• Categories

    • Loading categories...

      Loading markets...

  • For Vendors

    • Log In to Vendor Portal 

    • Get Started 

  • Write a Review

Join / Sign In
All Categories
/
IT Security

'IT Security' Reviews and Ratings

What is 'IT Security' market?

IT Security refers to products and services that protect digital systems and data from cyber threats and unauthorized access. This category includes markets that focus on network security, identity management, data protection, and cloud security, enabling organizations to reduce risk, ensure compliance, and operate securely in a digital world.

How Categories and Markets Are Defined
Highest Rated By Your Peers
For Willingness to Recommend
Logo of Patch My PC Patch Management
Patch My PC Patch Management
Logo of Chainalysis Reactor
Chainalysis Reactor
Logo of Cloudflare Access
Cloudflare Access
For 50M-1B USD Companies
Logo of Patch My PC Patch Management
Patch My PC Patch Management
Logo of Qualys TotalAppSec
Qualys TotalAppSec
Logo of Imperva Web Application Firewall (WAF) Gateway
Imperva Web Application Firewall (WAF) Gateway
For North America
Logo of Patch My PC Patch Management
Patch My PC Patch Management
Logo of Skyhigh Cloud-Native Application Protection Platform
Skyhigh Cloud-Native Application Protection Platform
Logo of Sucuri Website Firewall (WAF)
Sucuri Website Firewall (WAF)
Integration & Deployment
Logo of Patch My PC Patch Management
Patch My PC Patch Management
Logo of Sucuri Website Firewall (WAF)
Sucuri Website Firewall (WAF)
Logo of Chainalysis Reactor
Chainalysis Reactor

Product Listings

Filter by

Products 1 - 20 of 1236
Sort by
Logo of Trend Micro Deep Security

Trend Micro Deep Security

By Trend Micro

4.6
(608 Ratings)

Trend Micro is a global company specializing in cybersecurity. With comprehensive experience and global threat research, the principal business issue the company addresses is digital safety. Its cybersecurity platform is designed to protect numerous organizations and individuals across diverse clouds, networks, devices, and endpoints. The primary area of operation is in cloud and enterprise cybersecurity distinctive for providing advanced threat defense techniques suitable for various platforms. Additionally, the company offers central visibility for swift and improved detection and response. The threat research team of the company supplies essential intelligence and insights, thereby augmenting the effectiveness of the cybersecurity platform and assisting worldwide organizations in combating cyber threats. With a team of 7,000 employees spread across 65 countries, the primary aim of the company is to assist organizations in securing their connected world.

Show More Details
Logo of Skyhigh Cloud-Native Application Protection Platform

Skyhigh Cloud-Native Application Protection Platform

By Skyhigh Security

4.6
(417 Ratings)

Skyhigh Security protects organizations with cloud-based Zero Trust security solutions that are both data-aware and simple to use. Our Security Service Edge portfolio goes beyond data access and focuses on data use, allowing organizations to collaborate from any device and from anywhere without sacrificing security, while providing the visibility and control required to monitor and mitigate security risks. The Skyhigh Security Service Edge portfolio includes Skyhigh Secure Web Gateway, Skyhigh Cloud Access Security Broker, Skyhigh Privately Held Access, and Skyhigh Cloud Native Application Protection Platform.

Show More Details
Logo of Sucuri Website Firewall (WAF)

Sucuri Website Firewall (WAF)

By Sucuri

4.4
(271 Ratings)

Formed in 2008, the company is engaged in providing comprehensive website security solutions. It offers services ranging from malware removal to malware monitoring and website protection. Among its primary offerings is a tool named SiteCheck, which website owners utilize to monitor their sites for potential security issues including malware and blacklist status. Another key service is the CloudProxy Firewall, which is designed to shield websites and their visitors from different types of attacks. A central part of the company's mission is to increase awareness regarding website security concerns and to counteract web-based attacks.

Show More Details
Logo of Ivanti Connect Secure

Ivanti Connect Secure

By Ivanti

4.3
(251 Ratings)

Ivanti manages and secures Everywhere Work environments so that organizations and employees can improve their digital employee experience (DEX). Ivanti technology focuses on empowering IT and employees. Ivanti solutions let IT and employees use a wide range of corporate and personal devices to access IT applications and data over multiple networks to stay productive. Ivanti solutions find, manage and protect each IT asset and endpoint in an organization, no matter the OS. Over 40,000 customers, including 88 of the Fortune 100, have chosen Ivanti to help them deliver an excellent digital employee experience and improve IT and security team productivity and efficiency.

Show More Details
Logo of Qualys TotalAppSec

Qualys TotalAppSec

By Qualys

4.6
(231 Ratings)

Qualys, Inc. (NASDAQ: QLYS) is a pioneer and leading provider of disruptive cloud-based security, compliance and IT solutions with more than 10,000 subscription customers worldwide, including a majority of the Forbes Global 100 and Fortune 100. Qualys helps organizations streamline and automate their security and compliance solutions onto a single platform for greater agility, better business outcomes, and substantial cost savings.

The Qualys Cloud Platform leverages a single agent to continuously deliver critical security intelligence while enabling enterprises to automate the full spectrum of vulnerability detection, compliance, and protection for IT systems, workloads and web applications across on premises, endpoints, servers, public and private clouds, containers, and mobile devices.

Show More Details
Logo of Forcepoint Web Security (Appliance)

Forcepoint Web Security (Appliance)

By Forcepoint

4.3
(223 Ratings)

Forcepoint’s mission is to foster safe and trusting environments through a comprehensive security solution that understands digital identities and their cyber behaviors to protect employees and critical data everywhere. Forcepoint achieves this mission by simplifying security for global businesses and governments. The company’s all-in-one, truly cloud-native platform makes it easy to adopt Zero Trust, Security Service Edge (SSE), and Secure Access Service Edge (SASE), by preventing the theft or loss of sensitive data and intellectual property no matter where people are working. Rather than offering a static one-size fits all approach, Forcepoint solutions inherently understand how people interact with data, providing secure access while enabling employees to create value. Forcepoint creates safe, trusted environments for customers and their employees to achieve their highest potential while reducing risk.

Show More Details
Logo of Patch My PC Patch Management

Patch My PC Patch Management

By Patch My PC

4.9
(216 Ratings)

Patch My PC aims to simplify how enterprises create, manage, update, and deploy third-party applications within Microsoft Configuration Manager and Intune while creating experiences and relationships with the customers who trust them.

Show More Details
Logo of InsightAppSec

InsightAppSec

By Rapid7

4.3
(215 Ratings)

Rapid7, Inc. aims to create a safer digital world by simplifying and making cybersecurity simpler and more accessible. Rapid7 empowers security professionals worldwide to manage a modern attack surface through its technology, research, and broad, strategic expertise. Rapid7’s comprehensive security solutions help over 11,000 customers unite cloud risk management with threat detection and response to reduce attack surfaces and eliminate threats quickly and precisely.

Show More Details
Logo of Cloudflare Access

Cloudflare Access

By Cloudflare

4.5
(208 Ratings)

Cloudflare, is a provider of WAAP, SASE, SSE, SD-WAN, CDN, and Edge Developer services. Cloudflare empowers organizations to make their employees, applications and networks faster and more secure everywhere, while reducing complexity and cost. Cloudflare delivers all services from a single intelligent global network platform, providing customers with a unified platform of cloud-native products and developer tools, so any organization can gain the control they need to work, develop, and accelerate their business.

Show More Details
Logo of Carbon Black App Control

Carbon Black App Control

By Broadcom

4.5
(190 Ratings)

Broadcom Inc. is a global entity focusing on the design, development, and supply of semiconductor and infrastructure software solutions. Through these operations, the firm addresses the primary issue of providing efficient top-notch technology-based solutions.

Show More Details
Logo of Absolute Secure Access

Absolute Secure Access

By Absolute Security

4.6
(173 Ratings)

Absolute Security is embedded in the firmware of more than 600 million Windows endpoints, relied upon by thousands of enterprise customers, and licensed across more than 16 million remote, hybrid, and mobile devices. As a resilience platform providing endpoint management and security service edge, the Absolute Secure Endpoint and Absolute Secure Access product offerings empower CISOs and CIOs to defend their organizations against threats, protect them against risk, and stop downtime caused by cyberattacks, ransomware, and IT failures. The product capabilities deliver cyber resilience across endpoints, access, and applications.

Show More Details
Logo of Acunetix

Acunetix

By Invicti

4.4
(165 Ratings)

Formed through the combination of Netsparker, Acunetix, and Kondukto, Invicti Security provides an application security platform that unifies DAST, SAST, IAST, SCA, API security, secrets scanning, container security, and application security posture management (ASPM) to help enterprise organizations identify, prioritize, and remediate vulnerabilities across their application portfolio.

The platform's proof-based scanning validates runtime vulnerabilities while ASPM capabilities correlate findings across security tools to eliminate false positives. AI-powered remediation provides contextual fix recommendations within developer workflows. Key capabilities include automated vulnerability discovery, intelligent risk prioritization, unified dashboard management, and CI/CD pipeline integration.

Show More Details
Logo of Imperva Web Application Firewall (WAF) Gateway

Imperva Web Application Firewall (WAF) Gateway

By Thales Group (Imperva)

4.4
(164 Ratings)

Imperva is a cybersecurity firm that assists organizations in safeguarding critical applications, APIs, and data across various scales and locations. It adopts a comprehensive approach that amalgamates edge, application security, and data security to offer protection to businesses at all levels of their digital journey. Imperva Threat Research and the worldwide intelligence community contribute to Imperva's knowledge of the evolving threat landscape. This understanding allows incorporation of the most recent security, privacy, and compliance expertise into the offered solutions.

Show More Details
Logo of Symantec Advanced Threat Protection

Symantec Advanced Threat Protection

By Broadcom

4.5
(156 Ratings)

Broadcom Inc. is a global entity focusing on the design, development, and supply of semiconductor and infrastructure software solutions. Through these operations, the firm addresses the primary issue of providing efficient top-notch technology-based solutions.

Show More Details
Logo of Symantec ProxySG

Symantec ProxySG

By Broadcom

4.3
(141 Ratings)

Broadcom Inc. is a global entity focusing on the design, development, and supply of semiconductor and infrastructure software solutions. Through these operations, the firm addresses the primary issue of providing efficient top-notch technology-based solutions.

Show More Details
Logo of Chainalysis Reactor

Chainalysis Reactor

By Chainalysis

4.7
(139 Ratings)

Chainalysis is the blockchain data platform. We provide data, software, services, and research to government agencies, exchanges, financial institutions, and insurance and cybersecurity companies in over 70 countries. Our data powers investigation, compliance, and market intelligence software that has been used to solve some of the world’s most high-profile criminal cases and grow consumer access to cryptocurrency safely.

Show More Details
Logo of Sophos Central

Sophos Central

By Sophos

4.6
(118 Ratings)

Sophos is a global provider of advanced cybersecurity solutions. Their main focus is the delivery of an extensive range of security technologies including Managed Detection and Response (MDR), incident response services, as well as endpoint, network, email, and cloud security systems. These products and services are designed to help organizations combat various cyber threats such as active adversaries, ransomware, phishing, and malware. The company offers fully-managed, turnkey security solutions, providing cybersecurity-as-a-service to organizations worldwide. Moreover, Sophos hosts a cloud-based management console, known as Sophos Central, and supports the Sophos X-Ops, a cross-domain threat intelligence unit. The unit enriches the Sophos Adaptive Cybersecurity Ecosystem by optimizing its centralized data lake with a powerful set of open APIs. Sophos' operations are globally distributed and the company's headquarters are in Oxford, U.K.

Show More Details
Logo of Proofpoint Cloud App Security Broker (PCASB)

Proofpoint Cloud App Security Broker (PCASB)

By Proofpoint

4.4
(111 Ratings)

The company focuses on providing cybersecurity and compliance solutions. It primarily aims to offer protection across various digital channels such as email, web, cloud, and social media.

Show More Details
Logo of Citrix Gateway

Citrix Gateway

By Citrix

4.3
(97 Ratings)

Citrix, a business unit of Cloud Software Group, provides a secure app and desktop delivery platform that companies of all sizes can use to enable secure flexible work. With Citrix, employees can work where and how they prefer, and IT can be confident their information and devices remain safe.

Show More Details
Logo of Quick Heal (Legacy)

Quick Heal (Legacy)

By Seqrite

4.6
(94 Ratings)

SEQRITE, an Enterprise Security brand, addresses pressing cybersecurity needs through the development of innovative and straightforward solutions. The company combines intelligence, application analysis, and cutting-edge technologies to bolster user protection. Quick Heal's two-decades' worth of expertise in crafting cybersecurity solutions underpins SEQRITE's efforts. The primary objective is securing networks globally, assisting customers across 80 countries.

Show More Details

Top Trending Products

Check Point Harmony SaaSThales Sentinel Software MonetizationeSIM ManagementValence SaaS Security PlatformScienceSoft Penetration Testing ServicesDropzone AIAdmin By Request Endpoint Privilege Management (EPM)Kratikal Governance, Risk & Compliance ServiceTG IPXBackup Cloud

Popular Product Comparisons

CrowdStrike Falcon Shield vs ObsidianAccelPro Zero Trust Secure Access vs Trend Micro Deep SecurityEMV 3-D Secure vs Trend Micro Deep SecurityMicrosoft Identity Manager (MIM) vs ObsidianNetwrix Change Tracker vs Quest Change Auditor for Active DirectoryRadware AppWall vs Trend Micro Deep SecurityAirlock Digital vs Backup CloudBackup Cloud vs Boomerang for VMwareBarracuda Web Security Gateway vs Mimecast Web Security

Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences, and should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.

This site is protected by hCaptcha and its Privacy Policy and Terms of Use apply.


Software reviews and ratings for EMMS, BI, CRM, MDM, analytics, security and other platforms - Peer Insights by Gartner
Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQsPrivacyTerms of Use

©2026 Gartner, Inc. and/or its affiliates.

All rights reserved.