# Unisys Cybersecurity Software Pricing, Alternatives & More 2026 | Capterra

> With the help of Capterra, learn about Unisys Cybersecurity Software - reviews, pricing plans, popular comparisons to other Cybersecurity products and more.

Source: https://www.capterra.com/p/10031941/Unisys-Cybersecurity

---

# 

 Unisys Cybersecurity Software Review 2026: Features, Reviews, Integrations, Pros & Cons

Last updated on March 13, 2026

Provider data verified by our Software Research team, and reviews moderated by our Reviews Verification team.

Independent research methodology

Capterra’s researchers use a mix of verified reviews, independent research and objective methodologies to bring you selection and ranking information you can trust. While we may earn a referral fee when you visit a provider through our links or speak to an advisor, this has no influence on our research or methodology. [Learn more](https://www.capterra.com/resources/proprietary-data-research/)

How Capterra verifies reviews

Capterra carefully verified over 2.5 million+ reviews to bring you authentic software experiences from real users. Our human moderators verify that reviewers are real people and that reviews are authentic. They use leading tech to analyze text quality and to detect plagiarism and generative AI. [Learn more](https://www.capterra.com/resources/how-we-verify-reviews/)

How Capterra ensures transparency

Capterra lists all providers across its website—not just those that pay us—so that users can make informed purchase decisions. Capterra is free for users. Software providers pay us for sponsored profiles to receive web traffic and sales opportunities. Sponsored profiles include a link-out icon that takes users to the provider’s website. [Learn more](https://www.capterra.com/resources/how-we-ensure-transparency/)

[Description](#description)[Use cases](#use-cases)[Features](#features)[Pricing](#pricing)[Support](#support)

Unisys Cybersecurity

## What is Unisys Cybersecurity?

Unisys Cybersecurity is an endpoint detection and response solution that helps businesses protect digital assets by addressing threats and ensuring compliance. It enables teams to secure infrastructure, applications, and data through layered defenses. Security transformation supports teams with audits, assessments, and consulting. Administrators can use the continuous threat exposure management tool to identify vulnerabilities and mitigate risks. Digital identity and access management offers passwordless access, single sign-on, and role-based controls. Operators can utilize secure network access functionality to streamline zero trust architecture and microsegmentation. Its managed detection and response functionality provides monitoring, threat detection, and incident response. Supervisors can restore critical assets after ransomware attacks with advanced storage vaults and automated backup testing.

## What is Unisys Cybersecurity used for?

[Endpoint Protection](https://www.capterra.com/endpoint-protection-software/)[Threat Intelligence](https://www.capterra.com/threat-intelligence-software/)[Cybersecurity](https://www.capterra.com/cybersecurity-software/)

Overall rating

Based on 0 user reviews

Reviews sentiment

Positive

\-

Neutral

\-

Negative

\-

Contact vendor  
for pricing

Free trial  
not available

Capterra Shortlist charts the highest-rated and most popular products...

Our "Best of" badge program showcases products with the highest ratings...

Our "Best of" badge program showcases products with the highest ratings...

Do you work for Unisys Cybersecurity?[Manage this product listing](https://digitalmarkets.gartner.com/get-listed/claim-bx?url=http://www.unisys.com&name=Unisys Cybersecurity)

## Features

Features with the highest number of reviews are displayed first. Those that have no reviews appear next, sorted alphabetically.

Activity Dashboard

Dashboard to view the status of ongoing processes, identify current incidents and track past activities

Activity Monitoring

Track and report on everything that happens within the system or network

Activity Tracking

Track and document all activities across devices, networks, and other systems

Alerts/Notifications

Alerts or notifications of various types such as pop-up messages, sounds, banners, or badges

Anomaly/Malware Detection

Automatically identify and flag unusual behaviors and malicious software

Application Security

Identify and respond to security threats to developed applications

Unisys Cybersecurity 38 features

Dashboard to view the status of ongoing processes, identify current incidents and track past activities

Track and report on everything that happens within the system or network

Track and document all activities across devices, networks, and other systems

Alerts or notifications of various types such as pop-up messages, sounds, banners, or badges

Automatically identify and flag unusual behaviors and malicious software

Identify and respond to security threats to developed applications

Creation, administration, and evaluation of assessments or tests

Track and analyze user behavior within a system or network

Track visitors'/audience's responses across web pages and other optimized content

Track and analyse user behavior within a system or network

Track and manage adherence to policies for any service, product, process, or supplier

Conduct tracking and assessment of application and device behavior without breaks or interruptions

Alter the layout and content of reports

Protect sensitive data for digital privacy

Graphical representation of data

Track status, assign actions, and control access to systems for devices within the organization

Protect users working remotely and provide secure environments for personal devices to access company programs

Investigate security threats and validate malicious activity

A chronological record of actions or occurrences within a network, software, or process

Manage and track all disruptions and incidents

Report and update incidents related to health or workplace injuries that occur on a job or en route to a job site

Observe and track the demand, usage, progress or quality of a system, product, or user

Tracks and makes accessible data on the health of servers and other network components.

Set up and configure network resources to make them accessible for authorized users, devices and servers

Receive notification of issues as soon as they occur

Receive data and information in real time

Active monitoring of systems, applications, or networks

Notifications that are delivered to users as soon as an event occurs

Identify and orchestrate execution of actions needed to restore systems to optimal conditions

Remotely monitor and manage client networks, endpoints, systems, and devices via locally installed applications

Collection, analysis, and representation of numerical data and generation of reports to understand various patterns

View and track pertinent metrics to find patterns and gain insights from data

Notifying as a warning or reminder of a potential or imminent hazard

Analyze potential risks across the organization

At least a username and password is required to access the system

Information to prevent, understand and identify cyber threats

Identifying, analyzing, and mitigating security issues and taking appropriate action to protect systems and data from potential harm

Discover patch statuses and vulnerabilities

## Pricing

### Starting price

Contact vendor  
for pricing

Free trial  
not available

## Support, customer service and training options

Support

-   Email/Help Desk
-   FAQs/Forum
-   Knowledge Base
-   Phone Support
-   24/7 (Live rep)
-   Chat

Training

-   In Person
-   Live Online
-   Webinars
-   Documentation
-   Videos

Deployment

-   Web
-   Android
-   iPhone/iPad

Typical users

-   Freelancers
-   Small businesses
-   Mid size businesses
-   Enterprises

## Top-rated software of 2026

### Fill out the form and we'll send a list of the top-rated software based on real user reviews directly to your inbox.

Independent research methodology

Capterra's researchers use a mix of verified reviews, independent research and objective methodologies to bring you selection and ranking information you can trust. While we may earn a referral fee when you visit a provider through our links or speak to an advisor, this has no influence on our research or methodology.

[Learn more](https://www.capterra.com/resources/proprietary-data-research/)

How Capterra verifies reviews

Capterra carefully verified over 2.5 million+ reviews to bring you authentic software experiences from real users. Our human moderators verify that reviewers are real people and that reviews are authentic. They use leading tech to analyze text quality and to detect plagiarism and generative AI.

[Learn more](https://www.capterra.com/resources/how-we-verify-reviews/)

How Capterra ensures transparency

Capterra lists all providers across its website—not just those that pay us—so that users can make informed purchase decisions. Capterra is free for users. Software providers pay us for sponsored profiles to receive web traffic and sales opportunities. Sponsored profiles include a link-out icon that takes users to the provider's website.

[Learn more](https://www.capterra.com/resources/how-we-ensure-transparency/)