Best Computer Security Software - Page 2

Compare the Top Computer Security Software as of August 2024 - Page 2

  • 1
    Avast Small Business Solutions
    Avast Small Business Solutions deliver next-gen endpoint protection for business Windows PCs, Mac, and Windows servers that you can manage anywhere via a web browser. Our robust, easy-to-use security for devices, data, and applications is designed to keep small organizations and their employees safer online. Avast antivirus with multiple layers of security, online privacy, and remote-control features provides powerful cybersecurity controlled via a cloud-based management console. Avast Small Business Solutions are managed via cloud-based management console Avast Business Hub and consist of: * Avast Essential Business Security   * Avast Premium Business Security - combines our next-gen antivirus with VPN and USB control) * Avast Ultimate Business Security - award-winning next-gen antivirus with online privacy tools and patch management automation software
    Starting Price: $39.99/device/year
  • 2
    CPTRAX for Windows

    CPTRAX for Windows

    Visual Click Software

    Server File Activity Tracking - Audit who is creating, accessing, moving, and deleting your files and folders. Track file permission changes. Real-time alerts about critical file activities. Malicious activity containment (Ransomware, mass file deletes, etc.) Workstation File Activity Tracking - Audit who is copying files to USB or other removable drives. Track who is uploading files from a browser or via FTP. Block files from being created on USB/removable device. Email alerts when a removable device is connected. Active Directory Auditing - Keep audit logs and get real-time alerts of important Active Directory changes without dealing with SACLs or Windows Event Logs. Server Authentication Auditing - Track authentications into Windows Servers and Citrix sessions. Review all failed logon attempts. Workstation Logon/Logoff Tracking - Get visibility on workstation logons/logoffs, including locks, unlocks and password changes. Review all failed logon attempts.
  • 3
    Webroot Business Endpoint Protection
    To secure your businesses, you need endpoint protection software that’s stronger and smarter than traditional business antivirus. Endpoint protection, or endpoint security, is a general term that describes cybersecurity services for network endpoints, like laptops, desktops, smartphones, tablets, servers, and virtual environments. These services may include antivirus and antimalware, web filtering, and more. Endpoint protection helps businesses keep critical systems, intellectual property, customer data, employees, and guests safe from ransomware, phishing, malware, and other cyberattacks. If you are thinking, “Do I need endpoint protection?” Consider this, criminals are constantly developing new ways to attack networks, take advantage of employee trust and steal data. Smaller businesses may think they’re not a target, but that couldn’t be further from the truth. In fact, small businesses with 100 employees or fewer now face the same risk of attack as a 20,000-employee enterprise.
    Starting Price: $30 per year
  • 4
    OneLogin

    OneLogin

    OneLogin

    Secure critical company information and empower employees with OneLogin, a trusted identity and access management (IAM) solution for the modern enterprise. Designed to strengthen enterprise security while simplifying business logins, OneLogin is an excellent solution for companies looking to enforce security policies with ease. OneLogin includes top-rated features such as single sign-on (SS), unified directory, user provisioning, adaptive authentication, mobile identitiy, compliance reporting, and more.
  • 5
    Skybox Security

    Skybox Security

    Skybox Security

    The Skybox approach to risk-based vulnerability management starts with fresh vulnerability data from your entire network — physical IT, multi–cloud and operational technology (OT). Skybox uses a wide range of sources, including asset and patch management systems and network devices, to assess vulnerabilities without a scan. We also collect, centralize and merge data from multiple scanners to give you the most accurate vulnerability assessments on demand. Centralize and enhance vulnerability management processes from discovery to prioritization and remediation. Harness the power vulnerability and asset data, as well as network topology and security controls. Use network modeling and attack simulation to find exposed vulnerabilities. Augment vulnerability data with intelligence on the current threat landscape. Know your best remediation option, including patching, IPS signatures and network–based changes.
  • 6
    Kaspersky Security Cloud
    Get our best apps & features under one account. 6 premium products & apps for Windows, macOS, Android & iOS – all in one place & packed with 100s of features. Includes antivirus, anti-ransomware, mobile security, password management, VPN* & parental controls. Plus privacy tools, data leak detection, Home Wi-Fi security & payment protection – all easy to manage remotely. Find out if your private accounts data is leaked & get advice on what to do next. Get notified in real time if an unknown app attempts to connect to your webcam or mic*. Plus get personalized alerts & warnings sent straight to your devices to keep you safe. Take advantage of cloud-based security that keeps your devices fast and easy to use. Predict & fix issues with your hard drive by viewing metrics that report on its health. Manage storage space and battery life on your Android devices with specially built tools.
    Starting Price: $53.99 per year
  • 7
    Seraphic

    Seraphic

    Seraphic Algorithms

    Seraphic can secure any version of any browser on any device to prevent phishing, spear-phishing, clickjacking, CSS injection, man-in-the-middle, and Zero-day and unpatched N-Day attacks that other vendors cannot. This means that your end-users can leverage any combination of browsers they prefer and you can centrally manage corporate policy and governance for browsing as well as enterprise/private apps and SaaS environments. Seraphic also includes robust policy and governance controls including state of the art DLP engines that scans all outbound and inbound data in any format for any file with a complete privacy first approach.
  • 8
    Cylance

    Cylance

    BlackBerry

    Cylance uses cutting-edge algorithms and artificial intelligence to proactively protect you, preventing threats like malware, hackers, viruses, ransomware, and malicious websites. It does this whilst being lightweight and easy to use. We use cloud-based supercomputers and millions of examples of malicious programs to train a neural net, a kind of digital brain, to recognise threats. When you purchase Cylance, this is what you download onto your computer - a superlightweight 'brain', trained to catch and quarantine viruses. Cylance sits in the background, instantly recognising threats the moment they occur and reacting in milliseconds - unlike other antivirus software which must constantly scan for threats. Our AI quarantines files it identifies as threats, allowing you to review individual threats on you and your family's computers. Cylance sits in the background, instantly recognising threats the moment they occur and reacting in milliseconds.
    Starting Price: $29 per year
  • 9
    LogPoint

    LogPoint

    LogPoint

    Get a simple and fast security analytics implementation, along with a user-friendly interface that can be integrated with an entire IT infrastructure with LogPoint. LogPoint’s modern SIEM with UEBA provides advanced analytics and ML-driven automation capabilities that enable their customers to securely build-, manage, and effectively transform their businesses.They have a flat licensing model, based on nodes rather than data volume. This helps to reduce the cost of deploying a SIEM solution on-premise, in the cloud or even as an MSSP. The solution integrates easily with all devices in your network, giving a holistic and correlated overview of events in your IT infrastructure. LogPoint’s Modern SIEM solution translates all data into one common language, making it possible to compare events across all systems. Having a common language makes it both very easy and efficient to search, analyze and report on data.
  • 10
    Acunetix

    Acunetix

    Invicti Security

    As the market leader in automated web application security testing, Acunetix by Invicti is the go-to security tool for Fortune 500 companies. DevSecOps teams can cut through the noise to uncover unseen risks and mitigate dangerous exploits, detecting and reporting on a wide array of vulnerabilities. With an industry-leading crawler that fully supports HTML5, JavaScript, and Single-page applications, Acunetix enables the auditing of complex, authenticated applications for deeper insight into an organization's risk posture. It's a leader for a reason: the technology behind Acunetix delivers the only product on the market that can automatically detect out-of-band vulnerabilities to enable comprehensive management, prioritization, and control for vulnerability threats by criticality. Plus, it's available both online and as an on-prem solution, integrating with popular issue trackers and WAFs so that DevSecOps teams don't have to slow down when building innovative apps.
  • 11
    CWIS Antivirus Scanner

    CWIS Antivirus Scanner

    Cobweb Security

    We ensure 100% protection for your website by providing 24/7 security monitoring. If any hackers attack or virus injection occurs, we will clean and repair your website instantly. 24/7/365 monitoring of your website in our situation room. If an attack occurs, our software engineers will get an instant notification and protect, clean (if needed) and fix your website in the shortest possible time. Website clean-up and repair within 12 hours. Reports & Alerts via email. 24/7 Technical support. With CWIS Premium, you will get the best protection at the most reasonable price. You will receive recommendations for security hardening.
  • 12
    McAfee LiveSafe
    McAfee® LiveSafe™ is the ultimate protection for your PCs, Macs, smartphones, and tablets. McAfee LiveSafe provides award-winning antivirus protection and much more, covering your computers, mobile devices and even your identity. We help keep you safe – so you can focus on what matters. Defend against viruses and threats with online and offline protection. Protect your PCs, Macs, smartphones, and tablets with one subscription. Keep your browsing habits and data safe from prying eyes when connected to public Wi-Fi. Among our security solutions, McAfee LiveSafe stands tall with its combination of antivirus, privacy, and identity tools and features, built to protect you from all kinds of threats. And now, when you’re enrolled in auto-renewal**, you’ll gain access to our secure VPN, which provides bank-grade encryption to keep your personal information and online habits protected.
    Starting Price: $39.99 per year
  • 13
    Forescout

    Forescout

    Forescout Technologies

    It seemed to happen overnight. Your organization became a veritable Enterprise of Things (EoT). PCs, mobile devices, cloud workloads and other traditional IT systems. Agentless IoT and OT devices. Device diversity is thriving at the cost of security as your users connect from all over the map – literally. Here’s the thing: Every thing that touches your enterprise exposes you to potential risk. You must see it and secure it. Get to know Forescout. We offer the only solution that actively defends the Enterprise of Things at scale. Complex networks housing business-critical data and applications in physical, virtual and cloud environments create blind spots and security concerns. Gain Zero Trust security with 100% device visibility and control, network segmentation and unified policy enforcement with Forescout. Forescout offers agentless visibility and control of network-attached systems, allowing you to better secure your network.
  • 14
    Cornerstone MFT Server

    Cornerstone MFT Server

    South River Technologies

    Enterprise MFT Server Solution with high availability and failover to eliminate downtime. Advanced automation for improved productivity, SFTP Server for file transfers, and security that exceeds industry standards. Cornerstone MFT Server was named a Cybersecurity Excellence award winner for secure file transfer solution in 2018, 2019, and 2020. Cornerstone also offers a range of implementation options that can securely facilitate migration to the cloud, stand up reliable on-premise options, or customize a hybrid of both to best suit your organization’s objectives and budget. Our professional services team is available to assist you with any configuration that you choose.
  • 15
    GamaScan

    GamaScan

    GamaSec

    GamaSec provides a unique combination of cyber security, remediation-as-a-service and financial assurance to minimize the risk of website attacks for small and medium-sized businesses. FINALLY, SMBs gain the same security and resilience as large enterprises. GamaSec provides a combination of online web vulnerability scanning, daily malware detection & blacklist monitoring for optimal protection that significantly reduce risk of cyber breach of your website. GamaSec reports virtually eliminating false positives and dramatically simplifying remediation, enabling our trained security experts to fix and remove website vulnerability and malware from your website. GamaSec offers an always-on, cloud-based PCI-certified Web Application Firewall (WAF) and advanced Distributed Denial of Service (DDoS) protection to consistently guard against web attacks. GamaSec offers a data breach limited warranty that pays up to $50,000 to help cover costs associated with data restoration.
  • 16
    ZoneAlarm Extreme Security NextGen
    ZoneAlarm for Business offers comprehensive, advanced, and flexible solutions for unmanaged businesses such as small businesses, Telco’s, government municipalities, and other businesses with little to no IT resources. With its easy deployment and maintenance, ZoneAlarm for Business offers you Check Point’s vigorous multi-platform protection and support, made simple. ZoneAlarm Extreme Security NextGen is the comprehensive, ultimate PC and mobile security solution for all your business security needs, using Check Point’s cutting-edge enterprise-grade technology. Next-gen antivirus with award-winning Anti-Ransomware, advanced phishing protection, and secure browsing experience. Our advanced cyber security solutions use business-class protection to secure millions of home users’ PCs and mobile devices against the latest worldwide cyber threats. This powerful weapon is extremely effective at spotting malicious files and cyberattacks that evade traditional antiviruses.
    Starting Price: $44.95 per year
  • 17
    BroShield

    BroShield

    BroShield

    If you want to free your system with unwanted snoop ware then BroShield should be your 1st choice as this provides you a great anti snooping and detection of harmful viruses from your computer. Protect your computer with BroShield protection. BroShield helps you to get full authority over the internet. You can keep an eye on what kind of content your kid is exposed to. Restriction of adult websites and harmful content is in your hand. Allows you to control the internet access time. There are a lot of illegal websites that still run on the internet. We need to restrict our kids from getting exposed to sites like porn, gambling, and inappropriate sites. Visiting such sites may bring in viruses and other unwanted things with it. BroShield runs 24/7 to look for viruses and threats and keep the computer in full monitoring, to block the potential threats. The smart feature of BroShield fail-safe is designed to look for all the remote snooping activities to prevent getting compromised.
    Starting Price: $49.95 per year
  • 18
    CySight

    CySight

    IdeaData

    CySight's Dropless Collection method provides absolute data retention, enabling the most data orientated decision making and cost-effective workflow for any organization, significantly enhancing network performance, network security and cyber intelligence to the highest level. With a Unique approach, CySight delivers comparative baselining, superior granularity, scalable collection, root cause analysis and QoS Analysis. All Designed to run independently or work together as a powerful single unit. CySight empowers communication and application visibility for networking, security, billing and compliance with high-end integrated network traffic analytics, granular forensics, cybersecurity intelligence, cloud usage, internet-of-things analytics, peering and billing to medium and large enterprise customers and service providers. Our objective at CySight is to reveal your data’s potential and eliminate all blind spots.
    Starting Price: $299/month
  • 19
    Apozy Airlock
    Apozy Airlock. The browser endpoint detection and response platform that neutralizes web attacks in one click. The Internet is a dangerous place. It doesn’t have to be. Airlock fills the gap in your EPP/EDR by protecting the browser, delivering a safe, clean, and lightning-fast internet experience. Powered by the very first visually-aware native browser isolation platform with over 6 petabytes of visual data, Airlock prevents web attacks in real time. Airlock stops spearfishing in its tracks. With a visual model database of over 67.83 billion pages which analyzes over 12.20 trillion links per year, our technology protects anyone clicking on a malicious link by sandboxing the threat.
    Starting Price: $9/month/user
  • 20
    USBSecure Enterprise

    USBSecure Enterprise

    Lugrain Software

    USBSecure Enterprise is a USB port security software. It protects your corporate network from unknown USB devices. You can define allowed USB devices in whitelists on a per-user basis. Centralized management - no dedicated server required. USBSecure Enterprise supports USB devices, Bluetooth devices, FireWire and eSATA devices, SD cards, floppy and CD/DVD drives. A special OT version is also available (Operational Technology). USBSecure supports English and German languages, but is customizable to any other language.
    Starting Price: $ 298 for 10 PCs
  • 21
    EventSentry

    EventSentry

    NETIKUS.NET ltd

    Hybrid SIEM solution combining real-time (event) log monitoring with comprehensive system health & network monitoring provides users with a complete picture of their servers and endpoints. The included security event log normalization & correlation engine with descriptive email alerts provides additional context and presents cryptic Windows security events in easy to understand reports that offer insight beyond what is available from raw events. EventSentry's NetFlow component visualizes network traffic, can detect malicious activity and offers insight into bandwith usage. Keeping track of Active Directory changes is easy with EventSentry's ADMonitor component that records all changes to AD & Group Policy objects and provides a complete user inventory to help identify obsolete accounts. Various integrations & multi-tenancy available.
    Starting Price: $85.00/one-time
  • 22
    Automox

    Automox

    Automox

    Cloud-native and globally available, Automox enforces OS & third-party patch management, security configurations, and custom scripting across Windows, Mac, and Linux from a single intuitive console. IT and SecOps can quickly gain control and share visibility of on-prem, remote and virtual endpoints without the need to deploy costly infrastructure.
    Starting Price: $3.00
  • 23
    Bodi

    Bodi

    Pilixo

    A data breach can happen to any company, at anytime. Whether it’s a malicious attacker, a disgruntled former employee or a careless insider, no organization is immune. Prevents users from accidentally clicking on a malicious link stopping malware in its tracks irrespective of the vector – email, Skype, attachments, websites, Slack, etc. Stop data theft with real-time alerts based on defined keywords, file actions, special formats such as SSN or credit card number, and unauthorized privilege change. Detailed analysis of application usage, web browsing, printing, etc. as well as time and length of usage. Full video recording and keyword searching of each device in case you need to review and analyze. Full remote control capabilities of the endpoint to correct device. Employee Monitoring prevents users from clicking on malicious links helping you to stop malware in its tracks, irrespective of the platform.
    Starting Price: $20 per month
  • 24
    FileAudit

    FileAudit

    IS Decisions

    Proactively track, audit, report, alert on and respond to, all access to files and folders on Windows Servers and in the cloud. Monitor, in real time, access to sensitive files stored on both Windows Servers and in the cloud. Powerful filtering helps you find the answers you need quickly; tracking IP address and machine name pinpoints the exact access. Set up email alerts and a triggered response for access events (access denied - file deletion - a specific user, machine or IP address - time of access) and mass access events such as the copy, deletion or movement of bulk files. Review a searchable, secure and always-available audit trail. Analyze the access to and usage of files stored both on-premises and in the cloud. Schedule centralized reports according to multiple criteria.
    Starting Price: $826 one-time payment
  • 25
    SpyShelter

    SpyShelter

    SpyShelter

    SpyShelter Anti Keylogger monitors behavior of all currently ongoing actions on your PC and allows you to prevent any action that malware attempts to make. Thanks to our unique technology, SpyShelter is capable of stopping both commercial and custom-made keyloggers, which cannot be detected by any anti-virus software. Since SpyShelter does not rely on any fingerprint database, you will not have to worry about zero-day malware – your registry, RAM and all applications are going to be protected from the moment you install SpyShelter. Compared to other security software, SpyShelter’s fast algorithm processing does not slow your computer down, making it suitable even for older computers. SpyShelter Anti Keylogger provides solid protection in real time against known and unknown “zero-day” spy and monitoring software, for example: keyloggers, screen loggers, webcam loggers, and even advanced financial malware.
    Starting Price: $25 per year
  • 26
    Data Rover

    Data Rover

    Data Rover

    Data Rover is an Advanced User Data and Security Management for any Data-Driven Organisation. A single solution for Infrastructure and Security managers that allows data users to explore, manage, process, and protect their data effectively and efficiently, by simultaneously addressing the two primary needs related to the use of data: Cyber Security and Data Management. Data Rover plays a key role in business asset protection and corporate data management policy definition. Data Analytics Check for security flaws and eliminate issues. Simplify the management of permissions. File Auditor It gives you the proof that something was done. Right or Wrong it's not important - JUST the FACTS. Dark Data Makes work faster and safer by optimising the storage resources usage and reducing costs. Involve the users in data management so they can contribute in keeping the storage systems clean and efficient. Advanced Data Exchange Share business data in/out of the company SAFELY.
  • 27
    modus

    modus

    Vircom

    modusCloud gives clients access to an enterprise security technology and infrastructure that is used by some of the world’s largest and most security conscious companies. We combine this with expert knowledge and understanding of the needs that smaller businesses have. Along with our email threat protection, we provide a hosted email security product with a robust filter-rules engine, email continuity with Emergency Inbox, policy-enforced encryption and a cloud-based email archive. All of which is managed in a simple and intuitive user interface. As a cloud-based email security product, the message filtering activities of modusCloud (including detection of suspicious mail) take place at an external data center, protecting users from external threats while being managed by highly specialized personnel. Organizations simply register their mail servers, domains, and users by following an easy setup wizard.
    Starting Price: $12 per user per month
  • 28
    WipeDrive

    WipeDrive

    WipeDrive

    WipeDrive allows home users, corporations and government entities to securely and permanently erase data from hard drives, removable media, and mobile devices, providing a cost-effective, secure, and socially responsible way of recycling and retiring computer storage. WipeDrive is the world leader in secure data destruction.
    Starting Price: $19.95/one-time/drive
  • 29
    Bacula Enterprise

    Bacula Enterprise

    Bacula Systems

    Bacula Enterprise delivers Physical, Virtual, Container and Hybrid Cloud Backup & Recovery software for the Modern Data Center - all from a single platform. Designed for medium and large organizations, Bacula Enterprise backup and recovery software brings unique innovation, modern architecture, business value benefits and low cost of ownership. Bacula Enterprise corporate data backup software solution uses exclusive technologies that increase the interoperability, power, flexibility and functionality of Bacula Enterprise into a wide range of IT environments such as enterprise data centers, managed service providers, software vendors or cloud providers. Thousands of organizations worldwide use Bacula Enterprise in mission-critical environments, including NASA, Texas A&M University, Unicredit, Swisscom, Sky, and many more. Bacula provides additional security features over other vendors and offers advanced, hybrid Cloud connectivity to Amazon, S3, Google, Oracle and many more.
  • 30
    Coro

    Coro

    Coro Cybersecurity

    Coro puts an end to the security tool sprawl and to the constant worry that things have been overlooked. No need to check everything 10 times a day. Coro will take care of the ongoing security, and will alert you only when you need to take action. Coro analyses the threats to your entire business, takes action to eliminate the risk, and guides you on what to do next to improve your security posture. Coro is the central control point for sensitive data, practice data, and user activity, enabling you to enforce a wide range of security, compliance and governance policies. We scan every email for phishing, malware, ransomware and automatically eliminate threats. We automatically identify and block insider threats, accounts hacking, and malicious activities. We scan every file and email, or any data share for PII/PCI/PHI, and prevent confidential information leakage.
    Starting Price: $8.99 per user per month