Best Computer Security Software - Page 6

Compare the Top Computer Security Software as of August 2025 - Page 6

  • 1
    iSafeSend

    iSafeSend

    iSafeSend

    Use iSafeSend to encrypt and safely send sensitive information via email. iSafeSend generates a unique one-time use link to your sensitive or confidential information. This unique link is accessible for a limited time and once it has been accessed or reaches its expiry date, it is deleted and can no longer be accessed. iSafeSend allows you to send multiple unique links in separate emails for the same confidential information. iSafeSend enables users to create shareable links that when clicked, give recipients access to the sensitive data that you are sharing. This data can only be viewed once, and after being viewed, it is deleted. Since these links can only be viewed once, recipients should not forward the links to other people. Specify the number of days until the links expire and select the number of links you wish to generate. Remember, each generated link can only be viewed once.
  • 2
    SentryBay Armored Client
    The missing piece in the security stack jigsaw, easily downloaded in one-click to complete your armored shield against cyberattacks. ‍The Armored Client provides real time patented protection to applications and data without needing to detect and respond to threats. It does this by using kernel level prevention of data exfiltration, even if threats exist, combined with the secure wrapping of applications and injected security. ‍ The Armored Client takes a layered approach to protecting endpoint devices being used remotely to access your applications and data and to support secure online browsing. Whether your employees are using unmanaged, BYOD or managed endpoint devices, all your corporate apps are targeted on the endpoint and run in a secure session.
  • 3
    Siwenoid

    Siwenoid

    Siwena

    SIWENOID is a JAVA application and runs under Windows, Linux or Mac OS X. It is flexible, reliable, user, and engineer friendly. SIWENOID can integrate many types of subsystems and unify the operation of all. Supports SIEMENS, Bosch, Dahua, Texecom, Paradox systems and many more. Control everything on one (or more) screen with a unified user interface for every subsystem. Siwenoid is built on open-source foundations to keep the cost of the product lower. To keep up with the constant firmware updates of the compatible systems we rely on flexibility. Main goal of the software is to minimize the latency on interconnecting and handling different protocols. Siwenoid can be configured in operation while the subsystems are working. SIWENOID is an OS-independent JAVA application. It is a flexible, reliable, user- and engineer-friendly, scalable, and cost-effective solution.
  • 4
    Clearswift Secure Email Gateway
    Clearswift Secure Email Gateway (SEG) provides uniquely powerful protection of an organization's email data against inbound cyber-attacks and outbound data loss prevention. As the number one method of communication for most organizations, email has become one of the top sources for cybercriminals to infiltrate your systems and take hold of your critical data. Our Secure Email Gateway protects against known and unknown malware but also advanced threats including phishing. IT teams need to ensure that information being shared across email both in and out of the organization is not only secure, but appropriate and compliant. Clearswift’s unparalleled level of inspection and granular policy controls apply the optimal security treatment to your emails in real time so your communications remain safe and flowing, and business disruptions are minimized.
  • 5
    Specops Password Sync

    Specops Password Sync

    Specops Software

    Streamline passwords for users with just one password across multiple business systems. Specops Password Sync instantly synchronizes Active Directory passwords to domains, or other systems. This includes domains in the same forest/other forests, on-premises systems (e.g. Kerberos), and SaaS targets (e.g. O365). The tool enhances security by ensuring that password complexity applies to all systems consistently. Specops Password Sync effectively extends Active Directory password security to other business systems, including external SaaS resources. When combined with a strong password policy, the product ensures that the same level of password complexity applies to all connected systems. Built on Active Directory, the tool captures and synchronizes all changes to a user’s password in accordance with the synchronization rules defined in Group Policy. The solution can be setup in just a few hours by configuring the local Active Directory.
  • 6
    Nfusion

    Nfusion

    Ntrepid

    Nfusion is a virtual desktop environment that allows you to manage your attribution, or maintain complete control of the technical and behavioral indicators that comprise your online presence. Our product combines digital fingerprint masking with integrated collection tools and third-party applications. Nfusion puts your investigation desktop into a remote, isolated VDI that is accessed over a VPN connection. Access the internet from one of our proprietary points of presence, allowing you to appear from the location of your choice. At the end of every session, your VM is purged, destroying any malware or trackers. Your workspace can be personalized with third-party applications, including Maltego, i2 Analyst Notebook, Wickr, Telegram, and other messaging platforms.
  • 7
    RollBack Rx Server

    RollBack Rx Server

    Horizon Datasys

    RollBack Rx Server Edition is a robust Windows Server backup and restores utility that enables IT, professionals, an instant backup capability that can quickly restore mission-critical systems back to any number of multiple restore points with unrivaled speeds. RollBack Rx Server Edition makes it quick and easy to safely sandbox updates and service patches with a failsafe approach to system recovery. RollBack Rx Server Edition offers unrivaled background protection and real-time recovery speeds. This allows you to store a locally backed-up sector-map repository of complete multiple instances (or “snapshots”) of the server state. These snapshots can be scheduled to occur at intervals you specify — as frequently as every minute — and can number many thousands. This continual snapshot-taking can be set to occur in the background with no perceptible impact on day-to-day server response times.
  • 8
    CimTrak Integrity Suite
    Securing your enterprise against internal and external threats is key to meeting compliance standards and regulations. CimTrak’s change management, auditing, and reporting capabilities allow private and public companies to meet or exceed even the most rigorous compliance mandates. From PCI, SOX, HIPAA, CIS, NIST, and many more, CimTrak has you covered. File and System Integrity monitoring helps protect your critical files from changes, whether malicious or accidental, that can take down your critical IT infrastructure, threaten critical data, or cause non-compliance with regulations such as PCI. Change is inevitable in the IT environment. CimTrak delivers integrity monitoring, proactive incident response, change control, and auditing capabilities in one easy to use and cost-effective file integrity monitoring tool.
  • 9
    OSE

    OSE

    Open Seas

    Once hacked, compromised organizations face huge barriers to rebuilding customer trust and brand reputation. OSE detects & alerts to attacks on your critical systems as they occur so you can stop them before damage is done to your organization's IP, brand and reputation with the ensuing loss of customer trust. OSE provides an audit of an attack listing what was changed, what it was before making it quick to resolve. OSE reporting helps with ISO 27000 compliance. OSE (Operating system Security Enforcer) implements your defined Security Policy which can either be an out of the box OSE standard or your personalized version. Rolling-out & apply the security policy on all Unix, Linux & Windows corporate servers. The Autonomous OSE Agent is permanently located on a Unix/Linux server. It is persistent, even in case of network failure. It can also group a set of servers monitored by OSE Agents.
  • 10
    NerveCenter

    NerveCenter

    Logmatrix

    Primary utility power outages do occur; often caused by poor infrastructure or weather. As the size, complexity and criticality of networks continue to grow, reliable backup op UPS power is critical to network uptime. Additionally, UPS batteries lose capacity in as early as three years. While UPS battery manufacturers may market their batteries with a ten-year design life or life span, external factors can cause degradation and shorten battery life. Internal cell resistance (via temperature) – To verify the state of health by identifying low capacity cells Inter-Cell Resistance – conduction path integrity between cells to avoid hot spots, fires, and abrupt shutdowns via temperature monitoring. Properly monitored UPS battery systems have a longer life, require less energy to charge and require less preventive maintenance. Improve uptime and prevent network outages caused by UPS failures, UPS capacity issues and drained UPS battery power.
  • 11
    Qualys TruRisk Platform
    Qualys TruRisk Platform (formerly Qualys Cloud Platform). The revolutionary architecture that powers Qualys’ IT, security, and compliance cloud apps. Qualys TruRisk Platform gives you a continuous, always-on assessment of your global IT, security, and compliance posture, with 2-second visibility across all your IT assets, wherever they reside. And with automated, built-in threat prioritization, patching and other response capabilities, it’s a complete, end-to-end security solution. On premises, at endpoints, on mobile, in containers or in the cloud, Qualys TruRisk Platform sensors are always on, giving you continuous 2-second visibility of all your IT assets. Remotely deployable, centrally managed and self-updating, the sensors come as physical or virtual appliances, or lightweight agents. Qualys TruRisk Platform provides an end-to-end solution, allowing you to avoid the cost and complexities that come with managing multiple security vendors.
    Starting Price: $500.00/month
  • 12
    IntelliTrack Network
    IntelliTrack Security Control is a software suite developed specifically for Security Control Teams working in multi-location organizations. IntelliTrack Security Control is an integrated software suite that should form the backbone to the much-needed Disaster Recovery Planning process required by all businesses and organizations. Based on the premise of 'knowing your business', Security Teams have at their fingertips information such as business assets, staff details, keyholders, alarms & activation, cctv capturing, safe and lock details and much more; all required to make that informed decision on security control. Knowing how each of your stores or branches are setup is a key aspect of successful proactive Security Management. With IntelliTrack Security Control software, your teams will know who, when and how to contact key personnel during a disaster or incident.
  • 13
    iLock Security Services
    Manages users, groups and roles. Authentication, delegation, authorization and auditing. Role-based access control, entitlements and time-based access rules. Manages access control policies for Web, Java and CORBA® resources. Manages access control policies for fine-grain application data and/or features. Central administration with flexible deployment options. Features specifically designed to aid in meeting privacy legislation. Supports integration with existing security infrastructure. Provides foundation for orb2 for Java Security Services.
  • 14
    Tripwire

    Tripwire

    Fortra

    Cybersecurity for Enterprise and Industrial Organizations. Protect against cyberattacks with the industry’s best foundational security controls. Detect threats, identify vulnerabilities and harden configurations in real time with Tripwire. Thousands of organizations trust Tripwire Enterprise to serve as the core of their cybersecurity programs. Join them and regain complete control over your IT environment with sophisticated FIM and SCM. Shortens the time it takes to catch and limit damage from threats, anomalies, and suspicious changes. Gives you deep, unparalleled visibility into your security system state and know your security posture at all times. Closes the gap between IT and security by integrating with both teams' existing toolsets. Out-of-the-box platforms and policies enforce regulatory compliance standards.
  • 15
    360 Security Guard

    360 Security Guard

    360 Security Guard

    As an industry-leading security antivirus product, 360 Security Guard can accurately detect and kill all kinds of Trojan viruses, and is always committed to protecting users' computer security. Not only that, we have also developed a variety of features to improve the efficiency of your computer use. Scan the computer from multiple dimensions, including garbage cleaning, computer running speed, system abnormalities, and computer security risks, and quickly assess the computer system status. 38 layers of protection barriers are added layer by layer to sense the threat situation at the first time, forming an all-round, all-weather cyberspace defense system. Get the latest information on popular games and events in real time, gather multiple media, and unify the entrance. The latest and hottest game download and installation, 360 exclusive distribution channel, fast direct access.
  • 16
    Google Advanced Protection Program
    The Advanced Protection Program safeguards users with high visibility and sensitive information from targeted online attacks. New protections are automatically added to defend against today’s wide range of threats. Gmail blocks over 100 million phishing attempts every day. But sophisticated phishing tactics can trick the most savvy users into giving their sign-in credentials to hackers. Advanced Protection requires you to use a security key to verify your identity and sign in to your Google account. Unauthorized users won’t be able to sign in without your username and password. Safe browsing on Chrome protects 4 billion devices against risky sites, and Advanced Protection performs even more stringent checks before each download. It flags or even blocks you from downloading, files that may be harmful. Only app installations from verified stores, like Google Play Store and your device manufacturer’s app store, are allowed.
  • 17
    Promisec Endpoint Manager
    PEM delivers a fundamental capability to the IT organization responsible for software patches updates across the company endpoints and servers. PEM provides unified visibility and control over what’s running on your endpoints and servers, ensuring that you can respond in near real time to any potential flagged threat. With PEM you get full visibility of every file, registry, process, network connection, third-party product and OS version across the organization. PEM leverages proprietary agentless technology to quickly inspect your entire enterprise, identifying, analyzing, and remediating security gaps. The solution is engineered to run at scale on any network, serving diverse use cases from compliance through cyber.
  • 18
    Cofactor Kite

    Cofactor Kite

    Cofactor Computing

    Cofactor is a cloud security software company based in Austin, TX. Its flagship product - Kite - is a cloud protection platform that solves the problem. Perhaps most importantly, Kite enables applications to move to the cloud. No matter how complex your solution, Cofactor's patent-pending technology enables it to securely migrate to the cloud.
  • 19
    Secure Hunter Business
    Though built for small business, Secure Hunter Small Business includes big features. A scalable malware solution, Secure Hunter Small Business is ideal for both small and mid-sized businesses. When trusting your company’s cyber security to Secure Hunter, you’ll enjoy the following benefits. Secure Hunters team is committed to customer satisfaction. Anti spyware and anti-malware solutions are only the tip of the iceberg when it comes to Secure Hunters small business services. Small business owners benefit from Secure Hunters consulting services, growing community and personalized support. Each minute without anti spyware technology leaves your small business at risk for data breaches and theft. Dont put your clients or business through the devastating and costly process of data recovery. Secure your assets now with Secure Hunter Small Business and share the refreshing experience of cyber security with your friends on social media!
  • 20
    CyberGatekeeper

    CyberGatekeeper

    InfoExpress

    Protecting your organization is a complex task that requires the right tools to meet your needs. Insecurity, one size does not fit all, and organizations must carefully determine their requirements. InfoExpress offers a family of appliances to meet different NAC requirements. All appliances support enforcement that secures access for mobile, desktop, and IoT devices without network changes while supporting a core set of features. Support is provided to administrators only. Administrators can open a support ticket by simply sending an email to the support email address. InfoExpress provides network security solutions that enhance productivity and security through better visibility, improved security, and automating device and mobile access to the network. Hundreds of security conscious-organizations use InfoExpress products to secure their networks, data and client information.
  • 21
    OpaqueVEIL
    CKM® Runtime Environment, the core of TecSec’s Constructive Key Management® (CKM®) system, has an updated name! In an every changing market that is becoming more knowledgeable about security solutions, standards and products, TecSec has made a name change for our core technology in order to avoid any confusion between CKM the standard and CKM®, the product. CKM® Runtime Environment (RTE) is now known as OpaqueVEIL® and is the core of the VEIL® suite of products. The VEIL® suite, like its predecessor is a standards-based and patented cryptographic key management technology that provides information security and access control through cryptography. OpaqueVEIL®, as the underlying technology of all CKM Enabled® products, is comprised of a collection of software components that are required to utilize CKM technology. OpaqueVEIL® masks the detailed inner workings of cryptography and key management, making the results simple and programmer-friendly.
  • 22
    VIPRE Privacy Shield

    VIPRE Privacy Shield

    VIPRE Security Group

    VIPRE Privacy Shield is a privacy-focused tool designed to help users protect their personal data and online identity from prying eyes. It offers powerful features like data file shredding, which permanently deletes sensitive files to prevent recovery, and a history cleaner that removes browsing history, cookies, and other digital footprints. VIPRE Privacy Shield also includes webcam and microphone blockers, ensuring that unauthorized apps or malware can’t access these devices without permission. With easy-to-use controls and customizable settings, VIPRE Privacy Shield empowers users to take charge of their digital privacy, protecting against identity theft and data exposure risks across all online activities.
  • 23
    XyLoc Security Server

    XyLoc Security Server

    Ensure Technologies

    The XyLoc® Security Server (XSS) is a server-based software platform, with a web-based GUI, that centrally manages and monitors XyLoc users and protected workstations throughout the enterprise. XSS allows IT managers to easily implement and administer XyLoc across multiple network segments and user groups, and also enables detailed reporting and compliance auditing. Simplifies the administration, reporting, and management of XyLoc user environments. Monitors and logs all log-on, secure walk-away, and return (e.g., walk-up recognition) activities. Integrates seamlessly with XyLoc Single Sign-On for full SSO management and activity reporting. Enables fast, secure access to information in a multi-user, shared computer environment (e.g., “Kiosk Accounts”). Provides compliance reporting (e.g., HIPAA) with encrypted user audit logs. Scales easily to support tens of thousands of users. Supports Active Directory® (AD) with a Schema Extension, and SQL Server® environments.
  • 24
    RollBack Rx Pro

    RollBack Rx Pro

    Horizon Datasys

    RollBack Rx Professional is an instant time machine for your PC. A comprehensive Windows System Restore solution that empowers users and IT administrators to easily restore their PCs to any previous state within seconds. RollBack Rx Professional offers a fresh approach to managing PCs. Any unforeseen incidents such as user errors, viruses, or even botched software installations can be easily and absolutely reversed in a fast and efficient way. Most backup techniques (ex. imaging) are static and time-intensive. So arduous is this task, that even disciplined IT shops seldom get around to making regular backups. And if a disaster were to happen, depending on how long ago the backup was taken directly determines the amount of data loss. In today’s computing environment 98% of PC disasters are micro-disaster (malware, botched Windows updates, software installations, etc.).
    Starting Price: $69 one-time payment
  • 25
    mSpy

    mSpy

    mSpy

    It’s as easy as entering your email. We’ll set you up with your own mSpy account, so you’ll be ready to monitor their activity in no time. Everyone’s needs are different, so we’ve got multiple plans that work for you, your family, and the devices you use. Put your feet up. Once you’ve paid for your subscription, you can log in to your Control Panel and view their activity. We could go on and on with reasons why mSpy is the best monitoring app on the planet. But we’d rather let the numbers do the talking. Everything you’re looking for in a mobile tracking app is right here. In creating mSpy, our goal was to deliver a remote cell phone tracking solution that works out of the box, is easy to use, and gives you the information you need whenever you need it, all without making you scratch your head.
  • 26
    Rohos Logon Key

    Rohos Logon Key

    Tesline-Service

    Two-factor authentication solution that converts any USB drive into a security token for your computer and allows you to access Windows securely. Works also with RFID, OTP, U2F tokens by replacing the Windows login password. Replaces weak password-based login with a hardware Security Key: USB flash drive, Google Authenticator OTP, FIDO U2F or industrial RFID access cards. The computer is password-protected, but you don’t need to enter it manually each time you log in, unlock/resume or authorize changes. Rohos uses NIST-approved data-security principles and encryption: the password is not stored on the authentication key in open form. USB key copy protection prevents the creation of key copies without authorization. All data on the key is encrypted with AES-256 bit key length.
    Starting Price: $32 one-time payment
  • 27
    McAfee WebAdvisor
    McAfee WebAdvisor is your trusty companion that helps keep you safe from threats while you browse and search the web. WebAdvisor helps protect you from malware and phishing attempts while you surf, without impacting your browsing performance or experience. Click confidently by protecting yourself from malicious sites that could contain adware, spyware, viruses and phishing scams. Start your worry-free web browsing for free by downloading McAfee WebAdvisor. McAfee WebAdvisor includes misclick protection that blocks malware and phishing sites if you accidentally click on a malicious link, typo protection that protects you if you type a web address incorrectly and helps point you in the right direction, safer downloads that scans your downloads and alerts you if we find a risk, security check that inspects to see if your firewall and antivirus are activated before you surf, safe browsing uses a color-coded system to let you know which links are safe to click.