Best Computer Security Software in Germany - Page 4

Compare the Top Computer Security Software in Germany as of November 2024 - Page 4

  • 1
    ShieldApps Cyber Privacy Suite
    What you do online and on your computer should be your own business. Yet, in most cases, your personal information & web habits are being tracked constantly by 3rd parties who want to monetize your online behaviors or steal your identity. It takes powerful software to stave off malicious cyber attacks all day, every day. In our increasingly digital world, anyone is an easy target for a cyber attack. We put so much of our personal information online today, making it harder to guard against malicious hacking attempts. Our comprehensive software keeps you and your family safe at all times when using your devices or surfing the web. Cyber Privacy Suite fends off harmful privacy threats and proactively identifies where your information is vulnerable or exposed.
    Starting Price: $77.90 per 3 devices
  • 2
    ShieldApps Webcam Blocker
    ShieldApps’ Webcam Blocker equips you with highly sophisticated security software that utilizes advanced privacy enhancement algorithms – packaged in a simple interface that allows single-click protection. ShieldApps Webcam Blocker prevents hackers from accessing and using information collected through a webcam and microphone against you. The clean and user-friendly design will give you easy, one-click control over both Webcam and microphone-blocking features. ShieldApps Webcam Blocker adds another layer of protection to your computer and a proactive privacy approach. Upon selecting the options any external or internal attempt to access the webcam will be denied.
    Starting Price: $29.99 one-time payment
  • 3
    Protectstar Camera Guard
    Put an end to spying and unsightly taping. Not only millions of users but also the founder of Facebook, Mark Zuckerberg, and former FBI chief James Comey are taping over the webcam of their devices. Everything and everyone is being spied on. We have known this since June 2013, when the first NSA documents by whistleblower Edward Snowden were published. But not only hackers found ways to misuse the webcam without a warning signal to the user: Also, the latest malware is highly dangerous because it specifically targets control of the integrated device camera. Then, with just one click, protection is enabled, and Camera Guard blocks and monitors processes that try to access your device's camera. Any security breach is reported. You can easily choose which apps on your device can access your camera or webcam. With Deep Detective, we have created an intelligent and versatile detective that monitors all accesses of the macOS device.
    Starting Price: $8.90 per year
  • 4
    Internet Lock

    Internet Lock

    TopLang Software

    Internet Lock is an access control and password protection solution for your internet connections and internet programs. With Internet Lock, you can fully control the internet connections and programs on your computer. By using Internet Lock, you can restrict or password protect internet access, schedule internet access, protect internet programs on certain IP addresses or domains, limit users to access only the websites you specified, or keep them from accessing unwanted websites. You can use Internet Lock to restrict internet connections and programs. Programs blocked by Internet Lock will not be able to access the internet. You can use Internet Lock to password protect internet programs and connections. Users must provide correct password in order to use the protected programs to access internet. When a password protected program tries to connect to internet, Internet Lock pops up a password window to ask user to enter password. If user couldn't provide the correct password.
    Starting Price: $29.95/one-time/user
  • 5
    indeni

    indeni

    indeni

    Indeni’s security infrastructure automation platform monitors firewall health and auto-detects issues like misconfigurations or expired licenses before they affect network operations. It automatically prioritizes issues so you only receive the most important alerts. Indeni protects your cloud environment by taking a snapshot of it before it’s built. Our cloud security analysis tool, Cloudrail, reviews your infrastructure-as-code files so you can identify violations earlier in development when they’re easier to fix. Constant detection of HA unreadiness from cross-device inconsistencies in security policies, forwarding tables, and other configurations and state. Consistent measurement of device configuration skew against locally-defined organizational standards. Collect relevant performance and configuration data from leading firewalls, load balancers, and other security infrastructure.
  • 6
    Votiro

    Votiro

    Votiro

    The only file security solution that ensures all files coming into your enterprise are completely safe. Unlike detection-based file security solutions that scan for suspicious elements and block files, Positive Selection singles out only the safe elements of each file, ensuring every file that enters your organization is 100% safe. Any file, anywhere, anytime. With a deep, expert understanding of all types of files, Votiro’s Secure File Gateway eliminates threats from the widest possible range of files, no matter how they enter your organization.
  • 7
    iPrism Web Security
    iPrism Web Security offers a unique combination of fine-grained content filtering combined with threat detection and mitigation methods to assure powerful protection from Advanced Persistent Threats, including botnets, malware, viruses and others. iPrism Web Security is designed to be “set it and forget it” easy to use, self-contained to provide advanced threat protection and policy enforcement, yet require nearly zero maintenance. And our comprehensive on-box reporting makes managing your network a snap. iPrism uses our unique combination of iGuard automated intelligence and expert human analysis to block things like malware, Crypto-Locker and inappropriate sites. It also provides improved user productivity with low latency and false positive rates. This innovative approach ensures you have the most updated, advanced web protection 24/7 that is backed by world-class customer support.
  • 8
    Trust Lockdown

    Trust Lockdown

    White Cloud Security

    Because we focus on what you trust and want to run on your endpoints, we stop all unknowns by default. So unknown items such as new ransomware variants, advanced attacks, and zero-day exploits are stopped first by Trust Lockdown. Get out of the ‘Break-Fix’ cycle that is eating your time and budget. We also eliminate the need to be patching your apps every day. With Trust Lockdown, you can do your application patches on a regular planned basis instead of urgent need basis, again giving you back your time and budget to be more productive. Our protection also works when your device is offline! Whether you choose our cloud or appliance based service, our endpoint protection delivers the same protection when offline or disconnected from the network. An essential feature in today’s on-the-go environment and use of portable devices.
  • 9
    Aobo Internet Filter for Mac
    Aobo Filter for Mac OS X Professional is a piece of Internet Filtering Software for Mac OS X users. It effectively blocks porn websites, games and inappropriate applications on Mac. Aobo Filter for Mac is designed with the feature of logging website visiting as well, which helps you retrieve and identify visited websites from any web browsers. Computer becomes an indispensable facility in many offices and organizations. However, many employees are unable to use it appropriately, they are watching inappropriate videos, shopping on the internet, playing computer games, which give rise to the low working efficiency. Therefore, blocking unsuitable websites and applications is really important.
    Starting Price: $29.99 per month
  • 10
    G DATA

    G DATA

    G Data Software

    G DATA prepares you optimally for cyber threats and opens up all possibilities for you in the digital future. G DATA developed the world’s first antivirus software in 1987. Today, we defend our customers against all kinds of cybercrime with end-to-end solutions and services using the most advanced security software and AI technologies and even offering online security awareness training to teach safe behavior to employees. G DATA customer support is available 24/7/365, with support teams and the G DATA SecurityLab working hand-in-hand at the same location. Independent tests prove that G DATA IT security solutions provide best attack detection rates for effectively combating Trojans, malware and even unknown viruses.
  • 11
    Fortres 101

    Fortres 101

    Fortres Grand

    The desktop and file lockdown security of Fortres 101 restricts access to any aspect of Windows operation. Affordable, effortless, powerful. Fortres 101 restricts downloads and software installations, including viruses & malware. Fortres 101 offers you the ability to restrict/block local hard drives and removable media drives as well as any local file, folder, or application. Central Control is the complete administration tool for Fortres 101. With Central Control, you can easily configure and manage Fortres 101 from one configuration screen anywhere on the network. Fortres 101 offers you the ability to restrict/block local hard drives and removable media drives as well as any local file, folder, or application. Central Control is the complete administration tool for Fortres 101. With Central Control, you can easily configure and manage Fortres 101 from one configuration screen anywhere on the network.
  • 12
    AnVir Task Manager Pro
    Windows task manager processes, windows xp slow startup, windows startup programs, Vista tweaks. Control everything running on the computer, remove Trojans, speed up computer. AnVir Task Manager Pro provides convenience by offering all of its features in a single interface. It saves money because users won't have to buy multiple packages to perform a family of related tasks. Terminate processes that can not be terminated via Windows Task Manager. Temperature of CPU, video card, external USB HDD. Download and upload speed, amount of transferred data for network connections. Find locked files and DLL. Log of processes start and stop. Graph of processor, memory and disk activity for each process. Threads, handles, performance counters. Startup manager: manage all programs running on startup including services, Internet Explorer toolbars, Scheduler tasks.
    Starting Price: $49.95 one-time payment
  • 13
    PlatinumCache
    DTS PlatinumCache C4 is a caching system developed by Data Transmission System Incorporation. DTS PlatinumCache C4 is a solution for the storage bottleneck problems. DTS PlatinumCache C4 is basically a caching system supporting Write-Back, Write-Through, Write-Only and Pre-fetching policies. The system uses RAMDISK as its cache. In android we used SD card as our target drive. DTS PlatinumCache C4 reads and writes data to/from SD card to increase throughput. It is designed in such a way to fulfill the needs of every category of clients ranging from small to large enterprises. Performance becomes greatly enhanced because data transfer occurs from Cache which is RAM. MCell-II SSD first in the industry. SSD version of the hybrid memory disk. The via DRAM, 30,000 IOPS Random Read, 26,000 IOPS Ultra-fast access Random Write. The DTS chip, manage the number of writes. Achieve a long life. (DTS PlatinumCache that the chunk size to write to the SSD.
    Starting Price: $6 one-time payment
  • 14
    DriveCrypt

    DriveCrypt

    Securstar

    DRIVECRYPT securely and easily protects all proprietary data on notebooks and desktop computers 100% of the time without users having to think about security. Any organization, from a small company to a large international firm with thousands of users in the field, can effectively protect business plans, client lists, product specifications, confidential corporate memos, stock information, and much more with this disk encryption product. As data is read from the hard disk, DRIVECRYPT automatically decrypts the data before it is loaded into memory. When data is written back to the hard disk, it is automatically re-encrypted. The disk encryption/decryption process is completely transparent to the user or any application program because the data is processed by an operating system extension, "on the fly" as it transfers back and forth between the hard disk and memory. Consequently, users don't need to remember to decrypt or re-encrypt their data, or change the normal operation of the PC.
    Starting Price: $59.95
  • 15
    TF2000

    TF2000

    ComputerProx

    The ComputerProx TF2000 automates the locking of the PC when you step away. The TF2000 uses ultrasound to detect your presence. When you leave the proximity of the PC, the TF2000 automatically locks the system without requiring any keystrokes from you! No need for awkward timeout settings that mistakenly lock the PC when you are present. The TF2000 can detect your presence and will not lock the system inadvertently. The TF2000 attaches to the PC via the USB port and is configured by the system as a keyboard. Commands are simply sent to the PC as keystrokes therefore no special drivers are required! The individual keystrokes and specified delays are all configurable using our configuration tool. In addition, to the 'walk-away' command, the TF2000 has a 'walk-to' sequence which allows keystrokes to be sent when you approach the PC. For example, under Windows XP the TF2000 sends the CTRL-ALT-DEL sequence when the user approaches the PC. This readies the PC for user authentication.
    Starting Price: $79 one-time payment
  • 16
    SoftControl

    SoftControl

    SafenSoft

    The examples of using products of SoftControl for Information security of the commercial organizations. Solutions for Information security business. Proactive protection against breaking by hackers, malicious codes, insider threats. Control and monitoring the staff. Solutions for complexes APCS and specialized software. Centralized management of security. The policy of information security of banks: SoftControl’s solutions for protection of the bank’s infrastructure. Solutions for protection of software of ATMs, front-office and back-offices. Protection of banking e-documents. Protection of business correspondence and confidential data transmitted to recipients by e-mail as attachments. Compliance with the requirements of PCI DSS and the Central Bank of Russia.
    Starting Price: $25.00/one-time/user
  • 17
    AccuHash

    AccuHash

    AccuHash

    AccuHash 2.0 is Windows 95/98/Me/NT/2000/XP/2003 utility for protecting the integrity and verifying the accuracy of data files using checksum calculation algorithms (CRC32, MD5 and SHA-1). It will allow to easily and quickly verify integrity of files downloaded from Internet, transferred over a network and/or burned onto CD/DVD. AccuHash 2.0 use the checksum file format based on XML and Unicode-enabled - this allows to easily exchange checksum files between different systems in different countries, add new algorithms and expand the program features. But we don't forget also very popular SFV, MD5SUM and BSD-style checksum file formats - the utility can import/export from/to those formats. AccuHash 2.0 has the integrated Checksum Calculator, which allows calculating the checksum value (for all supported algorithms - CRC32, MD5 and SHA-1) for specified file directly, without creating the checksum file.
    Starting Price: $19.95 one-time payment
  • 18
    Stronghold Antivirus

    Stronghold Antivirus

    Security Stronghold

    Stronghold Antivirus is an antivirus and antispyware software that provides both superior real-time pro-active (on-access) and on-demand protection for your home and office computer. Stronghold Antivirus identifies and eliminates more than 3.500.000 known viruses, spyware, adware, trojans, rootkits and other threats with help of regularly updated database of malicious footprints. It also identifies and removes even unknown threats with help of active on-access shield protection Thanks to easy, handy and eye-pleasing interface Stronghold Antivirus is great for novice users, and professionals will be amused by the power of its additional features. Being powerful it is still very lightweight and will not consume any noticeable system resources of your computer. You can set up any scan area you want, customize both on-demand and on-access protection modules, schedule scanning with separate settings, add programs to white and black lists and manage them, and more.
  • 19
    Panda Fusion

    Panda Fusion

    WatchGuard Technologies

    Fusion combines our Systems Management and Endpoint Protection Plus solutions to protect, manage and support all of your corporate devices. Our Cloud-delivered solution allows a rapid deployment without needing maintenance or costly investments in server infrastructure. Complete your endpoint security solution with a wide range of IT & endpoint security operations products and modules that will allow you to minimize the attack surface and reduce risk of incidents. Identify and block malicious behaviors or noncompliant activity, manage your vulnerabilities, deploy patches and updates, encrypt your data, and manage your corporate systems and endpoints. Everything you need is included in a single platform from WatchGuard.
  • 20
    eScan

    eScan

    MicroWorld Technologies

    eScan's next-gen antivirus solution that protects the home network from viruses, malware, ransomware, bots, and more, using a layered approach. With the unique combination of basic and modern techniques, eScan blocks a broad range of attacks. It comprises right from web filtering, signature-based malware detection and behavior analysis to innovative techniques like deep learning malware detection, exploit prevention, heuristic scan, and many more. eScan offers business endpoint protection and endpoint detection and response (EDR) solutions as well as anti-spam solutions for email and multi-factor authentication.
    Starting Price: $58.95/one-time/user
  • 21
    Secure CommNet

    Secure CommNet

    Radient Software

    Your licenses are still valid. You'll still have excellent email technical support. And you'll still be able to purchase new or additional licenses for CommNet and Secure CommNet. Your trust is vital. Thank you for sticking with Radient Software through the years! Welcome! CommNet and Secure CommNet (with SSH2 support) are communications software for Windows that integrate modem dial-up and Internet Telnet into fast, full-featured and easy-to-use applications. It has the communication features you really need and it's been tested for over 20 years. There's no risk to trying it -- you can download a free 30-day trial at any time. Telnet and modem dial-up. Telnet Host Mode Server to allow other Telnet clients to connect to your system. Zmodem and FTP during Telnet connections.
    Starting Price: $29 one-time payment
  • 22
    WiKID Authentication System
    Easily meet PCI-DSS 3.2 with our latest release. Use WiKID two-factor authentication for service and privileged accounts instead of sharing passwords and storing them in spreadsheets or vaults. Prevent pass-the-hash attacks and stop attackers from escalating to admin rights! See how to set it up. Our Enterprise version is free for up to 5 users. Perfect for small organizations or large enterprises that need extended testing. This is the complete Enterprise version, not crippleware. Thanks to broad protocol support - RADIUS, LDAP, TACACS+, SAML and native Active Directory WIKID works with all your remote access and privileged access management tools, including Cisco, Checkpoint, Fortinet, pfSense, and all enterprise-class VPN solutions whether IPSec, PPTP or SSL. We've helped hundreds of organizations implement two-factor authentication using standard protocols. Download our eGuide on how to integrate Active Directory for authorization.
    Starting Price: $2.00/month/user
  • 23
    Cisco Cloudlock

    Cisco Cloudlock

    Cisco Umbrella

    Cloud access security broker (CASB) to secure cloud users, data, and apps with ease. Cisco Cloudlock is the API-based cloud access security broker (CASB) that helps accelerate use of the cloud. By securing your identities, data, and apps, Cloudlock combats account compromises, breaches, and cloud app ecosystem risks. Our API-driven approach provides a simple and open way to enable healthy cloud adoption. Defend against compromised accounts and malicious insiders with our User and Entity Behavior Analytics (UEBA) which run against an aggregated set of cross-platform activities for better visibility and detection. Protect against exposures and a data security breach with highly-configurable data loss prevention engine with automated, policy-driven response actions. Cloudlock Apps Firewall discovers and controls malicious cloud apps connected to your corporate environment, and provides a crowd-sourced Community Trust Rating to identify individual app risk.
  • 24
    Block Ransomware and Backup
    There are many ways to block ransomware, malware, and viruses. However, these malicious programs continue to evolve, so simply blocking malicious programs with patterns alone can infect your PC with other malicious programs. There is a way. Please try the "Block Ransomware and backup" product. Ransomware, malware, viruses, etc. can infiltrate your PC, but it can not damage your files. This product allows you to set the Desktop, Documents folder, and so on as protected folders, and allow only the programs that are allowed (for example, MS Office programs) to modify the files in the protected folder. Unauthorized programs can only open the file as read-only, or block the unauthorized program from running. Therefore, malicious programs can not be accessed to the protected folder. You can also create backup files automatically whenever you modify or create documents. These backup files are stored in a special folder, and not all programs can change this backup files unless you allow it.
    Starting Price: $49/user/year
  • 25
    BlueFiles

    BlueFiles

    Forecomm

    How do you do today when you need to quickly send a confidential file or email to a customer, partner, or employee outside of your company, outside the secure network? CNIL strongly advises businesses and organizations to " use data encryption during transfers " and " have people trained in the risks ". Data encryption is a central part of the modern data protection strategy. Using specialized encryption, like BlueFiles, companies can encode their data so that it becomes indecipherable to anyone but the intended recipient. BlueFiles provides a real guarantee on all your digital data transfers: Integrity of the BlueFiles file, 100% confidentiality, remote control of the files sent, and tracking. Save time, ease of use, and lower costs, we need to communicate with confidence over the Internet without the risk of our sensitive data being disclosed. Under the GDPR law, companies must take steps to encrypt their personal data flows or face high fines.
  • 26
    Exigence

    Exigence

    Exigence

    Exigence is providing a command and control center software to manage major incidents. Exigence automates the collaboration among stakeholders within and outside of the organization and structures it around a timeline that records the steps taken to resolve an incident and drives workflows across stakeholders and tools, thus ensuring all stakeholders are working off the same page. The product ties together stakeholders, processes and tools already in use, driving down time to resolution. Customers who have purchased and are using Exigence , have seen a more transparent process, faster onboarding of relevant stakeholders, and a reduced time for the resolution of critical incidents in general. They are using Exigence to address critical incidents, but also for cyber events as well as planned incidents like business continuity testing and software release.
  • 27
    Barracuda Web Security Gateway
    The Barracuda Web Security Gateway lets organizations benefit from online applications and tools without exposure to web-borne malware and viruses, lost user productivity, and misused bandwidth. As a comprehensive solution for web security and management, it unites award-winning spyware, malware, and virus protection with a powerful policy and reporting engine. Advanced features ensure that organizations adapt to emerging requirements like social-network regulation, remote filtering, and visibility into SSL-encrypted traffic. Unlimited remote user licenses are included to enforce content and access policies for mobile devices outside of the corporate network. The Barracuda Web Security Gateway is also available as a virtual appliance. For hosted web security, see Barracuda Content Shield.
  • 28
    NetLib Encryptionizer

    NetLib Encryptionizer

    NetLib Security

    Transparent Data Encryption (TDE) for all Editions of SQL Server from Express to Enterprise. No programming required. Developer and OEM friendly: may be easily bundled with SQL Server based applications. Cost effective alternative to upgrading to SQL Server Enterprise. Assists with compliance with various regulations. Protects data and intellectual property.
  • 29
    VMRay

    VMRay

    VMRay

    At VMRay, we provide enterprises and technology partners worldwide with best-in-class, scalable, automated malware analysis and detection solutions that greatly reduce their exposure to malware-related threats, attacks and vulnerabilities.
  • 30
    Intrusta

    Intrusta

    iSubscribed

    We believe digital security should be easy for you. Click, surf, and browse worry-free because we are there to protect you. We are your partner, working to identify, analyze and prevent so you can go about your day as planned. Intrusta’s goal is to make online security simple. Whether it’s using our software, paying your bill, or chatting with a customer service agent, we’ve taken great efforts to make every interaction enjoyable and easy. Gone are the days of shocking price increases and unclear billing practices. We will be upfront about what you pay and when. Come renewal time, you shouldn’t be surprised. We’re perpetual learners with a knack for improvement, and we use our knowledge to ensure our product keeps up with evolving threats as you move through life. We pride ourselves on stellar support. We’re empathetic, reliable and ready to help. Whether it’s technical, product or payment related, you can trust us to find a speedy solution.
    Starting Price: $24.99 one-time payment