Best Computer Security Software for Windows - Page 4

Compare the Top Computer Security Software for Windows as of October 2025 - Page 4

  • 1
    Anti-Executable
    Stop threats before they start by blocking unauthorized executables. Faronics Anti-Executable blocks any unknown threats that can bypass your antivirus solution. It protects you from sophisticated threats like zero-day attacks, mutating malware and advanced persistent threats that necessitate an approach that goes beyond a traditional antivirus solution, by ensuring only approved applications are allowed to run on a computer. Protect your endpoints with balance of flexibility and security using Faronics Anti-Executable. Ensure your servers are protected at all times with Faronics Anti-Executable. Protect your identity and keep your computer safe from malware with Faronics Anti-Executable. Faronics Anti-Executable provides security beyond an antivirus by blocking unauthorized programs– whether malicious, unlicensed or simply unwanted – from ever executing.
  • 2
    Votiro

    Votiro

    Votiro

    The only file security solution that ensures all files coming into your enterprise are completely safe. Unlike detection-based file security solutions that scan for suspicious elements and block files, Positive Selection singles out only the safe elements of each file, ensuring every file that enters your organization is 100% safe. Any file, anywhere, anytime. With a deep, expert understanding of all types of files, Votiro’s Secure File Gateway eliminates threats from the widest possible range of files, no matter how they enter your organization.
  • 3
    iPrism Web Security
    iPrism Web Security offers a unique combination of fine-grained content filtering combined with threat detection and mitigation methods to assure powerful protection from Advanced Persistent Threats, including botnets, malware, viruses and others. iPrism Web Security is designed to be “set it and forget it” easy to use, self-contained to provide advanced threat protection and policy enforcement, yet require nearly zero maintenance. And our comprehensive on-box reporting makes managing your network a snap. iPrism uses our unique combination of iGuard automated intelligence and expert human analysis to block things like malware, Crypto-Locker and inappropriate sites. It also provides improved user productivity with low latency and false positive rates. This innovative approach ensures you have the most updated, advanced web protection 24/7 that is backed by world-class customer support.
  • 4
    Trust Lockdown

    Trust Lockdown

    White Cloud Security

    Because we focus on what you trust and want to run on your endpoints, we stop all unknowns by default. So unknown items such as new ransomware variants, advanced attacks, and zero-day exploits are stopped first by Trust Lockdown. Get out of the ‘Break-Fix’ cycle that is eating your time and budget. We also eliminate the need to be patching your apps every day. With Trust Lockdown, you can do your application patches on a regular planned basis instead of urgent need basis, again giving you back your time and budget to be more productive. Our protection also works when your device is offline! Whether you choose our cloud or appliance based service, our endpoint protection delivers the same protection when offline or disconnected from the network. An essential feature in today’s on-the-go environment and use of portable devices.
  • 5
    G DATA

    G DATA

    G Data Software

    G DATA prepares you optimally for cyber threats and opens up all possibilities for you in the digital future. G DATA developed the world’s first antivirus software in 1987. Today, we defend our customers against all kinds of cybercrime with end-to-end solutions and services using the most advanced security software and AI technologies and even offering online security awareness training to teach safe behavior to employees. G DATA customer support is available 24/7/365, with support teams and the G DATA SecurityLab working hand-in-hand at the same location. Independent tests prove that G DATA IT security solutions provide best attack detection rates for effectively combating Trojans, malware and even unknown viruses.
  • 6
    Fortres 101

    Fortres 101

    Fortres Grand

    The desktop and file lockdown security of Fortres 101 restricts access to any aspect of Windows operation. Affordable, effortless, powerful. Fortres 101 restricts downloads and software installations, including viruses & malware. Fortres 101 offers you the ability to restrict/block local hard drives and removable media drives as well as any local file, folder, or application. Central Control is the complete administration tool for Fortres 101. With Central Control, you can easily configure and manage Fortres 101 from one configuration screen anywhere on the network. Fortres 101 offers you the ability to restrict/block local hard drives and removable media drives as well as any local file, folder, or application. Central Control is the complete administration tool for Fortres 101. With Central Control, you can easily configure and manage Fortres 101 from one configuration screen anywhere on the network.
  • 7
    DriveCrypt

    DriveCrypt

    Securstar

    DRIVECRYPT securely and easily protects all proprietary data on notebooks and desktop computers 100% of the time without users having to think about security. Any organization, from a small company to a large international firm with thousands of users in the field, can effectively protect business plans, client lists, product specifications, confidential corporate memos, stock information, and much more with this disk encryption product. As data is read from the hard disk, DRIVECRYPT automatically decrypts the data before it is loaded into memory. When data is written back to the hard disk, it is automatically re-encrypted. The disk encryption/decryption process is completely transparent to the user or any application program because the data is processed by an operating system extension, "on the fly" as it transfers back and forth between the hard disk and memory. Consequently, users don't need to remember to decrypt or re-encrypt their data, or change the normal operation of the PC.
    Starting Price: $59.95
  • 8
    TF2000

    TF2000

    ComputerProx

    The ComputerProx TF2000 automates the locking of the PC when you step away. The TF2000 uses ultrasound to detect your presence. When you leave the proximity of the PC, the TF2000 automatically locks the system without requiring any keystrokes from you! No need for awkward timeout settings that mistakenly lock the PC when you are present. The TF2000 can detect your presence and will not lock the system inadvertently. The TF2000 attaches to the PC via the USB port and is configured by the system as a keyboard. Commands are simply sent to the PC as keystrokes therefore no special drivers are required! The individual keystrokes and specified delays are all configurable using our configuration tool. In addition, to the 'walk-away' command, the TF2000 has a 'walk-to' sequence which allows keystrokes to be sent when you approach the PC. For example, under Windows XP the TF2000 sends the CTRL-ALT-DEL sequence when the user approaches the PC. This readies the PC for user authentication.
    Starting Price: $79 one-time payment
  • 9
    SoftControl

    SoftControl

    SafenSoft

    The examples of using products of SoftControl for Information security of the commercial organizations. Solutions for Information security business. Proactive protection against breaking by hackers, malicious codes, insider threats. Control and monitoring the staff. Solutions for complexes APCS and specialized software. Centralized management of security. The policy of information security of banks: SoftControl’s solutions for protection of the bank’s infrastructure. Solutions for protection of software of ATMs, front-office and back-offices. Protection of banking e-documents. Protection of business correspondence and confidential data transmitted to recipients by e-mail as attachments. Compliance with the requirements of PCI DSS and the Central Bank of Russia.
    Starting Price: $25.00/one-time/user
  • 10
    AccuHash

    AccuHash

    AccuHash

    AccuHash 2.0 is Windows 95/98/Me/NT/2000/XP/2003 utility for protecting the integrity and verifying the accuracy of data files using checksum calculation algorithms (CRC32, MD5 and SHA-1). It will allow to easily and quickly verify integrity of files downloaded from Internet, transferred over a network and/or burned onto CD/DVD. AccuHash 2.0 use the checksum file format based on XML and Unicode-enabled - this allows to easily exchange checksum files between different systems in different countries, add new algorithms and expand the program features. But we don't forget also very popular SFV, MD5SUM and BSD-style checksum file formats - the utility can import/export from/to those formats. AccuHash 2.0 has the integrated Checksum Calculator, which allows calculating the checksum value (for all supported algorithms - CRC32, MD5 and SHA-1) for specified file directly, without creating the checksum file.
    Starting Price: $19.95 one-time payment
  • 11
    Stronghold Antivirus

    Stronghold Antivirus

    Security Stronghold

    Stronghold Antivirus is an antivirus and antispyware software that provides both superior real-time pro-active (on-access) and on-demand protection for your home and office computer. Stronghold Antivirus identifies and eliminates more than 3.500.000 known viruses, spyware, adware, trojans, rootkits and other threats with help of regularly updated database of malicious footprints. It also identifies and removes even unknown threats with help of active on-access shield protection Thanks to easy, handy and eye-pleasing interface Stronghold Antivirus is great for novice users, and professionals will be amused by the power of its additional features. Being powerful it is still very lightweight and will not consume any noticeable system resources of your computer. You can set up any scan area you want, customize both on-demand and on-access protection modules, schedule scanning with separate settings, add programs to white and black lists and manage them, and more.
  • 12
    Panda Fusion

    Panda Fusion

    WatchGuard Technologies

    Fusion combines our Systems Management and Endpoint Protection Plus solutions to protect, manage and support all of your corporate devices. Our Cloud-delivered solution allows a rapid deployment without needing maintenance or costly investments in server infrastructure. Complete your endpoint security solution with a wide range of IT & endpoint security operations products and modules that will allow you to minimize the attack surface and reduce risk of incidents. Identify and block malicious behaviors or noncompliant activity, manage your vulnerabilities, deploy patches and updates, encrypt your data, and manage your corporate systems and endpoints. Everything you need is included in a single platform from WatchGuard.
  • 13
    eScan

    eScan

    MicroWorld Technologies

    eScan's next-gen antivirus solution that protects the home network from viruses, malware, ransomware, bots, and more, using a layered approach. With the unique combination of basic and modern techniques, eScan blocks a broad range of attacks. It comprises right from web filtering, signature-based malware detection and behavior analysis to innovative techniques like deep learning malware detection, exploit prevention, heuristic scan, and many more. eScan offers business endpoint protection and endpoint detection and response (EDR) solutions as well as anti-spam solutions for email and multi-factor authentication.
    Starting Price: $58.95/one-time/user
  • 14
    Secure CommNet

    Secure CommNet

    Radient Software

    Your licenses are still valid. You'll still have excellent email technical support. And you'll still be able to purchase new or additional licenses for CommNet and Secure CommNet. Your trust is vital. Thank you for sticking with Radient Software through the years! Welcome! CommNet and Secure CommNet (with SSH2 support) are communications software for Windows that integrate modem dial-up and Internet Telnet into fast, full-featured and easy-to-use applications. It has the communication features you really need and it's been tested for over 20 years. There's no risk to trying it -- you can download a free 30-day trial at any time. Telnet and modem dial-up. Telnet Host Mode Server to allow other Telnet clients to connect to your system. Zmodem and FTP during Telnet connections.
    Starting Price: $29 one-time payment
  • 15
    WiKID Authentication System
    Easily meet PCI-DSS 3.2 with our latest release. Use WiKID two-factor authentication for service and privileged accounts instead of sharing passwords and storing them in spreadsheets or vaults. Prevent pass-the-hash attacks and stop attackers from escalating to admin rights! See how to set it up. Our Enterprise version is free for up to 5 users. Perfect for small organizations or large enterprises that need extended testing. This is the complete Enterprise version, not crippleware. Thanks to broad protocol support - RADIUS, LDAP, TACACS+, SAML and native Active Directory WIKID works with all your remote access and privileged access management tools, including Cisco, Checkpoint, Fortinet, pfSense, and all enterprise-class VPN solutions whether IPSec, PPTP or SSL. We've helped hundreds of organizations implement two-factor authentication using standard protocols. Download our eGuide on how to integrate Active Directory for authorization.
    Starting Price: $2.00/month/user
  • 16
    NetLib Encryptionizer

    NetLib Encryptionizer

    NetLib Security

    Transparent Data Encryption (TDE) for all Editions of SQL Server from Express to Enterprise. No programming required. Developer and OEM friendly: may be easily bundled with SQL Server based applications. Cost effective alternative to upgrading to SQL Server Enterprise. Assists with compliance with various regulations. Protects data and intellectual property.
  • 17
    VMRay

    VMRay

    VMRay

    At VMRay, we provide enterprises and technology partners worldwide with best-in-class, scalable, automated malware analysis and detection solutions that greatly reduce their exposure to malware-related threats, attacks and vulnerabilities.
  • 18
    TACHYON Endpoint Security 5.0
    Advanced anti-virus solution that blocks cyber threats such as malware, spyware, ransomware, etc. Safely protect user system and important information with improved real-time monitoring and protection features.
    Starting Price: $37/Year/User
  • 19
    Microsoft Defender for Individuals
    Easy-to-use online protection for you, your family, and your devices with the Microsoft Defender app, now available for download with your Microsoft 365 subscription. Get one centralized view to manage and monitor your security status across your computers and phones. Protect your family and yourself from malicious online threats with help from antivirus and anti-phishing protection you can count on. Get real-time alerts with recommended actions plus information about how to stay safer online. One centralized view to monitor your online security status. See your and your family’s data and device protections in one place. Easily add or remove devices. Rest easy with malware protection for you and your family. Get continuous protection with antivirus scans on your apps and devices. Control what is scanned by identifying trusted apps and files. Stay up to date with real-time alerts on changes to your and your family’s security status.
  • 20
    LayerX

    LayerX

    LayerX

    LayerX Enterprise Browser Extension analyzes web sessions at the utmost granular elements to prevent attacker-controlled webpages from performing malicious activities and users from putting enterprise resources at risk, without disrupting their legitimate interactions with websites, data and applications Prevent risk to your data, apps, and devices with access and activity policies. Enhance identity protection by using the browser extension as an additional authentication factor. Dynamically scan every web page to disclose malicious code, content and files. Monitor user activities to detect potential compromise or data loss. Create adaptive or rule-based policies that respond to detected risk with a wide range of protective actions, from restricting ֵactivities and web page behavior to full blocking.
  • 21
    Loop8

    Loop8

    Loop8

    Loop8 is a passwordless digital security platform that replaces vulnerable passwords with biometric authentication, using your face or fingerprint to protect your accounts. It offers an all-in-one ecosystem that integrates authentication, dark web monitoring, cookie tracking protection, and secure document storage. The platform’s Authenticator (Auth) replaces traditional 2FA apps, while Privacy-M8 provides real-time alerts when personal data appears in breaches. Clean-SL8 automatically removes tracking cookies to protect browsing privacy, and MySafe stores sensitive files securely on your own devices. Loop8’s Tru8 Recovery system allows you to choose trusted contacts for account recovery instead of relying on companies. Designed for both individuals and families, it can protect up to eight users under a single subscription.
  • 22
    ThreatSentry

    ThreatSentry

    Privacyware

    Don't sweat unaddressed vulnerabilities, insider misuse, or new types of attacks. ThreatSentry combines a state-of-the-art Web Application Firewall and port-level firewall with advanced behavioral filtering to block unwanted IIS traffic and web application threats. ThreatSentry delivers enterprise-grade, multi-layered protection and compliance (i.e. PCI DSS) for Microsoft IIS (5/6/7/8/10) at a small-business price! Implemented as a native module in IIS7 through 10 (or ISAPI extension or filter in IIS 6 and IIS 5 respectively), and Snap-in to the Microsoft Management Console (MMC), ThreatSentry is exceptionally easy to use and designed to protect network weak points created by lapses in patch management, configuration errors, and the use of new and progressive attack techniques. Take advantage of a free ThreatSentry evaluation session today! We'll guide you one-on-one through installation and configuration. Click here to schedule.
    Starting Price: $649.00
  • 23
    MemberProtect

    MemberProtect

    InetSolution

    MemberProtect is designed for professional programmers to easily integrate into secure online systems, such as ACH, Online Banking, and wire transfer applications. MemberProtect is the most trusted user authentication, data encryption, and user management framework in the banking and credit union industries today. Based on roles & privileges model. Supports millions of users and organizations. Extremely granular application security. Powerful encryption that secures databases at the column level. Encrypt email messages and flat files stored anywhere on your network. Thorough logging, even failed attempts, of all data access. Protect member data from hackers & unauthorized staff, even beyond the limitations of firewalls, SSL, and operating systems. Leverage MemberProtect to develop secure connections with third-party APIs. Access to any web-based system, including support for LDAP.
  • 24
    iSafeSend

    iSafeSend

    iSafeSend

    Use iSafeSend to encrypt and safely send sensitive information via email. iSafeSend generates a unique one-time use link to your sensitive or confidential information. This unique link is accessible for a limited time and once it has been accessed or reaches its expiry date, it is deleted and can no longer be accessed. iSafeSend allows you to send multiple unique links in separate emails for the same confidential information. iSafeSend enables users to create shareable links that when clicked, give recipients access to the sensitive data that you are sharing. This data can only be viewed once, and after being viewed, it is deleted. Since these links can only be viewed once, recipients should not forward the links to other people. Specify the number of days until the links expire and select the number of links you wish to generate. Remember, each generated link can only be viewed once.
  • 25
    SentryBay Armored Client
    The missing piece in the security stack jigsaw, easily downloaded in one-click to complete your armored shield against cyberattacks. ‍The Armored Client provides real time patented protection to applications and data without needing to detect and respond to threats. It does this by using kernel level prevention of data exfiltration, even if threats exist, combined with the secure wrapping of applications and injected security. ‍ The Armored Client takes a layered approach to protecting endpoint devices being used remotely to access your applications and data and to support secure online browsing. Whether your employees are using unmanaged, BYOD or managed endpoint devices, all your corporate apps are targeted on the endpoint and run in a secure session.
  • 26
    Siwenoid

    Siwenoid

    Siwena

    SIWENOID is a JAVA application and runs under Windows, Linux or Mac OS X. It is flexible, reliable, user, and engineer friendly. SIWENOID can integrate many types of subsystems and unify the operation of all. Supports SIEMENS, Bosch, Dahua, Texecom, Paradox systems and many more. Control everything on one (or more) screen with a unified user interface for every subsystem. Siwenoid is built on open-source foundations to keep the cost of the product lower. To keep up with the constant firmware updates of the compatible systems we rely on flexibility. Main goal of the software is to minimize the latency on interconnecting and handling different protocols. Siwenoid can be configured in operation while the subsystems are working. SIWENOID is an OS-independent JAVA application. It is a flexible, reliable, user- and engineer-friendly, scalable, and cost-effective solution.
  • 27
    Clearswift Secure Email Gateway
    Clearswift Secure Email Gateway (SEG) provides uniquely powerful protection of an organization's email data against inbound cyber-attacks and outbound data loss prevention. As the number one method of communication for most organizations, email has become one of the top sources for cybercriminals to infiltrate your systems and take hold of your critical data. Our Secure Email Gateway protects against known and unknown malware but also advanced threats including phishing. IT teams need to ensure that information being shared across email both in and out of the organization is not only secure, but appropriate and compliant. Clearswift’s unparalleled level of inspection and granular policy controls apply the optimal security treatment to your emails in real time so your communications remain safe and flowing, and business disruptions are minimized.
  • 28
    Specops Password Sync

    Specops Password Sync

    Specops Software

    Streamline passwords for users with just one password across multiple business systems. Specops Password Sync instantly synchronizes Active Directory passwords to domains, or other systems. This includes domains in the same forest/other forests, on-premises systems (e.g. Kerberos), and SaaS targets (e.g. O365). The tool enhances security by ensuring that password complexity applies to all systems consistently. Specops Password Sync effectively extends Active Directory password security to other business systems, including external SaaS resources. When combined with a strong password policy, the product ensures that the same level of password complexity applies to all connected systems. Built on Active Directory, the tool captures and synchronizes all changes to a user’s password in accordance with the synchronization rules defined in Group Policy. The solution can be setup in just a few hours by configuring the local Active Directory.
  • 29
    Nfusion

    Nfusion

    Ntrepid

    Nfusion is a virtual desktop environment that allows you to manage your attribution, or maintain complete control of the technical and behavioral indicators that comprise your online presence. Our product combines digital fingerprint masking with integrated collection tools and third-party applications. Nfusion puts your investigation desktop into a remote, isolated VDI that is accessed over a VPN connection. Access the internet from one of our proprietary points of presence, allowing you to appear from the location of your choice. At the end of every session, your VM is purged, destroying any malware or trackers. Your workspace can be personalized with third-party applications, including Maltego, i2 Analyst Notebook, Wickr, Telegram, and other messaging platforms.
  • 30
    RollBack Rx Server

    RollBack Rx Server

    Horizon Datasys

    RollBack Rx Server Edition is a robust Windows Server backup and restores utility that enables IT, professionals, an instant backup capability that can quickly restore mission-critical systems back to any number of multiple restore points with unrivaled speeds. RollBack Rx Server Edition makes it quick and easy to safely sandbox updates and service patches with a failsafe approach to system recovery. RollBack Rx Server Edition offers unrivaled background protection and real-time recovery speeds. This allows you to store a locally backed-up sector-map repository of complete multiple instances (or “snapshots”) of the server state. These snapshots can be scheduled to occur at intervals you specify — as frequently as every minute — and can number many thousands. This continual snapshot-taking can be set to occur in the background with no perceptible impact on day-to-day server response times.