Best IT Security Software - Page 44

Compare the Top IT Security Software as of May 2026 - Page 44

  • 1
    KeepSolid DNS Firewall
    Prevention is better than cure, especially when it comes to cybersecurity. It’s better to detect and block malware domains before your device gets infected, agree? DNS Firewall is just the right solution for this! It lets you prevent malware by blocking known-malicious websites, so malware has no chance at all! KeepSolid DNS Firewall protects your online activities and blocks malicious domains in real-time, as you surf the web. Just select the types of websites or content you wish to block (like gambling, games, fake news, adult sites, etc.) or create a custom list. Phishing websites that attempt to steal your personal information and which are often used in email-based attacks, also stand no chance against KeepSolid DNS Firewall. The app successfully detects and blocks phishing links, ensuring your safety online. DNS Firewall features a very easy and intuitive interface and doesn’t require any technical knowledge at all. Getting started is as easy as 1-2-3.
    Starting Price: $.1.99 per month
  • 2
    MonoDefense

    MonoDefense

    KeepSolid

    Protect your online data, privacy, and way of life in one hit of a button. MonoDefense is a bundle of security apps that aim to protect all areas of your digital life. Store your account credentials, safeguard browsing activity, defend against suspicious DNS traffic, and unblock access to the desired content with these 4 ultimate solutions. Render any online surveillance and spying after you is impossible. Ensure secure web-surfing, untraceable data exchange, and anonymous communications on social media, forums, etc. Don’t risk becoming the target of cyber-bullying, witch-hunting, or thought-policing for your opinions. Take part in online discussions and express your point of view freely and without fear. We will protect your data, personal information, and devices from cyber criminals. AES-256 encryption will render your internet traffic, passwords, and sensitive data unreadable to third parties. Firewall capabilities will keep you away from malicious websites.
    Starting Price: $11.99 per month
  • 3
    Guardian

    Guardian

    Guardian

    Guardian is the safest and most secure way to protect your privacy and data while using apps and browsing the web on your iOS device. Your IP address will be hidden from any websites visited as traffic is routed through our firewall servers, making it more difficult for advertisers to track you. Your password, financial information and other sensitive data will be protected anywhere you go using strong AES-256 encryption to thwart hackers. Guardian adds an extra layer of strong encryption to all outgoing network traffic and filters out known junk to improve your mobile experience. Grant permissions to specific apps on your device, knowing that any attempt to send data to unwanted trackers will be blocked. Blocks unwanted connections to location trackers, mail trackers, generic data trackers, and other online nuisances
    Starting Price: $0.99 per day
  • 4
    Peig

    Peig

    Peig

    Peig is a passwordless access service that automates identity access management workflows for mid-size organizations. Businesses centrally manage employee and partner access to their cloud or self-hosted collaboration tools with little administration friction. Admins or managers use Peig to manage who in their organization has access to what data without having to deal with password management, VPNs or other forms of heavy-duty access security. Peig supports integration with various third-party applications such as Salesforce, AWS, Office 365, Slack and more. The access services are offered on a monthly subscription basis.
    Starting Price: $5 per user per month
  • 5
    REI3

    REI3

    Lean Softworks GmbH

    REI3 is an open (free to use and open source) business application platform. Anyone can create, use and publish applications. A wide range of professionally designed applications help your organization manage time, assets, projects, passwords and much more. Available on all major platforms and deployable in the cloud or on-premise, REI3 can be used by anyone.
    Starting Price: Free
  • 6
    Akamai MFA
    Make phish-proof authentication as easy as a mobile push. Prevent employee account takeovers and data breaches with phish-proof MFA. Stop MFA bypass attacks with the most secure standard for multi-factor authentication. Make MFA unfishable with end-to-end cryptography. No clunky physical security keys. Simplify adoption with self-service enrollment and an easy smartphone app experience. Get the strongest authentication with FIDO2. Increase security, not hardware. Reduce the workload on administrators. FIDO2 MFA security on any smartphone defeats phishing with frictionless push notifications. Select your authentication factors, including secure push, standard push, TOTP, and SMS. Easily integrates with market-leading IdP and identity solutions for a seamless MFA service. Automates user provisioning workflows to ensure that changes in IdP are immediately reflected. Rich reporting features keep administration teams informed of authentication events.
    Starting Price: Free
  • 7
    GRC Toolbox

    GRC Toolbox

    Swiss GRC

    GRC Toolbox is an integrated software solution for governance, risk and compliance management. It combines apps that manage the fundamental functions of GRC into a single integrated solution. Customers benefit from a systematic, coordinated approach to managing GRC-related strategy and implementation. Features covered by the GRC Toolbox include risk management, internal control system (ICS), compliance management, information security management (ISMS), data protection management, audit management, contract management and business continuity management (BCM). The GRC Toolbox helps teams successfully manage risk, monitor controls, manage policies and contracts, and demonstrate compliance with laws, regulations, and security requirements.
  • 8
    WinZip SafeShare
    A modernized sharing experience. Share your files with confidence and security in an intuitive environment built with simplicity in mind. This powerful sharing tool allows you to share, compress, and encrypt, all within a simple interface. Easily share files to one or many locations, surrounded by extra layers of security, including military-grade encryption and time bomb capabilities. Enjoy expanded cloud services, including OpenStack and SwiftStack regions and credential files, Alibaba, Wasabi, HP, Oracle, Azure, WebDAV, CenturyLink, IONOS and OVH cloud providers. Combine multiple PDF files into a single PDF file to save, zip, or share. Streamline workflow when sharing via Slack IM. Manage files shared by WinZip or ZipShare. Open and view, share again or remove shared files. Keep track of which Zip files you have shared via WinZip or ZipShare. Email anyone directly from WinZip by adding contacts from all your supported sources into one combined address book.
    Starting Price: $34.95 one-time payment
  • 9
    BotDelive

    BotDelive

    BotDelive

    BotDelive is a 2FA and push notification service via IM bots for developers. Create an account on BotDelive and get your API credentials. Read our API documentation and start integrating! You will need only 2 API endpoints to integrate 2FA. BotDelive is a cloud communication platform for developers. It allows developers to send and receive 2FA and push notifications over the chat apps by using its APIs. Normally, you have to force your user to install an app to send notifications. But, the chat apps are already installed on millions of devices. Why not use them? BotDelive offers a quick way of 2FA. With only answering the yes/no questions your users can authorize their own accounts. Authenticate users via BotDelive instead of e-mail and password. You can require only once the password and then BotDelive will handle all requests for you. Send important push notifications via chat apps. BotDelive ID is reliable.
    Starting Price: Free
  • 10
    OpenText Managed Extended Detection and Response
    OpenText™ Managed Extended Detection and Response (MxDR) is built around a 100% remote, cloud-based virtual security Operations Center (V-SOC) supported by machine learning and MITRE ATT&CK framework. Using artificial intelligence and advanced workflows, develop correlations between computer, network and device logs. BrightCloud® Threat Intelligence Services is integrated directly to help businesses understand the scope and impact of any security event for immediate threat validation to known malware. OpenText MxDR experts will identify, investigate and prioritize alerts, saving you time and effort and allowing internal teams to focus on business operations.
  • 11
    MegaMatcher SDK

    MegaMatcher SDK

    Neurotechnology

    MegaMatcher is designed for large-scale AFIS and multi-biometric systems developers. The technology ensures high reliability and speed of biometric identification even when using large databases. Available as a software development kit that allows the development of large-scale single- or multi-biometric fingerprint, iris, face, voice, or palm print identification products for Microsoft Windows, Linux, macOS, iOS, and Android platforms. Proven in national-scale projects, including passport issuance and voter deduplication. NIST MINEX-compliant fingerprint engine, NIST IREX-proven iris engine. Turnkey multi-biometric solution for national-scale identification projects with MegaMatcher ABIS. High-performance matching for large-scale systems with MegaMatcher Accelerator. Fingerprints, irises, and faces can be matched on smart cards using MegaMatcher On Card. Includes fingerprint, iris, face, voice, and palm print modalities.
    Starting Price: €2,590 one-time payment
  • 12
    Sendmarc

    Sendmarc

    Sendmarc

    At Sendmarc, we understand the importance of DMARC compliance and have built a platform specifically designed to implement it quickly and seamlessly across your entire organisation. Our platform's interoperability allows for the easy assessment and proactive monitoring of data from multiple email service providers, ensuring that your company's entire email ecosystem is secure. By following our well-defined process, you can achieve full protection from email impersonation and spoofing attacks, while still allowing legitimate email services to operate without interruption. Our approach also minimises the risk of false positives, so you can trust that your domain is in good hands. With Sendmarc, you'll see immediate improvements in your email security, compliance, visibility, and delivery. Our expert engineering team is laser-focused on DMARC, so you can be confident in their ability to get your business fully protected within 90 days. Don't leave your domain vulnerable to fraudulen
    Starting Price: $39
  • 13
    Ansys Cloud Direct
    Access Ansys Cloud Direct anywhere, anytime to obtain endless simulation capabilities compatible with most Ansys solvers. Engineering simulation has long been constrained by fixed computing resources available on a desktop or cluster. Ansys Cloud provides access to on-demand, cloud-based computing resources, including both interactive workstations and HPC clusters, for faster, high-fidelity results offering greater performance insight. Ansys Cloud increases simulation throughput by removing the hardware barrier. Ansys Cloud Direct is a scalable and cost-effective approach to HPC in the cloud. To leverage the combined benefits of cloud computing and best-in-class engineering simulation, Ansys partnered with Microsoft® Azure™ to create a secure cloud solution. Within Ansys Mechanical, Ansys Fluent, Ansys Electronics Desktop, Ansys SPEOS, Ansys Discovery, Ansys LS-Dyna, Ansys LST, Ansys CFX and Ansys Lumerical, you can easily access HPC in the cloud directly from the applications
  • 14
    IDHub

    IDHub

    Sath

    IDHub is a fully customizable, flexible, and user-friendly IAM solution. We know managing a highly technical IAM system can be challenging. However, convincing users how and why to use it is often as difficult. After nearly two decades of IAM experience, we designed IDHub with the needs of users and administrators in mind, for the best in usability, functionality, and customization, to make your jobs easier. We constantly expand our extensive training videos and easy read documentation, to make using and managing IDHub as easy as possible. Get expert-level support from veteran IAM professionals, with plans up to 24/7/365. We believe IAM processes should be incredibly fast. Our fail fast, recover faster model, allows businesses to launch and deploy complete systems and updates within hours and days, not weeks and months.
    Starting Price: $70/user/year
  • 15
    ThreatSTOP

    ThreatSTOP

    ThreatSTOP

    The platform automates threat intelligence acquisition, curation, and timely application for threat mitigation and visibility. In a noisy industry with high price tags, we bring a high quality, affordable and actionable threat intelligence platform to the table. It takes less than an hour to install ThreatSTOP, and the security benefits are immediately visible. Mix and match threat intelligence protection bundles based on your organization's needs, or create your own custom policies. We're vendor neutral and comprehensive, with complementary Protective DNS and IP filtering. You have the ability to provision your devices and enterprise consistently, with multi-layered security.
    Starting Price: $79 per month
  • 16
    Daito

    Daito

    Daito

    Daito is a web-based 2FA authenticator for small teams and big companies alike. Securely share access, no phone is needed. Daito does only one thing, manage TOTP 2FA tokens for you and thus offers a fully isolated system, separate from your password manager. Keep your 2FA token management separate from your password management and prevent worst-case scenarios. What do you do when you store usernames, passwords, 2FA seeds, and 2FA tokens in your password manager and this password manager gets breached? The authenticator is web-first and web-only. Access and manage your company's 2FA tokens from any browser and OS. Save money and the accompanying hassle of managing company phones. No more worrying about lost, malfunctioning, or missing devices. Give IT teams and admins full control, and limit regular users. Prevent 2FA seed leakage by limiting access only to generated 2FA tokens, not the underlying seed codes.
    Starting Price: $19 per month
  • 17
    OpenSSH

    OpenSSH

    OpenSSH

    OpenSSH is the premier connectivity tool for remote login with the SSH protocol. It encrypts all traffic to eliminate eavesdropping, connection hijacking, and other attacks. In addition, OpenSSH provides a large suite of secure tunneling capabilities, several authentication methods, and sophisticated configuration options. Remote operations are done using ssh, scp, and sftp. Key management with ssh-add, ssh-keysign, ssh-keyscan, and ssh-keygen. The service side consists of sshd, sftp-server, and ssh-agent. OpenSSH is developed by a few developers of the OpenBSD project and made available under a BSD-style license. OpenSSH is incorporated into many commercial products, but very few of those companies assist OpenSSH with funding. Contributions towards OpenSSH can be sent to the OpenBSD Foundation. Since telnet and rlogin are insecure, all operating systems should ship with support for the SSH protocol included. The SSH protocol is available in two incompatible varieties, SSH 1 and SSH 2.
    Starting Price: Free
  • 18
    NirvaShare

    NirvaShare

    Nirvato Software

    At times, when external identities such as customers, partners, etc who are not part of your organization's identity store do bring up a challenge in sharing and collaborating files securely. This is where NirvaShare can take care of dealing with access, security and compliance while sharing cloud storage files with external users. Besides cloud platform deployments, NirvaShare can also be deployable to your on-premise environment pointing to your existing S3 compatible or other supported file storage systems making it easy to share files with internal and external users. While sharing file or folders, set access rights to your users such as who can download, upload, delete, etc. Easily associate groups and users from your ActiveDirectory or from any other identity providers. NirvaShare is designed to handle large files with size ranging in several tens of gigabytes for upload and download with unbelievably minimal resource consumption.
    Starting Price: $4 per user per month
  • 19
    Protective.ai

    Protective.ai

    Protective.ai

    Protective.ai helps startups & developers improve their data protection while boosting user trust and adoption. Connecting 3rd-party apps to your favorite platforms has never been easier. However, this means that your customer information, e-mails, docs, and internal conversations are stored & processed by tens of different companies, with various data security measures and privacy standards. We use AI to analyze cloud security, privacy policies, and social signals to determine the data protection level of more than 10K business apps & integrations. Use our score to understand which apps are treating your data with care, and which apps need to improve their security & privacy. We uncover actual risks posed by cloud vulnerabilities and promiscuous privacy-policy terms, not relying only on self-reported compliance. Our PRO solution provides R&D, marketing, sales, and info-sec managers with ongoing monitoring, alerts, and protection against unsafe integrations.
    Starting Price: $38 per month
  • 20
    ScanFactory

    ScanFactory

    ScanFactory

    ScanFactory is an Attack Surface Management & Continuous Automated Vulnerability Assessment Platform that provides realtime security monitoring across all external assets of a company by enumerating & scanning its entire network infrastructure utilizing 15+ most trusted community-backed security tools & extensive database of exploits. Its vulnerability scanner stealthily performs a deep & continuous reconnaissance to map your entire external attack surface & are extended with handpicked top-rated premium plugins, custom wordlists & plethora of vulnerability signatures. Its dashboard can be used to discover & review all vulnerabilities sorted by CVSS & has enough information to understand, replicate & remediate the issue. It also has capability to export alerts to Jira, TeamCity, Slack & WhatsApp.
    Starting Price: $50
  • 21
    Shieldoo

    Shieldoo

    Cloudfield

    Shieldoo is a next-gen private network for remote connection from anywhere built with a well-known open-source tool called Nebula. The Shieldoo secure network is a collection of nodes, a lighthouse, and an admin center. The user device is a node, the server is a node, the cloud stack is a node, and the LAN access box is a node. Two nodes discover each other through a lighthouse and then connect peer-to-peer. With Shieldoo, you can build a complex security infrastructure which is easy to use. A tailored wizard will guide you through the initial setup, and the usual administration is handled in the admin center. You pay only for users and servers seen in the network that month, and you always get the complete feature set: unlimited admin accounts, SSO, MFA, domain by your choice etc.
    Starting Price: $0,49 per hour/server/user
  • 22
    Deepinfo

    Deepinfo

    Deepinfo

    Deepinfo has the most comprehensive Internet-wide data and has been using this data for years to empower cybersecurity of all sizes of organizations worldwide. Deepinfo also provides comprehensive threat intelligence solutions, data, and APIs to top-notch cybersecurity companies. Deepinfo Attack Surface Platform empowers all sizes of organizations' security by providing actionable insights. An all-in-one attack surface solution built by an experienced team dealing with Internet-wide data for years.
    Starting Price: $20,000 per year
  • 23
    Sima

    Sima

    Active Witness

    Sima does more than just keep the bad guys out. Sima is a highly secure yet frictionless cloud-based Access Control reader. Sima has the ability to read both mobile credentials (QR codes) and facial biometrics. This allows the integrated cloud-based software to issue both single (QR only) and multi-factor (facial verification) for highly secure and customized facility access. We take your privacy very seriously. We use facial recognition technology to perform facial authentication. This allows us to verify identity and grant access to a location. Facial data will be stored on our servers only for the purpose of identification. Your personal data, including your face picture, will not be shared with third parties.
    Starting Price: Free
  • 24
    Arnica

    Arnica

    Arnica

    Put your software supply chain security on autopilot. Actively mitigate anomalies & risks in your development ecosystem, protect developers, and trust their code commits. Automate developer access management. Behavior-based developer access management with self-service provisioning in Slack or Teams. Continuously monitor and mitigate anomalous developer behavior. Identify hardcoded secrets. Validate and mitigate before they land in production. Go beyond SBOM and get visibility into all open-source licenses, infrastructure, vulnerabilities, and OpenSSF scorecards across your organization in minutes. Arnica is a behavior-based software supply chain security platform for DevOps. Arnica proactively protects your software supply chain by automating the day-to-day security operations and empowering developers to own security without incurring risks or compromising velocity. Arnica enables you to automate constant progress toward the least-privilege for developer permissions.
    Starting Price: Free
  • 25
    Salesforce Shield
    Salesforce Shield is a comprehensive data security and compliance solution designed to protect sensitive information across the Salesforce platform. It provides advanced tools to monitor user activity, encrypt data, track changes, and detect sensitive information in real time. With Event Monitoring, organizations gain granular visibility into user behavior, API activity, and system performance through detailed event logs. Platform Encryption allows businesses to encrypt sensitive data at rest while maintaining control over encryption keys and compliance requirements. Field Audit Trail extends data history tracking to strengthen integrity and support forensic-level compliance. Data Detect uses intelligent pattern matching to identify and classify sensitive information such as credit card numbers and personal identifiers. Together, these capabilities help organizations mitigate risk, meet regulatory standards, and securely deploy AI-powered solutions like Agentforce.
    Starting Price: $25 per month
  • 26
    Trend Micro Mobile Security
    Stay safe, no matter where you go or what you do. Enjoy advanced security and privacy. Live your mobile life more safely with powerful protection for all your mobile devices. Improve performance. Take advantage of optimization features to make your mobile devices work better. Avoid online scams and fraud. Flag malicious phishing emails and scam websites. Trust in experience. Enjoy peace of mind thanks to mobile solutions built on nearly 30 years of security expertise. Stop threats, rely on the cloud-based Smart Protection Network™ and mobile app reputation technology to stop threats before they can reach you. Surf anywhere and prevent mobile apps from loading dangerous and risky websites when you browse. Protects you against malicious apps, ransomware, dangerous websites, unsafe Wi-Fi networks, unwanted access to your device, and more. Optimize your mobile phone to keep it running at peak performance.
    Starting Price: Free
  • 27
    MYAndroid Protection
    For you, it’s impossible to use personal judgment as a factor as to which apps have malicious intent and which have not. Our technology enables malware protection, privacy control, backup & recovery, Protection against theft & losses, and credit card & Identity theft protection. By combining an easy-to-use graphical interface with award-winning, business-strength technology, and preconfigured settings, MYAndroid Protection makes getting started straightforward and keeps your security level high. Several apps have been found with embedded malware, these apps contain malware that can steal your private information, wipe your data, or could increase your bill by dialing and texting Premium rate numbers without your awareness. Spyware apps can track your location, read your mailbox and more. Scan your smartphone and make sure that your Android device is free of malicious software and kept that way.
    Starting Price: Free
  • 28
    Falco

    Falco

    Sysdig

    Falco is the open source standard for runtime security for hosts, containers, Kubernetes and the cloud. Get real-time visibility into unexpected behaviors, config changes, intrusions, and data theft. Secure containerized applications, no matter what scale, using the power of eBPF. Protect your applications in real time wherever they run, whether bare metal or VMs. Falco is Kubernetes-compatible, helping you instantly detect suspicious activity across the control plane. Detect intrusions in real time across your cloud, from AWS, GCP or Azure, to Okta, Github and beyond. Falco detects threats across containers, Kubernetes, hosts and cloud services. Falco provides streaming detection of unexpected behavior, configuration changes, and attacks. A multi-vendor and broadly supported standard that you can rely on.
    Starting Price: Free
  • 29
    V-OS Virtual Secure Element
    V-OS is V-Key’s core patented technology, a virtual secure element. It is a secure sandbox that is embedded within a native iOS or Android mobile app and creates a safe operating environment where data can be stored and cryptographic processes can be executed in isolation from the rest of the mobile app. In this video, we take a step back to introduce and explain the core of our technology, V-OS. With V-OS as the security foundation of your mobile application, your organization can build a wide range of solutions that are secure, trusted and scalable, and customized to your business needs. Layered tamper detection and response mechanisms. Patented cryptographic virtual machine. FIPS 140-2 Level 1 and Common Criteria EAL3+. Minimizes total costs of ownership. Faster market penetration with effortless over-the-air deployment. Flexible and extensible SDK framework. Eradicate costly hardware dependency.
    Starting Price: Free
  • 30
    V-Key Smart Authenticator
    Sign up for the V-Key Smart Authenticator today and get a one-month free trial. Businesses, like relationships, are built on trust. Are your employees working remotely? Do you have a large number of users who need to access your app or system? With organizations moving towards multi-factor authentication (MFA), a simple password is just not enough. Unfortunately, SMS OTPs have been proven insecure, being vulnerable to interception and phishing attacks. Hardware tokens are expensive to deploy, can get lost or stolen, are not user-friendly, and require regular replacement. The V-Key authenticator provides strong and flexible, yet less expensive multi-factor authentication using a mobile authenticator that is ideal for small and medium-sized businesses. The V-Key Smart Authenticator supports many enterprise apps, systems and VPNs. Enterprise-grade multi-factor authentication in 3 easy steps.
    Starting Price: Free
MongoDB Logo MongoDB