Best IT Security Software - Page 48

Compare the Top IT Security Software as of May 2026 - Page 48

  • 1
    H2Cyber

    H2Cyber

    H2Cyber

    We are teaching you the basic arithmetic of cybersecurity via our prioritized approach. This will allow you to grow over time and move to a more robust cybersecurity framework if needed as all our controls are aligned to the five basic functions of the NIST cybersecurity framework (identify, protect, detect, respond, and recover). Prove you are taking reasonable measures to protect your business from a potential cyber-attack. Take the guessing out of cybersecurity and achieve basic cybersecurity hygiene. Have greater visibility into all your member firms or other affiliations with centralized oversight by cyber experts.
    Starting Price: $50 per month
  • 2
    HighGround.io

    HighGround.io

    HighGround.io

    HighGround.io reduces risk, improves security and increases cyber resilience. Cybersecurity can be overwhelming, especially when tasked with protecting an organisation without being a cyber expert. HighGround.io eliminates the complexity and uncertainty and provides clear and user-friendly KPIs along with actionable insights to help users comprehend their security posture and attack surface. HighGround.io simplifies the journey, addressing challenges like tool exhaustion, resource constraints, and one-size-fits-all solutions. Use all or one of the features with hands-on in app guidance or DIY with everything conveniently in one place. HighGround.io is a trusted ally who understands the challenges and simplifies the mission.
    Starting Price: $95 per month
  • 3
    VeriDoc Certificates
    VeriDoc Certificates offer you an end-to-end solution to store and send your certificates without thinking about how to send them, or will your certificates be secure, and also assures you 100% data transparency. You can now secure your certificates using blockchain technology, keeping your valuable certificates safe forever. With VeriDoc Certificates, your certificates become completely tamper-proof and safe from any scams & fraudsters. You can track, send, and verify the authenticity of any certificates without moving an inch from where you are. Now you can verify, send, and store certificates with ease. With VeriDoc Certificates, you can now store your certificates securely, send them to anyone and anywhere in the world, and verify the authenticity of all certificates whenever needed. VeriDoc Certificates store all your valuable documents in the blockchain which makes them tamper-proof and safe from any fishy activities.
    Starting Price: $30 per month
  • 4
    Affinidi

    Affinidi

    Affinidi

    At Affinidi, our vision is to revolutionize the current paradigm of digital identity, empowering individuals to reclaim ownership of data, regain control over digital identities, and actively engage in safeguarding privacy. Our concept of "holistic identity" encompasses the complete spectrum of discovering, collecting, sharing, storing, and even monetizing personal data in the digital realm. We enable individuals to possess a comprehensive integrated self-view in the digital world, exercise authority over their data, and make informed usage decisions. In the digital realm, our digital selves, constructed from attributes like names, ages, and locations, become fragmented as each site captures only partial aspects, leaving us exposed and vulnerable.
    Starting Price: $199 per month
  • 5
    Timly

    Timly

    Timly Software

    Whether it’s IT assets, furniture, tools, equipment, or machinery, Timly is fully modular and allows you to manage any type of inventory, whether on desktop or on the go with mobile devices. By automating maintenance processes, Timly optimizes productivity and efficiency, resulting in reduced downtime, improved asset reliability, and enhanced operational effectiveness. Track and optimize the consumption of your consumables such as safety equipment, parts, or office supplies. Timly keeps you informed about incoming and outgoing inventory, as well as low stock levels. With the 360° overview in Timly, you conduct your annual inventory in a time-optimized manner. Innovative features provide a comprehensive view of your company’s assets, including home office inventory. Through advanced IoT live tracking technology, you can effortlessly monitor real-time data such as location, consumption, fill levels, and more.
    Starting Price: €185 per month
  • 6
    Prosopo CAPTCHA
    Dynamic & PoW CAPTCHA: Real-Time Bot & Cyber Threat Defense | Prosopo Procaptcha Prosopo Procaptcha provides comprehensive protection against various automated threats, including web scraping, credential stuffing, account takeover attempts, clicks fraud, distributed denial of service (DDoS) attacks, inventory hoarding, credit card fraud, and other forms of malicious bot activity that can harm your online business or compromise user data. With no hidden fees and transparent pricing, our solution provides an affordable alternative to expensive services like reCAPTCHA and hCaptcha. Procaptcha dynamically evaluates user interactions by analyzing browser environments and behavior. Based on risk scores, it automatically applies the appropriate challenge, making it difficult for bots to bypass while ensuring a smooth experience for real users.
    Starting Price: Free
  • 7
    Document GPS

    Document GPS

    ShelterZoom

    The only platform for tokenizing your digital files from inside your email account. Protect documents, videos, audio files, and more in one click. Digital content ownership and control are now easier than ever. End-to-end encryption without changing email attachment workflow. Control who can download, share, and view your attachments. Track who has downloaded, shared, or viewed your attachments in real time. Effortlessly manage, track, and monitor your email attachments in one library. Send clients a secure link to enable them to exchange files with you securely. Block your device screen to prevent unauthorized screenshots and copying. Unlimited e-sign directly in your email, providing unprecedented convenience and security. Prevents data breaches, ransomware, wire fraud, and more. End-to-end protection from desktop to mobile to external devices. Originator-controlled, always know who created the files and IP.
    Starting Price: $5 per month
  • 8
    Wink

    Wink

    Wink

    Wink enables any institution to offer simpler and superior identity and payment experiences through biometrics. The Wink platform brings facial and voice recognition-based multi-factor authentication and payments that can eliminate passwords, SMS/OTP, usernames, card numbers, and other older technologies that are memory or device-based. Integrate the Wink streaming checkout plug-in to eliminate fraud with our unique face- and voice-based user recognition. Dramatically improve conversions and eliminate cart abandonments as consumers simply smile to check out. Make long checkout forms and forgotten passwords a thing of the past. The industry’s first multi-factor biometric authentication combines the convenience and security of face-id type experience enhanced by strong digital voice printing. Our unique and patented one-way anonymous encryption technology ensures full privacy protection as the unique Wink ID represents the user’s face and voice data as a 3D model.
    Starting Price: $499 per month
  • 9
    Zygon

    Zygon

    Zygon

    Efficient holistic SaaS Security Management. Scale your ability to control all applications with our flexible, automated workflow engine: usage justification, access requests, access reviews, security alerts,... they all become easier, faster with Zygon. Ditch the spreadsheet, Welcome collaborative SaaS Security Management. Zygon shows you every app every person in your organization is using and how they access it, at the granularity of individual accounts. Make access requests and reviews, onboarding and offboarding, simple, fast, and easy—without piling more responsibilities on IT. From Shadow IT to clear inventory: detecting each and every account in your organization. Zygon automatically builds a complete list of every app employees are using—whether they authenticate with email or SSO. Never get surprised by shadow IT again, and stop spending time maintaining a manual list of used apps.
    Starting Price: $1 per user per month
  • 10
    VenariX

    VenariX

    VenariX

    Discover your real exposure to cyber threats with VenariX, a data-driven, uncomplicated, and affordable platform that makes cyber insights accessible to everyone. Gain the foresight and knowledge to enhance your cyber resilience effectively. Customize and export your cyber insights dashboard for a tailored view of charts, graphs, and key stats, enhancing decision-making and reporting. Sort and analyze an exhaustive inventory of cyber incidents with detailed, time-based filters across various categories, enabling proactive measures and strategic planning. Track threat actors’ behaviors and patterns, equipping your team with the knowledge to anticipate and mitigate cyber risks. Visualize global incidents' origins and impacts, facilitating a better understanding of the cyber threat landscape and enhancing your global cyber defense strategies. VenariX delivers cyber clarity, transforming complex threats into actionable insight for decisive, meaningful action.
    Starting Price: $252 per year
  • 11
    Ostorlab

    Ostorlab

    Ostorlab

    Uncover your organization's vulnerabilities with ease using Ostorlab. It goes beyond subdomain enumeration, accessing mobile stores, public registries, crawling targets, and analytics to provide a comprehensive view of your external posture. With a few clicks, gain valuable insights to strengthen security and protect against potential threats. From insecure injection and outdated dependencies to hardcoded secrets and weak cryptography, Ostorlab automates security assessments and identifies privacy issues. Ostorlab empowers security and developer teams to analyze and remediate vulnerabilities efficiently. Experience hands-off security with Ostorlab's continuous scanning feature. Automatically trigger scans on new releases, saving you time and effort while ensuring continuous protection. Access intercepted traffic, file system, function invocation, and decompiled source code with ease using Ostorlab. See what attackers see and save hours of manual tooling and grouping of outputs.
    Starting Price: $365 per month
  • 12
    esChecker
    With esChecker, fasten your release cycles, dramatically reduce testing and delivery costs, and mitigate risks. Don't compromise your digitalization, leverage your mobile application security with automated testing within your CI/CD process. With a unique dynamic analysis feature, esChecker automatically executes the mobile application binary on unsafe devices and gives immediate feedback on your protections. Like any other IT system component, mobile apps must be designed, developed, and maintained with security in mind. They are the entry point to the system and require special attention. Compared to pentesting, a MAST tool enables a shorter, quicker, and more efficient security testing process to better control the application's code as it progresses. It’s about code verification integrated into a development cycle and it gives immediate feedback, allows compliance, and can be integrated into a DevSecOps process.
    Starting Price: Free
  • 13
    Transparently.AI

    Transparently.AI

    Transparently.AI

    Built for financial analysts, portfolio managers, and regulators, our AI provides highly accurate accounting risk scores for tens of thousands of organizations across the globe. It can identify corporate accounting manipulation years ahead of the market and within seconds. The world’s first AI solution for early detection of accounting manipulation and fraud. The sooner you can identify a company’s financial “red flags”, the better. Unfortunately, it can take financial analysts months to analyze one company, as businesses hide their wrongdoings well. We built our own AI system to shine a light on corporate accounting malfeasance and empower financial experts to make more informed investments. It delivers an accurate 0-100 percentage score, as well as a custom report with detailed next-step recommendations. Our AI algorithms are our own one-of-a-kind creation, not an off-the-shelf solution with limited scope for improvement; this means you benefit from all future features.
    Starting Price: $499 per month
  • 14
    Yandex SmartCaptcha
    The service identifies requests similar to automatic ones, identifies bots, and filters them out without loss of response speed. For analysis, we use ML models trained on datasets containing data on many years of experience in protecting Yandex web resources. The datasets are regularly updated. The service does not use ready-made images, but generates them independently, making it possible to maintain an 85% level of human recognition while making it difficult for bots to recognize the CAPTCHA. SmartCaptcha is deployed in the Yandex Cloud infrastructure, which complies with international standards and Russian information security laws. Add verification to your site without the “I’m not a robot” button. An invisible captcha will only be seen by users with suspicious-looking requests. The service generates texts for recognition independently, and you can choose their level of complexity.
    Starting Price: $0.800000 per 1000 requests
  • 15
    Yandex Key Management Service
    Use keys to protect the secrets, personal data, and sensitive information you store in the cloud. Create and delete keys, set up access policies, and perform rotation via the management console, CLI, or API. Yandex KMS implements symmetric and asymmetric cryptography. Use the REST or RPC API to encrypt and decrypt small amounts of data, such as secrets and local encryption keys, as well as to sign data using e-signature schemes. You manage access to encrypted data, and Yandex KMS ensures the reliability and physical security of keys. Hardware Security Modules (HSMs) are available. Encrypt small amounts of data using the SDK in Java or Go. To encrypt larger amounts of data, the service is integrated with popular encryption libraries, including the AWS Encryption SDK and Google Tink. Integration with Yandex Lockbox makes it possible to encrypt secrets with your own keys. Secrets and data can also be protected using encryption keys in Managed Service for Kubernetes.
    Starting Price: $0.0230 per month
  • 16
    GitHub Advanced Security for Azure DevOps
    GitHub Advanced Security for Azure DevOps is an application security testing service that is native to the developer workflow. It empowers Developer, Security, and Operations (DevSecOps) teams to prioritize innovation and enhance developer security without sacrificing productivity. Detect and prevent secret leaks from your application development processes with secret scanning. Take advantage of a partner program of more than 100 service providers and scanning for more than 200 token types. Adopt secret scanning quickly and easily without the need for additional tooling via the Azure DevOps UI. Protect your software supply chain by identifying any vulnerable open source components you may be using with dependency scanning. Get straightforward guidance on how to update component references so you can fix issues in minutes.
    Starting Price: $2 per GiB
  • 17
    Yandex Lockbox
    Create secrets in the management console or using the API. Your secrets are safely stored in one place, easily integrated with your cloud services, and accessible via external systems over the gRPC or REST API. Encrypt your secrets using Yandex Key Management Service keys. Secrets are only stored in encrypted form. You can choose pre-configured service roles to ensure granular access to your secrets. Set up access permissions to read or manage your secret or its metadata. Create a secret, select a Key Management Service (KMS) key, and securely store your login-password pairs and other sensitive information. A secret may contain any of your confidential information, e.g. a login-password pair, server certificate keys, or cloud service account keys. Each secret stored by the service can have multiple versions of stored data. The service stores this data securely in encrypted form. All secrets are replicated in three availability zones.
    Starting Price: $0.0277 per 10000 operations
  • 18
    Azure-AD-External-Identities
    Azure Active Directory External Identities, part of Microsoft Entra, provides highly secure digital experiences for partners, customers, citizens, patients, or any users outside your organization with customization controls. Combine external identities and user directories in one portal to seamlessly manage access across the organization. Give both onsite and remote employees seamless access to all their apps so they can stay productive anywhere. Automate workflows for easy user lifecycle management and provisioning. Save admin time and resources with self-service identity management for external users. Simplify access to thousands of pre-integrated software as a service (SaaS) applications with single sign-on from any location, on any device.
    Starting Price: $0.00325 per month
  • 19
    Azure Web Application Firewall
    Azure Web Application Firewall is a cloud-native service that protects web apps from common web-hacking techniques such as SQL injection and security vulnerabilities such as cross-site scripting. Deploy the service in minutes to get complete visibility into your environment and block malicious attacks. Protect your web applications in just a few minutes with the latest managed and preconfigured rule sets. The Azure Web Application Firewall detection engine combined with updated rule sets increases security, reduces false positives, and improves performance. Use Azure Policy to help enforce organizational standards and assess compliance at scale for Web Application Firewall resources. Get an aggregated view to evaluate the overall state of your environment.
    Starting Price: $0.443 per gateway per hour
  • 20
    Azure NAT Gateway
    NAT Gateway is a fully managed service that securely routes internet traffic from a private virtual network with enterprise-grade performance and low latency. With built-in high availability using software-defined networking, you can easily configure, scale, and deploy outbound connectivity for dynamic workloads with NAT Gateway. Start securely connecting outbound to the internet with enterprise-grade performance and low latency by deploying a NAT (network address translation) gateway resource. With just a few clicks of a button, assign your NAT gateway to subnets within a single virtual network and static public IP addresses. NAT Gateway assumes the default route to the internet once configured to a subnet, with no traffic routing configurations required.
    Starting Price: $0.045 per hour
  • 21
    Microsoft Defender External ASM
    Microsoft Defender External Attack Surface Management defines your organization’s unique internet-exposed attack surface and discovers unknown resources to proactively manage your security posture. View your organization's web applications, dependencies, and web infrastructure through a single pane of glass with a dynamic record system. Gain enhanced visibility to enable security and IT teams to identify previously unknown resources, prioritize risk, and eliminate threats. View your rapidly changing global attack surface in real time with complete visibility into your organization’s internet-exposed resources. A simple, searchable inventory provides network teams, security defenders, and incident responders with verified insights into vulnerabilities, risks, and exposures from hardware to individual application components.
    Starting Price: $0.011 per asset per day
  • 22
    Mailock

    Mailock

    Beyond Encryption

    Mailock secure email empowers companies to exchange sensitive information with customers, without risking their data. It combines award-winning encryption technology with multi-factor identity authentication to protect confidential emails from cyber risk and keep customer information protected. Compose a secure email from your desktop, browser, or use rules and keywords to initiate the encryption. Set authentication challenges to verify your recipients’ identity so only the right people gain access. Keep audit trails for every message and track your recipients’ activity with real-time read notifications. Recipients can encrypt their replies for free. Empower your customers with a secure thread to your business. Deliver confidential documents to your customers at high volume with automated secure email delivery.
    Starting Price: $9.30 per user per month
  • 23
    BIMA

    BIMA

    Peris.ai

    BIMA by Peris.ai is an all-encompassing Security-as-a-Service platform that combines the advanced functionalities of EDR, NDR, XDR, and SIEM into one powerful solution. This integration ensures proactive threat detection across all network points and endpoints, utilizing AI-driven analytics to predict and mitigate potential breaches before they escalate. BIMA streamlines incident response and enhances security intelligence, providing organizations with a formidable defense against sophisticated cyber threats. With BIMA, organizations benefit from a unified, intelligent approach to cybersecurity, enabling faster detection, improved incident response, and comprehensive protection. The platform’s AI capabilities continuously analyze data to identify patterns and anomalies, offering predictive insights that help prevent attacks. BIMA’s integration of multiple security technologies simplifies management and reduces the complexity of securing diverse IT environments.
    Starting Price: $168
  • 24
    Dropzone AI

    Dropzone AI

    Dropzone AI

    Dropzone AI replicates the techniques of elite analysts and autonomously investigates every alert. Our specialized AI agent autonomously performs end-to-end investigations and will cover 100% of your alerts. ‍ Trained to replicate the investigation techniques of best-in-class SOC analysts, its reports are fast, detailed and accurate. You can also go deeper with its chatbot. Dropzone’s cybersecurity reasoning system, purpose-built on top of advanced LLMs, runs a full end-to-end investigation tailored for each alert. Its security pre-training, organizational context understanding and guardrails make it highly accurate. Dropzone then generates a full report, with the conclusion, executive summary, and full insights in plain English. You can also converse with its chatbot for ad-hoc inquiries.
    Starting Price: $36,000/year
  • 25
    StepSecurity

    StepSecurity

    StepSecurity

    If you are using GitHub Actions for CI/CD and are worried about the security of CI/CD pipelines, StepSecurity platform is for you. Implement network egress control and CI/CD infrastructure security for GitHub Actions runners. Discover CI/CD risks and GitHub Actions security misconfiguration. Standardize GitHub Actions CI/CD pipeline as code files by automated pull requests. Provides runtime security to help you prevent SolarWinds and Codecov CI/CD security attacks by blocking egress traffic with an allowlist. Instant contextualized insight into network and file events for all workflow runs. Control network egress traffic with granular job-level and default cluster-wide policies. Many GitHub Actions are not maintained and are risky. Enterprises fork such Actions, but ongoing maintenance is expensive. By offloading the tasks of reviewing, forking, and maintaining Actions to StepSecurity, enterprises can realize substantial risk reduction and time savings.
    Starting Price: $1,600 per month
  • 26
    Logto

    Logto

    Silverhand

    Logto is an Auth0 alternative designed for modern apps and SaaS products. It offers a seamless developer experience and is well-suited for individuals and growing companies. 🧑‍💻 Comprehensive identity solution Enables easy authentication with Logto SDKs. Supports multiple passwordless and social sign-in methods. Offers customizable UI components to match your brand. 📦 Out-of-the-box infrastructure eliminates the need for extra setup. Provides ready-to-use Management API Offers flexible connectors for customization and scaling, and is customized with SAML, OAuth, and OIDC protocols. 💻 Enterprise-ready with role-based access control (RBAC), organizations (multi-tenant apps), user management, audit logs, single sign-on (SSO), and multi-factor authentication (MFA).
    Starting Price: $0
  • 27
    vRx

    vRx

    Vicarius

    Consolidate your software vulnerability assessment with one single vRx agent. Let vRx do the work so you can focus on and remediate the threats that matter most. vRx's prioritization engine using CVSS framework bases prioritization, plus AI of the specific security posture of your organization, and maps your digital environment to help you prioritize critical vulnerabilities for mitigation. vRx maps the potential consequences of a successful exploit within your unique digital infrastructure. CVSS metrics and context-based AI mapping provide the data needed to prioritize and mitigate critical vulnerabilities. For each detected app, OS, or asset vulnerability, vRx provides recommended actions that help you eliminate potential risks and stay resilient.
    Starting Price: $5 per asset per month
  • 28
    Ethiack

    Ethiack

    Ethiack

    We keep you safe by combining AI automated pentesting and elite ethical hacking for both in-depth and in-breadth security testing. It’s not just your code, third-party services, APIs, and external tools all pose a risk to your organization. We give you a complete view of your entire digital exposure so you can understand its weak points. Scanners flag too many false positives and pentests are not frequent enough. Automated pentesting fixes this. It reports less than 0.5% false positives and over 20% of its findings are impactful. We have a pool of world-class ethical hackers ready for human hacking events. To join, they go through an extensive process of background checks and those that get accepted go on to find the most critical vulnerabilities in your assets. Our team has won world-class awards and found vulnerabilities on Shopify, Verizon, Steam, and many more. Add the TXT record to your DNS and start your 30-day free trial.
    Starting Price: €1,790 per year
  • 29
    Humanize Salience
    Externally visible vulnerabilities and misconfigurations. Detect and address external vulnerabilities proactively with continuous, advanced scanning. Continuously monitor and secure your APIs, safeguarding against unauthorized access and data breaches. Get custom-tailored hardening tips to bolster your system's defenses. Gain valuable threat intelligence without risking real data. Quantify risks and focus resources for maximum ROI. Gain in-depth insights into compliance. Replace multiple tools with one unified platform. Proactively anticipate and neutralize cyber threats. Optimize your cybersecurity process by leveraging the power of machine learning and deep learning. Extended Attack Surface Management (xASM) ensures comprehensive visibility and control over your entire digital presence, including Internal, external, and API attack surfaces. xASM enables proactive mitigation of cyber threats, thereby safeguarding your business continuity.
    Starting Price: $199 per month
  • 30
    Stream Security

    Stream Security

    Stream Security

    Stay ahead of exposure risks & threat actors with real-time detection of config change impacts and automated threat investigations fused to posture and all activities. Track all changes, and detect critical exposure and toxic combinations before attackers do. Leverage AI to effectively address and fix issues using your preferred methods. Utilize any of your preferred SOAR tools to respond in real time or use our suggested code snippets. Harden and prevent external exposure & lateral movement risks, focus on risks that are truly exploitable. Detect toxic combinations of posture and vulnerabilities. Detect gaps from segmentation intent and implement zero-trust. Answer any cloud-related question fast with context. Maintain compliance, and prevent deviation from taking hold. We integrate with your existing investment. We can share more about our security policies and work with your security teams to deliver any specific requirements for your organization.
    Starting Price: $8,000 per year
MongoDB Logo MongoDB