Best IT Security Software - Page 51

Compare the Top IT Security Software as of May 2026 - Page 51

  • 1
    Trivy

    Trivy

    Aqua Security

    Trivy is a comprehensive and versatile security scanner. Trivy has scanners that look for security issues, and targets where it can find those issues. Trivy supports the most popular programming languages, operating systems, and platforms. Trivy is available in the most common distribution channels. Trivy is integrated with many popular platforms and applications. Trivy is integrated into many popular tools and applications so that you can easily add security to your workflow. Find vulnerabilities, misconfigurations, secrets, and SBOM in containers, Kubernetes, code repositories, clouds, and more.
    Starting Price: Free
  • 2
    Docker Scout
    Container images consist of layers and software packages, which are susceptible to vulnerabilities. These vulnerabilities can compromise the security of containers and applications. Docker Scout is a solution for proactively enhancing your software supply chain security. By analyzing your images, Docker Scout compiles an inventory of components, also known as a Software Bill of Materials (SBOM). The SBOM is matched against a continuously updated vulnerability database to pinpoint security weaknesses. Docker Scout is a standalone service and platform that you can interact with using Docker Desktop, Docker Hub, the Docker CLI, and the Docker Scout Dashboard. Docker Scout also facilitates integrations with third-party systems, such as container registries and CI platforms. Reveal and dig into the composition of your images. Ensure that your artifacts align with supply chain best practices.
    Starting Price: $5 per month
  • 3
    Tenable Vulnerability Management
    The solution that created the category continues to raise the bar to protect enterprises from critical cyber exposures that increase business risk. Expose and close your cyber weaknesses with the world’s #1 vulnerability management solution. Gain the full visibility you need to reveal the impactful vulnerabilities across your IT environment. Quickly spot priority exposures with a high likelihood of attack and business impact. Take rapid, decisive action to close critical exposures and execute remediations. Find hidden vulnerabilities with continuous, always-on asset discovery and assessment of known and unknown assets in your environment, even highly dynamic cloud or remote workforce assets. Search, contextualize, and respond to vulnerabilities based on the industry’s richest sources of data and intelligence provided by Tenable Research. Identify which vulnerabilities to fix first with automated prioritization that combines vulnerability data, threat intelligence, and data science.
    Starting Price: $4,399.05 per year
  • 4
    Fraudnetic

    Fraudnetic

    Fraudnetic

    We employ cutting-edge technology and data intelligence to stay one step ahead of emerging fraud threats. We're dedicated to safeguarding your online platform, ensuring a secure and enjoyable experience for your business and customers alike. Fraudnetic is your trusted source for advanced anti-fraud solutions tailored specifically to the gambling industry. Robust methods to authenticate user identities, minimizing the risk of fraudulent activities. Real-time surveillance to detect suspicious and abnormal activities, ensuring secure financial transactions. Tailored strategies to mitigate risks, safeguarding gambling platforms from potential threats. You'll have the opportunity to explore Fraudnetic's user-friendly interface and see how it seamlessly integrates into your existing infrastructure. Fraudnetic can adapt to the size and needs of your operation, from startups to established enterprises.
    Starting Price: Free
  • 5
    NextAuth.js

    NextAuth.js

    NextAuth.js

    NextAuth.js is an open source authentication solution tailored for Next.js applications, offering seamless integration with popular services like Google, Facebook, Auth0, and Apple. It supports various authentication methods, including OAuth 1.0 & 2.0, email/passwordless sign-ins, and custom username/password systems. Designed for flexibility, NextAuth.js operates efficiently in serverless environments and supports multiple databases such as MySQL, PostgreSQL, MSSQL, and MongoDB, allowing developers to choose between database sessions or JSON Web Tokens (JWT). Security features include signed, prefixed, server-only cookies, HTTP POST with CSRF token validation, and encrypted JWTs using JWS/JWE/JWK standards. The platform facilitates easy setup, enabling developers to add authentication in minutes with minimal configuration. Comprehensive documentation and a supportive community further enhance its accessibility for developers seeking a robust authentication system.
    Starting Price: Free
  • 6
    Auth.js

    Auth.js

    Auth.js

    Auth.js is an open-source authentication library designed to integrate seamlessly with modern JavaScript frameworks, providing a flexible and secure authentication experience. It supports various authentication methods, including OAuth (e.g., Google, GitHub), credentials, and WebAuthn, allowing developers to choose the most suitable approach for their applications. Auth.js is compatible with multiple frameworks, such as Next.js, SvelteKit, Express, Qwik, and SolidStart, enabling developers to implement authentication across different platforms. The library offers built-in support for popular databases like Prisma, Drizzle ORM, Supabase, Firebase, and TypeORM, facilitating user data management. Security features include signed cookies, CSRF token validation, and encrypted JSON Web Tokens (JWTs), ensuring robust protection for user data. Auth.js is designed to operate efficiently in serverless environments and provides comprehensive documentation and examples.
    Starting Price: Free
  • 7
    Amazon Security Lake
    Amazon Security Lake automatically centralizes security data from AWS environments, SaaS providers, on-premises, and cloud sources into a purpose-built data lake stored in your account. With Security Lake, you can get a more complete understanding of your security data across your entire organization. You can also improve the protection of your workloads, applications, and data. Security Lake has adopted the Open Cybersecurity Schema Framework (OCSF), an open standard. With OCSF support, the service normalizes and combines security data from AWS and a broad range of enterprise security data sources. Use your preferred analytics tools to analyze your security data while retaining complete control and ownership over that data. Centralize data visibility from cloud and on-premises sources across your accounts and AWS Regions. Streamline your data management at scale by normalizing your security data to an open standard.
    Starting Price: $0.75 per GB per month
  • 8
    NexVision

    NexVision

    NexVision Lab

    NexVision is an AI-powered platform that provides multi-layered, real-time information gathering and cyber protection. It offers deep, contextual intelligence encompassing targets, motivations, and threat analytics. The platform's advanced search algorithm discovers over 120,000 hidden Tor sites daily, enabling users to access the deep and dark web without the need for anonymizing browsers like Tor. NexVision's AI/ML-powered engine continuously collects, analyzes, and sorts big data from publicly available databases and the deep web, supporting multiple languages and equipped with natural language processing and steganography-decoding capabilities to detect hidden information used by advanced threat actors. The user-friendly dashboard allows for setting keyword alerts, conducting investigations, and analyzing results while maintaining user anonymity. NexVision enables organizations to proactively safeguard their assets and maintain a secure online environment.
    Starting Price: Free
  • 9
    OpenFGA

    OpenFGA

    The Linux Foundation

    OpenFGA is an open source authorization solution that enables developers to implement fine-grained access control using a user-friendly modeling language and APIs. Inspired by Google's Zanzibar paper, it supports various access control models, including Relationship-Based Access Control (ReBAC), Role-Based Access Control (RBAC), and Attribute-Based Access Control (ABAC). OpenFGA offers SDKs for multiple programming languages, such as Java, .NET, JavaScript, Go, and Python, facilitating seamless integration into diverse applications. The platform is designed for high performance, capable of processing authorization checks in milliseconds, making it suitable for projects ranging from small startups to large enterprises. Operating under the Cloud Native Computing Foundation (CNCF) as a sandbox project, OpenFGA emphasizes transparency and community collaboration, inviting contributions to its development and governance.
    Starting Price: Free
  • 10
    Permify

    Permify

    Permify

    Permify is an authorization service designed to help developers build and manage fine-grained, scalable access control systems within their applications. Inspired by Google's Zanzibar, Permify enables the structuring of authorization models, storage of authorization data in preferred databases, and interaction with its API to handle authorization queries across various applications and services. It supports multiple access control models, including Role-Based Access Control (RBAC), and Attribute-Based Access Control (ABAC), allowing for the creation of granular permissions and policies. Permify centralized authorization logic, abstracting it from the codebase to facilitate easier reasoning, testing, and debugging. It offers flexible policy storage options and provides a role manager to handle RBAC role hierarchies. The platform also supports filtered policy management for efficient enforcement in large, multi-tenant environments.
    Starting Price: Free
  • 11
    ArtistScope Site Protection System (ASPS)
    ArtistScope Site Protection Software (ASPS) provides the most robust and most secure website security and copy protection for all web page media, safe from all copy including screen capture, download, scraping, etc. In fact ASPS provides the most secure solution for data security and the prevention of data loss and plagiarism ever imagined. The ASPS server module is installed on the web server (Apache or Windows) to deliver encrypted web pages from your web site that only the ArtisBrowser can interpret and display, creating a secure tunnel between website and the user's web browser in which no data or media can be copied or extracted by any means, not even from browser cache or memory. ASPS is most unique and it is most secure because it does not depend on popular web browsers which are useless for copy protection. Any media displayed on your web page will be copy protected and you can use any video file format or embedded player that you like.
    Starting Price: $495.00
  • 12
    GoAccess

    GoAccess

    GoAccess

    GoAccess is an open source, real-time web log analyzer and interactive viewer that operates within a terminal on Unix-like systems or through a browser interface. Designed for rapid analysis, it provides immediate HTTP statistics, making it ideal for system administrators who need quick insights into server performance. The tool supports various web log formats, including those from Apache, Nginx, Amazon S3, Elastic Load Balancing, CloudFront, and Caddy, allowing users to set the log format and analyze logs effortlessly. Written in C, GoAccess requires only ncurses as a dependency, ensuring swift, millisecond-level updates. It offers customizable terminal and web-based dashboards, enabling users to tailor color schemes to their preferences. Beyond terminal output, GoAccess can generate comprehensive, self-contained real-time HTML reports, as well as JSON, facilitating analytics, monitoring, and data visualization.
    Starting Price: Free
  • 13
    GitHub Advanced Security
    With AI-powered remediation, static analysis, secret scanning, and software composition analysis, GitHub Advanced Security helps developers and security teams work together to eliminate security debt and keep new vulnerabilities out of code. Code scanning with Copilot Autofix detects vulnerabilities, provides contextual explanations, and suggests fixes in the pull request and for historical alerts. Solve your backlog of application security debt. Security campaigns target and generate autofixes for up to 1,000 alerts at a time, rapidly reducing the risk of application vulnerabilities and zero-day attacks. Secret scanning with push protection guards over 200 token types and patterns from more than 150 service providers, even elusive secrets like passwords and PII. Powered by security experts and a global community of more than 100 million developers, GitHub Advanced Security provides the insights and automation you need to ship more secure software on schedule.
    Starting Price: $49 per month per user
  • 14
    ScoreDetect

    ScoreDetect

    ScoreDetect

    Boost your audience’s trust, so your work stands out from others. We offer ways to help you display trust markers so that you can show your audience that you are the original creator. ScoreDetect has you covered with a fast, easy, and secure way to protect your digital content with the most integrations in the industry we know of. We can also assist you with your technical integrations in our Enterprise plan. ScoreDetect is an official partner of the SKALE blockchain, an eco-friendly blockchain with zero gas fees and a sustainable, predictable cost model. SKALE reduces the high energy usage associated with blockchain mining and transaction fees, making it an environmentally-friendly blockchain solution. Reduce your carbon footprint with our eco-friendly blockchain technology.
    Starting Price: $11.31 per month
  • 15
    Onsist

    Onsist

    Onsist

    Achieve comprehensive visibility of online threats with round-the-clock monitoring and enforcement. Locate and take down impersonating (social media) accounts and websites. Find and remove unauthorized copies of your mobile application and kill rogue apps. Monitor the web for your trademarked content and take down infringements. Find and remove illegal copies of your valuable content and increase your sales. Find and remove counterfeit copies of your products. Restore consumer confidence and brand reputation. Protect your brand and products by removing counterfeits from online marketplaces and ecommerce platforms such as Amazon, eBay, and Aliexpress.
    Starting Price: $199 per month
  • 16
    tirreno

    tirreno

    Tirreno Technologies Sàrl

    tirreno is an open-source security framework. tirreno helps understand, monitor, and protect your product from threats, fraud, and abuse. While classic cybersecurity focuses on infrastructure and network perimeter, most breaches occur through compromised accounts and application logic abuse that bypasses firewalls, SIEM, WAFs, and other defenses. tirreno detects threats where they actually happen: inside your product. Core components SDKs & API - Integrate tirreno into any product with SDKs. Send events with full context in a few lines of code. Built-in dashboard - Monitor and understand your product's security events from a single interface. Ready for use in minutes. Single user view - Analyze behaviour patterns, risk scores, connected identities, and activity timelines for a specific user. Rule engine - Calculate risk scores automatically with preset rules or create your own customized for your product. Review queue -Automatically suspend accounts with risky even
    Starting Price: Free
  • 17
    Zoho Directory
    Zoho Directory is a cloud-based identity and access management platform designed to streamline authentication, authorization, and user management for organizations. It offers Single Sign-On (SSO) capabilities, allowing employees to access multiple applications with a single set of credentials, thereby enhancing security and user convenience. The platform supports Multi-Factor Authentication (MFA), adding an extra layer of protection against unauthorized access. Device authentication ensures secure access to both applications and devices, enabling employees to use the same credentials across platforms. Zoho Directory also provides robust provisioning features, allowing IT administrators to create and manage user profiles across various applications directly from the platform, reducing the time spent on repetitive tasks. Integration with existing directories, such as Microsoft Active Directory and Azure AD, is facilitated through directory stores.
    Starting Price: $1.70/user/month
  • 18
    Paralus

    Paralus

    Paralus

    Paralus is a free, open source tool that enables controlled, audited access to Kubernetes infrastructure. It provides just-in-time service account creation and user-level credential management, integrating seamlessly with existing Role-Based Access Control (RBAC) and Single Sign-On (SSO) systems. Paralus applies zero-trust security principles, ensuring secure access to Kubernetes clusters by generating, maintaining, and revoking access configurations across clusters, projects, and namespaces. It offers both a browser-based graphical user interface and command-line interface tools for managing kubeconfigs directly from the terminal. Additionally, Paralus includes comprehensive auditing tools that provide detailed logging of activities and resource access, facilitating real-time and historical tracking. Installation is straightforward, with Helm charts available for deployment across various environments, including major cloud providers and on-premises setups.
    Starting Price: Free
  • 19
    Netwrix PingCastle
    Netwrix PingCastle is a security assessment tool designed to identify risks in Active Directory and Entra ID environments. It scans directory configurations to uncover vulnerabilities, misconfigurations, and potential attack paths. The platform provides detailed risk reports that highlight security gaps and exposure points. It assigns risk scores to help organizations prioritize the most critical issues. Netwrix PingCastle also offers remediation guidance to help teams quickly fix identified problems. The solution helps improve identity security by strengthening directory configurations. It enables organizations to maintain a clearer understanding of their security posture. Overall, it helps reduce the risk of breaches by proactively identifying and addressing weaknesses.
    Starting Price: Free
  • 20
    PryvateNow

    PryvateNow

    PryvateNow

    PryvateNow is a comprehensive communication platform that encrypts and secures voice and video calls, instant messages, emails, and conference calls, both on and off the network. It offers solutions tailored for small and medium-sized enterprises, corporate entities, and large enterprises, ensuring full control over communications and data. Key features include Post-Quantum ZRTP encryption for world-leading data security, built-in auditing and compliance aligning with MiFID II, HIPAA, and GDPR, and white-labeled OEM versions of Pryvate Closed User Groups (CUG) available. The platform also provides a Secure Integration Kit for VoIP, allowing providers to integrate Pryvate’s secure communication suite into their existing platforms seamlessly. PryvateNow's technology encompasses encrypted voice and video calls, secure email, file transfer and storage, and secure voice and video conference calls.
    Starting Price: $1.25 per month
  • 21
    RAV Endpoint Protection

    RAV Endpoint Protection

    Reason Cybersecurity

    RAV Endpoint Protection is a next-generation antivirus solution that leverages AI-powered Endpoint Detection and Response (EDR) technology to provide real-time protection against advanced cyber threats. Its lightweight engine requires fewer device resources compared to other antivirus programs, ensuring seamless operation without technical expertise. The platform offers comprehensive online protection and identity monitoring, safeguarding users from phishing, ransomware, adware, and more during web activities. It includes digital identity management features, such as personal data monitoring and dark web scanning, to alert users when their identity has been compromised. The dynamic ransomware defense and malware protection feature utilizes advanced heuristics to block and alert users to potentially unknown ransomware threats. Additionally, RAV Endpoint Protection emphasizes privacy with tools like webcam and microphone protection, minimizing potential entry points for attackers.
    Starting Price: $32.83 per month
  • 22
    Pomerium

    Pomerium

    Pomerium

    Pomerium is a secure, clientless solution that enables seamless access to web applications and services without the need for a corporate VPN. Designed to enhance developer productivity, it eliminates complex user access flows that can hinder workflow. Unlike traditional client-based tunneling solutions, Pomerium offers lightning-fast connections with minimal latency, ensuring security and privacy without compromise. It leverages contextual data for access control decisions, implementing continuous verification—a zero trust concept where every action is verified for contextual factors before being accepted or denied. This approach contrasts with NextGen VPNs, which only verify authentication and authorization at the start of a session. Pomerium supports secure access to web apps, databases, Kubernetes clusters, internal tools, and legacy applications, making it suitable for individuals and teams of all sizes.
    Starting Price: $7 per month
  • 23
    authentik

    authentik

    authentik

    authentik is an open source identity provider that unifies your identity needs into a single platform, replacing Okta, Active Directory, and Auth0. Authentik Security is a public benefit company that is building on top of the open-source project. Using a self-hosted, open-source identity provider means prioritizing security and taking control of your most sensitive data. With authentik, you no longer need to continually place your trust in a third-party service. Adopt authentik to your environment, regardless of your requirements. Use our APIs and fully customizable policies to automate any workflow. Simplify deployment and scaling with prebuilt templates and support for Kubernetes, Terraform, and Docker Compose. No need to rely on a third-party service for critical infrastructure or expose your sensitive data to the public internet. Use our pre-built workflows, or customize every step of authentication through configurable templates, infrastructure as code, and comprehensive APIs.
    Starting Price: $0.02 per month
  • 24
    Authelia

    Authelia

    Authelia

    Authelia is an open source authentication and authorization server and portal fulfilling the identity and access management role of information security in providing multi-factor authentication and single sign-on for your applications via a web portal. It acts as a companion for common reverse proxies. With a compressed container size smaller than 20 megabytes and observed memory usage normally under 30 megabytes, it's one of the most lightweight solutions available. Written in Go and React, authorization policies and many other backend tasks are completed in mere milliseconds, and login portal loading times of 100 milliseconds make it one of the fastest solutions available. Processors can use a lot of electricity, but when idle, usage is basically so low that you can't measure it, and active usage in a small business environment being under 1% allows you to rest easy (with the exclusion of password hashing). Security is heavily considered as part of our design process.
    Starting Price: Free
  • 25
    Patchstack

    Patchstack

    Patchstack

    Patchstack is a comprehensive security solution designed to protect WordPress websites from vulnerabilities in plugins, themes, and the core platform. By automatically deploying highly targeted virtual patches, it mitigates high and medium-priority vulnerabilities without altering your site's code or performance. As the world's largest vulnerability discloser, Patchstack has issued over 9,100 virtual patches, safeguarding users up to 48 hours before competitors. Its real-time detection prioritizes vulnerabilities based on exploitation likelihood, reducing alert fatigue. Supported by a vast community of ethical hackers, Patchstack serves as the official security contact for more than 560 plugins, including popular ones like Visual Composer, Elementor, and WP Rocket. It offers next-generation security for enterprise needs, ensuring compliance with standards such as SOC2 and PCI-DSS 4.0. Patchstack's user-friendly interface provides actionable security suggestions.
    Starting Price: $89 per month
  • 26
    Axoflow

    Axoflow

    Axoflow

    Axoflow, the Security Data Layer is the foundation for your SIEM and analytics tools enabling the use of AI, up to 70% faster investigations, and more than 50% reduction in SIEM spend by feeding them with actionable data. Axoflow Platform is built up of the following parts: A pipeline acting as the transportation layer for your security data and also acting as an automated ‘translator’ between data schemas. AI - If you prefer to run your detection content locally - whether it’s an AI or ML model, a threat intel lookup, or another type of enrichment - we’ve got you covered. Storage solutions to facilitate the cost-effective storage of security data and also acting as local storage to run your decentralized detection. Orchestration to weave all of the parts together in an easy-to-use GUI that lets youmonitor and manage, and control and search your data.
  • 27
    Wizer

    Wizer

    Wizer

    Wizer offers no-nonsense security awareness training and phishing simulation to level up your security culture. It's short, and to the point, and you can start for free! The platform includes training courses, phishing simulation, learner experience, and secure code training. The video library has hundreds of videos, with new ones added monthly, providing micro-learning that is quick, simple, effective, and fun. Video topics range from security awareness basics and advanced, assorted compliance training, advanced phishing, new employee onboarding, safety at home, and much more. Language packs are available, offering videos with both text and voice-overs in multiple languages. Wizer's pricing plan is clear and easy to understand, with a free plan providing basic annual training with tracking and reporting to help your team meet basic security awareness requirements.
    Starting Price: $25 per month
  • 28
    DeCloudUs

    DeCloudUs

    DeCloudUs

    DeCloudUs is a privacy-focused, customizable DNS service designed to enhance online security by blocking ads, trackers, malware, phishing attempts, and malicious sites. It offers users the ability to create multiple custom DNS profiles, allowing for tailored filtering rules and parental controls. The service supports encrypted DNS protocols, including DNSCrypt, DNS over TLS (DoT), and DNS over HTTPS (DoH), ensuring secure and private DNS queries. DeCloudUs operates on self-hosted infrastructure without reliance on third-party cloud services, adhering to a strict zero-logs policy to maintain user privacy. Subscription plans provide access to various DNS servers with different filtering capabilities, catering to diverse user needs. With DeCloudUs, you get access to multiple DNS servers that offer different types and levels of filtering capabilities to suit any use case you have for all of your devices or even the entire home network.
    Starting Price: $0.49 per month
  • 29
    Rethink DNS

    Rethink DNS

    Rethink DNS

    RethinkDNS is a free and open source application designed to enhance online privacy and security for Android users. It combines a DNS resolver, firewall, and VPN client into a single tool, allowing users to block ads, trackers, malware, and spyware across all apps. The app supports over 190 blocklists, including those used by popular ad blockers like uBlock Origin. By encrypting DNS queries using DNS over HTTPS (DoH) or DNS over TLS (DoT), RethinkDNS ensures secure and private internet connections. Additionally, it offers a customizable firewall to control internet access on a per-app basis and includes a built-in WireGuard VPN client for encrypting outgoing connections. RethinkDNS is available for download on the Google Play Store and F-Droid. RethinkDNS' goal is to turn Android devices into user agents, something that users can truly control to match their needs and expectations.
    Starting Price: Free
  • 30
    personalDNSfilter

    personalDNSfilter

    Zenz Solutions

    personalDNSfilter is a DNS filter proxy written in Java that intercepts domain name resolutions and returns the loopback address for filtered hosts. It supports secure DNS via DNS over HTTPS (DoH) and DNS over TLS (DoT) and is available for Java-enabled devices. The application operates with minimal memory usage, allowing filtering with millions of hosts while consuming only a few megabytes of RAM. On Android devices (version 4.2 and newer), personalDNSfilter functions as an effective ad, malware, and tracking server filter without requiring root access. It works with any upstream DNS server, ensuring that filtering is entirely local without any external communication. The software comes preconfigured with ad host filter lists, and users can add additional host filter lists as desired. personalDNSfilter can be run locally on a device or centrally as a DNS server within a network.
    Starting Price: Free
MongoDB Logo MongoDB