Best IT Security Software - Page 56

Compare the Top IT Security Software as of May 2026 - Page 56

  • 1
    AssureID

    AssureID

    Acuant

    Real Time Multi-Factor Identity Verification Software AssureID offers fast multi-factor authentication to improve customer experiences, increase conversion rates and mitigate fraud. Patented technology authenticates IDs by applying 50+ forensic and biometric tests, in seconds, utilizing the industry's largest document library. Acuant's library is powered by human-assisted machine learning for the highest accuracy. AssureID eliminates manual errors, speeds up the document inspection process, and significantly reduces employee training. Solutions integrate easily into any environment in any industry and read IDs from over 196 countries and all 50 US states. Accurate data population with 50+ forensic tests run in seconds in the same seamless process. Three classes of facial match & liveness tests including NIST algorithm, intuitive & fast. World-class patented image capture that automatically crops & detects document type & region.
  • 2
    Intelligent Management Center

    Intelligent Management Center

    Hewlett Packard Enterprise

    Aruba AirWave is the only multi-vendor wired and wireless network management solution designed with mobile devices, users and apps in mind. By proactively monitoring the health and performance of all things connected, AirWave gives IT the insights needed to support today’s digital workplace. As network management becomes more complex, the risks associated with compromised data flow have also increased. HPE Intelligent Management Center (IMC) delivers comprehensive management across campus core and data center networks. IMC converts meaningless network data to actionable information to keep your network, and your business, moving. HPE network and service management solutions support telco networks from the core to the edge allowing operators to seize the profits of 5G. Simplify the management of data center and the Fibre Channel (FC) storage area network (SAN) fabrics. HPE IMC Branch Intelligent Management System. Enable remote network management of Customer Premises Equipment (CPE).
    Starting Price: $2000.00/one-time
  • 3
    Active Login Manager
    The login process is fully automated by ALM. In addition, the solution improves the usability of your Cisco IP Phone Extension Mobility by controlling the log on and log off process. ALM will automatically log off the connected phone at selected events, e.g. when the PC is locked or when the screensavers starts. The user or its administrator has the option to customize the ALM behavior. ALM Pro is a client-only application so there is no need to add or invest in new (server) hardware. Deployment of ALM to your existing network is fully scriptable. Configuration of the software is therefore an easy task. To even further simplify the management of large-scale installations, the RSconnect Application Manager is available.
  • 4
    ScoutDNS

    ScoutDNS

    ScoutDNS

    Content Filtering And Malware Protection At The DNS Layer. Organizations of all sizes depend on ScoutDNS to gain visibility, comply with content obligations, and reduce their malware exposure. Manage 67 content categories. Network wide Google and Bing restricted search filters image and video search results. Supports YouTube Strict and Moderate modes with G Suite support. Block streaming media, P2P, social networks, web proxy, games, and more. Blocks malware, ransomware, and phishing sites. Stop hidden malware and objectionable content inside embedded ads. Easy to deploy with automatic updates to latest threats. Full log reporting and system dashboard. Create and mange multiple whitelists/blacklists. Manage 67+ categories, and create multiple allow/block lists that can be assigned globally or by the policy. Add custom list entries direct from logs with a single click. Sign up for a risk free full featured trial account on a single site. There is no credit card required.
    Starting Price: $15 per month
  • 5
    BETTER Mobile

    BETTER Mobile

    Better Mobile Security

    BETTER Mobile Threat Defense protects mobile devices from attacks and threats. It’s simple, affordable, and powerful. Lightweight mobile agent that provides endpoint protection. Deploy it in minutes via EMM. Streamlined admin console gives immediate visibility, intelligence and control over device risks and threats. The console provides rich information and easy policy management, but our goal is to keep you from ever needing to use it. We have built one of the most advanced machine learning platforms and focused it on mobile threat detection. With our global mobile sensor network feeding rich intelligence into Deep Thinker, a cloud-based AI engine, BETTER MTD provides highly accurate detection of risky apps, anomalous behavior, and network threats. The detection engine provides comprehensive around-the-clock protection for your company data and resources. Runs in the background only consuming 5% battery and 1% CPU.
  • 6
    Sqreen

    Sqreen

    Sqreen

    Security built into every app. Everywhere. Application security platform that helps teams protect applications, increase visibility and secure code. Protect applications by preventing data breaches, stopping account takeovers and blocking business logic attacks. Increase visibility by monitoring incidents in real time, streamlining incident response management and automating your application inventory. Secure code by finding critical threats, fixing vulnerabilities and integrating security into the SDLC. Protect, observe and test your applications through a single platform and apply a holistic security approach. Analyze application execution logic in real-time to deliver more robust security without compromising performance. Sandboxed microagents dynamically adapt to evolving applications and threats without requiring maintenance.
    Starting Price: $499 per month
  • 7
    KITEWIRE Mobility
    Mobile device management (MDM) is a balancing act. You need to protect your company’s most valuable asset—proprietary data—from theft and misuse. But your employees need the freedom to use mobile devices that aren’t hampered by security software. Every organization should be free to use the right devices and technology to meet it’s mission. If you’re like many CIO’s, you might be trying to strike a balance between giving your employees the freedom to use the right devices and the necessity to protect your company’s proprietary information on those devices. Your IT administrator can have this intuitive, user-friendly tool up and running in six minutes. You don’t even have to schedule time with our team to walk you through it (but we’re here if you need us).
    Starting Price: $1 per device per month
  • 8
    Comodo Endpoint Security Manager
    Comodo Advanced Endpoint Protection provides a state-of-the-art anti-malware suite that proactively protects your servers, workstations, laptops and netbooks while offering advanced, real-time management and control over critical system resources. Whether deployed as a complete security suite or by using the sandbox as a standalone to fortify existing AV solutions, Comodo ESM offers unrivaled endpoint protection for Microsoft Windows servers, desktops, laptops and tablets. The full Comodo Endpoint Security suite brings 5 layers of defense (Antivirus, Firewall, Host Intrusion Prevention, Auto-Sandbox & File Reputation) to the point of impact - the desktop environment. Its ground-breaking auto-sandbox technology eliminates malware outbreaks and operating system contamination by automatically running untrusted processes in an isolated environment. This makes Comodo's endpoint protection the only managed anti-malware solution that can offer a $5,000 limited warranty against infection.
    Starting Price: $4.00/one-time/user
  • 9
    Motadata

    Motadata

    Motadata

    Effectively addressing the intricate challenges posed by modern networks requires the implementation of advanced solutions in the realm of Network Observability. In this pursuit, consider embracing the cutting-edge offerings of Motadata AIOps, a leading provider in the industry. By integrating Motadata AIOps into your network infrastructure, you not only eliminate data silos but also gain unparalleled visibility into various facets such as network performance, SNMP data, Network Flow, and log data. This comprehensive approach empowers you to monitor and analyze your network with utmost precision, ensuring seamless operations across diverse environments, from on-premise setups to the expansive landscape of cloud infrastructure. The synergy of innovative Network Observability and Motadata AIOps not only meets but exceeds the expectations set for network management, ushering in a new era of efficiency and reliability.
  • 10
    Lynis Enterprise
    Lynis Enterprise performs security scanning for Linux, macOS, and Unix systems. It helps you discover and solve issues quickly, so you can focus on your business and projects again. It is fairly unique for a company to focus on just a few operating systems. In a field where there are so many services and software solutions, we specialize in Linux and Unix security. The primary focus of Lynis is to perform a health check of systems. It helps also to detect vulnerabilities and configuration management weaknesses. Lynis Enterprise is a software solution to perform security auditing, compliance testing, and apply system hardening. It includes Lynis in the core and focuses on environments with Linux, macOS, or other Unix-based systems.
    Starting Price: $90 per year
  • 11
    Nagios XI

    Nagios XI

    Nagios Enterprises, LLC

    Provides monitoring of all mission-critical infrastructure components including applications, services, operating systems, network protocols, systems metrics, and network infrastructure. Hundreds of third-party addons provide for monitoring of virtually all in-house applications, services, and systems. Provides a central view of your entire IT operations network and business processes. Powerful dashboards provide at-a-glance access to powerful monitoring information and third-party data. Views provide users with quick access to the information they find most useful. Automated, integrated trending and capacity planning graphs allow organizations to plan for infrastructure upgrades before outdated systems catch them by surprise. Alerts are sent to IT staff, business stakeholders, and end-users via email or mobile text messages, providing them with outage details so they can start resolving issues immediately.
    Starting Price: $1995.00/one-time
  • 12
    Nagios Log Server

    Nagios Log Server

    Nagios Enterprises

    Nagios Log Server greatly simplifies the process of searching your log data. Set up alerts to notify you when potential threats arise, or simply query your log data to quickly audit any system. With Nagios Log Server, you get all of your log data in one location, with high availability and fail-over built right in. Quickly configure your servers to send all log data with easy source setup wizards and start monitoring your logs in minutes. Easily correlate log events across all servers in a few clicks. Nagios Log Server allows you to view log data in real-time, providing the ability to quickly analyze and solve problems as they occur. This keeps your organization safe, secure, and running smoothly. Nagios Log Server provides users with advanced awareness of their infrastructure. Dive deep into network events, logs, and security events. Use Log Server to provide the evidence necessary to track down security threats, and quickly resolve vulnerabilities with built-in alerts.
    Starting Price: $1995.00/one-time
  • 13
    LiteSpeed Web ADC

    LiteSpeed Web ADC

    LiteSpeed Technologies

    LiteSpeed Web ADC is an affordable, high-performance HTTP load balancer application. Feature-rich, secure, and efficient, it offers more flexibility than similarly-priced load balancing software. Web ADC is an excellent choice for small enterprises looking to scale their applications beyond one server. High Scalability, High Availability IP failover, Cross Datacenter Replication, Cache Data Synchronization and out-of-the box acceleration for Magento and Wordpress round out the feature set to make LiteSpeed Web ADC the best-of-breed solution on the market. LiteSpeed Web ADC is a 100% software solution, meaning it can operate anywhere: private dedicated hardware, hosted environment, the cloud, etc. Web ADC's nearly-instant on-demand scaling adapts to your business needs, even during unexpected traffic spikes, with a flexible subscription model. A highly efficient, security-conscious, cost-effective product.
    Starting Price: $715 per year
  • 14
    VMware Tanzu CloudHealth
    Tanzu CloudHealth (formerly VMware Aria Cost Powered by CloudHealth) simplifies financial management, streamlines operations, and improves organizational collaboration across your multi-cloud environment. Get visibility into a rich set of data for managing your multi-cloud environment. Analyze your infrastructure by dynamic business groups and access custom reporting. Improve resource utilization and realize cost savings with tailored recommendations. Drive continuous optimization with governance policies and automated actions that execute changes in your cloud environment. With more than $24B of annualized cloud spend under management, Tanzu CloudHealth supports 22,000+ organizations worldwide. Grow your cloud expertise with a proven framework to progress through your cloud management maturity journey.
  • 15
    4identity
    4identity is the technological solution developed by Bit4id that empowers web applications with Digital Signature and Authentication processes. 4identity does not use Java Applets or any other third party add-on. It is simple, its is compatible with any web browser and works under the most used operating systems. The “integration-less” Engine to add Digital Signature and Strong Authentication to web applications through a simple API. 4identity means usability, providing a “1-click signing” user experience. Bit4id has extensive knowledge and experience in the development of software and tools for security and digital identity management based on Public Key Infrastructure (PKI). Providing solutions for managing more than 10 million digital identities, and processing more than 50 million digital signatures a year, Bit4id is a company leading in innovation for the PKI and digital identity market in Europe and Latin America.
  • 16
    ARCON | IDAM
    ARCON | IDAM is a solution that ensures the details of an employee’s overall employment tenure are maintained and managed from a single console. This allows administrators to perform access certification and review activity in a much faster and more efficient manner. At the same time, the end users do not have to wait too long to gain legitimate access to business applications, legacy applications, or IT Infrastructure devices. Enhance your digital experience at the workplace by maintaining a digital identity of each individual from the day an employee starts working for you until after they leave the organization, leading to faster development and release cycles. No more waiting for support to reply before you start your work again. Administration activities of adding, deleting, updating user credentials are now easier than ever, reducing help desk support calls such as password change, access requests, and access removal, resulting in reduced total cost of ownership.
  • 17
    PerfectMail Antispam
    PerfectMail delivers better than 99% filter accuracy with false positives (wanted e-mail blocked as spam) at less than 0.1%. PerfectMail automatically learns about your users and their regular e-mail peers and never blocks their e-mail. The only time PerfectMail might have an issue is with a questionable e-mail from new senders. This takes the risk out of antispam filtering. Most spam filters work like this: receive e-mail, queue, filter, deliver or send a non-delivery reply. The problem with this model is that mail is delayed and senders/recipients may never realize that wanted messages were blocked. PerfectMail works in real-time meaning that it filters messages as they are received - without queuing. This means that PerfectMail tells the sender if their message is being blocked. - PerfectMail's antispam engine is programmed C - the fastest programming language in the world.
    Starting Price: $499 one-time payment
  • 18
    Themis

    Themis

    Cossack Labs

    Secure Cell is a multi-mode cryptographic container suitable for storing anything from encrypted files to database records. Use Secure Cell to encrypt data at rest. Secure Cell is built around AES-256-GCM, AES-256-CTR. Secure Message is a simple encrypted messaging solution for the widest scope of applications. Use Secure Message to send encrypted and signed data from one user to another, from client to server, to prevent MITM attacks and avoid single secret leakage. Based on ECC + ECDSA / RSA + PSS + PKCS#7. Zero-knowledge proof-based protocol to compare secrets over non-trusted channels without risking leaks or reuse attacks. Use Secure Comparator for authenticating the users in a way that no password (or password hash) is sent over the network. Secure Session is a session-oriented encrypted data exchange with forward secrecy for better security guarantees and more demanding infrastructures.
    Starting Price: $0.01
  • 19
    Effivity

    Effivity

    Effivity Technologies

    Effivity is a cloud-based / on-premise QHSE/FSMS/ISMS software to implement a robust Quality - Occupational Health & Safety - Environment Management System & offers 100% conformity to ISO 9001, ISO 14001, ISO 45001, ISO 22000, HACCP standards. Effivity makes ISO compliance simple, easy, quick, value adding, cost-effective, collaborative and time-saving which results in enabling an organization to enhance efficiency and augment productivity as validated by users in more than 120 countries. Effivity offers a unique approach to optimize your management system with world-renowned QMS software, HSE software & FSMS-HACCP software. Simplicity, standardization and customer satisfaction delivered with no-code quality management system software, safe workplace enabled with 100% customizable occupational health & safety management system, sustainable environment possible with a user-friendly environment management system and safe food delivered with HACCP software that is ready to use.
    Starting Price: $30 per month
  • 20
    Syteca

    Syteca

    Syteca

    Syteca — control privileged access and detect identity threats in one place. Syteca is a PAM platform built from the ground up with identity threat detection and response (ITDR) capabilities. Instead of bolting on monitoring after the fact, Syteca was designed monitoring-first: every privileged session is visible, recorded, and auditable from the start. The platform covers the full privileged access lifecycle — account discovery, credential vaulting, just-in-time access provisioning, MFA, and manual approval workflows. What sets it apart is what happens after access is granted: continuous session monitoring, risk detection during active sessions, and automated response actions (block the user, terminate the session, kill the process). Syteca works across Windows, macOS, and Linux, and supports on-premises, cloud, and hybrid deployments. Trusted by 1,500+ organizations in 70+ countries. Recognized by Gartner and KuppingerCole.
  • 21
    Cofense PhishMe
    Your employees need to be conditioned to spot and report phishing emails immediately. With Cofense PhishMe™, simulations are based on the latest threats known to bypass SEGs, empowering your users to become human threat detectors. With resilient users attuned to the latest phishing threats, you have the best organizational defense. Cofense PhishMe Playbooks let you configure a full 12-month program, complete with phishing simulation scenarios, landing pages, attachments, and educational content, in just a few clicks. Our Smart Suggest capability uses advanced algorithms and embedded best practices to recommend scenarios based on current active threats, industry relevance, and your program’s history. The most important part of your phishing defense is reporting and resiliency rates. Boost reporting and help users become active defenders with Cofense Reporter™, our one-click reporting button.
  • 22
    VIPole

    VIPole

    VIPole

    Message editing and deleting, auto-delete messages, chat window clearing and complete history wiping. Disconnecting devices remotely, fake secret phrase, auto lock and auto logout on inactivity. Hidden and blacklist contacts, individual visibility settings for contacts, configurable contact authorization. Assign tasks to yourself and colleagues, track the progress. Store and organize passwords, securely share them with contacts. Foster collaboration by setting goals for the team and monitoring the solved issues.
    Starting Price: $5.99 per month
  • 23
    NopSec

    NopSec

    NopSec

    We help cyber defenders get a handle on the fragmented processes that make cyber exposure unmanageable. NopSec's end-to-end platform brings these processes together and provides cyber defenders with a means to then discover, prioritize, remediate, simulate, and report on cyber exposures. If you don’t know what's in your environment you can’t protect it. With today's global scale of digital business transformation, complete visiblity of your IT assets is essential to adaptive cyber risk management. Nopsec shows you the business impact of your IT assets on a continuous basis helping you prevent any potential blind spots of unmanaged risk and cyber exposures.
  • 24
    NGINX
    NGINX Open Source: The open source web server that powers more than 400 million websites. NGINX Plus is a software load balancer, web server, and content cache built on top of open source NGINX. Use NGINX Plus instead of your hardware load balancer and get the freedom to innovate without being constrained by infrastructure. Save more than 80% compared to hardware ADCs, without sacrificing performance or functionality. Deploy anywhere: public cloud, private cloud, bare metal, virtual machines, and containers. Save time by performing common tasks through the built‑in NGINX Plus API. From NetOps to DevOps, modern app teams need a self‑service, API‑driven platform that integrates easily into CI/CD workflows to accelerate app deployment – whether your app has a hybrid or microservices architecture – and makes app lifecycle management easier.
  • 25
    OpenAthens

    OpenAthens

    Eduserv

    Use our customizable reporting tool to make data-driven decisions about where to spend your library budget and how to improve student retention, all included with your OpenAthens subscription. Add on our reporting API to seamlessly integrate your library usage data into existing data visualization software, such as Tableau or Power BI for even more powerful insights into user behavior. For over 25 years we’ve supported publishers and other providers with single sign-on set-up and system migrations. When it comes to technical integrations, we do the heavy lifting so you don’t have to. Our reports area provides insight into provider usage, number of authentications, active accounts, location of successful session logins and much more! Create, edit and activate accounts. Assign users to permission sets. Intergrate with your organization's active directory.
  • 26
    Password Reset PRO
    Self service password reset software (SSPR) and identity management for Active Directory 2012, 2016, 2019 domain users. Secure for password self service outside of the domain by remote users. Easy to install. Perfect for Office 365, OWA, VPN, Azure, Mobile, BYOD users. Rapid deploy – No Databases – Use it free for a month! Server 2003 through 2019 supported. Password Reset PRO is the only enterprise-class web based self service software designed specifically for secure external (public) access by end users, allowing them to quickly change or reset their domain password and unlock their account without IT intervention. It is very easy to install, test and deploy, no databases required or changes to the domain, no disturbing users.
    Starting Price: $598.00/one-time/user
  • 27
    Monyog

    Monyog

    Webyog

    Agentless MySQL performance monitoring that's fully customizable and allows you to optimize query performance in real-time. Trace all changes done to the MySQL Global variables using the configuration management. You can track and compare changes to the configuration file and identify the reason for performance issues. Monitor locked and long running queries in real-time. Get notifications on mail or SNMP traps, Syslog, Slack and Pagerduty for queries that take more than a specified amount of time to execute. You also have the option to configure Monyog to kill, notify or notify & kill such queries. Avoid learning new tools by using the same performance monitoring tool for MySQL on-premise on physical and virtual machines, in the private, public, and government cloud on virtual machines, and in the public and government cloud as managed databases.
    Starting Price: $199 one-time payment
  • 28
    Axcient x360Cloud
    Protect Everything with Axcient x360. For too long MSPs have had to use multiple vendors for business availability. Now Axcient x360 provides the only unified platform and experience for MSPs to protect client data. The Axcient x360 portal is a single pane of glass for MSPs to manage BCDR, Cloud to Cloud Backup, and Secure Sync & Share. Axcient x360 supports SSO, MFA, and multi-tenant management to increase MSP productivity and reduce total cost of managed services (TCOMS). Axcient x360 gives MSPs one platform to Protect Everything – business continuity, cloud to cloud backup, and secure sync and share. Through a single pane of glass, MSPs can protect themselves and their customers with single sign-on (SSO), multi-factor authentication (MFA), and multi-tenant management to increase MSP productivity and reduce total cost of managed services (TCOMS).Axcient offers MSPs the most secure backup and disaster recovery technology stack with a proven business availability suite.
  • 29
    AwareABIS
    Aware provides software and solutions for government-sponsored, biometrics-enabled citizen identification and credentialing systems. Aware’s innovative biometric solutions provide critical support to help ensure national security and protect citizen freedoms and liberties. A decades long commitment to R+D has earned us work with more than 80 government agencies. We know biometrics, security and compliance. At the heart of what we do for citizen ID is AwareABIS™, an Automated Biometric Identification System (ABIS) used for large-scale biometric identification and deduplication, with support for fingerprint, face, and iris modalities. Its highly modular architecture allows it to be configured and optimized for either civil or criminal applications. A fully featured biometric search platform, AwareABIS is differentiated by its open architecture and configurability.
    Starting Price: $2495.00/one-time/user
  • 30
    Array APV Series

    Array APV Series

    Array Networks

    Array APV Series application delivery controllers provide the availability, scalability, performance, security and control essential to keeping applications and servers running in their power band. Integrated local and global server load balancing, as well as link load balancing, ensure the highest levels of resiliency for your applications, while connection multiplexing, SSL offload, caching and compression work together to deliver the fastest end-user experience possible. What’s more, by terminating connections on APV Series ADCs, applications are protected behind Array’s WebWall® application security suite. Available as physical or virtual appliances, or on popular public clouds, Array ADCs are designed to meet technical requirements while remaining simple enough for any size IT team and affordable enough for any size business.
MongoDB Logo MongoDB