Best IT Security Software - Page 57

Compare the Top IT Security Software as of May 2026 - Page 57

  • 1
    Netwrix Directory Manager
    Netwrix Directory Manager is a directory management solution designed to automate user and group management across enterprise environments. It enables organizations to manage identities across Active Directory, Entra ID, and other connected directories. The platform automates user lifecycle processes such as provisioning, updates, and deprovisioning based on authoritative data sources. It helps maintain accurate group memberships by using dynamic rules and automated updates. Netwrix Directory Manager allows secure delegation so managers can handle user and group changes without direct administrative access. It also includes self-service features that let users reset passwords and manage certain account tasks independently. The solution improves efficiency by reducing manual IT workloads and minimizing support requests. By centralizing and automating directory operations, it helps organizations maintain consistent and secure identity management.
  • 2
    RingStor

    RingStor

    RingStor

    RingStor is an innovative data management company providing digital asset backup, incident management, emergency action and business continuity planning software solutions. Taking its name from the technical architecture involved in data storage, RingStor provides cost-effective, cross-platform, multi-tenant solutions renowned for high performance and reliability. The solutions are rapidly deployable, configurable to fit any infrastructure situation, and easily managed. RingStor has assembled the key components that any business needs to ensure a disaster does not seriously damage your business or even worse put you out of business. RingStor LifeJacket provides a powerful online tool for business to assess risks, log and track incidents, create emergency action plans and business recovery procedures. The SaaS solution enables business to get organized and prepared for a structured business recovery procedure in event of interruption.
  • 3
    Barracuda Spam Firewall
    Spam, malicious email and virus attacks are becoming ever more sophisticated. Your corporate email is a gateway that can allow sensitive information to be destroyed or lost as well as for attacks that can hurt your network performance and employee productivity. The Barracuda Spam Firewall scans email and incoming files using three layers of powerful virus scanning technology. The firewall connects to the Barracuda Security Cloud to for the most up-to-date protection against the latest email-borne threats. Threats do not always come from the outside. The firewall also checks for internally tainted email to prevent the spread of viruses that don’t access the email gateway. Barracuda is the industry leader in spam protection for businesses. The Barracuda Spam Firewall leverages Barracuda Central to identify email from known spammers and determine whether domains embedded within emails lead to known spam or malware sites.
    Starting Price: $699.99/one-time
  • 4
    IDM365

    IDM365

    ITMC Soft

    The scenario in this video represents a problem that plagues many organizations on multiple levels. But it doesn't have to. See how a proper identity and access management solution can help. Effeciency is achieved through a workflow which automatically provides matching account access for the new hire. Our user-centric interface makes it possible for business to control and own the process allowing IT to focus on what they do best. Support for policies such as Segregation of Duties (SoD) protects your business against collusion and fraud. Powerful reporting tools provide instant access to audit trails, turning audits into your chance to shine. An organization or business may have a number of systems in use such as Active Directory, Exchange, Oracle and SharePoint, and they may have hundreds or even thousands of users who need to access them. Managing all of these users’ accounts and the access allowed for each one is generally known as identity and access management, or IAM.
    Starting Price: $5 per user per month
  • 5
    Apache Syncope

    Apache Syncope

    Apache Software Foundation

    Apache Syncope is an Open Source system for managing digital identities in enterprise environments, implemented in Java EE technology and released under Apache 2.0 license. Identity management (or IdM) means managing user data on systems and applications, using the combination of business processes and IT. Computers work with records of data about people. Such records contain technical information needed by the system for which the account is created and managed. Have you ever been hired by a company, entered an organization or just created a new Google account? Companies, organizations and cloud entities work with applications that need your data to function properly, username, password, e-mail, first name, surname, and more. In brief, Identity Management takes care of managing identity data throughout what is called the Identity Lifecycle.
  • 6
    Intelligent Discovery
    Intelligent Discovery helps you manage your AWS security with ease. Our industry-leading AWS vulnerability scanning and remediation tool allows you to quickly identify potential threats—without slowing down your infrastructure. Stay ahead of attackers looking for exploitable weaknesses by proactively identifying, resolving, and mitigating security threats through a user-friendly interface. Automate Security Auditing, Security Log Management, Customize Controls and so much more! Consolidated capacity, cost, and volume tools are in an evolving and scaling environment without impacting production or breaking the bank. As an organization grows, so does the management complexity of compliance. Defined organizational rule sets and customization expedite compliance. Consistent and frequent security logs, inventory, and change log monitoring bring inventory management into a consolidated interface.
    Starting Price: $199 per month
  • 7
    Sysdig Secure
    Cloud, container, and Kubernetes security that closes the loop from source to run. Find and prioritize vulnerabilities; detect and respond to threats and anomalies; and manage configurations, permissions, and compliance. See all activity across clouds, containers, and hosts. Use runtime intelligence to prioritize security alerts and remove guesswork. Shorten time to resolution using guided remediation through a simple pull request at the source. See any activity within any app or service by any user across clouds, containers, and hosts. Reduce vulnerability noise by up to 95% using runtime context with Risk Spotlight. Prioritize fixes that remediate the greatest number of security violations using ToDo. Map misconfigurations and excessive permissions in production to infrastructure as code (IaC) manifest. Save time with a guided remediation workflow that opens a pull request directly at the source.
  • 8
    Sophos UTM
    Sophos UTM drives threat prevention to unmatched levels. The artificial intelligence built into Sophos Sandstorm is a deep learning neural network, an advanced form of machine learning, that detects both known and unknown malware without relying on signatures. Sophos UTM 9.4 is one of the first Sophos products to offer our advanced next-gen cloud sandboxing technology. Sandstorm provides a whole new level of ransomware and targeted attack protection, visibility, and analysis. It can quickly and accurately identify evasive threats before they enter your network. And, it’s tremendous value: it’s enterprise-grade protection without the enterprise-grade price-tag or complexity. Harden your web servers and Microsoft Enterprise Applications against hacking attempts while providing secure access to external users with reverse proxy authentication. Full SMTP and POP message protection from spam, phishing and data loss with our unique all-in-one protection.
  • 9
    A10 Thunder ADC

    A10 Thunder ADC

    A10 Networks

    High-performance advanced load balancing solution that enables your applications to be highly available, accelerated, and secure. Ensure efficient and reliable application delivery across multiple datacenters and cloud. Minimize latency and downtime, and enhance end-user experience. Increase application security with advanced SSL/TLS offload, single sign-on (SSO), DDoS protection and Web Application Firewall (WAF) capabilities. Complete full-proxy Layer 4 load balancer and Layer 7 load balancer with flexible aFleX® scripting and customizable server health checks.
  • 10
    HAProxy Enterprise

    HAProxy Enterprise

    HAProxy Technologies

    HAProxy Enterprise is the industry’s leading software load balancer. It powers modern application delivery at any scale and in any environment, providing the utmost performance, observability and security. Load balance by round robin, least connections, URI, IP address and several hashing methods. Make advanced decisions based on any TCP/IP information or HTTP attribute with full logical operator support. Send requests to specific application clusters based on URL, domain name, file extension, client IP address, health state of backends, number of active connections, SSL client certificate, and more. Extend and customize HAProxy with Lua scripts that have access to the request/response pipeline. Maintain users' sessions based on TCP/IP information or any property of the HTTP request (cookies, headers, URI, and more). The world’s fastest, and most widely used software load balancer.
  • 11
    Varnish

    Varnish

    Varnish Software

    Varnish Software’s powerful caching technology helps the world’s biggest content providers deliver lightning-fast web and streaming experiences for huge audiences, without downtime or loss of performance. Our solution combines open-source flexibility with enterprise robustness to speed up media streaming services, accelerate websites and APIs, and enable global businesses to build custom CDNs, unlocking unbeatable content delivery performance and resilience. Our customers include Hulu, Emirates and Tesla, and our technology is powered by a caching layer that’s trusted by more than 10 million websites worldwide.
  • 12
    Splunk On-Call
    Empower teams by routing alerts to the right people for fast collaboration and issue resolution. Deliver the right alerts to the right people reducing time to acknowledge and resolve incidents. Complete ChatOps experience, integration with the tools you already have, incident timelines and reporting for blameless post-incident reviews. Engage people where they work. Mobile-first experiences leverage machine learning to make on-call accessible wherever you are. Splunk On-Call automates incident management, reducing alert fatigue and increasing uptime. Use Splunk On-Call to streamline your on-call schedules and escalation policies. From rotations to overrides, we automate all the essentials. Our software provides contextual alert information, suggestions driven from machine learning, and empowers collaboration to solve problems with speed and efficiency, all while capturing essential remediation data.
    Starting Price: $27.00/month/user
  • 13
    CodeMeter

    CodeMeter

    Wibu-Systems

    CodeMeter is the award-winning protection, licensing, and security system that gives software publishers and ISVs as well as intelligent device makers a complete arsenal to protect IP and fight cyber-threats while harnessing the power of smart licensing to monetize and grow their business. CodeMeter includes a complete lineup of license containers - hardware-, software-, or cloud-based - to store secret license keys safely, a set of stealthy encryption modules, and a versatile array of backend and frontend tools for license management, augmented by professional services. CodeMeter License Central is the versatile gateway to license creation, delivery, management, and monitoring across the complete license lifecycle. The integral CodeMeter Protection Suite comprises a suite of tools that automatically encrypt the compiled code to protect software from piracy, counterfeiting, reverse engineering, and tampering.
  • 14
    Matrix42 EgoSecure Data Protection
    Everything runs as before, but securely. All-round protection for all your devices, applications and sensitive company data. Your data remains secure. While digital networking and device diversity offer more flexibility, they also increase the risk of malware, data loss, and theft. Traditional firewall and antivirus protection is no longer enough to close security gaps. With just a mouse-click you get a graphically prepared overview of all data flows in the network and automatically trigger appropriate protective measures. Insight Analysis – determines the overall situation of your company network with regard to data security so that you can derive the optimum protective measures. The analysis results are available to you as a clearly structured dashboard. Conclusions about the activities of individual users are not possible. The reports can be generated automatically and sent by e-mail.
  • 15
    Bravura Identity

    Bravura Identity

    Bravura Security

    Bravura Identity is an integrated solution for managing identities, groups and security entitlements across systems and applications. It ensures that users are granted access quickly, that entitlements are appropriate to business need and that access is revoked once no longer needed. Users have too many login IDs. A typical user in a large organization may sign into 10 to 20 internal systems. This complexity creates real business problems. Bravura Identity manages the lifecycles of identities, accounts, groups and entitlements. It includes automation to grant and revoke access, after detecting changes on systems of record. A web portal for access requests, profile updates and certification. Full lifecycle management for groups and roles on target systems. A workflow manager to invite people to approve requests, review access or complete tasks. Policy enforcement related to SoD, RBAC, risk scores, privacy protection and more. Reports, dashboards and analytics.
  • 16
    SparrowIQ

    SparrowIQ

    Solana Networks

    SparrowIQ is a turnkey network traffic monitoring solution developed to help IT organizations to rapidly troubleshoot and diagnose network issues and provide visibility into how applications are performing and thus affecting end user experience. Its award-winning ‘resource efficient’ design combines powerful performance monitoring capability in an easy-to-deploy, intuitive package ensuring minimal administrative load on an already strained IT staff. SparrowIQ was designed for small and medium businesses that have the same need as their larger counterparts for enterprise-class monitoring solutions but have limited technical resources, time and money to invest in traditional systems.
    Starting Price: $19 per month
  • 17
    Simply Sync Password

    Simply Sync Password

    GoodWorks Communications

    Simply Sync Password allows organizations to synchronize their passwords and active directory properties from their local Active Directory site to an external Active Directory sites or other external systems. Simply Sync Password is a great alternative for organizations that do not want the added complexity and cost that comes with establishing a trust relationship between Active Directory sites or deploying an AD FS infrastructure. AD FS is great for large organizations, but in many cases it just doesn’t make sense for small and medium-size organizations. The role of the Password Capture Agent is to intercept password changes as they occur on the domain controllers. Since you don’t know which domain controller a user is going to use to reset their password, the Password Capture Agent must be installed on all domain controllers. The Password Capture Agent does not interfere with the password change process, it simply intercepts the change request as it happens.
    Starting Price: $20 per user per month
  • 18
    SolarWinds Patch Manager
    Patch management software designed for quickly addressing software vulnerabilities. SolarWinds® Patch Manager simplifies many of the steps in the patch management process—from research and scheduling, to deployment and reporting—to help save you time and make it easier to keep your servers and workstations patched and compliant. SolarWinds Patch Manager works with and extends your Microsoft WSUS and SCCM deployments with pretested, prebuilt updates for Microsoft products and third-party applications from a central point of control. SolarWinds Patch Manager makes it easier to manage patches on virtual desktops and servers with the ability to patch offline machines, organize virtual machines into groups, and inventory virtual machines across your enterprise.
    Starting Price: $3495.00/one-time
  • 19
    east-tec InvisibleSecrets
    east-tec InvisibleSecrets is a powerful privacy suite that protects your files using a two-layered approach: military-grade encryption and steganography. While encryption secures your data, steganography goes further by hiding it inside harmless-looking files like images or web pages, so no one even knows it's there. The software also includes a secure password manager, an application locker to restrict access to programs, and a file shredder to permanently erase sensitive data. For easy and safe sharing, you can create self-decrypting packages that only require a password to open, even if the recipient doesn’t have the software. Additional tools like a virtual keyboard help defend against keyloggers, making InvisibleSecrets a well-rounded solution for protecting your digital life.
    Starting Price: $29.95 one-time payment
  • 20
    Aobo Internet Filter for Mac
    Aobo Filter for Mac OS X Professional is a piece of Internet Filtering Software for Mac OS X users. It effectively blocks porn websites, games and inappropriate applications on Mac. Aobo Filter for Mac is designed with the feature of logging website visiting as well, which helps you retrieve and identify visited websites from any web browsers. Computer becomes an indispensable facility in many offices and organizations. However, many employees are unable to use it appropriately, they are watching inappropriate videos, shopping on the internet, playing computer games, which give rise to the low working efficiency. Therefore, blocking unsuitable websites and applications is really important.
    Starting Price: $29.99 per month
  • 21
    LevelBlue USM Anywhere
    Elevate your security with LevelBlue USM Anywhere, an advanced open XDR platform designed to scale with your evolving IT landscape and growing business needs. Combining sophisticated analytics, robust security orchestration, and automation, USM Anywhere offers built-in threat intelligence for quicker and more precise threat detection, as well as streamlined response coordination. Its flexibility is unmatched, with extensive integrations—referred to as BlueApps—that enhance its detection and orchestration across hundreds of third-party security and productivity tools. These integrations also enable you to trigger automated and orchestrated responses effortlessly. Begin your 14-day free trial now and discover how our platform simplifies cybersecurity.
  • 22
    WSO2 Identity Server
    WSO2 Identity Server is API-driven, is based on open standards with the deployment options of on-premise, cloud or hybrid. It supports complex IAM requirements given its high extensibility. WSO2 Identity Server helps you do single sign-on and identity federation backed by strong and adaptive authentication, securely expose APIs, and manage identities by connecting to heterogeneous user stores. Leverage the power of open-source IAM in your enterprise to innovate fast and build secure Customer IAM (CIAM) solutions to provide an experience your users will love
  • 23
    Avatier Identity Anywhere
    Introducing Identity Anywhere, the world’s first Identity Management solution based on Docker containers making it the most portable, scalable and secure solution on the market. Docker container technology allows Identity Anywhere to run anywhere: on any cloud, on premise or a private cloud instance hosted by Avatier. Avatier Identity Management products brings separately administered back office applications and assets together to manage them as one system. Now armed with a unified digital dashboard, C-level executives deliver measurable business growth and increased profits. Eliminate the #1 Help Desk request with military grade self-service password reset. Reduce Costs. Only pay for the cloud app licenses you need. Maximize company utilization with a phenomenal shopping cart experience. Avoid fines, lawsuits, negative publicity, and even jail time due to non-compliance.
    Starting Price: $5.00/one-time/user
  • 24
    AlterWind Log Analyzer
    With the help of the AlterWind Log Analyzer Professional, you can generate new unique web stats reports for website search engine optimization (SEO), website promotion, and pay-per-click programs. You can save hundreds of hours and thousands of dollars and get more website traffic. The promotion and development of your website will be several times more effective. Never before did website traffic statistics software yield such opportunities for increasing website traffic and improving its quality. AlterWind Log Analyzer's database contains more than 430 search engines and more than 120 catalogs from 120 countries. You will gather stats about hits from a search engine of any country where your business is applicable and where your potential clients can be found. If such a search engine does not exist yet in our database, we will certainly add it.
    Starting Price: $86 one-time payment
  • 25
    Deep Log Analyzer

    Deep Log Analyzer

    Deep Software

    Advanced and affordable web analytics solution for small and medium size websites. Analyze web site visitors’ behavior and get the complete website usage statistics in several easy steps! With Deep Log Analyzer website statistics and web analytics software you’ll know exactly where your visitors come from and how they move through your website. This software will help you to attract more visitors, optimize your website and convert more visitors to satisfied customers. Analyze logs from Microsoft IIS, Apache or Nginx web server from any hosting provider and get web analytics reports. Run it on your Windows computer or server. View reports on Top web pages, Referral websites, Search engines & phrases, bots/spiders, browsers and OS's, server errors and more with Deep Log Analyzer. Export to HTML or Excel. Deep Log Analyzer is a highly configurable web analytics software. Create your own custom reports or tailor any of the 50+ included reports using SQL language.
    Starting Price: $299.95 one-time payment
  • 26
    Praetorian Chariot
    Chariot is the first all-in-one offensive security platform that comprehensively catalogs Internet-facing assets, contextualizes their value, identifies and validates real compromise paths, tests your detection response program, and generates policy-as-code rules to prevent future exposures from occurring. As a concierge managed service, we operate as an extension of your team to reduce the burden of day-to-day blocking and tackling. Dedicated offensive security experts are assigned to your account to assist you through the full attack lifecycle. We remove the noise by verifying the accuracy and importance of every risk before ever submitting a ticket to your team. Part of our core value is only signaling when it matters and guaranteeing zero false positives. Gain the upper-hand over attackers by partnering Praetorian. We put you back on the offensive by combining security expertise with technology automation to continuously focus and improve your defensive.
  • 27
    Core Access Insight
    Core Access Insight offers a continuous, comprehensive view and analysis of the relationship between identities, access rights, policies, and resources that occur across your entire environment. Our easy-to-use, easy-to-understand solution applies analytics to the big identity and access data in your organization, empowering you to identify identity-related access risks, and drive provisioning and governance controls to manage that risk within your business. With Access Insight, your governance system does more than just manage access. It provides access intelligence to analyze the identity and access data in your organization, using advanced analytics tools. This enables you to perform data mining, statistical analysis, and data visualization—drawing on specific governance policies, rules, and risk indicators to provide intelligence and valuable information for administrators, analysts, compliance officers, and incident responders.
  • 28
    RMail

    RMail

    RPost

    RMail® is the e-security platform by RPost®, a global leader since 2000. RMail specializes in elegantly easy to use email encryption for privacy and compliance, e-signatures, legal e-delivery proof, secure file sharing, email impostor protection, document rights management, and AI-infused services to prevent data leaks and human e-security errors. RMail’s transmission e-security services are most often used by businesspeople or business systems that send important, sensitive, or consumer-regulated information. These RMail services are generally applied to those messages where the sender needs functionality beyond standard email in terms of (a) easier to use and more automated email encryption for privacy compliance, (b) returning a verifiable proof record of who said what to whom by email, (c) assurance and peace of mind related to delivery and open status of important and time-deadline email, (d) need a timestamped proof of content delivered, (f) need to share large files securely.
    Starting Price: $7/month/user
  • 29
    AnVir Task Manager Pro
    Windows task manager processes, windows xp slow startup, windows startup programs, Vista tweaks. Control everything running on the computer, remove Trojans, speed up computer. AnVir Task Manager Pro provides convenience by offering all of its features in a single interface. It saves money because users won't have to buy multiple packages to perform a family of related tasks. Terminate processes that can not be terminated via Windows Task Manager. Temperature of CPU, video card, external USB HDD. Download and upload speed, amount of transferred data for network connections. Find locked files and DLL. Log of processes start and stop. Graph of processor, memory and disk activity for each process. Threads, handles, performance counters. Startup manager: manage all programs running on startup including services, Internet Explorer toolbars, Scheduler tasks.
    Starting Price: $49.95 one-time payment
  • 30
    Activu

    Activu

    Activu

    Activu makes any information visible, collaborative, and proactive for people tasked with monitoring critical operations and incidents. Our customers automatically see, share, and respond to events in real-time, with context, to improve incident response, decision-making, and management. Activu software, systems, and services benefit the daily lives of billions of people around the world. Founded in 1983 as the first U.S.-based company to develop video wall technology, more than 1,000 control rooms and command centers depend on Activu. The most Intuitive, Flexible, Feature rich wall control on the market. Organize information easily based on specific user needs. Easily create Layouts and Templates based on user needs. Organize, place and even move information across multiple video walls. Organize information assets in easily accessible, searchable Spaces. Support for virtually any information source type.
MongoDB Logo MongoDB