Best IT Security Software - Page 58

Compare the Top IT Security Software as of May 2026 - Page 58

  • 1
    AnVir Task Manager Pro
    Windows task manager processes, windows xp slow startup, windows startup programs, Vista tweaks. Control everything running on the computer, remove Trojans, speed up computer. AnVir Task Manager Pro provides convenience by offering all of its features in a single interface. It saves money because users won't have to buy multiple packages to perform a family of related tasks. Terminate processes that can not be terminated via Windows Task Manager. Temperature of CPU, video card, external USB HDD. Download and upload speed, amount of transferred data for network connections. Find locked files and DLL. Log of processes start and stop. Graph of processor, memory and disk activity for each process. Threads, handles, performance counters. Startup manager: manage all programs running on startup including services, Internet Explorer toolbars, Scheduler tasks.
    Starting Price: $49.95 one-time payment
  • 2
    Activu

    Activu

    Activu

    Activu makes any information visible, collaborative, and proactive for people tasked with monitoring critical operations and incidents. Our customers automatically see, share, and respond to events in real-time, with context, to improve incident response, decision-making, and management. Activu software, systems, and services benefit the daily lives of billions of people around the world. Founded in 1983 as the first U.S.-based company to develop video wall technology, more than 1,000 control rooms and command centers depend on Activu. The most Intuitive, Flexible, Feature rich wall control on the market. Organize information easily based on specific user needs. Easily create Layouts and Templates based on user needs. Organize, place and even move information across multiple video walls. Organize information assets in easily accessible, searchable Spaces. Support for virtually any information source type.
  • 3
    Plurilock DEFEND

    Plurilock DEFEND

    Plurilock Security

    Plurilock DEFEND provides true real-time authentication for the duration of an active computing sessions using behavioral biometrics and the computing devices your employees already use. DEFEND relies on a lightweight endpoint agent and proprietary machine learning techniques to confirm or reject user's identity with very high accuracy based on their console input stream, without authentication steps that are evident to the user. By integrating with SIEM/SOAR, DEFEND can be used to triage and respond to SOC alerts with high-confidence identity threat intelligence. By integrating with login and application workflows, DEFEND provides just-in-time biometric identity behind the scenes, enabling login workflows to be skipped when biometric identity is already in a confirmed state. DEFEND supports Windows endpoints, Mac OS endpoints, and IGEL and Amazon Workspaces thin and VDI clients.
    Starting Price: $9 per user per month
  • 4
    INETCO Insight

    INETCO Insight

    INETCO Systems Ltd.

    INETCO Insight is more than a transaction monitoring tool; it is a critical software platform for financial institutions and payment service providers focused on ensuring operational excellence, enhancing customer experience and mitigating risk in real-time. With a 360-degree view of the customer journey, you can manage the end-to-end experience, optimize decision-making and detect potential issues before they impact customers. By investing in this advanced real-time transaction monitoring platform, you are not only protecting your operations today but also positioning your organization for continued success in an increasingly fast-paced and demanding financial landscape.
  • 5
    OpenText Recover
    OpenText Recover is a cloud-based disaster recovery solution that continuously replicates critical systems and data to ensure immediate failover when disaster strikes. By securely replicating data in real-time with AES encryption, it minimizes downtime to just minutes and reduces potential business impact. The platform supports failover and failback processes that are quick and easy to manage, helping businesses maintain productivity. Organizations benefit from self-service testing and failover reports to validate their disaster recovery readiness without disrupting operations. OpenText Recover eliminates the need for costly secondary data centers by managing all infrastructure in the cloud. Flexible deployment options include self-service and managed disaster recovery services to meet varied business needs.
  • 6
    Amtel MDM Solution
    SaaS platform that’s easy to implement and roll out to end-users. Nothing is easier than getting started with Amtel. A few clicks and you are on your way. You could be missing our on huge savings if you’re not managing expenses! Completely integrated, increase your savings today! Amtel’s solution includes an integrated mobile and telecom asset management module that enables IT, administrators, to create and maintain a dynamic inventory in a centralized location across the enterprise. It is updated automatically with changes made via our eProcurement portal to keep it current and accurate. An accurate inventory compiled by a mobile asset management solution is essential for billing management, monitoring contract expirations, and elimination of unused telecom connections.
  • 7
    SoftActivity Monitor

    SoftActivity Monitor

    Deep Software Inc.

    User monitoring software that helps protect organizations from insider threat. This employee monitoring software lets you view your users' web browsing history, applications usage log, screen, accessed files, email and more. View remote screens in real time and get historical logs and reports.
    Starting Price: $189.95/one-time
  • 8
    Protegrity

    Protegrity

    Protegrity

    Our platform allows businesses to use data—including its application in advanced analytics, machine learning, and AI—to do great things without worrying about putting customers, employees, or intellectual property at risk. The Protegrity Data Protection Platform doesn't just secure data—it simultaneously classifies and discovers data while protecting it. You can't protect what you don't know you have. Our platform first classifies data, allowing users to categorize the type of data that can mostly be in the public domain. With those classifications established, the platform then leverages machine learning algorithms to discover that type of data. Classification and discovery finds the data that needs to be protected. Whether encrypting, tokenizing, or applying privacy methods, the platform secures the data behind the many operational systems that drive the day-to-day functions of business, as well as the analytical systems behind decision-making.
  • 9
    Activate

    Activate

    Activate

    Activate is an enterprise management and automation solution that manages a user's Identity, Access and Digital Workspace. It's fully integrated with Microsoft Suite offerings such as Active Directory, Office 365 and Azure AD. Activate enables users to request, approve and manage common IT systems like Active Directory, Exchange, Office 365 and Azure for themselves and other users in the organization. Activate's integration of Identity Management and Service Management into a single product enables stream-lined management of a User's Lifecycle from On-boarding to Off-boarding. Activate's virtual LDAP technology allows Azure AD to be managed in the same way as Active Directory. This means that services can be transitioned from on-premise to the cloud in a seamless manner without user service interruptions.
    Starting Price: $5.00/one-time/user
  • 10
    TraceCSO

    TraceCSO

    TraceSecurity

    Our TraceCSO software is the GRC platform for compliance and cybersecurity solutions. While our services are the perfect way to ensure cybersecurity and compliance via 3rd party review on a yearly bases, they are also the perfect launching point to begin using TraceCSO software. With a series of modules that work together to ensure you have a full picture of your cybersecurity environment, TraceCSO can take care of Risk Management, Vulnerability Management, Training Management and more!
  • 11
    ActiveData

    ActiveData

    Information Active

    ActiveData For Excel® adds advanced data analytics capabilities and time saving workbook and worksheet management features to Microsoft Excel®. With ActiveData for Excel you can join, merge, match, query, summarize, categorize, locate duplicate and missing items, combine, split, splice, slice and dice your data. Over 100 features, many designed to increase your overall productivity with Excel are included in this easy-to-use package. ActiveData for Excel offers a feature-rich product at a fraction of the price of competitive database-driven data analytics and computer assisted audit tools (CAATS). Skills acquired using ActiveData are directly transferrable to other data analysis software packages and computer-assisted audit tools (CAATs) like ACL and IDEA. Our software works well side by side with these packages and is ideal for less technical users. ActiveData for Excel is available in a Business and Professional edition and works with Microsoft Excel 2007 to 2019.
    Starting Price: $129 one-time payment
  • 12
    Active Wall

    Active Wall

    Active Network CO

    Active Wall uses the middle layer drivers developed independently as the filter engines, which are more low-leveled than other software which uses WinPCap. Because WinPCap is a protocol-type driver, it can only monitor but not block. The other software which uses WinPCap can only block TCP communications, but cannot block UDP, ICMP, IGMP data packets. It has been proved that Active Wall is more stable, correct and effective after working online for a long time. Most similar software support the only one mode- Passby monitoring mode. Besides the Passby mode, Active Wall supports more modes including Gateway mode, Bridge mode and Single mode. It is recommended that the users should use the Gateway mode or the Bridge mode. When using the Passby mode, Active Wall can only block TCP data packets for the limit of the network topology. However, the Gateway mode or the Bridge mode enables the Active Wall to block all kinds of data packets.
    Starting Price: $10 per user
  • 13
    STOPzilla AntiVirus
    Active scanning quickly removes malware and prevents new infections in real-time. Hourly virus definition updates make sure the very latest infections are targeted. Improved smart web filter blocks malicious web sites from stealing your information. Works silently in the background. Will not impact computer performance. STOPzilla AntiVirus 8.0 detects viruses and malware in real-time before it is even saved to the hard drive. Preventative, faster detection than previous versions gives you the best antivirus protection possible. Many viruses and malware threats are designed to interfere with the operation of AntiVirus/AntiMalware products. STOPzilla AntiVirus 8.0 is designed to thwart this type of interference allowing the product to provide uninterrupted protection. Our smart Web Filter is a cloud based URL scanning utility that is updated with newly discovered threats every 5 seconds, protecting you from malicious websites that steal end-user information.
    Starting Price: $39.95 per year
  • 14
    Polar Crypto Component
    Polar Crypto Component gives your Windows applications the functionality of unbreakable encryption. It enables you to build your own security systems instantly, or to easily integrate it into your existing systems, enhancing their security and performance. Polar Crypto features the latest encryption technology and includes full source code written in MS Visual C++ included. Polar Crypto is an ActiveX and DLL component which can be implemented whenever secure information, authenticity and data integrity are needed. In all applications developed for conducting business transactions, where absolute confidentiality is needed. For digital signature creation and validation. In e-commerce web site applications that store sensitive information such as clients’ credit card details. In desktop applications that encrypt confidential files on your computer or computer network.
    Starting Price: $239.00/one-time/user
  • 15
    Net Monitor for Employees
    Employee monitoring software has become an essential tool for tracking your employee activity to increase productivity in offices. It happens many times that many team members spare their time in watching unnecessary content on the Internet or using your resources for their personal use or just spending time in web browsing. Employee monitoring is an established method used by many companies to help prevent and detect data breaches that can cost their business a fortune. It is an effective way to boost workers' engagement and optimize working processes. Computer monitoring gives companies an overall picture of how work is done in and out of the office. By using computer surveillance software an organization can lower risk and become more profitable. Gathered data can be used for analyzing bottlenecks, unusual patterns, and other potential issues.
    Starting Price: $99.95 one-time payment
  • 16
    AgenaRisk
    AGENARISK uses the latest developments from the field of Bayesian artificial intelligence and probabilistic reasoning to model complex, risky problems and improve how decisions are made. You can use AgenaRisk models to make predictions, perform diagnostics and make decisions by combining data and knowledge about complex causal and other dependencies in the real world. Our clients use AgenaRisk to model a variety of problems involving risk and uncertainty including operational risk, actuarial analysis, intelligence analysis risk, systems safety and reliability, health risk, cyber-security risk and strategic financial planning. AgenaRisk designs and markets groundbreaking products using Bayesian Network technology. Our technology and accompanying methodology has been published in top academic AI, machine learning, actuarial, decision science and cognitive science journals.
  • 17
    602LAN SUITE

    602LAN SUITE

    Software602

    We digitize with the Sofa application. Electronic signatures with approval workflow and document vault. In the company at the office or at the home office. Simply. Digitally. Online application for fast digitization of companies and offices. Management of documents, data messages and processes with electronic signatures, intuitive workflow and archive. You can have it in the cloud in the office and at the home office. Up-to-date information on topics such as circulation, approval, document management using DMS systems, trusted digital archiving, qualified services, eIDAS regulations, electronic signatures and seals, timestamps, business processes and workflows. How to get rid of unnecessary paperwork and use time efficiently. There is an eBook Paperless office on this topic. Here you will find answers not only to how to cleverly digitize the office, but much more. Just one click and you have everything with you. Simply and digitally.
    Starting Price: $299.95/one-time/user
  • 18
    Max Secure Spyware Detector

    Max Secure Spyware Detector

    Max Secure Software

    Most enhanced multi-layer protection combines multiple engines – white list, black list, anti-virus, anti-adware, patterns, gibberish identification, heuristic detection along with artificial intelligence and dynamic emulation and debugger – to identify advanced malware. Threat community applies behavioral analytics to find most recent, most active malware on user's PCs. Block bad websites by categories, configure them as you like. Run this tool and block any ransomware from encrypting data. Multi-threaded Scan engine with enhanced detection. Advance Active Monitor to protect against all types of Malware. Anti-Phishing to protect against all online threats. Application white listing ensures only known applications execute. Advance USB manager. Ransomware protection. Artificial intelligence with machine learning for Zero Day Malware detection. Anti-Theft: Lost laptop tracker.
    Starting Price: $31.83 per user per year
  • 19
    BlueTie

    BlueTie

    BlueTie

    BlueTie is your all-in-one resource for reliable cloud-based software and services. Keep your business up and running, from anywhere. Select from an array of affordable options that can grow with you—all backed by an experienced industry leader. Since 1999, BlueTie has provided companies worldwide with virtual IT services focused on communication and security. BlueTie revolutionized the Software as a Service industry by introducing the first hosted suite of business email and collaboration applications. Founded in 1999 by serial entrepreneur David Koretz and Paychex founder and Chairman Tom Golisano, BlueTie grew to become a leading provider of fast, reliable technology services for businesses. Today, BlueTie continues to deliver scalable email and calendar solutions for Internet Service Providers and businesses of all sizes, supporting millions of users worldwide.
    Starting Price: $19.99 per month
  • 20
    FastStats Log Analyzer

    FastStats Log Analyzer

    Mach5 Development

    Your log files are a gold mine of information about not only your web site, but your business. Understanding your web site traffic patterns -- seeing your web site through your potential customer's eyes -- is key to improving your business. Web server log files give you a view into your customer's activity and can help you tune your web site to acquire new customers. FastStats Log Analyzer is a powerful, quick, and inexpensive way to sift through gigabytes of logs and produce easy-to-understand summaries of your web site traffic. Are you spending $0.75 per click on your Google advertising, but only receiving $0.56 per click in revenue? FastStats is designed to help you determine your revenue per click, which you can use to price your Google advertisements. Use FastStats' Hyperlink Tree View to graphically see how customers move through your web site. FastStats is aptly named, and can process logs 40x faster than WebTrends, the industry leader.
    Starting Price: $99.95 one-time payment
  • 21
    Log2Stats

    Log2Stats

    BitStrike Software

    Log-to-Stats is a modern solution to get your website stats from web server log files. The software manages all your web log files and converts them into a statistics database. Then you can either look at your website stats using interactive and detailed reports or save them to html or other format. Log-to-Stats makes it easy to view how the stats changes over time and compare web traffic reports for different date ranges or special conditions.
    Starting Price: $299.95 one-time payment
  • 22
    Mvine

    Mvine

    Mvine

    Providing your client with a highly personalized and secure mobile app requires integration with on premise and in-cloud systems. To be successful you must overcome the challenges of single-sign on, federated user profile management, automated context provisioning and Seamless multiple API integration - all happening in near-real time. Mvine has both the technology and expertise to build mobile applications that integrate with a range of directory services, location services and systems of record to create highly personalized customer experiences. The highly sophisticated context provisioning engine operates in near-real time, allowing for experiences based on where customers are, what is known about them and what they are doing.
  • 23
    IAM Cloud

    IAM Cloud

    IAM Cloud

    IAM Cloud’s world-leading drive management tool for cloud storage. It provides secure direct access (no sync) to OneDrive for Business, MS Teams and SharePoint Online. Great for desktop and VDI environments alike. Our simple & secure sign-on platform. Provides single sign-on (SSO), multi-factor authentication (MFA), Surp4ss! password management, and basic identity sync & provisioning from Active Directory. Everything you need from an SSO solution without the premium price. IAM Cloud is an identity company at heart. With IDx you can connect & sync identities across all kinds of systems, allowing the full automation of the Joiner, Mover and Leaver process. IDx integrates with on-prem, cloud and custom-built HR, ERP, CRM, MIS & Directory systems. Cloud-based data migrator. Supports to-the-cloud and from-cloud-to-cloud migrations for Office 365. Merge multiple Office 365 tenancies into one tenant. Split tenancies.
    Starting Price: $2.40 per month
  • 24
    Black Duck

    Black Duck

    Black Duck

    Black Duck, part of the Synopsys Software Integrity Group, is a leading provider of application security testing (AST) solutions. Their comprehensive portfolio includes tools for static analysis, software composition analysis (SCA), dynamic analysis, and interactive analysis, enabling organizations to identify and mitigate security vulnerabilities throughout the software development life cycle. By automating the discovery and management of open-source software, Black Duck ensures compliance with security and licensing standards. Their solutions are designed to help organizations build trust in their software by managing application security, quality, and compliance risks at the speed their business demands. Black Duck empowers businesses to innovate securely and deliver software with confidence.
  • 25
    DBHawk

    DBHawk

    Datasparc

    Using DBHawk, our customers were able to comply with GDPR, HIPAA, SOX, GLBA, and other regulations and were able to implement SOD. Self-Service BI & Ad-Hoc Reporting Tool with feature to define Data Access Policy, Connect to multiple Data sources, Build Powerful SQL Charts and data Dashboards. DBHawk SQL editor is an advanced editor that allows users to build, edit, and run database queries with a web-based interface. DBHawk Query Builder is supported with all major databases such as Oracle, Microsoft SQL Server, PostgreSQL, Greenplum, MySQL, DB2, Amazon Redshift, Hive, Amazon Athena. Database SQL tasks and batch job automation with a web-based centralized tool. Secure access to SQL, NoSQL and Cloud databases with our all-in-one data platform. Trusted by our customers to protect and access their data. Centralized Security, Auditing and insights about your user’s activities.
    Starting Price: $99.00/month/user
  • 26
    Centraleyezer
    Integrates and correlates vulnerability scanners data and multiple exploit feeds combined with business and IT factors and to prioritize cyber security risks. Helps CISO, Red Teams and Vulnerability Assessment Teams reduce time-to-fix, prioritize and report risks. Used by Governments, Military, Banking, Finance, and E-Commerce companies
    Starting Price: $599 per month
  • 27
    Uptycs

    Uptycs

    Uptycs

    Uptycs is the first unified CNAPP and XDR platform. Reduce risk by prioritizing responses to threats, vulnerabilities, misconfigurations, sensitive data exposure, and compliance mandates. With Uptycs, you can protect your entire enterprise, from laptops and servers to public and private cloud infrastructure. The platform streamlines your response to threats and offers a single UI and data model for easy management. Uptycs ties together threat activity as it traverses on-prem and cloud boundaries, delivering a more cohesive security posture. If you're looking for a powerful security solution that eliminates silos and tool sprawl, Uptycs is the answer. Looking for acronym coverage? We have you covered, including CNAPP, CWPP, CSPM, KSPM, CIEM, CDR, and XDR. Start with your Detection Cloud, Google-like search, and the attack surface coverage you need today. Be ready for what’s next. Shift up with Uptycs.
  • 28
    SolarWinds Network Configuration Manager
    Automate network configuration management and compliance, which can help save time and optimize IT resources. Reduce cost, save work hours, and remain compliant with automated network configuration management and backup. Stop worrying whether inventory spreadsheets and lists are accurate, up-to-date, and reliable. With SolarWinds® Network Configuration Manager (NCM), you can quickly build an accurate inventory of your network devices by using network scanning and discovery to obtain up-to-date information on all network devices. When it comes to network configuration management, it’s critical to quickly and precisely compare configurations for a number of reasons. Some examples could be to check against security policies, to ensure there are no discrepancies between running and saved configs, and to quickly identify and fix unauthorized or failed changes. Automation of network configuration management simplifies processes like scheduling regular backups.
    Starting Price: $2,995 one-time fee
  • 29
    Avanan

    Avanan

    Check Point

    Enterprise AI cloud security: prevent phishing, malware, data leakage, account takeover, & shadow IT for full-suite cloud applications like Office 365™. Default security misses far too many malicious emails, necessitating advanced email security to protect the enterprise. Avanan reinvented email security in 2015 because traditional gateways couldn’t, and haven’t, adjusted to the cloud. Avanan’s patented security. Security for all your collaboration apps. Ransomware, account takeover, BEC, supply chain attacks. 99.2% reduction in phishing attacks reaching the inbox. Avanan is powered by True AI, trained on comprehensive data sets to stop the most sophisticated phishing attacks before they reach the inbox. To implement API, machine learning and AI for cloud email security. 5,000+ customers, 60% coming from large enterprise. Ranked Email Security solution in Gartner Peer Insights and G2.
  • 30
    Privileged Access Management
    Secure your most sensitive accounts in minutes with Imprivata Privileged Access Management. Privileged accounts, those with the highest level of access, pose a greater security risk than the average end user because of the degree of sensitive information that could be exposed. This risk isn’t lost on hackers, which is why 80% of security breaches involve compromised privileged credentials. Legacy PAM solutions are complex and resource-intensive, often requiring costly engagements with outside consultants. Imprivata Privileged Access Management combines all the features of a traditional enterprise-grade solution but with zero clients and server footprint. Incorporate the principle of least privilege by providing just enough access to complete a task through granular policy control at the system level. Get going in just minutes with a completely agentless architecture that helps you meet wide-ranging compliance requirements quickly.
    Starting Price: $25 per month
MongoDB Logo MongoDB