Best IT Security Software - Page 61

Compare the Top IT Security Software as of May 2026 - Page 61

  • 1
    Barracuda Web Application Firewall
    Application security is increasingly complex. Barracuda makes it simple. Barracuda Web Application Firewall is a part of Barracuda Cloud Application Protection, an integrated platform that brings a comprehensive set of interoperable solutions and capabilities together to ensure complete application security. Barracuda Web Application Firewall protects applications, APIs, and mobile app backends against a variety of attacks including the OWASP Top 10, zero-day threats, data leakage, and application-layer denial of service (DoS) attacks. By combining signature-based policies and positive security with robust anomaly-detection capabilities, Barracuda Web Application Firewall can defeat today’s most sophisticated attacks targeting your web applications. Barracuda Active DDoS Prevention, an add-on service for the Barracuda Web Application Firewall, filters out volumetric DDoS attacks before they ever reach your network and harm your apps.
  • 2
    IdRamp

    IdRamp

    idRamp

    Turn your digital identity strategy into a business asset, not a liability. Stop spending time, money, and headcount replatforming insecure identity technology. Simplify authentication complexities with decentralized zero trust Identity from Idramp. Bring order to your identity management chaos. Accelerate delivery of services to meet the speed of business. Eliminate expensive platform upgrade projects with rapid modular deployment. Relieve the pain of bespoke integration with rapid integration that automatically interoperates with existing infrastructure. Tailor your customer experience with a modular architecture that eliminates vendor stack lock-in. Add zero trust identity with automated security policies and adaptive access controls. Control extensible ecosystems with state of the art data protection. Never trust but always verify that your applications and people are safe.
  • 3
    Virtru

    Virtru

    Virtru

    Easily control access to sensitive data flowing in and out of your organization via email, file sharing, and other applications. All powered by the Trusted Data Format and Virtru’s industry-leading platform for Zero Trust Data Control. Virtru integrates natively within the apps your teams already use, securing workflows in Google, Microsoft 365, Salesforce, Zendesk, and more. We make military-grade encryption accessible to everyone. Deploy Virtru across your organization in less than a day and meet your compliance goals. Granular access controls safeguard your most valuable asset — your data — throughout its entire lifecycle, everywhere it travels. Collaborate securely in Docs, Sheets, and Slides. Store and share files in Drive. Message via Gmail and Google Meet. Secure messages flowing through enterprise and custom apps. Seamlessly protect emails and files shared via Outlook.
  • 4
    Vigilance

    Vigilance

    Vigilance Fintech Software

    VigilanceAML is an online software, trusted by businesses of all sizes across New Zealand to comply with the complex anti-money-laundering standards. CDD processes vary depending on your customer type, face-to-face and offshore clients, Trust etc. VigilanceAML provides all the tools you need to onboard your customer efficiently. Have your customers fill out a secure online form, upload necessary documents all of which get attached to your client record saving data entry time and using unsecured emails. ODD is equally important to remain compliant. VigilanceAML provides smart features to streamline ODD and keep you up to date. VigilanceAML can analyze any Trust account statements for you, setup rules and help filter out risk of missing PTR’s. Direct integration to ASB included. VigilanceAML integration to GoAML will save you hours of frustration by automating the proceeds avoiding manual data entry.
    Starting Price: $165 per month
  • 5
    Rapid7 InsightVM
    Better understand the risk in your modern environment so you can work in lockstep with technical teams. Align traditionally siloed teams and drive impact with the shared view and common language of InsightVM. Take a proactive approach to security with tracking and metrics that create accountability and recognize progress. InsightVM not only provides visibility into the vulnerabilities in your modern IT environment—including local, remote, cloud, containerized, and virtual infrastructure—but also clarity into how those vulnerabilities translate into business risk and which are most likely to be targeted by attackers. InsightVM is not a silver bullet. Instead, it provides the shared view and common language needed to align traditionally siloed teams and drive impact. It also supports a proactive approach to vulnerability management with tracking and metrics that create accountability for remediators, demonstrate impact across teams, and celebrate progress.
  • 6
    Instance Resolve
    Descriptive analytics (Prepares and analyzes historical data while identifying patterns from samples for reporting of trends). Predictive analytics (Finds relationships in data that may not be readily apparent with descriptive analysis). Reduces timeline to deliver critical information for security and compliance audits​. Automate Database Health Check that measure performance over time with drill-down capacities to find the root cause of the problem.
  • 7
    Syspeace

    Syspeace

    Treetop Innovation

    Syspeace protects Windows Servers from potentially harmful incidents, like hacking and brute force attacks. Making it a essential complement to firewalls and anti-virus solutions. Syspeace is free to download and try for 30 days. When you ready; our per-computer licenses are affordable and flexible – you only pay for what you need. And also: All updates are included. Imagine this. Your company has a physical facility. If someone repeatedly tries to gain access with a fake key or invalid key card, you would expect that your security guards would provide protection and not let the intruder through. For your servers, you might think antivirus and firewall protection would be enough? Unfortunately, antivirus and firewall software only help against attacks at some gates of your facility, but does not take action against intruders.
    Starting Price: $4.20/month/server
  • 8
    Burp Suite

    Burp Suite

    PortSwigger

    Burp Suite is a leading range of cybersecurity tools, brought to you by PortSwigger. We believe in giving our users a competitive advantage through superior research. Each new edition of Burp Suite shares a common ancestor. The DNA running through our family tree represents decades of excellence in research. As the industry has shown time and time again, Burp Suite is the tool you can trust with your online security. We designed Enterprise Edition with simplicity as a top priority. Discover easy scheduling, elegant reports and straightforward remediation advice - all in one powerful package. The toolkit that started it all. Find out why Burp Pro has been the penetration testing industry's weapon of choice for well over a decade. Nurturing the next generation of WebSec professionals and promoting strong online security. Community Edition gives everyone access to the basics of Burp.
    Starting Price: $399 per user per year
  • 9
    DefectDojo

    DefectDojo

    10Security

    Take DefectDojo for a spin and review the demo of DefectDojo and login with sample credentials. DefectDojo is available on Github and has a setup script for easy installation. A docker container with a pre-built version of DefectDojo is available. Know exactly when new vulnerabilities are introduced in a build or remediated. Tracking when a product is assessed is easily accomplished using DefectDojo's API to track security tests that are run on each build. DefectDojo has the ability to track the build-id, commit hash, branch or tag, orchestration server, source code repo, and build server for every on-demand security test. Various reports are available for tests, engagements, and products. Products can be grouped into critical products to track products that are critical to your organization. Similar findings can be easily merged into one finding to provide developers one finding instead of multiple findings.
  • 10
    Indusface WAS

    Indusface WAS

    Indusface

    Get the most comprehensive application security audit done today. Indusface WAS with its automated scans & manual pen-testing ensures none of the OWASP Top10, business logic vulnerabilities and malware go unnoticed. With zero false positive guarantee and comprehensive report with remediation guidance, Indusface web app scanning ensures developers quickly fixes vulnerabilities. The proprietary scanner built ground up, keeping js framework driven, single page applications in mind to provide complete & intelligent crawling. With latest threat intelligence, get extensive web app scanning for vulnerabilities, and malware. Support on a functional understanding of logical flaws for an in-depth security audit.
    Starting Price: $49 per month
  • 11
    SecureCircle

    SecureCircle

    SecureCircle

    SecureCircle's Zero Trust data protection eliminates data breaches and insider threats by protecting all data outside of SaaS applications. SecureCircle's Data Access Security Broker (DASB) protects and monitors data, including data egressing from enterprise cloud services and managed repositories to enforce access controls on data regardless of location, including cloud and endpoint devices. SecureCircle protects data transparently and persistently at scale delivering the world's only Zero Trust data protection. Most modern SaaS applications allow end users to pull data out of the browser onto the device. More often than not, end users leverage these features for productive reasons. The challenge most businesses face with modern SaaS applications is identifying the difference between productive activity and a security threat. With SecureCircle, all data is kept secure as it comes out of SaaS applications, which allows users to leverage data that comes out of these applications.
  • 12
    ManageEngine M365 Manager Plus
    M365 Manager Plus is an extensive Microsoft 365 tool used for reporting, managing, monitoring, auditing, and creating alerts for critical activities. With its user-friendly interface, you can easily manage Exchange Online, Azure Active Directory, Skype for Business, OneDrive for Business, Microsoft Teams, and other Microsoft 365 services all from one place. M365 Manager Plus provides exhaustive preconfigured reports on Microsoft 365 and helps you perform complex tasks including bulk user management, bulk mailbox management, secure delegation, and more. Monitor Microsoft 365 services around the clock, and receive instant email notifications about service outages. M365 Manager Plus eases compliance management with built-in compliance reports and offers advanced auditing and alerting features to keep your Microsoft 365 setup secure.
    Starting Price: $345 per year
  • 13
    MobileWare

    MobileWare

    MobileWare

    When it comes to IoT connectivity, you need stable, blazing-fast connections you can trust. MobileWare inspires forward-thinking customer connectivity with simple-to-deploy and easily managed mobile solutions. At MobileWare, we provide advanced end-to-end connectivity and IoT solutions for enterprises. We use industry-leading IoT connectivity technologies to support your business’ mobility, wireline, IoT, and security. Our unique MobileWare Single SIM™ simply and securely connects all endpoints between your customers around the world. When it comes to global IoT connectivity, you need a network that keeps your business connected in the wildest of weather or the most remote locations. And this is why MobileWare exists—to give your business a truly global IoT network connectivity that covers different parts of the earth. Bring your products and services to the market faster, using our secure, scalable mobile IoT connectivity.
  • 14
    HTTPCS Cyber Vigilance
    HTTPCS solutions comparison vs the other automated tools on the cybersecurity market. The features of each HTTPCS solution have been compared to the features of alternative solutions available on the cybersecurity market. Click on a tab and discover HTTPCS, a complete alternative to other cybersecurity solutions. 4 tools have been compared to HTTPCS Cyber Vigilance, a darknet monitoring tool that warns you in real-time if your organization becomes the target of a cyberattack. 6 tools to scan and detect security breaches on websites have been compared to HTTPCS Security, the vulnerability scanner with a 0 false-positive guarantee. 4 web integrity monitoring products and viewing of changes have been compared to HTTPCS Integrity, a cybersecurity solution which detects malicious files, malware and internal errors. Request a demo or try a free 14-day trial for HTTPCS Integrity and see for yourself its features!
  • 15
    Nutanix Cost Governance
    Drive financial accountability with intelligent resource sizing and accurate visibility into cloud metering and chargeback with NCM Cost Governance (formerly Beam). Achieve greater visibility, optimization and control across public, private, and hybrid multi-cloud environments to keep cloud costs under control. Visibility into public and private cloud spending simplifies cost management and multi-cloud governance. Save more by automating tasks, rightsizing resources and making smarter reserved instance purchases. Allocate resource costs based on consumption and drive governance with a multicolored chargeback. Total cost of ownership is based on the true cost of running a private cloud, including all IT admin costs, calculated using configurable industry standards. Automatically create cloud consumption reports to allocate untagged spending to a cost center and set up budget alerts to keep costs well under control.
  • 16
    GoGuardian

    GoGuardian

    GoGuardian

    Unify your filtering, classroom management, and school mental health tools into a single suite. GoGuardian’s suite of tools helps you maximize the learning potential of your 1:1 school technology program. Seamlessly integrate multiple device types and platforms into your 1:1 deployment. From Chromebooks and Apple devices to Windows and BYOD, GoGuardian’s suite of tools can help keep your students safe on any device. As the world of digital learning accelerates, we believe it is critical to study and understand the impact of the digital learning experience on student outcomes. Our dedicated impact research team is working tirelessly to understand this impact, and how digital learning can be improved. With an average response time of 30 seconds, our world-class support team is here to help you solve virtually any problem. We even provide direct support for your teachers. And our dedicated implementation team ensures you’re set up for success from the moment you deploy GoGuardian.
  • 17
    Moki Total Control

    Moki Total Control

    Moki Mobility

    Moki creates mobile device management software that enables companies to manage large fleets of single-purpose customer-facing iOS, Android, and BrightSign devices. With our MDM software, mobile devices transform into kiosks, digital signage, and points of sale (POS). Moki MDM is the simplest solution for mobile device management on interactive kiosks, POS stations, and digital signage. Moki’s device deployment can be done in minutes. Once enrolled devices can be managed in bulk with Moki’s simple-to-use UI. Moki’s mobile device management platform helps turn any smartphone or tablets into a single-purpose POS terminal. With Moki these devices can be locked to a single application so you can be sure they are only being utilized as intended. Moki MDM provides the functionality needed to deploy and manage digital kiosks in any scenario. Additionally, when using our Moki Kiosk application users can lock to desired URLs, images, and videos for a consistent end-user experience.
  • 18
    IAMCompare

    IAMCompare

    IAMCompare

    IAMCompare is the only solution focused on auditing the integrity of your Provisioning & De-provisioning process. We perpetually identify user access exceptions and track to resolution, reducing both time and cost from your process. IAMCompare is a focused solution that brings companies direct visibility into their account. Our solution provides results at a transparent price point. Next, our clients identify assets (applications, databases, devices, other) that require monitoring and supply relevant account data. IAMCompare unites census and account information and identifies actionable anomalies. View account access for employees as well as authorized contractors, vendors & customers. Leverage IAMCompare to streamline system user access reviews and standardize vendor, customer and other 3rd party user certifications.
    Starting Price: $500 per month
  • 19
    Intrusta

    Intrusta

    iSubscribed

    We believe digital security should be easy for you. Click, surf, and browse worry-free because we are there to protect you. We are your partner, working to identify, analyze and prevent so you can go about your day as planned. Intrusta’s goal is to make online security simple. Whether it’s using our software, paying your bill, or chatting with a customer service agent, we’ve taken great efforts to make every interaction enjoyable and easy. Gone are the days of shocking price increases and unclear billing practices. We will be upfront about what you pay and when. Come renewal time, you shouldn’t be surprised. We’re perpetual learners with a knack for improvement, and we use our knowledge to ensure our product keeps up with evolving threats as you move through life. We pride ourselves on stellar support. We’re empathetic, reliable and ready to help. Whether it’s technical, product or payment related, you can trust us to find a speedy solution.
    Starting Price: $24.99 one-time payment
  • 20
    TRUCE

    TRUCE

    TRUCE Software

    Eliminate Workplace Distractions by Making Mobile Smarter. What if mobile devices could make your employees safer? What if they could unleash productivity? They can. TRUCE (formerly Cellcontrol) makes your mobile devices smarter. We help you work better. Find out how Truce can help your business reduce accidents, increase efficiency, improve safety and much more. TRUCE has pioneered Contextual Mobile Device Management that makes devices smarter, workplaces more efficient, and employees safer. It’s easy. It’s seamless. It’s how we make work better. Mobile devices can be a source of distraction, or a way to make your workplace smarter, safer, and more productive. We believe that if you can enable just those apps and functions that are relevant to the task while minimizing the interrupting pings, buzzes and other diversions, mobile devices can unleash employees in every field to do their best.
  • 21
    gpg4o

    gpg4o

    Giegerich & Partner

    Preserve the privacy of your electronic correspondence. Send confidential email in Microsoft® Outlook® 2010/2013/2016 safely once and for all with gpg4o®, developed by Giegerich & Partner, based on OpenPGP, one of the most widely used and safest cryptographic techniques worldwide. gpg4o® is suitable both for private and enterprise use. gpg4o® by Giegerich & Partner guarantees the privacy of your electronic correspondence by mail encryption. gpg4o® enables the integration of one of the most widely used and safest email encryption systems into Microsoft® Outlook® 2010, Microsoft® Outlook® 2013, Microfost Outlook 2016 and for Microsoft® Outlook® 2019. Easy installation and an intuitive user experience help you preserve the privacy of your email. With the gpg4o® product maintenance, you will always get the latest features for more security and even better user experience.
    Starting Price: $93 one-time payment
  • 22
    SecurityScorecard

    SecurityScorecard

    SecurityScorecard

    SecurityScorecard has been recognized as a leader in cybersecurity risk ratings. Download now to see the new cybersecurity risk rating landscape. Understand the principles, methodologies, and processes behind how our cybersecurity ratings work. Download the data sheet to learn more about our security ratings. Claim, improve, and monitor your scorecard for free. Understand your vulnerabilities and make a plan to improve over time. Get started with a free account and suggested improvements. Gain a holistic view of any organization's cybersecurity posture with security ratings. Leverage security ratings for a variety of use cases, including risk and compliance monitoring, M&A due diligence, cyber insurance underwriting, data enrichment, and executive-level reporting.
  • 23
    Intuitive Password

    Intuitive Password

    Intuitive Security Systems

    Intuitive Password is a military-grade password manager that simplifies your online experience by remembering your passwords and confidential data for you. With Intuitive Password to manage your logins and passwords, it's easy to have an unique and strong password for every online account and improve your online security. Automatically syncs your data across all devices, so you can easily access your data from anywhere at anytime. Stop filling in the same login details over and over. Intuitive Password can login for you with one-click. Never again forget a username or password. Ever. Forget what it's like to go through tedious password resets.
  • 24
    emPower

    emPower

    emPower Solutions Inc.

    emPower Solutions works with organizations to meet their compliance, trainings needs and help prepare employees against social engineering. emPower has 100s of customers in several industries - financial, healthcare, utilities, services and higher-ed. emPower's platform provides learning management for your internal trainings, provides a course catalog for security trainings, HIPAA, OSHA etc. We also help manage internal policies. The platform provides simulated phishing to prepare employees against attack and train them on relevant security skills. Safety and compliance solutions exclusively for higher education. Cyber attackers are getting smarter, your team can out-smart them. Information security awareness training. We are experts in HIPAA and we can make HIPAA training and compliance easy and cost-effective. Everything you need to emPower your eLearning. Review performance, track progress and gain insight into training impact with reports, to-do lists and dashboards.
  • 25
    Zeguro

    Zeguro

    Zeguro

    Get holistic risk management with Zeguro Cyber Safety, our cybersecurity solution, and cyber insurance. Holistic risk management consists of four steps: avoid, mitigate, accept, and transfer. While you can’t avoid all risk, mitigate and reduce it to an acceptable level with our intuitive cybersecurity tools. Finally, transfer your risk by purchasing our cyber insurance, tailored to your organization’s unique risk profile. Prevent cyber attacks with our security tools, and get potential Zeguro Cyber Safe discounts on your insurance. It’s a win-win for your business and peace of mind. The regulatory landscape is ever-evolving, making compliance a challenging task for businesses. Depending on your industry, the data you process, and other factors, there are several frameworks and regulations you may need to comply with. Failure to meet requirements can result in hefty fines. Simplify your compliance efforts. Zeguro Cyber Safety can help you meet several requirements.
  • 26
    RocketCyber
    RocketCyber delivers around-the-clock Managed SOC (Security operations Center) services that allow you to instantly enhance threat detection and response initiatives for your managed IT environments. Improve your security posture and alleviate threat concerns with expert-powered services. RocketCyber provides a 24/7/365 MDR service that enables robust threat detection and response across the IT environments you manage. Stop advanced threats, remove stress and enhance your security posture with expert-backed cybersecurity.
  • 27
    CPA Fraud Detection Service
    Benford’s law to detect patterns of inappropriate disbursements. Searches Quickbooks or other bookkeeping software audit trail reports for unusual actions such as voids and deletions. Identify multiple payments for the same amount on the same day. Reviews payroll runs for payments in excess of salary or hourly rate. Find payments issued on non-business days. Calculations of statistical parameters to identify outliers that could indicate fraud. Test for duplicate payments. Review accounts payable vendor files for similar names. Check for fictitious vendors. Compare vendor and payroll addresses Z-Score and relative size factor test. Data monitoring and surprise audits are correlated with some of the largest reductions in fraud loss but only 37% of all organizations employ these controls. The median loss of a business with less than 100 employees is $200,000. Small business has fewer resources to detect and find fraud.
    Starting Price: $1,400 one-time payment
  • 28
    Vaultize DRM

    Vaultize DRM

    Vaultize Technologies

    Achieve security and governance of files throughout their lifecycles, inside and outside your network. Vaultize enables your team to store, access and share files securely & easily and, you to protect & manage them, with digital rights management (DRM), secure file sharing and continuous data protection. The Vaultize platform is designed to protect enterprise data end-to-end - from external or internal threats, from accidental or intentional data leakage and, exposure. Vaultize offers secure and user-friendly solutions that enable teams to store and share files easily via any kind of device while giving IT and auditors complete visibility and control over those files. DRM protection - give and revoke access rights (view, edit, print, share, copy/paste & more). Powerful sharing controls at admin and user level. Full control of who, where, when, how & more.
    Starting Price: $5,000 one-time payment
  • 29
    Dropvault

    Dropvault

    Apptimi

    DropVault is great team collaboration and document sharing which overcomes the limitations of email and also doesn't risk your privacy. We let you, your team and your customers share sensitive documents, collaborate, comment, add tasks and reminders in complete privacy. Everything you, your team or your customers share on DropVault is encrypted and secured so your data is protected. Encryption can be difficult to use and you worry about losing or sharing the key. DropVault takes care of these problems with a great, easy-to-use app that just requires a team member or customer to enter their password. We then retrieve the key and decrypt your documents and messages. We also give you the option to add ever better security, add in trusted (or blocked) locations, enable two factor authentication on any account, require strong passwords and much more. It's sharing with security that makes sense.
    Starting Price: $10 per month
  • 30
    MailGuard

    MailGuard

    MailGuard

    Cybersecurity is one of the most significant issues facing business today. With more than 293 billion emails sent throughout the world every day, that's more than 2 trillion messages each week, and growing. Combined with more than 3.48 billion+ social media users throughout the world, and 4.49 billion+ internet users, the explosion in personal and professional data makes a hotbed for cybercrime networks. In this climate of fast-paced attacks, every minute matters. Cybercriminals bank on the element of surprise. Benchmarking shows MailGuard is consistently between 2 hours and 48 hours ahead of the market in preventing fast-breaking attacks. MailGuard’s proprietary “Hybrid AI (Artificial Intelligence)” approach is unique in predicting and learning about new and emerging threats. Combined with our cloud-based web and email solutions, MailGuard is uniquely positioned to apply immediate protection to users throughout the world.
MongoDB Logo MongoDB