Best IT Security Software - Page 68

Compare the Top IT Security Software as of May 2026 - Page 68

  • 1
    Finite State

    Finite State

    Finite State

    Finite State manages risk across the software supply chain with comprehensive SCA and SBOMs for the connected world. By providing end-to-end SBOM solutions, Finite State enables Product Security teams to meet regulatory, customer, and security demands. Finite State's best-in-class binary SCA creates visibility into any-party software that enables Product Security teams to understand their risk in context and shift right on vulnerability detection. With visibility, scalability, and speed, Finite State correlates data from all of your security tools into a single pane of glass for maximum visibility.
  • 2
    Cyral

    Cyral

    Cyral

    Granular visibility and policy enforcement across all your data endpoints. Designed to support your infrastructure-as-code workflows and orchestration. Dynamically scales to your workloads, with sub millisecond latency. Easily clicks with all your tools with no changes to your applications. Enhance cloud security with granular data access policies. Extend Zero Trust to the data cloud. Protect your organization from data breaches. Increase trust with your customers and provide assurance. Cyral is built to handle the unique performance, deployment and availability challenges of the data cloud. With Cyral you see the full picture. Cyral’s data cloud sidecar is a featherweight and stateless interception service that enables real time observability into all data cloud activity, and granular access controls. Highly performant and scalable interception. Prevention of threats and malicious access to your data that would go otherwise undetected.
    Starting Price: $50 per month
  • 3
    DoubleClue

    DoubleClue

    DoubleClue

    DoubleClue is an Identity and Access Management platform from HWS Group in Bavaria to manage identities, rights and access. It secures company networks with modern multi factor authentication from cyberattacks targeted on digital identities / the "human factor". Plus, the platform offers an integrated password management and secure cloud storage for confidential data. Identity security, password management and secure cloud storage protected by adaptive multi-factor-authentication (MFA). On premises or in the cloud. DoubleClue protects the component of your business that is not covered by firewalls and virus scanners – the human factor, the most vulnerable part in any IT security. All digital accesses and applications, passwords and confidential data protected by a strong all-in-one platform. In the digital working world, employees demand maximum flexibility. Enable them to work from anywhere with any device without compromising their IT security.
  • 4
    Avast Small Office Protection
    Complete online security for small offices that want robust, real-time protection against ransomware and the latest cyberattacks, for all their business devices. Run your business online safely and with confidence. Our solution will keep hackers away so you can focus on growing your operations. Effortless, layered next-gen endpoint protection that is easy to install and requires no management or configuration. No experience or IT staff required! Advanced endpoint security for employees in the office or on the go. Covers up to 10 devices, including PCs, Mac computers, iPads, iPhone, and Android mobile devices. 24/5 fast and friendly support from our highly trained technical engineers, who can assist you via email, chat, or phone. We’re here for you. Small Office Protection works effortlessly with your business’ existing hardware and devices. It’s a cost-effective solution that boosts productivity while delivering robust next-gen endpoint security.
    Starting Price: $11.67 per month
  • 5
    Barracuda Content Shield
    Make web browsing safe for business. 18.5 million websites are infected with malware at any given time. Protect your users and business from malicious links, websites and downloads. Protect local and remote users from accessing malicious websites and files. 40% of internet activity is non-work related. Stop unproductive or inappropriate web browsing with granular access policies. Get started in minutes with no client software to install. Barracuda Content Shield Plus is a cloud-based service that combines robust content filtering, file-based protection, granular policy enforcement and reporting, simple centralized management, and real-time threat intelligence to protect your users, your organization, and your brand. Its proxy-free architecture ensures minimal latency. Barracuda Content Shield delivers advanced web security with a more limited feature-set. Content Shield provides advanced DNS filtering and URL filtering that’s always up to date, and uses agent-based filtering.
  • 6
    ESET Cybersecurity Awareness Training
    ESET Cybersecurity Awareness Training is specifically designed to educate your workforce—because employees who recognize phishing, avoid online scams and understand internet best practices add a vital layer of protection for your business. Developed by ESET researchers and educators, this comprehensive online course takes under 90 minutes to complete. Employees enjoy an engaging learning experience through gamified quizzes, interactive sessions and role playing. Providing cybersecurity training to everyone in your workforce—not just IT staff—highlights the role of each worker in preventing successful attacks. Employees learn how to protect data and networks via password best practices, two-factor authentication, mobile device security and more. Insurance companies may require cybersecurity awareness training in order to insure your business. Compliances such as HIPAA, PCI, SOX, GDPR, CCPA, etc. require or strongly encourage training for all employees.
    Starting Price: $250 per 10 employees
  • 7
    AVG AntiVirus Free

    AVG AntiVirus Free

    AVG Technologies

    Our free antivirus software just got even better. It now includes real-time security updates, scans for malware, ransomware, and performance issues, and even catches malicious downloads before they reach your PC. You also get an all-new, refreshingly simple design that shows you exactly how you’re protected. All of this, and it still won’t slow you down. Whether you choose free or full protection, you've got impressive security that even updates itself automatically. And with a cutting-edge virus scanner that blocks and removes viruses, you can be reassured that you and your family are protected from the latest threats. Stop viruses, spyware, ransomware & other malware, secure personal folders with an extra layer of ransomware protection, block unsafe links, downloads, & email attachments, scan for PC performance problems.
  • 8
    Kaspersky Security for Internet Gateway
    Working with the World Wide Web is critical to the majority of today's businesses. Your corporate internet gateway doesn't just give access to internet resources for your employees - it also provides an entry point for cyberthreats out to target them through social engineering, and to attack your endpoints with sophisticated malware. Kaspersky Security for Internet Gateways offers significant risk reduction in areas including infection, data leaks and internet distractions. Provides multi-layered gateway-level protection against the latest web-based threats. Blocks infections before they can reach your endpoints. Negates the effects of social engineering. Readily complements your existing gateway-level defenses. Reduces your exposure to attack by controlling internet resource usage. Supports and assists regulatory compliance initiatives.
  • 9
    Forcepoint Secure Web Gateway
    Proactively secure the web with advanced, real-time threat defenses—full content inspection and in-line security scanning help mitigate risk and protect against malware. The convenience of securing your global workforce with a single endpoint for Web Security, DLP, CASB, and NGFW with flexible connectivity and traffic redirection options. Deploy how, when and where you want. On-premises, hybrid and cloud deployment architectures so you can go to the cloud at your own pace. Behavioral analytics and inline capabilities secure your policies and data across the world. Consistent policies with robust access control for all your sites, cloud apps, and users both on and off the corporate network. Keep users safe from malicious threats, including zero-day threats. Protect against zero-day threats with real-time threat intelligence and remote browser isolation, and provide deep content inspection for encrypted and unencrypted traffic to detect evolving threats across the entire kill chain.
  • 10
    BlackBerry Access
    Enable access to your corporate network from personal or non-corporate managed devices, protecting enterprise data with full containerization to reduce the risk of data leakage. BlackBerry® Access provides a secure, intuitive user experience for intranet browsing. Employees get access to corporate intranets and apps on their personal or non-corporate managed devices. Simplify your bring your own computer program with desktop offerings from BlackBerry, giving you modern alternatives to traditional VPN and VDI solutions. BlackBerry® Desktop enables users to securely access corporate on-premises or cloud content and resources on their personally owned or non-corporate managed Windows 10 and macOS devices. It includes BlackBerry Access as well as BlackBerry® Work. BlackBerry Access is a secure browser that allows your organization to confidently enable mobile access to your corporate network. It supports iOS, Android, Windows, and macOS.
  • 11
    Blue Hexagon

    Blue Hexagon

    Blue Hexagon

    We’ve designed our real-time deep learning platform to deliver speed of detection, efficacy and coverage that sets a new standard for cyber defense. We train our neural networks with global threat data that we’ve curated carefully via threat repositories, dark web, our deployments and from partners. Just like layers of neural networks can recognize your image in photos, our proprietary architecture of neural networks can identify threats in both payloads and headers. Every day, Blue Hexagon Labs validates the accuracy of our models with new threats in the wild. Our neural networks can identify a wide range of threats — file and fileless malware, exploits, C2 communications, malicious domains across Windows, Android, Linux platforms. Deep learning is a subset of machine learning that uses multi-layered artificial neural networks to learn data representation.
  • 12
    Imperva WAF
    Web application attacks prevent important transactions and steal sensitive data. Imperva Web Application Firewall (WAF) analyzes traffic to your applications to stop these attacks and ensure uninterrupted business operations. A noisy WAF forces you to choose between blocking legitimate traffic or manually containing attacks your WAF let through. Imperva Research Labs ensure accuracy to WAF customers as the threat landscape changes. Automatic policy creation and fast rule propagation empower your security teams to use third-party code without risk while working at the pace of DevOps. Imperva WAF is a key component of a comprehensive Web Application and API Protection (WAAP) stack that secures from edge to database, so the traffic you receive is only the traffic you want. We provide the best website protection in the industry – PCI-compliant, automated security that integrates analytics to go beyond OWASP Top 10 coverage, and reduces the risks created by third-party code.
  • 13
    Imperva DDoS Protection
    Imperva DDoS Protection secures all your assets at the edge for uninterrupted operation. Ensure business continuity with guaranteed uptime. When it comes to DDoS mitigation, the rule of thumb is: ‘moments to go down, hours to recover’. This is why, when defending against an attack, every second counts. Imperva gives you the peace of mind that attack traffic will be automatically blocked at the edge – without you having to scale up in bandwidth to pay for it. Imperva DDoS Protection for Websites is an always-on service that immediately mitigates any type or size of DDoS attack targeting web applications. Our DDoS protection for websites complements the Imperva cloud web application firewall (WAF), which blocks hacking attempts and attacks by malicious bots. A change to your DNS records ensures that all HTTP/S traffic to your domain(s) is routed through the Imperva network. Acting as a secure proxy, Imperva DDoS protection for websites masks your origin server IP.
  • 14
    Blueliv Threat Compass
    Blueliv helps you counter cyberthreat faster using our adaptive, modular technology, Threat Compass. Unique external threats and exfiltrated information. The broadest threat collection capability on the market, delivered in real-time. Targeted, accurate and actionable Threat Intelligence powered by machine learning. All your threats, just your threats – with no false positives. Benefit from Blueliv playbooks; Stay one step ahead and remove illegitimate websites, social media mentions, mobile apps and exfiltrated data. Empower your security teams to efficiently hunt threats with limited resources – combining human expertise with machine learning. Modular, multi-tenant, subscription-based solution. Configure, deploy, and get results in a matter of minutes. Easily integrate your results with your existing solutions and share intelligence with peers and trusted parties.
  • 15
    AT&T Alien Labs Open Threat Exchange
    The world's largest open threat intelligence community that enables collaborative defense with actionable, community-powered threat data. Threat sharing in the security industry remains mainly ad-hoc and informal, filled with blind spots, frustration, and pitfalls. Our vision is for companies and government agencies to gather and share relevant, timely, and accurate information about new or ongoing cyberattacks and threats as quickly as possible to avoid major breaches (or minimize the damage from an attack). The Alien Labs Open Threat Exchange (OTX™) delivers the first truly open threat intelligence community that makes this vision a reality. OTX provides open access to a global community of threat researchers and security professionals. It now has more than 100,000 participants in 140 countries, who contribute over 19 million threat indicators daily. It delivers community-generated threat data, enables collaborative research, and automates the update of your security infrastructure.
  • 16
    Intermedia AppID

    Intermedia AppID

    Intermedia Cloud Communications

    Discover the single sign-on service that's simple for ANY business to deploy. Easy deployment—no infrastructure prerequisites. Enhance security with advanced two-factor authentication, Works with any web app, including custom apps. 99.999% uptime Service Level Agreement. Extend 2FA to any web app. Methods include push notifications, passcodes, text messages or phone calls. 99.999% uptime means less than 30 seconds of monthly unplanned downtime. Eliminate the need for users to hunt for login URLs or remember multiple password. The more web apps you have, the harder it is to ensure security, manage costs and maintain control. This leads to insecure password practices, increased help desk calls, and big security risks. Single sign-on solves the problem of too many apps. Unfortunately, it's always been too hard for smaller businesses to deploy. Now, there's AppID. With no infrastructure prerequisites, our single sign-on service is effortless to deploy.
    Starting Price: $4 per user per month
  • 17
    Fidelis Network

    Fidelis Network

    Fidelis Security

    Detecting advanced threats requires deep inspection, extraction, and analysis of all forms of content going across the wire in real-time. Fidelis network detection and response bi-directionally scans all ports and protocols to collect rich metadata used as the basis for powerful machine-learning analytics. With direct, internal, email, web and cloud sensors, you gain full network coverage and visibility. Identified attacker TTPs are mapped against the MITRE ATT&CK™ framework to help security teams get ahead of the curve. Threats can run, but they can’t hide. Automatically profile and classify IT assets and services including enterprise IoT, legacy systems and shadow IT to map your cyber terrain. When integrated with Fidelis’ endpoint detection and response solution, you gain a software asset inventory correlated with known vulnerabilities including CVE and KB links, as well as security hygiene for patches and endpoint status.
  • 18
    Splunk User Behavior Analytics
    Securing against unknown threats through user and entity behavior analytics. Discover abnormalities and unknown threats that traditional security tools miss. Automate stitching of hundreds of anomalies into a single threat to simplify a security analyst’s life. Use deep investigative capabilities and powerful behavior baselines on any entity, anomaly or threat. Automate threat detection using machine learning so you can spend more time hunting with higher fidelity behavior-based alerts for quick review and resolution. Rapidly identify anomalous entities without human analysis. Rich set of anomaly types (65+) and threat classifications (25+) across users, accounts, devices and applications. Rapidly identify anomalous entities without human analysis. Rich set of anomaly types and threat classifications (25+) across users, accounts, devices and applications. Organizations gain maximum value to detect and resolve threats and anomalies via the power of human and machine-driven solutions.
  • 19
    Verizon Network Detection and Response
    At a time when you are challenged more than ever to secure the digital infrastructure at the core of your operations, you need a technology foundation for security that unifies network threat detection, forensics and integrated response. Network Detection and Response is the evolution of effective, efficient and accessible network security. You need no specialized hardware to rapidly deploy Network Detection and Response in any segment of the modern network — enterprise, cloud, industrial, IoT and 5G — to see all activities and record everything for comprehensive analysis, discovery and action. Network Detection and Response delivers network visibility, threat detection and forensic analysis of suspicious activities. This service dramatically accelerates the ability for organizations to respond to and identify future attacks before they become serious events. This threat detection and response service captures, optimizes and stores network traffic from multiple infrastructures.
    Starting Price: $20 per month
  • 20
    Resecurity

    Resecurity

    Resecurity

    Resecurity Risk is dedicated threat monitoring platform for brands, their subsidiaries, assets, and executives. Launch in 24 hours just import your unique digital identifiers and get close to real-time updates of over 1 Petabyte of actionable intelligence impacting you now. Security information and event management (SIEM) tools can help identify and highlight many critical events at a glance if all active threat vectors are available to be ingested within the platform and are from verified sources with accurate risk scoring. Resecurity Risk an omni-directional threat product which would usually require multiple vendors to resolve. Integrate available security solutions to actualize the risk score of your enterprise footprint. Driven by your data, powered by Context™. Holistic approach to piracy and counterfeit monitoring for various industry verticals. Prevent illicit distribution and use of your products, using actionable intelligence.
  • 21
    N-able Risk Intelligence
    Your customers recognize the importance of security, but they often don't realize the urgency until they see something tangible. N-able™ Risk Intelligence makes it concrete by assigning value to your data vulnerability, helping you build a strong business case for data protection and triage the most important problems to tackle. Help ensure that only authorized individuals can access sensitive data. Safeguard sensitive personal data from attack. View reports on the potential financial impact of your at-risk data. Locate security holes in your systems. Protect credit card data and help ensure PCI DSS compliance. Sensitive data left exposed on systems poses a great risk to your customers. Often, companies amass large amounts of sensitive personally identifiable information (PII), including social security numbers, driver's license numbers, credit card information, and more in dispersed persistent storage.
  • 22
    CrowdStrike Falcon Adversary Intelligence
    CrowdStrike Falcon® Adversary Intelligence provides cutting-edge threat intelligence to help organizations proactively identify and mitigate cyber threats. With access to over 250 adversary profiles, dark web monitoring, and real-time threat intelligence, businesses can strengthen their defense and accelerate response times. This platform integrates seamlessly into existing security operations, offering automated threat modeling, sandbox analysis, and the ability to automate security workflows. CrowdStrike Falcon® empowers organizations to stay ahead of emerging threats with comprehensive insights into adversary tactics, techniques, and procedures.
  • 23
    Keywhiz

    Keywhiz

    Keywhiz

    Keywhiz is a system for managing and distributing secrets. It can fit well with a service oriented architecture (SOA). Here is an overview in presentation format. Common practices include putting secrets in config files next to code or copying files to servers out-of-band. The former is likely to be leaked and the latter difficult to track. Keywhiz makes managing secrets easier and more secure. Keywhiz servers in a cluster centrally store secrets encrypted in a database. Clients use mutually authenticated TLS (mTLS) to retrieve secrets they have access to. Authenticated users administer Keywhiz via CLI. To enable workflows, Keywhiz has automation APIs over mTLS. Every organization has services or systems that require secrets. Secrets like TLS certificates/keys, GPG keys, API tokens, database credentials. Keywhiz is reliable and used in production, however occasional changes may break API backward compatibility.
  • 24
    Knox

    Knox

    Pinterest

    Knox is a secret management service. Knox is a service for storing and rotation of secrets, keys, and passwords used by other services. Pinterest has a plethora of keys or secrets doing things like signing cookies, encrypting data, protecting our network via TLS, accessing our AWS machines, communicating with our third parties, and many more. If these keys become compromised, rotating (or changing our keys) used to be a difficult process generally involving a deploy and likely a code change. Keys/secrets within Pinterest were stored in git repositories. This means they were copied all over our company's infrastructure and present on many of our employees laptops. There was no way to audit who accessed or who has access to the keys. Knox was built to solve these problems. Ease of use for developers to access/use confidential secrets, keys, and credentials. Confidentiality for secrets, keys, and credentials. Provide mechanisms for key rotation in case of compromise.
  • 25
    Dataguise

    Dataguise

    Dataguise

    Don’t let data security or privacy hinder your analytics-driven innovation efforts. Dataguise can protect personal and sensitive data with flexible masking or encryption options to retain maximum business value. Data sets ready for analysis can be delivered in near real time for fresher insights and better decisions based on the complete picture. Dataguise customers have diverse and ever-changing needs. We recognize that by developing a strong network of carefully selected partners, we can deliver more comprehensive solutions, services, and expertise to our customers. Learn how to protect data privacy while maximizing data value in this executive guide. When compared to other data discovery solutions, Dataguise has been around longer, supports a broader range of data types and repositories, delivers lower false-positive results, and more reliably scans data at scale. Dataguise gives organizations the confidence to act on data in the best interests of the businesses,
  • 26
    Azure Information Protection
    Control and help secure email, documents, and sensitive data that you share outside your company. From easy classification to embedded labels and permissions, enhance data protection at all times with Azure Information Protection—no matter where it’s stored or who it’s shared with. Configure policies to classify, label, and protect data based on its sensitivity. Classification with Azure Information Protection is fully automatic, driven by users, or based on recommendation. Add classification and protection information for persistent protection that follows your data—ensuring it remains protected regardless of where it’s stored or who it’s shared with. Track activities on shared data and revoke access if necessary. Your IT team can use powerful logging and reporting to monitor, analyze, and reason over data. Share data safely with coworkers as well as your customers and partners. Define who can access data and what they can do with it.
  • 27
    Fasoo Data Radar
    Fasoo Data Radar (FDR) is a data discovery and classification solution that helps organizations locate, analyze, and manage sensitive unstructured data across on-premise servers, cloud storage, and endpoints. It scans and classifies files based on keywords, regex patterns, file formats, and other predefined policies, ensuring organizations maintain control over critical information. With real-time monitoring and centralized policy enforcement, FDR enhances data security by identifying risks, preventing unauthorized access, and assisting with compliance requirements such as GDPR, HIPAA, and CCPA. Its integration with enterprise security frameworks allows organizations to apply consistent data protection policies while improving operation workflows. By automating data classification and governance, FDR increases efficiency and enhances data visibility for security and compliance management.
  • 28
    Google VPC Service Controls
    VPC Service Controls. Managed networking functionality for your Google Cloud resources. New customers get $300 in free credits to spend on Google Cloud during the first 90 days. All customers get free usage (up to monthly limits) of select products, including BigQuery and Compute Engine. Mitigate exfiltration risks by isolating multi-tenant services. Ensure sensitive data can only be accessed from authorized networks. Restrict resource access to allowed IP addresses, identities, and trusted client devices. Control which Google Cloud services are accessible from a VPC network. Enforce a security perimeter with VPC Service Controls to isolate resources of multi-tenant Google Cloud services—reducing the risk of data exfiltration or data breach. Configure private communication between cloud resources from VPC networks spanning cloud and on-premises hybrid deployments. Take advantage of fully managed tools like Cloud Storage, Bigtable, and BigQuery.
  • 29
    Netwrix Threat Prevention
    Netwrix Threat Prevention Software is a real-time security solution designed to stop cyber threats before they cause damage. It monitors environments continuously to detect and block suspicious activities as they happen. The platform helps prevent insider threats by identifying unusual behavior and access anomalies. It provides real-time threat blocking to stop unauthorized changes to critical systems and assets. Netwrix Threat Prevention delivers actionable alerts with context, helping teams understand and respond quickly. It reduces the risk of attacker persistence by cutting off escalation paths immediately. The solution strengthens security by proactively preventing breaches rather than reacting after incidents occur. By combining detection and prevention, it helps organizations maintain a secure and resilient IT environment.
  • 30
    Netwrix Data Classification
    Netwrix Data Classification is a data security solution designed to discover, classify, and protect sensitive information across IT environments. It helps organizations automatically identify sensitive data stored in both on-premises and cloud systems. The platform uses predefined rules and intelligent analysis to classify data based on its type and sensitivity. It enables organizations to detect redundant, obsolete, and trivial data that increases risk exposure. Netwrix Data Classification supports automated remediation actions such as moving, securing, or restricting access to sensitive files. It helps organizations meet compliance requirements by identifying regulated data such as GDPR, HIPAA, and PCI-related information. The solution enhances data visibility, allowing teams to better understand where critical data resides. By improving data organization and protection, it reduces the risk of data breaches and unauthorized access.
MongoDB Logo MongoDB