Best IT Security Software - Page 76

Compare the Top IT Security Software as of May 2026 - Page 76

  • 1
    Strivacity

    Strivacity

    Strivacity

    Strivacity adds secure customer identity and access management (CIAM) capabilities to your online properties fast so you can grow your revenue, stay compliant with fast-changing privacy regulations and personalize your service with the insights you’ll get into how your customers interact with you. We can plug into your existing app, let your customers self-service their accounts and scale as fast as your business can grow. It's OK if you've outgrown your CIAM solution. We use clicks (not code) to reduce your TCO and get your customers where they’re going. Our Isolation by Design™ architecture secures regulated data and satisfies privacy standards like GDPR and CCPA. When you add in requirements from security and legal teams, the focus on the “C” (aka your customers) often gets lost. Strivacity keeps the focus on your customer with one solution that meets everyone’s needs, goes live faster and doesn’t require an army of developers and consultants to feed and water it.
    Starting Price: $500 per month
  • 2
    Patch My PC

    Patch My PC

    Patch My PC

    Save more time than you ever thought possible and improve security by automating the patching of third-party applications in Microsoft ConfigMgr and Intune. Extend beyond patching, auto-create applications for the initial deployment of products in Microsoft SCCM and Intune. Including icons, keywords, descriptions, and much more! We'll keep the base installs up to date automatically — no need to deploy outdated apps and wait for the updates to apply after the fact. Use existing installation methods within SCCM including task sequences and collection deployments for the initial installation of products. Add your own custom pre/post-update scripts to perform environment-specific configurations when needed. Disable the self-update feature within applications to ensure you can manage when and how updates apply in your enterprise.
    Starting Price: $2 per device per year
  • 3
    Abusix Mail Intelligence
    Abusix Mail Intelligence is an innovative set of blocklists (RBL/DNSBL) that adds real-time threat data to your existing email protection. Considered as the first line of defense, blocklists help to prevent email-borne threats such as spam and malware from entering your network. We’re the first line of defense for your mail servers which allows you to save bandwidth and CPU caused by the more costly in-depth spam and virus analysis required for later content filtering. Abusix Mail Intelligence prevents outbound spam by helping you identify risky or compromised accounts by using our AuthBL. We also prevent outbound spam by providing additional data to your existing filters using our Domain, Short URL, Disk URL, Cryptocurrency Wallet, and Email blocklists.
  • 4
    Wallarm API Security Platform
    Built by security practitioners for practitioners, Wallarm's API security platform provides robust protection for APIs, web apps, microservices, and serverless workloads in cloud-native, multi-cloud, Kubernetes, and on-premises environments. It delivers coverage against OWASP API Top-10 risks and advanced threats, ensuring visibility and rapid vulnerability remediation. The Wallarm platform is a best-in-class API security solution that supports multiple deployment options. Trusted by security teams globally, Wallarm's API security platform is the fastest, easiest, and most effective way to stop API attacks. Customers choose Wallarm to protect their applications and AI agents because the platform delivers a complete inventory of APIs, patented AI/ML-based abuse detection, real-time blocking, and an API SOC-as-a-service.
  • 5
    TruffleHog

    TruffleHog

    Truffle Security

    TruffleHog runs behind the scenes to scan your environment for secrets like private keys and credentials, so you can protect your data before a breach occurs. Secrets can be found anywhere, so TruffleHog scans more than just code repositories, including SaaS and internally hosted software. With support for custom integrations and new integrations added all the time, you can secure your secrets across your entire environment. TruffleHog is developed by a team entirely comprised of career security experts. Security is our passion and primary concern, and all features are developed with best practices in mind. TruffleHog enables you to track and manage secrets within our intuitive management interface, including links to exactly where secrets have been found. Authenticate with secure OAuth workflows for users and never worry about username and password breaches.
  • 6
    Spherical Defense

    Spherical Defense

    Spherical Defense

    Spherical Defense is an API security solution that uses deep unsupervised learning to protect your APIs. Spherical Defense Express is deployed on AWS, takes just a minute to download and will be protecting your assets within two hours at the cost of $1 per hour. Once you have deployed your Spherical instance, it will immediately start listening for API traffic. It will stay in this mode for only as long as there is insufficient data to train the first security model. After receiving roughly 16,000 requests, it will move to the next stage. After sufficient data has been received, the system moves into training mode. This mode will result in a trained security model after roughly 6 hours, which will then be mounted for evaluation. As new data is received, the Spherical instance will train more models to account for natural changes in your API traffic over time. Once the first security model has been trained, it is mounted for evaluation.
    Starting Price: $1 per hour
  • 7
    Imperva API Security
    Imperva API Security protects your APIs with an automated positive security model, detecting vulnerabilities in your applications, and shielding them from exploitation. Organizations manage a minimum of 300 APIs on average. Imperva’s API Security amplifies your security posture by automatically generating a positive security model for every uploaded API swagger file. APIs are being churned out faster than security teams can review, influence, and sign off on before they’re pushed into production. Imperva’s API Security enables your teams to stay ahead of DevOps via automation. Imperva API Security empowers your approach with out-of-the-box security rules adjusted to your APIs. This ensures complete OWASP API coverage and promotes visibility for all security events per API endpoint. With API Security, simply upload the OpenAPI specification file that your DevOps team has created and Imperva will automatically build a positive security model.
  • 8
    CloudGuard AppSec

    CloudGuard AppSec

    Check Point Software Technologies

    Automate your application security and API protection with AppSec powered by contextual AI. Stop attacks against your web applications with a fully automated, cloud-native application security solution. Eliminate the need to manually tune rules and write exceptions every time you make an update to your web application or APIs. Modern applications demand modern security solutions. Protect your web applications and APIs, eliminate false positives and stop automated attacks against your business. CloudGuard uses contextual AI to prevent threats with absolute precision, without any human intervention as the application is updated. Protect web applications, and prevent OWASP Top 10 attacks. From implementation through runtime, CloudGuard AppSec automatically analyzes every user, transaction, and URL to create a risk score to stop attacks without creating false positives. In fact, 100% of CloudGuard customers maintain fewer than 5 rule exceptions per deployment.
  • 9
    aapi

    aapi

    aapi

    Act on identity events in other apps to make identity experiences more seamless, secure, compliant, and productive. Automatically embed the correct real-time actions for users and teams to efficiently act on data in downstream apps with a single click. Next-generation granular access into specific functions of apps, surpassing existing PAM and CASB solutions for true zero trust. Events, like identity provisioning and suspicious activity, are responded to by aapi to automate identity, application, and security responses. aapi automatically embeds correct real-time actions for users and teams to act on data in downstream apps within their chosen application with a single click, while access is protected by your IAM. Users are given access to only the individual features within apps they need, while keeping everything else safe and secure, all directly through your IAM.
    Starting Price: $4 per user per month
  • 10
    Net Protector

    Net Protector

    Net Protector

    Net Protector defends your office network from all viruses, worm and spyware attacks and keeps your business lifeline, network and PCs, running smoothly and securely. Win10Boost is one of the software from Net Protector Antivirus Lab, which will enhance the performance of your Windows 10 PC. This improves the speed and performance of your Win10 PC and uses very little memory. Detects system model, processor type, processing speed, RAM and disk details, O/S edition and version details. Detects Antivirus related details. Check for the processes and services consuming high CPU utility. It helps to find processes and services which are not useful for users. Significantly increases the speed of the system. It monitors all background applications and detects applications that are in suspended mode. Background applications that are taking high CPU utility and are lowering system performance are monitored. Tunes up the system extensively.
    Starting Price: $9.33 per year
  • 11
    Access Auditor

    Access Auditor

    Security Compliance Corp

    Access Auditor automates user entitlement reviews and user access reviews. Access Auditor also alerts on changes in user access rights, and watches for separation of duties violations, and shows who has access to what. Users can be imported from any AD/LDAP, Database, or any REST API. Enterprise roles (RBAC) can be modeled and defined, allowing full RBAC reviews and provisioning. Access Manager leverages the same ease-of-use to automate the provisioning and management of user access rights. Any system with a database, LDAP, or REST API can be automatically managed via role based access controls. SCC’s powerful and simple approach to Identity Management enables a very rapid success at a low overall cost. With a 100% customer success rate, Access Auditor is the fastest and simplest solution available and can automate your user access reviews in under a week.
  • 12
    IBM Log Analysis
    You’re using log services. But your teams want cluster-level insight. Save time and gain deeper insight with the IBM® Log Analysis service. Get integrations to many cloud-native runtimes and environments. Get collection, log tailing and blazing fast log search. Get natural language query and search retention up to 30 days. Configure cluster-level logging for a Kubernetes cluster to get access to log types for worker, pod, application and network. Monitor this data from a wide range of sources. Monitor and manage Ubuntu logs in a centralized logging system on IBM Cloud®. DevOps can archive logs from an IBM Log Analysis instance. The logs are archived into a bucket in an IBM Cloud Object Storage instance. Aggregate all log data into a central location. Expect Pager Duty, Slack, webhooks and more. Supports more than 30 integrations and ingestion sources. Natural language query and pay-per-GB pricing.
  • 13
    IBM Cloud Veeam
    Veeam on IBM Cloud® can deliver reliable backup and predictable disaster recovery (DR) for virtual and physical workloads, wherever they reside, across your data center and the cloud. Build a DR strategy based on business objectives, not budget limits when you pair Veeam replication with the no-cost networking available between more than 60 IBM Cloud data centers Manage backup and recovery across your entire data center, remote office and cloud infrastructure with the same full features and capabilities to simplify and streamline administration. Take advantage of flexible options to meet your backup and disaster recovery needs. Do it yourself, or work with IBM experts for planning, architecture, migration and end-to-end managed services. Employ both backup and replication for simple, security-rich backups and streamlined disaster recovery to achieve low recovery time and recovery-point objectives.
  • 14
    IBM Operations Analytics
    IBM® Z® Operations Analytics is a tool that enables you to search, visualize and analyze large amounts of structured and unstructured operational data across IBM Z environments, including log, event and service request data and performance metrics. Leverage your analytics platform and machine learning to gain enterprise visibility, identify issues in your workloads, locate hidden problems and perform root cause analysis faster. Use machine learning to baseline normal system behavior and detect operational anomalies. Detect emerging issues across services, so you can proactively alert and cognitively adjust to changes. Gain expert advice for corrective actions and greater service assurance. Identify unusual workload behaviors. Locate common issues hidden in operational data. Reduce time required for root cause analysis. Harness the domain expertise of IBM Z. Leverage IBM Z insights on your analytics platform.
  • 15
    IBM Cloud Security Advisor
    Govern cloud resource configurations and centrally manage your compliance to organization and regulatory guidelines. Manage security and compliance controls directly within the IBM Cloud® platform. With the IBM Security and Compliance Center, you view your security and compliance postures from a unified dashboard. Define provisioned resources’ rules to standardize configurations. Choose from predefined groups of controls to ensure best practices. Select specific controls to meet regulatory standards. Identify anomalies by monitoring network and user behavior. Download results as a report for audit evidence. Use custom tools to manage security findings in one place. Automate security and compliance postures. Enable configuration governance. Detect vulnerabilities and threats. Follow a guided tutorial to complete the set up that is required to manage your posture.
  • 16
    IBM Cloud Pak for Security
    As you move your business to the cloud, you need to work smarter. Security data is frequently spread across cloud and on-premises environments, exposing gaps and vulnerabilities. IBM Cloud Pak® for Security can help you gain deeper insights, mitigate risks and accelerate response. With an open security platform that can advance your zero trust strategy, you can use your existing investments while leaving your data where it is, helping your team become more efficient and collaborative. Protect data, manage users and contain threats from a unified dashboard enabled with AI and automation. Connect to your existing security infrastructure, including IBM® and non-IBM products off-the-shelf to avoid integration efforts. Built on open source and open standards to easily integrate with your existing applications and scale security as you grow. Moving data to analyze it creates additional complexity and costs. Gain security insights without having to move your data.
    Starting Price: $800 per month
  • 17
    Spybot

    Spybot

    Spybot

    Our approved Spybot, Search & Destroy protects your computer against malware. Spybot Anti-Beacon helps to stop your data being sent out to third parties. The new Spybot Identity Monitor helps you to realize and take action when your personal information held by third parties was compromised. If you are not looking for a single system, you might find your individual the solution among the Family Packs or the small business pack which bundle all the security and privacy applications you need. Safer-Networking Ltd offers a comprehensive range of products so you can choose the solution that suits your individual needs. There are versions for private users who require an easy-to-use product that offers robust protection and versions for experienced business users. The business versions not only offer complete protection but also advanced technical tools. Volume discounts are available for all our products.
    Starting Price: €9.99 per year
  • 18
    Cyclonis Password Manager
    Store all your passwords in one place and sync them across multiple devices. Log into your favorite websites automatically and fill in long and complicated online forms in a matter of clicks. Encrypt your passwords in your vault with 256-bit Advanced Encryption Standard (AES). Our goal is to help you manage your many website account passwords and other sensitive data while also keeping your data organized and accessible. Along with an encrypted vault that stores all your personal, payment, and login information, Cyclonis Password Manager gives you a helpful estimate of the strength and complexity of your passwords. Last but not least, it saves you precious time by working directly in your browser to let you access your data and log in to your website accounts whenever you need. To access your data, you just need your master password, it’s the key to unlocking all your stored website accounts.
    Starting Price: $3 per month
  • 19
    Avira Free Antivirus
    We offer ultra-light virus definition updates, with a footprint so small it doesn’t slow you down and hog your system’s resources. Avira is a member of IT Security Made in Germany, synonymous with quality and respect for your privacy. We don’t monitor what you do nor share your private info with 3rd parties. To stay ahead, our multi-layered security harnesses the power of cloud technology, machine learning, and artificial intelligence. And as all the analysis happens on our end, you get top protection with minimal system impact. Unlike most security vendors, Avira doesn't sell your data and never will. Nor do we share your data with 3rd parties such as government, Big Tech or advertising networks. Visiting websites and downloading files makes your computer or mobile device vulnerable to threats and attacks. Download free antivirus software for real-time protection. With Avira’s award-winning virus protection, hackers don’t stand a chance.
  • 20
    NETGEAR Insight

    NETGEAR Insight

    NETGEAR Insight

    NETGEAR Insight is your gateway to easy networking and advanced services. Whether it's content filtering, business VPN or instant captive portal get the most of your network in the simplest and fastest way. Secure data traffic between work-from-home employees or between business locations, so that no unauthorized access can obtain your company’s information on Orbi Pro (SXK80, SXK50, SXK30). Insight business VPN seamlessly provides work-from-home employees the same network access and experience compared to while they are in office. For IT managers and MSPs, network management and configurations are handled easily with features including administering VPN access on a group level, managing VPN access for users or business sites and receiving reports and notifications on VPN downtime. Block access to undesirable and malicious websites may decrease work efficiency and be a threat to wired and wireless networks.
    Starting Price: $9.99 per year
  • 21
    Seqrite HawkkHunt
    Stop the most sophisticated hidden threats and adversaries efficiently with unified visibility, and powerful analytics using Seqrite HawkkHunt Endpoint Detection and Response (EDR). Gain complete visibility through robust and real-time intelligence from a single dashboard. Proactive threat hunting process to detect threats, and perform in-depth analysis to block breaches. Simplify alerts, data ingestion, and standardization from a single platform to respond to attacks faster. Get deep visibility and high efficacy, actionable detection to rapidly uncover and contain advanced threats lurking in the environment. Get unparalleled end-to-end visibility through advanced threat hunting mechanisms under one consolidated view across security layers. Intelligent EDR automatically detects lateral movement attacks, zero-day attacks, advanced persistent threats, and living off-the-land attacks.
  • 22
    Seqrite HawkkEye
    Up your cybersecurity game with an intuitive cloud-based platform that offers a holistic security posture to integrate your cybersecurity silos, make data-driven decisions, and manage all your individual point products from a single dashboard! Cloud-based management on a single console to consolidate multiple endpoint security abilities and operate faster. Real-time dashboards give insights into the security posture of your environment to prevent attacks before disaster strikes. Correlate data and alerts to create threat intelligence with actionable insights. Built to maximize business agility: Get rid of redundant workflows, save time and money with faster deployment, and simpler management. Superior user experience keeping in mind everyday business challenges and enabling easy navigation across products. Take remediation actions to ensure business security from advanced threats in real-time.
  • 23
    Seqrite Endpoint Security Cloud
    Seqrite Endpoint Security Cloud is a simple and comprehensive platform that lets you manage the security for multiple endpoints remotely from anywhere. Whether you’re on the move, at work or home, Seqrite EPS Cloud ensures complete security with easy manageability. Endpoint Security Cloud product by Seqrite allows small, medium and large-sized corporations to manage the security of their systems and operations from the cloud-based console. Seqrite Endpoint Security Cloud is a comprehensive digital solution to all your data security requirements. Our cloud-based endpoint security system does not require any hardware installation and provides complete security via advanced device control, DLP, asset management, etc. Seqrite’s all-inclusive cloud-based endpoint security tool is designed to be extremely user-friendly and does not need the technical expertise of a dedicated IT admin to operate. It greatly simplifies operations and is therefore ideal for small businesses as well.
  • 24
    Seqrite Linux AntiVirus
    Linux AntiVirus by Seqrite shields your Linux systems against malware. It offers real-time, on-demand and scheduled scanning, Samba Share protection, and complete web security. The software’s Advanced Device Control feature enforces complete governance over the use of removable storage devices, which helps to keep your system safe and secure. Our Linux antivirus features a user-friendly interface with comprehensive support for both 32-bit and 64-bit Linux distributions. Additionally, Seqrite Linux AntiVirus is one of the best antiviruses in the market today that offer comprehensive support to a range of Linux versions including Red Hat, Fedora, Ubuntu, Linux Mint, SUSE, CentOS, and BOSS. Our antivirus for Linux blocks phishing websites and other malicious online elements as well as restricts access to gaming and social networking websites. The Linux antivirus creates a safe ecosystem by controlling wireless and storage devices.
  • 25
    Z1 SecureMail Gateway
    25% of the 100 German companies with the highest turnover choose Zertificon. Z1 SecureMail Gateway is our highly automated Enterprise Email Encryption solution for effortless, secure communications with anyone, anywhere. Your entire organization encrypts and decrypts, just as well manages & verifies email signatures smoothly in the background. Z1 SecureMail Gateway requires minimal maintenance. And the browser-based admin interface needs no special skills. Keys are managed automatically & central policies enforce security. Integration is fast into your Cloud or On-premises email infrastructure. Your workflows and business are uninterrupted — no employee training needed plus frictionless experience for recipients. With Z1 SecureMail Gateway, encryption is centrally configurable and proofed against human error. You easily achieve and maintain compliance and the highest security standards. You also own all encryption keys and attain German-engineered data sovereignty with no backdoors.
    Starting Price: from $ 1.50 per user/per month
  • 26
    Zeek

    Zeek

    The Zeek Project

    Zeek (formerly Bro) is the world’s leading platform for network security monitoring. Flexible, open source, and powered by defenders. Zeek has a long history in the open source and digital security worlds. Vern Paxson began developing the project in the 1990s under the name “Bro” as a means to understand what was happening on his university and national laboratory networks. Vern and the project’s leadership team renamed Bro to Zeek in late 2018 to celebrate its expansion and continued development. Zeek is not an active security device, like a firewall or intrusion prevention system. Rather, Zeek sits on a “sensor,” a hardware, software, virtual, or cloud platform that quietly and unobtrusively observes network traffic. Zeek interprets what it sees and creates compact, high-fidelity transaction logs, file content, and fully customized output, suitable for manual review on disk or in a more analyst-friendly tool like a security and information event management (SIEM) system.
    Starting Price: Free
  • 27
    LOGIQ

    LOGIQ

    LOGIQ.AI

    LOGIQ.AI’s LogFlow provides centralized control of your observability data pipelines. As data streams arrive, they are automatically organized and optimized for your business teams and knowledge workers. XOps teams can centralize data flow management, gain data EPS control, and increase data quality and relevance. Built on any object store, LogFlow’s InstaStore enables infinite data retention and on-demand data replay to any target observability platform of your choice. Analyze operational metrics across applications and infrastructure and gain actionable insights that help you scale with confidence while maintaining high availability. Fuel business decisions and better user experiences by collecting, transforming, and analyzing behavioral data and usage patterns from business systems. Don’t let new attack techniques catch you off guard. Detect and analyze threat patterns from multiple sources and automate threat prevention and remediation.
  • 28
    Alibaba Cloud IDaaS

    Alibaba Cloud IDaaS

    Alibaba Cloud

    Alibaba Cloud Identity as a Service (IDaaS) is a cloud-based identity and access management service (IAM) covering comprehensive functions that enable user portal, user directory, flexible authentication, single sign-on, centralized authorization, and audit reporting. IDaaS plays a central role in enterprise identity management by removing ID silos and enabling one account-access-all function. IDaaS incorporates advanced security technologies that will facilitate identity management and enable enterprises to enhance their identity security to improve management efficiency. IDaaS supports all standard SSO protocols, which allows enterprises to connect to all mature enterprise services. Passwords are eliminated and security risks are reduced significantly. Users can painlessly and securely store dozens of passwords. IDaaS may serve as a bridge for other cloud platform identities to be connected to Alibaba Cloud.
  • 29
    Alibaba Cloud Firewall
    Cloud Firewall is one of the first SaaS firewalls deployed on the public cloud. It is your first choice for network security that safeguards your businesses in the cloud. Alibaba Cloud Firewall centrally manages the policies that control the traffic from the Internet to your businesses. It also controls the traffic between VPC networks, the traffic on Express Connect instances, and the traffic generated by VPN-based remote access. Cloud Firewall is embedded with an Intrusion Prevention System (IPS) and can detect outbound connections from your assets. Alibaba Cloud Firewall can also visualize network traffic and access between businesses as well as can store network traffic logs generated within the last six months. You can quickly activate Cloud Firewall without complex network configuration or image file installation. The firewalls are deployed in clusters to ensure high reliability. Smooth capacity expansion is supported.
  • 30
    Legit Security

    Legit Security

    Legit Security

    Legit Security protects software supply chains from attack by automatically discovering and securing the pipelines, infrastructure, code and people so that businesses can stay safe while releasing software fast. Automatically discover security issues, remediate threats and ensure the integrity and compliance of software releases. Comprehensive, visual SDLC inventory that's continually updated. Reveal unknown, misconfigured and vulnerable SDLC systems and infrastructure. Centralized visibility over location, coverage and configuration of your existing security tools and scanners. Catch insecure build actions before they can embed vulnerabilities downstream. Centralized, early prevention of sensitive data leaks, secrets and PII, before being pushed into the SDLC. Track security trends across teams and product lines to improve security posture and incentivize behavior. Get security posture at-a-glance with Legit Security Scores, Integrate your own alert and ticketing tools or use ours.
MongoDB Logo MongoDB