Best IT Security Software - Page 82

Compare the Top IT Security Software as of May 2026 - Page 82

  • 1
    Prancer

    Prancer

    Prancer

    Large-scale cyber assaults occur regularly, and most security systems are reactive to eliminate intrusions. Prancer’s patented attack automation solution aggressively validates your zero-trust cloud security measures against real-world critical attacks to harden your cloud ecosystem continuously. It automates the discovery of cloud APIs across an organization. It offers automated cloud pentesting, enabling businesses to quickly identify potential security risks and vulnerabilities related to their APIs and minimize false positives with correlated risk scoring. Prancer auto-discovers enterprise resources in the cloud and find out all the attack surfaces at the Infrastructure and Application layers. Prancer engine reviews the security configuration of the resources and correlates data from different sources. It immediately reports back all the security misconfigurations and provides auto-remediation.
  • 2
    DTonomy

    DTonomy

    DTonomy

    DTonomy is a leading security orchestration, automation, and response (SOAR) platform designed to help businesses in all industries to manage security alerts and automate incident response processes by collecting security data from various sources. Leveraging hundreds of built-in integrations and playbooks, the security team can easily achieve automation on mundane tasks and manage 10x more security risks with flexible dashboards and reports. The unique AI engine, including pattern discovery, adaptive learning, and intelligent recommendation, enables the security team to automatically correlate security risk to meaningful stories with guided response.
    Starting Price: $49 per month
  • 3
    F5 NGINX Plus
    The software load balancer, reverse proxy, web server, & content cache with the enterprise features and support you expect. Modern app infrastructure and dev teams love NGINX Plus. More than just the fastest web server around, NGINX Plus brings you everything you love about NGINX Open Source, adding enterprise‑grade features like high availability, active health checks, DNS system discovery, session persistence, and a RESTful API. NGINX Plus is a cloud‑native, easy-to-use reverse proxy, load balancer, and API gateway. Whether you need to integrate advanced monitoring, strengthen security controls, or orchestrate Kubernetes containers, NGINX Plus delivers the five‑star support you expect from NGINX. NGINX Plus provides scalable and reliable high availability along with monitoring to support debugging and diagnosing complex application architectures. Active health checks proactively poll upstream server status to get ahead of issues.
  • 4
    F5 NGINX App Protect
    A modern app‑security solution that works seamlessly in DevOps environments, helping you deliver secure apps from code to customer. Today’s application landscape has changed dramatically. Modern apps are microservices that run in containers, communicate via APIs, and deploy via automated CI/CD pipelines. DevOps teams need to integrate security controls authorized by the security team across distributed environments without slowing release velocity or performance. NGINX App Protect is a modern app‑security solution that works seamlessly in DevOps environments as a robust WAF or app‑level DoS defense, helping you deliver secure apps from code to customer. Seamlessly integrates strong security controls with NGINX Plus and NGINX Ingress Controller. Defends against many advanced threats and evasive attacks. Reduces complexity and tool sprawl while delivering modern apps. Create, secure, and operate adaptive applications that reduce costs, improve operations, and better protect users.
  • 5
    F5 NGINX Ingress Controller
    Streamline and simplify Kubernetes (north-south) network traffic management, delivering consistent, predictable performance at scale without slowing down your apps. Advanced app‑centric configuration – Use role‑based access control (RBAC) and self‑service to set up security guardrails (not gates), so your teams can manage their apps securely and with agility. Enable multi‑tenancy, reusability, simpler configs, and more. A native, type‑safe, and indented configuration style to simplify capabilities like circuit breaking, sophisticated routing, header manipulation, mTLS authentication, and WAF. Plus if you’re already using NGINX, NGINX Ingress resources make it easy to adapt existing configuration from your other environments.
  • 6
    Incogni

    Incogni

    Surfshark

    Thousands of companies are collecting, aggregating, and trading your personal data without you knowing anything about it. We make them remove it so your data stays secure and private. Data brokers create shadow profiles on you that include a frightening amount of personal details. These insights are then used by scammers, total strangers, insurance companies, banks, businesses, and even the government. Scammers often target victims using personal details such as income levels, health conditions, religious or political beliefs, and even the names of relatives and acquaintances – making data broker sites heaven for these criminals. Cybercriminals need details like your name, DOB, and SSN to steal your identity. Most data brokers collect many, if not all, of the data points these criminals are after. From follow-up emails that demand even more data to complicated forms, data brokers often make you jump through hoops to get your personal information off their databases.
    Starting Price: $5.79 per month
  • 7
    Foresiet

    Foresiet

    Foresiet

    Foresiet is a pioneer in cybersecurity that offer AI-enabled SaaS based Integrated Digital Risk Protection solution to predicts the cyber-attack. It comes with a One Click platform to simplify the process of identifying, prioritizing, and mitigating cyber risks across the complete supply chain. The solution provides 360-degree actionable intelligence with automated & continuous assessment of inside-out, outside-in and outside-out cyber view using Digital Risk protection (IDPRS) + External Attack Surface Management (EASM) + Threat Intelligence + Compliance ecosystem that predict and provide cyber hygiene analysis and measure cybers risk at runtime.
  • 8
    mxHERO

    mxHERO

    mxHERO

    The leading enterprise technology for email attachment security integrating your email and cloud storage services. mxHERO replaces email attachments with secure cloud storage links so that sensitive files are no longer sent and stored unprotected outside the organization - as they are in standard email. Email can expose sensitive content inside & outside the organization. mxHERO ensures that all email content is managed via client preferred content platforms. mxHERO automatically moves file attachments to cloud storage – keeping valuable digital files out of email – solving for content sprawl, version control, and file size issues. Reduces breach risks with in-flight or at-rest email assets. mxHERO's customers include major global brands and industry leading enterprises. Email is a major security problem but core to how business gets done. mxHERO's clients need to make their existing email more secure without introducing disruptive changes to their employees or customers.
    Starting Price: $5 month/user
  • 9
    Canopy

    Canopy

    Canopy

    Canopy is the only digital parenting app that detects and blocks pornography on every single website on the internet. It’s also the only one that alerts parents immediately when it detects sexting, so they address it in a conversation with their kids. With Canopy, parents can rest easy knowing their children are safe, no matter where their online adventures take them. Canopy uses advanced computing technology, including artificial intelligence and machine learning, to instantly recognize and filter out pornographic content online and on your child’s smartphone camera. Protects two million devices around the world. Keeps kids at thousands of schools safe online. Helps US law enforcement prevent digital crimes against children. Filter out inappropriate content on your kid’s smartphone, schedule breaks from screen time, and know if your kid has left home or school. And that’s just the beginning. Canopy gives families everything they need to thrive in the digital world.
    Starting Price: $7.99 per month
  • 10
    Delinea Privileged Behavior Analytics
    Know the warning signs of privileged account abuse. A sudden increase in privileged account access by certain users or systems. Atypical access to the most privileged accounts or secrets. A high number of privileged accounts are accessed at once. Accounts accessed at unusual times of day or locations. Privileged Behavior Analytics can quickly detect anomalous behavior and instantly alert your security team to a cyber attack or insider threat before a breach catastrophe happens. Delinea Privileged Behavior Analytics uses advanced machine learning to analyze activity on privileged accounts in real-time to detect anomalies and provide threat scoring and configurable alerts. Advanced machine learning analyzes all privileged account activity so you can spot problems and measure the extent of a breach. Reducing security risks to your organization by improving security saves your department time, money, and resources and maximizes your current investment.
  • 11
    Delinea Account Lifecycle Manager
    Seamless service account governance from discovery and provisioning through decommissioning. Non-human privileged accounts access services, applications, data, and network resources. Most service accounts fly under the radar of IT, expanding your vulnerable attack surface. Automate service account governance to provide security teams with central oversight and control. Increase accountability, consistency, and oversight of service account management. Control risky service account sprawl by automating and streamlining service account management. Gain a complete picture of your privileged attack surface and address the risk associated with service account lifecycle management. Account Lifecycle Manager helps manage service account sprawl and empowers you to manage and control service accounts with workflows and automated provisioning, governance, compliance, and decommissioning capabilities. Cloud-native architecture for rapid deployment and elastic scalability.
  • 12
    Delinea Server Suite
    Easily consolidate complex and disparate identities for Linux and Unix within Microsoft Active Directory. Minimize the risk of a breach and reduce lateral movement with a flexible, just-in-time privilege elevation model. Advanced session recording, auditing, and compliance reporting aid forensic analysis into abuse of privilege. Centralize discovery, management, and user administration for Linux and UNIX systems to enable rapid identity consolidation into Active Directory. Privileged Access Management best practices are easy to follow with the Server Suite. The results are higher levels of identity assurance and a significantly reduced attack surface with fewer identity silos, redundant identities, and local accounts. Manage privileged user and service accounts from Windows and Linux in Active Directory. Just-in-time, fine-grained access control with RBAC and our patented Zones technology. Complete audit trail for security review, corrective action, and compliance reporting.
  • 13
    Delinea Cloud Suite
    Simplify user authentication to servers from any directory service, including Active Directory, LDAP, and cloud directories such as Okta. Enforce the principle of least privilege with just-in-time and just enough privilege to minimize the risk of a security breach. Identify abuse of privilege, thwart attacks, and quickly prove regulatory compliance with a detailed audit trail and video recordings. Delinea’s cloud-based SaaS solution applies zero-trust principles to stop privileged access abuse and reduce security risks. Experience elastic scalability and performance, supporting multi-VPCs, multi-cloud, and multi-directory use cases. Single enterprise identity to securely log in anywhere. A flexible, just-in-time model with privilege elevation. Centrally manage security policies for users, machines, and applications. Apply MFA policies consistently across all your regulated and business-critical systems. Watch privileged sessions in real-time and instantly terminate suspicious sessions.
  • 14
    PC Matic

    PC Matic

    PC Matic

    PC Matic Pro's application whitelisting is a critical preventative layer of cyber-protection that resides on top of other endpoint security solutions. zero trust whitelisting solutions prevent hacking and cyber-attacks. Block all malware, ransomware, and malicious scripts from executing. Protect your business data, users, and network with our whitelist cybersecurity solution. PC Matic Pro represents a long overdue shift in the cybersecurity industry to absolute prevention. Today's threats to critical infrastructure, industry, and all levels of government demand nothing less. PC Matic Pro provides a patented default-deny security layer at the device that blocks all unknown executions without introducing headaches for IT. Unlike traditional security solutions, customer infections aren’t required to strengthen the whitelist architecture. Local overrides can be added after prevention with a focus on accuracy and without concern for responding to an already active infection.
    Starting Price: $50 per year
  • 15
    WALLIX MFA Authenticator
    WALLIX Authenticator offers strong, multi-factor authentication to protect access to IT, applications, and data, with a high-security connection wherever you are. The zero-trust principle requires proof of identity to enable access wherever you are. Prevent unauthorized access, reduce data breaches, and mitigate the risk of lateral movement to protect the entire IT environment without any technical constraints for users. Confirm the identity of your employees, partners, and contractors no matter where they are and reduce the risk of stolen passwords from phishing or other attack methods. Security made easy for remote workers and all digital interactions!
  • 16
    WALLIX Trustelem

    WALLIX Trustelem

    WALLIX Group

    WALLIX Trustelem is designed to make administration simple and intuitive. The web-based administration console enables IT staff to easily set up directory synchronization, manage life cycles of external user accounts and applications, create and adapt access rules, monitor activity, and audit access security. Keep control over your identities and data! The WALLIX Trustelem platform is hosted and operated by a trusted European cloud provider. Your data sovereignty and security are essential to ensure quality of service and to protect your company’s assets. Trustelem is designed for simplicity of user experience and administration, in both build and run phases. Security is at the heart of Trustelem's infrastructure, software and operations.
  • 17
    WALLIX BestSafe

    WALLIX BestSafe

    WALLIX Group

    Eliminate the need for user accounts with elevated permissions thanks to innovative endpoint privilege management. Achieve unparalleled security across all endpoints with permissions controlled at the application and process level – without impacting user productivity. Mitigate the risks of granting administrator privileges without overburdening your IT team. Endpoint Privilege Management applies the Principle of Least Privilege with seamless and granular application-level permissions control while empowering users to work efficiently. Block ransomware, malware, and crypto viruses from entering your network, even when users hold elevated privileges. Control privileges at the application and process-level and stop encryption operations with innovative endpoint protection technology. Enforce least privilege security efficiently, with no impact on user productivity and minimizing the need for IT intervention.
  • 18
    CyberFOX AutoElevate
    AutoElevate is a privileged access management solution designed specifically for MSPs and IT professionals. It helps organizations remove unnecessary admin rights while maintaining productivity and operational efficiency. The platform enables secure privilege elevation, ensuring users receive access only when it’s needed. AutoElevate integrates seamlessly into existing IT environments without disrupting workflows. It centralizes privilege management into a single, easy-to-use interface. By controlling access to critical systems, it reduces the risk of security breaches caused by overprivileged accounts. AutoElevate allows IT teams to secure endpoints while keeping users productive.
  • 19
    Armor XDR+SOC
    Continuously detect malicious behavior and let Armor's team of experts guide remediation. Manage threats and reverse the damage of exploited weaknesses. Collect logs and telemetry across your enterprise and cloud environments and leverage Armor's robust threat-hunting and alerting library to detect threats. Using open-source, commercial, and proprietary threat intelligence, the Armor platform enriches incoming data to enable smarter, faster determinations of threat levels. When threats are detected, alerts and incidents are created – you can rely on Armor's team of security experts around-the-clock to respond to threats. Armor's platform was built to take advantage of advanced AI and machine learning, as well as cloud-native automation engines to make all aspects of the security lifecycle simpler. Cloud-native detection and response with the support of a 24/7 team of cybersecurity experts. Armor Anywhere is integrated within our XDR+SOC offering with dashboard visibility.
    Starting Price: $4,317 per month
  • 20
    IDmelon Authenticator

    IDmelon Authenticator

    IDmelon Technologies

    IDmelon Authenticator, a mobile app available on Google Play and App Store, allows you to use your ubiquitous smartphone into a FIDO certified security key so as to easily and securely log into websites, online accounts, and apps on your PC. This means when you want to log into your accounts such as Microsoft or GitHub, instead of the traditional way of presenting your username and password, you add a layer of security by using your username and security key., which is an easier, stronger, and phishing-resistant way of authentication. In addition to it, IDmelon Admin Panel, which is a dashboard available on our website for login to manage users and security keys, enables organizations to deploy passwordless authentication within their companies overnight to protect their data and workforce.
    Starting Price: $5.99/user/year
  • 21
    Riot

    Riot

    Riot

    Albert achieves the impossible: teaching cybersecurity basics to your employees, in a way they love. The secret ingredient? The courses are chat-based, 5 minutes long, immersive and interactive. Set up your awareness program thanks to our vast catalog of courses covering everything from CEO fraud to tailgating. Courses are dynamically customized for each employee and sent all year long. Follow in real-time the rollout of your program directly from the dashboard, and easily find and ping the drop-outs. And export the overview as a CSV file for compliance purposes. Run a phishing drill to discover how your team would react when facing a phishing attack — while giving your employees the opportunity to practice in a safe environment. Over the past few years, phishing has evolved from spray-and-pray scams to highly-targeted attacks. Riot catalog includes a vast variety of scenarios, including spear phishing and CEO fraud.
    Starting Price: $5.89 per user per month
  • 22
    Amazon Fraud Detector
    Build, deploy, and manage fraud detection models without previous machine learning (ML) experience. Gain insights from your historical data, plus 20+ years of Amazon experience, to construct an accurate, customized fraud detection model. Start detecting fraud immediately, easily enhance models with customized business rules, and deploy results to generate critical predictions. Build, deploy, and manage fraud detection models without previous machine learning (ML) experience. Gain insights from your historical data, plus 20+ years of Amazon experience, to construct an accurate, customized fraud detection model. Start detecting fraud immediately, easily enhance models with customized business rules, and deploy results to generate critical predictions. Amazon Fraud Detector is a fully managed service enabling customers to identify potentially fraudulent activities and catch more online fraud faster.
  • 23
    Trustpage

    Trustpage

    Trustpage

    Hundreds of teams use Trustpage to automate questionnaires, share documents, manage security reviews, and more. Determine if vendors meet your security requirements and compare solutions to determine which tools you can trust with your data. No need for contractors to answer security questionnaires, leverage Trustpage's question-answering extension to complete entire questionnaires in minutes. Empower everyone on your team to accurately answer security questions when they source approved answers using the Trustpage browser extension. Beat out the competition when you streamline the review process and provide a seamless InfoSec experience from start to finish. Automate NDAs, gain visibility into the security process, and reduce back-and-forth between teams so deals move more quickly. Connect your Trust Center with Slack, Salesforce, and Hubspot to incorporate security processes into the tools your team is already using.
    Starting Price: $50 per month
  • 24
    LumenVox Voice Biometrics
    Using voice biometrics authentication, companies can provide a delightful customer experience without sacrificing security. LumenVox Voice Biometrics technology screens customers by comparing input voice audio to a collection of stored voice samples (“voiceprints”) that are known to be authentic or fraudulent. Just like a fingerprint, each voice is unique. This makes Voice Biometric Authentication an incredibly effective way to validate identity. LumenVox’s flexible voice biometrics technology can be deployed in the method of choice and gives organizations the ability to create a seamless and secure process to verify its customers. LumenVox Voice Biometrics not only creates a better user experience, but also reduces operational costs and strengthens security. Anti-fraud measures such as liveness detection provide an additional security layer.
  • 25
    KeeWeb

    KeeWeb

    KeeWeb

    Desktop apps look beautiful on each platform: macOS, Windows and Linux. You can open local files in desktop apps. Switch between dark and light themes, whichever you like more. Mark items with color and easily find them using the colors tab. Open several files, search for any entry, or view all items from all files as one list. Search works for all files, everything is done from one search box. Drop entry attachments and database files right into the app. Fields can be hidden when you need them, and they will be stored in memory in a more secure way than usual fields. Generate passwords of any desired length, with only the symbols you want. Refine search by specifying fields, searching passwords, and history and using powerful regular expressions syntax.
    Starting Price: Free
  • 26
    Smartlockr

    Smartlockr

    Smartlockr

    Smartlockr is a people-centric data security platform to easily enable secure email and file sharing for an entire organization. Smartlockr prevents data leaks by keeping user-friendliness in mind with everything we do. By eliminating the human error, we ensure your workforce is your strongest asset in preventing data leaks. Smartlockr can be customized for each organization, so that every employee can continue to work with the (email) systems they are used to. Smartlockr can be used with almost every operating system and device. It is available as a plug-in for Microsoft 365 (Outlook), it can be integrated into existing systems and an SMTP relay service can be used too. Even a combination is possible if required. Smartlockr can also be used to securely send and receive large files of up to 5 TB. Smartlockr is compliant with all privacy regulations and security standards like GDPR, ISO, NTA 7516.
    Starting Price: €0.42 / month / user
  • 27
    Remote Safely

    Remote Safely

    EPAM Systems

    Remote Safely is an extra layer of Zero-Trust security for mitigating residual risks associated with nature of remote work. Remote Safely combines multiple security controls such as AI-based risks detection, VDI and SOC workforce capabilities to offer the effective protection from data breaches caused by no- or low-tech attacks, for example, visual hacking. Remote Safely surpasses the current understanding of the zero-trust approach by only allowing access to critical data with continuous identity confirmation using biometric screening of the remote work environment. The solution verifies the identity of the person located in the camera view area via facial biometrics and detects suspicious events in order to protect data from being accessed and viewed by the wrong people. Remote Safely enables businesses to offer greater flexibility to their workforce, allowing their teams to focus on what they do best and trust their data is secure.
  • 28
    FOCAL

    FOCAL

    Mozn

    FOCAL by Mozn is a suite of products that leverage our powerful AI and machine learning technology to answer the challenges of AML compliance and Fraud Prevention in Emerging Markets. FOCAL Anti-Fraud is a suite of products that leverage powerful AI to address the increasing volume and complexity of Fraud in Emerging Markets. All-in-one AML compliance suite for financial institutions to confidently screen customers, monitor transactions and assess risk with powerful AI and seamless automation.
  • 29
    AP Lens

    AP Lens

    AP Lens

    AP Lens is a Sandbox Browser that isolates networks using DNS Whitelisting. We stop the attack before it reaches the network. What does AP Lens provide? - Web Filtering: Flexible and user-friendly content blocking. - Anti-Phishing: Stop look-alike domains with 100% accuracy. - Ransomware Protection: Isolate the network without affecting business applications. - Secure Remote Work: Enforce internet usage policies without VPN slowness. - No More 0-Day Attacks: Escape the limits of blacklisting with AP Lens Augmented Whitelist. - Compliant: AP Lens meets regulatory requirements requested by cybersecurity insurance policies. - One-Click Installation: No need for a lengthy setup process or updating from the user's side. - No Maintenance: Stop malware and phishing without continuous monitoring. Our team builds on over 20 years of experience in cyber security, cloud security, and information protection in industries such as private banking and the public sector.
    Starting Price: $5
  • 30
    FerrumGate

    FerrumGate

    FerrumGate

    FerrumGate is an Open source Zero Trust Network Access (ZTNA) project, that uses advanced identity and access management technologies to ensure secure access to your network and applications. With multi-factor authentication, continuous monitoring, and granular access controls. You can use it for Secure remote access, Cloud security, Privileged access management, Identity and access management, Endpoint security, IOT connectivity.
MongoDB Logo MongoDB