Best IT Security Software - Page 92

Compare the Top IT Security Software as of May 2026 - Page 92

  • 1
    Facctum

    Facctum

    Facctum

    Facctum is a next-generation compliance intelligence platform that enables financial institutions to detect, screen, and manage financial crime risks in real time. Leveraging AI and high-performance infrastructure, Facctum automates watchlist screening, sanctions compliance, name matching, and alert adjudication across customer and transaction data. Built for modern compliance teams, Facctum reduces false positives, accelerates decision-making, and integrates seamlessly into complex regulatory workflows via scalable APIs. Whether you’re a fintech, bank, or payments firm, Facctum delivers faster, smarter, and more accurate risk control — without compromise.
  • 2
    Pixee

    Pixee

    Pixee

    Pixee is an AI-powered automated product security engineer that integrates seamlessly into your development workflow, monitoring repositories and pull requests to provide high-quality fixes instantly. It triages scanner alerts from tools like Sonar, Snyk, and Semgrep, delivering code fixes and unlocking the velocity of GenAI-driven development. Pixee operates like a trusted specialist teammate, fitting into your workflow and current tooling without being a distraction, supporting languages such as Java, Python, JavaScript, Node.js, .NET/C#, and Go. It provides expert security context on each finding to filter out false positives, elevate true positives, and recommend actions, freeing your team from endless manual review. Pixee turns findings into actionable pull requests that developers can review and merge, enabling auto-remediation at scale without the grind.
    Starting Price: $29 per month
  • 3
    OpenCTI

    OpenCTI

    Filigran

    OpenCTI is an open source threat intelligence platform developed by Filigran, designed to help organizations collect, correlate, and leverage threat data at strategic, operational, and tactical levels. It provides a consolidated view of threat data from multiple sources, transforming raw data into actionable insights. It features a sophisticated knowledge hypergraph database, fully compliant with STIX standards, enabling deep context and relationships within threat intelligence. OpenCTI offers comprehensive visualizations and analytics, facilitating comparison and investigation within the knowledge graph. It integrates both technical and non-technical information into a unified system, linking each piece of threat intelligence to its original source for a complete analytical perspective. It also includes powerful case management capabilities, enhancing threat detection and response by centralizing incident-related data and fostering real-time collaboration.
  • 4
    OpenBAS

    OpenBAS

    Filigran

    OpenBAS is an open source breach and attack simulation (BAS) platform developed by Filigran, designed to help organizations plan, schedule, and conduct cyber adversary simulation campaigns and tests. It enables the creation of dynamic attack scenarios, ensuring accurate, timely, and effective responses during real-world incidents. With over 800 GitHub stars and more than 10 injectors, OpenBAS allows for customizable simulations tailored to various industry needs, evaluating both technical and human aspects of security posture. It integrates threat intelligence from OpenCTI, enabling dynamic customization based on the latest cyber threat insights, used techniques, and relevant adversary behaviors. OpenBAS facilitates team and technology evaluations regarding actual cyber threats and collaborative feedback on scenarios within the platform, enabling detailed analysis for a comprehensive review process.
  • 5
    Lumen Defender
    Lumen Defender is an AI- and ML-powered network threat detection and prevention service designed to proactively block evolving cyber threats at the network edge. Leveraging threat intelligence from Black Lotus Labs, Lumen's in-house threat research team, Defender analyzes over 200 billion NetFlow sessions daily to identify and intercept malicious activities such as malware, ransomware, phishing, and botnets before they can compromise business networks. Operating without the need for additional hardware or complex configurations, it integrates seamlessly with Lumen's Internet On-Demand services, providing real-time monitoring, customizable threat blocking based on severity levels, and detailed reporting through an intuitive web portal. Available in Essentials and Plus tiers, Lumen Defender offers features like automatic blocking of high-risk IP addresses, customizable allow/deny lists, and alert notifications, enabling businesses to enhance their cybersecurity posture efficiently.
    Starting Price: $0.04 per hour
  • 6
    Veille

    Veille

    Veille

    Veille is an advanced security platform designed to protect applications from AI-driven fraud, malicious bots, account takeovers, and automated attacks in real time. Its intelligent verification API helps stop suspicious signups and unauthorized access by analyzing multiple risk factors while maintaining a seamless user experience. Veille offers comprehensive features like device fingerprinting, bot detection, AI risk scoring, email intelligence, and behavioral analysis to safeguard platforms against abuse. The system is easy to integrate with just a few lines of code and continuously updates to counter emerging threats. With high uptime and a proven track record processing over 200 million requests, Veille ensures reliable and effective protection. Its flexible pricing plans cater to startups, growing teams, and large enterprises.
    Starting Price: $99/month
  • 7
    WebOrion Protector Plus
    WebOrion Protector Plus is a GPU-powered GenAI firewall engineered to provide mission-critical protection for generative AI applications. It offers real-time defenses against evolving threats such as prompt injection attacks, sensitive data leakage, and content hallucinations. Key features include prompt injection attack protection, safeguarding intellectual property and personally identifiable information (PII) from exposure, content moderation and validation to ensure accurate and on-topic LLM responses, and user input rate limiting to mitigate risks of security vulnerability exploitation and unbounded consumption. At the core of its capabilities is ShieldPrompt, a multi-layered defense system that utilizes context evaluation through LLM analysis of user prompts, canary checks by embedding fake prompts to detect potential data leaks, pand revention of jailbreaks using Byte Pair Encoding (BPE) tokenization with adaptive dropout.
  • 8
    WebOrion Protector
    WebOrion Protector is an enterprise-grade web application firewall (WAF) designed to deliver unmatched protection using the OWASP Core Rule Set (CRS). Built on the advice of the global OWASP community's leading experts in web application security, it leverages an intelligent anomaly-scoring, heuristics, and signature-based engine to defend against threats and exploits covered by the OWASP top 10 web application security risks. Rapidly respond to zero-day threats with seamless virtual patching and a powerful user interface built to streamline monitoring, analytics, and fine-tuning, with both entry-level and advanced users in mind. WebOrion Protector also comes equipped with specialized rulesets to protect login pages, WordPress sites, and more. It inspects all incoming and outgoing web traffic for your website with minimal performance impact.
  • 9
    APIVoid

    APIVoid

    APIVoid

    APIVoid is a powerful suite of cybersecurity APIs that enables seamless threat detection, analysis, prevention, and data enrichment through simple JSON‑based HTTPS POST requests. It includes specialized APIs such as IP reputation (70+ scanning engines, detection of proxy, VPN, TOR, hosting, and IP geolocation), domain reputation (30+ engines, domain age detection and risky category identification), URL reputation (70+ security checks for phishing and suspicious URLs, providing detailed insights), email verify (detection of fake, temporary and suspicious emails, flagging misconfigured domains), phone validator (number validation and normalization with international/E164 formatting, carrier and line‑type identification, and fake or abusive number detection), and site trustworthiness (assigning trust scores to websites to identify fraudulent or insecure web shops).
    Starting Price: $20 per month
  • 10
    Trapster

    Trapster

    Ballpoint

    Trapster is a complete Deceptive Security platform that uncovers intrusions by deploying convincing decoy systems within your network, luring attackers into revealing their presence. Its powerful detection capabilities are built on three key components: 1) Network-Based Honeypot Server: launches virtual machines on your Hypervisor or Cloud, supporting 15+ protocols. It detects scans and lateral movements, delivering real-time alerts via email, dashboard, webhooks, syslog, or API. Effortlessly auto-configured and maintenance-free for seamless integration. 2) Lures (Honeytokens): plants deceptive files, URLs, API keys, or database entries to trap attackers early. 3) External Login Panel: mimics authentic login interfaces to expose credential leaks before they’re exploited. Unlike traditional security tools, Trapster proactively identifies threats that evade conventional detection, empowering organizations to stay one step ahead.
    Starting Price: $1000/year
  • 11
    Axcient x360Recover
    Axcient x360Recover is an enterprise-grade backup, business continuity, and disaster recovery (BCDR) platform designed for MSPs, providing persistent, chain-free backups with industry-leading features like AirGap immutability, AutoVerify automated test restores, Local Cache–accelerated recoveries, and Virtual Office cloud virtualization. Its chain-free architecture stores backups as immutable ZFS snapshots, preventing degradation or reseeding even over long retention periods, and guards against ransomware and accidental deletion via a secure AirGap layer. AutoVerify conducts nightly boot-and-deep-volume backup integrity checks for recoverability assurance. Local Cache enables rapid bare-metal restores from on-prem block storage, and Virtual Office can instantly spin up entire offices or individual systems in the cloud for testing or live failover.
  • 12
    uqudo

    uqudo

    uqudo

    uqudo is MEA's leading digital identity platform, delivering end-to-end verification that safeguards every customer touchpoint. Our award-winning suite seamlessly integrates white-label KYC, KYB, AML Screening, Transaction Monitoring, and Biometric Authentication to embed trust into digital interactions. We empower enterprises and scaleups to accelerate digital transformation, slash operational costs, deliver frictionless user experiences, ensure regulatory compliance, and eliminate fraud. With proven expertise spanning Banking, Telecommunications, Fintech, Trading, and national identity programs, uqudo processes millions of verifications annually across the region.
  • 13
    HPE Serviceguard

    HPE Serviceguard

    Hewlett Packard Enterprise

    HPE Serviceguard for Linux (SGLX) is a high‑availability (HA) and disaster‑recovery (DR) clustering solution designed to maximize uptime for critical Linux workloads, on‑premises, in virtualized environments, or across hybrid and public clouds. It continuously monitors applications, services, databases, servers, networks, storage, and processes; upon detecting faults, it performs fast, automated failover, often within four seconds, without compromising data integrity. SGLX supports both shared‑storage and shared‑nothing architectures (via its Flex Storage add‑on), enabling highly available SAP HANA, NFS, or other services even where SAN isn’t available. The HA‑only E5 edition delivers zero‑RPO application failover with robust monitoring and a workload‑centric GUI, while the HA + DR E7 edition adds multi‑target replication, automated and push‑button site recovery, DR rehearsal, and workload mobility across on‑premises and cloud.
    Starting Price: $30 per month
  • 14
    Multiplier

    Multiplier

    Multiplier

    Multiplier is an identity governance and access management platform designed to embed seamless access request and provisioning workflows directly within Jira Service Management. It enables IT and security teams to automate approval processes, reduce manual provisioning, and enforce least privilege access at scale. Users can self-serve access requests through an internal app store integrated into Jira, improving employee satisfaction and speeding onboarding. The platform supports just-in-time access, allowing time-restricted permissions for applications and roles. Multiplier also automates quarterly access reviews to streamline audits and compliance with standards like SOC2 and ISO 27001. Its no-code workflow builder and integrations with major identity providers make it easy to manage user access, roles, and certifications centrally.
    Starting Price: $5/month/user
  • 15
    Allthenticator

    Allthenticator

    Allthenticate

    Allthenticator is a passwordless authentication platform designed to unify digital and physical access through a single smartphone-based identity. It enables proximity-based login to computers, websites, and servers, while also unlocking physical doors with the same device—eliminating passwords, tokens, and keycards. The platform supports SSH key signing, passkey logins, OTP management, and native integrations with identity providers like Azure AD and Okta. Admins manage everything from a centralized dashboard with role-based access and audit logs. Allthenticator also offers a decentralized credential recovery system, allowing users to back up identities with trusted peers instead of the cloud. Organizations using Allthenticator have reported 94% fewer password resets, 76% less time spent on access management, and up to 96% employee satisfaction
    Starting Price: $12/month/user
  • 16
    OpenText Core Endpoint Backup
    OpenText Core Endpoint Backup delivers a comprehensive, automatic data-protection solution for today’s distributed workforces by safeguarding Windows and macOS endpoints across any geographic distance or complex network topology. It centralizes backup management in a single console, automating forever-incremental snapshots and offering flexible restore options, including point-in-time recovery for individual devices or entire fleets. Industry-leading security features, AES 256-bit and RSA-4096 encryption with patented key management, ensure data remains protected both in transit and at rest, while built-in deduplication optimizes storage efficiency. Administrators benefit from streamlined deployment and policy control across the organization, regardless of size or environment, and can leverage geolocation tracking and remote-wipe capabilities to secure data on lost or compromised devices.
  • 17
    Security Blue Team

    Security Blue Team

    Security Blue Team

    Security Blue Team delivers practical, hands‑on defensive cybersecurity training and certifications designed to develop the skills of aspiring and established security professionals worldwide. Its core offerings include the Blue Team Level 1 Junior Security Operations certification, covering phishing analysis, digital forensics, threat intelligence, SIEM usage, and incident response across eight domains in approximately 30 hours; the Blue Team Level 2 Advanced Security Operations certification, focusing on malware analysis, threat hunting, vulnerability management, and advanced SIEM emulation over six domains in roughly 50 hours; and the SecOps Manager certification, which teaches planning, building, and maturing security operations teams through six comprehensive domains. Learners engage with gamified labs, biweekly challenges, and real‑world capstone projects via the Blue Team Labs Online platform to apply concepts in cloud environments and downloadable scenarios.
    Starting Price: $538.11 one-time payment
  • 18
    Zelt

    Zelt

    Zelt

    Zelt is a comprehensive, all‑in‑one human capital management (HCM) platform designed to manage the full employee lifecycle within a single, unified system. It centralizes employee data and automates workflows across HR, payroll, benefits, time‑off, performance, engagement, device provisioning, app access, and contractor management. With Zelt, teams can centralize onboarding, document storage, custom approval processes, reminders, and regulatory compliance; automate payroll processing, benefits enrolment and reconciliation, and global contractor payments; manage time‑off requests (including holiday, sick, WFH, parental leave) tightly integrated with payroll; oversee IT ops by provisioning and securing apps and devices, spotting inactive access, and remotely managing hardware; and facilitate people development through engagement surveys, performance reviews with anonymity features and automated timelines, and goal‑setting tools aligned to key results.
    Starting Price: $5 per month
  • 19
    CyberExam

    CyberExam

    CyberExam

    CyberExam is a cloud‑based cyber range platform that provides gamified, hands‑on cybersecurity upskilling from fundamentals to advanced scenarios, enabling individual and corporate users to develop skills in analysis, defense methods, and offensive techniques against real‑world threats. It delivers isolated, browser‑based virtual labs and microlearning environments where learners can practice vulnerability assessment, incident response, threat hunting, and red‑team operations directly within secure VMs, with no external infrastructure or portals required. Self‑paced modules span basic to expert levels, integrating interactive challenges, performance tracking, and analytics dashboards to measure progress and validate competencies. With 24/7 access, intuitive interfaces, and scalable architecture, CyberExam supports both solo learners and teams through customizable challenges, portfolio building via completed missions, and seamless corporate deployment for group training.
    Starting Price: $35 per month
  • 20
    Plexicus

    Plexicus

    Plexicus

    Plexicus is a cloud-native application protection platform that secures the software supply chain from code development to production environments. It uses agentless, open-source-powered scanning technology to detect vulnerabilities in codebases early and continuously. Plexicus’s AI-driven system enriches vulnerability reports with detailed analysis, impact assessment, and contextual insights. Its AI agent then automatically generates fixes and pull requests, streamlining the remediation process. Compared to traditional methods, Plexicus significantly reduces detection and remediation times, saving developers time and costs. Trusted by leading organizations, Plexicus helps DevSecOps teams enhance security with a seamless, automated workflow.
    Starting Price: $50/developer/month
  • 21
    Steganos Data Safe
    Steganos Data Safe is a secure, future-oriented digital vault that lets users create encrypted safes in minutes and store all kinds of sensitive files with strong, state-of-the-art 256-bit AES-GCM encryption accelerated via AES-NI. Safes automatically scale in size without wasting space, can be synchronized with cloud services (auto-detecting Dropbox, Microsoft OneDrive, Google Drive, and any other cloud), and support shared network safes that allow simultaneous write access by multiple users. Integration exposes opened safes as drives usable from any program, including on ARM devices, and portable safes can be created on USB sticks or optical media, so data remains protected even if the carrier is lost. Security is bolstered with TOTP two-factor authentication using standard apps (Authy, Microsoft Authenticator, Google Authenticator), a live password quality and entropy indicator.
    Starting Price: $29.95 per month
  • 22
    Bynn

    Bynn

    Bynn

    Bynn is an AI-first identity verification and anti-fraud platform that streamlines KYC, KYB, AML, and related compliance by automatically verifying individuals and businesses at a global scale with real-time risk assessment. It recognizes and extracts data from over 14,000 identity document types across 200+ countries, combines live document capture, certified face match, and liveness detection to defeat deepfakes, and applies AI-driven forensic analysis to detect manipulation, forged elements, and synthetic identities. Business verification is similarly automated, onboarding entities via intelligent document ingestion, ownership verification, and automated compliance decisioning with the option of human-in-the-loop review. Continuous AML screening, proxy and anonymous IP detection, age and utility bill verification, and an advanced customer risk profiling layer to prevent evolving fraud while preserving conversion by reducing unnecessary drop-offs.
  • 23
    IBM i Security Suite

    IBM i Security Suite

    Fresche Solutions

    The Fresche IBM i Security Suite is a comprehensive, cloud-compatible security, auditing, and intrusion detection platform designed specifically for IBM i environments to protect against ransomware, cybercrime, and data theft by increasing governance, compliance, and operational efficiency. It monitors critical exposure points, including IFS files, network connectivity (ODBC, FTP, web apps, sockets), and exit points, providing real-time notifications, lockdown controls, and pre-defined compliance reports. The suite delivers centralized management through a modern dashboard with visual monitoring, privilege escalation configuration, network access controls, and over 360 built-in compliance reports, while offering user profile management, access escalation, inactive session lockdown, and privileged access oversight to safeguard assets. Advanced capabilities include intrusion detection with SIEM integration, and field-level encryption/masking with sensitive field identification.
    Starting Price: $833 per month
  • 24
    Airia

    Airia

    Airia

    Airia’s enterprise AI orchestration platform seamlessly integrates with existing systems and data sources, offering a no-code agent builder for rapid prototyping, pre-built connectors for unified data integration, intelligent AI operations that optimize performance and costs through smart routing and centralized lifecycle management, and enterprise-grade security and governance with detailed audit capabilities and responsible AI guardrails. Model-agnostic and vendor-neutral, it supports flexible deployment across shared or dedicated cloud, private cloud, and on-premises environments, enabling both technical and business users to build, deploy, and manage secure AI agents at scale without complex installation or migration. Its intuitive interface and unified platform transform workflows across functions, from engineering and IT to finance, legal, marketing, sales, and support, so organizations can accelerate AI initiatives with confidence and compliance.
    Starting Price: $49 per month
  • 25
    Atmantara

    Atmantara

    Atmantara GmbH

    Atmantara is an enterprise AI infrastructure platform built for financial institutions, banks, insurers, and fintechs, to deploy and scale custom ML models securely and efficiently. Designed for regulated, data-rich environments, Atmantara streamlines the full ML lifecycle from ingestion to production through a unified, developer-friendly platform. Prebuilt & custom models for: • Fraud Detection • Credit Risk Scoring • Churn Prediction • Claims Automation • Debt Collection • Portfolio Optimization • Regulatory Compliance • Payment Optimization • Document Understanding • Customer Insights With real-time pipelines, secure model deployment, and full auditability, Atmantara lets your teams operationalize AI with speed and confidence.
    Starting Price: $199/month
  • 26
    Tenable AI Exposure
    Tenable AI Exposure is an agentless, enterprise-grade solution embedded within the Tenable One exposure management platform that provides visibility, context, and control over how teams use generative AI tools like ChatGPT Enterprise and Microsoft Copilot. It enables organizations to monitor user interactions with AI platforms, including who is using them, what data is involved, and how workflows are executed, while detecting and remediating risks such as misconfigurations, unsafe integrations, and exposure of sensitive information (like PII, PCI, or proprietary enterprise data). It also defends against prompt injections, jailbreak attempts, policy violations, and other advanced threats by enforcing security guardrails without disrupting operations. Supported across major AI platforms and deployed in minutes with no downtime, Tenable AI Exposure helps organizations govern AI usage as a core part of their cyber risk strategy.
  • 27
    SOCLabs

    SOCLabs

    SOCLabs

    SOCLabs is an interactive cybersecurity training platform for security operations teams, detection engineers, and blue team defenders. It transforms theory into practical skills by providing realistic environments, authentic threat data, and hands-on exercises. Key features include the world’s first Detection Challenge module, where users write and test rules using real attack datasets. It supports major SIEM query languages such as Sigma, Splunk, Elastic, and OpenSearch, with one‑click validation and accuracy checks based on the MITRE ATT&CK framework. The Learning System offers step‑by‑step courses, from basic defense tools to enterprise‑level architecture, with interactive labs and scenario challenges. The DetectionHub enables continuous log analysis and query testing, while the Collaborative Ecosystem connects global experts to share data, contribute rules, and solve threats together.
    Starting Price: $10/month
  • 28
    Tesseral

    Tesseral

    Tesseral

    Tesseral is the open source platform for managing identity and access in business software. It provides enterprise-grade capabilities, including SAML single sign-on, SCIM provisioning, role-based access control, managed API keys, and audit logs, implemented in just a few lines of code. Tesseral unifies access management for employees, customers, services, and AI agents, giving organizations the flexibility to adapt to any deployment model and the authority to enforce security policies with precision. You can learn more by reading our docs or by checking out our GitHub.
    Starting Price: $0
  • 29
    InterceptSuite

    InterceptSuite

    InterceptSuite

    InterceptSuite is a comprehensive MITM proxy and TLS interception tool designed for security professionals, developers, system administrators, and network engineers. It features advanced SOCKS5 proxy capabilities with Python extension support, allowing users to write custom protocol dissectors and analysers for any TLS-encrypted protocol. The platform offers cross-platform compatibility across Windows, macOS, and Linux, with both free open-source and professional editions available. Key features include TLS packet interception, Universal TLS Upgrade Detection for protocols like SMTPS, IMAP, PostgreSQL TLS, and STARTTLS, plus PCAP file export for analysis with external tools like Wireshark.
    Starting Price: $10/month
  • 30
    S4E

    S4E

    Security For Everyone

    S4E is a SaaS platform that helps businesses manage their IT systems and protect their data efficiently. It provides a centralized dashboard where you can monitor all devices, servers, and services in one place. Automated alerts notify you immediately if something goes wrong, allowing your team to respond quickly and reduce downtime. The platform includes tools for threat detection, IT task management, and reporting, making it easier to track performance and maintain system security without juggling multiple tools. Users can integrate S4E with commonly used software and customize notifications, reports, and access controls according to their company’s needs. S4E is designed to be simple enough for small and medium-sized businesses to use without dedicated IT staff while still providing the functionality required by larger teams. By centralizing IT and cybersecurity management, S4E saves time, reduces errors, and helps businesses keep their operations running smoothly and securely
    Starting Price: $19/month
MongoDB Logo MongoDB