Best IT Security Software - Page 95

Compare the Top IT Security Software as of May 2026 - Page 95

  • 1
    Certero for Mobile
    Certero for Mobile goes beyond standard MDM to deliver full management and security for your mobile workforce, from physical devices to the applications that run on them. Certero for Mobile is a highly automated MDM solution with intuitive administration settings and powerful security features for managing today’s mobile workforce. Certero for Mobile’s administration panel makes enrollment, configuration, integration, control and application management quick and easy and with minimal impact or disruption for end users. Comprehensive security features ensure valuable assets are protected and access to (or loss of) sensitive data is minimized. Certero for Mobile is also fully integrated into Certero’s Unified Platform, which means it can work holistically with all Certero ITAM and SAM solutions to provide complete end-to-end visibility of your devices and applications, all via a single, normalized data source.
  • 2
    minFraud

    minFraud

    MaxMind

    minFraud is a data return service that helps businesses prevent online fraud by providing risk scoring and risk data related to online transactions. Learn more about whether the minFraud service is right for your organization. The riskScore is generated in under half a second based on machine learning models and human review of network-wide fraud patterns. The data that feeds the riskScore consists of over 3 billion online transactions that the minFraud service screens annually for thousands of online businesses. When evaluating some types of online activity such as account logins, affiliate or incentivized traffic, or app installs, an IP address may be all you have. In these cases, the IP Risk Score allows you to check the IP risk to prevent bad activity. We recommend implementing our device tracking functionality to improve IP risk scoring.
  • 3
    PracticeProtect

    PracticeProtect

    PracticeProtect

    You don’t need a password manager. You need a cloud and data security platform purpose-built for accountants. From compliance to advisory, single sign-on and one click offboarding, Practice Protect is trusted by more accountants worldwide than any other data and password tool. Expand your practice, hire with confidence, operate remotely and support your teams wherever they are with upgraded login security, email protection and cyber threat training. It’s all built-in. With 50+ custom-built features and 6,000+ integrations, accounting firms are safer, and more scalable with Practice Protect. From up to 10x more encryption than retail password managers to compliance templates, security training and unlimited person-to-person support, Practice Protect is the complete cloud and cyber security platform for the modern accounting firm. Find out why more accountants choose Practice Protect than any other data security tool, worldwide.
  • 4
    MetaCompliance Security Awareness Training
    Easily automate Security Awareness Training, phishing and policies in minutes. As cybercriminals become increasingly sophisticated, cyber attacks are no longer a matter of if, but when. The challenge is that planning an effective security awareness campaign takes time and resource. Many resource-constrained organizations often struggle to provide even basic Security Awareness Training for their workforce, let alone develop a security awareness program that drives behavior change. Automated Security Awareness Training provides an engaging learning experience for end users, all year round, to ensure cyber security threats stay top of mind. MetaCompliance’s automated security awareness solution enables organizations to schedule their Security Awareness Training for the entire year and mitigate the risk of human-born error. Using a “set it and forget it” approach, automation of security training allows CISOs to save time and resources.
  • 5
    MetaCompliance Policy Management
    MetaCompliance Advantage is a policy management software that enables organisations to automate and manage the key tasks associated with user awareness and engagement for information assurance, including risk assessment, the measurement of organisation wide IT security posture and policy management. From creation and management to publishing and delivery, cloud-based policy management software enables organisations to measure and demonstrate the continuing improvements in awareness, and highlight areas that require attention before they pose a risk to security and compliance. The magic of the MetaCompliance policy management software lies in its unique ability to obtain employee attestation of staff policies. This avoids the need for management to chase staff participation and sign up, saving huge amounts of time. The software will encourage the user to electronically sign the policy through levels of insistence determined by you.
  • 6
    identiMetrics Biometric ID Management
    identiMetrics provides a flexible, unified biometric ID management platform allowing hygienic single sign-on ID for administrative applications. dentiMetrics works with all the leading education software companies. Our award-winning biometric finger scan identification platform uses a single common database for tardy, daily & meeting attendance, food service operations, library & media center, emergency evacuations, staff time & attendance, book store, for dances & athletic events - everywhere when accurate identification is required. identiMetrics simplifies the school day with efficient, accurate, and hassle-free accounting. From seasoned staff down to the kindergarten students, identiMetrics is 100% accurate, safe and secure. As for our customer support and services - our only option is excellence. identiMetrics is a proud signatory of the Student Privacy Pledge.
  • 7
    Ravelin

    Ravelin

    Ravelin Technology

    Make smarter decisions on fraud and payments. Target the specific fraud issues you’re facing with a solution built around your business. Prevent fraud with a combination of technologies. Streamline operations and let machines do the dirty work. Use link analysis to predict and block fraudulent orders. Create and adjust rules to suit your business priorities. Check user details against our database of known fraudsters. Our platform adapts to your fraud challenges. We offer proven solutions, clear analysis and informed recommendations to combat the fraud you have today. And whatever might come tomorrow. We make payments simple for merchants and PSPs. Get better control over the authentication process with our fully-certified 3DS Server and SDKs. Used with our fraud detection, we stop bad actors and ensure your customers have the best experience.
    Starting Price: $1300.00/month
  • 8
    Lunio

    Lunio

    Lunio

    Lunio, formerly PPC Protect automates click fraud protection. We analyze traffic behavior across all acquisition channels and apply that analysis to protect those channels. Ensure you only pay for clicks that have a high probability to convert, excluding traffic that we know to be fraudulent or invalid. We use cybersecurity techniques to analyze traffic behaviors on all networks and apply learnings from those analyses to all other networks. Every month, we plant thousands of trees on behalf of our users to help combat the effects of climate change. Built with privacy as a given, ensuring compliance with existing and pending privacy regulations across all networks. Our cybersecurity experts and data scientists use a combination of location and behavior to determine the threat level of traffic to all your paid acquisition channels. Traffic analysis from one channel can be applied to all, providing a robust layer of ad protection that continuously learns.
    Starting Price: $29 per month
  • 9
    Vade

    Vade

    Vade Secure

    Vade is a global leader in predictive email defense, protecting 1 billion mailboxes in 76 countries. We help MSPs and SMBs protect their Microsoft 365 users from advanced email security threats, including phishing, spear phishing, and malware. ISPs, MSPs, and SMBs choose Vade's email security solutions to protect their users and their businesses from advanced cybersecurity threats, including phishing, spear phishing, and malware. Whether we’re protecting consumers through leading ISPs, or business through our MSP partners, our AI-based email security solutions are designed to detect the undetectable. Block dynamic phishing attacks that bypass traditional solutions. Block targeted spear phishing & business email compromise attacks. Block evasive polymorphic and zero-day malware attacks.
  • 10
    Whistic

    Whistic

    Whistic

    The best way to assess, publish, and share vendor security information. Automate vendor assessments, share security documentation, and create trusted connections—all from the Whistic Vendor Security Network. Once companies start using Whistic, they can’t imagine how they managed vendor security assessments or responded to questionnaire requests before. Avoid the black box security reviews of the past by openly sharing vendor security requirements and publishing profiles. Focus on establishing trust rather than chasing down spreadsheets. Initiate assessments, assign inherent risk, engage vendors, calculate risk scores and trigger reassessments—automatically. In the fast-paced business environment we’re living in, no one has time for the slow, outdated security review processes of the past. Access the security posture of thousands of businesses immediately with Whistic.
  • 11
    AlertSite

    AlertSite

    SmartBear

    AlertSite is the 'Early Warning System' you can trust to monitor your websites, web apps, and APIs from all over the world and within your private networks. You shouldn't be burdened by the fear and the consequence of whether an alert is real or false. AlertSite monitors your UI and API layer for availability, performance, and functionality without the alert fatigue of other monitoring tools. Creating Web and API monitors in AlertSite is intuitive and effortless. Codelessly add new web monitors with DejaClick, our point-and-click web recorder, and API Monitors in just a few clicks using an API Endpoint URL or OpenAPI Specification file. Or, reuse test cases like Selenium Scripts or SoapUI tests to create new monitors. Don't let false alerts and erroneous data cloud your visibility into application health.
  • 12
    Cisco Vulnerability Management
    A tidal wave of vulnerabilities, but you can’t fix them all. Rely on extensive threat intel and patented prioritization to cut costs, save time, and keep your teams efficiently focused on reducing the biggest risks to your business. This is Modern Risk-Based Vulnerability Management. We created Risk-Based Vulnerability Management software and now we’re defining the modern model. Show your security and IT teams which infrastructure vulnerabilities they should remediate, when. Our latest version reveals exploitability can be measured, and accurately measuring exploitability can help you minimize it. Cisco Vulnerability Management (formerly Kenna.VM) combines real-world threat and exploit intelligence and advanced data science to determine which vulnerabilities pose the highest risk and which you can deprioritize. Spoiler alert: Your mega-list of “critical vulnerabilities” will shrink faster than a woolen sweater-vest in a hot cycle.
  • 13
    OS-Easy MMS

    OS-Easy MMS

    OS-Easy Cloud

    The first operation platform for system protection, restoration and Add Clone of Mac computer lab. Mac OS is based on rock-solid and long-tested UNIX, which is featured by excellent stability and advanced Internet standards support. In addition, with the superiority of multicore Intel processors and high-speed flash, it can complete various tasks in high speed and has excellent graphics processing ability. Mac OS is more and more frequently applied in graphics processing & design, video editing, special effects production, model design, animation production etc. for professional use. Mac computer lab gradually became the rigid demand of infrastructure construction for school. Mac is more and more widely used in school. While for many teachers who manage Mac computer lab for the first time, daily maintenance is a headache work, they have to figure out a solution to the problems.
    Starting Price: $29 one-time payment
  • 14
    Internet Lock

    Internet Lock

    TopLang Software

    Internet Lock is an access control and password protection solution for your internet connections and internet programs. With Internet Lock, you can fully control the internet connections and programs on your computer. By using Internet Lock, you can restrict or password protect internet access, schedule internet access, protect internet programs on certain IP addresses or domains, limit users to access only the websites you specified, or keep them from accessing unwanted websites. You can use Internet Lock to restrict internet connections and programs. Programs blocked by Internet Lock will not be able to access the internet. You can use Internet Lock to password protect internet programs and connections. Users must provide correct password in order to use the protected programs to access internet. When a password protected program tries to connect to internet, Internet Lock pops up a password window to ask user to enter password. If user couldn't provide the correct password.
    Starting Price: $29.95/one-time/user
  • 15
    Pirean Access: One

    Pirean Access: One

    Pirean Software

    We provide robust authentication and authorization services across web and mobile. Our Access: One platform protects high-value data, equity and IP across critical industries. We partner with some of the world’s largest organizations to protect their services globally. Delivered through our private cloud identity platform, we enable our customers to quickly realize identity services that: Provide a central point of control for managing identities and entitlements. Provide flexible access management, supporting single sign-on and strong user authentication. Deliver an agile and robust IAM API for extending the reach of your identity infrastructure. We are recognized for our innovation, our versatility and our focus on the end user.
  • 16
    Shift Claims Fraud

    Shift Claims Fraud

    Shift Technology

    Shift Technology’s Claims Fraud solution helps insurers detect and prevent fraudulent activity with AI-powered precision. By analyzing patterns across carriers, policies, and external data, it identifies suspicious claims in real time. The platform accelerates investigations, reduces false positives, and improves overall decision-making accuracy. With the Insurance Data Network, insurers gain a unique industry-wide view to uncover complex fraud schemes that would otherwise go unnoticed. Trusted by over 115 insurers worldwide, Shift has detected more than 13 million suspicious claims and saved billions in potential losses. Its technology empowers claims leaders, SIU teams, and executives to fight fraud faster and more effectively.
  • 17
    Haystax

    Haystax

    Haystax Technology

    Our platform analytically monitors threats and prioritizes risk — enabling leaders and operators to act with confidence when it matters most. Instead of starting with a massive pool of data and then mining it for usable threat intelligence, we first build a system for transforming human expertise into models that can evaluate complex security problems. With further analytics we can then automatically score the highest-priority threat signals and rapidly deliver them to the right people at the right time. We have also built a tightly integrated ‘ecosystem’ of web and mobile apps to enable our users to manage their critical assets and incident responses. The result is our on-premises or cloud-based Haystax Analytics Platform for early threat detection, situational awareness and information sharing. Read on to learn more!
  • 18
    Egress Intelligent Email Security

    Egress Intelligent Email Security

    Egress Software Technologies

    Intelligent Email Security. Our human layer security platform uses contextual machine learning, powerful encryption and analytics technologies to prevent human-activated data breaches, protect sensitive data (Egress Protect), and enable you to identify areas of risk across your email network. We use contextual machine learning and advanced DLP technologies to dynamically help employees make good security decisions. This includes detecting and preventing accidental and intentional data leaks, and ensuring the right level of protection is applied to sensitive data when it's shared with the correct recipients. We make email encryption easy using our simple plug-in or by automating protection based on your security policies. Our intelligent technology can determine the actual risk of a breach as data is shared to ensure the correct security and control is always applied. Our eDiscovery software delivers time-saving reporting and analytics across your email network.
  • 19
    MailChannels

    MailChannels

    MailChannels

    Secure and deliver email at scale. Use MailChannels to uncover bad actors and prevent spammers from taking advantage of your infrastructure. Monitor outgoing email messages for spam and unusual sending activity. Protect your customer inboxes against spam, phishing, and other email threats. A powerful, intuitive interface makes managing your customers simple and efficient. We operate across multiple clouds and minimize single points of failure to keep our services online, all the time. Get a real human response to your ticket within 30 minutes or less, 24/7/365. MailChannels Outbound Filtering is a cloud-based SMTP relay service which identifies and blocks spammers to ensure reliable email delivery. With Outbound Filtering, you can eliminate email delivery problems caused by IP address blocklisting. Automatically shut down compromised accounts and scripts to improve your security.
    Starting Price: $79.99 per month
  • 20
    ClrStream

    ClrStream

    Mithi Software Technologies

    29% of businesses that face a data breach end up losing revenue. And email is the #1 target of attack. Secure your email systems with ClrStream. A security and continuity solution for MS Exchange, Office 365, MDaemon, Postfix, Postmaster, Zimbra & other mail solutions. 88% of businesses experience data loss and email is the main culprit. An email scrubbing solution with guaranteed protection from Malware, Ransomware, Virus and Spam. Low latencies for mail delivery and a low rate of false positives. A peripheral, out-of-environment solution to mitigate DDOS attacks. A solution that can provide email Continuity when the primary mail server is unavailable or down. A solution offering with built-in redundancies and scale eliminating the need for a mail parking service. A cloud-based SaaS solution that helps de-congest bandwidth and eliminates management headaches.
  • 21
    Cyberwatch

    Cyberwatch

    Cyberwatch

    3CS meets the need for a national academic conference that focuses on cybersecurity education at the community college level. 3CS provides a forum for community college faculty and leadership to share new initiatives, model courses and programs, and effective practices. The National CyberWatch Center has model cybersecurity curricula available, including multiple degree and certificate programs. The National CyberWatch Center also examines and responds to cybersecurity curricular issues of interest to the larger security community. The National CyberWatch Center Digital Press was created to produce and disseminate collections of timely publications on topics related to cybersecurity education, research, and workforce development. One-stop shop for quality educational and training resources, discounted certification exam vouchers, webcasts, internships, and access to employers looking to hire.
  • 22
    SecureSheet

    SecureSheet

    SecureSheet Technologies, LLC

    SecureSheet takes the spreadsheet you already rely on and turns it into a secure, cloud-based solution designed specifically for compensation planning. Whether you’re managing merit increases, bonuses, incentives, or large-scale international programs, you can keep the familiar flexibility of Excel while gaining real-time collaboration, advanced security, and detailed reporting—all accessible from any browser. Because the platform uses a spreadsheet interface, your team can get started right away with no steep learning curve. Being fully cloud-based means updates are instant and data is available anytime, anywhere, with seamless single sign-on (SSO) integration. What sets SecureSheet apart is its patented security model, which allows you to control access at the sheet, row, column, or even cell level. This makes it possible to share one master sheet with hundreds or even thousands of users, while ensuring each person only views the data relevant to them.
    Starting Price: $15.00/month/user
  • 23
    Difenso

    Difenso

    Difenso

    The fruit of 5 years of research, the data protection we offer is the basis for a new approach to digital security. It is now major preoccupation for individuals, companies and organizations within the framework of harmonizing European Data Confidentiality laws. Organizations around the world are facing a dramatic increase in legal requirements to protect sensitive and private data. Companies that collect, process and store personal data and which infringe this regulation will face serious consequences. Although created by the EU, GDPR (General Data Protection Regulation) has an international scope, covering the personal data of European citizens and providers wherever the data is distributed worldwide.
  • 24
    SentryLogin

    SentryLogin

    Sentry Login

    Since 2001 Sentry has been the #1 Member System for Squarespace, Weebly, WordPress and more. Easy to install paywall and password protection for Weebly, Squarespace, Yola, Blogger, WordPress and more. Sentry is easy: it was created with non-programmers in mind. All login form and protection code is provided so all you have to do is Copy, Paste, and Publish. The built-in Sentry Integration Wizard guides you in setting up your subscription plans and takes you through the installation, too. Sentry is easy, but if you ever get stuck, our friendly staff responds quickly to your email help requests... for life! No one has better or faster support. Using the Header / Footer (skin) tools, you can easily set the appearance of Sentry's forms and pages to look more like your site. Better yet, let us create your skin branding for you! The service is free.
    Starting Price: $4.95 per month
  • 25
    Sepior

    Sepior

    Sepior

    Multiparty Computation (MPC) generates and uses keys in the form of distributed key shares – eliminating the existence of a complete key on any single device to eliminate single points of failure. Sepior provides next-generation key management technology that allows businesses to transact online with institutional-grade cryptocurrency wallets, private blockchains, and SaaS applications. Sepior is pioneering the industry transition to threshold cryptography, using multiparty computation (MPC) to address the need for data confidentiality, integrity, and availability of new and emerging online services. For cryptocurrency exchange providers and other institutional traders, Sepior solves the problem of securing the private keys associated with cryptocurrency stored in wallets, facilitating institutional-grade of wallet security for service providers and their customers. Sepior’s approach also dramatically reduces mining workloads and the complexity of on-chain operations.
  • 26
    StreamScan MDR

    StreamScan MDR

    StreamScan

    Network security is every bit as important to medium-sized companies as it is for multinationals. The fact is 1 out of 4 Canadian companies of all sizes will have their networks compromised each year. But until StreamScan, there were no effective cybersecurity solutions designed and priced specifically for small to medium-sized organizations. StreamScan’s Managed Detection & Response (MDR) service leverages our AI-powered network monitoring Cyberthreat Detection System (CDS) technology to provide enterprise-level protection at a price that will make sense to you. From the theft of IP to facility shutdowns, the risks to manufacturers’ IT and OT infrastructure are simply unacceptable. StreamScan is the first company to offer a Managed Detection & Response service that offers manufacturers enterprise-level protection at a price that makes sense. Healthcare and Pharma are prime targets for cybercriminals because of the value of their data.
  • 27
    FICO Falcon Fraud Manager
    Payment modes are evolving, with consumers demanding multiple methods to transact, involving credit cards, debit cards, prepaid cards, and digital payments including real-time, person-to-person, account-to-account, and wire transfers. The ability to defend against fraud from all payment channels goes to the core of maintaining customer trust and long-term loyalty. An extensible framework used by over 9,000 financial institutions worldwide. A containerized option facilitates ease of update, allowing you to adapt your fraud defenses rapidly as new features are added while RESTful APIs provides flexibility for data input. FICO’s industry-leading rules technology enables you to respond quickly to new threats as they arise and fine-tune to your organization’s strategies, policies, and practices.
  • 28
    KYC Portal

    KYC Portal

    Aqubix Ltd / Finopz

    KYC Portal focuses on streamlining and automating the back-office of any due diligence process. It allows you to define and manage all your regulatory and policy requirements within the system and it then provides the operational capacity to automate and manage the entire process from on-boarding relationship management all throughout the automation of ongoing aspects of KYC such as risk-based approach, reporting, document requests, automated risk-based questionnaires etc. KYCP hooks up with any 3rd party provider/s that you might choose on the market, giving you a centralised, due diligence workflow solution.
  • 29
    IceWarp

    IceWarp

    IceWarp

    The only office rule is, there is no office. Business email, TeamChat for project teamwork, real-time office document collaboration and online meetings. All in our secure cloud and for half the usual cost. Chat in teams organized around projects, upload files, mention coworkers, comment on posted emails, pin important posts. Integration with email enables sharing received messages directly to TeamChat room for colleagues‘ attention. Skyrocket your office work effectivity with Desktop Client and Desktop Office documents on Windows as well as Linux devices. Get the complete Suite, or choose only the app you need.
    Starting Price: $312.00/year/user
  • 30
    Technical Doctor

    Technical Doctor

    Technical Doctor

    Our HIPAA Compliant E-mail Service lets you Access E-mail, contacts, calendars and files from anywhere, anytime. Increase productivity by collaborating securely with coworkers, customers and suppliers. Save money by not having to purchase licenses, backup or Anti-virus software for your E-mail platform. Maintain data security with hosted E-mail in highly secure data centers with Firewall & Anti-Virus softwares. Mitigate Risk by protecting you against accidental or intentional deletion of E-mails by end users
    Starting Price: $25.00 per user per month
MongoDB Logo MongoDB