Best IT Security Software - Page 34

Compare the Top IT Security Software as of May 2026 - Page 34

  • 1
    MyDiamo

    MyDiamo

    Penta Security Systems Inc.

    Developed by Penta Security Systems, an APAC leader in encryption technology and web application firewall, MyDiamo is a free open-source database encryption solution, available to all for non-commercial use. The commercial license is available for enterprises and organizations that desire extended features.
  • 2
    MemberSpace

    MemberSpace

    MemberSpace

    Simply lock access to any page of your website then choose what people pay to get in. Create memberships for anything you want like courses, video tutorials, member directories, and more while having 100% control over the look & feel. We believe anyone should be able to build and run a membership site. You shouldn't need to hire a developer or have technical skills. So we've designed MemberSpace to be easy and simple for non-technical people to launch and grow a membership business on any website.With MemberSpace, you have 100% control over the design and member experience because everything occurs on your website without your members having to leave. They can sign up, login, access your content, or manage their account - all seamlessly within your existing site.
    Starting Price: $25 per month
  • 3
    Prot-On

    Prot-On

    Cognicase Management Consulting

    All copies of the document will be protected with strong encryption regardless of where they are stored; Devices, Cloud Services, USB. Every time users try to open the protected document Prot-On will check if they are authorized to do so and what type of access they have. You can check the activity log to see who has accessed your document, and change permissions even after the file has been distributed.
    Starting Price: €10 per month
  • 4
    Shufti Pro

    Shufti Pro

    Shufti Pro

    Shufti Pro is a user-friendly identity verification software that fills the gaps between clients and their consumers. It offers end-to-end identity verification services to businesses by providing them a safe and hassle-free platform to verify identities of their consumers or users in less than a minute, all aimed to deter and prevent, among other use-cases, fraudulent activities, online theft, and identity scams, and ultimately providing a reliable market place. Shufti Pro allows you to simply use the camera of your mobile device in real-time to capture and upload your selfie or a picture of your supported identity document to begin the process. With the OCR technology, data is extracted from the captured image and compared with the data provided to our systems. The two data sets are assessed meticulously, processed, correlated, and analyzed to generate results; all this is done in fraction of a minute.
    Starting Price: 0.20
  • 5
    JupiterOne

    JupiterOne

    JupiterOne

    JupiterOne is a cyber asset analysis platform every modern security team needs to collect and transform asset data into actionable insights to secure their attack surface. JupiterOne was created to make security as simple as asking a question and getting the right answer back, with context, to make the right decision. With JupiterOne, organizations are able to see all asset data in a single place, improve confidence in choosing their priorities and optimize the deployment of their existing security infrastructure.
    Starting Price: $2000 per month
  • 6
    InterGuard Employee Monitoring

    InterGuard Employee Monitoring

    Awareness Technologies

    Use of employee monitoring software on company-provided devices is becoming a commonplace business practice as more and more organizations embrace the trend of allowing their workforce the flexibility to work from home, either as a full-time remote employee or as an office worker who sometimes works from home. There’s no playbook for remote work. Organizations must decide if keeping workers at home is right for them. Many companies began shifting to a work-from-home office years ago because there are many benefits to allowing employees to work remotely. Regardless of how the effects of the Coronavirus play out on the global workforce – remote work could be the new normal. The new remote work-from-home trend comes with a new set of challenges that did not exist when employees worked exclusively from the office. Employees are drawn to telecommuting because of the flexibility it provides, allowing them to maintain a better work-life balance.
    Starting Price: $8.00/month/user
  • 7
    WaZa MDM

    WaZa MDM

    WaZa MDM

    State of the art Device Management and Tracking platform. WaZa MDM lets you remotely manage your enterprise mobile devices. With our easy to use WaZa Management Console, get up and running in minutes. You can also track the mobile device and enforce Geofences from our user-friendly mobile device management console. Test drive WaZa MDM mobile device management and tracking platform for 30 days.. No credit card required.
    Starting Price: $1.25/month/user
  • 8
    Dhound

    Dhound

    IDS Global

    Your business is linked to critical infrastructure or sensitive data, and you understand the cost of a vulnerability that an attacker can find. You work under security regulations stated by the law to take certain security measures (i.e. SOC2, HIPAA, PCI DSS, etc.) and are required to conduct pentests by a third-party company. Your clients claim partnership only with reliable and secure solutions, and you keep your promises, guaranteeing your system security with the results of penetration testing. Pen test is an imitation of a real hacking attack but performed by security knights who fight for your web security with noble intentions. We conduct Penetration testing (also known as pen test or ethical hacking) so you can breathe out and be confident your system in safe hands. Unlike vulnerability assessment, ethical hacking at Dhound not just seeks vulnerabilities. It would be too easy for us. To stay ahead of adversaries, we apply hackers’ mindset and techniques but no worry!
    Starting Price: $30 per month
  • 9
    Sheetgo

    Sheetgo

    Sheetgo Europe

    Sheetgo is the no-code automation tool for teams. Create custom workflows to collect, manage and share data — all from a spreadsheet. From inventory management and financial forecasting to sales tracking and student attendance monitoring, you can build a tailor-made, automated system for any business process. Sheetgo works with Google Sheets, Excel and CSV files. Say goodbye to manual work and create an automated workflow today at sheetgo.com.
    Starting Price: $20/user/month
  • 10
    ManageEngine DataSecurity Plus
    ManageEngine DataSecurity Plus enables organizations to gain deep visibility and control into how sensitive data is stored and shared across the enterprise. It monitors file integrity, detects insider threats, tracks and controls file movement across USBs, email, and cloud apps, etc. The solution also supports automated incident response, file permission analysis, ransomware detection, and regulatory compliance, helping businesses maintain a resilient and secure data environment.
    Starting Price: $745/year
  • 11
    Compliance Aspekte

    Compliance Aspekte

    expertree consulting GmbH

    Compliance Aspekte is an intuitive and easy-to-use GRC solution for compliance management. The Compliance Aspekte SCM tool helps SMBs and large enterprises from different business domains implement ISMS and DSMS to comply with any standard, be it general or industry-specific. The solution supports GDPR, TISAX, ASPICE, B3S, ISO 9001, ISO 1400, ISO 22301, ISO 27001, ISO 27019, ISO 31000,BSI IT Grundschutz and counting. It’s a perfect fit for companies that want to: - receive more than just a compliance solution: - combine ISMS and DSMS; - have the support of any standard; - get an affordable pricing model; - use modern UX and UI; - have a flexible and customizable GRC tool.
    Starting Price: €55/user/month
  • 12
    baramundi Management Suite

    baramundi Management Suite

    baramundi Software USA

    Modular, scalable and highly cost-effective Unified Endpoint Management system for comprehensive IT management, security and workflow automation. Modules work together via a single database in a single user interface. Select any of 18 available modules now and add others as needed for OS Install & Cloning, Patch Management, Vulnerability Management, MDM, Remote Control, Inventory, VM Management, SNMP Device Management, Application Control, Disaster Recovery, Personal Backup and more.
    Starting Price: $5000.00/one-time
  • 13
    Xeams

    Xeams

    Synametrics Technologies

    Xeams is, a secure and powerful complete mail server for Windows, Linux, Solaris, MacOSX and other flavors of UNIX. Xeams supports SMTP, POP3, and IMAP. It features a powerful spam filtering engine that eliminates up to 99% of junk email upon installation. The software offers a flexible approach to email, making it a very user-friendly server. Xeams can block 99% percent of all junk messages right out of the box. The filtering rules are fully customizable and get better as Xeams adapts to your email environment. IMAP and POP3 servers built right into the system to easily fetch emails from an email repository to a client's machine. Xeams can be used as an email firewall in front of another server, such as MS Exchange, or as a full email server requiring no other software to process emails. Use Xeams in front of your Office 365 infrastructure to gain additional filtering, reporting and archiving capabilities that you don't get with Office 365 alone.
    Starting Price: $20.00/year/user
  • 14
    Smart Transfer
    A cross-platform solution for all Android & iPhone data transfer needs. It effectively moves large data files to the new device within no time & that too, without any disconnections. Smartly connect smartphones or tablets through local Wi-Fi network or hotspot. Link up sender & receiver devices with the help of a unique & simple activation code. Voila! You have all your content on the new device. It permits you to easily transfer multiple content types including contacts, pictures, videos, audios, calendars, WhatsApp™ chats & more. All data is transferred over a safe & peer-to-peer channel without integration to any cloud network or servers. Smart Transfer app allows you to easily transfer content & manage data on the new device. Now switch phones in a carefree way to move files to another device without compromising quality & move data seamlessly. This mobile transfer app also supports different languages.
    Starting Price: $5 one-time payment
  • 15
    Password Depot

    Password Depot

    AceBIT GmbH

    Password Depot securely protects your passwords and documents from unauthorized access. Whether you work from home or at a large corporation access your passwords on your Windows, Android, iOS or macOS device. From now on, you will only need to remember one single password - for Password Depot. State-of-the-art security measures are in place to secure your sensitive data against external access by double encryption based on the highest security standard AES (Rijndael 256). All whilst remaining under your control as Password Depot functions as an on-premises solution. Our B2B solution "Password Depot Enterprise Server" offers straightforward implementation with no training required, as the software is self-explanatory at a cost-effective price. Collaborate securely on sensitive data across your organization and securely share passwords, documents, credit card details, and other confidential data with your team. Your IT department will cherish the Enterprise Server.
  • 16
    DropSecure

    DropSecure

    DropSecure

    With DropSecure, the keys to unlock your data are never shared with anyone you didn't intend to share with, including us. That means you get real privacy behind our military-grade encryption and file transfer technology. Discover the most secure way to share your documents. At DropSecure, it is our mission to empower you with technology that protects your digital valuables in a hassle-free manner. DropSecure protects your privacy and safeguards your data using military-grade algorithms before they leave your device. With end-to-end encryption, encrypted uploads, decrypted downloads, two-factor authentication, cryptographic keys, and zero knowledge transfers, we offer the ultimate technology to keep your data safe from the data centers. So whether you are an individual, business or enterprise, you are always aware of who has access to your sensitive documents. Most importantly, no one owns the keys to your documents apart from you, not even us.
    Starting Price: $10 per month
  • 17
    CloudfloorDNS

    CloudfloorDNS

    CloudfloorDNS

    Our Enterprise platform provides you with the power to manage your DNS & Domain related tasks in one easy to use secure interface. Powered by a fast and reliable Anycast DNS network with advanced DNS services to unleash the power of your internet presence. DNS is critical to your online performance and uptime. Slow DNS or DNS Outages can take your complete online presence down with it. Get insights on your DNS with our incredibly detailed stats and graphs.
    Starting Price: $480.00/year
  • 18
    RingCaptcha

    RingCaptcha

    RingCaptcha

    Validate leads and block bad actors with our reliable and simple SMS & Voice 2FA product, so you can engage your worldwide customers. RingCaptcha’s two-factor authentication (2FA) provides an initial screen to block fake leads while our backend code goes one step further, identifying and blocking suspicious requests and adding them to a blocklist to keep your business safe going forward. RingCaptcha can let you validate your leads so that your sales team knows which are real and which are fake. Review leads to identify your competition and prevent them from gaining inside knowledge about your business or driving up your CAC with fake leads. Capture user data to screen out repeat trial users that have no interest in actually purchasing your product and drive up costs. Get rid of freeloaders, get real leads! One click is often all it takes to initiate a sales process, use 2FA by SMS/Voice to ensure your leads are real - not careless.
    Starting Price: $9.00/month
  • 19
    Virus Vanish

    Virus Vanish

    DigitalBulls

    Virus Vanish is an antivirus program that ensure the device security in all aspects. It helps device to detect malicious files after scanning and removes all kinds of threat involved in it. It helps to improve the speed and performance of the device.
    Starting Price: $99
  • 20
    Wizuda

    Wizuda

    Wizuda

    Powerful Solutions to revolutionize how your organization shares data internally and externally. Designed with security, compliance and efficiency at its core, Wizuda MFT enables IT to manage the movement of critical data within your organization and with external parties, from one centralized solution. Wizuda MFT scales with your business and provides full end-to-end accountability of all file transfer operations. Provide people in your organization and clients with an easy, secure and compliant way to share sensitive data. With no file size limitations and encryption by default, using insecure alternatives such as USBs can be a thing of the past. Users have the added flexibility of sending emails with Wizuda either straight from their Outlook email or the secure web portal. Wizuda Virtual Data Rooms provide your business with a secure online repository for document storage, collaboration and distribution. Built with ‘privacy by design’, Wizuda VDRs can be set up in minutes.
    Starting Price: $9.99/month/user
  • 21
    Fluxguard

    Fluxguard

    Fox and Geese

    Fluxguard provides cloud-based website change monitoring. Locate errors, defacement, or other business-critical website changes, even on complex web apps or multi-page, multi-step sequences. Filter irrelevant changes. Create simple rules to alert business users and IT staff to web page changes that require investigation. Or delegate the analysis to one of our Solution Architects who will pre-screen results, optimize monitoring, and customize a change report. We utilize Natural Language Processing to simplify monitoring. This allows variation detection of a document’s extracted features, such as people, products, organizations, and so on. These insights can be leveraged to surface compelling dashboards and unique interrelationship analyses. Change summaries will be dispatched at once for staff remediation, analysis, or investigation. Receive detailed reports as soon as changes are detected.
    Starting Price: $25.00/month
  • 22
    SpectX

    SpectX

    SpectX

    SpectX is a powerful log analyzer for incident investigation and data exploration. It does not ingest or index data but runs queries directly on log files stored in file systems or blob storage. Local log servers, cloud storage, Hadoop clusters, JDBC-databases, production servers, Elastic clusters, or anything that speaks HTTP - SpectX turns any text-based log files into structured virtual views. SpectX query language is inspired by piping in Unix. An extensive library of built-in query functions allows analysts to compose complex queries and get advanced insights. In addition to the browser-based interface, every query can be easily executed via RESTful API, with advanced options to customize the resultset. This makes it easy to integrate SpectX with other applications in need of clean and structured data. SpectX easy-to-read pattern matching language can flexibly match any data, no need to read or write regex.
    Starting Price: $79/month
  • 23
    Barracuda WAF-as-a-Service
    Configuring traditional web application firewalls can take days of effort. But Barracuda WAF-as-a-Service—a full-featured, cloud-delivered application security service—breaks the mold. Deploy it, configure it, and put it into full production—protecting all your apps from all the threats—in just minutes.
  • 24
    WinLock Professional

    WinLock Professional

    Crystal Office Systems

    An ultimate security solution that lets you restrict access to various computer resources. It offers all features of the Standard edition, and includes security capabilities for power users and computer administrators: parental control, Internet restrictions, guest password, kiosk protection, remote access, USB authentication, desktop and webcam snapshots, and more. Powerful security solution that protects your computer against unauthorized use. All-in-one solution that enables you to control security aspects of Windows on a very low level. Create different protection schemes for each account in a multiple-user environment. For each user, WinLock will activate only the selected restrictions. Internet Explorer restrictions and website content filters are suited to control and protect Internet access. Supports most of the known browsers. Access WinLock in a secure way by USB flash drive. Turn any USB drive into a protection key for WinLock.
    Starting Price: $31.95/one-time/user
  • 25
    Ping Identity

    Ping Identity

    Ping Identity

    Ping Identity builds identity security for the global enterprise with an intelligent identity platform that offers comprehensive capabilities including single sign-on (SSO), multi-factor authentication (MFA), directory, and more. Ping helps enterprises balance security and user experience for workforce, customer, and partner identity types with a variety of cloud deployment options including identity-as-a-service (IDaaS), containerized software, and more. Ping has solutions for both IT and developer teams. Enable digital collaboration with simple integrations to these popular tools. Support your employees wherever they are with integrations to these popular tools. Deploy quickly with interoperability across the entire identity ecosystem. Whether you just want single sign-on (SSO) or a risk-based, adaptive authentication authority, starting off with a PingOne solution package lets you only pay for what you need, and gives you room to grow.
    Starting Price: $5 per user per month
  • 26
    CyberStrong

    CyberStrong

    CyberSaint Security

    CISOs of the Fortune 500 rely on CyberSaint's CyberStrong platform to achieve real-time cyber and IT risk management and continuous compliance from assessment to Boardroom. CyberStrong uses risk quantification, intuitive workflows, and executive reports to build cyber resilience through measurement and improved communication. Patented AI and ML automation eliminate manual effort, saving enterprises millions annually. The platform aligns cyber and business risk for faster, informed decision-making. Enterprises use CyberStrong as a competitive differentiator, mitigating even the most unprecedented risks while automating assessments across frameworks. CyberSaint is a Gartner Cool Vendor for Cyber & IT Risk Management, is named in Gartner's Security Operations, Cyber & IT Risk Management, and Legal & Compliance Hype Cycles, and won numerous awards including 2021 CRN Emerging Vendor, 2021 Cybersecurity Excellence Gold Winner, and 2021 Cyber Defense Magazine Global InfoSec Awards Winner
  • 27
    Perimeter

    Perimeter

    Perimeter

    Our Mission Is Simple: Deliver painless, real-time vendor risk management through one integrated platform - from onboarding to assessment to continuous monitoring. We give teams the tools they need to automate assessments, validate vendor responses, monitor risk continuously, and respond to issues before they escalate - all without adding headcount, complexity, or overhead. We were founded to fix the inefficiencies and blind spots plaguing traditional VRM programs - programs that are too slow to scale, too manual to trust, and too fragmented to protect against real-world threats.
  • 28
    Atatus

    Atatus

    NamLabs Technologies

    Atatus is a next-gen observability platform for modern, cloud-native systems, built for developers, DevOps engineers, and SREs who require deep visibility across applications and infrastructure. Trusted by organizations of all sizes and across diverse industries, Atatus provides a unified SaaS platform for comprehensive system monitoring. The platform combines metrics, logs, and traces to deliver full-stack observability across microservices, containers, and cloud environments. With distributed tracing, code-level performance analysis, and intelligent error detection, teams can pinpoint issues faster, understand system behavior, and minimize downtime. Atatus also delivers real-user experience and behavioral insights, helping teams connect application performance with how digital services are actually consumed.
    Starting Price: $49.00/month
  • 29
    Cato SASE

    Cato SASE

    Cato Networks

    Cato enables customers to gradually transform their WAN for the digital business. Cato SASE Cloud is a global converged cloud-native service that securely and optimally connects all branches, datacenters, people, and clouds. Cato can be gradually deployed to replace or augment legacy network services and security point solutions. Secure Access Service Edge (SASE) is a new enterprise networking category introduced by Gartner. SASE converges SD-WAN and network security point solutions (FWaaS, CASB, SWG, and ZTNA) into a unified, cloud-native service. In the past, network access was implemented with point solutions, managed as silos that were complex and costly. This hurt IT agility. With SASE, enterprises can reduce the time to develop new products, deliver them to the market, and respond to changes in business conditions or the competitive landscape.
    Starting Price: $1.00/year
  • 30
    SecurityMetrics Perimeter Scan
    Comprehensive Vulnerability Assessment Scan For Network Security. Vulnerability scans and network scans find top cybersecurity risks such as misconfigured firewalls, malware hazards, remote access vulnerabilities, and can be used for cyber security or compliance mandates like PCI Compliance (PCI DSS) and HIPAA. Add and remove your own targets through your Perimeter Scan Portal. You can mass upload scan targets and groups. You can group and label scan targets to make it easier to manage by location, network type, or unique circumstances at your organization. Run port scans on your most sensitive targets more frequently, test in scope PCI targets quarterly, or test designated IPs after changes to your network with simplicity. Vulnerability scanning reports list the target, vulnerability type, service (e.g., https, MySQL, etc.), and the severity of each vulnerability (low, medium, high).
    Starting Price: $99.00/one-time
MongoDB Logo MongoDB