Best IT Security Software - Page 45

Compare the Top IT Security Software as of May 2026 - Page 45

  • 1
    Shieldoo

    Shieldoo

    Cloudfield

    Shieldoo is a next-gen private network for remote connection from anywhere built with a well-known open-source tool called Nebula. The Shieldoo secure network is a collection of nodes, a lighthouse, and an admin center. The user device is a node, the server is a node, the cloud stack is a node, and the LAN access box is a node. Two nodes discover each other through a lighthouse and then connect peer-to-peer. With Shieldoo, you can build a complex security infrastructure which is easy to use. A tailored wizard will guide you through the initial setup, and the usual administration is handled in the admin center. You pay only for users and servers seen in the network that month, and you always get the complete feature set: unlimited admin accounts, SSO, MFA, domain by your choice etc.
    Starting Price: $0,49 per hour/server/user
  • 2
    Deepinfo

    Deepinfo

    Deepinfo

    Deepinfo has the most comprehensive Internet-wide data and has been using this data for years to empower cybersecurity of all sizes of organizations worldwide. Deepinfo also provides comprehensive threat intelligence solutions, data, and APIs to top-notch cybersecurity companies. Deepinfo Attack Surface Platform empowers all sizes of organizations' security by providing actionable insights. An all-in-one attack surface solution built by an experienced team dealing with Internet-wide data for years.
    Starting Price: $20,000 per year
  • 3
    Sima

    Sima

    Active Witness

    Sima does more than just keep the bad guys out. Sima is a highly secure yet frictionless cloud-based Access Control reader. Sima has the ability to read both mobile credentials (QR codes) and facial biometrics. This allows the integrated cloud-based software to issue both single (QR only) and multi-factor (facial verification) for highly secure and customized facility access. We take your privacy very seriously. We use facial recognition technology to perform facial authentication. This allows us to verify identity and grant access to a location. Facial data will be stored on our servers only for the purpose of identification. Your personal data, including your face picture, will not be shared with third parties.
    Starting Price: Free
  • 4
    Arnica

    Arnica

    Arnica

    Put your software supply chain security on autopilot. Actively mitigate anomalies & risks in your development ecosystem, protect developers, and trust their code commits. Automate developer access management. Behavior-based developer access management with self-service provisioning in Slack or Teams. Continuously monitor and mitigate anomalous developer behavior. Identify hardcoded secrets. Validate and mitigate before they land in production. Go beyond SBOM and get visibility into all open-source licenses, infrastructure, vulnerabilities, and OpenSSF scorecards across your organization in minutes. Arnica is a behavior-based software supply chain security platform for DevOps. Arnica proactively protects your software supply chain by automating the day-to-day security operations and empowering developers to own security without incurring risks or compromising velocity. Arnica enables you to automate constant progress toward the least-privilege for developer permissions.
    Starting Price: Free
  • 5
    Salesforce Shield
    Salesforce Shield is a comprehensive data security and compliance solution designed to protect sensitive information across the Salesforce platform. It provides advanced tools to monitor user activity, encrypt data, track changes, and detect sensitive information in real time. With Event Monitoring, organizations gain granular visibility into user behavior, API activity, and system performance through detailed event logs. Platform Encryption allows businesses to encrypt sensitive data at rest while maintaining control over encryption keys and compliance requirements. Field Audit Trail extends data history tracking to strengthen integrity and support forensic-level compliance. Data Detect uses intelligent pattern matching to identify and classify sensitive information such as credit card numbers and personal identifiers. Together, these capabilities help organizations mitigate risk, meet regulatory standards, and securely deploy AI-powered solutions like Agentforce.
    Starting Price: $25 per month
  • 6
    Trend Micro Mobile Security
    Stay safe, no matter where you go or what you do. Enjoy advanced security and privacy. Live your mobile life more safely with powerful protection for all your mobile devices. Improve performance. Take advantage of optimization features to make your mobile devices work better. Avoid online scams and fraud. Flag malicious phishing emails and scam websites. Trust in experience. Enjoy peace of mind thanks to mobile solutions built on nearly 30 years of security expertise. Stop threats, rely on the cloud-based Smart Protection Network™ and mobile app reputation technology to stop threats before they can reach you. Surf anywhere and prevent mobile apps from loading dangerous and risky websites when you browse. Protects you against malicious apps, ransomware, dangerous websites, unsafe Wi-Fi networks, unwanted access to your device, and more. Optimize your mobile phone to keep it running at peak performance.
    Starting Price: Free
  • 7
    MYAndroid Protection
    For you, it’s impossible to use personal judgment as a factor as to which apps have malicious intent and which have not. Our technology enables malware protection, privacy control, backup & recovery, Protection against theft & losses, and credit card & Identity theft protection. By combining an easy-to-use graphical interface with award-winning, business-strength technology, and preconfigured settings, MYAndroid Protection makes getting started straightforward and keeps your security level high. Several apps have been found with embedded malware, these apps contain malware that can steal your private information, wipe your data, or could increase your bill by dialing and texting Premium rate numbers without your awareness. Spyware apps can track your location, read your mailbox and more. Scan your smartphone and make sure that your Android device is free of malicious software and kept that way.
    Starting Price: Free
  • 8
    Falco

    Falco

    Sysdig

    Falco is the open source standard for runtime security for hosts, containers, Kubernetes and the cloud. Get real-time visibility into unexpected behaviors, config changes, intrusions, and data theft. Secure containerized applications, no matter what scale, using the power of eBPF. Protect your applications in real time wherever they run, whether bare metal or VMs. Falco is Kubernetes-compatible, helping you instantly detect suspicious activity across the control plane. Detect intrusions in real time across your cloud, from AWS, GCP or Azure, to Okta, Github and beyond. Falco detects threats across containers, Kubernetes, hosts and cloud services. Falco provides streaming detection of unexpected behavior, configuration changes, and attacks. A multi-vendor and broadly supported standard that you can rely on.
    Starting Price: Free
  • 9
    V-OS Virtual Secure Element
    V-OS is V-Key’s core patented technology, a virtual secure element. It is a secure sandbox that is embedded within a native iOS or Android mobile app and creates a safe operating environment where data can be stored and cryptographic processes can be executed in isolation from the rest of the mobile app. In this video, we take a step back to introduce and explain the core of our technology, V-OS. With V-OS as the security foundation of your mobile application, your organization can build a wide range of solutions that are secure, trusted and scalable, and customized to your business needs. Layered tamper detection and response mechanisms. Patented cryptographic virtual machine. FIPS 140-2 Level 1 and Common Criteria EAL3+. Minimizes total costs of ownership. Faster market penetration with effortless over-the-air deployment. Flexible and extensible SDK framework. Eradicate costly hardware dependency.
    Starting Price: Free
  • 10
    V-Key Smart Authenticator
    Sign up for the V-Key Smart Authenticator today and get a one-month free trial. Businesses, like relationships, are built on trust. Are your employees working remotely? Do you have a large number of users who need to access your app or system? With organizations moving towards multi-factor authentication (MFA), a simple password is just not enough. Unfortunately, SMS OTPs have been proven insecure, being vulnerable to interception and phishing attacks. Hardware tokens are expensive to deploy, can get lost or stolen, are not user-friendly, and require regular replacement. The V-Key authenticator provides strong and flexible, yet less expensive multi-factor authentication using a mobile authenticator that is ideal for small and medium-sized businesses. The V-Key Smart Authenticator supports many enterprise apps, systems and VPNs. Enterprise-grade multi-factor authentication in 3 easy steps.
    Starting Price: Free
  • 11
    DuskRise

    DuskRise

    DuskRise

    Connected to the home Wi-Fi router, this IoT device creates a new secure network where potential threats are deterred with lightning-fast speed. Essential for the device set up process, the app also delivers security notifications and insights to raise the cyber-literacy of the end-user. The security dashboard provides complete visibility of the offsite networks and allows to enforce office-grade policy controls in the remote environment. The DuskRise solution is powered by the threat intelligence research and data analysis form the Cluster25 team. Mitigate threats through effective control and prevention filters with strong detection and response mechanics. Leverage on our proprietary AI algorithms to filter noisy network data and detect anomalous behavior on the spot. Form a secure network enclave, creating a segment you can own and secure on any network.
    Starting Price: Free
  • 12
    Binary Ninja

    Binary Ninja

    Binary Ninja

    Binary Ninja is an interactive disassembler, decompiler, and binary analysis platform for reverse engineers, malware analysts, vulnerability researchers, and software developers that runs on Windows, macOS, and Linux. Disassemble executables and libraries from multiple formats, platforms, and architectures. Decompile code to C or BNIL for any supported architecture, including your own. Automate analysis with C++, Python, and Rust APIs from inside or outside the UI. Visualize control flow and navigate through cross-references interactively. Name variables and functions, apply types, create structures, and add comments. Collaborate effortlessly with synchronized commits using our Enterprise product. Our built-in decompiler works with all of our officially supported architectures at one price and builds on a powerful family of ILs called BNIL. In fact, not just our architectures, but even community architectures can produce amazing decompilation.
    Starting Price: $299 one-time payment
  • 13
    OX Security

    OX Security

    OX Security

    Automatically block risks introduced into the pipeline and ensure the integrity of each workload, all from a single location. Full visibility and end to end traceability over your software pipeline security from cloud to code. Manage your findings, orchestrate DevSecOps activities, prevent risks and maintain software pipeline integrity from a single location. Remediate risks based on prioritization and business context. Automatically block vulnerabilities introduced into your pipeline. Immediately identify the “right person” to take action on any security exposure. Avoid known security risks like Log4j and Codecov. Prevent new attack types based on proprietary research and threat intel. Detect anomalies like GitBleed. Ensure the security and integrity of all cloud artifacts. Undertake security gap analysis and identify any blind spots. Auto-discovery and mapping of all applications.
    Starting Price: $25 per month
  • 14
    RST Cloud

    RST Cloud

    RST Cloud

    RST Threat Feed, RST Report Hub, RST Noise Control, RST IoC Lookup, RST Whois API are a subscription-based services delivered by RST Cloud. RST Cloud collects actual knowledge about threats from all the available public TI sources. Normalise, filter, enrich and score it and gives it to your SOC and SecOps team, or directly put to your security solutions in ready-to-use format. RST Cloud includes: - Intelligence data from more than 250 sources and more than 250 000 indicators each day, - AI-powered threat report library, - IOC data formatted in a unified and standardised format, - Filtered results to excluded high-volume false positives, - Enriched IOCs which become more helpful in investigations, - Scored IOCs based on their severity and actuality, - Enriching and filtering False Positives services for SecOps teams, - Out-of-the-box integration with various SIEM, SOAR, TIP, NGFW solutions.
    Starting Price: $50/month
  • 15
    Defense.com

    Defense.com

    Defense.com

    Take control of cyber threats. Identify, prioritize and track all your security threats with Defense.com. Simplify your cyber threat management. Detection, protection, remediation, and compliance, are all in one place. Make intelligent decisions about your security with automatically prioritized and tracked threats. Improve your security by following the effective remediation steps provided for each threat. Gain knowledge and advice from experienced cyber and compliance consultants when you need assistance. Take control of your cyber security with easy-to-use tools that can work with your existing security investment. Live data from penetration tests, VA scans, threat intelligence and more all feeds into a central dashboard, showing you exactly where your risks are and their severity. Remediation advice is included for each threat, making it easy to make effective security improvements. Powerful threat intelligence feeds are mapped to your unique attack surface.
    Starting Price: $30 per node per month
  • 16
    EthicalCheck

    EthicalCheck

    EthicalCheck

    Submit API test requests via the UI form or invoke EthicalCheck API using cURL/Postman. Request input requires a public-facing OpenAPI Spec URL, an API authentication token valid for at least 10 mins, an active license key, and an email. EthicalCheck engine automatically creates and runs custom security tests for your APIs covering OWASP API Top 10 list Automatically removes false positives from the results, creates a custom developer-friendly report, and emails it to you. According to Gartner, APIs are the most-frequent attack vector. Hackers/bots have exploited API vulnerabilities resulting in major breaches across thousands of organizations. Only see real vulnerabilities; false positives are automatically separated. Generate enterprise-grade penetration test reports. Confidently share it with developers, customers, partners, and compliance teams. Using EthicalCheck is similar to running a private bug-bounty program.
    Starting Price: $99 one-time payment
  • 17
    Cerberus

    Cerberus

    Searchlight Cyber

    Cerberus gives security teams and law enforcement secure, searchable access to 475 billion live and recaptured data points spanning dark web forums, ransomware groups, illicit marketplaces, and encrypted channels – including closed sources other platforms can't reach. The Cerberus solution includes: ‣ Searchable access to 475B+ live and recaptured data points, including leaked credentials ‣ Continuously updated ransomware group, IAB, and market dashboards ‣ Accelerate your investigations with the AI Research Assistant ‣ Stealth Browser – a built-in dark web virtual machine for anonymous investigation of Tor and I2P sources in browser ‣ Automated alerting and case management to monitor threat actors and activity relevant to your organisation ‣ AI-powered translation – purpose-built translation optimised for dark web content
  • 18
    Raptor Email Security

    Raptor Email Security

    Peregrine Computer Consultants Corporation

    Raptor Email Security is an MX-based email security solution designed by industry experts to stop spam, phishing, and malware attacks using a unique scoring framework and multiple technologies including SpamAssassin, ClamAV, MIMEDefang, and Sendmail. Let our experts handle the annoying spam for you! No Spam. Zero Tickets. 2X Resources. With your email going through our servers, we handle the brunt of most cyber attacks which keeps your server better protected! With less resource usage, you'll be able to increase your hosting revenue and monetize your server by adding more hosting accounts. Raptor Email Security also comes with Raptor Review which provides a detailed, expert analysis of your email configuration. It's a phishing hotline and white glove service to definitively fix your email problems including blocking spam, improving email deliverability, identifying scams, finding missing email, and unblocking good email. Set up in minutes. Free 30 Day Trial Available!
    Starting Price: $15/server/month
  • 19
    MacScan

    MacScan

    SecureMac

    Mac malware removal is essential these days. Malware authors are targeting Apple's macOS with increasing frequency and, although there’s more Mac malware activity now than ever before, many users are still unprotected against these threats. MacScan protects your mac from malware, scanning and removing it for much-needed security and privacy. MacScan 3 can seek out and destroy privacy threats such as blocklisted tracking cookies, leaving the rest of your browsing data in place, or free up valuable hard drive space by locating and removing unnecessary files left behind by web browsers. All of this is in addition to removing malware threats. An easy-to-use interface provides complete control over malware scans, featuring drag-and-drop scanning, a customizable cookie blocklist and allowlist, logs of previous scan results and activity, and more.
    Starting Price: $49.99 per year
  • 20
    FOFA

    FOFA

    Beijing Huashun Xin'an Technology Co., Ltd

    FOFA is a Search Engine for global cyberspace mapping. Through continuous active detection of global Internet assets, identifying most software and hardware network assets. Asset data supports external presentation and application in various ways and can perform hierarchical portraits of assets based on IP.
    Starting Price: Free
  • 21
    EasyControl MDM

    EasyControl MDM

    EasyControl

    Manage devices from anywhere to anywhere. Our MDM Pro solution with some of the common features available in the Pro version for up to 10 devices for 30 days for free. Fully featured MDM Solution. Scale your device management with more features and deliver seamless user experiences. Fully customized solution to manage your devices using unlimited possibilities including specialized features. Packaged as a turn-key solution that integrates into your business model. Secure your mobile assets from the hardware to the cloud wherever your business takes you. Your business depends on secure and protected hardware, personal user information, data, and intellectual property, and keeping the software and applications that you rely upon up to date. Secure devices from the hardware to the network. Stop malicious actors with advanced security tools. Easily restore, edit, or purge protected data with a tap. Whitelist what’s required and eliminate the rest.
    Starting Price: $1 per month
  • 22
    Akto

    Akto

    Akto

    Akto is an open source API security in CI/CD platform. Key features of Akto include: 1. API Discovery 2. API Security Testing 3. Sensitive Data Exposure 4. API Security Posture Management 5. Authentication and Authorization 6. API Security in DevSecOps Akto helps developers and security teams secure APIs in their CI/CD by continuously discovering and testing APIs for vulnerabilities. Akto's pricing is transparent on website. Free tier is available. You can deploy both self-hosted and in cloud. It takes only few mins to deploy and see results. Akto can integrate with multiple traffic sources - Burpsuite, AWS, postman, GCP, gateways, etc.
  • 23
    Google Cloud Operations Suite
    Integrated monitoring, logging, and tracing managed services for applications and systems running on Google Cloud and beyond. Cloud Logging is a fully managed, scale-out service that can transfer log data from platforms and applications, as well as custom log data from GKE environments, VMs, and other services into and out of Google Cloud. Get advanced performance, troubleshooting, security, and business statistics with Log Statistics, which integrates the power of BigQuery into Cloud Logging. Cloud Monitoring provides visibility into the performance, uptime, and overall health of cloud-based applications. Collects metrics, events, and metadata from Google Cloud services, hosted uptime polls, application instrumentation, and various common application components.
    Starting Price: $0.2580 per MiB
  • 24
    ESET HOME
    Get important security and license notifications. Have all the information about your security available anywhere you go. These days it’s normal to have information about every aspect of your life at your fingertips. The online protection of your family and home should be part of that. ESET HOME app provides you with comprehensive oversight of your complete internet security wherever you go, whenever you need it. Stay on top of things with numerous benefits at your disposal. Get important security and license notifications. Have all the information about your security available on the go. Check the security status of protected devices at all times. Download protection for new devices and instantly secure them against threats. Install security software for any Windows device without typing your license key or logging in. Add, manage and share licenses with family and friends, and control who else uses them.
    Starting Price: Free
  • 25
    ImmuniWeb Discovery
    Attack Surface Management and Dark Web Monitoring. ImmuniWeb® Discovery leverages OSINT and our award-winning AI technology to illuminate attack surface and Dark Web exposure of a company. The non-intrusive and production-safe discovery is a perfect fit both for continuous self-assessment and vendor risk scoring to prevent supply chain attacks. Attack Surface Management Detect, map and classify your on-prem and cloud IT assets Continuous Security Monitoring Detect misconfigured or vulnerable IT assets Vendor Risk Scoring Discover insecure third parties that process your data Dark Web Monitoring Detect stolen data and credentials, and compromised systems Brand Protection Detect online misuse of your brand and take down phishing websites
    Starting Price: $499/month
  • 26
    Fudo Security

    Fudo Security

    Fudo Security

    With Fudo, users can get access to Unix/Windows servers, applications, and devices quickly and easily. Users will not have to change their habits and can continue to use native clients like Unix Terminals, RDCMan, or Putty. They can also connect through the Fudo Web Client which only needs a web browser for access. Using the JIT feature, you can create access workflows that adhere to the zero-trust approach. Through the request management section, you can easily define and schedule when a specific resource is available to a certain user and control it accordingly. Fudo allows you to permanently monitor and record all the ongoing sessions for 10+ protocols, including SSH, RDP, VNC, and HTTPS. You can watch the session live or use the footage for post-mortem analysis. Both the server and end-user computers do not require any agents. Furthermore, Fudo offers the ability to join the session, sharing, pausing, and terminate, as well as great tools like OCR and tagging.
    Starting Price: Free
  • 27
    Avira Security Antivirus & VPN
    Get more than the best antivirus and virus remover for Android! The latest mobile antivirus software now combines ultimate protection with a phone cleaner and booster. Also, protect your privacy with a free VPN. Scan, block, and remove viruses, spyware, malware, etc. VPN secures your data, anonymizes your browsing, and unblocks geo-restricted websites. Check if your email addresses or accounts have been leaked by third parties. Helps you find, track, and recover your lost or stolen phone. Shows which apps request access to sensitive data. Camera and microphone protection prevents someone from listening and spying on you through your device's camera and microphone. The PIN protects your sensitive applications (chat, calls, Skype, etc.) Find out what other devices are connected to the same Wi-Fi. Free or premium features. The ultimate in antivirus security for Android, Avira Antivirus Security is a comprehensive security and anti-malware application.
    Starting Price: Free
  • 28
    iCrypto

    iCrypto

    iCrypto

    Designed to be used with our entire suite of iCrypto cloud-based services, the iCrypto SDK can integrate into existing Enterprise Apps or when deployed as iCrypto App be used as a standalone one-step password-less verification solution. By employing the latest cryptography technologies in combination with device-level security and management, the iCrypto SDK is the ultimate software token that can be used as a biometric ID on the go in a wide variety of industries. iCrypto SDK provides authenticator PKI signatures, a range of cryptographic protocols such as TOTP/HOTP/OCRA/MTP, push-based authentication, on-device as well as network-based biometrics such as fingerprint, iris scan, face/voice/eyeball recognition, third-party authorization, secure storage, context collection and host of security features.
    Starting Price: Free
  • 29
    Say-Tec

    Say-Tec

    Finnovant

    Say-Tec is our flagship cybersecurity product, it combines state-of-the-art biometric technology with blockchain technology to ensure the safety of your data. Say-Tec eliminates the need for multiple passwords by using your unique face and voice biometrics to unlock a device, login to an account, and access your private data. Standard web interfaces could include invoking Say-Tec during account set-up, or during the log-in process, or resetting a password when it has been forgotten. Say-Tec can completely replace the user-id and password friction of logging into a website. Say-Tec has been tailored to support the world of decentralized apps, websites, and processing, which is commonly encountered with Blockchain access, cryptocurrency, and crypto wallets and exchanges.
    Starting Price: Free
  • 30
    UniSafeBox

    UniSafeBox

    Finnovant

    The UniSafebox password manager combines double encryption technology with blockchain encryption algorithms to secure your most sensitive information. To make it even more secure, UniSafebox access is secured by Say-Tec, Finnovant’s biometric authentication solution. UniSafeBox remembers your critical information so you don’t have to.
    Starting Price: Free
MongoDB Logo MongoDB