Best IT Security Software - Page 47

Compare the Top IT Security Software as of May 2026 - Page 47

  • 1
    SplashID

    SplashID

    SplashData

    SplashID has been the most trusted name in password managers for over 10 years, and now it is better than ever. Secure your employees and stakeholders by subscribing to a volume licensing plan. SplashData has been a leading provider of security applications and services for over 10 years. The company's secure password and record management solution SplashID Safe has over 1 million individual users worldwide as well as hundreds of business and enterprise clients. SplashData was founded in 2000 and is based in Los Gatos, CA. The next generation of the secure and reliable password manager, SplashID Safe, for you and your friends. SplashID Pro 9 is available on all your favorite mobile devices, laptops, desktops and browsers. Install and use SplashID on all your mobiles, tablets and desktops with one Pro license.
    Starting Price: Free
  • 2
    ScrapingBypass

    ScrapingBypass

    ScrapingBypass

    ScrapingBypass Web Scraping API can bypass all anti-bot detection, Bypass Cloudflare, CAPTCHA verification, WAF, and CC protection. Provides HTTP API and Proxy with a built-in global exclusive high hidden static residential proxy IP. Includes interface address, request parameters, return processing. Also allows setting of Referrer, browser UA, headless status, and other browser fingerprint device features. Support: Python, Curl, Java, NodeJS Bypass CAPTCHA Verification Code Available to CAPTCHA, GeeTest and other verification codes Bypass Cloudflare Verification Bypass Cloudflare anti-bot scraping shield WAF, CC protection Unlimited Data Scraping Built-in one-stop global exclusive high hidden static proxy IP
    Starting Price: $5.9/3 days
  • 3
    Blaze Transfer

    Blaze Transfer

    Blaze Transfer

    Blaze Transfer is a secure platform, designed for swift and safe large file transfers. It employs Post-quantum end-to-end encryption, protecting files from threats of quantum and classical computers while ensuring rapid transfers. Key features of Blaze Transfer include Collaborative Workspaces for unlimited file sharing between workspaces, enhancing team and client collaborations. It allows large files transfer of any type, from any location, on any device, removing concerns about security and size. The platform also supports interaction with external, non-BLAZE users, offering a secure upload and download portal operated by a unique shared security key for file exchange. Blaze Transfer's File Transfer History feature provides a detailed record of past transfers, enabling users to review, download, reshare, and manage file expiration dates with ease. To manage files easily, BLAZE Transfer provides OneDrive integration to transfer your files directly to your Drive.
    Starting Price: €5/user/month
  • 4
    ShieldApps Cyber Privacy Suite
    What you do online and on your computer should be your own business. Yet, in most cases, your personal information & web habits are being tracked constantly by 3rd parties who want to monetize your online behaviors or steal your identity. It takes powerful software to stave off malicious cyber attacks all day, every day. In our increasingly digital world, anyone is an easy target for a cyber attack. We put so much of our personal information online today, making it harder to guard against malicious hacking attempts. Our comprehensive software keeps you and your family safe at all times when using your devices or surfing the web. Cyber Privacy Suite fends off harmful privacy threats and proactively identifies where your information is vulnerable or exposed.
    Starting Price: $77.90 per 3 devices
  • 5
    ShieldApps Webcam Blocker
    ShieldApps’ Webcam Blocker equips you with highly sophisticated security software that utilizes advanced privacy enhancement algorithms – packaged in a simple interface that allows single-click protection. ShieldApps Webcam Blocker prevents hackers from accessing and using information collected through a webcam and microphone against you. The clean and user-friendly design will give you easy, one-click control over both Webcam and microphone-blocking features. ShieldApps Webcam Blocker adds another layer of protection to your computer and a proactive privacy approach. Upon selecting the options any external or internal attempt to access the webcam will be denied.
    Starting Price: $29.99 one-time payment
  • 6
    ShieldApps Identity Theft Preventer
    Identity Theft Preventer searches your device to find where your privacy may be vulnerable. It scans through your computer for your webmail credentials, bank account details, health provider records, social networks profiles and more, to identify potential concerns that you should address. The most recent edition of the product can even block hacking attempts against your webcams and microphones. With the Identity Theft Preventer, your audio and visual ports are secure, enabling you to confidently enjoy your private life again. Fend off hacking attempts against your devices. Identity Theft Preventer blocks malicious threats and hacking attacks on your webcam and microphone.Keep others from tracking your online activity and targeting you with unwanted ads. Enjoy web surfing again without feeling like you are being watched.
    Starting Price: $49.99 one-time payment
  • 7
    ShieldApps Anti Malware
    Anti Malware offers active protection from malicious threats and is set to monitor, block, and alert whenever malware is detected. Anti Malware offers full protection from online threats at a fraction of the CPU load due to its advanced detection engine and algorithms. Anti Malware will automatically scan a computer for threats on a defined schedule and also includes extra tools and features such as the secure file eraser, history cleaner, and start-up manager to help keep your computer protected and operating at peak performance. Anti Malware provides completely hands-free PC protection and is set to monitor, block, and alert whenever a threat is detected. Anti Malware finds & eliminates threats that are hidden deep in none-standard sub-folders and hard drive segments, thus keeping your computer on-guard status optimal.
    Starting Price: $79.99 one-time payment
  • 8
    Shield Antivirus
    Shield antivirus offers protection from all to-date viruses, malware, ransomware, trojans, and spyware for personal desktop and laptop computers. Shield antivirus utilizes active protection mechanisms to protect your computer from all threats and is set to monitor, block, and alert whenever a threat is detected. Shield Antivirus features an easy installation process, vast monitoring and alert capabilities, as well as email protection by blocking and quarantining any threats located in incoming emails. Shield antivirus offers full protection from internet/browsing threats at a fraction of the CPU load due to its advanced detection engine and algorithms. Shield Antivirus will automatically scan a computer for threats on a defined schedule and also includes extra tools and features such as the secure file eraser, history cleaner, and start-up manager to help keep your computer protected and operating at peak performance.
    Starting Price: $69.99 one-time payment
  • 9
    Intra

    Intra

    Intra

    Intra lets you access websites and apps blocked by Domain Name System (DNS) manipulation, one of the most common forms of censorship online. Intra helps protect you from phishing and malware. These attacks are used to steal personal information like usernames and passwords or install software on your device by redirecting you to fake websites. Intra couldn’t be simpler to use — just leave it on and forget about it. Intra won’t slow down your internet connection and there’s no limit on data usage. Intra keeps your information private. We don’t track the apps you use or websites you visit. Intra lets you customize your DNS server provider. Intra encrypts your internet connection to a public DNS server. DNS servers work like a contact list — when you use the internet, your DNS server provides the exact addresses you need to visit a website or open an app.
    Starting Price: Free
  • 10
    Wabbi

    Wabbi

    Wabbi

    Automatically assign security policies based on project attributes and your risk profile for each application, version, environment, and asset. Then, translate those policies into orchestrated workflows from ticket creation to scheduled scans, approvals and controls – all from one platform. Manage and orchestrate the full lifecycle of vulnerabilities from triggering scans proactively based on SDLC events and schedules, or reactively in response to security events to correlating and consolidating, rescoring based on application risk, and monitoring fix SLAs to ensure no vulnerability falls in the cracks. End-to-end management of the complete application security program as an integrated part of the SDLC ensures continuous security compliance, prioritization, and analysis throughout the lifecycle of the application as your single control point to reduce friction, scale AppSec and improve secure code quality.
    Starting Price: $8 per user per month
  • 11
    Phoenix Security

    Phoenix Security

    Phoenix Security

    Phoenix Security enables security, developers, and businesses to all talk the same language. We help security professionals focus on the vulnerabilities that matter most across cloud, infrastructure, and application security. Laser focuses on the 10% of vulnerabilities that matter today, and reduces risk faster with prioritized contextualized vulnerabilities. Threat intelligence automatically in the risk improves efficiency enabling fast reaction. Threat intelligence automatically in the risk improves efficiency enabling fast reaction. Aggregate, correlate and contextualize multiple security tools and data sources, providing your business with unprecedented visibility. Break down the silos between application security, operational security, and the business.
    Starting Price: $3,782.98 per month
  • 12
    Faraday

    Faraday

    Faraday

    In today’s dynamic world, security is no longer about fortifying rigid structures. It’s about keeping watch and securing change. Carry out a continuous evaluation of your attack surface with techniques and methodologies used by real attackers. Always keep track of your dynamic attack surface to guarantee constant coverage. Full coverage requires using several scanners. Let us pinpoint crucial data from an overwhelming amount of results. Our Technology allows you to define and execute your own actions from different sources with your own schedule and automatically import outputs into your repository. With +85 plugins, an easy-to-use Faraday-Cli, a RESTful API, and a flexible scheme to develop your own agents, our platform brings a unique alternative to creating your own automated and collaborative ecosystem.
    Starting Price: $640 per month
  • 13
    Orna

    Orna

    Orna

    The most intuitive cyber incident response and case management platform with on-call SME and 200+ integrations. Orna detects attacks and anomalies across the entire infrastructure 24/7/365, groups them by source, incident relevance, and criticality, and enriches them with threat intelligence data from 28 public and private sources. ORNA's AI analyzes the threat and estimates the severity of the resulting incident, not just the alert, as well as the affected assets. Clear, color-coded dashboards provide attack breakdown by asset, type, technique, time, and more to speed up operations. ORNA's SMS and email notifications are secure and highly configurable based on the team member's role, source, and severity to avoid alert fatigue. When an attack happens, quick and decisive actions make all the difference. With ORNA, you can mount a world-class response, as all alerts can be escalated into incidents with a single action.
    Starting Price: $833 per month
  • 14
    Zendata

    Zendata

    Zendata

    Manage data security & risk across your entire stack. Your customer-facing assets are where the data collection/shaping occurs. Source code with data flows and third-party components. Distrust with how companies handle data arises due to data breaches, sharing/selling of personal information, and targeted advertising without consent, eroding trust between companies and customers. Don’t forfeit your customers’ trust by exposing them to privacy risks. Ensure their individual privacy and also protect your organization’s sensitive information with our data protection plans. Our privacy program will keep all of your company's data safe. And for your enterprise's continuity, our privacy compliance software will safeguard you from paying fines for non-compliance with security policies. Protect your customers' personal information and ensure compliance with global privacy laws with Zendata's no-code platform.
    Starting Price: $299 per month
  • 15
    RogueKiller

    RogueKiller

    Adlice Software

    Thanks to its powerful engine RogueKiller is able to find known and unknown malware, of all kinds. Search and clean viruses, ransomware, trojans, and other malware. Powered with innovative Artificial Intelligence and cloud signatures engine, RogueKiller is the best virus removal tool. Try our free virus cleaner now for free. RogueKiller antimalware software is shipped with state-of-the-art malware protection. The real time protection stops infected programs before they execute. Protect your important documents against corruption and theft. With the increasing threat of Ransomware, it's very important to keep your documents secured. RogueKiller antivirus comes up with a very innovative clipboard protection. The engine monitors suspicious programs and prevents them from reading -or writing- sensitive data from the clipboard.
    Starting Price: $15 per year
  • 16
    WiperSoft

    WiperSoft

    WiperSoft

    WiperSoft can easily scan your PC, detect all unwanted applications (browser hijackers, adware, toolbars, and so on), and ask you which ones you want to remove. With this tool, you will be able to clean your system with minimal effort. Do not hesitate to install this tool and make your computer clean. WiperSoft can detect hijackers, adware, junk apps, toolbars, etc., that have infiltrated your system while you were browsing and, unknowingly, are slowing down your computer. With WiperSoft, there is no need for you to worry about the growing number of online computer infections, because the utility regularly updates its database. These updates allow WiperSoft to detect even the newest computer threats that may be unnoticed by other security tools.
    Starting Price: $6 per month
  • 17
    Cloudanix

    Cloudanix

    Cloudanix

    Cloudanix provides CSPM, CIEM, CWPP, and CNAPP capabilities across all major cloud providers in a single dashboard. Our risk scoring helps prioritize security threats to minimize alert fatigue from your DevOps and InfoSec teams. Our adaptive notifications ensure that the right alert reaches the right team member. 1-click JIRA integration, inbuilt review workflows, and other collaborative features increase team productivity by large. Cloudanix provides a library of automated remediation options to reduce the amount of time required to fix a problem. The solution is agentless and onboards in five minutes. Our pricing is resource based which means there are no minimums and you can bring all your different AWS accounts under our single Dashboard. We are backed by YCombinator and some amazing investors who have built and run infrastructure and security companies in the past. There is no minimum to start using Cloudanix to secure your cloud infrastructure
    Starting Price: $99/month
  • 18
    Hemmelig.app

    Hemmelig.app

    Hemmelig.app

    Hemmelig lets you share secrets securely with encrypted messages that automatically self-destruct after being read. Paste a password, confidential message, or private data. Ensure your sensitive data remains encrypted, secure, and confidential. The secret link, by default, is a one-time use only, after which it will vanish. Hemmelig, [he`m:(ə)li], means secret in Norwegian.
    Starting Price: Free
  • 19
    Incogniton

    Incogniton

    Incogniton

    Incogniton is a powerful anti-detect browser that gives you full control of your online data privacy. Choose online fingerprint protection and manage your social media and ecommerce accounts more efficiently. Set up multiple browser accounts and decide your own digital fingerprint details like geolocation. Data from browser profiles is securely stored in an online database. You can also choose to store your data on your own device. Create team members with separate logins and assign them roles with specific permissions. Access multiple unique internet browsers from one application with a structured overview. Human typing emulation to quickly fill in website forms. Access your browser profiles from all your devices. Automate browser operations using Selenium or Puppeteer to save time. Bulk creator which makes it possible for you to create multiple browser profiles in just a few clicks. Don't worry about creating a fingerprint, Incogniton has it covered.
    Starting Price: $29.99 per month
  • 20
    Vaporstream

    Vaporstream

    Vaporstream

    Vaporstream is how you have leakproof conversations, send disappearing messages, and stay in control of your information, all while remaining compliant. You should always have complete control over who can see your sensitive business information, when it can be forwarded, copied, shared, or saved, across your enterprise, and even after it reaches recipients’ devices. Get the convenience of traditional mobile apps with the functionality, reliability, and privacy your business demands. Our advanced content controls and enterprise-level security enable private and disappearing business communications while maintaining compliance with organizational and regulatory requirements. Send disappearing messages while maintaining compliance. You store your records and integrate them with your workflows. Communicate securely with external users. Mobile application with a desktop client. Shred conversations, not just messages.
    Starting Price: Free
  • 21
    Delska

    Delska

    Delska

    Delska (former DEAC European Data Center & Data Logistics Center) is a carrier-neutral data center and network provider in Northern Europe with 25 years of experience delivering reliable, personalized IT and network solutions in cloud computing, colocation, data security, network, and more. We own five data centers (one under construction, launching in 2025) in Riga and Vilnius, along with points of presence in Frankfurt and Amsterdam. For quick IT infrastructure deployment in Riga, Vilnius and Frankfurt, we have created the self-service myDelska cloud platform. It offers fast, secure, and scalable solutions and, in the summer of 2025, along with the VM management, will also offer bare metal servers. Delska data centers stand out for their energy efficiency, operating at PUE under 1.3 and powered entirely by green energy. Our upcoming Tier III-certified, 10 MW data center in Riga will exemplify green construction.
    Starting Price: €10
  • 22
    AccuKnox

    AccuKnox

    AccuKnox

    AccuKnox provides a zero trust Cloud Native Application Security (CNAPP) platform. AccuKnox is built in partnership with SRI (Stanford Research Institute) and is anchored on seminal inventions in the areas of container security, anomaly detection, and data provenance. AccuKnox can be deployed in public and private cloud environments. AccuKnox runtime Security helps you discover the application Behavior of the workloads running in a public cloud, private cloud, or on-prem in VM/BareMetal or local Kubernetes orchestrated cluster or unorchestrated pure-containerized cluster. If any ransomware attacker tries to compromise the security of the pod and gets access to the vault pod, they can do a command injection and encrypt the secrets stored in the volume mount points. Then the organizations have to pay millions of dollars to get back their secrets decrypted.
    Starting Price: $999 per month
  • 23
    Aratek TruFace Manager
    Aratek TruFace Manager is an unparalleled biometric-based access control and time attendance management software that provides comprehensive features for enhancing your business security and productivity. The TruFace Manager software is designed for seamlessly and efficiently managing Aratek TruFace facial recognition terminals. Use it to easily onboard and configure all your Aratek TruFace devices, enroll face and fingerprint biometrics, set access control policies, track employee attendance, and even troubleshoot device issues. Aratek TruFace manager software provides a fully functional web platform, mobile app, and device app that allow administrators and users to easily manage devices, and perform access control and attendance tracking at any place, anytime. Aratek TruFace manager features complete functionalities for effectivity managing all TruFace facial recognition terminals in one single panel.
    Starting Price: Free
  • 24
    Fakespot

    Fakespot

    Mozilla

    Fakespot protects you from getting ripped off when shopping online. Join the secure shopping revolution and get the the truth about products, reviews, and sellers before you buy. Fakespot has your back when you’re shopping online at home or on mobile. Fakespot’s new browser app allows you to browse the open-web and when you land on sites that we support you will have Fakespot's features enabled to help you make informed purchase decisions. Share via other shopping apps and browsers, Share to analyze functionality is still included for users coming from our previous app. Since Fakespot’s inception, we have analyzed over 9 billion product and seller reviews. Our analysis helps you make informed decisions so you love everything you buy and never return anything. Fakespot also stays one step ahead of emerging threats by always updating our algorithms to protect you as you shop. Fakespot is safe, secure shopping that saves time, money, and headaches.
    Starting Price: Free
  • 25
    WeVerify

    WeVerify

    WeVerify

    Online disinformation and fake media content have emerged as a serious threat to democracy, economy and society. Content verification at scale and in near real-time is currently far from trivial, even for experienced journalists, fact-checkers, human rights activists or media literacy scholars. The WeVerify project aims to develop intelligent human-in-the-loop content verification and disinformation analysis methods and tools. Social media and web content will be analyzed and contextualized within the broader online ecosystem, in order to expose fabricated content, through cross-modal content verification, social network analysis, micro-targeted debunking, and a blockchain-based public database of known fakes.
    Starting Price: Free
  • 26
    Certificate Authority Service
    Certificate Authority Service is a highly available, scalable Google Cloud service that enables you to simplify, automate, and customize the deployment, management, and security of private certificate authorities (CA). Simplify the deployment, management, and security of your enterprise PKI with a cloud service that helps to automate time-consuming, risky, and error-prone infrastructure tasks, freeing you to focus on higher-value projects. Customize Certificate Authority Service to your needs by configuring custom CAs and certificates, enforcing granular access controls, automating common tasks with APIs, and integrating with your existing systems. Have peace of mind knowing that your CA service is highly available, scalable, backed by an SLA, auditable, and ready to help you achieve compliance with advanced hardware and software security controls. Create a private CA in minutes versus the days and weeks that it takes to deploy and operate your own CA.
    Starting Price: $20 per CA per month
  • 27
    AppMap

    AppMap

    AppMap

    Runtime code reviews for every code change in the code editor and in CI. Catch runtime performance, security, and stability problems while you code, before they hit production. Collaborate on a team member’s application behavior problem without having to replicate their environment. Automate AppMap generation in CI, get alerts for performance and security flaws, and compare observability and alerts across branches and teams. Run AppMap in CI to automate observability, create OpenAPI docs, and much more. AppMap code reviews link to rich resources that enable you to uncover the root causes of unexpected behavior. Sequence diagrams diffs vividly showcase behavioral changes in your code.
    Starting Price: $15 per user per month
  • 28
    Pagerly

    Pagerly

    Pagerly

    At Pagerly, we understand the unique needs of your organization. Our platform offers extensive customization options to tailor the incident management process to your specific requirements. ‍ You don't need to introduce another tool with Pagerly working with your already tech stack. Easily manage all requests and incidents without any window switching and benefit from all Slack collaboration features. Update the team's channel topic with the current oncall whenever oncall changes. You can easily view and monitor the status, progress, and resolution time of these tickets, ensuring prompt action and preventing any potential breaches.
    Starting Price: $15 per month
  • 29
    Zillya! Total Security
    The product with the highest level of protection. Additionally, it has an instrument of computer control and a module of parental control. This product is ideal for those, who care about the information security of all families. Antivirus protects your PC from viruses, spyware, trojans, and other malicious programs. The basis of data protection against all types of malicious software is built on the use of the actual virus database, containing over 15 million malware signatures and an advanced module of proactive protection. This module is the core of the entire security system, which is based on the basis of Zillya! Total Security product. A unique feature of this module is a modern virus signature database that is updated every day. It should be noted that such data do not overload the server or local PC, as the database is optimized and modernized. Thus, working with it does not affect the computer's performance and does not lead to hanging or slowing down of the PC.
    Starting Price: $37 one-time payment
  • 30
    Zillya! for Android
    Complex protection against all types of cyber threats, together with an antitheft system, and parental control will provide maximum protection for your devices and the gadgets of your relatives. Blocks phishing and other potentially dangerous sites. To ensure the most reliable protection the base of malicious sites is updated several times a day. The Battery module displays the current charge level and provides additional features such as battery usage history and power-saving settings. The module provides you the possibility to clear the cache memory of the phone and delete unnecessary files. Also, the module provides the ability to independently choose to clear the downloads folder. Includes an antivirus scanner and protection against malicious links. The program offers users a simple interface that allows them to easily configure and manage device protection. Automatically scans installed applications for viruses.
    Starting Price: Free
MongoDB Logo MongoDB