Best IT Security Software - Page 50

Compare the Top IT Security Software as of May 2026 - Page 50

  • 1
    Protectstar Firewall AI
    Android Firewall is not only ready to use in seconds but also protects you from hacker attacks and notifies you when an app tries to send data to the internet. Get a real-time view of which apps are accessing which servers or wasting mobile data. With simple filter rules, you can even allow or deny certain connections of an app. With the firewall, you can monitor and block this data traffic. You can also completely block the online access of an app. The AI Android firewall can block unwanted access from known intelligence agencies and government organizations. With our built-in Intrusion Prevention System (IPS), all known servers and IP addresses of the FBI, CIA, NSA, GCHQ, and many more are automatically blocked. If there is an access attempt, you will receive a special warning. Firewall AI protects you from spy servers in countries like China, Iran, and Russia, as well as mobile trackers.
    Starting Price: $9.90 per year
  • 2
    Protectstar Micro Guard
    Micro Guard makes sure that no hacker or spycam listens to you. With just one single click, the integrated microphone of your Android device will be completely protected. With just one click, the protection is active, and Micro Guard blocks and observes all apps and processes that try to access your smartphone's microphone. Every attempted security breach will be reported. To maintain usability, choose which apps on your devices can access the microphone to take calls and record with ease and privacy orientated. With the Deep Detective, we have created an intelligent and versatile detective that observes all accesses. Deep Detective permanently controls which process or program currently attempts to access the microphone. Additionally, it reports known, and thanks to modern heuristic methods, also unknown attack attempts. We developed the app Camera Guard to block and protect your camera easily.
    Starting Price: $8.90 per year
  • 3
    dnstwist

    dnstwist

    dnstwist

    Find lookalike phishing domains that adversaries can use to attack you. See what sort of trouble users can get in trying to type your domain name. Find lookalike domains that adversaries can use to attack you. Can detect typosquatters, phishing attacks, fraud, and brand impersonation. Useful as an additional source of targeted threat intelligence. DNS fuzzing is an automated workflow that aims to uncover potentially malicious domains that target your organization. This tool generates a comprehensive list of permutations based on a provided domain name and subsequently verifies whether any of these permutations are in use. Additionally, it can generate fuzzy hashes of web pages to detect ongoing phishing attacks, brand impersonation, and much more.
    Starting Price: Free
  • 4
    Synthient

    Synthient

    Synthient

    Synthient has an up-to-date threat detection system that can detect the latest in automated and fraudulent browsers. Skip using user agents, Synthient provides deeper insights into your traffic and users. Get the metrics you need to make informed decisions. Go further than just VPN detection. Detect residential, data center, and mobile proxies with ease. Block spam, fraud, and account takeover using the latest in device fingerprinting. Skip having users complete annoying puzzles. Synthient works in the background without impacting your user experience. Use Synthient to build applications that are secure and reliable. Protect your users and your business. Track users across visits for up to a year regardless of whether they are using a VPN or Incognito mode. Block repeat signups and fraudulent users. Visualize your visitors, their actions, and the risks they pose to your platform.
    Starting Price: $100 per month
  • 5
    Arpio

    Arpio

    Arpio

    Protect your critical applications from outages and ransomware attacks with automated cross-region, cross-account disaster recovery for your AWS cloud. Maintain operational continuity during cloud outages with minimal disruption. Recover safely from ransomware attacks without giving in to ransom demands. Whether it's insider threats or outside hackers, your business will always be able to recover. For security pros guarding the fort, Arpio is the ace up your sleeve. With Arpio, you’re prepped with a recovery environment your adversaries can’t touch, ready to switch on like a backup generator. No automation to write, and no AWS docs to decode. You can have DR in place today. Automatic replication, change detection, and real-time alerts. This is your DR on autopilot. Recover quickly from outages. Recover safely from ransomware. Unlike traditional DR tools, Arpio recognizes and replicates everything your cloud workloads need to run.
    Starting Price: $12,000 per year
  • 6
    Everykey Echo
    Everykey Echo is security software that enables touch-free multi-factor authentication across devices. The Bluetooth-enabled software integrates with identity providers to enable passwordless login, replacing SMS codes, email codes, and hardware keys. It uses FIDO passkey technology for instant, secure access on desktop and mobile. Designed to reduce login time and account lockouts, Everykey can be quickly deployed to secure remote and in-office workforces.
    Starting Price: $1.99 per user
  • 7
    MonoCloud

    MonoCloud

    MonoCloud

    MonoCloud is a developer-focused platform designed to streamline authentication, authorization, and user management for applications across multiple environments, including web, mobile, IoT devices, and more. It enables developers to easily integrate secure and customizable login processes, supporting a range of authentication methods such as passwords, magic links, one-time passcodes, and social logins like Google, Facebook, and Apple. Built with a strong emphasis on reducing user friction, MonoCloud offers a branded and smooth authentication experience. The platform includes advanced features such as mutual TLS, brute-force protection, and global session management, making it a comprehensive solution for handling user access across various applications and devices. In addition, MonoCloud is designed with developers in mind, providing extensive documentation, integration guides, and support for various front-end and back-end frameworks.
    Starting Price: $0
  • 8
    enforza

    enforza

    enforza

    The cost-effective alternative to AWS Network Firewall, Azure Firewall, and cloud-native NAT Gateways. Same features. Less cost. No data processing charges. enforza is a cloud-managed firewall platform that helps you build a unified multi-cloud perimeter with powerful firewall, egress filtering and NAT Gateway capabilities. With easy cloud management at its core, enforza is truly multi-cloud, enabling you to apply consistent security policies across multiple clouds and regions. - Install the agent on *your* linux instance (cloud or on-prem) with one command. - Claim your device on the portal. - Manage your policies.
    Starting Price: $39/month/gateway
  • 9
    KloudMate

    KloudMate

    KloudMate

    Squash latencies, detect bottlenecks, and debug errors. Join a rapidly expanding community of businesses from around the world, that are achieving 20X value and ROI by adopting KloudMate, compared to any other observability platform. Quickly monitor crucial metrics, and dependencies, and detect anomalies through alarms and issue tracking. Instantly locate ‘break-points’ in your application development lifecycle, to proactively fix issues. View service maps for every component in your application, and uncover intricate interconnections and dependencies. Trace every request and operation, providing detailed visibility into execution paths and performance metrics. Whether it's multi-cloud, hybrid, or private architecture, access unified Infrastructure monitoring capabilities to monitor metrics and gather insights. Supercharge debugging speed and precision with a complete system view. Identify and resolve issues faster.
    Starting Price: $60 per month
  • 10
    XplicitTrust Network Access
    XplicitTrust Network Access is a Zero Trust Network Access (ZTNA) solution that provides secure, seamless access to applications regardless of location for users working from anywhere. It provides identity-based access control that integrates with existing identity providers for single sign-on (SSO) and multi-factor authentication (MFA) using factors such as user identity, device security, location and time. The platform includes real-time network diagnostics and centralized asset management for better oversight. Clients require no configuration and the solution is compatible with platforms including Windows, MacOS and Linux. XplicitTrust uses strong encryption, end-to-end protection, automatic key rotation and context-aware authentication to provide robust security. It also supports scalable application access and secure connections for IoT, legacy applications and remote desktops, making it versatile for today's security needs.
    Starting Price: $5/month/user
  • 11
    Stellar Antivirus

    Stellar Antivirus

    Stellar Security

    Stellar Antivirus uses billions of metrics to defend your devices. You're protected in real-time. Every time something happens on your device you will be notified. Auto scan does a full scan of your device, at random times, it ensures 360-degree protection. You'll get an online-guard, that helps you to stay safe online. Everything that happens on Stellar Antivirus can be seen by you. Each scan, each detection, everything is just there for you. Stellar Antivirus has over 1 billion metrics that are used to defend your devices from any kind of viruses. Each metric is there, to defend against any different kind of virus. We have done it this way for you, your privacy and security. Stellar Antivirus runs in the background, anytime something happens on your device it will notify you. You must know, what is happening on your devices, so you can take action. Enjoy peace of mind with continuous protection.
    Starting Price: €4.99 per month
  • 12
    Halo Security

    Halo Security

    Halo Security

    Get a complete picture of your attack surface with Halo Security. Our easy-to-use, all-in-one solution to external cybersecurity testing and monitoring helps thousands of enterprises protect their customer data. Modern business moves fast. Developers add new websites, services, and software. Old assets are forgotten and new acquisitions are brought into the fold. Every website, server, certificate, or third-party JavaScript creates another way for attackers looking to steal customer data. Our agentless and recursive discovery engine discovers the assets you’re not aware of, so you can prioritize your efforts from a single pane of glass. From firewall monitoring to penetration testing, you can easily apply the right resources to every asset from our centralized dashboard. With quick access to the specifications of each asset, you can be confident that everything you control is being monitored appropriately.
    Starting Price: $399 per month
  • 13
    WP Guardian

    WP Guardian

    WP Guardian

    Keep your entire WordPress fleet up-to-date and protected. Embrace proactive security to maintain control and visibility over the status of both sites and servers, all in one place. Stay ahead of WordPress threats with continuous vulnerability monitoring and effective mitigation strategies. Gain control over the security state for all WordPress sites. Scan connected servers, and identify & report vulnerabilities to keep your infrastructure secure. Manual & auto-updates, virtual patches, and continuous vulnerability monitoring. Designed to secure any control panel other than cPanel and Plesk, or no panel. Perform checks before, during, and after updates for a smooth and safe updating process. Block malicious requests, and mitigate vulnerabilities without modifying website code or affecting site performance. Protect servers and WordPress sites without installing any updates. Embrace the ultimate solution to actively block the exploitation of identified threats.
    Starting Price: $5 per month
  • 14
    nebty

    nebty

    nebty

    nebty is an innovative cybersecurity solution from Munich, Germany, designed to protect businesses from digital identity theft, online fraud, and phishing attacks. Utilizing advanced artificial intelligence, the company goes beyond conventional security measures by continuously monitoring the internet for potential threats. The software-as-a-service (SaaS) platform analyzes potential attack vectors and scans for signs of phishing activity, allowing for early detection and prevention of digital threats before they can cause harm. It also provides a managed takedown service to respond to threats quickly and effectively.
    Starting Price: €49
  • 15
    GRASP German GRC
    Capture, visualize, and communicate risks in an understandable way. Follow the risk-based approach: evaluation, treatment, and continuous overview of risks. Work in a time-saving and structured manner by spending less time on manual activities. GRASP can be customized to meet the specific needs of your organization, entirely without programming. With increasing digitalization and growing networking, the potential for threats has risen rapidly. Ignoring both familiar and new IT risks, especially in times of crisis, jeopardizes the economic success and continued existence of the company. An ISMS tool can help to make the company less risky. With the help of the data protection impact assessment (DPIA) and corresponding deletion concepts, you keep your data under control. GRASP guides you through business impact and risk analysis in accordance with ISO 22301 based on the applicability of the standard areas.
    Starting Price: 79€
  • 16
    Base27

    Base27

    Base27

    With Base27, you have all the tools at your disposal to inform employees, make processes secure, perform risk assessments quickly and easily, and continuously monitor and improve your information security. Keep control of potential risks with detailed analyses regarding scope, processes, information systems, and/or suppliers. All clearly mapped by threat models such as MAPGOOD, among others. Prepared for calamities through structured plans and allocations of responsibilities. Regular checks ensure that you are always prepared for calamities. Accurate insights into your information security through internal and external audits. Automated management reports keep you informed about your compliance. Comprehensive reports give you insight into the status of your information security at all times. Dashboards for quick and easy insight into the status of your information security.
    Starting Price: €22.50 per month
  • 17
    PropelAuth

    PropelAuth

    PropelAuth

    Easy integration and straightforward APIs for developers. Built-in user management for customer-facing teams. Data and insights for PMs and executives. PropelAuth was founded on the idea that a great auth product gets out of your way. We provide you with the right tools out of the box, so you can quickly make your users' experiences as secure and smooth as possible. As soon as you start onboarding users, your team will have a laundry list of things they need to do or see. Organizations are a first-class concept in PropelAuth. You can use our UIs to get started quickly or build your own with our APIs. Start with our default roles, or create your own. We even handle updating existing users when you make changes. The easiest way to integrate with identity providers, like Okta and Azure AD. We provide guides for your users to set up and test their configuration. Set custom session durations per organization, enforce MFA, and more. We handle the complexity so you don't have to.
    Starting Price: $150 per month
  • 18
    F5 NGINXaaS for Azure
    NGINX as a Service (NGINXaaS) for Azure is a fully managed offering that integrates the Microsoft Azure ecosystem with advanced NGINX traffic services. Lift and shift, migrate, or extend existing NGINX workloads to the cloud with minimal effort, helping your organization save money, increase flexibility, and achieve consistency in performance and security across its estate of on-prem and Azure cloud apps. Enables application developers to deliver consistent apps in the cloud, deployed straight from the Azure Marketplace with just a few clicks on the console. Deploy and manage NGINXaaS via the Azure Portal with built-in integrations, including Azure Monitor and Azure Key Vault for SSL/TLS certificate management. Seamless lift-and-shift experience of your existing NGINX configuration, so you can migrate or extend your workloads to the cloud faster and with minimal effort.
    Starting Price: $0.015 per ncu per hour
  • 19
    DataSet

    DataSet

    DataSet

    DataSet retains live, searchable real-time insights. Store indefinitely using DataSet-hosted or customer-managed, low-cost S3 storage. Ingest structured, semi-structured, and unstructured data faster than ever before. A limitless enterprise infrastructure for live data queries, analytics, insights, and retention, with no data schema requirements. The technology of choice for engineering, DevOps, IT, and security teams to unlock the power of data. Sub-second query performance powered by a patented parallel processing architecture. Work quicker and smarter to make better business decisions. Ingest hundreds of terabytes effortlessly. No rebalancing nodes, storage management, or resource reallocation. Scale on a limitless flexible platform. An efficient cloud-native architecture minimizes cost and maximizes output. Benefit from a predictable cost model with unmatched performance.
    Starting Price: $0.99 per GB per day
  • 20
    Oasis Defender

    Oasis Defender

    Oasis Defender

    Oasis Defender provides comprehensive protection across *multiple* cloud environments. Multi-dimensional visualization - Cloud Map visualizes the entire network infrastructure across multiple clouds - Policy Map visualizes cloud security policies - Security Map highlights and helps to remediate security issues Automated security analysis - Network security analysis: performs network security analysis based on industry best practices and provides actionable recommendations for remediation - Data storage security analysis: analyzes the security of data stores in cloud environments Agentless architecture - Instant onboarding - Seamless integration - Preserves your existing topology - Reduces potential weak points for attackers Designed for organizations of all sizes, it helps protect their cloud environments from potential security breaches with minimal effort.
    Starting Price: $25/month
  • 21
    Pass Wizard
    Being able to commit secure and complex passwords to memory is next to impossible, now you don’t have to. Use the passphrase generator to create strong and unique passwords to protect your data. With a Pass Wizard Pro account there’s no limit to the number of passwords you can manage. Our secure systems feature multi-factor authentication to help keep your data safe and secure. Create any number of shared passwords accessible by every user within your group. There’s a certain freedom that comes with having all of your important credentials at your fingertips. With Pass Wizard you never have to worry about forgetting another password. Pick the plan that fits your password management needs.
    Starting Price: $19.95 per month
  • 22
    Splunk Enterprise Security
    The market-leading SIEM delivers comprehensive visibility, empowers accurate detection with context, and fuels operational efficiency. Unmatched, comprehensive visibility by seamlessly ingesting, normalizing, and analyzing data from any source at scale enabled by Splunk's data-powered platform with assistive AI capabilities. Utilize risk-based alerting (RBA) which is the industry’s only capability from Splunk Enterprise Security that drastically reduces alert volumes by up to 90%, ensuring that you're always honed in on the most pressing threats. Amplify your productivity and ensure the threats you're detecting are high fidelity. Native integration with Splunk SOAR automation playbooks and actions with the case management and investigation features of Splunk Enterprise Security and Mission Control delivers a single unified work surface. Optimize mean time to detect (MTTD) and mean time to respond (MTTR) for an incident.
    Starting Price: Free
  • 23
    TikBox

    TikBox

    TikBox

    Transforming how digital content is secured, shared, and monetized. Available to all creators. Our custom-built tools, template agreements, and auto-invoicing enable you to establish copyrights, add provenance, and monetize your assets with ease. In-house legal teams can create custom agreements or integrate existing ones into the contract builder, ensuring colleagues in various functions have access to appropriate contractual arrangements. Our multi-layered encryption ensures the integrity of your copyright & provenance metadata & labels. This safeguards your data against manipulation & secures your licensing revenue streams. TikBox is pioneering an online ecosystem tailored for digital content creators to assert copyrights, embed provenance details, and unlock new revenue streams from their online assets. Our platform is designed to seamlessly integrate copyright and provenance-related metadata into your digital creations, safeguarding them across the internet.
    Starting Price: $5.84 per month
  • 24
    Jamf School
    Jamf School’s web-based interface provides the best learning experience for students. Deploying, managing, and securing Mac, iPad, iPhone, and Apple TV has never been simpler. Keep track of managed devices, users, and apps. Drag and drop apps, content, and restrictions. Students gain automatic access to subject-specific materials. Keep track of device damage and problems. Manage each location and its devices, users, and groups. Download files that will be used by multiple students. Teachers can request apps, which are then shared with IT admins. Keep teachers in control of their classrooms and parents in charge of their students. Jamf Student app gives students restricted permissions over their own devices. It enables live proctoring of web-based assessment exams and displays a camera view and the exam itself. Education-focused management and security for school IT admins, teachers, and parents.
    Starting Price: $5.50 per year
  • 25
    Jamf Safe Internet
    The internet should be where students learn confidently: growing and exploring where their curiosity takes them. Students spend nearly twice as much time online than ever before. This means a growing need for digital safety to eliminate cyberattacks and prevent students from accessing unsafe content. Jamf Safe Internet is an educational content-filtering solution. It ensures students can navigate the internet without reserve or fear, purpose-built for Apple, available across all mobile platforms. Comprehensive content filtering optimized for education and integrated with MDM for simple, powerful student and user protection. Designed to help schools and colleges protect students from harmful content on the internet, Jamf Safe Internet enforces acceptable-use policies without sacrificing the unmatched learning experience Apple devices provide. We combine best-in-class network threat prevention and a vast content-filtering database to block unsafe content and malicious attacks.
    Starting Price: $5 per year
  • 26
    Jamf Executive Threat Protection
    Users work from mobile devices more than ever before. And some of these devices access critical company and personal information. Jamf Executive Threat Protection keeps this data safe from increasingly sophisticated threats. Users requiring the highest level of security possible need advanced detection and response, which provides visibility into sophisticated attacks that Apple’s Lockdown Mode aims to prevent. Jamf does this by validating the integrity of a device and analyzing any compromise, without sacrificing privacy. Monitor beyond apps and device management to instantly find signs of compromise and provide a rich context to a sophisticated mobile attack. It does not collect personal information like passwords, photos/videos, text messages call data, contacts, or browser history. The modern workforce is mobile, but mobile is the weakest link. Complete mobile security for advanced detection and response.
    Starting Price: Free
  • 27
    12Port Horizon
    Our agentless platform allows you to quickly segment network workloads and restrict unauthorized traffic to prevent lateral movement and stop breaches. Protecting IT assets across physical, virtual, and cloud environments is increasingly complex. Traditional security can't counter sophisticated threats. Microsegmentation isolates workloads, monitors east-west traffic, and prevents lateral movement, ensuring attackers can't spread to critical areas and enhancing overall network security. Build and enforce security policies based on asset classification using hierarchical taxonomies and tagging. Enforce strict access controls and routinely monitor service traffic, aligning with zero trust principles to provide a comprehensive and flexible security strategy. 12Port Horizon features an agentless architecture, simplifying deployment and maintenance across physical, virtual, and cloud environments without adding complexity.
    Starting Price: $15 per month
  • 28
    Binarii Labs

    Binarii Labs

    Binarii Labs

    Binarii Labs has a patented data security process that uniquely solves cyber security risks, resilience, and bad actor threats. To revolutionize data security through a platform to enable people and enterprises to take back control, and ownership and secure custody of their own and their stakeholder’s data. This is achieved through our UK & UK-US-patented process which involves encryption, fragmentation, and distribution across multi-cloud storage solutions that enable business continuity, risk mitigation, and enterprises to uphold regulation and compliance. The secure storage of your data is proven through the world's first immutable ledger by providing the user a proof of record on the blockchain. Our patented data security process encrypts, fragments, and distributes your data wherever you want, and records its provenance on the blockchain for unprecedented security. 
However, you always own and control your data.
    Starting Price: €15 per month
  • 29
    AUTHADA

    AUTHADA

    AUTHADA

    AUTHADA is a company specializing in digital identification and signature solutions, offering services that enable quick, legally compliant, and digital processes. Their solutions digitize application procedures, optimize processes, and transform heavily regulated markets into modern, user-friendly, and digital industries. With a growing team of over 30 motivated employees, AUTHADA continuously develops its solutions, adapting them individually to customer needs. The company emphasizes trust, innovation, and solution orientation, both within the team and externally. AUTHADA's services include online identification, digital signatures, and on-site identification, all designed to provide secure and efficient digital processes. The ID data and the signed documents are transferred to the service provider in the last step. The branch employee uses the app to capture the customer’s ID card documents.
    Starting Price: Free
  • 30
    UpPass

    UpPass

    UpPass

    A single API that unifies verification methods, fraud tech, and trusted financial and identity data in Southeast Asia. Reduce integration and testing time to a matter of a few days. Access to truly local financial and identity data sources digitally. Validate individual or business information and their addresses with local data sources and AML lists to make sure you acquire only legitimate customers. Make suspicious users go through a series of verifications and streamline the process for genuine users with decision workflow. Build a seamless verification flow that fits your risk and compliance requirements. Chat with experts and choose the verifications, fraud services, and local data integration that fit your needs. Orchestrate the fraud decision with rules from various data sources. Set up a single API decision workflow for a personalized experience that can be embedded anywhere in your user journey.
    Starting Price: $0.20 USD per credit
MongoDB Logo MongoDB