Best IT Security Software - Page 54

Compare the Top IT Security Software as of May 2026 - Page 54

  • 1
    Fraud Scanner

    Fraud Scanner

    Fraud Scanner

    Fraud Scanner keeps the internet safe, one click at a time. Online scams are getting smarter. Fake shops, dodgy emails, misleading links, they pop up every day. And it only takes one wrong click to lose your money or personal data. Fraud Scanner gives you an extra layer of protection. Fraud Scanner checks websites and links in real time, before you land on something suspicious. If a site is unsafe, you’ll get an instant warning. Simple, clear, and right when you need it. Here’s how Fraud Scanner keeps you safe: - Instant alerts: get notified before you end up on a fraudulent site. - Cross-platform: available on desktop, iOS, and Android. - User-friendly: no tech skills required, just install the extension or app and browse safely. -Free to use: protection that everyone can access. Whether you’re shopping online, booking tickets, or just browsing, Fraud Scanner makes sure you can do it safely and worry-free. No jargon, no hassle, just real protection against real threats
    Starting Price: 0
  • 2
    Multifactor

    Multifactor

    Multifactor

    Multifactor is a next-generation account-sharing and access-management platform built around zero-trust, post-quantum cryptography, and fine-grained permissioning. Rather than simply sharing credentials, users store their online accounts (passwords, passkeys, 2FA codes) in a secure vault and grant access to humans or AI agents by sending controlled links. Access can be revoked instantly, and the underlying credentials remain hidden. You can define precise permissions (for example, “read transactions” but not “initiate transfers”), capture detailed non-repudiable audit trails of every action, and enjoy built-in encryption and post-quantum security architecture that ensures only authorized parties ever gain access. The platform can also operate as a full identity-and-access-management suite, supporting authentication (biometrics, hardware tokens), authorization, access auditing, device and network endpoint enforcement, and secure account/resource sharing.
    Starting Price: Free
  • 3
    Devici

    Devici

    Security Compass

    Devici is a diagram-focused threat modeling tool that helps AppSec teams and DevSecOps engineers create clear, repeatable models without relying on scattered diagrams or manual documents. Teams map system components, describe their behavior through attributes, and Devici identifies relevant threats and possible mitigations from its maintained library. The platform supports real-time collaboration, reusable patterns, templates, and version history, which helps groups standardize how they document risks across applications. Developers can contribute without needing deep threat modeling knowledge, while security teams can guide reviews and maintain consistency. Devici offers a practical way to keep threat models current as designs change and reduces the effort required to move from architecture diagrams to actionable security decisions.
    Starting Price: Free
  • 4
    Vulseek by Securetia
    Vulseek is a modern Vulnerability Management as a Service (VMaaS) solution that simplifies how organizations identify, assess, and remediate security vulnerabilities across their infrastructure. Designed with usability and effectiveness in mind, Vulseek automates the entire vulnerability lifecycle, from detection to resolution, empowering teams to stay secure without added complexity. At its core, Vulseek combines automated asset discovery and scanning with intelligent risk prioritization, allowing security teams to focus on what truly matters. Its customizable dashboards, real-time alerts, and integrations with popular ticketing systems and SIEMs help ensure vulnerabilities are addressed swiftly and systematically. Built by cybersecurity experts, Vulseek is trusted by companies across industries to maintain continuous visibility into their attack surface Reduce mean time to remediation (MTTR) Meet compliance requirements with ease
    Starting Price: $40/month
  • 5
    KeePassium

    KeePassium

    KeePassium

    KeePassium is a privacy-first password manager for iOS and macOS that combines the trusted open source format of KeePass with a clean, intuitive design and full user control over where databases are stored. It supports offline or cloud-based database files, automatic two-way sync with any storage provider accessible via the Files app, and AutoFill for websites and apps. KeePassium supports all major KeePass database formats (kdb, kdbx3, kdbx4) and uses strong, time-proven encryption algorithms such as AES, ChaCha20, Twofish, and Argon2. It includes features like custom entry fields, custom icons, TOTP codes, file attachments, Face ID/Touch ID or passcode unlock, full accessibility support (VoiceOver, large text), entry history, recycle bin for deleted entries, and pre-saving of database copies for safety. It is open source under GPLv3, allowing auditability by anyone.
    Starting Price: €19.99 per year
  • 6
    TabLogs

    TabLogs

    TabLogs

    TabLogs is a cloud-based, field-ready boring-log and geotechnical-data software solution designed to streamline the collection, management, and reporting of subsurface investigation information. It enables you to log boreholes on-site to internationally recognized standards, generating finished graphical logs, site plans, and sample registers in seconds, eliminating time-consuming back-office data entry. It supports adaptable boring-log data formats, allows you to query and manage your entire subsurface dataset in one central database, and incorporates features such as direct photo insertion, professional branding, workflow tracking, and self-service dashboards. It is built for both engineers and drillers, enabling large consultancies or government departments to consistently record high-quality data across sites and then provide clients with timely, report-ready deliverables ahead of competitors.
    Starting Price: $300 per month
  • 7
    Tosi

    Tosi

    Tosi

    The Tosi Platform is a purpose-built Cyber-Physical Systems platform designed specifically to secure, connect, and control Operational Technology (OT) networks and critical infrastructure. Unlike traditional IT tools adapted for OT, Tosi was engineered from the ground up for industrial environments: it supports native industrial protocols, tolerates extreme temperatures, and requires no complicated configuration. Deployment is rapid, sites can be up and running in under five minutes with a “plug-and-go” setup, allowing organizations to connect distributed infrastructure quickly and securely without specialized IT expertise. It implements a zero-trust security model with enterprise-grade protections: end-to-end 256-bit AES encryption, hardware-based authentication (with RSA keys), no open inbound ports, and ISO/IEC 27001:2022 certification. With Tosi, you get unified, centralized management through a single interface (TosiControl), enabling visual network topology views.
    Starting Price: Free
  • 8
    BlastShield

    BlastShield

    BlastWave

    BlastShield is a zero-trust, software-defined perimeter solution designed to protect critical IT and OT assets by rendering them invisible and inaccessible to unauthorized users. It establishes an encrypted, peer-to-peer overlay network that cloaks protected devices and data from network scanning or traffic analysis tools, preventing credential theft, reconnaissance, and lateral movement. BlastShield combines phishing-resistant, passwordless multi-factor authentication (including mobile authenticators or FIDO2 keys), microsegmentation, data-in-motion encryption, and policy-based access controls to ensure only explicitly authorized devices and users can connect. It supports deployment across a wide range of network environments, TCP/IP, SCADA, SD-WAN, or even raw Ethernet, and can protect everything from legacy OT/ICS equipment, sensors, PLCs, HMIs, cloud VMs, and virtual infrastructure.
    Starting Price: Free
  • 9
    SurePassID

    SurePassID

    SurePassID

    SurePassID is an advanced, deploy-anywhere multi-factor authentication platform built to secure both IT and OT (operational technology) environments, including critical infrastructure, legacy systems, on-premise, air-gapped, hybrid cloud, or fully cloud-based operations. It supports a wide variety of authentication methods; passwordless, phishing-resistant approaches like FIDO2/WebAuthn (with FIDO2 PIN, biometric, or push), as well as one-time passwords (OTP via OATH HOTP/TOTP), mobile push, SMS, voice, and traditional methods. SurePassID integrates with common operating systems, including domain and local logins, RDP/SSH remote access, and even legacy or embedded Windows systems often found in OT/ICS/SCADA environments, enabling offline 2FA when needed. It also supports securing VPNs, network devices, appliances, legacy applications, web apps (via SAML 2.0 or OIDC identity provider functionality), and network-device access protocols.
    Starting Price: $48 per year
  • 10
    The Code Registry

    The Code Registry

    The Code Registry

    The Code Registry is an AI-powered code intelligence and analysis platform that gives businesses and non-technical stakeholders full visibility into their software codebase, even if they don’t write code themselves. Upon connecting your code repository (GitHub, GitLab, Bitbucket, Azure DevOps, or uploading a zipped archive), the platform creates a secure “IP Vault” and runs a comprehensive automated analysis across your entire codebase. It produces a range of reports and dashboards, including a code-complexity score (revealing how intricate or maintainable your code is), open-source component analysis (detecting dependencies, license status, outdated or vulnerable libraries), security analysis (identifying potential vulnerabilities, insecure configurations or risky dependencies), and a “cost-to-replicate” valuation, estimating how much effort or resources it would take to rebuild or replace the software from scratch.
    Starting Price: $2 per month
  • 11
    Microsoft Defender for Business
    Microsoft Defender for Business is an AI-powered device security solution designed for small and medium-sized businesses with up to 300 users. It goes beyond traditional antivirus by providing enterprise-grade endpoint protection across Windows, macOS, iOS, and Android devices. The platform helps organizations identify vulnerabilities, protect devices, detect threats, and rapidly respond to cyberattacks. AI-driven endpoint detection and response automatically disrupt ransomware and other in-progress attacks in real time. Defender for Business includes vulnerability management to prioritize and remediate security weaknesses. Its simplified onboarding and management experience makes it easy to deploy without complex security expertise. Overall, Microsoft Defender for Business delivers cost-effective, scalable security tailored to modern hybrid work environments.
    Starting Price: $3/user/month
  • 12
    Credas

    Credas

    Credas

    Credas is a digital identity verification and compliance platform that helps businesses verify customer identity, perform anti-money-laundering, Know Your Customer, and due diligence checks, and streamline onboarding with secure, real-time technology. It uses biometric facial recognition, liveness detection, and digital document verification to confirm a person’s identity against government-issued IDs and integrated data sources, replacing manual, time-intensive checks with automated workflows that deliver results instantly through a web portal, mobile app, or API integration. Credas also supports PEP/sanctions screening, proof of address and source of funds analysis, automated data capture forms, advanced eSignatures, and configurable onboarding journeys that can be fully branded and tailored to sector-specific compliance needs such as finance, legal, property, recruitment, and corporate services.
    Starting Price: Free
  • 13
    nRF Cloud

    nRF Cloud

    nRF Cloud

    nRF Cloud is a cloud-based IoT platform and lifecycle management service designed to connect, monitor, control, and optimize wireless IoT devices, especially those built with Nordic Semiconductor ultra-low power radios and cellular modules, throughout their entire product lifecycle from onboarding to retirement. It offers device management features for easy onboarding, configuration, connectivity tracking, and remote firmware-over-the-air updates to keep devices secure and up to date, plus data visualization and customizable dashboards that turn raw sensor streams into actionable insights for performance and trend analysis. It includes location services (such as Assisted-GPS, predictive, and multi-cell positioning) that enable power-efficient tracking of deployed assets and support protocol-agnostic connectivity via MQTT, CoAP, and REST APIs, so it fits a variety of IoT architectures.
    Starting Price: $0.10 per month
  • 14
    Primo

    Primo

    Primo

    Primo is an all-in-one AI-powered IT operations platform that helps organizations buy, track, secure, and remotely manage company devices and software from a single, centralized system by combining identity, mobile device management (MDM), endpoint detection and response, SaaS management, and global hardware procurement so teams no longer juggle multiple disconnected tools; IT can enforce security policies, push apps and updates, monitor and remediate issues across macOS, Windows, and Linux devices, and coordinate zero-touch deployments at scale, all while keeping identity and access workflows in sync with HR data to automate onboarding, offboarding, and permission changes. It integrates with 60+ HR and email tools to ensure a single source of truth for users and devices, offers real-time compliance and activity logs, supports role-based access and single sign-on, and provides AI-assisted automation to reduce manual work and improve security posture.
    Starting Price: €8 per month
  • 15
    SnowcatCloud

    SnowcatCloud

    SnowcatCloud

    SnowcatCloud is a cloud-hosted customer data infrastructure platform built on an open source Snowplow fork (OpenSnowcat) that enables organizations to collect, process, route, and integrate behavioral and event-level data at scale across web, mobile, server, and IoT sources so teams can build a real-time, first-party customer 360 view while retaining full ownership and control of their data; it supports multiple deployment models including cloud-hosted, fully managed service, “bring your own cloud,” and self-hosted open-source options to suit different privacy, cost, and infrastructure needs, all with enterprise-grade security (SOC 2 Type II) and real-time data delivery capabilities. It enriches event pipelines with identity resolution techniques like browser fingerprinting and probabilistic/deterministic matching to improve customer profiles, helps create a customer knowledge graph for deeper insights, and integrates with analytics and data warehouses.
    Starting Price: Free
  • 16
    Proton Authenticator
    Proton Authenticator is a privacy-first two-factor authentication app that generates time-based one-time passwords to add an extra layer of login security for online accounts beyond just a password, so users can secure accounts across all their devices. It is open source and uses end-to-end encryption, meaning all cryptographic operations and secret keys are generated and stored locally, and even Proton cannot see your unencrypted 2FA data, offering transparency and strong privacy by design. Users can sync 2FA codes across devices with encrypted backups (including via iCloud or a Proton Account), import existing codes from other authenticator apps, and export them if needed, giving flexibility and control over 2FA secrets without vendor lock-in. Proton Authenticator is free to use, has no ads or tracking, and supports secure practices like biometric locks and offline access, so users can generate login codes.
    Starting Price: Free
  • 17
    Ente Auth
    Ente Auth is a free, open-source two-factor authentication app that helps users generate and manage time-based one-time passwords to secure logins for online accounts with an extra layer of verification beyond just a password, offering end-to-end encrypted backups so you never lose your codes and they remain private even to the service itself. It syncs codes across mobile, desktop, and web clients using fully encrypted channels, lets users import existing 2FA tokens by scanning QR codes or manual entry, and provides features like offline code generation, tagging and searching of codes, pinning favorites, icon identification, and quick “next code” display for faster logins. Backups are encrypted with audited cryptography, giving users peace of mind that only they can decrypt and access their 2FA secrets, and codes can be shared securely with teammates via encrypted links with optional expirations.
    Starting Price: Free
  • 18
    Aegis Authenticator

    Aegis Authenticator

    Beem Development

    Aegis Authenticator is a free, secure, open source Android app for managing two-factor authentication tokens, helping users add an extra layer of security to their online accounts by generating time-based or HMAC-based one-time codes (HOTP/TOTP) that work with thousands of services that support industry-standard 2FA, making it a privacy-respecting alternative to apps like Google Authenticator or Authy. Tokens are stored in a locally encrypted vault that can be unlocked with a strong password and optionally with device biometrics, and the app includes features such as encrypted backups, QR-code scanning, manual entry, and import/export from other authenticator apps so users can migrate their existing 2FA credentials easily and securely. Aegis provides extensive organization tools including custom icons, grouping, alphabetical and custom sorting, and search to help manage many accounts effectively, and its design emphasizes security and privacy.
    Starting Price: Free
  • 19
    2FAS Auth
    2FAS is a two-factor authentication and password management platform centered on its open source 2FAS Authenticator app, which helps users add a strong second layer of login security to online accounts by generating time-based and event-based one-time codes that refresh frequently to defend against unauthorized access, making it easier to secure email, social, financial, and other services that support 2FA. It is designed to be simple, private, and secure, it works offline, does not store passwords or usage metadata, and doesn’t require users to create an account, offering anonymous use while still syncing codes across multiple mobile devices with encrypted backup options, biometric or PIN protection, and support for importing and exporting authentication seeds so you retain control of your data and can migrate between devices or apps.
    Starting Price: Free
  • 20
    2FAS Pass
    2FAS Pass is a local-first password manager designed with security and privacy at its core that lets users store and manage passwords and sensitive credentials in an encrypted vault on their own device without requiring an account or external cloud service; all data is encrypted end-to-end so only the user can access it, and the app can work offline while providing optional encrypted synchronization using services like Google Drive, iCloud, or custom WebDAV setups if users choose. It emphasizes full data control and privacy by storing credentials locally by default, with security tiers to protect especially sensitive entries, and no centralized server collecting or storing personal information, giving users confidence that their vault remains private and under their own management. 2FAS Pass also integrates with a browser extension for seamless access to stored passwords while browsing, lets users import and export items, and supports typical password management functions.
    Starting Price: Free
  • 21
    PicKey

    PicKey

    PicKey

    PicKey.ai is an AI-powered visual password manager that eliminates the need to remember complex text passwords by letting you log in using a unique visual Master Key composed of a personal image (like a favorite place, object, or face) combined with a 3D collectible, and then generates and manages strong site credentials on the fly without ever storing the actual passwords, using advanced neural image recognition and patented MagicPass cryptography to re-create credentials securely when needed. Instead of memorizing password strings, users simply authenticate with their chosen Vision Secret photo plus a 3D Keymoji selection, and PicKey’s AI recognizes the image even under variations in lighting or angle, mirroring human photographic memory and making login intuitive and memorable while enhancing resistance to brute-force, phishing, and keylogging attacks.
    Starting Price: $4 per month
  • 22
    Outtake

    Outtake

    Outtake

    Outtake is an AI-powered cybersecurity platform that uses always-on, agentic AI agents to secure an organization’s digital presence by continuously scanning and defending against modern threats like brand impersonation, phishing, fake domains, fraudulent ads, and spoofed apps across the open web, social platforms, forums, and media at internet scale. Its autonomous agents analyze text, images, video, and audio in real time to detect coordinated attacks, correlate related malicious activity across formats and surfaces, and prioritize and execute remediation steps faster than traditional, manual processes, shrinking takedown timelines from weeks to hours while reducing analyst workload. It includes open source intelligence for narrative and risk monitoring, digital risk protection that maps and dismantles interconnected threat networks, and Outtake Verify, a browser extension that cryptographically authenticates email sender identity to prove who actually sent a message.
    Starting Price: Free
  • 23
    NudgeBee

    NudgeBee

    NudgeBee

    NudgeBee is an AI Agents and Agentic Workflow platform built for SRE, CloudOps, and DevOps teams. It combines pre-built AI Assistants for incident troubleshooting, cloud cost optimization, and Kubernetes operations with a visual no-code Workflow Builder for custom automation. NudgeBee's AI engine auto-investigates alerts using a live semantic Knowledge Graph, grounded in your actual infrastructure topology. It queries data in place from existing tools (Prometheus, Datadog, Grafana, Loki) with zero data ingestion. The Workflow Builder supports 20+ action categories, native AWS/Azure/GCP CLI nodes, A2A and MCP protocol support, and human-in-the-loop approval gates. 49+ integrations. Enterprise-ready with RBAC, audit trails, BYOM (Bring Your Own Model), and self-hosted deployment. SOC-2 Type II and ISO 27001 compliant.
    Starting Price: $150 per month
  • 24
    QSafe

    QSafe

    C9Lab

    QSafe is an AI-powered Digital Risk Protection Platform designed to help businesses detect, monitor, and respond to external cyber threats in real time. The platform identifies brand impersonation, phishing domains, fake social media accounts, leaked credentials, dark web exposure, and emerging attack vectors. QSafe provides continuous monitoring across domains, social media, mobile apps, and underground sources, enabling security teams to take rapid action before threats escalate into incidents. It is built for enterprises, BFSI, startups, and growing organizations that need visibility beyond traditional perimeter security.
  • 25
    Splashtop Autonomous Endpoint Management
    Splashtop Autonomous Endpoint Management is an automation-led endpoint management solution designed to help IT teams monitor, secure, patch, and manage endpoints remotely with minimal manual effort by providing real-time visibility into device health, automated system and third-party software patching, and compliance tracking across distributed environments. It enables secure remote access, real-time patch management that complements tools like Microsoft Intune by detecting and remediating zero-day vulnerabilities, and centralized dashboards that show inventory, security metrics, and endpoint status, allowing IT operations to proactively fix issues before they impact users and maintain consistent compliance with regulations such as ISO/IEC 27001, SOC 2, GDPR, HIPAA, and PCI. AEM automates routine tasks such as patch deployment, system updates, and diagnostics, freeing IT staff from repetitive manual work, and supports advanced features.
    Starting Price: $5.30 per month
  • 26
    keyhold.io

    keyhold.io

    keyhold.io

    Your clients send credentials via Slack. Your contractors have passwords in email threads. Chaos. keyhold.io is a zero-knowledge secret custody platform for teams who manage credentials that aren't theirs. Send secure request links, collect credentials encrypted before they reach our servers, and get full audit trails of every access. Built for MSPs, agencies, and anyone tired of sensitive access scattered across chat threads.
    Starting Price: £50/month
  • 27
    XFA

    XFA

    XFA

    XFA is a device security and Zero Trust access platform that helps organizations discover, assess, and enforce security posture on every device accessing business systems, including BYOD, contractor, and unmanaged endpoints, by integrating with identity providers and checking key security settings such as OS updates, encryption and other posture signals at login without taking control of devices or requiring traditional MDM deployment; it gives real-time visibility into all connected devices, boosts security awareness with alerts and reports, enables conditional access policies so only compliant devices can access cloud tools, and helps teams meet compliance frameworks like SOC 2, ISO 27001 and NIS2 with audit-ready evidence, while offering friction-free self-onboarding, lightweight installation, agentless capabilities and integrations with platforms like Microsoft 365, Okta, TrustCloud and Drata to strengthen security across hybrid, remote and BYOD environments.
    Starting Price: €2,450 per year
  • 28
    StasherX

    StasherX

    SC Next IT Computers SRL

    StasherX is a smart, lightweight Windows utility designed for users who value privacy without sacrificing performance. It combines military-grade encryption with intelligent automation and cutting-edge AI. Key Features: Selective Application Visibility (Granular Application Access Control): Industry-Unique Feature: StasherX allows you to define a "Trusted Apps" list. While a folder remains 100% invisible to users and the OS, you can grant specific software (e.g., a backup tool like Acronis, a media server like Plex, or a crypto app) full access to the data. The Benefit: Your data stays hidden from prying eyes without breaking your automated workflows or backup routines. Uninstall Guard: A unique security barrier that prevents unauthorized removal. If a password is set, the app won't leave your PC without it. Performance Tuning: Automatically cleans up redundant system tasks and background processes, ensuring your Windows machine runs faster and leaner.
    Starting Price: $0
  • 29
    Cyber Prot

    Cyber Prot

    SC Next IT Computers SRL

    Cyber Prot is a streamlined security utility built for users who need lightweight yet ironclad protection for their Windows environment. It focuses on proactive defense, ensuring your system remains secure from unauthorized access and internal clutter. Key Features: Instant Data Lock: Uses high-level encryption to shield your most sensitive folders and files from prying eyes. Smart Uninstall Guard: Features a specialized security lock that requires admin validation to remove the software, preventing malware or unauthorized users from disabling your protection. System Hygiene: Beyond security, it monitors and manages background services, stopping "resource-hungry" processes to maintain peak PC speed. Stealth Operation: Designed to run silently in the background, providing maximum safety without intrusive pop-ups or heavy CPU usage. Zero-Trace Removal: Ensures a 100% clean uninstall, wiping all temporary data and registry entries.
    Starting Price: $0
  • 30
    Csper

    Csper

    Csper

    Csper is a security-focused platform designed to simplify the implementation, deployment, and management of Content Security Policy (CSP) for web applications, providing automated tools and insights that help protect users from common web vulnerabilities such as cross-site scripting. It offers a suite of features, including a CSP generator that can automatically create policy headers for any website, browser extensions that assist in building and refining policies in real time, and an evaluator that scans existing configurations to detect misconfigurations and security gaps. It enables developers to quickly generate, test, and deploy CSP rules, then monitor their effectiveness through actionable feedback and reporting, reducing the complexity traditionally associated with configuring CSP manually. Csper emphasizes ease of use and automation, allowing teams to understand, deploy, and maintain CSP in minutes while ensuring policies remain effective as applications evolve.
    Starting Price: $50 per month
MongoDB Logo MongoDB