Best IT Security Software - Page 56

Compare the Top IT Security Software as of May 2026 - Page 56

  • 1
    Hushmail

    Hushmail

    Hushmail

    Hushmail protects your clients by adding encryption to your emails, web forms and e-signatures. It’s secure, HIPAA-compliant, and trusted by healthcare professionals worldwide. Best of all, Hushmail is easy to set up and use. Send your first encrypted email today, and set up a secure online intake form in minutes. Your Hushmail account works just like a regular email account, with added security features to help keep your data safe. Send and receive encrypted email on the web and iPhone. Access your account using Outlook, Apple Mail or your Android smartphone. Move your forms online in minutes. Hush™ Secure Forms is our secure alternative to old-fashioned paper forms and includes online signing for your most important digital forms. Switching from pen and ink to e-signatures has never been easier.
    Starting Price: $9.99/month/user
  • 2
    Oversight

    Oversight

    Oversight Systems

    With Oversight, you have 100% visibility in real-time across systems into every area of spend from payables to T&E, P-Cards and more. Leveraging AI and machine learning, Oversight completely automates spend analysis and prioritizes risk based on your unique spend profile, allowing for focused action on your most pressing audit findings. Oversight identifies process breakdowns so you can quickly correct issues and drive measurable change in employee purchasing behavior. Oversight optimizes the people – not just the policy – reducing out-of-policy spending by 70%. Oversight's proven best-practice approach reduces audit effort and delivers measurable ROI through behavior tracking, benchmarks, employee engagement and scorecards, which report progress and opportunity to diverse stakeholders. Use Oversight to control the most pressing risk in your financial process, whether procurement, payables, fleet, T&E, P-Card, or general ledger. The platform easily scales as you broaden your controls.
  • 3
    GSLB.me

    GSLB.me

    GSLB.me

    GSLB.me is a hosted, cloud-based, highly reliable DNS and Global Server Load Balancing solution that provides full authoritative DNS services, DNS-based geographical traffic balancing, failover, high availability, geographical routing, dynamic DNS, DNSSEC and recursive DNS. Nothing to install, configure your DNS services and you’re ready to go. Seamless and powerful. All in one, everything you need is here. Programmability and orchestration at your fingertips: GSLB.me can be used interactively or as a natively integrated component of your application or network service. Global Server Load Balancing made easy and powerful. Six balancing algorithms allow full control of your services delivery. Built on top of a reliable, fast and geographically-distributed infrastructure, GSLB.me speeds up your DNS resolution.
    Starting Price: $1 per month
  • 4
    AIONCLOUD

    AIONCLOUD

    AIONCLOUD

    Traditional networks used to be located within data centers, connecting users to secure applications. However, many applications are moving to a Software-as-a-Service (SaaS) model located on the cloud. With so many users and devices connected everywhere, traditional network security only increases complexity and cost, and can no longer solve the underlying problem. MONITORAPP provides Security-as-a-Service (SECaaS) on its cloud-based service platform AIONCLOUD. AIONCLOUD ensures both Website Protection and Secure Internet Access for smooth business operations. The AIONLCOUD Website Protection implemented on edge networks exhibits the same performance strength as physical servers. You can also maintain application performance and security regardless of where your application is located, such as in data centers, cloud, or multi-cloud.
    Starting Price: $35 per month
  • 5
    SendForensics

    SendForensics

    SendForensics

    On average, 30% of emails fail to reach their target by dropping straight into customers' spam folders. Reclaim this lost revenue with the most advanced email deliverability system available. The SendForensics Deliverability Score is a unique, predictive modeling of an email's ability to reach any given inbox. To put it simply, it is a measure of an email's 'quality' in terms of how it will be perceived by global filtering-systems/ISPs and even human recipients themselves. Truly the Missing Metric. From email content, to the sending infrastructure, reputation, engagement-history, external feeds (such as Microsoft SNDS*) and more, SendForensics EDS automatically sifts through the datasets to present the biggest cause(s) for concern at every analysis.
    Starting Price: $49 per user per month
  • 6
    Cognito

    Cognito

    Cognito

    Smarter identity verification services and compliance solutions. Our APIs are easy to integrate and our dashboards are built to simplify workflows, not clog them. With robust documentation and hands-on support, you will be integrated in days not months. We've verified and screened millions of customers and have learned a thing or two about what works. Our APIs are built to make doing the right thing the default so you can focus on your business. Extensive API documentation, a dedicated Slack room for your company, and clients SDKs for the most popular programming languages make Cognito quick and easy to integrate. Data security and compliance sit at our core. Sensitive values like SSNs are encrypted on disks with AES-256 and we engage in regular organizational (SOC 2) and app-level security audits.
    Starting Price: $0.99 per identity
  • 7
    Trisul Network Analytics

    Trisul Network Analytics

    Trisul Network Analytics

    In today's bandwidth unconstrained, encrypted, cloud-centric networks you can no longer separate traffic analytics from security and investigation activities. Trisul helps organizations of all sizes deploy full-spectrum deep network monitoring which can serve as a single goto source of truth for performance monitoring, network design, security analytics, threat detection, and compliance. Traditional approaches based on SNMP, Netflow, Agents, or Packet Capture have a narrow focus and rigid vendor-supplied analytics. Trisul is the only platform that provides a rich and open platform you can innovate upon. Includes a tightly integrated backend datastore and a web UI. Yet, open enough to plug into a different backend or to drive Kibana, Grafana UIs. Our design goal is to pack as much performance as we can in a single node. For larger networks scale out by adding more probes and hubs.
    Starting Price: $950 one-time payment
  • 8
    SNOK

    SNOK

    SecureNok

    SNOK™ is a cybersecurity monitoring and detection system tailored for industrial networks and control systems. SNOK™ detects targeted industrial attacks such as espionage, sabotage, malware, and other security interruptions in control systems. SNOK™ uniquely combines network and endpoint monitoring of components such as PLC’s, HMI’s, Servers etc. We are cybersecurity experts on industrial automation and control systems. Our skilled advisors and technicians help you secure critical infrastructure and production facilities, train your staff and implement secure practices. Hacking, malware and viruses have attacked IT systems for decades. Recently, cyberattacks has grown into a serious threat to critical industrial infrastructure as well. What has happened and how can infrastructure be protected? Assets in the Oil & Gas Industry are attractive targets for cyber-attacks with potentially severe consequences.
    Starting Price: $0.01
  • 9
    CloudFish

    CloudFish

    CloudFish

    Cloud-Fish protects your sensitive data across all platforms and provides your business with a solid defense against cyber-attacks and data breaches. Your sensitive business information, intellectual property assets, and customer data are stored on your employees’ computers, mobile devices, and on external cloud servers that your company uses. Securing this sensitive information is critical to protecting your business from financial risks, regulatory violations, and reputation setbacks. How do you ensure the security of your sensitive data that is dispersed across different platforms? Your company has regional as well as global offshore offices. You have little visibility and control over what is going on in your offshore organization. Who is sharing what information? You need an ability to monitor and an effective mechanism to respond if a cyber-attack or a security violation occurs.
    Starting Price: $9.09 one-time payment
  • 10
    CloudCheckr

    CloudCheckr

    Spot by NetApp

    CloudCheckr unifies IT, security and finance teams around the cloud and provides total visibility, deep insight, and cloud automation and governance. CloudCheckr is a comprehensive cloud management solution, helping businesses manage and automate cost as well as security for their public cloud environments. We are an AWS Advanced Technology Partner with Security and Government competencies, as well as a certified Silver Partner with Azure, to support multi- or hybrid-cloud strategies.
  • 11
    Specops Password Auditor
    Authentication and password security is more important than ever. Our password audit tool scans your Active Directory and identifies password-related vulnerabilities. The collected information generates multiple interactive reports containing user and password policy information. Specops Password Auditor is a read-only program, and available for free download. Analyze your domain password policies, and fine-grained password policies, to see if they enable users to create secure passwords. Generate reports to identify accounts with password vulnerabilities, including expired passwords, identical passwords, blank passwords, and more. In addition to these insights, Specops Password Auditor allows you to measure the effectiveness of your policies against a brute-force attack. For a complete list of the password reports, see the product overview.
    Starting Price: Free
  • 12
    UpGuard

    UpGuard

    UpGuard

    The new standard in third-party risk and attack surface management. UpGuard is the best platform for securing your organization’s sensitive data. Our security ratings engine monitors millions of companies and billions of data points every day. Continuously monitor your vendors, automate security questionnaires, and reduce third and fourth-party risk. Monitor your attack surface, prevent data breaches, discover leaked credentials, and protect customer data. Scale your third-party risk program with UpGuard analysts, and let us monitor your organization and vendors for data leaks. UpGuard builds the most powerful and flexible tools for cybersecurity. Whether you’re looking to prevent third-party data breaches, continuously monitor your vendors, or understand your attack surface, UpGuard’s meticulously designed platform, and unmatched functionality helps you protect your most sensitive data. Hundreds of the world’s most data-conscious companies are scaling faster and more securely.
    Starting Price: $5,249 per year
  • 13
    RDS-Shield

    RDS-Shield

    Marty Soft Conception

    RDS-Shield is a standalone Windows Service managing a lot of server events, and an intuitive Administration interface. No need to install Java, update PHP, download MS C++ libraries or .NET. All is included and so powerful. Just download it, install it, and discover. Forget the complexity of GPO & AD. Simply say: Now, all users of this group are in the Highly secured user environment, but in this same group, this account will be in a Secured user session, while others will work in Kiosk Mode. Easily import Applocker’s rules without opening GPO, allow Homeland Access, define Working Hours, and Control Intrusion attempts. What you say is what you get immediately. Your decisions are applied without reboot needed, without logoff/logon for connected users, and will be applied for your futures accounts or unconnected users. Ready to drive more Security Rules in few simples clicks?
    Starting Price: $299 one-time payment
  • 14
    Biosite

    Biosite

    Biosite Systems

    Turning data into insight. It makes Sense. Underpinned by a unique biometric algorithm, Biosite provides market-leading solutions for workforce management, task management, material management and fire safety & security on site. At the heart of all Biosite solutions is the capture of accurate data that is converted to valuable real-time insight, to enable more informed decision-making. Putting you in control. We work collaboratively with our customers to provide a tailored solution; becoming trusted partners and giving them peace of mind they are in control of their sites.
  • 15
    ManageEngine Key Manager Plus
    ManageEngine Key Manager Plus is a web-based key management solution that helps you consolidate, control, manage, monitor, and audit the entire life cycle of SSH (Secure Shell) keys and SSL (Secure Sockets Layer) certificates. It provides visibility into the SSH and SSL environments and helps administrators take total control of the keys to preempt breaches and compliance issues. Similarly, managing a Secure Socket Layer (SSL) environment can be daunting when organizations use a large number of SSL certificates issued by different vendors with varying validity periods. On the other hand, SSL certificates left unmonitored and unmanaged could expire, or rogue/invalid certificates could be used. Both scenarios could lead to service downtime or display of error messages that would destroy customer trust in data security and, in extreme cases, even result in security breaches.
    Starting Price: $595 per year
  • 16
    AssureID

    AssureID

    Acuant

    Real Time Multi-Factor Identity Verification Software AssureID offers fast multi-factor authentication to improve customer experiences, increase conversion rates and mitigate fraud. Patented technology authenticates IDs by applying 50+ forensic and biometric tests, in seconds, utilizing the industry's largest document library. Acuant's library is powered by human-assisted machine learning for the highest accuracy. AssureID eliminates manual errors, speeds up the document inspection process, and significantly reduces employee training. Solutions integrate easily into any environment in any industry and read IDs from over 196 countries and all 50 US states. Accurate data population with 50+ forensic tests run in seconds in the same seamless process. Three classes of facial match & liveness tests including NIST algorithm, intuitive & fast. World-class patented image capture that automatically crops & detects document type & region.
  • 17
    Intelligent Management Center

    Intelligent Management Center

    Hewlett Packard Enterprise

    Aruba AirWave is the only multi-vendor wired and wireless network management solution designed with mobile devices, users and apps in mind. By proactively monitoring the health and performance of all things connected, AirWave gives IT the insights needed to support today’s digital workplace. As network management becomes more complex, the risks associated with compromised data flow have also increased. HPE Intelligent Management Center (IMC) delivers comprehensive management across campus core and data center networks. IMC converts meaningless network data to actionable information to keep your network, and your business, moving. HPE network and service management solutions support telco networks from the core to the edge allowing operators to seize the profits of 5G. Simplify the management of data center and the Fibre Channel (FC) storage area network (SAN) fabrics. HPE IMC Branch Intelligent Management System. Enable remote network management of Customer Premises Equipment (CPE).
    Starting Price: $2000.00/one-time
  • 18
    Active Login Manager
    The login process is fully automated by ALM. In addition, the solution improves the usability of your Cisco IP Phone Extension Mobility by controlling the log on and log off process. ALM will automatically log off the connected phone at selected events, e.g. when the PC is locked or when the screensavers starts. The user or its administrator has the option to customize the ALM behavior. ALM Pro is a client-only application so there is no need to add or invest in new (server) hardware. Deployment of ALM to your existing network is fully scriptable. Configuration of the software is therefore an easy task. To even further simplify the management of large-scale installations, the RSconnect Application Manager is available.
  • 19
    ScoutDNS

    ScoutDNS

    ScoutDNS

    Content Filtering And Malware Protection At The DNS Layer. Organizations of all sizes depend on ScoutDNS to gain visibility, comply with content obligations, and reduce their malware exposure. Manage 67 content categories. Network wide Google and Bing restricted search filters image and video search results. Supports YouTube Strict and Moderate modes with G Suite support. Block streaming media, P2P, social networks, web proxy, games, and more. Blocks malware, ransomware, and phishing sites. Stop hidden malware and objectionable content inside embedded ads. Easy to deploy with automatic updates to latest threats. Full log reporting and system dashboard. Create and mange multiple whitelists/blacklists. Manage 67+ categories, and create multiple allow/block lists that can be assigned globally or by the policy. Add custom list entries direct from logs with a single click. Sign up for a risk free full featured trial account on a single site. There is no credit card required.
    Starting Price: $15 per month
  • 20
    BETTER Mobile

    BETTER Mobile

    Better Mobile Security

    BETTER Mobile Threat Defense protects mobile devices from attacks and threats. It’s simple, affordable, and powerful. Lightweight mobile agent that provides endpoint protection. Deploy it in minutes via EMM. Streamlined admin console gives immediate visibility, intelligence and control over device risks and threats. The console provides rich information and easy policy management, but our goal is to keep you from ever needing to use it. We have built one of the most advanced machine learning platforms and focused it on mobile threat detection. With our global mobile sensor network feeding rich intelligence into Deep Thinker, a cloud-based AI engine, BETTER MTD provides highly accurate detection of risky apps, anomalous behavior, and network threats. The detection engine provides comprehensive around-the-clock protection for your company data and resources. Runs in the background only consuming 5% battery and 1% CPU.
  • 21
    Sqreen

    Sqreen

    Sqreen

    Security built into every app. Everywhere. Application security platform that helps teams protect applications, increase visibility and secure code. Protect applications by preventing data breaches, stopping account takeovers and blocking business logic attacks. Increase visibility by monitoring incidents in real time, streamlining incident response management and automating your application inventory. Secure code by finding critical threats, fixing vulnerabilities and integrating security into the SDLC. Protect, observe and test your applications through a single platform and apply a holistic security approach. Analyze application execution logic in real-time to deliver more robust security without compromising performance. Sandboxed microagents dynamically adapt to evolving applications and threats without requiring maintenance.
    Starting Price: $499 per month
  • 22
    KITEWIRE Mobility
    Mobile device management (MDM) is a balancing act. You need to protect your company’s most valuable asset—proprietary data—from theft and misuse. But your employees need the freedom to use mobile devices that aren’t hampered by security software. Every organization should be free to use the right devices and technology to meet it’s mission. If you’re like many CIO’s, you might be trying to strike a balance between giving your employees the freedom to use the right devices and the necessity to protect your company’s proprietary information on those devices. Your IT administrator can have this intuitive, user-friendly tool up and running in six minutes. You don’t even have to schedule time with our team to walk you through it (but we’re here if you need us).
    Starting Price: $1 per device per month
  • 23
    Comodo Endpoint Security Manager
    Comodo Advanced Endpoint Protection provides a state-of-the-art anti-malware suite that proactively protects your servers, workstations, laptops and netbooks while offering advanced, real-time management and control over critical system resources. Whether deployed as a complete security suite or by using the sandbox as a standalone to fortify existing AV solutions, Comodo ESM offers unrivaled endpoint protection for Microsoft Windows servers, desktops, laptops and tablets. The full Comodo Endpoint Security suite brings 5 layers of defense (Antivirus, Firewall, Host Intrusion Prevention, Auto-Sandbox & File Reputation) to the point of impact - the desktop environment. Its ground-breaking auto-sandbox technology eliminates malware outbreaks and operating system contamination by automatically running untrusted processes in an isolated environment. This makes Comodo's endpoint protection the only managed anti-malware solution that can offer a $5,000 limited warranty against infection.
    Starting Price: $4.00/one-time/user
  • 24
    Motadata

    Motadata

    Motadata

    Effectively addressing the intricate challenges posed by modern networks requires the implementation of advanced solutions in the realm of Network Observability. In this pursuit, consider embracing the cutting-edge offerings of Motadata AIOps, a leading provider in the industry. By integrating Motadata AIOps into your network infrastructure, you not only eliminate data silos but also gain unparalleled visibility into various facets such as network performance, SNMP data, Network Flow, and log data. This comprehensive approach empowers you to monitor and analyze your network with utmost precision, ensuring seamless operations across diverse environments, from on-premise setups to the expansive landscape of cloud infrastructure. The synergy of innovative Network Observability and Motadata AIOps not only meets but exceeds the expectations set for network management, ushering in a new era of efficiency and reliability.
  • 25
    Lynis Enterprise
    Lynis Enterprise performs security scanning for Linux, macOS, and Unix systems. It helps you discover and solve issues quickly, so you can focus on your business and projects again. It is fairly unique for a company to focus on just a few operating systems. In a field where there are so many services and software solutions, we specialize in Linux and Unix security. The primary focus of Lynis is to perform a health check of systems. It helps also to detect vulnerabilities and configuration management weaknesses. Lynis Enterprise is a software solution to perform security auditing, compliance testing, and apply system hardening. It includes Lynis in the core and focuses on environments with Linux, macOS, or other Unix-based systems.
    Starting Price: $90 per year
  • 26
    Nagios XI

    Nagios XI

    Nagios Enterprises, LLC

    Provides monitoring of all mission-critical infrastructure components including applications, services, operating systems, network protocols, systems metrics, and network infrastructure. Hundreds of third-party addons provide for monitoring of virtually all in-house applications, services, and systems. Provides a central view of your entire IT operations network and business processes. Powerful dashboards provide at-a-glance access to powerful monitoring information and third-party data. Views provide users with quick access to the information they find most useful. Automated, integrated trending and capacity planning graphs allow organizations to plan for infrastructure upgrades before outdated systems catch them by surprise. Alerts are sent to IT staff, business stakeholders, and end-users via email or mobile text messages, providing them with outage details so they can start resolving issues immediately.
    Starting Price: $1995.00/one-time
  • 27
    Nagios Log Server

    Nagios Log Server

    Nagios Enterprises

    Nagios Log Server greatly simplifies the process of searching your log data. Set up alerts to notify you when potential threats arise, or simply query your log data to quickly audit any system. With Nagios Log Server, you get all of your log data in one location, with high availability and fail-over built right in. Quickly configure your servers to send all log data with easy source setup wizards and start monitoring your logs in minutes. Easily correlate log events across all servers in a few clicks. Nagios Log Server allows you to view log data in real-time, providing the ability to quickly analyze and solve problems as they occur. This keeps your organization safe, secure, and running smoothly. Nagios Log Server provides users with advanced awareness of their infrastructure. Dive deep into network events, logs, and security events. Use Log Server to provide the evidence necessary to track down security threats, and quickly resolve vulnerabilities with built-in alerts.
    Starting Price: $1995.00/one-time
  • 28
    LiteSpeed Web ADC

    LiteSpeed Web ADC

    LiteSpeed Technologies

    LiteSpeed Web ADC is an affordable, high-performance HTTP load balancer application. Feature-rich, secure, and efficient, it offers more flexibility than similarly-priced load balancing software. Web ADC is an excellent choice for small enterprises looking to scale their applications beyond one server. High Scalability, High Availability IP failover, Cross Datacenter Replication, Cache Data Synchronization and out-of-the box acceleration for Magento and Wordpress round out the feature set to make LiteSpeed Web ADC the best-of-breed solution on the market. LiteSpeed Web ADC is a 100% software solution, meaning it can operate anywhere: private dedicated hardware, hosted environment, the cloud, etc. Web ADC's nearly-instant on-demand scaling adapts to your business needs, even during unexpected traffic spikes, with a flexible subscription model. A highly efficient, security-conscious, cost-effective product.
    Starting Price: $715 per year
  • 29
    VMware Tanzu CloudHealth
    Tanzu CloudHealth (formerly VMware Aria Cost Powered by CloudHealth) simplifies financial management, streamlines operations, and improves organizational collaboration across your multi-cloud environment. Get visibility into a rich set of data for managing your multi-cloud environment. Analyze your infrastructure by dynamic business groups and access custom reporting. Improve resource utilization and realize cost savings with tailored recommendations. Drive continuous optimization with governance policies and automated actions that execute changes in your cloud environment. With more than $24B of annualized cloud spend under management, Tanzu CloudHealth supports 22,000+ organizations worldwide. Grow your cloud expertise with a proven framework to progress through your cloud management maturity journey.
  • 30
    4identity
    4identity is the technological solution developed by Bit4id that empowers web applications with Digital Signature and Authentication processes. 4identity does not use Java Applets or any other third party add-on. It is simple, its is compatible with any web browser and works under the most used operating systems. The “integration-less” Engine to add Digital Signature and Strong Authentication to web applications through a simple API. 4identity means usability, providing a “1-click signing” user experience. Bit4id has extensive knowledge and experience in the development of software and tools for security and digital identity management based on Public Key Infrastructure (PKI). Providing solutions for managing more than 10 million digital identities, and processing more than 50 million digital signatures a year, Bit4id is a company leading in innovation for the PKI and digital identity market in Europe and Latin America.
MongoDB Logo MongoDB