Best IT Security Software - Page 58

Compare the Top IT Security Software as of May 2026 - Page 58

  • 1
    SparrowIQ

    SparrowIQ

    Solana Networks

    SparrowIQ is a turnkey network traffic monitoring solution developed to help IT organizations to rapidly troubleshoot and diagnose network issues and provide visibility into how applications are performing and thus affecting end user experience. Its award-winning ‘resource efficient’ design combines powerful performance monitoring capability in an easy-to-deploy, intuitive package ensuring minimal administrative load on an already strained IT staff. SparrowIQ was designed for small and medium businesses that have the same need as their larger counterparts for enterprise-class monitoring solutions but have limited technical resources, time and money to invest in traditional systems.
    Starting Price: $19 per month
  • 2
    Simply Sync Password

    Simply Sync Password

    GoodWorks Communications

    Simply Sync Password allows organizations to synchronize their passwords and active directory properties from their local Active Directory site to an external Active Directory sites or other external systems. Simply Sync Password is a great alternative for organizations that do not want the added complexity and cost that comes with establishing a trust relationship between Active Directory sites or deploying an AD FS infrastructure. AD FS is great for large organizations, but in many cases it just doesn’t make sense for small and medium-size organizations. The role of the Password Capture Agent is to intercept password changes as they occur on the domain controllers. Since you don’t know which domain controller a user is going to use to reset their password, the Password Capture Agent must be installed on all domain controllers. The Password Capture Agent does not interfere with the password change process, it simply intercepts the change request as it happens.
    Starting Price: $20 per user per month
  • 3
    SolarWinds Patch Manager
    Patch management software designed for quickly addressing software vulnerabilities. SolarWinds® Patch Manager simplifies many of the steps in the patch management process—from research and scheduling, to deployment and reporting—to help save you time and make it easier to keep your servers and workstations patched and compliant. SolarWinds Patch Manager works with and extends your Microsoft WSUS and SCCM deployments with pretested, prebuilt updates for Microsoft products and third-party applications from a central point of control. SolarWinds Patch Manager makes it easier to manage patches on virtual desktops and servers with the ability to patch offline machines, organize virtual machines into groups, and inventory virtual machines across your enterprise.
    Starting Price: $3495.00/one-time
  • 4
    east-tec InvisibleSecrets
    east-tec InvisibleSecrets is a powerful privacy suite that protects your files using a two-layered approach: military-grade encryption and steganography. While encryption secures your data, steganography goes further by hiding it inside harmless-looking files like images or web pages, so no one even knows it's there. The software also includes a secure password manager, an application locker to restrict access to programs, and a file shredder to permanently erase sensitive data. For easy and safe sharing, you can create self-decrypting packages that only require a password to open, even if the recipient doesn’t have the software. Additional tools like a virtual keyboard help defend against keyloggers, making InvisibleSecrets a well-rounded solution for protecting your digital life.
    Starting Price: $29.95 one-time payment
  • 5
    Aobo Internet Filter for Mac
    Aobo Filter for Mac OS X Professional is a piece of Internet Filtering Software for Mac OS X users. It effectively blocks porn websites, games and inappropriate applications on Mac. Aobo Filter for Mac is designed with the feature of logging website visiting as well, which helps you retrieve and identify visited websites from any web browsers. Computer becomes an indispensable facility in many offices and organizations. However, many employees are unable to use it appropriately, they are watching inappropriate videos, shopping on the internet, playing computer games, which give rise to the low working efficiency. Therefore, blocking unsuitable websites and applications is really important.
    Starting Price: $29.99 per month
  • 6
    LevelBlue USM Anywhere
    Elevate your security with LevelBlue USM Anywhere, an advanced open XDR platform designed to scale with your evolving IT landscape and growing business needs. Combining sophisticated analytics, robust security orchestration, and automation, USM Anywhere offers built-in threat intelligence for quicker and more precise threat detection, as well as streamlined response coordination. Its flexibility is unmatched, with extensive integrations—referred to as BlueApps—that enhance its detection and orchestration across hundreds of third-party security and productivity tools. These integrations also enable you to trigger automated and orchestrated responses effortlessly. Begin your 14-day free trial now and discover how our platform simplifies cybersecurity.
  • 7
    WSO2 Identity Server
    WSO2 Identity Server is API-driven, is based on open standards with the deployment options of on-premise, cloud or hybrid. It supports complex IAM requirements given its high extensibility. WSO2 Identity Server helps you do single sign-on and identity federation backed by strong and adaptive authentication, securely expose APIs, and manage identities by connecting to heterogeneous user stores. Leverage the power of open-source IAM in your enterprise to innovate fast and build secure Customer IAM (CIAM) solutions to provide an experience your users will love
  • 8
    Avatier Identity Anywhere
    Introducing Identity Anywhere, the world’s first Identity Management solution based on Docker containers making it the most portable, scalable and secure solution on the market. Docker container technology allows Identity Anywhere to run anywhere: on any cloud, on premise or a private cloud instance hosted by Avatier. Avatier Identity Management products brings separately administered back office applications and assets together to manage them as one system. Now armed with a unified digital dashboard, C-level executives deliver measurable business growth and increased profits. Eliminate the #1 Help Desk request with military grade self-service password reset. Reduce Costs. Only pay for the cloud app licenses you need. Maximize company utilization with a phenomenal shopping cart experience. Avoid fines, lawsuits, negative publicity, and even jail time due to non-compliance.
    Starting Price: $5.00/one-time/user
  • 9
    AlterWind Log Analyzer
    With the help of the AlterWind Log Analyzer Professional, you can generate new unique web stats reports for website search engine optimization (SEO), website promotion, and pay-per-click programs. You can save hundreds of hours and thousands of dollars and get more website traffic. The promotion and development of your website will be several times more effective. Never before did website traffic statistics software yield such opportunities for increasing website traffic and improving its quality. AlterWind Log Analyzer's database contains more than 430 search engines and more than 120 catalogs from 120 countries. You will gather stats about hits from a search engine of any country where your business is applicable and where your potential clients can be found. If such a search engine does not exist yet in our database, we will certainly add it.
    Starting Price: $86 one-time payment
  • 10
    Deep Log Analyzer

    Deep Log Analyzer

    Deep Software

    Advanced and affordable web analytics solution for small and medium size websites. Analyze web site visitors’ behavior and get the complete website usage statistics in several easy steps! With Deep Log Analyzer website statistics and web analytics software you’ll know exactly where your visitors come from and how they move through your website. This software will help you to attract more visitors, optimize your website and convert more visitors to satisfied customers. Analyze logs from Microsoft IIS, Apache or Nginx web server from any hosting provider and get web analytics reports. Run it on your Windows computer or server. View reports on Top web pages, Referral websites, Search engines & phrases, bots/spiders, browsers and OS's, server errors and more with Deep Log Analyzer. Export to HTML or Excel. Deep Log Analyzer is a highly configurable web analytics software. Create your own custom reports or tailor any of the 50+ included reports using SQL language.
    Starting Price: $299.95 one-time payment
  • 11
    Praetorian Chariot
    Chariot is the first all-in-one offensive security platform that comprehensively catalogs Internet-facing assets, contextualizes their value, identifies and validates real compromise paths, tests your detection response program, and generates policy-as-code rules to prevent future exposures from occurring. As a concierge managed service, we operate as an extension of your team to reduce the burden of day-to-day blocking and tackling. Dedicated offensive security experts are assigned to your account to assist you through the full attack lifecycle. We remove the noise by verifying the accuracy and importance of every risk before ever submitting a ticket to your team. Part of our core value is only signaling when it matters and guaranteeing zero false positives. Gain the upper-hand over attackers by partnering Praetorian. We put you back on the offensive by combining security expertise with technology automation to continuously focus and improve your defensive.
  • 12
    Core Access Insight
    Core Access Insight offers a continuous, comprehensive view and analysis of the relationship between identities, access rights, policies, and resources that occur across your entire environment. Our easy-to-use, easy-to-understand solution applies analytics to the big identity and access data in your organization, empowering you to identify identity-related access risks, and drive provisioning and governance controls to manage that risk within your business. With Access Insight, your governance system does more than just manage access. It provides access intelligence to analyze the identity and access data in your organization, using advanced analytics tools. This enables you to perform data mining, statistical analysis, and data visualization—drawing on specific governance policies, rules, and risk indicators to provide intelligence and valuable information for administrators, analysts, compliance officers, and incident responders.
  • 13
    RMail

    RMail

    RPost

    RMail® is the e-security platform by RPost®, a global leader since 2000. RMail specializes in elegantly easy to use email encryption for privacy and compliance, e-signatures, legal e-delivery proof, secure file sharing, email impostor protection, document rights management, and AI-infused services to prevent data leaks and human e-security errors. RMail’s transmission e-security services are most often used by businesspeople or business systems that send important, sensitive, or consumer-regulated information. These RMail services are generally applied to those messages where the sender needs functionality beyond standard email in terms of (a) easier to use and more automated email encryption for privacy compliance, (b) returning a verifiable proof record of who said what to whom by email, (c) assurance and peace of mind related to delivery and open status of important and time-deadline email, (d) need a timestamped proof of content delivered, (f) need to share large files securely.
    Starting Price: $7/month/user
  • 14
    AnVir Task Manager Pro
    Windows task manager processes, windows xp slow startup, windows startup programs, Vista tweaks. Control everything running on the computer, remove Trojans, speed up computer. AnVir Task Manager Pro provides convenience by offering all of its features in a single interface. It saves money because users won't have to buy multiple packages to perform a family of related tasks. Terminate processes that can not be terminated via Windows Task Manager. Temperature of CPU, video card, external USB HDD. Download and upload speed, amount of transferred data for network connections. Find locked files and DLL. Log of processes start and stop. Graph of processor, memory and disk activity for each process. Threads, handles, performance counters. Startup manager: manage all programs running on startup including services, Internet Explorer toolbars, Scheduler tasks.
    Starting Price: $49.95 one-time payment
  • 15
    Activu

    Activu

    Activu

    Activu makes any information visible, collaborative, and proactive for people tasked with monitoring critical operations and incidents. Our customers automatically see, share, and respond to events in real-time, with context, to improve incident response, decision-making, and management. Activu software, systems, and services benefit the daily lives of billions of people around the world. Founded in 1983 as the first U.S.-based company to develop video wall technology, more than 1,000 control rooms and command centers depend on Activu. The most Intuitive, Flexible, Feature rich wall control on the market. Organize information easily based on specific user needs. Easily create Layouts and Templates based on user needs. Organize, place and even move information across multiple video walls. Organize information assets in easily accessible, searchable Spaces. Support for virtually any information source type.
  • 16
    Plurilock DEFEND

    Plurilock DEFEND

    Plurilock Security

    Plurilock DEFEND provides true real-time authentication for the duration of an active computing sessions using behavioral biometrics and the computing devices your employees already use. DEFEND relies on a lightweight endpoint agent and proprietary machine learning techniques to confirm or reject user's identity with very high accuracy based on their console input stream, without authentication steps that are evident to the user. By integrating with SIEM/SOAR, DEFEND can be used to triage and respond to SOC alerts with high-confidence identity threat intelligence. By integrating with login and application workflows, DEFEND provides just-in-time biometric identity behind the scenes, enabling login workflows to be skipped when biometric identity is already in a confirmed state. DEFEND supports Windows endpoints, Mac OS endpoints, and IGEL and Amazon Workspaces thin and VDI clients.
    Starting Price: $9 per user per month
  • 17
    INETCO Insight

    INETCO Insight

    INETCO Systems Ltd.

    INETCO Insight is more than a transaction monitoring tool; it is a critical software platform for financial institutions and payment service providers focused on ensuring operational excellence, enhancing customer experience and mitigating risk in real-time. With a 360-degree view of the customer journey, you can manage the end-to-end experience, optimize decision-making and detect potential issues before they impact customers. By investing in this advanced real-time transaction monitoring platform, you are not only protecting your operations today but also positioning your organization for continued success in an increasingly fast-paced and demanding financial landscape.
  • 18
    OpenText Recover
    OpenText Recover is a cloud-based disaster recovery solution that continuously replicates critical systems and data to ensure immediate failover when disaster strikes. By securely replicating data in real-time with AES encryption, it minimizes downtime to just minutes and reduces potential business impact. The platform supports failover and failback processes that are quick and easy to manage, helping businesses maintain productivity. Organizations benefit from self-service testing and failover reports to validate their disaster recovery readiness without disrupting operations. OpenText Recover eliminates the need for costly secondary data centers by managing all infrastructure in the cloud. Flexible deployment options include self-service and managed disaster recovery services to meet varied business needs.
  • 19
    Amtel MDM Solution
    SaaS platform that’s easy to implement and roll out to end-users. Nothing is easier than getting started with Amtel. A few clicks and you are on your way. You could be missing our on huge savings if you’re not managing expenses! Completely integrated, increase your savings today! Amtel’s solution includes an integrated mobile and telecom asset management module that enables IT, administrators, to create and maintain a dynamic inventory in a centralized location across the enterprise. It is updated automatically with changes made via our eProcurement portal to keep it current and accurate. An accurate inventory compiled by a mobile asset management solution is essential for billing management, monitoring contract expirations, and elimination of unused telecom connections.
  • 20
    SoftActivity Monitor

    SoftActivity Monitor

    Deep Software Inc.

    User monitoring software that helps protect organizations from insider threat. This employee monitoring software lets you view your users' web browsing history, applications usage log, screen, accessed files, email and more. View remote screens in real time and get historical logs and reports.
    Starting Price: $189.95/one-time
  • 21
    Protegrity

    Protegrity

    Protegrity

    Our platform allows businesses to use data—including its application in advanced analytics, machine learning, and AI—to do great things without worrying about putting customers, employees, or intellectual property at risk. The Protegrity Data Protection Platform doesn't just secure data—it simultaneously classifies and discovers data while protecting it. You can't protect what you don't know you have. Our platform first classifies data, allowing users to categorize the type of data that can mostly be in the public domain. With those classifications established, the platform then leverages machine learning algorithms to discover that type of data. Classification and discovery finds the data that needs to be protected. Whether encrypting, tokenizing, or applying privacy methods, the platform secures the data behind the many operational systems that drive the day-to-day functions of business, as well as the analytical systems behind decision-making.
  • 22
    Activate

    Activate

    Activate

    Activate is an enterprise management and automation solution that manages a user's Identity, Access and Digital Workspace. It's fully integrated with Microsoft Suite offerings such as Active Directory, Office 365 and Azure AD. Activate enables users to request, approve and manage common IT systems like Active Directory, Exchange, Office 365 and Azure for themselves and other users in the organization. Activate's integration of Identity Management and Service Management into a single product enables stream-lined management of a User's Lifecycle from On-boarding to Off-boarding. Activate's virtual LDAP technology allows Azure AD to be managed in the same way as Active Directory. This means that services can be transitioned from on-premise to the cloud in a seamless manner without user service interruptions.
    Starting Price: $5.00/one-time/user
  • 23
    TraceCSO

    TraceCSO

    TraceSecurity

    Our TraceCSO software is the GRC platform for compliance and cybersecurity solutions. While our services are the perfect way to ensure cybersecurity and compliance via 3rd party review on a yearly bases, they are also the perfect launching point to begin using TraceCSO software. With a series of modules that work together to ensure you have a full picture of your cybersecurity environment, TraceCSO can take care of Risk Management, Vulnerability Management, Training Management and more!
  • 24
    ActiveData

    ActiveData

    Information Active

    ActiveData For Excel® adds advanced data analytics capabilities and time saving workbook and worksheet management features to Microsoft Excel®. With ActiveData for Excel you can join, merge, match, query, summarize, categorize, locate duplicate and missing items, combine, split, splice, slice and dice your data. Over 100 features, many designed to increase your overall productivity with Excel are included in this easy-to-use package. ActiveData for Excel offers a feature-rich product at a fraction of the price of competitive database-driven data analytics and computer assisted audit tools (CAATS). Skills acquired using ActiveData are directly transferrable to other data analysis software packages and computer-assisted audit tools (CAATs) like ACL and IDEA. Our software works well side by side with these packages and is ideal for less technical users. ActiveData for Excel is available in a Business and Professional edition and works with Microsoft Excel 2007 to 2019.
    Starting Price: $129 one-time payment
  • 25
    Active Wall

    Active Wall

    Active Network CO

    Active Wall uses the middle layer drivers developed independently as the filter engines, which are more low-leveled than other software which uses WinPCap. Because WinPCap is a protocol-type driver, it can only monitor but not block. The other software which uses WinPCap can only block TCP communications, but cannot block UDP, ICMP, IGMP data packets. It has been proved that Active Wall is more stable, correct and effective after working online for a long time. Most similar software support the only one mode- Passby monitoring mode. Besides the Passby mode, Active Wall supports more modes including Gateway mode, Bridge mode and Single mode. It is recommended that the users should use the Gateway mode or the Bridge mode. When using the Passby mode, Active Wall can only block TCP data packets for the limit of the network topology. However, the Gateway mode or the Bridge mode enables the Active Wall to block all kinds of data packets.
    Starting Price: $10 per user
  • 26
    STOPzilla AntiVirus
    Active scanning quickly removes malware and prevents new infections in real-time. Hourly virus definition updates make sure the very latest infections are targeted. Improved smart web filter blocks malicious web sites from stealing your information. Works silently in the background. Will not impact computer performance. STOPzilla AntiVirus 8.0 detects viruses and malware in real-time before it is even saved to the hard drive. Preventative, faster detection than previous versions gives you the best antivirus protection possible. Many viruses and malware threats are designed to interfere with the operation of AntiVirus/AntiMalware products. STOPzilla AntiVirus 8.0 is designed to thwart this type of interference allowing the product to provide uninterrupted protection. Our smart Web Filter is a cloud based URL scanning utility that is updated with newly discovered threats every 5 seconds, protecting you from malicious websites that steal end-user information.
    Starting Price: $39.95 per year
  • 27
    Polar Crypto Component
    Polar Crypto Component gives your Windows applications the functionality of unbreakable encryption. It enables you to build your own security systems instantly, or to easily integrate it into your existing systems, enhancing their security and performance. Polar Crypto features the latest encryption technology and includes full source code written in MS Visual C++ included. Polar Crypto is an ActiveX and DLL component which can be implemented whenever secure information, authenticity and data integrity are needed. In all applications developed for conducting business transactions, where absolute confidentiality is needed. For digital signature creation and validation. In e-commerce web site applications that store sensitive information such as clients’ credit card details. In desktop applications that encrypt confidential files on your computer or computer network.
    Starting Price: $239.00/one-time/user
  • 28
    Net Monitor for Employees
    Employee monitoring software has become an essential tool for tracking your employee activity to increase productivity in offices. It happens many times that many team members spare their time in watching unnecessary content on the Internet or using your resources for their personal use or just spending time in web browsing. Employee monitoring is an established method used by many companies to help prevent and detect data breaches that can cost their business a fortune. It is an effective way to boost workers' engagement and optimize working processes. Computer monitoring gives companies an overall picture of how work is done in and out of the office. By using computer surveillance software an organization can lower risk and become more profitable. Gathered data can be used for analyzing bottlenecks, unusual patterns, and other potential issues.
    Starting Price: $99.95 one-time payment
  • 29
    AgenaRisk
    AGENARISK uses the latest developments from the field of Bayesian artificial intelligence and probabilistic reasoning to model complex, risky problems and improve how decisions are made. You can use AgenaRisk models to make predictions, perform diagnostics and make decisions by combining data and knowledge about complex causal and other dependencies in the real world. Our clients use AgenaRisk to model a variety of problems involving risk and uncertainty including operational risk, actuarial analysis, intelligence analysis risk, systems safety and reliability, health risk, cyber-security risk and strategic financial planning. AgenaRisk designs and markets groundbreaking products using Bayesian Network technology. Our technology and accompanying methodology has been published in top academic AI, machine learning, actuarial, decision science and cognitive science journals.
  • 30
    602LAN SUITE

    602LAN SUITE

    Software602

    We digitize with the Sofa application. Electronic signatures with approval workflow and document vault. In the company at the office or at the home office. Simply. Digitally. Online application for fast digitization of companies and offices. Management of documents, data messages and processes with electronic signatures, intuitive workflow and archive. You can have it in the cloud in the office and at the home office. Up-to-date information on topics such as circulation, approval, document management using DMS systems, trusted digital archiving, qualified services, eIDAS regulations, electronic signatures and seals, timestamps, business processes and workflows. How to get rid of unnecessary paperwork and use time efficiently. There is an eBook Paperless office on this topic. Here you will find answers not only to how to cleverly digitize the office, but much more. Just one click and you have everything with you. Simply and digitally.
    Starting Price: $299.95/one-time/user
MongoDB Logo MongoDB