Best IT Security Software - Page 50

Compare the Top IT Security Software as of April 2026 - Page 50

  • 1
    TikBox

    TikBox

    TikBox

    Transforming how digital content is secured, shared, and monetized. Available to all creators. Our custom-built tools, template agreements, and auto-invoicing enable you to establish copyrights, add provenance, and monetize your assets with ease. In-house legal teams can create custom agreements or integrate existing ones into the contract builder, ensuring colleagues in various functions have access to appropriate contractual arrangements. Our multi-layered encryption ensures the integrity of your copyright & provenance metadata & labels. This safeguards your data against manipulation & secures your licensing revenue streams. TikBox is pioneering an online ecosystem tailored for digital content creators to assert copyrights, embed provenance details, and unlock new revenue streams from their online assets. Our platform is designed to seamlessly integrate copyright and provenance-related metadata into your digital creations, safeguarding them across the internet.
    Starting Price: $5.84 per month
  • 2
    Jamf School
    Jamf School’s web-based interface provides the best learning experience for students. Deploying, managing, and securing Mac, iPad, iPhone, and Apple TV has never been simpler. Keep track of managed devices, users, and apps. Drag and drop apps, content, and restrictions. Students gain automatic access to subject-specific materials. Keep track of device damage and problems. Manage each location and its devices, users, and groups. Download files that will be used by multiple students. Teachers can request apps, which are then shared with IT admins. Keep teachers in control of their classrooms and parents in charge of their students. Jamf Student app gives students restricted permissions over their own devices. It enables live proctoring of web-based assessment exams and displays a camera view and the exam itself. Education-focused management and security for school IT admins, teachers, and parents.
    Starting Price: $5.50 per year
  • 3
    Jamf Safe Internet
    The internet should be where students learn confidently: growing and exploring where their curiosity takes them. Students spend nearly twice as much time online than ever before. This means a growing need for digital safety to eliminate cyberattacks and prevent students from accessing unsafe content. Jamf Safe Internet is an educational content-filtering solution. It ensures students can navigate the internet without reserve or fear, purpose-built for Apple, available across all mobile platforms. Comprehensive content filtering optimized for education and integrated with MDM for simple, powerful student and user protection. Designed to help schools and colleges protect students from harmful content on the internet, Jamf Safe Internet enforces acceptable-use policies without sacrificing the unmatched learning experience Apple devices provide. We combine best-in-class network threat prevention and a vast content-filtering database to block unsafe content and malicious attacks.
    Starting Price: $5 per year
  • 4
    Jamf Executive Threat Protection
    Users work from mobile devices more than ever before. And some of these devices access critical company and personal information. Jamf Executive Threat Protection keeps this data safe from increasingly sophisticated threats. Users requiring the highest level of security possible need advanced detection and response, which provides visibility into sophisticated attacks that Apple’s Lockdown Mode aims to prevent. Jamf does this by validating the integrity of a device and analyzing any compromise, without sacrificing privacy. Monitor beyond apps and device management to instantly find signs of compromise and provide a rich context to a sophisticated mobile attack. It does not collect personal information like passwords, photos/videos, text messages call data, contacts, or browser history. The modern workforce is mobile, but mobile is the weakest link. Complete mobile security for advanced detection and response.
    Starting Price: Free
  • 5
    12Port Horizon
    Our agentless platform allows you to quickly segment network workloads and restrict unauthorized traffic to prevent lateral movement and stop breaches. Protecting IT assets across physical, virtual, and cloud environments is increasingly complex. Traditional security can't counter sophisticated threats. Microsegmentation isolates workloads, monitors east-west traffic, and prevents lateral movement, ensuring attackers can't spread to critical areas and enhancing overall network security. Build and enforce security policies based on asset classification using hierarchical taxonomies and tagging. Enforce strict access controls and routinely monitor service traffic, aligning with zero trust principles to provide a comprehensive and flexible security strategy. 12Port Horizon features an agentless architecture, simplifying deployment and maintenance across physical, virtual, and cloud environments without adding complexity.
    Starting Price: $15 per month
  • 6
    Binarii Labs

    Binarii Labs

    Binarii Labs

    Binarii Labs has a patented data security process that uniquely solves cyber security risks, resilience, and bad actor threats. To revolutionize data security through a platform to enable people and enterprises to take back control, and ownership and secure custody of their own and their stakeholder’s data. This is achieved through our UK & UK-US-patented process which involves encryption, fragmentation, and distribution across multi-cloud storage solutions that enable business continuity, risk mitigation, and enterprises to uphold regulation and compliance. The secure storage of your data is proven through the world's first immutable ledger by providing the user a proof of record on the blockchain. Our patented data security process encrypts, fragments, and distributes your data wherever you want, and records its provenance on the blockchain for unprecedented security. 
However, you always own and control your data.
    Starting Price: €15 per month
  • 7
    AUTHADA

    AUTHADA

    AUTHADA

    AUTHADA is a company specializing in digital identification and signature solutions, offering services that enable quick, legally compliant, and digital processes. Their solutions digitize application procedures, optimize processes, and transform heavily regulated markets into modern, user-friendly, and digital industries. With a growing team of over 30 motivated employees, AUTHADA continuously develops its solutions, adapting them individually to customer needs. The company emphasizes trust, innovation, and solution orientation, both within the team and externally. AUTHADA's services include online identification, digital signatures, and on-site identification, all designed to provide secure and efficient digital processes. The ID data and the signed documents are transferred to the service provider in the last step. The branch employee uses the app to capture the customer’s ID card documents.
    Starting Price: Free
  • 8
    UpPass

    UpPass

    UpPass

    A single API that unifies verification methods, fraud tech, and trusted financial and identity data in Southeast Asia. Reduce integration and testing time to a matter of a few days. Access to truly local financial and identity data sources digitally. Validate individual or business information and their addresses with local data sources and AML lists to make sure you acquire only legitimate customers. Make suspicious users go through a series of verifications and streamline the process for genuine users with decision workflow. Build a seamless verification flow that fits your risk and compliance requirements. Chat with experts and choose the verifications, fraud services, and local data integration that fit your needs. Orchestrate the fraud decision with rules from various data sources. Set up a single API decision workflow for a personalized experience that can be embedded anywhere in your user journey.
    Starting Price: $0.20 USD per credit
  • 9
    Spotrisk

    Spotrisk

    Spotrisk

    Spotrisk safeguards online businesses against fraudsters, scammers, and bad actors. Increase revenue, save time, and eliminate doubt. Spotrisk can protect both ecommerce stores and SaaS businesses. Spotrisk is easy to setup, up and completely free to use. No credit card is required until you want to upgrade your limits or features. Get key information on why users or buyers are being flagged as risky. Use the extra context to take action confidently. Leveraging customer and behavioral data from our network, Spotrisk can detect a bad actor the very first time they order from you. Block known-fraudsters permanently, or build a whitelist so your best customers don't have their orders flagged. Extend and customize Spotrisk to suit your unique business needs with API access. Verify a buyer's identity with the click of a button using Spotrisk's buyer verification feature. Our live dashboard lets you see how much fraud Spotrisk is blocking, and how much you're saving in the process.
    Starting Price: $99 per month
  • 10
    bucketAV

    bucketAV

    bucketAV

    Forget the hassle of complex configuration. Detect viruses, trojans, ransomware, and malware at your convenience with a ready-to-deploy solution for your cloud infrastructure. Protect Amazon S3 or Cloudflare R2 from viruses, trojans, ransomware, and other kinds of malware. Keep your files virus-free with a solution that runs on its own within your cloud infrastructure and effortlessly scales. You don’t need to search far and wide. Here you find the easiest solution to deploy to protect your data integrity while combating malware threats. Start in 15 minutes with the help of our setup guide and auto-installer based on AWS CloudFormation. Scan uploaded files within seconds to immediately detect malware. Scan your data with virtual machines running in your AWS account, with no need to transfer data to an external service. Automatically scan as many files as needed ensuring cost efficiency even for spiky workloads.
    Starting Price: $0.025 per hour
  • 11
    VIPRE SafeSend

    VIPRE SafeSend

    VIPRE Security Group

    Protect your organization from accidental data breaches with VIPRE SafeSend, the ultimate safeguard for Microsoft Outlook. SafeSend prompts users to confirm external recipients and attachments before sending emails, reducing the risk of misaddressed messages. Unlike traditional Data Loss Prevention (DLP) solutions that simply block emails after they’re sent—adding strain to already overstretched security teams—SafeSend proactively empowers employees to recognize and prevent mistakes in real time. It also scans outgoing emails and attachments to ensure sensitive data stays within your network. Over time, users develop better email habits, enhancing your organization’s security posture. Choose from two tailored packages: one focused on preventing misaddressed emails and another designed to meet comprehensive DLP requirements. With VIPRE SafeSend, you’re not just protecting data—you’re building a smarter, more security-conscious workforce.
    Starting Price: $30/user/year
  • 12
    Microsoft Purview Audit
    Determine the scope of compromise, and access audit logs to support investigations. Determine the scope of compromise, and access audit logs to support investigations. Get a dynamic bandwidth quota to access your auditing data. Support investigations by providing visibility to events such as when mail items were accessed, replied to, and forwarded, or when and what a user searched for in Exchange Online and SharePoint Online. Create customized audit log retention policies to retain audit records based on the service where the audited activities occur, specific audited activities, or the user who performs an audited activity. Organizations are initially allocated a baseline of 2,000 requests per minute, where this limit will dynamically increase depending on an organization's seat count and licensing subscription. Retain audit log records for up to 10 years with an add-on license.
    Starting Price: $12 per month
  • 13
    Microsoft Purview Data Loss Prevention
    Get intelligent detection and control of sensitive information across Office 365, OneDrive, SharePoint, Microsoft Teams, and on the endpoint. Our data landscape has evolved and data loss prevention (DLP) solutions need to evolve too. Learn about the common deployment states, migration challenges, and best practices including the benefits of adopting a cloud-native DLP solution. Help prevent unauthorized sharing, use, or transfer of sensitive information across apps, services, and devices with Microsoft Purview Data Loss Prevention. Create, manage, and enforce data loss prevention policies from the Microsoft Purview compliance portal. DLP is integrated with information protection classification and labeling capabilities, including out-of-the-box, customer, or advanced SITs and trainable classifiers. Configure, triage, and track alerts through the Data Loss Prevention (DLP) alerts page. Extend DLP alerts to the Microsoft Defender XDR portal and Microsoft Sentinel.
    Starting Price: $12 per month
  • 14
    Microsoft Purview Information Protection
    Understand what data is sensitive and business-critical, then manage and protect it across your environment. Experience built-in labeling and information protection in Microsoft 365 apps and services. Get accurate classification with AI-powered classifiers, exact data matches, and other capabilities. Configure and manage policies and view analytics across on-premises file shares, Microsoft 365 apps and services, and desktop and mobile devices in one place. Extend a consistent protection experience to popular non-Microsoft apps and services with an SDK. Enable discovery and protection of sensitive data across your digital estate, including Microsoft 365 and Azure clouds; on-premises, hybrid, and third-party clouds; and SaaS apps. Scan across data at rest and in use to classify it across on-premises file shares, SharePoint, OneDrive, Exchange, Microsoft Teams, endpoints, and non-Microsoft cloud apps.
    Starting Price: $12 per month
  • 15
    Gecko Security

    Gecko Security

    Gecko Security

    Gecko makes it possible to find 0 days that previously only humans could find. We are on a mission to automate hacker intuition and build the next generation of security tooling. Gecko is an AI-powered security engineer that finds and fixes vulnerabilities in your codebase. Gecko tests your code like a hacker and finds logical vulnerabilities that slip past other tools. Findings are verified in a secure sandbox, minimizing false positives. Gecko integrates into your environment and catches vulnerabilities as they emerge. Secure the code you ship without slowing down development. Vulnerabilities are verified and prioritized. No noise, only actual risk. Gecko creates targeted attack scenarios to test your code like a hacker. No more wasting engineering time and cost on patching vulnerabilities. Connect your existing SAST tools and integrate them into your security stack. Our optimized testing can complete comprehensive pentests in hours.
    Starting Price: Free
  • 16
    ZITADEL

    ZITADEL

    ZITADEL

    ZITADEL is an open-source identity and access management platform designed to simplify authentication and authorization for applications. It offers a comprehensive suite of features, including customizable hosted login pages, support for modern authentication methods such as Single Sign-On (SSO) and social logins, and enforcement of multifactor authentication to enhance security. Developers can integrate authentication directly into their applications using ZITADEL's APIs or build dedicated login interfaces. The platform supports role-based access control, allowing for precise permission assignments based on user roles, and is inherently multi-tenant, facilitating easy extension of applications to new organizations. ZITADEL's extensibility enables seamless adaptation to various workflows, user management processes, and brand guidelines, with features like ZITADEL Actions that execute workflows after predefined events without the need for additional code deployment.
    Starting Price: $100 per month
  • 17
    Caido

    Caido

    Caido Labs Inc.

    Caido is a modern web security toolkit designed for pentesters, bug bounty hunters, and security teams who need an efficient and customizable solution for web application testing. Caido features a powerful intercept proxy for capturing and manipulating HTTP requests, replay functionality for testing endpoints, and automation tools for handling large-scale workflows. Its sitemap visualization provides a clear view of web application structures, helping users map and navigate complex targets. With HTTPQL, users can efficiently filter and analyze traffic, while no-code workflows and a plugin system enable easy customization to fit specific testing needs. Built on a flexible client/server architecture, Caido supports local or remote hosting, allowing seamless access from anywhere. Its project management system simplifies switching between targets and eliminates the need for manual file handling, keeping workflows organized.
    Starting Price: Free
  • 18
    Trivy

    Trivy

    Aqua Security

    Trivy is a comprehensive and versatile security scanner. Trivy has scanners that look for security issues, and targets where it can find those issues. Trivy supports the most popular programming languages, operating systems, and platforms. Trivy is available in the most common distribution channels. Trivy is integrated with many popular platforms and applications. Trivy is integrated into many popular tools and applications so that you can easily add security to your workflow. Find vulnerabilities, misconfigurations, secrets, and SBOM in containers, Kubernetes, code repositories, clouds, and more.
    Starting Price: Free
  • 19
    Docker Scout
    Container images consist of layers and software packages, which are susceptible to vulnerabilities. These vulnerabilities can compromise the security of containers and applications. Docker Scout is a solution for proactively enhancing your software supply chain security. By analyzing your images, Docker Scout compiles an inventory of components, also known as a Software Bill of Materials (SBOM). The SBOM is matched against a continuously updated vulnerability database to pinpoint security weaknesses. Docker Scout is a standalone service and platform that you can interact with using Docker Desktop, Docker Hub, the Docker CLI, and the Docker Scout Dashboard. Docker Scout also facilitates integrations with third-party systems, such as container registries and CI platforms. Reveal and dig into the composition of your images. Ensure that your artifacts align with supply chain best practices.
    Starting Price: $5 per month
  • 20
    Tenable Vulnerability Management
    The solution that created the category continues to raise the bar to protect enterprises from critical cyber exposures that increase business risk. Expose and close your cyber weaknesses with the world’s #1 vulnerability management solution. Gain the full visibility you need to reveal the impactful vulnerabilities across your IT environment. Quickly spot priority exposures with a high likelihood of attack and business impact. Take rapid, decisive action to close critical exposures and execute remediations. Find hidden vulnerabilities with continuous, always-on asset discovery and assessment of known and unknown assets in your environment, even highly dynamic cloud or remote workforce assets. Search, contextualize, and respond to vulnerabilities based on the industry’s richest sources of data and intelligence provided by Tenable Research. Identify which vulnerabilities to fix first with automated prioritization that combines vulnerability data, threat intelligence, and data science.
    Starting Price: $4,399.05 per year
  • 21
    Fraudnetic

    Fraudnetic

    Fraudnetic

    We employ cutting-edge technology and data intelligence to stay one step ahead of emerging fraud threats. We're dedicated to safeguarding your online platform, ensuring a secure and enjoyable experience for your business and customers alike. Fraudnetic is your trusted source for advanced anti-fraud solutions tailored specifically to the gambling industry. Robust methods to authenticate user identities, minimizing the risk of fraudulent activities. Real-time surveillance to detect suspicious and abnormal activities, ensuring secure financial transactions. Tailored strategies to mitigate risks, safeguarding gambling platforms from potential threats. You'll have the opportunity to explore Fraudnetic's user-friendly interface and see how it seamlessly integrates into your existing infrastructure. Fraudnetic can adapt to the size and needs of your operation, from startups to established enterprises.
    Starting Price: Free
  • 22
    NextAuth.js

    NextAuth.js

    NextAuth.js

    NextAuth.js is an open source authentication solution tailored for Next.js applications, offering seamless integration with popular services like Google, Facebook, Auth0, and Apple. It supports various authentication methods, including OAuth 1.0 & 2.0, email/passwordless sign-ins, and custom username/password systems. Designed for flexibility, NextAuth.js operates efficiently in serverless environments and supports multiple databases such as MySQL, PostgreSQL, MSSQL, and MongoDB, allowing developers to choose between database sessions or JSON Web Tokens (JWT). Security features include signed, prefixed, server-only cookies, HTTP POST with CSRF token validation, and encrypted JWTs using JWS/JWE/JWK standards. The platform facilitates easy setup, enabling developers to add authentication in minutes with minimal configuration. Comprehensive documentation and a supportive community further enhance its accessibility for developers seeking a robust authentication system.
    Starting Price: Free
  • 23
    Auth.js

    Auth.js

    Auth.js

    Auth.js is an open-source authentication library designed to integrate seamlessly with modern JavaScript frameworks, providing a flexible and secure authentication experience. It supports various authentication methods, including OAuth (e.g., Google, GitHub), credentials, and WebAuthn, allowing developers to choose the most suitable approach for their applications. Auth.js is compatible with multiple frameworks, such as Next.js, SvelteKit, Express, Qwik, and SolidStart, enabling developers to implement authentication across different platforms. The library offers built-in support for popular databases like Prisma, Drizzle ORM, Supabase, Firebase, and TypeORM, facilitating user data management. Security features include signed cookies, CSRF token validation, and encrypted JSON Web Tokens (JWTs), ensuring robust protection for user data. Auth.js is designed to operate efficiently in serverless environments and provides comprehensive documentation and examples.
    Starting Price: Free
  • 24
    Amazon Security Lake
    Amazon Security Lake automatically centralizes security data from AWS environments, SaaS providers, on-premises, and cloud sources into a purpose-built data lake stored in your account. With Security Lake, you can get a more complete understanding of your security data across your entire organization. You can also improve the protection of your workloads, applications, and data. Security Lake has adopted the Open Cybersecurity Schema Framework (OCSF), an open standard. With OCSF support, the service normalizes and combines security data from AWS and a broad range of enterprise security data sources. Use your preferred analytics tools to analyze your security data while retaining complete control and ownership over that data. Centralize data visibility from cloud and on-premises sources across your accounts and AWS Regions. Streamline your data management at scale by normalizing your security data to an open standard.
    Starting Price: $0.75 per GB per month
  • 25
    NexVision

    NexVision

    NexVision Lab

    NexVision is an AI-powered platform that provides multi-layered, real-time information gathering and cyber protection. It offers deep, contextual intelligence encompassing targets, motivations, and threat analytics. The platform's advanced search algorithm discovers over 120,000 hidden Tor sites daily, enabling users to access the deep and dark web without the need for anonymizing browsers like Tor. NexVision's AI/ML-powered engine continuously collects, analyzes, and sorts big data from publicly available databases and the deep web, supporting multiple languages and equipped with natural language processing and steganography-decoding capabilities to detect hidden information used by advanced threat actors. The user-friendly dashboard allows for setting keyword alerts, conducting investigations, and analyzing results while maintaining user anonymity. NexVision enables organizations to proactively safeguard their assets and maintain a secure online environment.
    Starting Price: Free
  • 26
    OpenFGA

    OpenFGA

    The Linux Foundation

    OpenFGA is an open source authorization solution that enables developers to implement fine-grained access control using a user-friendly modeling language and APIs. Inspired by Google's Zanzibar paper, it supports various access control models, including Relationship-Based Access Control (ReBAC), Role-Based Access Control (RBAC), and Attribute-Based Access Control (ABAC). OpenFGA offers SDKs for multiple programming languages, such as Java, .NET, JavaScript, Go, and Python, facilitating seamless integration into diverse applications. The platform is designed for high performance, capable of processing authorization checks in milliseconds, making it suitable for projects ranging from small startups to large enterprises. Operating under the Cloud Native Computing Foundation (CNCF) as a sandbox project, OpenFGA emphasizes transparency and community collaboration, inviting contributions to its development and governance.
    Starting Price: Free
  • 27
    Permify

    Permify

    Permify

    Permify is an authorization service designed to help developers build and manage fine-grained, scalable access control systems within their applications. Inspired by Google's Zanzibar, Permify enables the structuring of authorization models, storage of authorization data in preferred databases, and interaction with its API to handle authorization queries across various applications and services. It supports multiple access control models, including Role-Based Access Control (RBAC), and Attribute-Based Access Control (ABAC), allowing for the creation of granular permissions and policies. Permify centralized authorization logic, abstracting it from the codebase to facilitate easier reasoning, testing, and debugging. It offers flexible policy storage options and provides a role manager to handle RBAC role hierarchies. The platform also supports filtered policy management for efficient enforcement in large, multi-tenant environments.
    Starting Price: Free
  • 28
    ArtistScope Site Protection System (ASPS)
    ArtistScope Site Protection Software (ASPS) provides the most robust and most secure website security and copy protection for all web page media, safe from all copy including screen capture, download, scraping, etc. In fact ASPS provides the most secure solution for data security and the prevention of data loss and plagiarism ever imagined. The ASPS server module is installed on the web server (Apache or Windows) to deliver encrypted web pages from your web site that only the ArtisBrowser can interpret and display, creating a secure tunnel between website and the user's web browser in which no data or media can be copied or extracted by any means, not even from browser cache or memory. ASPS is most unique and it is most secure because it does not depend on popular web browsers which are useless for copy protection. Any media displayed on your web page will be copy protected and you can use any video file format or embedded player that you like.
    Starting Price: $495.00
  • 29
    GoAccess

    GoAccess

    GoAccess

    GoAccess is an open source, real-time web log analyzer and interactive viewer that operates within a terminal on Unix-like systems or through a browser interface. Designed for rapid analysis, it provides immediate HTTP statistics, making it ideal for system administrators who need quick insights into server performance. The tool supports various web log formats, including those from Apache, Nginx, Amazon S3, Elastic Load Balancing, CloudFront, and Caddy, allowing users to set the log format and analyze logs effortlessly. Written in C, GoAccess requires only ncurses as a dependency, ensuring swift, millisecond-level updates. It offers customizable terminal and web-based dashboards, enabling users to tailor color schemes to their preferences. Beyond terminal output, GoAccess can generate comprehensive, self-contained real-time HTML reports, as well as JSON, facilitating analytics, monitoring, and data visualization.
    Starting Price: Free
  • 30
    GitHub Advanced Security
    With AI-powered remediation, static analysis, secret scanning, and software composition analysis, GitHub Advanced Security helps developers and security teams work together to eliminate security debt and keep new vulnerabilities out of code. Code scanning with Copilot Autofix detects vulnerabilities, provides contextual explanations, and suggests fixes in the pull request and for historical alerts. Solve your backlog of application security debt. Security campaigns target and generate autofixes for up to 1,000 alerts at a time, rapidly reducing the risk of application vulnerabilities and zero-day attacks. Secret scanning with push protection guards over 200 token types and patterns from more than 150 service providers, even elusive secrets like passwords and PII. Powered by security experts and a global community of more than 100 million developers, GitHub Advanced Security provides the insights and automation you need to ship more secure software on schedule.
    Starting Price: $49 per month per user
MongoDB Logo MongoDB