Best IT Security Software - Page 56

Compare the Top IT Security Software as of April 2026 - Page 56

  • 1
    Themis

    Themis

    Cossack Labs

    Secure Cell is a multi-mode cryptographic container suitable for storing anything from encrypted files to database records. Use Secure Cell to encrypt data at rest. Secure Cell is built around AES-256-GCM, AES-256-CTR. Secure Message is a simple encrypted messaging solution for the widest scope of applications. Use Secure Message to send encrypted and signed data from one user to another, from client to server, to prevent MITM attacks and avoid single secret leakage. Based on ECC + ECDSA / RSA + PSS + PKCS#7. Zero-knowledge proof-based protocol to compare secrets over non-trusted channels without risking leaks or reuse attacks. Use Secure Comparator for authenticating the users in a way that no password (or password hash) is sent over the network. Secure Session is a session-oriented encrypted data exchange with forward secrecy for better security guarantees and more demanding infrastructures.
    Starting Price: $0.01
  • 2
    Effivity

    Effivity

    Effivity Technologies

    Effivity is a cloud-based / on-premise QHSE/FSMS/ISMS software to implement a robust Quality - Occupational Health & Safety - Environment Management System & offers 100% conformity to ISO 9001, ISO 14001, ISO 45001, ISO 22000, HACCP standards. Effivity makes ISO compliance simple, easy, quick, value adding, cost-effective, collaborative and time-saving which results in enabling an organization to enhance efficiency and augment productivity as validated by users in more than 120 countries. Effivity offers a unique approach to optimize your management system with world-renowned QMS software, HSE software & FSMS-HACCP software. Simplicity, standardization and customer satisfaction delivered with no-code quality management system software, safe workplace enabled with 100% customizable occupational health & safety management system, sustainable environment possible with a user-friendly environment management system and safe food delivered with HACCP software that is ready to use.
    Starting Price: $30 per month
  • 3
    Syteca

    Syteca

    Syteca

    Syteca — control privileged access and detect identity threats in one place. Syteca is a PAM platform built from the ground up with identity threat detection and response (ITDR) capabilities. Instead of bolting on monitoring after the fact, Syteca was designed monitoring-first: every privileged session is visible, recorded, and auditable from the start. The platform covers the full privileged access lifecycle — account discovery, credential vaulting, just-in-time access provisioning, MFA, and manual approval workflows. What sets it apart is what happens after access is granted: continuous session monitoring, risk detection during active sessions, and automated response actions (block the user, terminate the session, kill the process). Syteca works across Windows, macOS, and Linux, and supports on-premises, cloud, and hybrid deployments. Trusted by 1,500+ organizations in 70+ countries. Recognized by Gartner and KuppingerCole.
  • 4
    Cofense PhishMe
    Your employees need to be conditioned to spot and report phishing emails immediately. With Cofense PhishMe™, simulations are based on the latest threats known to bypass SEGs, empowering your users to become human threat detectors. With resilient users attuned to the latest phishing threats, you have the best organizational defense. Cofense PhishMe Playbooks let you configure a full 12-month program, complete with phishing simulation scenarios, landing pages, attachments, and educational content, in just a few clicks. Our Smart Suggest capability uses advanced algorithms and embedded best practices to recommend scenarios based on current active threats, industry relevance, and your program’s history. The most important part of your phishing defense is reporting and resiliency rates. Boost reporting and help users become active defenders with Cofense Reporter™, our one-click reporting button.
  • 5
    VIPole

    VIPole

    VIPole

    Message editing and deleting, auto-delete messages, chat window clearing and complete history wiping. Disconnecting devices remotely, fake secret phrase, auto lock and auto logout on inactivity. Hidden and blacklist contacts, individual visibility settings for contacts, configurable contact authorization. Assign tasks to yourself and colleagues, track the progress. Store and organize passwords, securely share them with contacts. Foster collaboration by setting goals for the team and monitoring the solved issues.
    Starting Price: $5.99 per month
  • 6
    NopSec

    NopSec

    NopSec

    We help cyber defenders get a handle on the fragmented processes that make cyber exposure unmanageable. NopSec's end-to-end platform brings these processes together and provides cyber defenders with a means to then discover, prioritize, remediate, simulate, and report on cyber exposures. If you don’t know what's in your environment you can’t protect it. With today's global scale of digital business transformation, complete visiblity of your IT assets is essential to adaptive cyber risk management. Nopsec shows you the business impact of your IT assets on a continuous basis helping you prevent any potential blind spots of unmanaged risk and cyber exposures.
  • 7
    NGINX
    NGINX Open Source: The open source web server that powers more than 400 million websites. NGINX Plus is a software load balancer, web server, and content cache built on top of open source NGINX. Use NGINX Plus instead of your hardware load balancer and get the freedom to innovate without being constrained by infrastructure. Save more than 80% compared to hardware ADCs, without sacrificing performance or functionality. Deploy anywhere: public cloud, private cloud, bare metal, virtual machines, and containers. Save time by performing common tasks through the built‑in NGINX Plus API. From NetOps to DevOps, modern app teams need a self‑service, API‑driven platform that integrates easily into CI/CD workflows to accelerate app deployment – whether your app has a hybrid or microservices architecture – and makes app lifecycle management easier.
  • 8
    OpenAthens

    OpenAthens

    Eduserv

    Use our customizable reporting tool to make data-driven decisions about where to spend your library budget and how to improve student retention, all included with your OpenAthens subscription. Add on our reporting API to seamlessly integrate your library usage data into existing data visualization software, such as Tableau or Power BI for even more powerful insights into user behavior. For over 25 years we’ve supported publishers and other providers with single sign-on set-up and system migrations. When it comes to technical integrations, we do the heavy lifting so you don’t have to. Our reports area provides insight into provider usage, number of authentications, active accounts, location of successful session logins and much more! Create, edit and activate accounts. Assign users to permission sets. Intergrate with your organization's active directory.
  • 9
    Password Reset PRO
    Self service password reset software (SSPR) and identity management for Active Directory 2012, 2016, 2019 domain users. Secure for password self service outside of the domain by remote users. Easy to install. Perfect for Office 365, OWA, VPN, Azure, Mobile, BYOD users. Rapid deploy – No Databases – Use it free for a month! Server 2003 through 2019 supported. Password Reset PRO is the only enterprise-class web based self service software designed specifically for secure external (public) access by end users, allowing them to quickly change or reset their domain password and unlock their account without IT intervention. It is very easy to install, test and deploy, no databases required or changes to the domain, no disturbing users.
    Starting Price: $598.00/one-time/user
  • 10
    Globalscape Enhanced File Transfer (EFT)
    Globalscape’s Enhanced File Transfer (EFT) platform is a comprehensive, user-friendly managed file transfer (MFT) software. Thousands of Windows-Centric Organizations trust Globalscape EFT for their mission-critical file transfers. EFT provides security and compliance combined with powerful tools for automation, collaboration, and analysis. It is available in cloud/SaaS (EFT Arcus) and on-premises EFT deployments. Unlike traditional file transfer software, EFT provides enterprise-level data security as well as data transfer automation through integration with back-end systems. Administration is easy, yet detailed enough for complete control of your file transfer system. EFT replaces insecure legacy systems, homegrown servers, manual delivery, expensive leased lines, and VANs with a top-performing, scalable alternative.
  • 11
    Monyog

    Monyog

    Webyog

    Agentless MySQL performance monitoring that's fully customizable and allows you to optimize query performance in real-time. Trace all changes done to the MySQL Global variables using the configuration management. You can track and compare changes to the configuration file and identify the reason for performance issues. Monitor locked and long running queries in real-time. Get notifications on mail or SNMP traps, Syslog, Slack and Pagerduty for queries that take more than a specified amount of time to execute. You also have the option to configure Monyog to kill, notify or notify & kill such queries. Avoid learning new tools by using the same performance monitoring tool for MySQL on-premise on physical and virtual machines, in the private, public, and government cloud on virtual machines, and in the public and government cloud as managed databases.
    Starting Price: $199 one-time payment
  • 12
    Axcient x360Cloud
    Protect Everything with Axcient x360. For too long MSPs have had to use multiple vendors for business availability. Now Axcient x360 provides the only unified platform and experience for MSPs to protect client data. The Axcient x360 portal is a single pane of glass for MSPs to manage BCDR, Cloud to Cloud Backup, and Secure Sync & Share. Axcient x360 supports SSO, MFA, and multi-tenant management to increase MSP productivity and reduce total cost of managed services (TCOMS). Axcient x360 gives MSPs one platform to Protect Everything – business continuity, cloud to cloud backup, and secure sync and share. Through a single pane of glass, MSPs can protect themselves and their customers with single sign-on (SSO), multi-factor authentication (MFA), and multi-tenant management to increase MSP productivity and reduce total cost of managed services (TCOMS).Axcient offers MSPs the most secure backup and disaster recovery technology stack with a proven business availability suite.
  • 13
    AwareABIS
    Aware provides software and solutions for government-sponsored, biometrics-enabled citizen identification and credentialing systems. Aware’s innovative biometric solutions provide critical support to help ensure national security and protect citizen freedoms and liberties. A decades long commitment to R+D has earned us work with more than 80 government agencies. We know biometrics, security and compliance. At the heart of what we do for citizen ID is AwareABIS™, an Automated Biometric Identification System (ABIS) used for large-scale biometric identification and deduplication, with support for fingerprint, face, and iris modalities. Its highly modular architecture allows it to be configured and optimized for either civil or criminal applications. A fully featured biometric search platform, AwareABIS is differentiated by its open architecture and configurability.
    Starting Price: $2495.00/one-time/user
  • 14
    Array APV Series

    Array APV Series

    Array Networks

    Array APV Series application delivery controllers provide the availability, scalability, performance, security and control essential to keeping applications and servers running in their power band. Integrated local and global server load balancing, as well as link load balancing, ensure the highest levels of resiliency for your applications, while connection multiplexing, SSL offload, caching and compression work together to deliver the fastest end-user experience possible. What’s more, by terminating connections on APV Series ADCs, applications are protected behind Array’s WebWall® application security suite. Available as physical or virtual appliances, or on popular public clouds, Array ADCs are designed to meet technical requirements while remaining simple enough for any size IT team and affordable enough for any size business.
  • 15
    RingStor

    RingStor

    RingStor

    RingStor is an innovative data management company providing digital asset backup, incident management, emergency action and business continuity planning software solutions. Taking its name from the technical architecture involved in data storage, RingStor provides cost-effective, cross-platform, multi-tenant solutions renowned for high performance and reliability. The solutions are rapidly deployable, configurable to fit any infrastructure situation, and easily managed. RingStor has assembled the key components that any business needs to ensure a disaster does not seriously damage your business or even worse put you out of business. RingStor LifeJacket provides a powerful online tool for business to assess risks, log and track incidents, create emergency action plans and business recovery procedures. The SaaS solution enables business to get organized and prepared for a structured business recovery procedure in event of interruption.
  • 16
    Barracuda Spam Firewall
    Spam, malicious email and virus attacks are becoming ever more sophisticated. Your corporate email is a gateway that can allow sensitive information to be destroyed or lost as well as for attacks that can hurt your network performance and employee productivity. The Barracuda Spam Firewall scans email and incoming files using three layers of powerful virus scanning technology. The firewall connects to the Barracuda Security Cloud to for the most up-to-date protection against the latest email-borne threats. Threats do not always come from the outside. The firewall also checks for internally tainted email to prevent the spread of viruses that don’t access the email gateway. Barracuda is the industry leader in spam protection for businesses. The Barracuda Spam Firewall leverages Barracuda Central to identify email from known spammers and determine whether domains embedded within emails lead to known spam or malware sites.
    Starting Price: $699.99/one-time
  • 17
    IDM365

    IDM365

    ITMC Soft

    The scenario in this video represents a problem that plagues many organizations on multiple levels. But it doesn't have to. See how a proper identity and access management solution can help. Effeciency is achieved through a workflow which automatically provides matching account access for the new hire. Our user-centric interface makes it possible for business to control and own the process allowing IT to focus on what they do best. Support for policies such as Segregation of Duties (SoD) protects your business against collusion and fraud. Powerful reporting tools provide instant access to audit trails, turning audits into your chance to shine. An organization or business may have a number of systems in use such as Active Directory, Exchange, Oracle and SharePoint, and they may have hundreds or even thousands of users who need to access them. Managing all of these users’ accounts and the access allowed for each one is generally known as identity and access management, or IAM.
    Starting Price: $5 per user per month
  • 18
    Apache Syncope

    Apache Syncope

    Apache Software Foundation

    Apache Syncope is an Open Source system for managing digital identities in enterprise environments, implemented in Java EE technology and released under Apache 2.0 license. Identity management (or IdM) means managing user data on systems and applications, using the combination of business processes and IT. Computers work with records of data about people. Such records contain technical information needed by the system for which the account is created and managed. Have you ever been hired by a company, entered an organization or just created a new Google account? Companies, organizations and cloud entities work with applications that need your data to function properly, username, password, e-mail, first name, surname, and more. In brief, Identity Management takes care of managing identity data throughout what is called the Identity Lifecycle.
  • 19
    Intelligent Discovery
    Intelligent Discovery helps you manage your AWS security with ease. Our industry-leading AWS vulnerability scanning and remediation tool allows you to quickly identify potential threats—without slowing down your infrastructure. Stay ahead of attackers looking for exploitable weaknesses by proactively identifying, resolving, and mitigating security threats through a user-friendly interface. Automate Security Auditing, Security Log Management, Customize Controls and so much more! Consolidated capacity, cost, and volume tools are in an evolving and scaling environment without impacting production or breaking the bank. As an organization grows, so does the management complexity of compliance. Defined organizational rule sets and customization expedite compliance. Consistent and frequent security logs, inventory, and change log monitoring bring inventory management into a consolidated interface.
    Starting Price: $199 per month
  • 20
    Sysdig Secure
    Cloud, container, and Kubernetes security that closes the loop from source to run. Find and prioritize vulnerabilities; detect and respond to threats and anomalies; and manage configurations, permissions, and compliance. See all activity across clouds, containers, and hosts. Use runtime intelligence to prioritize security alerts and remove guesswork. Shorten time to resolution using guided remediation through a simple pull request at the source. See any activity within any app or service by any user across clouds, containers, and hosts. Reduce vulnerability noise by up to 95% using runtime context with Risk Spotlight. Prioritize fixes that remediate the greatest number of security violations using ToDo. Map misconfigurations and excessive permissions in production to infrastructure as code (IaC) manifest. Save time with a guided remediation workflow that opens a pull request directly at the source.
  • 21
    Sophos UTM
    Sophos UTM drives threat prevention to unmatched levels. The artificial intelligence built into Sophos Sandstorm is a deep learning neural network, an advanced form of machine learning, that detects both known and unknown malware without relying on signatures. Sophos UTM 9.4 is one of the first Sophos products to offer our advanced next-gen cloud sandboxing technology. Sandstorm provides a whole new level of ransomware and targeted attack protection, visibility, and analysis. It can quickly and accurately identify evasive threats before they enter your network. And, it’s tremendous value: it’s enterprise-grade protection without the enterprise-grade price-tag or complexity. Harden your web servers and Microsoft Enterprise Applications against hacking attempts while providing secure access to external users with reverse proxy authentication. Full SMTP and POP message protection from spam, phishing and data loss with our unique all-in-one protection.
  • 22
    A10 Thunder ADC

    A10 Thunder ADC

    A10 Networks

    High-performance advanced load balancing solution that enables your applications to be highly available, accelerated, and secure. Ensure efficient and reliable application delivery across multiple datacenters and cloud. Minimize latency and downtime, and enhance end-user experience. Increase application security with advanced SSL/TLS offload, single sign-on (SSO), DDoS protection and Web Application Firewall (WAF) capabilities. Complete full-proxy Layer 4 load balancer and Layer 7 load balancer with flexible aFleX® scripting and customizable server health checks.
  • 23
    HAProxy Enterprise

    HAProxy Enterprise

    HAProxy Technologies

    HAProxy Enterprise is the industry’s leading software load balancer. It powers modern application delivery at any scale and in any environment, providing the utmost performance, observability and security. Load balance by round robin, least connections, URI, IP address and several hashing methods. Make advanced decisions based on any TCP/IP information or HTTP attribute with full logical operator support. Send requests to specific application clusters based on URL, domain name, file extension, client IP address, health state of backends, number of active connections, SSL client certificate, and more. Extend and customize HAProxy with Lua scripts that have access to the request/response pipeline. Maintain users' sessions based on TCP/IP information or any property of the HTTP request (cookies, headers, URI, and more). The world’s fastest, and most widely used software load balancer.
  • 24
    Varnish

    Varnish

    Varnish Software

    Varnish Software’s powerful caching technology helps the world’s biggest content providers deliver lightning-fast web and streaming experiences for huge audiences, without downtime or loss of performance. Our solution combines open-source flexibility with enterprise robustness to speed up media streaming services, accelerate websites and APIs, and enable global businesses to build custom CDNs, unlocking unbeatable content delivery performance and resilience. Our customers include Hulu, Emirates and Tesla, and our technology is powered by a caching layer that’s trusted by more than 10 million websites worldwide.
  • 25
    Splunk On-Call
    Empower teams by routing alerts to the right people for fast collaboration and issue resolution. Deliver the right alerts to the right people reducing time to acknowledge and resolve incidents. Complete ChatOps experience, integration with the tools you already have, incident timelines and reporting for blameless post-incident reviews. Engage people where they work. Mobile-first experiences leverage machine learning to make on-call accessible wherever you are. Splunk On-Call automates incident management, reducing alert fatigue and increasing uptime. Use Splunk On-Call to streamline your on-call schedules and escalation policies. From rotations to overrides, we automate all the essentials. Our software provides contextual alert information, suggestions driven from machine learning, and empowers collaboration to solve problems with speed and efficiency, all while capturing essential remediation data.
    Starting Price: $27.00/month/user
  • 26
    CodeMeter

    CodeMeter

    Wibu-Systems

    CodeMeter is the award-winning protection, licensing, and security system that gives software publishers and ISVs as well as intelligent device makers a complete arsenal to protect IP and fight cyber-threats while harnessing the power of smart licensing to monetize and grow their business. CodeMeter includes a complete lineup of license containers - hardware-, software-, or cloud-based - to store secret license keys safely, a set of stealthy encryption modules, and a versatile array of backend and frontend tools for license management, augmented by professional services. CodeMeter License Central is the versatile gateway to license creation, delivery, management, and monitoring across the complete license lifecycle. The integral CodeMeter Protection Suite comprises a suite of tools that automatically encrypt the compiled code to protect software from piracy, counterfeiting, reverse engineering, and tampering.
  • 27
    Matrix42 EgoSecure Data Protection
    Everything runs as before, but securely. All-round protection for all your devices, applications and sensitive company data. Your data remains secure. While digital networking and device diversity offer more flexibility, they also increase the risk of malware, data loss, and theft. Traditional firewall and antivirus protection is no longer enough to close security gaps. With just a mouse-click you get a graphically prepared overview of all data flows in the network and automatically trigger appropriate protective measures. Insight Analysis – determines the overall situation of your company network with regard to data security so that you can derive the optimum protective measures. The analysis results are available to you as a clearly structured dashboard. Conclusions about the activities of individual users are not possible. The reports can be generated automatically and sent by e-mail.
  • 28
    Bravura Identity

    Bravura Identity

    Bravura Security

    Bravura Identity is an integrated solution for managing identities, groups and security entitlements across systems and applications. It ensures that users are granted access quickly, that entitlements are appropriate to business need and that access is revoked once no longer needed. Users have too many login IDs. A typical user in a large organization may sign into 10 to 20 internal systems. This complexity creates real business problems. Bravura Identity manages the lifecycles of identities, accounts, groups and entitlements. It includes automation to grant and revoke access, after detecting changes on systems of record. A web portal for access requests, profile updates and certification. Full lifecycle management for groups and roles on target systems. A workflow manager to invite people to approve requests, review access or complete tasks. Policy enforcement related to SoD, RBAC, risk scores, privacy protection and more. Reports, dashboards and analytics.
  • 29
    SparrowIQ

    SparrowIQ

    Solana Networks

    SparrowIQ is a turnkey network traffic monitoring solution developed to help IT organizations to rapidly troubleshoot and diagnose network issues and provide visibility into how applications are performing and thus affecting end user experience. Its award-winning ‘resource efficient’ design combines powerful performance monitoring capability in an easy-to-deploy, intuitive package ensuring minimal administrative load on an already strained IT staff. SparrowIQ was designed for small and medium businesses that have the same need as their larger counterparts for enterprise-class monitoring solutions but have limited technical resources, time and money to invest in traditional systems.
    Starting Price: $19 per month
  • 30
    Simply Sync Password

    Simply Sync Password

    GoodWorks Communications

    Simply Sync Password allows organizations to synchronize their passwords and active directory properties from their local Active Directory site to an external Active Directory sites or other external systems. Simply Sync Password is a great alternative for organizations that do not want the added complexity and cost that comes with establishing a trust relationship between Active Directory sites or deploying an AD FS infrastructure. AD FS is great for large organizations, but in many cases it just doesn’t make sense for small and medium-size organizations. The role of the Password Capture Agent is to intercept password changes as they occur on the domain controllers. Since you don’t know which domain controller a user is going to use to reset their password, the Password Capture Agent must be installed on all domain controllers. The Password Capture Agent does not interfere with the password change process, it simply intercepts the change request as it happens.
    Starting Price: $20 per user per month
MongoDB Logo MongoDB