Best IT Security Software - Page 65

Compare the Top IT Security Software as of April 2026 - Page 65

  • 1
    Drone

    Drone

    Harness

    Configuration as a code. Pipelines are configured with a simple, easy‑to‑read file that you commit to your git repository. Each pipeline step is executed inside an isolated Docker container that is automatically downloaded at runtime. Any source code manager. Drone integrates seamlessly with multiple source code management systems, including GitHub, GitHubEnterprise, Bitbucket, and GitLab. Any platform. Drone.io natively supports multiple operating systems and architectures, including Linux x64, ARM, ARM64 and Windows x64. Any language. Drone works with any language, database or service that runs inside a Docker container. Choose from thousands of public Docker images or provide your own. Create and share plugins. Drone uses containers to drop pre‑configured steps into your pipeline. Choose from hundreds of existing plugins, or create your own. Drone makes advanced customization easy. Implement custom access controls, approval workflows, secret management, yaml syntax extensions& more.
  • 2
    Appknox

    Appknox

    Appknox

    Push world-class mobile apps faster into the market without compromising on security Build and deploy world-class mobile apps for your organizations at scale and leave your mobile app security to us. Highest Rated Security solution on Gartner We rejoice when the Appknox system secures our client’s app against all vulnerabilities. At Appknox we’re dedicated to delivering Mobile Application Security to help businesses achieve their objectives today and in the near Future. Static Application Security Testing (SAST). With 36 different test cases, Appknox SAST can detect almost every vulnerability that’s lurking around by analyzing your source code. Our tests cover security compliances like OWASP Top 10, PCI-DSS, HIPAA and other commonly used security threat parameters. Dynamic Application Security Testing (DAST). Detect advanced vulnerabilities while your application is running.
  • 3
    ThreatWatch

    ThreatWatch

    ThreatWatch

    Stay informed on emerging threats using real-time, machine curated threat intelligence. Detect and prioritize threats up to 3 months earlier than leading scanning solutions without redundant scanning or agents. Use Attenu8, our AI platform to prioritize your threats. Secure your DevOps pipeline against open source vulnerabilities, malware, code secrets and configuration issues. Secure your infrastructure, network and IOT devices and any other assets by modeling them as virtual assets. Discover and manage your assets easily with a simple open source CLI. Decentralize security functions using real-time alerts. Integrate with MSTeams, Slack, JIRA, ServiceNow and other ecosystems using our powerful API and SDK. Stay ahead of your adversaries. Get informed on emerging malware, vulnerabilities, exploits, patches and remediations in real-time using our AI powered, machine curated threat intelligence.
  • 4
    Jamf Protect

    Jamf Protect

    Jamf Protect

    Endpoint protection built exclusively for Mac. Prevent macOS malware, detect and remediate Mac-specific threats, and monitor endpoints for compliance with Jamf Protect. Built for Mac to protect Mac. Jamf Protect puts the spotlight on Apple, helping security and IT teams with Mac in organizations of all sizes. Scale your teams through tools that understand the Mac platform. Jamf Protect helps maintain Mac endpoint compliance, address anti-virus needs by preventing macOS malware, control Mac application within the organization, detect and remediate Mac-specific threats, all while maintaining minimal impact to the device and the end-user experience. Prevent With comprehensive insight into Mac-specific malware, Jamf Protect meets your anti-virus needs by preventing known malware from running on your devices and quarantining them for later analysis. Lock down unwanted software by letting Jamf Protect limit its execution. Detect. Defend against sophisticated attacks on your Mac
    Starting Price: $5 per user, per month
  • 5
    K2 Security Platform

    K2 Security Platform

    K2 Cyber Security

    Complete Protection for Applications and Container Workloads. Real-time Zero Day Attack Prevention. The K2 Security Platform is highly effective at detecting increasingly sophisticated attacks targeting applications that often go undetected by network and end point security solutions such as web application firewall (WAF) and endpoint detection and response (EDR). K2’s easy to deploy non-invasive agent installs in minutes. Using a deterministic technique of optimized control flow integrity (OCFI) the K2 Platform automatically creates a DNA map of each application at runtime which are used to determine the application is executing correctly. This results in extremely accurate attack detection that eliminates almost all false alerts. K2’s Platform can be deployed in cloud, on premise or in hybrid environments and protects web applications, container workloads and Kubernetes. OWASP Top 10 and other sophisticated attack type coverage.
  • 6
    Sparrow DAST
    Dynamic application security testing solution that provides powerful analytics and high usability. Web application analysis using the latest technologies including HTML5, and Ajax. Reproduce vulnerability attack process by event. Automatically crawls subdirectories information from a web application’s URL. Detect security vulnerabilities from crawled URLs. Open source web library vulnerability analysis. Interaction with Sparrow’s analytic solutions to overcome the limitation of conventional DAST technology. TrueScan (IAST module): Improve detection with IAST module. Web-based user interface eliminates the need for installation and easy access via web browser. Centralized management of analysis results and sharing. Detect security vulnerabilities in web applications using browser event replay technology. Open source web library vulnerability analysis. Overcome limitation of dynamic analysis via interaction with Sparrow SAST and RASP. IAST capability via TrueScan function.
  • 7
    TheHive

    TheHive

    StrangeBee

    TheHive is a collaborative security case management platform that integrates with security tools such as SIEM, EDR, threat intelligence platforms and more, enabling security teams to manage alerts, conduct investigations and respond to incidents from a single interface. The platform works in conjunction with Cortex, an open-source engine also developed by StrangeBee to automate observable enrichment and response actions through an extensive library of analyzers and responders. Today, TheHive boasts 3500+ users worldwide, enabling them to centralize, automate and scale security operations and incident response across multiple teams, environments or clients.
  • 8
    Qwiet AI

    Qwiet AI

    Qwiet AI

    The Fastest Code Analysis, Hands Down. 40X faster scan times so developers never have to wait for results after submitting pull requests. The Most Accurate Results. Qwiet AI has the highest OWASP Benchmark score, which is nearly triple the commercial average and more than double the 2nd highest score. Developer-Centric Security Workflows. 96% of developers report that disconnected security and development workflows inhibit their productivity. Implementing developer-centric AppSec workflows decreases mean-time-to-remediation (MTTR), typically by 5X - enhancing both security and developer productivity. Automatically Find Business Logic Flaws in Dev. Identify vulnerabilities that are unique to your code base before they reach production. Achieve Compliance. Demonstrate and maintain compliance with security and privacy regulations such as SOC 2, PCI-DSS, GDPR, and CCPA.
    Starting Price: Free
  • 9
    Brakeman

    Brakeman

    Brakeman

    Brakeman is a security scanner for Ruby on Rails applications. Unlike many web security scanners, Brakeman looks at the source code of your application. This means you do not need to set up your whole application stack to use it. Once Brakeman scans the application code, it produces a report of all security issues it has found. Brakeman requires zero setup or configuration once it is installed. Just run it. Because all Brakeman needs is source code, Brakeman can be run at any stage of development: you can generate a new application with rails new and immediately check it with Brakeman. Since Brakeman does not rely on spidering sites to determine all their pages, it can provide more complete coverage of an application. This includes pages which may not be ‘live’ yet. In theory, Brakeman can find security vulnerabilities before they become exploitable. Brakeman is specifically built for Ruby on Rails applications, so it can easily check configuration settings for best practices.
  • 10
    LOGalyze

    LOGalyze

    Zuriel

    LOGalyze is an open source, centralized log management and network monitoring software. If you would like to handle all of your log data in one place, LOGalyze is the right choice. It supports Linux/Unix servers, network devices, Windows hosts. It provides real-time event detection and extensive search capabilities. With this open source application log analyzer, collect your log data from any device, analyze, normalize and parse them with any custom made Log Definition, use the built-in Statistics and Report Definitions or use your own ones. You can define Events and Alerts by correlating any log data. The ticketing system provides powerful tool closing your open incidents more quickly. LOGalyze is an open source network management tool what helps reducing internal costs, improving network uptime, increasing network efficiency and eliminating unwanted network traffic. The built-in scheduled Reports give you an overview of the whole network.
  • 11
    LUCY Security Awareness Training
    Train. phish. assess. engage. alarm. Lucy Security from Switzerland allows organizations to measure and improve the security awareness of employees and test their IT defenses. Turn employees into a human firewall with simulated attacks and our E-Learning platform with hundreds of preconfigured videos, training, quiz ready for usage. The most powerful IT Security Awareness Solution in the market. Fixed Prices | On-Premise or SaaS | Phish-Button | Threat Analytics | Over 10.000 installations and more than 25.000.000 trained users | 2020 Excellence Award for Best Anti Phishing.
  • 12
    GuardRails

    GuardRails

    GuardRails

    Empowering modern development teams to find, fix and prevent vulnerabilities related to source code, open source libraries, secret management and cloud configuration. Empowering modern development teams to find, fix, and prevent security vulnerabilities in their applications. Continuous security scanning reduces cycle times and speeds up the shipping of features. Our expert system reduces the amount of false alerts and only informs about relevant security issues. Consistent security scanning across the entire product portfolio results in more secure software. GuardRails provides a completely frictionless integration with modern Version Control Systems like Github and GitLab. GuardRails seamlessly selects the right security engines to run based on the languages in a repository. Every single rule is curated to decide whether it has a high security impact issue resulting in less noise. Has built an expert system that detects false positives that is continuously tuned to be more accurate.
    Starting Price: $35 per user per month
  • 13
    RadiantOne

    RadiantOne

    Radiant Logic

    Make identity a business enabler with a unified platform that transforms your existing infrastructure into a resource for the entire organization. RadiantOne is the cornerstone of complex identity infrastructures. Harness your identity data with intelligent integration to drive better business outcomes, improve security and compliance posture, increase speed-to-market, and more. Without RadiantOne, companies must rely on custom coding, rework, and ongoing maintenance to make new initiatives work with existing environments. Expensive solutions can’t be deployed on time or on budget, negatively impacting ROI and causing employee frustration. Identity frameworks that can’t scale waste time and resources, with employees struggling to deploy new solutions for users. Rigid, static systems can’t meet changing requirements, leading to duplicate efforts and repeated processes.
  • 14
     Acronis Cyber Protect Cloud
    Avoid downtime and data loss for your clients at a lower cost. Acronis Cyber Protect Cloud is the only solution that natively integrates cybersecurity, data protection and management to protect endpoints, systems and data. This synergy eliminates complexity, so service providers can protect customers better while keeping costs down. Next-generation cybersecurity. Advanced AI-based behavioral detection engine for zero-day attack prevention. Reliable backup and recovery. Full-image and file-level backup, disaster recovery, and metadata collection for security forensics. MSP-ready protection management. URL filtering, vulnerability assessments, and patch management for greater control. The traditional stack of endpoint protection products lacks integration and requires much more time for management – maintaining licenses, installing updates and patches, verifying compatibility after updates, and managing multiple policies using a variety of different user interfaces.
  • 15
    Proofpoint Cloud App Security Broker (CASB)
    Proofpoint Cloud App Security Broker (Proofpoint CASB) helps you secure applications such as Microsoft Office 365, Google G Suite, Box, and more. Our solution gives you people-centric visibility and control over your cloud apps, so you can deploy cloud services with confidence. Our powerful analytics help you grant the right levels of access to users and third-party add-on apps based on the risk factors that matter to you. Proofpoint CASB solution provides granular visibility into users and data at risk. You get a people-centric view of cloud access and sensitive-data handling. With Proofpoint CASB's protection app, you can gain insight into cloud usage at global, app and user level, identify SaaS files at risk, including ownership, activity and who they were shared with, check suspicious logins, activity, and DLP alerts via drill-down dashboards.
  • 16
    Oracle CASB
    Gain visibility and detect threats on the entire cloud stack for workloads and applications with Oracle CASB. Leverage real-time threat intelligence feeds and machine learning techniques to establish security baselines, learn behavioral patterns, and identify threats to the cloud stack. Leverage real-time threat intelligence feeds and machine learning techniques to establish security baselines, learn behavioral patterns, and identify threats to the cloud stack. Eliminate labor-intensive and error-prone manual processes. Manage security configurations within cloud applications by assessing and continuously enforcing configurations with simplified monitoring and automated remediation. Accelerate regulatory compliance and provide consistent reporting with secure provisioning and comprehensive monitoring across activity, configurations, and transactions. Identify anomalies as well as fraud and breach patterns across cloud applications with CASB.
  • 17
    OpenText Dynamic Application Security Testing
    OpenText Dynamic Application Security Testing (DAST) is an automated solution that simulates real-world attacks on live applications, APIs, and services to identify exploitable vulnerabilities. It operates on running production environments, requiring no source code or staging setup. Designed for modern DevSecOps teams, the platform prioritizes vulnerabilities for root cause analysis and integrates seamlessly through REST APIs and an intuitive user interface. OpenText DAST supports automation in CI/CD pipelines, reducing manual efforts while accelerating security feedback. It covers modern web technologies like HTML5, JSON, AJAX, JavaScript, and HTTP2 to ensure comprehensive testing. Flexible deployment options allow organizations to run the solution on public cloud, private cloud, or on-premises environments.
  • 18
    Evinent Analytics
    Evinent Offers Professional Software Development for Your Business. We are an ever-growing team of highly qualified software engineers with a focus on delivering customized software development and ongoing technical support to our clients. By utilizing our balanced blend of new methodologies and technologies, you will be able to streamline your software or modernize your company's web applications. Evinent Analytics provides a superb predictive analysis to suggest your customers the most interesting products. Hence, increase sales conversion. What You Get. With the Evinent Analytics Marketing Automation Platform, you can: Build profiles of customers — including their purchase history, total expenditures, and rewards history. Fraud and Risk Analytics, Analyze purchasing patterns, Determine correlations between data sets and generate statistical reports, Segment data, Predict future sales trends for products and services Receive suggestions on how to build product packages.
    Starting Price: $3500 per month
  • 19
    AWS Elastic Load Balancing
    Elastic Load Balancing automatically routes incoming application traffic across multiple destinations, such as Amazon EC2 instances, containers, IP addresses, Lambda functions, and virtual appliances. You can control the variable load of your application traffic in a single zone or in multiple Availability Zones. Elastic Load Balancing offers four types of load balancers that have the necessary level of high availability, automatic scalability, and security to make your applications fault tolerant. Elastic Load Balancing is part of the AWS network, with native knowledge of fault limits like AZ to keep your applications available in one region, without requiring Global Server Load Balancing (GSLB). ELB is also a fully managed service, which means you can focus on delivering applications and not installing fleets of load balancers. Capacity is automatically added and removed based on the utilization of the underlying application servers.
    Starting Price: $0.027 USD per Load Balancer per hour
  • 20
    OVH Load Balancer
    All our Cloud products can be scaled up or out with no constraints, in all our data centers. The OVH Load Balancer distributes the workload among your various services across our data centers. It ensures the scaling of your infrastructure in the event of heavy traffic, with optimized fault tolerance and response time. All this with a service level aiming for zero downtime. Configure and monitor your infrastructures from A to Z with our control panel. The let's encrypt DV SSL certificates are now included in all of our Load Balancer solutions – completely free – and will activate HTTPS protocol by default. The Anycast DNS system means that the server nearest to your user’s location will load your website, improving load times. Use metrics to monitor your Load Balancer's load and outgoing requests to your servers. This information can then be used to maximise your system’s performance!
    Starting Price: $22.99 per month
  • 21
    IBM Load Balancer
    As strain increases on a website or business application, eventually, a single server cannot support the full workload. To meet demand, organizations spread the workload over multiple servers called "load balancing", this practice prevents a single server from becoming overworked, which could cause it to slow down, drop requests, and even crash. Load balancing lets you evenly distribute network traffic to prevent failure caused by overloading a particular resource. This strategy improves the performance and availability of applications, websites, databases, and other computing resources. It also helps process user requests quickly and accurately. From a user perspective, load balancing acts as an invisible facilitator that sits between a client and a group of servers, ensuring connection requests don’t get lost. Without load balancing, applications, websites, databases, and online services would likely fail when demand gets too high.
  • 22
    Ivanti vADC
    Delight your users with faster, more reliable applications, with no compromise on performance or security. More than just a software load balancer, Ivanti vADC drives more transactions, even at peak load conditions, ensuring continuous uptime and real-time security monitoring of application traffic. Enhance your customer experience and grow your business with more attractive and responsive services. Increase systems efficiency and boost the throughput of application servers and security by up to 50%. Reduce costs with flexible capacity-based licensing. Ivanti vADC is natively designed for virtualization and cloud portability. Ivanti vADC provides unprecedented scale and flexibility to enhance the performance and security of applications across the widest range of environments, from physical and virtual data centers to public and hybrid clouds.
  • 23
    IBM Cloud Data Shield
    IBM Cloud™ Data Shield enables users to run containerized applications in a secure enclave on an IBM Cloud Kubernetes Service host, providing data-in-use protection. IBM Cloud Data Shield supports user-level code to allocate private regions of memory, called enclaves, that are protected from processes running at higher privilege levels. It extends Intel Software Guard Extensions (SGX) language support from C and C++ to Python and Java™, while also providing preconverted SGX applications for MySQL, NGINX and Vault. Powered by the Fortanix Runtime Encryption platform and Intel SGX technology, these tools enable organizations with sensitive data to leverage cloud computing with more confidence. IBM Cloud Data Shield helps enable organizations with sensitive data to deploy and benefit from cloud computing. IBM Cloud Data Shield can run containerized applications in secure enclaves on the IBM Cloud Kubernetes Service.
  • 24
    Aptible

    Aptible

    Aptible

    Aptible automatically implements the security controls you need to achieve regulatory compliance and pass customer audits. Out-of-the-box compliance. Aptible Deploy enables you to meet and maintain regulatory compliance and customer audit requirements automatically. Aptible provides everything you need to meet encryption requirements so your Databases, traffic, and certificates are secure. You get automatic backups of your data every 24 hours. You can trigger a manual backup at any time, and restore in a few clicks. Logs are generated and backed up for every deploy, config change, database tunnel, and console operation, and session. Aptible monitors the underlying EC2 instances in your stacks for potential intrusions, such as unauthorized SSH access, rootkits, file integrity issues, and privilege escalation. The Aptible Security Team responds on your behalf 24/7 to investigate and resolve issues as they arise.
  • 25
    Qualys Container Security
    Qualys CS features a vulnerability analysis plug-in for CI/CD tool Jenkins, and soon for other CI/CD tools including Bamboo, TeamCity, and CircleCI. You can download the plugins directly from within the container security module. With Qualys CS, security teams can participate in the DevOps process to gate vulnerable images entering the system, while developers get actionable data to remediate vulnerabilities. Configure policies for preventing vulnerable images from entering the repositories. Set policies based on criteria such as vulnerability severity, and specific QIDs. Review from within the plug-in a summary of the build with its vulnerabilities, information on patchable software and fixed versions, and image layers where it is present. Container infrastructure is immutable in nature, which means containers need to be identical to the images they are baked from.
  • 26
    Super Gluu
    Super Gluu is a push-notification two-factor authentication (2FA) mobile app built to work with the Gluu Server. Super Gluu uses public-key encryption as specified in the FIDO U2F authentication standard. Upon device enrollment, Super Gluu registers its public key against the Gluu Server's FIDO U2F endpoint. When authentication happens, there is a challenge response to ensure that the device has the corresponding private key. Better identity access management for customers, citizens, and remote workforce. Super Gluu is supported by the Gluu Server out-of-the-box -- simply turn it on! Make strong access security as easy as approving a push notification. Make strong access security as easy as approving a push notification. The Gluu Server and Super Gluu can work in the same network, without a DNS server hostname and with a self-signed certificate. There is only one limitation: both components should belong to the same network.
  • 27
    Alice

    Alice

    Alice

    Alice (formerly ActiveFence) is a security, safety, and trust platform built to protect AI systems and online platforms in the GenAI era. Powered by the world’s largest adversarial intelligence dataset, Alice safeguards over 3 billion users across more than 120 languages. Its Rabbit Hole intelligence engine continuously analyzes billions of toxic and manipulative data samples to detect emerging threats in real time. The WonderSuite platform includes tools like WonderBuild for pre-launch stress testing, WonderFence for runtime guardrails, and WonderCheck for automated red-teaming. By defending against prompt injection, jailbreaks, governance gaps, and harmful AI behavior, Alice enables enterprises and foundation model labs to innovate with confidence.
  • 28
    Sophos Central Device Encryption
    Increased remote working makes it more important than ever to secure computers and the data on them. With the huge number of laptops lost, stolen, or misplaced every day, a crucial first line of defense against the loss or theft of devices is full disk encryption. Sophos Central Device Encryption leverages Windows BitLocker and macOS FileVault to secure devices and data. Centralized security management and operations from the world’s most trusted and scalable cloud security platform. With open APIs, extensive third-party integrations, and consolidated dashboards and alerts, Sophos Central makes cybersecurity easier and more effective. Integrated SASE-ready solutions to secure your cloud and hybrid networks - now and into the future. From Firewall and Zero Trust to Switches, Wi-Fi, and more. Trust your inbox again with cloud email security that protects your people and critical information from malware, phishing and impersonation attempts.
  • 29
    ARMO

    ARMO

    ARMO

    ARMO pioneers a new approach to Cloud Security with an open source powered, behavioral driven, Cloud Runtime Security Platform. ARMOs CADR (Cloud App Detection & Response) solution addresses a major unsolved pain point for organizations running on cloud-native architectures: how to continuously protect dynamic workloads during runtime without overwhelming teams with alerts or interrupting operations. ARMO CADR continuously reduces the cloud attack surface using real-time runtime insights, while actively detecting and responding to threats with true risk context. It includes 2 major products that are tightly integrated together and are part of one platform solution - * Kubernetes-First, runtime driven, Cloud Security Posture mgmt (CSPM) - identifying risks, prioritizing them and offering remediation without breaking applications in production * Real-Time Threat Detection & Response - detecting and responding to active threats across the entire cloud and applications stack
  • 30
    HashiCorp Vault
    Secure, store and tightly control access to tokens, passwords, certificates, encryption keys for protecting secrets and other sensitive data using a UI, CLI, or HTTP API. Secure applications and systems with machine identity and automate credential issuance, rotation, and more. Enable attestation of application and workload identity, using Vault as the trusted authority. Many organizations have credentials hard coded in source code, littered throughout configuration files and configuration management tools, and stored in plaintext in version control, wikis, and shared volumes. Safeguarding and ensuring that a credentials isn’t leaked, or in the likelihood it is, that the organization can quickly revoke access and remediate, is a complex problem to solve.
MongoDB Logo MongoDB