Best IT Security Software - Page 74

Compare the Top IT Security Software as of May 2026 - Page 74

  • 1
    Emteria

    Emteria

    emteria GmbH

    What if making use of Android’s benefits in your professional solution was as easy as pie? With emteria you can build customer-facing Android™ products at scale, operate them remotely and ensure long-term security. emteria is a tech company from Aachen, Germany. Its core product emteria.OS is a managed version of Android, extended for industrial use cases and professional applications. Besides the operating system itself, emteria provides embedded expertise, device management, and web services to build, scale and operate fleets of Android IoT devices. To enable faster time-to-market, Android-based emteria.OS supports Raspberry Pi and other cost-effective single-board computers (SBC). Also, emteria ensures a seamless transfer from Raspberry Pi onto industry-grade hardware, like i.MX8 based boards. Moreover, support includes custom hardware, e.g. provided by our partner network.
    Starting Price: €80/month
  • 2
    Alviere Hive
    Alviere’s embedded finance platform allows any organization to seamlessly integrate financial products and services into their existing offerings, and provide customers and partners with the most comprehensive embedded financial solution on the market. Alviere’s platform offers an extensive range of customizable branded products and services that include FDIC-insured virtual accounts and physical card issuing, payments, digital global money transfers, and crypto/web3 products, all through one API integration. Alviere is a fully licensed and regulated financial institution, and provides comprehensive compliance, risk management, fraud/AML montioring and security to ensure long-term program success.
    Starting Price: $0
  • 3
    EraSearch

    EraSearch

    Era Software

    Purpose-built for cloud-native deployments, EraSearch brings you a dynamic data fabric that leverages decoupled storage & compute, a true zero-schema design, and adaptive indexing to deliver an infinitely-scalable log management experience with an unparalleled reduction in cost and complexity. Lots of log management products are built on top of Elasticsearch. We built EraSearch from scratch to solve its key problems. By embracing a stateless design for all of the core components, managing EraSearch with k8s is a dream. Lots of log management products are built on top of Elasticsearch. We built EraSearch from scratch to solve its key problems. By using a modern, coordination-free ingest design, EraSearch can handle data at a greatly-reduced cost. Running EraSearch is completely hands-off, so you never have to worry about cluster health again.
    Starting Price: ¢65 per GB
  • 4
    TCS MasterCraft DataPlus

    TCS MasterCraft DataPlus

    Tata Consultancy Services

    The users of data management software are primarily from enterprise business teams. This requires the data management software to be highly user-friendly, automated and intelligent. Additionally, data management activities must adhere to various industry-specific and data protection related regulatory requirements. Further, data must be adequate, accurate, consistent, of high quality and securely accessible so that business teams can make informed and data-driven strategic business decisons. Enables an integrated approach for data privacy, data quality management, test data management, data analytics and data modeling. Efficiently addresses growing volumes of data efficiently, through service engine-based architecture. Handles niche data processing requirements, beyond out of box functionality, through a user-defined function framework and python adapter. Provides a lean layer of governance surrounding data privacy and data quality management.
  • 5
    opEvents

    opEvents

    Opmantek

    Configure your business policies to reflect your business environment. Set up to send alerts via SMS or email while following your escalation rules to one or more contacts. Outline your business hours to follow escalation or hierarchy differences and also allow for planned outages. Completely customizable notification settings that alert at the frequency that matches your demands. opEvents provides a centralised logging service for the purposes of operations, compliance and auditing. Complete management (centralised storage and audit capability) of logs from NMIS, applications, active directory, devices and cloud infrastructure. Enrich your network events with logs from multiple sources. Suppression and highlighting lists to ensure the right events generate notifications. Stateless and stateful events are applicable and events can be related to nodes. A set of normalized node properties are extracted and applied to the event.
    Starting Price: $649 per year
  • 6
    opFlow

    opFlow

    FirstWave

    opFlow by FirstWave is a robust network traffic analyzer that helps organizations gain deep insights into their network usage by collecting and presenting NetFlow data. With features such as high-volume traffic monitoring, anomaly detection (including DDoS attacks), and detailed traffic summaries, opFlow helps businesses identify issues and optimize network performance. Compatible with multiple vendors and protocols, including Cisco NetFlow and Juniper J-Flow, opFlow is scalable and can process large amounts of network traffic efficiently, making it a powerful tool for improving overall network management.
    Starting Price: $1,649 per year
  • 7
    OMNIPRIVACY

    OMNIPRIVACY

    OMNIPRIVACY

    AVG/GDPR is not a tick in the box. It is there to stay and needs to be embedded in the way organizations are organized and working. OMNIPRIVACY, a 360°AVG/GDPR management tool, has been designed by OMNINET Software Solutions with the aim of insuring 100% control and oversight of AVG/GDPR Readiness by continuously monitoring 7 processes: the processing register, contract management, data leaks, privacy requests, document management, risk management and dashboards. Read on and discover how OMNIPRIVACY can contribute to this within your organization. Manage and document all processing activities related to personal data. Manage all types of privacy requests from one central point (right to be forgotten, right of access, etc.). Easily gain insight into previously made agreements or agreements yet to be made which relate to data processors or data controllers. Manage identified risks and define procedures and measures.
  • 8
    Data443 Global Privacy Manager
    We make it possible for retailers to champion their customers’ privacy rights while maintaining conversion and simplifying SAR processing. Make your privacy settings the new standard for user experience and customer service. Give your customers clear access to easy-to-understand settings. Give customers a one-stop location for all their privacy needs. Provide clear, accurate explanations of the data you collect and how it is used. Earn increased trust in return. All-or-nothing consent doesn’t benefit you or your customers. Allowing customers to opt-in or out of specific data collection gives them more control and improves your conversion rates. Provide an easy-to-understand report that allows customers to see what data you’ve collected, how it’s being used, and that it’s being protected properly. Enhance your customers’ privacy experience with rapid responses to Subject Access Requests (SARs) while simplifying processing for your team.
    Starting Price: $225 per month
  • 9
    Kolide

    Kolide

    Kolide

    Endpoint solutions for teams that value productivity, transparency, and employee happiness. Engage with employees on Slack providing customized security and compliance recommendations for their Mac, Windows, and Linux devices. Traditional security solutions don't interact with end-users and must rely on strict enforcement and surveillance. We believe that device security starts with the user. With Kolide you can clearly communicate your organization's security guidelines and help users achieve compliance without resorting to rigid management. Get a bird's eye view of your environment, then drill down into the nitty gritty to gain critical insights into your fleet's health and hygiene. A single device in your fleet can produce thousands of unique data points. This data is often intended to be read by programs and systems, not people. Kolide interpets and visualizes the data we collect so you can quickly understand the state of your devices.
    Starting Price: $6 per month
  • 10
    Dow Jones Risk & Compliance

    Dow Jones Risk & Compliance

    Dow Jones Risk & Compliance

    Dow Jones Risk & Compliance is a global provider of best-in-class risk data, web-based software applications and scalable due diligence services that help organizations manage risk and meet regulatory requirements related to financial crime, third-party risk management, sanctions and international trade. Built on the legacy of one of the world’s most trusted newsrooms, Dow Jones Risk & Compliance combines the expertise of a multilingual research team with industry-leading data scientists and technologists to provide actionable content structured specifically for compliance needs. Our solutions were developed in partnership with top legal and political advisors — including former regulators — to help our clients maintain consistency across global business units and teams.
  • 11
    Scorechain

    Scorechain

    Scorechain

    Scorechain is specialized in blockchain analytics and crypto compliance tools and helps worldwide companies comply with AML regulations on crypto-assets. Scorechain Blockchain Analytics Suite covers Bitcoin, including Lightning Network detection, Ethereum with ERC20 and stablecoins, XRP Ledger, Litecoin, Bitcoin Cash, Dash, Tezos, Tron with TRC10/20 tokens, and BSC with BEP20 tokens. The fully customizable platform is available on UI and API and comes with reporting, transaction tracking, risk assessment, automatic red flags indicator, real-time alert features, and much more. In addition, users can make use of Scorechain's Exploration Tool, Case Manager, and Entity Directory to implement complete and comprehensive crypto compliance processes. With a powerful and unique scoring system, Scorechain's products allow traditional finance players and cryptocurrency companies to apply a risk-based approach to this new class of assets and fulfill all new regulatory requirements.
  • 12
    IRI CellShield
    IRI CellShield® protects the sensitive information in your Microsoft Excel® spreadsheets, allowing you to comply with data privacy laws. Point-and-click to protect your columns with reversible and non-reversible masking functions. CellShield keeps your data secure, whether it's in one sheet or a million. Use multiple search methods to find and report on PII across the LAN, and protect it all at once. Classify and mask it in intuitive graphical dialogs. CellShield's core technology is built on the award-winning IRI FieldShield data masking product for databases and flat files. Data masked in one platform can be revealed in another. CellShield EE is the only full-featured, professional data discovery, masking, and auditing package for Excel 2010, 2013, 2016, and 2019 (plus Office 365) workbooks in your LAN. CellShield EE exceeds the security and scope of a single password by combining and automating all these extra capabilities.
    Starting Price: $35 one-time payment
  • 13
    IRI Voracity

    IRI Voracity

    IRI, The CoSort Company

    Voracity is the only high-performance, all-in-one data management platform accelerating AND consolidating the key activities of data discovery, integration, migration, governance, and analytics. Voracity helps you control your data in every stage of the lifecycle, and extract maximum value from it. Only in Voracity can you: 1) CLASSIFY, profile and diagram enterprise data sources 2) Speed or LEAVE legacy sort and ETL tools 3) MIGRATE data to modernize and WRANGLE data to analyze 4) FIND PII everywhere and consistently MASK it for referential integrity 5) Score re-ID risk and ANONYMIZE quasi-identifiers 6) Create and manage DB subsets or intelligently synthesize TEST data 7) Package, protect and provision BIG data 8) Validate, scrub, enrich and unify data to improve its QUALITY 9) Manage metadata and MASTER data. Use Voracity to comply with data privacy laws, de-muck and govern the data lake, improve the reliability of your analytics, and create safe, smart test data
  • 14
    Enveil

    Enveil

    Enveil

    Data is the backbone of the digital economy, we change the paradigm of how and where organizations can leverage data to unlock value. Enterprises use Enveil’s award-winning ZeroReveal® solutions to securely and privately use data in-place across organizational boundaries, jurisdictions, and third parties while ensuring that the content of the interaction and the results are never exposed. Our PETs and homomorphic encryption-powered capabilities deliver an efficient and decentralized data collaboration framework designed to reduce risk and address business challenges including data sharing, monetization, and regulatory compliance. Protecting data while it's being used or processed, the ‘holy grail’ of secure data usage, we deliver the most mature encrypted search, analytic, and machine learning products on the market. Enveil is a pioneering privacy enhancing technology company protecting data in use for secure data usage, sharing, and monetization.
  • 15
    RiskRecon

    RiskRecon

    RiskRecon

    Automated risk assessments tuned to match your risk appetite. Get the intimate risk performance assessments you need to efficiently manage your third-party risk. RiskRecon’s deep transparency and risk contextualized insights enable you to understand the risk performance of each vendor. RiskRecon’s workflow enables you to easily engage your vendors to realize good risk outcomes. RiskRecon knows a lot about your systems. Know what RiskRecon knows. Get continuous objective visibility of your entire internet risk surface, spanning managed, shadow and forgotten IT. RiskRecon knows a lot about your systems. Know what RiskRecon knows. Get continuous objective visibility of your entire internet risk surface, spanning managed, shadow and forgotten IT. See the intimate details of every system, the detailed IT profile and security configuration. We’ll even show you the data types at risk in every system. RiskRecon’s asset attribution is independently certified to 99.1% accuracy.
  • 16
    FileScan.IO

    FileScan.IO

    FileScan GmbH

    FileScan.IO is a next-gen malware analysis platform with the following emphasis: - Providing rapid and in-depth threat analysis services capable of massive processing - Focus on Indicator-of-Compromise (IOC) extraction and actionable context Key Benefits - Perform detection and IOC extraction for all common files in a single platform - Rapidly identify threats, their capabilities and update your security systems - Search your corporate network for compromised endpoints - Analyze files at scale without actually executing them - Easy reporting for entry level analysts and executive summary - Easy deployment and maintenance We offer a free community service which is a free malware analysis service that offers rapid in-depth file assessments, threat intelligence and indicator of compromise (IOCs) extraction for a wide range of executable files, documents and scripts.
  • 17
    DisruptOps

    DisruptOps

    FireMon

    DisruptOps is a cloud security operations platform that monitors, alerts and responds to security risk in real-time across your public cloud infrastructure. DisruptOps breaks down barriers between development, security & operations teams, enabling everyone to become an active defender of your cloud infrastructure, working from your existing tools. DisruptOps delivers critical issues directly to the right responders inside the tools you already use, like Slack, Teams & Jira, enabling everyone to be an active defender, even when it’s not their full-time job. DisruptOps brings security operations into your DevOps workflow, empowering your teams to find & fix issues before they become incidents. Immediate visibility into your risks and threats, critical issues routed to the right responders, security context and expert guidance to remediate issues. Insights to plan & track your risk reduction and playbooks with pre-built response actions that save time.
  • 18
    FireCompass

    FireCompass

    FireCompass

    FireCompass runs continuously and indexes the deep, dark and surface web using elaborate recon techniques as threat actors. The platform then automatically discovers an organization's dynamic digital attack surface, including unknown exposed databases, cloud buckets, code leaks, exposed credentials, risky cloud assets, and open ports & more. FireCompass provides the ability to launch safe-attacks on your most critical applications and assets. Once you approve the scope on which the attacks need to be launched, FireCompass engine launches the multi-stage attacks, which includes network attacks, application attacks, and social engineering attacks to identify breach and attack paths. FireCompass helps to prioritize digital risks to focus efforts on the vulnerabilities that are most likely to be exploited. The dashboard summarizes the high, medium, and low priority risks and the recommended mitigation steps.
  • 19
    ATTACK Simulator

    ATTACK Simulator

    ATTACK Simulator

    ATTACK Simulator can strengthen your security infrastructure by reducing the risk of data breach, helping your employees protect customer data, and complying with international standards of cyber security. Given the current state of the world, there has never been a more opportune moment to engage in Security Awareness Training with ATTACK Simulator. Bad actors take advantage of the global pandemic, the shift in working environment and other opportunities to target unsuspecting individuals and companies. Conducting business online involves security risks not worth taking. You can avoid falling victim to a cyberattack by taking adequate measures on time. ATTACK Simulator is here to make sure your employees are on top of security awareness with our automatic training plan, so you won’t have to worry about it anymore. Cyber security skills are recommended to anyone who owns a computer.
  • 20
    Intego Internet Security
    Mac users have been misled by the common myth that “Macs can’t get viruses,” and that antivirus software is unnecessary. The reality is all machines are vulnerable, and devious cyber-criminals use a variety of malware that threatens Macintosh computers. Worse yet, they’re not just targeting Macs—they’re after your sensitive personal information and your money. You can protect your Mac and your precious data with Intego VirusBarrier, the award-winning Mac antivirus software. Intego VirusBarrier provides real-time antivirus protection for Macs, and scans files whenever they’re accessed to keep your Mac free of malware. Our Mac antivirus software automatically checks for the latest updates to make sure you’re protected against the newest threats. Intego VirusBarrier not only protects you from existing Mac threats, it detects PC-based malware so you don’t spread infected files to friends, family, or work colleagues.
    Starting Price: $39.99 per year
  • 21
    Balbix

    Balbix

    Balbix

    Balbix automatically analyzes the enterprise attack surface using specialized AI to provide a 100x more accurate view of breach risk. The platform continuously identifies and prioritizes vulnerabilities and other risk items, dispatching them for automatic and supervised mitigation. Balbix helps you reduce cyber risk by 95%, while making your security team 10x more efficient. Most data breaches happen because of known security issues which are missed and not fixed. Security teams try to discover and mitigate vulnerabilities but can’t keep up! To accurately quantify breach risk, Balbix continuously analyzes up to several hundred billion time-varying signals from your network. Balbix dispatches prioritized tickets with relevant context to risk owners for automatic and supervised mitigation. Leaderboards and incentives can be set up for a gamified approach to cyber risk reduction.
  • 22
    Assetnote

    Assetnote

    Searchlight Cyber

    Assetnote scans and verifies exposures across your entire external attack surface every hour – covering known assets, shadow IT, third-party tools, and cloud infrastructure – delivering high-signal, validated findings, each with a working proof of concept (POC). Backed by an in-house offensive security research team that actively hunts zero-day vulnerabilities in the tools your organization relies on, feeding findings directly into the platform, often months ahead of public disclosure and before the patching scramble begins. The Assetnote solution includes: ‣ Hourly attack surface scanning ‣ High-signal exposure engine – programmatically validates every finding ready for immediate remediation ‣ Zero-day vulnerability research via our in-house offensive security research team ‣ Proactive IOC monitoring ‣ Custom signature builder to run your own security checks ‣ Broad integration support via pre-built integrations, API, and CLI for custom workflows
  • 23
    SmileID

    SmileID

    Electronic Identification

    SmileID is the new standard for face biometrics. Face biometrics solution where identity is verified remotely. SmileID is compliant with KYC/AML stringent regulations. SmileID unique UX works on any channel from a mobile, desktop, tablet or digital platfotms at branch offices. Enjoy an omnichannel experience. Our API toolkit helps you improve your omnichannel customer experience in all your operations, no matter the industry. Our Video IDentification, Advanced and Qualified Electronic Signature, and Facial Biometric Authentication services are transforming the way in which companies and customers interact. Current eKYC solutions, powered by Artificial Intelligence and Machine Learning allow businesses in any sector, such as banking, insurance, financial and investment services, to be digitally transformed, reduce digital customer onboarding costs and grow by offering a unique user experience.
  • 24
    Revoke

    Revoke

    Revoke

    We take your – and your customer’s – security very seriously, and go to great lengths to ensure privacy principles are maintained at all times. Communications are secured using advanced military grade encryption, ensuring that data remains inaccessible and unreadable by anybody except the intended recipient. As decryption of personal data can only occur through the secure key held on your customer’s mobile phone, the only person who will see any personal data you return, will be that customer. White-label data protection app for your customers. Data breach notifications for staff and customers Easy setup – no requirement for IT integration. Boost your reputation as a secure and ethical custodian of your customer data. Foster a positive reputation for ethical data management and transparency with your customers. Stop holding priceless customer data in insecure plain text.
  • 25
    OpenText SOCKS
    OpenText™ SOCKS Client is a Windows®–certified security solution that connects to hosts across firewalls. Without requiring any changes to enterprise applications, OpenText SOCKS Client helps organizations enforce security policies and allow applications to reach legitimate external hosts through simple, centrally controlled rule-based settings. The SOCKS Client uses the SOCKS industry-standard security protocol, including SOCKS5, developed to allow computers on one network to connect to hosts on another network through a proxy. Firewalls can impose severe restrictions on IP data traffic, leading to problems for software not using mainstream IP ports, such as mail and remote access protocols. Organizations require a solution that keeps firewalls effective and secure, yet still allow IP access to services behind the firewall.
  • 26
    ConnectWise SIEM

    ConnectWise SIEM

    ConnectWise

    ConnectWise SIEM (formerly Perch) offers threat detection and response backed by an in-house Security Operations Center (SOC). Defend against business email compromise, account takeovers, and see beyond your network traffic. Our team of threat analysts does all the tedium for you, eliminating the noise and sending only identified and verified treats to action on. Built with multi-tenancy, ConnectWise SIEM helps you keep clients safe with the best threat intel on the market.
    Starting Price: $10 per month
  • 27
    Trellix Enterprise Security Manager
    Real-time monitoring and analysis allowing you to quickly prioritize, investigate, and respond to hidden threats. A central view of potential threats with built-in workflows removes the complexity of threat protection. Be ready anytime for the audit with automated compliance. Get greater transparency monitoring users, applications, networks and devices. Data correlated and enriched to deliver purposeful intelligence on the threat and how to mitigate. Real-time threat identification and response powered by advanced threat intelligence reduces lead time to protect against threats such as phishing, insider threats, data exfiltration and Distributed Denial of Service (DDOS) attacks.
  • 28
    Rescana

    Rescana

    Rescana

    Successful risk programs rely on accuracy in the process of discovering and managing assets and only then assessing the risks. Rescana's artificial intelligence preforms asset attribution, thereby keeping false positives to a minimum. Rescana's form engine gives you the flexibility you need to conduct your risk surveys. Use and customize our built in forms, or upload your own to make the perfect survey. Infinitely scalable, our army of collector bots scour the deepest corners of the web in search of your assets and data on a daily basis. With Rescana you are always up to date. Integrate into your procurement system, and make sure vendors are classified correctly from the beginning. Rescana's flexible survey will ingest any existing questionnaire, and is feature rich - providing the best experience for you and your vendor. Communicate the vulnerabilities to your vendors with ease, re-certify them quickly with pre filled forms.
    Starting Price: $25 per month
  • 29
    Google Cloud Web Risk
    Web Risk is a Google Cloud service that allows your client applications to verify URLs against Google's lists of insecure web resources, which are constantly updated. Unsafe web resources include social engineering sites, such as deceptive and phishing sites, and sites that host malicious or unwanted software. With Web Risk you can quickly identify known unsafe sites, warn users before they click infected links, and prevent them from posting links to known infected pages on your site. Web Risk includes data from over a million unsafe URLs and is kept up-to-date by scanning billions of URLs daily. Users are essential to your business. Therefore, you need security controls that protect them and your company. With Web Risk you can prevent users from posting infected URLs to your site and sharing malicious links on your platform, as well as showing them warnings before they visit sites that are known to be unsafe.
    Starting Price: $50 per 1,000 calls per month
  • 30
    Alexio CyberSchool

    Alexio CyberSchool

    Alexio Corporation

    Alexio Essentials just won a global award for our next-gen cybersecurity training and management. Your insurance company is likely to require proof of security awareness training. Of course everyone needs training, but how do you deliver training that really sticks? It can’t be boring and it has to be ongoing, or people forget the concepts. In the case of computer security, small businesses have a lot at stake. They can’t risk someone slipping up and allowing a hacker to vaporize their business in seconds. Alexio solves the problem with engaging continuous automated training and risk monitoring. New content each year that keeps up with the new threats your team needs to know about. Get a new certificate each year to prove compliance. Just sign-up your team and we do the rest. Follow up via your dashboard if you want to track their progress, or monitor ongoing risk by upgrading to alexio essentials.
    Starting Price: $1,699 per year
MongoDB Logo MongoDB