Best IT Security Software - Page 85

Compare the Top IT Security Software as of May 2026 - Page 85

  • 1
    P0 Security

    P0 Security

    P0 Security

    Find and fix vulnerabilities, request and grant privileged access. You should never need to trade off infrastructure security against developer velocity. Process access escalations in minutes. No more tickets, better-scoped permissions, and automatic expiration. P0 Security enables engineers to request just-in-time, fine-grained access to any cloud resource, without becoming an expert in the language of cloud IAM. DevOps teams can automate provisioning and expiry of access, without needing to constantly update static IDP groups. Provide developers just-in-time, short-lived, and fine-grained access to a production stack (AWS, GCP, Kubernetes) for deploying or troubleshooting services. Automate periodic access reviews of your cloud environment, and accelerate compliance for SOC2 and ISO 27001, without overburdening your teams. Provide engineers and customer success teams just-in-time and short-lived access to customer data in a cloud environment, or in a data warehouse.
    Starting Price: $25 per month
  • 2
    TECH5

    TECH5

    TECH5

    In a world where identity is moving away from the physical documents we have carried for decades and is becoming increasingly digital, online, and mobile, a solution is needed that can ensure citizens’ trust in the organizations that collect, store and access their data. TECH5 introduces T5-Digital ID – the inclusive technology solution for identity issuance and verification. It allows the strong binding of the digital credential to the holder biometrically and brings ownership of the identity to its authorized holder. With T5-Digital ID, the holder controls what data to share under what circumstances. We built our solution from the ground up by taking the analogy of the physical ID document and asking five fundamental questions related to where identity comes from and what it is moving toward. We then went further and applied all of the above questions to building an ecosystem where a physical smart card, with its (expensive) reader infrastructure, is not necessary.
  • 3
    PHP Secure

    PHP Secure

    PHP Secure

    PHP Secure is a FREE code scanner that analyzes your PHP code for critical security vulnerabilities. Free online scanner: - Quickly and qualitatively finds web app vulnerabilities - Gives explicit reports and recommendations to fix vulnerabilities - Easy to use and requires no specialized knowledge - Reduces risk, saves budget, and boosts productivity PHP Secure Scanner is suitable for analyzing sites on Php, framework Laravel, and CMS Wordpress, Drupal and Joomla. PHP Secure detects the most common and dangerous types: -SQL injection vulnerabilities -Command Injection -Cross-Site Scripting (XSS) Vulnerabilities -PHP Serialize Injections -Remote Code Executions -Double Escaping -Directory Traversal -Regular Expression Denial of Service (ReDos)
  • 4
    Formica

    Formica

    Formica

    You can use a set of rules and workflows with the drag & drop feature which is perfect for your team's efficiency and making it easier to use complex rules.  With an AI-powered self-learning model based on the behavior of your customers and users, you can quickly differentiate the real behavior from the abnormal. Handle millions of transactions in real-time take automatic actions based on your rules and investigate the ones that you choose. Having your all team on the same platform is comfortable and you can onboard as many team members as you want. Use a comprehensive alarm management screen to analyze and investigate risky transactions and potential fraud incidents. A fraud detection product that can be integrated with an API gateway to any service or application your company uses.
    Starting Price: $199 per month
  • 5
    4n6 DBX Forensics Wizard
    4n6 DBX Forensics Software helps investigators to analyze and examine DBX files without Outlook Express in detail. With DBX File Forensics Software, you can extract DBX data to several popular file formats and email services. The software provides DBX file preview in 4 different modes: Content, Attributes, Message Headers, and Hexadecimal View Attributes. To explore DBX files with the software GUI, the software provides two modules: Folder Selection and File Selection. Select File allows you to search only a single file, while Select Folder allows you to search a folder containing multiple DBX files. This DBX Forensics Software can save evidence of DBX files to multiple destinations like email files (DBX files can be preserved as PST files EML files and MBOX files), document files (DBX files can be preserved as PDF, HTML text and emails). It helps in extracting and preserving.
    Starting Price: $49
  • 6
    Zillya! Antivirus for Business
    Total protection of organizations against all types of cyber threats with the possibility of centralized management of antivirus software. Zillya! Antivirus for Business is a modern solution created to form reliable cyber protection for corporate clients. A distinctive feature of this product is the format of total protection of the organization against all types of cyber threats with the possibility of centralized management of antivirus software. Work computers of the network (client side) of organizations will be protected by the product of internet security class with daily updates of virus signatures. Zillya! Antivirus for Business is a comprehensive product for cyber defense. The antivirus structure is designed to facilitate its management and thin customization. Update of antivirus databases on computers of the organization is centralized and does not require every separate PC to be connected to the Internet.
  • 7
    DOT Anonymizer

    DOT Anonymizer

    DOT Anonymizer

    Mask your personal data while ensuring it looks and acts like real data. Software development needs realistic test data. DOT Anonymizer masks your test data while ensuring its consistency, across all your data sources and DBMS. The use of personal or identifying data outside of production (development, testing, training, BI, external service providers, etc.) carries a major risk of data leak. Increasing regulations across the world require companies to anonymize/pseudonymize personal or identifying data. Anonymization enables you to retain the original data format. Your teams work with fictional but realistic data. Manage all your data sources and maintain their usability. Invoke DOT Anonymizer functions from your own applications. Consistency of anonymizations across all DBMS and platforms. Preserve relations between tables to guarantee realistic data. Anonymize all database types and files like CSV, XML, JSON, etc.
    Starting Price: €488 per month
  • 8
    Randtronics DPM easyCipher
    Randronics DPM easyCipher providers Transparent Data Encryption (TDE) lock-box protection to files, folders, and databases. Protection is transparent as contents are automatically decrypted for authorized users. Like a lock-box, TDE-protected objects are either locked or unlocked. DPM easyCipher is a centrally managed, policy-based encryption management solution that allows an organization to standardize its encryption protection by defining and managing encryption policies and applying these policies to any server or laptop where a DPM easyCipher agent has been installed. DPM easyCipher protects all files and folders on servers or laptops. Server environments protected by DPM easyCipher include database servers, web/app servers, and file servers. DPM easyCipher can either extend or replace database-native TDE solutions provided by database vendors to secure their own DB products. Use easyCipher to protect information residing outside of the database.
  • 9
    Trend Micro Cloud Edge
    Trend Micro Cloud Edge integrates with existing tools and processes for maximum efficiency and optimal security. Combines a physical appliance with an industry-unique cloud scanning function for maximum performance and protection. Benefit from a next-generation, on-premises unified threat management appliance plus the convenience of security as a service. Protection managed natively from the cloud provides zero-touch deployment, multi-tenant management, and complete control of your customers’ security in one central location. Simple deployment and user-friendly management allow you to maintain security without compromising on performance. With our unique, pay-as-you-go MSP pricing model, there are no upfront costs and no term commitments. Cloud Edge intelligently combines a comprehensive set of protection techniques and features, providing maximum protection and performance to your customers.
  • 10
    Nimblr Security Awareness
    Nimblr’s interactive micro training covers everything from ransomware to safe browsing and is automatically adapted to your business environment. The training modules are based on the micro-learning concept and are always concise and relevant. Nimblr’s simulated attacks are based on thousands of current threats which are analyzed, processed, and disarmed by Nimblr’s experts. To make the simulations even more realistic, they are automatically adapted using customer-specific data such as the name of the business’ CFO or information about the customer’s website. Nimblr Security Awareness is continuously updated with new zero-day classes and associated simulations based on current attacks and threats. The most urgent gaps in your knowledge are automatically prioritised so we always provide the right information at the right time.
  • 11
    Infisign

    Infisign

    Infisign

    Infisign is a cutting-edge Identity and Access Management (IAM) platform that revolutionizes digital security by leveraging decentralized identity, passwordless authentication, federation, and privileged access management capabilities. The solution empowers organizations to streamline user authentication, manage access efficiently, and ensure compliance across diverse environments. With its unique approach, Infisign addresses the challenges of traditional IAM systems and offers a comprehensive solution for modern identity management.
    Starting Price: $4/user/month
  • 12
    Conviso Platform

    Conviso Platform

    Conviso Platform

    Gain a complete view of your application security. Increase security maturity in your secure development process, and reduce the risks associated with your products. Application Security Posture Management (ASPM) solutions play a crucial role in the ongoing management of application risks, addressing security issues from the development phase to deployment. Efficiently managing an AppSec program, dealing with a growing number of products, and lacking a comprehensive view of vulnerabilities are typically significant challenges for the development team. We enhance the evolution of maturity by supporting the implementation of AppSec programs, monitoring established and executed actions, KPIs, and much more. We enable security to be incorporated into the early stages of development by defining requirements, processes, and policies and optimizing resources and time invested in additional testing or validations.
    Starting Price: $20.99 per asset
  • 13
    CaptchaFox

    CaptchaFox

    CaptchaFox

    Online businesses rely on CaptchaFox to defend and safeguard their website and services against automated bot attacks. CaptchaFox protects against account takeover, credential stuffing, spam and scalping while complying with global privacy laws, such as GDPR, CCPA, and more. Through minimized data collection and retention during verification, the privacy of your users is always preserved. CaptchaFox utilizes a variety of data signals and dynamic response challenges to verify the authenticity of visitors without the use of cookies or trackers. The challenges have low friction and are easy for humans to solve but difficult for bots. The service is available in multiple languages and scales to incoming traffic through our global infrastructure. Enterprise customers can access advanced threat insights to achieve complete risk awareness.
    Starting Price: €15/month
  • 14
    OSSEC

    OSSEC

    OSSEC

    OSSEC is fully open source and free, you can tailor OSSEC for your security needs through its extensive configuration options, adding custom alert rules and writing scripts to take action when alerts occur. Atomic OSSEC helps organizations meet specific compliance requirements such as NIST and PCI DSS. It detects and alerts on unauthorized file system modification and malicious behavior that could make you non-compliant. The Atomic OSSEC open source-based detection and response system adds thousands of enhanced OSSEC rules, real-time FIM, frequent updates and software integrations, built-in active response, a graphical user interface (GUI), compliance tools, and expert professional support. It’s a versatile XDR and compliance all-in-one security solution.
  • 15
    Strobes ASM

    Strobes ASM

    Strobes Security

    Strobes ASM stands out in the crowded asset management market for its intuitive interface, real-time scanning capabilities, and comprehensive data insights. Unlike many solutions that offer static, outdated views, Strobes ensures users get up-to-date information on their assets. With advanced features like vulnerability scanning and dynamic widgets tailored to unique use cases, users gain not just visibility but actionable insights. We combine multiple techniques that involve a scalable yet efficient way to discover assets, vulnerabilities, misconfigurations and more. An all-encompassing solution providing unparalleled visibility over your digital footprint. Identify all your IT assets and monitor them for vulnerabilities, Zero-days and configuration weaknesses.
    Starting Price: $499
  • 16
    Strobes PTaaS

    Strobes PTaaS

    Strobes Security

    Pentesting as a Service (PTaaS) offers a personalized, cost-effective, and offense-driven approach to safeguard your digital assets. With a team of seasoned experts and advanced pen-testing methodologies, Strobes PTaaS provides actionable insights to improve your security posture by multifold. Pentesting as a Service (PtaaS) seamlessly combines the power of manual, human-driven testing with a state-of-the-art delivery platform. It’s all about effortlessly setting up ongoing pentest programs, complete with integrations for smooth operation and easy reporting. Say goodbye to the time-consuming process of procuring pentests one by one. To truly appreciate the benefits of a PtaaS platform, you need to dive in and witness the innovative delivery model in action for yourself. It’s an experience like no other! Our unique testing methodology involves both automated and manual pentesting that helps us uncover most of the vulnerabilities and keep you away from breaches.
    Starting Price: $499 per month
  • 17
    IBM QRadar SOAR
    Respond to threats and remediate incidents faster with an open platform that brings in alerts from disparate data sources to a single dashboard for investigation and response. Ensure your response processes are met quicker by taking a more holistic approach to case management with custom layouts, adaptable playbooks, and tailored responses. Artifact correlation, investigation, and case prioritization are automated before someone even touches the case. Your playbook evolves as the investigation proceeds, with threat enrichment happening at each stage of the process. Prepare for and respond to privacy breaches by integrating privacy reporting tasks into your overall incident response playbooks. Work together with privacy, HR, and legal teams to address requirements for over 180 regulations.
    Starting Price: $4,178 per month
  • 18
    OffSec

    OffSec

    OffSec

    Empowering individuals and organizations to fight cyber threats with indispensable cybersecurity skills and resources. Our Learning Library enables enterprise security teams to better fight cyber threats and improve their security posture with indispensable offensive and defensive skills training. Provide the opportunity to acquire the knowledge, competencies, and skills to handle new and emerging cyber threats. Build a bench of talent with the right level of knowledge to minimize the impact of unexpected attrition. Ensure the learner is trained on the latest vulnerabilities and leading practices with ongoing deployment of new content to the OffSec learning library. The OffSec flex program gives your organization the ability to pre-purchase a block of training to utilize throughout the year as needed.
    Starting Price: $799 per year
  • 19
    BurpGPT

    BurpGPT

    Aegis Cyber Ltd

    Experience enhanced web security testing with BurpGPT our Burp Suite extension which integrates OpenAI's LLMs for advanced vulnerability scanning and traffic-based analysis. It also supports local LLMs, including custom-trained models, ensuring greater data privacy and more accurate results according to your needs. Effortlessly integrate Burp GPT into your security testing workflows with user-friendly documentation. Developed by application security experts, Burp GPT represents the cutting-edge of web security testing. Burp GPT continuously improves based on user feedback, ensuring it meets evolving security testing needs. Burp GPT is a robust tool developed to enhance the precision and efficiency of application security testing. Extended with advanced language processing capabilities and an intuitive interface, it enhances security testing for both beginners and seasoned testers alike. With BurpGPT, you can perform sophisticated technical tasks.
    Starting Price: $100.07 per year
  • 20
    TruKno

    TruKno

    TruKno

    Keep up with how adversaries are bypassing enterprise security controls based on the latest cyber attack sequences in the wild. Understand cyber attack sequences associated with malicious IP addresses, file hashes, domains, malware, actors, etc. Keep up with the latest cyber threats attacking your networks, your industry/peers/vendors, etc.​ Understand MITRE TTPs (at a ‘procedure’ level) used by adversaries in the latest cyber attack campaigns so you can enhance your threat detection capabilities.​ A real-time snapshot of how top malware campaigns are evolving in terms of attack sequences (MITRE TTPs), vulnerability exploitation (CVEs), IOCs, etc.​
  • 21
    Engity

    Engity

    Engity GmbH

    As an Identity & Access Management Solution Provider, we offer European SMEs, start-ups and grown-ups a fully scalable, managed and customizable Keycloak alternative. Engity can ensure full compliance with European data protection regulations by providing all services from European data centers. Furthermore, Engity offers standard security features such as Easy-Ensure Strong Password Check or Breached Password Detection to ensure the highest security standards. In addition to the classic authentication features such as login with username & password, MFA, SSO or biometrics, Engity also brings new solutions to the market, such as authentication environments for directories or sign-up without the need for an e-mail account.
    Starting Price: €0.01/month/user
  • 22
    BadBadger AntiMalware

    BadBadger AntiMalware

    BADBADGERSECURITY LLC

    BadBadgerAntiMalware is a complete cyber-security software package designed to protect users and their personal data from hackers and malicious software. BadBadgerAntiMalware uses zero-day threat analysis of malware, bad websites, ransomware, spyware, rootkits and other software that is intent on stealing personal information.
    Starting Price: $24.95
  • 23
    Marble

    Marble

    Marble

    Marble is an open-source Transaction, Event, and User real-time engine designed to help companies detect money laundering, service abuse or fraud behavior. We provide an easy-to-use rule builder that can leverage any type of data, an engine capable of running checks in batch or in real-time, and a case manager to improve operational efficiency. Marble is beneficial for payment service providers (PSPs), banking-as-a-service (BaaS) providers, neobanks, marketplaces, telecommunications companies... It allows them to quickly set up and update detection scenarios that generate decisions within minutes. These decisions can trigger events in your systems, introduce friction, or restrict operations in real-time. They can also be investigated within Marble using our case manager or in your own system by utilizing our API. Marble is developed with compliance requirements in mind, ensuring that everything is versioned and auditable without any time limitations.
    Starting Price: €2500 per month for SaaS
  • 24
    ResilientX

    ResilientX

    ResilientX

    Automated discovery and inventory of external assets empowered by passive scanning and view of an organization's digital attack surface, points, vulnerabilities, and risk score. Cyber exposure management is more than just a product, it’s your strategic ally in safeguarding your digital landscape. Going beyond the capabilities of conventional attack surface tools, it offers a panoramic view of an entire internet-facing digital infrastructure. Our meticulous process involves correlating, categorizing, and assessing each data point, ensuring our customers receive accurate and pertinent information. We go beyond by offering valuable insights and context, making sure you’re always a step ahead in cyber security. Get an actionable report, full of context and documentation to include for your GRC. Seamless setup, comprehensive testing, and robust posture management. Run a specific type of test or schedule it to be periodically run.
  • 25
    Cloaked

    Cloaked

    Cloaked

    Make your data invisible by generating unlimited identities. The next level in privacy protection for online and travel. Generate virtual identities, and unique contact info to substitute for your personal information. Every website, company, or person can have a stored 
identity you can use forever or delete anytime. Protect personal information using the Cloaked extension. Available for Chromium browsers like Google Chrome and Brave. Generating identities with the mobile app is one tap away. Integrates with your browser or mobile device to sign in anywhere with ease. Generated phone numbers route through an encrypted server making your personal number invisible to recipients. Unique sets of functional contact and login credentials that protect your personal info. With unique identities, it's impossible for companies to build a central profile on you. Unlock powerful features to keep your communication organized and secure.
    Starting Price: $10 per month
  • 26
    Fastly Next-Gen WAF
    The Fastly Next-Gen WAF provides advanced protection for your applications, APIs, and microservices, wherever they live, from a single unified solution. Reporting and alerting feedback loops provide Layer 7 visibility across your entire app and API footprint. Integrations with your DevOps and security toolchains encourage the sharing and correlation of data and help simplify automation, both decreasing security risks and speeding up CI/CD. Our Next-Gen WAF uses SmartParse, a highly accurate detection method, to evaluate the context of each request and how it would execute, to determine if there are malicious or anomalous payloads in requests. SmartParse enables near-zero tuning and the ability to start detecting threats immediately. Block account takeover (ATO) attacks by inspecting web requests and correlating anomalous activity with malicious intent.
  • 27
    ScalePad ControlMap
    There are thousands of steps between you and your cybersecurity compliance goals. With the right cybersecurity compliance management software, you’ll hit the ground running. Start with customizable, expert-verified templates, and cross-mapping finds the overlap between common standards to get you cruising through compliance tasks. Managing evidence and policies keeps everything at hand. Keep tabs on risks and vendors too, no more spreadsheets and scattered documents, everyone on the team needs to contribute to compliance. In this personalized portal, they can access policies and handle any tasks they need to do.
    Starting Price: $200 per month
  • 28
    Cove Identity

    Cove Identity

    Cove Identity

    Share your sensitive data with anyone securely and easily, without compromising on privacy. Cove's advanced search feature makes finding documents a breeze - search by file name or smart tags to quickly locate the information you need. Transform paper to pixels, organize with ease, and maximize productivity while keeping your information protected. Safely share your files with others using Cove's secured links feature. With encrypted links and access control, you're always in control of who can access your data. Easily transfer large volumes of documents securely with Cove's bulk upload feature. Our end-to-end encryption keeps your data protected at all times. Get ample space to store all your important files securely with Cove's cloud storage.
    Starting Price: $0.59 per month
  • 29
    Nuggets

    Nuggets

    Nuggets

    Whether you’re a bank, subscription service, telco or logistics company, Nuggets self-sovereign decentralized identity helps you deliver on your regulatory expectations while building competitive advantage. While your consumers enjoy more convenience, confidence and choice. With Nuggets, consumers get back control of their data and you become a champion of trust. Nuggets ties every transaction to a verified self-sovereign decentralized identity. This means the customer is verified as legitimate before they even connect to the service. This is a gold standard in digital identity, through private, secure proof of transactions. Nuggets ties every payment to a verified digital identity, preventing fraudsters from compromising identities online. Payment providers and merchants save money from reduced fraud, as well as delivering all the payment options customers want.
    Starting Price: Free
  • 30
    Gataca

    Gataca

    Gataca

    Gataca provides simple, compliant, and secure decentralized identity management technology, also known as self-sovereign identity (SSI) technology. Create and digitally sign identity credentials in a standardized format. Design customizable verification templates for on boarding and sign-in processes to offer frictionless access to digital services. Let your users authenticate seamlessly in digital services and control their data with the Gataca Wallet. User data and ID credentials are issued by trusted authorities and protected with biometrics and post-quantum cryptography to ensure they are tamper-proof, allowing instant identity verification without relying on centralized systems.
    Starting Price: €12 per month
MongoDB Logo MongoDB