Best IT Security Software - Page 87

Compare the Top IT Security Software as of May 2026 - Page 87

  • 1
    HivePro Uni5
    The Uni5 platform elevates traditional vulnerability management to holistic threat exposure management by identifying your enterprises' likely cyber threats, fortifying your weakest controls, and eliminating the vulnerabilities that matter most to reduce your enterprise risks. Minimizing your threat exposure and outmaneuvering cybercriminals requires enterprises to know their terrain, and the attacker’s perspective well. HiveUni5 platform provides wide asset visibility, actionable threat, and vulnerability intelligence, security controls testing, patch management, and in-platform, cross-functional collaboration. Close the loop on risk management with auto-generated strategic, operational, and tactical reports. HivePro Uni5 supports over 27 well-known asset management, ITSM, vulnerability scanners, and patch management tools out of the box, allowing organizations to utilize their existing investments.
  • 2
    Ivanti Secure Unified Client
    Ivanti Secure Unified Client is a dynamic, integrated, and easy-to-use network client that delivers anytime/anywhere secure connectivity. It provides secure connectivity, an intuitive end-user interface, and simplified deployment options. It runs on platforms that support application distribution through an online application store. Secure access to corporate networks for employees, anywhere, anytime, and from any device. Increased productivity, reduced management overhead, and better security profiles. Data channels use FIPS-certified cryptographic modules. Automated tunnel tear-down or re-establishment. VPN connected automatically via a predefined host. Change the appearance of UI and input elements. With Ivanti Secure Unified Client, you can improve your security for employee access to corporate networks.
  • 3
    VictoriaLogs

    VictoriaLogs

    VictoriaMetrics

    VictoriaLogs, an open-source log database from VictoriaMetrics, is designed to be user-friendly. It seamlessly integrates with widely used log collectors and offers a more straightforward setup process than Elasticsearch and Grafana Loki. The robust LogsQL query language provides full-text search capabilities across all log fields, simplifying log management. It scales impressively with CPU, RAM, disk IO, and space, running efficiently on Raspberry Pi and high-end servers. It handles data volumes up to 30 times larger than Elasticsearch and Grafana Loki on the same hardware, making it a powerful choice for various environments. VictoriaLogs supports fast full-text search over high-cardinality log fields like trace_id, user_id, and IP. It works seamlessly with traditional Unix log analysis tools like grep, less, sort, and jq. It also offers multi-tenancy support, accommodating diverse needs.
    Starting Price: $0
  • 4
    Compleye

    Compleye

    Compleye

    Welcome to the world’s most user-friendly compliance platform, with a 100% certification success rate among internally audited clients. Discover the most user-friendly compliance platform, seamlessly supporting ISO 27001, ISO 9001, ISO 27701, and SOC 2 frameworks for easy and straightforward adherence to industry standards. Achieve GDPR compliance for your company in no time. Our structured roadmap, a dedicated platform for evidence management, and collaborative strategy sessions with a seasoned privacy expert create a holistic and customized experience. Clients passing our internal audit have consistently achieved certification afterward. Internal audits identify risks, enhance operational efficiency, and ensure regulatory compliance. By answering a couple of questions you’ll know exactly how ready you are for external audit and you’ll be able to see a snapshot of what’s missing. We offer a range of compliance modules that you can mix and match to create a solution that works for you.
    Starting Price: €149 per month
  • 5
    ProActive QMS

    ProActive QMS

    ProActive QMS

    ISO and BRC compliance software meet the requirements of multiple management standards including ISO 9001, 14001, ISO 45001, ISO 27001, and the BRC standards. Intuitive powerful CAPA software, capturing continual improvement activities, non-conformities, root cause analysis, corrective and preventive actions, and top loss performance data. Effective version and change controls for system documents and controlled forms. Location issue controls for user access to role-related documents only. Compliance evaluation software listing compliance requirements, departmental/area accountability, guidance on legal and other requirements conformity for single or multiple standards including ISO 9001, ISO 14001, ISO 45001, ISO 27001, etc. Supplier, service provider, and contractor qualification, ongoing assessment, and performance enhancement made easy through customized risk work streams, assessments, software scheduled re-assessments, and targeted action logs.
    Starting Price: $150.95 per month
  • 6
    FastPass Sync

    FastPass Sync

    FastPassCorp

    FastPass Sync is a password synchronization software that integrates Active Directory with systems like SAP, IBM, Oracle SQL, and more. It copies new passwords to user accounts across platforms so users remember just one password. The tool intercepts clear text passwords at the domain controller before encryption, enabling password synchronization between Active Directory and target systems in encrypted form. The software provides convenience for users and employees, strengthened security, and reduced help desk costs. FastPass Sync can synchronize passwords between Active Directory(AD) and systems target systems like SAP, Oracle, SQL, IBM (Z/OS and iSeries). It is a low-cost, easy and most effective way of solving password problems.
  • 7
    ELC Information Security

    ELC Information Security

    ELC Information Security

    Secure your workforce and educate your employees. More than 24 topics, monthly and annual training on phishing, ransomware, social engineering, and more. Your best defense is a good offense. Security awareness customizations include script edits, branding, and company-specific policy and contact information. Our security awareness training is compatible with smartphones, tablets, laptops, and desktops. Save time and increase productivity with custom security awareness training specific to your company. As the cybersecurity landscape rapidly transforms, we are committed to helping your workforce adapt and meet the challenges of maintaining secure information systems. We provide end-to-end support to all our clients throughout the entire license period. Customization and integration takes days, not weeks. Learning management hosting, tracking, and reporting. We have all the tools you need to get started today.
  • 8
    CredoLab

    CredoLab

    CredoLab

    Help your risk, fraud, and marketing teams make better decisions with advanced behavioral analytics based on smartphone and web metadata. Join 150+ financial companies, banks, and fintech unicorns already using CredoLab platform to enrich their data and unlock revenue opportunities for sustainable growth and innovation. Designed to be seamlessly embedded into your products, providing unparalleled real-time data-driven solutions for your business needs. Greater predictive power, 100% hit rate, lower cost of risk, higher approval rate. Top-of-the-funnel data, real-time device velocity checks, and predictive behavior-based scores. Better user engagement with personality-based and outcome-based marketing campaigns. Granular and real-time behavioral insights for a deeper understanding of all users. Once embedded in your products, it delivers value across the entire organization. It also works as a standalone or as a complement to existing risk, fraud, and marketing solutions.
    Starting Price: $600 per month
  • 9
    TrustDecision

    TrustDecision

    TrustDecision

    Distinguish between genuine users and potential threats with high accuracy by identifying unique devices and global historical data in real time. Device characteristics can change over time, leading to recognizing the same device as a different one. Collecting sufficient data while respecting user privacy, especially with stringent data protection regulations. New devices and OS are regularly released, and being up-to-date and adaptable is vital. Associating multiple device profiles with a single user with an accurate cross-device tracking capability. Manipulate the user-agent information sent by browsers or apps to mimic legitimate devices. Difficulty in maintaining a unique device ID when it’s being tampered with, modified, or hijacked. Distinguishing every device, even in challenging scenarios like factory resets, tampered device locations, detection of group control tools, script-based manipulations, app reinstalls, and beyond.
  • 10
    DeviceID

    DeviceID

    DeviceID

    Our ML-powered platform instantly reveals your traffic allowing you to identify your users even if they try to hide their identity. detect attacks and bots, access extensive real-time analytics, and enjoy the most advanced identification method. We support the most popular browsers and programming languages so you can easily identify your users across all devices and browsers. The culmination of our meticulous identification process is the delivery of a comprehensive response. This response includes a unique and persistent identifier for the device, ensuring reliable user recognition across sessions. Furthermore, you'll receive a detailed analysis of the client's device, encompassing a wealth of information gleaned from our advanced fingerprinting techniques and machine learning analysis. This includes data points such as the user's browser version, operating system, and potential threat scores.
    Starting Price: $50 per month
  • 11
    ManageEngine Mobile Device Manager Plus MSP
    ManageEngine Mobile Device Manager Plus MSP empowers IT administrators to effortlessly manage various devices within their client's organization, including smartphones, tablets, laptops, and desktops. The user-friendly platform simplifies device management through ergonomic configurations, allowing for centralized deployment, monitoring, and security control from smartphones to laptops under one roof, including company-issued devices and employee-owned (BYOD). The platform can be installed on-site or accessed as a cloud service. Using over-the-air (OTA) technology, Mobile Device Manager Plus MSP simplifies enrollment and ongoing management. Schedule regular scans to identify potential security risks, like jailbroken phones or unauthorized modifications. The solution also differentiates between personal and corporate devices with its Profile Management feature. This lets IT set specific restrictions and security profiles for each device type.
    Starting Price: $595/year/user
  • 12
    360 Antivirus Pro

    360 Antivirus Pro

    360 Antivirus Pro

    For Windows devices, 360 Antivirus Pro is a complete security solution that offers real-time shield against a wide range of threats, such as viruses, malware, ransomware, and spyware. It uses advanced algorithms to detect and block threats, ensuring your system remains secure. The intuitive user interface makes it easy to manage scans, schedule updates, and adjust protection settings. With its robust protection capabilities and user-friendly design, 360 Antivirus Pro provides peace of mind and ensures the security of your Windows Devices against both known and unknown cyber threats. It's also an affordable option for both home users and businesses.
    Starting Price: $69.99
  • 13
    Swimage Attune EPM
    In addition to being the best imaging & provisioning tool on the market, Swimage Attune EPM prepares you for today’s cyber threats. Security & compliance monitoring Rapid, hyper-automated remediation Zero trust security Full-disk forensic snapshot Low/no bandwidth Onsite or remote Self-service capability Full system rebuild capability Encryption handler Integrates with other security tools Automated imaging Automated, dynamic provisioning Domain join flexibility Cloud management portal Multi-tenancy Client-side agent Asset management Application delivery & patching PC health monitoring & automated remediation Intelligent driver interrogator Fast & easy installation & configuration Integrates with existing system management tools Flexible & customizable Scalable to any organization size 100% end-to-end automation Requires minimal labor Reduces help desk demands Own & protect your PC information & data Alternative to SCCM & Autopilot
    Starting Price: $15.00 per user per month
  • 14
    AuthZed

    AuthZed

    AuthZed

    Unblock your business with an authorization system inspired by Google's Zanzibar white paper. As the creators of SpiceDB, the AuthZed team delivers enterprise-ready permissions systems built for scale and security. The most mature open source Zanzibar implementation designed for both consistency and performance at scale. Define fine-grained access for any object in your application or across your product suite and manage permissions using a centralized schema. Specify consistency requirements per authorization check; tunable consistency features balance performance and correctness according to your use case. SpiceDB returns lists of authorized subjects and accessible resources, helpful when pre-filtering permission-based results. Instrumented with observability tooling, a powerful Kubernetes operator, and load-testing capabilities, SpiceDB prioritizes both developer and platform engineering experiences.
  • 15
    Red Hat Ansible Automation Platform
    Red Hat® Ansible® Automation Platform is a unified solution for strategic automation. It combines the security, features, integrations, and flexibility needed to scale automation across domains, orchestrate essential workflows, and optimize IT operations to successfully adopt enterprise AI. The path to fully optimized automation is a journey. Moving from manual Day 2 operations and ad hoc solutions to a comprehensive, integrated automation platform requires a strategic commitment. And it determines your current—and future—business success. With Red Hat Ansible Automation Platform, you can maximize efficiency, improve security, and overcome increasing IT challenges like skill gaps and tech sprawl. It helps you: Deliver consistent, reliable automation across domains and use cases. Maximize the value of the technology and resources you already have. Build a strong foundation for AI adoption.
    Starting Price: $5,000 per year
  • 16
    iLocker

    iLocker

    Protectstar

    With iLocker, you can make your Mac not only even more safe but also more flexible if you share your Mac with others. iLocker Mac password-protects each app, such as Apple Mail, Photos, Contacts, Safari, and Games, from unauthorized access. You pick which apps will be protected, and iLocker Mac keeps them secure. In addition, it tracks failed attempts to access the protected apps, so you'll know when it happened with the date and time. The automatic exit feature locks the app after some time when you're away from the keyboard to improve security. There is only one more comfortable way to protect any app you need. Just drag-drop your apps, click on the button, and don't worry about anything. Now you can unlock your Mac in an instant. Use Apple Pay to make secure online purchases. Quickly access system settings and locked notes. And even switch between users, all with the touch of a finger.
    Starting Price: $376 per year
  • 17
    ELLIO

    ELLIO

    ELLIO

    IP Threat Intel delivers real-time threat intelligence that helps security teams reduce alert fatigue and speed up triage in TIPs, SIEM & SOAR platforms. Available as an API for your SIEM/SOAR/TIP or as a local database for most demanding on-premise workloads. The feed provides detailed information on IP addresses observed in the last 30 days, including ports targeted by an IP. Updated every 60 minutes, it reflects the current threat landscape. Each IP entry includes context on event volume over the past 30 days and the most recent detection by ELLIO's deception network. Provides a list of all IP addresses observed today. Each IP entry includes tags and comments with context on targeted regions, connection volume, and the last time the IP was observed by ELLIO's deception network. Updated every 5 minutes, it ensures you have the most current information for your investigation and incident response.
    Starting Price: $1.495 per month
  • 18
    Axiad Cloud

    Axiad Cloud

    Axiad Cloud

    Systematically authenticate across all users, machines, and interactions with a cloud-based, complete, and flexible authentication platform. Axiad helps organizations move to a passwordless future without the friction and risk of fragmented solutions and ultimately improve their cybersecurity posture and empower their end users. Establish best practices for user security, eliminate silos, and meet compliance requirements with enterprise-grade passwordless MFA. Establish best practices for user security, eliminate silos, and meet compliance requirements with government-grade phishing-resistant authentication. Go beyond an in-place IAM product, establish best practices for user security, and meet compliance requirements with passwordless and phishing-resistant MFA. Enhance machine identity authentication and improve overall security with a unified, highly customizable PKI solution.
  • 19
    MyGlue

    MyGlue

    IT Glue

    MyGlue is your collaboration and intranet portal, creating a direct line for meaningful communication with end-users. Leave insecure email exchanges, shoulder-tapping, and one-off conversations behind. IT professionals have to manage more devices, more data, and more users than ever before. With a collaboration and intranet platform in your stack, easily and securely share IT documentation and collaborate with end-users. MyGlue is packed with features, many of which you’ll recognize from IT Glue. From the password vault to checklists, to the security features like audit trail, version history, and SOC 2 compliance, MyGlue has everything your end-users need to manage their passwords and process documentation. With the introduction of the MyGlue help center, sharing documents such as “how-to’s” has never been easier. Enjoy a holistic approach to managing communications, documentation, and password management across the entire organization and all teams within.
    Starting Price: $29 per month
  • 20
    Bitdefender Sandbox Analyzer
    Sandbox Analyzer detects advanced zero-day threats prior to execution. Suspicious files are automatically uploaded to a secure on-prem or Bitdefender-hosted cloud sandbox for in-depth behavior analysis. Sandbox Analyzer, built by in-house machine learning and behavioral heuristic models, is a powerful forensic tool used in conjunction with Endpoint Detection and Response (EDR) to enhance an organization’s defenses against concealed sophisticated threats. It serves as a source of validation to provide enhanced visibility and focused investigation while optimizing effective threat containment. Suspicious files are analyzed in-depth by detonating payloads in Bitdefender's cloud platform, or in a secure customer virtual environment. Our sandbox technology observes malware behavior by simulating a ‘real target’ so that the malware will act as it would in the wild. Post analysis, appropriate actions are taken to effectively neutralize the threat.
  • 21
    Imperva Client-Side Protection
    Client-Side Protection provides real-time monitoring of all client-side resources and JavaScript behavior. Gain control over all first and third-party JavaScript code embedded on your website. Actionable insights make it easy to identify risky resources and scripts that should not load on your client side. And if any JavaScript code is compromised, your security team is the first to know. Provides comprehensive inventorying, authorization, dynamic integrity verification, and real-time monitoring, helping streamline regulatory compliance with the new client-side security requirements introduced in PCI DSS 4.0. Protect your website against client-side attacks and streamline regulatory compliance with PCI DSS 4.0. Client-side attacks increase as web applications shift to client-side logic and incorporate more third-party code and resources. These attacks can directly steal sensitive customer data, resulting in breaches and noncompliance with data privacy regulations.
  • 22
    Akamai Client-Side Protection
    Client-Side Protection helps protect against end-user data exfiltration and shield websites from JavaScript threats. It analyzes script behavior in real-time, provides actionable insights in a single dashboard view, and delivers alerts to mitigate harmful script activity. Designed for PCI DSS v4.0, the solution helps businesses meet new script security requirements and safeguards against client-side attacks. Inject simple scripts into each monitored page without meaningfully impacting performance. Monitor and assess script activity from the browser while machine learning techniques analyze the risk of unauthorized action. Get real-time alerts, with detailed information about mitigation, if an active threat or attack is found. Immediately restrict malicious scripts from accessing and exfiltrating sensitive data on protected pages with one click. Defend your site from client-side threats. Ease compliance with PCI DSS v4.0. Strengthen your web page integrity.
  • 23
    HTCD

    HTCD

    HTCD

    HTCD is a cloud security SaaS built AI-first to materially upgrade your security posture. Access centralized visibility across your AWS and Azure environments—with 500+ OOTB policies for cloud security, infrastructure, network, SaaS, and compliance. All while retaining 100% ownership of your data. Create no-code detections in minutes. AI converts your questions to code for rapid results: Which CVEs can be exploited in my Azure environment? Show me S3 costs over the last 2 weeks ... and more. Get a prioritized view of security misconfigurations and vulnerabilities—solve the most pressing issues to reduce operational risk. AI reduces your response time by prioritizing in minutes what otherwise takes weeks. Get started in 15 minutes, free for 6 months for startups.
  • 24
    Active Roles

    Active Roles

    One Identity

    Simplify identity management and security with visibility of all Entra ID (Azure AD) tenants, Microsoft 365, and Active Directory domains from a single pane of glass. Ensure users and objects have fine-grained privileged access only when they need it with dynamic delegation across your identity landscape. Automate manual processes to increase efficiency and security while accelerating account, group, and directory management. Manage all Active Directory domains, Entra ID (Azure AD), and Microsoft 365 tenants from a single pane of glass with our Microsoft solution. Control access and permissions with dynamic rules, group families, and policies with automation. Manage users, groups, roles, contacts, Microsoft 365 licenses, and objects with configurable workflows and customizable scripts. Seamless integration of Active Roles with AWS Directory Service for a zero-trust least privilege model, access delegation, and synchronized on-prem user data.
  • 25
    Cymmetri

    Cymmetri

    Cymmetri

    From employees and partners to customers and privileged users, Cymmetri seamlessly manages and protects your entire identity ecosystem. Streamlined control over user access, ensuring secure and efficient operations in the digital landscape. Empowers seamless identity protection, safeguarding individuals and organizations with security everywhere, anytime. Streamline onboarding for all new employees. Experience the power of Cymmetri firsthand or discuss your specific IAM needs with our experts. Measurable outcomes, demonstrating the tangible and positive effects of our solutions on security, efficiency, and overall performance. Implementing robust cybersecurity enhances data protection, minimizing the risk of breaches and unauthorized access. Boost productivity with our solutions, empowering employees to thrive in a secure and efficient work environment. Enhance efficiency, streamline operations, and achieve cost savings through our innovative solutions and optimized processes.
    Starting Price: $2 per month
  • 26
    SAP Cloud Identity Services
    With SAP Cloud Identity Services, you can successfully support identity management in cloud and hybrid environments. SAP Cloud Identity Services enable you to provide audit reports and support compliance with corporate policies and legal regulations. Improving security, compliance, and system integration in cloud and hybrid environments. Secure system and data access, while granting users an SSO access experience across your cloud or hybrid landscape. Apply consistent mechanisms for user authentication, user provisioning, role assignment, and authorization management. Eliminate redundancies by using one central repository to manage user accounts in a complex cloud or hybrid system landscape. Benefit from centralized capabilities, such as secure authentication and SSO. Provide convenient user self-services, including registration and password reset, for employees and partners. Protect access to applications by defining risk-based authentication rules, two-factor authentication, etc.
  • 27
    RSA Governance & Lifecycle
    Full identity governance and administration (IGA) capabilities are delivered in cloud, hybrid, and on-premises deployments. Robust governance capabilities help to enforce internal policies and external mandates. Visibility and insights reveal risks, identify priorities, and recommend interventions. Extensive automation and centralized management improve operational efficiency. Integrate IGA across applications, systems, and data to manage and secure identities and access at scale. Lifecycle capabilities manage user permissions and access through the entire joiner-mover-leaver lifecycle. A dynamic dashboarding framework provides insights to identify trends, measure efficacy, and uncover risks. Integrated gamification accelerates reviews, reduces audit cycles, and promotes
better outcomes. RSA combines automated identity intelligence, authentication, access, governance, and lifecycle to protect the gaps and blind spots that result from combining multiple-point solutions.  
  • 28
    Fasoo Smart Print
    Fasoo Smart Print (FSP) is a print security solution that prevents unauthorized data breaches through printouts. The solution applies dynamic watermarks containing user name, IP address, printed time, user ID, and company information to make documents traceable to their source. With context-aware print control, it prevents unauthorized printing and applies data masking to detected sensitive information. A comprehensive audit trail monitors all printing activities, capturing both text and images of what users printed, ensuring a secure chain of custody for privacy and a robust defense against data breaches. Key Features of Fasoo Smart Print include: Dynamic print watermark, Context-aware print control, Smart pull-printing, and Comprehensive logging.
  • 29
    Microsoft Defender for Cloud Apps
    Modernize how you secure your apps, protect your data, and elevate your app posture with SaaS security. Get full visibility of your SaaS app landscape and help protect your apps with Defender for Cloud Apps. Discover, control, and configure apps to ensure employees are using trusted and compliant applications. Classify and protect sensitive information at rest, in use, and in motion. Enable your employees to safely access and view files in apps. Control how apps interact with each other. Gain insight into privileges, permissions, and apps that are accessing sensitive data on behalf of another application. Defend against advanced cyberattacks using app signals. Defend against sophisticated cyberattacks using app signals as part of your advanced hunting in Microsoft Defender XDR. The scenario-based detections will enable your security operations center (SOC) to hunt across the entire cyberattack chain.
  • 30
    WinZip SafeMedia
    Employees need the flexibility to take digital data with them wherever they go. Businesses must ensure this data is always secured. WinZip SafeMedia enables users to quickly and safely store, manage, and transport files on removable media (e.g., removable storage devices such as CDs, DVDs, and USB drives and sticks), empowering IT admins to uphold protocols and standards that defend your business against online and offline threats. Tailor security policies to your organization’s needs. Customize settings for individuals or groups, and monitor activity as needed. Use drag and drop plus automatic security features to provide end users with a simple, easy solution that doesn’t hinder productivity. Leverage FIPS 140-2 compliant and FIPS 197 certified encryption and compression to protect data on removable media. Best-in-class encryption methodologies protect classified information while enabling storage flexibility and centralized control.
MongoDB Logo MongoDB