Best IT Security Software - Page 96

Compare the Top IT Security Software as of May 2026 - Page 96

  • 1
    Anti-Executable
    Stop threats before they start by blocking unauthorized executables. Faronics Anti-Executable blocks any unknown threats that can bypass your antivirus solution. It protects you from sophisticated threats like zero-day attacks, mutating malware and advanced persistent threats that necessitate an approach that goes beyond a traditional antivirus solution, by ensuring only approved applications are allowed to run on a computer. Protect your endpoints with balance of flexibility and security using Faronics Anti-Executable. Ensure your servers are protected at all times with Faronics Anti-Executable. Protect your identity and keep your computer safe from malware with Faronics Anti-Executable. Faronics Anti-Executable provides security beyond an antivirus by blocking unauthorized programs– whether malicious, unlicensed or simply unwanted – from ever executing.
  • 2
    Superna

    Superna

    Superna

    Superna is the global leader in data security and cyberstorage solutions for unstructured data, with the widest platform support of any cyberstorage vendor in the market. Automatically detect exfiltration and other anomalous events and trigger AirGap to mitigate impact of ransomware attacks. Active security at the data level for increased resiliency, to minimize disruption of business operations. Real-time auditing for proactive protection of data, with automated responses to security events. Supports forensics, performance auditing, and compliance initiatives. Orchestrate, manage, and secure your unstructured data wherever it resides.
  • 3
    Unistal Anti Virus

    Unistal Anti Virus

    Unistal Systems

    Unistal is a name synonymous to data security. Unistal’s brand Protegent is the most advanced & fastest antivirus. Protegent is deciphered from French word ‘Protegee’, which means ‘To Protect’. As the name suggests Protegent products have been designed to provide protection to your business, data and computer/Laptop. It is world’s only antivirus with inbuilt data recovery software. It is available in three variants Protegent antivirus, Total Security and Complete Security. Unistal has developed an empowering solution that discards all unwanted virus threats and makes your PC Virus Free!! Protegent Antivirus not only safeguards your computer system from all kinds of Malware but also provides Pro-active data recovery software to ensure that there is no loss of data/files due to any kind of logical crash. Protegent Antivirus is world’s only antivirus having inbuilt data recovery software.
    Starting Price: $49 one-time payment
  • 4
    AbuseHQ

    AbuseHQ

    Abusix

    AbuseHQ is the first network abuse desk SaaS application for ISPs, Telcos, and Hosting & Cloud Providers which identifies and neutralizes abuse. With AbuseHQ, it is easy to keep control, knowledge, and oversight to prevent abuse within your network. AbuseHQ enables network security and abuse teams to identify, respond, mitigate, and address compromised accounts automatically. We believe that we can fight network abuse and other cyber threats on a global scale, and AbuseHQ plays one major part in it. AbuseHQ fully automates security and abuse workflows, increases productivity, subscriber alert speed, and dramatically improves network security while lowering support costs, thus making your network unattractive for bad actors and their bots. AbuseHQ is designed to easily integrate with other types of subscriber security alerts through email or our well-documented API, honeypots, MTA logs, user login failure alerts, and different kinds of edge security system logs.
  • 5
    ALog ConVerter
    ALog ConVerter / ALog ConVerter DB automatically collects and analyzes access records (logs) for important data . With patented translation technology, A huge amount of data access records are extracted from complex system logs and compiled into an easy-to-read "access log" using the world's unique log analysis and conversion technology. Automatically learn file access frequency / access destination for each user. It scores unusual behaviors according to the degree of risk, revealing signs of fraud and attacks. By setting alerts / reports in advance, such as "Recording access to important folders", you can streamline the periodic checks / monitoring required for auditing. Monitor suspicious behavior from various perspectives, such as users who repeatedly fail to log on and users who repeatedly delete files.
  • 6
    Pwn Pulse Sensor
    Pwn Pulse Sensor provides total device visibility by building baseline security profile and enforcing critical network controls across physical locations. Easy to deploy without the need to install and manage agents. Real time discovery of all IT and IoT devices — wired, wireless, and Bluetooth — on the network and in the surrounding airspace. Automatically create comprehensive fingerprints of devices consisting of manufacturer, OS, ports, running services, and IP/MAC address. Correlate interfaces, analyze snapshots, and evaluate device relationships to create individual device identities and track their behavior and changes.
  • 7
    BluSapphire

    BluSapphire

    BluSapphire

    The only Cybersecurity platform you will ever need. Cloud-Native, seamless, unified platform for businesses of all scales and sizes. Prevent a cyberattack even before it happens. For creating disruption in the cybersecurity space with unified advanced threat detection, response, and remediation platform that is completely agentless. BluSapphire solutions are built with one aim- to ensure you never have to suffer another cyberattack, or its consequences, ever again. Powered by Machine Learning and robust analytics to detect malicious behavior well in advance, and Artificial Intelligence capabilities to triage attacks across multiple data layers. Build your organization’s cyber posture and have all compliance questions answered. Go beyond XDR with one Cybersecurity solution addressing complete Incident lifecycle management across varied organizations. Accelerate Cyber threat detection and Response capabilities across organizations with an XDR solution.
  • 8
    indeni

    indeni

    indeni

    Indeni’s security infrastructure automation platform monitors firewall health and auto-detects issues like misconfigurations or expired licenses before they affect network operations. It automatically prioritizes issues so you only receive the most important alerts. Indeni protects your cloud environment by taking a snapshot of it before it’s built. Our cloud security analysis tool, Cloudrail, reviews your infrastructure-as-code files so you can identify violations earlier in development when they’re easier to fix. Constant detection of HA unreadiness from cross-device inconsistencies in security policies, forwarding tables, and other configurations and state. Consistent measurement of device configuration skew against locally-defined organizational standards. Collect relevant performance and configuration data from leading firewalls, load balancers, and other security infrastructure.
  • 9
    ISMS.online

    ISMS.online

    Alliantist

    Compliance and control for multiple certifications, standards and regulations including ISO 27001, ISO 27701, ISO 22301 and GDPR. A pre-configured ISMS offering up to 77% progress for ISO 27001 the minute you log on. All the help you need with Virtual Coach, Assured Results Method, live customer support and an in-built knowledge base. We’ve developed a series of intuitive features and toolsets to save you time, money and hassle. With ISMS.online you can quickly achieve ISO 27001 certification and then maintain it with ease. Forget about time consuming and costly training. Our Virtual Coach video series is available 24/7 to guide you through. Save time with our pre-configured asset inventory – specifically compiled to reflect the most common information assets in ISO 27001 – or add your own. Assign team members to input and review details and track progress. You can even identify priorities based on the risk and financial value of your assets.
  • 10
    Socure

    Socure

    Socure

    Market-leading coverage and accuracy from the most comprehensive solution. Over 1000 companies rely on Socure to ensure customer trust and unlock rapid acquisition growth across all channels. Socure serves 1000+ customers including financial services and fintech leaders, and we’re rapidly expanding across adjacent verticals, including telco, payroll providers, crypto, government & public sector, healthcare, online gaming, cable, and insurance. Socure ID+ supports automated machine-learning identity fraud risk management, as well as data-centric Know Your Customer (KYC) and Global Watchlist compliance tools, all returned with reason codes for decision transparency. DevHub is a central hub for developers to easily integrate and quickly build identity verification applications on the Socure ID+ Platform. DevHub contains documentation for all product modules, an API Reference Guide, a support ticketing system, and the latest communication updates in a self-service model for developers.
  • 11
    Votiro

    Votiro

    Votiro

    The only file security solution that ensures all files coming into your enterprise are completely safe. Unlike detection-based file security solutions that scan for suspicious elements and block files, Positive Selection singles out only the safe elements of each file, ensuring every file that enters your organization is 100% safe. Any file, anywhere, anytime. With a deep, expert understanding of all types of files, Votiro’s Secure File Gateway eliminates threats from the widest possible range of files, no matter how they enter your organization.
  • 12
    Feedzai

    Feedzai

    Feedzai

    Feedzai is an end-to-end AI-powered financial crime prevention platform covering the entire lifecycle from account opening to fraud detection and AML compliance. It uses behavioral analytics to establish trusted digital identities and detect abnormal events that indicate fraud. The platform provides real-time fraud detection and prevention across multiple payment types and channels. Feedzai serves retail banks, commercial banks, payment service providers, merchant acquirers, core banking systems, and government agencies. It helps reduce AML compliance costs while enhancing security and operational efficiency. Trusted globally, Feedzai protects over a billion consumers and secures trillions in payments every year.
  • 13
    Adept Secure

    Adept Secure

    Adept Technologies

    The rush to be first to market in application development, and the leveraging of open-source technology has created a hacker’s paradise. The Unites States of America and its allies are the target of an unprecedented amount of cyber terror attacks. Hacking, cracking, kill chains, zero-day attacks, ransomware, denial of service and other cyberattacks have reached levels of sophistication surpassing the capabilities of most organizations to defend against. On December 23, 2015, Ukrainian power companies experienced unscheduled power outages impacting a large number of customers in Ukraine. In addition, there have also been reports of malware found in Ukrainian companies in a variety of critical infrastructure sectors. Public reports indicate that the Black Energy (BE) malware has been discovered on numerous power companies’ computer networks.
  • 14
    NetGuardians

    NetGuardians

    NetGuardians

    As payment channels have multiplied, so have the routes open to fraudsters; increasing banks’ potential liabilities. Adoption of real-time payments, Open Banking and digital-led interactions exacerbates these problems. Traditional anti-fraud practices find it all but impossible to efficiently prevent payment fraud. Most rely on hundreds of static, reactive rules that fail to detect new fraud patterns and trigger too many poor hits. Leveraging award-winning 3D artificial intelligence (3D AI) technology, NetGuardians’ platform NG|Screener monitors all of the bank’s payment transactions in real-time catching more fraud with fewer false positives. It identifies suspicious payments coming from social engineering techniques or scams (such as invoice redirection, love scams, CEO-fraud) and ties this in with digital banking fraud indicators (such as eBanking/mBanking sessions redirected by malware, hijacked by hackers or account takeover fraud resulting from identity theft).
  • 15
    Actifio

    Actifio

    Google

    Automate self-service provisioning and refresh of enterprise workloads, integrate with existing toolchain. High-performance data delivery and re-use for data scientists through a rich set of APIs and automation. Recover any data across any cloud from any point in time – at the same time – at scale, beyond legacy solutions. Minimize the business impact of ransomware / cyber attacks by recovering quickly with immutable backups. Unified platform to better protect, secure, retain, govern, or recover your data on-premises or in the cloud. Actifio’s patented software platform turns data silos into data pipelines. Virtual Data Pipeline (VDP) delivers full-stack data management — on-premises, hybrid or multi-cloud – from rich application integration, SLA-based orchestration, flexible data movement, and data immutability and security.
  • 16
    Catchpoint

    Catchpoint

    Catchpoint Systems

    Instant insight into your customers' digital experience and the performance of all your apps, networks, and digital services. Monitor, analyze, and troubleshoot all digital services. 80% of issues with availability and performance are outside your firewall. Catchpoint's digital experience monitor platform provides you with the necessary insights across your entire service delivery chain in order to quickly identify and fix these issues. Our global network monitors modern, federated applications beyond the firewall. Get specific alerts when something goes wrong and learn how each component of your service delivery chain affects users. Verify the signals that you receive when you combine synthetic and real user monitoring.
  • 17
    Scale Computing Platform
    SC//Platform brings faster time to value in the data center, in the distributed enterprise, and at the edge. Scale Computing Platform brings simplicity, high availability and scalability together, replacing the existing infrastructure and providing high availability for running VMs in a single, easy-to-manage platform. Run your applications in a fully integrated platform. Regardless of your hardware requirements, the same innovative software and simple user interface give you the power to run infrastructure efficiently at the edge. Eliminate mundane management tasks and save the valuable time of IT administrators. The simplicity of SC//Platform directly impacts IT with higher productivity and lower costs. Plan the perfect future by not predicting it. Simply mix and match old and new hardware and applications on the same infrastructure for a future-proof environment that can scale up or down as needed.
  • 18
    INKY

    INKY

    INKY Technology

    INKY is an award-winning cloud-based email protection software. It blocks spam, malware, and most importantly — it protects businesses from phishing attacks like no other email security solution can. INKY uses domain-specific machine learning and computer vision to identify and block zero-day phishing emails that get through legacy email systems. Warning banners directly in the email offer guidance for suspicious emails. Integrates into Office 365 organization-wide within minutes. Safe/Unusual/Malicious warnings let users know how to treat the email. Our advanced dashboard gives you complete visibility and tracking into the threats being blocked. INKY’s email protection software places user-friendly warnings directly into the email, offering specific guidance to both protect and educate your users. Safe/Unusual/Malicious warnings with details guide the user to take a closer look or proceed cautiously. One of our clients’ favorite features is the ability to Report an Email with a click.
  • 19
    DirectID

    DirectID

    DirectID

    DirectID is a global credit risk platform that is redefining the industry for both lenders and their consumers. By leveraging Open Finance and bank statement data, DirectID help lenders understand their customers throughout the credit risk lifecycle, from onboarding through to collections & recoveries. Today DirectID powers some of the world's biggest brands from banking, consumer and SME lending through to the gig economy, gambling and others. DirectID’s Platform provides global access to bank data through over 13,000+ connections across 65 countries supporting access to over 1.5bn people through one simple integration. The insights provide solutions to common lending questions such as affordability, income verification, expense categorisation, cash flow, emerging financial distress, and more, and are all available directly or through the platform itself. The business is authorised by the FCA to provide AISP (Account Information Service Provider) services within the UK.
  • 20
    Stytch

    Stytch

    Stytch

    The authentication platform for developers. Onboard, authenticate, and engage your users with Stytch’s APIs. Improve security and user experience with flexible, passwordless authentication solutions. Let us build the infrastructure, so you can focus on your product. Our SDKs offer flexible templates that can be tailored to your colors, fonts, and logo, so you can easily create seamless onboarding and authentication experiences that delight users and complement your brand—without the trouble of building UI from the ground up. For even more control over your user experience, choose our direct API integration, which considers both developer and user experience to ensure fast, safe, and easy passwordless authentication flows. We make the integration quick and painless, with clear and comprehensive documentation.
  • 21
    Sophos Intercept X Endpoint
    Take threat hunting and IT security operations to the next level with powerful querying and remote response capabilities. Ransomware file protection, automatic file recovery, and behavioral analysis to stop ransomware and boot record attacks. Deep Learning Technology Artificial intelligence built into Intercept X that detects both known and unknown malware without relying on signatures. Deny attackers by blocking the exploits and techniques used to distribute malware, steal credentials, and escape detection. Elite team of threat hunters and response experts who take targeted actions on your behalf to neutralize even the most sophisticated threats. Active adversary mitigation prevents persistence on machines, credential theft protection, and malicious traffic detection.
    Starting Price: $28 per user per year
  • 22
    Microsoft Identity Manager
    Microsoft Identity Manager (MIM) builds on the identity and access management capabilities of Forefront Identity Manager and predecessor technologies. MIM provides integration with heterogeneous platforms across the datacenter, including on-premises HR systems, directories, and databases. MIM augments Azure AD cloud-hosted services by enabling the organization to have the right users in Active Directory for on-premises apps. Azure AD Connect can then make available in Azure AD for Microsoft 365 and cloud-hosted apps. Automatic identity and group provisioning based on business policy and workflow-driven provisioning. Integration of the contents of directories with HR systems and other sources of authority. Synchronizing identities between directories, databases, and on-premises applications through common APIs and protocols, Microsoft-delivered connectors, and partner-delivered connectors.
  • 23
    Trend Micro Password Manager
    Allows you to open Password Manager with the simple touch of your finger. Creates unique, tough-to-hack passwords. Manage your passwords from any location on any device and browser quickly and easily. For every door that opens on the Internet, there’s usually a “key” to open that door—in other words, a combination of username and password. And behind each door is a ton of personal information about you. If you use easy-to-hack passwords, reuse them across sites, and save them to browsers, you are handing out the keys to your personal information to anyone online. Get comprehensive, multiple device protection and privacy for your digital life. Trend Micro™ Maximum Security includes all of the capabilities of Password Manager for up to 5 devices PLUS it. Works on PCs, Macs, and Android™ and iOS devices. Works with Chrome, Safari, or Firefox browsers. Keeps you safe from hackers.
  • 24
    NetBarrier X9
    Network protection for home and on the go. Two-way Firewall responds to all incoming and outgoing network connections. Full-time application activity monitoring for anti-spyware measures. Location-aware network protection. Worry-free protection from unknown devices and applications. Whether you’re at work, traveling to conferences or in a cafe, Intego NetBarrier will automatically switch to the appropriate firewall setting for the best level of protection. Intego NetBarrier identifies various devices that are trying to access your Mac and lets you decide what’s allowed in and what gets turned away—providing peace of mind when sharing files with others. Just because Intego NetBarrier provides sophisticated firewall protection for Mac doesn’t mean network settings should be confusing and complicated. With simplicity in mind, the intuitive firewall makes it easy for you to adjust settings to the best level of protection.
  • 25
    SISA RA

    SISA RA

    SISA Information Security

    Soaring cyber-attacks emphasize the need for organizations to look forward and see what is coming ahead. A formal Risk Assessment helps entities to disclose vulnerabilities and build a robust security architecture. While assessing risks is highly recommended for organizations to gain insights into the evolving cyber threats, automated risk assessment tools simplify the job for businesses. With the right Risk Assessment tool, organizations can save 70 – 80% of efforts to conduct risk-related activities and concentrate on critical tasks. SISA being a PCI Risk and Compliance expert for more than a decade, identified the challenges faced by organizations in anticipating risks and built SISA Risk Assessor, an intuitive Risk Assessment solution. SISA’s Risk Assessor is the first PCI Risk Assessment tool in the market, built based on world-renowned security methodologies, including NIST, OCTAVE, ISO 27001, and PCI DSS risk assessment guidelines.
  • 26
    NetVizura NetFlow Analyzer
    NetFlow Analyzer is an easy solution for net admins to better understand bandwidth consumption, traffic trends, applications, hosts and traffic anomalies, by visualising the traffic by network devices, interfaces and subnets, traffic segments and end users. NetFlow Analyzer utilizes Cisco® NetFlow, IPFIX, NSEL, sFlow and compatible netflow-like protocols to help net admins with bandwidth monitoring, network traffic investigation, analyses and reporting. This way, companies can optimise networks and applications, plan network expansion, minimize time spent on troubleshooting and diagnostics, and improve security. NetVizura allows you to define custom traffic to be monitored based on IP subnets and traffic characteristics like protocol and service used. Monitor specific traffic for each organisational unit in your network such as departments, remote sites and collections of regional offices by identifying them with IP subnets.
  • 27
    Radware Bot Manager
    Leveraging collective bot intelligence and machine learning techniques, your online business is constantly protected from not just the known bad bots, but also from new ones, ensuring best-in-class protection. Processing billions of pages, and with constant learnings, Radware Bot Manager (formerly ShieldSquare) bot prevention service is tweaked to ensure that none of the genuine traffic to your website and mobile app is blocked. Unlike the DNS re-routing technique used by other bot detection tools in the market, Radware Bot Manager uses an API-based approach, thereby ensuring seamless integration with your existing infrastructure. Radware Bot Manager provides Cloud Connectors and Web server plugins to get started quickly. A lightweight REST API code and JavaScript inserted on your page provides complete bot protection.
  • 28
    Arnica UnifiedLogon

    Arnica UnifiedLogon

    Arnica Software

    Arnica UnifiedLogon is an identity management system, which provides access control, personalization and configuration services, and allows you to implement single-point user log-on for access to multiple applications. It is a powerful tool for efficient control of granular user access to applications, application resources and functionalities, all managed through a web browser. Arnica UnifiedLogon was designed as an extremely scalable system, and is perfectly suited for management of any number of users - from a dozen of local users at a small organization to thousands of users in a large enterprise, to millions of users at a public web site. Arnica UnifiedLogon provides several ways of maintaining and extending user profile data to a virtually unlimited level of complexity.
  • 29
    Fortra Robot
    The Robot product line is designed and developed with operators in mind. Our modern interfaces and enterprise-class functionality make it possible for even novice IBM i teams to manage the system by exception, freeing up time to focus on IT initiatives that add value and impact the bottom line. Robot’s roots run deep. We’ve been part of the IBM i community for 35+ years. We know the platform inside and out. More importantly, we understand the people who manage it and the organizations who run on it. When you need a partner on IBM i—not just a vendor—you need Robot.
  • 30
    AppIdentity

    AppIdentity

    AppDirect

    The AppDirect Cloud Management Suite’s Identity and Access Management solution empowers you with administrative control over cloud consumption within your organization while offering your team members the most secure and convenient cloud experience available today. We offer a powerful set of tools including single sign-on, multi-factor authentication, directory integration, user management, thousands of pre-integrated applications and much more to drive organization productivity and security. Let your users experience the power of cloud services with AppDirect Cloud Management Suite. AppDirect Cloud Management Suite eliminates the need for passwords by offering secure single sign-on to applications using industry standards SAML 1.1/ 2.0, OpenID, OpenID connect, Oauth 2.0, WS-Federation. By signing in once through AppDirect, users can launch all their web applications from their MyApps page.
MongoDB Logo MongoDB