Best IT Security Software - Page 99

Compare the Top IT Security Software as of May 2026 - Page 99

  • 1
    Ivanti Avalanche
    We know how important mobile productivity is to your business – you have no time for downtime. Using Avalanche for MDM, your mobile devices are ready for today’s and tomorrow’s business demands.This is the Wavelink product you know and love. Whether scanners in the warehouse, or tablets on the retail floor, Avalanche (powered by Wavelink) helps maintain control of your most critical mobile deployments – keeping them secure, available, and accessible. Avalanche Enterprise Mobile Device Management manages some of the most demanding, high-profile supply chain mobility solutions in the world. So, we understand the pressure you're under to maximize worker (and device) uptime.
    Starting Price: $50.00/one-time
  • 2
    Specops uReset

    Specops uReset

    Specops Software

    Are password resets and account lockouts exhausting valuable IT resources? Let users address common tasks related to password management including Active Directory self-service password resets, changes, and account lockouts. With Specops uReset, you can revolutionize password resets with a flexible authentication engine, and ensure that users always have a secure way to reset their password, regardless of location, device, or browser.
  • 3
    Safend Protector
    Safend Protector prevents internal/external data leakage by monitoring endpoint devices and data flow. Using granular and customizable security policies and rules, Protector automatically detects, permits and restricts files and encrypts media devices. Very intuitive, Protector has strong reporting and analysis capabilities and already complies with PCI, HIPAA, SOX and EU GDPR. Preventing viruses from entering via removable devices, Protector’s AV SCAN blocks each device as soon as it is inserted, checks for viruses and then permits usage according to rules and policies. AV SCAN interfaces with most anti-virus solutions already used to protect data networks, and permits devices when no viruses are found and fully blocks devices that are contaminated. Selected, restricted or blocked endpoint connectivity without compromising on security.
  • 4
    D3 Smart SOAR

    D3 Smart SOAR

    D3 Security

    D3 Security leads in Security Orchestration, Automation, and Response (SOAR), aiding major global firms in enhancing security operations through automation. As cyber threats grow, security teams struggle with alert overload and disjointed tools. D3's Smart SOAR offers a solution with streamlined automation, codeless playbooks, and unlimited, vendor-maintained integrations, maximizing security efficiency. Smart SOAR's Event Pipeline normalizes, de-dupes, enriches and correlates events to remove false positives, giving your team more time to spend on real threats. When a real threat is identified, Smart SOAR brings together alerts and rich contextual data to create high-fidelity incidents that provide analysts with the complete picture of an attack. Clients have seen up to a 90% decrease in mean time to detect (MTTD) and mean time to respond (MTTR), focusing on proactive measures to prevent attacks.
  • 5
    ObserveIT

    ObserveIT

    Proofpoint

    Every organization is mobile now: whether it’s work-from-home employees, third party contractors, or executives and sales teams always on the move. As we all collaborate more on sensitive assets, the risks of security mistakes and malicious insider behavior are equally heightened. Traditional perimeter-based solutions do not provide the visibility or business continuity that security and IT teams need. Protecting intellectual property, and customer and employee information requires more than preventative measures. With a prevention-heavy approach, you’ve got many blindspots even after spending months of data discovery, classification, and policy creation. Invariably, you cannot respond to data loss in real-time and need days or weeks to correlate DLP, application and forensic logs. Your users are the new security perimeter. For security teams, piecing together context around suspicious user and data activity from disparate logs is time-intensive and often impossible.
  • 6
    Dbvisit Standby

    Dbvisit Standby

    Dbvisit Software Ltd

    Your databases are at the heart of your business. They contain your most critical information and your world revolves around them. Protecting your databases doesn't have to be difficult or expensive. Standby MultiPlatform (MP) provides enterprise-class Disaster Recovery for all your Oracle SE and Microsoft SQL Server databases, whether on-premise, hybrid, or in the cloud. It effortlessly creates a standby database that is continually updated and verified, ensuring fast and successful failover at any time. StandbyMP is database aware for greater database integrity, easily deployable to remote locations for disaster resiliency, warm and continuously updated for fast recovery, and controlled via a single intuitive dashboard for ease of use. We keep your world moving, whatever the universe has in store!
  • 7
    Netsweeper

    Netsweeper

    Netsweeper

    Netsweeper enables organizations to protect internet users from harmful online content and provides web filtering, digital monitoring, and online activity reporting solutions to ensure digital safety on-premise and in remote environments. The leading web filtering platform with the lowest total cost of ownership, Netsweeper delivers advanced intelligence and management solutions for service provider networks, governments, and enterprises. Capable of being onboarded in cloud and on-premise deployments, Netsweeper works across multiple devices and systems to ensure a high level of protection from any location. The most advanced content filtering platform to manage internet access and activity to protect users from illicit content and web threats. Netsweeper’s dynamic categorization engine scans and sorts the content of billions of websites and adds this information to a database of categorized sites maintained on the Netsweeper Category Name Server (CNS).
    Starting Price: $1 per month
  • 8
    FraudGuard

    FraudGuard

    First American Data & Analytics

    FraudGuard® is the most intelligent decision tool on the market today, leveraging advanced analytics, reporting, defect trending and audit trails that are essential to a compliant loan origination process. No other automated solution can match the depth of data sources or capabilities FraudGuard marshals into a single solution quality assurance platform. Lenders can trust FraudGuard to provide top tier analytics backed by veteran product support and development teams. Leveraging public, private and proprietary data sources, the FraudGuard platform helps lenders identify potential fraud risk and errors in mortgage applications, comply with regulations, improve the application review process through greater speed and efficiency, and increase loan quality. Enhanced reporting of findings and recommendations provides the actionable insight needed to support loan decisions.
  • 9
    Declude Security Suite
    Declude is a comprehensive email defense solution that incorporates anti-virus, anti-spam, hijack prevention, threat management, and Security Flaw Scanningâ„¢ (SFS) the Declude product is free and can be used as a unified email solution for protecting both inbound and outbound messages. The Declude system's roots can be traced back to 1997 when founder Scott Perry, a pioneer in email threat management developed Declude technology to work inside the mail server with IMail and SmarterMail platforms exclusively. Declude technology is used by more than 3,000 customers around the world including government agencies, Fortune 100 companies and leading universities. Fully integrated eMail solutions using best-of-breed components. Fully customized integration, support, and management resources. Solutions that reduce costs, improve performance, and provide a sustainable competitive advantage.
    Starting Price: $395 per month
  • 10
    TF2000

    TF2000

    ComputerProx

    The ComputerProx TF2000 automates the locking of the PC when you step away. The TF2000 uses ultrasound to detect your presence. When you leave the proximity of the PC, the TF2000 automatically locks the system without requiring any keystrokes from you! No need for awkward timeout settings that mistakenly lock the PC when you are present. The TF2000 can detect your presence and will not lock the system inadvertently. The TF2000 attaches to the PC via the USB port and is configured by the system as a keyboard. Commands are simply sent to the PC as keystrokes therefore no special drivers are required! The individual keystrokes and specified delays are all configurable using our configuration tool. In addition, to the 'walk-away' command, the TF2000 has a 'walk-to' sequence which allows keystrokes to be sent when you approach the PC. For example, under Windows XP the TF2000 sends the CTRL-ALT-DEL sequence when the user approaches the PC. This readies the PC for user authentication.
    Starting Price: $79 one-time payment
  • 11
    VFind Security ToolKit
    The VFind Security ToolKit (VSTK) is a suite of four powerful network, and computer, anti-malware utilities that provide flexible and uncompromising computer anti-malware protection. The VFind™ Security ToolKit (VSTK) is a suite of four powerful network and computer anti-malware utilities, that provide flexible and uncompromising computer anti-malware protection. CIT: Is a fantastic anti-malware security tool that has multiple uses. It reports on all files that have been removed, added, modified or duplicated. It can tighten baseline configuration control down to a single bit. It can also be used with surgical precision on an entire system or single file. The CIT tool produces a database of cryptographic hash values for every file it is directed to manage. Besides its use in anti-virus protection, the UAD tool is built for making identification based upon direct inspection of the data. It makes no assumptions about the file’s contents based upon the file’s name.
    Starting Price: $1035 one-time payment
  • 12
    Paragon Protect & Restore

    Paragon Protect & Restore

    Paragon Software Group

    A common availability solution for protecting ESX/ESXi, Hyper-V and physical Windows systems drastically reduces IT administration work and lowering the associated expenses. Manage all backup tasks from a central console with conventional monitoring solutions and extended testing, reporting and analysis functions. The solution adapts to company’s RTO and RPO. Near CDP, instant replication (failover), automatic data validation, test failover and much more ensure continuity and constant availability. Multi-tier storage support, archiving functions and expanded data duplication options – just to name a few features making Paragon Protect & Restore really cost-efficient. The solution adapts to IT requirements and can be expanded for using with VMware and Hyper-V hypervisors. Storage reconfiguration and infrastructure expansion are made in minutes.
    Starting Price: $89.00/one-time/user
  • 13
    SoftControl

    SoftControl

    SafenSoft

    The examples of using products of SoftControl for Information security of the commercial organizations. Solutions for Information security business. Proactive protection against breaking by hackers, malicious codes, insider threats. Control and monitoring the staff. Solutions for complexes APCS and specialized software. Centralized management of security. The policy of information security of banks: SoftControl’s solutions for protection of the bank’s infrastructure. Solutions for protection of software of ATMs, front-office and back-offices. Protection of banking e-documents. Protection of business correspondence and confidential data transmitted to recipients by e-mail as attachments. Compliance with the requirements of PCI DSS and the Central Bank of Russia.
    Starting Price: $25.00/one-time/user
  • 14
    AccuHash

    AccuHash

    AccuHash

    AccuHash 2.0 is Windows 95/98/Me/NT/2000/XP/2003 utility for protecting the integrity and verifying the accuracy of data files using checksum calculation algorithms (CRC32, MD5 and SHA-1). It will allow to easily and quickly verify integrity of files downloaded from Internet, transferred over a network and/or burned onto CD/DVD. AccuHash 2.0 use the checksum file format based on XML and Unicode-enabled - this allows to easily exchange checksum files between different systems in different countries, add new algorithms and expand the program features. But we don't forget also very popular SFV, MD5SUM and BSD-style checksum file formats - the utility can import/export from/to those formats. AccuHash 2.0 has the integrated Checksum Calculator, which allows calculating the checksum value (for all supported algorithms - CRC32, MD5 and SHA-1) for specified file directly, without creating the checksum file.
    Starting Price: $19.95 one-time payment
  • 15
    Infiltrator

    Infiltrator

    Infiltration Systems

    Infiltrator is a free easy to use, intuitive network security scanner that can quickly audit your network computers for vulnerabilities, exploits, and information enumerations. Infiltrator can reveal and catalog a plethora of information on scanned computers - such as installed software, shares, users, drives, hotfixes, NetBios and SNMP information, open ports and much more! Infiltrator can audit each computer's password and security policies, alerting you when changes should be made to increase security. All results can be generated into sleek, easy to read report by the report generator. Infiltrator also comes with over 15 powerful network utilities for footprinting, scanning, enumerating and gaining access to machines. Included utilities are ping sweep, whois lookups, email tracing, brute force cracking tools, share scanning, network enumerating, and many more!
  • 16
    Stronghold Antivirus

    Stronghold Antivirus

    Security Stronghold

    Stronghold Antivirus is an antivirus and antispyware software that provides both superior real-time pro-active (on-access) and on-demand protection for your home and office computer. Stronghold Antivirus identifies and eliminates more than 3.500.000 known viruses, spyware, adware, trojans, rootkits and other threats with help of regularly updated database of malicious footprints. It also identifies and removes even unknown threats with help of active on-access shield protection Thanks to easy, handy and eye-pleasing interface Stronghold Antivirus is great for novice users, and professionals will be amused by the power of its additional features. Being powerful it is still very lightweight and will not consume any noticeable system resources of your computer. You can set up any scan area you want, customize both on-demand and on-access protection modules, schedule scanning with separate settings, add programs to white and black lists and manage them, and more.
  • 17
    Panda Fusion

    Panda Fusion

    WatchGuard Technologies

    Fusion combines our Systems Management and Endpoint Protection Plus solutions to protect, manage and support all of your corporate devices. Our Cloud-delivered solution allows a rapid deployment without needing maintenance or costly investments in server infrastructure. Complete your endpoint security solution with a wide range of IT & endpoint security operations products and modules that will allow you to minimize the attack surface and reduce risk of incidents. Identify and block malicious behaviors or noncompliant activity, manage your vulnerabilities, deploy patches and updates, encrypt your data, and manage your corporate systems and endpoints. Everything you need is included in a single platform from WatchGuard.
  • 18
    Kerio Control

    Kerio Control

    GFI Software

    Detect threats, block viruses and secure VPN with the firewall built for SMB. Configure your firewall with easy-to-use traffic rules, controlling in- and outbound communications by URL, application, traffic type and more. Intrusion detection and prevention using the Snort system constantly monitors inbound and outbound network communications for suspicious activity. Log or block the communications depending on the severity. Prevent viruses, worms, Trojans and spyware from entering your network. Kerio Control goes beyond just checking files for malicious code; it scans your network traffic for potential attacks. Create secure, high-performance server-to-server connections between your offices running Kerio Control with an easy-to-setup VPN technology. Or, you can create a secure VPN connection to a remote office that doesn’t have Kerio Control deployed, using industry-standard VPN protocols.
    Starting Price: $270 per year
  • 19
    Tectia

    Tectia

    SSH Communications Security

    We are a cybersecurity company dedicated to safeguarding mission-critical data in transit, in use, and at rest for leading organizations around the world. Assess your SSH key estate and related SSH key risks with our self-service tool SSHerlock. SSHerlock is an SSH key and post-quantum resilience discovery and audit self-service tool and can be used free of charge. Passwordless authentication, operational technology (OT) security, defensive cybersecurity, and more. What are the top trends that will shape cybersecurity in the upcoming year? PrivX is perfect for securing, managing and tracking superuser and power user access in the hybrid cloud - by also eliminating risky privileged passwords from critical infrastructures. UKM Zero Trust manages and automates the lifecycle of millions of encryption keys for risk mitigation and audit success - also by making access keyless. Software-based NQX features matchless performance and security.
  • 20
    Acronis DeviceLock DLP
    Acronis DeviceLock DLP provides comprehensive endpoint DLP (endpoint data loss prevention) – discovering and protecting sensitive data while monitoring the operations involving that information. Prevent data leakage due to employee negligence or malicious insiders by blocking any unauthorized attempt to access or transfer data, discovering and protecting sensitive data-at-rest. Reduce the complexity of data protection and cut reporting times with a single DLP solution for thorough visibility over data flows and user behavior. Reduce information security risks and comply with IT security standards and regulations by enforcing data use and handling policies that users can’t avoid following. Save the time and hassle associated with managing a DLP solution. Acronis DeviceLock DLP is easily deployable through Active Directory (AD) and offers various central management consoles, based on your organization’s requirements.
    Starting Price: $615 one-time payment
  • 21
    Ivanti Endpoint Manager
    From Windows to macOS, from iOS to Android and beyond to IoT—one place to manage all devices—plus user profiles. Do more than keep your business up and running. Consolidate your endpoint and workspace management, satisfy growing user expectations, and simplify your management processes through a single, unified endpoint management suite. Ivanti Endpoint Manager is proven, reliable endpoint and user-profile management software that is core to: 1) discovering everything that touches your network; 2) automating software delivery; 3) reducing headaches with login performance; and 4) integrating actions with multiple IT solutions. Experience UEM today. Discover, inventory, and configure all devices—PCs, laptops, servers, tablets, and smartphones. Also remote control Windows and Mac devices.
  • 22
    eScan

    eScan

    MicroWorld Technologies

    eScan's next-gen antivirus solution that protects the home network from viruses, malware, ransomware, bots, and more, using a layered approach. With the unique combination of basic and modern techniques, eScan blocks a broad range of attacks. It comprises right from web filtering, signature-based malware detection and behavior analysis to innovative techniques like deep learning malware detection, exploit prevention, heuristic scan, and many more. eScan offers business endpoint protection and endpoint detection and response (EDR) solutions as well as anti-spam solutions for email and multi-factor authentication.
    Starting Price: $58.95/one-time/user
  • 23
    ESET Endpoint Encryption
    A simple to use standalone encryption solution providing full remote control of endpoint encryption keys and security policy for files on hard drives, portable devices and emails. Patented technology to protect data for businesses of all sizes. ESET Endpoint Encryption is FIPS 140-2 validated with 256 bit AES encryption. ESET Endpoint Encryption requires no server for deployment and can seamlessly support remote users. Manage encryption on Windows machines and native macOS encryption (FileVault) from a single dashboard. ESET Endpoint Encryption gives companies enhanced ability to protect specific files, folders, virtual disks or archives. By encrypting emails and attachments, and restricting access to removable media for specific users, you can protect data in transit and prevent their leakage outside the company. Full control of licensing and software features, security policy and encryption keys from a dedicated ESET Endpoint Encryption console.
  • 24
    Abacre Advanced Log Analyzer
    Advanced Log Analyzer is powerful web activity analysis software. It generates a large number of traditional reports like Most Common Pages and Referrers. The main advantage of this analyzer is in its "untraditional" reports like Most Common Visitor Paths and Profiles, Web Model report and Indirect and Direct Referrer Analysis reports.
    Starting Price: $49.99 one-time payment
  • 25
    Secure CommNet

    Secure CommNet

    Radient Software

    Your licenses are still valid. You'll still have excellent email technical support. And you'll still be able to purchase new or additional licenses for CommNet and Secure CommNet. Your trust is vital. Thank you for sticking with Radient Software through the years! Welcome! CommNet and Secure CommNet (with SSH2 support) are communications software for Windows that integrate modem dial-up and Internet Telnet into fast, full-featured and easy-to-use applications. It has the communication features you really need and it's been tested for over 20 years. There's no risk to trying it -- you can download a free 30-day trial at any time. Telnet and modem dial-up. Telnet Host Mode Server to allow other Telnet clients to connect to your system. Zmodem and FTP during Telnet connections.
    Starting Price: $29 one-time payment
  • 26
    WiKID Authentication System
    Easily meet PCI-DSS 3.2 with our latest release. Use WiKID two-factor authentication for service and privileged accounts instead of sharing passwords and storing them in spreadsheets or vaults. Prevent pass-the-hash attacks and stop attackers from escalating to admin rights! See how to set it up. Our Enterprise version is free for up to 5 users. Perfect for small organizations or large enterprises that need extended testing. This is the complete Enterprise version, not crippleware. Thanks to broad protocol support - RADIUS, LDAP, TACACS+, SAML and native Active Directory WIKID works with all your remote access and privileged access management tools, including Cisco, Checkpoint, Fortinet, pfSense, and all enterprise-class VPN solutions whether IPSec, PPTP or SSL. We've helped hundreds of organizations implement two-factor authentication using standard protocols. Download our eGuide on how to integrate Active Directory for authorization.
    Starting Price: $2.00/month/user
  • 27
    SDS E-Business Server

    SDS E-Business Server

    Software Diversified Services

    SDS is now distributing, supporting, and actively developing new features for the proven E-Business Server, the authentic OpenPGP encryption tool originally developed by cryptography pioneer Phil Zimmerman. Using OpenPGP encryption technology and versatile APIs, SDS E-Business Server offers strong encryption that integrates with the widest range of applications and platforms, including the mainframe. E-Business Server is designed for companies that require the highest levels of protection for data stored internally, transmitted within the organization, and distributed beyond its firewalls. Today’s data security mandates are complex but critical. Gain compliance with GDPR and other required standards with unbreakable signature creation and reliable authentication. E-Business Server dramatically reduces file sizes, bandwidth consumption, processing time, and disk space to keep resources under control.
  • 28
    Adabas & Natural

    Adabas & Natural

    Software AG

    In an age of ever-faster change, you need a forward-thinking partner with a vision. someone who can help you take your powerful Adabas & Natural applications to 2050 and beyond. You’ve relied on Adabas & Natural to get the job done—for decades. Look ahead to a future where you can continue to make the most of that investment and the unique business logic built into your core applications. We’re that partner, committed to helping you digitalize your legacy, fast and risk-free. Together, let’s manage the generational change of developers, modernize your applications to save costs, expand the reach of your core apps, and accelerate development in an ultra-modern environment. Count on leading-edge Adabas & Natural technologies to help you optimize your IT environment and modernize your applications, risk free and fast. Connect to new services with APIs. Run Adabas & Natural in the cloud. Attract new developer talent with DevOps. Save costs by offloading mainframe workload to zIIP.
  • 29
    Trend Micro Smart Protection Suites
    The threat landscape is constantly changing, and traditional security solutions can’t keep up. Turning to multiple point products on a single endpoint results in too many products that don’t work together, increases complexity, slows your users, and leaves gaps in your security. To further complicate matters, you’re moving to the cloud and need flexible security deployment options that will adapt as your needs change. There is no silver bullet that stops all of today’s evolving threats. You need smart security that uses the right technique for each type of threat without slowing you down. Security that is connected by using multiple layers to stop emerging threats, and reduce management overhead. Security that is optimized to work in your environment from a forward-thinking, proven vendor that is always working on the next generation of security. It’s time to think seriously about Trend Micro Smart Protection Suites.
  • 30
    NICE Actimize X-Sight
    NICE Actimize X-Sight is an enterprise-level financial crime risk management platform built for scale, flexibility, and cloud readiness. It enables organizations to manage and analyze limitless data from any source to better detect and prevent financial crime. X-Sight replaces siloed, reactive systems with a proactive, AI-driven approach to risk management. The platform delivers intelligent automation, advanced analytics, and centralized entity risk profiles. With a single entity profile and trust score, teams gain a unified view of risk across the organization. X-Sight is designed to meet regulatory compliance and reporting requirements while controlling operational costs. Its cloud-powered architecture supports continuous innovation and enterprise-grade performance.
MongoDB Logo MongoDB