Compare the Top IT Security Software that integrates with Drupal as of July 2025

This a list of IT Security software that integrates with Drupal. Use the filters on the left to add additional filters for products that have integrations with Drupal. View the products that work with Drupal in the table below.

What is IT Security Software for Drupal?

IT security software is designed to protect information technology (IT) systems, networks, and data from cyber threats, such as malware, hacking, and unauthorized access. These tools provide various features such as antivirus protection, firewalls, encryption, intrusion detection and prevention systems, and vulnerability management to ensure the integrity, confidentiality, and availability of sensitive information. IT security software helps organizations detect, prevent, and respond to security incidents, mitigate risks, and ensure compliance with industry regulations. It is critical for businesses and individuals to safeguard against cyberattacks, data breaches, and other security vulnerabilities. Compare and read user reviews of the best IT Security software for Drupal currently available using the table below. This list is updated regularly.

  • 1
    Kamatera

    Kamatera

    Kamatera

    With our comprehensive suite of scalable cloud services, you can build your cloud server, your way. Kamatera’s infrastructure specializes in VPS hosting, with a choice of 24 data centers worldwide, including 8 data centers across the US as well as locations in Europe, Asia, and the Middle East. Our enterprise-grade cloud servers can meet your needs at every stage. We use cutting-edge hardware, such as Ice Lake Processors and NVMe SSD, to deliver consistent speed and 99.95% uptime. With a robust service like ours, you can expect plenty of great features, such as fantastic hardware, flexible and scalable cloud setup, fully managed hosting, windows server hosting, data security and safety, consultation, server migration, and disaster recovery. Our technical staff is always on duty, with 24/7 live support to assist you across all time zones. And our flexible, predictable pricing plans means you’ll only pay for what you use with our hourly or monthly billing options.
    Starting Price: $4 per month
    View Software
    Visit Website
  • 2
    ProHoster

    ProHoster

    ProHoster

    ProHoster.Info - Hosting is a service to provide resources for publishing information on a server, which is always on the Internet. The websites are hosted and stored on our servers which provide with the necessary technology in order to view the website on the internet. By purchasing the website hosting from us, you are also provided with a free domain name, DDoS protection, and an SSL certificate. Fast and reliable unlimited hosting with DDOS protection and free chips, such as the website builder, SSL certificate, and domain. For projects, where regular hosting is not enough, and you need a larger amount of resources and functionality. Virtualization such as KVM and OVZ is available. An excellent solution for non-standard projects with increased requirements for power and full root access. Professional DDoS protection against any type of attack. Immediate response and display of the threats. Huge channel handling capacity.
    Leader badge
    Starting Price: $2.50 per month
  • 3
    New Relic

    New Relic

    New Relic

    There are an estimated 25 million engineers in the world across dozens of distinct functions. As every company becomes a software company, engineers are using New Relic to gather real-time insights and trending data about the performance of their software so they can be more resilient and deliver exceptional customer experiences. Only New Relic provides an all-in-one platform that is built and sold as a unified experience. With New Relic, customers get access to a secure telemetry cloud for all metrics, events, logs, and traces; powerful full-stack analysis tools; and simple, transparent usage-based pricing with only 2 key metrics. New Relic has also curated one of the industry’s largest ecosystems of open source integrations, making it easy for every engineer to get started with observability and use New Relic alongside their other favorite applications.
    Leader badge
    Starting Price: Free
  • 4
    Astra Security

    Astra Security

    Astra Security

    Astra Security is the go-to security suite for web & mobile apps, network, cloud infrastructures, API and more. With Astra Website Protection, you don't have to worry about any malware, credit card hack, SQLi, XSS, SEO spam, comments spam, brute force & 100+ types of internet threats. Astra Website Protection offers Website/Web Application Firewall and Malware Scanner. This means you can get rid of multiple security solutions & let Astra take care of it all.
    Starting Price: $25/month
  • 5
    Routee

    Routee

    AMD Telecom

    Routee is an intelligent omnichannel communication platform (CPaaS) offering advanced Web and API automation for all industries worldwide. Powered by AMD Telecom’s robust infrastructure, Routee's services enable businesses to optimize their marketing & business processes. -SMS Marketing: tailor-made messages based on customers' individual preferences -Email Marketing: personalized newsletters & email campaigns based on an audience's behavioral data -Transactional Email: automated emails to customers on important data regarding their transactions -Marketing Automation: rich forms & customer data capture, automation of repetitive marketing tasks, and tracking of marketing campaigns -Two Factor Authentication: a second layer of security with fallback through SMS, Voice, Viber & Missed Call -Cloud IVR: multilingual capabilities, turning speech into text, & text to human-sounding speech -Push Notification: personalized web & mobile push notifications, based on segmentation and user
    Starting Price: $0.01 one-time fee
  • 6
    miniOrange

    miniOrange

    miniOrange

    miniOrange is a premier Identity and Access Management platform offering Workforce and Customer Identity solutions to diverse industries from IT to eCommerce to manufacturing and many more. With miniOrange, you can configure Single Sign-On (SSO), Multi-Factor Authentication (MFA), set up custom rules or policies, and customize the login page for any cloud, on-premise, or in-house apps. Get pre-built integrations for 5000+ applications including legacy apps, cloud apps, and many more. Customers praise miniOrange’s outstanding support and their ability to provide customized solutions for unique use cases.
    Starting Price: $1 per user per month
  • 7
    Linode

    Linode

    Linode

    Simplify your cloud infrastructure with our Linux virtual machines and robust set of tools to develop, deploy, and scale your modern applications faster and easier. Linode believes that in order to accelerate innovation in the cloud, virtual computing must be more accessible, affordable, and simple. Our infrastructure-as-a-service platform is deployed across 11 global markets from our data centers around the world and is supported by our Next Generation Network, advanced APIs, comprehensive services, and vast library of educational resources. Linode products, services, and people enable developers and businesses to build, deploy, and scale applications more easily and cost-effectively in the cloud.
    Starting Price: $5 per month
  • 8
    OneTrust Privacy Automation
    Go beyond compliance and build trust through transparency, choice, and control. People demand greater control of their data, unlocking an opportunity for organizations to use these moments to build trust and deliver more valuable experiences. We provide privacy and data governance automation to help organizations better understand their data across the business, meet regulatory requirements, and operationalize risk mitigation to provide transparency and choice to individuals. Achieve data privacy compliance faster and build trust in your organization. Our platform helps break down silos across processes, workflows, and teams to operationalize regulatory compliance and enable trusted data use. Build proactive privacy programs rooted in global best practices, not reactive to individual regulations. Gain visibility into unknown risks to drive mitigation and risk-based decision making. Respect individual choice and embed privacy and security by default into the data lifecycle.
  • 9
    PureAUTH

    PureAUTH

    PureID

    Eliminate passwords and associated risks from your enterprise with PureAUTH. PureAUTH offers unmatched benefits over any other enterprise multi-factor authentication solution out there. Simple to deploy, easy to integrate & smooth to use. Secure and breach resilient technology. Reduce cost & overheads of compliance/governance. With a new breach every day, enterprises are becoming more aware of risk and inconvenience of passwords. Many enterprises are considering going passwordless. PureAUTH gives uniform & frictionless authentication experience across all the enterprise resources. Corporate networks, AWS, Azure, Google Cloud platform. Enterprise applications with or without SSO, on premise or cloud. Web Applications, Executive dashboards, IoT and industrial systems console. Every enterprise is different so are their authentication needs. PureAUTH provides seamless integrations with enterprise resources across multiple clouds, on premise and also in a hybrid environment.
  • 10
    MTCaptcha

    MTCaptcha

    MTCaptcha

    MTCaptcha is a smart captcha service that prioritizes privacy and accessibility. It offers an adaptive invisible noCaptcha that is easy for humans but hard for bots, making verification frictionless. MTCaptcha is GDPR and WCAG compliant, ensuring that your data is never sold or shared with third parties. The captcha images are certified colorblind safe and the widget is fully VPAT compliant and optimized for screen readers. MTCaptcha supports any language and can be fully customized to match any webpage. It also supports audio in captcha, making it accessible to users who are visually impaired. MTCaptcha is trusted by Enterprises, Government, NGOs worldwide and is available in all the major world languages. MTCaptcha works around the world, including in China, making it a truly global captcha solution. It is backed by an adaptive Risk Engine that monitors and responds to threats, making it difficult for bots but easy for humans.
    Starting Price: Free plan $0, Paid $85 - $150
  • 11
    ALTCHA

    ALTCHA

    BAU Software s.r.o.

    ALTCHA is a modern security and privacy-focused platform built to defend web services from bots and abuse — without compromising the user experience. At the heart of its ecosystem is ALTCHA Sentinel, a next-generation threat detection and mitigation system designed to protect websites, APIs, and applications from automated attacks, spam, and other forms of abuse. ALTCHA Sentinel stands out by combining adaptive machine learning, behavioral analysis, and smart verification techniques. It doesn’t rely on intrusive CAPTCHAs or outdated blocking tactics; instead, it works invisibly behind the scenes, analyzing traffic patterns in real time to identify and stop threats before they cause harm. Sentinel protects critical entry points like sign-up forms, login pages, and comment sections — all while keeping the experience seamless for real users.
    Starting Price: 0
  • 12
    Hacker Target

    Hacker Target

    Hacker Target

    Simplify the security assessment process with hosted vulnerability scanners. From attack surface discovery to vulnerability identification, actionable network intelligence for IT & security operations. Proactively hunt for security weakness. Pivot from attack surface discovery to vulnerability identification. Find security holes with trusted open source tools. Get access to tools used by penetration testers and security professionals around the world. Hunt vulnerabilities from the attackers perspective. Simulating real world security events, testing vulnerabilities and incident response. Discover the attack surface with tools and open source intelligence. Protect your network with improved visibility. Over 1 million scans performed last year. Our vulnerability scanners have been launching packets since 2007. Fixing security issues requires you find them. Identify the issue, re-mediate the risk and test again to be sure.
    Starting Price: $10 per month
  • 13
    Patchstack

    Patchstack

    Patchstack

    Patchstack is a comprehensive security solution designed to protect WordPress websites from vulnerabilities in plugins, themes, and the core platform. By automatically deploying highly targeted virtual patches, it mitigates high and medium-priority vulnerabilities without altering your site's code or performance. As the world's largest vulnerability discloser, Patchstack has issued over 9,100 virtual patches, safeguarding users up to 48 hours before competitors. Its real-time detection prioritizes vulnerabilities based on exploitation likelihood, reducing alert fatigue. Supported by a vast community of ethical hackers, Patchstack serves as the official security contact for more than 560 plugins, including popular ones like Visual Composer, Elementor, and WP Rocket. It offers next-generation security for enterprise needs, ensuring compliance with standards such as SOC2 and PCI-DSS 4.0. Patchstack's user-friendly interface provides actionable security suggestions.
    Starting Price: $89 per month
  • 14
    Varnish

    Varnish

    Varnish Software

    Varnish Software’s powerful caching technology helps the world’s biggest content providers deliver lightning-fast web and streaming experiences for huge audiences, without downtime or loss of performance. Our solution combines open-source flexibility with enterprise robustness to speed up media streaming services, accelerate websites and APIs, and enable global businesses to build custom CDNs, unlocking unbeatable content delivery performance and resilience. Our customers include Hulu, Emirates and Tesla, and our technology is powered by a caching layer that’s trusted by more than 10 million websites worldwide.
  • 15
    Qualys WAF
    Qualys Web Application Firewall (WAF) is a virtual appliance-based service that reduces the operational cost and complexity of application security. Leveraging a unified platform, it continuously detects attacks using inhouse inspection logics and rulesets, and virtually patches web application vulnerabilities if needed. Its simple, scalable and adaptive approach lets you quickly block web application attacks, prevent disclosure of sensitive information, and control when and where your applications are accessed. Qualys WAF can be used alone, or paired with Qualys Web Application Scanning (WAS). Together, they make identifying and mitigating web application risks seamless – whether you have a dozen apps or thousands. You scan your web applications using Qualys WAS, deploy one-click virtual patches for detected vulnerabilities in WAF and manage it all from a centralized cloud-based portal. Qualys WAF can be deployed in minutes, supports SSL/TLS.
  • 16
    AppCheck

    AppCheck

    AppCheck

    Technology agnostic, sophisticated scanning engine developed and maintained by leading security experts, easy to use and highly configurable. Proof of concept evidence is provided through safe exploitation, unparalleled support for modern HTML5 applications. Supports all forms of authentication via a scriptable browser interface. Granular scheduling and continuous scanning, integration with popular bug tracking platforms such as JIRA, and custom integration via JSON API. The dashboard provides a customizable view of your security posture at any given moment in time. The status of discovered vulnerabilities, emerging threats and remediation progress are all displayed using easy to understand dashboard widgets. Whether you just want to run a quick scan or are a power user who needs ultimate control, AppCheck allows complete flexibility. Scans can be run in a few clicks using profiles built by our security experts or built from scratch using the profile editor.
  • 17
    Alliance Key Manager

    Alliance Key Manager

    Townsend Security

    Once data is encrypted, your private information depends on enterprise-level key management to keep that data safe. The solution provides high availability, standards-based enterprise encryption key management to a wide range of applications and databases. Alliance Key Manager is a FIPS 140-2 compliant enterprise key manager that helps organizations meet compliance requirements and protect private information. The symmetric encryption key management solution creates, manages, and distributes 128-bit, 192-bit, and 256-bit AES keys for any application or database running on any Enterprise operating system. Encryption keys can be restricted based on several criteria. The most permissive level requires a secure and authenticated TLS session to the key server. Individual encryption keys can be restricted to users, groups, or specific users in groups. Enterprise-wide groups can be defined and keys can be restricted to Enterprise users, groups, or specific users in groups.
    Starting Price: $4,800 one-time payment
  • 18
    NXLog

    NXLog

    NXLog

    Achieve complete security observability with powerful insights from your log data. Improve your infrastructure visibility and enhance threat prevention with a versatile multi-platform tool. With support for over 100 operating system versions and more than 120 configurable modules, gain comprehensive insights and increased security. Cut the cost of your SIEM solution by reducing noisy and unnecessary log data. Filter events, truncate unused fields, and remove duplicates to increase the quality of your logs. Collect and aggregate logs from systems across the entire breadth of your organization with a single tool. Reduce complexity in managing security-related events and decrease detection and response times. Empower your organization to meet compliance requirements by centralizing some logs in an SIEM and archiving others in your long-term storage. NXLog Platform is an on-premises solution for centralized log management, with versatile processing.
  • 19
    PaymentCloud

    PaymentCloud

    PaymentCloud

    Here at PaymentCloud Merchant Services, we provide credit card processing for businesses of all types. From Fortune 100 companies to small, local storefronts, ecommerce or retail, and all levels of risk, we can support each and every business. We have a robust toolset of integrations with nearly any platform, shopping cart, and CRM, unified fraud detection software, and chargeback mitigation tools that allow you to reduce your risk and amplify your reward. Talk with one of our dedicated account managers to get personalized care and a real person every single time. PaymentCloud lays the foundation businesses need to thrive. With 50+ years of combined experience within the payments industry, we look forward to paving the way to your business’ success. Free cost comparison. Seamless setup. Chargeback and fraud prevention. Hundreds of integrations. Low risk and hard to place industries accepted.
  • 20
    ReachFive

    ReachFive

    ReachFive

    Improve customer experience through advanced identity management. The Customer Identity and Access Management (CIAM) industry is undergoing fundamental changes as identity management shifts from big data to structured customer identity data. Relationships and interactions between customers and brands is undergoing deep transformation as online and offline boundaries disappear. Organizations need to deliver seamless, personalized customer engagement across multiple channels, and accomplishing this depends on capturing, managing, securing and using customer identity data. ReachFive’s Customer Identity and Access Management (CIAM) solutions help you create a unique user experience, across an integrated, unified platform. Our solutions help you acquire and recognize customers, collect accurate first-party data, build unified customer profiles and facilitate personalized marketing through integrations, driving revenue and loyalty.
  • 21
    ImageWare Authenticate

    ImageWare Authenticate

    ImageWare Systems

    Increase the fidelity of user access management with biometrics. Simple to use and easy to deploy, Authenticate provides true user assurance across your enterprise applications and end customer base. Add your existing environments and its self-enrollment feature to quickly get users up and running. For simple passwordless login, the users can choose the most convenient option from the enabled modalities. When a more secure authentication is needed, you can enforce use of two or more modalities to reach a higher level of security. Facial Authentication: using a mobile phone or laptop webcam, users look at the camera similar to taking a selfie. Highest level of authentication, particularly when combined with the NIST compliant Biointellic Anti-Spoofing technology. Voice Recognition: users speak a randomized phrase, typically using a mobile phone.
  • 22
    Solve Media CAPTCHA TYPE-IN
    Solve Media's CAPTCHA TYPE-IN™ ads are an easy plug-in solution that saves your users time while making your site more secure and more profitable. Instead of struggling with difficult puzzles, users quickly enter a simple brand message or security phrase. Help your users reach their destination quickly and easily, saving them an average of 7 seconds every time. Earn incremental revenue from previously un-monetized placements on a revenue share model. Behind our TYPE-IN™ ads is a sophisticated technology that protects your site from bots, spammers, and attackers. Our security advisory council is comprised of industry-leading experts who drive the technology that makes safe online advertising possible. CAPTCHA is a test to determine if an end user is a human or an automated bot. Did you know that bots account for 25% of web traffic? As a Solve Media partner, some of the industry's best security minds have you protected.
  • 23
    KeyCAPTCHA

    KeyCAPTCHA

    KeyCAPTCHA

    More than 50.000 sites worldwide use our protection. Improve your captcha in 5 minutes. We have captcha plugins for 19 popular content management systems such as Concrete5, phpBB, Simple Machines Forum, MediaWiki, PunBB, MyBB, Movable Type, DataLife Engine, Phorum, Woltlab BB, OpenCart, Pligg, and XOOPS.
  • 24
    IPQS Device Fingerprinting
    Access over 25 data points for device fingerprinting details to analyze risk and device info. Device Fingerprinting by IPQS offers an unparalleled fraud detection solution capable of detecting even the most advanced fraudsters, bad actors, and cyber criminals. Scan over 300 data points (like operating system, screen resolution, fonts) to accurately identify fake devices, location spoofing, and high-risk behavior in a user's online fingerprint. Identify bots, automated behavior, device spoofing, & other high-confidence signals that the user is likely to engage in fraudulent behavior. Deploy JavaScript device fingerprinting for web devices or use our SDKs for mobile devices on iOS or Android. Robust risk scoring will accurately identify fake accounts, chargebacks, credential stuffing, bot behavior, and similar abuse. IPQS Device Fingerprinting can reveal advanced fraud techniques including the latest emulator software.
  • 25
    CyberSiARA

    CyberSiARA

    CyberSiARA

    When it comes to fraud, prevention is more cost-effective than cure. By deploying intuitive traffic testing, the CyberSiARA system provides a proactive approach to cyber-security that stops fraud in its tracks. The traffic classification capability differentiates between genuine users and potential attackers in real-time using interactive enforcement challenges – quickly halting both automated and human-driven attacks before a breach can be made. CyberSiARA uses powerful traffic analysis processes to determine user intent. By identifying fraud signifiers in traffic behavior, the system deploys interactive challenges to test activity classified as suspicious. This allows genuine users to enjoy a seamless access experience, while attacks from a broad range of origins are defeated. Traffic designed to overcome authentication challenges is stopped with innovative challenge strategies.
  • Previous
  • You're on page 1
  • Next