Best IT Security Software in the UK - Page 2

Compare the Top IT Security Software in the UK as of March 2026 - Page 2

  • 1
    D&B Finance Analytics

    D&B Finance Analytics

    Dun & Bradstreet

    AI-driven credit-to-cash solutions powered by Dun & Bradstreet’s industry-leading global data and analytics. D&B Finance Analytics provides AI-driven solutions powered by the Dun & Bradstreet Data Cloud. Intelligent, flexible, and easy to use, D&B Finance Analytics helps finance teams manage risk, increase operational efficiency, reduce cost, and improve the customer experience. Manage credit and receivables risk to help minimize bad debt, reduce DSO, and improve cash flow. Help automate manual decisioning, monitoring, matching, and customer communications. Provide your customers with an online credit application and a payment portal. D&B Finance Analytics comprises two platforms, D&B Credit Intelligence, and D&B® Receivables Intelligence, that together provide powerful insights and technology to help you accelerate success throughout your credit-to-cash processes. You can gain visibility into credit risk quickly onboard customers and set the right terms.
  • 2
    Unimus

    Unimus

    NetCore j.s.a. (Unimus)

    Unimus is a powerful, on-premise Network Automation and Configuration Management (NCM) solution designed for fast deployment and ease of use. As one of the most versatile NCM solutions available, it simplifies network management with features such as: 🔹Disaster Recovery – Automated configuration backups ensure business continuity 🔹Change Management – Detect, review, and audit configuration changes with real-time notifications 🔹Configuration Auditing - Search and validate configurations and runtime state across your entire network 🔹Network Automation – Push large-scale configuration changes or perform firmware upgrades in minutes 🔹Compliance Reporting – Ensure adherence to internal policies and industry standards across your network devices 🔹Integrated Device CLI – Access device terminals directly within Unimus Supporting 450+ device types across 160+ vendors, Unimus is a vendor-agnostic NCM that boosts security and speeds network operations with no programming needed.
    Leader badge
    Starting Price: $6.90 per device per year
  • 3
    Proton Pass

    Proton Pass

    Proton AG

    Proton Pass is an open-source password manager based in Switzerland that encrypts your usernames, passwords, bank cards, and encrypted notes and lets users quickly autofill details across all devices and browsers. Proton Pass goes beyond keeping your password safe, it secures your online identity with its additional features and enables secure sharing of log-in information. Proton Pass is built by the same team of scientists who met at CERN and created Proton Mail, the world’s largest encrypted email service. Proton has been recommended by the United Nations for sharing highly sensitive data, and our encryption is open source and battle tested. Proton Pass is the first password manager built by a security company with a privacy-first philosophy. Join the millions of people who have signed up for Proton to protect their information.
    Starting Price: $1.99/user/month
  • 4
    Proton Drive

    Proton Drive

    Proton AG

    Proton Drive is the all-in-one workspace for storing sensitive data and collaborating with your teams, clients, and partners. Collaborate securely without compromising control: Share client files, contracts, and sensitive business documents with full end-to-end encryption. You control who can access what. Set passwords, add expiry dates, 
 or revoke access anytime. Protect all your business data:
Plans come with 1 TB of storage allowance per user, giving your team enough space for all their files and docs. You can always add more storage later if needed. Simplify compliance across industries: Proton Drive supports GDPR, HIPAA, NIS2, DORA, and ISO 27001 compliance out of the box, and has been successfully audited for SOC 2 Type II. There's no need for custom configurations or third-party tools, as this helps you meet regulatory standards with minimal effort.
    Starting Price: $1.00/user/month
  • 5
    Proton Mail

    Proton Mail

    Proton AG

    Proton Mail is the simplest way to protect your communications with built-in end-to-end encryption. Prevent data breaches, stay compliant with regulations like GDPR and HIPAA, and earn client trust. Protected by Swiss privacy laws and trusted by over 50,000 businesses, Proton Mail keeps your business data confidential and under your control. With Proton Mail and Calendar, your team can securely manage their inbox and schedule, while your organization maintains a professional presence with support for custom email domains and personalized branding. And with the Easy Switch tool, migrating from Google or Microsoft is seamless, no IT expertise required.
    Leader badge
    Starting Price: $6.99/user/month
  • 6
    Carbide

    Carbide

    Carbide

    Carbide strengthens your IT security posture with a proactive, integrated platform that helps identify risks, enforce secure practices, and meet industry standards. Through cloud infrastructure monitoring, automated technical checks, and built-in policy enforcement, Carbide helps you scale securely while meeting the expectations of security-conscious partners and customers. Our expert services layer enhances internal capabilities, while Carbide Academy keeps your team up to speed on evolving threats and secure behavior.
    Starting Price: $7,500 annually
    Partner badge
  • 7
    HERE Enterprise Browser

    HERE Enterprise Browser

    Here Enterprise Inc.

    Built through collaboration with global banks, HERE Enterprise Browser provides enterprise security, workforce productivity and seamless integration of enterprise AI. HERE’s Chromium-based, zero-trust security model includes integration with Microsoft Entra and other IDPs, app access controls, data loss prevention controls, executable protection and auditability for compliance. HERE supercharges productivity through app interoperability and Supertabs that combine multiple tabs into persona or task-based dashboards. It provides federated enterprise search to Microsoft 365, Google Workspace, Salesforce and other platforms. HERE also has its own Notification Center and an AI Center that enables integration of enterprise AI models into end user workflows. The company is backed by major banks and IQT, the not-for-profit strategic investor that accelerates the introduction of groundbreaking technologies to enhance the national security of America and its allies.
  • 8
    Reflectiz

    Reflectiz

    Reflectiz

    Reflectiz is a web exposure management platform that helps organizations identify, monitor, and mitigate security, privacy, and compliance risks across their online environments. It provides full visibility and control over first, third, and fourth-party components like scripts, trackers, and open-source libraries that traditional security tools often miss. Operating remotely without embedding code, Reflectiz ensures no impact on site performance, no access to sensitive user data, and no additional attack surface. The platform analyzes your digital supply chain, identifying risks in real-time and allowing for swift mitigation. Reflectiz offers a centralized dashboard for monitoring all public web assets, empowering teams with governance, risk management, and continuous monitoring. It helps businesses reduce attack surfaces, enhance security, and maintain compliance with evolving standards—without requiring code modifications.
    Starting Price: $5000/year
  • 9
    Gearset

    Gearset

    Gearset

    Gearset is the complete, enterprise-ready Salesforce DevOps platform, enabling teams to implement best practices across the entire DevOps lifecycle. With powerful solutions for metadata and CPQ deployments, CI/CD, testing, code scanning, sandbox seeding, backups, archiving, observability, and Org Intelligence — including the Gearset Agent — Gearset gives teams complete visibility, control, and confidence in every release. More than 3,000 enterprises, including McKesson, IBM and Zurich, trust Gearset to deliver securely at scale. Combining advanced governance, built‑in audit trails, SOX/ISO/HIPAA support, parallel pipelines, integrated security scans, and compliance with ISO 27001, SOC 2, GDPR, CCPA/CPRA, and HIPAA, Gearset provides enterprise‑grade controls, rapid onboarding, and a user‑friendly interface — all in one platform. Gearset delivers enterprise‑grade power without the overhead, which is why leading global organizations in finance, healthcare, and technology choose us,
    Starting Price: $200 per user, per month
    Partner badge
  • 10
    Graylog

    Graylog

    Graylog

    Graylog is a centralized log management and IT security platform that helps teams monitor, investigate, and secure complex environments with confidence. It collects and analyzes log data from servers, applications, networks, and cloud infrastructure to surface security issues, misconfigurations, and operational risks in real time. Designed for efficiency, Graylog reduces noise with normalized data, targeted alerts, and guided workflows—so IT and security teams can quickly understand what’s happening and take action. Flexible deployment options support on-prem, cloud, and hybrid environments, while selective ingestion and intelligent data tiering keep storage and licensing costs predictable. With open integrations, built-in dashboards, and powerful search, Graylog gives IT teams clear visibility, faster troubleshooting, and stronger security—without complexity or vendor lock-in.
    Starting Price: $1250/month
  • 11
    Feroot

    Feroot

    Feroot Security

    Feroot Security is a global leader in AI-powered website compliance and security. Feroot AI protects websites and web applications from hidden threats while enforcing compliance with PCI DSS 4.0.1, HIPAA rules on online tracking technologies, CCPA/CPRA, GDPR, CIPA, and 50+ laws and standards. The Feroot AI Platform replaces manual compliance work with continuous automation, delivering real-time protection and audit-ready evidence in minutes. Feroot unifies JavaScript behavior analysis, web compliance scanning, third-party script monitoring, consent enforcement, and data privacy posture management to stop Magecart, formjacking, and unauthorized tracking. Trusted by enterprises, healthcare providers, retailers, SaaS platforms, payment service providers, and public sector organizations. Feroot AI solutions include PaymentGuard AI, HealthData Shield AI, AlphaPrivacy AI, CodeGuard AI, and MobileGuard AI. Visit feroot for more information.
  • 12
    myACI

    myACI

    ACI Learning

    ACI Learning delivers hands-on IT and cybersecurity training built for modern teams. Expert-led videos, interactive labs, and certification prep for today’s top credentials turn knowledge into real-world skill. Whether you’re training a team or advancing your career, myACI makes it easy to learn, track progress, and see results that matter. This is online training with labs—not passive learning. From compliance and cloud to security and systems, ACI Learning helps professionals build confidence and capability. myACI offers role-based learning paths, video+lab combos, practice exams, and progress tracking. Managers get dashboards, credential tracking, and analytics that tie training to outcomes—with enterprise tools like SSO, LMS/LTI integration, SCORM support, and audit-ready reporting.
    Leader badge
    Starting Price: $59/mo./user
    Partner badge
  • 13
    Venn

    Venn

    Venn

    Venn is the leader in BYOD Security. Venn’s Blue Border™ is patented technology that protects company data and applications on BYOD computers used by contractors and remote employees - without VDI. With Venn, work lives in a company-controlled Secure Enclave (installed on the user’s PC or Mac) where all data is encrypted and access is managed. Work applications run locally within the Enclave (no hosting or virtualization) and are protected and isolated from any personal use on the same computer. With Venn, customers are empowered to achieve the cost savings and workforce agility of BYOD, while ensuring robust data protection and compliance with HIPAA, FINRA, PCI, SOC 2, and many more. Join the 700+ organizations, including Fidelity, Guardian, and Voya, that trust Venn to secure their business-critical data and apps.
  • 14
    GoAnywhere MFT
    GoAnywhere MFT provides secure managed file transfer for enterprises. Deployable on-premise, in the cloud, or in hybrid environments, GoAnywhere MFT software enables organizations to exchange data among employees, customers, and trading partners, as well as between systems, securely. GoAnywhere MFT was a recipient of the Cybersecurity Excellence Award for Secure File Transfer.
  • 15
    Atera IT Autopilot
    Atera IT Autopilot is an autonomous AI agent designed to provide 24/7 IT support, helping IT teams manage rising ticket volumes and staff shortages. It automates routine and complex IT tasks, enabling users to self-solve issues and reducing the IT workload by up to 40%. The platform offers instant, always-on support with near-zero response times, ensuring minimal downtime and keeping employees productive. IT Autopilot interacts through multiple channels including a user portal, email, Slack, and Teams, delivering human-like assistance. It also provides smart device and cloud support, proactive IT solutions, and analytics reporting. This tool helps IT teams focus on priority projects by eliminating repetitive support tasks.
  • 16
    ZeroPath

    ZeroPath

    ZeroPath

    ZeroPath (YC S24) is an AI-native application security platform that delivers comprehensive code protection beyond traditional SAST. Founded by security engineers from Tesla and Google, ZeroPath combines large language models with advanced program analysis to find and automatically fix vulnerabilities. ZeroPath provides complete security coverage: 1. AI-powered SAST for business logic flaws & broken authentication 2. SCA with reachability analysis 3. Secrets detection and validation 4. Infrastructure as Code 5. Automated patch generation. any more... ZeroPath delivers 2x more real vulnerabilities with 75% fewer false positives. Our research team has been successful in finding vulns like critical account takeover in better-auth (CVE-2025-61928, 300k+ weekly downloads), identifying 170+ verified bugs in curl, and discovering 0-days in production systems at Netflix, Hulu, and Salesforce. Trusted by 750+ companies and performing 200k+ code scans monthly.
    Starting Price: Free
  • 17
    Diplomat Managed File Transfer
    Diplomat MFT by Coviant Software is a secure, reliable managed file transfer solution designed to simplify and automate SFTP, FTPS, and HTTPS file transfers. Built for seamless integration, Diplomat MFT works across major cloud storage platforms, including AWS S3, Azure Blob, Google Cloud, Oracle Cloud, SharePoint, Dropbox, Box, and more. With over two decades of proven, breach-free performance, Diplomat MFT supports compliance with HIPAA, HITECH, GLBA, PCI/DSS, GDPR, and DORA. It features robust capabilities such as PGP encryption, multi-factor authentication, IP-based access rules, and built-in threat intelligence. If you're still relying on manual scripts or outdated FTP tools and you're concerned about audit failures, security gaps, or compliance risks, Diplomat MFT offers a scalable, secure solution you can trust. Start your free trial today.
    Starting Price: $1,149/year
    Partner badge
  • 18
    Plaid

    Plaid

    Plaid

    Plaid is a global fintech infrastructure platform that enables businesses and consumers to securely connect to financial data and services. Through APIs that connect to more than 12,000 financial institutions across 20+ countries, Plaid operates the world’s largest open banking data network. By removing the complexity of direct bank integrations, Plaid enables developers, financial institutions, and enterprises to build secure, user-friendly, and conversion-optimized financial products. Plaid powers payments, lending, identity verification, fraud prevention, and personal finance applications. Today, more than 100 million people worldwide, including half of U.S. adults, have relied on Plaid through their connections to over 7,000 apps and services.
    Starting Price: Free
  • 19
    Cloudflare

    Cloudflare

    Cloudflare

    Cloudflare is the foundation for your infrastructure, applications, and teams. Cloudflare secures and ensures the reliability of your external-facing resources such as websites, APIs, and applications. It protects your internal resources such as behind-the-firewall applications, teams, and devices. And it is your platform for developing globally scalable applications. Your website, APIs, and applications are your key channels for doing business with your customers and suppliers. As more and more shift online, ensuring these resources are secure, performant and reliable is a business imperative. Cloudflare for Infrastructure is a complete solution to enable this for anything connected to the Internet. Behind-the-firewall applications and devices are foundational to the work of your internal teams. The recent surge in remote work is testing the limits of many organizations’ VPN and other hardware solutions.
    Leader badge
    Starting Price: $20 per website
  • 20
    Safetica

    Safetica

    Safetica

    Safetica’s Intelligent Data Security protects sensitive data where teams work, using powerful AI to deliver contextual awareness, reduce false positives, and stop real threats without disrupting productivity. With Safetica, security teams can maintain visibility and control over sensitive data, stay ahead of insider risks, maintain compliance, and secure sensitive cloud-based data. ✔️ Data Protection: Classify, monitor and control sensitive data across devices and clouds in real time. ✔️ Insider Risk and User Behavior: Spot risky behavior, detect intent, and stop insider threats to stay ahead of the careless handling of sensitive data, compromised user accounts and malicious user activity. ✔️ Compliance and Data Discovery: Prove compliance with audit-ready reporting for data in use, in motion, and at rest. ✔️ Cloud Security: Protect Microsoft 365, cloud, and file-sharing platforms to secure sensitive cloud-based data.
  • 21
    Files.com

    Files.com

    Files.com

    Files.com is a cloud-native Managed File Transfer (MFT) platform that unifies file transfers, sharing, and automation across any cloud, protocol, or partner. It connects 50+ storage systems — including Amazon S3, Azure, Google Drive, SharePoint, Dropbox, and Box — presenting them as a single seamless namespace. ​ Files.com supports SFTP, FTP/FTPS, AS2, HTTPS, WebDAV, and REST APIs, making it compatible with virtually any system or partner. Automated workflows eliminate manual scripts and reduce admin overhead by up to 90%. ​ Enterprise-grade security includes AES-256 encryption, SOC 2 Type II certification, HIPAA/GDPR compliance, full audit trails, SSO (Okta, Azure AD, and more), and 2FA. With a 99.99% uptime history and zero data breaches in 15 years, Files.com is trusted by IT teams in finance, healthcare, and technology. Available via web, desktop (Windows/macOS), mobile (iOS/Android), and on-premises agent (Windows/macOS/Linux)
  • 22
    Auvik

    Auvik

    Auvik Networks

    Auvik's cloud-based network monitroing and management software gives you instant insight into the networks you manage, and automates complex and time-consuming network tasks. You get complete network visibility and control. Real-time network mapping & inventory means you'll always know exactly whats where, even as your users move. Automated config backup & restore on network devices means you'll mitigate network risk with no manual effort. And deep network traffic insights is a game changer. Whether you are a corporate IT professional or a Managed Service Provider, Auvik has a simple, out of the box solution for you and your team that only take minutes to deploy.
  • 23
    Thinfinity Workspace

    Thinfinity Workspace

    Cybele Software, Inc.

    Thinfinity® Workspace 7 is a comprehensive, secure platform that offers a zero-trust approach, enabling secure and contextual access to corporate virtual desktops, virtual applications, internal web apps, SaaS, and files, whether they are on Windows, Linux, or mainframes. It supports various deployment models, including cloud, on-premise, and hybrid settings, and can be deployed on any cloud provider of your choice. With its proprietary reverse gateway technology, Thinfinity® Remote Workspace 7 ensures secure reverse connections over SSL with TLS 1.3 encryption. This robust approach doesn't require client-side installations, firewall modifications, or the opening of inbound ports on your network, thereby enhancing the security infrastructure of your business. The platform ensures all browser-based connections are secured over HTTPS, offering a wide variety of authentication options, from straightforward User/Password to sophisticated Active Directory authentication.
  • 24
    Air

    Air

    Air.inc

    Centralize your team's content in a workspace that's organized, versioned, and easy to share. Sure, Air stores your content. But it also has smart search, guest permissions, custom layouts, version tracking, and hassle-free sharing that makes every part of the creative process easier and more enjoyable. Stop hiding your assets in folders and zip files. Plan social media posts, create lightweight presentations, and organize your content in a workspace that reflects your brand. Navigate your workspace like a search engine. Built-in features like image recognition and smart tags enable anyone on your team to jump in and locate assets all by themselves. Now the only painful part of the feedback cycle is the feedback. Create public boards and allow guests to upload directly into your workspace. Leave comments, have discussions, and make selects with context. Track new changes and clearly identify the latest asset version.
    Starting Price: $250 per month
  • 25
    FusionAuth

    FusionAuth

    FusionAuth

    FusionAuth is a modern, developer-focused identity and access management platform built to give you full control over your authentication stack. Whether you’re building a startup app or managing enterprise-scale infrastructure, FusionAuth delivers all the must-have features — from login and SSO to advanced protocols like OAuth2, OIDC, SAML, and WebAuthn — in a self-hostable or cloud-native package. Designed with developers in mind, FusionAuth integrates seamlessly with any language, framework, or architecture. Every capability is API-first and built for extensibility, so you can tailor authentication workflows without getting locked into rigid, inflexible systems. FusionAuth supports all the key use cases — user registration, multi-factor authentication (MFA), passwordless login, role-based access control, and more — while helping you stay compliant with GDPR, HIPAA, PCI, and other regulatory standards.
    Leader badge
    Starting Price: $0
    Partner badge
  • 26
    Proton VPN

    Proton VPN

    Proton AG

    Protect your business against damaging data breaches and easily comply with security frameworks like ISO 27001, GDPR, and HIPAA. Our software-only virtual private network easily integrates with your existing infrastructure to provide a flexible and scalable way to protect your organization. With our VPN Professional plan, you can securely access your LAN and SaaS resources by assigning and segmenting permissions to private dedicated VPN servers, allowing employees to access only what they need. With all plans, your network traffic is secured using strong AES-256 or ChaCha20 encryption. You can further strengthen your organization's security with enforced 2FA and seamless login through single sign-on (SSO) with SCIM support for automated user provisioning. Proton VPN's high-speed server network is one of the largest in the world and is part of a suite of open source end-to-end encrypted products from the makers of Proton Mail that are designed to keep your business secure.
    Starting Price: $6.99/user/month
  • 27
    Chainguard

    Chainguard

    Chainguard

    Chainguard Containers are a guarded catalog of 1,700+ minimal, zero-CVE container images with a best-in-class CVE remediation SLA (7 days for critical severity, 14 days for high, medium and low) that helps customers build and deploy software better. Modern software development practices and deployment pipelines require secure, up-to-date containerized applications for cloud-native applications. Chainguard builds minimal images continuously from source in our hardened build infrastructure, with only the components required to build and run your applications. Aimed at engineering organizations and security teams alike, Chainguard Containers reduce costly engineering toil around vulnerability management, enhance the security posture of applications by eliminating attack surface, and unlock revenue by simplifying compliance with key frameworks and customer requirements.
  • 28
    Orca Security

    Orca Security

    Orca Security

    Designed for organizations operating in the cloud who need complete, centralized visibility of their entire cloud estate and want more time and resources dedicated to remediating the actual risks that matter, Orca Security is an agentless cloud Security Platform that provides security teams with 100% coverage their entire cloud environment. Instead of layering multiple siloed tools together or deploying cumbersome agents, Orca combines two revolutionary approaches - SideScanning, that enables frictionless and complete coverage without the need to maintain agents, and the Unified Data Model, that allows centralized contextual analysis of your entire cloud estate. Together, Orca has created the most comprehensive cloud security platform available on the marketplace.
  • 29
    ToogleBox

    ToogleBox

    ToogleBox

    A secured platform helping Super Admins, IT Managers, Marketing Managers, and HR Managers automate, secure, and manage Google Workspace functionalities. Running natively on GCP, our modular suite bridges the gap between standard Google functionalities and enterprise governance. ToogleBox Core Capabilities: 1. Email Damage Control: Execute domain-wide queries to bulk-delete malicious phishing emails in real-time or recall internal mistakes. 2. User Directory Management: Centrally control your employees' data, corporate email signatures, vacation responders, and shared calendars. 3. Contacts & Groups: Use attribute-based automation to create and update distribution lists. Delete obsolete internal contacts and manage shared contacts. 4. InfoBox: Targeted corporate information management for your entire organization's ecosystem. Integrates via Google Workspace Marketplace APIs, Admin SDK, and Gmail API. Protected by Veracode SAST/DAST, CASA Tier 3, and GDPR compliance
    Starting Price: $4/user/year
    Partner badge
  • 30
    AdRem NetCrunch

    AdRem NetCrunch

    AdRem Software

    NetCrunch is a powerful, scalable, all-in-one network monitoring system built for modern IT environments. It supports agentless monitoring of thousands of devices, covering SNMP, servers, virtualization (VMware, Hyper-V), cloud (AWS, Azure, GCP), traffic flows (NetFlow, sFlow), logs, and custom data via REST or scripts. With 670+ monitoring packs and dynamic views, it automates discovery, configuration, alerting, and automates self-healing actions for efficient remote remediation in response to alerts. Its node-based licensing eliminates sensor sprawl and complexity, providing a clear, cost-effective path to scale. Real-time dashboards, policy-driven setup, advanced alert tuning and 40+ alert actions including remote script execution, service restart, process kill or device reboot-make NetCrunch ideal for organizations replacing legacy tools like PRTG, SolarWinds, or WhatsUp Gold. Fast to deploy and future-proof. Can be installed on-prem, self-hosted in the cloud, or mixed.
    Leader badge
    Starting Price: $1600 for NetCrunch 50 nodes
    Partner badge
MongoDB Logo MongoDB