Best IT Security Software for Windows - Page 12

Compare the Top IT Security Software for Windows as of May 2026 - Page 12

  • 1
    Retrospective

    Retrospective

    centeractive AG

    Retrospective is a desktop application for convenient and effective searching in local and distributed log files as well as log data from container platforms such as Docker and Kubernetes. Such data sources are accessed on local and/or remote computers and the log data of different format is extracted, combined and displayed in one place (the result table). Advanced features such as profile definition, data source monitoring, sorting/filtering result entries, highlighting, bookmarking, exporting etc. enable fast and robust log data exploration. Retrospective assists you in early error detection by monitoring application servers’ logs, searching for exceptions, etc. The highly optimized search engine together with the aforementioned features ensures that much precious time is saved. Being able to access all log data in one place makes log data processing incredibly efficient, thus ensuring quick and effective reactions to problems, and therefore gain customers’ trust and loyalty.
    Starting Price: $92 per year
  • 2
    Zirozen

    Zirozen

    Zirozen

    Zirozen is a unified autonomous endpoint management platform that delivers real‑time visibility and control across your entire IT environment to network equipment and cloud infrastructure, via an intuitive drag‑and‑drop dashboard. Its AI‑powered engine continuously scans for vulnerabilities, misconfigurations, missing patches, and unauthorized software, automatically prioritizing and remediating risks based on severity scores. Zirozen automates cross‑platform patch and configuration management with policy‑driven scheduling, continuous compliance auditing for standards like GDPR, HIPAA, and PCI‑DSS, software metering and license optimization, file integrity monitoring, application control, and malicious activity detection. Deep integrations eliminate tool sprawl by correlating security, asset, and inventory data in one console, while customizable alerts and centralized reporting enable proactive SecOps with reduced mean time to resolution.
  • 3
    Passly

    Passly

    IDAgent

    Growing numbers of remote workers, increased dependency on cloud applications, and explosive increases in cyber theft should require every organization of every size to consider Secure Identity & Access Management. With Passly™ from ID Agent (a Kaseya company), IT teams can easily, simply, and affordably enable the right people to have the right access to the right resources – all from the right devices and locations. Secure Password Management, Single Sign-On, Multi-Factor Authentication and more. In a time when the threat of cyberattack has never been greater, and with nearly 80% percent of all data breaches due to lost, weak or stolen passwords, it’s critical to select the right secure identity & access management platform. Passly provides the most comprehensive and cost-effective solution to enable security, compliance, and efficiency. Shared Password Vaults allow techs to manage and store passwords for business, personal or shared accounts. Centralized and easy to use.
  • 4
    TurnKey Lender

    TurnKey Lender

    TurnKey Lender

    TurnKey Lender is a one-stop lending infrastructure used by creditors in 50+ countries to automate all elements of their operations. The platform enables lenders to profitably grow their business while cutting operational costs and risks. It's a powerful AI-driven SaaS that automates over 90% of all lending processes and gives both B2C and B2B lenders a competitive edge. TurnKey Lender Platform has several pre-configured solutions packages including Commercial, Consumer, Pay Later, Auto, Mortgage, Leasing, Factoring. Built in constant collaboration with lenders worldwide, TurnKey Lender is the ultimate solution that answers real-life digital lending challenges in a sophisticated manner.
  • 5
    Endpoint Protector
    Endpoint Protector is an advanced, all-in-one Data Loss Prevention solution for Windows, macOS and Linux, that puts an end to data leaks and data theft and offers seamless control of portable storage devices. Endpoint Protector’s filtering capabilities for data at rest and in motion range from file type to predefined content based on dictionaries, regular expressions or data protection regulations such as GDPR, PCI DSS, CCPA, HIPAA, etc. Endpoint Protector features several specialized modules that can be mixed and matched based on client needs. The modules comprise: Content Aware Protection, Device Control, Enforced Encryption, and eDiscovery . It makes work more convenient, secure and enjoyable, offering an excellent ROI.
  • 6
    Zerto

    Zerto

    Zerto

    Zerto helps customers accelerate IT transformation by eliminating the risk and complexity of modernization and cloud adoption. By replacing multiple legacy solutions with a single IT Resilience Platform, Zerto is changing the way disaster recovery, backup and cloud are managed. At enterprise scale, Zerto’s software platform delivers continuous availability for an always-on customer experience while simplifying workload mobility to protect, recover and move applications freely across hybrid and multi-clouds. Zerto is trusted by over 6,000 customers globally and is powering resiliency offerings for Microsoft Azure, IBM Cloud, AWS, SunGard AS and more than 350 cloud services providers. Learn more at www.zerto.com
  • 7
    Kaspersky Password Manager
    Automatically fills out login fields. Plus auto-completes online forms with info like email addresses and bank card details. Stores your documents, medical records and photos in an encrypted vault only you can unlock. Enables you to generate super-strong and unique passwords for all your various online accounts. Lets you create passwords when you register new accounts - or replace weak passwords in existing ones. Alerts you if you’re using weak or duplicate passwords and prompts you to generate new ones. Warns if your passwords have been leaked online so you can take the appropriate action. Your vault is secured with AES-256 encryption. This means it would take longer than the universe has existed for a hacker to unlock it. Your vault is only accessible with a main password created by you. Or via fingerprint and face ID on your mobile devices. Rest assured that neither Kaspersky, as the app developer, or anybody else, knows a single thing about your data.
    Starting Price: $14.99 per user per year
  • 8
    OpenText Core DNS Protection
    OpenText Core DNS Protection is a cloud-native security solution that monitors and filters every DNS request to block threats before they reach your users or devices. It prevents malware infections by stopping access to malicious domains and Command and Control servers, reducing the risk of data exfiltration. The platform offers full visibility into DNS activity through detailed logs, giving security teams greater insight into network behavior and potential vulnerabilities. With agent-level intelligence, it detects unauthorized DNS servers, enforces policy across encrypted DNS traffic, and eliminates DNS leaks in real time. Deployment takes only seconds, and protection applies on any network—whether employees are in the office, at home, or on public Wi-Fi. By acting as a DNS firewall, OpenText Core DNS Protection closes critical visibility gaps left by legacy tools and strengthens organizational resilience against modern cyber threats.
  • 9
    Spiceworks Network Monitor
    Simple, easy-to-use website monitoring software. Real-time up/down status and alerts for your critical web applications and services. Thousands of businesses use Spiceworks to be alerted on the up/down status of the web applications and services that their end-users need to do their job everyday. Spiceworks Connectivity Dashboard is simple to set up. Install the monitoring agent on any workstation/server, configure the application URLs and start monitoring. Get real-time insights and spot sluggish network connections, or overwhelmed applications – either hosted in your data center or in the cloud – before they crash or users start calling. Coming Soon! Get email alerts when a business critical web application is unreachable by your users: CRM, HR, engineering. Real-time status on critical devices and apps. Get the latest monitoring info without the clutter. Keep an eye on everything within your realm with a single, easy-to-use dashboard.
    Starting Price: $0.01/one-time/user
  • 10
    LogPoint

    LogPoint

    LogPoint

    Get a simple and fast security analytics implementation, along with a user-friendly interface that can be integrated with an entire IT infrastructure with LogPoint. LogPoint’s modern SIEM with UEBA provides advanced analytics and ML-driven automation capabilities that enable their customers to securely build-, manage, and effectively transform their businesses.They have a flat licensing model, based on nodes rather than data volume. This helps to reduce the cost of deploying a SIEM solution on-premise, in the cloud or even as an MSSP. The solution integrates easily with all devices in your network, giving a holistic and correlated overview of events in your IT infrastructure. LogPoint’s Modern SIEM solution translates all data into one common language, making it possible to compare events across all systems. Having a common language makes it both very easy and efficient to search, analyze and report on data.
  • 11
    Sophos Mobile
    Sophos Mobile is a secure Unified Endpoint Management (UEM) solution that helps businesses spend less time and effort to manage and secure traditional and mobile endpoints. The only UEM solution that integrates natively with a leading next-gen endpoint security platform, Sophos Mobile supports management of Windows 10, macOS, iOS, and Android devices. Sophos Mobile lets you secure any combination of personal and corporate-owned devices with minimal effort. When users bring their personal macOS, Windows 10, or mobile devices to work, the flexible self-service portal lets them enroll their device, reset passwords, and get help, with no involvement from IT, making your life easier. Container-only Management gives admins control over corporate content in the Sophos Secure Email and Sophos Secure Workspace apps without requiring management of the mobile device itself. Ensure business data doesn’t go adrift and isn’t threatened by malware.
  • 12
    SailPoint

    SailPoint

    SailPoint Technologies

    You can’t do business without technology and you can’t securely access technology without identity security. In today’s era of “work from anywhere”, managing and governing access for every digital identity is critical to the protection of your business and the data that it runs on. Only SailPoint Identity Security can help you enable your business and manage the cyber risk associated with the explosion of technology access in the cloud enterprise – ensuring each worker has the right access to do their job – no more, no less. Gain unmatched visibility and intelligence while automating and accelerating the management of all user identities, entitlements, systems, data and cloud services. Automate, manage and govern access in real-time, with AI-enhanced visibility and controls. Enable business to run with speed, security and scale in a cloud-critical, threat-intensive world.
  • 13
    DriveCrypt

    DriveCrypt

    Securstar

    DRIVECRYPT securely and easily protects all proprietary data on notebooks and desktop computers 100% of the time without users having to think about security. Any organization, from a small company to a large international firm with thousands of users in the field, can effectively protect business plans, client lists, product specifications, confidential corporate memos, stock information, and much more with this disk encryption product. As data is read from the hard disk, DRIVECRYPT automatically decrypts the data before it is loaded into memory. When data is written back to the hard disk, it is automatically re-encrypted. The disk encryption/decryption process is completely transparent to the user or any application program because the data is processed by an operating system extension, "on the fly" as it transfers back and forth between the hard disk and memory. Consequently, users don't need to remember to decrypt or re-encrypt their data, or change the normal operation of the PC.
    Starting Price: $59.95
  • 14
    Nsauditor Network Security Auditor
    Nsauditor Network Security Auditor is a powerful network security tool designed to scan networks and hosts for vulnerabilities, and to provide security alerts. Network Security Auditing Software and Vulnerability Scanner Network Security Auditing Software and Vulnerability Scanner Nsauditor network auditor checks enterprise network for all potential methods that a hacker might use to attack it and create a report of potential problems that were found. Network Security Auditing Software and Vulnerability Scanner Network Security Auditing Software and Vulnerability Scanner Nsauditor network auditing software significantly reduces the total cost of network management in enterprise environments by enabling IT personnel and systems administrators gather a wide range of information from all the computers in the network without installing server-side applications on these computers and create a report of potential problems that were found.
    Starting Price: $69 one-time payment
  • 15
    Ivanti Neurons
    Power and protect your teams from cloud to edge with Ivanti Neurons, the hyperautomation platform for the Everywhere Workplace. Delivering the power of self-healing has never been so simple. What if you could discover and fix issues automatically before your users even know about them? Ivanti Neurons does just that. Powered by machine-learning and deep intelligence, it lets you remediate issues preemptively before they slow your productivity. Take troubleshooting off your agenda and deliver better experiences, everywhere your business works. Ivanti Neurons fuels your IT with real-time intelligence you can act on, enables devices to self-heal and self-secure, and provides users with a personalized self-service experience. Empower your users, your team and your business to do more, everywhere, with Ivanti Neurons. Ivanti Neurons delivers value from day one by providing real-time insights that let you thwart risks and prevent breaches in seconds, not minutes.
  • 16
    Swascan

    Swascan

    Swascan

    It runs the scan of web sites and web applications to spot and analyze in a proactive way security vulnerabilities. The Network Scanner spots and identifies network vulnerabilities and helps you fixing them. It runs the source code analysis to highlight and solve weak spots and security vulnerabilities. The online tool that makes you evaluate the Compliance level of your company in terms of GDPR. Create a unique learning opportunity for your employees and avoid the more and more frequent phishing attacks. Consultancy activity to support companies with management, control and risk evaluation. Ransomware has been confirmed to be the threat par excellence in the global cybersecurity landscape also in Q3 of 2022. In this Webinar Swascan, Pierguido Iezzi CEO of Swascan, will show you more about the data collected, concerning the victims of the 15 Ransomware gangs active in the third quarter of 2022.
  • 17
    Emsisoft Anti-Malware
    They turn your PC into a remote-controlled zombie. Your computing power is collectively sold on the black market to send spam, attack others or store illegal content. Potentially Unwanted Programs that mess up your computer with useless browser toolbars, tons of commercials and other bulk that slows down the PC. Emsisoft Anti-Malware Home not only detects more because it uses the full power of two major antivirus- and anti-malware technologies, it also scans quicker because of the efficient combination of the scanners. Any unnecessary duplicates in detection are avoided, enabling the least impact on memory and overall hardware resources. If a user attempts to access a malicious website, Emsisoft Anti-Malware Home will immediately block the connection and prevent access. Leading privacy-conscious filtering without SSL exploitation.
    Starting Price: $19.99 per device per year
  • 18
    Silverfort

    Silverfort

    Silverfort

    Silverfort’s Unified Identity Protection Platform is the first to consolidate security controls across corporate networks and cloud environments to block identity-based attacks. Using innovative agentless and proxyless technology, Silverfort seamlessly integrates with all existing IAM solutions (e.g., AD, RADIUS, Azure AD, Okta, Ping, AWS IAM), extending coverage to assets that could not previously have been protected, such as legacy applications, IT infrastructure, file systems, command-line tools, and machine-to-machine access. Our platform continuously monitors all access of users and service accounts across both cloud and on-premise environments, analyzes risk in real time, and enforces adaptive authentication and access policies.
  • 19
    pfSense

    pfSense

    Netgate

    The pfSense project is a free network firewall distribution, based on the FreeBSD operating system with a custom kernel and including third party free software packages for additional functionality. pfSense software, with the help of the package system, is able to provide the same functionality or more of common commercial firewalls, without any of the artificial limitations. It has successfully replaced every big name commercial firewall you can imagine in numerous installations around the world, including Check Point, Cisco PIX, Cisco ASA, Juniper, Sonicwall, Netgear, Watchguard, Astaro, and more.
  • 20
    K7 Endpoint Security
    K7 Endpoint Security is easy to install, deploy, configure, and manage, reducing IT workload. The console for the On-premises version can be installed on any client in the network, avoiding additional investment in server hardware and software. The Cloud deployed version supports 100% remote deployment and cybersecurity management of all endpoints in the organization anytime, anywhere. K7’s international award-winning scan engine has been tested and proven to protect endpoints without affecting device performance.
  • 21
    Mullvad VPN
    You have a right to privacy. In a society increasingly determined to erode that right, a fast, trustworthy and easy-to-use VPN is a good first step toward reclaiming it. When you connect to the internet with Mullvad, we ensure that the traffic to and from your computer is encrypted to the highest standards even if you are using a public WiFi network at a cafe or hotel. We keep no activity logs, do not ask for personal information, and even encourage anonymous payments via cash or one of the cryptocurrencies we accept. Your IP address is replaced by one of ours, ensuring that your device's activity and location are not linked to you. Using Mullvad is straightforward and simple – just download and install the app. You won't need to waste time with setup configurations or a multi-step registration process. We built Mullvad with ease of use in mind. Privacy is fundamental to a well-functioning society because it allows norms, ethics, and laws to be safely discussed and challenged.
  • 22
    BitLocker

    BitLocker

    Microsoft

    BitLocker Drive Encryption is a data protection feature that integrates with the operating system and addresses the threats of data theft or exposure from lost, stolen, or inappropriately decommissioned computers. BitLocker provides the most protection when used with a Trusted Platform Module (TPM) version 1.2 or later. The TPM is a hardware component installed in many newer computers by the computer manufacturers. It works with BitLocker to help protect user data and to ensure that a computer has not been tampered with while the system was offline. On computers that do not have a TPM version 1.2 or later, you can still use BitLocker to encrypt the Windows operating system drive. However, this implementation will require the user to insert a USB startup key to start the computer or resume from hibernation. Starting with Windows 8, you can use an operating system volume password to protect the operating system volume on a computer without TPM.
  • 23
    Parrot OS

    Parrot OS

    Parrot Security

    Parrot is a worldwide community of developers and security specialists that work together to build a shared framework of tools to make their job easier, standardized and more reliable and secure. Parrot OS, the flagship product of Parrot Security is a GNU/Linux distribution based on Debian and designed with Security and Privacy in mind. It includes a full portable laboratory for all kinds of cyber security operations, from pentesting to digital forensics and reverse engineering, but it also includes everything needed to develop your own software or keep your data secure. Always updated, frequently released with many hardening and sandboxing options available. Everything is under your complete control. Feel free to get the system, share with anyone, read the source code and change it as you want! this system is made to respect your freedom, and it ever will be.
  • 24
    Google Password Manager
    Manage your saved passwords in Android or Chrome. They’re securely stored in your Google Account and available across all your devices. Check the strength and security of your saved passwords. Find out if they’ve been compromised and get personalized advice when you need it.
  • 25
    MoreLogin

    MoreLogin

    MoreLogin

    Extra opportunity, performance growth, and sales with multiple accounts. Use unlimited advertising accounts to reach extra audience and display worldwide location. Manage accounts on all platform to accelerate sales performance without prohibition. Get excessive revenue by using automation and masked browsers. Manage unlimited number of profiles to plan social media campaigns and marketing. Every device has a unique browser fingerprint. The website can use browser fingerprint to identify accounts used on the same device to limit your activities. MoreLogin provides an Antidetect Browser that you can use to create multiple browser fingerprints. These new browser fingerprints don't overlap, so websites don't ban your account, which is great for performing various tasks on the internet
  • 26
    SAV7

    SAV7

    SAV7

    SAV7 encrypts files of any type with AES-256 and generates a secure key to restore the files. Encrypted files can only be restored with the key file. This ensures that it is impossible to decrypt the files without the key file. SAV7 AES-256 Encryption employs state-of-the-art encryption technology based on the symmetric AES (Advanced Encryption Standard). This technology ensures reliable security for your data through a combination of symmetric encryption, authentication, and message authentication codes (MACs). The AES algorithm, one of the world’s leading encryption algorithms, provides strong encryption and is utilized by governments, banks, and organizations worldwide. SAV7 secures your sensitive data against unauthorized access by offering a robust method of encryption and authentication that adheres to the latest security standards.
  • 27
    Fortinet

    Fortinet

    Fortinet

    Fortinet is a global leader in cybersecurity solutions, known for its comprehensive and integrated approach to safeguarding digital networks, devices, and applications. Founded in 2000, Fortinet provides a wide range of products and services, including firewalls, endpoint protection, intrusion prevention systems, and secure access solutions. At the core of its offerings is the Fortinet Security Fabric, a unified platform that seamlessly integrates security tools to deliver visibility, automation, and real-time threat intelligence across the entire network. Trusted by businesses, governments, and service providers worldwide, Fortinet emphasizes innovation, scalability, and performance, ensuring robust defense against evolving cyber threats while supporting digital transformation and business continuity.
  • 28
    Datto SIRIS

    Datto SIRIS

    Datto, a Kaseya company

    From servers to virtual machines, SIRIS is the secure data protection solution built for MSPs to protect their client data. Security comes first with two-factor authentication and the immutable Datto Cloud to deliver the all-in-one solution for backup and recovery in a ransomware world. Born for the MSP with a cloud first architecture that delivers an all-in-one solution that spans backup to DRaaS, all administered from a secure, multi-tenant cloud portal. Immutable backups and the secure Datto Cloud make SIRIS your best line of defense against ransomware. Patented Inverse Chain Technology™ fundamentally changes the way backup and recovery is done allowing for every incremental snapshot to be a fully constructed recovery point. Does deleting backups either accidentally or maliciously mean you can’t recover? Think again with Cloud Deletion Defense™ that undeletes the unthinkable.
  • 29
    Soffid IAM
    Soffid provides full Single Sign On experience and full identity and access management features by policy-based centralized orchestration of user identities. Everything delivered by a full open source solution. Improve user productivity with Soffid IAM. Soffid provides a single configuration tool for the administrator and provides an easy to use self service portal for the end users. One single tool for everyone to enhance user productivity! Increase IT internal and external security. Soffid uses state of the art security standards. Identity and Access Management provides a new vision on security, no longer based in the old school firewall vision, but centered in who, when and how is the user accessing specific resources to improve external and internal security. Increase IT flexibility. Soffid enables the option of managing all the IT assets not based on their location but based on who is accessing them.
  • 30
    SPAMfighter

    SPAMfighter

    SPAMfighter

    Download our award winning free spam filter, or secure yourself from threats with our effective anti-virus software. Also, try SPYWAREfighter to remove spyware and malware quickly. Try SLOW-PCfighter to speed up boot time on a slow PC, or try a free scan of FULL-DISKfighter to recover space on a full disk. The latest offering is DRIVERfighter to update your driver updater. Get complete PC optimization and extend the life of your PC with these must-have software tools. SPAMfighter Hosted Mail Gateway is the simple and low-cost solution for companies, organizations, and individuals with their own the domain name and want to get rid of spam and virus without buying and maintaining their server software.
    Starting Price: $25 per year
MongoDB Logo MongoDB