Best IT Security Software for Windows - Page 24

Compare the Top IT Security Software for Windows as of May 2026 - Page 24

  • 1
    SigningHub

    SigningHub

    Ascertia

    Significant cost savings can be made when paper-based processes are moved on-line. For some documents it is vital to ensure traceability, accountability and audit with clear legal weight, data integrity and individual signed approval together with easy to access workflow process evidence. SigningHub enables quick, efficient on-line approval of any business document, agreement, report, request or package. SigningHub supports basic e-Signatures, Advanced e-Signatures and EU Qualified Signatures. The best way to prove a document is unchanged from the time of signing is to use cryptographic digital signatures. Organisations need to show that their internal controls are effective and compliant with local legislation and regulations. Ascertia has offered world-class PKI products for years. SigningHub brings together all of this capability and knowledge to provide the most secure way to sign documents.
    Starting Price: $12.10/month/user
  • 2
    Vitrium Security

    Vitrium Security

    Vitrium Systems

    A robust, yet easy to use content security and enterprise digital rights management software. Get started today with our cloud-hosted subscription service or contact our team to learn how you can implement in your business as part of your overall content strategy or workflow process. Protect all your video, document, and image content files for secured and controlled distribution with Vitrium’s Enterprise Content Security Software. Enjoy one of the highest levels of encryption while still offering seamless access for your customers and gain incredible insight with detailed, analytics reports. Your customers (clients, students or employees) do not require any apps or plug-ins to view their secured content and they can access the content from any device at anytime.
    Starting Price: $300.00/month
  • 3
    SNOK

    SNOK

    SecureNok

    SNOK™ is a cybersecurity monitoring and detection system tailored for industrial networks and control systems. SNOK™ detects targeted industrial attacks such as espionage, sabotage, malware, and other security interruptions in control systems. SNOK™ uniquely combines network and endpoint monitoring of components such as PLC’s, HMI’s, Servers etc. We are cybersecurity experts on industrial automation and control systems. Our skilled advisors and technicians help you secure critical infrastructure and production facilities, train your staff and implement secure practices. Hacking, malware and viruses have attacked IT systems for decades. Recently, cyberattacks has grown into a serious threat to critical industrial infrastructure as well. What has happened and how can infrastructure be protected? Assets in the Oil & Gas Industry are attractive targets for cyber-attacks with potentially severe consequences.
    Starting Price: $0.01
  • 4
    CloudFish

    CloudFish

    CloudFish

    Cloud-Fish protects your sensitive data across all platforms and provides your business with a solid defense against cyber-attacks and data breaches. Your sensitive business information, intellectual property assets, and customer data are stored on your employees’ computers, mobile devices, and on external cloud servers that your company uses. Securing this sensitive information is critical to protecting your business from financial risks, regulatory violations, and reputation setbacks. How do you ensure the security of your sensitive data that is dispersed across different platforms? Your company has regional as well as global offshore offices. You have little visibility and control over what is going on in your offshore organization. Who is sharing what information? You need an ability to monitor and an effective mechanism to respond if a cyber-attack or a security violation occurs.
    Starting Price: $9.09 one-time payment
  • 5
    Specops Password Auditor
    Authentication and password security is more important than ever. Our password audit tool scans your Active Directory and identifies password-related vulnerabilities. The collected information generates multiple interactive reports containing user and password policy information. Specops Password Auditor is a read-only program, and available for free download. Analyze your domain password policies, and fine-grained password policies, to see if they enable users to create secure passwords. Generate reports to identify accounts with password vulnerabilities, including expired passwords, identical passwords, blank passwords, and more. In addition to these insights, Specops Password Auditor allows you to measure the effectiveness of your policies against a brute-force attack. For a complete list of the password reports, see the product overview.
    Starting Price: Free
  • 6
    UpGuard

    UpGuard

    UpGuard

    The new standard in third-party risk and attack surface management. UpGuard is the best platform for securing your organization’s sensitive data. Our security ratings engine monitors millions of companies and billions of data points every day. Continuously monitor your vendors, automate security questionnaires, and reduce third and fourth-party risk. Monitor your attack surface, prevent data breaches, discover leaked credentials, and protect customer data. Scale your third-party risk program with UpGuard analysts, and let us monitor your organization and vendors for data leaks. UpGuard builds the most powerful and flexible tools for cybersecurity. Whether you’re looking to prevent third-party data breaches, continuously monitor your vendors, or understand your attack surface, UpGuard’s meticulously designed platform, and unmatched functionality helps you protect your most sensitive data. Hundreds of the world’s most data-conscious companies are scaling faster and more securely.
    Starting Price: $5,249 per year
  • 7
    RDS-Shield

    RDS-Shield

    Marty Soft Conception

    RDS-Shield is a standalone Windows Service managing a lot of server events, and an intuitive Administration interface. No need to install Java, update PHP, download MS C++ libraries or .NET. All is included and so powerful. Just download it, install it, and discover. Forget the complexity of GPO & AD. Simply say: Now, all users of this group are in the Highly secured user environment, but in this same group, this account will be in a Secured user session, while others will work in Kiosk Mode. Easily import Applocker’s rules without opening GPO, allow Homeland Access, define Working Hours, and Control Intrusion attempts. What you say is what you get immediately. Your decisions are applied without reboot needed, without logoff/logon for connected users, and will be applied for your futures accounts or unconnected users. Ready to drive more Security Rules in few simples clicks?
    Starting Price: $299 one-time payment
  • 8
    ManageEngine Key Manager Plus
    ManageEngine Key Manager Plus is a web-based key management solution that helps you consolidate, control, manage, monitor, and audit the entire life cycle of SSH (Secure Shell) keys and SSL (Secure Sockets Layer) certificates. It provides visibility into the SSH and SSL environments and helps administrators take total control of the keys to preempt breaches and compliance issues. Similarly, managing a Secure Socket Layer (SSL) environment can be daunting when organizations use a large number of SSL certificates issued by different vendors with varying validity periods. On the other hand, SSL certificates left unmonitored and unmanaged could expire, or rogue/invalid certificates could be used. Both scenarios could lead to service downtime or display of error messages that would destroy customer trust in data security and, in extreme cases, even result in security breaches.
    Starting Price: $595 per year
  • 9
    AssureID

    AssureID

    Acuant

    Real Time Multi-Factor Identity Verification Software AssureID offers fast multi-factor authentication to improve customer experiences, increase conversion rates and mitigate fraud. Patented technology authenticates IDs by applying 50+ forensic and biometric tests, in seconds, utilizing the industry's largest document library. Acuant's library is powered by human-assisted machine learning for the highest accuracy. AssureID eliminates manual errors, speeds up the document inspection process, and significantly reduces employee training. Solutions integrate easily into any environment in any industry and read IDs from over 196 countries and all 50 US states. Accurate data population with 50+ forensic tests run in seconds in the same seamless process. Three classes of facial match & liveness tests including NIST algorithm, intuitive & fast. World-class patented image capture that automatically crops & detects document type & region.
  • 10
    Intelligent Management Center

    Intelligent Management Center

    Hewlett Packard Enterprise

    Aruba AirWave is the only multi-vendor wired and wireless network management solution designed with mobile devices, users and apps in mind. By proactively monitoring the health and performance of all things connected, AirWave gives IT the insights needed to support today’s digital workplace. As network management becomes more complex, the risks associated with compromised data flow have also increased. HPE Intelligent Management Center (IMC) delivers comprehensive management across campus core and data center networks. IMC converts meaningless network data to actionable information to keep your network, and your business, moving. HPE network and service management solutions support telco networks from the core to the edge allowing operators to seize the profits of 5G. Simplify the management of data center and the Fibre Channel (FC) storage area network (SAN) fabrics. HPE IMC Branch Intelligent Management System. Enable remote network management of Customer Premises Equipment (CPE).
    Starting Price: $2000.00/one-time
  • 11
    Active Login Manager
    The login process is fully automated by ALM. In addition, the solution improves the usability of your Cisco IP Phone Extension Mobility by controlling the log on and log off process. ALM will automatically log off the connected phone at selected events, e.g. when the PC is locked or when the screensavers starts. The user or its administrator has the option to customize the ALM behavior. ALM Pro is a client-only application so there is no need to add or invest in new (server) hardware. Deployment of ALM to your existing network is fully scriptable. Configuration of the software is therefore an easy task. To even further simplify the management of large-scale installations, the RSconnect Application Manager is available.
  • 12
    BETTER Mobile

    BETTER Mobile

    Better Mobile Security

    BETTER Mobile Threat Defense protects mobile devices from attacks and threats. It’s simple, affordable, and powerful. Lightweight mobile agent that provides endpoint protection. Deploy it in minutes via EMM. Streamlined admin console gives immediate visibility, intelligence and control over device risks and threats. The console provides rich information and easy policy management, but our goal is to keep you from ever needing to use it. We have built one of the most advanced machine learning platforms and focused it on mobile threat detection. With our global mobile sensor network feeding rich intelligence into Deep Thinker, a cloud-based AI engine, BETTER MTD provides highly accurate detection of risky apps, anomalous behavior, and network threats. The detection engine provides comprehensive around-the-clock protection for your company data and resources. Runs in the background only consuming 5% battery and 1% CPU.
  • 13
    Comodo Endpoint Security Manager
    Comodo Advanced Endpoint Protection provides a state-of-the-art anti-malware suite that proactively protects your servers, workstations, laptops and netbooks while offering advanced, real-time management and control over critical system resources. Whether deployed as a complete security suite or by using the sandbox as a standalone to fortify existing AV solutions, Comodo ESM offers unrivaled endpoint protection for Microsoft Windows servers, desktops, laptops and tablets. The full Comodo Endpoint Security suite brings 5 layers of defense (Antivirus, Firewall, Host Intrusion Prevention, Auto-Sandbox & File Reputation) to the point of impact - the desktop environment. Its ground-breaking auto-sandbox technology eliminates malware outbreaks and operating system contamination by automatically running untrusted processes in an isolated environment. This makes Comodo's endpoint protection the only managed anti-malware solution that can offer a $5,000 limited warranty against infection.
    Starting Price: $4.00/one-time/user
  • 14
    4identity
    4identity is the technological solution developed by Bit4id that empowers web applications with Digital Signature and Authentication processes. 4identity does not use Java Applets or any other third party add-on. It is simple, its is compatible with any web browser and works under the most used operating systems. The “integration-less” Engine to add Digital Signature and Strong Authentication to web applications through a simple API. 4identity means usability, providing a “1-click signing” user experience. Bit4id has extensive knowledge and experience in the development of software and tools for security and digital identity management based on Public Key Infrastructure (PKI). Providing solutions for managing more than 10 million digital identities, and processing more than 50 million digital signatures a year, Bit4id is a company leading in innovation for the PKI and digital identity market in Europe and Latin America.
  • 15
    ARCON | IDAM
    ARCON | IDAM is a solution that ensures the details of an employee’s overall employment tenure are maintained and managed from a single console. This allows administrators to perform access certification and review activity in a much faster and more efficient manner. At the same time, the end users do not have to wait too long to gain legitimate access to business applications, legacy applications, or IT Infrastructure devices. Enhance your digital experience at the workplace by maintaining a digital identity of each individual from the day an employee starts working for you until after they leave the organization, leading to faster development and release cycles. No more waiting for support to reply before you start your work again. Administration activities of adding, deleting, updating user credentials are now easier than ever, reducing help desk support calls such as password change, access requests, and access removal, resulting in reduced total cost of ownership.
  • 16
    Themis

    Themis

    Cossack Labs

    Secure Cell is a multi-mode cryptographic container suitable for storing anything from encrypted files to database records. Use Secure Cell to encrypt data at rest. Secure Cell is built around AES-256-GCM, AES-256-CTR. Secure Message is a simple encrypted messaging solution for the widest scope of applications. Use Secure Message to send encrypted and signed data from one user to another, from client to server, to prevent MITM attacks and avoid single secret leakage. Based on ECC + ECDSA / RSA + PSS + PKCS#7. Zero-knowledge proof-based protocol to compare secrets over non-trusted channels without risking leaks or reuse attacks. Use Secure Comparator for authenticating the users in a way that no password (or password hash) is sent over the network. Secure Session is a session-oriented encrypted data exchange with forward secrecy for better security guarantees and more demanding infrastructures.
    Starting Price: $0.01
  • 17
    Effivity

    Effivity

    Effivity Technologies

    Effivity is a cloud-based / on-premise QHSE/FSMS/ISMS software to implement a robust Quality - Occupational Health & Safety - Environment Management System & offers 100% conformity to ISO 9001, ISO 14001, ISO 45001, ISO 22000, HACCP standards. Effivity makes ISO compliance simple, easy, quick, value adding, cost-effective, collaborative and time-saving which results in enabling an organization to enhance efficiency and augment productivity as validated by users in more than 120 countries. Effivity offers a unique approach to optimize your management system with world-renowned QMS software, HSE software & FSMS-HACCP software. Simplicity, standardization and customer satisfaction delivered with no-code quality management system software, safe workplace enabled with 100% customizable occupational health & safety management system, sustainable environment possible with a user-friendly environment management system and safe food delivered with HACCP software that is ready to use.
    Starting Price: $30 per month
  • 18
    Syteca

    Syteca

    Syteca

    Syteca — control privileged access and detect identity threats in one place. Syteca is a PAM platform built from the ground up with identity threat detection and response (ITDR) capabilities. Instead of bolting on monitoring after the fact, Syteca was designed monitoring-first: every privileged session is visible, recorded, and auditable from the start. The platform covers the full privileged access lifecycle — account discovery, credential vaulting, just-in-time access provisioning, MFA, and manual approval workflows. What sets it apart is what happens after access is granted: continuous session monitoring, risk detection during active sessions, and automated response actions (block the user, terminate the session, kill the process). Syteca works across Windows, macOS, and Linux, and supports on-premises, cloud, and hybrid deployments. Trusted by 1,500+ organizations in 70+ countries. Recognized by Gartner and KuppingerCole.
  • 19
    Cofense PhishMe
    Your employees need to be conditioned to spot and report phishing emails immediately. With Cofense PhishMe™, simulations are based on the latest threats known to bypass SEGs, empowering your users to become human threat detectors. With resilient users attuned to the latest phishing threats, you have the best organizational defense. Cofense PhishMe Playbooks let you configure a full 12-month program, complete with phishing simulation scenarios, landing pages, attachments, and educational content, in just a few clicks. Our Smart Suggest capability uses advanced algorithms and embedded best practices to recommend scenarios based on current active threats, industry relevance, and your program’s history. The most important part of your phishing defense is reporting and resiliency rates. Boost reporting and help users become active defenders with Cofense Reporter™, our one-click reporting button.
  • 20
    VIPole

    VIPole

    VIPole

    Message editing and deleting, auto-delete messages, chat window clearing and complete history wiping. Disconnecting devices remotely, fake secret phrase, auto lock and auto logout on inactivity. Hidden and blacklist contacts, individual visibility settings for contacts, configurable contact authorization. Assign tasks to yourself and colleagues, track the progress. Store and organize passwords, securely share them with contacts. Foster collaboration by setting goals for the team and monitoring the solved issues.
    Starting Price: $5.99 per month
  • 21
    NGINX
    NGINX Open Source: The open source web server that powers more than 400 million websites. NGINX Plus is a software load balancer, web server, and content cache built on top of open source NGINX. Use NGINX Plus instead of your hardware load balancer and get the freedom to innovate without being constrained by infrastructure. Save more than 80% compared to hardware ADCs, without sacrificing performance or functionality. Deploy anywhere: public cloud, private cloud, bare metal, virtual machines, and containers. Save time by performing common tasks through the built‑in NGINX Plus API. From NetOps to DevOps, modern app teams need a self‑service, API‑driven platform that integrates easily into CI/CD workflows to accelerate app deployment – whether your app has a hybrid or microservices architecture – and makes app lifecycle management easier.
  • 22
    Password Reset PRO
    Self service password reset software (SSPR) and identity management for Active Directory 2012, 2016, 2019 domain users. Secure for password self service outside of the domain by remote users. Easy to install. Perfect for Office 365, OWA, VPN, Azure, Mobile, BYOD users. Rapid deploy – No Databases – Use it free for a month! Server 2003 through 2019 supported. Password Reset PRO is the only enterprise-class web based self service software designed specifically for secure external (public) access by end users, allowing them to quickly change or reset their domain password and unlock their account without IT intervention. It is very easy to install, test and deploy, no databases required or changes to the domain, no disturbing users.
    Starting Price: $598.00/one-time/user
  • 23
    Monyog

    Monyog

    Webyog

    Agentless MySQL performance monitoring that's fully customizable and allows you to optimize query performance in real-time. Trace all changes done to the MySQL Global variables using the configuration management. You can track and compare changes to the configuration file and identify the reason for performance issues. Monitor locked and long running queries in real-time. Get notifications on mail or SNMP traps, Syslog, Slack and Pagerduty for queries that take more than a specified amount of time to execute. You also have the option to configure Monyog to kill, notify or notify & kill such queries. Avoid learning new tools by using the same performance monitoring tool for MySQL on-premise on physical and virtual machines, in the private, public, and government cloud on virtual machines, and in the public and government cloud as managed databases.
    Starting Price: $199 one-time payment
  • 24
    AwareABIS
    Aware provides software and solutions for government-sponsored, biometrics-enabled citizen identification and credentialing systems. Aware’s innovative biometric solutions provide critical support to help ensure national security and protect citizen freedoms and liberties. A decades long commitment to R+D has earned us work with more than 80 government agencies. We know biometrics, security and compliance. At the heart of what we do for citizen ID is AwareABIS™, an Automated Biometric Identification System (ABIS) used for large-scale biometric identification and deduplication, with support for fingerprint, face, and iris modalities. Its highly modular architecture allows it to be configured and optimized for either civil or criminal applications. A fully featured biometric search platform, AwareABIS is differentiated by its open architecture and configurability.
    Starting Price: $2495.00/one-time/user
  • 25
    Array APV Series

    Array APV Series

    Array Networks

    Array APV Series application delivery controllers provide the availability, scalability, performance, security and control essential to keeping applications and servers running in their power band. Integrated local and global server load balancing, as well as link load balancing, ensure the highest levels of resiliency for your applications, while connection multiplexing, SSL offload, caching and compression work together to deliver the fastest end-user experience possible. What’s more, by terminating connections on APV Series ADCs, applications are protected behind Array’s WebWall® application security suite. Available as physical or virtual appliances, or on popular public clouds, Array ADCs are designed to meet technical requirements while remaining simple enough for any size IT team and affordable enough for any size business.
  • 26
    Netwrix Directory Manager
    Netwrix Directory Manager is a directory management solution designed to automate user and group management across enterprise environments. It enables organizations to manage identities across Active Directory, Entra ID, and other connected directories. The platform automates user lifecycle processes such as provisioning, updates, and deprovisioning based on authoritative data sources. It helps maintain accurate group memberships by using dynamic rules and automated updates. Netwrix Directory Manager allows secure delegation so managers can handle user and group changes without direct administrative access. It also includes self-service features that let users reset passwords and manage certain account tasks independently. The solution improves efficiency by reducing manual IT workloads and minimizing support requests. By centralizing and automating directory operations, it helps organizations maintain consistent and secure identity management.
  • 27
    RingStor

    RingStor

    RingStor

    RingStor is an innovative data management company providing digital asset backup, incident management, emergency action and business continuity planning software solutions. Taking its name from the technical architecture involved in data storage, RingStor provides cost-effective, cross-platform, multi-tenant solutions renowned for high performance and reliability. The solutions are rapidly deployable, configurable to fit any infrastructure situation, and easily managed. RingStor has assembled the key components that any business needs to ensure a disaster does not seriously damage your business or even worse put you out of business. RingStor LifeJacket provides a powerful online tool for business to assess risks, log and track incidents, create emergency action plans and business recovery procedures. The SaaS solution enables business to get organized and prepared for a structured business recovery procedure in event of interruption.
  • 28
    IDM365

    IDM365

    ITMC Soft

    The scenario in this video represents a problem that plagues many organizations on multiple levels. But it doesn't have to. See how a proper identity and access management solution can help. Effeciency is achieved through a workflow which automatically provides matching account access for the new hire. Our user-centric interface makes it possible for business to control and own the process allowing IT to focus on what they do best. Support for policies such as Segregation of Duties (SoD) protects your business against collusion and fraud. Powerful reporting tools provide instant access to audit trails, turning audits into your chance to shine. An organization or business may have a number of systems in use such as Active Directory, Exchange, Oracle and SharePoint, and they may have hundreds or even thousands of users who need to access them. Managing all of these users’ accounts and the access allowed for each one is generally known as identity and access management, or IAM.
    Starting Price: $5 per user per month
  • 29
    Apache Syncope

    Apache Syncope

    Apache Software Foundation

    Apache Syncope is an Open Source system for managing digital identities in enterprise environments, implemented in Java EE technology and released under Apache 2.0 license. Identity management (or IdM) means managing user data on systems and applications, using the combination of business processes and IT. Computers work with records of data about people. Such records contain technical information needed by the system for which the account is created and managed. Have you ever been hired by a company, entered an organization or just created a new Google account? Companies, organizations and cloud entities work with applications that need your data to function properly, username, password, e-mail, first name, surname, and more. In brief, Identity Management takes care of managing identity data throughout what is called the Identity Lifecycle.
  • 30
    CodeMeter

    CodeMeter

    Wibu-Systems

    CodeMeter is the award-winning protection, licensing, and security system that gives software publishers and ISVs as well as intelligent device makers a complete arsenal to protect IP and fight cyber-threats while harnessing the power of smart licensing to monetize and grow their business. CodeMeter includes a complete lineup of license containers - hardware-, software-, or cloud-based - to store secret license keys safely, a set of stealthy encryption modules, and a versatile array of backend and frontend tools for license management, augmented by professional services. CodeMeter License Central is the versatile gateway to license creation, delivery, management, and monitoring across the complete license lifecycle. The integral CodeMeter Protection Suite comprises a suite of tools that automatically encrypt the compiled code to protect software from piracy, counterfeiting, reverse engineering, and tampering.
MongoDB Logo MongoDB