Best IT Security Software for Windows - Page 9

Compare the Top IT Security Software for Windows as of May 2026 - Page 9

  • 1
    Cybereason

    Cybereason

    Cybereason

    Together we can end cyber attacks at the endpoint, across the enterprise, to everywhere the battle moves. Cybereason delivers over-the-horizon visibility and high fidelity convictions of both known and unknown threats so defenders can leverage the power of true prevention. Cybereason provides the deep context and correlations from across the whole of the network to uncover stealthy operations and enable defenders to be expert threat hunters. Cybereason significantly reduces the time required for defenders to investigate and resolve attacks through both automated and guided remediation with just a click of the mouse. Cybereason analyzes 80 million events per second - that’s 100x the volume of other solutions on the market. Reduce investigation time by as much as 93% to eliminate emerging threats in a matter of minutes rather than days.
  • 2
    RoboForm

    RoboForm

    Siber Systems

    RoboForm securely stores all of your passwords and logs you in with a single click (or tap). Save time entering personal and billing information with AutoFill for long web forms. RoboForm's random password generator will create a strong and unique password for each site. Say goodbye to using weak or duplicate passwords for everything. Securely share Login information with other RoboForm users. Simply enter the recipient’s email and share away. To protect your data, RoboForm uses AES-256 bit encryption with PBKDF2 SHA-256. Support for two factor authentication (2FA) to access your account. Create your RoboForm account by entering your email address and setting a Master Password. The Master Password secures your data. It is the one password you'll need to remember. Add your passwords manually or import from your browser, a CSV, or even another password management product. RoboForm saves new passwords automatically as you log in to your online accounts.
  • 3
    Securepoint Antivirus Pro
    One of the best scanning engines. Antivirus Pro utilizes the IKARUS T3.scan.engine, making it one of the best drive engines in the world. Centralized cloud management. Manage license, update and infection status, regardless of the location of the terminal in the user interface. Comprehensive virus protection. Protects PCs and servers from viruses / malware through on-access scanners and scheduled on-demand scans. Low system requirements. The system architecture of Antivirus Pro is designed to work quickly and resource-conserving. With Antivirus Pro, Securepoint offers an endpoint antivirus solution that is convincing with a central cloud management. The free management portal shows all installed client systems including their license, update and infection status. IT service providers and retailers can acess all the information cross customer with a single login.
  • 4
    SaltStack

    SaltStack

    SaltStack

    SaltStack is an intelligent IT automation platform that can manage, secure, and optimize any infrastructure—on-prem, in the cloud, or at the edge. It’s built on a unique and powerful event-driven automation engine that detects events in any system and reacts intelligently to them, making it an extremely effective solution for managing large, complex environments. With the newly launched SecOps offering, SaltStack can detect security vulnerabilities and non-compliant, mis-configured systems. As soon as an issue is detected, this powerful automation helps you and your team remediate it, keeping your infrastructure securely configured, compliant, and up-to-date. The SecOps suite includes both Comply and Protect. Comply scans and remediates against CIS, DISA-STIG, NIST, PCI, HIPAA compliance standards. And Protect scans for vulnerabilities and patches and updates your operating systems.
  • 5
    Keyless Authenticator

    Keyless Authenticator

    Keyless Technologies

    Nothing to remember. Nothing to steal. You are the key. Adopt zero-trust authentication to protect your remote workforce and enable strong customer authentication with just a look. Anywhere. Any time. Any device. Embrace passwordless, multi-factor authentication to eliminate fraud, phishing and credential reuse – all while enhancing customer and employee experiences and protecting their privacy. Unique capabilities powered by unique technology. Hardware Agnostic. Since we do not rely on the device hardware or sensors, Keyless can be deployed on a large set of devices and appliances. Drive better outcomes for your organization by eliminating passwords. Top-Notch Security. No central honeypot, no data on user devices. Data can never be stolen or lost because no private information is accessible to anyone but the user. Reduce password associated costs by going passwordless. Password Reset Costs. The average helpdesk labor cost is estimated at $70.
  • 6
    Microsoft Defender Antivirus
    Microsoft Defender is an all-in-one security app designed to safeguard your identity, data, and devices from online threats. Available with Microsoft 365, it provides real-time protection against phishing, malware, and identity theft across Windows, macOS, iOS, and Android. Defender continuously monitors the dark web for potential identity breaches and sends alerts when your personal data is at risk. Families can protect up to 60 types of personal information with identity monitoring and get 24/7 restoration support in case of theft. Users also benefit from credit monitoring, monthly credit reports, and up to $1 million in identity theft insurance. Easy to use and deeply integrated into Microsoft 365, Defender keeps you and your loved ones secure wherever you connect.
  • 7
    Norton Password Manager
    Secures logins and more in your private, online vault. Creates complex passwords when you need them. Encrypts your information before it leaves your device. Use Safety Dashboard to help spot weaknesses in your logins. Create new, hard-to-break passwords with one click with Password Generator. Update and save them easily with Autochange. Your vault automatically keeps logins sync'd across all your devices. Access it quickly with Touch ID/Face ID or Android biometrics on your mobile devices.
  • 8
    Symantec Endpoint Protection
    Symantec Endpoint Security delivers the most complete, integrated endpoint security platform on the planet. As an on-premises, hybrid, or cloud-based solution, the single-agent Symantec platform protects all your traditional and mobile endpoint devices, and uses artificial intelligence (AI) to optimize security decisions. A unified cloud-based management system simplifies protecting, detecting and responding to all the advanced threats targeting your endpoints. Keep your business running. Compromised endpoints are highly disruptive to business. Innovative attack prevention and attack surface reduction delivers the strongest security across the entire attack life cycle (e.g., stealthy malware, credential theft, fileless, and “living off the land” attacks). Prevent the worst-case scenario. Full blown breaches are CISOs' worst nightmare. Deliver detection and remediation of persistent threats with sophisticated attack analytics and prevention of AD credential theft.
  • 9
    N-able N‑central
    Join the thousands of MSPs and IT professionals who use N-able™ N-central® to remotely monitor and manage devices and complex networks. Key features include: • Monitor almost any device, including support for Windows, Linux, and macOS • Gain complete insight across your network and cloud services without the need for extra network monitoring software • Create automated patch management policies to ensure devices are up to date • Streamline your workflow with drag-and-drop scripting in automation manager—no need to write a line of code • Provide remote support across devices and platforms with the integrated Take Control feature • Integrate your existing PSA software or use N-able MSP Manager to manage tickets and billing • Manage security with integrated backup, EDR, AV, and disk encryption • Available as an on-premises or hosted cloud solution to fit your business
  • 10
    SanerNow

    SanerNow

    SecPod Technologies

    SecPod SanerNow is the world's best unified endpoint security & management platform that powers IT/Security Teams automate cyber hygiene practices. It works on an intelligent agent-server model to execute effective endpoint management and security. It gives you accurate vulnerability management with scanning, detection, assessment, prioritization, and remediation capabilities. SanerNow is available on both cloud and on-premise, whose integrated patch management automates patching across all major OSs like Windows, MAC, Linux, and a vast collection of 3rd party software patches. What makes it unique? You can now access other salient features like security compliance management, IT asset management, endpoint management, software deployment, application & device control, and endpoint threat detection and response, all on a single platform. With SanerNow, you can remotely perform and automate these tasks to secure your systems from the emerging wave of cyberattacks.
    Starting Price: $50/year/device
  • 11
    miniOrange

    miniOrange

    miniOrange

    miniOrange is a premier Identity and Access Management platform offering Workforce and Customer Identity solutions to diverse industries from IT to eCommerce to manufacturing and many more. With miniOrange, you can configure Single Sign-On (SSO), Multi-Factor Authentication (MFA), set up custom rules or policies, and customize the login page for any cloud, on-premise, or in-house apps. Get pre-built integrations for 5000+ applications including legacy apps, cloud apps, and many more. Customers praise miniOrange’s outstanding support and their ability to provide customized solutions for unique use cases.
    Starting Price: $1 per user per month
  • 12
    BDRSuite

    BDRSuite

    Vembu Technologies

    BDRSuite by Vembu offers comprehensive and cost-effective Backup and Disaster Recovery software tailored to meet the diverse data protection requirements of Businesses and Service Providers. BDRSuite provides robust backup solutions for a wide range of IT workloads, including virtual machines, servers, endpoints, SaaS applications, cloud VMs, NAS/File Shares, and databases & applications. It offers the flexibility to store backups anywhere and centrally manage the entire backup infrastructure. BDRSuite is designed to help businesses keep their data secure and ensure it is easily recoverable in the event of data loss or ransomware attacks. With BDRSuite, businesses can achieve reliable data protection and ensure business continuity – all at an affordable price.
    Starting Price: $1.20/month
  • 13
    Prey

    Prey

    Prey

    Prey is a cross-platform Device Tracking & Security tool to stay in control of remote assets. Mobile device tracking, management, and data protection available for laptops, tablets and mobiles. It offers a range of services for both personal and corporate use. The software and service are developed by the Chilean company Prey Inc., successor of the funding company Fork Ltd. Prey started in 2009 as a small tech company with a sole purpose: helping people keep track of their devices. 13 years later, our service evolved into a trusted multi-tool for both people and businesses. It's a service that protects over 8 million devices and their data every day, all around the world. We are experts at tracking, protecting and managing your work and play tech tools. And a proud team of people willing to support you.
    Starting Price: $1.2 per month
  • 14
    Quicklaunch

    Quicklaunch

    Quicklaunch

    QuickLaunch is the #1 leader in Identity and Access Management (IAM) for Higher Education. More than 500 organizations trust QuickLaunch’s platform to manage over 2,000,000 identities and integrate over 3,000 applications worldwide. CIOs, CTOs, and CISOs use QuickLaunch IAM technologies to engage with students, faculty, and staff and protect them throughout their journey. QuickLaunch’s technology is vital in protecting the user experience, driving both operational efficiencies and higher productivity for colleges, universities, and institutions. Improves cyber security posture by protecting user accounts from being hacked and thwarting ransomware and phishing cyber attacks. Automatically provisions students from the Student Information System and employees from the Human Resources system so they can quickly get access to the apps they need when they matriculate and join.
    Starting Price: $0.73 per month
  • 15
    passbolt

    passbolt

    passbolt

    Finally, a password manager built for collaboration. Secure, flexible, and automation-ready. Trusted by 10,000 organizations, including Fortune 500 companies, newspapers, governments, and defense forces. Passbolt servers are designed to be simple to install and easy to manage. Yet they are enterprise-ready and can support complex setup for high availability. Passbolt can be used from your browser or mobile phone. Sharing happens in real-time. Desktop apps are coming soon. Retrieve, store and share passwords programmatically with the JSON API. Automate at scale with Passbolt CLI. Real-time access logs. Privacy is in our DNA, but also in the DNA of European laws (to make sure we don’t change our minds). Passbolt self-hosted source code comes under an AGPL license. Yes, even the commercial version. You are free to audit it, contribute to it, and redistribute it. This is why we have a healthy community of thousands of organizations in all sectors.
    Starting Price: €45/month/10 users
  • 16
    Devolutions Cloud
    Devolutions Cloud is a powerful, cloud-based solution designed to securely manage and store credentials and sensitive information for teams and organizations. Whether you're a small business or a large enterprise, Devolutions Cloud enables seamless password management with robust security features, including role-based access control, audit trails, and encryption. Accessible through any web browser, it simplifies credential sharing and management, while also integrating with other IT and security tools. Devolutions Cloud is the ideal solution for businesses looking to enhance security without compromising usability.
    Starting Price: $3 USD/month/user
  • 17
    Avast Small Business Solutions
    Avast Small Business Solutions deliver next-gen endpoint protection for business Windows PCs, Mac, and Windows servers that you can manage anywhere via a web browser. Our robust, easy-to-use security for devices, data, and applications is designed to keep small organizations and their employees safer online. Avast antivirus with multiple layers of security, online privacy, and remote-control features provides powerful cybersecurity controlled via a cloud-based management console. Avast Small Business Solutions are managed via cloud-based management console Avast Business Hub and consist of: * Avast Essential Business Security   * Avast Premium Business Security - combines our next-gen antivirus with VPN and USB control) * Avast Ultimate Business Security - award-winning next-gen antivirus with online privacy tools and patch management automation software
    Starting Price: $39.99/device/year
  • 18
    JumpCloud

    JumpCloud

    JumpCloud

    JumpCloud® delivers a unified open directory platform that makes it easy to securely manage identities, devices, and access across your organization. With JumpCloud, IT teams and MSPs enable users to work securely from anywhere and manage their Windows, Apple, Linux, and Android devices from a single platform. Everything in One Platform Grant users Secure, Frictionless Access™ to everything they need to do their work however they choose. Manage it all in one unified view. Cross-OS Device Management Manage Windows, macOS, Linux, iOS, iPad, and Android devices. One Identity for Everything Connect users to thousands of resources with one set of secure credentials. Comprehensive Security Enforce device policies, patches, MFA, and other security and compliance measures. Automated Workflows Connect to whatever resources you need, including Microsoft Active Directory, Google Workspace, HRIS platforms, and more.
    Starting Price: $9/user
  • 19
    Chargebacks911

    Chargebacks911

    Chargebacks911

    Chargebacks911® provides end-to-end chargeback management technology and support designed to help businesses reduce chargeback threats, recover lost revenue, and repair the operational and reputational damage caused by disputes and fraud. Its solutions combine technology, reporting, and expert guidance to improve outcomes across the full chargeback lifecycle. Built for merchants, acquirers, issuers, and other financial institutions, Cb911 supports a wide range of industries including eCommerce, travel, retail, and digital commerce. The platform is designed for fast, flexible implementation and is fully agnostic, with fast-track integrations and compatibility with current solutions. Cb911 emphasizes measurable results, pertinent reporting, enterprise-grade security, and broad ecosystem compatibility. The company highlights PCI Level 1 certification, SOC 2 compliance, and an extensive integration network designed to work with modern payment, fraud, and operational workflows.
    Starting Price: $99 per month
  • 20
    Snyk

    Snyk

    Snyk

    Snyk is the leader in developer security. We empower the world’s developers to build secure applications and equip security teams to meet the demands of the digital world. Our developer-first approach ensures organizations can secure all of the critical components of their applications from code to cloud, leading to increased developer productivity, revenue growth, customer satisfaction, cost savings and an overall improved security posture. Snyk’s Developer Security Platform automatically integrates with a developer’s workflow and is purpose-built for security teams to collaborate with their development teams. Snyk is used by 1,200 customers worldwide today, including industry leaders such as Asurion, Google, Intuit, MongoDB, New Relic, Revolut and Salesforce. Snyk is recognized on the Forbes Cloud 100 2021, the 2021 CNBC Disruptor 50 and was named a Visionary in the 2021 Gartner Magic Quadrant for AST.
    Starting Price: $0
  • 21
    USB-LOCK-RP

    USB-LOCK-RP

    Advanced Systems International

    USB Control & Lockdown Software to Block USB Devices Access and Lock USB Ports in Windows Systems. Centralized USB Device Management, Monitoring and Whitelisting to Protect Computers in a Network. USB Device Control is an important part of Endpoint Security Management and focuses in the protection of computer systems and data assets from threats posed by unauthorized USB device usage. Controlling USB devices access to endpoints is required to secure networks that control machinery or store sensitive information. - Centralized USB Device Management. - Secures Groups of Computer or Specific Computers. - Whitelists Specific Devices by Hardware ID and Blocks the rest. -Automatically apply Group 1 protection settings to unassigned clients. NEW! - Receives Alerts & Logs Device Connections in the Network Automatically. -Export Status and Alerts Reports to csv format (Comma-separated value)NEW! -Automatic Authorizations Mode, Whitelist USB devices across the network automatically. NEW
    Starting Price: $20 per client/one-time
  • 22
    ESET PROTECT
    Protect your company endpoints, business data and users with ESET's multilayered technology. ESET PROTECT platform offers customizable security solutions, easy to manage from a cloud console. Cyber risk management and visibility into your IT environment. Stay one step ahead of any known or unknown threats. Up-to-date information and customized notifications allow the IT staff to react promptly to any risks that may have developed. Smart predefined policies and automated tasks help IT admins save time and better protect against future attacks. Easily meet reporting requirements and save time with scheduled reporting and dozens of customizable templates. A user within your network might open a malicious email containing a new form of ransomware. Programmers who work with code on their work computers might tend to create false positives due to compiling software.
    Starting Price: $239 per year
  • 23
    Virtual Safe Business Professional
    Virtual Safe Business Professional is business software that allows you and your employees to manage virtual, encrypted directories in your IT infrastructure. Master Data Management: The individual virtual safes can be flexibly expanded to include master data. Expand your safes with an item or customer number or a processing status, for example. Safe-Search: You or your employees can then use the integrated search function to filter according to your master data. Master-Password: Critical operations can be secured with a master password and, of course, all safes can be opened with it. Collaboration: When working in a team, it is important that the software supports you. Therefore the type of access can be selected by the user. The software also recognizes when a safe is already being processed. In this case, all employees can still read the safe data. Company standards are mapped and distributed to business areas via common configuration directories.
    Starting Price: €49/user
  • 24
    USBSecure Enterprise

    USBSecure Enterprise

    Lugrain Software

    USBSecure Enterprise is a USB port security software. It protects your corporate network from unknown USB devices. You can define allowed USB devices in whitelists on a per-user basis. Centralized management - no dedicated server required. USBSecure Enterprise supports USB devices, Bluetooth devices, FireWire and eSATA devices, SD cards, floppy and CD/DVD drives. A special OT version is also available (Operational Technology). USBSecure supports English and German languages, but is customizable to any other language.
    Starting Price: $ 298 for 10 PCs
  • 25
    Vulert

    Vulert

    Vulert

    🛡️ Vulert - Real-time Open-Source Vulnerability Monitoring & Alerts! 🛡️ Why Vulert? 🤔 🔒 Privacy: No code sharing or installations required! Just upload your package manifest (e.g., package-lock.json) to get started. 🛡️ Security: Stay one step ahead of hackers! Receive real-time alerts before malicious activities occur, ensuring your website remains safeguarded and customer-ready. 💰 Save: Why hire security staff to track dependencies when we've got you covered for FREE! Vulert's basic version is Free Forever! 🆓 🌐 For Open Source Organizations: Enjoy 100% FREE access to our powerful features! 🇬🇧 Made in the UK with love! ❤️ Discover Vulert today and fortify your software against vulnerabilities, effortlessly! 💪
    Starting Price: $25/month
  • 26
    Psono

    Psono

    esaqa GmbH

    Psono is a self-hosted, open-source password manager designed to safeguard your data. It encrypts and stores your credentials, ensuring only you have access. You can also securely share encrypted access with your team. With a rich set of features, Psono makes data management and password retrieval simpler than ever. Its robust security includes client-side encryption for genuine end-to-end password sharing, supplemented by SSL and storage encryption. The entire code is open for transparent public auditing, emphasizing that true security lies in proper encryption rather than concealing flaws. Hosting Psono on your server offers enhanced access control, eliminating the need to depend on public services for data storage. Psono stands out as one of the most secure password managers, prioritizing the online safety of its users on their servers.
    Starting Price: Free
  • 27
    ixBrowser

    ixBrowser

    Fuzhou Insight Network Technology

    ixBrowser is an ultimate secure anti-detect browser designed to revolutionize business scalability. With our cutting-edge stealth browser technology, online marketing professionals can now effortlessly manage multiple online profiles while evading account bans. Our virtual profiles boast fully customizable fingerprints that seamlessly mimic native and unique identities. Rest assured, our platform is fortified with industry-leading encryption, ensuring the utmost security for your profiles - to the extent that even we cannot access their contents. Experience the power of ixBrowser and unlock unprecedented growth opportunities for your business.
    Starting Price: $0 (Proxy start from $2.25)
  • 28
    SolarWinds Server & Application Monitor
    SolarWinds® Server & Application Monitor (SAM) is designed to monitor your applications and their supporting infrastructure, whether running on-premises, in the cloud, or in a hybrid environment. Don’t let slow applications and downtime impact your end users and business services. Pinpoint the root cause of application issues across various layers of the IT stack. Automatically discover your application’s environment and start monitoring, typically in about an hour. No professional services or consultation needed.
  • 29
    DNSFilter

    DNSFilter

    DNSFilter

    DNSFilter is a cloud-based security solution that provides DNS-level protection against online threats and unwanted content. Leveraging its proprietary AI engine, Webshrinker, DNSFilter continuously scans and categorizes over 180 million websites, enabling real-time blocking of malicious domains, phishing sites, and inappropriate content. The platform offers flexible deployment options, including agentless setups and roaming clients for various operating systems, ensuring comprehensive coverage for both on-site and remote users. With features like intuitive reporting, customizable filtering policies, and compliance with regulations such as CIPA, DNSFilter serves diverse sectors, including education, healthcare, and enterprise environments. Additionally, its global Anycast network ensures rapid DNS resolution, enhancing both security and performance for its users.
    Starting Price: $20/month
  • 30
    Countly

    Countly

    Countly

    Countly is a product analytics solution and innovation enabler that helps organizations track product performance and user journey and behavior across mobile, web, and desktop applications. Ensuring privacy by design, it allows organizations to innovate and enhance their products to provide personalized and customized customer experiences, and meet key business and revenue goals. Track, measure, and take action - all without leaving Countly.
MongoDB Logo MongoDB