Best IT Security Software for Windows - Page 24

Compare the Top IT Security Software for Windows as of October 2025 - Page 24

  • 1
    LevelBlue USM Anywhere
    Elevate your security with LevelBlue USM Anywhere, an advanced open XDR platform designed to scale with your evolving IT landscape and growing business needs. Combining sophisticated analytics, robust security orchestration, and automation, USM Anywhere offers built-in threat intelligence for quicker and more precise threat detection, as well as streamlined response coordination. Its flexibility is unmatched, with extensive integrations—referred to as BlueApps—that enhance its detection and orchestration across hundreds of third-party security and productivity tools. These integrations also enable you to trigger automated and orchestrated responses effortlessly. Begin your 14-day free trial now and discover how our platform simplifies cybersecurity.
  • 2
    WSO2 Identity Server
    WSO2 Identity Server is API-driven, is based on open standards with the deployment options of on-premise, cloud or hybrid. It supports complex IAM requirements given its high extensibility. WSO2 Identity Server helps you do single sign-on and identity federation backed by strong and adaptive authentication, securely expose APIs, and manage identities by connecting to heterogeneous user stores. Leverage the power of open-source IAM in your enterprise to innovate fast and build secure Customer IAM (CIAM) solutions to provide an experience your users will love
  • 3
    Avatier Identity Anywhere
    Introducing Identity Anywhere, the world’s first Identity Management solution based on Docker containers making it the most portable, scalable and secure solution on the market. Docker container technology allows Identity Anywhere to run anywhere: on any cloud, on premise or a private cloud instance hosted by Avatier. Avatier Identity Management products brings separately administered back office applications and assets together to manage them as one system. Now armed with a unified digital dashboard, C-level executives deliver measurable business growth and increased profits. Eliminate the #1 Help Desk request with military grade self-service password reset. Reduce Costs. Only pay for the cloud app licenses you need. Maximize company utilization with a phenomenal shopping cart experience. Avoid fines, lawsuits, negative publicity, and even jail time due to non-compliance.
    Starting Price: $5.00/one-time/user
  • 4
    Deep Log Analyzer

    Deep Log Analyzer

    Deep Software

    Advanced and affordable web analytics solution for small and medium size websites. Analyze web site visitors’ behavior and get the complete website usage statistics in several easy steps! With Deep Log Analyzer website statistics and web analytics software you’ll know exactly where your visitors come from and how they move through your website. This software will help you to attract more visitors, optimize your website and convert more visitors to satisfied customers. Analyze logs from Microsoft IIS, Apache or Nginx web server from any hosting provider and get web analytics reports. Run it on your Windows computer or server. View reports on Top web pages, Referral websites, Search engines & phrases, bots/spiders, browsers and OS's, server errors and more with Deep Log Analyzer. Export to HTML or Excel. Deep Log Analyzer is a highly configurable web analytics software. Create your own custom reports or tailor any of the 50+ included reports using SQL language.
    Starting Price: $299.95 one-time payment
  • 5
    Praetorian Chariot
    Chariot is the first all-in-one offensive security platform that comprehensively catalogs Internet-facing assets, contextualizes their value, identifies and validates real compromise paths, tests your detection response program, and generates policy-as-code rules to prevent future exposures from occurring. As a concierge managed service, we operate as an extension of your team to reduce the burden of day-to-day blocking and tackling. Dedicated offensive security experts are assigned to your account to assist you through the full attack lifecycle. We remove the noise by verifying the accuracy and importance of every risk before ever submitting a ticket to your team. Part of our core value is only signaling when it matters and guaranteeing zero false positives. Gain the upper-hand over attackers by partnering Praetorian. We put you back on the offensive by combining security expertise with technology automation to continuously focus and improve your defensive.
  • 6
    Core Access Insight
    Core Access Insight offers a continuous, comprehensive view and analysis of the relationship between identities, access rights, policies, and resources that occur across your entire environment. Our easy-to-use, easy-to-understand solution applies analytics to the big identity and access data in your organization, empowering you to identify identity-related access risks, and drive provisioning and governance controls to manage that risk within your business. With Access Insight, your governance system does more than just manage access. It provides access intelligence to analyze the identity and access data in your organization, using advanced analytics tools. This enables you to perform data mining, statistical analysis, and data visualization—drawing on specific governance policies, rules, and risk indicators to provide intelligence and valuable information for administrators, analysts, compliance officers, and incident responders.
  • 7
    RMail

    RMail

    RPost

    RMail® is the e-security platform by RPost®, a global leader since 2000. RMail specializes in elegantly easy to use email encryption for privacy and compliance, e-signatures, legal e-delivery proof, secure file sharing, email impostor protection, document rights management, and AI-infused services to prevent data leaks and human e-security errors. RMail’s transmission e-security services are most often used by businesspeople or business systems that send important, sensitive, or consumer-regulated information. These RMail services are generally applied to those messages where the sender needs functionality beyond standard email in terms of (a) easier to use and more automated email encryption for privacy compliance, (b) returning a verifiable proof record of who said what to whom by email, (c) assurance and peace of mind related to delivery and open status of important and time-deadline email, (d) need a timestamped proof of content delivered, (f) need to share large files securely.
    Starting Price: $7/month/user
  • 8
    AnVir Task Manager Pro
    Windows task manager processes, windows xp slow startup, windows startup programs, Vista tweaks. Control everything running on the computer, remove Trojans, speed up computer. AnVir Task Manager Pro provides convenience by offering all of its features in a single interface. It saves money because users won't have to buy multiple packages to perform a family of related tasks. Terminate processes that can not be terminated via Windows Task Manager. Temperature of CPU, video card, external USB HDD. Download and upload speed, amount of transferred data for network connections. Find locked files and DLL. Log of processes start and stop. Graph of processor, memory and disk activity for each process. Threads, handles, performance counters. Startup manager: manage all programs running on startup including services, Internet Explorer toolbars, Scheduler tasks.
    Starting Price: $49.95 one-time payment
  • 9
    Activu

    Activu

    Activu

    Activu makes any information visible, collaborative, and proactive for people tasked with monitoring critical operations and incidents. Our customers automatically see, share, and respond to events in real-time, with context, to improve incident response, decision-making, and management. Activu software, systems, and services benefit the daily lives of billions of people around the world. Founded in 1983 as the first U.S.-based company to develop video wall technology, more than 1,000 control rooms and command centers depend on Activu. The most Intuitive, Flexible, Feature rich wall control on the market. Organize information easily based on specific user needs. Easily create Layouts and Templates based on user needs. Organize, place and even move information across multiple video walls. Organize information assets in easily accessible, searchable Spaces. Support for virtually any information source type.
  • 10
    Plurilock DEFEND

    Plurilock DEFEND

    Plurilock Security

    Plurilock DEFEND provides true real-time authentication for the duration of an active computing sessions using behavioral biometrics and the computing devices your employees already use. DEFEND relies on a lightweight endpoint agent and proprietary machine learning techniques to confirm or reject user's identity with very high accuracy based on their console input stream, without authentication steps that are evident to the user. By integrating with SIEM/SOAR, DEFEND can be used to triage and respond to SOC alerts with high-confidence identity threat intelligence. By integrating with login and application workflows, DEFEND provides just-in-time biometric identity behind the scenes, enabling login workflows to be skipped when biometric identity is already in a confirmed state. DEFEND supports Windows endpoints, Mac OS endpoints, and IGEL and Amazon Workspaces thin and VDI clients.
    Starting Price: $9 per user per month
  • 11
    INETCO Insight

    INETCO Insight

    INETCO Systems Ltd.

    INETCO Insight is more than a transaction monitoring tool; it is a critical software platform for financial institutions and payment service providers focused on ensuring operational excellence, enhancing customer experience and mitigating risk in real-time. With a 360-degree view of the customer journey, you can manage the end-to-end experience, optimize decision-making and detect potential issues before they impact customers. By investing in this advanced real-time transaction monitoring platform, you are not only protecting your operations today but also positioning your organization for continued success in an increasingly fast-paced and demanding financial landscape.
  • 12
    SoftActivity Monitor

    SoftActivity Monitor

    Deep Software Inc.

    User monitoring software that helps protect organizations from insider threat. This employee monitoring software lets you view your users' web browsing history, applications usage log, screen, accessed files, email and more. View remote screens in real time and get historical logs and reports.
    Starting Price: $189.95/one-time
  • 13
    Protegrity

    Protegrity

    Protegrity

    Our platform allows businesses to use data—including its application in advanced analytics, machine learning, and AI—to do great things without worrying about putting customers, employees, or intellectual property at risk. The Protegrity Data Protection Platform doesn't just secure data—it simultaneously classifies and discovers data while protecting it. You can't protect what you don't know you have. Our platform first classifies data, allowing users to categorize the type of data that can mostly be in the public domain. With those classifications established, the platform then leverages machine learning algorithms to discover that type of data. Classification and discovery finds the data that needs to be protected. Whether encrypting, tokenizing, or applying privacy methods, the platform secures the data behind the many operational systems that drive the day-to-day functions of business, as well as the analytical systems behind decision-making.
  • 14
    ActiveData

    ActiveData

    Information Active

    ActiveData For Excel® adds advanced data analytics capabilities and time saving workbook and worksheet management features to Microsoft Excel®. With ActiveData for Excel you can join, merge, match, query, summarize, categorize, locate duplicate and missing items, combine, split, splice, slice and dice your data. Over 100 features, many designed to increase your overall productivity with Excel are included in this easy-to-use package. ActiveData for Excel offers a feature-rich product at a fraction of the price of competitive database-driven data analytics and computer assisted audit tools (CAATS). Skills acquired using ActiveData are directly transferrable to other data analysis software packages and computer-assisted audit tools (CAATs) like ACL and IDEA. Our software works well side by side with these packages and is ideal for less technical users. ActiveData for Excel is available in a Business and Professional edition and works with Microsoft Excel 2007 to 2019.
    Starting Price: $129 one-time payment
  • 15
    Active Wall

    Active Wall

    Active Network CO

    Active Wall uses the middle layer drivers developed independently as the filter engines, which are more low-leveled than other software which uses WinPCap. Because WinPCap is a protocol-type driver, it can only monitor but not block. The other software which uses WinPCap can only block TCP communications, but cannot block UDP, ICMP, IGMP data packets. It has been proved that Active Wall is more stable, correct and effective after working online for a long time. Most similar software support the only one mode- Passby monitoring mode. Besides the Passby mode, Active Wall supports more modes including Gateway mode, Bridge mode and Single mode. It is recommended that the users should use the Gateway mode or the Bridge mode. When using the Passby mode, Active Wall can only block TCP data packets for the limit of the network topology. However, the Gateway mode or the Bridge mode enables the Active Wall to block all kinds of data packets.
    Starting Price: $10 per user
  • 16
    STOPzilla AntiVirus
    Active scanning quickly removes malware and prevents new infections in real-time. Hourly virus definition updates make sure the very latest infections are targeted. Improved smart web filter blocks malicious web sites from stealing your information. Works silently in the background. Will not impact computer performance. STOPzilla AntiVirus 8.0 detects viruses and malware in real-time before it is even saved to the hard drive. Preventative, faster detection than previous versions gives you the best antivirus protection possible. Many viruses and malware threats are designed to interfere with the operation of AntiVirus/AntiMalware products. STOPzilla AntiVirus 8.0 is designed to thwart this type of interference allowing the product to provide uninterrupted protection. Our smart Web Filter is a cloud based URL scanning utility that is updated with newly discovered threats every 5 seconds, protecting you from malicious websites that steal end-user information.
    Starting Price: $39.95 per year
  • 17
    Polar Crypto Component
    Polar Crypto Component gives your Windows applications the functionality of unbreakable encryption. It enables you to build your own security systems instantly, or to easily integrate it into your existing systems, enhancing their security and performance. Polar Crypto features the latest encryption technology and includes full source code written in MS Visual C++ included. Polar Crypto is an ActiveX and DLL component which can be implemented whenever secure information, authenticity and data integrity are needed. In all applications developed for conducting business transactions, where absolute confidentiality is needed. For digital signature creation and validation. In e-commerce web site applications that store sensitive information such as clients’ credit card details. In desktop applications that encrypt confidential files on your computer or computer network.
    Starting Price: $239.00/one-time/user
  • 18
    Net Monitor for Employees
    Employee monitoring software has become an essential tool for tracking your employee activity to increase productivity in offices. It happens many times that many team members spare their time in watching unnecessary content on the Internet or using your resources for their personal use or just spending time in web browsing. Employee monitoring is an established method used by many companies to help prevent and detect data breaches that can cost their business a fortune. It is an effective way to boost workers' engagement and optimize working processes. Computer monitoring gives companies an overall picture of how work is done in and out of the office. By using computer surveillance software an organization can lower risk and become more profitable. Gathered data can be used for analyzing bottlenecks, unusual patterns, and other potential issues.
    Starting Price: $99.95 one-time payment
  • 19
    AgenaRisk
    AGENARISK uses the latest developments from the field of Bayesian artificial intelligence and probabilistic reasoning to model complex, risky problems and improve how decisions are made. You can use AgenaRisk models to make predictions, perform diagnostics and make decisions by combining data and knowledge about complex causal and other dependencies in the real world. Our clients use AgenaRisk to model a variety of problems involving risk and uncertainty including operational risk, actuarial analysis, intelligence analysis risk, systems safety and reliability, health risk, cyber-security risk and strategic financial planning. AgenaRisk designs and markets groundbreaking products using Bayesian Network technology. Our technology and accompanying methodology has been published in top academic AI, machine learning, actuarial, decision science and cognitive science journals.
  • 20
    602LAN SUITE

    602LAN SUITE

    Software602

    We digitize with the Sofa application. Electronic signatures with approval workflow and document vault. In the company at the office or at the home office. Simply. Digitally. Online application for fast digitization of companies and offices. Management of documents, data messages and processes with electronic signatures, intuitive workflow and archive. You can have it in the cloud in the office and at the home office. Up-to-date information on topics such as circulation, approval, document management using DMS systems, trusted digital archiving, qualified services, eIDAS regulations, electronic signatures and seals, timestamps, business processes and workflows. How to get rid of unnecessary paperwork and use time efficiently. There is an eBook Paperless office on this topic. Here you will find answers not only to how to cleverly digitize the office, but much more. Just one click and you have everything with you. Simply and digitally.
    Starting Price: $299.95/one-time/user
  • 21
    Max Secure Spyware Detector

    Max Secure Spyware Detector

    Max Secure Software

    Most enhanced multi-layer protection combines multiple engines – white list, black list, anti-virus, anti-adware, patterns, gibberish identification, heuristic detection along with artificial intelligence and dynamic emulation and debugger – to identify advanced malware. Threat community applies behavioral analytics to find most recent, most active malware on user's PCs. Block bad websites by categories, configure them as you like. Run this tool and block any ransomware from encrypting data. Multi-threaded Scan engine with enhanced detection. Advance Active Monitor to protect against all types of Malware. Anti-Phishing to protect against all online threats. Application white listing ensures only known applications execute. Advance USB manager. Ransomware protection. Artificial intelligence with machine learning for Zero Day Malware detection. Anti-Theft: Lost laptop tracker.
    Starting Price: $31.83 per user per year
  • 22
    FastStats Log Analyzer

    FastStats Log Analyzer

    Mach5 Development

    Your log files are a gold mine of information about not only your web site, but your business. Understanding your web site traffic patterns -- seeing your web site through your potential customer's eyes -- is key to improving your business. Web server log files give you a view into your customer's activity and can help you tune your web site to acquire new customers. FastStats Log Analyzer is a powerful, quick, and inexpensive way to sift through gigabytes of logs and produce easy-to-understand summaries of your web site traffic. Are you spending $0.75 per click on your Google advertising, but only receiving $0.56 per click in revenue? FastStats is designed to help you determine your revenue per click, which you can use to price your Google advertisements. Use FastStats' Hyperlink Tree View to graphically see how customers move through your web site. FastStats is aptly named, and can process logs 40x faster than WebTrends, the industry leader.
    Starting Price: $99.95 one-time payment
  • 23
    Log2Stats

    Log2Stats

    BitStrike Software

    Log-to-Stats is a modern solution to get your website stats from web server log files. The software manages all your web log files and converts them into a statistics database. Then you can either look at your website stats using interactive and detailed reports or save them to html or other format. Log-to-Stats makes it easy to view how the stats changes over time and compare web traffic reports for different date ranges or special conditions.
    Starting Price: $299.95 one-time payment
  • 24
    Black Duck

    Black Duck

    Black Duck

    Black Duck, part of the Synopsys Software Integrity Group, is a leading provider of application security testing (AST) solutions. Their comprehensive portfolio includes tools for static analysis, software composition analysis (SCA), dynamic analysis, and interactive analysis, enabling organizations to identify and mitigate security vulnerabilities throughout the software development life cycle. By automating the discovery and management of open-source software, Black Duck ensures compliance with security and licensing standards. Their solutions are designed to help organizations build trust in their software by managing application security, quality, and compliance risks at the speed their business demands. Black Duck empowers businesses to innovate securely and deliver software with confidence.
  • 25
    DBHawk

    DBHawk

    Datasparc

    Using DBHawk, our customers were able to comply with GDPR, HIPAA, SOX, GLBA, and other regulations and were able to implement SOD. Self-Service BI & Ad-Hoc Reporting Tool with feature to define Data Access Policy, Connect to multiple Data sources, Build Powerful SQL Charts and data Dashboards. DBHawk SQL editor is an advanced editor that allows users to build, edit, and run database queries with a web-based interface. DBHawk Query Builder is supported with all major databases such as Oracle, Microsoft SQL Server, PostgreSQL, Greenplum, MySQL, DB2, Amazon Redshift, Hive, Amazon Athena. Database SQL tasks and batch job automation with a web-based centralized tool. Secure access to SQL, NoSQL and Cloud databases with our all-in-one data platform. Trusted by our customers to protect and access their data. Centralized Security, Auditing and insights about your user’s activities.
    Starting Price: $99.00/month/user
  • 26
    Uptycs

    Uptycs

    Uptycs

    Uptycs is the first unified CNAPP and XDR platform. Reduce risk by prioritizing responses to threats, vulnerabilities, misconfigurations, sensitive data exposure, and compliance mandates. With Uptycs, you can protect your entire enterprise, from laptops and servers to public and private cloud infrastructure. The platform streamlines your response to threats and offers a single UI and data model for easy management. Uptycs ties together threat activity as it traverses on-prem and cloud boundaries, delivering a more cohesive security posture. If you're looking for a powerful security solution that eliminates silos and tool sprawl, Uptycs is the answer. Looking for acronym coverage? We have you covered, including CNAPP, CWPP, CSPM, KSPM, CIEM, CDR, and XDR. Start with your Detection Cloud, Google-like search, and the attack surface coverage you need today. Be ready for what’s next. Shift up with Uptycs.
  • 27
    SolarWinds Network Configuration Manager
    Automate network configuration management and compliance, which can help save time and optimize IT resources. Reduce cost, save work hours, and remain compliant with automated network configuration management and backup. Stop worrying whether inventory spreadsheets and lists are accurate, up-to-date, and reliable. With SolarWinds® Network Configuration Manager (NCM), you can quickly build an accurate inventory of your network devices by using network scanning and discovery to obtain up-to-date information on all network devices. When it comes to network configuration management, it’s critical to quickly and precisely compare configurations for a number of reasons. Some examples could be to check against security policies, to ensure there are no discrepancies between running and saved configs, and to quickly identify and fix unauthorized or failed changes. Automation of network configuration management simplifies processes like scheduling regular backups.
    Starting Price: $2,995 one-time fee
  • 28
    Privileged Access Management
    Secure your most sensitive accounts in minutes with Imprivata Privileged Access Management. Privileged accounts, those with the highest level of access, pose a greater security risk than the average end user because of the degree of sensitive information that could be exposed. This risk isn’t lost on hackers, which is why 80% of security breaches involve compromised privileged credentials. Legacy PAM solutions are complex and resource-intensive, often requiring costly engagements with outside consultants. Imprivata Privileged Access Management combines all the features of a traditional enterprise-grade solution but with zero clients and server footprint. Incorporate the principle of least privilege by providing just enough access to complete a task through granular policy control at the system level. Get going in just minutes with a completely agentless architecture that helps you meet wide-ranging compliance requirements quickly.
    Starting Price: $25 per month
  • 29
    AVX ONE

    AVX ONE

    AppViewX

    AVX ONE is the most advanced SaaS certificate lifecycle management (CLM) platform for enterprise PKI, IAM, security, DevOps, cloud, platform and application teams. With visibility, automation and control of certificates and keys, AVX ONE enables crypto-agility to rapidly respond to cryptographic changes, mitigate threats, prevent outages and prepare for Post-Quantum Cryptography. In one unified platform, AppViewX provides instant value via enterprise-wide CLM, Kubernetes and container TLS automation, scalable PKI-as-a-Service, easy Microsoft PKI modernization, secure code signing, IoT identity security, SSH management, and Post-Quantum Cryptography (PQC) readiness with AI and ML risk reduction capabilities in complex hybrid, multi-cloud and edge environments.
  • 30
    NTFS Permissions Reporter
    Get your easy-to-use NTFS permissions tool to analyze and report NTFS security! Report NTFS permissions in a nicely formatted Excel sheet or HTML report. Report effective NTFS permissions owner to the owner of the data. Get User-specific effective NTFS permissions of a share or folder and its hierarchy. You can save any Permissions Report using Company Edition or Enterprise Edition to either a local built-in database or an external Microsoft SQL Server, to load it at any time to see the differences. Keep your NTFS Permissions Report clean and exclude any Active Directory security groups from the scan. There is no need to report the names of known accounts, e.g. backup operator or share operator. In case there are some special ACEs set to folders you can translate these security settings to meaningful labels.
    Starting Price: €997 per year