Best IT Security Software for Windows - Page 39

Compare the Top IT Security Software for Windows as of December 2025 - Page 39

  • 1
    Topicus KeyHub
    Topicus KeyHub offers Privileged Access Management for people. Gain easy and secure access to containers, sensitive data and production environments with privileged access management. KeyHub provides just-in-time access and enforces least privilege principles.
  • 2
    Aspida Mail
    Aspida Mail was developed with simplicity in mind. We know it's important for you to be able to continue with business as usual. Aspida Mail's setup is seamless and works with any IMAP enabled device. Aspida is HIPAA compliant encrypted email.
  • 3
    FortiEDR

    FortiEDR

    Fortinet

    Fortinet announced the acquisition of enSilo, Inc., a leading provider of advanced endpoint security. The combination of Fortinet and enSilo further enhances the Fortinet Security Fabric by providing enterprises with a full suite of endpoint detection and response (EDR) capabilities designed to automate the protection against advanced threats, pre and post-execution, with real time orchestrated incident response functionality. enSilo’s integration with Fortigate firewalls, FortiSIEM, FortiSandbox and FortiClient, helps enterprises gain superior endpoint visibility and tightly coordinated, dynamic control of network, user, and host activity within their environment. Likewise, service providers can extract the full value of such integration and deliver a comprehensive and efficient managed detection and response (MDR) service.
  • 4
    Resolve

    Resolve

    Resolve Systems

    Resolve is the #1 IT automation and orchestration platform, powering more than a million automations every day from simple, high-volume tasks to incredibly complex processes that go well beyond what you imagine is automatable. With more than a decade of automation expertise under our belts, we know how to build an intelligent automation and orchestration platform to meet the growing demands faced by today’s IT Operations and Network Operations teams. In fact, millions of automations are powered by Resolve on a daily basis… many of which go well beyond what you imagine is automatable. We know it sounds impossible, but it’s true. Just ask the customers who have cracked the code on tough automations like PIM testing, updating active load balancers, CUCM onboarding in seconds, true end-to-end patch management, interacting with Watson for NLP, maintaining infrastructure in segregated networks and hybrid cloud deployments, and more. Keep reading to see how we do it.
  • 5
    NetScaler

    NetScaler

    Cloud Software Group

    Application delivery at scale can be complex. Make it simpler with NetScaler. Firmly on-prem. All-in on cloud. Good with hybrid. Whichever you choose, NetScaler works the same across them all. NetScaler is built with a single code base using a software-based architecture, so no matter which ADC form factor you choose — hardware, virtual machine, bare metal, or container — the behavior will be the same. Whether you are delivering applications to hundreds of millions of consumers, hundreds of thousands of employees, or both, NetScaler helps you do it reliably and securely. NetScaler is the application delivery and security platform of choice for the world’s largest companies. Thousands of organizations worldwide — and more than 90 percent of the Fortune 500 — rely on NetScaler for high-performance application delivery, comprehensive application and API security, and end-to-end observability.
  • 6
    ContentProtect

    ContentProtect

    Content Watch

    ContentProtect helps increase productivity by blocking inappropriate or time wasting web content. With the powerful cloud-based administration tools you can make changes and see reports anywhere and anytime. ContentProtect Professional is the perfect solution for managing the Internet use of your employees, both in and out of the office, with a powerful and real-time content analysis engine to categorize web content in real-time. This engine can accurately filter out the content and websites you don’t want your employees viewing. ContentProtect Professional makes managing the settings for all your users easy and accessible anywhere. The web based administration console “in the cloud” allows Administrators to view reports, manage, and make changes to Internet policies, and permit or terminate Internet access, anywhere and at any time. Administrators have actionable data via the web based administration console.
    Starting Price: $39.99
  • 7
    Securly Filter
    Keep your students safe on all devices—including Chromebooks, iPads, Macs, and Windows devices—with Securly’s signature cloud-based web filter for schools. Get full visibility into online activity, download or email reports, and receive notifications for flagged content with the most sophisticated AI engine in student safety. Filter, a cloud-based web filter designed specifically for schools, helps you keep students safe with powerful features that make your school safer and your IT team happier. Get visibility into online activity, download or email reports, and block inappropriate sites instantly. Stay up-to-date with no bulky hardware, software crashes, agents, or network bottlenecks. Google, Azure, and Active Directory authentication using G Suite or Office 365. Chromebooks. iPads. Macs and PCs. Filter safeguards students across any device or operating system.
  • 8
    UltraBac

    UltraBac

    UltraBac

    Mountable image backup for on-premise and cloud file/folder level recoveries with fast bare metal recovery. Continuous replication to low cost Azure storage with unlimited recovery points for near instant failover/migration. Continuous replication to low cost Azure storage with unlimited recovery points for near instant failover/migration. UltraBac's flexible and multi-faceted products provide you with choices in configuring a backup and disaster recovery solution that fits your organization's needs and budget. To begin the process, simply answer a few questions below and an UltraBac specialist will contact you within 24 hours to discuss your options. Once the BDR configuration has been tailored for your business, a custom quote can then be generated using any competitive, educational, or quantity discounts that may be applicable, for the ultimate in cost savings.
  • 9
    Armor Anywhere

    Armor Anywhere

    Armor Cloud Security

    Whether your data is stored in a cloud environment (private, public, or hybrid) or you’re hosting it onsite, Armor will keep it safe. We’ll help you zero in on real threats and filter out the rest with powerful analytics, workflow automation, and a team of experts working day and night. When (not if) there is an attack, we don’t just send an alert. Our Security Operations Center experts are on it immediately, guiding your security team on how to respond and resolve the problem. Our solutions prefer open source software and open frameworks, and cloud-native implementations freeing you from conventional provider lock-in. Our IaC-based continuous deployment model easily integrates into your existing DevOps pipeline, or we can manage the stack for you. We aim to empower your business by making security and compliance accessible, understandable, and easy to implement and maintain.
  • 10
    Imperva Runtime Protection
    Imperva Runtime Protection detects and blocks attacks from inside the application. Using patented LangSec techniques which treat data as code, Imperva Runtime Protection has full context of potentially malicious payloads before the application completes its processes. The result? Fast and accurate protection with NO signatures and NO learning mode. Imperva Runtime Protection is a key component of Imperva’s market-leading, full stack application security solution which brings defense-in-depth to a new level.
  • 11
    Polaris Software Integrity Platform
    The Polaris Software Integrity Platform™ brings the power of Black Duck Integrity products and services together into an integrated, easy-to-use solution that enables security and development teams to build secure, high-quality software faster. Elastic capacity and concurrent scanning optimize application scan times. And Polaris scales to support thousands of applications. With Polaris, there is no hardware to deploy or software to update, and no limits on team size or scan frequency. Onboard and start scanning code in minutes, and automate testing easily with built-in SCM, CI, and issue-tracking integrations. Polaris brings our market-leading security analysis engines together in a unified platform, giving you the flexibility to run different tests at different times based on application, project, schedule, or SDLC events.
  • 12
    Adaptiva OneSite Anywhere
    Adaptiva OneSite Anywhere enables IT admins to exert total visibility and control over all endpoints, regardless of where they are – at home, at work, or at a coffee shop. With most employees working remotely, content delivery – getting patches, updates, and operating systems to endpoints quickly and without creating issues with production traffic, bandwidth degradation, and software delivery success rates – is even more difficult, especially over VPN. OneSite Anywhere helps you securely manage endpoints at unprecedented speed and scale whether they are on premise, connected remotely over VPN, or on the Internet without a VPN connection. OneSite Anywhere combines the world’s most advanced software distribution engine with a new, revolutionary cloud architecture to seamlessly extend the boundaries of the enterprise network to cover the entire internet.
  • 13
    TozID

    TozID

    Tozny

    An SSO and Customer Identity Management platform with privacy and end-to-end encryption built in. Centralize Access Control without centralizing your security risk. Our cryptography-at-the-edge approach delivers identity protection where you need it – secure your customer’s accounts with strong encryption and a customizable UI, or streamline protected access for your business and employees with SSO. All the features you expect – including SAML & OIDC support along with push-based MFA and more. Here are a few key features we think you’ll love! Administrators have the keys to the kingdom. Moving to zero-trust means protecting admin accounts from hacks and malicious insiders. Tozny's Privileged Access Manager (PAM) is built directly into our single sign-on solution. Get advanced protection for any endpoint and any 3rd party with Tozny PAM.
  • 14
    Netspark

    Netspark

    Netspark

    Web filtering solutions that let you create an internet you want to use. Netspark’s unique approach to filtering provides access to more content, without increased risk of exposure. Multiple filtering levels as well as Custom Mode empowers users to define the Internet they want access to. We offer solutions for both network-side and on‑the‑go protection. Choose from a complete range of flexible and affordable deployment options. Netspark’s filtering solution was born from the understanding that what users really need is a content filtering tool focused on enabling access to content, not just blocking it. Our unique algorithms and machine learning engines work together to contextually understand web content and the value it offers our users, prior to filtering out any inappropriate elements.
  • 15
    Somansa Privacy-i
    As more corporate information is stored in company desktops, laptops, mobile devices, and servers and copied or transferred to removable storage such as USB, DVD, through applications, and other channels, the liabilities and amount of resources exhausted for companies have also increased. Confidential and sensitive data leakage, meeting compliance requirements, and legal lawsuits can all lead to financial and resource loss for organizations of all sizes and industries, healthcare, financial, and government. Somansa Privacy-i is a endpoint data loss prevention (DLP) solution to protect personal and confidential data stored in company desktops, laptops, mobile devices, and servers and monitors, discovers, and secures confidential data based on policy rules to prevent copy and transfer to USB, CD/DVD, Printing, Wi-Fi/Bluetooth, and applications.
  • 16
    Cyberwatch

    Cyberwatch

    Cyberwatch

    Manage all your vulnerabilities, from their detection to their correction. Cyberwatch helps you to get a complete and contextualized list of assets and technologies in your Information System. Cyberwatch continuously searches for vulnerabilities published by the authorities (CERT-FR, NVD...) and present on your IT assets. Cyberwatch evaluates your vulnerabilities based on their CVSS score, the existence of an exploit, and the business context of the affected machine. Cyberwatch lets you make the right decisions using dashboards and simple actions (comment, exclude...). Cyberwatch natively embeds a Patch Management module, compatible with your infrastructure (WSUS / RedHat Satellite...). Define your compliance rules and control your information system. Cyberwatch helps you to get a complete and contextualized list of assets and technologies in your Information System. Cyberwatch allows you to define your objectives thanks to an encyclopedia of rules with pre-sets.
  • 17
    VMware Workstation Pro
    VMware Workstation Pro is the industry standard for running multiple operating systems as virtual machines (VMs) on a single Linux or Windows PC. IT professionals, developers and businesses who build, test or demo software for any device, platform or cloud rely on Workstation Pro. VMware Workstation Pro allows you to run multiple operating systems at once on the same Windows or Linux PC. Create real Linux and Windows VMs and other desktop, server, and tablet environments, complete with configurable virtual networking and network condition simulation, for use in code development, solution architecting, application testing, product demonstrations and more. Securely connect with vSphere, ESXi or other Workstation servers to launch, control and manage both virtual machines (VMs) and physical hosts. A common VMware hypervisor maximizes productivity and enables easy transfer of VMs to and from your local PC.
  • 18
    Revenera SCA
    Take control of your open source software management. Empower your organization to manage open source software (OSS) and third-party components. FlexNet Code Insight helps development, legal and security teams to reduce open source security risk and manage license compliance with an end-to-end system. FlexNet Code Insight is a single integrated solution for open source license compliance and security. Find vulnerabilities and remediate associated risk while you build your products and during their entire lifecycle. Manage open source license compliance, add automation to your processes, and implement a formal OSS strategy that balances business benefits and risk management. Integrate with build tools, CI/CD and SCM tools, artifact repositories, external repositories or build your own integrations using the FlexNet Code Insight REST API framework to make code scanning easy and effective.
  • 19
    Verizon DNS Safeguard
    Stop threats before they reach your network with DNS Safeguard, a cloud-based Domain Name System (DNS) security solution. DNS Safeguard proactively protects your business from malware, ransomware and phishing attacks no matter where your users access the internet, even if they’re not on the corporate network or a VPN. As a cloud-based DNS security solution, DNS Safeguard can identify and block connections to unsafe internet destinations before a connection is made. Organizations wanting to block dangerous connections between users and potentially malicious websites Branch offices and mobile workers that connect directly to the internet without a VPN. Businesses and agencies that need powerful preventive security that is cost-effective and easy to deploy. DNS Safeguard provides DNS-layer security to improve visibility and protect your users on and off the network by stopping threats over any port or protocol before they reach your network or endpoints.
  • 20
    IDCentral

    IDCentral

    IDcentral

    The need for Digital ID verification. 18 B dollars is the projected market worth of digital services by 2020. 50 % users manipulate data during onboarding. 20 +types of ID frauds currently plague the market. Your one-stop-shop for Digital Identity solutions! Our Digital ID solution enables businesses to verify customer identities using alternate sources of data in real-time. ID Cloud. A comprehensive identity repository enabling enterprises to convert attributes to digital identities. ID Verification. Identity verification and authentication solutions based on phone number and alternate ID. Identity Scoring. Data driven intelligence for a comprehensive behavioral score of your consumers. Huge data repository. Access to data from over 150 telcos across the globe resulting in a massive bank of information. Expansive network of businesses that have a critical business need to consume ID information.
  • 21
    Adaptiva OneSite Health
    Adaptiva OneSite Health automatically checks the configuration of endpoints, diagnoses any problems, and remediates any issues. And it does this at massive scale – hundreds of thousands of endpoints – without bandwidth throttling or disrupting business processes. Adaptiva OneSite Health is the fastest, most scalable solution to manage endpoint health at scale and includes over 100 pre-built checks and remediations. Our customers use Endpoint Health to ensure endpoints are functioning properly and securely. Over 100 built-in checks can ensure Bitlocker is turned on, or ConfigMgr is working as expected. A major national retailer ran Adaptiva OneSite Health on just over 11,000 live production endpoints. They found a 55% failure rate. Endpoint Health was able to automatically remediate 89% of failed endpoints, with an instant savings of over $1m.
  • 22
    Login-Master
    Login-Master Access + User Management redefined. CIAM solution for B2B delivers highest performance for web application users. The modular Customer Identity & Access Management solution was born to meet fundamental needs in a web portal project. Login-Master offers the users’ authentication and access control requirements of a B2B Portal. We had the choice between two Open Source offers: ForgeRock, one of the oldest platforms for CIAM with expensive subscription fees or the young CIAM rocket Keycloak with no subscription fees. We selected Keycloak. With Keycloak we chose one of the best Open Source SSO solutions. It delivers all necessary authentication features. It works perfectly for the storage of up to 500 user accounts. But our customer challenge was: His web portals supported more than 500 users. And there was an important part missing: the User-Life-Cycle management. Therefore, we combined the access management with all necessary identity features to build an holistic CIAM.
  • 23
    AppScaler

    AppScaler

    XPoint Network

    What does AppScaler CMS do? Managing, monitoring and reporting on growing distributed networks is increasingly complex and costly, AppScaler CMS allows you to manage one or more AppScaler devices from a single management server. AppScaler CMS provides organizations, distributed enterprises and service providers with a powerful and intuitive solution to centrally manage and rapidly deploy AppScaler devices and provides centralized, real-time monitoring and comprehensive application performance reporting. Central AppScaler Policy Management AppScaler CMS ensures governance and compliance with centrally managed configuration: Import the configuration from AppScaler device in one click. Comprehensive policy management on load balancing of each AppScaler device. Configuration backup and restore. AppScaler Firmware Upgrade Role-based access control. AppScaler CMS provides fine-grained, role-based access control with which you can grant access permissions.
  • 24
    Softchoice

    Softchoice

    Softchoice

    VMware Enterprise Licensing Agreement (ELA). Simplify software asset management (SAM) for VMware. Make the most of your VMware investments. Even the most advanced IT department may struggle to procure, deploy and manage thousands of enterprise VMware assets. Navigating the negotiation and renewal process only adds time and complexity. Without a deep understanding of VMware licensing programs, terms and conditions, it’s easy to fall behind – and risk overspending. A VMware enterprise licensing agreement (ELA) simplifies licensing and reduces costs. With enterprise-wide coverage and 3-year terms, it frees IT resources from time-consuming licensing tasks. Working with Softchoice ensures you get the best value from your ELA. Make the most of your VMware investments. Right-size your SAM strategy. Enterprise software agreements have made it much more cost-effective to acquire the technology that powers your business.
  • 25
    Email Shield

    Email Shield

    Fraud.net

    Email Shield is a cloud-based email security add-in, which helps businesses across various industry verticals such as banking, fintech, eCommerce, government, mobile, travel, gaming, telecommunications and more, prevent email-based fraud attempts and receive fraud risk scores and alerts. It tracks and verifies trusted contacts, letting users expose risky emails and ensuring safety of financial transactions. Email Shield allows accounts payable (AP) agents to scan emails, AP senders, and attachments and approve, escalate, or reject payment and account change requests. The system accesses and modifies personal details in the active message including the subject, body, recipients, sender, and attachment information to ensure protection from invoice, vendor, and wire fraud.
  • 26
    SureLog

    SureLog

    Surelog

    SureLog SIEM. Capabilities. SureLog Enterprise SIEM is a next-generation log and event management reporting platform that analyzes log event data in real time to detect and prevent security attacks. By consolidating events from all log sources, SureLog Enterprise correlates and aggregates events into normalized alerts to spot cyber security threats and instantly notifies your IT & security teams. SureLog includes advanced SIEM capabilities like real-time event management, entity and user behaviour analytic, machine learning, incident management, threat intelligent and reporting. SureLog enterprise has more than 2000 out-of-box correlations rules for broad selection of security, privacy and compliance use cases. Use Cases. Gain full visibility into logs, data flow, and events across on-premises, IoT, and cloud environments. Satisfy regulatory compliance with pre-built reports including PCI, GDPR, HIPAA, SOX, PIPEDA, OSFI and more. Automatically detect threats
  • 27
    PT Application Inspector

    PT Application Inspector

    Positive Technologies

    PT Application Inspector is the only source code analyzer providing high-quality analysis and convenient tools to automatically confirm vulnerabilities — significantly speeding up the work with reports and simplifying teamwork between security specialists and developers. The combination of static, dynamic, and interactive application security testing (SAST + DAST + IAST) delivers unparalleled results. PT Application Inspector pinpoints only real vulnerabilities so you can focus on the problems that actually matter. Accurate detection, automatic vulnerability verification, filtering, incremental scanning, and an interactive data flow diagram (DFD) for each vulnerability are special features that make remediation so much quicker. Minimize vulnerabilities in the final product and the costs of fixing them. Perform analysis at the earliest stages of software development.
  • 28
    OWASP ZAP
    OWASP ZAP (Zed Attack Proxy) is a free, open-source penetration testing tool being maintained under the umbrella of the Open Web Application Security Project (OWASP). ZAP is designed specifically for testing web applications and is both flexible and extensible. At its core, ZAP is what is known as a “man-in-the-middle proxy.” It stands between the tester’s browser and the web application so that it can intercept and inspect messages sent between browser and web application, modify the contents if needed, and then forward those packets on to the destination. It can be used as a stand-alone application, and as a daemon process. ZAP provides functionality for a range of skill levels – from developers, to testers new to security testing, to security testing specialists. ZAP has versions for each major OS and Docker, so you are not tied to a single OS. Additional functionality is freely available from a variety of add-ons in the ZAP Marketplace, accessible from within the ZAP client.
  • 29
    Sasa Software GateScanner
    Sasa Software is a leading provider of Content Disarm and Reconstruction (CDR) content sanitization technology. It's Gatescanner solutions provide unparalleled protection from known and unknown content-borne threats - on all incoming routes. GateScanner solutions include - > Secure Email Gateway with CDR > Secure web-based Managed File Transfer and Vaults - with CDR > Secure web-downloading extension for Chromium-based browsers (Chrome/Edge and others) with CDR > Secure import from portable media (USB, CD, DVD) with CDR > CDR delivered via API and ICAP Our CDR solutions are protecting hundreds of sensitive installations in government, critical infrastructure, healthcare, financial and legal services, oil, gas and energy companies, pharmaceuticals and security agencies. Sasa Software is a member of the IC3 Israeli Cyber Companies Consortium and a Gartner Cool Vendor for cyber-physical systems for the year 2020.
  • 30
    Trellix Data Encryption
    Trellix Data Encryption products secure devices and removable media to ensure that only authorized users can access the information they contain. Deploy encryption policies through a single management console, while monitoring encryption status and generating compliance reports. Choose from an extensive catalog of policy options to secure information across devices, files, and removable media - easily managed from a single location. Trellix Native Drive Encryption centralizes and simplifies management of both BitLocker and FileVault into a central console that is available on-premises or via SaaS. This saves time and resources for organizations managing multiple operating systems, since reporting and administrative tasks like encryption key and pin management are centralized.