Best IT Security Software for Windows - Page 45

Compare the Top IT Security Software for Windows as of December 2025 - Page 45

  • 1
    Datto EDR

    Datto EDR

    Datto, a Kaseya company

    With Datto Endpoint Detection and Response (EDR) you can detect and respond to advanced threats. Datto EDR is an easy-to-use cloud-based EDR solution that’s designed for your business. Datto EDR is independently verified and proven as a leader against malware and advanced threats. Miercom, a global leader in cybersecurity testing, found that Datto EDR detects and stops 99.62% of all malware when combined with Datto AV. With new threats being developed and released into the wild every day, rest assured knowing that even the most advanced threats are caught by Datto EDR. You don’t have to be a security expert to get security expertise. Datto EDR smart recommendations eliminate alert fatigue, while the correlation engine reduces unnecessary noise. Empowering you to focus on what matters most. Seamless integration with Datto RMM allows one-click EDR deployment, alert response, device isolation, and dashboard access.
  • 2
    URLFiltre

    URLFiltre

    amsbctech

    URLFiltre is a URL Filtering solution by amsbctech. It comes in 2 versions a cloud based version and a on premise version. In cloud version the filtering database is maintained by amsbctech and in on premise version database is maintained by company opting for on-premise url filter. The product has following features. 1. Daily reports using desktop client. 2. Add exclusions. 3. Locally block URLs. 4. Send URL blocking request to database operator.
    Starting Price: $10
  • 3
    SAMI

    SAMI

    NorthWest Protection Services

    SAMI uses real-time data and threat intelligence to provide tailored insights that help businesses identify and mitigate security risks. With continuous monitoring, the platform helps companies stay ahead of evolving threats, ensures compliance, and minimizes the risk of data breaches. It empowers employees with the knowledge and tools to protect sensitive information, making it a vital part of a robust cybersecurity strategy.
  • 4
    Scribbler Log Manager

    Scribbler Log Manager

    SyskeyOT Cybersecurity

    Scribbler Log Manager can monitor logs in real-time, alerting administrators to potential security threats or performance issues as they occur. Scribbler Log Manager can help organizations meet regulatory compliance requirements by providing the ability to retain and report on log data. Scribbler Log Manager has a user-friendly interface that allows administrators to easily search and analyze log data, as well as create custom reports. Scribbler Log Manager allows organizations to collect and store log data from multiple sources in a centralized location, making it easier to search, analyze, and report on the data. Scribbler Log Manager automatically rotates and archives log data to prevent data loss and also provides the ability to archive data to cloud storage. Scribbler Log Manager allows for advanced search and filtering capabilities, so you can find the logs you need quickly and easily.
  • 5
    Oneleet

    Oneleet

    Oneleet

    We help companies build trust by creating real-world security controls, and then attesting to those controls with a SOC 2 report. Oneleet is a full-stack cybersecurity platform that makes effective cybersecurity easy and painless. We help businesses stay secure so that they can focus on providing value to their customers. We'll start by doing a scoping call to learn about your infrastructure, security concerns, & compliance needs. Then we'll build you out a custom security program that is stage-appropriate. We'll perform your penetration test with highly qualified OSCE-certified or OSWE-certified testers, only around 1,000 of whom exist worldwide. Finally, we'll take you through the SOC 2 auditing process with a 3rd party CPA. Oneleet has everything you need to become compliant and secure in one place. Having all tools under one roof makes the compliance journey smooth and seamless.
  • 6
    AppSecure Security

    AppSecure Security

    AppSecure Security

    Anticipate and prevent system attacks from the most sophisticated adversaries with AppSecure’s offensive security stance. Discover critical exploitable vulnerabilities and continuously patch them with our advanced security solutions. Continuously fortify your security posture and uncover concealed vulnerabilities from a hacker’s perspective. Evaluate the efficacy of your security team’s readiness posture, detection, and response measures to tenacious hacker attacks on your network’s susceptible pathways. Identify and redress the key security lapses with our balanced approach that tests your APIs in accordance with the OWASP paradigm, along with tailored test cases for preventing any recurrences. Pentest as a service offers continuous, expert-led security testing to identify and remediate vulnerabilities, enhancing your website’s defenses against evolving cyber threats and making it secure, compliant, and reliable.
  • 7
    ESET Inspect
    ESET Inspect is an advanced endpoint detection and response (EDR) tool designed by ESET to provide comprehensive visibility, threat detection, and incident response capabilities for businesses. It helps organizations identify, investigate, and mitigate sophisticated cyber threats that bypass traditional security measures. ESET Inspect monitors endpoint activities in real time, using behavioral analysis, machine learning, and threat intelligence to detect suspicious behavior, anomalies, and potential security breaches. It integrates seamlessly with ESET’s endpoint protection platform, providing a unified view of network security and enabling security teams to respond quickly to threats through automated or manual actions. With features like threat hunting, detailed reporting, and customizable alerts, ESET Inspect empowers businesses to enhance their cybersecurity defenses and proactively address potential vulnerabilities.
  • 8
    FortiTrust Identity
    FortiTrust Identity is a cloud-based subscription that simplifies identity and access management across enterprise hybrid environments. FortiTrust Identity (FTI) is cloud-based and natively integrated with the Fortinet Security Fabric to deliver a rich set of security controls and centralized management of user authentications, including multi-factor authentication. FTI enables you to begin your zero-trust journey with reliable user verification and strong authentication, plus ease of use for the end user. Adaptive, multi-factor, or passwordless authentication and identity federation for SSO across the enterprise hybrid environment are all included via user-based licensing. Ensure the right people get appropriate access to your data, resources, and applications across the enterprise. Increase certainty of user identity with the verification of another factor and adaptive authentication technique.
  • 9
    MetaDefender Kiosk
    The OPSWAT MetaDefender Kiosk Tower is our largest Kiosk capable of scanning the broadest range of media types. The MetaDefender Kiosk Tower is built with an industrial touchscreen and strong metal enclosure. OPSWAT’s proven, globally trusted, and award-winning technology prevents removable and peripheral media-borne threats from entering critical IT and OT environments. MetaDefender Kiosk scans incoming removable media before it enters your network. It identifies malicious content and sanitizes it prior to use. MetaDefender provides access to real-time OT data and enables secure data transfer to OT environments while defending the OT environment from network-borne threats. Enables users to transfer large files automatically, implement data-at-rest encryption, provide role-based access, and ensure regulatory compliance and audit trails. Provides a second layer of defense against threats by blocking access to USB drives and other media devices until security conditions are met.
  • 10
    Kitecyber

    Kitecyber

    Kitecyber

    Kitecyber provides a hyper-converged endpoint security solution that provides comprehensive security and meets compliance requirements of organizations for SOC2, ISO27001, HIPAA, PCI-DSS, GDPR etc. Our unique endpoint-based approach eliminates the need for cloud gateways or local appliances. The hyper-converged offering includes the following protections: 1) Secure Web Gateway to safeguard internet access 2) Eliminate Shadow SaaS and Shadow AI) 3) Anti-Phishing measures to protect user credentials 4) Zero Trust Private Access (Next gen VPN) 5) Data Loss Prevention across all devices—Mac, Windows, and mobile 6) Device Management for Mac, Windows, and mobile for all employees, BYOD devices and 3rd party contractors 7) Continuous Compliance Monitoring 8) User Behavior Analysis to identify potential risks
  • 11
    MINDely
    MIND is the first-ever data security platform that puts data loss prevention (DLP) and insider risk management (IRM) programs on autopilot, so you can automatically identify, detect, and prevent data leaks at machine speed. Continuously find your sensitive data in files spread across your IT environments whether at rest, in motion, or in use. MIND continuously exposes blindspots of sensitive data across your IT environments including SaaS, AI apps, endpoints, on-premise file shares, and emails. MIND monitors and analyzes billions of data security events in real time, enriches each incident with context, and remediates autonomously. MIND automatically blocks sensitive data in real-time from escaping your control, or collaborates with users to remediate risks and educate on your policies. MIND continuously exposes blindspots of sensitive data at rest, in motion, and in use by integrating with data sources across your IT workloads, e.g. SaaS, AI apps, on-premises, endpoints, and emails.
  • 12
    Twine

    Twine

    Twine Security

    Twine builds AI digital cybersecurity employees who execute tasks from A to Z to help cyber teams close the talent gap. Our first digital employee, Alex, learns, understands and takes away the burden of Identity and Access Management (IAM) tasks - proactively completing your organization’s cyber objectives.
  • 13
    Wraith

    Wraith

    NetCentrics

    Rapid cloud adoption coupled with the complexities of multi-cloud environments and siloed security teams creates a critical visibility gap for many organizations. Wraith addresses this challenge by offering unparalleled visibility and threat-hunting capabilities across on-premise, hybrid, and multi-cloud architectures. These capabilities are enhanced by AI-enabled anomaly detection, making Wraith an essential tool for neutralizing hidden threats to secure and defend cloud environments. Wraith provides comprehensive multi-terrain visibility, allowing security teams to monitor assets and activities across different Cloud Service Providers (CSPs) with a single tool set. This ensures a unified security posture and faster threat response across diverse and complex cloud environments.
  • 14
    pwncheck

    pwncheck

    pwncheck

    Pwncheck is an efficient, offline Active Directory password auditing tool designed to identify compromised, weak, or shared passwords within an organization's network. Utilizing a comprehensive collection of breached passwords, including data from the HaveIBeenPwned (HIBP) database by Troy Hunt, Pwncheck enables administrators to quickly detect users employing compromised credentials. The tool operates without installation, requiring only a machine with connectivity to a domain controller, and delivers comprehensive results in under three minutes. Key features include the detection of blank passwords, identification of shared passwords among users, and the ability to generate detailed reports suitable for presentation to senior management and auditors. By operating entirely offline, Pwncheck mitigates legal and security concerns associated with storing breached database data on corporate networks, ensuring user hashes and passwords remain secure.
  • 15
    Sysgem Logfile Concentrator
    Sysgem's Logfile Concentrator is a comprehensive Windows-based tool designed to integrate streams of log file data from multiple sources into a single centralized location. It collects log data from remote multi-platform servers and end devices, storing them in a central database for analysis and regulatory-compliant archiving. Key features include automated archiving and reporting, customizable record displays, advanced querying, audit trail, and compliance management, as well as intelligent alarms and real-time alerts. The platform offers a user-customizable display for real-time record monitoring and provides a full web browser interface for remote access. Additionally, it supports common ODBC databases such as MS SQL, Oracle, and MS Access. As part of the Sysgem product family, Logfile Concentrator can function as a standalone solution or complement the Sysgem Enterprise Manager (SEM).
  • 16
    alphaMountain Threat Intelligence APIs and Feeds
    alphaMountain’s domain and IP threat intelligence powers many of the world’s leading cybersecurity solutions. High-fidelity threat feeds are updated hourly with fresh URL classification, threat ratings and actionable intelligence on over 2 billion hosts including domains and IP addresses. KEY BENEFITS: Get high-fidelity URL classification and threat ratings for any URL from 1.00 to 10.0. Receive fresh categorization and threat ratings updated every hour, syndicated via API or threat feed. See threat factors and other intelligence contributing to threat verdicts. USE CASES: Use threat feeds in your network security products such as secure web gateway, secure email gateway or next-generation firewall. Call the alphaMountain API from your SIEM to investigate threats or from your SOAR to automate responses such as blocking and policy updates. Detect if a URL is suspicious, contains malware, is a phishing site and which of 89 content categories the site belongs to.
    Starting Price: $300/month
  • 17
    Orchid Security

    Orchid Security

    Orchid Security

    Orchid Security utilizes a passive listening service to continuously discover self-hosted applications (those that you manage/maintain) and SaaS applications (developed and maintained by others), providing you with a comprehensive inventory of your enterprise applications, along with their key identity characteristics (e.g. MFA enforcement, rogue or orphaned accounts, RBAC privilege data). Orchid Security leverages advanced AI analytics to automatically assess the identity technologies, protocols, and native authentication/ authorization flows for each application. Identity controls are compared against privacy regulations, cyber security frameworks, and identity best practices (e.g. PCI DSS, HIPAA, SOX, GDPR, CMMC, NIST CSF, ISO 27001, SOC2) to detect potential exposure in cyber security posture and compliance coverage. Orchid Security goes beyond providing visibility into weaknesses, to enable organizations with quick and effective remediation of those weaknesses without recoding.
  • 18
    1Password Extended Access Management (XAM)
    1Password Extended Access Management (XAM) is a security solution designed to safeguard every login across applications and devices, making it ideal for hybrid work environments. It combines user identity verification, device trust assessments, enterprise password management, and application insights to ensure that only authorized users on secure devices can access both approved and unapproved applications. By providing IT and security teams with visibility into app usage, including shadow IT, XAM enables organizations to enforce contextual access policies based on real-time risk signals like device compliance and credential integrity. With its zero-trust approach, XAM helps businesses move beyond traditional identity management, strengthening security in today’s SaaS-driven workplace.
  • 19
    PrimeSSL

    PrimeSSL

    PrimeSSL

    PrimeSSL, a leading Certificate Authority (CA) backed by the trusted Sectigo Root, delivers affordable and user-friendly SSL/TLS certificate solutions. Its offerings include Domain Validated (DV) SSL, Wildcard, Multi-Domain (SAN), and Multi-Domain Wildcard, tailored to the needs of personal websites, blogs, and small businesses. It's fast domain validation and instant issuance process makes SSL setup effortless, often taking just minutes. Featuring 256-bit encryption and cutting-edge cryptographic algorithms, PrimeSSL delivers strong security and builds trust through recognizable browser security indicators.
    Starting Price: $5.99/year
  • 20
    Prisma Access Browser

    Prisma Access Browser

    Palo Alto Networks

    ​Prisma Access Browser is a secure enterprise browser developed by Palo Alto Networks, designed to protect both managed and unmanaged devices by integrating security directly into the browsing experience. Built on the Chromium platform, it combines the familiar interface and core features of Google Chrome with enhanced security measures to safeguard against cyber threats such as phishing, malware, eavesdropping, and data exfiltration. This browser extends Secure Access Service Edge (SASE) protection seamlessly to every device, offering agility, security, and control to businesses. Key features include creating a secure workspace on any device, protecting against advanced phishing attacks, identifying and blocking advanced malware, supporting forensics and threat hunting, and reducing the risk of tampering. Additionally, it enhances visibility and control with last-mile data protection, and blocks the transfer of data from business to personal accounts.
  • 21
    Keep Aware

    Keep Aware

    Keep Aware

    ​Keep Aware is an enterprise browser security platform designed to provide comprehensive protection against browser-based threats without disrupting user workflows. By integrating directly into existing browsers such as Chrome, Edge, and Firefox, it offers real-time visibility and control over browser activities, enabling security teams to monitor page visits, extension events, and data transfers. The platform features advanced threat prevention capabilities, including blocking zero-day phishing attempts, malware, and identity attacks through real-time detection and prevention mechanisms. Keep Aware also offers out-of-the-box security profiles for immediate deployment, allowing organizations to enforce web policies and prevent data leaks effectively. Its lightweight architecture ensures minimal impact on system performance, and centralized management provides unified security controls across all browsers within the organization.
  • 22
    Mammoth Enterprise Browser
    ​Mammoth Cyber's Enterprise Browser is a Chromium-based solution designed to enhance secure remote access by integrating a policy engine directly within the browser. It offers organizations visibility and control over user interactions with internal applications, public cloud services, and SaaS platforms. By enforcing conditional access and implementing least privilege principles, the browser ensures that users access only the resources necessary for their roles, thereby reducing the risk of data breaches. Detailed audit logs of user activities support compliance and security monitoring. The Enterprise Browser integrates seamlessly with identity providers like Okta and Azure AD, automating role-based permissions and streamlining user onboarding. Its familiar interface minimizes the learning curve, promoting user adoption. Additionally, the browser facilitates secure developer access by supporting SSH, RDP, Git, Kubernetes, and database connections directly.
  • 23
    DataBahn

    DataBahn

    DataBahn

    DataBahn.ai is redefining how enterprises manage the explosion of security and operational data in the AI era. Our AI-powered data pipeline and fabric platform helps organizations securely collect, enrich, orchestrate, and optimize enterprise data—including security, application, observability, and IoT/OT telemetry—for analytics, automation, and AI. With native support for over 400 integrations and built-in enrichment capabilities, DataBahn streamlines fragmented data workflows and reduces SIEM and infrastructure costs from day one. The platform requires no specialist training, enabling security and IT teams to extract insights in real time and adapt quickly to new demands. We've helped Fortune 500 and Global 2000 companies reduce data processing costs by over 50% and automate more than 80% of their data engineering workloads.
  • 24
    Libelle BusinessShadow
    With our Libelle BusinessShadow solution for disaster recovery and high availability, you can mirror databases and other application systems with a time delay. Your company is thus protected not only from the consequences of hardware and application errors, but also from the consequences of elemental damage, sabotage, or data loss due to human error. Our patented and dynamically adjustable time funnel temporarily stores the change logs before they are mirrored to the standby system. Switching over to this system in the event of an error or even maintenance can thus be carried out with impressive speed and without any fuss. The time funnel temporarily stores logs before they reach the standby system. You can quickly and easily switch to an error-free state. Your data is up to date and consistent, as it does not have to be laboriously reverted from a backup, but is temporarily stored in the time funnel.
  • 25
    Libelle DataMasking
    Libelle DataMasking (LDM) is a robust, enterprise-grade data masking solution that automates the anonymization of sensitive or personal data—such as names, addresses, dates, emails, IBANs, credit cards—and transforms them into realistic, logically consistent substitutes that maintain referential integrity across SAP and non‑SAP systems, including Oracle, SQL Server, IBM DB2, MySQL, PostgreSQL, SAP HANA, flat files, and cloud databases. Capable of processing up to 200,000 entries per second and supporting parallelized masking for massive datasets, LDM uses a multithreaded architecture to efficiently read, anonymize, and write data back with high performance. It features over 40 built‑in anonymization algorithms—such as number, alphanumeric, date shifting, name, email, IBAN masking, credit card obfuscation, and mapping algorithms—as well as templates for SAP modules (CRM, ERP, FI/CO, HCM, SD, SRM).
  • 26
    Biometric Anti-Fraud (BAF)
    Biometric Anti-Fraud (BAF) is a technology stack for intelligent processing, analysis and recognition of images with an application scenario for remote human identification. Technology stack for online identity verification with NIST FRVT top-ranked face biometrics, advanced liveness detection and user session data monitoring for face authentication and identity fraud prevention in digital onboarding and eKYC services.
  • 27
    Ivanti Endpoint Security for Endpoint Manager
    Endpoint Security for Endpoint Manager delivers powerful, integrated endpoint protection and unified management from within the familiar Ivanti console. It combines passive visibility, discovering and inventorying every IP-enabled device and installed software in real time, including rogue devices, with active control features such as application whitelisting, device control (USB/media lockdown and detailed copy logs) and antivirus orchestration (Ivanti AV or third-party engines) to detect and prevent threats before they spread. Automated patch management covers Windows, macOS, Linux, and third-party applications across on-site, remote, and offline devices, ensuring systems stay up to date without impacting users. When malware or ransomware does get through, the solution’s auto-isolation and remote-control capabilities contain infections instantly, kill malicious processes, notify connected machines, and remediate or reimage compromised endpoints.
  • 28
    IriCore

    IriCore

    Iritech, Inc.

    IriCore is the next generation of IriTech’s IrisSDK, delivering dramatically improved accuracy and matching speed through a new, compact template format optimized for network transmission and smart‑card storage. It incorporates industry‑leading iris‑recognition algorithms rigorously tested in NIST’s ICE and IREX evaluations and supports modern ISO image formats. IriCore runs seamlessly and reads and writes common industrial image formats such as BMP, JPG, JP2, and PNG. An optional module enables it to detect and adapt to images from either IriTech cameras or third‑party devices, while built‑in compression and decompression capabilities handle both lossy (JPG, JP2) and lossless (PNG) formats. Fully compliant with ISO 19794-6 and pre‑qualified for upcoming standards, including rectilinear, cropped, and ROI‑masked formats, it offers a robust, future‑proof SDK for end‑to‑end iris capture and matching solutions.
  • 29
    IriCoreLite

    IriCoreLite

    Iritech, Inc.

    IriCoreLite is an iris recognition library that provides a comprehensive set of application programming interfaces and functions for developers and system integrators to build iris recognition–based applications. It is specifically designed for large‑scale iris identification deployments on PCs and enterprise systems using IriTech’s iris scanners. The library incorporates highly accurate iris segmentation for feature extraction based on variable multi‑sector analysis and non‑linear segmentation, a robust image enhancer to handle varying illumination levels and obstructions, and a powerful occlusion detection algorithm to remove eyelids and eyelashes. Its fast and accurate matching algorithm is optimized for large databases, while a strong image quality assessment component ensures reliable input. IriCoreLite’s algorithms have been rigorously evaluated in NIST tests and proven across public databases.
  • 30
    IriMaster

    IriMaster

    Iritech, Inc.

    IriMaster is IriTech’s state‑of‑the‑art middleware server software providing a complete set of iris recognition functions, including enrollment, verification, identification, and de‑duplication, powered by advanced algorithms. Designed for seamless integration into legacy enterprise infrastructures, it addresses the demands of large‑scale biometric systems such as national ID programs, customs and border control, and access control. As a middleware component, IriMaster supports secure transactions and data exchange using SSL and WS‑Security standards, and ensures device‑level encryption via a PKI‑based security infrastructure. Its Web Service API enables scalable, service‑oriented deployments, supporting clients in Java, .NET, or web applications. The software delivers high availability through application server clustering and hardware redundancy, and scales from single‑PC setups to distributed server networks with load balancers.