Best IT Security Software for Windows - Page 46

Compare the Top IT Security Software for Windows as of October 2025 - Page 46

  • 1
    SentryBay Armored Client
    The missing piece in the security stack jigsaw, easily downloaded in one-click to complete your armored shield against cyberattacks. ‍The Armored Client provides real time patented protection to applications and data without needing to detect and respond to threats. It does this by using kernel level prevention of data exfiltration, even if threats exist, combined with the secure wrapping of applications and injected security. ‍ The Armored Client takes a layered approach to protecting endpoint devices being used remotely to access your applications and data and to support secure online browsing. Whether your employees are using unmanaged, BYOD or managed endpoint devices, all your corporate apps are targeted on the endpoint and run in a secure session.
  • 2
    InAct

    InAct

    Asseco Group

    Fraud detection and prevention has become more important in recent years as the result of rising digitalization trends around the world effecting finances the most. As new technologies and standards are introduced, it becomes more challenging for companies to protect their customers against fraud attacks and maintain good business reputation. Therefore, fraud issues have become more sensitive and need more sophisticated approach. With more than 20 years of experience in payments and anti-fraud business, we offer banks, financial institutions, factoring companies, insurers, telecom operators, FMCG companies, and retail end- to-end anti-fraud solutions. InACT® is a modular application that monitors and prevents transactional fraud and internal misuse, operational faults and transactions that are contrary to the legislation. InACT® protects your institution and your customers against malicious transactions.
  • 3
    cidaas

    cidaas

    WidasConcepts

    cidaas is the optimal solution for fast and secure identity management. Thanks to cidaas you create one identity per user across all your channels. cidaas is based on OAuth2.0 and OpenID Connect standards, provides strong API security and with integrated Bot Net Detection and Fraud Detection a secure journey across all your business channels. Modern Identity and Access Management goes like this. Comprehensive feature set for quick and easy integration and implementation of all use cases and systems. We take care of it so you can focus on your core business. No more worrying about maintenance or operation. Countless passwords and pins make life difficult for users and are an unsightly barrier to access on digital channels. With passwordless authentication you secure your digital applications and offer your users a unique customer experience – because the login is the first thing your users see.
  • 4
    Siwenoid

    Siwenoid

    Siwena

    SIWENOID is a JAVA application and runs under Windows, Linux or Mac OS X. It is flexible, reliable, user, and engineer friendly. SIWENOID can integrate many types of subsystems and unify the operation of all. Supports SIEMENS, Bosch, Dahua, Texecom, Paradox systems and many more. Control everything on one (or more) screen with a unified user interface for every subsystem. Siwenoid is built on open-source foundations to keep the cost of the product lower. To keep up with the constant firmware updates of the compatible systems we rely on flexibility. Main goal of the software is to minimize the latency on interconnecting and handling different protocols. Siwenoid can be configured in operation while the subsystems are working. SIWENOID is an OS-independent JAVA application. It is a flexible, reliable, user- and engineer-friendly, scalable, and cost-effective solution.
  • 5
    Devknox

    Devknox

    XYSEC Labs

    Get your code checked for security flaws as you write it, in realtime. Devknox understands the context of your code and suggests one-click fixes. Devknox takes care of security requirements and keeps them up to date with global security standards. How your app fares across 30 test cases with the Devknox Plugin on the IDE. Ensuring the app you are building, meets industry compliance standards like OWASP Top 10, HIPAA and PCI-DSS. Details of commonly exploited vulnerabilities, quick fixes and alternate suggestions on how to fix them. Devknox is a developer friendly Android Studio plugin that helps Android developers detect and resolve security issues in their apps, while writing code. Imagine Devknox to similar to what autocorrect is for English. As you write code, Devknox highlights possible security risks and also gives you a suggested solution which you can select and replace across your code.
  • 6
    Touch N Go

    Touch N Go

    Bayometric

    Touch N Go – a fast, secure & simple way to integrate biometric fingerprint identification into your solution with just FOUR lines of code. A scalable, reliable and high performing biometric identification solution for seamless integration. Makes implementing and maintaining fingerprint recognition easy with no learning curve for developers. Provides best fit identity solution for workflows with demanding security that keeps developers happy and productive and IT satisfied and in control. Offers organizations a cost-effective turnkey biometric identification system leveraging proven, best of breed technologies so organizations can focus on their core operations.
  • 7
    DDP Endpoint Security Suite
    Dell Data Protection | Endpoint Security Suite offers threat protection, authentication, and encryption, all centrally-managed from the Dell Data Protection Server. With centralized management, consolidated compliance reporting, and console threat alerts, businesses can easily enforce and prove compliance for all of their endpoints. Ensure that security device drivers are up-to-date for the best customer experience. Visit http://www.dell.com/support to download Dell ControlVault drivers. Software-based Data Centric Encryption enables IT to easily enforce encryption policies, whether the data resides on the system drive or external media. Designed for mixed vendor environments, it also won’t get in the way of existing IT processes for patch management and authentication. Exclusive to select Dell Latitude, OptiPlex and Dell Precision systems, the optional Full Volume Encryption* solution equips end-user systems with military-grade protection that won’t slow your employees down.
  • 8
    Prilink Network Traffic Analytics
    PRILINK delivers complete Network Traffic Analytics (NTA) by analyzing mirrored traffic inside the cloud as well as onsite. Users can manage cloud traffic with ease as if it is local. We bring the cloud closer to you. To get started, you just need a Windows 10 PC and launching our virtual and physical IP meters in the cloud and onsite respectively. As an option, meters can stream network dashboards to the cloud for team collaboration. Using our NTA, users can easily validate whether their networks perform as per business needs.
  • 9
    Fusion UEM

    Fusion UEM

    VXL Technology

    VXL Software’s unified endpoint management solution, Fusion UEM, provides powerful device management for smartphones, tablets, desktops, laptops and thin clients – enabling better control over your devices and more secure homeworking. Fusion UEM brings the industry-leading device management portfolio of applications – to Android (4.x upwards) and iOS (7.0 upwards) mobile devices, Windows desktop / laptop PCs (XP/7/8/10 IoT & Windows 7/10 Professional) and VXL Windows Embedded and Linux thin clients together with Windows-based thin clients from third parties. Via Fusion SecureDesktop, Fusion UEM provides incredible endpoint management power, delivering a level of control for remote and homeworking devices that equals on-premises control. For organisations wishing to provide secure access to virtualised corporate Windows desktops, Fusion SecureDesktop enables employees to securely access corporate applications and data from a home PC.
  • 10
    Clearswift Secure Email Gateway
    Clearswift Secure Email Gateway (SEG) provides uniquely powerful protection of an organization's email data against inbound cyber-attacks and outbound data loss prevention. As the number one method of communication for most organizations, email has become one of the top sources for cybercriminals to infiltrate your systems and take hold of your critical data. Our Secure Email Gateway protects against known and unknown malware but also advanced threats including phishing. IT teams need to ensure that information being shared across email both in and out of the organization is not only secure, but appropriate and compliant. Clearswift’s unparalleled level of inspection and granular policy controls apply the optimal security treatment to your emails in real time so your communications remain safe and flowing, and business disruptions are minimized.
  • 11
    Biocoded

    Biocoded

    Biocoded

    Biocoded combines uncompromising security with ease of use. Based on double ratchet protocol. Audited by independent security agencies. Record and send encrypted voice messages. Use timed self-destruction of messages. Make and receive encrypted conference calls.
  • 12
    Deep Identity

    Deep Identity

    Deep Identity

    Deep Identity enables you to protect your organization with a complete range of Deep Identity integration and data governance products. Built on light-weight flexible and open architecture. Trusted Identity Audit & Compliance Manager (Trusted IACM) is the industry’s most comprehensive solution that provides a ‘layered approach’ to identity governance and administration. Trusted Identity Manager (Trusted IM) is the industry’s most lightweight solution that provides a “layered” approach to identity administration. Privilege Identity Manager (Trusted PIM) is the industry’s most practical and non-intrusive solution to address privilege identity related challenges in any organization. Data Governance Manager (Trusted DGM) provides complete automation for identity, data access governance and lifecycle management with integration across modules and systems. Handle Full time, Contractors profile management, Access review, N Level approval workflow, Self Service, Bulk provisioning etc
  • 13
    Specops Password Sync

    Specops Password Sync

    Specops Software

    Streamline passwords for users with just one password across multiple business systems. Specops Password Sync instantly synchronizes Active Directory passwords to domains, or other systems. This includes domains in the same forest/other forests, on-premises systems (e.g. Kerberos), and SaaS targets (e.g. O365). The tool enhances security by ensuring that password complexity applies to all systems consistently. Specops Password Sync effectively extends Active Directory password security to other business systems, including external SaaS resources. When combined with a strong password policy, the product ensures that the same level of password complexity applies to all connected systems. Built on Active Directory, the tool captures and synchronizes all changes to a user’s password in accordance with the synchronization rules defined in Group Policy. The solution can be setup in just a few hours by configuring the local Active Directory.
  • 14
    TrueSight Operations Management
    TrueSight Operations Management delivers end-to-end performance monitoring and event management. It uses AIOps to dynamically learn behavior, correlate, analyze, and prioritize event data so IT operations teams can predict, find and fix issues faster. Identify data anomalies and predictively alert to remediate issues before service impact. TrueSight Infrastructure Management helps you detect and address performance abnormalities before they impact the business. It automatically learns the behavior of your infrastructure, telling you what’s normal, and only issues alerts when behavior needs attention. This helps you focus on the events that matter most to IT and the business. TrueSight IT Data Analytics uses machine-assisted analysis for log data, metrics, events, changes, and incidents. You can automatically sift through millions of messages with a single click to solve problems faster.
  • 15
    LogFusion

    LogFusion

    Binary Fortress Software

    LogFusion is a powerful realtime log monitoring application designed for system administrators and developers! Use custom highlighting rules, filtering and more. You can even sync your LogFusion settings between computers. Use LogFusion's powerful custom highlighting to match text strings or regex patterns and format the matched log lines to suit your needs. Use LogFusion's Advanced Text Filtering to filter and hide lines that don't match your search text, all in realtime as new lines are being added. Complex queries allow you to easily narrow down your results. LogFusion can automatically add new logs from Watched Folders. Just specify the folders to monitor, and LogFusion will automatically open any new log files created in those folders.
  • 16
    IDReset

    IDReset

    Interactive Northwest

    Self-service password reset applications are designed to ease helpdesk load by providing a secure mechanism for users to independently reset their accounts via web or phone. INI delivers automated password reset solutions that uniquely meet an organization’s security needs as well as the expectations of its users. Helpdesk inquiries cost an average of $10-$30 per call. By automating the reset process, a self-service password reset application allows most organizations to realize a return on investment that pays for the application within the first year of use. Time saved by users, helpdesk, IT, finance, and security personnel yields significant productivity gains throughout the organization providing significant value to the bottom line. Elevates security by removing the agent from the authentication process. Enhances convenience with 24/7 immediate access. Maximizes ROI with 20%-40% fewer costly helpdesk calls. Frees helpdesk staff to work on mission-critical issues.
  • 17
    CI Badge

    CI Badge

    CI Solutions

    CI Badge is a powerful ID card issuance program that serves thousands with flexible image capture, robust data connectivity and unlimited card printing bringing simplicity to complex, secure ID card production. Each version of our CI Badge Card Printing Software is customized to your specific card printing needs. We base our solutions on a number of factors in order to create the best long-term solution for your organization. Start your card printing program by scheduling a demo with us today. Look Up a Record, Take a Photo & Click Print. CI Badge is the software program that connects your camera, card printer, and database. Using a connected camera and CI Badge, you can easily send print jobs to your card printer. You can also import your current database into CI Badge. Simply look up a record in CI Badge, take a photo if needed, and click print.
  • 18
    Argoscope

    Argoscope

    Detelix Software Technologies

    A combination of knowledge, experience, technology and automation leads the executives of over 25 leading companies in Israel to rely on Argoscope will alert in time and allow them to prevent financial leaks. Argoscope checks 24/7 all company payments, including suppliers, customers, insureds, salaries and any other organizational process in order to detect errors, fraud and embezzlement in time, also the work procedures compliance. Argoscope integrates into every possible database, thus examining every end-to-end business process. The system is based on the knowledge and experience of the best experts, including finance managers, risks, internal auditors, information security and cyber of the large organizations in Israel, using machine learning, business intelligence, re-learning and developing new algorithms on an ongoing basis. Argoscope keeps track of your organization's assets anywhere, anytime, anytime.
  • 19
    ISEEK

    ISEEK

    XtremeForensics

    Running entirely in memory, ISEEK is the embodiment of a patented process. It is an automated tool that can be deployed to run concurrently across any number of computer systems where it operates invisibly in accordance with an encrypted set of instructions. The results of ISEEK's processing are encrypted and sent to a location specified in the set of instructions which can be a local drive, a network share or cloud storage.​ Stand-alone utilities enable the creation of the encrypted set of instructions and the ability to review and process the contents of encrypted results containers. Once ISEEK has been used to pinpoint the required data and reduce the volume for further review it enables multiple encrypted results containers to have their contents extracted in a number of different formats (with optional XML metadata) for ingesting by a review tool. These formats include generic load files and a Relativity-specific load file.
  • 20
    Nfusion

    Nfusion

    Ntrepid

    Nfusion is a virtual desktop environment that allows you to manage your attribution, or maintain complete control of the technical and behavioral indicators that comprise your online presence. Our product combines digital fingerprint masking with integrated collection tools and third-party applications. Nfusion puts your investigation desktop into a remote, isolated VDI that is accessed over a VPN connection. Access the internet from one of our proprietary points of presence, allowing you to appear from the location of your choice. At the end of every session, your VM is purged, destroying any malware or trackers. Your workspace can be personalized with third-party applications, including Maltego, i2 Analyst Notebook, Wickr, Telegram, and other messaging platforms.
  • 21
    DDP Mobile Edition
    Today employees, partners and vendors alike work any time, anywhere, using any device to download and share files. Personally owned smartphones and tablets, like desktops and laptops, have become a standard work tool. Accordingly, most organizations are embracing the bring your own device movement, recognizing it helps to both reduce equipment costs and increase productivity. But without proper encryption and password enforcement, data accessed on mobile devices, whether from a corporate server or a public cloud, is unprotected. If the device is lost or stolen, or if data is accessed through an open wireless hotspot, it could be hijacked, putting companies in jeopardy of a security breach and compliance violations. IT teams are struggling to strike a balance between protecting data and impeding worker productivity by restricting data access. Dell Data Protection | Mobile Edition helps to put IT back in control of data security by enabling you to protect data.
  • 22
    DESwrap

    DESwrap

    Data Encryption Systems

    The DK2 and DK3 can be used in conjunction with our DESwrap software to give instant protection to .EXE and .DLL files. This is achieved by wrapping a protective shield around the application using encryption techniques designed and tested during the past 25 years to provide a very secure operating environment for your software. The Down Counter within the DESkey may be called from DESwrap. This feature provides the means to stop your software working after a pre-programmed number of executions. An ideal method of controlling demonstration software, this counter may be reset remotely. In addition to the standard features, all DESwrap system messages may be user-defined when protecting your application. DESwrap for 32-bit Windows also encrypts function calls to .DLL files and the Win32 API. The number of API calls per DESkey access and the .DLL files which use ACE can be customized. DESwrap for 32-bit Windows also encrypts function calls to .DLL files and the Win32 API.
  • 23
    IDSync

    IDSync

    IDSync

    Active Directory To Active Directory Identity Synchronizer Software. Solves Password Sharing Problems, Overly Broad “rights” for IT staff and supports user enablement/disablement for Customer’s Active Directory. The Identity Syncronizer Active Directory to Active Directory platform enables an MSP to connect its on-premise Active Directory to its customers’ Active Directories for purposes of provisioning and synchronizing user metadata and passwords for its technicians, those who will be accessing the customers’ Active Directory and networks. IDSync provides an interface through which the MSP can identify those technicians for provisioning, identify target Active Directories into which the technicians will be provisioned or de-provisioned. Provisioning and synchronization can be maintained at the individual user level or can be accomplished in bulk via security groups.
  • 24
    Firco Insight

    Firco Insight

    LexisNexis

    Firco Insight (formerly SBS SAFE Advanced Solutions Visual Intelligence Platform) is a feature-rich and scalable platform that combines account screening filtering intelligence with high-performance processing and scoring capabilities to improve your screening accuracy and eliminate alert overload. Leveraging AI techniques, Firco Insight reduces false positives and prioritizes alerts by risk severity and enables you to avoid missing high-risk accounts and meet financial crime regulatory requirements with confidence. Arm your organization with the visibility required to understand which accounts you should do business with, and more importantly, what high-risk accounts you should avoid. Protect your institution from risk by enhancing your screening process to strategically target risk, reduce false positive alerts, streamline investigations, and boost operational efficiency.
  • 25
    Clari5

    Clari5

    Clari5 (CustomerXPs)

    Category leaders for Enterprise Fraud Risk Management Systems and Anti-Money Laundering Systems, winner of premier global acclaim for product innovation and featured consistently in global risktech and regtech top 100 rankings, Clari5 redefines real-time, cross-channel Financial Crime Risk Management using a 'central nervous system' approach to help banks combat financial crime. Clari5 uses a ‘human brain like’ approach by synthesizing enterprise-wide intelligence and delivering precise contextual insights in extreme real-time, within the short transaction window, for necessary interventions. Clari5 is a bolt-on system, requires no replacement and features a compact implementation cycle with extremely quick ROI. Harnessing the combined power of Automation, AI, ML, Decision Sciences & Real-time Decisions, Clari5 is today processing over 10 bn transactions and is managing over 500 mn accounts. Marquee banks in 15 countries trust Clari5 to power their fraud risk management strategy. With
  • 26
    Radware DefensePro
    DefensePro and DefensePro VA provide advanced DDoS prevention, protection and IoT botnet attack mitigation across legacy data center and public cloud. Part of Radware’s attack mitigation solution, DefensePro provides automated DDoS defense and protection from fast moving, high volume, encrypted or very short duration threats, including IoT-based attacks like Mirai, Pulse, Burst, DNS, TLS/SSL attacks and those attacks associated with Permanent Denial of Service (PDoS) and Ransom Denial-of-Service (RDoS) techniques. Are you tired of fighting prolonged attack campaigns? Is your organization using the proper DDoS defense techniques to withstand today’s sophisticated DDoS attacks? With the threat of reduced revenues, higher expenses and damaged reputations, organizations need Radware’s hybrid attack mitigation solution that integrates real-time WAF, SSL protection and DDoS protection on-premise with a cloud service that is activated on-demand.
  • 27
    RollBack Rx Server

    RollBack Rx Server

    Horizon Datasys

    RollBack Rx Server Edition is a robust Windows Server backup and restores utility that enables IT, professionals, an instant backup capability that can quickly restore mission-critical systems back to any number of multiple restore points with unrivaled speeds. RollBack Rx Server Edition makes it quick and easy to safely sandbox updates and service patches with a failsafe approach to system recovery. RollBack Rx Server Edition offers unrivaled background protection and real-time recovery speeds. This allows you to store a locally backed-up sector-map repository of complete multiple instances (or “snapshots”) of the server state. These snapshots can be scheduled to occur at intervals you specify — as frequently as every minute — and can number many thousands. This continual snapshot-taking can be set to occur in the background with no perceptible impact on day-to-day server response times.
  • 28
    PATRIOT OFFICER

    PATRIOT OFFICER

    GlobalVision Systems

    PATRIOT OFFICER is endorsed by the American Bankers Association through its subsidiary, the Corporation for American Banking, LLC and other prestigious financial trade associations across the nation. PATRIOT OFFICER is the industry leading regulatory compliance and risk management solution for financial institutions of all sizes, integrating anti-money laundering, counter-terrorist financing, and anti-fraud capabilities all into a single streamlined system. PATRIOT OFFICER is fully compatible with your existing core processing system - delivering scalability and data accuracy while eliminating the need for costly third-party interface solutions. PATRIOT OFFICER exclusively uses the most advanced adaptive intelligence technology, empowering financial institutions to effectively comply with risk-based policy, procedure and process as required by the BSA/AML examination manual.
  • 29
    Red Hat Virtualization
    Red Hat® Virtualization is an enterprise virtualization platform that supports key virtualization workloads including resource-intensive and critical applications, built on Red Hat Enterprise Linux® and KVM and fully supported by Red Hat. Virtualize your resources, processes, and applications with a stable foundation for a cloud-native and containerized future. Automate, manage, and modernize your virtualization workloads. Whether automating daily operations or managing your VMs in Red Hat OpenShift, Red Hat Virtualization uses the Linux® skills your team knows and will build upon for future business needs. Built on an ecosystem of platform and partner solutions and integrated with Red Hat Enterprise Linux, Red Hat Ansible Automation Platform, Red Hat OpenStack® Platform, and Red Hat OpenShift to improve overall IT productivity and drive a higher return on investment.
  • 30
    CimTrak Integrity Suite
    Securing your enterprise against internal and external threats is key to meeting compliance standards and regulations. CimTrak’s change management, auditing, and reporting capabilities allow private and public companies to meet or exceed even the most rigorous compliance mandates. From PCI, SOX, HIPAA, CIS, NIST, and many more, CimTrak has you covered. File and System Integrity monitoring helps protect your critical files from changes, whether malicious or accidental, that can take down your critical IT infrastructure, threaten critical data, or cause non-compliance with regulations such as PCI. Change is inevitable in the IT environment. CimTrak delivers integrity monitoring, proactive incident response, change control, and auditing capabilities in one easy to use and cost-effective file integrity monitoring tool.