Best IT Security Software for Windows - Page 47

Compare the Top IT Security Software for Windows as of December 2025 - Page 47

  • 1
    Deep Identity

    Deep Identity

    Deep Identity

    Deep Identity enables you to protect your organization with a complete range of Deep Identity integration and data governance products. Built on light-weight flexible and open architecture. Trusted Identity Audit & Compliance Manager (Trusted IACM) is the industry’s most comprehensive solution that provides a ‘layered approach’ to identity governance and administration. Trusted Identity Manager (Trusted IM) is the industry’s most lightweight solution that provides a “layered” approach to identity administration. Privilege Identity Manager (Trusted PIM) is the industry’s most practical and non-intrusive solution to address privilege identity related challenges in any organization. Data Governance Manager (Trusted DGM) provides complete automation for identity, data access governance and lifecycle management with integration across modules and systems. Handle Full time, Contractors profile management, Access review, N Level approval workflow, Self Service, Bulk provisioning etc
  • 2
    Specops Password Sync

    Specops Password Sync

    Specops Software

    Streamline passwords for users with just one password across multiple business systems. Specops Password Sync instantly synchronizes Active Directory passwords to domains, or other systems. This includes domains in the same forest/other forests, on-premises systems (e.g. Kerberos), and SaaS targets (e.g. O365). The tool enhances security by ensuring that password complexity applies to all systems consistently. Specops Password Sync effectively extends Active Directory password security to other business systems, including external SaaS resources. When combined with a strong password policy, the product ensures that the same level of password complexity applies to all connected systems. Built on Active Directory, the tool captures and synchronizes all changes to a user’s password in accordance with the synchronization rules defined in Group Policy. The solution can be setup in just a few hours by configuring the local Active Directory.
  • 3
    TrueSight Operations Management
    TrueSight Operations Management delivers end-to-end performance monitoring and event management. It uses AIOps to dynamically learn behavior, correlate, analyze, and prioritize event data so IT operations teams can predict, find and fix issues faster. Identify data anomalies and predictively alert to remediate issues before service impact. TrueSight Infrastructure Management helps you detect and address performance abnormalities before they impact the business. It automatically learns the behavior of your infrastructure, telling you what’s normal, and only issues alerts when behavior needs attention. This helps you focus on the events that matter most to IT and the business. TrueSight IT Data Analytics uses machine-assisted analysis for log data, metrics, events, changes, and incidents. You can automatically sift through millions of messages with a single click to solve problems faster.
  • 4
    LogFusion

    LogFusion

    Binary Fortress Software

    LogFusion is a powerful realtime log monitoring application designed for system administrators and developers! Use custom highlighting rules, filtering and more. You can even sync your LogFusion settings between computers. Use LogFusion's powerful custom highlighting to match text strings or regex patterns and format the matched log lines to suit your needs. Use LogFusion's Advanced Text Filtering to filter and hide lines that don't match your search text, all in realtime as new lines are being added. Complex queries allow you to easily narrow down your results. LogFusion can automatically add new logs from Watched Folders. Just specify the folders to monitor, and LogFusion will automatically open any new log files created in those folders.
  • 5
    IDReset

    IDReset

    Interactive Northwest

    Self-service password reset applications are designed to ease helpdesk load by providing a secure mechanism for users to independently reset their accounts via web or phone. INI delivers automated password reset solutions that uniquely meet an organization’s security needs as well as the expectations of its users. Helpdesk inquiries cost an average of $10-$30 per call. By automating the reset process, a self-service password reset application allows most organizations to realize a return on investment that pays for the application within the first year of use. Time saved by users, helpdesk, IT, finance, and security personnel yields significant productivity gains throughout the organization providing significant value to the bottom line. Elevates security by removing the agent from the authentication process. Enhances convenience with 24/7 immediate access. Maximizes ROI with 20%-40% fewer costly helpdesk calls. Frees helpdesk staff to work on mission-critical issues.
  • 6
    CI Badge

    CI Badge

    CI Solutions

    CI Badge is a powerful ID card issuance program that serves thousands with flexible image capture, robust data connectivity and unlimited card printing bringing simplicity to complex, secure ID card production. Each version of our CI Badge Card Printing Software is customized to your specific card printing needs. We base our solutions on a number of factors in order to create the best long-term solution for your organization. Start your card printing program by scheduling a demo with us today. Look Up a Record, Take a Photo & Click Print. CI Badge is the software program that connects your camera, card printer, and database. Using a connected camera and CI Badge, you can easily send print jobs to your card printer. You can also import your current database into CI Badge. Simply look up a record in CI Badge, take a photo if needed, and click print.
  • 7
    Argoscope

    Argoscope

    Detelix Software Technologies

    A combination of knowledge, experience, technology and automation leads the executives of over 25 leading companies in Israel to rely on Argoscope will alert in time and allow them to prevent financial leaks. Argoscope checks 24/7 all company payments, including suppliers, customers, insureds, salaries and any other organizational process in order to detect errors, fraud and embezzlement in time, also the work procedures compliance. Argoscope integrates into every possible database, thus examining every end-to-end business process. The system is based on the knowledge and experience of the best experts, including finance managers, risks, internal auditors, information security and cyber of the large organizations in Israel, using machine learning, business intelligence, re-learning and developing new algorithms on an ongoing basis. Argoscope keeps track of your organization's assets anywhere, anytime, anytime.
  • 8
    ISEEK

    ISEEK

    XtremeForensics

    Running entirely in memory, ISEEK is the embodiment of a patented process. It is an automated tool that can be deployed to run concurrently across any number of computer systems where it operates invisibly in accordance with an encrypted set of instructions. The results of ISEEK's processing are encrypted and sent to a location specified in the set of instructions which can be a local drive, a network share or cloud storage.​ Stand-alone utilities enable the creation of the encrypted set of instructions and the ability to review and process the contents of encrypted results containers. Once ISEEK has been used to pinpoint the required data and reduce the volume for further review it enables multiple encrypted results containers to have their contents extracted in a number of different formats (with optional XML metadata) for ingesting by a review tool. These formats include generic load files and a Relativity-specific load file.
  • 9
    Nfusion

    Nfusion

    Ntrepid

    Nfusion is a virtual desktop environment that allows you to manage your attribution, or maintain complete control of the technical and behavioral indicators that comprise your online presence. Our product combines digital fingerprint masking with integrated collection tools and third-party applications. Nfusion puts your investigation desktop into a remote, isolated VDI that is accessed over a VPN connection. Access the internet from one of our proprietary points of presence, allowing you to appear from the location of your choice. At the end of every session, your VM is purged, destroying any malware or trackers. Your workspace can be personalized with third-party applications, including Maltego, i2 Analyst Notebook, Wickr, Telegram, and other messaging platforms.
  • 10
    DDP Mobile Edition
    Today employees, partners and vendors alike work any time, anywhere, using any device to download and share files. Personally owned smartphones and tablets, like desktops and laptops, have become a standard work tool. Accordingly, most organizations are embracing the bring your own device movement, recognizing it helps to both reduce equipment costs and increase productivity. But without proper encryption and password enforcement, data accessed on mobile devices, whether from a corporate server or a public cloud, is unprotected. If the device is lost or stolen, or if data is accessed through an open wireless hotspot, it could be hijacked, putting companies in jeopardy of a security breach and compliance violations. IT teams are struggling to strike a balance between protecting data and impeding worker productivity by restricting data access. Dell Data Protection | Mobile Edition helps to put IT back in control of data security by enabling you to protect data.
  • 11
    DESwrap

    DESwrap

    Data Encryption Systems

    The DK2 and DK3 can be used in conjunction with our DESwrap software to give instant protection to .EXE and .DLL files. This is achieved by wrapping a protective shield around the application using encryption techniques designed and tested during the past 25 years to provide a very secure operating environment for your software. The Down Counter within the DESkey may be called from DESwrap. This feature provides the means to stop your software working after a pre-programmed number of executions. An ideal method of controlling demonstration software, this counter may be reset remotely. In addition to the standard features, all DESwrap system messages may be user-defined when protecting your application. DESwrap for 32-bit Windows also encrypts function calls to .DLL files and the Win32 API. The number of API calls per DESkey access and the .DLL files which use ACE can be customized. DESwrap for 32-bit Windows also encrypts function calls to .DLL files and the Win32 API.
  • 12
    IDSync

    IDSync

    IDSync

    Active Directory To Active Directory Identity Synchronizer Software. Solves Password Sharing Problems, Overly Broad “rights” for IT staff and supports user enablement/disablement for Customer’s Active Directory. The Identity Syncronizer Active Directory to Active Directory platform enables an MSP to connect its on-premise Active Directory to its customers’ Active Directories for purposes of provisioning and synchronizing user metadata and passwords for its technicians, those who will be accessing the customers’ Active Directory and networks. IDSync provides an interface through which the MSP can identify those technicians for provisioning, identify target Active Directories into which the technicians will be provisioned or de-provisioned. Provisioning and synchronization can be maintained at the individual user level or can be accomplished in bulk via security groups.
  • 13
    Firco Insight

    Firco Insight

    LexisNexis

    Firco Insight (formerly SBS SAFE Advanced Solutions Visual Intelligence Platform) is a feature-rich and scalable platform that combines account screening filtering intelligence with high-performance processing and scoring capabilities to improve your screening accuracy and eliminate alert overload. Leveraging AI techniques, Firco Insight reduces false positives and prioritizes alerts by risk severity and enables you to avoid missing high-risk accounts and meet financial crime regulatory requirements with confidence. Arm your organization with the visibility required to understand which accounts you should do business with, and more importantly, what high-risk accounts you should avoid. Protect your institution from risk by enhancing your screening process to strategically target risk, reduce false positive alerts, streamline investigations, and boost operational efficiency.
  • 14
    Clari5

    Clari5

    Clari5 (CustomerXPs)

    Category leaders for Enterprise Fraud Risk Management Systems and Anti-Money Laundering Systems, winner of premier global acclaim for product innovation and featured consistently in global risktech and regtech top 100 rankings, Clari5 redefines real-time, cross-channel Financial Crime Risk Management using a 'central nervous system' approach to help banks combat financial crime. Clari5 uses a ‘human brain like’ approach by synthesizing enterprise-wide intelligence and delivering precise contextual insights in extreme real-time, within the short transaction window, for necessary interventions. Clari5 is a bolt-on system, requires no replacement and features a compact implementation cycle with extremely quick ROI. Harnessing the combined power of Automation, AI, ML, Decision Sciences & Real-time Decisions, Clari5 is today processing over 10 bn transactions and is managing over 500 mn accounts. Marquee banks in 15 countries trust Clari5 to power their fraud risk management strategy. With
  • 15
    Radware DefensePro
    DefensePro and DefensePro VA provide advanced DDoS prevention, protection and IoT botnet attack mitigation across legacy data center and public cloud. Part of Radware’s attack mitigation solution, DefensePro provides automated DDoS defense and protection from fast moving, high volume, encrypted or very short duration threats, including IoT-based attacks like Mirai, Pulse, Burst, DNS, TLS/SSL attacks and those attacks associated with Permanent Denial of Service (PDoS) and Ransom Denial-of-Service (RDoS) techniques. Are you tired of fighting prolonged attack campaigns? Is your organization using the proper DDoS defense techniques to withstand today’s sophisticated DDoS attacks? With the threat of reduced revenues, higher expenses and damaged reputations, organizations need Radware’s hybrid attack mitigation solution that integrates real-time WAF, SSL protection and DDoS protection on-premise with a cloud service that is activated on-demand.
  • 16
    RollBack Rx Server

    RollBack Rx Server

    Horizon Datasys

    RollBack Rx Server Edition is a robust Windows Server backup and restores utility that enables IT, professionals, an instant backup capability that can quickly restore mission-critical systems back to any number of multiple restore points with unrivaled speeds. RollBack Rx Server Edition makes it quick and easy to safely sandbox updates and service patches with a failsafe approach to system recovery. RollBack Rx Server Edition offers unrivaled background protection and real-time recovery speeds. This allows you to store a locally backed-up sector-map repository of complete multiple instances (or “snapshots”) of the server state. These snapshots can be scheduled to occur at intervals you specify — as frequently as every minute — and can number many thousands. This continual snapshot-taking can be set to occur in the background with no perceptible impact on day-to-day server response times.
  • 17
    PATRIOT OFFICER

    PATRIOT OFFICER

    GlobalVision Systems

    PATRIOT OFFICER is endorsed by the American Bankers Association through its subsidiary, the Corporation for American Banking, LLC and other prestigious financial trade associations across the nation. PATRIOT OFFICER is the industry leading regulatory compliance and risk management solution for financial institutions of all sizes, integrating anti-money laundering, counter-terrorist financing, and anti-fraud capabilities all into a single streamlined system. PATRIOT OFFICER is fully compatible with your existing core processing system - delivering scalability and data accuracy while eliminating the need for costly third-party interface solutions. PATRIOT OFFICER exclusively uses the most advanced adaptive intelligence technology, empowering financial institutions to effectively comply with risk-based policy, procedure and process as required by the BSA/AML examination manual.
  • 18
    Red Hat Virtualization
    Red Hat® Virtualization is an enterprise virtualization platform that supports key virtualization workloads including resource-intensive and critical applications, built on Red Hat Enterprise Linux® and KVM and fully supported by Red Hat. Virtualize your resources, processes, and applications with a stable foundation for a cloud-native and containerized future. Automate, manage, and modernize your virtualization workloads. Whether automating daily operations or managing your VMs in Red Hat OpenShift, Red Hat Virtualization uses the Linux® skills your team knows and will build upon for future business needs. Built on an ecosystem of platform and partner solutions and integrated with Red Hat Enterprise Linux, Red Hat Ansible Automation Platform, Red Hat OpenStack® Platform, and Red Hat OpenShift to improve overall IT productivity and drive a higher return on investment.
  • 19
    CimTrak Integrity Suite
    Securing your enterprise against internal and external threats is key to meeting compliance standards and regulations. CimTrak’s change management, auditing, and reporting capabilities allow private and public companies to meet or exceed even the most rigorous compliance mandates. From PCI, SOX, HIPAA, CIS, NIST, and many more, CimTrak has you covered. File and System Integrity monitoring helps protect your critical files from changes, whether malicious or accidental, that can take down your critical IT infrastructure, threaten critical data, or cause non-compliance with regulations such as PCI. Change is inevitable in the IT environment. CimTrak delivers integrity monitoring, proactive incident response, change control, and auditing capabilities in one easy to use and cost-effective file integrity monitoring tool.
  • 20
    Netwrix Change Tracker
    Netwrix Change Tracker provides critical and fundamental cyber security prevention and detection. It does this by leveraging the required security best practice disciplines of system configuration and integrity assurance combined with the most comprehensive and intelligent change control solution available. Netwrix Change Tracker will ensure that your IT systems remain in a known, secure and compliant state at all times. Netwrix Change Tracker includes context-based File Integrity Monitoring and File Whitelisting to assure all change activity is automatically analyzed and validated. Complete and certified CIS and DISA STIG configuration hardening ensures all systems remain securely configured at all times and, coupled with the most intelligent change control technology, provides unparalleled change noise reduction along with the ultimate reassurance that the changes occurring within your production environment are consistent, safe and as required.
  • 21
    BlackBerry UEM

    BlackBerry UEM

    BlackBerry

    With diverse endpoints that include smartphones, tablets, laptops and other devices with different ownership models and running different operating systems, it’s essential for organizations to have control and visibility across the entire ecosystem. BlackBerry® offers solutions to open up choice for your employees while maintaining security. Employees are increasingly looking for the flexibility to use their smartphone of choice for work. When done securely, this can reduce costs and boost morale. A comprehensive Mobile Device Management strategy needs to deliver flexibility that can evolve with your changing mobility needs. BlackBerry solutions can allow you to deploy MDM securely and in a way that meets your business needs.
  • 22
    SDS VitalSigns

    SDS VitalSigns

    Software Diversified Services

    Every product in the VitalSigns family is a money saver. Each VitalSigns product provides a quick install, an economical alternative to costly legacy products, minimal demand on the mainframe, and 24/7 access to our world-class support team. VitalSigns is a full-spectrum tool set for… Event Log Management and Compliance – VitalSigns SIEM Agent for z/OS FTP Monitoring – VitalSigns for FTP Complete FTP Security – The VFTP/SSH Collaboration IP Monitoring – VitalSigns for IP Network Automation – VitalSigns for Network Automation and Control SNA and IP Monitoring – VitalSigns for VTAM
  • 23
    Dataview360

    Dataview360

    GDS Link

    The DataView360 was developed to ease the integration with external and internal data sources, such as credit bureaus, fraud and ID verification providers. The software product is configurable to allow our customers to pick up and choose the data they require, within their processes, for instant decisioning. DataView360 is a web-services application that is easily integrated within existing infrastructure or external environments. The DataView360 Data Engine has emerged as an essential tool for effective and dynamic risk management practices. Used to access, interrogate and integrate data with any host or proprietary systems, the Data Engine is equally ideal for users who need to enhance their legacy systems as well as those looking for a modular full-scale solution.
  • 24
    Digital.ai Application Protection
    Our proprietary protection capabilities shield apps from reverse engineering, tampering, API exploits, and other attacks that can put your business, your customers, and your bottom line at risk. Obfuscates source code, inserts honeypots, and implements other deceptive code patterns to deter and confuse threat actors. Triggers defensive measures automatically if suspicious activity is detected, including app shutdown, user sandbox, or code self-repair. Injects essential app code protections and threat detection sensors into CI/CD cycle after code development, without disrupting the DevOps process. Encrypts static or dynamic keys and data embedded or contained within app code. Protects sensitive data at rest within an app or in transit between the app and server. Supports all major cryptographic algorithms and modes with FIPS 140-2 certification.
  • 25
    OSE

    OSE

    Open Seas

    Once hacked, compromised organizations face huge barriers to rebuilding customer trust and brand reputation. OSE detects & alerts to attacks on your critical systems as they occur so you can stop them before damage is done to your organization's IP, brand and reputation with the ensuing loss of customer trust. OSE provides an audit of an attack listing what was changed, what it was before making it quick to resolve. OSE reporting helps with ISO 27000 compliance. OSE (Operating system Security Enforcer) implements your defined Security Policy which can either be an out of the box OSE standard or your personalized version. Rolling-out & apply the security policy on all Unix, Linux & Windows corporate servers. The Autonomous OSE Agent is permanently located on a Unix/Linux server. It is persistent, even in case of network failure. It can also group a set of servers monitored by OSE Agents.
  • 26
    NerveCenter

    NerveCenter

    Logmatrix

    Primary utility power outages do occur; often caused by poor infrastructure or weather. As the size, complexity and criticality of networks continue to grow, reliable backup op UPS power is critical to network uptime. Additionally, UPS batteries lose capacity in as early as three years. While UPS battery manufacturers may market their batteries with a ten-year design life or life span, external factors can cause degradation and shorten battery life. Internal cell resistance (via temperature) – To verify the state of health by identifying low capacity cells Inter-Cell Resistance – conduction path integrity between cells to avoid hot spots, fires, and abrupt shutdowns via temperature monitoring. Properly monitored UPS battery systems have a longer life, require less energy to charge and require less preventive maintenance. Improve uptime and prevent network outages caused by UPS failures, UPS capacity issues and drained UPS battery power.
  • 27
    NetMotion

    NetMotion

    NetMotion Software

    The only remote access solution that includes patented technologies that stabilize and enhance the network, built specifically for the mobile and remote worker. A more intelligent way to deliver secure remote access, protecting users from risky content and securing enterprise resources from unapproved access. Get deep insights on remote workers, visualized in real-time dashboards. Diagnose issues, identify opportunities and take action to improve the employee experience. Your workforce is more distributed than ever, relying on the cloud to get work done from anywhere. You need security solutions that reflect the new normal, offering zero trust at the edge without ignoring the requirements of today. Get the best of VPN and the best of ZTNA in a single platform. No matter which OS or device mix your environment supports, and whether your strategy is primarily on-premise or in the cloud, you’ll be able to deploy it exactly in the way that suits you.
  • 28
    Encrypted Data Gateway Engine
    Authora's Encrypted Data Gateway Engine "EDGE" is a command line designed for organizations that must securely exchange large volumes of information. EDGE protects business-critical data easily and with little impact on existing systems. EDGE can also be used to protect large volumes of information stored on servers and backup media from unauthorized access. From tape backup processes to batch FTP transfers and data distribution to partners, EDGE provides robust encryption capabilities for automated data processing applications. Adding EDGE's cryptographic functions to business applications and processes allows organizations to address risk mitigation and compliance standards. Authora's Encrypted Data Gateway Engine, "EDGE", is an OpenPGP compliant command-line application. Edge elegentlyr integrates cryptogrphic functions into your existing business prosseses. Edge is platform independent and runs on Windows and on a variety of UNIX systems.
  • 29
    Snorkel-BX

    Snorkel-BX

    Odyssey Technologies

    Snorkel-BX is a versatile transaction security server that enables secure communication and trust between business applications. B2B applications form the backbone of e-commerce and are often the target for hackers. Securing business applications from hackers is often complicated due to requiring painful integration and constant maintenance, not to mention a dedicated team with esoteric PKI knowledge. The complexity of securing B2B applications stems from the fact that the transacting entities are often built on diverse platforms, have differing feature sets, and possess varying levels of security. To keep up with changes in business needs, technology, and threat environment, the applications also need constant changes and upgrades which can further complicate the task of securing business applications.
  • 30
    StealthDisk Mobile

    StealthDisk Mobile

    Security Group Six

    StealthDisk Mobile uses Virtual Disk Technology to easily and securely store all your important files and documents. Using industry-leading encryption algorithms, StealthDisk Mobile creates an encrypted virtual disk that encrypts and decrypts all data on-the-fly as you work. When you are done, simply dismount the StealthDisk volume and all your important files and documents will be instantly hidden and encrypted. There is no need to encrypt each and every file or each and every every folder like other file encryption applications. All our algorithms are optimized and blazing fast! Our software processes data on-the-fly meaning data only gets decrypted when it is accessed. Other file encryption software encrypts or decrypts the entire file before you can use it. StealthDisk Mobile does this automatically and only to the data that you access saving valuable time and resources.
    Starting Price: $49.95 one-time payment