The "/xMSannotator_1.1.1...Sannotator_1.1.1.zip" file could not be found or is not available. Please select another file.

Best Free Network Security Software - Page 3

Compare the Top Free Network Security Software as of April 2026 - Page 3

  • 1
    Privatoria

    Privatoria

    Privatoria

    If уоu аrе соnсеrnеd аbоut уоur оnlіnе ѕаfеtу, you ѕhоuld trу ѕоmе methods that wіll hide уоur identity. The mоѕt widely uѕеd today аrе thоѕе that hide the ір. Such methods іnсludе the use оf рrоxу servers and software рrоgrаmѕ. VPN is a good tool to keep you safe and anonymous at the same time. It creates a secure and encrypted connection between you and accessed website. When you connect to a VPN server all your traffic goes through an encrypted tunnel and none can see it until it exits the tunnel and accesses a public internet. If you are connecting to websites with HTTPS encryption, your personal data stays secure even when it exits the tunnel. VPN protects information and allows to leave no footprints while surfing the web.
    Starting Price: $2.74 per user per month
  • 2
    Infiltrator

    Infiltrator

    Infiltration Systems

    Infiltrator is a free easy to use, intuitive network security scanner that can quickly audit your network computers for vulnerabilities, exploits, and information enumerations. Infiltrator can reveal and catalog a plethora of information on scanned computers - such as installed software, shares, users, drives, hotfixes, NetBios and SNMP information, open ports and much more! Infiltrator can audit each computer's password and security policies, alerting you when changes should be made to increase security. All results can be generated into sleek, easy to read report by the report generator. Infiltrator also comes with over 15 powerful network utilities for footprinting, scanning, enumerating and gaining access to machines. Included utilities are ping sweep, whois lookups, email tracing, brute force cracking tools, share scanning, network enumerating, and many more!
  • 3
    Comodo Dragon Platform
    Our completely cloud-native framework delivers you zero day protection against undetectable threats while defending your endpoints from known threat signatures. Comodo introduced a new approach to endpoint protection, engineered to solve the issue of legacy security solutions. The Dragon platform delivers the foundation principles for complete next-generation endpoint protection. Easily improve your cybersecurity and performance with the Dragon Platform's lightweight agent delivering artificial intelligence (AI) and Auto Containment to stop all threats. Comodo delivers everything cybersecurity you ever needed to activate breach protection immediate value added from day one. 100% trusted verdict within 45 seconds on 92% of signatures via analysis, and 4 hours SLA on the remaining 8% via human experts. Automatic signature updates that simplifies deployment across your entire environment to lower operational costs.
  • 4
    Gravwell

    Gravwell

    Gravwell

    Gravwell is an all-you-can-ingest data fusion analytics platform that enables complete context and root cause analytics for security and business data. Gravwell was founded to bring the benefits of usable machine data to all customers: large or small, text or binary, security or operational. When experienced hackers and big data experts team-up you get an analytics platform capable of things never seen before. Gravwell enables security analytics that go well beyond log data into industrial processes, vehicle fleets, IT infrastructure, or everything combined. Need to hunt down a suspected access breach? Gravwell can correlate building access logs and run facial recognition machine learning against camera data to isolate multiple subjects entering a facility with a single badge-in. We exist to provide analytics capabilities to people who need more than just text log searching and need it sooner rather than later at a price they can afford.
  • 5
    GreyNoise

    GreyNoise

    GreyNoise

    We collect, analyze, and label data on IPs that scan the internet and saturate security tools with noise. This unique perspective helps analysts waste less time on irrelevant or harmless activity, and spend more time focused on targeted and emerging threats. GreyNoise helps analysts recognize events not worth their attention. Indicators in GreyNoise are likely associated with opportunistic internet scanning or common business services, not targeted threats. This context helps analysts focus on what matters most. If we see your device scanning the internet, it's likely compromised. GreyNoise notifies analysts when an IP they care about shows up in our collection, helping security teams respond quickly to compromises. Security teams can uncover tradecraft seen across the internet through our GreyNoise Query Language (GNQL). Our tags reveal IPs looking for and exploiting vulnerabilities. Security teams can assess their exposure as they monitor progressive threat activity.
  • 6
    Comodo cWatch

    Comodo cWatch

    Comodo Group

    The CSOC provides 24/7 security monitoring by certified security analysts and uses state-of-the-art technology. Analysts at the CSOC identify and analyze threats, provide alerting when appropriate to engage clients in resolution and to assist in mitigation. Comodo cWatch CSOC extends your internal IT team's capacity to protect your applications with advanced security solutions that are easy to implement, fully managed and do not require large upfront investments. It is designed to absorb the time-consuming and complex security incident investigation process while offloading the high costs of in-house security staff. With real-time web traffic monitoring and proactive incident identification, our security experts are able to notify organizations and take necessary actions quickly when an attack is detected. Continuous monitoring by Comodo CSOC security experts that have deep expertise in application security monitoring and management.
    Starting Price: $9.90
MongoDB Logo MongoDB