Alternatives to CacheGuard

Compare CacheGuard alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to CacheGuard in 2025. Compare features, ratings, user reviews, pricing, and more from CacheGuard competitors and alternatives in order to make an informed decision for your business.

  • 1
    UTunnel VPN and ZTNA
    UTunnel provides Cloud VPN, ZTNA, and Mesh Networking solutions for secure remote access and seamless network connectivity. ACCESS GATEWAY: Our Cloud VPN as a Service offers swift deployment of Cloud or On-Premise VPN servers. It utilizes OpenVPN and IPSec protocols, enables policy-based access control, and lets you deploy a Business VPN network effortlessly. ONE-CLICK ACCESS: A Zero Trust Application Access (ZTAA) solution that simplifies secure access to internal business applications. It allows users to securely access them via web browsers without the need for a client application. MESHCONNECT: This Zero Trust Network Access (ZTNA) and mesh networking solution based on WireGuard enables granular access controls to business network resources and easy creation of secure mesh networks. SITE-TO-SITE VPN: The Access Gateway solution lets you easily set up secure Site-to-Site tunnels (IPSec) between UTunnel's VPN servers and hardware network gateways, firewalls & UTM systems.
    Leader badge
    Partner badge
    Compare vs. CacheGuard View Software
    Visit Website
  • 2
    Fastly

    Fastly

    Fastly

    Empower your developers, connect with your customers, and grow your business with today’s leading edge cloud platform. Deliver the best online experiences possible with our edge cloud platform, built to strengthen your current teams and technology. We move data and applications closer to your users — at the edge of the network — to help your websites and apps perform faster, safer, and at global scale. Fastly's highly programmable CDN gives you the freedom to customize delivery right at the edge. Delight your users with the content they want at their fingertips. Our powerful POPs, driven by solid-state drives (SSDs) and hosted in well-connected locations around the world, help us keep more content in cache longer for fewer trips to the origin. Instant Purge and batch purging with surrogate keys let you cache and invalidate highly dynamic content with a mean purge time of 150 milliseconds*. Serve headlines, inventory, or weather forecasts that are always up to date.
  • 3
    Fortinet

    Fortinet

    Fortinet

    Fortinet is a global leader in cybersecurity solutions, known for its comprehensive and integrated approach to safeguarding digital networks, devices, and applications. Founded in 2000, Fortinet provides a wide range of products and services, including firewalls, endpoint protection, intrusion prevention systems, and secure access solutions. At the core of its offerings is the Fortinet Security Fabric, a unified platform that seamlessly integrates security tools to deliver visibility, automation, and real-time threat intelligence across the entire network. Trusted by businesses, governments, and service providers worldwide, Fortinet emphasizes innovation, scalability, and performance, ensuring robust defense against evolving cyber threats while supporting digital transformation and business continuity.
  • 4
    Amazon ElastiCache
    Amazon ElastiCache allows you to seamlessly set up, run, and scale popular open-Source compatible in-memory data stores in the cloud. Build data-intensive apps or boost the performance of your existing databases by retrieving data from high throughput and low latency in-memory data stores. Amazon ElastiCache is a popular choice for real-time use cases like Caching, Session Stores, Gaming, Geospatial Services, Real-Time Analytics, and Queuing. Amazon ElastiCache offers fully managed Redis and Memcached for your most demanding applications that require sub-millisecond response times. Amazon ElastiCache works as an in-memory data store and cache to support the most demanding applications requiring sub-millisecond response times. By utilizing an end-to-end optimized stack running on customer-dedicated nodes, Amazon ElastiCache provides secure, blazing-fast performance.
  • 5
    LiteSpeed Web Server

    LiteSpeed Web Server

    LiteSpeed Technologies

    Our lightweight Apache alternative conserves resources without sacrificing performance, security, compatibility, or convenience. Double the maximum capacity of your current Apache servers with LiteSpeed Web Server's streamlined event-driven architecture, capable of handling thousands of concurrent clients with minimal memory consumption and CPU usage. Protect your servers with already familiar ModSecurity rules while also taking advantage of a host of built-in anti-DDoS features, such as bandwidth and connection throttling. Conserve capital by reducing the number of servers needed to support your growing hosting business or online application. Reduce complexity by eliminating the need for an HTTPS reverse proxy or additional 3rd party caching layers. LiteSpeed Web Server is compatible with all popular Apache features including its Rewrite Engine and ModSecurity, and can load Apache configuration files directly.
  • 6
    Axcient x360Recover
    Axcient x360Recover is an enterprise-grade backup, business continuity, and disaster recovery (BCDR) platform designed for MSPs, providing persistent, chain-free backups with industry-leading features like AirGap immutability, AutoVerify automated test restores, Local Cache–accelerated recoveries, and Virtual Office cloud virtualization. Its chain-free architecture stores backups as immutable ZFS snapshots, preventing degradation or reseeding even over long retention periods, and guards against ransomware and accidental deletion via a secure AirGap layer. AutoVerify conducts nightly boot-and-deep-volume backup integrity checks for recoverability assurance. Local Cache enables rapid bare-metal restores from on-prem block storage, and Virtual Office can instantly spin up entire offices or individual systems in the cloud for testing or live failover.
  • 7
    Squid

    Squid

    Squid

    Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. It reduces bandwidth and improves response times by caching and reusing frequently-requested web pages. Squid has extensive access controls and makes a great server accelerator. It runs on most available operating systems, including Windows, and is licensed under the GNU GPL. Squid is used by hundreds of Internet Providers worldwide to provide their users with the best possible web access. Squid optimizes the data flow between client and server to improve performance and caches frequently-used content to save bandwidth. Squid can also route content requests to servers in a wide variety of ways to build cache server hierarchies that optimize network throughput. Thousands of websites around the Internet use Squid to drastically increase their content delivery. Squid can reduce your server load and improve delivery speeds to clients.
  • 8
    WatchGuard Endpoint Protection Platform (EPP)
    The WatchGuard EPP product goes beyond signature-based antivirus to stop malware, ransomware and threats that leverage unknown, zero day vulnerabilities. Even better, it's managed with an intuitive Cloud-based console and lightweight agent that doesn't interfere with endpoint performance. Endpoints are protected from viruses, malware, spyware and phishing with WatchGuard EPP. We use a comprehensive set of security techniques including signatures, local cache, and even our own proprietary intelligence feeds derived from the malware previously detected with our EDR products. This enables us to find zero day exploits using behavioral heuristics and known indicators of attacks as “contextual rules." WatchGuard EPP centralizes next-generation antivirus for all your Windows, macOS and Linux desktops, laptops, and servers, in addition to the leading virtualization systems.
  • 9
    Ehcache

    Ehcache

    Terracotta

    Ehcache is an open source, standards-based cache that boosts performance, offloads your database, and simplifies scalability. It's the most widely-used Java-based cache because it's robust, proven, full-featured, and integrates with other popular libraries and frameworks. Ehcache scales from in-process caching, all the way to mixed in-process/out-of-process deployments with terabyte-sized caches. Terracotta actively develops, maintains, and supports Ehcache as a professional open source project available under an Apache 2.0 license. Contributors are welcome to join our community.
  • 10
    NCache

    NCache

    Alachisoft

    NCache is an open source distributed cache for .NET Framework & .NET Core (released under Apache License, Version 2.0), by Alachisoft. NCache provides an extremely fast and linearly scalable distributed cache that caches application data and reduces expensive database trips. Organizations use NCache to remove performance bottlenecks related to their data storage and databases and can scale their .NET and Java applications to extreme transaction processing (XTP). NCache Open Source gives the .NET developer community unrestricted access to the industry’s oldest and most popular distributed cache. Due to its Open Source nature .NET developers finally have complete access to a truly elastic .NET distributed cache that fits in nicely with their application’s .NET stack. Alachisoft is the market leader since 2003 through its product NCache. Founded in 1996 as a software development services company, Alachisoft transitioned to a product company in 2003
    Starting Price: $995.00
  • 11
    iPrism Web Security
    iPrism Web Security offers a unique combination of fine-grained content filtering combined with threat detection and mitigation methods to assure powerful protection from Advanced Persistent Threats, including botnets, malware, viruses and others. iPrism Web Security is designed to be “set it and forget it” easy to use, self-contained to provide advanced threat protection and policy enforcement, yet require nearly zero maintenance. And our comprehensive on-box reporting makes managing your network a snap. iPrism uses our unique combination of iGuard automated intelligence and expert human analysis to block things like malware, Crypto-Locker and inappropriate sites. It also provides improved user productivity with low latency and false positive rates. This innovative approach ensures you have the most updated, advanced web protection 24/7 that is backed by world-class customer support.
  • 12
    WatchGuard Firebox Cloud
    It’s a fact – businesses are migrating services from on-premises servers into the cloud. Email servers, web servers, customer relationship management systems (CRM), and file storage are migrating to public cloud services. With so much sensitive data moving to the cloud, security is essential. WatchGuard’s Firebox Cloud allows network administrators to extend their security perimeter to the cloud and protect servers running within a public cloud environment. WatchGuard Firebox Cloud brings the protection of WatchGuard’s leading Firebox Unified Threat Management (UTM) appliances to public cloud environments. Firebox Cloud can quickly and easily be deployed to protect a Virtual Private Cloud (VPC) from attacks such as botnets, cross-site scripting, SQL injection attempts, and other intrusion vectors.
  • 13
    ClamAV

    ClamAV

    ClamAV

    ClamAV® is the open-source standard for mail gateway-scanning software. ClamAV includes a multi-threaded scanner daemon, command-line utilities for on-demand file scanning, and automatic signature updates. ClamAV supports multiple file formats and signature languages, as well as file and archive unpacking. Access to ClamAV versions that work with your operating system. ClamAV® is an open-source antivirus engine for detecting trojans, viruses, malware & other malicious threats. ClamAV® is an open-source (GPL) anti-virus engine used in a variety of situations, including email and web scanning, and endpoint security. It provides many utilities for users, including a flexible and scalable multi-threaded daemon, a command-line scanner, and an advanced tool for automatic database updates. Built-in support for various archive formats, including ZIP, RAR, Dmg, Tar, GZIP, BZIP2, OLE2, Cabinet, CHM, BinHex, SIS, and others.
  • 14
    Netvisor ONE

    Netvisor ONE

    Pluribus Networks

    Moving to Open Networking bare metal switches brings significant operational and financial benefits to build next-generation networks. These switches provide the capacity needed to achieve cloud-scale, agility, elasticity, and adaptability. As you move to a disaggregated open networking strategy, selecting the right Network Operating System (OS) is a critical success factor. Why? The Network OS deployed unlocks the performance, functionality, and services from Open Networking switches to realize the most value. Netvisor® ONE is an open, secure, and programable next-generation Network OS that is purpose-built to optimize the power and performance of bare metal Open Networking hardware. Deployment-proven in production mission-critical enterprise and carrier networks, Netvisor ONE operating system meets the most stringent performance requirements and delivers the maximum levels of reliability and flexibility at scale, and without compromise.
  • 15
    iBoostUp

    iBoostUp

    iBoostUp

    iBoostUp is a powerful Mac optimization tool with a strong emphasis on security. Security features include Spyware Doctor, which uses both cloud-based signature scanning and advanced heuristic techniques to detect malicious apps, and HID Implant Guard, which alerts and protects against modified peripherals like USB drives or Lightning cables that could compromise your Mac. BoostUp also provides a behavioral Keylogger Guard, n ARP Cache Poisoning Detector to scan for suspicious network activity, an Application Uninstaller to remove all traces of uninstalled apps, and a Duplicate File Finder to free up disk space by removing identical content files. All in all, iBoostUp is an ideal tool for Mac users who want to optimize their system's performance and safeguard their privacy and security against various types of threats. We are not affiliated with Symantec Corporation, Norton, iAntiVirus, or PC Tools, but was instead founded by ex-employees with a wealth of expertise in this field.
  • 16
    ProGuard

    ProGuard

    Guardsquare

    ProGuard: Open Source Optimizer for Java and Kotlin. ProGuard is the most popular optimizer for Java bytecode. ProGuard also provides minimal protection against reverse engineering by obfuscating the names of classes, fields and methods. ProGuard reduces the download and startup time of Android applications and improves their performance on mobile devices. ProGuard obfuscates Java applications and pre-verifies the processed code for Java Micro Edition and for Java 6 and higher. ProGuard optimizes and obfuscates Java applications for cell phones, Blu-ray players, set-top boxes and other constrained devices. ProGuard fully supports Java and Kotlin applications, enabling developers to take full advantage of these languages’ features without sacrificing performance or security. ProGuard is a command-line tool with an optional graphical user interface. ProGuard is fast: It processes small Android applications and entire runtime libraries in seconds.
  • 17
    FatPipe WAN Acceleration
    FatPipe Networks' WAN Optimization technology offers the highest performance level of WAN Optimization and optimization available using patented and patent-pending technology. With FatPipe WAN Optimization, you can significantly boost your Wide Area Network performance. This is possible through the acceleration of your applications, and better utilization of your current WAN infrastructure which would ultimately result in saving you thousands of dollars a year on additional hardware, software, and bandwidth costs. FatPipe WAN Optimization appreciably increases WAN utilization, providing effective use of WAN bandwidth by caching/compressing that sharply reduces redundant data on a WAN. FatPipe is the first to market and the only provider of WAN Optimization and optimization technology that can work across multiple WANs. Not only can you optimize your WAN traffic, but you can also achieve the highest level of WAN redundancy and reliability.
  • 18
    LMCache

    LMCache

    LMCache

    LMCache is an open source Knowledge Delivery Network (KDN) designed as a caching layer for large language model serving that accelerates inference by reusing KV (key-value) caches across repeated or overlapping computations. It enables fast prompt caching, allowing LLMs to “prefill” recurring text only once and then reuse those stored KV caches, even in non-prefix positions, across multiple serving instances. This approach reduces time to first token, saves GPU cycles, and increases throughput in scenarios such as multi-round question answering or retrieval augmented generation. LMCache supports KV cache offloading (moving cache from GPU to CPU or disk), cache sharing across instances, and disaggregated prefill, which separates the prefill and decoding phases for resource efficiency. It is compatible with inference engines like vLLM and TGI and supports compressed storage, blending techniques to merge caches, and multiple backend storage options.
  • 19
    Avast Secure Web Gateway
    Block web threats before they hit the network - secure your network traffic without additional proxy servers or on-premise appliances. Filter web traffic and keep unwanted malware away from networks. Secure Web Gateway is simple to deploy and manage across multiple locations, and can be set up in minutes. Devices are automatically directed to the nearest data center for lightning-fast connections from anywhere in the world. Our threat network is geographically dispersed with over 100 data centers, on five different continents, and draws from dozens of top threat feeds that act as vigilant security guards, observing, processing, and reporting on around 30 billion requests per day. When an uncategorized web address is accessed via Secure Web Gateway, the site gets inspected for threats and categorized into one of dozens of categories, resulting in constant updates to the whole security network.
  • 20
    UpGuard

    UpGuard

    UpGuard

    The new standard in third-party risk and attack surface management. UpGuard is the best platform for securing your organization’s sensitive data. Our security ratings engine monitors millions of companies and billions of data points every day. Continuously monitor your vendors, automate security questionnaires, and reduce third and fourth-party risk. Monitor your attack surface, prevent data breaches, discover leaked credentials, and protect customer data. Scale your third-party risk program with UpGuard analysts, and let us monitor your organization and vendors for data leaks. UpGuard builds the most powerful and flexible tools for cybersecurity. Whether you’re looking to prevent third-party data breaches, continuously monitor your vendors, or understand your attack surface, UpGuard’s meticulously designed platform, and unmatched functionality helps you protect your most sensitive data. Hundreds of the world’s most data-conscious companies are scaling faster and more securely.
    Starting Price: $5,249 per year
  • 21
    Atomic ModSecurity Rules
    Atomic ModSecurity Rules is a comprehensive WAF rule set with hundreds of ModSecurity WAF rules to protect applications against web attacks and is fully backed by expert support. WAF Rules to Strengthen ModSecurity Against: - SQL injection - Cross-site scripting - Cross-site request forgery - Encoding abuse - Protocol abuse - Unicode and UTF-8 attacks - HTTP smuggling - Path recursion - Web spam - Shells - And much more * Atomicorp developed the first ModSecurity rule set and maintains the largest number of active WAF rules that support server types from Tomcat and Nginx to IIS, LightSpeed and Apache. * Atomic ModSecurity Rules are the most comprehensive WAF rule set in the industry, have the highest level of quality and are fully backed by expert support. ****** More info: https://www.atomicorp.com/atomic-modsecurity-rules/ *******
  • 22
    Tencent Cloud Web Application Firewall
    Web attack recognition is based on AI+ rules. It is anti-bypass and low in both false negative and false positive rates. Web attack recognition defends effectively against common web attacks including the OWASP top 10 web security threats (SQL injection, unauthorized access, cross-site scripting, cross-site request forgery, web shell trojan upload, etc). Users can cache core web contents to the cloud and publish cached web pages, which act as substitutes and can prevent the negative consequences of web page tampering. Backend data is well protected by pre-event server and application concealing, mid-event attack prevention and post-event sensitive data replacement and concealing. WAF performs nationwide DNS verification of the domain names submitted by the customer to detect and display the hijacking conditions of the protected domain names in various regions, helping avoid data theft and financial losses caused by the hijacking of website users.
  • 23
    TorGuard

    TorGuard

    TorGuard VPN

    Protect Your Privacy With Anonymous VPN. TorGuard VPN Service encrypts your internet access and provides an anonymous IP so you can browse securely. With all the security issues created by hackers, net censorship, identity theft, and ISP's monitoring activities, your online privacy has never been more threatened or important. TorGuard's goal is to provide easy to use services that protect your online identity. Don't risk your personal privacy! Install TorGuard VPN service within minutes on any device. TorGuard software is pre-configured to protect your data with 256-bit AES encryption, DNS/IPV6/WebRTC leak blocking, kill switch, and more. TorGuard offers a massive network of 3000+ global VPN servers in over 50+ countries. Get unlimited bandwidth and zero throttling anywhere in the world. Bypass strict VPN blockades with invisible SSL Stealth VPN access. TorGuard offers OpenVPN obfuscation, Stunnel, OpenConnect, and Shadowsocks.
    Starting Price: $9.99 per month
  • 24
    BleachBit

    BleachBit

    BleachBit

    When your computer is getting full, BleachBit quickly frees disk space. When your information is only your business, BleachBit guards your privacy. With BleachBit you can free cache, delete cookies, clear Internet history, shred temporary files, delete logs, and discard junk you didn't know was there. Designed for Linux and Windows systems, it wipes clean thousands of applications including Firefox, Adobe Flash, Google Chrome, Opera, and more. Beyond simply deleting files, BleachBit includes advanced features such as shredding files to prevent recovery, wiping free disk space to hide traces of files deleted by other applications, and vacuuming Firefox to make it faster. Better than free, BleachBit is open source. BleachBit has many useful features designed to help you easily clean your computer to free space and maintain privacy. No adware, spyware, malware, backdoors, browser toolbars, or "value-added software".
  • 25
    FreeBSD

    FreeBSD

    FreeBSD

    FreeBSD offers advanced networking, performance, security and compatibility features today which are still missing in other operating systems, even some of the best commercial ones. FreeBSD makes an ideal Internet or Intranet server. It provides robust network services under the heaviest loads and uses memory efficiently to maintain good response times for thousands of simultaneous user processes. FreeBSD brings advanced network operating system features to appliance and embedded platforms, from higher-end Intel-based appliances to ARM, PowerPC, and MIPS hardware platforms. From mail and web appliances to routers, time servers, and wireless access points, vendors around the world rely on FreeBSD’s integrated build and cross-build environments and advanced features as the foundation for their embedded products. And the Berkeley open source license lets them decide how many of their local changes they want to contribute back.
  • 26
    Llama Guard
    Llama Guard is an open-source safeguard model developed by Meta AI to enhance the safety of large language models in human-AI conversations. It functions as an input-output filter, classifying both prompts and responses into safety risk categories, including toxicity, hate speech, and hallucinations. Trained on a curated dataset, Llama Guard achieves performance on par with or exceeding existing moderation tools like OpenAI's Moderation API and ToxicChat. Its instruction-tuned architecture allows for customization, enabling developers to adapt its taxonomy and output formats to specific use cases. Llama Guard is part of Meta's broader "Purple Llama" initiative, which combines offensive and defensive security strategies to responsibly deploy generative AI models. The model weights are publicly available, encouraging further research and adaptation to meet evolving AI safety needs.
  • 27
    CloudGuard Network Security

    CloudGuard Network Security

    Check Point Software

    CloudGuard protects public, private and hybrid-cloud deployments from advanced threats with the highest catch rate of malware and other attacks. With CloudGuard Network Security, customers are ensured the easiest, quickest, and most secure cloud migration. Integrates with leading IaC tools for rapid deployment, agility, and automation of CI/CD workflows. Cutting-edge threat prevention with industry-leading catch rate of malware, ransomware and other types of attacks. Organizations with on-premises environments and in the process of migrating to the cloud are ensured unified and consistent security management of all their on-prem and cloud environments – experiencing the easiest, quickest and most secure cloud migration with lowest total cost of ownership and lowest organizational risk.
  • 28
    Blacksmith

    Blacksmith

    Blacksmith

    Speed up your GitHub Actions with a one-line code change, by running them on high-performance gaming CPUs instead of GitHub's older server hardware. We run GitHub Actions on high-performance gaming CPUs that are optimized to run CI workloads faster. Our cache is colocated with VMs, delivering 4x faster reads and writes for your CI workloads. Build your Docker images faster, leveraging powerful machines with cached Docker layers, located close to your container registry. Use Blacksmith for out-of-the-box analytics for your GitHub Action pipelines, at no additional cost. Get unprecedented visibility into your costs and runtime trends for your CI suite. Ensure your workflows are caching effectively by monitoring cache hits. Delete unused cache entries right from your dashboard. Blacksmith runs jobs in isolated virtual machines directly on bare metal. Single-use GitHub access tokens per job execution.
    Starting Price: $0.004 per GHz per hour
  • 29
    StrongVPN

    StrongVPN

    J2 Global

    StrongVPN is your fast and easy solution for navigating a truly open internet. Connect to StrongVPN with WireGuard®, a state-of-the-art VPN protocol. WireGuard outperforms other protocol options with its industry-leading speed, security, and performance. Experience WireGuard, a next-generation VPN protocol that delivers industry-leading speed, security, and performance. StrongVPN is proud to be one of the first commercial VPN providers to offer WireGuard across all of our apps and platforms.
    Starting Price: $10 per month
  • 30
    Netmaker

    Netmaker

    Netmaker

    Netmaker is an open source tool based on the groundbreaking WireGuard protocol. Netmaker unifies distributed environments with ease, from multi-cloud to Kubernetes. Netmaker enhances Kubernetes clusters by providing flexible and secure networking for cross-environment scenarios. Netmaker uses WireGuard for modern, secure encryption. It is built with zero trust in mind, utilizes access control lists, and follows leading industry standards for secure networking. Netmaker enables you to create relays, gateways, full VPN meshes, and even zero trust networks. Netmaker is fully configurable to let you maximize the power of Wireguard.
  • 31
    HomeNetGuard

    HomeNetGuard

    Slimware Utilities

    HomeNetGuard scans your connected devices for weak passwords and notifies you about login attempts using common/weak credentials on open ports. HomeNetGuard also sends you an alert each time an unknown device connects to your home network. HomeNetGuard allows you to easily change your home network in case you set another connection (e.g VPN, Ethernet). Our smart security application remembers all devices previously connected to your home network and notifies about new ones, so you are always made aware of who is connected to your home network devices. Security scan is launched every 24 hours automatically or by clicking the ‘Scan Now’ button from the Home screen or Device details screen. During the security scan HomeNetGuard identifies potentially vulnerable devices which have open ports or weak passwords, notifies the user about them and provides helpful advice on how to resolve security issues.
  • 32
    ApacheBooster

    ApacheBooster

    NdimensionZ

    ApacheBooster has been specifically designed to enhance the working of web servers based on cPanel. ApacheBooster as the name suggests boosts the working ability of the Apache web server, which is according to the census the most used web server in the world! Nginx and varnish has been fused together in ApacheBooster to make it effectively efficient in its working. Nginx is a super quality high performing web server software that speeds up the working of the web server. The best feature of Nginx is that it is very fast in its working i.e in retrieving static files and also helps in saving memory by using less memory for processing of concurrent requests. It is very efficient in handling traffic requests. With the less amount of memory used, it is capable of handling more requests/clients when compared to Apache. Nginx is a reverse proxy server of open source type that smartly balances the load, a web server and web cache (also known as HTTP cache).
  • 33
    Forcepoint WebShield

    Forcepoint WebShield

    Forcepoint WebShield

    Secures HTTP traffic throughout the enterprise and provides access to web-based resources on less sensitive networks. Forcepoint WebShield, a Commercial-Off-The-Shelf (COTS) data guard, provides secure Web search and browse-down capabilities from high-side networks to lower-level networks. WebShield supports the missions of the largest number of cross domain transfer users as a secure mechanism for complete information browsing and discovery. WebShield provides transparent protection of the entire network and allows users to carry out their missions with increased protection. Users surfing lower-level networks can be restricted to specific server and file types as defined by security policies. All requests, responses and transfers go through security controls, such as dirty word search, virus scan and malicious content checks. Forcepoint WebShield is an approved cross domain transfer solution on the Unified Cross Domain Services Management Office (UCDSMO) Cross Domain Baseline.
  • 34
    VyOS

    VyOS

    VyOS Networks

    Democratizing how we access networks through a universal router and open source software. Our vision at VyOS is to dramatically change how we access networks so that we can all build the solutions we always dreamed of, without restrictions, limitations, or prohibitive costs. We fundamentally believe that internet access is as vital to our human development as air, food, water, and healthcare. Built by engineers for engineers, VyOS is an open source software company that democratizes how we access networks so that the many, not the few, benefit from building solutions without limitations and prohibitive fees. We do this as VyOS through our open source software and virtual platforms. Stateful firewalls, zone-based firewall, all types of source and destination NAT (one to one, one to many, many to many). The entire codebase and build toolchain are available to everyone for auditing, building customized images and contributing.
    Starting Price: $1000
  • 35
    FraudGuard

    FraudGuard

    First American Data & Analytics

    FraudGuard® is the most intelligent decision tool on the market today, leveraging advanced analytics, reporting, defect trending and audit trails that are essential to a compliant loan origination process. No other automated solution can match the depth of data sources or capabilities FraudGuard marshals into a single solution quality assurance platform. Lenders can trust FraudGuard to provide top tier analytics backed by veteran product support and development teams. Leveraging public, private and proprietary data sources, the FraudGuard platform helps lenders identify potential fraud risk and errors in mortgage applications, comply with regulations, improve the application review process through greater speed and efficiency, and increase loan quality. Enhanced reporting of findings and recommendations provides the actionable insight needed to support loan decisions.
  • 36
    Greypanel

    Greypanel

    Greypanel

    Greypanel CDN is an independently-researched and developed dispatching system that intelligently distributes globally-located acceleration nodes to users based on their access location. By assigning the nearest resources to users, GreypanelCDN improves web services capacity, network access quality, download speeds and reduces response time, providing in smoother user experience. Targeted at portals and e-commerce sites, GreypanelCDN caches static content such as web pages, HTML, CSS, JS, images and files onto the nodes to accelerate the distribution process. Visitors will be able to access the content from the nearest node and load complex content in seconds, significantly improving web access speeds and reducing site response time, leading to better user experience. Enjoy a fast, stable and secure dynamic request acceleration with our extensive network of acceleration nodes, a large reserve of direct connections and an intelligent scheduling system.
  • 37
    DexGuard

    DexGuard

    Guardsquare

    Protecting Android applications and SDKs against reverse engineering and hacking. Android applications and SDKs are easy to decompile using readily available tools. This opens the way for various forms of abuse, including intellectual property theft, credential harvesting, tampering and cloning. DexGuard protects native Android and cross-platform apps and SDKs against reverse engineering and hacking. It hardens apps' code and enables them to defend themselves at runtime. DexGuard is a command-line tool that processes, optimizes and protects Android applications and libraries. It enables you to fully protect your application or SDK without requiring you to share or alter the source code. DexGuard offers built-in support for both native Android (Java, Kotlin) and cross-platform applications (Cordova, Ionic, React Native, Unity). DexGuard’s functionality can be extended with the NDK add-on to process and protect native libraries.
  • 38
    CacheFly

    CacheFly

    CacheFly

    Deliver your rich media on the network with the best throughput and global reach, making your content infinitely scalable. Go live in hours, not days, on CacheFly's existing worldwide infrastructure. CacheFly has optimized its network for throughput and time to last byte with a focus on digital platforms. For live video and audio, CacheFly offers an ultra-low latency streaming solution with sub-second latency. For two decades, CacheFly has built best-in-class delivery solutions for gaming, video, e-learning, audio, and software platforms. CacheFly helps you offer the highest QoE with scalable CDN solutions on the fastest global network - no matter where your users sit.
    Starting Price: $595 per month
  • 39
    AdGuard VPN

    AdGuard VPN

    AdGuard Software Ltd

    AdGuard VPN is a reliable solution designed to protect your online privacy, safeguard sensitive data, and maintain seamless internet operations. With robust encryption and a global network of servers, AdGuard VPN ensures that all company internet traffic is routed securely, shielding your organization from being traced. AdGuard has a reputation of being privacy fanatics, and that means your data gets the highest level of protection. AdGuard’s no-logging policy helps ensure that no user activity is recorded. AdGuard VPN effectively masks IP addresses to ensure anonymity, while also bypassing geo-restrictions and giving access to content from anywhere in the world. You can access restricted resources to satisfy your research, development or market expansion goals. Ideal for remote teams or businesses with a global presence, AdGuard VPN helps secure your digital communications and online operations.
    Starting Price: $1.49 per month
  • 40
    Security Guard App

    Security Guard App

    Security Guard App

    Build, manage, and communicate with your security guard teams using the Security Guard App. Security Guard App is packed with numerous features that help enhance data sharing and communication within your security team. Security guard mobile and web apps is everything your business needs to manage security teams and security guard operations remotely. Security guard mobile app for guards is available on both the Apple Store and Play Store. Turn on the GPS of your smartphone to select the location and start adding multiple sites. Start inviting security guards to start collaborating and monitoring them seamlessly. Optimize your security guard operations with an easy-to-use security guard mobile and web in real-time. We help security guard companies overcome obstacles and maximize the power of their security operations effortlessly. Run your security operations seamlessly using the Security Guard App.
    Starting Price: $3 per month
  • 41
    NetBird

    NetBird

    NetBird

    NetBird is an open-source Zero Trust Networking platform built by engineers for engineers. It radically simplifies deploying secure private networks using the high-performance WireGuard® protocol. Unlike traditional VPNs, NetBird creates decentralized, low-latency, high-throughput private networks with a single management console for identity-based access control. Integrating seamlessly with your IdP for SSO and MFA, it forms direct, encrypted peer-to-peer tunnels between devices, servers, and clouds - no central bottlenecks or single points of failure. Lightweight clients ensure scalability and privacy, with traffic never passing through management services. NetBird supports integrations with CrowdStrike, Intune, SentinelOne, pfSense, and more. Ideal for Zero Trust remote access, multi-cloud connectivity, dynamic posture checks, detailed auditing, and MSP multi-tenant management - all through one intuitive platform.
    Starting Price: $5/user/month
  • 42
    WatchGuard WIPS

    WatchGuard WIPS

    WatchGuard Technologies

    WIPS or Wireless Intrusion Prevention System is a term from the Wi-Fi industry that refers to the prevention of Wi-Fi threats, and at WatchGuard we have taken it to the next level. Our WIPS is unlike any other competing Wi-Fi security solution on the market. WatchGuard's patented technology ensures you have the real, accurate, and automated Wi-Fi protection that your business needs. Each WatchGuard access point (AP) has the flexibility to operate as both an access point and a dedicated WIPS security sensor protecting any 3rd party brand access points. Deploy WatchGuard APs managed with Wi-Fi Cloud and enjoy Trusted Wireless Environment compliant Wi-Fi, intelligent network visibility and troubleshooting features, captive portals , and location-based analytics. Just add WatchGuard APs as a security sensor to your existing infrastructure and protect any 3rd party brand access points 24/7.
  • 43
    Cassandana

    Cassandana

    Cassandana

    Cassandana is an open-source MQTT message broker which is entirely written in Java. This project began its life as a fork of Moquette, and later underwent some cleanup, optimization and adding extra features. Now it’s ready to work as an enterprise message broker. Supports In-memory caching mechanism to reduce I/O operations. Supports In-memory caching mechanism to reduce I/O operations.
  • 44
    GuardsPro

    GuardsPro

    GuardsPro

    Manage security guard operations on the cloud with GuardsPro, a robust security guard management solution. GuardsPro allows users to streamline patrol operations with features such as online reporting, site tours, in-app check-in/check-out, and more. With GuardsPro's dashboard, users can manage tasks, notifications, company policies, online notes, and more. GuardsPro is available via iOS and Android platforms.
    Starting Price: $15.00/month/user
  • 45
    TagtronicsPatrol
    TagtronicsPatrol portfolio of products are integrated into our user-friendly security guard software package which was developed with the help of several security companies to aid the busy day-to-day administration of the ever growing security market. We have produced several videos to demonstrate the functionality of our security guard software packages; these can be accessed via the links below. The entire demonstration lasts roughly 10 minutes and will give you a brief overview of our comprehensive security software. Tagtronics Security Guard Rostering Software is a complete workforce management tool for security providers. Our user friendly windows based software can help you with all aspects of your security business. Tagtronics software takes care of all guards training, supervision reviews, appraisals, SIA expiries, holidays and sickness, ensuring the best match security guard attends each shift.
  • 46
    ProxiGuard Patrol Management
    ProxiGuard is a Real Time guard monitoring system which skyrockets the efficiency of security companies and offer them the ability to upgrade their services via technology. In brief, ProxiGuard incorporates all the basic features of a smart guard tour system solution. ProxiGuard guard tour system relieves officers from daily time-consuming processes such as filling paper reports and making repetitive phone calls to the Monitoring Center, provoking confusion and misunderstandings. The whole procedure is defined by strict guidelines and simple actions to take. Guards and officers can quickly send incidents reports, implement patrols and any other guard service by taking advantage of the last innovations in technology. Neither hardware infrastructure required nor software installation - minimum cost requirements.
    Starting Price: $39 per month
  • 47
    SONiC

    SONiC

    NVIDIA Networking

    NVIDIA offers pure SONiC, a community-developed, open-source, Linux-based network operating system that has been hardened in the data centers of some of the largest cloud service providers. Pure SONiC through NVIDIA removes distribution limitations and lets enterprises take full advantage of the benefits of open networking—as well as the NVIDIA expertise, experience, training, documentation, professional services, and support that best guarantee success. NVIDIA provides support for Free Range Routing (FRR), SONiC, Switch Abstraction Interface (SAI), systems, and application-specific integrated circuits (ASIC)—all in one place. Unlike a distribution, SONiC doesn’t require reliance upon a single vendor for roadmap additions, bug fixes, or security patches. With SONiC, you can achieve unified management with existing management tools across the data center.
  • 48
    OnGuard

    OnGuard

    LenelS2

    The OnGuard® access control system exemplifies our commitment to providing a superior, integrated and customizable security management system that meets your evolving needs. The OnGuard system delivers solutions that seamlessly unify access control and video monitoring for a wide range of industries. Providing the means to aggregate, visualize and share security data from multiple sources, the OnGuard system helps companies recognize context and analyze inputs from a number of simultaneous events. Seamlessly synthesizing information from access control, video and other sensors, the OnGuard system delivers complete line-of-sight to all aspects of security and facilitates intelligent responses and outcomes. The OnGuard system integrates seamlessly with a wide range of existing business systems. The OnGuard system can bi-directionally exchange cardholder data with many HR platforms and/or ERP systems, coordinate alarm/event data with emergency response systems, and more.
  • 49
    Amazon GuardDuty
    Amazon GuardDuty is a threat detection service that continuously monitors for malicious activity and unauthorized behavior to protect your AWS accounts, workloads, and data stored in Amazon S3. With the cloud, the collection and aggregation of account and network activities is simplified, but it can be time consuming for security teams to continuously analyze event log data for potential threats. With GuardDuty, you now have an intelligent and cost-effective option for continuous threat detection in AWS. The service uses machine learning, anomaly detection, and integrated threat intelligence to identify and prioritize potential threats. GuardDuty analyzes tens of billions of events across multiple AWS data sources, such as AWS CloudTrail event logs, Amazon VPC Flow Logs, and DNS logs. With a few clicks in the AWS Management Console, GuardDuty can be enabled with no software or hardware to deploy or maintain.
  • 50
    WireGuard

    WireGuard

    Edge Security

    WireGuard® is an extremely simple yet fast and modern VPN that utilizes state-of-the-art cryptography. It aims to be faster, simpler, leaner, and more useful than IPsec, while avoiding the massive headache. It intends to be considerably more performant than OpenVPN. WireGuard is designed as a general purpose VPN for running on embedded interfaces and super computers alike, fit for many different circumstances. Initially released for the Linux kernel, it is now cross-platform (Windows, macOS, BSD, iOS, Android) and widely deployable. It is currently under heavy development, but already it might be regarded as the most secure, easiest to use, and simplest VPN solution in the industry. WireGuard aims to be as easy to configure and deploy as SSH. A VPN connection is made simply by exchanging very simple public keys – exactly like exchanging SSH keys – and all the rest is transparently handled by WireGuard. It is even capable of roaming between IP addresses, just like Mosh.