Alternatives to IRI CellShield
Compare IRI CellShield alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to IRI CellShield in 2026. Compare features, ratings, user reviews, pricing, and more from IRI CellShield competitors and alternatives in order to make an informed decision for your business.
-
1
Hotspot Shield
Hotspot Shield
Protect yourself with military-grade encryption, and access sites and streaming content around the world. Hotspot Shield encrypts your connection and doesn’t log any data that could be tied to you, shielding your identity and info from hackers and cyber predators. With servers across 80+ countries and 35+ cities, our proprietary Hydra protocol optimizes your VPN to ensure fast, secure connections for gaming, streaming, downloading, P2P, and more. -
2
IRI FieldShield
IRI, The CoSort Company
IRI FieldShield® is powerful and affordable data discovery and masking software for PII in structured and semi-structured sources, big and small. Use FieldShield utilities in Eclipse to profile, search and mask data at rest (static data masking), and the FieldShield SDK to mask (or unmask) data in motion (dynamic data masking). Classify PII centrally, find it globally, and mask it consistently. Preserve realism and referential integrity via encryption, pseudonymization, redaction, and other rules for production and test environments. Delete, deliver, or anonymize data subject to DPA, FERPA, GDPR, GLBA, HIPAA, PCI, POPI, SOX, etc. Verify compliance via human- and machine-readable search reports, job audit logs, and re-identification risk scores. Optionally mask data as you map it. Apply FieldShield functions in IRI Voracity ETL, federation, migration, replication, subsetting, or analytic jobs. Or, run FieldShield from Actifio, Commvault or Windocks to mask DB clones. -
3
IRI Data Protector Suite
IRI, The CoSort Company
The IRI Data Protector suite contains multiple data masking products which can be licensed standalone or in a discounted bundle to profile, classify, search, mask, and audit PII and other sensitive information in structured, semi-structured, and unstructured data sources. Apply their many masking functions consistently for referential integrity: IRI FieldShield® Structured Data Masking FieldShield classifies, finds, de-identifies, risk-scores, and audits PII in databases, flat files, JSON, etc. IRI DarkShield® Semi & Unstructured Data Masking DarkShield classifies, finds, and deletes PII in text, pdf, Parquet, C/BLOBs, MS documents, logs, NoSQL DBs, images, and faces. IRI CellShield® Excel® Data Masking CellShield finds, reports on, masks, and audits changes to PII in Excel columns and values LAN-wide or in the cloud. IRI Data Masking as a Service IRI DMaaS engineers in the US and abroad do the work of classifying, finding, masking, and risk-scoring PII for you. -
4
IRI DarkShield
IRI, The CoSort Company
IRI DarkShield is a powerful data masking tool that can (simultaneously) find and anonymize Personally Identifiable Information (PII) "hidden" in semi-structured and unstructured files and database columns / collections. DarkShield jobs are configured, logged, and run from IRI Workbench or a restful RPC (web services) API to encrypt, redact, blur, etc., the PII it finds in: * NoSQL & RDBs * PDFs * Parquet * JSON, XML & CSV * Excel & Word * BMP, DICOM, GIF, JPG & TIFF DarkShield is one of 3 data masking products in the IRI Data Protector Suite, and comes with IRI Voracity data management platform subscriptions. DarkShield bridges the gap between structured and unstructured data masking, allowing users to secure data in a consistent manner across disparate silos and formats by using the same masking functions as FieldShield and CellShield EE. DarkShield also handles data in RDBs and flat-files, too, but there are more capabilities that FieldShield offers for those sources.Starting Price: $5000 -
5
ShieldApps VPN
ShieldApps
ShieldApps VPN secures the connection between your device, the WiFi hotspot that you have connected to, and the world wide web. ShieldApps VPN is used to protect your online browsing from tracking, information snooping, ip-logging and more, providing you complete anonymity and privacy. ShieldApps VPN uses strong encryption algorithms to mask and falsify your location so you can browse the internet freely, without geographical limitation, censorship or any other restriction. Watch any content, from anywhere. ShieldApps VPN servers are distributed in multiple locations, allowing you to mask your location and use any remote server location you may want from a wide list of options, thus opening unlimited streaming opportunities. Use ShieldApps VPN on your desktop, laptop and android devices. ShieldApps VPN is compatible with multiple operating systems and devices, assuring your privacy wherever and whenever you choose to use it.Starting Price: $79.98 per year -
6
VIPRE Internet Shield VPN
VIPRE Security Group
VIPRE Internet Shield VPN is a virtual private network (VPN) service designed to enhance online security and privacy by encrypting internet connections and masking IP addresses. With VIPRE Internet Shield VPN, users can browse securely on public Wi-Fi, keeping their data protected from hackers, trackers, and potential cyber threats. It allows users to select from multiple server locations worldwide, granting access to restricted content and improving anonymity online. The VPN operates with high-speed connections and maintains reliable performance, ensuring smooth streaming and browsing experiences. VIPRE Internet Shield VPN is an ideal solution for anyone looking to protect their online identity, secure their internet activities, and enjoy unrestricted access to global content. -
7
Informatica Persistent Data Masking
Informatica
Retain context, form, and integrity while preserving privacy. Enhance data protection by de-sensitizing and de-identifying sensitive data, and pseudonymize data for privacy compliance and analytics. Obscured data retains context and referential integrity remain consistent, so the masked data can be used in testing, analytics, or support environments. As a highly scalable, high-performance data masking solution, Informatica Persistent Data Masking shields confidential data—such as credit card numbers, addresses, and phone numbers—from unintended exposure by creating realistic, de-identified data that can be shared safely internally or externally. It also allows you to reduce the risk of data breaches in nonproduction environments, produce higher-quality test data and streamline development projects, and ensure compliance with data-privacy mandates and regulations. -
8
TreeGrid SpreadSheet
COQsoft
TreeGrid SpreadSheet provides cell based AJAX grid with spreadsheet features like editable formulas, many predefined and custom formula functions, individual cell styling and borders, manipulating individual cells or selected cell groups, auto grid size, auto row and column index. Dynamic cell styling - every cell can have set and changed style attributes: text color, background color, shadow color and style, font size and name, text bold, italic, underline, strike, overline and small caps. And also horizontal and vertical alignment, wrapping text vertically and text rotate 90 and 270 degrees. Dynamic cell span - every cell can be vertically and horizontally spanned through more next cells. Dynamic cell format - every cell can have set and changed its type and display format.Starting Price: $200 per device -
9
ShieldConex
Bluefin
Tokenize PAN (primary account number) data and associated PII/PHI data so you maintain compliance for regulations governing the handling of sensitive data. PCI DSS scope reduction across all channels and trusted third parties. Tokenization masks data at the time of input and helps your organization meet evolving security standards. The ShieldConex platform provides vaultless, format-preserving tokenization for every data element. Payment data, including credit or debit card primary account number (PAN), expiration, date, CVV, cardholder name, and more. Standardize the payment experience across businesses, locations and channels including mobile, online, and in-store. -
10
AWS Shield
Amazon
AWS Shield is a managed Distributed Denial of Service (DDoS) protection service that safeguards applications running on AWS. AWS Shield provides always-on detection and automatic inline mitigations that minimize application downtime and latency, so there is no need to engage AWS Support to benefit from DDoS protection. There are two tiers of AWS Shield - Standard and Advanced. All AWS customers benefit from the automatic protections of AWS Shield Standard, at no additional charge. AWS Shield Standard defends against most common, frequently occurring network and transport layer DDoS attacks that target your web site or applications. When you use AWS Shield Standard with Amazon CloudFront and Amazon Route 53, you receive comprehensive availability protection against all known infrastructure (Layer 3 and 4) attacks. -
11
Shield Antivirus
ShieldApps
Shield antivirus offers protection from all to-date viruses, malware, ransomware, trojans, and spyware for personal desktop and laptop computers. Shield antivirus utilizes active protection mechanisms to protect your computer from all threats and is set to monitor, block, and alert whenever a threat is detected. Shield Antivirus features an easy installation process, vast monitoring and alert capabilities, as well as email protection by blocking and quarantining any threats located in incoming emails. Shield antivirus offers full protection from internet/browsing threats at a fraction of the CPU load due to its advanced detection engine and algorithms. Shield Antivirus will automatically scan a computer for threats on a defined schedule and also includes extra tools and features such as the secure file eraser, history cleaner, and start-up manager to help keep your computer protected and operating at peak performance.Starting Price: $69.99 one-time payment -
12
Box Shield
Box
Shield lets you classify content your way, both manually and automatically. We're excited to announce our powerful, native capability that identifies PII and custom terms within files, and automatically classifies them based on your policies — helping you protect your data at scale. Placing controls close to your content helps prevent leaks in real time, while powering a frictionless end-user experience. Configure access policies within minutes to keep your data secure while letting people do their mission-critical work. Using machine learning, Shield brings you timely, accurate alerts on insider threats, account compromise, and malware attacks. Quickly evaluate alerts in Shield, or send them to your existing tools for further analysis. Shield works with the best-of-breed security tools you already have in place. Alerts containing more insights than ever before can be integrated with your SIEM and CASB for a unified view.Starting Price: $130 per month -
13
Promon SHIELD
Promon
Achieving application security doesn’t have to be difficult or time-consuming. With Promon SHIELD™, your developer team can implement protection to any desktop application, in minutes, without affecting the end-users. Promon SHIELD™ is designed to secure code integrity, data protection, intellectual property and ultimately brand and revenue against targeted malware. With security protections that are infused directly into your application, Promon SHIELD™ protects your desktop apps from both static and dynamic attacks. Since security is embedded into the application, protection is not invasive to the end user’s computer or network, nor does it rely on external libraries or hardware for its protection. Promon SHIELD™ is a security technology that offers multi-layered app protection beyond what the operating system can offer, and beyond what can be achieved by normal best practice and programming by app developers. -
14
ForceShield
ForceShield
We are the dynamic application guardian for Web, Mobile, and IoT. ForceShield was established in 2016 by a group of security experts with the goal of changing the game rules in the cybersecurity world. The founders believe that the traditional signature-based security technologies were failing in the face of ever more frequent and sophisticated automated attacks. They developed a proprietary security technology – Dynamic Transformation – that shifted the security approach from reactive to proactive protection while increasing complexity and cost for attackers. ForceShield foresaw that the rapid growth of automated attacks targeting the Internet of Things presented an unprecedented security challenge that their technology and engineering experience could solve. ForceShield creates a complete network defense layer by protecting Web/Mobile applications and IoT devices against bot attacks. -
15
ShieldApps PC Privacy Shield
ShieldApps
PC Privacy Shield will wipe out your online digital footprint, including your browsing history and tracking records. PC Privacy Shield will also provide you with an advanced file encryption mechanism to protect your personal and sensitive files. PC Privacy Shield is used to both defend one’s information from phishing and to cover his/her tracks when needed. PC Privacy Shield will let you encrypt or delete login credentials and alert in real time when those are being logged by the browsers. PC Privacy Shield includes an easy-to-use ad blocker that blocks annoying and sometimes abusive banner advertisements.Starting Price: $39.99 one-time payment -
16
Google Shielded VMs
Google
Shielded VMs are virtual machines (VMs) on Google Cloud hardened by a set of security controls that help defend against rootkits and bootkits. Using Shielded VMs helps protect enterprise workloads from threats like remote attacks, privilege escalation, and malicious insiders. Shielded VMs leverage advanced platform security capabilities such as secure and measured boot, a virtual trusted platform module (vTPM), UEFI firmware, and integrity monitoring. Quickly protect VMs against advanced threats: In just a few clicks, you can enable Shielded VMs to help protect against threats such as malicious project insiders, malicious guest firmware, and kernel- or user-mode vulnerabilities. & more -
17
VPN Proxy Master
VPN Proxy Master
Internet privacy is the first thing that comes to everyone’s mind while surfing the web. Is my data safe? Is someone spying on me or collecting my information? VPN Proxy Master reroutes your traffic through a tunnel with AES 256-bit encryption and masks your online identity by hiding your IP address. Worrying about a slow connection somewhere or getting a tradeoff between a safer or faster VPN service? With VPN Proxy Master, no worries! You can always enjoy ultra-fast and secure connections whether you are in a public space, workplace, school, or at your home. A Virtual Private Network(VPN) provides you with a secure, encrypted tunnel to shield your online activities. As the best VPN for security, VPN Proxy Master is dedicated to protecting your online security and privacy.Starting Price: $3.75 per month -
18
AdGuard VPN
AdGuard Software Ltd
AdGuard VPN is a reliable solution designed to protect your online privacy, safeguard sensitive data, and maintain seamless internet operations. With robust encryption and a global network of servers, AdGuard VPN ensures that all company internet traffic is routed securely, shielding your organization from being traced. AdGuard has a reputation of being privacy fanatics, and that means your data gets the highest level of protection. AdGuard’s no-logging policy helps ensure that no user activity is recorded. AdGuard VPN effectively masks IP addresses to ensure anonymity, while also bypassing geo-restrictions and giving access to content from anywhere in the world. You can access restricted resources to satisfy your research, development or market expansion goals. Ideal for remote teams or businesses with a global presence, AdGuard VPN helps secure your digital communications and online operations.Starting Price: $1.49 per month -
19
IRI DMaaS
IRI, The CoSort Company
Data may be the most important asset, and risk, that your company holds. It describes customers, products, transaction histories, and everything else that you use and plan in business. This data can be in databases, files, spreadsheets, Hadoop, cloud platforms or apps. If you don't have the time or expertise to find and de-identify the personally identifiable information (PII) in those sources yourself, IRI Data Masking as a Service (DMaaS) can help. With IRI DMaaS, you can minimize risk and cost because you only pay for the data you need protected. IRI can do all, or some, of the work to classify, find, and mask that data. IRI can also provide your auditors with the logs and targets that verify that your sensitive data was protected and now complies with privacy laws. To facilitate the service, you can transfer unprotected data to a secure on-premise or cloud-based staging area, or provide remote, supervised access to IRI to the data sources(s) at issue under a strict NDA.Starting Price: $1000 per day -
20
IBM Cloud™ Data Shield enables users to run containerized applications in a secure enclave on an IBM Cloud Kubernetes Service host, providing data-in-use protection. IBM Cloud Data Shield supports user-level code to allocate private regions of memory, called enclaves, that are protected from processes running at higher privilege levels. It extends Intel Software Guard Extensions (SGX) language support from C and C++ to Python and Java™, while also providing preconverted SGX applications for MySQL, NGINX and Vault. Powered by the Fortanix Runtime Encryption platform and Intel SGX technology, these tools enable organizations with sensitive data to leverage cloud computing with more confidence. IBM Cloud Data Shield helps enable organizations with sensitive data to deploy and benefit from cloud computing. IBM Cloud Data Shield can run containerized applications in secure enclaves on the IBM Cloud Kubernetes Service.
-
21
T-Mobile Scam Shield
T-Mobile
Our free Scam Shield ™ app gives you control over T-Mobile’s anti-scam protections like scam ID, scam block, and caller ID, and is available to all T-Mobile postpaid customers. T-Mobile Scam Shield is a free app available to all T-Mobile postpaid customers on Android & iOS. View the number of scam likely calls. Turn on scam block. Report telemarketer, fraud, and scam calls. Report unwanted or misidentified calls. Turn on inbound caller ID. View your outbound caller ID name. Allow specific numbers to always ring through. Premium Scam Shield features are available for an additional charge. Block whole categories of calls, like telemarketers or political solicitors. Blocked number lists are stored on the network and automatically transfer to new devices. Perform a reverse number lookup for unknown callers. Includes voicemail-to-text, providing voicemail transcripts in the visual voicemail app or via text.Starting Price: Free -
22
vShield
vShield
vShield is a secure and reliable hosting provider offering a range of server solutions including Virtual Dedicated Servers (VDS), web hosting, and dedicated servers. With a focus on high performance, security, and 99.9% uptime, vShield ensures businesses have the infrastructure to scale efficiently. The platform supports instant server activation and provides a user-friendly control panel, making it ideal for companies looking for flexible and customizable hosting solutions. With a strong emphasis on data protection, vShield guarantees a safe environment for hosting sensitive business data.Starting Price: $12.99/month -
23
Project Shield
Project Shield
Project Shield, created by Google Cloud and Jigsaw and powered by Google Cloud Armor, provides free unlimited protection against DDoS attacks, a type of digital attack used to censor information by taking websites offline. Project Shield filters out malicious traffic using Google's infrastructure and DDoS tools. If your website is targeted by a DDoS attack, our servers will block attacking traffic to keep your website up and running. Project Shield can be configured to fetch content from your website's servers once and serve a cached copy on subsequent requests. This reduces traffic to your servers and absorbs potential DDoS attacks. Project Shield caches content to strengthen DDoS defenses, improve site performance, and save bandwidth to sites. Users have the ability to invalidate caches for their site's needs. Project Shield provides controls such as JavaScript cookies and IP denylists for increased site protection. -
24
HostShield
HostShield
HostShield, a UK-based hosting authority, excels in VPS Hosting and Dedicated Servers, primarily serving the Netherlands. With instant VPS activation and top-tier Dedicated Servers, we combine our UK headquarters with Dutch data centers for exceptional online performance. HostShield LTD is your go-to choice for hosting excellence, where the UK meets the Netherlands seamlessly. Our commitment to customer satisfaction, coupled with our dedication to cutting-edge technology, ensures that your online presence remains secure, robust, and highly responsive. Join the HostShield LTD family and experience hosting solutions that set the standard for excellence.Starting Price: $64.99 -
25
Steganos VPN Online Shield
Steganos
Steganos VPN Online Shield is a German-made VPN that makes it easy to surf anonymously, unblock geo-restricted videos and websites, and protect data on any network by encrypting connections with strong 256-bit AES; it automatically selects optimal servers, lets users choose IP locations worldwide to bypass censorship, and keeps them invisible online by hiding their real IP address. It secures public Wi-Fi, protects sensitive activities like banking and password use, and uniquely extends protection beyond the browser to downloaders, ensuring apps that fetch content also benefit from IP masking. Compatible with all major browsers (Chrome, Firefox, Edge, etc.), it emphasizes digital freedom and privacy without requiring complicated setup: users install, connect, and instantly get uncensored access to content from anywhere. The interface promotes ease of use while delivering real-time anonymity, with continuous updates and support for multiple devices.Starting Price: $2.41 per month -
26
RidgeShield
Ridge Security
RidgeShield cloud workload protection, is your first line of defense, providing zero-trust micro-segmentation technology to protect cloud workloads, regardless of whether they are deployed on-premises, in hybrid cloud, or multi-cloud environments. With RidgeShield, organizations can ensure the security posture of their network against sophisticated security threats. As an innovative host based micro-segmentation platform, RidgeShield supports a wide range of operating systems and workloads, continuously monitoring traffic across workloads and enforcing unified security policies across any environment. -
27
BroShield
BroShield
If you want to free your system with unwanted snoop ware then BroShield should be your 1st choice as this provides you a great anti snooping and detection of harmful viruses from your computer. Protect your computer with BroShield protection. BroShield helps you to get full authority over the internet. You can keep an eye on what kind of content your kid is exposed to. Restriction of adult websites and harmful content is in your hand. Allows you to control the internet access time. There are a lot of illegal websites that still run on the internet. We need to restrict our kids from getting exposed to sites like porn, gambling, and inappropriate sites. Visiting such sites may bring in viruses and other unwanted things with it. BroShield runs 24/7 to look for viruses and threats and keep the computer in full monitoring, to block the potential threats. The smart feature of BroShield fail-safe is designed to look for all the remote snooping activities to prevent getting compromised.Starting Price: $49.95 per year -
28
Bugsmirror MASST
Bugsmirror
MASST (Mobile Application Security Suite & Tools) is a unified mobile app security platform designed to detect, protect, and monitor mobile applications across development and runtime. The suite’s Threat Detection layer includes modules such as CodeLock for static analysis across 50+ vulnerability vectors, RunLock for runtime testing and attack simulations, APILock for discovering and securing API endpoints, and ThreatLock for deep red-teaming assessments. The Threat Mitigation layer wraps your mobile apps with protections including Defender (RASP-based real-time shielding), Shield (anti-reverse-engineering and IP-theft protection), and Guard (secure local storage of keys, certificates, and sensitive data via white-box cryptography). The Threat Visibility layer offers the ThreatLens Dashboard for real-time monitoring, analytics, and actionable insights into attacks, anomalies, and app security posture. -
29
VIPRE Privacy Shield
VIPRE Security Group
VIPRE Privacy Shield is a privacy-focused tool designed to help users protect their personal data and online identity from prying eyes. It offers powerful features like data file shredding, which permanently deletes sensitive files to prevent recovery, and a history cleaner that removes browsing history, cookies, and other digital footprints. VIPRE Privacy Shield also includes webcam and microphone blockers, ensuring that unauthorized apps or malware can’t access these devices without permission. With easy-to-use controls and customizable settings, VIPRE Privacy Shield empowers users to take charge of their digital privacy, protecting against identity theft and data exposure risks across all online activities. -
30
Excel-like Tables for Jira
Ricksoft
Get the fantastic features of Excel in every Jira issue. Unlock the potential of using more than 450 popular Excel-like formulas, tables and charts within Jira issues, allowing you to utilize functions like SUM, AVERAGE, VLOOKUP, and more. Our excel-like sheet provides a seamless experience for working with Jira data. With our bi-directional Jira field mapping features, you can read and write mapping easily. Read - show Jira filed value in the table cell Write - write the value in the table cell to the Jira field Effortlessly import your existing Excel files into our Excel-like Tables for Jira issues, enabling quick collaboration and enhancing teamwork. Seamlessly integrate your spreadsheets into Jira, eliminating the need for manual data entry and fostering a more efficient workflow.Starting Price: $0.18/month/user -
31
Forcepoint WebShield
Forcepoint WebShield
Secures HTTP traffic throughout the enterprise and provides access to web-based resources on less sensitive networks. Forcepoint WebShield, a Commercial-Off-The-Shelf (COTS) data guard, provides secure Web search and browse-down capabilities from high-side networks to lower-level networks. WebShield supports the missions of the largest number of cross domain transfer users as a secure mechanism for complete information browsing and discovery. WebShield provides transparent protection of the entire network and allows users to carry out their missions with increased protection. Users surfing lower-level networks can be restricted to specific server and file types as defined by security policies. All requests, responses and transfers go through security controls, such as dirty word search, virus scan and malicious content checks. Forcepoint WebShield is an approved cross domain transfer solution on the Unified Cross Domain Services Management Office (UCDSMO) Cross Domain Baseline. -
32
ByteHide
ByteHide
ByteHide is an all-in-one, developer-first application security platform designed to protect code, secrets, data, and runtime environments, while minimizing your dependencies and risk. It integrates seamlessly with your development workflows and communication tools, delivering key security insights and alerts without disrupting productivity. Operating under a zero-knowledge model, ByteHide uses client-side encryption so only you hold the keys, and it never stores your source code. With minimal, typically read-only permissions, you remain fully in control of what repositories and data sources are analyzed. ByteHide’s core tools include Shield for next-generation code obfuscation and anti-tampering, Secrets for AI-powered secret detection and decentralized management, Monitor for real-time runtime threat detection, and Radar for unified SAST/SCA scanning. These tools run in secure, isolated environments and automatically mask sensitive personal data.Starting Price: €39.99 per month -
33
OneSpan Mobile App Shielding
OneSpan
Empower your mobile app to operate safely in untrusted environments without interrupting the end-user experience. Fortify your app against the latest mobile threats without hindering deployment frequency or speed. Strengthen your app's resistance to intrusion, tampering, reverse-engineering, and malware. Add strong data protection controls to support compliance with regulations such as PSD2, GDPR, and more. Serve more customers – even on jailbroken or rooted devices – while reducing risk. Automate app shielding via integrations with your dev teams’ favorite CI/CD tools. Financial institutions lack visibility into the security status of their customers’ mobile devices. The OneSpan application shielding solution protects a mobile banking app from the inside out. It allows the app to securely operate even in potentially hostile environments, such as jailbroken or rooted iOS and Android devices – and only deny service when absolutely necessary. -
34
Shield
KingsBridge
KingsBridge's Shield is a web-based business continuity planning platform that provides companies with disaster recovery and contingency plans. Shield provides users with over 250 pages of optimized content that adapts easily to their business needs. Shield's customization feature allows users to delete, add, and rename teams to suit their company structure. With Shield's integrated threat risk assessment (TRA), users can recognize threats that could have negative effects on their businesses.Starting Price: $500.00/month -
35
ShieldApps Webcam Blocker
ShieldApps
ShieldApps’ Webcam Blocker equips you with highly sophisticated security software that utilizes advanced privacy enhancement algorithms – packaged in a simple interface that allows single-click protection. ShieldApps Webcam Blocker prevents hackers from accessing and using information collected through a webcam and microphone against you. The clean and user-friendly design will give you easy, one-click control over both Webcam and microphone-blocking features. ShieldApps Webcam Blocker adds another layer of protection to your computer and a proactive privacy approach. Upon selecting the options any external or internal attempt to access the webcam will be denied.Starting Price: $29.99 one-time payment -
36
Dot Browser
Dot HQ
The browser with privacy at heart. Dot Browser is a privacy-conscious web browser with smarts built-in for protection against trackers and advertisements online. Your data is constantly being sold through large advertisement networks that track what sites you like to visit online. We never send telemetry or crash reports without your consent. Browse our library of thousands of themes and extensions to get Dot just how you like it. We will offer to mask your email address when you sign up for sites or services. Dot is built on top of open-source software meaning the source code is open to anyone. Dot can migrate all your data from your previous browser in just a few clicks. Dot Browser has Dot Shield, which protects you from nasty ads and trackers. We chose Gecko due to its position as the best competitor to Chromium, and because it’s developed by Mozilla, who are best known for their privacy efforts in the community.Starting Price: Free -
37
NoSky
NoSky
NoSky: The Mighty Data Guardian! Our superhero software protects your data towers, battling hackers, viruses, corruption, and ransomware." In a world where data faces constant threats from nefarious villains like hackers, viruses, corruption, and ransomware, NoSky emerges as the ultimate superhero to protect your valuable information. With its superpowers fueled by cutting-edge technology, NoSky stands tall as the guardian of your data towers and castles, ensuring they remain impervious to the forces of evil. Highlighted Features: Shield of Security: NoSky's impenetrable shield shields your data from relentless hackers, leaving them powerless against its robust defenses. Virus-Vanquishing Abilities: Armed with the latest antivirus capabilities, NoSky annihilates viruses and keeps your data fortress free from any malicious intrusions.Starting Price: $2.43 -
38
SoftwareShield
Yummy Interactive
SoftwareShield™ Professional Edition is our mid-level product designed to combine advanced protection features with an easy-to-use interface and a powerful HTML/Javascript end-user interface ("nag screens"). Professional edition goes beyond simple licensing by providing the tools you need to maximize your revenue through advanced up-sell and marketing techniques. SoftwareShield™ Professional Edition provides the features you need to maximize revenue. SoftwareShield™ has the superior flexibility to meet the demands of any license model you want to deploy. Try-Before-You-Buy, buy-and-download (e.g. ESD), pay- per-level, micro-transactions, etc. can all be realized with SoftwareShield™. And non-monetized initiatives such as demos, media previews, and betas are also supported. -
39
Huawei Data Security Center
Huawei Cloud
Data Security Center (DSC) helps you effortlessly identify, mask, and protect sensitive data in structured and unstructured datasets. DSC displays high, medium, and low risks in data collection, transmission, storage, exchange, usage and deletion. You can efficiently locate the risks and take immediate actions to ensure data security. DSC precisely and efficiently identifies sensitive data sources based on the expert expertise and Natural Language Processing (NLP). DSC provides one-stop protection for both structured and unstructured data from a wide range of sources, such as Object Storage Service, databases, and big data sources. DSC leverages preset and user-defined masking algorithms to limit exposure of sensitive data, preventing unauthorized access to sensitive data. DSC provides sensitive data discovery, classification, and protection during all phases of data lifecycle management. -
40
Network Analyzer
Techet
Network Analyzer is a lite version of Network Analyzer Pro - an advanced tool for network diagnostics, LAN scanning and problem detection. Network Analyzer can help you diagnose various problems with your wifi network setup and Internet connectivity thanks to the tools it provides. It is equipped with a fast wifi device discovery tool, including all the LAN device's addresses and names. Further, arbitrary device's reachability can be tested with the provided ping tool. Finally, it displays various useful information related to your wifi/cell connection. Round trip delay testing including the server's IP address and hostname. Wifi network information such as SSID, BSSID, IP address (v4 and v6), and subnet mask. Cell network information such as IP address, network provider, MCC, MNC.Starting Price: $3.99 one-time payment -
41
Salesforce Shield
Salesforce
Salesforce Shield is a comprehensive data security and compliance solution designed to protect sensitive information across the Salesforce platform. It provides advanced tools to monitor user activity, encrypt data, track changes, and detect sensitive information in real time. With Event Monitoring, organizations gain granular visibility into user behavior, API activity, and system performance through detailed event logs. Platform Encryption allows businesses to encrypt sensitive data at rest while maintaining control over encryption keys and compliance requirements. Field Audit Trail extends data history tracking to strengthen integrity and support forensic-level compliance. Data Detect uses intelligent pattern matching to identify and classify sensitive information such as credit card numbers and personal identifiers. Together, these capabilities help organizations mitigate risk, meet regulatory standards, and securely deploy AI-powered solutions like Agentforce.Starting Price: $25 per month -
42
CCIS Church Management Software
CCIS Church Management Software
CCIS Shield™ is the latest system church management system developed by CCIS Church Management Software. CCIS Shield™ is fully web enabled so access from anywhere with an Internet connection is possible. While CCIS Shield is accessible from any device, the user experience is best with a desktop/laptop computer or a tablet as a mobile device. CCIS Shield™ web application offers you a convenient and comprehensive membership financial management system that you can tailor to fit your church's needs. This program is flexible enough that you can choose what's important to you, but powerful enough that you can expand the depth of your data at any time. Keep secure notes on individuals, chart individual and family relationships, track contributions and giving with the greatest of ease, and devise activities and attendance records. Execute reports, retrieve data and enhance how you view your church. Improve your church's administration today using CCIS Shield Web Church Membership Management.Starting Price: $29.99/month -
43
GAT Labs
GAT Labs
Control your cloud environment as if it were on your own LAN with GAT’s powerful management and reporting capabilities! View all user files as if they were on a single Drive and all user Emails as if they were on a single server. Remove file shares or emails with the click of a button. Starting with GAT+ (our core tool) which gives you deeper domain understanding from data that’s otherwise overlooked — Enjoy outstanding data analysis covering all aspects of team operations and collaboration. GAT Shield not only ensures a 360° protective shield for your domain, its rich dashboard also displays every Chrome interaction in one place. Admins can also use GAT Shield to monitor almost every aspect of user behaviour while the user is online. -
44
GameShield
Alibaba Cloud
GameShield is a customizable network security solution, which has been designed for the game industry. GameShield allows you to efficiently defend against TCP CC attacks that typically occur in the game industry and to prevent Tb-level DDoS attacks. In addition, GameShield can help you reduce the costs of security protection. Multi-level disaster recovery architecture and risk management system to block malicious users and prevent DDoS and CC attacks. Supports visual management and multiple built-in features in the console, allowing you to simply scale the architecture. Supports SDK-based query dispatching within several seconds and eight-ISP-based BGP acceleration to guarantee the optimum gaming experience. Supports customization to meet different business demands and save costs. GameShield provides SDKs for multiple platforms, such as Windows, Android, and iOS.Starting Price: $1.65 per month -
45
BrandShield
BrandShield
BrandShield is an anti-counterfeiting, anti-phishing and online brand protection solution. From proactive detection to the removal of online phishing and elimination of their social distribution. Monitor marketplaces and websites to remove counterfeits and increase your revenues and reputation. Protect your brand from TM infringements, counterfeit sales and brand abuse. BrandShield is a brand-oriented digital risk protection company, that specializes in monitoring, detection, and removal of digital threats such as phishing attempts, executive impersonation, counterfeit products, trademark infringements, and more. BrandShield was established to revolutionize the way companies can protect their digital assets outside their security perimeter. Ever since the launch, we have introduced groundbreaking innovative features and services to provide the most automated and relevant solutions for the 21st century, such as Patterns detection, built-in enforcement case management, etc. -
46
Dose for Excel
Zbrainsoft.com
If you're tired of eliminating duplicate rows, comparing sheets, or executing hard activities in Excel, Dose for Excel is the powerful convenient solution you need to simplify all of these complicated chores into a few clicks. It has over 100 powerful new functions and features that have been added to the Excel ribbon for your convenience. You may, for example, instantly export sheets, merge cells, rows, or columns without losing data, use the comments helper, count cells by color, use powerful built-in calculations, and easily backup your workbooks. Dose for Excel is a simple application that will save you time and effort. Convert your Excel workbook to Full Screen mode for easier reading; the ribbon, status bar, and formula bar will be minimized. Return the workbook to the first show state by showing them again. -
47
Shield Docs
Shield Docs
KPMG Shield Docs helps you achieve an equilibrium between security and freedom, providing a trusted online environment allowing you to share and collaborate on confidential information with confidence. KPMG Shield Docs is an innovative cloud-based solution that combines secure file sharing, collaboration, virtual data room functionality, document management and data protection in a single package. It offers an intuitive and customizable mix of functions to share, edit, store and utilize critical files and data sets with complete end-to-end visibility and efficiency, giving your business peace of mind that sensitive information will remain secure from unauthorized access. This module delivers the core security functionality of the KPMG Shield Docs platform. It includes features such as granular user access control, digital fingerprinting, remote document termination, information rights management and two-factor authentication amongst others.Starting Price: $49.95 per month -
48
RedShield
RedShield
RedShield has partnered with the no.1 cloud provider AWS to create a next-generation architecture that offers unparalleled DDoS protection as part of RedShield’s service. In a world where the odds are stacked against you, with 50 new vulnerabilities published each day, it can feel like a near-impossible task to stay ahead of cybercriminals. RedShield uses a best-practice operational model with cybersecurity experts, tools, and AI-supported processes to allow our customers to minimize their risk and maximize their cybersecurity resilience. Not only is the cybersecurity battle complex and dynamic, coupled with the high demand & short supply of security & development professionals, but it can also soon become a costly distraction away from core business. RedShield’s service not only solves the people's problem but does so at approx. 10% of the cost of building & running your own in-house web app security team, offering a compelling return on mitigation investment. -
49
MCP Shield
MCP Insight
MCP Insight’s bespoke Fraud Detection and Fraud Blocking Solution MCP Shield provides real-time fraud detection and blocking with an intuitive analytics portal and a simple implementation process. The tool operates by detecting unexpected changes and actions on your service landing or payment page. It determines whether a payment request is legitimate or fraudulent by monitoring the activity of the alleged consumer and by logging whether the consent is bot or human in a transaction assessment. MCP Shield provides the information you need to decide whether or not to block a service. MCP Shield Dashboard Monitors 100+ variables grouped into fraud categories Provides statistics on APK and Browsing fraud on your services Provides transactional detail and statistics Request real-time transaction assessment results You decide when and what to block MCP Shield Implementation Fill out a simple form to add your services to the MCP Shield dashboard Add a snippet of code to youStarting Price: $500 -
50
NeuShield Data Sentinel
NeuShield
The War on Ransomware is Over. NeuShield Data Sentinel does more than just detecting and blocking ransomware attacks. We’re the only anti-ransomware technology that can recover your damaged data from malicious software attacks without a backup. Data Sentinel uses Mirror Shielding™ to protect files ensuring that you can instantly recover your important data from any ransomware attack. Patented technology that adds a barrier to protected files preventing them from being modified. Mirror Shielding™ makes an attacker believe they have access to a computer’s original data files, but they are in fact only seeing a mirror image of them. Restores operating system files and settings back to a known good state allowing you to quickly regain access to your computer after a ransomware attack. One-Click Restore also removes both known and unknown malware. Protects the boot portion of a drive to prevent aggressive types of ransomware from taking over the boot process.