Alternatives to Passages
Compare Passages alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Passages in 2026. Compare features, ratings, user reviews, pricing, and more from Passages competitors and alternatives in order to make an informed decision for your business.
-
1
Google Chrome Enterprise
Google
Chrome Enterprise is a suite of business offerings that includes Chrome browser, Chrome's cloud management tool Chrome Enterprise Core, and the advanced security capabilities in Chrome Enterprise Premium. Chrome offers a dedicated enterprise download bundle, giving admins access to additional resources and policy templates for managing Chrome across desktop environments in their organization. Chrome Enterprise Core provides admins with simple, centralized management from the cloud. It allows admins to manage their enterprise browser deployment across platforms all from the same place. Chrome Enterprise Premium enables secure access to applications and resources, and offers integrated threat and data protection in the browser. It adds an extra layer of security to safeguard your Chrome browser environment, including DLP, real-time URL and file scanning, and context aware access for SaaS and web apps. -
2
Kasm Workspaces
Kasm Technologies
Kasm Workspaces streams your workplace environment directly to your web browser…on any device and from any location. Kasm uses our high-performance streaming and secure isolation technology to provide web-native Desktop as a Service (DaaS), application streaming, and secure/private web browsing. Kasm is not just a service; it is a highly configurable platform with a robust developer API and devops-enabled workflows that can be customized for your use-case, at any scale. Workspaces can be deployed in the cloud (Public or Private), on-premise (Including Air-Gapped Networks or your Homelab), or in a hybrid configuration. -
3
WebTitan
TitanHQ
WebTitan is a DNS Based Web content filter and Web security layer that blocks cyber attacks, malware, ransomware and malicious phishing as well as providing granular web content control. WebTitan DNS filtering filters over 2 billion DNS requests every day and identifies 300,000 malware iterations a day. Our intelligent AI driven real time content categorization engine combines industry leading anti-virus and cloud based architecture. This makes the WebTitan Cloud DNS filter an ideal solution for organizations needing maximum protection and minimal maintenance. This cloud based web filtering solution provides complete protection from online threats such as viruses, malware, ransomware, phishing and comprehensive content filtering. WebTitan Cloud is a low maintenance solution that can be set up in five minutes to stop your users from accessing inappropriate content online. Start your free Trial of WebTitan today, with full support included. -
4
VersaONE
Versa Networks
The AI-powered platform for unified security and networking. Enhance the speed of detection and remediation with AI-powered threat and data protection that minimizes human errors. Improve user and app experience, and improve performance and reliability with an AI-powered network. Lower your TCO by simplifying your infrastructure with a converged platform that reduces point product sprawl, fragmented operations, and complex lifecycle management. VersaONE provides seamless connectivity and unified security for all users, devices, offices, branches, and edge locations. It delivers secure access to all your workloads, applications, and clouds from a single platform, ensuring that data and resources are accessible and secure across any network whether it be WAN, LAN, wireless, cellular or satellite. This unified platform approach streamlines network management, reduces complexity, and enhances security, meeting the demands of modern IT environments. -
5
Zscaler
Zscaler
Zscaler, creator of the Zero Trust Exchange platform, uses the largest security cloud on the planet to make doing business and navigating change a simpler, faster, and more productive experience. The Zscaler Zero Trust Exchange enables fast, secure connections and allows your employees to work from anywhere using the internet as the corporate network. Based on the zero trust principle of least-privileged access, it provides comprehensive security using context-based identity and policy enforcement. The Zero Trust Exchange operates across 150 data centers worldwide, ensuring that the service is close to your users, co-located with the cloud providers and applications they are accessing, such as Microsoft 365 and AWS. It guarantees the shortest path between your users and their destinations, providing comprehensive security and an amazing user experience. Use our free service, Internet Threat Exposure Analysis. It’s fast, safe, and confidential. -
6
Citrix Enterprise Browser
Cloud Software Group
Keep your data safe from browser-based attacks. When it comes to security, the internet is among your biggest enemies. Which is a problem, since employees need the web to stay productive. That’s what Citrix Enterprise Browser is for. This cloud-hosted browser lets you thoroughly protect your network—without complicating the experience for users. Go ahead—let employees browse away. We’ll isolate that traffic and keep your network protected. Even if someone lands on a compromised site, your devices and data stay safe. Teams have more freedom. You get greater control. Employees want to browse without limits. IT needs to keep web-based attacks at bay. Citrix Enterprise Browser lets you do both. Citrix Enterprise Browser is completely separate from your network. That means browsing is 100% isolated and each session is destroyed after use. So even as you expand employee options for working on-the-go, your corporate resources remain safe.Starting Price: $2 per user per month -
7
Talon Enterprise Browser
Talon Cyber Security
The first secure enterprise browser designed for the future of work. Defend against malware and prevent data loss for SaaS and web-based applications for any business user from any location or device. TalonWork, is a hardened Chromium-based browser that isolates web traffic locally on the endpoint, providing a responsive, native user experience. TalonWork integrates with popular Identity Providers to streamline user onboarding and policy enforcement. TalonWork provides comprehensive DLP to reduce cyber risk. This includes file encryption to prevent sensitive files from being shared externally or stored on endpoints. TalonWork also provides granular clipboard, printing, and screenshot restrictions. TalonWork blocks access to malicious domains and phishing websites with URL filtering and enhanced safe browsing functions. TalonWork also prevents malicious files from being uploaded/downloaded using Talon’s file scanning engine or CrowdStrike Falcon X. -
8
Browser Security software is a tool that helps protect sensitive enterprise data from security breaches associated with cyberattacks. Browser Security Plus is an enterprise browser security tool that helps IT administrators manage and secure browsers across networks. It enables them to gain visibility on browser usage trends, harden browsers settings, control browser extensions and plug-ins, lock down enterprise browsers, and ensure compliance with stipulated browser security standards. All this helps admins protect their networks from cyberattacks, such as phishing attacks, watering hole attacks, ransomware, viruses, and trojans. Gain total visibility into browser usage trends and add-ons present across your network. Detect which add-ons components are capable of causing security breaches. Manage and secure the browser add-ons with Add-on Management.
-
9
BlackBerry Access
BlackBerry
Enable access to your corporate network from personal or non-corporate managed devices, protecting enterprise data with full containerization to reduce the risk of data leakage. BlackBerry® Access provides a secure, intuitive user experience for intranet browsing. Employees get access to corporate intranets and apps on their personal or non-corporate managed devices. Simplify your bring your own computer program with desktop offerings from BlackBerry, giving you modern alternatives to traditional VPN and VDI solutions. BlackBerry® Desktop enables users to securely access corporate on-premises or cloud content and resources on their personally owned or non-corporate managed Windows 10 and macOS devices. It includes BlackBerry Access as well as BlackBerry® Work. BlackBerry Access is a secure browser that allows your organization to confidently enable mobile access to your corporate network. It supports iOS, Android, Windows, and macOS. -
10
iboss
iboss
iboss is a cloud security company that enables organizations to reduce cyber risk by delivering a Zero Trust Secure Access Service Edge platform designed to protect resources and users in the modern distributed world. Applications, data, and services have moved to the cloud and are located everywhere, while users needing access to those resources are working from anywhere. The iboss platform replaces legacy VPN, Proxies, and VDI with a consolidated service that improves security, increases the end-user experience, consolidates technology, and substantially reduces costs. Built on a containerized cloud architecture, iboss delivers security capabilities such as SWG, malware defense, Browser Isolation, CASB, and Data Loss Prevention to protect all resources via the cloud instantaneously and at scale. The iboss platform includes ZTNA to replace legacy VPN, Security Service Edge to replace legacy Proxies, and Browser Isolation to replace legacy VDI. This shifts the focus from protecting -
11
Kaspersky Security for Internet Gateway
Kaspersky
Working with the World Wide Web is critical to the majority of today's businesses. Your corporate internet gateway doesn't just give access to internet resources for your employees - it also provides an entry point for cyberthreats out to target them through social engineering, and to attack your endpoints with sophisticated malware. Kaspersky Security for Internet Gateways offers significant risk reduction in areas including infection, data leaks and internet distractions. Provides multi-layered gateway-level protection against the latest web-based threats. Blocks infections before they can reach your endpoints. Negates the effects of social engineering. Readily complements your existing gateway-level defenses. Reduces your exposure to attack by controlling internet resource usage. Supports and assists regulatory compliance initiatives. -
12
R&S®Browser in the Box
Rohde & Schwarz Cybersecurity
R&S®Browser in the Box from Rohde & Schwarz Cybersecurity prevents malware from entering your PC and your infrastructure. The solution takes an innovative approach and fully separates the browser from a computer‘s operating system. It runs on a virtual machine (VM) for complete isolation at the computer level, keeping malware away from the user‘s device and the corporate’s network. Browser in the Box offers proactive protection against cyberattacks. Thanks to the secure separation of the browser from the rest of the PC, you and your corporate network are protected against Trojan horses, ransomware, ATPs and zero-day attacks. Java, JavaScript, Flash and the opening of dangerous links are no longer a threat. -
13
Symantec Web Isolation
Broadcom
Symantec Web Isolation executes web sessions away from endpoints, sending only a safe rendering of information to users’ browsers thereby preventing any website-delivered zero-day malware from reaching your devices. When combined with Symantec Secure Web Gateways, policies drive traffic from uncategorized sites or URLs with suspicious or potentially unsafe risk profiles through Isolation for safe browsing. By integrating with Symantec messaging solutions, Web Isolation isolates links in email to prevent phishing threats and credential attacks. Web Isolation protects against emails with links to malicious websites, so they cannot deliver malware, ransomware and other advanced attacks. It also prevents users from submitting corporate credentials and other sensitive information to unknown and malicious websites by rendering pages in read-only mode. -
14
Comodo IceDragon
Comodo Security Solutions
IceDragon features privacy and performance enhancements over the Firefox core browser as well as additional features such as SiteInspector malware scanning, Comodo Secure DNS and improved social media functionality. Fast, easy to use and light on PC resources. Scan web-pages for malware right from the browser. Lightning fast page loads with integrated DNS service. Privacy and performance enhancements over Firefox core. Full compatibility with Firefox plug-ins. Comodo IceDragon is a fast and versatile Internet browser based on Mozilla Firefox which features several security, performance and feature enhancements over the core build. Fully compatible with Firefox plug-ins and extensions, IceDragon combines the freedom and functionality of Firefox with the unparalleled security and privacy of Comodo. Comodo IceDragon is a fast and versatile internet browser based on Mozilla Firefox which features several security, performance and feature enhancements over the core build. -
15
CPU-enforced malware prevention stops phishing and ransomware attacks, while reducing overall alert volume. Remotely locate, lock, and wipe a lost or stolen PC. HP Protect and Trace2 protects data, reduces operational burden, and can eliminate breach notifications. Continually monitors device for anomalous behavior and self-heals. HP Wolf Security brings a host of advanced technologies to your endpoint cyber-defenses, supporting HP and non-HP (OEM) PCs, and HP printers. Unlike alternatives that only protect above the operating system, HP takes a full-stack approach. HP Wolf Security1 builds security layer by layer, from motherboard hardware and firmware, through the OS, to application execution.
-
16
Menlo Security
Menlo Security
Our platform invisibly protects users wherever they go online. So threats are history and the alert storm is over. Explore the key ingredients that make the Menlo Security platform so secure, seamless, and simplified. Fueling our unique approach to security, the Elastic Isolation Core protects against known and unknown threats, and isolates them before they get to users. Zero Trust isolation provides 100% protection with no need for special software or plug-ins, so users experience no impact on performance or interruption in workflow. Cloud-native and high performance, the Elastic Edge is built to scale globally on demand. It dynamically scales to meet enterprise-level growth—from 1000 users to over 3M— with no performance hit, and is easily extendible with a rich set of APIs and integrations. -
17
Comodo Dragon
Comodo Security Solutions
The Dragon encompasses all of the best features of Chrome. It includes Chromium technology engineered to offer web users an internet browser that surpasses others especially when it comes to functional speed, stability and convenience. This is exactly why Comodo, the world's leading online security and trust assurance innovator, has stepped forward with Comodo Dragon. A Chromium technology-based web browser that offers you all of Chrome's features plus the unparalleled level of security and privacy you only get from Comodo. Including a greater level of privacy than Chromium technology offers. The Comodo companies are innovative and prolific developers of online security and trust assurance solutions. The Comodo Dragon has taken the latest Chromium technology and beefed it up in the one way necessary to make it the optimum browser to use on today's malware plagued Internet. Superior security and privacy. -
18
FortiProxy
Fortinet
As attacks become more versatile, organizations need an integrated approach to secure from malicious web traffic, websites, and viruses. Fortinet's secure web gateway, FortiProxy, addresses these issues with one, unified product to protect against web attacks with URL filtering, advanced threat defense, and malware protection. Defend end-users from internet-borne threats and enforce policy compliance. Secure Web Gateway addresses a set of overlapping security problems within one product. Using one solution which protects against web attacks with URL filtering, advanced threat defense and malware protection to defend users from internet-borne threats and help enforce internet policy compliance. FortiProxy is a secure web proxy that protects employees against internet-borne attacks by incorporating multiple detection techniques such as web filtering, DNS filtering, data loss prevention, antivirus, intrusion prevention, and advanced threat protection. -
19
Symantec Web Security Service
Broadcom
Cloud-delivered network security service enforces comprehensive internet security and data compliance policies, regardless of location or device. Increasing web use, rapid cloud adoption, and greater numbers of mobile and remote users are exposing your network to additional risk. Symantec Web Security Service (WSS) is an indispensable line of defense against modern day cyber threats. It provides secure web services, enables enterprises to control access, protects users from threats, and secures their sensitive data. Moving to the cloud introduces new security and compliance risks, but it also enables tremendous new defensive strategies. Cloud-delivered network security adds flexibility and boosts performance, while protecting users with consistent threat prevention and data compliance policies—wherever they go. -
20
Citrio
Citrio
Citrio is a fast, polished browser which demonstrates excellent performance. Citrio’s rapid startup time, smooth browsing, and responsive addons will ensure the most comfortable web surfing ever. Citrio respects your privacy and doesn’t gather any of your personal information. The browser is designed to keep you safe and secure on the web with built-in malware and phishing protection, as well as automatic updates that make sure you have all the latest security fixes. Citrio has full support for all addons and extensions available in the web store. You can expand the functionality of Citrio by adding any features you might need. This makes Citrio a highly customizable tool for everyone. Citrio’s integrated Download Manager gives you full control of your downloads. You will be able to access all downloaded files at any time right through the browser. The built-in download accelerator will ensure that you get your downloads faster and will speed up your downloads by up to 5 times!Starting Price: Free -
21
Chromnius Browser
Chromnius
Download Chromnius Web Browser with the latest security updates & smart features to block Display, Pop-Up Ads & Trackers. Chromnius automatically protects you from security issues like phishing and dangerous sites.Starting Price: Free -
22
Avast Secure Browser
Avast
Avast Secure Browser automatically blocks online ads to drastically improve website load time. Hide all ads, or just the most intrusive, so you can browse uninterrupted. Our private browser has advanced security built in, so you can browse, shop, and bank safely on any website. Hide everything you type online to keep your sensitive data safe. Protect your device from threats with powerful anti-phishing technology. Make sure supported websites use encryption to secure your data. What you do online is your business, which is why we’ve included several layers of privacy protection to prevent online tracking and to mask your digital identity. Stay private online by preventing third parties from tracking you. Stop websites from identifying you based on your unique browser profile. Monitor your email address to ensure your passwords haven’t leaked online.Starting Price: $0 -
23
AhnLab MDS
AhnLab
More recent and sophisticated cyber-attacks have targeted organizations by injecting malware or files into web applications and email. The attacks initiate the distribution of malware that passes undetected through conventional security solutions; hence, these are so-called Advanced Persistent Threats(APTs). However, the response to the ever-evolving malware-based threats has been via ordinary security methods like antivirus, firewall, and intrusion prevention products. Because of this, many organizations remain vulnerable to Advanced Persistent Threats. It’s no secret that these attacks cost a company via lost intellectual property, stolen information assets, damage to equipment, and network downtime. AhnLab MDS (Malware Defense System) is a network sandbox based APT (Advanced Persistent Threat) protection solution that combines on-premise and cloud-based analytics to defeat advanced targeted threats anywhere across the organization. -
24
WEBGAP
WEBGAP
WEBGAP is a remote browser isolation (RBI) platform that delivers a native browser user experience in a scalable and cost-effective way. It works by isolating web browsing activity in a remote cloud environment so that malicious code and other threats cannot reach user devices. This makes it an effective way to protect against a wide range of cyber attacks, including phishing, malware, and ransomware. WEBGAP is easy to use and deploy, and it can be integrated with existing security systems. It is also scalable to meet the needs of businesses of all sizes. -
25
Reveelium
ITrust.fr
3 out of 4 companies are subject to computer attacks or hacking. However, 90% are equipped with essential security equipment that does not detect these malicious attacks. APTs, malicious behaviors, viruses, crypto lockers, override existing security defenses and no current tool can detect these attacks. Yet these attacks leave footprints of their passage. Finding these malicious traces on a large amount of data and exploiting these signals is impossible with current tools. Reveelium correlates and aggregates all types of logs from an information system and detects attacks or malicious activity in progress. An essential tool in the fight against cyber-malware Reveelium SIEM can be used alone or complemented by Ikare, Reveelium UEBA or ITrust’s Acsia EDR, to provide a true next-generation security center (SOC). Have the practices of its teams monitored by a third party and obtain an objective opinion on its level of safety. -
26
Intego Antivirus
Intego
Using the latest technology, malware engine and behavior analysis, Intego will protect your system around the clock to block Malware, Spyware, Adware, Ransomware and other threats - before they attack. You and your family will be protected from online dangers with Intego Web Shield. Phishing attacks, fake websites, and other malware will be blocked quickly so that your PC remains safe at all times. The threat of advanced Ransomware attacks and Zero-Day attacks is on the rise, using Intego’s advanced Prevention Engine, we will make sure to thwart and block these attacks, which traditional antivirus software can’t.Starting Price: $709.99 per pc per year -
27
CensorNet Web Security
Censornet
Protect your organization from web-borne malware, and offensive or inappropriate content and manage time spent on websites that impact productivity with Censornet Web Security. Powered by a unique architecture that ensures lightning-fast response times for all users no matter where they are in the world. Malware distribution sites, compromised pages on legitimate sites, malvertising and infected files either downloaded or cloud-shared. Protection via a powerful combination of real-time traffic inspection, URL reputation, advanced anti-malware and threat intelligence. With Web Security, every page within a site is categorized – not just the domain or sub-domain. -
28
360 Extreme Browser
360.cn
Based on the new Chromium high-speed kernel engine, carefully adapted to you better network helper. Privacy and security should not be just expectations. We provide you with high-quality security measures to avoid deception and dangerous websites, and create a rich and easy online world; not only that, the new Mac version of the speed browser uses a variety of security technologies to defend Your online privacy and security. Do not want to be discovered in your browsing history? Turning on the private browsing mode will not record any visited web pages, search history or "autofill", allowing you to achieve truly private browsing without any traces and protect your online privacy. Whether you are using Windows, MacOS, domestic systems, iOS, Android, you can easily synchronize your passwords, favorites, settings, and extended applications by logging in to the official account; you can also migrate your favorites from Safari and Google. -
29
Bad actors take advantage of SSL/TLS encryption to hide malicious payloads to outsmart and bypass security controls. Don’t leave your organization vulnerable to attack with security solutions that can’t inspect encrypted traffic efficiently at scale. BIG-IP SSL Orchestrator delivers high-performance decryption of inbound and outbound SSL/TLS traffic, enabling security inspection that exposes threats and stops attacks before they happen. Maximize infrastructure and security investments with dynamic, policy-based decryption, encryption, and traffic steering through security inspection devices. Protect against outbound traffic dispersing malware, exfiltrating data, or reaching out to a command-and-control server to trigger attacks. Decrypt incoming encrypted traffic to ensure it’s not hiding ransomware, malware, or other threats that lead to attacks, infections, and data breaches. Prevent new security blind spots by enabling greater flexibility without architectural changes.
-
30
Epic Privacy Browser
Epic Privacy Browser
Epic is a private, secure web browser that blocks ads, trackers, fingerprinting, cryptomining, ultrasound signaling and more. Stop 600+ tracking attempts in an average browsing session. Turn on network privacy with our free VPN (servers in 8 countries). Download audio and video from YouTube, Vimeo, SoundCloud, Facebook, Dailymotion and hundreds of other sites. Epic's built-in encrypted proxy encrypts your data, hides your location, and lets you access blocked websites such as Pandora from anywhere in the world. Epic is dedicated to protecting your privacy so no one can track what you browse. Epic's proxy when enabled encrypts your data. Every tab is a separate process for exceptional security. Epic is powered by chromium like chrome for amazing performance and rendering. Your browsing history is tracked and sold even sensitive visits to sites for jobs and health conditions. -
31
Skyhigh Remote Browser Isolation
Skyhigh Security
Because no local code execution happens on the user’s computer, users are protected from all malicious websites, links, emails and adverts. Administrators can finely control which files users are permitted to download. All permitted downloads are first scanned to eliminate threats. Organizations can obtain analytics into users’ web activities, which can be used for compliance monitoring and to detect insider threats and unproductive employees. The effects of a malware infection can be severe and require a substantial amount of money and time to fix. Isolated browsing protects your network completely from web-based malware. Analyze user data for compliance monitoring and to detect insider threats. -
32
Ericom Shield
Ericom Software
Ericom Software provides businesses with Zero Trust Secure Access to corporate applications, in the cloud and on-premises, from any device or location. Ericom Shield is a clientless enterprise-grade solution that is designed to address the needs of security and IT professionals while providing a transparent Internet experience for end users using Remote Browser Isolation. Ericom Shield can be deployed across organizations of any size, on all devices, using any operating system, or browser and does not require installation of any software or plug-ins on endpoints. Files to be downloaded are scanned and cleansed using a pre-integrated, Content Disarm and Reconstruction (CDR) process, before being released to the user device. When it comes to phishing attacks, user training just isn’t enough. Ericom Shield executes email-embedded URLs away from endpoints, in remote virtual browsers in the cloud or DMZ, so no malware can reach endpoints. -
33
Barracuda Web Security Gateway
Barracuda Networks
The Barracuda Web Security Gateway lets organizations benefit from online applications and tools without exposure to web-borne malware and viruses, lost user productivity, and misused bandwidth. As a comprehensive solution for web security and management, it unites award-winning spyware, malware, and virus protection with a powerful policy and reporting engine. Advanced features ensure that organizations adapt to emerging requirements like social-network regulation, remote filtering, and visibility into SSL-encrypted traffic. Unlimited remote user licenses are included to enforce content and access policies for mobile devices outside of the corporate network. The Barracuda Web Security Gateway is also available as a virtual appliance. For hosted web security, see Barracuda Content Shield. -
34
Fluency Tutor
Texthelp
Features including text-to-speech, dictionary and translation tools, help struggling readers. By giving them access to support tools that help build their understanding and confidence. Teachers can share reading passages with their class and receive recordings of the assigned passages back. Helping to keep students reading, whether they’re in class or at home and avoid any learning loss. Share passages with individual students, or with the entire class using Google Drive or Google Classroom 'share' function. Provides extra help for students with text-to-speech, dictionary, picture dictionary and translation tools. Students can record their own assigned reading passages whenever and wherever it suits them and share back with their teacher. Friendly dashboard interface for teachers & students. -
35
Recap
Recap
Smart split and summarize with ChatGPT. An open-source browser extension lets you easily summarize any portion of any webpage with ChatGPT. Recap is an open-source browser extension to summarize text on a webpage with ChatGPT. Recap splits the article into passages so that you can easily summarize any part of the article. You need a ChatGPT account to do the actual summarization work. Auto-split the article into passages. Summarize entire pages, summarize the text in a passage, recap previous content before a passage, and summarize the user-selected text. Supports ChatGPT, supports official OpenAI API. Custom prompt, toggle enable/disable for individual domain or page. Supports user configuration for different sites. Dark mode and keyboard shortcut support.Starting Price: Free -
36
Orion Browser
Orion Browser
Built on WebKit, Orion gives you a fast, smooth and lightweight browsing experience, without holding your device’s battery hostage. Orion has no built-in telemetry, so it can never “phone home” and risk exposing your data. Orion is truly and verifiably a privacy-respecting browser, unlike those that offer only an illusion of privacy. Orion approaches the problem with the philosophy of "no fingerprinter running, no fingerprinting possible". The reason is that it is literally impossible to prevent fingerprinting from a sophisticated fingerprinter if one is ever allowed to run. The only efficient protection against fingerprinting is what Orion is doing - preventing the fingerprinter from running in the first place. Orion is the only browser on the market that comes with full first-party and third-party ad and tracking script blocker, built-in by default, making sure invasive fingerprinters never run on the page. -
37
Carbon Browser
Carbon Browser
We solve the privacy issue with our in-built dVPN, firewall & ToR e2ee which will come at no extra cost. A fully immersive web 3.0 experience with crypto features as standard including a multi-chain wallet and bridge. An optimized engine along with automatic blocking of intrusive ads and trackers gives you blazing-fast page load speeds. We block trackers and ads on every page you browse without compromising UX or browsing speed. Carbon Browser’s AdBlock feature blocks all intrusive and annoying ads by default, enhancing the browsing experience by removing disruptions. It automatically prevents video ads on YouTube, sponsored posts sidebar ads on Facebook, and distracting banner ads. Additionally, it eliminates pop-ups and pop-under windows, making web pages load faster and reducing clutter for a cleaner, more focused browsing experience. Carbon’s open source code is hosted on decentralized servers, offering a secure and distributed alternative to conventional file hosting services.Starting Price: Free -
38
UR Browser
UR Browser
Websites load faster without the ads, trackers and cookies that can weigh pages down. Protect your privacy with a powerful suite of tools that give you control over who sees your data online. Browse safer with alerts for dangerous websites, automatic HTTPS redirect and a built-in virus scanner. Depending on the website you are on, you may need a higher or lower level of privacy. Discover the three levels of privacy found in the Privacy Suite, and the features found within each one. You can change your level of privacy and save your preferences for specific websites. This way, your website will always load in the privacy level you chose. By default, UR browser's medium and high profiles will automatically block annoying and disruptive ads like pop-ups, video ads, and banner ads. Occasionally, you may see some ads that aren’t disruptive. These ads help support and encourage content creators.Starting Price: Free -
39
Passage Health
Passage Health
Passage Health is an all-in-one EMR designed specifically for ABA practices. We bring together clinical documentation and data collection, streamlined scheduling, automated billing, authorization tracking, intake management, analytics and more in one intuitive system. Passage helping teams grow, save time, bill faster, reduce errors, and focus on delivering quality care. With powerful reporting and real-time insights, Passage empowers practice owners to make data-driven decisions and achieve sustainable growth. -
40
PassagePoint
STOPware
Improve your company image and streamline the visitor registration process with PassagePoint, an on-premise security platform designed to enhance the safety and security of your facility. PassagePoint’s extensive customization capabilities and add-ons are specifically designed for school districts, global corporations, multi-tenant buildings and hospitals with unique security requirements worldwide. PassagePoint’s enhanced feature set can be added as required; web pre-registration, Single Sign-On and our Control Center module to centrally manage multiple locations with unique policies and settings. This scalable architecture enables integration with external systems, such as physical access control, HL7 interface, Denied Party Screening Services and the National Sex Offender Registry to provide an additional layer of security required for enterprise-level systems. STOPware offers a wide range of hardware components supported to speed up the visitor check-in process. -
41
TILDE
ielab
TILDE (Term Independent Likelihood moDEl) is a passage re-ranking and expansion framework built on BERT, designed to enhance retrieval performance by combining sparse term matching with deep contextual representations. The original TILDE model pre-computes term weights across the entire BERT vocabulary, which can lead to large index sizes. To address this, TILDEv2 introduces a more efficient approach by computing term weights only for terms present in expanded passages, resulting in indexes that are 99% smaller than those of the original TILDE. This efficiency is achieved by leveraging TILDE as a passage expansion model, where passages are expanded using top-k terms (e.g., top 200) to enrich their content. It provides scripts for indexing collections, re-ranking BM25 results, and training models using datasets like MS MARCO. -
42
SigmaOS
SigmaOS
The new home for your internet ✨ Everything other browsers offer, and much more. Be more productive by organizing your work. Multitask like a pro with two active pages at a time. Keep your workspaces clear by snoozing pages you don’t need right now. Pick up your work from anywhere – your workspaces and pages are synced across your devices. You can do everything from your keyboard. SigmaOS is built using the best of Apple technology and the WebKit engine. That means your data is locked behind biometrics (if available), and malicious cookies can't track your web-activity.Starting Price: Free -
43
Prisma Access Browser
Palo Alto Networks
Prisma Access Browser is a secure enterprise browser developed by Palo Alto Networks, designed to protect both managed and unmanaged devices by integrating security directly into the browsing experience. Built on the Chromium platform, it combines the familiar interface and core features of Google Chrome with enhanced security measures to safeguard against cyber threats such as phishing, malware, eavesdropping, and data exfiltration. This browser extends Secure Access Service Edge (SASE) protection seamlessly to every device, offering agility, security, and control to businesses. Key features include creating a secure workspace on any device, protecting against advanced phishing attacks, identifying and blocking advanced malware, supporting forensics and threat hunting, and reducing the risk of tampering. Additionally, it enhances visibility and control with last-mile data protection, and blocks the transfer of data from business to personal accounts. -
44
BUFFERZONE
Bufferzone Security
BUFFERZONE provides a patented containment and disarming solution that defends endpoints against advanced malware and zero-day attacks while maximizing user and IT productivity. By isolating potentially malicious content coming from browsers, email and removable media, BUFFERZONE defends individuals and organizations from advanced threats that evade detection. BUFFERZONE disarms content for securely transferring it from the container to the native endpoint and secure network zones, and provides critical intelligence for enterprise-wide security analytics. Easy to deploy and configure, BUFFERZONE is a lightweight solution that provides cost-effective containment for up to thousands of endpoints. -
45
Puffin
CloudMosa
Popular browsers boast a plethora of features, but often fall short in fully protecting users. With our advanced cloud technology, Puffin provides all the benefits without sacrificing security. Our devices are extremely vulnerable to cyber exploits. With browsing sessions now inside the cloud, your phone, tablet, and computer are safe from hijacking. Designed for users in mind. The internal workload is reduced, resulting in improved processing efficiency. -
46
OMEGA Browser
OMEGA
OMEGA is an ultra-lightweight native macOS web browser engineered to provide maximum privacy, minimal footprint, and fast performance by leveraging the WebKit engine already built into Apple devices rather than bundling a heavy browser engine of its own. At around 3.6 MB on disk and launching in under a second, it prioritizes privacy by blocking third-party trackers, fingerprinting scripts, and ad-tech endpoints at the network level so browsing behavior isn’t profiled or shared with data brokers, and it includes aggressive features such as YouTube ad neutralization, Fortress Mode for strict security and HTTPS upgrades, and anti-fingerprinting techniques that inject slight noise to make persistent identification harder. OMEGA’s Amnesia Mode lets you browse in RAM so session data disappears when you quit, and the Nuke Button lets you wipe cookies, cache, history, and site data across selectable time ranges.Starting Price: Free -
47
Zenarmor
Zenarmor
Get instant security whenever and wherever you have network access! Easily manage all your Zenarmor instances through the cloud-based management interface and get ultimate control over your security! Powerful, enterprise-class content filtering engine that detects and blocks advanced malware as well as highly sophisticated threats. You can even deploy Zenarmor on an outdated PC or a home lab virtual system! Free, lightweight and nimble. This allows enterprises to instantly launch software-based micro firewalls on demand to easily secure assets wherever they might be and at any time. AI-powered cloud based web categorization database provides real-time classification for hundreds of millions of sites. Unknown sites are categorized under 5 minutes. -
48
Tor Browser
The Tor Project
Protect yourself against tracking, surveillance, and censorship. f you are in a country where Tor is blocked, you can configure Tor to connect to a bridge during the setup process. Select "Tor is censored in my country." If Tor is not censored, one of the most common reasons Tor won't connect is an incorrect system clock. Please make sure it's set correctly. Tor Browser will block browser plugins such as Flash, RealPlayer, QuickTime, and others: they can be manipulated into revealing your IP address. We do not recommend installing additional add-ons or plugins into Tor Browser. Plugins or addons may bypass Tor or compromise your privacy. Tor Browser already comes with HTTPS Everywhere, NoScript, and other patches to protect your privacy and security. Tor Browser uses the Tor network to protect your privacy and anonymity. Tor Browser is designed to prevent websites from “fingerprinting” or identifying you based on your browser configuration. -
49
iPrism Web Security
EdgeWave
iPrism Web Security offers a unique combination of fine-grained content filtering combined with threat detection and mitigation methods to assure powerful protection from Advanced Persistent Threats, including botnets, malware, viruses and others. iPrism Web Security is designed to be “set it and forget it” easy to use, self-contained to provide advanced threat protection and policy enforcement, yet require nearly zero maintenance. And our comprehensive on-box reporting makes managing your network a snap. iPrism uses our unique combination of iGuard automated intelligence and expert human analysis to block things like malware, Crypto-Locker and inappropriate sites. It also provides improved user productivity with low latency and false positive rates. This innovative approach ensures you have the most updated, advanced web protection 24/7 that is backed by world-class customer support. -
50
Arc Browser
The Browser Company
Arc is a web browser, but more importantly, it’s everything you care about, all in one place. Despite the ways our internet use has evolved, the browser has remained relatively unchanged. While all of our other software tools are changing for the better—with more collaborative features, flexible interfaces, and powerful functionality—the browser largely still does what it did twenty-five years ago. What’s more, we blame ourselves for the browser’s shortcomings. When our browser has an overwhelming number of tabs, we call ourselves inefficient; when we get distracted online, we tell ourselves we need more discipline; when we can’t find a url, we think we’re disorganized. Why does the browser get a free pass? That’s why we’re building a new browser, which we call Arc, because we believe browsers can do so much more to empower us. We’re imagining a browser that can think as quickly as we do, take work off of our plates, and pull our creativity forward.Starting Price: Free