Alternatives to RollBack Rx Pro
Compare RollBack Rx Pro alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to RollBack Rx Pro in 2024. Compare features, ratings, user reviews, pricing, and more from RollBack Rx Pro competitors and alternatives in order to make an informed decision for your business.
-
1
DriveStrike
DriveStrike
DriveStrike is easy to use, implement and manage. With DriveStrike you can execute secure remote wipe, remote lock, and remote locate commands on any platform. Integrated drive encryption support as well as mobile device management MDM for mobile platforms. Our professional support team is always available to answer your questions and help you install our services or manage your account and devices. Protecting your data and devices has never been easier or more cost effective. If you have questions or need help understanding how best to protect your data please contact us and we will gladly answer your questions. Protect your business with a device and data protection platform that keeps all devices safe with a single solution and Dashboard. Keep your Workstations, MacBooks, iPads, Smartphones, Tablets, Laptops safe, secure, and organized. -
2
SpamTitan
TitanHQ
SpamTitan email security is an email spam filter for businesses, smbs, MSPs, and schools. SpamTitan email security blocks spam as well as phishing and day-zero attacks, viruses, malware, ransomware, and other email threats. Helps control mail flow, clean it, and protect against unwanted email. We provide easy-to-use yet advanced email security for businesses, smbs and MSPs that are Office365 friendly. SpamTitan - Premium functionality included: • CEO Impersonation protection • Phishing/ Spear phishing protection • Link analysis • Full Sandboxing • Zero Day Attacks protection • Mail Spooling • Spoofing protection • Malware and Ransomware protection • SPF/DKIM/DMARC checking • Encryption • Fully multitenant environment • Ability to rebrand the entire UI • Full REST API: • Comprehensive support and set up docs Try a FREE, fully supported trial of SpamTitan Email Security today. -
3
PhishTitan
TitanHQ
Powerful Inline Phishing Protection for M365. Harness the power of AI and our LLM to defeat phishing. PhishTitan is next generation inline phishing protection and remediation, powered by TitanHQ, the global leaders in email cybersecurity. Our proprietary large learning model and AI integrates directly with Microsoft 365, both catching and remediating sophisticated phishing and BEC attacks that Microsoft misses. It provides users with in-the-moment warning banners to help them decide whether an email is malicious or safe, continually enhancing the human firewall. Risk free deployment in 6 minutes. PhishTitan will filter your email to identify phishing threats and protect your users and business. That’s how you AVOID that one wrong click that can lead to disaster – all it takes is 6 minutes! The TitanHQ team has been a category leader in the email security field for over 20 years. Bringing the experience of working with over 12,000 customers to our new phishing solution. -
4
Bacula Enterprise
Bacula Systems
Bacula Enterprise delivers Physical, Virtual, Container and Hybrid Cloud Backup & Recovery software for the Modern Data Center - all from a single platform. Designed for medium and large organizations, Bacula Enterprise backup and recovery software brings unique innovation, modern architecture, business value benefits and low cost of ownership. Bacula Enterprise corporate data backup software solution uses exclusive technologies that increase the interoperability, power, flexibility and functionality of Bacula Enterprise into a wide range of IT environments such as enterprise data centers, managed service providers, software vendors or cloud providers. Thousands of organizations worldwide use Bacula Enterprise in mission-critical environments, including NASA, Texas A&M University, Unicredit, Swisscom, Sky, and many more. Bacula provides additional security features over other vendors and offers advanced, hybrid Cloud connectivity to Amazon, S3, Google, Oracle and many more. -
5
Skybox Security
Skybox Security
The Skybox approach to risk-based vulnerability management starts with fresh vulnerability data from your entire network — physical IT, multi–cloud and operational technology (OT). Skybox uses a wide range of sources, including asset and patch management systems and network devices, to assess vulnerabilities without a scan. We also collect, centralize and merge data from multiple scanners to give you the most accurate vulnerability assessments on demand. Centralize and enhance vulnerability management processes from discovery to prioritization and remediation. Harness the power vulnerability and asset data, as well as network topology and security controls. Use network modeling and attack simulation to find exposed vulnerabilities. Augment vulnerability data with intelligence on the current threat landscape. Know your best remediation option, including patching, IPS signatures and network–based changes. -
6
RollBack Rx Server
Horizon Datasys
RollBack Rx Server Edition is a robust Windows Server backup and restores utility that enables IT, professionals, an instant backup capability that can quickly restore mission-critical systems back to any number of multiple restore points with unrivaled speeds. RollBack Rx Server Edition makes it quick and easy to safely sandbox updates and service patches with a failsafe approach to system recovery. RollBack Rx Server Edition offers unrivaled background protection and real-time recovery speeds. This allows you to store a locally backed-up sector-map repository of complete multiple instances (or “snapshots”) of the server state. These snapshots can be scheduled to occur at intervals you specify — as frequently as every minute — and can number many thousands. This continual snapshot-taking can be set to occur in the background with no perceptible impact on day-to-day server response times. -
7
Trend Micro HouseCall
Trend Micro
The best free online virus scanner that you can get to identify hidden threats on your PC and Mac. Discover if your files are safe and block malicious software hidden outside of files. Threats can harm your device before you realize there is a problem. Use HouseCall to get your device back to normal. With the detailed report, you can see what threats have targeted your device and take quick action. With HouseCall, you can choose which scan to run, quick or full. You can even create a custom scan. Detect and fix viruses, worms, spyware, and other malicious threats for free. HouseCall can quickly find new threats on your Windows or Mac computer for free without getting in the way of your existing security software. You can count on HouseCall to keep malicious files off your device and stop them from spreading. HouseCall for Home Networks scans all of your home network devices for vulnerabilities and recommends how to eliminate them.Starting Price: Free -
8
Trend Micro Maximum Security
Trend Micro
Trend Micro Maximum Security is fully compatible with Windows 11 so you can shop, game, and socialize online with confidence that you and your devices are protected by world-class protection against the latest malware, fraud, and scams. Enhanced anti-scam protection protects you when shopping and banking online from malicious and fraudulent websites attempting to steal your financial and personal data. Our cloud-based AI technology delivers highly effective and proactive protection against ever-evolving malware infections. You can depend on Trend Micro to defend against known and never-before-seen attacks, keeping you ahead of the rapidly changing threat landscape. Get complete, multi-device protection against ransomware, viruses, dangerous websites, and identity thieves. An enhanced Folder Shield safeguards your valuable files and digital assets both locally and on cloud-synced folders.Starting Price: $39.95 per year -
9
Fortres 101
Fortres Grand
The desktop and file lockdown security of Fortres 101 restricts access to any aspect of Windows operation. Affordable, effortless, powerful. Fortres 101 restricts downloads and software installations, including viruses & malware. Fortres 101 offers you the ability to restrict/block local hard drives and removable media drives as well as any local file, folder, or application. Central Control is the complete administration tool for Fortres 101. With Central Control, you can easily configure and manage Fortres 101 from one configuration screen anywhere on the network. Fortres 101 offers you the ability to restrict/block local hard drives and removable media drives as well as any local file, folder, or application. Central Control is the complete administration tool for Fortres 101. With Central Control, you can easily configure and manage Fortres 101 from one configuration screen anywhere on the network. -
10
OSE
Open Seas
Once hacked, compromised organizations face huge barriers to rebuilding customer trust and brand reputation. OSE detects & alerts to attacks on your critical systems as they occur so you can stop them before damage is done to your organization's IP, brand and reputation with the ensuing loss of customer trust. OSE provides an audit of an attack listing what was changed, what it was before making it quick to resolve. OSE reporting helps with ISO 27000 compliance. OSE (Operating system Security Enforcer) implements your defined Security Policy which can either be an out of the box OSE standard or your personalized version. Rolling-out & apply the security policy on all Unix, Linux & Windows corporate servers. The Autonomous OSE Agent is permanently located on a Unix/Linux server. It is persistent, even in case of network failure. It can also group a set of servers monitored by OSE Agents. -
11
G DATA
G Data Software
G DATA prepares you optimally for cyber threats and opens up all possibilities for you in the digital future. G DATA developed the world’s first antivirus software in 1987. Today, we defend our customers against all kinds of cybercrime with end-to-end solutions and services using the most advanced security software and AI technologies and even offering online security awareness training to teach safe behavior to employees. G DATA customer support is available 24/7/365, with support teams and the G DATA SecurityLab working hand-in-hand at the same location. Independent tests prove that G DATA IT security solutions provide best attack detection rates for effectively combating Trojans, malware and even unknown viruses. -
12
Stronghold Antivirus
Security Stronghold
Stronghold Antivirus is an antivirus and antispyware software that provides both superior real-time pro-active (on-access) and on-demand protection for your home and office computer. Stronghold Antivirus identifies and eliminates more than 3.500.000 known viruses, spyware, adware, trojans, rootkits and other threats with help of regularly updated database of malicious footprints. It also identifies and removes even unknown threats with help of active on-access shield protection Thanks to easy, handy and eye-pleasing interface Stronghold Antivirus is great for novice users, and professionals will be amused by the power of its additional features. Being powerful it is still very lightweight and will not consume any noticeable system resources of your computer. You can set up any scan area you want, customize both on-demand and on-access protection modules, schedule scanning with separate settings, add programs to white and black lists and manage them, and more. -
13
When an unrecognized file is downloaded onto one of your PCs, a copy will be sent to our experts at our Threat Labs to identify if it’s safe or not. Checks webpages before they open in your browser and displays a safety rating in the search engine results to help you surf the web with more confidence. Better protection against even the newest malware thanks to cloud-based Real-Time Outbreak Detection and proactive AI Detection. Protects against online security threats like spam, viruses, hackers and malware. Anti-Spyware protects your identity from spyware and adware that tracks personal information. Our Windows file server security helps keep it safe, private and out of the hackers’ hands. Advanced File Shredder securely deletes files to help prevent unintended recovery. Scans your PC when you’re not working so it doesn't get in the way. It does the hard work so you and your employees can focus on your business without costly distractions and delays.Starting Price: $44.99 per year
-
14
The Advanced Protection Program safeguards users with high visibility and sensitive information from targeted online attacks. New protections are automatically added to defend against today’s wide range of threats. Gmail blocks over 100 million phishing attempts every day. But sophisticated phishing tactics can trick the most savvy users into giving their sign-in credentials to hackers. Advanced Protection requires you to use a security key to verify your identity and sign in to your Google account. Unauthorized users won’t be able to sign in without your username and password. Safe browsing on Chrome protects 4 billion devices against risky sites, and Advanced Protection performs even more stringent checks before each download. It flags or even blocks you from downloading, files that may be harmful. Only app installations from verified stores, like Google Play Store and your device manufacturer’s app store, are allowed.
-
15
MemberProtect
InetSolution
MemberProtect is designed for professional programmers to easily integrate into secure online systems, such as ACH, Online Banking, and wire transfer applications. MemberProtect is the most trusted user authentication, data encryption, and user management framework in the banking and credit union industries today. Based on roles & privileges model. Supports millions of users and organizations. Extremely granular application security. Powerful encryption that secures databases at the column level. Encrypt email messages and flat files stored anywhere on your network. Thorough logging, even failed attempts, of all data access. Protect member data from hackers & unauthorized staff, even beyond the limitations of firewalls, SSL, and operating systems. Leverage MemberProtect to develop secure connections with third-party APIs. Access to any web-based system, including support for LDAP. -
16
McAfee Total Protection
McAfee
McAfee® Total Protection is the protection for today's security needs, so you can enjoy life online. Includes premium antivirus, safe browsing. With ID theft protection and secure VPN. It’s more than just antivirus software—it’s peace of mind. At McAfee, we protect what matters – you. We protect over 500 million devices with award-winning antivirus, but understand that you need a solution that protects your personal info, privacy, and helps you navigate safely online. Our multi-layered identity protection helps secure your accounts by alerting you if your info gets leaked online and generating & storing complex passwords automatically. Keep your credit card and personal info safe from prying eyes everywhere you go by turning unsecured networks into your own private connection with our secure VPN. Color-coded links expose dangerous and fraudulent sites on search results and social media pages—we’ll even steer you back to safety if you misclick.Starting Price: $19.99 per year -
17
Block Ransomware and Backup
xSecuritas, Inc
There are many ways to block ransomware, malware, and viruses. However, these malicious programs continue to evolve, so simply blocking malicious programs with patterns alone can infect your PC with other malicious programs. There is a way. Please try the "Block Ransomware and backup" product. Ransomware, malware, viruses, etc. can infiltrate your PC, but it can not damage your files. This product allows you to set the Desktop, Documents folder, and so on as protected folders, and allow only the programs that are allowed (for example, MS Office programs) to modify the files in the protected folder. Unauthorized programs can only open the file as read-only, or block the unauthorized program from running. Therefore, malicious programs can not be accessed to the protected folder. You can also create backup files automatically whenever you modify or create documents. These backup files are stored in a special folder, and not all programs can change this backup files unless you allow it.Starting Price: $49/user/year -
18
Sophos Home
Sophos
The same malware that attacks fortune 500 companies attacks private users, too. Sophos Home uses the same award-winning security features that keep those companies safe. See an immediate improvement as Sophos Home scans and cleans your computer, removing malware that could be slowing it down. Keep your valued, private information safe by blocking viruses, ransomware, and other malware from stealing or destroying files, documents, and photos. Surf the web with confidence, knowing Sophos Home protects your online shopping and banking from phishing and hacking. Starts with a deep scan and clean of your computers for hidden threats. Removes malware lurking on your system. Eliminates viruses, trojans, rootkits, spyware, and more. Protects against viruses, malware, trojans, worms, bots, unwanted apps, and more – even ones no one’s heard of yet.Starting Price: $44.99 per year -
19
Defencebyte
Defencebyte
Download our antivirus software, and our range of PC security and optimization tools to get the best performance and safety for your system. Give your computer a new lease of life by removing unnecessary files and software. Your antivirus online purchase will help you keep your PC free of unwanted software. No matter what you’re doing online, with defencebyte you’ll stay safe and secure. If you have any issues with your online antivirus purchase for PC we’re here to help any time of day. By downloading an antivirus for Windows you’ll be able to give your computer a higher level of protection. Windows computers are the most highly targeted by hackers and viruses. Safeguard your system and crucial data from ransomware reach! Ensure a secure digital environment for your systems & networks with defencebyte security. Scans and eradicates ransomware traces. Protects devices as well as networks.Starting Price: $39 per year -
20
360 Security Guard
360 Security Guard
As an industry-leading security antivirus product, 360 Security Guard can accurately detect and kill all kinds of Trojan viruses, and is always committed to protecting users' computer security. Not only that, we have also developed a variety of features to improve the efficiency of your computer use. Scan the computer from multiple dimensions, including garbage cleaning, computer running speed, system abnormalities, and computer security risks, and quickly assess the computer system status. 38 layers of protection barriers are added layer by layer to sense the threat situation at the first time, forming an all-round, all-weather cyberspace defense system. Get the latest information on popular games and events in real time, gather multiple media, and unify the entrance. The latest and hottest game download and installation, 360 exclusive distribution channel, fast direct access. -
21
iPrism Web Security
EdgeWave
iPrism Web Security offers a unique combination of fine-grained content filtering combined with threat detection and mitigation methods to assure powerful protection from Advanced Persistent Threats, including botnets, malware, viruses and others. iPrism Web Security is designed to be “set it and forget it” easy to use, self-contained to provide advanced threat protection and policy enforcement, yet require nearly zero maintenance. And our comprehensive on-box reporting makes managing your network a snap. iPrism uses our unique combination of iGuard automated intelligence and expert human analysis to block things like malware, Crypto-Locker and inappropriate sites. It also provides improved user productivity with low latency and false positive rates. This innovative approach ensures you have the most updated, advanced web protection 24/7 that is backed by world-class customer support. -
22
McAfee LiveSafe
McAfee
McAfee® LiveSafe™ is the ultimate protection for your PCs, Macs, smartphones, and tablets. McAfee LiveSafe provides award-winning antivirus protection and much more, covering your computers, mobile devices and even your identity. We help keep you safe – so you can focus on what matters. Defend against viruses and threats with online and offline protection. Protect your PCs, Macs, smartphones, and tablets with one subscription. Keep your browsing habits and data safe from prying eyes when connected to public Wi-Fi. Among our security solutions, McAfee LiveSafe stands tall with its combination of antivirus, privacy, and identity tools and features, built to protect you from all kinds of threats. And now, when you’re enrolled in auto-renewal**, you’ll gain access to our secure VPN, which provides bank-grade encryption to keep your personal information and online habits protected.Starting Price: $39.99 per year -
23
Microsoft Family Safety
Microsoft
Empowering you and your family to create healthy habits and help protect the ones you love. Set screen time limits that apply to devices, apps, and games. When screen time runs out, choose to add more or not, based on what’s right for you and your family. Create a safe space for your kids to explore online. Use the app's content filtering settings to set healthy boundaries, block inappropriate apps and games, and limit browsing to kid-friendly websites using Microsoft Edge on Xbox, Windows, and Android. Stay connected even when you’re apart with family location sharing and tracking. Share your location with loved ones, spot them on a map, and save places they visit the most. Get insights on how your family is doing on the road, including how many times the driver uses their phone, their top speed, and even the number of times they brake hard.Starting Price: $9.99 per month -
24
Trust Lockdown
White Cloud Security
Because we focus on what you trust and want to run on your endpoints, we stop all unknowns by default. So unknown items such as new ransomware variants, advanced attacks, and zero-day exploits are stopped first by Trust Lockdown. Get out of the ‘Break-Fix’ cycle that is eating your time and budget. We also eliminate the need to be patching your apps every day. With Trust Lockdown, you can do your application patches on a regular planned basis instead of urgent need basis, again giving you back your time and budget to be more productive. Our protection also works when your device is offline! Whether you choose our cloud or appliance based service, our endpoint protection delivers the same protection when offline or disconnected from the network. An essential feature in today’s on-the-go environment and use of portable devices. -
25
Trusted Knight Protector Home
Trusted Knight Corporation
The easiest and most effective way to protect your identity, your family’s online presence, and all of your sensitive information. This is an alarming statistic considering each year at least 24 million new malware variants (this is malware that is slightly changed to avoid detection by antivirus software) are found on computers. The truth is, your computer is probably already infected with this type of malware, which is why you need Protector Home - the solution that goes beyond detection, to protect your personal information even if your computer is already infected. Takes only a minute to install and automatically protects your online sessions. Protector Home goes beyond traditional protection to bring you the benefits and security your family needs, even if your computers have already been compromised.Starting Price: $34.95 per user per year -
26
Xeams
Synametrics Technologies
Xeams is, a secure and powerful complete mail server for Windows, Linux, Solaris, MacOSX and other flavors of UNIX. Xeams supports SMTP, POP3, and IMAP. It features a powerful spam filtering engine that eliminates up to 99% of junk email upon installation. The software offers a flexible approach to email, making it a very user-friendly server. Xeams can block 99% percent of all junk messages right out of the box. The filtering rules are fully customizable and get better as Xeams adapts to your email environment. IMAP and POP3 servers built right into the system to easily fetch emails from an email repository to a client's machine. Xeams can be used as an email firewall in front of another server, such as MS Exchange, or as a full email server requiring no other software to process emails. Use Xeams in front of your Office 365 infrastructure to gain additional filtering, reporting and archiving capabilities that you don't get with Office 365 alone.Starting Price: $20.00/year/user -
27
AccessPatrol
CurrentWare Inc.
AccessPatrol is a device control software that provides a proactive solution for securing company endpoints against data breaches caused by illicit data transfers. AccessPatrol controls a variety of peripherals, including… - Storage devices such as USB flash drives and external hard drives - Wireless Devices such as Bluetooth, Infrared, and WiFi - Communication Ports such as Serial and Parallel ports - Imaging Devices such as Scanners or Cameras, and… - Other Devices such as network share drives, printers, and mobile phones File operations alerts and permissions can be configured to alert IT administrators to suspicious file operations and proactively prevent data transfers to unauthorized users. The security policies are enforced by a software agent that is installed on your user’s computers. This keeps devices restricted and monitored even when the computers are taken off of the network.Starting Price: $3.99 PUPM -
28
BrowseControl
CurrentWare Inc.
BrowseControl is an easy-to-use web filter that helps organizations enforce policies, improve productivity, reduce bandwidth consumption, and meet compliance requirements - no matter where their users are located. With BrowseControl you can… - Ensure a safe and productive environment by blocking high-risk, distracting, or inappropriate websites - Improve network performance by blocking bandwidth hogs, and... - Prevent users from using unsanctioned applications and software-as-a-service providers BrowseControl’s security policies are enforced by a software agent that is installed on your user’s computers. This allows the solution to continue blocking websites and applications even when computers are taken off-site. The Category Filtering feature is regularly updated with new websites; it allows you to block millions of websites across over 100 content categories including pornography, social media, and virus-infected sites.Starting Price: $3.99 PUPM -
29
Norton AntiTrack
Norton
Browse without sacrificing speed even on sites that may restrict access when other competitor tools are in place. Goes beyond clearing cookies to obscure your digital fingerprint so companies can’t use it to profile you. Stay informed on tracking attempts with a user dashboard that lets you see how we keep you more private. Your subscription begins when your purchase is completed (or otherwise, when your payment is received). You must download and install on each device, or complete enrollment to get protection. Special offer(s) may expire at any time at NortonLifeLock's discretion. By subscribing, you are purchasing a recurring subscription which will automatically renew.Starting Price: $34.99 per year -
30
SpyShelter
SpyShelter
SpyShelter Anti Keylogger monitors behavior of all currently ongoing actions on your PC and allows you to prevent any action that malware attempts to make. Thanks to our unique technology, SpyShelter is capable of stopping both commercial and custom-made keyloggers, which cannot be detected by any anti-virus software. Since SpyShelter does not rely on any fingerprint database, you will not have to worry about zero-day malware – your registry, RAM and all applications are going to be protected from the moment you install SpyShelter. Compared to other security software, SpyShelter’s fast algorithm processing does not slow your computer down, making it suitable even for older computers. SpyShelter Anti Keylogger provides solid protection in real time against known and unknown “zero-day” spy and monitoring software, for example: keyloggers, screen loggers, webcam loggers, and even advanced financial malware.Starting Price: $25 per year -
31
ThreatSentry
Privacyware
Don't sweat unaddressed vulnerabilities, insider misuse, or new types of attacks. ThreatSentry combines a state-of-the-art Web Application Firewall and port-level firewall with advanced behavioral filtering to block unwanted IIS traffic and web application threats. ThreatSentry delivers enterprise-grade, multi-layered protection and compliance (i.e. PCI DSS) for Microsoft IIS (5/6/7/8/10) at a small-business price! Implemented as a native module in IIS7 through 10 (or ISAPI extension or filter in IIS 6 and IIS 5 respectively), and Snap-in to the Microsoft Management Console (MMC), ThreatSentry is exceptionally easy to use and designed to protect network weak points created by lapses in patch management, configuration errors, and the use of new and progressive attack techniques. Take advantage of a free ThreatSentry evaluation session today! We'll guide you one-on-one through installation and configuration. Click here to schedule.Starting Price: $649.00 -
32
Quantum Armor
Silent Breach
Your attack surface is the sum of every attack vector that can be used to breach your perimeter defenses. In other words, it is the total quantity of information you are exposing to the outside world. Typically, the larger the attack surface, the more opportunities hackers will have to find a weak link which they can then exploit to breach your network. Professional hackers typically follow the cyber kill chain when attacking a target, and surveying the target's attack surface is normally the very first step in this process; what is known as advanced reconnaissance. Reducing the attack surface can minimize risk further down the cyber kill chain, preventing attacks before they even occur by eliminating potential attack vectors as early as possible. The cyber kill chain is a method of categorizing and tracking the various stages of a cyberattack from the early reconnaissance stages to the exfiltration of data.Starting Price: From $49/asset/month -
33
Driver Genius
Driver Genius
Update your drivers with one click to make your system run more stable and smoothly. You can restore all drivers with one click after reinstalling Windows. Double insurance: System restore point + Driver rollback. You can roll back to the previous driver at any time. Clean up invalid driver packages to free up disk space. Query the hardware information and working status of your computer. Real-time monitoring hardware temperature and voltage. If you replace hardware, the previous hardware data will remain in the system. Get the network back to work immediately after you change operating system. The offline driver update tool helps you quickly install the driver and restore your network connection if your computer is unable to connect to the Internet.Starting Price: $29.95 per 3 PCs per year -
34
MiniTool ShadowMaker
MiniTool Software
MiniTool ShadowMaker is a professional backup tool, which can provide data protection services and disaster recovery solutions for your PCs. It is the best backup software that can back up OS, files and folders, disks and partitions. With this backup software, you are able to restore data once a disaster occurs.Starting Price: $29/Year/PC -
35
IntelliTrack Network
Soni-Soft
IntelliTrack Security Control is a software suite developed specifically for Security Control Teams working in multi-location organizations. IntelliTrack Security Control is an integrated software suite that should form the backbone to the much-needed Disaster Recovery Planning process required by all businesses and organizations. Based on the premise of 'knowing your business', Security Teams have at their fingertips information such as business assets, staff details, keyholders, alarms & activation, cctv capturing, safe and lock details and much more; all required to make that informed decision on security control. Knowing how each of your stores or branches are setup is a key aspect of successful proactive Security Management. With IntelliTrack Security Control software, your teams will know who, when and how to contact key personnel during a disaster or incident. -
36
Kaspersky Anti-Virus
Kaspersky
Blocks the latest viruses, ransomware, spyware, cryptolockers & more – and helps stop cryptocurrency mining malware damaging your PC’s performance. Delivers real-time antivirus protection. Blocks ransomware, cryptolockers & more. Prevents cryptomining malware infections. Lets your PC perform as it’s designed to.Starting Price: $29.99 per year -
37
Total Upkeep
BoldGrid
Total Upkeep is an automated backup, fault protection, and migration solution that allows you to secure, restore, or move your website with ease. Use Total Upkeep to quickly restore your site after server crashes, website hacks, rouge updates, and other threats. Simply install Total Upkeep, select a date and time for automatic backups and you’re good to go! Download, restore, or delete backups with a single click. You can set Total Upkeep to automatically backup your site before updates, and automatically rollback your site to the last backup if an update fails. Simply install Total Upkeep on both WordPress sites, create a backup archive on the first site, then restore that backup on your second site. Automatic updates can be set for WordPress core, plugins, and themes individually. You can even set Auto Backups to run before the update.Starting Price: $2.50 per month -
38
BroShield
BroShield
If you want to free your system with unwanted snoop ware then BroShield should be your 1st choice as this provides you a great anti snooping and detection of harmful viruses from your computer. Protect your computer with BroShield protection. BroShield helps you to get full authority over the internet. You can keep an eye on what kind of content your kid is exposed to. Restriction of adult websites and harmful content is in your hand. Allows you to control the internet access time. There are a lot of illegal websites that still run on the internet. We need to restrict our kids from getting exposed to sites like porn, gambling, and inappropriate sites. Visiting such sites may bring in viruses and other unwanted things with it. BroShield runs 24/7 to look for viruses and threats and keep the computer in full monitoring, to block the potential threats. The smart feature of BroShield fail-safe is designed to look for all the remote snooping activities to prevent getting compromised.Starting Price: $49.95 per year -
39
AVG Internet Security
Avast
Get total security that keeps you safe online with award-winning antivirus, a customizable firewall, remote access protection against hackers, and more. AVG Internet Security blocks viruses and malware, keeps your emails secure, protects your personal files, passwords, and webcam from hackers, and lets you shop and bank online without worry. Advanced Antivirus scans your PC for viruses, ransomware, spyware, and other types of malware. Behavior shield sends alerts if suspicious software behavior is detected on your PC. AI Detection proactively identifies malware samples to protect you from new threats. CyberCapture blocks new threats by having our antivirus software automatically upload them for analysis. Stay safe when you go online by scanning links, downloads, and email attachments for threats and avoiding unsecure Wi-Fi networks. Link Scanner avoid dangerous websites by scanning links for anything suspicious.Starting Price: $3.29 per month -
40
Cylance
BlackBerry
Cylance uses cutting-edge algorithms and artificial intelligence to proactively protect you, preventing threats like malware, hackers, viruses, ransomware, and malicious websites. It does this whilst being lightweight and easy to use. We use cloud-based supercomputers and millions of examples of malicious programs to train a neural net, a kind of digital brain, to recognise threats. When you purchase Cylance, this is what you download onto your computer - a superlightweight 'brain', trained to catch and quarantine viruses. Cylance sits in the background, instantly recognising threats the moment they occur and reacting in milliseconds - unlike other antivirus software which must constantly scan for threats. Our AI quarantines files it identifies as threats, allowing you to review individual threats on you and your family's computers. Cylance sits in the background, instantly recognising threats the moment they occur and reacting in milliseconds.Starting Price: $29 per year -
41
Kaspersky Internet Security
Kaspersky
Whatever you do online – on your PC, Mac & Android devices – our advanced, one-license security suite helps protect you from malware, webcam spies, financial scammers & more. - Blocks viruses, cryptolockers, attacks & more - Prevents online trackers collecting your data* - Detects spyware hiding on your Android device - Protects payments, with bank-grade encryption* - Blocks unauthorized access to your webcam* - Encrypts data you send & receive online – VPN**Starting Price: $39.99 per year -
42
eScan
MicroWorld Technologies
eScan's next-gen antivirus solution that protects the home network from viruses, malware, ransomware, bots, and more, using a layered approach. With the unique combination of basic and modern techniques, eScan blocks a broad range of attacks. It comprises right from web filtering, signature-based malware detection and behavior analysis to innovative techniques like deep learning malware detection, exploit prevention, heuristic scan, and many more. eScan offers business endpoint protection and endpoint detection and response (EDR) solutions as well as anti-spam solutions for email and multi-factor authentication.Starting Price: $58.95/one-time/user -
43
OpenText Security Suite
OpenText
OpenText™ Security Suite, powered by OpenText™ EnCase™, provides 360-degree visibility across laptops, desktops and servers for proactive discovery of sensitive data, identification and remediation of threats and discreet, forensically-sound data collection and investigation. With agents deployed on more than 40 million endpoints, clients that include 78 of the Fortune 100 and more than 6,600 EnCE™ certified users, Security Suite delivers the industry gold standard for incident response and digital investigations. EnCase solutions help enterprises, government agencies and law enforcement address a range of needs around risk and compliance, file analytics, endpoint detection and response (EDR) and digital forensics with the most trusted digital forensics and cybersecurity software. Solving problems that often go undetected or unsolved on the endpoint, Security Suite restores the confidence of companies and their customers with unparalleled reliability and breadth of coverage. -
44
Barracuda Web Security Gateway
Barracuda Networks
The Barracuda Web Security Gateway lets organizations benefit from online applications and tools without exposure to web-borne malware and viruses, lost user productivity, and misused bandwidth. As a comprehensive solution for web security and management, it unites award-winning spyware, malware, and virus protection with a powerful policy and reporting engine. Advanced features ensure that organizations adapt to emerging requirements like social-network regulation, remote filtering, and visibility into SSL-encrypted traffic. Unlimited remote user licenses are included to enforce content and access policies for mobile devices outside of the corporate network. The Barracuda Web Security Gateway is also available as a virtual appliance. For hosted web security, see Barracuda Content Shield. -
45
GhostVolt
GhostVolt Ltd
GhostVolt is a security App which protects your privacy and stops unauthorised access to your files and folders and helps fight against cybercriminals who want to steal your data and use it for identity theft, ransomware, blackmail, and other criminal attacks. With GhostVolt, you can secure all your personal files including your health records, photos, movies, tax returns or any other document so you’re in control of who has access to your files and data, all the time. All your files are automatically encrypted with industry standard 256 AES encryption and because it works just like your regular file manager, you already know how to use it. GhostVolt works perfectly with Microsoft OneDrive and allows you to automatically backup and sync your protected files across your computers, you also get an integrated secure note manager, secure file sharing, file comments and tagging and so much more.Starting Price: $20 per year -
46
NerveCenter
Logmatrix
Primary utility power outages do occur; often caused by poor infrastructure or weather. As the size, complexity and criticality of networks continue to grow, reliable backup op UPS power is critical to network uptime. Additionally, UPS batteries lose capacity in as early as three years. While UPS battery manufacturers may market their batteries with a ten-year design life or life span, external factors can cause degradation and shorten battery life. Internal cell resistance (via temperature) – To verify the state of health by identifying low capacity cells Inter-Cell Resistance – conduction path integrity between cells to avoid hot spots, fires, and abrupt shutdowns via temperature monitoring. Properly monitored UPS battery systems have a longer life, require less energy to charge and require less preventive maintenance. Improve uptime and prevent network outages caused by UPS failures, UPS capacity issues and drained UPS battery power. -
47
GamaScan
GamaSec
GamaSec provides a unique combination of cyber security, remediation-as-a-service and financial assurance to minimize the risk of website attacks for small and medium-sized businesses. FINALLY, SMBs gain the same security and resilience as large enterprises. GamaSec provides a combination of online web vulnerability scanning, daily malware detection & blacklist monitoring for optimal protection that significantly reduce risk of cyber breach of your website. GamaSec reports virtually eliminating false positives and dramatically simplifying remediation, enabling our trained security experts to fix and remove website vulnerability and malware from your website. GamaSec offers an always-on, cloud-based PCI-certified Web Application Firewall (WAF) and advanced Distributed Denial of Service (DDoS) protection to consistently guard against web attacks. GamaSec offers a data breach limited warranty that pays up to $50,000 to help cover costs associated with data restoration. -
48
McAfee WebAdvisor
McAfee
McAfee WebAdvisor is your trusty companion that helps keep you safe from threats while you browse and search the web. WebAdvisor helps protect you from malware and phishing attempts while you surf, without impacting your browsing performance or experience. Click confidently by protecting yourself from malicious sites that could contain adware, spyware, viruses and phishing scams. Start your worry-free web browsing for free by downloading McAfee WebAdvisor. McAfee WebAdvisor includes misclick protection that blocks malware and phishing sites if you accidentally click on a malicious link, typo protection that protects you if you type a web address incorrectly and helps point you in the right direction, safer downloads that scans your downloads and alerts you if we find a risk, security check that inspects to see if your firewall and antivirus are activated before you surf, safe browsing uses a color-coded system to let you know which links are safe to click. -
49
AnVir Task Manager Pro
AnVir Software
Windows task manager processes, windows xp slow startup, windows startup programs, Vista tweaks. Control everything running on the computer, remove Trojans, speed up computer. AnVir Task Manager Pro provides convenience by offering all of its features in a single interface. It saves money because users won't have to buy multiple packages to perform a family of related tasks. Terminate processes that can not be terminated via Windows Task Manager. Temperature of CPU, video card, external USB HDD. Download and upload speed, amount of transferred data for network connections. Find locked files and DLL. Log of processes start and stop. Graph of processor, memory and disk activity for each process. Threads, handles, performance counters. Startup manager: manage all programs running on startup including services, Internet Explorer toolbars, Scheduler tasks.Starting Price: $49.95 one-time payment -
50
CySight
IdeaData
CySight's Dropless Collection method provides absolute data retention, enabling the most data orientated decision making and cost-effective workflow for any organization, significantly enhancing network performance, network security and cyber intelligence to the highest level. With a Unique approach, CySight delivers comparative baselining, superior granularity, scalable collection, root cause analysis and QoS Analysis. All Designed to run independently or work together as a powerful single unit. CySight empowers communication and application visibility for networking, security, billing and compliance with high-end integrated network traffic analytics, granular forensics, cybersecurity intelligence, cloud usage, internet-of-things analytics, peering and billing to medium and large enterprise customers and service providers. Our objective at CySight is to reveal your data’s potential and eliminate all blind spots.Starting Price: $299/month