Computer Security Software

Computer Security software automates the security and monitoring of computer systems. These applications scan and monitor an organization's computer network to evaluate potential vulnerabilities. Additionally, Computer Security solutions provide customizable network security solutions as well as those preconfigured for a variety of regulatory standards. Computer Security software provides for real-time reporting on network security as well as incident reports for potential security breaches. Computer Security software is related to Network Security software.

Why Capterra is Free
Realtime Security

Realtime Security

by Cloud Management Suite

(24 reviews)
Cloud Management Suite is a cloud-based IT Management and Security solution allowing IT departments to instantly respond to security events. Whether its a ransomware attack or supporting users on the fly, Cloud Management Suite Realtime Security allows you to manage, patch, and remediate your environment with ease. Learn more about Realtime Security Stop breaches in real time and remediate vulnerabilities all from one console. Get live, data from 1000s of devices in under 10 seconds Learn more about Realtime Security
Acunetix

Acunetix

by Acunetix

(23 reviews)
Acunetix is a computer security tool that scans and audits all web applications including HTML5, JavaScript and Single Page Applications. Scans for 4500 vulnerabilities incl. SQLi and XSS among others. Used by Government, Military, Education, Telecommunications, Banking, Finance, and E-Commerce sectors, including many Fortune 500 companies. Acunetix offers a cost-effective, simple, scalable, and high availability solution. Available on Windows, Linux and Online Learn more about Acunetix Computer Security solution that performs a website scan, detects vulnerabilities like XSS or SQL Injection and offers remediation Learn more about Acunetix
Netsparker Security Scanner

Netsparker Security Scanner

by Netsparker

(1 review)
Netsparker Security Scanner is an accurate solution that automatically identifies XSS, SQL Injection and other vulnerabilities in web applications. Netsparker's unique Proof-Based Scanning Technology allows you to allocate more time to fix the reported flaws by automatically exploiting the identified vulnerabilities in a read-only and safe way, and also produces a proof of exploitation. Therefore you can immediately see the impact of the vulnerability and do not have to manually verify it. Learn more about Netsparker Security Scanner Accurate solution that automatically identifies XSS, SQL Injection and other vulnerabilities in web applications. Learn more about Netsparker Security Scanner
Avast Business Antivirus Pro Plus
Avast Business Antivirus Pro Plus 2019 is all-in-one powerful endpoint, email, server and network protection package for small and medium size businesses (best for 1-500 employees). Works on PCs, Macs and Windows servers. It is enhanced with 18 cutting - edge features to keep your company's life fully secure. Includes powerful antivirus, server, email and network security, CyberCapture, firewall, password manger, VPN and much more. It can be used either with cloud console or without. Learn more about Avast Business Antivirus Pro Plus All-in-one award winning antivirus solution ready to protect every part of your business. Available for PCs, Macs and servers. Learn more about Avast Business Antivirus Pro Plus
LanScope Cat

LanScope Cat

by Interfocus

(0 reviews)
Interfocus provides LanScope Cat, a unified endpoint management and security solution in the cloud that simplifies and automates how you control your teams devices in the workplace. LanScope Cat automatically inventories your PCs, laptops, peripherals and software licenses to provide visibility into how users interact with your proprietary data Learn more about LanScope Cat Manage and secure all your endpoints to ensure compliance and protection against malware and other cyber security attacks. Learn more about LanScope Cat
SolarWinds Threat Monitor

SolarWinds Threat Monitor

by SolarWinds MSP

(1 review)
SolarWinds Threat Monitor - Service Provider Edition is a fast, scalable, cloud-based platform built to enable security-minded Managed Service Providers (MSPs) with a unified tool to monitor managed networks for threats analyze logs against the latest and most up to date threat intelligence information from around the globe. Remediate your customer's threats quickly, and prepare the information needed to demonstrate their compliance to standards set by regulatory governing bodies. Learn more about SolarWinds Threat Monitor SolarWinds® Threat Monitor is the tool you need to detect, remediate, and report on security events for all your managed networks. Learn more about SolarWinds Threat Monitor
Webroot SecureAnywhere Endpoint Protection

Webroot SecureAnywhere Endpoint Protection

by Webroot Software

(101 reviews)
Multi-vector protection against viruses and malware offering full protection against all of today's sophisticated malware threats including Trojans, keyloggers, phishing, spyware, back-doors, rootkits, zero-day and advanced persistent threats. Built in Identity & Privacy Shield stops data being stolen or captured when using the Internet and the outbound firewall also stops malware stealing data. No need to worry about or run updates cloud-driven security means endpoints are always up to date. Learn more about Webroot SecureAnywhere Endpoint Protection Multi-vector protection against viruses and malware offering full protection against all of today's sophisticated malware threats. Learn more about Webroot SecureAnywhere Endpoint Protection
ADAudit Plus

ADAudit Plus

by ManageEngine

(17 reviews)
ManageEngine ADAudit Plus is an IT security and compliance solution. With over 200 reports and real-time alerts, it provides knowledge about changes made to the content and configuration of Active Directory, Azure AD, and Windows servers. Additionally it provides insight on workstation and file server access (including NetApp and EMC). ADAudit Plus helps you track user logon and logoff; analyze account lockouts; audit ADFS, ADLDS, and printers; forward logs to SIEM tools; and do much more. Learn more about ADAudit Plus ADAudit Plus is an Active Directory, Azure AD, file server (including NetApp and EMC), and workstation change monitoring software. Learn more about ADAudit Plus
WebTitan

WebTitan

by TitanHQ

(172 reviews)
DNS Based Web content filter that blocks malware, ransomware and phishing attempts as well as providing web content control. We filter over 1/2 a billion DNS requests every day, identify 60,000 malware iterations a day and have over 7,500 customers. Cloud and gateway versions available. Improve your network & computer security now. Try a free Trial of WebTitan today, support included. Learn more about WebTitan DNS Based Web content filter that blocks malware, ransomware and phishing attempts as well as providing web content control Learn more about WebTitan
JumpCloud DaaS

JumpCloud DaaS

by JumpCloud

(4 reviews)
JumpCloud Directory-as-a-Service is Active Directory and LDAP reimagined. JumpCloud securely manages and connects your users to their systems, applications, files, and networks. JumpCloud manages users and their systems whether Mac, Linux, or Windows and provides access to cloud and on-prem resources such as Office 365, G Suite, AWS, Salesforce, and Jira. The same login connects users to networks & file shares via RADIUS and Samba, respectively, securing your organizations WiFi. Learn more about JumpCloud DaaS JumpClouds Directory-as-a-Service securely manages and connects your users to their systems, applications, files, and networks. Learn more about JumpCloud DaaS
Dhound

Dhound

by IDS Global

(1 review)
Dhound IDS provides agent-based collection and analysis of security events on your internet facing server/device; agentless collection and analysis of security events for cloud (AWS); detecting and alerting about intrusions and suspecious activity; auditing outgoing traffic and data leakage detection; access control and comprehensive IP addresses analysis for incident investigation; tracking custom events that are important particularly for your online business. Learn more about Dhound Dhound is a security monitoring and intrusion detection tool for internet facing servers, clouds and web applications. Learn more about Dhound
Teramind

Teramind

by Teramind

(50 reviews)
Teramind provides a user-centric security approach to monitor employee's PC behavior. Our software streamlines employee data collection in order to identify suspicious activity, detect possible threats, monitor employee efficiency, and ensure industry compliance. We help reduce security incidents by providing real-time access to user activities by offering alerts, warnings, redirects and user lock-outs to keep your business running as efficiently and secure as possible. Learn more about Teramind Take our Free Trial to see what the buzz is about. User Activity Monitoring and Data Theft Prevention made easy with Teramind. Learn more about Teramind
Passworks

Passworks

by Certero

(1 review)
Passworks is an easy to use self-service solution that will help you to significantly reduce the costs associated with resetting Mac OS X and Windows Active Directory passwords. Users can securely reset their own password and continue working, lowering user downtime and freeing up valuable help desk resources Certero Passworks utilises Web technologies and can be administered using any modern Web-browser. Learn more about Passworks Passworks is an easy to use self-service password reset solution working across both Windows and Mac OS X. Learn more about Passworks
PA File Sight

PA File Sight

by Power Admin

(0 reviews)
PA File Sight is a file monitoring software that will help you detect file copying, protect the server from ransomware attacks, and allow auditing of who is reading, writing and deleting important files. It can also tell who is deleting or moving folders. If the user has the optional File Sight Endpoint installed, you can also be notified of file copying activity. The user account, and their IP address is reported. Learn more about PA File Sight PA File Sight is a file monitoring software that will help you detect file copying, and protect the server from ransomware attacks. Learn more about PA File Sight
Veriato RansomSafe

Veriato RansomSafe

by Veriato 360

(4 reviews)
Veriato RansomSafe acts as a vital layer in your ransomware defense, combining just-in-time data protection with multiple mechanisms to detect, and shut down attacks before they hold your business hostage. Learn more about Veriato RansomSafe Veriato RansomSafe acts as a vital layer in your ransomware defense. Shut down attacks before they hold your business hostage. Learn more about Veriato RansomSafe
OneLogin

OneLogin

by OneLogin

(31 reviews)
Designed for companies with 100+ users, OneLogin provides a cloud-based identity and access management (IAM) solution that offers simple single sign-on (SSO) making it easier for companies to secure and manage access to web applications both in the cloud and behind the firewall. Does your company have three or more SaaS or internal web apps? If so, then you will benefit from the security of OneLogin's cloud-based single sign-on solution. Learn more about OneLogin Identity management (IAM) and single sign-on (SSO) solution for companies of all sizes. Get started immediately with our free trial. Learn more about OneLogin
GlassWire

GlassWire

by GlassWire

(15 reviews)
Use GlassWire's simple to use firewall interface to view all your past and present network activity on a graph. Click the graph to see what applications initiated the incoming or outgoing bandwidth and instantly see what hosts the applications were communicating with. Hosts are automatically resolved and also include their country of origin. Click the Apps and Traffic options to break down network activity by applications and traffic types. Learn more about GlassWire GlassWire is a modern network monitor & security tool with a built in firewall. Learn more about GlassWire
AVG Antivirus Business Edition
AVG Antivirus Business Edition 2018 keeps your business and customer data safe from latest ransomware, viruses, malware and and outbreaks in real-time. Its powered with new cloud based features as CyberCapture, improved malware detection and enhanced web shield. This product includes also free remote management and great reporting. Client user interface is updated, as well. Available for Windows PCs, desktops and servers. AVG offers free phone support 24/7 to its customers. Learn more about AVG Antivirus Business Edition AVG Antivirus Business Edition 2018 keeps your SMBs and customer data safe from online threats in real-time Learn more about AVG Antivirus Business Edition
EventSentry

EventSentry

by Netikus.net

(17 reviews)
Hybrid SIEM solution combining real-time (event) log monitoring with FIM, SW/HW inventory and more for an integrated approach to increase network security. Unique security event log normalization & correlation engine with descriptive email alerts provides additional context and presents cryptic Windows security events in easy to understand reports that offer insight beyond what's available from raw events. A dynamic release cycle constantly adds features for timely challenges like Ransomware. Learn more about EventSentry Real-Time Log & Event Log monitoring solution with system monitoring, hardware/software inventory and network monitoring capabilities. Learn more about EventSentry
TunnelBear

TunnelBear

by TunnelBear

(88 reviews)
When TunnelBear is turned On, your internet connection gets secured with AES-256 bit encryption and your public IP address gets switched to the country of your choice. Businesses rely on TunnelBear for: Securing remote and traveling employees Global quality assurance testing Gathering competitive intelligence Stealthfully conducting market research Accessing geo-restricted business tools Businesses have access to priority support and a personal account manager. TunnelBear for Teams is the easiest way your team can work securely and privately from anywhere.
mSpy

mSpy

by mSpy

(10 reviews)
mSpy is the most popular monitoring and safety application in the market with millions of satisfied users around the globe. Our software works by tracking all activity in the background of the monitored phone including GPS location, web history, images, videos, email, SMS, Skype, WhatsApp, keystrokes and much more. The easy to use control panel, 24/7 live customer support and 256 bit encryption makes mSpy the best solution out there for keeping your children safe and workers productive. A monitoring and safety application for reviewing user activity and measuring productivity.
VyprVPN

VyprVPN

by Golden Frog

(20 reviews)
Manages its own network, and owns the hardware so we can deliver the fastest VPN speeds in the world Manages its own network, and owns the hardware so we can deliver the fastest VPN speeds in the world
AVG Internet Security

AVG Internet Security

by AVG Technologies

(643 reviews)
AVG helps you grow your business knowing that your data and online communications are protected. AVG helps you grow your business knowing that your data and online communications are protected.
MiniTool Partition Wizard

MiniTool Partition Wizard

by MiniTool

(37 reviews)
MiniTool Partition Wizard Free Edition is a piece of free partition manager targeting home and home office users. Certain software owns comprehensive disk partition management functions such as Merge Partition, Move/Resize Partition, Copy Partition, Create Partition, Split Partition, Delete Partition, Format Partition, and Convert File System. MiniTool Partition Wizard Free Edition is a piece of free partition manager targeting home and home office users.
PowerBroker

PowerBroker

by BeyondTrust

(0 reviews)
BeyondTrust is a global cyber security company that believes preventing data breaches requires the right visibility to enable control over internal and external risks. We give you the visibility to confidently reduce risks and the control to take proactive, informed action against threats. Our platform unifies the most effective technologies for addressing internal and external risk: Privileged Account Management and Vulnerability Management. Platform that unifies effective technologies for addressing internal and external risk: privileged account & vulnerability management.
Phishme

Phishme

by Phishme

(3 reviews)
Offers phishing threat management functionality including phishing scenarios simulation, threat detection, and analysis. Offers phishing threat management functionality including phishing scenarios simulation, threat detection, and analysis.
Kaspersky Endpoint Security

Kaspersky Endpoint Security

by Kaspersky Lab

(309 reviews)
Protect users against malicious programs such as viruses, worms, Trojans, hackers, spam and other forms of intrusion. Protect users against malicious programs such as viruses, worms, Trojans, hackers, spam and other forms of intrusion.
CylancePROTECT

CylancePROTECT

by Cylance

(28 reviews)
Stop merely detecting attacks, prevent them using CylancePROTECT, the endpoint solution that blocks 99% of threats in real time. Stop merely detecting attacks, prevent them using CylancePROTECT, the endpoint solution that blocks 99% of threats in real time.
Bitium

Bitium

by Bitium

(16 reviews)
Access control solution for corporate apps that supports integration with third party authentication providers. Access control solution for corporate apps that supports integration with third party authentication providers.
Internet Lock

Internet Lock

by TopLang Software

(0 reviews)
Password protect or deny any program from accessing internet. Protect or deny all programs from accessing the special TCP ports. Ppassword protect or deny any program from accessing internet. Protect or deny all programs from accessing the special TCP ports.
LogPoint

LogPoint

by LogPoint

(0 reviews)
The LogPoint SIEM solution intelligently extracts events and incidents from the billions of logs existing in any IT infrastructure of any size. Filtered and carefully correlated real-time results are displayed in easy to manage dashboards that can be configured based on the specific roles and responsibilities of each user. LogPoint is an effective and valuable SIEM solution for enterprises of all sizes because of its unique design and rich features.
DeviceLock

DeviceLock

by DeviceLock

(0 reviews)
Provides both contextual and content-based control for maximum leakage prevention at minimum upfront and ownership cost. Provides both contextual and content-based control for maximum leakage prevention at minimum upfront and ownership cost.
NerveCenter

NerveCenter

by Logmatrix

(0 reviews)
Delivers integrated, real-time security management in a single, seamless suite. Delivers integrated, real-time security management in a single, seamless suite.
Indeni

Indeni

by Indeni

(12 reviews)
Indeni is the crowd-sourced automation platform for network and security infrastructure. With Indeni Crowd and Indeni Insight organizations gain access to living repository of automation scripts across maintenance, high availability, network visibility, security, compliance and vendor best practices. Teach your team co-development processes alongside the largest community of certified IT professionals and reduce total cost of ownership with prescriptive steps to resolve issues. Indeni helps IT pros detect network issues before they become major issues using predictive analytics technology.
SecurityEXPERT

SecurityEXPERT

by St. Bernard Software

(0 reviews)
Policy-based product; audit, enforce and report on managed machines with respect to their assigned policies. Policy-based product; audit, enforce and report on managed machines with respect to their assigned policies.
TF2000

TF2000

by ComputerProx

(0 reviews)
Ultrasonic Proximity Sensor. When you leave the proximity of the PC, it automatically locks the system without requiring any keystrokes from you. Solution that automatically locks the system without requiring any keystrokes from the user.
Jscrambler

Jscrambler

by Jscrambler

(0 reviews)
Jscrambler is the leader in security for JavaScript Applications, working on highly innovative security products to protect Web and Mobile apps. Their products are used by 30.000 users in 145 countries, including some of the most innovative companies in the world and Fortune 500 organizations, in a number of sectors including Finance, Advertising, Media and Gaming. Recently, a new Webpage Integrity module was introduced that extends their code protection expertize to the webpage. Make Your JavaScript Application Protect Itself
ControlCase

ControlCase

by ControlCase

(0 reviews)
ControlCase offers the most comprehensive computer security incident management system available. This robust application centralizes the reporting, tracking and resolution of security incidents in an easy-to-use, web-based format. In addition to incident management, ControlCase helps comply with Federal regulations such as FISMA. It is the only platform that allows for secure reporting of security incidents to federal agencies such as US-CERT and FBI. Comprehensive computer security incident management system.
Rohos Logon Key

Rohos Logon Key

by Tesline-Service

(0 reviews)
Two-factor authentication solutions for Windows. Secure USB Key logon. Two-factor authentication solutions for Windows. Secure USB Key logon.
Gemnasium

Gemnasium

by Gemnasium

(0 reviews)
Gemnasium monitors your applications' open source dependencies and alerts you about updates and security vulnerabilities. Your project might be using a dangerous dependency, we will notify you as soon as advisories are public and affect your projects. We support JavaScript, Ruby, Python and PHP applications with more coming soon. We have an enterprise version that supports GitHub Enterprise, GitLab and Bitbucket Server. All versions have free trials. A security solution that monitors your project dependencies and alerts you about updates and security vulnerabilities.
BlackFog

BlackFog

by BlackFog

(1 review)
BlackFog provides Cyber Privacy Protection software designed to protect your online and offline privacy using real-time threat detection and blocking. BlackFog prevents the unauthorized collection and profiling of your behavior by blocking advertising, data collection and analysis, significantly improving the performance and safety of your computer. Security solution that manages data privacy, threat protection and tracking activity.
Security Shield

Security Shield

by PCSecurityShield

(0 reviews)
A complete security suite for maximum protection. Includes antivirus, anti-malware, intrusion protection, root-kit detection, spam filter, content filter and firewall. Centrally managed and server solutions available. Free phone and email tech support and a 30-day guarantee. Protection your office should not be without. Protects your business from viruses, spyware, Trojans, root-kits, hackers, adware and more.
Nfusion

Nfusion

by Ntrepid

(0 reviews)
Nfusion is the ultimate secure online environment for protecting your organization. Nfusion combines IP address attribution control with virtualization and other specialized features to camouflage your identity and protect your corporate IT assets from malware contagion. Nfusion provides a virtualized full Windows desktop. Both Windows 7 and 8 are available. Ntrepid can incorporate most Windows-compatible applications directly into the users virtual desktop. Nfusion is a fully-managed and completely segragated secure VDI for online research and investigation.
ZoneAlarm Pro

ZoneAlarm Pro

by Zone Labs

(12 reviews)
PC firewall that keeps your personal data and privacy safe from Internet hackers and data thieves. PC firewall that keeps your personal data and privacy safe from Internet hackers and data thieves.
UserLock

UserLock

by IS Decisions

(0 reviews)
Stronger security for Windows logins. UserLock works alongside Active Directory to protect access to Windows systems. With context-aware access controls and real-time monitoring, UserLock reduces the risk of external attacks and internal security breaches while helping to address regulatory compliance. Secure, control & audit user access to Microsoft Windows Server-based networks and protect the resources and data contained within.
FileAudit

FileAudit

by IS Decisions

(0 reviews)
Proactively track, audit, report and alert on all access to files and folders on Windows servers. FileAudit is installed in less than 3 minutes on any machine and offers real-time monitoring to access or access attempts, automatic email alerts, reports according to multiple criteria ( (path, file type, access type, IP source address, time, etc.) for auditing and regulatory compliance, alerts on mass access, copying, deletion or movement of bulk files that indicate a potential breach and more. Proactively track, audit, report and alert on all access - and access attempts - to files, folders and file shares on Windows servers.
Network Security Auditor

Network Security Auditor

by Nsasoft

(0 reviews)
Network security audit system designed to audit network and detect available security vulnerabilities in the network. Network security audit system designed to audit network and detect available security vulnerabilities in the network.
DriveCrypt

DriveCrypt

by Securstar

(0 reviews)
Protects all proprietary data on notebooks and desktop computers 100% of the time without users having to think about security. Protects all proprietary data on notebooks and desktop computers 100% of the time without users having to think about security.
Symantec Advanced Threat Protection
Symantec Advanced Threat Protection is a single unified solution that uncovers, prioritizes, and remediates advanced attacks. The product fuses intelligence from endpoint, network, and email control points, as well as Symantecs massive global sensor network, to stop threats that evade individual security products. It leverages your existing Symantec Endpoint Protection and Symantec Email Security.cloud investments, so it does not require the deployment of any new agents. Fosters the productivity of your mobile workforce through scalable device management and security. Licensed on a per-user basis.
Black Duck Hub

Black Duck Hub

by Black Duck

(28 reviews)
Organizations worldwide use Black Duck Softwares industry-leading products to secure and manage open source software, eliminating the pain related to security vulnerabilities, open source license compliance and operational risk. Black Duck is headquartered in Burlington, MA, and has offices in Mountain View, CA, London, Frankfurt, Hong Kong, Tokyo, Seoul and Beijing. For more information, visit www.blackducksoftware.com. We secure & manage open source software, eliminating pain related to open source security vulnerabilities & license compliance.
SSH Tectia

SSH Tectia

by SSH Communications Security

(3 reviews)
Enables secure system administration, secure file transfer and secure application connectivity with centralized control. Enables secure system administration, secure file transfer and secure application connectivity with centralized control.
Active Shield

Active Shield

by Security Stronghold

(1 review)
Protects your computer from trojans, spyware, adware, trackware, dialers, keyloggers, and even some special kinds of viruses. Protects your computer from trojans, spyware, adware, trackware, dialers, keyloggers, and even some special kinds of viruses.
Retina Network Security Scanner

Retina Network Security Scanner

by eEye Digital Security

(0 reviews)
Combines advanced scanning technology with most comprehensive vulnerability database. Combines advanced scanning technology with most comprehensive vulnerability database.
Falcon Host

Falcon Host

by CrowdStrike

(3 reviews)
Next-generation endpoint protection software that detects, prevents, and responds to attacks. Next-generation endpoint protection software that detects, prevents, and responds to attacks.
Invisible Secrets

Invisible Secrets

by NeoByte Solutions

(0 reviews)
Security software that encrypts your data and files for safe keeping or secure transfer across the net. Security software that encrypts your data and files for safe keeping or secure transfer across the net.
SecuBox

SecuBox

by Aiko Solutions

(0 reviews)
AES 256-bit disk encryption for Windows Embedded Compact/ Windows CE handhelds and its media cards. Safe, secure and convenient storage for all important and business critical information. AES 256-bit disk encryption for Windows Embedded Compact/ Windows CE handhelds and its media cards. Safe, secure and convenient storage
AnVir Task Manager Pro

AnVir Task Manager Pro

by AnVir Software

(0 reviews)
Descriptions for over 70,000 programs, custom settings, preferred processes, and blocking of undesired processes. Descriptions for over 70,000 programs, custom settings, preferred processes, and blocking of undesired processes.
Clearlogin

Clearlogin

by Evolve IP

(9 reviews)
Clearlogin makes it easy for IT Administrators to integrate thousands of popular cloud applications with instant end user dashboards, password management, and SSO! Give users self-service password resets. Integrate with AD, G-Suite, LDAP, or use our hosted directory for free. Grant and revoke access for groups and individuals with a single click. Mitigate potential risks with robust IP-based security rules. Secure password management, end-user dashboards and SSO to thousands of cloud applications!
StillSecure

StillSecure

by StillSecure

(0 reviews)
Security testing, monitoring and management software that defends networks from security breaches. Security testing, monitoring and management software that defends networks from security breaches.
Fortres 101

Fortres 101

by Fortres Grand

(1 review)
Reliable security software for student access. Fortres 101 limits computer access to only programs, files, and Web sites you allow. Reliable security software for student access. Fortres 101 limits computer access to only programs, files, and Web sites you allow.
NetSupport Protect

NetSupport Protect

by NetSupport

(0 reviews)
Top choice of IT admins and tech coordinators to protect Windows operating systems and desktops from unwanted or malicious changes. Top choice of IT admins and tech coordinators to protect Windows operating systems and desktops from unwanted or malicious changes.
Fusion

Fusion

by Panda Security

(12 reviews)
Panda Fusion Remotely protects, manages and supports all of your IT infrastructure devices, including tablets and smartphones. Offering the maximum protection against malware and other unknown threats; automation of infrastructure management and centralized control; and the best support experience with proactive troubleshooting and remote, non-intrusive access to devices, no matter where they are. Panda Fusion is a complete product able to protect, manage and deliver remote support to all your IT devices.
CyberGatekeeper

CyberGatekeeper

by InfoExpress

(0 reviews)
Network-ready solution that automatically detects, audits, quarantines and remediates endpoints. Network-ready solution that automatically detects, audits, quarantines and remediates endpoints.
Genesis

Genesis

by Internet Biometric Security Systems

(0 reviews)
On demand biometric security solution for any type of internet application requiring security of confidential information. On demand biometric security solution for any type of internet application requiring security of confidential information.
QualysGuard Enterprise

QualysGuard Enterprise

by Qualys

(2 reviews)
Security Risk and Compliance Management - On Time, On Budget, On Demand -- Qualys is the first company to deliver an on demand solution for security risk and compliance management. Qualys monitors your company's vulnerability management process, tracks remediation and ensures policy compliance. QualysGuard is also the widest deployed security on demand platform in the world, performing over 150 million IP audits per year - with no software to install and maintain. Monitors the vulnerability management process, tracks remediation and ensures policy compliance.
eScan ISS

eScan ISS

by MicroWorld Technologies

(1 review)
A complete security suite which provides essential protection against viruses, objectionable content, hackers and privacy threats. A complete security suite which provides essential protection against viruses, objectionable content, hackers and privacy threats.
LiveEnsure

LiveEnsure

by LiveEnsure

(0 reviews)
Authenticates users through their mobile device, location, knowledge and behavior. Authenticates users through their mobile device, location, knowledge and behavior.
Secret Server Password Manager

Secret Server Password Manager

by Thycotic Software

(13 reviews)
Secure, multi-user password management software for IT professionals. One central vault for securing passwords and more. Easy deployment - 30 to 60 minutes. Installed on-premise (runs on a VM if you want). Free 30 Day Trial. Integrated with Active Directory. Changes passwords on AD, Windows, SQL Server, Sybase, Oracle, MySQL, UNIX/Linux, Cisco, Juniper and even more. Also take control of your Service Account passwords (find where service accounts are used and automatically change passwords). Password management software enables colleagues within IT departments to securely store, manage and audit passwords and other secrets.
RSA Keon

RSA Keon

by RSA Security

(4 reviews)
Public key infrastructure; enables, manages and simplifies the use of digital certificates. Public key infrastructure; enables, manages and simplifies the use of digital certificates.
GamaScan

GamaScan

by GamaSec

(2 reviews)
Website security test to protect application and server against hackers. Website security test to protect application and server against hackers.
Saint Security Suite

Saint Security Suite

by SAINT

(2 reviews)
The SAINT security suite includes vulnerability, configuration, & application assessment & integrated penetration testing, providing a complete picture of both internal & external threats. It is offered as a cloud service, software, virtual machine, or a pre-configured appliance. The security suite includes custom reports; dashboards and dynamic data analysis including security trending; automatic updates; social engineering tools; compliance policies and reports for PCI, FISMA, SOX, & HIPAA. Integrated Vulnerability Management, Penetration Testing, Compliance, and Configuration Audit software.
Tripwire for Servers

Tripwire for Servers

by Tripwire

(0 reviews)
Detect intentional tampering, user error, software failure, and introductions of malicious software. Detect intentional tampering, user error, software failure, and introductions of malicious software.
AccuHash

AccuHash

by Viwal Interactive

(0 reviews)
Unicode-enabled checksum utility for Windows, will help to prevent accidental or intentional damaging of your data. Unicode-enabled checksum utility for Windows, will help to prevent accidental or intentional damaging of your data.
G Data Internet Security 2013

G Data Internet Security 2013

by G Data Software

(2 reviews)
Comprehensive antivirus protection package with behavior checking, parental controls, and idle scanning. Comprehensive antivirus protection package with behavior checking, parental controls, and idle scanning.
Egosecure Endpoint

Egosecure Endpoint

by Egosecure

(0 reviews)
Covers all endpoint security, control and data loss prevention tasks which are relevant for preventive data protection measures. 1700 customers in 40 countries Covers all endpoint security, control and data loss prevention tasks which are relevant for preventive data protection measures.
CipherCloud for Salesforce

CipherCloud for Salesforce

by CipherCloud

(3 reviews)
CipherCloud for Salesforce addresses data privacy, residency, security, and compliance concerns so that organizations can confidently deploy Salesforce.The CipherCloud solution understands Salesforce metadata and provides organizations with the ability to easily tag any standard and custom fields, files, and attachments as sensitive. Once configured, the CipherCloud solution secures this data and prevents it from being leaked to unauthorized users, while working seamlessly with Salesforce. Addresses data privacy, residency, security, and compliance concerns so that organizations can confidently deploy Salesforce.
BorderWare Firewall Server

BorderWare Firewall Server

by BorderWare Technologies

(1 review)
Integrated solution that eliminates vulnerabilities and costs associated with a separate firewall and operating system. Integrated solution that eliminates vulnerabilities and costs associated with a separate firewall and operating system.
NetIQ Sentinel 7

NetIQ Sentinel 7

by NetIQ

(1 review)
Make decisive, appropriate responses to incidents by automating identification and resolution processes. Make decisive, appropriate responses to incidents by automating identification and resolution processes.
Viewfinity Application Control

Viewfinity Application Control

by Viewfinity

(1 review)
Cloud based platform offering endpoint security technology that eliminates gaps left undetected by other endpoint security solutions. Cloud based platform offering endpoint security technology that eliminates gaps left undetected by other endpoint security solutions.
Beacon

Beacon

by Great Bay Software

(1 review)
Great Bay Software is helping organizations gain back complete control over their corporate networks. Our technology, the Beacon product suite, solves the lack of endpoint visibility and control that keeps enterprises from fully securing their corporate network. We can help you with: Asset discovery and management, Identity monitoring and threat avoidance, Incident response, Regulatory compliance, Network capacity planning and Device authentication. Suite of solutions designed to secure corporate networks, ensure compliance, and enhance endpoint visibility.
Secure Hive

Secure Hive

by Secure Hive

(0 reviews)
Create encrypted archives and self-extracting .exe files for secure storage and file sharing. Create encrypted archives and self-extracting .exe files for secure storage and file sharing.
Validian Protect

Validian Protect

by Validian

(0 reviews)
Manages all crucial security functions, including authentication, encryption and addressing. Manages all crucial security functions, including authentication, encryption and addressing.
TweakEasy Professional

TweakEasy Professional

by WinSetter

(0 reviews)
A professional yet easy-to-use Windows tweaking utility with 2494 policies to configure. A professional yet easy-to-use Windows tweaking utility with 2494 policies to configure.
CimTrak Integrity Suite

CimTrak Integrity Suite

by Cimcor

(0 reviews)
Built around advanced file integrity monitoring technology, CimTrak can go beyond server monitoring detecting changes to network devices, databases, desktops/workstations, VMware ESX/ESXi hosts, and more, CimTrak helps companies and government agencies worldwide keep their IT infrastructure secure, maintain compliance with regulations such as the Payment Card Industry Standards (PCI-DSS), ensure continuous system uptime, and take control of changes in their IT environments. A comprehensive security software application that is easy to deploy and scales to the largest of global networks.
Advanced Security Manager

Advanced Security Manager

by Nexvue

(0 reviews)
Your Acumatica installation contains some of your companys most valuable information as well as some of its most sensitive information. Password protection is simply not enough to protect your company against hackers and breaches. Organizations that need the next level of protection are turning to two-factor authentication, or 2FA, to secure their information from unwanted intruders. Now NexVue makes 2FA available for Acumatica. Now NexVue makes 2FA available for Acumatica.
ForeScout CounterACT Edge

ForeScout CounterACT Edge

by ForeScout Technologies

(3 reviews)
Security hardware that monitors the perimeter and preempts targeted attacks. Security hardware that monitors the perimeter and preempts targeted attacks.
Vera

Vera

by Vera

(2 reviews)
Vera secures any kind of data, wherever it goes Vera secures any kind of data, wherever it goes
iLock Security Services
iLock Security Services includes application level access control services for Java, C/C++ and Web environments. jLock, webLock and c/Lock enable companies to quickly and easily define access security policy for applications and centrally administer the policy. Centralized management of users, groups and roles, role-based access control, entitlements and access policies.
Spoon

Spoon

by Spoon

(1 review)
Powerful, flexible, and easy-to-use code security and deployment solution for .NET developers. Powerful, flexible, and easy-to-use code security and deployment solution for .NET developers.
Trust Lockdown

Trust Lockdown

by White Cloud Security

(1 review)
App trust-listing technology. Protects your systems by only allowing trusted applications to execute. App trust-listing technology. Protects your systems by only allowing trusted applications to execute.
Promisec Endpoint Manager 4.12
The program uses patented agentless technology to remotely and quickly inspect the entire endpoint environment to uncover threats. The program uses patented agentless technology to remotely and quickly inspect the entire endpoint environment to uncover threats.
OpaqueVEIL

OpaqueVEIL

by TecSec

(0 reviews)
Enables access to information through encryption, providing information security, privacy and confidentiality. Enables access to information through encryption, providing information security, privacy and confidentiality.
Identity & Access Manager

Identity & Access Manager

by Evidian

(0 reviews)
Manages access rights to your applications and lets you enforce a unified security policy across the enterprise. Lets you enforce access governance and automates account provisioning. Manages and safeguards access to your data and lets you enforce a unified security policy across the enterprise.
WiKID Authentication System

WiKID Authentication System

by WiKID Systems

(0 reviews)
System for two-factor authentication that increases security, reduces costs and is very convenient to the end-user. System for two-factor authentication that increases security, reduces costs and is very convenient to the end-user.
Secure CommNet

Secure CommNet

by Radient Software

(0 reviews)
A 32-bit Windows application for secure shell (SSH2), telnet, and dial-up connections. A 32-bit Windows application for secure shell (SSH2), telnet, and dial-up connections.
MemberProtect

MemberProtect

by InetSolution

(0 reviews)
Uses powerful encryption to secure databases at the cell level and can encrypt email messages and flat files on your network. Uses powerful encryption to secure databases at the cell level and can encrypt email messages and flat files on your network.
IntelliTrack Network

IntelliTrack Network

by Soni-Soft

(0 reviews)
Intelligence software system for security, loss prevention and audit organisations in the retail & financial sectors. Intelligence software system for security, loss prevention and audit organisations in the retail & financial sectors.
Calyx Suite

Calyx Suite

by Open Seas

(0 reviews)
Includes two factor sign-on, access control, encryption, personal firewall using smart cards, USB or biometrics. Includes two factor sign-on, access control, encryption, personal firewall using smart cards, USB or biometrics.
Security Services Platform
Security services platform is your company's security services, for your clients, and 100% private labeled for YOUR business. Security services platform is your company's security services, for your clients, and 100% private labeled for YOUR business.
IMCrypto Pro

IMCrypto Pro

by Global Information Technology

(0 reviews)
IMCrypto Pro uses in its work one of the most widely spread asymmetric encryption algorithms - RSA. IMCrypto Pro uses in its work one of the most widely spread asymmetric encryption algorithms - RSA.
PlatinumCache

PlatinumCache

by DTS

(0 reviews)
Secures the Windows Operating System from unwanted or malicious writes. DTS offers High Security Products in Web Application Firewall & Security Applicance Software. Secures the Windows Operating System from unwanted or malicious writes.
SyncBoss

SyncBoss

by SecurePro Software

(0 reviews)
File Synchronization Application and Cloud Storage. File Synchronization Application and Cloud Storage.
XyLoc Security Server

XyLoc Security Server

by Ensure Technologies

(0 reviews)
A server-based software platform that centrally manages and monitors XyLoc users and protected workstations throughout the enterprise. A server-based software platform that centrally manages and monitors XyLoc users and protected workstations throughout the enterprise.
Trustifier KSE

Trustifier KSE

by Trustifier

(0 reviews)
Trustifier KSE is an advanced kernel-level security cyber-security software for Linux, BSD, and other Unix-like operating systems. KSE gives organizations the ability to stop insiders from stealing data, and IT resources, including the ability to separate system administrators from sensitive data.Since KSE is able to stop insiders it can protect information even if someone has broken into your network. Security solution for Unix-like OS. Separate system administrators from sensitive data to ensure security of your IT resources.
Data Rover EP

Data Rover EP

by Mission2Mars

(0 reviews)
DATA ROVER Effective Permissions is a structured product designed to make it easy for you to: - analyze your file servers and shared file systems - check and track file system permissions - gain valuable knowledge on your business critical servers and data DATA ROVER EP automates and actively makes the process of security analysis and permission reporting. It provides a scalable and cost-effective way of managing network data resources across the organization. Calculates the Effective Permissions on Microsoft Windows File Servers.
Secure Hunter Business

Secure Hunter Business

by Secure Hunter

(0 reviews)
Acting as a sidekick to your antivirus program, Secure Hunter locates malicious software and eliminates it before it reaches your data. Acting as a sidekick to your antivirus program, Secure Hunter locates malicious software and eliminates it before it reaches your data.
Appvigil

Appvigil

by Wegilant

(0 reviews)
Just a scan to find the security vulnerabilities in your mobile app and their exact location. Appvigil does the rest. Just a scan to find the security vulnerabilities in your mobile app and their exact location. Appvigil does the rest.
Cofactor Kite

Cofactor Kite

by Cofactor Computing

(0 reviews)
Kite protects your solutions in any cloud. Kite works with SharePoint online & on-prem, and better than Shadow IT. Kite protects your solutions in any cloud. Kite works with SharePoint online & on-prem, and better than Shadow IT.
Specops Password Sync

Specops Password Sync

by Specops Software

(0 reviews)
Specops Password Sync simplifies password management for users by allowing them to use one password across multiple systems- including on-premises and SaaS targets. Specops Password Sync instantly synchronizes Active Directory passwords to other systems, which ensures complexity is applied to all business systems. Fights password fatigue by reducing number of passwords to remember
Votiro Secure Email Gateway
A network security software which helps in protecting sensitive data from phishing attacks by scanning file attachments in emails. A network security software which helps in protecting sensitive data from phishing attacks by scanning file attachments in emails.
Siwenoid

Siwenoid

by Siwena

(0 reviews)
We integrate the most widely used intrusion panels and CCTV systems on one screen with features including camera picture pop-ups. We integrate the most widely used intrusion panels and CCTV systems on one screen with features including camera picture pop-ups.
iSafeSend

iSafeSend

by DMS Companies

(0 reviews)
Use iSafeSend to encrypt and safely send sensitive information via email. iSafeSend generates a unique one-time use link to your sensitive or confidential information. This unique link is accessible for a limited time and once it has been accessed or reaches its expiry date, it is deleted and can no longer be accessed. iSafeSend allows you to send multiple unique links in separate emails for the same confidential information. iSafeSend enables you to securely share sensitive information through a one-time use link.
EntryProtect

EntryProtect

by SentryBay

(0 reviews)
Desktop software designed to protect all data entered into web browsers. Protects all data entry including personal and financial information from malware/spyware/trojans and phishing attacks that attempt to steal confidential information. Works alongside all other security software such as anti-virus providing a real-time layer of protection for all data. Provides real-time protection of user data from malware and phishing attacks
NordVPN

NordVPN

by NordVPN

(114 reviews)
We help companies keep their networks and Internet connections secure. Our VPN service adds an extra layer of protection to secure your communications. We do this by applying strong encryption to all incoming and outgoing traffic so that no third parties can access your confidential information. Protect your organization against security breaches. Secure remote team access. Simplify business network security. Access region-specific online content from anywhere in the world NordVPN applies strong encryption to all your Internet traffic so that no third parties can breach your business communications.
bitdefender GravityZone

bitdefender GravityZone

by bitdefender

(64 reviews)
GravityZone is built from the ground up for virtualization and cloud to deliver business security services to physical endpoints, mobile devices, virtual machines in private, public cloud and Exchange mail servers. GravityZone Enterprise Security provides flexible licensing options to fit the protection needs of your offices, datacenters and public cloud. All security services are delivered from one virtual appliance to install on premise covering all endpoints across your environment. Provides flexible licensing options to fit the protection needs of your offices, datacenters and public cloud.
McAfee E-Business Server

McAfee E-Business Server

by McAfee

(28 reviews)
Simplifies protecting files, file transfers, and application data while improving security; uses PGP encryption. Simplifies protecting files, file transfers, and application data while improving security; uses PGP encryption.
Windscribe

Windscribe

by Windscribe

(21 reviews)
Windscribe is a VPN desktop application and VPN/proxy browser extension that work together to block ads, trackers, restore access to blocked content, secure online communications and help you safeguard your privacy online. Protect your data and access information without restrictions regardless of your geolocation through a secure VPN and ad-block.
F-Secure VPN+

F-Secure VPN+

by F-Secure

(6 reviews)
Provides strong encryption, supports multiple protocols, security standards & authentication methods. Provides strong encryption, supports multiple protocols, security standards & authentication methods.
Avast Business CloudCare

Avast Business CloudCare

by Avast

(6 reviews)
Avast Business CloudCare is a cloud-based, endpoint security platform that makes it significantly faster and easier for IT service providers to deliver layered protection, monitor threats, and resolve issues all from a single platform. With CloudCare, you can remotely secure multiple clients, protect networks, and deliver pay-as- you-go services, such as antivirus, antispam, content filtering, and backup services, that enhance their protection and boost your profits. Deliver powerful, layered protection to multiple customers quickly and easily.
Prey

Prey

by Prey

(5 reviews)
A mobile security, anti-theft, and management solution from Chile with geographical location, device & data locking, data recovery, and a robust MDM core package. Prey is open-source and it embraces a transparent security environment that not only protects your assets but also your privacy. A mobile security and management solution from Chile with geographical location, device & data locking, data recovery, and a robust MDM
Hushmail

Hushmail

by Hushmail

(3 reviews)
Hushmail is a secure email service that lets you send and receive private, encrypted emails and attachments to and from anyone, even people who don't use Hushmail. With easy-to-use webmail and an iPhone app, there's no complicated installation process. Just sign up and start sending securely. Our Healthcare plans come configured for HIPAA compliance and include the required BAA, an archive account and secure forms. A secure email service that lets you send and receive private, encrypted emails and attachments to and from anyone.
Ransomware Defender

Ransomware Defender

by ShieldApps Software Development

(3 reviews)
Scans, detects and protects from ransomware malicious attempts. Scans, detects and protects from ransomware malicious attempts.
Firewall-1

Firewall-1

by Check Point Software Technologies

(2 reviews)
Firewall that provides access control, content security, authentication and centralized management. Firewall that provides access control, content security, authentication and centralized management.
Cisco Cloudlock

Cisco Cloudlock

by Cisco Cloudlock

(2 reviews)
Cisco Cloudlock is the leading CASB & Cybersecurity-as-a-Service provider, fully protecting your enterprise Cisco Cloudlock is the leading CASB & Cybersecurity-as-a-Service provider, fully protecting your enterprise
HackerOne

HackerOne

by HackerOne

(2 reviews)
A computer security solution with issue tracker connection, security inbox, team controls, analysis & metrics, and more. A computer security solution with issue tracker connection, security inbox, team controls, analysis & metrics, and more.
CWIS Security Antivirus Scanner

CWIS Security Antivirus Scanner

by Cobweb Security

(2 reviews)
A Professional Security Protection Antivirus scanner The WebDefender was developed by a team of security experts and it incorporates professional tools for the best all around WordPress website protection and prevention of threats. Security scanner designed to detect adware, malware, backdoors, exploits, defacement, phishing code, trojans and viruses. Security scanner designed to detect adware, malware, backdoors, exploits, defacement, phishing code, trojans and viruses.
Web Security Appliance

Web Security Appliance

by IronPort

(1 review)
The industry's fastest Web security appliance with a new scanning technology that enables signature-based spyware filtering. The industry's fastest Web security appliance with a new scanning technology that enables signature-based spyware filtering.
modusGate

modusGate

by Vircom

(1 review)
modusGate is an on-premise multi-layer anti-spam email filtering gateway harnessing 2 decades of security and network experience. It incorporates state of the art AI through a real-time machine learning engine to effectively identify threats by reputation and advanced statistical models. We integrate layered scanning with Bitdefender and Avira Anti-Virus, providing leading defense against phishing and malware threats. Robust, customizable email security solution that ensures a high catch rate and an almost non-existent false-positive rate.
End-user IT Analytics

End-user IT Analytics

by Nexthink

(1 review)
Visualize your entire network, identify security threats in real-time, and improve IT governance with modular analytics solution. Visualize your entire network, identify security threats in real-time, and improve IT governance with modular analytics solution.
SpyShelter Anti-Keylogger

SpyShelter Anti-Keylogger

by SpyShelter

(1 review)
Protects agains spy and monitoring software including keyloggers, webcam loggers, and financial malware. Protects agains spy and monitoring software including keyloggers, webcam loggers, and financial malware.
Powertech Security Software

Powertech Security Software

by HelpSystems

(1 review)
Powertech combines world-class software and outstanding customer support with IBM i security expertise that's second to none. Whether your IT staff consists of IBM i security novices or seasoned professionals, we have the experience and resources to help you implement a security policy that controls network access, enhances visibility to unauthorized activities, and manages your powerful users without disrupting business activity. Powertech is the leading source of automated security and compliance solutions for IBM i, helping you manage and save valuable data.
Bodi

Bodi

by Pilixo

(1 review)
Bodi is a complete end-point security platform encompassing... Phishing prevention- prevents users from accidentally clicking on malicious links Insider threat detection stop data theft with real time alerts based on defined rules Usage analysis detailed analysis of app usage, web browsing, printing, activity Forensic evidence full recording and keyword search for detailed investigations Remediation full remote control capabilities to correct device related issues Integrate- API Support Increase employee productivity, deter insider threats and improve data security to meet strict compliance requirements.
EventLog Analyzer

EventLog Analyzer

by ManageEngine

(1 review)
EventLog Analyzer is a comprehensive log management solution withreal-time threat detection and analysis. It can correlate disparate events happening across your network and also has a built-in threat intelligence and incident management platform. It offers predefined audit reports to help track activity happening in databases, web servers, Windows devices, network perimeter devices, and more. It also assists in meeting compliance regulations like the PCI DSS, SOX, HIPAA, FISMA, and GDPR. EventLog Analyzer is a comprehensive log management solution that provides multiple security capabilities in one unified platform.
Barracuda Web Security Gateway

Barracuda Web Security Gateway

by Barracuda Networks

(1 review)
Making Web Browsing Safe Making Web Browsing Safe
Network Security Manager

Network Security Manager

by Intellitactics

(0 reviews)
Threat management software that enables you to police, prioritize and prevail across the full range of today's security threats. Threat management software that enables you to police, prioritize and prevail across the full range of today's security threats.
Snorkel-Server

Snorkel-Server

by Odyssey Technologies

(0 reviews)
Security gateway software with capabilities for providing digital certificate based authentication and non-repudiation services. Security gateway software with capabilities for providing digital certificate based authentication and non-repudiation services.
PureSight CSDK/OEM

PureSight CSDK/OEM

by PureSight Technologies

(0 reviews)
Easily integrated into Internet security suites/appliances to provide content filtering capabilities to your offerings. Easily integrated into Internet security suites/appliances to provide content filtering capabilities to your offerings.
Net Monitor for Employees

Net Monitor for Employees

by EduIQ.com

(0 reviews)
Net Monitor for Employees lets you see what everyone's doing - without leaving your desk. Monitor the activity of all the PCs in your company remotely. Plus you can share your screen with your employees' PCs, making demos and presentations much easier. Easy Step-by-step installation takes only 5 minutes! No registration is needed. Start tracking employee activity today to improve productivity. Net Monitor for Employees is employee monitoring software that allows you to take full control of a computer and much more.
east-tec Eraser

east-tec Eraser

by East-Tec

(0 reviews)
Protect your sensitive data and privacy, and securely erase all evidence of your Internet and PC activity. Go beyond any system optimization or cleanup tool, improve your PC performance, and keep it clean and secure! east-tec Eraser has been continuously improved since its launch in 1998, and exceeds government and industry standards for the permanent erasure of digital information. east-tec Eraser easily removes every trace of sensitive data from your PC. Protect your sensitive data and privacy, and securely erase all evidence of your Internet and PC activity. Since 1998.
Clearswift SECURE Email Gateway

Clearswift SECURE Email Gateway

by Clearswift

(0 reviews)
The award-winning Clearswift SECURE Email Gateway (SEG) offers an unprecedented level of cyber-attack protection and outbound data loss prevention for secure email collaboration. With its legacy in the MIMEsweeper for SMTP technology, the Clearswift SEG incorporates the latest in inbound threat protection (Sophos and/or Kaspersky AV), a multi-layer spam defence mechanism, multiple encryption options, deep content inspection control on size and types of attachments and Adaptive Redaction features The award-winning Clearswift SECURE Email Gateway (SEG) offers an unprecedented level of cyber-attack protection and outbound data loss
RDS-Shield

RDS-Shield

by Marty Soft Conception

(0 reviews)
Secures and easily protects a Windows Remote Desktop Server against cyber criminals. RDS-Shield is a standalone Windows Service managing a lot of servers events, and an intuitive Administration interface. Forget the complexity of GPO & AD. Simply say : Now, all users of this group are in Highly secured user environment, but in this same group, this account will be in Secured user session, when other will work in Kiosk Mode. Set Hours Restrictions with Time Zone and Homeland access. Secures and easily protects a Windows Remote Desktop Server against cyber criminals.
Anti-Executable

Anti-Executable

by Faronics

(0 reviews)
Faronics Anti-Executable ensures total endpoint productivity by only allowing approved applications to run on a computer or server. Any other programs - whether they are unwanted, unlicensed, or simply unnecessary - are blocked from ever executing. Faronics Anti-Executable ensures total endpoint productivity by only allowing approved applications to run on a computer or server.
OX Guard

OX Guard

by Open-Xchange

(0 reviews)
Email security solution that adheres to PGP encryption standard to assure that communications remain confidential. Email security solution that adheres to PGP encryption standard to assure that communications remain confidential.
Cyberator

Cyberator

by Zartech

(0 reviews)
Cyberator is an all-in-one cybersecurity tool that simplifies the complexity of assessments, by leveraging its intelligence in merging and mapping cybersecurity frameworks against the existing & future posture of an organization. It provides automatic tracking of all gap remediation efforts, along with full control of road-map development, based on simple answers to a sophisticated tool that queries the environment. Cyberator streamlines 3rd party and IT risk audits with a centralized solution Conduct your organization's cybersecurity maturity assessment with just few steps & use the intuitive improvement road-map to close gap
ThreatSentry

ThreatSentry

by Privacyware

(0 reviews)
Web application firewall that provides protection from known or new threats to IIS and from internal or external threats. Web application firewall that provides protection from known or new threats to IIS and from internal or external threats.
CISS Forza

CISS Forza

by SAI Technology

(0 reviews)
A computer security solution that limits incorrect employee access privileges and responds to malicious activity. A computer security solution that limits incorrect employee access privileges and responds to malicious activity.
SERVERWAT.CH Security Scanner

SERVERWAT.CH Security Scanner

by SERVERWAT.CH Security Scanner

(0 reviews)
Are you running an online business and haven't thought about security? Find your vulnerabilities before others do. Schedule vulnerability scans for your servers and get notified when it's time to call your admin. Schedule vulnerability scans for your servers and get notified when it's time to call your admin.
GridinSoft Anti-Malware

GridinSoft Anti-Malware

by Gridinsoft

(0 reviews)
GridinSoft Anti-Malware targets all kinds of threats on your Windows PC including malware, adware and PUPs. Cure your computer & keep your privacy safe! Defeat viruses within few clicks instead of long-lasting and really boring manual procedures and get the help of security experts whenever you need it. A network security solution to clean system of viruses, help restore computer performance, and more.
BlueFiles

BlueFiles

by Forecomm

(0 reviews)
In a simple and fast way, send your sensible data with full confidentiality. With the BlueFiles virtual printer, send an encrypted copy of your native files with permanent control over printing, download, access period, recipients, even after dispatch, or simply right click on your original files or folders to transfer them. BlueFiles ensures the highest degree of confidentiality until reception of your data with a simple and user-friendly interface. In a simple and fast way, send you sensible data with full confidentiality
BitRaser

BitRaser

by Stellar Data Recovery

(0 reviews)
It is a Secure, reliable and cost effective data erasure solution to erase data permanently at end of life cycle of IT assets such as PCs, servers, rack mounted drives, and smartphones. The software erase data using US dod (3/7 pass), NIST algorithms and 25 others erasure algorithm. BitRaser is a plug and play software that completely erases data beyond the scope of data recovery.
Encryptionizer

Encryptionizer

by NetLib Security

(0 reviews)
Transparent Data Encryption for any application or database on the Windows Platform. Physical, Virtual or Cloud. SQL Server, MySQL, Web Servers, Legacy Applications. With Centralized Key Management. No programming required. Transparent Data Encryption for any application or database on the Windows Platform.
Cornerstone MFT Server

Cornerstone MFT Server

by South River Technologies

(0 reviews)
Cornerstone MFT offers secure file transfer & collaboration with multi-layer security, high availability & automation. PCI & HIPAA compliant, the Cornerstone solution offers point-to-point encryption, perimeter security & 2-factor authentication. Improving productivity while enhancing security, Cornerstone enables users to easily incorporate this highly secure solution into existing work processes. Cornerstone MFT Server is a Managed File Transfer Server with multi-layer security, high availability and automation.
SecureCircle

SecureCircle

by SecureCircle

(0 reviews)
The first security product designed to meet the challenges of securing & managing unstructured data in a zero-trust word. Unlike existing technologies, SecureCircle provides a transparent solution which is always encrypted, trackable, and retractable. SecureCircle helps companies within healthcare, finance, manufacturing, pharma, media, and government organizations meet data security and compliance requirements. SecureCircle helps organizations ensure the security, visibility, and control of unstructured data from internal and external threats.
SecuredTouch

SecuredTouch

by SecuredTouch

(0 reviews)
SecuredTouch provides behavioral biometrics for mobile, continuous authentication technologies to strengthen security and reduce fraud. SecuredTouch provides behavioral biometrics for mobile, continuous authentication technologies to strengthen security and reduce fraud.
Driver Genius 18 Professional

Driver Genius 18 Professional

by Avanquest Software

(0 reviews)
Automatic driver detection: - Schedule the analysis of your drivers - Have Notifications for the new drivers Download: - Download and automatically install from a database of more than 600.000 drivers Backup: - Have a complete history of your drivers - Save your PC drivers - Choose a download location for your drivers - Clone your drivers in an auto-installation file Cleaning and optimisation: - Uninstall the unwanted drivers: - Identify the devices which are not working Driver Genius will find the drivers your PC needs, so your applications run smoothly and your PC operates at peak performance
NCR Network & Security Services
NCR Network and Security Services protects restaurant and retail network and IT infrastructures with a multi-layered security defense solution. NCR Network and Security Services protects restaurant and retail network and IT infrastructures with a multi-layered security solution.
RollBack Rx Pro

RollBack Rx Pro

by Horizon Datasys

(0 reviews)
RollBack Rx is an instant time machine for your PC. A comprehensive Windows System Restore solution that empowers users and IT administrators to easily restore their PCs to any previous state within seconds. RollBack Rx offers a fresh approach to managing PCs. Any unforeseen incidents such as user errors, viruses or even botched software installations can be easily and absolutely reversed in a fast and efficient way. A comprehensive Windows System Restore solution that empowers users to easily restore their PCs to any previous state within seconds.
VMRay

VMRay

by VMRay

(0 reviews)
VMRay Analyzer is an automated malware analysis and detection product with a revolutionary agentless, hypervisor-centric dynamic analysis engine at its core. Combined with rapid static analysis and reputation engines, it enables malware analysts and incident response professionals to monitor, analyze and identify threats and extract indicators of compromise (IOCs). VMRay Analyzer helps security teams analyze and detect advanced, targeted malware by offering an automated malware analysis solution.
IPdiva Cleanroom

IPdiva Cleanroom

by Systancia

(0 reviews)
IPdiva Cleanroom is a solution combining PAM, VDI, SSO and VPN technologies to provide a single-use, sterile and monitored work environment that meets growing security requirements. IPdiva Cleanroom provides a virtualized, fully sealed and recyclable workstation for every use in association with password policy enhancement mechanisms, real-time monitoring of actions taken on critical resources and secure mobility. IPdiva Cleanroom provides a single-use, sterile and monitored work environment.
Syspeace

Syspeace

by Treetop Innovation

(0 reviews)
Anti-hacking software protecting against brute force attacks on Microsoft servers. Anti-hacking software protecting against brute force attacks on Microsoft servers.
Intrusta

Intrusta

by iSubscribed

(0 reviews)
Intrusta's goal is to make online security simple. Whether it's using our software, paying your bill, or chatting with a customer service agent, we've taken great efforts to make every interaction enjoyable and easy. Intrusta's software is very lightweight, unlike other products that consume RAM and eat into your battery leaving your system struggling to cope. Intrusta focuses on the bare essentials and fulfills the main purpose efficiently. Completely securing your computer from harm's way. Intelligent scanning software that works quietly in the background finding and fixing issues so you never have to think about it.
SearchLight

SearchLight

by Digital Shadows

(0 reviews)
Digital Shadows monitors and manages an organization's digital risk, providing relevant threat intelligence across the widest range of data sources within the open, deep, and dark web to protect their brand, and reputation. Digital Shadows monitors an organization's digital risk, providing relevant threat intelligence across the open, deep, and dark web.
R&S®Web Application Firewall

R&S®Web Application Firewall

by Rohde & Schwarz Cybersecurity

(0 reviews)
The R&S®Web Application Firewall is the holistic security suite for web applications, web services and APIs. The R&S®Web Application Firewall plays an important role in setting up and implementing an application security strategy. It blocks application-level attacks, including the OWASP Top 10, monitors the use of Web applications to guard against insider threats, is highly scalable and available for local deployment as well as cloud environments. R&S®Web Application Firewall protects business-critical web applications against threats and known and unknown attacks, including OWASP