Best IT Security Software - Page 5

Compare the Top IT Security Software as of May 2025 - Page 5

  • 1
    ThreatAdvice Breach Prevention Platform
    Data security is your business’ biggest threat & the one that is the hardest to manage... Reduce your security burden with ThreatAdvice vCISO, our flagship comprehensive cybersecurity solution. The vCISO solution provides oversight into all of your cybersecurity needs, and ensures that the proper protocols are in place so that the likelihood of a cybersecurity event is significantly reduced. ThreatAdvice vCISO provides employee cybersecurity training and education, intelligence on potential cyber threats & a comprehensive cybersecurity monitoring solution delivered through our proprietary dashboard. Sound interesting? Sign up for a no-pressure demo today!
  • 2
    SharePass

    SharePass

    SharePass

    SharePass is a SaaS Secret Management platform that allows sharing and managing secrets and confidential information using a web application, extension, or mobile app. SharePass works with encrypted links transmitted from the sender to the receiver with various settings and flags. The settings include expiry restriction, availability, IP restrictions and an entire filtering funnel (patent pending). SharePass is platform-independent that can be used with your existing communication tools. When it comes to your privacy, SharePass or any of its employees cannot see the content of your secrets; the secrets can be seen only by the exchanging parties. SharePass meets the latest cybersecurity compliance and regulations. In the era of identity theft, SharePass will protect you and prevent your data from leaking to the dark web by eliminating your digital footprint. SharePass supports SSO with Office365, Google Workspace, MFA, and integration with Yubikeys for maximum security.
    Leader badge
    Starting Price: Free
  • 3
    Queue-it

    Queue-it

    Queue-it ApS

    Queue-it empowers organizations to deliver seamless user experiences and protect their brand reputation by controlling online traffic. Crashes and slowdowns threaten even the biggest of businesses. They impact sales, frustrate visitors, and damage reputation and trust. Traffic management solutions equip brands to protect themselves against the threat of downtime. Queue-it’s cloud-based virtual waiting room lets organizations control web traffic to deliver a fair and frictionless user experience, no matter the demand. It gives organizations peace of mind and confidence on their busiest days, so they can focus on delivering customers and citizens the experience they deserve. Since Queue-it’s first waiting room went live in 2010, over 50 billion users have passed through our system. Today, we have offices in Copenhagen, Minneapolis, and Sydney, and people joining our queues from 172 countries around the globe.
  • 4
    Fusion Framework System

    Fusion Framework System

    Fusion Risk Management

    Fusion Risk Management's software, the Fusion Framework System, enables you to understand how your business works, how it breaks, and how to put it together again. Our platform provides easy, visual, and interactive ways to explore every aspect of your business so you can identify single points of failure and key risks. Achieve resilience with greater speed and efficiency with Fusion’s flexible and integrated suite of platform capabilities that can be tailored to best fit the needs of your organization. We meet you wherever you are on your journey for more resilient operations. - Map critical service and product delivery processes as they actually are - Leverage objective risk insights that help you audit, analyze, and improve your business operations - Plan, orchestrate, and measure risk management and resilience activities with confidence - Leverage automation to reduce the burden of manual, time-consuming, repetitive tasks, freeing teams for higher value activities
  • 5
    Auth Armor

    Auth Armor

    Auth Armor

    Harness the power of biometrics on smartphones to make authentication easy for any application or website, creating a new approach to logging and authenticating online. Passwordless and 2-factor authentication that lets you authenticate your users with the smartphones in their pockets. Auth Armor puts secure authentication in the hands of every user — no weak passwords or cumbersome codes. We have built powerful APIs, SDKs, libraries, and dashboards to allow you to build what you want to build, how you want to build it. Use our tools to build authentication into any app, using any flow you would like. We offer Consumer facing and workforce protection, giving you the power and flexibility to secure anything, the way you need it. Auth Armor is the fastest and easiest mobile authenticator available. We support instant push messaging directly to user's devices enabling the fastest login and authentication experience.
    Starting Price: FREE for 10,000 active users!
  • 6
    GateKeeper Enterprise

    GateKeeper Enterprise

    Untethered Labs, Inc.

    Passwordless, proximity login to PCs, Macs, websites, and desktop applications. Hands-free, wireless 2FA and password manager through active proximity-detection. IT admins can dynamically allow users to log in to their computers and websites with a physical key either automatically, by touch, by pressing Enter, or with a PIN. Seamlessly login, switch users, switch computers, and logout without passwords, touch, or trouble - just a key. Once a user walks away, the computer will lock, blocking access to the computer and web passwords. With continuous authentication, users are always being checked to ensure that they require access. No more typing passwords. Admins and compliance can now automate password security from a central admin console: enforce stronger passwords, enforce 2FA, and give employees the power of password-free login without interrupting workflow. Reduce helpdesk tickets related to forgotten passwords/password resets. Login and auto-lock with proximity.
    Starting Price: $3/user/month
  • 7
    Hexnode UEM

    Hexnode UEM

    Mitsogo Inc

    Hexnode, the enterprise software division of Mitsogo Inc., is a Unified Endpoint Management solution with cross-platform functionalities. Hexnode supports all major operating systems, including iOS, iPadOS, Android, Windows, macOS, tvOS, Linux, ChromeOS, visionOS, Apple TV, Android TV, and fireOS, and offers out-of-the-box enrollment methods. The entire device lifecycle, starting from enrollment to device retirement, can be monitored and managed from a unified console. Features such as automated device enrollment, geofencing, Remote Monitoring and Management, patch management, and a simple and intuitive UI makes it the perfect tool for device management. In addition, Hexnode offers a wealth of tools perfect for today's increasingly mobile, modern teams, which includes an intuitive dashboard for greater visibility and control over mobile devices across the enterprise, web filtering for security, location tracking, and so much more.
  • 8
    Massdriver

    Massdriver

    Massdriver

    At Massdriver, we believe in prevention, not permission, letting ops teams enforce guardrails while developers deploy confidently. Our platform encodes your non-negotiables into self-service modules built with your preferred IaC (Terraform, Helm, OpenTofu, etc.) standardizing infrastructure across AWS, Azure, GCP, and Kubernetes out-of-the-box. By bundling policy, security, and cost controls into functional IaC assets, Massdriver cuts overhead for ops teams and speeds developer workflows. Through a central service catalog, developers can provision what they need with integrated monitoring, secrets management, and RBAC baked in. No more brittle IaC pipelines; ephemeral CI/CD spins up automatically from each module’s tooling. Scale faster with unlimited cloud accounts and projects, all while reducing risk and ensuring compliance. Massdriver—fast by default, safe by design.
    Starting Price: Free trial
  • 9
    MyChat

    MyChat

    Network Software Solutions

    Secure instant messaging system with own server that can work in local area network and over the Internet. Providing collaboration tools for employee engagement. Built-in knowledge base, important notifications with return receipts, Bulletin board, broadcast messages, flexible server management, the system for user rights to access MyChat features, voice/video calls, screen sharing calls, Kanban project management, conferences, private dialogues, extended contact list, available for all platforms: Windows, macOS, Linux, Android, iOS, WEB.
    Starting Price: $6/per user/one-time
  • 10
    SafeNetClub

    SafeNetClub

    SSH Invest Holding GmbH

    SafeNetClub is an antivirus software that protects your PC against cyber threats. The application is connected with a realtime virus database to scan the system, all incoming traffic and files to avoid damage of the computer, spy attacks and data theft. SafeNetClub blocks all attempts to steal user related data like passwords, credit card details and other sensitive information of the user from being stolen in Internet. SafeNetClub is easy to install and provides a simple user-friendly interface. The system check can be started on click, but is also active in background while you are surfing in internet. If you visit a suspicious website that would trying to attempt your personal data or sending to your PC a spy virus, it will be blocked. The virus database will be updated daily. SafeNetClub is designed to provide the best security by using the lowest CPU of your PC as possible. Your hardware will not be overloaded by the system files running on background.
    Starting Price: $10 per month
  • 11
    Relianoid

    Relianoid

    Relianoid

    Designed to elevate your online services to unparalleled levels of performance, reliability, and security, our ADC solution ensures seamless traffic distribution, enhanced resource utilization, and fortified protection against potential cyber threats. Providing you massive scalability, high availability, and increased security for your services, applications, and networks. Unlimited throughput, connections, farms, and optimized for multi-core with broad hardware compatibility. No need for installation that allows a quick production consolidation, ensuring a seamless deployment process. Integrated easily in your infrastructure ensuring a productive and cost-saving setup and maintenance. Sharing hardware resources reduces costs associated with physical hardware, making it a budget-friendly option. Ready for 64 bits platforms in order to provide better performance and a more robust environment. It permits to assign more resources in terms of performance than other architectures.
    Starting Price: $1,356 one-time payment
  • 12
    CacheGuard

    CacheGuard

    CacheGuard Technologies

    CacheGuard-OS transforms a virtual or bare metal machine into a powerful and easy to handle network appliance. It's a Linux based Operating System built from scratch and especially designed to Secure and Optimize the network traffic. Great care has been taken by CacheGuard-OS developers to select the best of the best Open Source technologies to integrate into CacheGuard-OS. The result is a robust and trustworthy solution that can be up and running within minutes. CacheGuard-OS integrates Open Source software such as but not limited to OpenSSL, NetFilter, IProute2, StrongSwan, ClamAV, Apache, ModSecurity, Squid and Open Source developments made by CacheGuard-OS developers.
    Starting Price: $9.99 per month
  • 13
    Hackrate

    Hackrate

    Hackrate

    Check us out at hckrt.com! 🔐 Hackrate Ethical Hacking Platform is a crowdsourced security testing platform that connects businesses with ethical hackers to find and fix security vulnerabilities. Hackrate's platform is designed to be easy to use for both businesses and ethical hackers. Hackrate's platform is a valuable tool for businesses of all sizes. By crowdsourcing their security testing, businesses can gain access to a large pool of experienced ethical hackers who can help them find and fix security vulnerabilities quickly and efficiently. If you are looking for a way to improve the security of your business's systems and applications, then Hackrate Ethical Hacking Platform is a great option to consider.
    Starting Price: €250/month
  • 14
    FastPass SSPR

    FastPass SSPR

    FastPassCorp

    FastPass enhances user protection against identity theft. The combination of FastPass SSPR and FastPass IVM, integrated into FastPass Suite, boosts productivity for end-users and help desk support, simultaneously safeguarding against social engineering attacks on the service desk. Preventing password theft from the help desk necessitates a secure IT workflow. FastPass IVM, available as a cloud or on-premises offering and certified by ServiceNow and others, enables dynamic and contextual verification. Tailored to individual user groups based on security policies, this solution incorporates information about the user's device usage and multi-factor authentication (MFAs), creating a robust defense against hackers. FastPass SSPR provides an advanced self-service solution for password resets and unlocks. It seamlessly supports passwords from AD, Entra, SAP, IBM, Oracle, LDAP, and other systems. All types of MFA and manager approval for verification.
    Starting Price: $0.20/user/month
  • 15
    TrustMAPP

    TrustMAPP

    TrustMAPP

    TrustMAPP provides customers with a continuous process of measuring, reporting, planning and cintinuous improvement. Provides information security leaders with a real-time view of the effectiveness of their cybersecurity program while aligning to business objectives and risk. TrustMAPP provides the story of where you are, where you’re going, and what it will take to get there. From a single source of data, or from multiple integrations, an organization’s security posture is visible based on stakeholder perspectives: CISO, C-Suite, and Board. TrustMAPP gives organizations the ability to manage security as a business, quantifying and prioritizing remediation actions and costs.
  • 16
    Virtual Safe Business Professional
    Virtual Safe Business Professional is business software that allows you and your employees to manage virtual, encrypted directories in your IT infrastructure. Master Data Management: The individual virtual safes can be flexibly expanded to include master data. Expand your safes with an item or customer number or a processing status, for example. Safe-Search: You or your employees can then use the integrated search function to filter according to your master data. Master-Password: Critical operations can be secured with a master password and, of course, all safes can be opened with it. Collaboration: When working in a team, it is important that the software supports you. Therefore the type of access can be selected by the user. The software also recognizes when a safe is already being processed. In this case, all employees can still read the safe data. Company standards are mapped and distributed to business areas via common configuration directories.
    Starting Price: €49/user
  • 17
    AppSealing

    AppSealing

    INKA Entworks

    AppSealing - the AI-powered next-gen AppShielding solution crafted to enable organizations to prevent mobile app attacks and deal with sophisticated threat landscapes with perfect precision in just 3 simple steps. AppSealing brings the benefits of DevSecOps to Mobile Apps with a ZERO-FRICTION, ZERO-CODING Approach. Get the best of Defense-in-depth security and regulatory compliance in a single solution for mobile apps AppSealing is trusted by industries like Fintech/Banking, O2O, Movie Apps, Gaming, Healthcare, Public apps, E-commerce, and others globally.
    Starting Price: $129/app/month
  • 18
    ManageEngine Applications Manager
    ManageEngine Applications Manager is an enterprise-ready platform designed to monitor an entire application ecosystem of a business organization. Our platform helps IT and DevOps teams get visibility into all the dependent components within their application stack. With Applications Manager, it becomes easier to monitor the performance of mission-critical web applications, web servers, databases, cloud services, middleware, ERP systems, messaging components, and more. It has tons of features that fast-track the troubleshooting process and help reduce MTTR. This way, issues are fixed before application end-users are affected. Applications Manager has a fully functional dashboard that can be customized to get performance insights at a glance. By configuring alerts, it constantly keeps a lookout for performance issues within the application stack. Combining this with intelligent machine learning, Applications Manager helps turn performance data into actionable insights.
    Starting Price: $395.00/Year
  • 19
    Bugfender

    Bugfender

    Beenario

    Remote logger, crash reporter and in-app user feedback Bugfender is a log storage service for application developers. Bugfender collects everything happening in the application, even if it doesn’t crash, in order to reproduce and resolve bugs more effectively and provide better customer support. Bugfender respects your user's privacy, is battery and network efficient and keeps logging even if the device is offline. Track and destroy bugs before users even notice. Bugfender logs all bugs on all devices and sends the results in seconds - enabling you to find and fix bugs before your users even get an error message. Achieve 5-Star Ratings. Bugfender doesn’t just log bugs and crashes. It logs all the information you’ll ever need so you can build a clear picture of your users and earn those crucial five-star ratings. Deliver world-class customer service. Our logging tool enables you to target individual users and provide personalized customer support.
    Starting Price: €29 per month
  • 20
    ABLE Platform

    ABLE Platform

    ABLE Platform

    ABLE Platform is a multimodule web software that covers the entire loan origination and loan management processes. The following modules are included: - Landing page - to attract new borrowers. - Borrower portal - to serve actual borrowers. - Self-service portal - to manage the whole enterprise activity. - Back-office - the core of the platform to manage incoming loan applications, service disbursed loans, configure the loan product catalog, built-in dashboards and more. The platform automates the lending process throughout all the stages: - Initiation of omnichannel application - Consolidation and restructuring of debts - Negotiation with customers - Application decision-making - Personalized offers - Automation of the loan disbursement ABLE Platform serves any type of loan: - Payday Loan - Personal Loan - Point of Sale Loan (POS) - Buy Now, Pay Later (BNPL) - Mortgage Loan - Home Equity Loan - Auto Loan (Car finance) - Student Loan, etc
  • 21
    Quantum Armor

    Quantum Armor

    Silent Breach

    Your attack surface is the sum of every attack vector that can be used to breach your perimeter defenses. In other words, it is the total quantity of information you are exposing to the outside world. Typically, the larger the attack surface, the more opportunities hackers will have to find a weak link which they can then exploit to breach your network. Professional hackers typically follow the cyber kill chain when attacking a target, and surveying the target's attack surface is normally the very first step in this process; what is known as advanced reconnaissance. Reducing the attack surface can minimize risk further down the cyber kill chain, preventing attacks before they even occur by eliminating potential attack vectors as early as possible. The cyber kill chain is a method of categorizing and tracking the various stages of a cyberattack from the early reconnaissance stages to the exfiltration of data.
    Starting Price: From $49/asset/month
  • 22
    Perimeter 81

    Perimeter 81

    Check Point Software Technologies

    Perimeter 81 is transforming the world of secure network access and helping businesses of all industries and sizes smoothly transition to the cloud. Unlike hardware-based firewall and traditional VPN technology, Perimeter 81’s cloud-based and user-centric Secure Network as a Service utilizes the Zero Trust approach and SASE model framework to offer greater network visibility, seamless onboarding, and automatic integration with all the major cloud providers. Named a Gartner Cool Vendor, Perimeter 81 is considered by industry leaders to be winning the “SASE space race". Network security doesn’t have to be complicated – join Perimeter 81 on a mission to radically simplify the cybersecurity experience!
    Starting Price: $8 per user per month
  • 23
    Imunify360

    Imunify360

    CloudLinux, Inc.

    Imunify360 is a security solution for web-hosting servers. Imunify360 goes beyond antivirus and WAF and is a combination of an Intrusion Prevention and Detection system, a Application Specific Web Application Firewall, Real-time Antivirus protection, a Network Firewall, and Patch Management components in one security suite. Imunify360 is a fully-automated solution and it collects all statistics under an intuitive dashboard.
    Starting Price: $12
  • 24
    Visual Expert
    Visual Expert is a static code analyzer for Oracle PL/SQL, SQL Server T-SQL, and PowerBuilder. Identify code dependencies to modify your code without breaking your application. Scan your code to improve the security, performance, and quality. Perform Impact analysis to Identify breaking changes. Automatically scan your code to detect and fix security vulnerabilities, bugs and maintenance Issues. Implement continuous code inspection Understand the inner workings of your code with call graphs, code diagrams, CRUD Matrix and Object Dependency Matrix (ODM). Automatically generate an HTML Source Code documentation. Explore your code exploration with hyperlinks Compare applications, databases or pieces of code. Improve maintainability. Clean up code. Comply with dev standards. Analyze and Improve DB code performance: Find slow objects and SQL queries, Optimize a slow object, a Chain of calls a slow SQL, Get a query Execution Plan. And much more.
    Starting Price: $495 per year
  • 25
    ManageEngine Network Configuration Manager
    Network Configuration Manager is a multi-vendor network change, configuration and compliance management (NCCM) solution for switches, routers, firewalls and other network devices. NCM helps automate and take total control of the entire life cycle of device configuration management. Schedule device configuration backups, track user activity and spot changes by comparing configuration versions all from a centralized web GUI. Monitor configuration changes, get instant notifications and prevent unauthorized changes to make your networking environment secure, stable and compliant. Define standard practices and policies, check device configurations for violations and readily apply remedial measures to ensure device compliance. Save time by automating repetitive, time-consuming configuration management tasks and also by centrally applying configuration changes to devices in bulk.
    Starting Price: $238
  • 26
    JM-Crypt

    JM-Crypt

    JM-Crypt

    Low-cost professional and multi-platform software (Windows - Android) intended to encrypt sensitive data such as documents or photos in order to protect them from theft or ransom. Ideal for VIPs or liberal professions such as lawyers, medical professions etc. Consult our detailed product sheets on MS Store - "JM-Crypt PC" and Play Store - "JM-Crypt Mobile". Our software install on your device, with no IT backdoor, no remote servers, no third parties, no sponsorship, no pub and this for a derisory cost and an unlimited duration. Our software use the best known algorythm : AES-256 – CBC – PKCS official unaltered version with authentication (encrypt-then-mac) and random IV (initialization vector). Hash functions and HMAC: SHA3 – 256. Better than full disk encryption slowing down your computer's performance, "JM-Crypt PC" can target for fast serial encryption specific folders or file extentions of your choice.
    Starting Price: $2.99 (Android) - $9.99 (PC)
  • 27
    Runecast

    Runecast

    Runecast Solutions

    Runecast is an enterprise CNAPP platform that saves your Security and Operations teams time and resources by enabling a proactive approach to ITOM, CSPM, and compliance. It automates vulnerability assessment, configuration drift management and continuous compliance – for VMware, Cloud and Containers. By proactively using our agentless scanning in real-time admins discover potential risks and remediation solutions before any issues can develop into a major outage. It provides continuous audits against vendor best practices, common security standards, and frameworks such as BSI IT-Grundschutz, CIS, Cyber Essentials, DISA STIG, DORA, Essential 8, GDPR, HIPAA, ISO 27001, KVKK, NIST, PCI DSS, TISAX, VMware Security Hardening Guidelines, and the CISA KEVs catalog. Detect and assess risks and be fully compliant across your hybrid cloud in minutes. Runecast has been recognized with Frost & Sullivan's 2023 European New Product Innovation Award in the CNAPP industry.
  • 28
    IceIT

    IceIT

    Quantum Knight, Inc

    IceIT is an always-free desktop utility for encrypting files quickly and easily using quantum-strength encryption. In addition to the community edition, IceIT includes available commercial upgrades for creating always-on sharing and private networks that allow securing files and folders across multiple users and groups, without the need for a centralized cloud account. IceIT frees you to confidently use your email, text message, and legacy communication mediums without worry. Got backups that you want to protect? Just IceIT!
    Starting Price: 0
  • 29
    Carbide

    Carbide

    Carbide

    Get compliant, prevent breaches, and save money with a security and privacy program that doesn’t slow down your growth. While “checkbox”-style security and privacy can seem attractive, it builds security debt that multiplies with each new regulation and every new security questionnaire. Instead, Carbide makes enterprise-class security accessible to companies of all sizes. That means that start-ups get the step-by-step support they need to design and implement strong security and privacy, while established security teams gain back valuable time by capitalizing on the automation and efficiency provided by the platform. Adopting a security and privacy posture that goes beyond checkbox compliance is possible even without a large security team. Carbide breaks down enterprise-class security and privacy requirements and makes them accessible to, and achievable by, companies of all sizes.
    Starting Price: $7,500 annually
  • 30
    NetFlow Analyzer

    NetFlow Analyzer

    ManageEngine

    NetFlow Analyzer is a comprehensive traffic analysis tool that leverages flow technologies to provide real-time visibility into network bandwidth performance. NetFlow Analyzer is primarily a bandwidth monitoring tool, which has optimized thousands of networks globally, offering a holistic view of your network bandwidth and traffic patterns. NetFlow Analyzer is a unified solution that collects, analyzes, and reports on your network's bandwidth usage, and by whom. NetFlow Analyzer is your partner in optimizing bandwidth usage across a million interfaces globally, as well as providing network forensics and network traffic analysis. Reconfigure policies with traffic shaping via ACLs or class-based policies to gain control of the applications that use the most bandwidth. NetFlow Analyzer leverages Cisco NBAR technology to give you deep visibility into Layer 7 traffic and recognize applications that use dynamic port numbers or hide behind known ports.
    Starting Price: $245