Top Computer Security Software Products

2,000+ businesses use Capterra each week to find the right software.

OneLogin provides a cloud-based identity and access management (IAM) solution that offers simple single sign-on (SSO), making it easier for companies to secure and manage access to web applications both in the cloud and behind the firewall. Does your company have three or more SaaS or internal web apps? If so, then you will benefit from the security of a cloud-based single sign-on solution like OneLogin. Learn more about our solution from our whitepapers and webinars. Learn More

CipherCloud for Salesforce addresses data privacy, residency, security, and compliance concerns so that organizations can confidently deploy Salesforce.The CipherCloud solution understands Salesforce metadata and provides organizations with the ability to easily tag any standard and custom fields, files, and attachments as sensitive. Once configured, the CipherCloud solution secures this data and prevents it from being leaked to unauthorized users, while working seamlessly with Salesforce. Learn More

Secure, multi-user password management software for IT professionals. One central vault for securing passwords and more. Easy deployment - 30 to 60 minutes. Installed on-premise (runs on a VM if you want). Free 30 Day Trial. Integrated with Active Directory. Changes passwords on AD, Windows, SQL Server, Sybase, Oracle, MySQL, UNIX/Linux, Cisco, Juniper and even more. Also take control of your Service Account passwords (find where service accounts are used and automatically change passwords). Learn More

Corner Bowl Log Manager

by Corner Bowl Software

Log monitoring, consolidation, auditing and reporting tool that allows users to monitor networks and satisfy auditing requirements. Learn More

Protect users against malicious programs such as viruses, worms, Trojans, hackers, spam and other forms of intrusion. Learn More

PDF document security software with US Government strength encryption and DRM digital rights management controls. Learn More


by GamaSec

Website security test to protect application and server against hackers. Learn More


by CurrentWare

provides a proactive solution for securing company endpoints (USBs, CD/DVDs, BlueTooth, WiFi, FireWire, iPods, MP3s). Learn More


by Viwal Interactive

Unicode-enabled checksum utility for Windows, will help to prevent accidental or intentional damaging of your data. Learn More


by ActivIdentity

Provides multi-factor, strong authentication to a variety of services on PCs. Learn More

Active Shield

by Security Stronghold

Protects your computer from trojans, spyware, adware, trackware, dialers, keyloggers, and even some special kinds of viruses. Learn More

Activeworx Enterprise

by CrossTec

Secure, cross-platform, remote support, management, inventory, file transfer and scripting software. Learn More


by Faronics

Faronics Anti-Executable ensures total endpoint productivity by only allowing approved applications to run on a computer or server. Learn More

Aobo Filter for PC

by Awosoft

Aobo Filter for PC automatically blocks porn, websites and programs via keywords, URLs and app names. Learn More

Apriva ISS

by Apriva

DoD certified software to encrypt secure mobile communications and ensure user authenticity via email, card reader, and more. Learn More


by Labyrinth Information Systems

Internet exposure management software that gives organisations the environment to deploy defences against attacks. Learn More

Astaro Security Gateway

by Astaro Internet Security

Unified threat management solution providing complete email, Web and network protection. Learn More

AVG Internet Security

by AVG Technologies

AVG helps you grow your business knowing that your data and online communications are protected. Learn More


by LatinSecurity

Hardware & services IP monitoring application that is easy to use and includes full Web access. Learn More


by CBR Software

Network automation software that aims at personalizing security systems. Learn More

BorderWare Firewall Server

by BorderWare Technologies

Integrated solution that eliminates vulnerabilities and costs associated with a separate firewall and operating system. Learn More

Calyx Suite

by Open Seas

Includes two factor sign-on, access control, encryption, personal firewall using smart cards, USB or biometrics. Learn More

A comprehensive security software application that is easy to deploy and scales to the largest of global networks. Learn More

Companies can successfully navigate today's regulatory environment and increase business value by automating IT security functions. Learn More


by Absolute Software

Centrally manage laptops and PCs off the network from a single web-based interface. Learn More

Enables access to information through encryption, providing information security, privacy and confidentiality. Learn More


by ControlCase

Comprehensive computer security incident management system. Learn More

Prevents unauthorized use of enterprise data by policy-based control of access to portable devices/removable media. Learn More

A security scanner and commercial patch manager that integrates with Microsoft WSUS & SCCM for easy deployment of security patches. Learn More

Crypto Complete

by Linoma Software

Encryption and tokenization software that protects sensitive data using strong encryption, integrated key management and auditing. Learn More


by InfoExpress

Network-ready solution that automatically detects, audits, quarantines and remediates endpoints. Learn More

DiamondCS ProcessGuard

by Diamond Computer Systems

Increases the security of your computer by preventing processes from being able to attack each other. Learn More

Digital Vaccine

by TippingPoint

Enterprise, customizable solution that automatically addresses critical vulnerabilities, exploits and Zero Day threats. Learn More


by Securstar

Protects all proprietary data on notebooks and desktop computers 100% of the time without users having to think about security. Learn More

east-tec Eraser 2014

by East-Tec

Keep what you do on your computer to yourself! Protect your privacy and files! Learn More

EnCase Enterprise

by Guidance Software

Enables analysis to respond to security incidents, perform investigations and conduct audits. Learn More


by Encryption Security Solutions

Best in class encryption security products for business, governmental and individual needs. Learn More


by SentryBay

Protects users' logins from all keylogging spyware - for both PC and web-based applications. Learn More

eScan ISS

by MicroWorld Technologies

A complete security suite which provides essential protection against viruses, objectionable content, hackers and privacy threats. Learn More

F-Secure VPN+

by F-Secure

Provides strong encryption, supports multiple protocols, security standards & authentication methods. Learn More


by Check Point Software Technologies

Firewall that provides access control, content security, authentication and centralized management. Learn More

Folder Castle

by MagneticSoft

Protects your personal data from snoopers and thieves. You can either lock away files and folders, or put them into Secure Storage with on-the-fly AES-256 encryption. Learn More

ForeScout CounterACT Edge

by ForeScout Technologies

Security hardware that monitors the perimeter and preempts targeted attacks. Learn More

Fortres 101

by Fortres Grand

Reliable security software for student access. Fortres 101 limits computer access to only programs, files, and Web sites you allow. Learn More

G Data Internet Security 2013

by G Data Software

Comprehensive antivirus protection package with behavior checking, parental controls, and idle scanning. Learn More


by Internet Biometric Security Systems

On demand biometric security solution for any type of internet application requiring security of confidential information. Learn More

Gold Antivirus

by M1 Group

Gold Antivirus: Free Edition offers a wide range of effective tools for keeping your computer safe for your business. Learn More

Manages and safeguards access to your data and lets you enforce a unified security policy across the enterprise. Learn More

Centralized management of users, groups and roles, role-based access control, entitlements and access policies. Learn More

IMCrypto Pro

by Global Information Technology

IMCrypto Pro uses in its work one of the most widely spread asymmetric encryption algorithms - RSA. Learn More

Indigo Secure

by Indigo Secure Business Internet Management Systems

Internet Management and Security Software System for managing and monitoring internet use. Learn More

IntelliTrack Network

by Soni-Soft

Intelligence software system for security, loss prevention and audit organisations in the retail & financial sectors. Learn More

Internet Lock

by TopLang Software

Ppassword protect or deny any program from accessing internet. Protect or deny all programs from accessing the special TCP ports. Learn More

Invisible Secrets

by NeoByte Solutions

Security software that encrypts your data and files for safe keeping or secure transfer across the net. Learn More


by SoftForYou

Internet filtering software providing schools, libraries and other public-use computers protection from harmful content. Learn More


by LucidLink

Secures your 802.11 wireless LAN with the same technology used by Fortune 500 companies. Learn More

Patch management solution that delivers centralized control of your entire vulnerability management process from a single location. Learn More

Simplifies protecting files, file transfers, and application data while improving security; uses PGP encryption. Learn More


by InetSolution

Uses powerful encryption to secure databases at the cell level and can encrypt email messages and flat files on your network. Learn More


by Clearswift

Content security software that enables businesses to protect themselves against digital attacks. Learn More


by Vircom

Robust, customizable email security solution that ensures a high catch rate and an almost non-existent false-positive rate. Learn More

MxM Secure

by Ezenia!

Provides real-time collaboration and information sharing, with military grade encryption for the security of your information. Learn More


by Logmatrix

Delivers integrated, real-time security management in a single, seamless suite. Learn More

NetIQ Sentinel 7

by NetIQ

Make decisive, appropriate responses to incidents by automating identification and resolution processes. Learn More

NetSupport Protect

by NetSupport

The #1 choice of IT admins and tech coordinators to protect Windows┬┐┬┐ operating systems and desktops from unwanted or malicious changes. Learn More

Network security audit system designed to audit network and detect available security vulnerabilities in the network. Learn More

Network Security Manager

by Intellitactics

Threat management software that enables you to police, prioritize and prevail across the full range of today's security threats. Learn More

Safeguard your network against undesirable Internet content while maintaining exceptional performance levels. Learn More

Password Reset

by Special Operations Software

Self Service Password Reset for Active Directory. Deploy a solution that saves you $1000's in lost productivity and support costs. Learn More

Secures the Windows Operating System from unwanted or malicious writes. Learn More


by BeyondTrust

Access Control and Authentication; identify and strengthen your security's weak points, manage access and allocate privileges. Learn More

Out of the box protection and automated policy building with adaptive learning allow for fast track web security. Learn More

PureSight CSDK/OEM

by PureSight Technologies

Easily integrated into Internet security suites/appliances to provide content filtering capabilities to your offerings. Learn More

Monitors the vulnerability management process, tracks remediation and ensures policy compliance. Learn More


by LogMeIn

Monitor your systems, get alerts and resolve issues remotely. Learn More

Retina Network Security Scanner

by eEye Digital Security

Combines advanced scanning technology with most comprehensive vulnerability database. Learn More

Rohos Logon Key

by Teslain

Two-factor authentication solutions for Windows. Secure USB Key logon. Learn More

RollBack Rx

by Horizon Datasys

Robust system restore utility that enables home users and IT professionals to easily restore a PC to a time before certain events occurred. Learn More

RSA Keon

by RSA Security

Public key infrastructure; enables, manages and simplifies the use of digital certificates. Learn More


by Utimaco

A comprehensive solution portfolio that guarantees your organization to cover all data security requirements the way you want. Learn More

SafeWord PremierAccess

by Secure Computing

Gives you control over who can access your Web, VPN, and network applications with multiple authentication options. Learn More

Integrated Vulnerability Management, Penetration Testing, Compliance, and Configuration Audit software. Learn More

SecuBox for Pocket PC

by Aiko Solutions

User-friendly encryption software for Windows driven PDAs and smartphones. Learn More

Secure Audit Vault

by Kinamik

A software solution for data integrity protection that centralizes and preserves sensitive data, and makes it tamper-evident. Learn More

Secure CommNet

by Radient Software

A 32-bit Windows application for secure shell (SSH2), telnet, and dial-up connections. Learn More

Secure Hive

by Secure Hive

Create encrypted archives and self-extracting .exe files for secure storage and file sharing. Learn More

SecureSuite XS

by I/O Software

Supports multiple authentication technologies on a single network. Learn More

Full-featured Security Information platform that correlates security events and data across applications, servers and security systems. Learn More

Security services platform is your company's security services, for your clients, and 100% private labeled for YOUR business. Learn More

Security Shield

by PCSecurityShield

Protects your business from viruses, spyware, Trojans, root-kits, hackers, adware and more. Learn More


by St. Bernard Software

Policy-based product; audit, enforce and report on managed machines with respect to their assigned policies. Learn More

SenSage 3.0

by SenSage

Allows for analyzation, monitoring and storage of event log data for compliance and insider threat detection. Learn More

SmartFix Security Center

by DefendGate

All-in-one system security solution including anti-spyware, firewall, intrusion detection, anti-spam, anti-virus, etc. Learn More


by Odyssey Technologies

Security gateway software with capabilities for providing digital certificate based authentication and non-repudiation services. Learn More

Security software that protects that devices and data. Includes anti-malware, patcch assessment, and website filtering. Learn More

SP Detect

by BlackStratus

Reliable access to comprehensive correlation, dynamic threat visualization, reporting and analytics. Learn More

Spy Sweeper Enterprise

by Webroot Software

Provides a distributed anti-spyware solution using a client/server architecture with centralized management & reporting. Learn More

Spyware Scanning

by Alfasoftware

Fast spyware scanning easily remove pests such as WinFixer, SpyAxe, SpyFalcon, and thousands more. Learn More

SSH Tectia

by SSH Communications Security

Enables secure system administration, secure file transfer and secure application connectivity with centralized control. Learn More


by StillSecure

Security testing, monitoring and management software that defends networks from security breaches. Learn More


by Stonesoft

Highly Available Firewall/VPN that provides Security, Manageability, Availability, and Scalability. Learn More

Protects enterprise assets and business transactions by ensuring fast and secure connections with the Internet. Learn More


by SecurePro Software

File Synchronization Application and Cloud Storage. Learn More


by RepairTech

Automate computer diagnosing and repair processes through a suite of tools that consists of TechUSB, D7(rt), and TechPortal. Learn More


by ComputerProx

Ultrasonic Proximity Sensor. When you leave the proximity of the PC, it automatically locks the system without requiring any keystrokes from you. Learn More


by Panda Software

Easy-to-use protection against viruses, spyware, hackers, spam and other Internet threats. Learn More

Tripwire for Servers

by Tripwire

Detect intentional tampering, user error, software failure, and introductions of malicious software. Learn More

TrustBearer Live

by TrustBearer Labs

Web smart card and identity solutions Learn More

Trustifier KSE

by Trustifier

Security solution for Unix-like OS. Separate system administrators from sensitive data to ensure security of your IT resources. Learn More

TweakEasy Professional

by WinSetter

A professional yet easy-to-use Windows tweaking utility with 2494 policies to configure. Learn More


by Baltimore Technologies

PKI; addresses key security concerns associated with the Web, and enables Intranets, Extranets, e-mail and VPNs. Learn More


by Secu Tech

A license management solution for audio, video, software, and web authentication. Learn More


by US Diversified Tech

Administrative control of USB ports, CD-RW and Bluetooth. Learn More

Validian ASI

by Validian

Manages all crucial security functions, including authentication, encryption and addressing. Learn More


by FaceTime Communications

Applications that enable real-time communication on any enterprise, private, or public IM network. Learn More


by Golden Frog

Manages its own network, and owns the hardware so we can deliver the fastest VPN speeds in the world Learn More

Web Gateway Security

by Marshal8e6

Appliance-based Internet filtering, application control, forensic reporting and monitoring and mitigation of Web-based threats. Learn More

The industry's fastest Web security appliance with a new scanning technology that enables signature-based spyware filtering. Learn More

WiKID Authentication System

by WiKID Systems

System for two-factor authentication that increases security, reduces costs and is very convenient to the end-user. Learn More

XenoCode 2005

by XenoCode

Powerful, flexible, and easy-to-use code security and deployment solution for .NET developers. Learn More

XyLoc Security Server

by Ensure Technologies

A server-based software platform that centrally manages and monitors XyLoc users and protected workstations throughout the enterprise. Learn More

ZoneAlarm Pro

by Zone Labs

PC firewall that keeps your personal data and privacy safe from Internet hackers and data thieves. Learn More

Filter Results: 122 Products

Number of Users

Looking for great reviews?  See our top computer security software reviews.

Related Categories