Top Computer Security Software Products

2,000+ businesses use Capterra each week to find the right software.


FEATURED PRODUCTS

OneLogin provides a cloud-based identity and access management (IAM) solution that offers simple single sign-on (SSO), making it easier for companies to secure and manage access to web applications both in the cloud and behind the firewall. Does your company have three or more SaaS or internal web apps? If so, then you will benefit from the security of a cloud-based single sign-on solution like OneLogin. Learn more about our solution from our whitepapers and webinars. View Profile

Identity management (IAM) and single sign-on (SSO) solution for companies of all sizes. Get started immediately with our free trial. View Profile

Avast for Business Premium Endpoint Protection is a premium simple and efficient solution to protect business data and files from malwares, cyber threats and attacks. No installation needed. Accessible and managed from anywhere. Protects your file, sharepoint, SBS, exchange and email servers, Windows and Macs. Companies can protect as many devices as needed. It includes also enhanced firewall, antispam and data shredder. View Profile

Avast provides businesses with premium, simple and efficient web based managed antivirus to protect data and files from cyber threats. View Profile

Passworks is an easy to use self-service solution that will help you to significantly reduce the costs associated with resetting Mac OS X and Windows Active Directory passwords. Users can securely reset their own password and continue working, lowering user downtime and freeing up valuable help desk resources Certero Passworks utilises Web technologies and can be administered using any modern Web-browser. View Profile

Passworks is an easy to use self-service solution working across both Windows and Mac OS X. View Profile

Clearlogin Cloud App Dashboard integrates with hundreds of apps and supports custom integrations. Grant and revoke access for groups and individuals with a single click. Give users access to the apps they use every day, from anywhere. Receive reports and alerts on all aspects of user access, including unsuccessful login attempts, password changes, geography and browser data. Mitigate potential risks and take comfort in an extra layer of security with enhanced authentication features. View Profile

Give users streamlined access to the applications they use every day, from anywhere. View Profile

Protect users against malicious programs such as viruses, worms, Trojans, hackers, spam and other forms of intrusion. View Profile

Protect users against malicious programs such as viruses, worms, Trojans, hackers, spam and other forms of intrusion. View Profile

AVG helps you grow your business knowing that your data and online communications are protected. View Profile

AVG helps you grow your business knowing that your data and online communications are protected. View Profile

MiniTool Partition Wizard Free Edition is a piece of free partition manager targeting home and home office users. View Profile

MiniTool Partition Wizard Free Edition is a piece of free partition manager targeting home and home office users. View Profile

SecureAnywhere

by Webroot Software

Advanced protection against viruses and malware offering full protection against all of todays sophisticated malware threats. View Profile

Advanced protection against viruses and malware offering full protection against all of todays sophisticated malware threats. View Profile

Bitium

by Bitium

Access control solution for corporate apps that supports integration with third party authentication providers. View Profile

Access control solution for corporate apps that supports integration with third party authentication providers. View Profile

TunnelBear

by TunnelBear

TunnelBear for Teams is an easy-to-use VPN service made for teams. View Profile

TunnelBear for Teams is an easy-to-use VPN service made for teams. View Profile

Teramind

by Teramind

User Activity Monitoring and Data Theft Prevention made easy with Teramind. View Profile

User Activity Monitoring and Data Theft Prevention made easy with Teramind. View Profile

Stop merely detecting attacks, prevent them using CylancePROTECT, the endpoint solution that blocks 99% of threats in real time. View Profile

Stop merely detecting attacks, prevent them using CylancePROTECT, the endpoint solution that blocks 99% of threats in real time. View Profile

Password management software enables colleagues within IT departments to securely store, manage and audit passwords and other secrets. View Profile

Password management software enables colleagues within IT departments to securely store, manage and audit passwords and other secrets. View Profile

Fosters the productivity of your mobile workforce through scalable device management and security. Licensed on a per-user basis. View Profile

Fosters the productivity of your mobile workforce through scalable device management and security. Licensed on a per-user basis. View Profile

GlassWire

by GlassWire

Helps protect your computer network and privacy via network monitoring and a built in firewall management tool. View Profile

Helps protect your computer network and privacy via network monitoring and a built in firewall management tool. View Profile

Addresses data privacy, residency, security, and compliance concerns so that organizations can confidently deploy Salesforce. View Profile

Addresses data privacy, residency, security, and compliance concerns so that organizations can confidently deploy Salesforce. View Profile

Simplifies protecting files, file transfers, and application data while improving security; uses PGP encryption. View Profile

Simplifies protecting files, file transfers, and application data while improving security; uses PGP encryption. View Profile

Beacon

by Great Bay Software

Suite of solutions designed to secure corporate networks, ensure compliance, and enhance endpoint visibility. View Profile

Suite of solutions designed to secure corporate networks, ensure compliance, and enhance endpoint visibility. View Profile

We secure & manage open source software, eliminating pain related to open source security vulnerabilities & license compliance. View Profile

We secure & manage open source software, eliminating pain related to open source security vulnerabilities & license compliance. View Profile

Website security test to protect application and server against hackers. View Profile

Website security test to protect application and server against hackers. View Profile

ActivTrak

by Birch Grove Software

Free way to see who is doing what and for how long. View Profile

Free way to see who is doing what and for how long. View Profile

BlackFog

by BlackFog

Security solution that manages data privacy, threat protection and tracking activity. View Profile

Security solution that manages data privacy, threat protection and tracking activity. View Profile

Corner Bowl Log Manager

by Corner Bowl Software

Log monitoring, consolidation, auditing and reporting tool that allows users to monitor networks and satisfy auditing requirements. View Profile

Log monitoring, consolidation, auditing and reporting tool that allows users to monitor networks and satisfy auditing requirements. View Profile

PDF document security software with US Government strength encryption and DRM digital rights management controls. View Profile

PDF document security software with US Government strength encryption and DRM digital rights management controls. View Profile

Patch management solution that delivers centralized control of your entire vulnerability management process from a single location. View Profile

Patch management solution that delivers centralized control of your entire vulnerability management process from a single location. View Profile

Protects agains spy and monitoring software including keyloggers, webcam loggers, and financial malware. View Profile

Protects agains spy and monitoring software including keyloggers, webcam loggers, and financial malware. View Profile

AccessPatrol

by CurrentWare

provides a proactive solution for securing company endpoints (USBs, CD/DVDs, BlueTooth, WiFi, FireWire, iPods, MP3s). View Profile

provides a proactive solution for securing company endpoints (USBs, CD/DVDs, BlueTooth, WiFi, FireWire, iPods, MP3s). View Profile

AccuHash

by Viwal Interactive

Unicode-enabled checksum utility for Windows, will help to prevent accidental or intentional damaging of your data. View Profile

Unicode-enabled checksum utility for Windows, will help to prevent accidental or intentional damaging of your data. View Profile

Active Shield

by Security Stronghold

Protects your computer from trojans, spyware, adware, trackware, dialers, keyloggers, and even some special kinds of viruses. View Profile

Protects your computer from trojans, spyware, adware, trackware, dialers, keyloggers, and even some special kinds of viruses. View Profile

Now NexVue makes 2FA available for Acumatica. View Profile

Now NexVue makes 2FA available for Acumatica. View Profile

Faronics Anti-Executable ensures total endpoint productivity by only allowing approved applications to run on a computer or server. View Profile

Faronics Anti-Executable ensures total endpoint productivity by only allowing approved applications to run on a computer or server. View Profile

Descriptions for over 70,000 programs, custom settings, preferred processes, and blocking of undesired processes. View Profile

Descriptions for over 70,000 programs, custom settings, preferred processes, and blocking of undesired processes. View Profile

Appvigil

by Wegilant

Just a scan to find the security vulnerabilities in your mobile app and their exact location. Appvigil does the rest. View Profile

Just a scan to find the security vulnerabilities in your mobile app and their exact location. Appvigil does the rest. View Profile

Blue Coat is a leading provider of advanced web security solutions for global enterprises and governments. View Profile

Blue Coat is a leading provider of advanced web security solutions for global enterprises and governments. View Profile

BorderWare Firewall Server

by BorderWare Technologies

Integrated solution that eliminates vulnerabilities and costs associated with a separate firewall and operating system. View Profile

Integrated solution that eliminates vulnerabilities and costs associated with a separate firewall and operating system. View Profile

Includes two factor sign-on, access control, encryption, personal firewall using smart cards, USB or biometrics. View Profile

Includes two factor sign-on, access control, encryption, personal firewall using smart cards, USB or biometrics. View Profile

A comprehensive security software application that is easy to deploy and scales to the largest of global networks. View Profile

A comprehensive security software application that is easy to deploy and scales to the largest of global networks. View Profile

Cisco Cloudlock

by Cisco Cloudlock

Cisco Cloudlock is the leading CASB & Cybersecurity-as-a-Service provider, fully protecting your enterprise View Profile

Cisco Cloudlock is the leading CASB & Cybersecurity-as-a-Service provider, fully protecting your enterprise View Profile

Cofactor Kite

by Cofactor Computing

Kite protects your solutions in any cloud. Kite works with SharePoint online & on-prem, and better than Shadow IT. View Profile

Kite protects your solutions in any cloud. Kite works with SharePoint online & on-prem, and better than Shadow IT. View Profile

ControlCase

by ControlCase

Comprehensive computer security incident management system. View Profile

Comprehensive computer security incident management system. View Profile

The Secunia CSI is a vulnerability and patch management solution that completes the patch management process. View Profile

The Secunia CSI is a vulnerability and patch management solution that completes the patch management process. View Profile

Network-ready solution that automatically detects, audits, quarantines and remediates endpoints. View Profile

Network-ready solution that automatically detects, audits, quarantines and remediates endpoints. View Profile

Data Rover EP

by Mission2Mars

Calculates the Effective Permissions on Microsoft Windows File Servers. View Profile

Calculates the Effective Permissions on Microsoft Windows File Servers. View Profile

DataGravity

by DataGravity

DataGravity for Virtualization provides timely intelligence and actionable insights to secure and protect all your virtualized data. View Profile

DataGravity for Virtualization provides timely intelligence and actionable insights to secure and protect all your virtualized data. View Profile

DeviceLock

by DeviceLock

Provides both contextual and content-based control for maximum leakage prevention at minimum upfront and ownership cost. View Profile

Provides both contextual and content-based control for maximum leakage prevention at minimum upfront and ownership cost. View Profile

DriveCrypt

by Securstar

Protects all proprietary data on notebooks and desktop computers 100% of the time without users having to think about security. View Profile

Protects all proprietary data on notebooks and desktop computers 100% of the time without users having to think about security. View Profile

Protect your sensitive data and privacy, and securely erase all evidence of your Internet and PC activity. Since 1998. View Profile

Protect your sensitive data and privacy, and securely erase all evidence of your Internet and PC activity. Since 1998. View Profile

Covers all endpoint security, control and data loss prevention tasks which are relevant for preventive data protection measures. View Profile

Covers all endpoint security, control and data loss prevention tasks which are relevant for preventive data protection measures. View Profile

EnCase Enterprise

by Guidance Software

Enables analysis to respond to security incidents, perform investigations and conduct audits. View Profile

Enables analysis to respond to security incidents, perform investigations and conduct audits. View Profile

Visualize your entire network, identify security threats in real-time, and improve IT governance with modular analytics solution. View Profile

Visualize your entire network, identify security threats in real-time, and improve IT governance with modular analytics solution. View Profile

Provides real-time protection of user data from malware and phishing attacks View Profile

Provides real-time protection of user data from malware and phishing attacks View Profile

eScan ISS

by MicroWorld Technologies

A complete security suite which provides essential protection against viruses, objectionable content, hackers and privacy threats. View Profile

A complete security suite which provides essential protection against viruses, objectionable content, hackers and privacy threats. View Profile

Provides strong encryption, supports multiple protocols, security standards & authentication methods. View Profile

Provides strong encryption, supports multiple protocols, security standards & authentication methods. View Profile

Falcon Host

by CrowdStrike

Next-generation endpoint protection software that detects, prevents, and responds to attacks. View Profile

Next-generation endpoint protection software that detects, prevents, and responds to attacks. View Profile

FileAudit

by IS Decisions

Proactively track, audit, report and alert on all access - and access attempts - to files, folders and file shares on Windows servers. View Profile

Proactively track, audit, report and alert on all access - and access attempts - to files, folders and file shares on Windows servers. View Profile

Firewall-1

by Check Point Software Technologies

Firewall that provides access control, content security, authentication and centralized management. View Profile

Firewall that provides access control, content security, authentication and centralized management. View Profile

ForeScout CounterACT Edge

by ForeScout Technologies

Security hardware that monitors the perimeter and preempts targeted attacks. View Profile

Security hardware that monitors the perimeter and preempts targeted attacks. View Profile

Fortres 101

by Fortres Grand

Reliable security software for student access. Fortres 101 limits computer access to only programs, files, and Web sites you allow. View Profile

Reliable security software for student access. Fortres 101 limits computer access to only programs, files, and Web sites you allow. View Profile

Fusion

by Panda Security

Easy-to-use protection against viruses, spyware, hackers, spam and other Internet threats. View Profile

Easy-to-use protection against viruses, spyware, hackers, spam and other Internet threats. View Profile

Comprehensive antivirus protection package with behavior checking, parental controls, and idle scanning. View Profile

Comprehensive antivirus protection package with behavior checking, parental controls, and idle scanning. View Profile

Gemnasium

by Gemnasium

A security solution that monitors your project dependencies and alerts you about updates and security vulnerabilities. View Profile

A security solution that monitors your project dependencies and alerts you about updates and security vulnerabilities. View Profile

Genesis

by Internet Biometric Security Systems

On demand biometric security solution for any type of internet application requiring security of confidential information. View Profile

On demand biometric security solution for any type of internet application requiring security of confidential information. View Profile

Hushmail

by Hushmail

A secure email service that lets you send and receive private, encrypted emails and attachments to and from anyone. View Profile

A secure email service that lets you send and receive private, encrypted emails and attachments to and from anyone. View Profile

Manages and safeguards access to your data and lets you enforce a unified security policy across the enterprise. View Profile

Manages and safeguards access to your data and lets you enforce a unified security policy across the enterprise. View Profile

Centralized management of users, groups and roles, role-based access control, entitlements and access policies. View Profile

Centralized management of users, groups and roles, role-based access control, entitlements and access policies. View Profile

IMCrypto Pro

by Global Information Technology

IMCrypto Pro uses in its work one of the most widely spread asymmetric encryption algorithms - RSA. View Profile

IMCrypto Pro uses in its work one of the most widely spread asymmetric encryption algorithms - RSA. View Profile

Intelligence software system for security, loss prevention and audit organisations in the retail & financial sectors. View Profile

Intelligence software system for security, loss prevention and audit organisations in the retail & financial sectors. View Profile

Internet Lock

by TopLang Software

Ppassword protect or deny any program from accessing internet. Protect or deny all programs from accessing the special TCP ports. View Profile

Ppassword protect or deny any program from accessing internet. Protect or deny all programs from accessing the special TCP ports. View Profile

Invisible Secrets

by NeoByte Solutions

Security software that encrypts your data and files for safe keeping or secure transfer across the net. View Profile

Security software that encrypts your data and files for safe keeping or secure transfer across the net. View Profile

Integrated cyber security suite for comprehensive data protection and web security compliance across all network access points View Profile

Integrated cyber security suite for comprehensive data protection and web security compliance across all network access points View Profile

iSafeSend

by DMS Companies

iSafeSend enables you to securely share sensitive information through a one-time use link. View Profile

iSafeSend enables you to securely share sensitive information through a one-time use link. View Profile

LiveEnsure

by LiveEnsure

Authenticates users through their mobile device, location, knowledge and behavior. View Profile

Authenticates users through their mobile device, location, knowledge and behavior. View Profile

LogPoint

by LogPoint

LogPoint is an effective and valuable SIEM solution for enterprises of all sizes because of its unique design and rich features. View Profile

LogPoint is an effective and valuable SIEM solution for enterprises of all sizes because of its unique design and rich features. View Profile

MemberProtect

by InetSolution

Uses powerful encryption to secure databases at the cell level and can encrypt email messages and flat files on your network. View Profile

Uses powerful encryption to secure databases at the cell level and can encrypt email messages and flat files on your network. View Profile

MIMEsweeper

by Clearswift

Content security software that enables businesses to protect themselves against digital attacks. View Profile

Content security software that enables businesses to protect themselves against digital attacks. View Profile

miniOrange

by miniOrange

miniOrange offers a wide range of security-related solutions from single sign on to 2-factor authentication, social logins and more. View Profile

miniOrange offers a wide range of security-related solutions from single sign on to 2-factor authentication, social logins and more. View Profile

modus

by Vircom

Robust, customizable email security solution that ensures a high catch rate and an almost non-existent false-positive rate. View Profile

Robust, customizable email security solution that ensures a high catch rate and an almost non-existent false-positive rate. View Profile

A monitoring and safety application for reviewing user activity and measuring productivity. View Profile

A monitoring and safety application for reviewing user activity and measuring productivity. View Profile

Provides real-time collaboration and information sharing, with military grade encryption for the security of your information. View Profile

Provides real-time collaboration and information sharing, with military grade encryption for the security of your information. View Profile

Delivers integrated, real-time security management in a single, seamless suite. View Profile

Delivers integrated, real-time security management in a single, seamless suite. View Profile

Net Monitor for Employees is employee monitoring software that allows you to take full control of a computer and much more. View Profile

Net Monitor for Employees is employee monitoring software that allows you to take full control of a computer and much more. View Profile

Make decisive, appropriate responses to incidents by automating identification and resolution processes. View Profile

Make decisive, appropriate responses to incidents by automating identification and resolution processes. View Profile

Top choice of IT admins and tech coordinators to protect Windows operating systems and desktops from unwanted or malicious changes. View Profile

Top choice of IT admins and tech coordinators to protect Windows operating systems and desktops from unwanted or malicious changes. View Profile

Network security audit system designed to audit network and detect available security vulnerabilities in the network. View Profile

Network security audit system designed to audit network and detect available security vulnerabilities in the network. View Profile

Threat management software that enables you to police, prioritize and prevail across the full range of today's security threats. View Profile

Threat management software that enables you to police, prioritize and prevail across the full range of today's security threats. View Profile

Nfusion

by Ntrepid

Nfusion is a fully-managed and completely segragated secure VDI for online research and investigation. View Profile

Nfusion is a fully-managed and completely segragated secure VDI for online research and investigation. View Profile

Enables access to information through encryption, providing information security, privacy and confidentiality. View Profile

Enables access to information through encryption, providing information security, privacy and confidentiality. View Profile

OX Guard

by Open-Xchange

Email security solution that adheres to PGP encryption standard to assure that communications remain confidential. View Profile

Email security solution that adheres to PGP encryption standard to assure that communications remain confidential. View Profile

Phishme

by Phishme

Offers phishing threat management functionality including phishing scenarios simulation, threat detection, and analysis. View Profile

Offers phishing threat management functionality including phishing scenarios simulation, threat detection, and analysis. View Profile

Secures the Windows Operating System from unwanted or malicious writes. View Profile

Secures the Windows Operating System from unwanted or malicious writes. View Profile

PowerBroker

by BeyondTrust

Our platform unifies the most effective technologies for addressing internal and external risk: Privileged Account & Vulnerability Mgt. View Profile

Our platform unifies the most effective technologies for addressing internal and external risk: Privileged Account & Vulnerability Mgt. View Profile

PowerTech

by HelpSystems

PowerTech is the leading source of automated security and compliance solutions for IBM i, helping you manage and save valuable data. View Profile

PowerTech is the leading source of automated security and compliance solutions for IBM i, helping you manage and save valuable data. View Profile

A personal firewall and intrusion detection application that eliminates unauthorized access to your PC. View Profile

A personal firewall and intrusion detection application that eliminates unauthorized access to your PC. View Profile

The program uses patented agentless technology to remotely and quickly inspect the entire endpoint environment to uncover threats. View Profile

The program uses patented agentless technology to remotely and quickly inspect the entire endpoint environment to uncover threats. View Profile

PureSight CSDK/OEM

by PureSight Technologies

Easily integrated into Internet security suites/appliances to provide content filtering capabilities to your offerings. View Profile

Easily integrated into Internet security suites/appliances to provide content filtering capabilities to your offerings. View Profile

Monitors the vulnerability management process, tracks remediation and ensures policy compliance. View Profile

Monitors the vulnerability management process, tracks remediation and ensures policy compliance. View Profile

Combines advanced scanning technology with most comprehensive vulnerability database. View Profile

Combines advanced scanning technology with most comprehensive vulnerability database. View Profile

Rohos Logon Key

by Tesline-Service

Two-factor authentication solutions for Windows. Secure USB Key logon. View Profile

Two-factor authentication solutions for Windows. Secure USB Key logon. View Profile

RollBack Rx Server

by Horizon Datasys

Windows Server backup and restore utility that gives IT professionals the ability to quickly restore mission critical systems. View Profile

Windows Server backup and restore utility that gives IT professionals the ability to quickly restore mission critical systems. View Profile

RSA Keon

by RSA Security

Public key infrastructure; enables, manages and simplifies the use of digital certificates. View Profile

Public key infrastructure; enables, manages and simplifies the use of digital certificates. View Profile

A comprehensive solution portfolio that guarantees your organization to cover all data security requirements the way you want. View Profile

A comprehensive solution portfolio that guarantees your organization to cover all data security requirements the way you want. View Profile

Integrated Vulnerability Management, Penetration Testing, Compliance, and Configuration Audit software. View Profile

Integrated Vulnerability Management, Penetration Testing, Compliance, and Configuration Audit software. View Profile

SecuBox

by Aiko Solutions

AES 256-bit disk encryption for Windows Embedded Compact/ Windows CE handhelds and its media cards. Safe, secure and convenient storage View Profile

AES 256-bit disk encryption for Windows Embedded Compact/ Windows CE handhelds and its media cards. Safe, secure and convenient storage View Profile

Secure CommNet

by Radient Software

A 32-bit Windows application for secure shell (SSH2), telnet, and dial-up connections. View Profile

A 32-bit Windows application for secure shell (SSH2), telnet, and dial-up connections. View Profile

Secure Hive

by Secure Hive

Create encrypted archives and self-extracting .exe files for secure storage and file sharing. View Profile

Create encrypted archives and self-extracting .exe files for secure storage and file sharing. View Profile

Acting as a sidekick to your antivirus program, Secure Hunter locates malicious software and eliminates it before it reaches your data. View Profile

Acting as a sidekick to your antivirus program, Secure Hunter locates malicious software and eliminates it before it reaches your data. View Profile

Security services platform is your company's security services, for your clients, and 100% private labeled for YOUR business. View Profile

Security services platform is your company's security services, for your clients, and 100% private labeled for YOUR business. View Profile

Security Shield

by PCSecurityShield

Protects your business from viruses, spyware, Trojans, root-kits, hackers, adware and more. View Profile

Protects your business from viruses, spyware, Trojans, root-kits, hackers, adware and more. View Profile

SecurityEXPERT

by St. Bernard Software

Policy-based product; audit, enforce and report on managed machines with respect to their assigned policies. View Profile

Policy-based product; audit, enforce and report on managed machines with respect to their assigned policies. View Profile

We integrate the most widely used intrusion panels and CCTV systems on one screen with features including camera picture pop-ups. View Profile

We integrate the most widely used intrusion panels and CCTV systems on one screen with features including camera picture pop-ups. View Profile

Snorkel-Server

by Odyssey Technologies

Security gateway software with capabilities for providing digital certificate based authentication and non-repudiation services. View Profile

Security gateway software with capabilities for providing digital certificate based authentication and non-repudiation services. View Profile

Specops Password Sync

by Specops Software

Fights password fatigue by reducing number of passwords to remember View Profile

Fights password fatigue by reducing number of passwords to remember View Profile

Powerful, flexible, and easy-to-use code security and deployment solution for .NET developers. View Profile

Powerful, flexible, and easy-to-use code security and deployment solution for .NET developers. View Profile

SSH Tectia

by SSH Communications Security

Enables secure system administration, secure file transfer and secure application connectivity with centralized control. View Profile

Enables secure system administration, secure file transfer and secure application connectivity with centralized control. View Profile

StillSecure

by StillSecure

Security testing, monitoring and management software that defends networks from security breaches. View Profile

Security testing, monitoring and management software that defends networks from security breaches. View Profile

SyncBoss

by SecurePro Software

File Synchronization Application and Cloud Storage. View Profile

File Synchronization Application and Cloud Storage. View Profile

TF2000

by ComputerProx

Solution that automatically locks the system without requiring any keystrokes from the user. View Profile

Solution that automatically locks the system without requiring any keystrokes from the user. View Profile

Detect intentional tampering, user error, software failure, and introductions of malicious software. View Profile

Detect intentional tampering, user error, software failure, and introductions of malicious software. View Profile

Trust Lockdown

by White Cloud Security

App trust-listing technology. Protects your systems by only allowing trusted applications to execute. View Profile

App trust-listing technology. Protects your systems by only allowing trusted applications to execute. View Profile

Security solution for Unix-like OS. Separate system administrators from sensitive data to ensure security of your IT resources. View Profile

Security solution for Unix-like OS. Separate system administrators from sensitive data to ensure security of your IT resources. View Profile

A professional yet easy-to-use Windows tweaking utility with 2494 policies to configure. View Profile

A professional yet easy-to-use Windows tweaking utility with 2494 policies to configure. View Profile

Manages all crucial security functions, including authentication, encryption and addressing. View Profile

Manages all crucial security functions, including authentication, encryption and addressing. View Profile

Vera secures any kind of data, wherever it goes View Profile

Vera secures any kind of data, wherever it goes View Profile

Veriato RansomSafe acts as a vital layer in your ransomware defense. Shut down attacks before they hold your business hostage. View Profile

Veriato RansomSafe acts as a vital layer in your ransomware defense. Shut down attacks before they hold your business hostage. View Profile

Cloud based platform offering endpoint security technology that eliminates gaps left undetected by other endpoint security solutions. View Profile

Cloud based platform offering endpoint security technology that eliminates gaps left undetected by other endpoint security solutions. View Profile

A network security software which helps in protecting sensitive data from phishing attacks by scanning file attachments in emails. View Profile

A network security software which helps in protecting sensitive data from phishing attacks by scanning file attachments in emails. View Profile

VyprVPN

by Golden Frog

Manages its own network, and owns the hardware so we can deliver the fastest VPN speeds in the world View Profile

Manages its own network, and owns the hardware so we can deliver the fastest VPN speeds in the world View Profile

The industry's fastest Web security appliance with a new scanning technology that enables signature-based spyware filtering. View Profile

The industry's fastest Web security appliance with a new scanning technology that enables signature-based spyware filtering. View Profile

System for two-factor authentication that increases security, reduces costs and is very convenient to the end-user. View Profile

System for two-factor authentication that increases security, reduces costs and is very convenient to the end-user. View Profile

XyLoc Security Server

by Ensure Technologies

A server-based software platform that centrally manages and monitors XyLoc users and protected workstations throughout the enterprise. View Profile

A server-based software platform that centrally manages and monitors XyLoc users and protected workstations throughout the enterprise. View Profile

PC firewall that keeps your personal data and privacy safe from Internet hackers and data thieves. View Profile

PC firewall that keeps your personal data and privacy safe from Internet hackers and data thieves. View Profile

Filter Results (131)

Product Rating

Number of Users

Deployment

Features