Computer Security Software

Find the best Computer Security Software for your business. Compare product reviews and features to build your list.

What is Computer Security Software?

Filter Results (167)

Product Rating

Users

Deployment

Features

Why Capterra is free

DNS Based Web content filter that blocks malware, ransomware and phishing attempts as well as providing web content control. We filter over 1/2 a billion DNS requests every day, identify 60,000 malware iterations a day and have over 7,500 customers. Cloud and gateway versions available. Improve your network & computer security now. Try a free Trial of WebTitan today, support included. Learn more about WebTitan

DNS Based Web content filter that blocks malware, ransomware and phishing attempts as well as providing web content control Learn more about WebTitan

Acunetix

by Acunetix

Acunetix is a computer security tool that scans and audits all web applications including HTML5, JavaScript and Single Page Applications. Scans for 4500 vulnerabilities incl. SQLi and XSS among others. Used by Government, Military, Education, Telecommunications, Banking, Finance, and E-Commerce sectors, including many Fortune 500 companies. Acunetix offers a cost-effective, simple, scalable, and high availability solution. Available on Windows, Linux and Online Learn more about Acunetix

Computer Security solution that performs a website scan, detects vulnerabilities like XSS or SQL Injection and offers remediation Learn more about Acunetix

Netsparker Security Scanner is an accurate solution that automatically identifies XSS, SQL Injection and other vulnerabilities in web applications. Netsparker's unique Proof-Based Scanning Technology allows you to allocate more time to fix the reported flaws by automatically exploiting the identified vulnerabilities in a read-only and safe way, and also produces a proof of exploitation. Therefore you can immediately see the impact of the vulnerability and do not have to manually verify it. Learn more about Netsparker Security Scanner

Accurate solution that automatically identifies XSS, SQL Injection and other vulnerabilities in web applications. Learn more about Netsparker Security Scanner

Avast Business Antivirus Pro Plus 2019 is all-in-one powerful endpoint, email, server and network protection package for small and medium size businesses (best for 1-500 employees). Works on PCs, Macs and Windows servers. It is enhanced with 18 cutting - edge features to keep your company's life fully secure. Includes powerful antivirus, server, email and network security, CyberCapture, firewall, password manger, VPN and much more. It can be used either with cloud console or without. Learn more about Avast Business Antivirus Pro Plus

All-in-one award winning antivirus solution ready to protect every part of your business. Available for PCs, Macs and servers. Learn more about Avast Business Antivirus Pro Plus

LanScope Cat

by Interfocus

Interfocus provides LanScope Cat, a unified endpoint management and security solution in the cloud that simplifies and automates how you control your teams devices in the workplace. LanScope Cat automatically inventories your PCs, laptops, peripherals and software licenses to provide visibility into how users interact with your proprietary data Learn more about LanScope Cat

Manage and secure all your endpoints to ensure compliance and protection against malware and other cyber security attacks. Learn more about LanScope Cat

Multi-vector protection against viruses and malware offering full protection against all of today's sophisticated malware threats including Trojans, keyloggers, phishing, spyware, back-doors, rootkits, zero-day and advanced persistent threats. Built in Identity & Privacy Shield stops data being stolen or captured when using the Internet and the outbound firewall also stops malware stealing data. No need to worry about or run updates cloud-driven security means endpoints are always up to date. Learn more about Webroot SecureAnywhere Endpoint Protection

Multi-vector protection against viruses and malware offering full protection against all of today's sophisticated malware threats. Learn more about Webroot SecureAnywhere Endpoint Protection

ADAudit Plus

by ManageEngine

ManageEngine ADAudit Plus is an IT security and compliance solution. With over 200 reports and real-time alerts, it provides knowledge about changes made to the content and configuration of Active Directory, Azure AD, and Windows servers. Additionally it provides insight on workstation and file server access (including NetApp and EMC). ADAudit Plus helps you track user logon and logoff; analyze account lockouts; audit ADFS, ADLDS, and printers; forward logs to SIEM tools; and do much more. Learn more about ADAudit Plus

ADAudit Plus is an Active Directory, Azure AD, file server (including NetApp and EMC), and workstation change monitoring software.  Learn more about ADAudit Plus

EventLog Analyzer is a comprehensive log management solution withreal-time threat detection and analysis. It can correlate disparate events happening across your network and also has a built-in threat intelligence and incident management platform. It offers predefined audit reports to help track activity happening in databases, web servers, Windows devices, network perimeter devices, and more. It also assists in meeting compliance regulations like the PCI DSS, SOX, HIPAA, FISMA, and GDPR. Learn more about EventLog Analyzer

EventLog Analyzer is a comprehensive log management solution that provides multiple security capabilities in one unified platform. Learn more about EventLog Analyzer

SolarWinds Threat Monitor - Service Provider Edition is a fast, scalable, cloud-based platform built to enable security-minded Managed Service Providers (MSPs) with a unified tool to monitor managed networks for threats analyze logs against the latest and most up to date threat intelligence information from around the globe. Remediate your customer's threats quickly, and prepare the information needed to demonstrate their compliance to standards set by regulatory governing bodies. Learn more about SolarWinds Threat Monitor

SolarWinds® Threat Monitor is the tool you need to detect, remediate, and report on security events for all your managed networks. Learn more about SolarWinds Threat Monitor

Realtime Security

by Cloud Management Suite

Cloud Management Suite is a cloud-based IT Management and Security solution allowing IT departments to instantly respond to security events. Whether its a ransomware attack or supporting users on the fly, Cloud Management Suite Realtime Security allows you to manage, patch, and remediate your environment with ease. Learn more about Realtime Security

Stop breaches in real time and remediate vulnerabilities all from one console. Get live, data from 1000s of devices in under 10 seconds Learn more about Realtime Security

AVG Antivirus Business Edition 2018 keeps your business and customer data safe from latest ransomware, viruses, malware and and outbreaks in real-time. Its powered with new cloud based features as CyberCapture, improved malware detection and enhanced web shield. This product includes also free remote management and great reporting. Client user interface is updated, as well. Available for Windows PCs, desktops and servers. AVG offers free phone support 24/7 to its customers. Learn more about AVG Antivirus Business Edition

AVG Antivirus Business Edition 2018 keeps your SMBs and customer data safe from online threats in real-time Learn more about AVG Antivirus Business Edition

Veriato RansomSafe acts as a vital layer in your ransomware defense, combining just-in-time data protection with multiple mechanisms to detect, and shut down attacks before they hold your business hostage. Learn more about Veriato RansomSafe

Veriato RansomSafe acts as a vital layer in your ransomware defense. Shut down attacks before they hold your business hostage. Learn more about Veriato RansomSafe

Passworks is an easy to use self-service solution that will help you to significantly reduce the costs associated with resetting Mac OS X and Windows Active Directory passwords. Users can securely reset their own password and continue working, lowering user downtime and freeing up valuable help desk resources Certero Passworks utilises Web technologies and can be administered using any modern Web-browser. Learn more about Passworks

Passworks is an easy to use self-service password reset solution working across both Windows and Mac OS X. Learn more about Passworks

PA File Sight

by Power Admin

PA File Sight is a file monitoring software that will help you detect file copying, protect the server from ransomware attacks, and allow auditing of who is reading, writing and deleting important files. It can also tell who is deleting or moving folders. If the user has the optional File Sight Endpoint installed, you can also be notified of file copying activity. The user account, and their IP address is reported. Learn more about PA File Sight

PA File Sight is a file monitoring software that will help you detect file copying, and protect the server from ransomware attacks. Learn more about PA File Sight

OneLogin

by OneLogin

Designed for companies with 100+ users, OneLogin provides a cloud-based identity and access management (IAM) solution that offers simple single sign-on (SSO) making it easier for companies to secure and manage access to web applications both in the cloud and behind the firewall. Does your company have three or more SaaS or internal web apps? If so, then you will benefit from the security of OneLogin's cloud-based single sign-on solution. Learn more about OneLogin

Identity management (IAM) and single sign-on (SSO) solution for companies of all sizes. Get started immediately with our free trial. Learn more about OneLogin

strongDM

by strongDM

strongDM works out of the box with any database or server in any environment. strongDM easily integrates with any identity provider, log aggregator, and change management system to onboard, offboard, and audit staff's access to databases and servers. Learn more about strongDM

Companies like Hearst, SoFi, and Peloton rely on strongDM to secure staff's access to databases and servers. Learn more about strongDM

WipeDrive

by WhiteCanyon Software

WipeDrive enables corporations, government entities, and individuals to permanently and securely erase data from hard drives, removable media, and mobile devices. We provide a cost-effective, secure, and socially responsible way to recycle and retire computers and computer storage. WipeDrive is the world leader in secure data destruction. Learn more about WipeDrive

We provide a cost-effective, secure, and socially responsible way to recycle and retire IT assets, computers and computer storage. Learn more about WipeDrive

AVG helps you grow your business knowing that your data and online communications are protected. Learn more about AVG Internet Security

AVG helps you grow your business knowing that your data and online communications are protected. Learn more about AVG Internet Security

Protect users against malicious programs such as viruses, worms, Trojans, hackers, spam and other forms of intrusion. Learn more about Kaspersky Endpoint Security

Protect users against malicious programs such as viruses, worms, Trojans, hackers, spam and other forms of intrusion. Learn more about Kaspersky Endpoint Security

NordVPN applies strong encryption to all your Internet traffic so that no third parties can breach your business communications. Learn more about NordVPN

NordVPN applies strong encryption to all your Internet traffic so that no third parties can breach your business communications. Learn more about NordVPN

TunnelBear

by TunnelBear

TunnelBear for Teams is the easiest way your team can work securely and privately from anywhere. Learn more about TunnelBear

TunnelBear for Teams is the easiest way your team can work securely and privately from anywhere. Learn more about TunnelBear

Provides flexible licensing options to fit the protection needs of your offices, datacenters and public cloud. Learn more about bitdefender GravityZone

Provides flexible licensing options to fit the protection needs of your offices, datacenters and public cloud. Learn more about bitdefender GravityZone

Teramind

by Teramind

Take our Free Trial to see what the buzz is about. User Activity Monitoring and Data Theft Prevention made easy with Teramind. Learn more about Teramind

Take our Free Trial to see what the buzz is about. User Activity Monitoring and Data Theft Prevention made easy with Teramind. Learn more about Teramind

MiniTool Partition Wizard Free Edition is a piece of free partition manager targeting home and home office users. Learn more about MiniTool Partition Wizard

MiniTool Partition Wizard Free Edition is a piece of free partition manager targeting home and home office users. Learn more about MiniTool Partition Wizard

empulse

by WorkPuls

Automatic Time Tracking with Screenshots, Payroll and Productivity Analysis for employees that spend their time on computers. Learn more about empulse

Automatic Time Tracking with Screenshots, Payroll and Productivity Analysis for employees that spend their time on computers. Learn more about empulse

Stop merely detecting attacks, prevent them using CylancePROTECT, the endpoint solution that blocks 99% of threats in real time. Learn more about CylancePROTECT

Stop merely detecting attacks, prevent them using CylancePROTECT, the endpoint solution that blocks 99% of threats in real time. Learn more about CylancePROTECT

Fosters the productivity of your mobile workforce through scalable device management and security. Licensed on a per-user basis. Learn more about Symantec Advanced Threat Protection

Fosters the productivity of your mobile workforce through scalable device management and security. Licensed on a per-user basis. Learn more about Symantec Advanced Threat Protection

Simplifies protecting files, file transfers, and application data while improving security; uses PGP encryption. Learn more about McAfee E-Business Server

Simplifies protecting files, file transfers, and application data while improving security; uses PGP encryption. Learn more about McAfee E-Business Server

We secure & manage open source software, eliminating pain related to open source security vulnerabilities & license compliance. Learn more about Black Duck Hub

We secure & manage open source software, eliminating pain related to open source security vulnerabilities & license compliance. Learn more about Black Duck Hub

Windscribe

by Windscribe

Protect your data and access information without restrictions regardless of your geolocation through a secure VPN and ad-block. Learn more about Windscribe

Protect your data and access information without restrictions regardless of your geolocation through a secure VPN and ad-block. Learn more about Windscribe

VyprVPN

by Golden Frog

Manages its own network, and owns the hardware so we can deliver the fastest VPN speeds in the world Learn more about VyprVPN

Manages its own network, and owns the hardware so we can deliver the fastest VPN speeds in the world Learn more about VyprVPN

EventSentry

by Netikus.net

Real-Time Log & Event Log Hybrid SIEM monitoring solution with system monitoring, inventory and network monitoring capabilities. Learn more about EventSentry

Real-Time Log & Event Log Hybrid SIEM monitoring solution with system monitoring, inventory and network monitoring capabilities. Learn more about EventSentry

GlassWire

by GlassWire

GlassWire is a modern network monitor & security tool with a built in firewall. Learn more about GlassWire

GlassWire is a modern network monitor & security tool with a built in firewall. Learn more about GlassWire

Access control solution for corporate apps that supports integration with third party authentication providers. Learn more about Bitium

Access control solution for corporate apps that supports integration with third party authentication providers. Learn more about Bitium

Password management software enables colleagues within IT departments to securely store, manage and audit passwords and other secrets. Learn more about Secret Server Password Manager

Password management software enables colleagues within IT departments to securely store, manage and audit passwords and other secrets. Learn more about Secret Server Password Manager

Fusion

by Panda Security

Panda Fusion is a complete product able to protect, manage and deliver remote support to all your IT devices. Learn more about Fusion

Panda Fusion is a complete product able to protect, manage and deliver remote support to all your IT devices. Learn more about Fusion

FileAudit

by IS Decisions

Proactively track, audit, report and alert on all access - and access attempts - to files, folders and file shares on Windows servers. Learn more about FileAudit

Proactively track, audit, report and alert on all access - and access attempts - to files, folders and file shares on Windows servers. Learn more about FileAudit

Indeni helps IT pros detect network issues before they become major issues using predictive analytics technology. Learn more about Indeni

Indeni helps IT pros detect network issues before they become major issues using predictive analytics technology. Learn more about Indeni

UserLock

by IS Decisions

Secure, control & audit user access to Microsoft Windows Server-based networks and protect the resources and data contained within. Learn more about UserLock

Secure, control & audit user access to Microsoft Windows Server-based networks and protect the resources and data contained within. Learn more about UserLock

PC firewall that keeps your personal data and privacy safe from Internet hackers and data thieves. Learn more about ZoneAlarm Pro

PC firewall that keeps your personal data and privacy safe from Internet hackers and data thieves. Learn more about ZoneAlarm Pro

Clearlogin

by Evolve IP

Secure password management, end-user dashboards and SSO to thousands of cloud applications! Learn more about Clearlogin

Secure password management, end-user dashboards and SSO to thousands of cloud applications! Learn more about Clearlogin

Deliver powerful, layered protection to multiple customers quickly and easily. Learn more about Avast Business CloudCare

Deliver powerful, layered protection to multiple customers quickly and easily. Learn more about Avast Business CloudCare

Provides strong encryption, supports multiple protocols, security standards & authentication methods. Learn more about F-Secure VPN+

Provides strong encryption, supports multiple protocols, security standards & authentication methods. Learn more about F-Secure VPN+

A mobile security and management solution from Chile with geographical location, device & data locking, data recovery, and a robust MDM Learn more about Prey

A mobile security and management solution from Chile with geographical location, device & data locking, data recovery, and a robust MDM Learn more about Prey

RSA Keon

by RSA Security

Public key infrastructure; enables, manages and simplifies the use of digital certificates. Learn more about RSA Keon

Public key infrastructure; enables, manages and simplifies the use of digital certificates. Learn more about RSA Keon

JumpClouds Directory-as-a-Service securely manages and connects your users to their systems, applications, files, and networks. Learn more about JumpCloud DaaS

JumpClouds Directory-as-a-Service securely manages and connects your users to their systems, applications, files, and networks. Learn more about JumpCloud DaaS

Addresses data privacy, residency, security, and compliance concerns so that organizations can confidently deploy Salesforce. Learn more about CipherCloud for Salesforce

Addresses data privacy, residency, security, and compliance concerns so that organizations can confidently deploy Salesforce. Learn more about CipherCloud for Salesforce

Falcon Host

by CrowdStrike

Next-generation endpoint protection software that detects, prevents, and responds to attacks. Learn more about Falcon Host

Next-generation endpoint protection software that detects, prevents, and responds to attacks. Learn more about Falcon Host

ForeScout CounterACT Edge

by ForeScout Technologies

Security hardware that monitors the perimeter and preempts targeted attacks. Learn more about ForeScout CounterACT Edge

Security hardware that monitors the perimeter and preempts targeted attacks. Learn more about ForeScout CounterACT Edge

Hushmail

by Hushmail

A secure email service that lets you send and receive private, encrypted emails and attachments to and from anyone. Learn more about Hushmail

A secure email service that lets you send and receive private, encrypted emails and attachments to and from anyone. Learn more about Hushmail

Phishme

by Phishme

Offers phishing threat management functionality including phishing scenarios simulation, threat detection, and analysis. Learn more about Phishme

Offers phishing threat management functionality including phishing scenarios simulation, threat detection, and analysis. Learn more about Phishme

SSH Tectia

by SSH Communications Security

Enables secure system administration, secure file transfer and secure application connectivity with centralized control. Learn more about SSH Tectia

Enables secure system administration, secure file transfer and secure application connectivity with centralized control. Learn more about SSH Tectia

Security scanner designed to detect adware, malware, backdoors, exploits, defacement, phishing code, trojans and viruses. Learn more about CWIS Security Antivirus Scanner

Security scanner designed to detect adware, malware, backdoors, exploits, defacement, phishing code, trojans and viruses. Learn more about CWIS Security Antivirus Scanner

Firewall-1

by Check Point Software Technologies

Firewall that provides access control, content security, authentication and centralized management. Learn more about Firewall-1

Firewall that provides access control, content security, authentication and centralized management. Learn more about Firewall-1

Comprehensive antivirus protection package with behavior checking, parental controls, and idle scanning. Learn more about G Data Internet Security 2013

Comprehensive antivirus protection package with behavior checking, parental controls, and idle scanning. Learn more about G Data Internet Security 2013

HackerOne

by HackerOne

THE MOST TRUSTED HACKER-POWERED SECURITY PLATFORM - From implementing the basics of a vulnerability disclosure process to supercharging Learn more about HackerOne

THE MOST TRUSTED HACKER-POWERED SECURITY PLATFORM - From implementing the basics of a vulnerability disclosure process to supercharging Learn more about HackerOne

Cisco Cloudlock

by Cisco Cloudlock

Cisco Cloudlock is the leading CASB & Cybersecurity-as-a-Service provider, fully protecting your enterprise Learn more about Cisco Cloudlock

Cisco Cloudlock is the leading CASB & Cybersecurity-as-a-Service provider, fully protecting your enterprise Learn more about Cisco Cloudlock

Monitors the vulnerability management process, tracks remediation and ensures policy compliance. Learn more about QualysGuard Enterprise

Monitors the vulnerability management process, tracks remediation and ensures policy compliance. Learn more about QualysGuard Enterprise

Integrated Vulnerability Management, Penetration Testing, Compliance, and Configuration Audit software. Learn more about Saint Security Suite

Integrated Vulnerability Management, Penetration Testing, Compliance, and Configuration Audit software. Learn more about Saint Security Suite

Website security test to protect application and server against hackers. Learn more about GamaScan

Website security test to protect application and server against hackers. Learn more about GamaScan

Ransomware Defender

by ShieldApps Software Development

Scans, detects and protects from ransomware malicious attempts. Learn more about Ransomware Defender

Scans, detects and protects from ransomware malicious attempts. Learn more about Ransomware Defender

Data security management platform for enterprises that monitors and protects information shared across users, devices, etc. Learn more about Vera

Data security management platform for enterprises that monitors and protects information shared across users, devices, etc. Learn more about Vera

Active Shield

by Security Stronghold

Protects your computer from trojans, spyware, adware, trackware, dialers, keyloggers, and even some special kinds of viruses. Learn more about Active Shield

Protects your computer from trojans, spyware, adware, trackware, dialers, keyloggers, and even some special kinds of viruses. Learn more about Active Shield

Making Web Browsing Safe Learn more about Barracuda Web Security Gateway

Making Web Browsing Safe Learn more about Barracuda Web Security Gateway

BlackFog

by BlackFog

Security solution that manages data privacy, threat protection and tracking activity. Learn more about BlackFog

Security solution that manages data privacy, threat protection and tracking activity. Learn more about BlackFog

Bodi

by Pilixo

Increase employee productivity, deter insider threats and improve data security to meet strict compliance requirements. Learn more about Bodi

Increase employee productivity, deter insider threats and improve data security to meet strict compliance requirements. Learn more about Bodi

Dhound

by IDS Global

Dhound is a security monitoring and intrusion detection tool for internet facing servers, clouds and web applications. Learn more about Dhound

Dhound is a security monitoring and intrusion detection tool for internet facing servers, clouds and web applications. Learn more about Dhound

Protect your sensitive data and privacy, and securely erase all evidence of your Internet and PC activity. Since 1998. Learn more about east-tec Eraser

Protect your sensitive data and privacy, and securely erase all evidence of your Internet and PC activity. Since 1998. Learn more about east-tec Eraser

Centralized management of users, groups and roles, role-based access control, entitlements and access policies. Learn more about iLock Security Services

Centralized management of users, groups and roles, role-based access control, entitlements and access policies. Learn more about iLock Security Services

Robust, customizable email security solution that ensures a high catch rate and an almost non-existent false-positive rate. Learn more about modusGate

Robust, customizable email security solution that ensures a high catch rate and an almost non-existent false-positive rate. Learn more about modusGate

Powertech is the leading source of automated security and compliance solutions for IBM i, helping you manage and save valuable data. Learn more about Powertech Security Software

Powertech is the leading source of automated security and compliance solutions for IBM i, helping you manage and save valuable data. Learn more about Powertech Security Software

The program uses patented agentless technology to remotely and quickly inspect the entire endpoint environment to uncover threats. Learn more about Promisec Endpoint Manager 4.12

The program uses patented agentless technology to remotely and quickly inspect the entire endpoint environment to uncover threats. Learn more about Promisec Endpoint Manager 4.12

Spoon

by Spoon

Powerful, flexible, and easy-to-use code security and deployment solution for .NET developers. Learn more about Spoon

Powerful, flexible, and easy-to-use code security and deployment solution for .NET developers. Learn more about Spoon

Protects agains spy and monitoring software including keyloggers, webcam loggers, and financial malware. Learn more about SpyShelter Anti-Keylogger

Protects agains spy and monitoring software including keyloggers, webcam loggers, and financial malware. Learn more about SpyShelter Anti-Keylogger

Trust Lockdown

by White Cloud Security

App trust-listing technology. Protects your systems by only allowing trusted applications to execute. Learn more about Trust Lockdown

App trust-listing technology. Protects your systems by only allowing trusted applications to execute. Learn more about Trust Lockdown

Cloud based platform offering endpoint security technology that eliminates gaps left undetected by other endpoint security solutions. Learn more about Viewfinity Application Control

Cloud based platform offering endpoint security technology that eliminates gaps left undetected by other endpoint security solutions. Learn more about Viewfinity Application Control

Beacon

by Great Bay Software

Suite of solutions designed to secure corporate networks, ensure compliance, and enhance endpoint visibility. Learn more about Beacon

Suite of solutions designed to secure corporate networks, ensure compliance, and enhance endpoint visibility. Learn more about Beacon

BorderWare Firewall Server

by BorderWare Technologies

Integrated solution that eliminates vulnerabilities and costs associated with a separate firewall and operating system. Learn more about BorderWare Firewall Server

Integrated solution that eliminates vulnerabilities and costs associated with a separate firewall and operating system. Learn more about BorderWare Firewall Server

Visualize your entire network, identify security threats in real-time, and improve IT governance with modular analytics solution. Learn more about End-user IT Analytics

Visualize your entire network, identify security threats in real-time, and improve IT governance with modular analytics solution. Learn more about End-user IT Analytics

eScan ISS

by MicroWorld Technologies

A complete security suite which provides essential protection against viruses, objectionable content, hackers and privacy threats. Learn more about eScan ISS

A complete security suite which provides essential protection against viruses, objectionable content, hackers and privacy threats. Learn more about eScan ISS

Make decisive, appropriate responses to incidents by automating identification and resolution processes. Learn more about NetIQ Sentinel 7

Make decisive, appropriate responses to incidents by automating identification and resolution processes. Learn more about NetIQ Sentinel 7

The industry's fastest Web security appliance with a new scanning technology that enables signature-based spyware filtering. Learn more about Web Security Appliance

The industry's fastest Web security appliance with a new scanning technology that enables signature-based spyware filtering. Learn more about Web Security Appliance

Fortres 101

by Fortres Grand

Reliable security software for student access. Fortres 101 limits computer access to only programs, files, and Web sites you allow. Learn more about Fortres 101

Reliable security software for student access. Fortres 101 limits computer access to only programs, files, and Web sites you allow. Learn more about Fortres 101

AccuHash

by Viwal Interactive

Unicode-enabled checksum utility for Windows, will help to prevent accidental or intentional damaging of your data. Learn more about AccuHash

Unicode-enabled checksum utility for Windows, will help to prevent accidental or intentional damaging of your data. Learn more about AccuHash

Now NexVue makes 2FA available for Acumatica. Learn more about Advanced Security Manager

Now NexVue makes 2FA available for Acumatica. Learn more about Advanced Security Manager

Faronics Anti-Executable ensures total endpoint productivity by only allowing approved applications to run on a computer or server. Learn more about Anti-Executable

Faronics Anti-Executable ensures total endpoint productivity by only allowing approved applications to run on a computer or server. Learn more about Anti-Executable

Descriptions for over 70,000 programs, custom settings, preferred processes, and blocking of undesired processes. Learn more about AnVir Task Manager Pro

Descriptions for over 70,000 programs, custom settings, preferred processes, and blocking of undesired processes. Learn more about AnVir Task Manager Pro

Appvigil

by Wegilant

Just a scan to find the security vulnerabilities in your mobile app and their exact location. Appvigil does the rest. Learn more about Appvigil

Just a scan to find the security vulnerabilities in your mobile app and their exact location. Appvigil does the rest. Learn more about Appvigil

BitRaser

by Stellar Data Recovery

BitRaser is a plug and play software that completely erases data beyond the scope of data recovery. Learn more about BitRaser

BitRaser is a plug and play software that completely erases data beyond the scope of data recovery. Learn more about BitRaser

BlueFiles

by Forecomm

In a simple and fast way, send you sensible data with full confidentiality Learn more about BlueFiles

In a simple and fast way, send you sensible data with full confidentiality Learn more about BlueFiles

Includes two factor sign-on, access control, encryption, personal firewall using smart cards, USB or biometrics. Learn more about Calyx Suite

Includes two factor sign-on, access control, encryption, personal firewall using smart cards, USB or biometrics. Learn more about Calyx Suite

A comprehensive security software application that is easy to deploy and scales to the largest of global networks. Learn more about CimTrak Integrity Suite

A comprehensive security software application that is easy to deploy and scales to the largest of global networks. Learn more about CimTrak Integrity Suite

CISS Forza

by SAI Technology

A computer security solution that limits incorrect employee access privileges and responds to malicious activity. Learn more about CISS Forza

A computer security solution that limits incorrect employee access privileges and responds to malicious activity. Learn more about CISS Forza

The award-winning Clearswift SECURE Email Gateway (SEG) offers an unprecedented level of cyber-attack protection and outbound data loss Learn more about Clearswift SECURE Email Gateway

The award-winning Clearswift SECURE Email Gateway (SEG) offers an unprecedented level of cyber-attack protection and outbound data loss Learn more about Clearswift SECURE Email Gateway

Cofactor Kite

by Cofactor Computing

Kite protects your solutions in any cloud. Kite works with SharePoint online & on-prem, and better than Shadow IT. Learn more about Cofactor Kite

Kite protects your solutions in any cloud. Kite works with SharePoint online & on-prem, and better than Shadow IT. Learn more about Cofactor Kite

ControlCase

by ControlCase

Comprehensive computer security incident management system. Learn more about ControlCase

Comprehensive computer security incident management system. Learn more about ControlCase

Cornerstone MFT Server

by South River Technologies

Cornerstone MFT Server is a Managed File Transfer Server with multi-layer security, high availability and automation. Learn more about Cornerstone MFT Server

Cornerstone MFT Server is a Managed File Transfer Server with multi-layer security, high availability and automation. Learn more about Cornerstone MFT Server

Coronet

by Coronet

Coronet provides end to end data breach protection for companies that use the cloud. Learn more about Coronet

Coronet provides end to end data breach protection for companies that use the cloud. Learn more about Coronet

Conduct your organization's cybersecurity maturity assessment with just few steps & use the intuitive improvement road-map to close gap Learn more about Cyberator

Conduct your organization's cybersecurity maturity assessment with just few steps & use the intuitive improvement road-map to close gap Learn more about Cyberator

Network-ready solution that automatically detects, audits, quarantines and remediates endpoints. Learn more about CyberGatekeeper

Network-ready solution that automatically detects, audits, quarantines and remediates endpoints. Learn more about CyberGatekeeper

Data Rover EP

by Mission2Mars

Calculates the Effective Permissions on Microsoft Windows File Servers. Learn more about Data Rover EP

Calculates the Effective Permissions on Microsoft Windows File Servers. Learn more about Data Rover EP

DataSecurity Plus offers data discovery and real-time server auditing, alerting, and reporting. Learn more about DataSecurity Plus

DataSecurity Plus offers data discovery and real-time server auditing, alerting, and reporting. Learn more about DataSecurity Plus

DeviceLock

by DeviceLock

Provides both contextual and content-based control for maximum leakage prevention at minimum upfront and ownership cost. Learn more about DeviceLock

Provides both contextual and content-based control for maximum leakage prevention at minimum upfront and ownership cost. Learn more about DeviceLock

DriveCrypt

by Securstar

Protects all proprietary data on notebooks and desktop computers 100% of the time without users having to think about security. Learn more about DriveCrypt

Protects all proprietary data on notebooks and desktop computers 100% of the time without users having to think about security. Learn more about DriveCrypt

Covers all endpoint security, control and data loss prevention tasks which are relevant for preventive data protection measures. Learn more about Egosecure Endpoint

Covers all endpoint security, control and data loss prevention tasks which are relevant for preventive data protection measures. Learn more about Egosecure Endpoint

Encryptionizer

by NetLib Security

Transparent Data Encryption for any application or database on the Windows Platform. Learn more about Encryptionizer

Transparent Data Encryption for any application or database on the Windows Platform. Learn more about Encryptionizer

Provides real-time protection of user data from malware and phishing attacks Learn more about EntryProtect

Provides real-time protection of user data from malware and phishing attacks Learn more about EntryProtect

Gemnasium

by Gemnasium

A security solution that monitors your project dependencies and alerts you about updates and security vulnerabilities. Learn more about Gemnasium

A security solution that monitors your project dependencies and alerts you about updates and security vulnerabilities. Learn more about Gemnasium

Genesis

by Internet Biometric Security Systems

On demand biometric security solution for any type of internet application requiring security of confidential information. Learn more about Genesis

On demand biometric security solution for any type of internet application requiring security of confidential information. Learn more about Genesis

A network security solution to clean system of viruses, help restore computer performance, and more. Learn more about GridinSoft Anti-Malware

A network security solution to clean system of viruses, help restore computer performance, and more. Learn more about GridinSoft Anti-Malware

Manages and safeguards access to your data and lets you enforce a unified security policy across the enterprise. Learn more about Identity & Access Manager

Manages and safeguards access to your data and lets you enforce a unified security policy across the enterprise. Learn more about Identity & Access Manager

IMCrypto Pro

by Global Information Technology

IMCrypto Pro uses in its work one of the most widely spread asymmetric encryption algorithms - RSA. Learn more about IMCrypto Pro

IMCrypto Pro uses in its work one of the most widely spread asymmetric encryption algorithms - RSA. Learn more about IMCrypto Pro

Intelligence software system for security, loss prevention and audit organisations in the retail & financial sectors. Learn more about IntelliTrack Network

Intelligence software system for security, loss prevention and audit organisations in the retail & financial sectors. Learn more about IntelliTrack Network

Internet Lock

by TopLang Software

Ppassword protect or deny any program from accessing internet. Protect or deny all programs from accessing the special TCP ports. Learn more about Internet Lock

Ppassword protect or deny any program from accessing internet. Protect or deny all programs from accessing the special TCP ports. Learn more about Internet Lock

Intrusta

by iSubscribed

Intelligent scanning software that works quietly in the background finding and fixing issues so you never have to think about it. Learn more about Intrusta

Intelligent scanning software that works quietly in the background finding and fixing issues so you never have to think about it. Learn more about Intrusta

Invisible Secrets

by NeoByte Solutions

Security software that encrypts your data and files for safe keeping or secure transfer across the net. Learn more about Invisible Secrets

Security software that encrypts your data and files for safe keeping or secure transfer across the net. Learn more about Invisible Secrets

IPdiva Cleanroom provides a single-use, sterile and monitored work environment. Learn more about IPdiva Cleanroom

IPdiva Cleanroom provides a single-use, sterile and monitored work environment. Learn more about IPdiva Cleanroom

Integrated cyber security suite for comprehensive data protection and web security compliance across all network access points Learn more about iPrism Web Security

Integrated cyber security suite for comprehensive data protection and web security compliance across all network access points Learn more about iPrism Web Security

iSafeSend

by DMS Companies

iSafeSend enables you to securely share sensitive information through a one-time use link. Learn more about iSafeSend

iSafeSend enables you to securely share sensitive information through a one-time use link. Learn more about iSafeSend

Jscrambler

by Jscrambler

Make Your JavaScript Application Protect Itself Learn more about Jscrambler

Make Your JavaScript Application Protect Itself Learn more about Jscrambler

LiveEnsure

by LiveEnsure

Authenticates users through their mobile device, location, knowledge and behavior. Learn more about LiveEnsure

Authenticates users through their mobile device, location, knowledge and behavior. Learn more about LiveEnsure

LogPoint

by LogPoint

LogPoint is an effective and valuable SIEM solution for enterprises of all sizes because of its unique design and rich features. Learn more about LogPoint

LogPoint is an effective and valuable SIEM solution for enterprises of all sizes because of its unique design and rich features. Learn more about LogPoint

MemberProtect

by InetSolution

Uses powerful encryption to secure databases at the cell level and can encrypt email messages and flat files on your network. Learn more about MemberProtect

Uses powerful encryption to secure databases at the cell level and can encrypt email messages and flat files on your network. Learn more about MemberProtect

NCR Network and Security Services protects restaurant and retail network and IT infrastructures with a multi-layered security solution. Learn more about NCR Network & Security Services

NCR Network and Security Services protects restaurant and retail network and IT infrastructures with a multi-layered security solution. Learn more about NCR Network & Security Services

Delivers integrated, real-time security management in a single, seamless suite. Learn more about NerveCenter

Delivers integrated, real-time security management in a single, seamless suite. Learn more about NerveCenter

Net Monitor for Employees is employee monitoring software that allows you to take full control of a computer and much more. Learn more about Net Monitor for Employees

Net Monitor for Employees is employee monitoring software that allows you to take full control of a computer and much more. Learn more about Net Monitor for Employees

Top choice of IT admins and tech coordinators to protect Windows operating systems and desktops from unwanted or malicious changes. Learn more about NetSupport Protect

Top choice of IT admins and tech coordinators to protect Windows operating systems and desktops from unwanted or malicious changes. Learn more about NetSupport Protect

Network security audit system designed to audit network and detect available security vulnerabilities in the network. Learn more about Network Security Auditor

Network security audit system designed to audit network and detect available security vulnerabilities in the network. Learn more about Network Security Auditor

Threat management software that enables you to police, prioritize and prevail across the full range of today's security threats. Learn more about Network Security Manager

Threat management software that enables you to police, prioritize and prevail across the full range of today's security threats. Learn more about Network Security Manager

Nfusion

by Ntrepid

Nfusion is a fully-managed and completely segragated secure VDI for online research and investigation. Learn more about Nfusion

Nfusion is a fully-managed and completely segragated secure VDI for online research and investigation. Learn more about Nfusion

Enables access to information through encryption, providing information security, privacy and confidentiality. Learn more about OpaqueVEIL

Enables access to information through encryption, providing information security, privacy and confidentiality. Learn more about OpaqueVEIL

OX Guard

by Open-Xchange

Email security solution that adheres to PGP encryption standard to assure that communications remain confidential. Learn more about OX Guard

Email security solution that adheres to PGP encryption standard to assure that communications remain confidential. Learn more about OX Guard

Password Safe

by BeyondTrust

Platform that unifies effective technologies for addressing internal and external risk: privileged account & vulnerability management. Learn more about Password Safe

Platform that unifies effective technologies for addressing internal and external risk: privileged account & vulnerability management. Learn more about Password Safe

Secures the Windows Operating System from unwanted or malicious writes. Learn more about PlatinumCache

Secures the Windows Operating System from unwanted or malicious writes. Learn more about PlatinumCache

PureSight CSDK/OEM

by PureSight Technologies

Easily integrated into Internet security suites/appliances to provide content filtering capabilities to your offerings. Learn more about PureSight CSDK/OEM

Easily integrated into Internet security suites/appliances to provide content filtering capabilities to your offerings. Learn more about PureSight CSDK/OEM

R&S Web Application Firewall

by Rohde & Schwarz Cybersecurity

R&S®Web Application Firewall protects business-critical web applications against threats and known and unknown attacks, including OWASP Learn more about R&S Web Application Firewall

R&S®Web Application Firewall protects business-critical web applications against threats and known and unknown attacks, including OWASP Learn more about R&S Web Application Firewall

RDS-Shield

by Marty Soft Conception

Secures and easily protects a Windows Remote Desktop Server against cyber criminals. Learn more about RDS-Shield

Secures and easily protects a Windows Remote Desktop Server against cyber criminals. Learn more about RDS-Shield

Combines advanced scanning technology with most comprehensive vulnerability database. Learn more about Retina Network Security Scanner

Combines advanced scanning technology with most comprehensive vulnerability database. Learn more about Retina Network Security Scanner

Rohos Logon Key

by Tesline-Service

Two-factor authentication solutions for Windows. Secure USB Key logon. Learn more about Rohos Logon Key

Two-factor authentication solutions for Windows. Secure USB Key logon. Learn more about Rohos Logon Key

RollBack Rx Pro

by Horizon Datasys

A comprehensive Windows System Restore solution that empowers users to easily restore their PCs to any previous state within seconds. Learn more about RollBack Rx Pro

A comprehensive Windows System Restore solution that empowers users to easily restore their PCs to any previous state within seconds. Learn more about RollBack Rx Pro

SearchLight

by Digital Shadows

Digital Shadows monitors an organization's digital risk, providing relevant threat intelligence across the open, deep, and dark web. Learn more about SearchLight

Digital Shadows monitors an organization's digital risk, providing relevant threat intelligence across the open, deep, and dark web. Learn more about SearchLight

SecuBox

by Aiko Solutions

AES 256-bit disk encryption for Windows Embedded Compact/ Windows CE handhelds and its media cards. Safe, secure and convenient storage Learn more about SecuBox

AES 256-bit disk encryption for Windows Embedded Compact/ Windows CE handhelds and its media cards. Safe, secure and convenient storage Learn more about SecuBox

Secure CommNet

by Radient Software

A 32-bit Windows application for secure shell (SSH2), telnet, and dial-up connections. Learn more about Secure CommNet

A 32-bit Windows application for secure shell (SSH2), telnet, and dial-up connections. Learn more about Secure CommNet

Secure Hive

by Secure Hive

Create encrypted archives and self-extracting .exe files for secure storage and file sharing. Learn more about Secure Hive

Create encrypted archives and self-extracting .exe files for secure storage and file sharing. Learn more about Secure Hive

Acting as a sidekick to your antivirus program, Secure Hunter locates malicious software and eliminates it before it reaches your data. Learn more about Secure Hunter Business

Acting as a sidekick to your antivirus program, Secure Hunter locates malicious software and eliminates it before it reaches your data. Learn more about Secure Hunter Business

SecureCircle

by SecureCircle

SecureCircle helps organizations ensure the security, visibility, and control of unstructured data from internal and external threats. Learn more about SecureCircle

SecureCircle helps organizations ensure the security, visibility, and control of unstructured data from internal and external threats. Learn more about SecureCircle

SecuredTouch

by SecuredTouch

SecuredTouch provides behavioral biometrics for mobile, continuous authentication technologies to strengthen security and reduce fraud. Learn more about SecuredTouch

SecuredTouch provides behavioral biometrics for mobile, continuous authentication technologies to strengthen security and reduce fraud. Learn more about SecuredTouch

Security services platform is your company's security services, for your clients, and 100% private labeled for YOUR business. Learn more about Security Services Platform

Security services platform is your company's security services, for your clients, and 100% private labeled for YOUR business. Learn more about Security Services Platform

Security Shield

by PCSecurityShield

Protects your business from viruses, spyware, Trojans, root-kits, hackers, adware and more. Learn more about Security Shield

Protects your business from viruses, spyware, Trojans, root-kits, hackers, adware and more. Learn more about Security Shield

SecurityEXPERT

by St. Bernard Software

Policy-based product; audit, enforce and report on managed machines with respect to their assigned policies. Learn more about SecurityEXPERT

Policy-based product; audit, enforce and report on managed machines with respect to their assigned policies. Learn more about SecurityEXPERT

SERVERWAT.CH Security Scanner

by SERVERWAT.CH Security Scanner

Schedule vulnerability scans for your servers and get notified when it's time to call your admin. Learn more about SERVERWAT.CH Security Scanner

Schedule vulnerability scans for your servers and get notified when it's time to call your admin. Learn more about SERVERWAT.CH Security Scanner

We integrate the most widely used intrusion panels and CCTV systems on one screen with features including camera picture pop-ups. Learn more about Siwenoid

We integrate the most widely used intrusion panels and CCTV systems on one screen with features including camera picture pop-ups. Learn more about Siwenoid

Snorkel-Server

by Odyssey Technologies

Security gateway software with capabilities for providing digital certificate based authentication and non-repudiation services. Learn more about Snorkel-Server

Security gateway software with capabilities for providing digital certificate based authentication and non-repudiation services. Learn more about Snorkel-Server

Specops Password Sync

by Specops Software

Fights password fatigue by reducing number of passwords to remember Learn more about Specops Password Sync

Fights password fatigue by reducing number of passwords to remember Learn more about Specops Password Sync

StillSecure

by StillSecure

Security testing, monitoring and management software that defends networks from security breaches. Learn more about StillSecure

Security testing, monitoring and management software that defends networks from security breaches. Learn more about StillSecure

SyncBoss

by SecurePro Software

File Synchronization and Cloud Storage application that allows users to protect, synchronize, and share files. Learn more about SyncBoss

File Synchronization and Cloud Storage application that allows users to protect, synchronize, and share files. Learn more about SyncBoss

Syspeace

by Treetop Innovation

Anti-hacking software protecting against brute force attacks on Microsoft servers. Learn more about Syspeace

Anti-hacking software protecting against brute force attacks on Microsoft servers. Learn more about Syspeace

TF2000

by ComputerProx

Solution that automatically locks the system without requiring any keystrokes from the user. Learn more about TF2000

Solution that automatically locks the system without requiring any keystrokes from the user. Learn more about TF2000

ThreatSentry

by Privacyware

Web application firewall that provides protection from known or new threats to IIS and from internal or external threats. Learn more about ThreatSentry

Web application firewall that provides protection from known or new threats to IIS and from internal or external threats. Learn more about ThreatSentry

Detect intentional tampering, user error, software failure, and introductions of malicious software. Learn more about Tripwire for Servers

Detect intentional tampering, user error, software failure, and introductions of malicious software. Learn more about Tripwire for Servers

Security solution for Unix-like OS. Separate system administrators from sensitive data to ensure security of your IT resources. Learn more about Trustifier KSE

Security solution for Unix-like OS. Separate system administrators from sensitive data to ensure security of your IT resources. Learn more about Trustifier KSE

A professional yet easy-to-use Windows tweaking utility with 2494 policies to configure. Learn more about TweakEasy Professional

A professional yet easy-to-use Windows tweaking utility with 2494 policies to configure. Learn more about TweakEasy Professional

Manages all crucial security functions, including authentication, encryption and addressing. Learn more about Validian Protect

Manages all crucial security functions, including authentication, encryption and addressing. Learn more about Validian Protect

VMRay Analyzer helps security teams analyze and detect advanced, targeted malware by offering an automated malware analysis solution. Learn more about VMRay

VMRay Analyzer helps security teams analyze and detect advanced, targeted malware by offering an automated malware analysis solution. Learn more about VMRay

A network security software which helps in protecting sensitive data from phishing attacks by scanning file attachments in emails. Learn more about Votiro Secure Email Gateway

A network security software which helps in protecting sensitive data from phishing attacks by scanning file attachments in emails. Learn more about Votiro Secure Email Gateway

System for two-factor authentication that increases security, reduces costs and is very convenient to the end-user. Learn more about WiKID Authentication System

System for two-factor authentication that increases security, reduces costs and is very convenient to the end-user. Learn more about WiKID Authentication System

XyLoc Security Server

by Ensure Technologies

A server-based software platform that centrally manages and monitors XyLoc users and protected workstations throughout the enterprise. Learn more about XyLoc Security Server

A server-based software platform that centrally manages and monitors XyLoc users and protected workstations throughout the enterprise. Learn more about XyLoc Security Server

Filter Results (167)

Product Rating

Users

Deployment

Features


What is Computer Security Software?

Computer Security software automates the security and monitoring of computer systems.


Loading...

Tips & Trends

We know business software inside and out. Check out our blog to see what's happening in the world of software.

Visit the Blog