[go: up one dir, main page]

Suggested Categories:

IT Security Software
IT security software is designed to protect information technology (IT) systems, networks, and data from cyber threats, such as malware, hacking, and unauthorized access. These tools provide various features such as antivirus protection, firewalls, encryption, intrusion detection and prevention systems, and vulnerability management to ensure the integrity, confidentiality, and availability of sensitive information. IT security software helps organizations detect, prevent, and respond to security incidents, mitigate risks, and ensure compliance with industry regulations. It is critical for businesses and individuals to safeguard against cyberattacks, data breaches, and other security vulnerabilities.
IoT Security Software
IoT (Internet of Things) security software is designed to protect connected devices and networks from cyber threats, ensuring the confidentiality, integrity, and availability of data transmitted between IoT devices. These tools monitor and secure devices, applications, and networks that are part of the IoT ecosystem, which includes sensors, actuators, smart appliances, wearables, and industrial equipment. IoT security software includes features such as threat detection, data encryption, access control, device authentication, and vulnerability management to mitigate risks from cyberattacks, unauthorized access, and data breaches. It is essential for industries like healthcare, manufacturing, transportation, and smart cities, where the IoT devices are widely used and often contain sensitive or critical data.
Data Center Security Software
Data center security software enables IT security professionals and organizations to secure their data center infrastructure including racks, networks, server endpoints, and more. Data center security tools provide all aspects of security for data centers. Data center security software helps protect the physical and virtual infrastructure of data centers from unauthorized access, cyber threats, and data breaches. Data center security software ensures that sensitive information and critical systems are safeguarded from external and internal threats by providing real-time alerts, logging activities, and implementing compliance with security standards.
Application Security Software
Application security software is designed to protect applications from cyber threats by identifying vulnerabilities, preventing attacks, and ensuring data integrity throughout the application’s lifecycle. This software typically includes features like static and dynamic analysis, runtime protection, and vulnerability scanning to detect and address potential security issues such as SQL injection, cross-site scripting (XSS), and unauthorized access. It helps organizations maintain secure applications by implementing best practices for secure coding, performing penetration testing, and monitoring for security breaches. Application security software is crucial for organizations to safeguard sensitive data, comply with regulations, and minimize the risk of exploitation.
Database Security Software
Database security software tools enable organizations to secure their databases, and ensure security compliance with database operations.
Website Security Software
Website security software enables the protection of websites from cyber threats, online attacks and hackers through DDoS protection features and web application firewalls.
Cloud Security Software
Cloud security software consists of tools, software, and services designed to protect data, applications, and infrastructure associated with cloud environments. It addresses unique security challenges posed by the cloud, such as data breaches, unauthorized access, and compliance with regulatory standards. These solutions often include features like encryption, identity and access management, intrusion detection systems, and security information and event management (SIEM). By implementing cloud security software, organizations can safeguard their cloud-based assets from cyber threats and ensure the integrity and confidentiality of sensitive information. As businesses increasingly adopt cloud services, robust cloud security measures have become essential for maintaining operational continuity and customer trust.
Computer Security Software
Computer security software helps protect devices, networks, and sensitive data from unauthorized access, cyberattacks, and other security threats. These tools provide a range of protective features such as antivirus, firewall, encryption, malware detection, and intrusion prevention systems. Computer security software is essential for safeguarding against viruses, ransomware, spyware, and phishing attacks, ensuring the integrity, confidentiality, and availability of data. Many security solutions also offer real-time monitoring, automated updates, and threat intelligence to detect and mitigate new vulnerabilities as they emerge. Businesses and individuals rely on computer security software to reduce risks, comply with regulations, and maintain a secure computing environment.
Data Security Software
Data security software is designed to protect sensitive data from unauthorized access, theft, or corruption. It includes a variety of tools and features such as encryption, access control, data masking, and backup and recovery to ensure that data remains secure at rest, in transit, and during processing. These solutions help organizations comply with data protection regulations, such as GDPR and HIPAA, by safeguarding personal, financial, and business data. Data security software often integrates with other IT security systems to provide comprehensive protection against cyberattacks, insider threats, and data breaches, ensuring that critical information remains protected.
Container Security Software
Container security software is software designed to protect containerized applications and environments from security vulnerabilities, threats, and attacks. Containers, which are used to deploy and run applications in isolated environments, present unique security challenges due to their dynamic and ephemeral nature. Container security software helps secure containerized environments by providing capabilities such as vulnerability scanning, runtime protection, access control, and image security. These tools monitor container configurations and activity to detect anomalies, ensure compliance with security policies, and mitigate risks like container escapes or unauthorized access. By enhancing the security of containers and container orchestration platforms (like Kubernetes), these solutions enable organizations to securely deploy and manage applications in cloud-native and microservices environments.
API Security Software
API security software is designed to protect APIs from security threats such as unauthorized access, data breaches, and denial-of-service attacks. These tools monitor, authenticate, and secure the connections between APIs and the systems they interact with, ensuring that only authorized users and systems can access the data or services offered by the API. Features typically include encryption, rate limiting, authentication (such as OAuth, JWT), API traffic monitoring, threat detection, and automated security testing. API security software is crucial for businesses that rely on APIs to connect with third-party services, mobile apps, or microservices, as it helps mitigate risks and maintain data integrity.
Network Security Software
Network security software is a type of software that helps protect computers, networks, and data from malicious attacks and unauthorized access. It is typically used by businesses to protect their confidential information and keep systems safe. It can also be used by individuals to protect their personal information and devices from potential threats.
Physical Security Software
Physical security software is a suite of tools designed to manage and monitor the security of physical spaces, assets, and individuals within an organization. These platforms often integrate with hardware systems such as access control systems, surveillance cameras, alarms, and sensors to provide a comprehensive security solution. Features of physical security software can include real-time monitoring, incident reporting, visitor management, access control, and remote security management. The software can also provide detailed analytics on security incidents, track access logs, and manage emergency response protocols. By helping organizations secure their physical premises, physical security software enhances safety, prevents unauthorized access, and ensures regulatory compliance.
Email Security Software
Email security software protects organizations from cyber threats such as phishing, malware, and spam by filtering incoming and outgoing email traffic. It uses advanced threat detection, encryption, and data loss prevention (DLP) to safeguard sensitive information. These tools also offer features like email authentication (DMARC, SPF, DKIM) and real-time threat intelligence to block emerging attacks. By securing email communications, businesses can prevent data breaches, ensure regulatory compliance, and maintain user trust. Email security software is essential for mitigating human error, which is one of the leading causes of data breaches.
Secure Web Gateways
Secure web gateways, also known as web security gateways, are web security solutions meant to protect organizations by filtering network traffic like websites, downloads, and content, as well as stopping incoming threats. Secure web gateways also help enforce employee compliance to reduce cyberthreats.
Security Awareness Training Programs
Security awareness training programs are platforms designed to help employees, partners, and other stakeholders recognize and respond to security threats and best practices. These programs typically focus on topics like phishing, password management, data protection, and secure browsing habits, aiming to create a culture of security within an organization. By providing interactive modules, quizzes, and real-world scenarios, these programs ensure that participants can identify potential risks and mitigate them effectively. Many security awareness training platforms offer tracking and reporting features, allowing organizations to monitor progress and measure the effectiveness of their training efforts. The goal is to reduce the likelihood of security breaches caused by human error and ensure that individuals are well-informed about their role in maintaining cybersecurity.
Cloud Access Security Brokers (CASB)
Cloud Access Security Brokers (CASBs) are software applications that sit between a cloud service provider and an organization. Their purpose is to provide visibility and control over the use of cloud services, ensuring that data remains secure while enabling users to access the resources they need from any device. CASBs operate in real-time and can be used with multiple cloud platforms, such as SaaS, IaaS, or PaaS. They also provide granular access controls on user activities within the cloud system, allowing administrators to create rules around data sharing.
Zero Trust Security Software
Zero trust security software, also known as zero trust networking software, provides a security solution based on the zero trust methodology. Zero trust security solutions enable organizations to enforce security policies on a "zero trust" basis for both internal and external users, and allow security teams to track, monitor, and analyze user behavior and usage across the network to identify potential threats.
School Safety Software
School safety software enables schools and educational institutions to manage all aspects of school safety, school security, and compliance.
DNS Security Software
DNS security software enables organizations to protect their DNS against threats and malware. DNS security solutions streamline the process of securing DNS servers against attacks.

1069 Products for "security" with 1 filter applied:

  • 1
    Proton Mail

    Proton Mail

    Proton AG

    Proton Mail is the simplest way to protect your communications with built-in end-to-end encryption. Prevent data breaches, stay compliant with regulations like GDPR and HIPAA, and earn client trust. Protected by Swiss privacy laws and trusted by over 50,000 businesses, Proton Mail keeps your business data confidential and under your control. With Proton Mail and Calendar, your team can securely manage their inbox and schedule, while your organization maintains a professional presence...
    Leader badge">
    Starting Price: $6.99/user/month
  • 2
    Topsec Managed Email Security

    Topsec Managed Email Security

    Topsec Cloud Solutions

    Topsec Managed Email Security is a robust cloud-based service tailored to fortify organizations against email-based threats like phishing, ransomware, malware, zero-day attacks, etc while optimizing communication. This is a fully managed conceirge service. Its comprehensive feature set encompasses advanced threat protection, data loss prevention, email continuity, customizable policies, user-friendly management tools, real-time monitoring, and reporting. By deploying Topsec, businesses...
  • 3
    School Security First App

    School Security First App

    School Security First App

    Once your school has purchased the plan of their choice, our app allows any school staff member the capability to activate one of the 8 available emergency alerts. With a simple click of a button, every person on campus and the police who has the school security first app will be notified as to the type and exact location of the emergency. With a second click of a button, the police are also notified as to the type of emergency and location. This all happens in under six seconds, the app...
  • 4
    SpamTitan

    SpamTitan

    TitanHQ

    SpamTitan email security is an email spam filter for businesses, smbs, MSPs, and schools. SpamTitan email security blocks spam as well as phishing and day-zero attacks, viruses, malware, ransomware, and other email threats. Helps control mail flow, clean it, and protect against unwanted email. We provide easy-to-use yet advanced email security for businesses, smbs and MSPs that are Office365 friendly. SpamTitan - Premium functionality included: • CEO Impersonation protection...
    Leader badge">
    Starting Price: $2.14/user/month
  • 5
    Cloudbrink

    Cloudbrink

    Cloudbrink

    If you’ve ever dealt with slow VPNs, or clunky ZTNA agents that degrade app performance, you’re not alone. Many IT teams are stuck balancing security with usability—and often end up sacrificing both. Here is a different approach. The high-performance ZTNA service that is part of a personal SASE solution from Cloudbrink can upgrade or replace traditional VPNs while fixing the performance and complexity that come from other vendors in the ZTNA and SASE space. Built as a software-only service...
  • 6
    NeoCertified Secure Email
    NeoCertified protects sensitive information through our secure email application across our versatile Cloud-based platform on any web browser, through Microsoft Office 365/Outlook plug-ins, and Gmail integration. iPhone + Android mobile apps are also available directly on your mobile devices. We have provided federally compliant, secure email solutions since 2002, and have helped businesses send and receive secure emails on any web browser or mobile device. NeoCertified also works across...
    Leader badge">
    Starting Price: $99.00/year/user
  • 7
    iPlum

    iPlum

    iPlum

    ... and manage iPlum users with different profiles and permissions in a corporate account. Tell your customers you care by automatically sending smart business text for missed calls or texts. Attach a signature for your texts. Texting in legal or healthcare business requiring HIPAA compliance, use secure channels with encryption. Your clients get FREE iPlum app to send you secure texts. It is critical to protect client data as per privacy and security regulations.
    Starting Price: $8.99 per user per month
  • 8
    ManageEngine ADManager Plus
    ADManager Plus is a simple, easy-to-use Windows Active Directory (AD) management and reporting solution that helps AD administrators and help desk technicians in their day-to-day activities. With a centralized and intuitive web-based GUI, the software handles a variety of complex tasks like bulk management of user accounts and other AD objects, delegates role-based access to help desk technicians, and generates an exhaustive list of AD reports, some of which are an essential requirement to...
    Starting Price: $595 per year
  • 9
    Notifyre

    Notifyre

    Notifyre

    Elevate your business communications with Notifyre's secure SMS and fax solutions. We're ISO 27001 certified and fully HIPAA compliant, providing BAA's, user access controls and audit trails and more security features. Benefit from flexible pay-as-you-go fax & SMS and outstanding value receive fax plans. Fax service features include: - Online Fax Platform - Email to Fax and Fax to Email - Fax API -Online Fax Numbers -Fax Number Porting -Fax Broadcast Text messaging service...
    Leader badge">
    Starting Price: 2¢/SMS part; 3¢/fax page (USD)
  • 10
    iDenfy

    iDenfy

    iDenfy

    Powerful, all-in-one identity verification, fraud prevention, and compliance platform. iDenfy protects startups, financial institutions, gambling, streaming, ridesharing, and other digital services from identity fraud using a three-layer identity verification process. The process protects businesses from the most threatening forms of identity fraud. iDenfy also provides services for business verification, proxy detection, fraud scoring, AML screening and monitoring, NFC...
    Starting Price: €0.5 per verification
  • 11
    Lavabit

    Lavabit

    Lavabit

    Secure email for the world. Because everyone has the right to communicate privately. Flow is the most secure email solution for traditional email—compatible with most email clients. Volcano—our free, open source mail client—takes full advantage of the Dark Internet Mail Environment. Magma is our open source server for the Dark Internet Mail Environment—perfect if you need to host your own secure email. We're pioneers in encrypted email who believe all people have the right to private and secure...
  • 12
    Sealit

    Sealit

    Sealit Technologies

    When implementing a Zero Trust security model you shouldn’t question if your accounts or devices will get get compromised - assume they will. With Sealit, the sensitive data in your emails and files will remain fully protected even in that scenario. It takes one click from your existing inbox to encrypt your sensitive emails. It takes one click to encrypt any file format on your desktop. We made sure your workflow isn’t disrupted as we add a strong layer of protection to your sensitive data...
  • 13
    Enterprise Bot

    Enterprise Bot

    Enterprise Bot

    Enterprise Bot, based in Switzerland, is a pioneer in Conversational AI, Process Automation, and Generative AI. With the trust of esteemed enterprise giants across industries like Generali, SIX, SBB, DHL, and SWICA, Enterprise Bot is revolutionizing both customer and employee experiences. Through its advanced integration with Large Language Models (LLM) such as ChatGPT and Llama 2, and its unique patent-pending DocBrain technology, the company delivers unparalleled personalization, active...
  • 14
    WebCatalog Desktop
    ... app, eliminate browser tab overload, and easily switch between multiple accounts for the same service without constant logins. Each app runs in its own secure sandbox, safeguarding your data and preventing cross-site tracking. With unified notifications, customizable layouts, workspace grouping, and cross-platform sync, WebCatalog Desktop delivers a seamless, organized, and distraction-free digital workflow.
    Starting Price: Free
  • 15
    URIports

    URIports

    URIports BV

    Utilize the free built-in capabilities of mail servers and your site visitors' browsers to quickly identify and resolve security, content and connectivity issues with your domain, without having to install additional scripts or software. URIports is an advanced unified tool to monitor web and mail server security and configuration. URIports is the result of our decades of experience in online coding, monitoring, and security. When the system is configured, we receive reports from your site...
    Starting Price: $1 per month
  • 16
    GBS iQ.Suite
    The use of collaboration tools and meeting platforms from vendors such as Microsoft and CISCO is constantly increasing, and with it the security measures that need to be taken. As more and more channels, more complex IT infrastructures and a large part of the platforms run entirely in the cloud, new gateways and attack vectors are emerging. While most organizations are constantly increasing their email security measurements, they often tend to overlook protection against malicious files...
  • 17
    BrandMail

    BrandMail

    BrandQuantum

    ... managed. More importantly, users see their signatures, banners and surveys when they create, reply or forward emails. BrandMail does not reroute your emails via any external servers and does not append rules to your exchange environment. It works directly within Microsoft Outlook. Leverage every email as an opportunity to brand consistently and minimize the security risks associated with the tampering of HTML signatures.
    Leader badge">
    Starting Price: $1 per user per month
    Partner badge
  • 18
    365 Total Protection

    365 Total Protection

    Hornetsecurity

    365 Total Protection from Hornetsecurity offers comprehensive protection for Microsoft cloud services – specially developed for Microsoft 365 and seamlessly integrated to provide comprehensive protection for Microsoft cloud services. Easy to set up and extremely intuitive to use, 365 Total Protection simplifies your IT Security management from the very start. Protect your Microsoft 365 against phishing, ransomware, advanced threats and data loss with 365 Total Protection Enterprise Backup...
  • 19
    Tuta

    Tuta

    Tuta

    Tuta offers a highly secure, encrypted email, calendar, and contacts service designed to give users complete control over their data. With end-to-end encryption powered by quantum-safe cryptography, Tuta ensures that all your communications are private and safe from surveillance. The platform is easy to use, supports mobile apps for Android and iOS, and is ad-free, offering a seamless experience across multiple devices. Tuta is committed to using renewable energy to power its servers, ensuring...
    Starting Price: €1.20 per month
  • 20
    Mailfence

    Mailfence

    Mailfence

    Mailfence is an encrypted email service that offers OpenPGP based end-to-end encryption and digital signatures. Mailfence comes with a plethora of features that boost collaboration without compromising security and convenience. Mailfence documents allow you to safely store and edit documents, you can also share docs with your team with the push of a button. Mailfence calendar will keep your tasks, meetings, and events all in one secure place. Mailfence contacts will store your contacts...
    Leader badge">
    Starting Price: $2.50/month/user
  • 21
    Brosix

    Brosix

    Brosix

    Brosix Instant Messenger (IM) supports businesses to streamline and secure their team communication through private team communication networks. Brosix provides businesses with all of the tools they need to increase team productivity in one user friendly and fully encrypted platform, including file transfer, screen sharing, group and private chat, virtual whiteboard and more. Brosix IM’s private networks help businesses to increase team collaboration and efficiency, reduce overhead...
    Leader badge">
    Starting Price: $4 per month
  • 22
    Chanty

    Chanty

    Chanty

    Chanty is an internal communication app that bridges the gap between back-office and frontline staff, enabling secure, on-the-go access for every employee on any device, anywhere. With Chanty, you can view all your messages, contacts, and tasks in one place, even offline. Its clear user interface makes it fast, simple, and intuitive, much like WhatsApp. Beyond chats with unlimited history, Chanty offers audio/video calls, screen sharing, project management tools, and integrations with any...
    Leader badge">
    Starting Price: $3 per user per month
  • 23
    Shape Software

    Shape Software

    Shape Software

    Shape is purpose-built sales and marketing automation software that comes with pre-built features that can be configured for any business. The easy-to-use interface empowers your teams and consolidates all aspects of your business in one AI platform. Shape provides a collaborative space for your teams to stay aligned and efficient in everything they do, whether it's streamlining your sales pipeline, engaging more prospects with marketing sequences and digital ads, nurturing customer...
    Leader badge">
    Starting Price: $119
  • 24
    Mailprotector

    Mailprotector

    Mailprotector

    Mailprotector delivers award-winning email experiences exclusively through our amazing partner resellers. Easy to use encrypted email with no plugins or apps. Bracket has turned using email encryption from dread to delight. Just wrap brackets around the [subject] in any email client on any device, and Bracket handles the rest. Total email security that filters all the junk people don’t want. CloudFilter delivers full-stack protection from annoying spam and crippling email-based virus...
  • 25
    CallHub

    CallHub

    CallHub

    CallHub is a trusted campaigning platform that will revolutionize your outreach, canvassing, mobilizing, and marketing campaigns. We offer calling, texting, and email solutions for political campaigns, advocacy groups, nonprofits, and businesses of all sizes. But CallHub is more than a software solution. We understand your needs for data security, high contact rates, automation, reliability, and compliance. CallHub is designed with these parameters in focus. Try us out today! Call...
    Leader badge">
    Starting Price: $0
    Partner badge
  • 26
    Dataminr

    Dataminr

    Dataminr

    Dataminr’s AI platform detects high-impact events and potential risks as they unfold, sending real-time alerts to your global teams. Know critical information first, respond with confidence, and manage crises more effectively across your enterprise. Dataminr Pulse gives you the earliest indications of high-impact events—plus rich visual context and tools that help you collaborate and act faster—so you can better protect your people, your brand and your physical and digital assets. Dataminr...
  • 27
    ArvanCloud

    ArvanCloud

    ArvanCloud

    ArvanCloud CDN comprises tens of PoP sites in important locations all around the world to deliver online content to the users, from the closest geographical point at the highest speed and quality. With ArvanCloud Cloud Computing infrastructure, you are just a few clicks away from creating unlimited cloud servers on demand. You can create several cloud storage disks for each server and easily manage your cloud data center communications using Firewall and private and public networks....
  • 28
    mxHERO

    mxHERO

    mxHERO

    The leading enterprise technology for email attachment security integrating your email and cloud storage services. mxHERO replaces email attachments with secure cloud storage links so that sensitive files are no longer sent and stored unprotected outside the organization - as they are in standard email. Email can expose sensitive content inside & outside the organization. mxHERO ensures that all email content is managed via client preferred content platforms. mxHERO automatically moves file...
    Starting Price: $5 month/user
  • 29
    MailChannels

    MailChannels

    MailChannels

    Secure and deliver email at scale. Use MailChannels to uncover bad actors and prevent spammers from taking advantage of your infrastructure. Monitor outgoing email messages for spam and unusual sending activity. Protect your customer inboxes against spam, phishing, and other email threats. A powerful, intuitive interface makes managing your customers simple and efficient. We operate across multiple clouds and minimize single points of failure to keep our services online, all the time. Get...
    Starting Price: $79.99 per month
  • 30
    Barracuda Spam Firewall
    Spam, malicious email and virus attacks are becoming ever more sophisticated. Your corporate email is a gateway that can allow sensitive information to be destroyed or lost as well as for attacks that can hurt your network performance and employee productivity. The Barracuda Spam Firewall scans email and incoming files using three layers of powerful virus scanning technology. The firewall connects to the Barracuda Security Cloud to for the most up-to-date protection against the latest email...
    Starting Price: $699.99/one-time
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next