[go: up one dir, main page]

Suggested Categories:

IT Security Software
IT security software is designed to protect information technology (IT) systems, networks, and data from cyber threats, such as malware, hacking, and unauthorized access. These tools provide various features such as antivirus protection, firewalls, encryption, intrusion detection and prevention systems, and vulnerability management to ensure the integrity, confidentiality, and availability of sensitive information. IT security software helps organizations detect, prevent, and respond to security incidents, mitigate risks, and ensure compliance with industry regulations. It is critical for businesses and individuals to safeguard against cyberattacks, data breaches, and other security vulnerabilities.
IoT Security Software
IoT (Internet of Things) security software is designed to protect connected devices and networks from cyber threats, ensuring the confidentiality, integrity, and availability of data transmitted between IoT devices. These tools monitor and secure devices, applications, and networks that are part of the IoT ecosystem, which includes sensors, actuators, smart appliances, wearables, and industrial equipment. IoT security software includes features such as threat detection, data encryption, access control, device authentication, and vulnerability management to mitigate risks from cyberattacks, unauthorized access, and data breaches. It is essential for industries like healthcare, manufacturing, transportation, and smart cities, where the IoT devices are widely used and often contain sensitive or critical data.
Data Center Security Software
Data center security software enables IT security professionals and organizations to secure their data center infrastructure including racks, networks, server endpoints, and more. Data center security tools provide all aspects of security for data centers. Data center security software helps protect the physical and virtual infrastructure of data centers from unauthorized access, cyber threats, and data breaches. Data center security software ensures that sensitive information and critical systems are safeguarded from external and internal threats by providing real-time alerts, logging activities, and implementing compliance with security standards.
Application Security Software
Application security software is designed to protect applications from cyber threats by identifying vulnerabilities, preventing attacks, and ensuring data integrity throughout the application’s lifecycle. This software typically includes features like static and dynamic analysis, runtime protection, and vulnerability scanning to detect and address potential security issues such as SQL injection, cross-site scripting (XSS), and unauthorized access. It helps organizations maintain secure applications by implementing best practices for secure coding, performing penetration testing, and monitoring for security breaches. Application security software is crucial for organizations to safeguard sensitive data, comply with regulations, and minimize the risk of exploitation.
Website Security Software
Website security software protects websites from cyber threats such as malware, hacking attempts, DDoS attacks, and data breaches. It continuously monitors website traffic, scans for vulnerabilities, and blocks suspicious activity in real time. Many solutions include firewalls, bot protection, SSL management, and automated malware removal to keep sites safe and compliant. Website security software also provides dashboards and reports to help teams understand risks and stay ahead of emerging threats. Overall, it ensures websites remain fast, secure, and trustworthy for users.
Cloud Security Software
Cloud security software consists of tools, software, and services designed to protect data, applications, and infrastructure associated with cloud environments. It addresses unique security challenges posed by the cloud, such as data breaches, unauthorized access, and compliance with regulatory standards. These solutions often include features like encryption, identity and access management, intrusion detection systems, and security information and event management (SIEM). By implementing cloud security software, organizations can safeguard their cloud-based assets from cyber threats and ensure the integrity and confidentiality of sensitive information. As businesses increasingly adopt cloud services, robust cloud security measures have become essential for maintaining operational continuity and customer trust.
Database Security Software
Database security software tools enable organizations to secure their databases, and ensure security compliance with database operations.
Data Security Software
Data security software is designed to protect sensitive data from unauthorized access, theft, or corruption. It includes a variety of tools and features such as encryption, access control, data masking, and backup and recovery to ensure that data remains secure at rest, in transit, and during processing. These solutions help organizations comply with data protection regulations, such as GDPR and HIPAA, by safeguarding personal, financial, and business data. Data security software often integrates with other IT security systems to provide comprehensive protection against cyberattacks, insider threats, and data breaches, ensuring that critical information remains protected.
Network Security Software
Network security software is a type of software that helps protect computers, networks, and data from malicious attacks and unauthorized access. It is typically used by businesses to protect their confidential information and keep systems safe. It can also be used by individuals to protect their personal information and devices from potential threats.
API Security Software
API security software is designed to protect APIs from security threats such as unauthorized access, data breaches, and denial-of-service attacks. These tools monitor, authenticate, and secure the connections between APIs and the systems they interact with, ensuring that only authorized users and systems can access the data or services offered by the API. Features typically include encryption, rate limiting, authentication (such as OAuth, JWT), API traffic monitoring, threat detection, and automated security testing. API security software is crucial for businesses that rely on APIs to connect with third-party services, mobile apps, or microservices, as it helps mitigate risks and maintain data integrity.
Computer Security Software
Computer security software helps protect devices, networks, and sensitive data from unauthorized access, cyberattacks, and other security threats. These tools provide a range of protective features such as antivirus, firewall, encryption, malware detection, and intrusion prevention systems. Computer security software is essential for safeguarding against viruses, ransomware, spyware, and phishing attacks, ensuring the integrity, confidentiality, and availability of data. Many security solutions also offer real-time monitoring, automated updates, and threat intelligence to detect and mitigate new vulnerabilities as they emerge. Businesses and individuals rely on computer security software to reduce risks, comply with regulations, and maintain a secure computing environment.
Container Security Software
Container security software is software designed to protect containerized applications and environments from security vulnerabilities, threats, and attacks. Containers, which are used to deploy and run applications in isolated environments, present unique security challenges due to their dynamic and ephemeral nature. Container security software helps secure containerized environments by providing capabilities such as vulnerability scanning, runtime protection, access control, and image security. These tools monitor container configurations and activity to detect anomalies, ensure compliance with security policies, and mitigate risks like container escapes or unauthorized access. By enhancing the security of containers and container orchestration platforms (like Kubernetes), these solutions enable organizations to securely deploy and manage applications in cloud-native and microservices environments.
Physical Security Software
Physical security software is a suite of tools designed to manage and monitor the security of physical spaces, assets, and individuals within an organization. These platforms often integrate with hardware systems such as access control systems, surveillance cameras, alarms, and sensors to provide a comprehensive security solution. Features of physical security software can include real-time monitoring, incident reporting, visitor management, access control, and remote security management. The software can also provide detailed analytics on security incidents, track access logs, and manage emergency response protocols. By helping organizations secure their physical premises, physical security software enhances safety, prevents unauthorized access, and ensures regulatory compliance.
Email Security Software
Email security software protects organizations from cyber threats such as phishing, malware, and spam by filtering incoming and outgoing email traffic. It uses advanced threat detection, encryption, and data loss prevention (DLP) to safeguard sensitive information. These tools also offer features like email authentication (DMARC, SPF, DKIM) and real-time threat intelligence to block emerging attacks. By securing email communications, businesses can prevent data breaches, ensure regulatory compliance, and maintain user trust. Email security software is essential for mitigating human error, which is one of the leading causes of data breaches.
Secure Web Gateways
Secure web gateways protect users and organizations from online threats by monitoring and controlling web traffic between internal networks and the internet. They filter malicious websites, block unauthorized access, and prevent data leaks by enforcing security policies in real time. These gateways use technologies such as URL filtering, malware scanning, sandboxing, and data loss prevention to safeguard users across devices and locations. Cloud-based versions extend protection to remote and hybrid workforces without relying on traditional network perimeters. Ultimately, secure web gateways ensure safe, compliant, and controlled internet access while maintaining high performance and user productivity.
Security Awareness Training Programs
Security awareness training programs are platforms designed to help employees, partners, and other stakeholders recognize and respond to security threats and best practices. These programs typically focus on topics like phishing, password management, data protection, and secure browsing habits, aiming to create a culture of security within an organization. By providing interactive modules, quizzes, and real-world scenarios, these programs ensure that participants can identify potential risks and mitigate them effectively. Many security awareness training platforms offer tracking and reporting features, allowing organizations to monitor progress and measure the effectiveness of their training efforts. The goal is to reduce the likelihood of security breaches caused by human error and ensure that individuals are well-informed about their role in maintaining cybersecurity.
Zero Trust Security Software
Zero trust security software, also known as zero trust networking software, provides a security solution based on the zero trust methodology. Zero trust security solutions enable organizations to enforce security policies on a "zero trust" basis for both internal and external users, and allow security teams to track, monitor, and analyze user behavior and usage across the network to identify potential threats.
Cloud Access Security Brokers (CASB)
Cloud Access Security Brokers (CASBs) are software applications that sit between a cloud service provider and an organization. Their purpose is to provide visibility and control over the use of cloud services, ensuring that data remains secure while enabling users to access the resources they need from any device. CASBs operate in real-time and can be used with multiple cloud platforms, such as SaaS, IaaS, or PaaS. They also provide granular access controls on user activities within the cloud system, allowing administrators to create rules around data sharing.
DNS Security Software
DNS security software enables organizations to protect their DNS against threats and malware. DNS security solutions streamline the process of securing DNS servers against attacks.
Security Compliance Software
Security compliance software enables organizations to manage, track, and comply with cybersecurity compliance regulations and frameworks. Security compliance software provides tools for companies to audit their security posture and policies and achieve compliance certifications such as ISO 27001, ISO 27002, ISO 27017, CSA STAR, SOC 2, PCI DSS, FedRAMP, NIST 800-171, NIST 800-53, and more.

562 Products for "secure" with 1 filter applied:

  • 1
    Secure Shield

    Secure Shield

    SecureShield

    ...Getting people to use it should be simple. Automate and monitor attendance and resource use at classrooms, recreational facilities, stadiums, cafeteria and classrooms. Refine security systems by adding location intelligence. A smart campus is a healthy campus. Detect HVAC, Air Quality issues in classrooms and address operational deficiencies proactively. Insights to understand how students are using the campus. Customizable reports and dashboards to support the unique use cases that a smart campus needs. Secure Shield leverages the infrastructure you already have in place. ...
  • 2
    Secure Code Warrior

    Secure Code Warrior

    Secure Code Warrior

    Secure Code Warrior is a proven suite of secure coding tools. They are contained within one powerful platform which moves the focus from reaction to prevention. The platform trains and equips Developers to think and act with a security mindset as they build and verify their skills, gain real-time advice and monitor skill development - allowing them to ship secure code with confidence.
  • 3
    myACI

    myACI

    ACI Learning

    ...Whether you’re training a team or advancing your career, myACI makes it easy to learn, track progress, and see results that matter. This is online training with labs—not passive learning. From compliance and cloud to security and systems, ACI Learning helps professionals build confidence and capability. myACI offers role-based learning paths, video+lab combos, practice exams, and progress tracking. Managers get dashboards, credential tracking, and analytics that tie training to outcomes—with enterprise tools like SSO, LMS/LTI integration, SCORM support, and audit-ready reporting.
    Leader badge">
    Starting Price: $59/mo./user
    Partner badge
  • 4
    GoPad for Schools

    GoPad for Schools

    GoPad Secure Technologies

    Improve school security and go paperless with GoPad for Schools, an attendance solution. GoPad for Schools is suitable for camps, schools, and other educational organizations. GoPad for Schools features included communication, security, and data storage. GoPad for Schools enables users to track student attendance by checking students in and out and display the attendance of each classroom.
    Starting Price: $12.00/year/user
  • 5
    CBT Nuggets

    CBT Nuggets

    CBT Nuggets

    Learning IT doesn’t have to mean boring lectures, the frantic pace of bootcamps, or lots of time away from your job or family. With CBT Nuggets, you can train anytime, anywhere, at your own pace — all from the comfort of your office chair or living room couch. Our training team is made up of industry experts who truly enjoy teaching people IT. Their training is informative, relevant, and engaging — and because most videos are 10 minutes or less, it’s easier to retain information. Choose...
    Starting Price: $59 per user per month
  • 6
    Synap

    Synap

    Synap

    Synap is an award-winning exam platform that empowers organisations to deliver secure, online exams with ease. Save time and reduce your workload for creating, marking, and analysing exams. Customise your tests with multiple-choice and written question types, timers, randomisation, and question bank options. Reduce cheating and maintain exam integrity by preventing copying and pasting, using secure browsers, or by proctoring the exams.
    Starting Price: £40/month
    Partner badge
  • 7
    Eurekos

    Eurekos

    Eurekos

    ...Eurekos has everything for rapid onboarding, advanced certification, eCommerce, unlimited brand portals, complex organizational structures and integrated content development all under the highest privacy & security standards (ISO7IEC 27001 & 27701). We are constantly reinvesting into our software to bring our clients the latest, most current technical features available on the LMS market.
    Leader badge">
    Starting Price: $550 USD/month
    Partner badge
  • 8
    AwareGO

    AwareGO

    AwareGO

    The cyber security awareness solution that employees love. Build a strong security culture and empower your employees to become the first line of defense. Security awareness should not make people doze off. It should be fun, engaging and highly relatable. We’ve built a complete solution that will help you efficiently reduce the risk of cyber security breaches.
    Starting Price: $1 per user per month
  • 9
    STARS Campus for Career Colleges

    STARS Campus for Career Colleges

    STARS Campus Solutions

    ...You’ll experience our team’s expertise in information management as well as effective postsecondary school operations. We built STARS to be the most reliable and most secure career college management system, and we've built outstanding career schools using it! Contact us today to learn how STARS can help you!
    Starting Price: $250 / mo. - up to 25 students
  • 10
    Regpack

    Regpack

    Regpack

    Regpack is a smart online registration and payment platform that automates onboarding, billing, and client communication in one secure system. Trusted by thousands worldwide, Regpack streamlines how you collect payments, manage forms, and reduce manual work—giving you real-time insight into every part of your registration process. Looking for camp or course registration software with built-in payment tools? Regpack connects forms, billing, reporting, and communication, so you can automate recurring invoices, offer flexible plans, and track revenue all in one place. ...
  • 11
    RangeForce

    RangeForce

    RangeForce

    ...Train in customizable, virtual environments that emulate your own security stack.
  • 12
    Station X

    Station X

    Station X

    ...We offer comprehensive online cyber security training for security professionals and aspiring security professionals.
    Starting Price: $26 one-time payment
  • 13
    BioSig-ID

    BioSig-ID

    Biometric Signature ID

    ...Additionally, it provides real-time alerts for potential data crimes, ensuring proactive security.
  • 14
    emPower

    emPower

    emPower Solutions Inc.

    emPower Solutions works with organizations to meet their compliance, trainings needs and help prepare employees against social engineering. emPower has 100s of customers in several industries - financial, healthcare, utilities, services and higher-ed. emPower's platform provides learning management for your internal trainings, provides a course catalog for security trainings, HIPAA, OSHA etc. We also help manage internal policies. The platform provides simulated phishing to prepare employees against attack and train them on relevant security skills. Safety and compliance solutions exclusively for higher education. Cyber attackers are getting smarter, your team can out-smart them. Information security awareness training. ...
  • 15
    ManagedMethods

    ManagedMethods

    ManagedMethods

    Google Workspace and Microsoft 365 security made easy for K-12. ManagedMethods is an easy, affordable platform developed for school district IT teams to manage data security risks and detect student safety signals in the cloud. ManagedMethods provides K-12 IT teams with an easy, affordable way to identify cyber safety signals and data security risks in district Google Workspace and Microsoft 365 accounts.
  • 16
    YouTestMe

    YouTestMe

    YouTestMe

    ...YouTestMe harnesses cutting-edge AI technologies to empower users to effortlessly create tests and training courses from both proprietary and globally available resources, keeping organizations aligned with the latest industry trends. Designed as a highly secure enterprise solution, YouTestMe GetCertified can be deployed in the cloud or on-premise, making it an ideal choice for government, corporate, and educational institutions. The platform offers extensive customization options, API integrations, and a wide range of add-ons such as E-commerce and Single Sign-On (SSO), allowing organizations to tailor the system to their specific needs.
    Leader badge">
    Starting Price: $1/test
    Partner badge
  • 17
    Curricula

    Curricula

    Curricula

    Curricula's fun eLearning platform uses behavioral science-based techniques, such as storytelling, to fundamentally transform your employee security awareness training program. Let’s face it, employees tune out of boring ‘Death by PowerPoint’ information security awareness training and start to resent security instead of embracing it. Our behavioral science approach trains employees using short, memorable stories based on real-world cyber attacks. Our security awareness training content library is fun, memorable, and will have your employees begging you to release the next episode! ...
  • 18
    Cyberwatch

    Cyberwatch

    Cyberwatch

    ...The National CyberWatch Center has model cybersecurity curricula available, including multiple degree and certificate programs. The National CyberWatch Center also examines and responds to cybersecurity curricular issues of interest to the larger security community. The National CyberWatch Center Digital Press was created to produce and disseminate collections of timely publications on topics related to cybersecurity education, research, and workforce development. One-stop shop for quality educational and training resources, discounted certification exam vouchers, webcasts, internships, and access to employers looking to hire.
  • 19
    Living Security

    Living Security

    Living Security

    Living Security's training platform leverages gamified learning with live action immersive storylines and role-based micro modules to encourage engagement and motivate behavior change. Participants leave armed with valuable tools and techniques to combat cyber threats. Living Security’s Cyber Escape Room brings together all of the key components of a successful training program – hands-on, fun learning combined with relevant, comprehensive training to promote cybersecurity awareness that drives results. ...
  • 20
    Schoolplayer

    Schoolplayer

    Schoolplayer

    ...It includes Online Admission, Student & Employee Management, Fees & Finance, Attendance, Exam, Time-Table, Transport, Hostel, Canteen, and Payroll Management. With SMS/Notification alerts, GPS tracking, PTM scheduling, Gate Security, and Dashboard analytics, SchoolPlayer ensures smooth communication, safety, and performance tracking. It supports Scholarships, Parent-Teacher meetings, and front desk management too. Empower your school with a digital platform that’s secure, scalable, and made for modern education ne
    Starting Price: 240
  • 21
    Netsweeper

    Netsweeper

    Netsweeper

    Netsweeper enables organizations to protect internet users from harmful online content and provides web filtering, digital monitoring, and online activity reporting solutions to ensure digital safety on-premise and in remote environments. The leading web filtering platform with the lowest total cost of ownership, Netsweeper delivers advanced intelligence and management solutions for service provider networks, governments, and enterprises. Capable of being onboarded in cloud and on-premise...
    Starting Price: $1 per month
  • 22
    Flexible IR

    Flexible IR

    Flexible IR

    ...Evolving runbooks using Symbolic AI system integration. We provide understandable and easy baseline runbooks to handle incidents. The runbooks can be customised to your specific environment and security analyst. Expert audit of runbooks. Easily coach the less experienced members of the team in threat hunting and incident response topics. Simulate adversary use cases and practise. Plan skill development for your analysts. Move towards critical 1-10-60 rule for Incident response. Per analyst skill matrix and point systems to bring in continuous motivation and planned learning. ...
  • 23
    IDentifyED Campus Security
    Kornukopia’s IDentifyED. #1 Complete Campus Safety and Security. In 150 Countries and 14 languages; 1,000s of schools use Kornukopia’s extensive education tool set. Now there’s more: Identifyed (Campus Security), School Social Network and Kornukopia Premium! IDentifyED’s campus safety and security system includes a collection of tools for campus. Such as, payment systems, emergency broadcast, library checkout, access control to open doors (includes an integrated smartcard). ...
  • 24
    Immersive Labs

    Immersive Labs

    Immersive Labs

    To stand prepared against an ever evolving threat landscape, your organization needs an increasingly skilled cyber workforce. Immersive Labs’ unique approach to human cyber readiness moves you beyond generic training courses and certifications to interactive skills content that’s directly relevant to the risks you face. Traditional approaches to cybersecurity training are focused on skills transfer and “covering” subject areas. At Immersive Labs, we only care about two things: do experiences...
  • 25
    Hack The Box

    Hack The Box

    Hack The Box

    Hack The Box is the Cyber Performance Center with the mission to provide a human-first platform to create and maintain high-performing cybersecurity individuals and organizations. Hack The Box is the only platform that unites upskilling, workforce development, and the human focus in the cybersecurity industry, and it’s trusted by organizations worldwide for driving their teams to peak performance. Offering an all-in-one environment for continuous growth, assessment, and recruitment, Hack The...
  • 26
    Easy Exams

    Easy Exams

    Easy Exams

    ...Automated grading provides instant results along with real-time analytics and detailed performance insights. Easy Exams allows examiners to invite unlimited candidates and monitor progress as exams are completed. Enterprise-grade security and reliable infrastructure ensure data protection and consistent uptime. Trusted by thousands of educators and HR professionals, Easy Exams streamlines the entire testing process from creation to reporting.
    Starting Price: $5
  • 27
    Jamf School
    ...Jamf Student app gives students restricted permissions over their own devices. It enables live proctoring of web-based assessment exams and displays a camera view and the exam itself. Education-focused management and security for school IT admins, teachers, and parents.
    Starting Price: $5.50 per year
  • 28
    AI Proctor

    AI Proctor

    AI Proctor

    ...AI Proctor authenticates the students IDs and diligently monitors/tracks them while, they take their exam securely over the internet. AI Proctor is a catalyst in enhancing the student testing process and assists in improving remote testing integrity and exam/testing security. Fully compliant with data protection act’s requirements. AI Proctor provides best data integrity and security with very secure, reliable and most advanced technologies.
    Starting Price: $6 per exam
  • 29
    Linewize

    Linewize

    Linewize

    Linewize combines world leading technology with world leaders in online safety education, IT administration, teaching and student safeguarding. Our aim is to help schools, students and families develop better digital habits and better communities. Utilizing a combination of AI and a team of highly trained human moderators, it’s the most advanced K-12 student threat detection tool available. Providing cyber safety education and tools, including a parent app, to engage your school community....
  • 30
    SiteOwl

    SiteOwl

    SiteOwl

    Design, install, and manage thousands of security devices from one location. Keep floor plans, mockups, and notes for every security project all in one spot. Access your system details anytime and anywhere through desktop or mobile. Ensure that your system information is always up to date. Increase project visibility and collaboration across your entire team. Build complex floor plans with an intuitive drag-and-drop design interface.
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next