[go: up one dir, main page]

Suggested Categories:

IT Security Software
IT security software is designed to protect information technology (IT) systems, networks, and data from cyber threats, such as malware, hacking, and unauthorized access. These tools provide various features such as antivirus protection, firewalls, encryption, intrusion detection and prevention systems, and vulnerability management to ensure the integrity, confidentiality, and availability of sensitive information. IT security software helps organizations detect, prevent, and respond to security incidents, mitigate risks, and ensure compliance with industry regulations. It is critical for businesses and individuals to safeguard against cyberattacks, data breaches, and other security vulnerabilities.
IoT Security Software
IoT (Internet of Things) security software is designed to protect connected devices and networks from cyber threats, ensuring the confidentiality, integrity, and availability of data transmitted between IoT devices. These tools monitor and secure devices, applications, and networks that are part of the IoT ecosystem, which includes sensors, actuators, smart appliances, wearables, and industrial equipment. IoT security software includes features such as threat detection, data encryption, access control, device authentication, and vulnerability management to mitigate risks from cyberattacks, unauthorized access, and data breaches. It is essential for industries like healthcare, manufacturing, transportation, and smart cities, where the IoT devices are widely used and often contain sensitive or critical data.
Data Center Security Software
Data center security software enables IT security professionals and organizations to secure their data center infrastructure including racks, networks, server endpoints, and more. Data center security tools provide all aspects of security for data centers. Data center security software helps protect the physical and virtual infrastructure of data centers from unauthorized access, cyber threats, and data breaches. Data center security software ensures that sensitive information and critical systems are safeguarded from external and internal threats by providing real-time alerts, logging activities, and implementing compliance with security standards.
Application Security Software
Application security software is designed to protect applications from cyber threats by identifying vulnerabilities, preventing attacks, and ensuring data integrity throughout the application’s lifecycle. This software typically includes features like static and dynamic analysis, runtime protection, and vulnerability scanning to detect and address potential security issues such as SQL injection, cross-site scripting (XSS), and unauthorized access. It helps organizations maintain secure applications by implementing best practices for secure coding, performing penetration testing, and monitoring for security breaches. Application security software is crucial for organizations to safeguard sensitive data, comply with regulations, and minimize the risk of exploitation.
Website Security Software
Website security software protects websites from cyber threats such as malware, hacking attempts, DDoS attacks, and data breaches. It continuously monitors website traffic, scans for vulnerabilities, and blocks suspicious activity in real time. Many solutions include firewalls, bot protection, SSL management, and automated malware removal to keep sites safe and compliant. Website security software also provides dashboards and reports to help teams understand risks and stay ahead of emerging threats. Overall, it ensures websites remain fast, secure, and trustworthy for users.
Cloud Security Software
Cloud security software consists of tools, software, and services designed to protect data, applications, and infrastructure associated with cloud environments. It addresses unique security challenges posed by the cloud, such as data breaches, unauthorized access, and compliance with regulatory standards. These solutions often include features like encryption, identity and access management, intrusion detection systems, and security information and event management (SIEM). By implementing cloud security software, organizations can safeguard their cloud-based assets from cyber threats and ensure the integrity and confidentiality of sensitive information. As businesses increasingly adopt cloud services, robust cloud security measures have become essential for maintaining operational continuity and customer trust.
Database Security Software
Database security software tools enable organizations to secure their databases, and ensure security compliance with database operations.
Data Security Software
Data security software is designed to protect sensitive data from unauthorized access, theft, or corruption. It includes a variety of tools and features such as encryption, access control, data masking, and backup and recovery to ensure that data remains secure at rest, in transit, and during processing. These solutions help organizations comply with data protection regulations, such as GDPR and HIPAA, by safeguarding personal, financial, and business data. Data security software often integrates with other IT security systems to provide comprehensive protection against cyberattacks, insider threats, and data breaches, ensuring that critical information remains protected.
Network Security Software
Network security software is a type of software that helps protect computers, networks, and data from malicious attacks and unauthorized access. It is typically used by businesses to protect their confidential information and keep systems safe. It can also be used by individuals to protect their personal information and devices from potential threats.
API Security Software
API security software is designed to protect APIs from security threats such as unauthorized access, data breaches, and denial-of-service attacks. These tools monitor, authenticate, and secure the connections between APIs and the systems they interact with, ensuring that only authorized users and systems can access the data or services offered by the API. Features typically include encryption, rate limiting, authentication (such as OAuth, JWT), API traffic monitoring, threat detection, and automated security testing. API security software is crucial for businesses that rely on APIs to connect with third-party services, mobile apps, or microservices, as it helps mitigate risks and maintain data integrity.
Computer Security Software
Computer security software helps protect devices, networks, and sensitive data from unauthorized access, cyberattacks, and other security threats. These tools provide a range of protective features such as antivirus, firewall, encryption, malware detection, and intrusion prevention systems. Computer security software is essential for safeguarding against viruses, ransomware, spyware, and phishing attacks, ensuring the integrity, confidentiality, and availability of data. Many security solutions also offer real-time monitoring, automated updates, and threat intelligence to detect and mitigate new vulnerabilities as they emerge. Businesses and individuals rely on computer security software to reduce risks, comply with regulations, and maintain a secure computing environment.
Container Security Software
Container security software is software designed to protect containerized applications and environments from security vulnerabilities, threats, and attacks. Containers, which are used to deploy and run applications in isolated environments, present unique security challenges due to their dynamic and ephemeral nature. Container security software helps secure containerized environments by providing capabilities such as vulnerability scanning, runtime protection, access control, and image security. These tools monitor container configurations and activity to detect anomalies, ensure compliance with security policies, and mitigate risks like container escapes or unauthorized access. By enhancing the security of containers and container orchestration platforms (like Kubernetes), these solutions enable organizations to securely deploy and manage applications in cloud-native and microservices environments.
Physical Security Software
Physical security software is a suite of tools designed to manage and monitor the security of physical spaces, assets, and individuals within an organization. These platforms often integrate with hardware systems such as access control systems, surveillance cameras, alarms, and sensors to provide a comprehensive security solution. Features of physical security software can include real-time monitoring, incident reporting, visitor management, access control, and remote security management. The software can also provide detailed analytics on security incidents, track access logs, and manage emergency response protocols. By helping organizations secure their physical premises, physical security software enhances safety, prevents unauthorized access, and ensures regulatory compliance.
Email Security Software
Email security software protects organizations from cyber threats such as phishing, malware, and spam by filtering incoming and outgoing email traffic. It uses advanced threat detection, encryption, and data loss prevention (DLP) to safeguard sensitive information. These tools also offer features like email authentication (DMARC, SPF, DKIM) and real-time threat intelligence to block emerging attacks. By securing email communications, businesses can prevent data breaches, ensure regulatory compliance, and maintain user trust. Email security software is essential for mitigating human error, which is one of the leading causes of data breaches.
Secure Web Gateways
Secure web gateways protect users and organizations from online threats by monitoring and controlling web traffic between internal networks and the internet. They filter malicious websites, block unauthorized access, and prevent data leaks by enforcing security policies in real time. These gateways use technologies such as URL filtering, malware scanning, sandboxing, and data loss prevention to safeguard users across devices and locations. Cloud-based versions extend protection to remote and hybrid workforces without relying on traditional network perimeters. Ultimately, secure web gateways ensure safe, compliant, and controlled internet access while maintaining high performance and user productivity.
Security Awareness Training Programs
Security awareness training programs are platforms designed to help employees, partners, and other stakeholders recognize and respond to security threats and best practices. These programs typically focus on topics like phishing, password management, data protection, and secure browsing habits, aiming to create a culture of security within an organization. By providing interactive modules, quizzes, and real-world scenarios, these programs ensure that participants can identify potential risks and mitigate them effectively. Many security awareness training platforms offer tracking and reporting features, allowing organizations to monitor progress and measure the effectiveness of their training efforts. The goal is to reduce the likelihood of security breaches caused by human error and ensure that individuals are well-informed about their role in maintaining cybersecurity.
Zero Trust Security Software
Zero trust security software, also known as zero trust networking software, provides a security solution based on the zero trust methodology. Zero trust security solutions enable organizations to enforce security policies on a "zero trust" basis for both internal and external users, and allow security teams to track, monitor, and analyze user behavior and usage across the network to identify potential threats.
Cloud Access Security Brokers (CASB)
Cloud Access Security Brokers (CASBs) are software applications that sit between a cloud service provider and an organization. Their purpose is to provide visibility and control over the use of cloud services, ensuring that data remains secure while enabling users to access the resources they need from any device. CASBs operate in real-time and can be used with multiple cloud platforms, such as SaaS, IaaS, or PaaS. They also provide granular access controls on user activities within the cloud system, allowing administrators to create rules around data sharing.
DNS Security Software
DNS security software enables organizations to protect their DNS against threats and malware. DNS security solutions streamline the process of securing DNS servers against attacks.
Security Compliance Software
Security compliance software enables organizations to manage, track, and comply with cybersecurity compliance regulations and frameworks. Security compliance software provides tools for companies to audit their security posture and policies and achieve compliance certifications such as ISO 27001, ISO 27002, ISO 27017, CSA STAR, SOC 2, PCI DSS, FedRAMP, NIST 800-171, NIST 800-53, and more.
  • 1
    HEAL Security

    HEAL Security

    HEAL Security

    ...This integrated platform is unmatched in its cyber threat and vulnerability intelligence for healthcare and equips you with all the necessary information to make critical decisions and the resources to take action. HEAL Security’s cybersecurity platform is made up of three core products. They each have the same underlying cyber threat intelligence and work together to help your team with situational awareness. Access vital data and robust analytical tools to swiftly discover deep insights, vulnerabilities, technology, and news 
in one place for efficiency to stay ahead 
of threats. ...
  • 2
    Blackwell Security

    Blackwell Security

    Blackwell Security

    Blackwell’s hyper-specialized security operations are tailor-made to deliver the most complete protection and rapid response aligned to the unique needs of healthcare organizations. Secure your entire environment with full MDR signals, customized healthcare intelligence, and advanced security tooling that ensures 24/7 protection against complex cyber threats. Blackwell Security provides managed security operations designed exclusively for healthcare organizations, so you can reduce risk, maintain compliance, and build a secure continuum of care. ...
  • 3
    iPlum

    iPlum

    iPlum

    ...Tell your customers you care by automatically sending smart business text for missed calls or texts. Attach a signature for your texts. Texting in legal or healthcare business requiring HIPAA compliance, use secure channels with encryption. Your clients get FREE iPlum app to send you secure texts. It is critical to protect client data as per privacy and security regulations.
    Starting Price: $8.99 per user per month
  • 4
    Forescout Medical Device Security
    Forescout Medical Device Security is a dedicated healthcare solution that’s part of Forescout Continuum. Formerly known as the CyberMDX Healthcare Security Suite, the solution delivers continuous, real-time discovery and visibility of every medical device connected to your clinical network. It then assesses the risk of each device, factoring in their known exposures, the attack potential and operational criticality.
  • 5
    ScriptSure

    ScriptSure

    DAW Systems, Inc.

    ...Enjoy a user-friendly interface and streamlined workflow methods for electronic refills, order sets, compound medication ordering, prescription printing, patient reports and comprehensive audit logs. Security and compliance are paramount, with ScriptSure being fully HIPAA compliant, ensuring the confidentiality and privacy of patient data. ScriptSure is fast, accurate and built for patient safety.
  • 6
    Ensora Mental Health
    For solo and small-group mental health practice owners, TheraNest is the EHR and practice-management platform that simplifies clinical documentation, streamlines billing, and empowers sustainable practice growth without administrative headaches. Unlike SimplePractice and TherapyNotes, TherapyNotes uniquely allows therapists to run secure group telehealth sessions (up to 20 participants), automatically insert evidence-based Wiley® treatment plans, and access built-in flat-rate RCM services — all in one place. TheraNest gives therapists back time, control, and confidence by combining workflow automation, AI-enhanced documentation, and reliable U.S.-based support.
    Starting Price: $29 per month
  • 7
    FAMCare Human Services

    FAMCare Human Services

    Global Vision Technologies

    FAMCare – Turning Human Services Data Into Funder-Ready Results FAMCare by Global Vision Technologies helps human service agencies prove impact and secure funding with powerful, real-time reporting. Trusted nationwide, FAMCare is HIPAA-compliant, SOC 2 Type II, and TX-RAMP Level 2 certified, ensuring your data stays secure and compliant. Built on the Visions 2.0 Low-Code Engine, FAMCare adapts to your unique programs—no coding, no costly redevelopment. From intake to outcomes, agencies in child welfare, aging, housing, victim services, and behavioral health use FAMCare to track performance, automate reporting, and deliver insights funders demand. ...
    Starting Price: $20/mo/user plus platform
  • 8
    Notifyre

    Notifyre

    Notifyre

    Elevate your business communications with Notifyre's secure SMS and fax solutions. We're ISO 27001 certified and fully HIPAA compliant, providing BAA's, user access controls and audit trails and more security features. Benefit from flexible pay-as-you-go fax & SMS and outstanding value receive fax plans. Fax service features include: - Online Fax Platform - Email to Fax and Fax to Email - Fax API -Online Fax Numbers -Fax Number Porting -Fax Broadcast Text messaging service features include: - 10DLC Registration -> Book a Demo for one-on-one guidance! ...
    Leader badge">
    Starting Price: 2¢/SMS part; 3¢/fax page (USD)
  • 9
    TeleRay

    TeleRay

    TeleRay

    ...In addition, the cloud-based medical imaging solution, enables users to consult live, view modalities, store images to view anywhere on any device and share images securely to patients or professionals. The platform offers a wide array of features that include importing or converting DICOM or non-DICOM images, PACS query, and HL7 connectivity. Connect to any EHR such as EPIC, Cerner, EcW, Athena, Allscripts, and more. TeleRay is the most secure end-point to end-point health communication platform on the market. ...
    Starting Price: Zero Cost Option
  • 10
    StackAI

    StackAI

    StackAI

    .... • Govern usage with enterprise security: SSO (Okta, Azure AD, Google), RBAC, audit logs, PII masking, data residency, and cost controls. • Route across OpenAI, Anthropic, Google, or local LLMs with guardrails, evaluations, and testing. • Start fast with templates for Contract Analyzer, Support Desk, RFP Response, Investment Memo Generator, and more.
    Leader badge">
    Starting Price: $0
  • 11
    Perfect Radiology Information System
    ...It includes features for customizable reporting, automated billing processes, regulatory compliance, and detailed management of radiology procedures. The RIS also optimizes workflow, enhances patient throughput, and ensures data security and privacy.
    Starting Price: $5/month
  • 12
    My Care CRM

    My Care CRM

    My Care CRM Pty Ltd

    ...A fully integrated mobile app for support workers (iOS and Android) enables shift management, support notes, evidence uploads, and access to participant information from the field. All data syncs instantly with the provider dashboard. With encrypted storage, role‑based access, and audit logs, My Care CRM delivers a security‑first environment suitable for providers of any size. All features, one price.
    Starting Price: $22/month
  • 13
    Alpha Anywhere

    Alpha Anywhere

    Alpha Software Corporation

    Alpha Anywhere is the only development platform with both low-code and no-code capabilities. Developers can rapidly create secure, cross-platform mobile and web business apps. Alpha leads in offline development, ensuring that data can be captured AND accessed (database lookups/media file retrieval) offline. A powerful bi-directional API can integrate with existing systems of record and workflows, tie into web services, and meet advanced security requirements.
    Leader badge">
    Starting Price: $0
  • 14
    RMail

    RMail

    RPost

    RMail® is the e-security platform by RPost®, a global leader since 2000. RMail specializes in elegantly easy to use email encryption for privacy and compliance, e-signatures, legal e-delivery proof, secure file sharing, email impostor protection, document rights management, and AI-infused services to prevent data leaks and human e-security errors. RMail’s transmission e-security services are most often used by businesspeople or business systems that send important, sensitive, or consumer-regulated information. ...
    Starting Price: $7/month/user
  • 15
    SwipedOn

    SwipedOn

    SwipedOn

    Reinvent your front desk with SwipedOn - the smart, safe, secure visitor and employee management system. Protect your employees and workplace with contactless sign in, visitor screening and instant alert notifications. Let SwipedOn take care of all your reception desk processes - visitor management, receiving deliveries, employee in-out and more! Go from a paper visitor book to a secure digital solution in under 10 minutes.
    Leader badge">
    Starting Price: $49.00/month
  • 16
    LuxSci

    LuxSci

    Lux Scientiae

    .... • Secure SMTP Connector for encrypting outbound emails sent from Microsoft 365 and Google Workspace. • Secure Email Marketing platform for creating and sending marketing campaigns with ePHI. • Secure Email Hosting for reliable and secure day-to-day business email. • Fully managed Secure Web and Database Hosting for web applications that require compliance
    Starting Price: $4 per/user/month
  • 17
    Hirsch Velocity Software
    ...Hirsch Velocity Software provides the security and functionality expected from high-end systems with the ease-of-use found in entry level packages. Velocity delivers stringent security compliance, interoperability, and expansion and flexibility options designed to accommodate the evolution of security technology and meet the needs of even the most complex business, personnel, and facility requirements.
  • 18
    miSecureMessages
    miSecureMessages is a secure healthcare solution and HIPAA-compliant mobile messaging app used and trusted by care teams to send secure texts, photos, videos, and audio files. Mobile messaging is critical for managing hospital workflows and keeping electronically protected health information (ePHI) confidential. miSecureMessages is an integral part of 1Call’s secure healthcare solutions and functions as a secure messaging platform that is easy to use and meets the strict HIPAA security standards for healthcare organizations. miSecureMessages is a stand-alone app that can also seamlessly integrate with 1Call’s software, or existing hospital technology and electronic medical record (EMR) platforms from other vendors to send secure texts, photos, videos, and audio files. ...
  • 19
     SecureRx

    SecureRx

    TroyRx

    ...Print State and Federal Compliant prescriptions securely, efficiently and cost-effectively directly on plain paper. SecureRx allows your facility to print CMS-compliant prescriptions directly on plain paper across your entire network on any printer. SecureRx also complements your existing e-prescribe initiatives securing the prescriptions that still need to be printed. SecureRx serves health facilities of all sizes from Private Practices to large Health Systems. ...
  • 20
    Virtru

    Virtru

    Virtru

    ...Collaborate securely in Docs, Sheets, and Slides. Store and share files in Drive. Message via Gmail and Google Meet. Secure messages flowing through enterprise and custom apps. Seamlessly protect emails and files shared via Outlook.
  • 21
    Cynerio

    Cynerio

    Cynerio

    We cover every threat vector with automated security and risk reduction for every Healthcare IoT device--from medical/IoMT devices to Enterprise IoT and OT systems to ensure patient safety, data confidentiality, and operational continuity. The Cynerio platform promotes proactive and preemptive cybersecurity with automated risk reduction, threat mitigation, attack prevention tools, and step-by-step remediation programs built on a zero trust framework infused with clinical context to get hospitals secure--fast. ...
  • 22
    Send It Secure

    Send It Secure

    Protected Trust

    Send and receive secure emails that enable you to meet HIPAA & GLBA compliance standards. Protected Trust Email Encryption is now Send It Secure by Protected Trust. You may know us as Protected Trust Email Encryption, or perhaps just Protected Trust. As our email encryption product has grown and our company offerings have increased, we believe it is the right time to create a new brand for our email encryption product.
    Starting Price: $15 per month
  • 23
    MailHippo

    MailHippo

    MailHippo

    ...MailHippo looks and works great on any smartphone or tablet. Get a unique link that empowers you to receive totally-secure emails from anyone. Get our HIPAA-compliant email platform with secure encrypted email messaging for FREE during our limited-time Beta program!
    Starting Price: $4.95 per month
  • 24
    AlertEnterprise

    AlertEnterprise

    AlertEnterprise

    AlertEnterprise delivers a unified cyber-physical security convergence platform by linking IT, OT and Physical Security for risk prevention, detection and mitigation. We help you eliminate security silos, to deliver the most complete view of threats and vulnerabilities while enhancing workforce safety, data privacy and experience. As the only SaaS provider to connect physical security, IT, OT and HR systems, we can help you empower your workforce and unlock new levels of business with a zero-trust, cyber-physical platform for identity, access governance and security. ...
  • 25
    PBHS SecureMail
    Achieve and maintain data privacy compliance. PBHS Secure Mail is a mature HIPAA encrypted messaging solution for doctors, dentists, hospitals and other healthcare providers. Compliancy made easy! There is no software to install, configure or maintain. PBHS Secure Mail works on any device, from any location. It’s simple to share. Documents, Radiographs, CT Scans, and Messages are organized and available to all colleagues working on a case.
    Starting Price: $10 per month per account
  • 26
    Paubox

    Paubox

    Paubox

    Healthcare's simple, easy, and scalable way to email secure, HIPAA compliant patient information. Keeping patient data secure and remaining HIPAA compliant is a top concern for healthcare organizations, especially when it comes to email. Paubox Email Suite provides guaranteed encryption so you can rest assured your patient data is protected. Our HIPAA compliant email service removes the hassle of portals and passcodes by sending encrypted emails that can be read right in your recipient’s inbox. ...
    Leader badge">
    Starting Price: $29/month
  • 27
    CareComplete

    CareComplete

    JewelCode

    CareComplete™ Plus runs on a secure cloud server. This means that you can use it on a desktop, laptop, tablet, iPad, and phones, both Android and Apple. You must have an Internet connection to use the software. We have partnered with ePC IT Solutions in Belmont, California, to provide a secure server that is unique to each client. This is the type of server that is used in banking and healthcare and has special security built in to protect client information. ...
    Starting Price: $595 one-time payment
  • 28
    NHSmail

    NHSmail

    NHS Digital

    ...Emails sent to and from health and social care organizations must meet the secure email standard (DCB1596) so that everyone can be sure that sensitive and confidential information is kept secure. NHSmail is the chosen email service for NHS Digital. Account details are required to manage access to the system. NHS Digital sends and receives confidential information during the course of its activities. Sign in to your secure NHS email.
  • 29
    Pryv.io
    Personal Data & Privacy Management Software - A ready-to-use solution for personal data and consent management. - Pryv.io is a solid foundation on which you build your own digital health solution, so you can collect, store, share and rightfully use personal data. - Maintained and developed by Pryv. Features - Provides latest Pryv.io core system ready for production - User registration and authentication - Granular consent-based access control rights - Data model made for...
  • 30
    MediCat

    MediCat

    TeskaLabs

    ...MediCat is used by healthcare providers and hospitals to build secure mobile applications and protect sensitive data. MediCat has been thoroughly reviewed and approved by healthcare cyber-security auditors and data privacy officers. Leave your contact information and our specialist will contact you shortly. Strong protection of sensitive data. Seamless user experience. In compliance with GDPR, and HIPAA.
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next