[go: up one dir, main page]

Suggested Categories:

IT Security Software
IT security software is designed to protect information technology (IT) systems, networks, and data from cyber threats, such as malware, hacking, and unauthorized access. These tools provide various features such as antivirus protection, firewalls, encryption, intrusion detection and prevention systems, and vulnerability management to ensure the integrity, confidentiality, and availability of sensitive information. IT security software helps organizations detect, prevent, and respond to security incidents, mitigate risks, and ensure compliance with industry regulations. It is critical for businesses and individuals to safeguard against cyberattacks, data breaches, and other security vulnerabilities.

22 Products for "xampp 32" with 2 filters applied:

  • 1
    DESwrap

    DESwrap

    Data Encryption Systems

    ...An ideal method of controlling demonstration software, this counter may be reset remotely. In addition to the standard features, all DESwrap system messages may be user-defined when protecting your application. DESwrap for 32-bit Windows also encrypts function calls to .DLL files and the Win32 API. The number of API calls per DESkey access and the .DLL files which use ACE can be customized. DESwrap for 32-bit Windows also encrypts function calls to .DLL files and the Win32 API.
  • 2
    AccuHash

    AccuHash

    AccuHash

    ...But we don't forget also very popular SFV, MD5SUM and BSD-style checksum file formats - the utility can import/export from/to those formats. AccuHash 2.0 has the integrated Checksum Calculator, which allows calculating the checksum value (for all supported algorithms - CRC32, MD5 and SHA-1) for specified file directly, without creating the checksum file.
    Starting Price: $19.95 one-time payment
  • 3
    ESET NOD32 Antivirus
    Fast and light, vital for gamers and everyday users that don’t want any interruptions. Just install and forget. Secures Windows and macOS devices. These days it’s normal to have information about every aspect of your life at your fingertips. The online protection of your family and home should be part of that. ESET HOME app provides you with comprehensive oversight of your complete internet security wherever you go, whenever you need it. Stay on top of things with numerous benefits at your...
    Starting Price: $39.99 per year
  • 4
    Sandboxie

    Sandboxie

    Sandboxie

    Sandboxie is a sandbox-based isolation software for 32- and 64-bit Windows NT-based operating systems. It is being developed by David Xanatos since it became open source, before that it was developed by Sophos (which acquired it from Invincea, which acquired it earlier from the original author Ronen Tzur). It creates a sandbox-like isolated operating environment in which applications can be run or installed without permanently modifying the local or mapped drive.
  • 5
    Proof&Trust

    Proof&Trust

    Proof&Believe LLC

    ...This algorithm has been meticulously refined and enhanced with cutting-edge AI technologies, ensuring unparalleled accuracy and efficiency. Vendors provide evidence and answer 32 straightforward questions covering various aspects of their operations, compliance, and security measures. With our user-friendly interface, 95% of vendors complete the assessment in under 30 minutes, minimizing disruption to their operations. Our algorithm thoroughly analyzes vendor-provided evidence and responses, leveraging AI to identify risks, vulnerabilities, and compliance issues. ...
  • 6
    Simility

    Simility

    Simility

    Simility is a cloud-based fraud detection software solution that helps accelerate business, block fraud, and foster loyalty. Combining the power of real-time fraud intelligence, adaptive data ingestion, and visualization and smart decisions, Simility helps analyze millions of transactions on a daily basis and flag those activities that are recognized as suspicious. Founded by Google's fraud-fighting teams, Simility enables users to define undesirable behaviors as fraud and help them detect...
  • 7
    Rohos Logon Key

    Rohos Logon Key

    Tesline-Service

    Two-factor authentication solution that converts any USB drive into a security token for your computer and allows you to access Windows securely. Works also with RFID, OTP, U2F tokens by replacing the Windows login password. Replaces weak password-based login with a hardware Security Key: USB flash drive, Google Authenticator OTP, FIDO U2F or industrial RFID access cards. The computer is password-protected, but you don’t need to enter it manually each time you log in, unlock/resume or...
    Starting Price: $32 one-time payment
  • 8
    Mi-Token

    Mi-Token

    Mi-Token

    ...By default, you can add a PIN to the OTP, making your solution fully compliant with many industry standards for MFA, including those required by the Payment Card Industry Standards Council (PCI DSS 3.2)
  • 9
    Cofense Vision
    ...And all of these threats were missed by existing technologies. Rapidly detect and automatically eliminate phishing attacks in minutes, not days or weeks. Leverage global crowd-sourced phishing intelligence from 32 million people reporting suspected phish. Seamlessly automate the removal of phish from your enterprise environment. Get personalized security reports, actionable intelligence, and direct access to phishing experts.
  • 10
    GFI LanGuard

    GFI LanGuard

    GFI Software

    GFI LanGuard enables you to manage and maintain endpoint protection across your network. It provides visibility into all the elements in your network, helps you assess where there may be potential vulnerabilities, and enables you to patch them. The patch management and network auditing solution are easy-to-use and easy to deploy. Automatically discover all the elements in your network, including computers, laptops, mobile phones, tablets, printers, servers, virtual machines, routers and...
    Starting Price: $32 per year
  • 11
    WiKID Authentication System
    Easily meet PCI-DSS 3.2 with our latest release. Use WiKID two-factor authentication for service and privileged accounts instead of sharing passwords and storing them in spreadsheets or vaults. Prevent pass-the-hash attacks and stop attackers from escalating to admin rights! See how to set it up. Our Enterprise version is free for up to 5 users. Perfect for small organizations or large enterprises that need extended testing.
    Starting Price: $2.00/month/user
  • 12
    Forcepoint URL Filtering
    ...Powered by our ThreatSeeker Intelligence, Forcepoint URL Filtering collects and analyzes up to 5 billion incidents every day (from over 155 countries), producing updated threat analytics for Forcepoint solutions at up to 3.2 updates per second. Forcepoint URL Filtering blocks web threats to reduce malware infections, decrease help desk incidents and provide relief to valuable IT resources. Forcepoint URL Filtering is an easy-to-deploy, transparent filter and security solution that avoids the complexity of a proxy gateway. It’s equipped with more than 120 security and web filtering categories, hundreds of web application and protocol controls, and 60-plus reports with customization and role-based access. ...
  • 13
    Seqrite Linux AntiVirus
    ...The software’s Advanced Device Control feature enforces complete governance over the use of removable storage devices, which helps to keep your system safe and secure. Our Linux antivirus features a user-friendly interface with comprehensive support for both 32-bit and 64-bit Linux distributions. Additionally, Seqrite Linux AntiVirus is one of the best antiviruses in the market today that offer comprehensive support to a range of Linux versions including Red Hat, Fedora, Ubuntu, Linux Mint, SUSE, CentOS, and BOSS. Our antivirus for Linux blocks phishing websites and other malicious online elements as well as restricts access to gaming and social networking websites. ...
  • 14
     ThumbmarkJS

    ThumbmarkJS

    ThumbmarkJS

    ...Offered under an MIT license, it can be installed via NPM or loaded from jsDelivr, and with just a few lines of JavaScript, importing the UMD bundle and calling tm.get(), it returns a consistent 32-character thumbmark fingerprint. For small projects requiring higher accuracy, a free API version is available, while the Pro version scales indefinitely and cost-efficiently for large-scale applications. Without complex setup or invasive tracking, ThumbmarkJS has been integrated into over 60,000 websites, handling more than 1 billion identifications and 200 thousand downloads per month. ...
    Starting Price: €15 per month
  • 15
    Ezeelogin

    Ezeelogin

    Ezeelogin

    ...It would help you meet security compliances such as PCI, NIST, ISO 27001, and more, to know more visit us. Many companies, including fortune 500 companies are using Ezeelogin SSH Jump Server to meet various security compliances such as PCI DSS 3.2, ISO 27001, GDPR, HIPAA, FFIEC, NIST, FedRamp, SOC, SOX, and much more while accessing Linux servers, Routers, Switches, Cloud instances & containers they manage over ssh. Save millions of dollars annually managing and administering your server infrastructure and cloud instances. Moreover, security is priceless.
    Starting Price: $1.99 per month
  • 16
    Excel Password Recovery

    Excel Password Recovery

    eSoftTools Software

    ...Smart Key Features of Excel Password Unlocker Recover lost Excel spreadsheet password Unlock Excel, Word, & Access file formats Support all MS Excel versions 97 up to 2019 and Windows versions up to 10 (32-bit, & 64-bit) Gives recovery attack options such as Dictionary attack, Brute Force attack, & Mask attack
    Starting Price: $19
  • 17
    X-Ways Forensics
    X-Ways Forensics is an advanced work environment for computer forensic examiners and our flagship product. Runs under Windows XP/2003/Vista/2008/7/8/8.1/2012/10/2016, 32 Bit/64 Bit, standard/PE/FE. (Windows FE is described here, here and here.) Compared to its competitors, X-Ways Forensics is more efficient to use after a while, by far not as resource-hungry, often runs much faster, finds deleted files and search hits that the competitors will miss, offers many features that the others lack, as a German product is potentially more trustworthy, comes at a fraction of the cost, does not have any ridiculous hardware requirements, does not depend on setting up a complex database, etc.! ...
    Starting Price: $18,589
  • 18
    RAV Endpoint Protection

    RAV Endpoint Protection

    Reason Cybersecurity

    RAV Endpoint Protection is a next-generation antivirus solution that leverages AI-powered Endpoint Detection and Response (EDR) technology to provide real-time protection against advanced cyber threats. Its lightweight engine requires fewer device resources compared to other antivirus programs, ensuring seamless operation without technical expertise. The platform offers comprehensive online protection and identity monitoring, safeguarding users from phishing, ransomware, adware, and more...
    Starting Price: $32.83 per month
  • 19
    Win Riser

    Win Riser

    Bit Guardian

    ...Additional highlights include real-time notifications, system restore capabilities, automatic backups to prevent data loss, startup management for faster boot times, and customizable scan scheduling. Win Riser is compatible with Windows 7, 8, 8.1, 10, and 11, supporting both 32-bit and 64-bit systems. The installation package is approximately 11.4 MB in size. Win Riser aims to provide a seamless and efficient user experience for maintaining optimal PC health.
    Starting Price: $11 one-time payment
  • 20
    Macquarie Telecom

    Macquarie Telecom

    Macquarie Telecom

    Answer an incoming landline call. Ring someone overseas. With Teams Calling, you can do these things seamlessly right inside Microsoft Teams. Today, we give out our deskphone numbers to be easily contactable. But at the same time, we’ve moved into a world where our mobiles and laptops are at the centre of how we communicate. Teams Calling brings the two together. Give out one number – your business landline – and answer or make calls on your mobile, laptop or desk phone, wherever you’re...
    Starting Price: $32 per month
  • 21
    Scuba Database Vulnerability Scanner
    ...Scan enterprise databases for vulnerabilities and misconfiguration. Know the risks to your databases. Get recommendations on how to mitigate identified issues. Available for Windows, Mac, Linux (x32), and Linux (x64), Scuba offers over 2,300 assessment tests for Oracle, Microsoft SQL, SAP Sybase, IBM DB2 and MySQL. Scuba is a free tool that scans leading enterprise databases for security vulnerabilities and configuration flaws, including patch levels, that allows you to uncover potential database security risks. It includes more than 2,300 assessment tests for Oracle, Microsoft SQL Server, SAP Sybase, IBM DB2 and MySQL. ...
  • 22
    Kount

    Kount

    Kount

    ...Identity Trust is the ability to establish the level of trust for each identity behind every payment, account creation, and login event. Linked by AI, Kount’s Identity Trust Global Network TM combines trust and fraud signals from 32 billion annual interactions to block fraud in real-time, and to enable personalized customer experiences. Quick and accurate identity trust decisions deliver safe payments, account creation and login events while reducing digital fraud, chargebacks, false positives, and manual reviews. Decrease false positives. Reduce false positives and friction. ...
  • Previous
  • You're on page 1
  • Next