Network Security Software

Network Security software prevents unauthorized access to a computer network. Organizations use these applications to prevent unauthorized, malicious or inadvertent intrusions into or usage of secure systems. Network Security solutions are designed to recognize legitimate traffic over today's complex enterprise networks and isolate abnormal events for further investigation as well as to perform key security audit and regulatory compliance functions. Features can include anti-spam, anti-virus, and intrusion detection. Network Security software is related to Computer Security software and Network Monitoring software.

Why Capterra is Free
WebTitan

WebTitan

by TitanHQ

(172 reviews)
DNS Based Web content filter that blocks malware, ransomware and phishing attempts as well as providing web content control. We filter over 1/2 a billion DNS requests every day, identify 60,000 malware iterations a day and have over 7,500 customers. Cloud and gateway versions available. Improve your network security now. Try a free Trial of WebTitan today, support included. Learn more about WebTitan DNS Based Web content filter that blocks malware, ransomware and phishing attempts as well as providing web content control Learn more about WebTitan
Acunetix

Acunetix

by Acunetix

(23 reviews)
Acunetix leads the market in automatic web application security software. It scans your website for vulnerabilities such as SQL Injection and XSS. The Acunetix Online solution includes network security scanning available for free for up to one year Learn more about Acunetix Acunetix Online includes network security scanning available for free for up to one year Learn more about Acunetix
Alert Logic Network Security

Alert Logic Network Security

by Alert Logic

(1 review)
Intrusion Detection System (IDS) & Vulnerability Management for hybrid infrastructure, applications & cloud workloads. Combine with ActiveWatch for fully managed security-as-a-service with 24x7 monitoring, expert incident analysis & live notifications of critical attacks by security analysts in our global SOCs. Learn more about Alert Logic Network Security Intrusion Detection System (IDS) & Vulnerability Management for hybrid infrastructure, applications & cloud workloads. Learn more about Alert Logic Network Security
Avast Business Antivirus Pro Plus
Avast Business Antivirus Pro Plus 2019 is all-in-one powerful endpoint, email, server and network protection package for small and medium size businesses (best for 1-500 employees). Works on PCs, Macs and Windows servers. It is enhanced with 18 cutting - edge features to keep your company's life fully secure. Includes powerful antivirus, server, email and network security, CyberCapture, firewall, password manger, VPN and much more. It can be used either with cloud console or without. Learn more about Avast Business Antivirus Pro Plus All-in-one award winning antivirus solution ready to protect every part of your business. Available for PCs, Macs and servers. Learn more about Avast Business Antivirus Pro Plus
ESET Endpoint Security

ESET Endpoint Security

by ESET

(470 reviews)
Eliminates all types of threats, including viruses, malware, ransomware, rootkits, worms and spyware with optional cloud-powered scanning for even better performance and detection. ESET uses multilayered technologies that go far beyond the capabilities of basic antivirus. Includes anti-spyware, anti-phishing, web control, anti-spam, and botnet protection with remote management capability. Learn more about ESET Endpoint Security Includes anti-spyware, anti-phishing, web control, anti-spam, and botnet protection with remote management capability. Learn more about ESET Endpoint Security
CyberGRX

CyberGRX

by CyberGRX

(1 review)
CyberGRX has the #1 cyber risk management platform that automates self-assessments and their validation for third-party suppliers. Identify risks, reduce costs, scale your ecosystem and get access to advanced analytics that'll save countless hours of manual assessing risk. Learn more about CyberGRX Cyber risk management platform that automates self-assessments and their validation for third-party suppliers. Learn more about CyberGRX
ManageEngine Firewall Analyzer

ManageEngine Firewall Analyzer

by ManageEngine

(0 reviews)
Firewall Analyzer is an agent less log analytics and configuration management software, which analyzes logs from firewalls and generates real time alert notifications, security and bandwidth reports. The solution is a vendor-agnostic software and supports more than 50 plus firewall vendors. It also empowers administrators by providing comprehensive reports about the security events and in turn they can take steps to mitigate the security. Learn more about ManageEngine Firewall Analyzer Firewall Analyzer, a log analytics and configuration management software for a complete visibility over entire network security. Learn more about ManageEngine Firewall Analyzer
LogicMonitor

LogicMonitor

by LogicMonitor

(62 reviews)
LogicMonitor is the SaaS-based, automated IT performance monitoring platform for on-premises, hybrid, and cloud infrastructures. LogicMonitor provides the end-to-end visibility needed to maintain the performance and availability of critical business applications. It leverages automation and built-in intelligence to monitor today's complex and distributed infrastructures. Learn more about LogicMonitor LogicMonitor is the SaaS-based performance monitoring platform for modern IT infrastructure. Learn more about LogicMonitor
NetFlow Analyzer

NetFlow Analyzer

by ManageEngine

(5 reviews)
NetFlow Analyzer avails flow technology to monitor and analyse your network bandwidth usage. It helps you identify and avoid bandwidth delays and bottlenecks with customized reports and set threshold-based email/SMS alerts to understand the severity of an issue. This easy-to-use analytics tool detects, diagnoses and troubleshoots network anomalies and zero-day intrusions in real-time and plans your future bandwidth need based on usage trend pattern thereby optimizing your bandwidth usage. Learn more about NetFlow Analyzer A flow-based complete traffic analytics tool that gives a holistic view of your network traffic activity in real-time. Learn more about NetFlow Analyzer
Kaseya VSA

Kaseya VSA

by Kaseya

(102 reviews)
Kaseya VSA is an integrated IT systems management platform that can be leveraged seamlessly across IT disciplines to streamline and automate your IT services. Kaseya VSA integrates all your key management capabilities into a single platform. VSA makes your IT staff more productive, services more reliable, your systems more secure, and your value easier to show. VSA capabilities include: Remote Monitoring, Remote Control, Help Desk, Patch Management, AV/AM, Process Automation, and more. Learn more about Kaseya VSA Get the Power of Kaseya VSA¿s network security while providing real-time status updates and alerts to ensure maximum security. Learn more about Kaseya VSA
EventLog Analyzer

EventLog Analyzer

by ManageEngine

(4 reviews)
EventLog Analyzer is a comprehensive log management solution withreal-time threat detection and analysis. It can correlate disparate events happening across your network and also has a built-in threat intelligence and incident management platform. It offers predefined audit reports to help track activity happening in databases, web servers, Windows devices, network perimeter devices, and more. It also assists in meeting compliance regulations like the PCI DSS, SOX, HIPAA, FISMA, and GDPR. Learn more about EventLog Analyzer EventLog Analyzer is a comprehensive log management solution that provides multiple security capabilities in one unified platform. Learn more about EventLog Analyzer
Log360

Log360

by ManageEngine

(4 reviews)
Log360, an integrated solution that combines ADAudit Plus and EventLog Analyzer into a single console, is the one-stop solution for all log management & network security challenges. It offers real-time log collection, analysis, correlation, & archiving abilities that help protect confidential data, thwart internal security threats, & combat external attacks. To help meet the most needed security, auditing, & compliance demands, it comes prepackaged over 1,200 predefined reports & alert criteria. Learn more about Log360 Log360, a comprehensive SIEM solution that helps defend internal and external security attacks with log management ability. Learn more about Log360
JumpCloud DaaS

JumpCloud DaaS

by JumpCloud

(4 reviews)
JumpCloud Directory-as-a-Service is Active Directory and LDAP reimagined. JumpCloud securely manages and connects your users to their systems, applications, files, and networks. JumpCloud manages users and their systems whether Mac, Linux, or Windows and provides access to cloud and on-prem resources such as Office 365, G Suite, AWS, Salesforce, and Jira. The same login connects users to networks & file shares via RADIUS and Samba, respectively, securing your organizations WiFi. Learn more about JumpCloud DaaS JumpClouds Directory-as-a-Service securely manages and connects your users to their systems, applications, files, and networks. Learn more about JumpCloud DaaS
Horangi Web Security Services

Horangi Web Security Services

by Horangi Cyber Security

(1 review)
Web based Vulnerability scanner, with market comparison and optionality for Horangi to fix the vulnerabilities for you. On our higher tiers we also provide Penetration Testing and Incident Response services combined in with the product as well as internal scans. Learn more about Horangi Web Security Services Cyberspace is a territory full of threats and attacks that are usually detected after the fact and we intend to help reduce your risk. Learn more about Horangi Web Security Services
DSRAZOR for Windows

DSRAZOR for Windows

by Visual Click Software

(0 reviews)
Quickly report file and folder NTFS permissions in Manager-ready formats. DSRAZOR provides simple reports that detail the type of access that users and groups have to your files. DSRAZOR reveals effective NTFS permissions, each are provided in a simple easy-to-read report (see our sample screenshots); Detailed reports are ready for ACL documentation, explicit and inherited permissions, blocked inheritance, and orphaned SID trustees; Customize Reports as required and much more. Learn more about DSRAZOR for Windows DSRAZOR File System Permissions Reporter saves you time and headache by auditing NTFS permissions and providing easy-to-read reports. Learn more about DSRAZOR for Windows
Fluxguard

Fluxguard

by Fox and Geese

(0 reviews)
Website change monitoring to catch outages, bugs, and monitor overall web app integrity. Learn more about Fluxguard Website change monitoring to catch outages, bugs, and monitor overall web app integrity. Learn more about Fluxguard
EventSentry

EventSentry

by Netikus.net

(17 reviews)
Hybrid SIEM solution combining real-time (event) log monitoring with FIM, SW/HW inventory and more for an integrated approach to increase network security. Unique security event log normalization & correlation engine with descriptive email alerts provides additional context and presents cryptic Windows security events in easy to understand reports that offer insight beyond what's available from raw events. A dynamic release cycle constantly adds features for timely challenges like Ransomware. Learn more about EventSentry Real-Time Log & Event Log monitoring solution with system monitoring, hardware/software inventory and network monitoring capabilities. Learn more about EventSentry
CloudSploit

CloudSploit

by CloudSploit

(0 reviews)
CloudSploit scans configurations of AWS accounts, looking for security concerns. Open source, with a fully free option. Learn more about CloudSploit Automated AWS Security and configuration monitoring to maintain a secure and compliant cloud infrastructure environment. Learn more about CloudSploit
SolarWinds Threat Monitor

SolarWinds Threat Monitor

by SolarWinds MSP

(1 review)
SolarWinds Threat Monitor - Service Provider Edition is a fast, scalable, cloud-based platform built to enable security-minded Managed Service Providers (MSPs) with a unified tool to monitor managed networks for threats analyze logs against the latest and most up to date threat intelligence information from around the globe. Remediate your customer's threats quickly, and prepare the information needed to demonstrate their compliance to standards set by regulatory governing bodies. Learn more about SolarWinds Threat Monitor SolarWinds® Threat Monitor is the tool you need to detect, remediate, and report on security events for all your managed networks. Learn more about SolarWinds Threat Monitor
Dhound

Dhound

by IDS Global

(1 review)
Dhound IDS provides agent-based collection and analysis of security events on your internet facing server/device; agentless collection and analysis of security events for cloud (AWS); detecting and alerting about intrusions and suspecious activity; auditing outgoing traffic and data leakage detection; access control and comprehensive IP addresses analysis for incident investigation; tracking custom events that are important particularly for your online business. Learn more about Dhound Dhound is a security monitoring and intrusion detection tool for internet facing servers, clouds and web applications. Learn more about Dhound
AdRem NetCrunch

AdRem NetCrunch

by AdRem Software

(23 reviews)
An all-in-one and agentless network monitoring and management system, capable of monitoring every device in your network. Monitor bandwidth, availability, performance, services and traffic flow. Automatically generate maps and dependencies. Support for all leading OS types: Windows, Linux, Mac OS X, VMWare ESX/ESXi, BSD, and more. Advanced layer-2 mapping and automatic alert correlation. Baseline thresholds and range triggers. 8,000+ MIBs nd a built-in MIB compiler for complete SNMP support Learn more about AdRem NetCrunch A powerful all-in-one, agentless network monitoring and management system designed for ease-of-use and automation Learn more about AdRem NetCrunch
PA File Sight

PA File Sight

by Power Admin

(0 reviews)
PA File Sight is a file monitoring software that will help you detect file copying, protect the server from ransomware attacks, and allow auditing of who is reading, writing and deleting important files. It can also tell who is deleting or moving folders. If the user has the optional File Sight Endpoint installed, you can also be notified of file copying activity. The user account, and their IP address is reported. Learn more about PA File Sight PA File Sight is a file monitoring software that will help you detect file copying, and protect the server from ransomware attacks. Learn more about PA File Sight
OneLogin

OneLogin

by OneLogin

(30 reviews)
Designed for companies with 100+ users, OneLogin provides a cloud-based identity and access management (IAM) solution that offers simple single sign-on (SSO) making it easier for companies to secure and manage access to web applications both in the cloud and behind the firewall. Does your company have three or more SaaS or internal web apps? If so, then you will benefit from the security of OneLogin's cloud-based single sign-on solution. Learn more about OneLogin Identity management (IAM) and single sign-on (SSO) solution for companies of all sizes. Get started immediately with our free trial. Learn more about OneLogin
GlassWire

GlassWire

by GlassWire

(15 reviews)
Use GlassWire's simple to use firewall interface to view all your past and present network activity on a graph. Click the graph to see what applications initiated the incoming or outgoing bandwidth and instantly see what hosts the applications were communicating with. Hosts are automatically resolved and also include their country of origin. Click the Apps and Traffic options to break down network activity by applications and traffic types. Learn more about GlassWire GlassWire is a modern network monitor & security tool with a built in firewall. Learn more about GlassWire
AVG Antivirus Business Edition
AVG Antivirus Business Edition 2018 keeps your business and customer data safe from latest ransomware, viruses, malware and and outbreaks in real-time. Its powered with new cloud based features as CyberCapture, improved malware detection and enhanced web shield. This product includes also free remote management and great reporting. Client user interface is updated, as well. Available for Windows PCs, desktops and servers. AVG offers free phone support 24/7 to its customers. Learn more about AVG Antivirus Business Edition AVG Antivirus Business Edition 2018 keeps your SMBs and customer data safe from online threats in real-time Learn more about AVG Antivirus Business Edition
Webroot SecureAnywhere Endpoint Protection

Webroot SecureAnywhere Endpoint Protection

by Webroot Software

(101 reviews)
Multi-vector protection against viruses and malware offering full protection against all of today's sophisticated malware threats including Trojans, keyloggers, phishing, spyware, back-doors, rootkits, zero-day and advanced persistent threats. Built in Identity & Privacy Shield stops data being stolen or captured when using the Internet and the outbound firewall also stops malware stealing data. No need to worry about or run updates cloud-driven security means endpoints are always up to date. Learn more about Webroot SecureAnywhere Endpoint Protection Multi-vector protection against viruses and malware offering full protection against all of today's sophisticated malware threats. Learn more about Webroot SecureAnywhere Endpoint Protection
Avatier Identity Anywhere

Avatier Identity Anywhere

by Avatier

(4 reviews)
Only Avatier Identity Anywhere offers a cloud-based and on-premise true identity management platform for assess certification, lifecycle and password management with workflow, & SSO. Each customer has their own private instance; maximizing security. With deep integrations to enterprise and cloud apps, our identity management solution automates IT administration tasks through self-service and workflow. Millions of customers trust Avatier to increase productivity, reduce cost and ensure security. Learn more about Avatier Identity Anywhere Only Avatier Identity Anywhere offers a cloud-based and on-premise true identity management platform. Learn more about Avatier Identity Anywhere
beSECURE (AVDS)

beSECURE (AVDS)

by Beyond Security

(1 review)
The beSECURE (AVDS) family of network vulnerability assessment and web application security testing solutions are the most accurate and easiest to use in the industry. beSECURE (AVDS) is scalable in size 50 - 500,000 IPs. It will find, prioritize and manage the repair of security weaknesses in your network and web applications with the fast setup and the least upkeep possible. Behavior based scanning with zero false positives. Learn more about beSECURE (AVDS) Automated network Vulnerability Assessment and Management. Eliminate time consuming false positives and scan 50-500,000 IPs. Learn more about beSECURE (AVDS)
Malwarebytes

Malwarebytes

by Malwarebytes

(771 reviews)
Powerful multi-layered defense delivers smart endpoint protection Powerful multi-layered defense delivers smart endpoint protection
TunnelBear

TunnelBear

by TunnelBear

(88 reviews)
When TunnelBear is turned On, your internet connection gets secured with AES-256 bit encryption and your public IP address gets switched to the country of your choice. Businesses rely on TunnelBear for: Securing remote and traveling employees Global quality assurance testing Gathering competitive intelligence Stealthfully conducting market research Accessing geo-restricted business tools Businesses have access to priority support and a personal account manager. TunnelBear for Teams is the easiest way your team can work securely and privately from anywhere.
CryptoMite

CryptoMite

by BAxBEx Software

(0 reviews)
A program you can use to encrypt your personal files, E-Mails and sensitive data quickly, easily, and securely. A program you can use to encrypt your personal files, E-Mails and sensitive data quickly, easily, and securely.
SUPERAntiSpyware

SUPERAntiSpyware

by SUPERAntiSpyware

(23 reviews)
Multi-dimensional scanning and process interrogation technology that detects and removes spyware. Multi-dimensional scanning and process interrogation technology that detects and removes spyware.
Norton Security

Norton Security

by Symantec

(918 reviews)
Protecting your data and information is our only concern. Its why Norton makes this bold promise to you: From the moment youre eligible for the Norton Virus Protection Promise, a Norton expert will help keep your devices virus-free or well refund your money. Centralized policy management with scalable, cross-platform virus protection on an enterprise-wide basis.
PureVPN

PureVPN

by PureVPN

(36 reviews)
VPN solution for Windows that protects against 3rd party spying, accessing restricted websites, and ISP speed throttling. VPN solution for Windows that protects against 3rd party spying, accessing restricted websites, and ISP speed throttling.
RMail

RMail

by RPost

(27 reviews)
RMail is an all-in-one service extension for powerful email, with simple-to-use open tracking, delivery proof, email encryption, electronic signatures, large file transfers and more. RMail provides a Registered Receipt record for every message sent, certifying delivery, time and content. RMail works with your existing email platform, including Microsoft Outlook and Gmail. Send to anyone using your existing email address. No special software or signups are needed on the recipient end. RMail is an all-in-one service extension for powerful email, offering email encryption, e-delivery proof, e-signatures and more.
Praetorian

Praetorian

by Praetorian

(0 reviews)
As a collective of highly technical engineers and developers offering deep security expertise, Praetorian solves the toughest challenges faced by todays leading organizations across an ever-evolving digital threat landscape. Our solutions enable clients to find, fix, stop, and ultimately solve cybersecurity problems across their entire enterprise and product portfolios. Our solutions enable clients to find, fix, stop, and solve cybersecurity problems across their enterprise and product portfolios.
VIPole

VIPole

by VIPole

(0 reviews)
VIPole is an encrypted communication platform for individuals, teams and companies. It delivers secure messaging, file sharing, calls and video conferencing as well as a whole host of collaboration tools for business, such an organizer, notes, daily planner and a password vault. Everything within the system is fully e2e encrypted in transit and at rest. A set of advanced admin tools enables centralized control and comprehensive user management for complete security. Secure business communications with encrypted messages, calls, video, sharing and collaboration tools, all in one platform.
Sophos UTM

Sophos UTM

by Sophos

(13 reviews)
Sophos UTM helps you consolidate your security without compromising its effectiveness. By combining multiple security layers, its simple to protect your users everywhere while making security easier to deploy and manage. Sophos UTM provides essential next-gen firewall protection for your network, web, email, applications, and users. The Ultimate Security Package: Essential next-gen firewall protection for your network, web, email, applications, and users.
SiteLock

SiteLock

by SiteLock

(12 reviews)
SiteLock, the global leader in website security solutions, is the only provider to offer complete, cloud-based website protection. Its 360-degree monitoring detects and fixes threats, prevents future attacks, accelerates website performance, and meets PCI compliance standards for businesses of all sizes. Founded in 2008, the company protects over 12 million websites worldwide. For more information, please visit sitelock.com. SiteLock is the Global Leader in Website Security, currently protecting more than twelve million websites worldwide.
Security Testing

Security Testing

by tieBridge

(1 review)
After assessing your current security measures, tieBridge will work with you to create your customized security solution. After assessing your current security measures, tieBridge will work with you to create your customized security solution.
Kenna

Kenna

by Kenna Security

(0 reviews)
Kenna Security integrates vulnerability scan data with big data analytics and multiple exploit feeds to predict the risk of a vulnerability being exploited. It calculates risk scores for your enterprise, organizations and critical asset groups. Remediation guidance prioritizes patches that have the greatest risk reduction. Actionable results are achieved within hours of installing scan data. Kenna Security uses exploit intelligence feeds to identify vulnerabilities being exploited in the wild and put your company at risk.
KerioControl

KerioControl

by Kerio Technologies

(2 reviews)
Multi-function network firewall with anti-virus, VPN, web content filtering, bandwidth control and more. Multi-function network firewall with anti-virus, VPN, web content filtering, bandwidth control and more.
Netmon

Netmon

by Netmon

(0 reviews)
Netmon is a comprehensive network monitoring system featuring our proprietary high-performance traffic sniffing technology. Our combination of deep analysis and instant alerting make Netmon a complete solution for organizations who need to monitor the health and current status of mission-critical systems. Our product offerings combined with flexible licensing terms scale to put enterprise-level systems monitoring capabilities into the hands of small and medium-sized businesses. Comprehensive network monitoring appliance. Monitor network traffic, devices, and services. Integrated alert system.
Kaspersky Endpoint Security

Kaspersky Endpoint Security

by Kaspersky Lab

(305 reviews)
Protect users against malicious programs such as viruses, worms, Trojans, hackers, spam and other forms of intrusion. Protect users against malicious programs such as viruses, worms, Trojans, hackers, spam and other forms of intrusion.
LogMeIn Pro

LogMeIn Pro

by LogMeIn

(68 reviews)
With the release of LogMeIn Central and LogMeIn Pro, LogMeIn's next generation solutions for remote access and systems management, LogMeIn IT Reach is no longer available to new customers. We will continue to support existing IT Reach customers and assist them with their transition over time to the new products. Remote systems management for desktops, servers, and mobile laptops.
Corax

Corax

by Corax

(0 reviews)
Cloud-based software that will help you to make decisions and take actions to prevent cyber crime and data loss. Cloud-based software that will help you to make decisions and take actions to prevent cyber crime and data loss.
Vormetric

Vormetric

by Vormetric

(0 reviews)
Vormetric helps enterprises move confidently and quickly and create trust by securing data-at-rest across all channels and environments. Knowing their data is secure, customers can respond faster and generate trust between users and across channels, applications and environments. Vormetric helps make secure adoption of new data environments a reality. Vormetrics Data Security enables confidence, speed and trust by encrypting the data that builds business.
MailWasher

MailWasher

by Firetrust

(19 reviews)
Allows you to preview and delete your unwanted email from an unlimited number of accounts, before it reaches your inbox. Allows you to preview and delete your unwanted email from an unlimited number of accounts, before it reaches your inbox.
GFI LanGuard

GFI LanGuard

by GFI Software

(7 reviews)
GFI LanGuard is a complete vulnerability management solution, which allows you to scan, detect, assess and rectify security vulnerabilities on your network. It also provides the tools to remediate vulnerabilities and install missing patches on the network. GFI LanGuard gives you a complete picture of your network set-up and helps you to maintain a secure network state faster and more effectively. We scan your network and ports to detect, assess and correct security vulnerabilities with minimal administrative effort.
Application Security

Application Security

by F5 Networks

(0 reviews)
Provides proactive and comprehensive safeguards against unauthorized access and malicious application attacks. Provides proactive and comprehensive safeguards against unauthorized access and malicious application attacks.
OpenVPN Access Server

OpenVPN Access Server

by OpenVPN

(48 reviews)
Full featured secure network tunneling VPN solution for Windows, Mac, and Linus environments. Full featured secure network tunneling VPN solution for Windows, Mac, and Linus environments.
CylancePROTECT

CylancePROTECT

by Cylance

(28 reviews)
Stop merely detecting attacks, prevent them using CylancePROTECT, the endpoint solution that blocks 99% of threats in real time. Stop merely detecting attacks, prevent them using CylancePROTECT, the endpoint solution that blocks 99% of threats in real time.
RansomFree

RansomFree

by Cybereason

(3 reviews)
RansomFree is the first and only free anti-ransomware tool designed to detect and stop 99% of ransomware from encrypting files. The software uses behavioral and proprietary deception techniques to target the core behaviors typical of ransomware attacks. Unlike traditional antivirus solutions, Cybereason's RansomFree can target a broad variety of advanced ransomware strains, including fileless ransomware. Currently, it's available for PCs running Windows 7, 8, 10, Windows Server 2008 and 2010 R2. RansomFree is the first and only free anti-ransomware tool designed to detect and stop 99% of ransomware from encrypting files.
vArmour

vArmour

by vArmour

(0 reviews)
vArmour's software-based distributed security system delivers the industry's only integrated micro-segmentation solution with advanced security analytics across networks, applications, and users. vArmour's extensible architecture provides security across private and public clouds, with a single point of policy management. In addition, vArmour provides contextual visibility traffic from Layer 2 to Layer 7, combined with inline security policy controls prevent and quarantine lateral attacks. Software-based distributed security system delivers the industry's only integrated micro-segmentation solution with security analytics.
SmartFlow

SmartFlow

by Solana Networks

(0 reviews)
SmartFlow is a Cyber Security Monitoring tool that uses Anomaly detection to Pinpoint hard to detect security threats/zero day attacks. SmartFlow distills network traffic & flow data into more than 20 different stat measures. SmartFlow is a Cyber Security Monitoring tool that uses Anomaly detection to Pinpoint hard to detect security threats/zero day attacks.
DESlock

DESlock

by DESlock

(0 reviews)
Protects your data transparently with fast file, folder and email encryption and used to encrypt any data. Protects your data transparently with fast file, folder and email encryption and used to encrypt any data.
LogPoint

LogPoint

by LogPoint

(0 reviews)
The LogPoint SIEM solution intelligently extracts events and incidents from the billions of logs existing in any IT infrastructure of any size. Filtered and carefully correlated real-time results are displayed in easy to manage dashboards that can be configured based on the specific roles and responsibilities of each user. LogPoint is an effective and valuable SIEM solution for enterprises of all sizes because of its unique design and rich features.
NANO Antivirus

NANO Antivirus

by NANO Security

(9 reviews)
Freeware antivirus application which is capable of finding packed and archived malware quickly and efficiently. Freeware antivirus application which is capable of finding packed and archived malware quickly and efficiently.
SecureZIP

SecureZIP

by PKWARE

(0 reviews)
Provides practical, reliable data encryption and protection that is easy to deploy, maintain, and use. Provides practical, reliable data encryption and protection that is easy to deploy, maintain, and use.
DeviceLock

DeviceLock

by DeviceLock

(0 reviews)
Provides both contextual and content-based control for maximum leakage prevention at minimum upfront and ownership cost. Provides both contextual and content-based control for maximum leakage prevention at minimum upfront and ownership cost.
NerveCenter

NerveCenter

by Logmatrix

(0 reviews)
Delivers integrated, real-time security management in a single, seamless suite. Delivers integrated, real-time security management in a single, seamless suite.
Qrator

Qrator

by Qrator Labs

(0 reviews)
Our proprietary, continuously updated technology solution severely mitigates the risks associated with DDoS attacks of all kinds. Our proprietary, continuously updated technology solution severely mitigates the risks associated with DDoS attacks of all kinds.
BlueTalon

BlueTalon

by BlueTalon

(0 reviews)
Delivers data-centric security across big data environments and eliminates security blind spots. Delivers data-centric security across big data environments and eliminates security blind spots.
Indeni

Indeni

by Indeni

(12 reviews)
Indeni is the crowd-sourced automation platform for network and security infrastructure. With Indeni Crowd and Indeni Insight organizations gain access to living repository of automation scripts across maintenance, high availability, network visibility, security, compliance and vendor best practices. Teach your team co-development processes alongside the largest community of certified IT professionals and reduce total cost of ownership with prescriptive steps to resolve issues. Indeni helps IT pros detect network issues before they become major issues using predictive analytics technology.
Privatoria

Privatoria

by Privatoria

(1 review)
Privatoria is an online service that secures web surfing protection and web traffic encryption. It is an online service which provides VPN, VPN Plus Tor, Anonymous Proxy and Tor web Proxy, that enable surf anonymously, change IP and unblock sites. VPN Plus Tor
Dome9

Dome9

by Dome9 Security

(1 review)
SaaS-based solution purpose-built to provide security and compliance across all public and hybrid cloud infrastructure environments. SaaS-based solution purpose-built to provide security and compliance across all public and hybrid cloud infrastructure environments.
Sqreen

Sqreen

by Sqreen

(0 reviews)
Runtime Application Self-Protection (RASP) for developers. It protects web applications against attacks at runtime. The protection logic is brought into applications with no source code modification or traffic redirection. Once deployed, Sqreen provides real-time monitoring and protection against a large set of vulnerabilities incl. SQL injections, XSS, account takeovers, bad bots,Security scanners etc. Sqreen gets installed in 30 seconds and doesn't require any configuration or maintenance. An automated and real-time security solution for developers. It protects web applications against attacks at runtime.
DNSFilter

DNSFilter

by DNSFilter

(35 reviews)
DNSFilter is revolutionizing the DNS industry. We provide a DNS based threat protection and content filtering service for IT professionals. Our product is powered by artificial intelligence that analyzes domains in real time, meaning we stop more threats than our competitors whom often take weeks through human review. We're U.S. based and operate a global anycast network with the most advertised network peers in the industry and offer fair, transparent pricing and no contracts or commitments. DNSFilter offers a DNS based threat protection and content filtering service for IT professionals.
RG System

RG System

by RG System

(10 reviews)
Manage your network and secure your business. RG SYSTEM is a Network Management Platform that allows you to Monitor, Supervise and Secure your network infrastructure. You can monitor your system, network and software layer. With RG SYSTEM you can install antivirus, anti spam, firewall and backup. You can also remote access any machine. Give more transparency to your clients as well. RG SYSTEM can also assist you through its Team As A Service. We can back you up when you need it the most. RG SYSTEM is a powerful Network Management Platform that allows you to Monitor, Supervise and Secure your network infrastructure.
Security Framework

Security Framework

by PrimeSoft Solutions

(0 reviews)
A network security solution with access agent, service controller, and secure service gateway functions. A network security solution with access agent, service controller, and secure service gateway functions.
REVE Antivirus

REVE Antivirus

by REVE Antivirus

(19 reviews)
REVE Antivirus is a computer security software for home users & enterprises. It has many advanced features such as-Turbo Scan, Anti-Rootkit, Anti-Malware, Advanced Parental Control with Live Notification, Safe Browsing, Data Theft Protection & PC Tune Up. REVE Antivirus provides protection from Rootkit, Spyware & all types of Malware ensuring complete digital security.
Security Shield

Security Shield

by PCSecurityShield

(0 reviews)
A complete security suite for maximum protection. Includes antivirus, anti-malware, intrusion protection, root-kit detection, spam filter, content filter and firewall. Centrally managed and server solutions available. Free phone and email tech support and a 30-day guarantee. Protection your office should not be without. Protects your business from viruses, spyware, Trojans, root-kits, hackers, adware and more.
Netsweeper

Netsweeper

by Netsweeper

(0 reviews)
Netsweeper Inc. provides web content filtering and web threat management that protects more than 50 million users worldwide. Netsweeper solutions ensure compliance with regulations, defend against web-based threats and help deliver a positive, productive and safe Internet experience. Netsweeper supports customers worldwide with offices in North America, the UK, the UAE, India and Australia as well as a network of partners and distributors. Web content filtering specialist, focusing on protecting networks from spam, phishing, spyware and other malicious applications.
Nfusion

Nfusion

by Ntrepid

(0 reviews)
Nfusion is the ultimate secure online environment for protecting your organization. Nfusion combines IP address attribution control with virtualization and other specialized features to camouflage your identity and protect your corporate IT assets from malware contagion. Nfusion provides a virtualized full Windows desktop. Both Windows 7 and 8 are available. Ntrepid can incorporate most Windows-compatible applications directly into the users virtual desktop. Nfusion is a fully-managed and completely segragated secure VDI for online research and investigation.
Fortscale

Fortscale

by Fortscale

(0 reviews)
Detect and Eliminate Threats with User Behavior Analytics Detect and Eliminate Threats with User Behavior Analytics
PerimeterX

PerimeterX

by PerimeterX

(0 reviews)
A new approach for Accurate, Easy to Integrate Protection from Automated Attacks A new approach for Accurate, Easy to Integrate Protection from Automated Attacks
Artica Proxy

Artica Proxy

by Artica Tech

(0 reviews)
A powerful solution for large and multinational companies to log internet performance, filter requests, and manage reporting. A powerful solution for large and multinational companies to log internet performance, filter requests, and manage reporting.
ZoneAlarm Pro

ZoneAlarm Pro

by Zone Labs

(12 reviews)
PC firewall that keeps your personal data and privacy safe from Internet hackers and data thieves. PC firewall that keeps your personal data and privacy safe from Internet hackers and data thieves.
Red Hat Enterprise Virtualization
Software to ensure network security and data retention for servers or desktop computers, with live migration and power saving features. Software to ensure network security and data retention for servers or desktop computers, with live migration and power saving features.
SecureTrack

SecureTrack

by Tufin

(0 reviews)
Enables organizations to enhance security, reduce service interruptions and automate tasks through powerful firewall management. Enables organizations to enhance security, reduce service interruptions and automate tasks through powerful firewall management.
PDF Restrictions Remover

PDF Restrictions Remover

by Axommsoft

(0 reviews)
PDF decryption software is fast desktop utility which helps to remove security from pdf documents. PDF decryption software is fast desktop utility which helps to remove security from pdf documents.
UserLock

UserLock

by IS Decisions

(0 reviews)
Stronger security for Windows logins. UserLock works alongside Active Directory to protect access to Windows systems. With context-aware access controls and real-time monitoring, UserLock reduces the risk of external attacks and internal security breaches while helping to address regulatory compliance. Secure, control & audit user access to Microsoft Windows Server-based networks and protect the resources and data contained within.
E8 Security

E8 Security

by E8 Security

(0 reviews)
Machine-learning analytics solution to identify unknown threats already inside the network Machine-learning analytics solution to identify unknown threats already inside the network
CloudFish

CloudFish

by CloudFish

(0 reviews)
A network security solution creating the next generation of security infrastructure products for the cloud. A network security solution creating the next generation of security infrastructure products for the cloud.
Cyberint

Cyberint

by Cyberint

(0 reviews)
In an age of digital transformation, businesses are exposed to far greater cyber risks and threats. CyberInt's Managed Detection and Response services track your digital channels, responding to advanced cyber threats missed by standard security controls, protecting your brand, digital assets and customers. CyberInt is trusted by the world's top finance, retail and telecommunication organizations. CyberInt provides Managed Detection and Response for the Digital Business.
EventTracker

EventTracker

by EventTracker

(20 reviews)
EventTracker, a Netsurion company, empowers organizations to successfully predict, prevent, detect, and respond to cybersecurity threats. Our SIEM platform unifies machine learning, behavior analytics, and security orchestration, and has been recognized for 10 straight years by Gartner on the Magic Quadrant. EventTracker offers SIEM solutions for any size company or budget. SIEMphonic builds on the EventTracker platform by delivering a Co-Managed SIEM service complete with 24/7 global SOC. By owning both the technology and the expertise, we quickly deliver advanced threat protection and security orchestration.
Axence nVision

Axence nVision

by Axence

(14 reviews)
Axence nVision is all-in-one, professional solution for comprehensive IT management. It responds to the key demands of administrators and CSOs in terms of network and user activity monitoring, hardware and software inventory, remote technical support and data leak protection. It also allows management boards to optimize the costs of servicing IT infrastructure, regardless of its size. Application consists of 5 modules and is free for up to 10 workstations with no time limits. Network and user activity monitoring, hardware and software inventory, remote technical support, protection against data leaks.
AlienVault USM

AlienVault USM

by AlienVault

(10 reviews)
AlienVault Unified Security Management (USM) delivers a unified, simple and affordable solution for threat detection and compliance. Powered by the latest AlienVault Labs Threat Intelligence and the Open Threat Exchange the largest crowd-sourced threat intelligence exchange, USM enables mid-size organizations to defend against modern threats. Security management platform offering fully integrated security controls for threat detection and compliance management.
NG Firewall

NG Firewall

by Untangle

(2 reviews)
Includes network security, user management, content filtering, and performance optimization tools. Ideal for K-12 schools and SMBs. Includes network security, user management, content filtering, and performance optimization tools. Ideal for K-12 schools and SMBs.
FireLayers

FireLayers

by FireLayers

(0 reviews)
Enables the responsible adoption of cloud apps, while ensuring security, compliance and governance of any cloud application. Enables the responsible adoption of cloud apps, while ensuring security, compliance and governance of any cloud application.
IMMUNIO

IMMUNIO

by IMMUNIO

(0 reviews)
A RASP solution, providing comprehensive web application security across multiple frameworks - blocking threats in real time. A RASP solution, providing comprehensive web application security across multiple frameworks - blocking threats in real time.
Black Duck Hub

Black Duck Hub

by Black Duck

(28 reviews)
Organizations worldwide use Black Duck Softwares industry-leading products to secure and manage open source software, eliminating the pain related to security vulnerabilities, open source license compliance and operational risk. Black Duck is headquartered in Burlington, MA, and has offices in Mountain View, CA, London, Frankfurt, Hong Kong, Tokyo, Seoul and Beijing. For more information, visit www.blackducksoftware.com. We secure & manage open source software, eliminating pain related to open source security vulnerabilities & license compliance.
Active Shield

Active Shield

by Security Stronghold

(1 review)
Protects your computer from trojans, spyware, adware, trackware, dialers, keyloggers, and even some special kinds of viruses. Protects your computer from trojans, spyware, adware, trackware, dialers, keyloggers, and even some special kinds of viruses.
Biocoded

Biocoded

by Biocoded

(0 reviews)
Safest end-to-end encrypted voice call and messaging app by opinion of independent security research groups. Safest end-to-end encrypted voice call and messaging app by opinion of independent security research groups.
The Email Laundry

The Email Laundry

by The Email Laundry

(10 reviews)
The Email Laundrys technological edge in threat intelligence, advanced predictive analytics, and impersonation detection allows our customers to rest assured that our service will identify malicious sources before they can attack keeping your customers email safe. Industry-leading defense against ransomware, viruses, impersonation attacks, CEO fraud, phishing, and more.
STOPzilla AntiVirus

STOPzilla AntiVirus

by STOPzilla

(4 reviews)
Detects, blocks, and removes Spyware, Adware, Pop-up Ads, Phishing Attacks, Hijackers, Rootkits, Trojans, etc. Detects, blocks, and removes Spyware, Adware, Pop-up Ads, Phishing Attacks, Hijackers, Rootkits, Trojans, etc.
ECS2

ECS2

by SecuCloud

(1 review)
Modular cloud security system designed to provide security framework for any devices. Modular cloud security system designed to provide security framework for any devices.
CIAgent

CIAgent

by SNMP Research

(0 reviews)
It is a new Web-based, SNMP agent for system and application management. It is a new Web-based, SNMP agent for system and application management.
Cloudbric

Cloudbric

by Cloudbric

(0 reviews)
Cloudbric is a cloud-based web security provider, offering an award-winning Web Application Firewall (WAF), DDoS protection, and SSL. With its soon to launch reverse ICO, Cloudbric will expand its service offerings to encompass more than website security security.
MePin

MePin

by MePin

(0 reviews)
MePIN is a mobile app authenticator and a universal authentication service, providing compliance and strong security with exceptional user experience. Use MePIN as a service or on-premise as a white label strong authentication platform. MePIN supports two-factor authentication, passwordless login, digital signatures, biometrics, FIDO & legacy OTPs; choose your authentication methods and policies, or offer them all for the end-users to choose. Integration is easy with unified MePIN Services API. One API delivering compliance, digital signatures, biometrics, payment authorization, multi-factor authentication and more.
FlowTraq

FlowTraq

by FlowTraq

(0 reviews)
FlowTraq is network security software that uses full-fidelity network flow records to provide unified security, monitoring, and forensics. Its behavioral analytics and alerting helps IT administrators identify and investigate data leaks, compromises, spammers, botnets, worms, and DDoS attacks in high-volume networks. FlowTraq monitors network performance and bandwidth consumption, catalogs applications in use, and detects problematic changes in network activity. Scalable full-fidelity netflow/sFlow/IPFIX solution.
ConnectWise Automate

ConnectWise Automate

by ConnectWise

(63 reviews)
In today's fast evolving IT environment, security threats come in many forms. From viruses & spyware to vulnerabilities & security holes within an operating system or application running on a desktop or server, IT service providers must solve for a growing number of threats. ConnectWise Automate has teamed up with industry-leading solution providers to bring you a wide breadth of security solutions. Provide your clients with comprehensive, efficient & effective threat protection & management. ConnectWise Automate has teamed up with industry-leading solution providers to bring you a wide breadth of security solutions.
ConnectWise Automate

ConnectWise Automate

by ConnectWise

(63 reviews)
In today's fast evolving IT environment, security threats come in many forms. From viruses & spyware to vulnerabilities & security holes within an operating system or application running on a desktop or server, IT service providers must solve for a growing number of threats. ConnectWise Automate has teamed up with industry-leading solution providers to bring you a wide breadth of security solutions. Provide your clients with comprehensive, efficient & effective threat protection & management. ConnectWise Automate has teamed up with industry-leading solution providers to bring you a wide breadth of security solutions.
Connect Secure

Connect Secure

by Pulse Secure

(28 reviews)
Delivers end-user access to corporate networks and resources. Ensures connectivity for both trusted & untrusted devices. Delivers end-user access to corporate networks and resources. Ensures connectivity for both trusted & untrusted devices.
My Digital Shield

My Digital Shield

by My Digital Shield

(15 reviews)
My Digital Shield (MDS) is a leading provider of Security-as-a-Service (SECaaS) that delivers enterprise-level security technology to small businesses. Based on industry-leading unified threat management (UTM) technology, MDS' customizable cloud-based security solution offers continual protection against cyber threats and intrusion at an affordable price. Founded in 2013, MDS serves numerous managed service providers (MSPs) and small businesses in various industries. My Digital Shield is a Security-as-a-Service (SECaaS) provider of enterprise-level security technology to small businesses.
eTrust Antivirus

eTrust Antivirus

by CA Technologies

(11 reviews)
eTrust Antivirus is CA's award-winning antivirus solution, providing superior protection against today's most prevalent security threat - viruses. eTrust Antivirus reduces virus infections, simplifies and automates updating, eases administration, and enforces security polices. Extensive features include multiple scanning engine support, realtime detection with system cure, unmatched manageability, and centralized event logging and alerting. Reduces virus infections, simplifies and automates updating, eases administration, and enforces security polices.
ACL Manager

ACL Manager

by Cyber Operations

(0 reviews)
Centrally managing thousands of router ACLs from a single software application. Centrally managing thousands of router ACLs from a single software application.
Active Wall

Active Wall

by Active Network CO

(0 reviews)
Provides continuous enterprise-wide protection against the full range of Internet threats. Provides continuous enterprise-wide protection against the full range of Internet threats.
InfiSecure

InfiSecure

by InfiSecure Technologies

(0 reviews)
InfiSecure Technologies Inc is a cutting-edge Web Application Security company that specializes in protecting WebsitesI from OWASP Top Automated Threats such as web scraping / price scraping, account hijacking, carding fraud, form spam and application-level DDoS attacks. It is designed to give online businesses finely tuned control over bot traffic on their websites. InfiSecure is a robust bot protection platform to detect and block automated attacks on websites in real-time.
Virtual Mobile Infrastructure
Mobile virtualization: keeps all apps running in the datacenter, creating clean separation between enterprise and personal data. Mobile virtualization: keeps all apps running in the datacenter, creating clean separation between enterprise and personal data.
RBLTracker

RBLTracker

by RBLTracker

(0 reviews)
Provides easy-to-use, real-time blacklist monitoring for your email, website, and social media. Provides easy-to-use, real-time blacklist monitoring for your email, website, and social media.
Avira Antivirus Server

Avira Antivirus Server

by Avira Operations

(118 reviews)
File server security solution that offers network protection, scan scheduling, and traffic filtering. File server security solution that offers network protection, scan scheduling, and traffic filtering.
VMware VirtualCenter

VMware VirtualCenter

by VMware

(56 reviews)
Virtual infrastructure management software, provides a central point of control for virtual computing resources. Virtual infrastructure management software, provides a central point of control for virtual computing resources.
Onion ID

Onion ID

by Onion ID

(0 reviews)
Solution for IT Infrastructure Security to prevent insider threats. Solution for IT Infrastructure Security to prevent insider threats.
LogRhythm Network Monitor

LogRhythm Network Monitor

by LogRhythm

(0 reviews)
Organizations need visibility into their networks to detect threats, perform forensic investigations, support audits, and identify operational issues. LogRhythm Network Monitor is a highly-functional, intuitive and cost-effective network monitoring and forensics solution that provides enterprise-wide network visibility in more detail than traditional network and security solutions like flow analysis tools and next-generation firewalls. LogRhythm Network Monitor provides full network visibility critical for advanced threat detection and rapid incident response.
Metapacket

Metapacket

by Metapacket

(0 reviews)
Defend your network against any malware. Defend your network against any malware.
Difenso

Difenso

by Difenso

(0 reviews)
Difenso is a data security software that helps companies protect sensitive data in cloud and intranet Difenso is a data security software that helps companies protect sensitive data in cloud and intranet
Flextivity

Flextivity

by Intego

(1 review)
Anti-virus Mac solution designed to monitor online employee activity and protect your network. Anti-virus Mac solution designed to monitor online employee activity and protect your network.
Abusix

Abusix

by Abusix

(1 review)
Monitor and protect your network from abuse using this all in one solution. Monitor and protect your network from abuse using this all in one solution.
Leakwatch

Leakwatch

by Leakwatch

(0 reviews)
Solution that monitors your data to detect leaks in real time and enable you to take action quickly. Solution that monitors your data to detect leaks in real time and enable you to take action quickly.
Sepior

Sepior

by Sepior

(0 reviews)
Sepior is a key management as a service software (KMaaS) that allows users to encrypt data on Amazon S3 using encryption keys Sepior is a key management as a service software (KMaaS) that allows users to encrypt data on Amazon S3 using encryption keys
Fusion

Fusion

by Panda Security

(12 reviews)
Panda Fusion Remotely protects, manages and supports all of your IT infrastructure devices, including tablets and smartphones. Offering the maximum protection against malware and other unknown threats; automation of infrastructure management and centralized control; and the best support experience with proactive troubleshooting and remote, non-intrusive access to devices, no matter where they are. Panda Fusion is a complete product able to protect, manage and deliver remote support to all your IT devices.
CyberGatekeeper

CyberGatekeeper

by InfoExpress

(0 reviews)
Network-ready solution that automatically detects, audits, quarantines and remediates endpoints. Network-ready solution that automatically detects, audits, quarantines and remediates endpoints.
CyBlock

CyBlock

by Wavecrest Computing

(0 reviews)
CyBlock is a reliable, cost-effective and schedulable Web access monitoring, control and filtering solution. For business use, it is available in three deployment options and it's easy to install, set up and use. Cyblock lets you apply different blocking policies to different groups in ways that curtail wasteful surfing, prevent bandwidth abuse and protect against security threats. It also provides a variety of tailorable Web-use reports and is backed by the vendor's skilled support team. Web-use filtering and monitoring in a powerful proxy server. Covers 500 million Web pages with 80 blocking categories.
Specops Password Policy

Specops Password Policy

by Specops Software

(0 reviews)
You can use Specops Password Policy to enforce password rules, meet compliance requirements and help users select stronger passwords. Specops Password Policy extends the functionality of Group Policy and allows you to configure a different set of rules for different types of users. Specops Password Policy is a component of the Specops Password Management solution. Specops Password Management addresses both security and flexibility needs by enabling organizations to reach their appropriate level Specops Password Policy helps you increase password security in your Active Directory environment.
Genian NAC

Genian NAC

by GENIANS

(0 reviews)
Genian NAC helps maintain full visibility & control of all IT assets and ensures them to be the highest level of security and compliance through flexible deployment options (Cloud or on-prem). Genian NAC also provides a consistent and reliable access experience to all authorized users and keeps non-compliant devices to the highest level of security compliance automatically through comprehensive IT management solution. Re-imagined Network Access Control for the World of IoT
PhishingBox

PhishingBox

by PhishingBox

(4 reviews)
PhishingBox is an online system for any company to easily conduct social engineering testing via simulated phishing attacks. Our system is simple to use, cost-effective and helps clients reduce risk and achieve cyber security objectives. PhishingBox is an online system for any company to easily conduct social engineering testing via simulated phishing attacks.
QualysGuard Enterprise

QualysGuard Enterprise

by Qualys

(2 reviews)
Security Risk and Compliance Management - On Time, On Budget, On Demand -- Qualys is the first company to deliver an on demand solution for security risk and compliance management. Qualys monitors your company's vulnerability management process, tracks remediation and ensures policy compliance. QualysGuard is also the widest deployed security on demand platform in the world, performing over 150 million IP audits per year - with no software to install and maintain. Monitors the vulnerability management process, tracks remediation and ensures policy compliance.
PerfectMail

PerfectMail

by XPMsoftware

(1 review)
An intelligent approach to spam using Adaptive Reputation Technology resulting in 99.9%+ accuracy and 1 in 500,000 false positive rate. An intelligent approach to spam using Adaptive Reputation Technology resulting in 99.9%+ accuracy and 1 in 500,000 false positive rate.
TraceCSO

TraceCSO

by TraceSecurity

(1 review)
Provides a continual security process, not just a point in time. It empowers organizations to monitor themselves and develop policies. Provides a continual security process, not just a point in time. It empowers organizations to monitor themselves and develop policies.
RanStop

RanStop

by Temasoft

(1 review)
Protects computers and networks against present and future ransomware of any type. Protects computers and networks against present and future ransomware of any type.
AuthenWare

AuthenWare

by AuthenWare

(0 reviews)
AuthenWare is a leading cybersecurity software provider focused on fighting identity theft. The Company's innovative tokenless 2-factor authentication system delivers strong security through a combination of keystroke dynamics, behavioral and environmental characteristics to minimize identity theft, web fraud and other system vulnerabilities. The AuthenWare solution measures how a user types to ensure only authorized users access a system or web page, while stopping hackers and password sharing. Ferifies that a user's ID and password is the actual owner of those credentials - technology requires only a PC logon.
Marble Security

Marble Security

by Marble Security

(0 reviews)
Security solution for corporate mobile devices that facilitates remote authentication for access to corporate networks. Security solution for corporate mobile devices that facilitates remote authentication for access to corporate networks.
602LAN SUITE

602LAN SUITE

by Software602

(0 reviews)
Secure mail server with anti-virus & anti-spam,built-in firewall with NAT and web content filter proxy. Secure mail server with anti-virus & anti-spam,built-in firewall with NAT and web content filter proxy.
PrivacyKeyboard

PrivacyKeyboard

by Global Information Technology

(0 reviews)
PrivacyKeyboard for Microsoft Windows 7/Vista/XP/2000, Microsoft Windows Server 2008/2003 is the first product of its kind in the world that can provide every computer with strong protection against ALL types of real spy programs and hardware keyloggers, both known and unknown, currently in use or presently being developed worldwide. Makes data stealing impossible. Protects computers against ALL types of keylogging programs and keylogging hardware devices.
Safend Protector

Safend Protector

by Safend

(0 reviews)
Safend is a leading provider of endpoint data protection solutions that protect against corporate data loss or theft by offering comprehensive products for data encryption and data transfer devices. The Safend Data Protection Suite encrypts internal and external hard drives, removable storage and CD/DVDs and provides granular control over all physical ports, wireless ports and removable media devices, ensuring compliance with regulatory data security and privacy standards. Endpoint data protection and leakage prevention solutions that protect against corporate data loss.
Cloudmark Authority

Cloudmark Authority

by Cloudmark

(1 review)
Gateway anti-spam software solution, scales for any large organization from the enterprise to the carrier. Gateway anti-spam software solution, scales for any large organization from the enterprise to the carrier.
Pulse

Pulse

by Pwnie Express

(0 reviews)
Pulse discovers, inventories and classifies all IT and IoT devices and builds a comprehensive identity for each device. Device discovery and classification is performed on a continual basis, without the need for agents or network changes. Pulse continually monitors the behavior of devices and associated systems for indicators of compromise or sabotage, then creates actionable intelligence for threats and risks. Respond directly from from Pulse to neutralize IoT device threats to your systems. Pulse continuously identifies and assesses all devices and IoT systems, and provides the ability to respond to network threats.
Key Manager Plus

Key Manager Plus

by ManageEngine

(0 reviews)
ManageEngine Key Manager Plus is a web-based key management solution that helps you consolidate, control, manage, monitor, and audit the entire life cycle of SSH (Secure Shell) keys and SSL (Secure Sockets Layer) certificates. It provides visibility into the SSH and SSL environments and helps administrators take total control of the keys to preempt breaches and compliance issues. Web-based SSH Key and SSL Certificate Management Solution for Enterprises
Saint Security Suite

Saint Security Suite

by SAINT

(2 reviews)
The SAINT security suite includes vulnerability, configuration, & application assessment & integrated penetration testing, providing a complete picture of both internal & external threats. It is offered as a cloud service, software, virtual machine, or a pre-configured appliance. The security suite includes custom reports; dashboards and dynamic data analysis including security trending; automatic updates; social engineering tools; compliance policies and reports for PCI, FISMA, SOX, & HIPAA. Integrated Vulnerability Management, Penetration Testing, Compliance, and Configuration Audit software.
Lynis Enterprise

Lynis Enterprise

by CISOfy

(1 review)
Lets companies perform security scans of their Linux, macOS, and UNIX-based systems, to help with system compliance. Lets companies perform security scans of their Linux, macOS, and UNIX-based systems, to help with system compliance.
SafenSec

SafenSec

by SafenSoft

(0 reviews)
Intrusion prevention system that blocks spyware, new viruses and other malware. Intrusion prevention system that blocks spyware, new viruses and other malware.
IWASSA

IWASSA

by IWASSA

(0 reviews)
Single-sign-in for each user and secured service for file sharing. Single-sign-in for each user and secured service for file sharing.
Tanium Endpoint Platform

Tanium Endpoint Platform

by Tanium

(0 reviews)
15-Second Visibility and Control Over Every Endpoint. Even Across the Largest Networks. 15-Second Visibility and Control Over Every Endpoint. Even Across the Largest Networks.
SQL Safe Backup

SQL Safe Backup

by IDERA

(0 reviews)
DBAs need a powerful backup and recovery solution that greatly reduces backup and recovery time, minimizes storage requirements, and provides enterprise management capabilities to conduct backups across a large numbers of servers simultaneously. SQL Safe has been specifically designed to meet these requirements, resulting in increased application and business availability for your critical SQL Server infrastructure. Perform a SQL Backup Across Your Servers
TRITON Enterprise

TRITON Enterprise

by Forcepoint

(2 reviews)
Spam, malware, and blended threats protection solution for the entire enterprise network, including on-site and remote employees. Spam, malware, and blended threats protection solution for the entire enterprise network, including on-site and remote employees.
Privileged Account Security Solution

Privileged Account Security Solution

by CyberArk Software

(1 review)
Software to control access to administrative and privileged accounts to reduce information leaks & overall risk by automating policies. Software to control access to administrative and privileged accounts to reduce information leaks & overall risk by automating policies.
Cryptainer PE

Cryptainer PE

by Cypherix

(0 reviews)
Corporate network security solution that provides for a network wide encryption based security implementation. Corporate network security solution that provides for a network wide encryption based security implementation.
SpamJadoo

SpamJadoo

by Data Infocom

(0 reviews)
Anti Spam service which eliminates spam at protocol level. Anti Spam service which eliminates spam at protocol level.
Terabit Security

Terabit Security

by Terabit Security

(0 reviews)
Our system offers significant technical and financial advantages. DPS functions at the network edge and conducts automatic traffic Our system offers significant technical and financial advantages. DPS functions at the network edge and conducts automatic traffic
BluSapphire

BluSapphire

by BluSapphire

(0 reviews)
BluSapphire is a single tool, providing unrivaled visibility into Advanced Persistent Threats (APT) and malicious activity on a client's infrastructure. Operating across the entire Cyber Defense stack, we deliver real-time Advanced Behavioral Analytics, Multi-layered Anomaly Detection, Machine intelligence, and Threat Hunting to drive improved efficiency and response times while cutting costs. ONE TOOL FOR ENTIRE CYBER DEFENSE STACK DETECTION, ANALYSIS, RESPONSE & REMEDIATION.
DLP Suite

DLP Suite

by Spirion

(1 review)
This software helps to prevent data leaks and protect your information wherever it is or what form its in. This software helps to prevent data leaks and protect your information wherever it is or what form its in.
Armor2net Personal Firewall

Armor2net Personal Firewall

by Armor2net Software

(0 reviews)
Stops hackers and data thieves and protects your PC from Internet-borne threats. Stops hackers and data thieves and protects your PC from Internet-borne threats.
Business Email Security

Business Email Security

by Grove Group

(0 reviews)
Secure boundary services that protect email communications by providing complete email intrusion prevention. Secure boundary services that protect email communications by providing complete email intrusion prevention.
CounterStorm

CounterStorm

by Raytheon

(0 reviews)
An advanced network security solution specifically designed to stop zero-day, and targeted attacks in seconds. An advanced network security solution specifically designed to stop zero-day, and targeted attacks in seconds.
Illumio ASP

Illumio ASP

by Illumio

(0 reviews)
Go beyond network-level visibility. Gain information on systems and processes on physical and virtual hosts and their communications. Go beyond network-level visibility. Gain information on systems and processes on physical and virtual hosts and their communications.
BorderWare Firewall Server

BorderWare Firewall Server

by BorderWare Technologies

(1 review)
Integrated solution that eliminates vulnerabilities and costs associated with a separate firewall and operating system. Integrated solution that eliminates vulnerabilities and costs associated with a separate firewall and operating system.
NetSpective Content Filter

NetSpective Content Filter

by TeleMate.Net Software

(1 review)
Passive and Proxy packet inspection identifies URL, VoIP, and P2P signatures regardless of port with unprecedented scalability Passive, deep packet inspection identifies URL, VoIP, and P2P signatures regardless of port with unprecedented scalability.
Bot Detection and Mitigation

Bot Detection and Mitigation

by Distil Networks

(1 review)
Distil Networks is the first easy and accurate way to identify and police malicious malicious website traffic, blocking 99.9% of bad bots without impacting legitimate users. Distil also provides you with API security, real-time threat intelligence, and complete visibility and control over human, good bot, and bad bot traffic across your web infrastructure. Web based solution designed to protect your website and content from bad bots.
DynaZip Max Secure

DynaZip Max Secure

by Inner Media

(0 reviews)
Data compression plus strong industry-standard Advanced Encryption Standard (AES) encryption and decryption. Data compression plus strong industry-standard Advanced Encryption Standard (AES) encryption and decryption.
SafeInternetEmail

SafeInternetEmail

by FreeStone Software

(0 reviews)
NETWORK SECURITY, FILTERING AND OPTIMIZATION.. Solutions for Visibility, Control and Performance.. Email virus protection, spam and Server-based website content filtering.
StealthDisk Mobile

StealthDisk Mobile

by Security Group Six

(0 reviews)
Virtual Disk Technology that easily and securely stores and encrypts all your important files and documents. Virtual Disk Technology that easily and securely stores and encrypts all your important files and documents.
SSProtect

SSProtect

by Definitive Data Security

(0 reviews)
SSProtect provides endpoint data protection against advanced threats - even on compromised hosts - without the need for user training. SSProtect provides endpoint data protection against advanced threats - even on compromised hosts - without the need for user training.
Spam and Virus Blocker

Spam and Virus Blocker

by ClearMyMail

(0 reviews)
Spam filtering solution for SME and Internet users, blocking all spam and virus emails before they reach your computer. Spam filtering solution for SME and Internet users, blocking all spam and virus emails before they reach your computer.
Max Secure Spyware Detector

Max Secure Spyware Detector

by Max Secure Software

(0 reviews)
Scans, detects and deletes Spyware and Malwares providing you a safe browsing experience. Scans, detects and deletes Spyware and Malwares providing you a safe browsing experience.
VFind Security ToolKit

VFind Security ToolKit

by CyberSoft

(0 reviews)
It is a suite of State-Of-The-Art Computer Security Virus and Intrusion Tools. It is a suite of State-Of-The-Art Computer Security Virus and Intrusion Tools.
XD Air

XD Air

by Tresys

(0 reviews)
Security software for mobile networks allowing only designated content to be sent or received over a given network. Security software for mobile networks allowing only designated content to be sent or received over a given network.
CimTrak Integrity Suite

CimTrak Integrity Suite

by Cimcor

(0 reviews)
Built around advanced file integrity monitoring technology, CimTrak can go beyond server monitoring detecting changes to network devices, databases, desktops/workstations, VMware ESX/ESXi hosts, and more, CimTrak helps companies and government agencies worldwide keep their IT infrastructure secure, maintain compliance with regulations such as the Payment Card Industry Standards (PCI-DSS), ensure continuous system uptime, and take control of changes in their IT environments. A comprehensive security software application that is easy to deploy and scales to the largest of global networks.
Attack Mitigation System

Attack Mitigation System

by Radware

(0 reviews)
Network attack mitigation solution with several security modules, including network behavioral analysis & intrusion prevention. Network attack mitigation solution with several security modules, including network behavioral analysis & intrusion prevention.
Aobo Internet Filter for Mac
Aobo Internet Filter for Mac is a stealthy web blocker for Mac OS X users. It effectively filters websites and blocks inappropriate applications. Support multi-computer setup with easy steps. A stealthy web blocker for Mac OS X users. It effectively filters websites and blocks inappropriate applications.
CPTRAX for Windows

CPTRAX for Windows

by Visual Click Software

(0 reviews)
Email alerts when users are locked out of Active Directory? Email alerts when folders are 'drag-n-dropped'? Failed logon alerting that can be isolated to the kerberos error? CPTRAX for Windows provides real-time enterprise-wide alerting and auditing for your Windows and Active Directory environments. Areas covered include Windows File Systems (NTFS) including permission changes, Active Directory, Server Authentication and Group Policy. Does not use or rely on Windows Event Logs. Provides real-time enterprise-wide alerting and auditing for your Windows Servers, Workstations and Active Directory environments.
Themis

Themis

by Cossack Labs

(0 reviews)
We aim to mitigate risks in data security through the development of easy-to-use, cross-platform solutions that are designed to provide a simple means to protect data within corporate infrastructures or stand-alone applications and over both a distributed application setting and in the open Internet. Solution providing data security and offering open-source and commercial instruments for data protection and security in your business.
Unistal Anti Virus

Unistal Anti Virus

by Unistal Systems

(0 reviews)
Unistal has exerted full potential and developed superior recovery applications that restore deleted files. The diverse range of recovery applications include hard drive,mailbox,Raid Server data recoveries,email conversion (OST to PST , EDB to PST, NSF to PST), and file repairing software,and are also proficient in handling complex data recovery with cent percent absolute end results. All the applications are designed and developed at Unistal lab; incorporated with cutting edge technology. Unistal provides best Data Recovery Software that Recovers Lost or Deleted Files From Windows,Mac,Linux,Hard Disk,Pen Drive,etc
Okta

Okta

by Okta

(199 reviews)
Okta is the leading provider of identity for the enterprise. The Okta Identity Cloud connects and protects employees of many of the worlds largest enterprises. It also securely connects enterprises to their partners, suppliers and customers. With deep integrations to over 5,000 apps, the Okta Identity Cloud enables simple and secure access from any device. Thousands of customers, including Experian, 20th Century Fox, LinkedIn, and Adobe trust Okta to work faster, boost revenue and stay secure. Okta is the foundation for secure connections between people & technology. Use the cloud to access apps on any device at any time.
Cloudflare

Cloudflare

by Cloudflare

(82 reviews)
Cloudflare Inc. is the leading web performance and security company helping to build a better Internet. Today the company runs one of the worlds largest networks (of more than 100 data centers) that powers more than 10 trillion requests per month. This is nearly 10% of all Internet requests, impacting more than 2.5 billion people globally. Cloudflare Inc. is a web performance and security company on a mission to build a better Internet.
Splunk

Splunk

by Splunk

(71 reviews)
Software that lets you search and analyze all your IT infrastructure data from a single location in real time. Software that lets you search and analyze all your IT infrastructure data from a single location in real time.
McAfee Preventsys Risk Analyzer
Consolidate data. Identify risks. Automate security compliance reporting. Consolidate data. Identify risks. Automate security compliance reporting.
Adguard

Adguard

by Adguard

(14 reviews)
THE WORLD'S MOST ADVANCED AD BLOCKER! Get rid of intrusive ads and online tracking, and protect your devices from malware. *AdGuard will deal with annoying banners, pop-ups and video ads once and for all. *AdGuard hides your data from the multitude of trackers and activity analyzers that swarm the web. *Thanks to AdGuard, you will be able to avoid all fraudulent and phishing websites and malware attacks. Available for Windows, Mac, Android, iOS (on App Store). AdGuard is the best way to get rid of intrusive ads and online tracking, and to protect your computer from malware.
CryptoPhoto

CryptoPhoto

by CryptoPhoto

(4 reviews)
Blocks phishing & malware attacks by giving you a fast new way to log in. Blocks phishing & malware attacks by giving you a fast new way to log in.
Kiuwan Code Security

Kiuwan Code Security

by Kiuwan

(4 reviews)
We provide an end-to-end Software Security platform to bring you objective data so you can make informed decisions regarding the security risks faced by your applications. We make tough decisions easier and this translates in cost reduction, risk mitigation, objective measurement, with the broadest language coverage and third party intergations to name but a few of the possibilities brought about by our platform. SAST and open source management of your entire portfolio. DevSecOps platform with SAST and SCA, IDE integration and distributed analysis to shield your applications from external threats
ForeScout CounterACT Edge

ForeScout CounterACT Edge

by ForeScout Technologies

(3 reviews)
Security hardware that monitors the perimeter and preempts targeted attacks. Security hardware that monitors the perimeter and preempts targeted attacks.
Vera

Vera

by Vera

(2 reviews)
Vera secures any kind of data, wherever it goes Vera secures any kind of data, wherever it goes
SecureAd

SecureAd

by Oxford BioChronometrics

(2 reviews)
Uses real-time behavioral analysis to detect even the most sophisticated bots that commit ad fraud and waste your money. Uses real-time behavioral analysis to detect even the most sophisticated bots that commit ad fraud and waste your money.
WildFire

WildFire

by Palo Alto Networks

(2 reviews)
Cloud-based malware analysis solution for automated unknown malware detection and threat prevention. Cloud-based malware analysis solution for automated unknown malware detection and threat prevention.
SecurenceMail

SecurenceMail

by Securence

(1 review)
Developed in 2001, Securence was the 1st cloud based email filtering solution on the market featuring game changing signature based detection. Zero minute detection methods are deployed to counter malware campaigns faster and more accurately than any other solution. Securence is known for the best admin interface, overall effectiveness and lowest pricing on the market. 10 year email archiving, encrypted sending, continuity DR, all optimized to enhance on-prem hosted email, O365 and Gmail. A simple switch of your MX records will demonstrate why Securence is the secret weapon in email filtering, sec