Cybersecurity Software
Use Capterra.it in Italy to find the best Cybersecurity Software for your business.
Eliminates all types of threats, including viruses, malware, ransomware, rootkits, worms and spyware with optional cloud-powered scanning for even better performance and detection. ESET uses multilayered technologies that go far beyond the capabilities of basic antivirus. Includes anti-spyware, anti-phishing, web control, anti-spam, and botnet protection with remote management capability. Learn more about ESET Endpoint Security
Barkly replaces legacy antivirus with the strongest protection, the smartest technology and simplest management. Barkly blocks attacks across all vectors and intents, including exploits, scripts, executables, and ransomware. Barkly's patented 3-level architecture enables unmatched visibility into all levels of the system, including the CPU, to block attacks. Barkly is incredibly simple to manage and deploy: no policies, configuration or security expertise required. Learn more about Barkly
DNS Based Web content filter that blocks malware, ransomware and phishing attempts as well as providing web content control. We filter over 1/2 a billion DNS requests every day, identify 60,000 malware iterations a day and have over 7,500 customers. Cloud and gateway versions available. Improve your cybersecurity now. Try a free Trial of WebTitan today, support included. Learn more about WebTitan
SecurityScorecard helps enterprises gain operational command of their security posture and the security posture of their ecosystems through continuous, non-intrusive monitoring. The companys approach to security focuses on identifying vulnerabilities from an outside-in perspective, the same way a hacker would. SecurityScorecards proprietary SaaS platform offers an unmatched breadth and depth of critical data points. Learn more about SecurityScorecard
Perimeter 81 is the ultimate secure network access service for your organization. Say goodbye to costly hardware, tedious installation and hours of help desk support. Instantly grant employees secure access to critical company resources based on-premise, on the web or in the cloud. Deploy private VPN servers with static IPs in a matter of seconds and gain unparalleled network visibility with a complete management portal. Includes single-click apps for every device. Learn more about Perimeter 81
RiskVision, powered by Resolver, offers a threat-based and intelligence-driven approach to IT risk and compliance. The RiskVision platform manages risk through a closed-loop lifecycle on identification, assessment, remediation, and monitoring processes to protect your organization from cyber attacks. Introduce new levels of IT efficiency and achieve continuous compliance across multiple regulatory and control frameworks. Learn more about IT Risk Management Software
Multi-vector protection against viruses and malware offering full protection against all of today's sophisticated malware threats including Trojans, keyloggers, phishing, spyware, back-doors, rootkits, zero-day and advanced persistent threats. Built in Identity & Privacy Shield stops data being stolen or captured when using the Internet and the outbound firewall also stops malware stealing data. No need to worry about or run updates cloud-driven security means endpoints are always up to date. Learn more about Webroot SecureAnywhere Endpoint Protection
Acunetix leads the market in automatic web security testing technology that scans and audits complex, authenticated, HTML5 and JavaScript-heavy websites among others. Used by many Government, Military, Educational, Telecommunications, Banking, Finance, and E-Commerce sectors, including many Fortune 500 companies, Acunetix offers cost-effective entry into the web scanning market with a simple, scalable, and high availability solution, without compromising quality. Learn more about Acunetix
Teramind provides a user-centric security approach to monitor employee's PC behavior. Our software streamlines employee data collection in order to identify suspicious activity, detect possible threats, monitor employee efficiency, and ensure industry compliance. We help reduce security incidents by providing real-time access to user activities by offering alerts, warnings, redirects and user lock-outs to keep your business running as efficiently and secure as possible. Learn more about Teramind
Netwrix Auditor gives you deep insight into what unstructured data you have, who owns it, who is entitled to access it and who actually uses it. With Netwrix Auditor, you can ensure that you have all the proper access security measures in place to prevent breaches. Oversee data access and permission changes, identify users with unnecessary access and lock it down, monitor file activity and detect suspicious user behavior, manage your unstructured data and optimize storage with Netwrix Auditor. Learn more about Netwrix Auditor
ComplyAssistant offers Governance, Risk, and Compliance (GRC) software and service solutions to healthcare organizations of all sizes. We help clients manage compliance activities for various healthcare regulations and accreditation requirements. Our cloud portal is used to document and manage risk, policies, procedures, evidence, contracts, incidents, and business associate (BA) / medical device vendor (MDV) audits. Learn more about ComplyAssistant
Web based Vulnerability scanner, with market comparison and optionality for Horangi to fix the vulnerabilities for you. On our higher tiers we also provide Penetration Testing and Incident Response services combined in with the product as well as internal scans. Learn more about Horangi Web Security Services
Cryptosense provides state-of-the-art analysis software to help businesses eliminate the vulnerabilities caused by insecure use of cryptography in their applications and infrastructure. Learn more about Cryptosense
Award-winning, comprehensive and economical monitoring suite which ensures that all aspects of your IT infrastructure are secure and performing optimally. EventSentry includes real-time event log, logfile, disk space, service, network, environment, Syslog/SNMP and performance monitoring. Customize depending on your needs - only enable the components you need. The built-in application scheduler allows easy integration of existing scripts. Download now and take charge of IT infrastructure today. Learn more about EventSentry
Log360, an integrated solution that combines ADAudit Plus and EventLog Analyzer into a single console, is the one-stop solution for all log management & network security challenges. It offers real-time log collection, analysis, correlation, & archiving abilities that help protect confidential data, thwart internal security threats, & combat external attacks. To help meet the most needed security, auditing, & compliance demands, it comes prepackaged over 1,200 predefined reports & alert criteria. Learn more about Log360
Cloud Defender is an integrated suite of security & compliance controls for cloud, on-premises, hosted & hybrid infrastructures, delivered as-a-service with 24x7 expert GIAC-certified analysts. With a single solution, it identifies vulnerabilities, defends against web app attacks, analyzes logs across the application stack to identify malicious or anomalistic behavior, & assists with meeting compliance mandates - all in a monthly subscription. Learn more about Cloud Defender
Namogoo is a customer hijacking prevention, technology identifies and blocks unauthorized ads injected into consumer web sessions. Learn more about Customer Hijacking Prevention
Okta is the leading provider of identity for the enterprise. The Okta Identity Cloud connects and protects employees of many of the worlds largest enterprises. It also securely connects enterprises to their partners, suppliers and customers. With deep integrations to over 5,000 apps, the Okta Identity Cloud enables simple and secure access from any device. Thousands of customers, including Experian, 20th Century Fox, LinkedIn, and Adobe trust Okta to work faster, boost revenue and stay secure. Learn more about Okta
Our solutions enable clients to find, fix, stop, and solve cybersecurity problems across their enterprise and product portfolios.
SiteLock is the Global Leader in Website Security, currently protecting more than five million websites.
Platform that unifies effective technologies for addressing internal and external risk: privileged account & vulnerability management.
Indeni helps IT pros detect network issues before they become major issues using predictive analytics technology.
Provides a continual security process, not just a point in time. It empowers organizations to monitor themselves and develop policies.
FICO Enterprise Security Score allows you to assess the cybersecurity risk of any organization
Endpoint security solution for malware monitoring, software management, internet traffic reporting, web scanning and filtering.
ONE TOOL FOR ENTIRE CYBER DEFENSE STACK DETECTION, ANALYSIS, RESPONSE & REMEDIATION.
Information security and compliance software for Risk Assessment, Policies, Business Continuity Planning, Vendor Management, and more.
Minimize your company's attack surface with identity assurance, advanced monitoring, reporting, just-in-time & just enough privilege.
Threat defense system for servers that enables users to protect physical, virtual, and cloud workloads.
ThreatAdvice analyzes your risk environment, educates your people and performs assessment exercises so that you are cyber-prepared.
CPU-level threat detection software that prohibits network's infections from malware and targeted attacks.
Pulsedive is an analyst-centric platform for searching, enriching, and correlating threat intelligence to help identify known threats.
Deliver powerful, layered protection to multiple customers quickly and easily.
Threat response system that collects and analyzes security alerts, automates workflows, and manages incident response process.
Self-configuring cyber defense system based on machine learning and probabilistic mathematics.
Free tool that scans your computer for viruses, malware, spyware, and other threats.
Protect your IoT in the cloud from previously known and ever growing cybersecurity threats.
Software to continuously verify networks' security with a visual interface to ensure control policies, analyze access, and more.
Business security software for organizations of all sizes that blocks access from unknown sites and automatically updates systems.
Security solution for on-premises data centers and public clouds.
Encryption and key management system that protects IBM i data and offers field encryption and backup encryption..
Web-based threat analytics software that offers codified detection expertise and guided investigation workflows.
Stop all your browsers, apps and operating systems from visiting malicious, online trackers, or otherwise unwanted websites.
1Tbps+ DDoS Protection that works with any application. Used frequently to protect online games, DNS, TCP services, HTTPS/HTTP websites
The new Argent for AWS goes beyond the free AWS Console and SDK to deliver peace-of-mind, professional-grade data center monitoring.
Twistlock is the leading cloud native cybersecurity platform for the modern enterprise
CyberStrong empowers cybersecurity teams to implement automated, intelligent cybersecurity compliance and risk management.
WebDefender plugin - A new generation WP security HAKERHIDE in cooperated in a multilayered website protection
Secures and easily protects a Windows Remote Desktop Server against cyber criminals.
Conduct your organization's cybersecurity maturity assessment with just few steps & use the intuitive improvement road-map to close gap
A network security solution with two factor authentication, SMS & voice recognition, reports & statistics, and more.
Threat protection software that detects access by spiteful domains and stops them from exfiltrating data.
Threat intelligence system that helps monitor network activities, reports on threat incidents, and visualizes threats' statuses.
Security management and operations platform with detection, analytics, and response capabilities.
Web-based business intelligence platform for security operations designed to protect organizations from risks and threats.
Automated threat detection and response platform that protects both network and endpoint devices.
Unified suite of solutions for insider threat management and employee behavioral analysis to protect sensitive information.
Protection for PCs, smartphones, tablets that helps guard against viruses, malware, ransom-ware, spyware and more.
Security analytics software powered by machine learning that detects threats at any time anywhere on your network/computer.
Cloud security platform that protects data in any SaaS with phishing, malware, insider threat and data loss protection.
Transparent Data Encryption for any application or database on the Windows Platform.
Browser Isolation technology that prevents malware and zero-day attacks.
Threat Intel SaaS to help companies rank if users have been classified as 'abusers' by one or more public blacklists.
CDCAT® provides a comprehensive cyber security strategy and capability improvement service.
Helps you use open source and stay secure and continuously find & fix vulnerabilities in your dependencies.
Multi-factor authentication and identity protection platform built to secure and control access to corporate applications and websites.
LoginCat is the AI based Cybersecurity solution which set up the zero trust zones to proactively stop hackers.
Rohde & Schwarz Cybersecurity helps to secure your cloud applications and web services.
Develops behavioral biometric profiles of online users to recognize a wide range of human and non-human cybersecurity threats.
Uplevel is the first intelligent cybersecurity system powered by graph-based machine learning.
Perception Point helps to stop email attacks at the earliest possible stage more accurate protection.
Threat detection software that monitors user behavior and identifies anomalies that can lead to security breeches.
EclecticIQ helps turn cyber threat intelligence into business value with a suite of products built for cyber security.
Cryptomage provides hi-tech ICT solutions that offer products in the cybersecurity area.
Kaymera is a cybersecurity software providing protection on any device and maintain effective cyber defense.
Security accreditation management system that helps organizations comply with information security regulations.
With Traditional Managed IT Service Contracts, you may pay for MORE than you need!
HOB Cloud Suite offers cybersecurity solution for enterprise Security Broker functions.
KOBIL provides mobile security management on all platforms and communication channels for your mobile business.
Cybersecurity solution that provides 360 degree automated protection against malicious attacks.
OUTSCAN is an automated vulnerability management solution that scans and secures external networks to prevent cyberattacks.
Gpg4o is a cybersecurity software that guarantees the privacy of your electronic correspondence by mail encryption.
CryptoSmart is the only governmental level cyber-security solution that helps to secure mobile communications on all devices.
SaaS security platform that ensures optimal data protection by monitoring devices on the network and identifying security leaks.
A tool that helps to protect your documents, controls access to all files, and supports activity tracking for any channel.
HaXM by XM Cyber is an APT simulation platform designed to safeguard your critical assets.
SaaS-based intelligent web application firewall with DDoS, Bot, and CDN capabilities in one solution.
Detect the insider threat, security breach, compromised accounts, phishing attacks and more.
Red Sift is an open cloud platform that makes cybersecurity accessible to everyone to prevent cyber attacks.




























































































