Best IT Security Software - Page 5

Compare the Top IT Security Software as of June 2025 - Page 5

  • 1
    6clicks

    6clicks

    6clicks

    6clicks is an easy way to implement your risk and compliance program or achieve compliance with ISO 27001, SOC 2, PCI-DSS, HIPAA, NIST, FedRamp and many other standards. Hundreds of businesses trust 6clicks to set up and automate their risk and compliance programs and streamline audit, vendor risk assessment, incident and risk management and policy implementation. Easily import standards, laws, regulations or templates from our massive content library, use AI-powered features to automate manual tasks, and integrate 6clicks with over 3,000 apps you know and love. 6clicks has been built for businesses of all shapes and sizes and is also used by advisors with a world-class partner program and white label capability available. 6clicks was founded in 2019 and has offices in the United States, United Kingdom, India and Australia.
  • 2
    Queue-it

    Queue-it

    Queue-it ApS

    Queue-it empowers organizations to deliver seamless user experiences and protect their brand reputation by controlling online traffic. Crashes and slowdowns threaten even the biggest of businesses. They impact sales, frustrate visitors, and damage reputation and trust. Traffic management solutions equip brands to protect themselves against the threat of downtime. Queue-it’s cloud-based virtual waiting room lets organizations control web traffic to deliver a fair and frictionless user experience, no matter the demand. It gives organizations peace of mind and confidence on their busiest days, so they can focus on delivering customers and citizens the experience they deserve. Since Queue-it’s first waiting room went live in 2010, over 50 billion users have passed through our system. Today, we have offices in Copenhagen, Minneapolis, and Sydney, and people joining our queues from 172 countries around the globe.
  • 3
    Auth Armor

    Auth Armor

    Auth Armor

    Harness the power of biometrics on smartphones to make authentication easy for any application or website, creating a new approach to logging and authenticating online. Passwordless and 2-factor authentication that lets you authenticate your users with the smartphones in their pockets. Auth Armor puts secure authentication in the hands of every user — no weak passwords or cumbersome codes. We have built powerful APIs, SDKs, libraries, and dashboards to allow you to build what you want to build, how you want to build it. Use our tools to build authentication into any app, using any flow you would like. We offer Consumer facing and workforce protection, giving you the power and flexibility to secure anything, the way you need it. Auth Armor is the fastest and easiest mobile authenticator available. We support instant push messaging directly to user's devices enabling the fastest login and authentication experience.
    Starting Price: FREE for 10,000 active users!
  • 4
    GateKeeper Enterprise

    GateKeeper Enterprise

    Untethered Labs, Inc.

    Passwordless, proximity login to PCs, Macs, websites, and desktop applications. Hands-free, wireless 2FA and password manager through active proximity-detection. IT admins can dynamically allow users to log in to their computers and websites with a physical key either automatically, by touch, by pressing Enter, or with a PIN. Seamlessly login, switch users, switch computers, and logout without passwords, touch, or trouble - just a key. Once a user walks away, the computer will lock, blocking access to the computer and web passwords. With continuous authentication, users are always being checked to ensure that they require access. No more typing passwords. Admins and compliance can now automate password security from a central admin console: enforce stronger passwords, enforce 2FA, and give employees the power of password-free login without interrupting workflow. Reduce helpdesk tickets related to forgotten passwords/password resets. Login and auto-lock with proximity.
    Starting Price: $3/user/month
  • 5
    Hexnode UEM

    Hexnode UEM

    Mitsogo Inc

    Hexnode, the enterprise software division of Mitsogo Inc., is a Unified Endpoint Management solution with cross-platform functionalities. Hexnode supports all major operating systems, including iOS, iPadOS, Android, Windows, macOS, tvOS, Linux, ChromeOS, visionOS, Apple TV, Android TV, and fireOS, and offers out-of-the-box enrollment methods. The entire device lifecycle, starting from enrollment to device retirement, can be monitored and managed from a unified console. Features such as automated device enrollment, geofencing, Remote Monitoring and Management, patch management, and a simple and intuitive UI makes it the perfect tool for device management. In addition, Hexnode offers a wealth of tools perfect for today's increasingly mobile, modern teams, which includes an intuitive dashboard for greater visibility and control over mobile devices across the enterprise, web filtering for security, location tracking, and so much more.
  • 6
    Massdriver

    Massdriver

    Massdriver

    At Massdriver, we believe in prevention, not permission, letting ops teams enforce guardrails while developers deploy confidently. Our platform encodes your non-negotiables into self-service modules built with your preferred IaC (Terraform, Helm, OpenTofu, etc.) standardizing infrastructure across AWS, Azure, GCP, and Kubernetes out-of-the-box. By bundling policy, security, and cost controls into functional IaC assets, Massdriver cuts overhead for ops teams and speeds developer workflows. Through a central service catalog, developers can provision what they need with integrated monitoring, secrets management, and RBAC baked in. No more brittle IaC pipelines; ephemeral CI/CD spins up automatically from each module’s tooling. Scale faster with unlimited cloud accounts and projects, all while reducing risk and ensuring compliance. Massdriver—fast by default, safe by design.
    Starting Price: Free trial
  • 7
    Relianoid

    Relianoid

    Relianoid

    Designed to elevate your online services to unparalleled levels of performance, reliability, and security, our ADC solution ensures seamless traffic distribution, enhanced resource utilization, and fortified protection against potential cyber threats. Providing you massive scalability, high availability, and increased security for your services, applications, and networks. Unlimited throughput, connections, farms, and optimized for multi-core with broad hardware compatibility. No need for installation that allows a quick production consolidation, ensuring a seamless deployment process. Integrated easily in your infrastructure ensuring a productive and cost-saving setup and maintenance. Sharing hardware resources reduces costs associated with physical hardware, making it a budget-friendly option. Ready for 64 bits platforms in order to provide better performance and a more robust environment. It permits to assign more resources in terms of performance than other architectures.
    Starting Price: $1,356 one-time payment
  • 8
    MyChat

    MyChat

    Network Software Solutions

    Secure instant messaging system with own server that can work in local area network and over the Internet. Providing collaboration tools for employee engagement. Built-in knowledge base, important notifications with return receipts, Bulletin board, broadcast messages, flexible server management, the system for user rights to access MyChat features, voice/video calls, screen sharing calls, Kanban project management, conferences, private dialogues, extended contact list, available for all platforms: Windows, macOS, Linux, Android, iOS, WEB.
    Starting Price: $6/per user/one-time
  • 9
    Hackrate

    Hackrate

    Hackrate

    Check us out at hckrt.com! 🔐 Hackrate Ethical Hacking Platform is a crowdsourced security testing platform that connects businesses with ethical hackers to find and fix security vulnerabilities. Hackrate's platform is designed to be easy to use for both businesses and ethical hackers. Hackrate's platform is a valuable tool for businesses of all sizes. By crowdsourcing their security testing, businesses can gain access to a large pool of experienced ethical hackers who can help them find and fix security vulnerabilities quickly and efficiently. If you are looking for a way to improve the security of your business's systems and applications, then Hackrate Ethical Hacking Platform is a great option to consider.
    Starting Price: €250/month
  • 10
    FastPass SSPR

    FastPass SSPR

    FastPassCorp

    FastPass enhances user protection against identity theft. The combination of FastPass SSPR and FastPass IVM, integrated into FastPass Suite, boosts productivity for end-users and help desk support, simultaneously safeguarding against social engineering attacks on the service desk. Preventing password theft from the help desk necessitates a secure IT workflow. FastPass IVM, available as a cloud or on-premises offering and certified by ServiceNow and others, enables dynamic and contextual verification. Tailored to individual user groups based on security policies, this solution incorporates information about the user's device usage and multi-factor authentication (MFAs), creating a robust defense against hackers. FastPass SSPR provides an advanced self-service solution for password resets and unlocks. It seamlessly supports passwords from AD, Entra, SAP, IBM, Oracle, LDAP, and other systems. All types of MFA and manager approval for verification.
    Starting Price: $0.20/user/month
  • 11
    CacheGuard

    CacheGuard

    CacheGuard Technologies

    CacheGuard-OS transforms a virtual or bare metal machine into a powerful and easy to handle network appliance. It's a Linux based Operating System built from scratch and especially designed to Secure and Optimize the network traffic. Great care has been taken by CacheGuard-OS developers to select the best of the best Open Source technologies to integrate into CacheGuard-OS. The result is a robust and trustworthy solution that can be up and running within minutes. CacheGuard-OS integrates Open Source software such as but not limited to OpenSSL, NetFilter, IProute2, StrongSwan, ClamAV, Apache, ModSecurity, Squid and Open Source developments made by CacheGuard-OS developers.
    Starting Price: $9.99 per month
  • 12
    TrustMAPP

    TrustMAPP

    TrustMAPP

    TrustMAPP provides customers with a continuous process of measuring, reporting, planning and cintinuous improvement. Provides information security leaders with a real-time view of the effectiveness of their cybersecurity program while aligning to business objectives and risk. TrustMAPP provides the story of where you are, where you’re going, and what it will take to get there. From a single source of data, or from multiple integrations, an organization’s security posture is visible based on stakeholder perspectives: CISO, C-Suite, and Board. TrustMAPP gives organizations the ability to manage security as a business, quantifying and prioritizing remediation actions and costs.
  • 13
    ManageEngine Applications Manager
    ManageEngine Applications Manager is an enterprise-ready platform designed to monitor an entire application ecosystem of a business organization. Our platform helps IT and DevOps teams get visibility into all the dependent components within their application stack. With Applications Manager, it becomes easier to monitor the performance of mission-critical web applications, web servers, databases, cloud services, middleware, ERP systems, messaging components, and more. It has tons of features that fast-track the troubleshooting process and help reduce MTTR. This way, issues are fixed before application end-users are affected. Applications Manager has a fully functional dashboard that can be customized to get performance insights at a glance. By configuring alerts, it constantly keeps a lookout for performance issues within the application stack. Combining this with intelligent machine learning, Applications Manager helps turn performance data into actionable insights.
    Starting Price: $395.00/Year
  • 14
    Quantum Armor

    Quantum Armor

    Silent Breach

    Your attack surface is the sum of every attack vector that can be used to breach your perimeter defenses. In other words, it is the total quantity of information you are exposing to the outside world. Typically, the larger the attack surface, the more opportunities hackers will have to find a weak link which they can then exploit to breach your network. Professional hackers typically follow the cyber kill chain when attacking a target, and surveying the target's attack surface is normally the very first step in this process; what is known as advanced reconnaissance. Reducing the attack surface can minimize risk further down the cyber kill chain, preventing attacks before they even occur by eliminating potential attack vectors as early as possible. The cyber kill chain is a method of categorizing and tracking the various stages of a cyberattack from the early reconnaissance stages to the exfiltration of data.
    Starting Price: From $49/asset/month
  • 15
    AppSealing

    AppSealing

    INKA Entworks

    AppSealing - the AI-powered next-gen AppShielding solution crafted to enable organizations to prevent mobile app attacks and deal with sophisticated threat landscapes with perfect precision in just 3 simple steps. AppSealing brings the benefits of DevSecOps to Mobile Apps with a ZERO-FRICTION, ZERO-CODING Approach. Get the best of Defense-in-depth security and regulatory compliance in a single solution for mobile apps AppSealing is trusted by industries like Fintech/Banking, O2O, Movie Apps, Gaming, Healthcare, Public apps, E-commerce, and others globally.
    Starting Price: $129/app/month
  • 16
    ABLE Platform

    ABLE Platform

    ABLE Platform

    ABLE Platform is a multimodule web software that covers the entire loan origination and loan management processes. The following modules are included: - Landing page - to attract new borrowers. - Borrower portal - to serve actual borrowers. - Self-service portal - to manage the whole enterprise activity. - Back-office - the core of the platform to manage incoming loan applications, service disbursed loans, configure the loan product catalog, built-in dashboards and more. The platform automates the lending process throughout all the stages: - Initiation of omnichannel application - Consolidation and restructuring of debts - Negotiation with customers - Application decision-making - Personalized offers - Automation of the loan disbursement ABLE Platform serves any type of loan: - Payday Loan - Personal Loan - Point of Sale Loan (POS) - Buy Now, Pay Later (BNPL) - Mortgage Loan - Home Equity Loan - Auto Loan (Car finance) - Student Loan, etc
  • 17
    Bugfender

    Bugfender

    Beenario

    Remote logger, crash reporter and in-app user feedback Bugfender is a log storage service for application developers. Bugfender collects everything happening in the application, even if it doesn’t crash, in order to reproduce and resolve bugs more effectively and provide better customer support. Bugfender respects your user's privacy, is battery and network efficient and keeps logging even if the device is offline. Track and destroy bugs before users even notice. Bugfender logs all bugs on all devices and sends the results in seconds - enabling you to find and fix bugs before your users even get an error message. Achieve 5-Star Ratings. Bugfender doesn’t just log bugs and crashes. It logs all the information you’ll ever need so you can build a clear picture of your users and earn those crucial five-star ratings. Deliver world-class customer service. Our logging tool enables you to target individual users and provide personalized customer support.
    Starting Price: €29 per month
  • 18
    Virtual Safe Business Professional
    Virtual Safe Business Professional is business software that allows you and your employees to manage virtual, encrypted directories in your IT infrastructure. Master Data Management: The individual virtual safes can be flexibly expanded to include master data. Expand your safes with an item or customer number or a processing status, for example. Safe-Search: You or your employees can then use the integrated search function to filter according to your master data. Master-Password: Critical operations can be secured with a master password and, of course, all safes can be opened with it. Collaboration: When working in a team, it is important that the software supports you. Therefore the type of access can be selected by the user. The software also recognizes when a safe is already being processed. In this case, all employees can still read the safe data. Company standards are mapped and distributed to business areas via common configuration directories.
    Starting Price: €49/user
  • 19
    Perimeter 81

    Perimeter 81

    Check Point Software Technologies

    Perimeter 81 is transforming the world of secure network access and helping businesses of all industries and sizes smoothly transition to the cloud. Unlike hardware-based firewall and traditional VPN technology, Perimeter 81’s cloud-based and user-centric Secure Network as a Service utilizes the Zero Trust approach and SASE model framework to offer greater network visibility, seamless onboarding, and automatic integration with all the major cloud providers. Named a Gartner Cool Vendor, Perimeter 81 is considered by industry leaders to be winning the “SASE space race". Network security doesn’t have to be complicated – join Perimeter 81 on a mission to radically simplify the cybersecurity experience!
    Starting Price: $8 per user per month
  • 20
    Imunify360

    Imunify360

    CloudLinux, Inc.

    Imunify360 is a security solution for web-hosting servers. Imunify360 goes beyond antivirus and WAF and is a combination of an Intrusion Prevention and Detection system, a Application Specific Web Application Firewall, Real-time Antivirus protection, a Network Firewall, and Patch Management components in one security suite. Imunify360 is a fully-automated solution and it collects all statistics under an intuitive dashboard.
    Starting Price: $12
  • 21
    ManageEngine Network Configuration Manager
    Network Configuration Manager is a multi-vendor network change, configuration and compliance management (NCCM) solution for switches, routers, firewalls and other network devices. NCM helps automate and take total control of the entire life cycle of device configuration management. Schedule device configuration backups, track user activity and spot changes by comparing configuration versions all from a centralized web GUI. Monitor configuration changes, get instant notifications and prevent unauthorized changes to make your networking environment secure, stable and compliant. Define standard practices and policies, check device configurations for violations and readily apply remedial measures to ensure device compliance. Save time by automating repetitive, time-consuming configuration management tasks and also by centrally applying configuration changes to devices in bulk.
    Starting Price: $238
  • 22
    Easy365Manager
    Remove all pain from Office 365 management. Manage everything from AD Users & Computers. Eliminate Exchange on-premises. Easy365Manager integrates Office 365 with AD management, eliminating the need to constantly log in to web consoles and run PowerShell. Easy365Manager extends the functionality of AD Users & Computers by adding two new tabs to user properties. This allows you to manage EXO mailboxes directly from AD user properties - even complex settings like calendar delegation that otherwise require complex PowerShell scripting. Easy365Manager will allow your first-level supporter to work lightning-fast and reduce the number of tickets that are escalated to senior admins. Easy365Manager installs to any PC or server that has AD Users & Computers. There is no server component, service, AD extension, or custom security layer. You can install and configure Easy365Manager in less than two minutes and instantly eliminate all pain from hybrid Office 365 Management.
    Starting Price: $84 per year
  • 23
    GlassWire

    GlassWire

    GlassWire

    Instantly see who or what your PC is talking to on GlassWire's network monitoring graph, plus see what your PC may have connected to in the past. Detect spyware, malware, badly behaving apps, and bandwidth hogs, then block their connections. Monitor other PCs on your network and get alerted when new unknown devices join your WiFi. GlassWire warns you of network related changes to your PC, or unusual changes to your apps that could indicate malware. GlassWire offer a Consumer Solution and a Business solution, to suit the needs of both personal users and IT professionals. Among the features: Real-Time Monitoring to keep an eye on active and past network activity Threat. Threat Detection. GlassWire's built-in firewall detects and blocks potential threats. Application Tracking to Identify which applications are using your network and track their usage patterns. Bandwidth Usage, to stay informed about data consumption, And many more!
    Starting Price: $35.88/year/user
  • 24
    SparkView

    SparkView

    beyond SSL

    Fast, secure and reliable remote access to desktops, applications and servers. SparkView offers a simple and secure way to connect untrusted devices to your desktops and applications. The ZTNA solution with no installation on the client provides secure remote access from any device with a browser. All via HTML5 technology. The solution for remote office / mobile work and home office. Best web RDP client - advantages of SparkView: - ZTNA compliant remote access to applications, desktops and servers - Access from any device with browser (e.g. Chrome, Firefox, Edge, Opera, Safari, etc.) - No installation on clients or the target systems - One central point for administration, security and authorization - HTML5 technology - Flexible, stable and scalable - Low support and management overhead - Supports common protocols such as RDP, SSH, Telnet, VNC and HTTP(S) - No Java, no Flash, no ActiveX, no plugin, no rollout
    Starting Price: $60 per year
  • 25
    Verosint

    Verosint

    Verosint

    Verosint's Threat Detection, Investigation and Response platform provides real-time, intelligent ITDR for both workforce and customer identities. -Fastest MTTD & MTTR: Detect and respond to Identity based threats faster than anyone else in the industry -Detect Advanced Threats: Spot session hijacking, credential stuffing, account takeovers and more -Investigate Efficiently: Our customers say investigating incidents has gone from days to minutes with our AI Insights, unparalleled visibility and intelligence -Remediate Quickly: Automatically resolve identity threats with our integrated remediation playbooks -Easy to Deploy: Deploys in 60 minutes or less
    Starting Price: $1/user/month
  • 26
    Visual Expert
    Visual Expert is a static code analyzer for Oracle PL/SQL, SQL Server T-SQL, and PowerBuilder. Identify code dependencies to modify your code without breaking your application. Scan your code to improve the security, performance, and quality. Perform Impact analysis to Identify breaking changes. Automatically scan your code to detect and fix security vulnerabilities, bugs and maintenance Issues. Implement continuous code inspection Understand the inner workings of your code with call graphs, code diagrams, CRUD Matrix and Object Dependency Matrix (ODM). Automatically generate an HTML Source Code documentation. Explore your code exploration with hyperlinks Compare applications, databases or pieces of code. Improve maintainability. Clean up code. Comply with dev standards. Analyze and Improve DB code performance: Find slow objects and SQL queries, Optimize a slow object, a Chain of calls a slow SQL, Get a query Execution Plan. And much more.
    Starting Price: $495 per year
  • 27
    NetFlow Analyzer

    NetFlow Analyzer

    ManageEngine

    NetFlow Analyzer is a comprehensive traffic analysis tool that leverages flow technologies to provide real-time visibility into network bandwidth performance. NetFlow Analyzer is primarily a bandwidth monitoring tool, which has optimized thousands of networks globally, offering a holistic view of your network bandwidth and traffic patterns. NetFlow Analyzer is a unified solution that collects, analyzes, and reports on your network's bandwidth usage, and by whom. NetFlow Analyzer is your partner in optimizing bandwidth usage across a million interfaces globally, as well as providing network forensics and network traffic analysis. Reconfigure policies with traffic shaping via ACLs or class-based policies to gain control of the applications that use the most bandwidth. NetFlow Analyzer leverages Cisco NBAR technology to give you deep visibility into Layer 7 traffic and recognize applications that use dynamic port numbers or hide behind known ports.
    Starting Price: $245
  • 28
    ManageEngine Firewall Analyzer
    Firewall Analyzer helps manage and optimize firewall policies, automates firewall rule administration, tracks configuration, rule changes, helps schedule configuration backup, executes regular compliance audit checks, performs periodic security audits, generates real-time alerts for security events, tracks VPN usage, generates VPN reports, displays the current security status of firewalls, tracks employee internet usage, monitors to generate live, historical bandwidth reports, alerts when bandwidth is exceeded, collects, consolidates, and analyzes firewall logs to generate security, bandwidth reports.
    Starting Price: $395
  • 29
    Xecrets Ez

    Xecrets Ez

    Axantum Software AB

    Xecrets Ez is an easy to use personal desktop application for file encryption available for Windows, Mac and Linux. It is compatible with AxCrypt, in fact it is based on the exact same code, but is less complex and is entirely focused on delivering the core functionality needed without the bells and whistles. For personal daily use it's a great alternative to AxCrypt at a significantly lower cost. Xecrets Ez does not require installation, privileges or Internet. It allows you to encrypt, decrypt and open files for editing with single clicks or drag and drop with a clean and simple user interface. It is a fully integrated frontend to Xecrets Cli, an open source and free command line program that does all the heavy lifting with encryption, decryption and secure wiping. The command line can also be downloaded and used separately for scripting and integration into other software.
    Starting Price: €15/year
  • 30
    Carbide

    Carbide

    Carbide

    Get compliant, prevent breaches, and save money with a security and privacy program that doesn’t slow down your growth. While “checkbox”-style security and privacy can seem attractive, it builds security debt that multiplies with each new regulation and every new security questionnaire. Instead, Carbide makes enterprise-class security accessible to companies of all sizes. That means that start-ups get the step-by-step support they need to design and implement strong security and privacy, while established security teams gain back valuable time by capitalizing on the automation and efficiency provided by the platform. Adopting a security and privacy posture that goes beyond checkbox compliance is possible even without a large security team. Carbide breaks down enterprise-class security and privacy requirements and makes them accessible to, and achievable by, companies of all sizes.
    Starting Price: $7,500 annually