Here's our list of apps for Computer Security Software. Filters help you narrow down the results to find exactly what you’re looking for.

180 Software options

RedShield is a cybersecurity software designed to help government agencies and businesses across healthcare and finance industries streamline network security and risk assessment operations using artificial intelligence (AI) technology. It enables IT teams to identify and remove vulnerabilities from online applications and APIs, perform penetration... Read more about RedShield
CrowdSec is an open-source and collaborative multiplayer firewall. Analyze behaviors, respond to attacks & share signals across the community. Security should be available to everyone. We make it happen. For free. Read more about Crowdsec
Protect students across Mac, Windows, Chromebook, iOS, Kindle ad Android with dynamic web filtering and intelligent reporting. Read more about Qustodio for Schools
Design & build a robust identification and authentication security innovation for passwordless multi-factor security across systems with our swIDch Auth SDK. Read more about swIDch Auth SDK
Open Source Self-Sovereign Identity (SSI) solutions (B2B/G) for any use case - including authentication, identification, credentialing and digital signatures. Read more about SSI Kit
Verimatrix Code Shield solution injects powerful, automated, and self-defending security directly into your app. It secures the app from being modified and can be easily implemented at any stage of the development process. Read more about Verimatrix Code Shield
DIARIO is capable of scanning documents without them ever leaving the perimeter of the company or user, using an artificial intelligence engine with 100% Telefónica TECH technology. It accepts all types of different documents, from Microsoft Word to Adobe Acrobat and more. Read more about DIARIO
Securden is an endpoint protection software designed to help businesses of all sizes control applications, privileged access, and remote endpoints. Administrators can utilize the password vault to store, manage, and share certificates and secured keys. Read more about Securden
AdsPower is an anti-association independent browser environment provider. The centralized platform is mainly for eCommerce marketers who require untraceable multi-account browser tools to set up, log in, and manage multiple social media profiles or other online accounts without leaving fingerprints. Read more about AdsPower
FortMesa provides cybersecurity programs for organizations without a security professional on staff. It allows users to build their organization's cyber risk management and security operations capability using simple and easy to use team-based workflows. Map to a cyber standard and build controls Read more about FortMesa
Cybersprint is a security platform that allows companies to visualize their digital footprint and identify online access points to their business systems. The software searches all possible public entrances via the internet: social media, IoT, mobile apps, and the dark web. Read more about Cybersprint
Trend Micro Cloud One is cloud and cybersecurity software that helps businesses manage security policies, detect threats, receive malicious activity alerts, conduct root-cause analysis, and more from within a unified platform. It allows staff members to set up runtime container protection, manage security policies across multi-cloud environments,... Read more about Trend Micro Cloud One
GetSecured is a data protection program designed to help businesses detect vulnerabilities and data breaches. The platform acts as a comprehensive security scanning tool to find breached data, web app/AWS cloud vulnerabilities, exposed servers, and compliance issues. Read more about GetSecured
SpamTitan Plus is an anti-phishing solution, which provides features such as URL inspection, malicious link neutralizing, URL rewriting, and time-of-click analysis. Read more about SpamTitan Plus
A software solution that helps businesses automate data security and compliance through discovery, mapping, labeling, risk mitigation, and protecting data assets. Read more about Polar Security
Rzilient, the next-generation IT management partner for small and medium-sized businesses to simplify, automate and secure your IT management. Read more about Rzilient
BroShield is a computer security and parental control software that helps individuals and families block inappropriate sites, schedule screen times, restrict activities, receive suspicious activity alerts, and more from within a unified platform. It allows users to monitor activities in real-time, restrict adult websites, set up web firewalls,... Read more about BroShield
Risk Assistant is a cloud-based cybersecurity solution that helps businesses of all sizes prevent financial losses. It provides effective defensive measures to protect a business by evaluating and tracking risk levels. Read more about Risk Assistant
Adaptive SSO Authentication & FIM Solution Hitachi ID's all credential self-service identity authentication management for passwords, security questions, smart cards, tokens, etc. Request a demo. Read more about Hitachi ID Bravura Pass
Prove's Phone-Centric Identity platform helps companies mitigate fraud while accelerating revenue and reducing OPEX across mobile, desktop, tablet, contact center, and in-store channels. Read more about Prove
Protect computers and devices in your IT network from malware by removing administrative privileges and limiting the actions that can be performed by a standard user. Eliminate standing privileges & enforce JIT access. Control application usage and track activities using comprehensive audit trails. Read more about Windows Privilege Manager
Secure Remote Worker addresses the challenges faced by BPOs & Contact Centers enabling them to create a secure and compliant remote working environment that allows them to scale faster. Read more about Secure Remote Worker
The ASPIA platform enables automated and simplified security assessment and vulnerability management. Using ASPIA, enterprise security workflows can be automated and orchestrated to measure and improve efficiency and accuracy. Read more about ASPIA
Blacklock is an award-winning self-service penetration testing platform that enables businesses to perform security testing in a cost-effective, scalable and continuous manner. The platform automates several stages of the traditional penetration testing cycle, introducing an agile penetration testing approach and making security testing accessible... Read more about Blacklock
Teleport lets you manage your infrastructure from your laptop, tablet or phone. It provides secure SSH and SFTP access to any server from your browser or the command line. You can use Teleport to securely manage any server, anywhere in the world. Read more about Teleport
tbIAM is a cloud-based identity access management (IAM) solution that helps businesses in IT, finance, healthcare, retail, HR, manufacturing, and other industries manage security operations using single sign-on (SSO), multi-factor authentication (MFA), and other measures. It lets staff members utilize the self-service portals to manage profiles... Read more about tbIAM
iBoostUp will quickly and easily make your Mac perform better. Whether it’s running a little slow, using too much space, or if you just want to be sure it’s safe from malware and viruses, iBoostUp is the solution for you. Read more about iBoostUp
Versio.io continuously and automatically detects and documents changes in businesses and IT landscapes. Data from third-party applications that companies use to run business processes, monitor the IT landscape and control IT service management can be seamlessly integrated. Read more about Versio.io
Shieldoo's mesh network is a revolutionary new tool designed to connect securely from anywhere with next-gen encryption and anonymity. Read more about Shieldoo
IObit Uninstaller is software that removes unwanted programs, plugins, and suspicious files from computers, allowing for safer browsing and improved device performance. The system also offers an intelligent scan that performs a thorough and optimized cleanup. Read more about IObit Uninstaller

Related categories