Here's our list of apps for Computer Security Software. Filters help you narrow down the results to find exactly what you’re looking for.

199 Software options

Hex-Rays develops and supports the IDA disassembler. This famous software analysis tool, which is a de-facto standard in the software security industry, is an indispensable item in the toolbox of a software analyst, security expert, software developer, or software engineer. Read more about IDA Pro
Faronics Anti-Executable provides security beyond an antivirus by blocking unauthorized programs whether malicious, unlicensed or simply unwanted from ever executing. Read more about Anti-Executable
Cyber Hawk is the enabling technology that allows businesses to begin offering new, high-value internal cybersecurity services to all clients. Read more about Cyber Hawk
Hitachi ID Bravura Privilege cloud architected PAM & PSM solution secures access to elevated privileges including administrator accounts & security groups. Read more about Hitachi ID Bravura Privilege
Versio.io continuously and automatically detects and documents changes in businesses and IT landscapes. Data from third-party applications that companies use to run business processes, monitor the IT landscape and control IT service management can be seamlessly integrated. Read more about Versio.io
ACE Managed Security Services offers a suite of next-generation security solutions, including Managed EDR, SIEM, DNS Filtering, Email Security, and Vulnerabiity Assessment. Read more about Ace Managed Security Services
Specops Secure Service Desk hels businesses enforce and track user authentication at the service desk to guarantee that information, password resets and other sensitive credentials are not offered to unauthorized users. An additional layer of security with the Secure Service Desk is the ability to verify callers using authentication methods that... Read more about Specops Secure Service Desk
Our enterprise self-service password reset solution allows users to securely reset their Active Directory passwords themselves. The product can be used for the purpose of updating local cached credentials, even when they are off VPN. This can be done by initiating the reset process right from the Windows logon screen on their workstations. With... Read more about Specops uReset
Zyston, a leading cybersecurity provider, offers CyberCast, a software solution which finds critical insights into an organization's threat susceptibility. Read more about CyberCAST
Live Ensure protects users by securing and authenticating their identities through a synthesized multi-factor approach. Users are confident that their credentials are protected whilst on your site. Your users are protected from phishing, pharming or man-in-middle attacks. Read more about LiveEnsure
CloudPassage® Halo® is the world’s leading security and compliance automation platform that provides instant visibility and continuous protection for servers. Read more about CloudPassage Halo
BlueFiles enables users to send encrypted files securely while maintaining full control over recipients, access periods, downloads, and printing Read more about BlueFiles
Cornerstone MFT is a cloud-based solution, which assists enterprises, financial services and healthcare organizations with managing security and file transfers across servers. Key features include process automation, compliance management, collaboration, and data encryption. Read more about Cornerstone MFT Server
Evidian is a cloud-based and on-premise identity and access management suite that helps enterprises across government, telecommunication, healthcare, and various other industries securely manage and authenticate user identities. Read more about Evidian
PerimeterX offers a suite of products, Bot Defender, Code Defender, and Page Defender to protect businesses from online attacks. It uses behavioral fingerprinting, machine learning, and predictive analytics to recognize real users while blocking automated attacks. The suite can protect against web scraping, carding, browser extensions, digital... Read more about PerimeterX
iPrism Web Security is a secure web gateway designed to help businesses detect threats and secure against malware attacks. The platform enables managers to classify URLs, identify botnets, and protect the system from advanced persistent threats (APTs). Read more about iPrism Web Security
EmpowerID is an identity management and cloud security suite of tools designed to help businesses in healthcare, manufacturing, retail, banking, finance, and other industries manage passwords, groups, risks, permissions, roles, and more to access cloud and on-premise applications. Read more about EmpowerID
RedShield is a cybersecurity software designed to help government agencies and businesses across healthcare and finance industries streamline network security and risk assessment operations using artificial intelligence (AI) technology. It enables IT teams to identify and remove vulnerabilities from online applications and APIs, perform penetration... Read more about RedShield
CrowdSec is an open-source and collaborative multiplayer firewall. Analyze behaviors, respond to attacks & share signals across the community. Security should be available to everyone. We make it happen. For free. Read more about Crowdsec
Protect students across Mac, Windows, Chromebook, iOS, Kindle ad Android with dynamic web filtering and intelligent reporting. Read more about Qustodio for Schools
Design & build a robust identification and authentication security innovation for passwordless multi-factor security across systems with our swIDch Auth SDK. Read more about swIDch Auth SDK
Open Source Self-Sovereign Identity (SSI) solutions (B2B/G) for any use case - including authentication, identification, credentialing and digital signatures. Read more about SSI Kit
Verimatrix Code Shield solution injects powerful, automated, and self-defending security directly into your app. It secures the app from being modified and can be easily implemented at any stage of the development process. Read more about Verimatrix Code Shield
DIARIO is capable of scanning documents without them ever leaving the perimeter of the company or user, using an artificial intelligence engine with 100% Telefónica TECH technology. It accepts all types of different documents, from Microsoft Word to Adobe Acrobat and more. Read more about DIARIO
Securden is an endpoint protection software designed to help businesses of all sizes control applications, privileged access, and remote endpoints. Administrators can utilize the password vault to store, manage, and share certificates and secured keys. Read more about Securden
AdsPower is an anti-association independent browser environment provider. The centralized platform is mainly for eCommerce marketers who require untraceable multi-account browser tools to set up, log in, and manage multiple social media profiles or other online accounts without leaving fingerprints. Read more about AdsPower
FortMesa provides cybersecurity programs for organizations without a security professional on staff. It allows users to build their organization's cyber risk management and security operations capability using simple and easy to use team-based workflows. Map to a cyber standard and build controls Read more about FortMesa
Key Manager Plus helps enterprises gain complete visibility and control over their cryptographic environments. It enables IT and PKI admins to perform periodic discovery of SSH keys, SSL/TLS certificates, and PGP keys, build a central inventory, request, acquire, deploy, rotate, renew, and track. Read more about ManageEngine Key Manager Plus
Cybersprint is a security platform that allows companies to visualize their digital footprint and identify online access points to their business systems. The software searches all possible public entrances via the internet: social media, IoT, mobile apps, and the dark web. Read more about Cybersprint
Trend Micro Cloud One is cloud and cybersecurity software that helps businesses manage security policies, detect threats, receive malicious activity alerts, conduct root-cause analysis, and more from within a unified platform. It allows staff members to set up runtime container protection, manage security policies across multi-cloud environments,... Read more about Trend Micro Cloud One
GetSecured is a data protection program designed to help businesses detect vulnerabilities and data breaches. The platform acts as a comprehensive security scanning tool to find breached data, web app/AWS cloud vulnerabilities, exposed servers, and compliance issues. Read more about GetSecured
SpamTitan Plus is an anti-phishing solution, which provides features such as URL inspection, malicious link neutralizing, URL rewriting, and time-of-click analysis. Read more about SpamTitan Plus
A software solution that helps businesses automate data security and compliance through discovery, mapping, labeling, risk mitigation, and protecting data assets. Read more about Polar Security
BroShield is a computer security and parental control software that helps individuals and families block inappropriate sites, schedule screen times, restrict activities, receive suspicious activity alerts, and more from within a unified platform. It allows users to monitor activities in real-time, restrict adult websites, set up web firewalls,... Read more about BroShield
Risk Assistant is a cloud-based cybersecurity solution that helps businesses of all sizes prevent financial losses. It provides effective defensive measures to protect a business by evaluating and tracking risk levels. Read more about Risk Assistant
Holm Security VMP helps customers identify vulnerabilities in their cyber security defenses covering both technical and human assets. Read more about Holm Security VMP
Adaptive SSO Authentication & FIM Solution Hitachi ID's all credential self-service identity authentication management for passwords, security questions, smart cards, tokens, etc. Request a demo. Read more about Hitachi ID Bravura Pass
Prove's Phone-Centric Identity platform helps companies mitigate fraud while accelerating revenue and reducing OPEX across mobile, desktop, tablet, contact center, and in-store channels. Read more about Prove
Protect computers and devices in your IT network from malware by removing administrative privileges and limiting the actions that can be performed by a standard user. Eliminate standing privileges & enforce JIT access. Control application usage and track activities using comprehensive audit trails. Read more about EndPoint Privilege Manager
Secure Remote Worker addresses the challenges faced by BPOs & Contact Centers enabling them to create a secure and compliant remote working environment that allows them to scale faster. Read more about Secure Remote Worker
Blacklock is an award-winning self-service penetration testing platform that enables businesses to perform security testing in a cost-effective, scalable and continuous manner. The platform automates several stages of the traditional penetration testing cycle, introducing an agile penetration testing approach and making security testing accessible... Read more about Blacklock
Teleport lets you manage your infrastructure from your laptop, tablet or phone. It provides secure SSH and SFTP access to any server from your browser or the command line. You can use Teleport to securely manage any server, anywhere in the world. Read more about Teleport
tbIAM is a cloud-based identity access management (IAM) solution that helps businesses in IT, finance, healthcare, retail, HR, manufacturing, and other industries manage security operations using single sign-on (SSO), multi-factor authentication (MFA), and other measures. It lets staff members utilize the self-service portals to manage profiles... Read more about tbIAM
iBoostUp will quickly and easily make your Mac perform better. Whether it’s running a little slow, using too much space, or if you just want to be sure it’s safe from malware and viruses, iBoostUp is the solution for you. Read more about iBoostUp
Security application that helps secure and maintain business IT infrastructure, compliance with regulations such as the PCI-DSS, etc. Built around advanced file integrity monitoring technology, CimTrak helps companies and government agencies worldwide keep their IT infrastructure secure. Read more about CimTrak Integrity Suite
From protecting your critical data to storing sensitive keys, SecureDoc CloudVM offers a secure and flexible key management solution for your virtualized environment. Read more about SecureDoc CloudVM
Aruba SD-WAN is a network management solution designed to help businesses streamline application performance, bandwidth, and SD-WAN orchestration operations. It allows companies to control their network traffic across any type of connection and can be used in conjunction with existing routers. Read more about Aruba SD-WAN
Cerberus is a powerful platform for uncovering and investigating criminal activity on the deep and dark web. Cerberus collates unstructured data from the dark web into meaningful intelligence to help investigators and intelligence officers combat threats safely and easily. Read more about Cerberus

Related categories