Best Other IT Security Software

G2 Crowd Grid® for Other IT Security
Leaders
High Performers
Contenders
Niche
Momentum Leaders
Momentum Score
Market Presence
Satisfaction
Compare Other IT Security Software
    Results: 110

    Filters
    Star Rating

    Other IT Security reviews by real, verified users. Find unbiased ratings on user satisfaction, features, and price based on the most reviews available anywhere.

    The easiest way to make your Internet safer, faster and more reliable.


    Hierarchically manage resources by project, folder, and organization


    360 Total Security offers your PC complete protection from Viruses, Trojans and other emerging threats. Whether you are shopping online, downloading files or chatting with your friends you can be sure that 360 Total Security is there to keep you safe and your computer optimized.


    GlobalProtect delivers the protection of next-generation security platform to the mobile workforce in order to stop targeted cyberattacks, evasive application traffic, phishing, malicious websites, command-and-control traffic, and known and unknown threats.


    Esker on Demand is a cloud-based document process and information exchange service that enables companies to automate the processing and exchange of crucial business documents it include rapid project go live, increased profitability, pay only for what you use, and low risk.


    Apple Support Number offers Apple customer service for MacBook, iPad, iPhone and iTunes.


    FireEye Network Security (NX) solutions protect against known and unknown advanced attacks with the signature-less Multi-Vector Virtual Execution (MVX) engine, conventional intrusion prevention system (IPS) and intelligence-driven detection.


    Prey is a cross-platform anti-theft and management solution for laptops, tablets and phones used to protect over 8 million devices, all around the world. Its solid tracking technology helps people and companies keep track of their assets 24/7, and proves to be crucial in the recovery of stolen devices and in the prevention of data breaches. What can you do with Prey anti-theft: MONITOR EFFICIENTLY Global view with location history to keep an eye on all devices, plus Control Zones to delimit areas on a map, like an office, and receive alerts if any assigned device moves in or out. MITIGATE DATA LOSS Data protection features provide the chance to avoid leaks by wiping custom directories remotely or retrieving files from compromised devices with corporate information. PREVENT THEFT Prey’s Missing Evidence reports will provide location, pictures, nearby Wifi networks and more data crucial when retrieving stolen devices and finding the culprit. MANAGE EFFORTLESSLY Smoothly manage thousands of devices by categorizing them with labels and perform bulk tasks with ease using Mass Actions: Alarm, Lock, Message Alerts, Wipe. INTEGRATE YOUR FLEET Organize devices from all types and operating systems under a single platform. Android, Windows, Linux, Chromebook, iOS, macOS, laptops, tablets, and mobiles, we got it. TRACKING CAPABILITIES ► Control Zones: Mark an area on a map, and get alerts when your mobile devices enter or leave it. ► Missing Device Reports: Receive evidence reports with location, nearby networks, pictures, and everything else you need to locate a device. ► GPS Geolocation: Pin-point accuracy reflected on a map, with gps coordinates on each report. ► Aware Tracking: Select between a smart and automatic periodic location tracking, or the on-demand alternative. ► Security Alarm: It will ring like gangbusters, even if your android phone's sound is silenced. ► Re Lock: Keep curious hands away from your lost mobile device, block it remotely. ► Front and Back Camera: Take silent snaps and discover who is holding your device. ► Security Camouflage: Go silent with the camouflage mode, hide the app on your android phone. ► Security Message Alert: Display a message on the screen to contact the current user. ► Location History: DATA PROTECTION ► Wipe: Boom, gone. Simply select what you want to delete, and safeguard your privacy. ► File Retrieval: That document you worked on for countless nights? We can retrieve it. DEVICE MANAGEMENT: ► Group Labelling: Create custom labels and group devices according to users, status, or area. ► Advanced Search: Filter the devices you are looking for with our advanced search system. ► Custom APK: Deploy and configure Prey with ease using customized installers. ► Mass Actions: All security actions can be deployed in mass to ensure smooth large-scale management.


    Outlook Password Recovery software is a software that can to reset forgotten Outlook PST password, support to recover longer and multilingual password and unlock protected PST file within seconds and get data from protected PST file without any data defeat.


    The majority of attacks and exposure to malicious content occurs during the normal course of web browsing activities, which requires the ability to allow safe, secure web access for all users. URL Filtering with PAN-DB automatically prevents attacks that leverage the web as an attack vector, including phishing links in emails, phishing sites, HTTP-based command and control, malicious sites and pages that carry exploit kits.


    WildFire cloud-based threat analysis service is the industrys most advanced analysis and prevention engine for highly evasive zero-day exploits and malware. The cloud-based service employs a unique multi-technique approach combining dynamic and static analysis, innovative machine learning techniques, and a groundbreaking bare metal analysis environment to detect and prevent even the most evasive threats.


    ClickCease is a clickfraud detection, prevention, and protection service software.


    Panorama network security management provides static rules and dynamic security updates in an ever-changing threat landscape. Reduce administrator workload and improve your overall security posture with a single rule base for firewall, threat prevention, URL filtering, application awareness, iser identification, file blocking, and data filtering.


    The VM-Series is a virtualized form factor of our next-generation firewall that can be deployed in a range of private and public cloud computing environments based on technologies from VMware, Amazon Web Services, Microsoft, Citrix, and KVM. The VM-Series natively analyzes all traffic in a single pass to determine the application identity, the content within, and the user identity. These core elements of your business can then be used as integral components of your security policy, enabling you to improve your security efficacy through a positive control model and reduce your incident repsonse time through complete visibility into applications across all ports.


    Rocket Servergraph reduces the cost and complexity of monitoring/reporting of backup environment across heterogeneous platforms and applications.


    Swift PC Optimizer helps to identify and clean most common problems on Windows based computer. It automatically detects internet junk files, registry errors, cookies and other files that need to be deleted from user’s computer to enhance overall performance of computer. It removes unnecessary items and maintains health of Windows System. It keeps your PC clean, stable and running like new. It will also help you to identify and remove unwanted startup item so that your PC boots up faster then before. Very easy to use, audio notification,


    Ready-to-deploy change auditing & reporting solution for MS Exchange environment


    Voimakas Outlook PST Recovery is a software that recover emails from corrupted PST file save them into new PST files or existing PST file with whole emails items and attachments and also recovers deleted Outlook emails items without any data defeat.


    Threats do not discriminate between application delivery vectors, requiring an approach that has full visibility into all application traffic, including SSL encrypted content, with full user context. Threat Prevention leverages the visibility of our next-generation firewall to inspect all traffic, automatically preventing known threats, regardless of port, protocol or SSL encryption.


    Suhosin is an advanced protection system for PHP 5 installations. It is designed to protect servers and users from known and unknown flaws in PHP applications and the PHP core.


    Symantec CloudSOC CASB Gateway is a software that provide a solution for website security from Extended Validation (EV) SSL/TLS Certificates and malware scanning, to DDoS mitigation and performance optimization.



    Belkasoft Evidence Center makes it easy for an investigator to acquire, search, analyze, store and share digital evidence found inside computer and mobile devices.


    The Predictive Abuse-Prevention Solution for Email Service Providers BlackBox is the world's most comprehensive resource for finding potentially problematic email addresses, allowing ESPs to preemptively score the quality of their senders' lists and manage senders more effectively.


    FireEye Helix is a intelligence-led platform designed to simplify, integrate and automate security operations.


    FlowTraq is a security visibility tool that enables (network) security operators to hunt for threats, discover data leaks, spot hacker-controlled systems, and investigate security breaches.


    Your business can’t afford downtime, which can result in revenue loss, damaged reputation and regulatory penalties. IBM Cloud Resiliency Orchestration can help transform your disaster recovery (DR) to simplify management and reduce risk, cost and DR testing time. Now you can combine the disaster recovery monitoring, reporting, testing and workflow automation capabilities of your on-premise, public cloud, and private cloud workloads in a scalable, easier-to-use solution built on industry standards. Built-in analytics help keep daily business operations running smoothly and proactively avoid disruptions.


    HPE ArcSight Logger delivers a cost-effective universal log management solution designed to unify searching, reporting, alerting, and analysis across any type of enterprise machine data.


    Notes Storage Format (NSF) file is an IBM Lotus Notes database file. The NSF files stores users emails, notes, contacts, calendars, etc.


    mSpy is a computer security for parental control. Helps parents to give attention to their children online activities. It checks WhatsApp, Facebook, massage and snapchat messages.


    What Does NoMoreCaptchas Do? NoMoreCaptchas stops bots that try to register and log in to websites, leave spam comments on blogs and social sites and send spam message emails through contact forms. Use it wherever you would use a CAPTCHA code. Bots are detected by their behavior, which is detected during page load. Even the most advanced bots can’t successfully fake being human, so we detect their behavior with our cloud-based algorithms and block them from your site. NoMoreCaptchas is a great plugin for eliminating bots at the user login or contact form. The plugin comes in 7 flavors from WordPress, Drupal, Joomla, .Net, ASP, PHP, and JSP.


    One Identity offers identity and access management solutions.


    Internal integrity checks ensure event data is read-only and any tampering can be detected for your compliance and security needs


    SysInfoTools Outlook Duplicates Removal Software is a software that remove duplicates email and content and help to minimize PST file size spport MS Outlook version.


    Only with Quest InTrust, you can monitor all user workstation and administrator activity from logons to logoffs and everything in between.


    Reduce uncertainty by identifying attackers in your network before they make their next move. Boost confidence in your network visibility with timely, accurate and actionable intelligence.


    Snyk is a security solution designed to find and fix vulnerabilities in Node.js and Ruby apps.


    This is a rescue application which retrieves deleted data from a Mac hard drive. A number of storage devices it can support ranges from SSDs, USB, external hard drives, Time Machine and password protected media. Compatible with macOS Sierra 10.12.


    SureLock offers a quick and easy way to lockdown off-the-shelf mobile devices. Tablets, Smartphones, Smartwatches or even desktop computers can be used as dedicated purpose devices.


    System Frontier is like a proxy server for admin rights. It enables organizations to empower IT support staff with delegated, fine-grained permissions to manage systems and execute automation tasks. Using a real-time web console, help desk staff, developers, vendors or any other support personnel can safely manage Windows servers and workstations without agents or complicated user interfaces.


    TEMASOFT Ranstop is an effective anti-ransomware tool for companies. Based on behavior analysis, Ranstop protects computers and networks against present and future ransomware of any type.


    Wind River is a Internet of Things (IoT) software company.


    Vyapin Active Directory Change Tracker performs a complete change audit of your Active Directory - tracks, analyzes and reports all changes made to your Active Directory configuration.



    Alyne is a SaaS software that enable organisations of all industries and sizes mature their cyber security, risk management and compliance capabilities and cost effectively measure maturity in extended enterprise.


    Aotol Page Monitor is a website monitoring software that detects page changes, highlighting new content and alerting.


    Generating complex Active Directory Reports just got easier for your Active Directory Auditing and Reporting needs. All you need is Vyapin's Active Directory reporting solution ARK for Active Directory (ARKAD) for the Microsoft Active Directory Enterprise.


    Vyapin Exchange Server Reporting and Analytics software is a must-have tool for administrators to audit and report on Exchange Server’s Mailboxes, Public Folders, Usage, Security and Server configuration.


    Astra is website security suite that protects websites from hackers, bots & 80+ internet threats.


    The BitSight Security Ratings Platform gathers terabytes of data on security outcomes from sensors deployed across the globe. From our data, we see indicators of compromise, infected machines, improper configuration, poor security hygiene and potentially harmful user behaviors. BitSight’s sophisticated algorithms analyze the data for severity, frequency, duration, and confidence and then map it to a company's known networks, creating an overall rating of that organization’s security performance. These objective ratings, based on externally accessible data, give visibility into a company's security posture over time.