Best Computer Security Software for Government

Find and compare the best Computer Security software for Government in 2026

Use the comparison tool below to compare the top Computer Security software for Government on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    HERE Enterprise Browser Reviews
    See Software
    Learn More
    At the heart of HERE Enterprise Browser lies robust computer security, offering comprehensive cybersecurity solutions for enterprises through sophisticated endpoint protection, application isolation, and a Zero Trust model. Tailored specifically for corporate networks, it effectively prevents phishing attacks, malware threats, and data breaches, all while facilitating safe browsing for critical systems. HERE integrates secure access to both legacy and cloud applications with strict enforcement of enterprise policies, positioning itself as the premier security solution for industries with strict regulatory requirements and high-risk settings.
  • 2
    StrongDM Reviews

    StrongDM

    StrongDM

    $70/user/month
    100 Ratings
    See Software
    Learn More
    Access and access management today have become more complex and frustrating. strongDM redesigns access around the people who need it, making it incredibly simple and usable while ensuring total security and compliance. We call it People-First Access. End users enjoy fast, intuitive, and auditable access to the resources they need. Administrators gain precise controls, eliminating unauthorized and excessive access permissions. IT, Security, DevOps, and Compliance teams can easily answer who did what, where, and when with comprehensive audit logs. It seamlessly and securely integrates with every environment and protocol your team needs, with responsive 24/7 support.
  • 3
    Keeper Security Reviews
    Top Pick

    Keeper Security

    Keeper Security

    $2.00 per user, per month
    1,755 Ratings
    See Software
    Learn More
    Password security is the foundation of cybersecurity. Keeper's powerful password security platform will protect your business from cyberthreats and data breaches related to passwords. Research shows that 81% of data breaches can be attributed to weak passwords. Password security platforms are an affordable and easy way for companies to address the root cause of most data breaches. Your business can significantly reduce the risk of data breaches by implementing Keeper. Keeper creates strong passwords for all websites and apps, then secures them on all devices. Each employee receives a private vault to store and manage their passwords, credentials and files, as well as private client data. Employees will save time and frustration by not having to remember, reset, reuse, or remember passwords. Industry compliance is achieved through strict and customizable role-based access controls. This includes 2FA, usage auditing, and event reporting.
  • 4
    Avast Business Hub Reviews
    Top Pick
    The Business Hub is an integrated platform for complete security – delivered entirely through the cloud. The Business Hub encompasses every essential layer of security needed to defend a business from cyberthreats – covering users and devices anywhere, anytime. Formerly known as CloudCare, the Business Hub is an easy-to-use cloud security platform with a refreshing new UI.
  • 5
    Invicti Reviews
    Invicti (formerly Netsparker) dramatically reduces your risk of being attacked. Automated application security testing that scales like none other. Your team's security problems grow faster than your staff. Security testing automation should be integrated into every step in your SDLC. Automate security tasks to save your team hundreds of hours every month. Identify the critical vulnerabilities and then assign them to remediation. Whether you are running an AppSec, DevOps or DevSecOps program, help security and development teams to get ahead of their workloads. It's difficult to prove that you are doing everything possible to reduce your company's risk without full visibility into your apps, vulnerabilities and remediation efforts. You can find all web assets, even those that have been forgotten or stolen. Our unique dynamic + interactive (DAST+ IAST) scanning method allows you to scan the corners of your apps in a way that other tools cannot.
  • 6
    USB-LOCK-RP Reviews

    USB-LOCK-RP

    Advanced Systems International

    $20 per client/one-time
    1 Rating
    USB Control & Lockdown Software to Block USB devices Access and Lock USB Ports within Windows Systems. Centralized USB Device Management, Monitoring, and Whitelisting to Protect Computers within a Network. Endpoint Security Management's USB Device Control program is an important component of Endpoint Security Management. It focuses on protecting computer systems and data assets against threats from unauthorized USB device use. To protect networks that store sensitive information or control machinery, it is necessary to control USB device access to endpoints. Latest version v12.968 (released: September 26, 2021 - Centralized USB Device Management - Secures Computers in Groups or Specific Computers. - Whitelists specific devices by Hardware ID and blocks the rest -Automatically apply Group 1 protection settings to unassigned clients. NEW! -Automatic Authorizations Mode, Whitelist USB devices across the network automatically. NEW -Receives alerts & logs USB device connections in the network. -Exports Status and Alerts Reports to csv format (Comma-separated value) - Presents Full Screen Locking on Blocking Devices (includes company logo). - Monitors and Encrypts File Transfers From Endpoints to USB.
  • 7
    Acunetix Reviews
    As the top choice for automated web application security testing, Acunetix by Invicti stands out as the preferred security solution among Fortune 500 firms. DevSecOps teams can efficiently navigate through complexities to identify hidden risks and address serious vulnerabilities, allowing for comprehensive detection and reporting on various security flaws. Featuring a state-of-the-art crawler that adeptly handles HTML5, JavaScript, and single-page applications, Acunetix facilitates the thorough examination of intricate, authenticated applications, providing a clearer understanding of an organization's risk profile. Its status as a leader in the field is well-deserved, as the technology behind Acunetix is the only one available that can autonomously identify out-of-band vulnerabilities, thus ensuring complete management, prioritization, and oversight of vulnerability threats based on their severity. Additionally, Acunetix is offered in both online and on-premise versions, seamlessly integrating with popular issue trackers and web application firewalls, which allows DevSecOps teams to maintain momentum while developing cutting-edge applications. This unique combination of features not only enhances security but also streamlines the workflow for teams dedicated to keeping their applications secure.
  • 8
    Skybox Security Reviews
    Skybox's risk-based vulnerability management approach starts with new vulnerability data from your entire network, including physical IT, multicloud and operational technology (OT). Skybox assesses vulnerabilities without the need to scan. Skybox uses a variety of sources including asset and patch management systems as well as network devices. Skybox also collects, centralizes and merges data from multiple scanners to provide you with the most accurate vulnerability assessments. - Centralize and improve vulnerability management processes, from discovery to prioritization to remediation - Harness power vulnerability and asset data, network topology, and security controls - Use network simulation and attack simulation to identify exposed vulnerabilities - Augment vulnerability data by incorporating intelligence on the current threat environment - Learn your best remedy option, including patching and IPS signatures, as well as network-based changes
  • 9
    LogPoint Reviews
    LogPoint provides a simple and quick security analytics implementation. It also offers a user-friendly interface which can be integrated with any IT infrastructure. LogPoint's modern SIEM and UEBA offers advanced analytics and ML driven automation capabilities that enable customers to secure build-, manage and transform their businesses. This allows for lower costs to deploy a SIEM solution either on-premise or in the cloud. The solution can be integrated with all devices on your network to provide a comprehensive and correlated overview over events in your IT infrastructure. LogPoint's Modern SIEM software translates all data into a common language that allows you to compare events across different systems. A common language makes it easy to search, analyze, and report on data.
  • 10
    CWIS Antivirus Scanner Reviews
    We offer complete protection for your website with our continuous security monitoring available around the clock. In the event of a hacker assault or virus infiltration, our team will promptly clean and restore your site. Our dedicated situation room monitors your website 24 hours a day, every day of the year. Should an attack happen, our software engineers will receive immediate alerts, allowing them to safeguard, clean, and repair your website as quickly as possible. We guarantee that your website will be cleaned and restored within 12 hours. You will also receive email reports and alerts to keep you informed. Our technical support is available 24/7 to assist you whenever needed. With CWIS Premium, you can expect top-notch protection at an affordable price, along with tailored recommendations to enhance your security measures further. Additionally, our proactive approach ensures that you remain one step ahead of potential threats.
  • 11
    EventSentry Reviews

    EventSentry

    NETIKUS.NET ltd

    $85.00/one-time
    Hybrid SIEM solutions combine real-time log monitoring with comprehensive system and network monitoring to provide users with a complete view of their servers, endpoints, and networks. The security event log normalization and correlation engine with descriptive emails alerts provides additional context. It presents cryptic Windows security incidents in easy-to-understand reports that provide insight beyond what is available as raw events. EventSentry's NetFlow component visualizes network traffic and can detect malicious activity. It also provides insight into bandwidth usage. EventSentry's ADMonitor component makes it easy to keep track of Active Directory changes. It records all changes to Group Policy objects and provides a complete user inventory that can be used to identify old accounts. There are many integrations and multi-tenancy options.
  • 12
    FileAudit Reviews

    FileAudit

    IS Decisions

    $826 one-time payment
    Actively monitor, audit, report, notify, and react to all interactions with files and folders on Windows Servers and within cloud environments. Keep a close watch, in real time, on access to sensitive documents located on both Windows Servers and cloud storage. With robust filtering options, you can swiftly obtain the information you require, while tracking the IP address and machine name allows for precise identification of access instances. Configure email notifications and automated responses for various access events, such as denied access, file deletions, or activities linked to specific users, machines, or IP addresses, as well as large-scale actions like copying, deleting, or moving multiple files. Maintain a searchable, secure, and always-accessible audit trail for thorough reviews. Assess the access patterns and usage of files stored both on-premises and in the cloud to gain valuable insights. Additionally, set up centralized reporting schedules based on various criteria to streamline your oversight process. This comprehensive approach not only enhances security but also ensures compliance with organizational policies.
  • 13
    VaultCore Reviews

    VaultCore

    Fornetix

    $1,118 per year
    VaultCore™ is a next-generation, highly scalable enterprise key management solution from Fornetix®. It integrates seamlessly with existing platforms, automates policy, and empowers administrators with a centralized, organized control that can be easily applied across all environments. Request a demo to experience VaultCore's products: - Quick, seamless integration with existing technology - Separation Of Duties (a best practice). - Powerful automation allows for centralized control of policy - Increased security of data in motion, at rest, and in use - Significant reduction in the costs associated with data breaches -- lost businesses, recovery time, reputational damage - Simplified compliance, regulatory enforcement - Scalable to more than 100 million keys (more that enough to meet any industry or government's requirements) - Reporting capabilities to meet compliance requirements - Ease in Use
  • 14
    Barracuda Web Security Gateway Reviews
    The Barracuda Web Security Gateway enables organizations to take advantage of online applications and tools while safeguarding against threats such as web-based malware and viruses, productivity loss, and bandwidth misuse. This all-encompassing web security and management solution integrates industry-leading spyware, malware, and virus protection with an advanced policy and reporting framework. Its sophisticated features help organizations address evolving needs such as regulating social media usage, filtering remote connections, and gaining insights into SSL-encrypted traffic. Additionally, it offers unlimited remote user licenses to implement content and access policies for mobile devices operating outside the corporate environment. The Barracuda Web Security Gateway can also be deployed as a virtual appliance, providing flexibility in security infrastructure. For those seeking hosted web security options, Barracuda Content Shield is available, ensuring comprehensive protection across various platforms.
  • 15
    BeyondTrust Password Safe Reviews
    Identify, oversee, audit, and track privileged accounts across various types. Conduct scanning to recognize and categorize all assets and applications with the automatic onboarding of privileged accounts. Safeguard, manage, and rotate privileged account passwords to remove embedded credentials while ensuring strong password practices. Record and supervise all activities and sessions related to privileged credentials to maintain compliance and enable forensic investigation. Leverage Password Safe for precise and automated password management, privilege approval controls, and comprehensive session oversight, which includes real-time monitoring and all necessary audit trail information to satisfy compliance standards. Additionally, it ensures the automatic discovery and onboarding of accounts, reinforcing the management and rotation of privileged passwords to eradicate embedded credentials found in scripts and code. This holistic approach guarantees robust security measures and compliance in handling privileged accounts.
  • 16
    Internet Lock Reviews

    Internet Lock

    TopLang Software

    $29.95/one-time/user
    Internet Lock serves as a robust solution for managing access and securing passwords for your internet connections and applications. This software empowers you to have complete oversight over the internet activities and programs on your computer. With Internet Lock, you can impose restrictions or set password protections on internet usage, establish schedules for internet access, safeguard specific internet applications linked to particular IP addresses or domains, and limit users to only the predetermined websites while blocking access to any undesired ones. Additionally, Internet Lock is effective in preventing unauthorized internet connections and program usage, as any application that is restricted by the software will not be able to connect to the internet. It also provides an added layer of security by requiring users to enter a correct password to access these protected applications for internet connectivity. When a user attempts to connect to the internet through a password-protected program, Internet Lock promptly displays a password entry window, and if the user fails to enter the correct password, the connection will be denied. This ensures that sensitive content and unauthorized access are kept at bay, promoting a safer browsing environment.
  • 17
    Trust Lockdown Reviews

    Trust Lockdown

    White Cloud Security

    By prioritizing your trusted applications and managing what runs on your endpoints, we automatically block all unfamiliar threats. This proactive stance means that unknown dangers like newly emerging ransomware, sophisticated attacks, and zero-day vulnerabilities are intercepted promptly by Trust Lockdown. Break free from the exhausting ‘Break-Fix’ cycle that consumes both your time and resources. Additionally, this solution removes the necessity for daily app patching, allowing you to schedule updates regularly rather than reactively, ultimately restoring your productivity and financial efficiency. Our robust protection continues to operate even when your device is offline! Regardless of whether you opt for our cloud service or an appliance-based option, our endpoint protection ensures consistent safeguarding while disconnected from the network, a crucial benefit in the modern landscape of mobile devices and remote work. Embrace a more efficient approach to endpoint security that allows you to focus on your core tasks without constant interruptions.
  • 18
    TF2000 Reviews

    TF2000

    ComputerProx

    $79 one-time payment
    The ComputerProx TF2000 is a device that automates the locking process of your computer when you step away, enhancing security effortlessly. Utilizing ultrasound technology, it senses your presence and locks the system automatically when you are out of range, eliminating the need for any manual keystrokes. This means no more frustrating timeout settings that can mistakenly activate while you are still nearby. The device is designed to accurately detect when you are present, ensuring that it won’t inadvertently lock the computer at inappropriate times. Connecting via the USB port, the TF2000 is recognized by the system as a keyboard, allowing it to send commands as keystrokes without the need for additional drivers. Users can easily customize the individual keystrokes and timing using the provided configuration tool. Moreover, in addition to the 'walk-away' feature, the TF2000 also incorporates a 'walk-to' sequence, which triggers specific keystrokes when you approach the computer. For instance, when nearing the PC running Windows XP, the TF2000 automatically sends the CTRL-ALT-DEL combination, preparing the system for user authentication seamlessly. This advanced functionality not only streamlines your workflow but also enhances the overall security of your computer.
  • 19
    NetLib Encryptionizer Reviews
    Transparent Data Encryption for all Editions (Express to Enterprise) of SQL Server. No programming required. Developer friendly: can be easily bundled with SQL Server-based applications. An economical alternative to upgrading from SQL Server Enterprise. Assists in compliance with various regulations. Protects intellectual property and data.
  • 20
    MemberProtect Reviews
    MemberProtect is tailored for professional developers to seamlessly incorporate into secure digital platforms such as ACH, Online Banking, and wire transfer systems. It stands as the most reliable framework for user authentication, data encryption, and user management within the banking and credit union sectors today. Utilizing a roles and privileges model, it accommodates millions of users and organizations while offering highly detailed application security. Its robust encryption capabilities secure databases down to the column level and extend to encrypting email communications and flat files stored across your network. Additionally, it maintains comprehensive logging, capturing even unsuccessful data access attempts, which aids in safeguarding member information against hackers and unauthorized personnel, effectively surpassing the protective measures of firewalls, SSL, and operating systems. By utilizing MemberProtect, developers can establish secure connections with third-party APIs, ensuring extensive compatibility with any web-based system, including integration with LDAP services. This comprehensive approach not only enhances security but also empowers organizations to maintain trust and compliance in a rapidly evolving digital landscape.
  • 21
    CimTrak Integrity Suite Reviews
    Protecting your organization from both internal and external risks is essential for adhering to compliance requirements and regulations. With CimTrak’s robust change management, auditing, and reporting features, both private and public entities can successfully meet or even surpass stringent compliance obligations. Whether dealing with PCI, SOX, HIPAA, CIS, NIST, and a host of others, CimTrak ensures comprehensive coverage. Its File and System Integrity monitoring is designed to safeguard vital files from alterations that may be either malicious or unintentional, thus preserving your IT infrastructure's integrity, protecting sensitive data, and ensuring compliance with regulations like PCI. In the ever-evolving landscape of IT, changes are unavoidable. CimTrak provides an all-in-one, user-friendly, and cost-efficient solution for integrity monitoring, proactive incident management, change control, and auditing, making it an indispensable tool for modern enterprises. By streamlining these processes, it empowers organizations to focus more on their core operations while maintaining compliance and security.
  • 22
    NerveCenter Reviews
    Power outages from primary utility sources do happen, frequently due to inadequate infrastructure or adverse weather conditions. As networks become increasingly expansive, intricate, and essential, dependable backup power from uninterruptible power supply (UPS) systems is vital for maintaining continuous network operations. Moreover, it's important to note that UPS batteries can start losing their capacity within just three years. Although manufacturers may promote their batteries with a projected lifespan of ten years, various external elements can lead to a decline in performance and a reduction in overall battery longevity. Factors such as internal cell resistance, often influenced by temperature, play a crucial role in assessing battery health by pinpointing low-capacity cells. Additionally, monitoring inter-cell resistance ensures the integrity of the conduction path between cells, which helps prevent issues like hot spots, fires, and sudden system shutdowns through effective temperature management. By maintaining a well-monitored UPS battery system, not only can the lifespan of the batteries be extended, but the energy needed for charging can also be reduced, resulting in less preventive maintenance. Ultimately, enhancing monitoring practices can significantly improve system uptime and mitigate the risks associated with UPS failures, capacity limitations, and depleted battery power, ensuring a more resilient network environment.
  • 23
    iLock Security Services Reviews
    Oversees users, groups, and roles while handling authentication, delegation, authorization, and auditing processes. Implements role-based access control along with entitlements and rules based on time restrictions. Administers access control policies for resources related to Web, Java, and CORBA® environments. Additionally, it manages access control policies for detailed application data and features. Centralized management is complemented by versatile deployment choices. The system includes features tailored to assist in compliance with privacy laws. It also allows for integration with current security frameworks, establishing a basis for orb2 for Java Security Services, thereby enhancing overall security management capabilities.
  • 24
    OpaqueVEIL Reviews
    The core of TecSec’s Constructive Key Management® (CKM®) system has undergone a rebranding! In a rapidly evolving market that is increasingly aware of security solutions, standards, and products, TecSec has decided to rename its foundational technology to prevent any potential confusion between the CKM standard and CKM® the product. The CKM® Runtime Environment (RTE) is now officially recognized as OpaqueVEIL®, which serves as the foundation for the VEIL® suite of products. Similar to its predecessor, the VEIL® suite utilizes patented and standards-compliant cryptographic key management technology, ensuring robust information security and access control through advanced cryptography. OpaqueVEIL®, which is integral to all CKM Enabled® products, consists of a set of software components necessary for implementing CKM technology effectively. By obscuring the intricate details of cryptography and key management, OpaqueVEIL® enables users to achieve straightforward and programmer-friendly results, thereby enhancing usability in security applications. This change aims to clarify the distinction between the product and the standard, reinforcing TecSec’s commitment to innovation and clarity in the ever-competitive security landscape.
  • 25
    XyLoc Security Server Reviews
    The XyLoc® Security Server (XSS) serves as a centralized software platform equipped with a web-based interface, designed to manage and oversee XyLoc users and their secured workstations across an entire organization. This system empowers IT administrators to effortlessly deploy and manage XyLoc across various network segments and user categories, while also facilitating comprehensive reporting and compliance checks. It streamlines the tasks of administration, reporting, and overall management of XyLoc user settings, and it keeps track of all login activities, secure walk-aways, and return actions such as walk-up recognition. Additionally, XSS integrates flawlessly with XyLoc Single Sign-On, delivering complete management and reporting of SSO activities. The platform ensures prompt, secure access to resources in a shared computing environment, such as those utilizing “Kiosk Accounts.” Furthermore, it provides compliance documentation, including HIPAA requirements, through encrypted audit logs that track user activity. The system is designed to scale efficiently, accommodating tens of thousands of users, and it supports Active Directory® (AD) with a Schema Extension, as well as environments powered by SQL Server®. With its robust capabilities, XSS enhances both security and productivity within enterprise settings.
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB