Best Cybersecurity Software for Google

Find and compare the best Cybersecurity software for Google in 2024

Use the comparison tool below to compare the top Cybersecurity software for Google on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Psono Reviews

    Psono

    esaqa GmbH

    Free
    92 Ratings
    See Software
    Learn More
    Psono, a self-hosted and open-source password manager, prioritizes keeping your data secure. It encrypts and stores your credentials in a manner accessible only to you, while also offering encrypted access-sharing with your team. Boasting a range of features, Psono facilitates easier data management and password accessibility than ever before. Its multi-level encryption begins with client-side encryption, ensuring genuine end-to-end encryption for password sharing, and is further bolstered by SSL and storage encryption. The complete code is subject to transparent public audit possibilities, underscoring that true security stems from precise encryption rather than the obfuscation of security weaknesses. Opting for a self-hosted credential manager like Psono allows you enhanced access control and eliminates dependency on public services for data storage, asserting itself as one of the most secure password managers that genuinely prioritizes client online safety on user-hosted servers.
  • 2
    Criminal IP Reviews

    Criminal IP

    AI SPERA

    $65/month
    1 Rating
    See Software
    Learn More
    Criminal IP is a cyber threat intelligence search engine that detects vulnerabilities in personal and corporate cyber assets in real time and allows users to take preemptive actions. Coming from the idea that individuals and businesses would be able to boost their cyber security by obtaining information about accessing IP addresses in advance, Criminal IP's extensive data of over 4.2 billion IP addresses and counting to provide threat-relevant information about malicious IP addresses, malicious links, phishing websites, certificates, industrial control systems, IoTs, servers, CCTVs, etc. Using Criminal IP’s four key features (Asset Search, Domain Search, Exploit Search, and Image Search), you can search for IP risk scores and vulnerabilities related to searched IP addresses and domains, vulnerabilities for each service, and assets that are open to cyber attacks in image forms, in respective order.
  • 3
    Quantum Armor Reviews

    Quantum Armor

    Silent Breach

    From $49/asset/month
    1 Rating
    Your attack surface is the sum total of all attack vectors that can be used against your perimeter defenses. It is simply the amount of information that you are exposing the outside world. The attack surface is the most important thing hackers will need to exploit to break into your network. When attacking targets, professional hackers usually follow the cyber kill chains. Typically, the first step in this process is to survey the target's attack surfaces. This is called advanced reconnaissance. By reducing the attack surface, you can reduce the risk and prevent attacks from ever happening. The cyber kill chain is a method for categorizing and tracking all stages of a cyberattack, from early reconnaissance to the exfiltration data.
  • 4
    CyCognito Reviews

    CyCognito

    CyCognito

    $11/asset/month
    Using nation-state-grade technology, uncover all security holes in your organization. CyCognito's Global Bot Network uses an attacker-like reconnaissance technique to scan, discover, and fingerprint billions digital assets around the globe. No configuration or input required. Discover the unknown. The Discovery Engine uses graph data modelling to map your entire attack surface. The Discovery Engine gives you a clear view on every asset an attacker could reach, their relationship to your business, and what they are. The CyCognito risk-detection algorithms allow the attack simulator to identify risks per asset and find potential attack vectors. It does not affect business operations and doesn't require configuration or whitelisting. CyCognito scores each threat based on its attractiveness to attackers, and the impact on the business. This dramatically reduces the number of attack vectors organizations may be exposed to to just a few.
  • 5
    Astrix Security Reviews
    Astrix helps you connect your core systems securely to third-party cloud service providers by extending threat prevention and access management to API keys, OAuth Tokens, service accounts and more. Our agentless solution is easy to deploy and allows you to identify and remediate app-toapp connections that could expose you to supply-chain attacks, data breaches and compliance violations. Get a consolidated overview of all connections to your critical systems, including internal and external apps as well as access keys, secret workflows, and secrets. Discover unnecessary, untrusted, and overprivileged connections. Receive an alert when a suspicious app is detected.
  • 6
    ijura Reviews
    Ijura Enterprise, a cloud-deployed next generation mobile threat defense solution, protects end-user devices as well as IoT in the network. Our cloud-based solution protects smartphones and tablets (with SIM), tablets and IoT devices against malicious content and cybercriminal attacks. Our innovation in mobile security is covered by three patents. This allows us to solve security vulnerabilities that sophisticated attackers can bypass while providing an end-user with seamless access to their personal data and corporate apps. Our zero-trust policy ensures that personal data protection is not compromised while protecting the enterprise. Ijura Enterprise holds three patents that pertain to the security of any connected device via the telecom operator's terminals. This is done by directly integrating with the operator through its data servers. Ijura Enterprise inspects each data packet for vulnerabilities such as malware, phishing, and botnets.
  • 7
    Threater Reviews
    Threater Enforce deploys data in real-time and enforces it at scale across your entire network, blocking all known bad actors from entering your network. You can block all known bad actors in your network at scale by attribution of threat sources to every connection. Your team will also have powerful insights into what is happening on your network in real-time. Threater is an all-in-one solution that manages and understands threats, and blocks both inbound as well as outbound threats. This service integrates with your existing security stack, blocking threat actors from accessing your network. Threater supports most popular apps, and has common connectors built-in. This allows you to maximize your value and share data between all of your tools.
  • Previous
  • You're on page 1
  • Next