Best IT Security Software for BackBox

Find and compare the best IT Security software for BackBox in 2024

Use the comparison tool below to compare the top IT Security software for BackBox on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Paessler PRTG Reviews
    Top Pick

    Paessler PRTG

    Paessler GmbH

    $2149 for PRTG 500
    681 Ratings
    See Software
    Learn More
    Paessler PRTG is an all-inclusive monitoring solution with an intuitive, user-friendly interface powered by a cutting-edge monitoring engine. It optimizes connections and workloads, reduces operational costs, and prevents outages. It also saves time and controls service level agreements (SLAs). This solution includes specialized monitoring features such as flexible alerting, cluster failover, distributed monitoring, maps, dashboards, and in-depth reporting.
  • 2
    IBM QRadar SIEM Reviews
    The market-leading SIEM is built to outpace your adversary in terms of speed, scale, and accuracy SOC analysts' roles are more important than ever as digital threats grow and cyber adversaries become more sophisticated. QRadar SIEM goes beyond threat detection and reaction to help security teams face today’s threats proactively. It does this with advanced AI, powerful intelligence and access to cutting edge content. IBM has a SIEM that will meet your needs, whether you are looking for a cloud-native solution with hybrid scale and speed, or a solution that complements your on-premises architecture. IBM's enterprise-grade AI is designed to increase the efficiency and expertise for every security team. With QRadar SIEM analysts can reduce repetitive tasks such as case creation and risk priority to focus on critical investigations and remediation efforts.
  • 3
    FortiSIEM Reviews
    Powerful Security Information and Event Management (SIEM) Cyberattacks are a 24/7 fact. The attack surface is growing exponentially due to the complexity and growth in the enterprise estate - Infrastructure and Applications, VMs, Cloud, Endpoints, and IoT. Security becomes everyone's problem when there is a shortage of skills and limited resources. However, visibility, event correlation, and remediation are all the responsibility of others. Security management requires visibility. This includes all devices and infrastructure in real-time. But also context. What devices are a threat? What is their capability to manage the threat that your business faces. Not the noise multiple security tools make. Security management gets more complicated. Endpoints, IoT and Infrastructure, Security Tools, Applications and VM's, Cloud - there are so many things to protect and monitor that it is becoming increasingly difficult.
  • 4
    pfSense Reviews
    The pfSense project provides a free network firewall distribution. It is based on FreeBSD's operating system with a custom kernel. Third-party free software packages are also included. The package system allows pfSense software to offer the same functionality as or more common commercial firewalls without any artificial limitations. It has replaced every major commercial firewall in many installations around the globe, including Check Point and Cisco PIX, Cisco ASA and Juniper.
  • 5
    F5 BIG-IP Reviews
    App-centric technology requires advanced technology. Apps are your business. BIG-IP application services offer the performance, availability, and security that you need to meet your business needs. Big-IP application delivery controllers will keep your apps running. BIG-IP Local Traffic Manager and BIG-IP DNS manage your application traffic and protect your infrastructure. No matter if your applications are in a private or public data center, you'll have built-in security and traffic management. BIG-IP Traffic Management, BIG IP Policy Enforcement Manager (PEM), BIG-IP Carrier Grade NAT (CGNAT), and BIG IP Diameter Traffic Management (PEM) manage your network resources to ensure that your applications perform at carrier-grade levels. They can also help you optimize your network and monetize it, improving your bottom line.
  • 6
    Riverbed SteelHead Reviews
    SteelHead is the industry’s best optimization solution for accelerated delivery across any application over the Hybrid WLAN. SteelHead WAN optimization gives you better visibility into network and application performance, and the end user experience. IT can see the entire network, application, and end user performance metrics to provide deep visibility so that problems can be identified and fixed before they impact users. You can also benefit from the application-aware approach and the most comprehensive set of network services. Path selection is based on business-driven policies with local enforcement. This will allow you to have significantly improved control and enable business agility.
  • 7
    Forescout Reviews

    Forescout

    Forescout Technologies

    1 Rating
    It all seemed to happen in a matter of hours. Your organization became an Enterprise of Things (EoT). PCs, mobile devices and cloud workloads. Agentless IoT devices and OT devices. Device diversity is good for security, but it comes at the expense of security. Your users can connect from anywhere in the world. The truth is that every thing that touches your enterprise exposes it to risk. It is essential to see it and protect it. Forescout is a great place to start. We are the only company that actively defends Enterprise of Things at Scale.
  • 8
    CyberArk Privileged Access Manager Reviews
    Protect your business from malicious use of privileged credentials and accounts - this is a common route to stealing valuable assets. CyberArk's PAM as a Service solution uses the most advanced automation technologies to protect your company as it grows. Attackers are always looking for ways in. To minimize risk, manage privileged access. Protect credential exposure and prevent critical assets from falling into the wrong hand. Maintain compliance with key events recorded and tamper-resistant auditors. Privileged Access Manager integrates easily with a variety of platforms, applications, and automation tools.
  • 9
    Proofpoint Email Protection Reviews
    Proofpoint Email protection solutions, whether deployed as a cloud-based service or on-premises, protect against malware and threats without malware, such as impostor emails or business email compromises (BEC). Granular email filters control spam, bulk graymail and other unwanted emails. Continuity capabilities ensure that email communications continue even if your email server fails. Proofpoint Email Protection, the industry's leading email gateway, can be deployed on premises or as a cloud-based service. It detects both known and unknown threats, which others may miss. Email Protection, powered by NexusAI's advanced machine learning technology and powered by NexusAI, accurately classifies different types of emails. It also detects and blocks threats without malicious payloads, such as impostor emails (also known as Business Email Compromise (BEC), using our Advanced BEC Defense. You can also tag suspicious emails automatically to raise user awareness. You can also track down any email within seconds.
  • 10
    Bitdefender GravityZone Reviews
    Bitdefender GravityZone gives organizations complete visibility into their overall security status, global security threats, as well as control over the security services that protect mobile devices, servers, and virtual desktops. All Bitdefender Enterprise Security solutions can be managed in the GravityZone via a single console, Control Center. This provides control, reporting and alerting services for different roles within the organization.
  • 11
    Symantec Endpoint Protection Reviews
    Symantec Endpoint Security is the best integrated endpoint security platform available. Symantec Endpoint Security is available as an on-premises, hybrid or cloud-based platform. It protects both your mobile and traditional endpoint devices and uses artificial intelligence (AI), to optimize security decisions. Unified cloud-based management makes it easy to detect, protect and respond to advanced threats that target your endpoints. Keep your business running. Compromised endpoints can be disruptive to your business. Innovative attack prevention and attack surfaces reduction provide the best security throughout the attack life cycle (e.g. stealthy malware and credential theft, fileless and "living off the land". Avoid the worst-case scenario. Full-blown breaches are CISOs worst nightmare. Provide detection and remediation for persistent threats using sophisticated attack analytics and prevention from AD credential theft.
  • 12
    Trellix Endpoint Security (HX) Reviews
    Trellix Endpoint Security HX performs targeted, fast forensic investigations on thousands of endpoints. Protect and empower your employees with an integrated security system that protects all endpoints. Trellix Endpoint Security Solutions apply proactive threat intelligence, defenses and protections across the entire attack cycle to keep your organization more resilient and safer. Keep your endpoints safe in today's dynamic threats landscape. Discover how our integrated suites of endpoint protection technology can help you monitor threats and avert them by combining machine learning and actionable intelligence. Endpoint security is a practice that involves safeguarding data and workflows on the devices that connect to the network. Endpoint protection platforms (EPPs) examine files as they enter your network.
  • 13
    WatchGuard Firebox Cloud Reviews
    It's a fact that businesses are migrating their services from on-premises servers to the cloud. Email servers, web servers and customer relationship management (CRM) systems are all moving to the public cloud. Security is crucial with so much sensitive data moving into the cloud. WatchGuard's Firebox Cloud allows network managers to extend their security perimeter to include the cloud and protect servers in a public cloud environment. WatchGuard Firebox Cloud provides protection for WatchGuard's Firebox Unified Threat Management appliances in public cloud environments. Firebox Cloud can be quickly and easily deployed to protect Virtual Private Clouds (VPCs) from botnets, SQL injection attempts, cross-site scripting, and other intrusion vectors.
  • 14
    FortiAnalyzer Reviews
    The digital attack surface is growing rapidly, making it more difficult to protect against advanced threats. Ponemon's recent study found that nearly 80% of organizations are using digital innovation faster than they can secure it against cyberattacks. Complex and fragmented infrastructures are allowing for an increase in cyber incidents and data breaches. Many point security products used at enterprises are often used in silos, which prevents network and security operations teams having consistent and clear insight into what is going on across the organization. A security architecture that integrates analytics and automation capabilities can dramatically improve visibility and automation. FortiAnalyzer is part of the Fortinet Security Fabric and provides security fabric analytics as well as automation to improve detection and response to cyber risks.
  • 15
    Sophos Firewall Reviews
    The best visibility, protection, response, and response in the world. Superior visibility into suspicious traffic, risky activity, advanced threats and advanced threats allows you to regain control over your network. Next-generation protection technologies such as deep learning and intrusion prevention ensure your organization's security. Automated threat response immediately detects and isolates compromised systems in your network to prevent them from spreading. XG Firewall makes it easy for employees to connect to your secure network from anywhere. Sophos Connect is an intuitive VPN client that is easy to install and configure. Remote workers can access corporate resources from Windows and MacOS devices. Our small and affordable XG 86(w), and SD-RED devices offer the ultimate in SOHO security with an always-on, dedicated or split-tunnel virtual private network (VPN) that is easy to set up and manage.
  • 16
    NorthStar Navigator Reviews

    NorthStar Navigator

    NorthStar.io, Inc.

    $8 per device
    NorthStar allows organizations to easily incorporate threat intelligence and business context to enable a risk-based approach to their vulnerability management program. The Platform automates the collection, normalization, consolidation and correlation of threat intelligence, asset, software, and vulnerability data. Combined with a transparent scoring model, NorthStar automates the tedious and manual process of prioritizing vulnerability remediation.
  • 17
    Sophos UTM Reviews
    Sophos UTM increases threat prevention to unmatched levels. The deep learning neural network that is part of Sophos Sandstorm's artificial intelligence detects known and unknown malware, without the need for signatures. Sophos UTM 9.4 was the first product to feature our next-generation cloud sandboxing technology. Sandstorm offers a new level of ransomware protection and targeted attack protection. It can identify evasive threats quickly and accurately before they reach your network. It's an enterprise-grade protection solution without the complexity or price tag.
  • 18
    LogRhythm SIEM Reviews
    We understand that your job is not easy. Log management, machine learning and NDR are all part of our solution. This gives you broad visibility to your environment, so you can quickly spot threats and minimize risk. A mature SOC does more than stop threats. LogRhythm makes it easy to track your progress and baseline your security operations program. This will allow you to easily report on your successes to your board. Protecting your enterprise is a huge responsibility. That's why we designed our NextGen SIEM Platform for you. Protecting your business has never been easier thanks to intuitive, high-performance analytics, and a seamless workflow for responding to incidents. LogRhythm XDR Stack gives your team an integrated set of capabilities that can be used to deliver the core mission of your SOC, which is threat monitoring, threat hunting and incident response. It also comes at a low total cost.
  • 19
    VMware NSX Reviews
    VMware NSX enables full-stack network and security virtualization. Your virtual cloud network can connect and protect applications from your data center, multi-cloud, container infrastructure, and bare metal. VMware NSX Data Center is a complete L2-L7 security and networking platform that allows you to manage your entire network from one pane of glass. You can easily provision your security and networking services with one click. You can manage consistent security and networking policies across private and publicly cloud environments from one pane of glass. This is regardless of whether your application runs on a VM, container or bare metal. Micro-segmentation allows you to provide granular protection for your apps, depending on the workload.
  • 20
    Syslog-ng Reviews
    Syslog-ng provides a reliable, scalable and secure central log management solution. IT teams can use syslog to collect and centralize log data regarding user activity, network traffic, and other metrics. This eliminates data silos and gives teams full-stack access to their log data. Syslog-ng features include secure data storage, scalable architecture, flexible routing, real-time transformation, and more. Syslog-ng is available in both open source and enterprise editions.
  • 21
    SecureSphere Reviews
    Imperva SecureSphere management products provide superior performance, scalability, and unified management capabilities for all sizes of deployments. SecureSphere management solutions allow you to manage small sites or large numbers of business units on-prem and in AWS. Unify auditing and reporting across SecureSphere products. Unique auditing and security capabilities can be applied to specific domains. Web applications, databases, file servers. Live security dashboard allows you to monitor security status and detect incidents in real time. Interactive audit analytics allows you to investigate user activity. One console allows you to monitor the environment's health. View all security activity across the entire deployment. System-wide policies can be managed and distributed.
  • 22
    FireMon Reviews
    Comprehensive visibility across your entire network is essential for maintaining strong security and compliance. Learn how to gain real-time visibility into and control over complex hybrid network infrastructure, policies, and risk. Security Manager gives you real-time visibility, control and management of network security devices in hybrid cloud environments. It is a single pane. Security Manager offers automated compliance assessment capabilities that validate configuration requirements and alert when violations occur. Security Manager allows you to create customized reports or get audit reports right out of the box. This reduces the time spent configuring policies and gives security to ensure you are ready to meet regulatory or internal compliance audit requirements.
  • 23
    Array APV Series Reviews
    Array APV Series application controllers provide the reliability, scalability and performance required to keep applications and servers in their power range. Integrated local and worldwide server load balancing as well as link load balancers ensure maximum resiliency for your application. Connection multiplexing and SSL offload work together to provide the best end-user experience. Array's WebWall®, application security suite, protects applications by terminating connections on APV Series APDCs. Array ADCs can be used on physical or virtual appliances or public clouds. They are easy to use for any IT team and affordable for all businesses.
  • 24
    A10 Thunder ADC Reviews
    Advanced load balancing solution for high-performance applications that ensures your applications are highly available, accelerated, secure, and reliable. Ensure reliable and efficient application delivery across multiple datacenters. Reduce latency and downtime and improve the end-user experience Advanced SSL/TLS offload, single-sign-on (SSO), DDoS protection, and Web Application Firewall capabilities increase application security. Integrate the Harmony™, Controller to gain per-application visibility and complete controls for secure application delivery across public, private, and hybrid clouds. Full-proxy Layer 4 and Layer 7 loadbalers with flexible aFleX® scripting, customizable server health checks and customizable server monitoring. High-performance SSL Offload with the most current SSL/TLS encryption enables secure and optimized application service. Global Server Load Balance (GSLB), extends load balancing to a global level.
  • 25
    WALLIX Bastion Reviews
    WALLIX Bastion's PAM solution is easy to use and deploy. It provides robust security and oversight of privileged access to critical IT infrastructure. With simplified Privileged Access Management, you can reduce the attack surface, protect remote access, and comply with regulatory compliance requirements. WALLIX Bastion provides top session management, secrets management and access management features to secure IT environments and enable Zero Trust policies. It also protects internal and external access of sensitive data, servers and networks in industries that range from healthcare to finance to industry, manufacturing, and even finance. Adapt to the digital transformation with secure DevOps thanks to AAPM (Application-to-Application Password Management). WALLIX Bastion can be used both on-premise or in the cloud for maximum flexibility, scalability and the lowest total cost of ownership. WALLIX Bastion PAM natively integrates to a full suite security solutions
  • Previous
  • You're on page 1
  • 2
  • Next