Best IT Security Software for Google Chrome - Page 2

Find and compare the best IT Security software for Google Chrome in 2026

Use the comparison tool below to compare the top IT Security software for Google Chrome on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Adaware Ad Block Reviews
    Adaware Ad Block enhances your browsing experience by eliminating bothersome ads and intrusive trackers, effectively boosting your speed nearly twofold. With advanced antivirus-level cloud scanning capabilities, it ensures your online safety against the latest cyber threats. Wave goodbye to unwanted disruptions and embrace a smoother, more serene browsing journey. Unlike any other ad blocking solution available, Adaware AdBlock excels in swiftly filtering out ads and trackers, allowing you to enjoy a nearly doubled browsing velocity. Experience the freedom of uninterrupted online activities as the extension diligently blocks website ads, pop-ups, and video advertisements. Designed with user-friendliness in mind, it not only speeds up your internet activity but also protects your privacy through robust security features. In addition to these benefits, the built-in phishing protection acts as a safeguard against malicious websites that may attempt to compromise your information, ensuring a comprehensive online defense. With Adaware AdBlock, you can navigate the internet with confidence and efficiency, knowing that your experience is both fast and secure.
  • 2
    Trend Micro Check Reviews
    With Trend Micro Check, you can safeguard yourself against scams, phishing schemes, malware, and harmful links through our advanced detection technology. This all-in-one anti-scam mobile application and browser extension allows you to quickly assess the safety of any website or link, blocking access if threats are detected. Additionally, it helps identify and eliminate risks from your browsing history to prevent revisiting potentially harmful sites. Our top-tier database guarantees comprehensive protection against various scams, while also eliminating intrusive pop-up ads and banners. It prevents third-party trackers from monitoring your online activities and issues alerts before you finalize payments to suspicious entities. You can easily send a text, screenshot, or website link for prompt scam detection. By installing Trend Micro Check, you can effectively steer clear of scams, misinformation, and other online hazards. The application is compatible with iOS, Android, Chrome, Safari, and Edge, and it can also be accessed through WhatsApp and Messenger. Experience a private and ad-free browsing environment to enhance your online security and peace of mind.
  • 3
    TeamsID Reviews

    TeamsID

    TeamsID

    $6 per user per month
    1 Rating
    For a straightforward and reliable password management solution tailored for teams, consider TeamsID. This platform offers a secure and user-friendly approach to password security for businesses, enabling team members to effortlessly handle and retrieve their organizational logins and records. Key features encompass a secure vault for business use, a personal vault known as MySafe, management of secret passwords, as well as functionalities for auto-filling and auto-saving credentials, alongside customizable record types. By utilizing the TeamsID Business Password Manager, your organization's password safety, employee access, logins, credit card information, and any personalized records you create can see significant enhancement! To initiate the process of integrating TeamsID within your company, you can easily start a complimentary 14-day trial without any limitations or the need for a credit card. Furthermore, it grants complete oversight over who can access sensitive business passwords and records, allowing you to onboard or remove employees in mere seconds. TeamsID also supports seamless integration with various platforms, including Google Apps for Work, Google Apps for Education, Active Directory, Okta, and OneLogin, ensuring a smooth experience for your team.
  • 4
    SpyHunter Reviews
    SpyHunter serves as an adaptive tool for detecting and eliminating malware, effectively identifying and eradicating the latest threats, such as spyware, trojans, rootkits, ransomware, keyloggers, and various other forms of malicious software. Its standout features include sophisticated remediation abilities, real-time system protection, and a dedicated Spyware HelpDesk that creates tailored solutions for specific issues that may arise on your computer. For Mac users, SpyHunter offers robust anti-malware capabilities designed to tackle the growing array of unique malware challenges affecting Mac systems. Additionally, it provides optimization functionalities that help users reclaim disk space by removing unnecessary applications and their remnants. To address persistent malware challenges, a live technical support team is readily available to provide assistance and guidance. This comprehensive approach ensures that users are well-equipped to maintain the integrity and performance of their devices.
  • 5
    Google Password Manager Reviews
    Organize your saved passwords in Android or Chrome, as they are safely kept within your Google Account and accessible from any device you use. Assess the strength and security of these passwords to ensure your online safety. You can also discover if any of them have been breached and receive tailored guidance whenever necessary to enhance your security. This proactive management helps protect your digital identity effectively.
  • 6
    GateKeeper Password Manager Reviews

    GateKeeper Password Manager

    Untethered Labs, Inc.

    $3/user/month
    Proximity-based passwordless login for desktop applications, Macs, websites, PCs, Macs and Macs. Active proximity-detection allows hands-free wireless 2FA and password management. IT administrators can allow users to log into their computers and websites dynamically using a physical key. This can be done either automatically, manually, by touch, pressing Enter, or with an PIN. You can easily log in, switch users, change computers, and log out without any passwords, touch, trouble, or hassle - all you need is a key. The computer locks automatically when a user leaves, preventing access to the computer or web passwords. Continuous authentication ensures that users are constantly being checked to make sure they have access. No more typing passwords. Administrators and compliance can now automate password protection from a central admin console. This allows them to enforce stronger passwords, enforce 2FA and give employees the ability to log in without having to interrupt their workflow. Helpdesk tickets for forgotten passwords/password changes will be reduced. Login to enable auto-lock and presence detection
  • 7
    BastionPass Reviews

    BastionPass

    BastionWare

    $1.59 per user per month
    BastionPass emerged out of a need for a comprehensive and collaborative platform that serves families or colleagues in ways that traditional password managers cannot. From the very beginning, we have concentrated on delivering streamlined identity management and sharing features through an intuitive interface, ensuring a secure and reliable solution for password handling for both individuals and teams. With BastionPass, you can efficiently oversee your passwords, eliminating the hassle from your daily routine. Simply log in once with your master password, and our plugin takes care of the rest by automatically signing you in to all your accounts. Generate strong, unique passwords for each of your logins with ease, while safely storing them in our exclusive, triple-encrypted vault. Whether on desktop or mobile, you can conveniently access, manage, or share your passwords, adapting seamlessly to your digital lifestyle. BastionPass is not just a tool; it is a solution crafted to keep pace with the evolving demands of your online presence.
  • 8
    CoScreen Reviews
    CoScreen enables multiple team members to share and edit application windows simultaneously on a joint desktop. Key features: - Crystal-clear audio and video chat - Multi-user screen sharing of any desktop or browser app with one click - Multi-user editing of shared windows using mouse and keyboard, 2-3x lower latency than Zoom, Slack, and Microsoft Teams - See who from your team is online and call them with one click - Integrate CoScreen with your favorite apps like Slack, VS Code, IntelliJ, and other JetBrains IDEs - Enterprise-grade compliance and securely encrypted connections At CoScreen, our mission is to help teams and organizations work together more seamlessly and effectively than ever before. We empower teams like yours to become more productive without getting burned out or video chat-fatigued - no matter if you work fully remotely, co-located, or hybrid. Top use cases: Team standups, 1:1s, sprint demos, pair programming, coding interviews, employee onboarding, incident management, incident response, and many more...
  • 9
    BeyondCorp Enterprise Reviews

    BeyondCorp Enterprise

    Google

    $6 per user per month
    A zero trust framework that facilitates secure access while incorporating comprehensive threat and data protection measures is essential. It ensures that critical applications and services are always accessible securely. By leveraging integrated threat and data protection, your information is well-guarded against potential risks. The experience for both administrators and end-users is streamlined through an agentless methodology. This modern zero trust solution enhances your security posture significantly. It is constructed on the robust foundation of Google’s extensive network and infrastructure, delivering a smooth and secure experience augmented by integrated DDoS defense, low-latency connections, and the ability to scale elastically. Employing a multi-layered security strategy across users, access, data, and applications helps to defend against malware, data breaches, and fraudulent activities with every interaction. Furthermore, it incorporates posture information and insights from top security vendors to bolster protection. You can effortlessly set up policies that are based on user identity, device health, and various contextual elements to apply precise access controls to applications, virtual machines, and Google APIs. This comprehensive approach ensures that every aspect of security is considered, making it easier to adapt to the evolving landscape of threats.
  • 10
    Trust DNS Reviews

    Trust DNS

    Surfshark

    $2.50 per month
    A DNS (Domain Name System) changer converts web addresses such as Surfshark.com into the numerical IP addresses essential for machine communication. Typically, your DNS provider is your Internet Service Provider (ISP), which has the capability to monitor your web activity and retain your browsing history. By using a DNS changer, you can enhance your privacy since it encrypts your DNS requests and allows you to connect to public DNS servers provided by third parties. Changing your DNS settings is relatively straightforward; you can manually adjust them through your device’s Wi-Fi settings by editing the network configuration. Alternatively, you can simplify the process by using the Trust DNS app, which enables you to switch DNS servers with just one tap. There are two primary methods to utilize the Trust DNS app: you can either activate its server for improved browsing security or connect to one of the free third-party DNS servers that offer features like content filtering, ad blocking, and protection against malware. This flexibility ensures that users can choose an option that best suits their needs while enhancing their online experience.
  • 11
    Logflare Reviews

    Logflare

    Logflare

    $5 per month
    Say goodbye to unexpected logging fees by collecting data over the years and querying it in mere seconds. Traditional log management solutions can lead to soaring costs quickly. To implement long-term event analytics, you typically need to export data to a CSV file and establish a separate data pipeline to funnel events into a customized data warehouse. However, with Logflare and BigQuery, you can bypass the setup complexity for long-term analytics. You can immediately ingest data, execute queries in seconds, and retain information for years. Utilize our Cloudflare app to capture every request made to your web service seamlessly. Our Cloudflare App worker does not alter your requests; instead, it efficiently extracts request and response data, logging it to Logflare without delay after processing your request. Interested in keeping tabs on your Elixir application? Our library is designed to minimize overhead, as we group logs together and utilize BERT binary serialization to reduce both payload size and serialization load effectively. Once you log in with your Google account, we grant you direct access to your underlying BigQuery table, enhancing your analytic capabilities further. This streamlined approach ensures you can focus on developing your applications without worrying about the intricacies of logging management.
  • 12
    MetaCert Reviews

    MetaCert

    MetaCert

    $2.19 per month
    MetaCert’s Zero Trust browser software significantly diminishes the likelihood of organizations falling victim to phishing-related cyberattacks by over 98%. While blocking harmful URLs and websites is crucial, it is far from sufficient on its own. Every prominent security firm with a “threat intelligence system” aims to identify and obstruct known malicious URLs, and like its competitors, MetaCert maintains a database of such dangerous links. When a harmful link bypasses current security measures, users are often left to rely on their judgment, having to discern which links are safe and which websites can be trusted. This legacy method leaves even those employing a combination of security solutions vulnerable to threats. By leveraging advanced internal URL classification technology, we provide clear guidance on which links are secure and which websites can genuinely be relied upon. With millions of URLs confirmed as safe, our solution effectively mitigates the risk associated with cyberattacks that originate from questionable URLs, ensuring greater peace of mind for users. Ultimately, our approach not only enhances security but also simplifies the browsing experience by eliminating the uncertainty that often accompanies online navigation.
  • 13
    Privacy Badger Reviews
    Privacy Badger is a browser extension designed to autonomously identify and block invisible trackers that monitor users' online activities. This tool effectively prevents advertisers and various third-party trackers from covertly surveilling your browsing habits and the websites you visit. When Privacy Badger detects that an advertiser is tracking you across several sites without your consent, it promptly obstructs that advertiser from loading additional content in your browser, making it seem as though you have vanished to them. The inception of Privacy Badger stemmed from a commitment to provide a straightforward solution that could independently assess and eliminate any tracker or advertisement that disregarded user consent. It operates seamlessly without necessitating user settings, prior knowledge, or configuration, and it is developed by an organization that prioritizes user interests over those of advertisers, leveraging algorithmic techniques to determine what constitutes tracking. Ultimately, Privacy Badger empowers users to regain control over their online privacy.
  • 14
    Protective.ai Reviews

    Protective.ai

    Protective.ai

    $38 per month
    Protective.ai assists startups and developers in enhancing their data security while simultaneously increasing user trust and adoption rates. The integration of third-party applications with your preferred platforms has become simpler than ever. Nevertheless, this convenience often results in your customer data, emails, documents, and internal communications being handled by multiple companies, each with differing levels of data security and privacy policies. We leverage artificial intelligence to evaluate the cloud security, privacy terms, and social signals of over 10,000 business applications and integrations to assess their data protection effectiveness. Our scoring system helps users identify which applications prioritize data safety and which ones require improvements in their security and privacy practices. By revealing the genuine risks associated with cloud vulnerabilities and lenient privacy policies, we go beyond merely relying on self-reported compliance from these apps. Furthermore, our PRO solution offers research and development, marketing, sales, and information security teams continuous oversight, notifications, and safeguards against potentially unsafe integrations, ensuring comprehensive protection for your data.
  • 15
    Padloc Reviews

    Padloc

    Padloc

    $3.49 per month
    In our online lives, the protection of sensitive information extends far beyond just passwords. It encompasses everything from credit card numbers and confidential documents to private notes, software license keys, and much more, allowing Padloc to offer comprehensive flexibility in data storage. Rest assured, your information is safeguarded with end-to-end encryption, ensuring that neither we nor anyone else can access it! If you wish to share your secure data with family, friends, or colleagues, Padloc simplifies that process, making it easy to manage your sensitive information within any group or organization. We firmly believe that transparency and openness foster trust, which is why Padloc is being developed in a fully transparent manner. Our source code is available under an open-source license, inviting anyone to review, provide input, and contribute their ideas at any point, further enhancing our commitment to community engagement. This open approach not only builds trust but also encourages innovation through collective input.
  • 16
    Passit Reviews
    Utilizing a password manager enhances your online security, and our advanced security functionalities protect your passwords seamlessly. By offering open-source code, we invite transparency, allowing anyone to understand how Passit operates, which boosts our credibility and contributes to overall product security. Effortlessly access your passwords on any internet-enabled device and share them with trusted individuals. You can view saved passwords even when you are offline, ensuring you have access when needed. Our platform also supports the import and export of CSV files for easy management of your password data. Additionally, you can invite other users to collaborate in groups on a self-hosted instance, facilitating password sharing. This collaborative feature strengthens both individual and collective security efforts.
  • 17
    Password.link Reviews

    Password.link

    Password.link

    €8.99 per month
    The link is designed to be accessed only a single time, guaranteeing that no one else has opened it prior to the intended recipient and that it cannot be accessed again afterward. Once the encrypted secret is viewed, it is permanently erased from our database, making it impossible to retrieve. Sending sensitive information in plain text can lead to exposure, even after the message seems to have faded from memory. By utilizing a one-time link, you can avoid leaving any valid credentials lingering in email inboxes or stored messages. One half of the encryption key is embedded within the link itself, ensuring that neither we nor anyone else can see it. Accessing the secret is only feasible through the original link, reinforcing its security. Our service allows you to generate a one-time link for the credentials, ensuring that they remain unseen until accessed by the recipient. Additionally, you can set up notifications through various channels to alert you when the credentials are viewed and by whom, enhancing your overall security and awareness. This way, you have greater control over sensitive information and can monitor its access effectively.
  • 18
    InPrivy Reviews

    InPrivy

    InPrivy

    €30 per year
    Easily exchange confidential information with colleagues, clients, friends, and family members. InPrivy allows you to share passwords and other sensitive data securely, ensuring that your private information does not remain exposed in email threads or chat messages. It is essential to share private notes, passwords, API keys, credit card details, or any other sensitive content in a secure manner. When transmitted through email or messaging platforms, your data can be visible and accessible for an extended period. Begin sharing securely with InPrivy, which is free of advertisements, avoids excessive user tracking, and is developed in Germany. We prioritize the strong protection of your sensitive information. You can use it anywhere on the internet without the need to install additional applications. You will be the sole individual aware of the link to the confidential information you create, which you can then share with the intended recipient. The links are encrypted with SSL and are set to be utilized just once by default. Additionally, the secure information is safeguarded with powerful AES-256 encryption, ensuring that your data remains protected throughout the sharing process. With InPrivy, you can confidently share sensitive information, knowing that privacy and security are our top priorities.
  • 19
    ShieldApps Cyber Privacy Suite Reviews

    ShieldApps Cyber Privacy Suite

    ShieldApps

    $77.90 per 3 devices
    Your online activities and computer usage should remain private, but unfortunately, third parties often track your personal data and browsing habits to profit from your online presence or compromise your identity. To combat the relentless threat of cyber attacks, robust software is essential to protect against malicious intrusions at all times. In today's digital landscape, anyone can easily become a victim of cybercrime due to the vast amounts of personal information shared online, which complicates efforts to defend against hacking attempts. Our all-inclusive software is designed to ensure the safety of you and your family while using devices or navigating the internet. The Cyber Privacy Suite effectively guards against dangerous privacy risks and actively pinpoints areas where your data may be at risk or exposed. By utilizing this software, you can enjoy greater peace of mind as you explore the online world.
  • 20
    Fakespot Reviews
    Fakespot serves as a safeguard against online scams during your shopping experiences. Embrace the secure shopping movement and uncover the reality behind products, reviews, and sellers prior to making any purchases. Whether you are shopping from your couch or on your phone, Fakespot is there to support you. With its innovative browser application, you can navigate the internet, and whenever you visit a supported site, Fakespot’s features will activate to assist you in making well-informed buying choices. The functionality that allows sharing to analyze remains available for those transitioning from our earlier app. Since its launch, Fakespot has meticulously reviewed over 9 billion product and seller evaluations. This comprehensive analysis empowers you to choose wisely so that you genuinely enjoy each item you buy and avoid returns. Furthermore, Fakespot continuously enhances its algorithms to stay ahead of new threats, ensuring your shopping experience is safe and secure. In the end, Fakespot not only simplifies your shopping but also conserves your time and money while eliminating stress. You can shop with confidence, knowing that Fakespot is dedicated to protecting your interests.
  • 21
    Wink Reviews

    Wink

    Wink

    $499 per month
    Wink empowers institutions to provide enhanced identity and payment solutions through the use of biometrics, simplifying the user experience. The Wink platform utilizes facial and voice recognition for multi-factor authentication and transactions, effectively removing the need for traditional security measures such as passwords, SMS/OTP, usernames, and card numbers, which rely on memory or specific devices. By integrating the Wink streaming checkout plug-in, businesses can reduce fraud risks through innovative face and voice recognition technology. This not only significantly enhances conversion rates but also minimizes cart abandonment, as customers can complete their purchases with just a smile. Say goodbye to lengthy checkout processes and forgotten passwords with this revolutionary solution. The pioneering multi-factor biometric authentication seamlessly blends the ease of a face-id experience with robust digital voice printing for heightened security. Moreover, our proprietary one-way anonymous encryption technology guarantees user privacy, as the Wink ID encapsulates the user's facial and vocal data in an advanced 3D model format, ensuring a secure yet user-friendly transaction process. With Wink, institutions can embrace the future of authentication and payments while providing their customers with a cutting-edge experience.
  • 22
    2FAS Auth Reviews
    2FAS is a robust platform for password management and two-factor authentication that prominently features its open-source 2FAS Authenticator application. This app empowers users to enhance their login security by generating both time-based and event-based one-time codes that refresh regularly, effectively shielding online accounts from unauthorized access. As a result, it simplifies the security process for various services, including email, social media, financial accounts, and more that utilize 2FA. The platform prides itself on being user-friendly, private, and secure; it operates offline and abstains from storing passwords or any usage data, eliminating the need for user account creation and allowing for anonymous usage. Furthermore, 2FAS offers the convenience of syncing codes across multiple mobile devices through encrypted backups, along with biometric or PIN protection. Users can also import and export authentication seeds, ensuring they maintain control over their data and can easily transition between devices or applications whenever necessary. This blend of security and usability makes 2FAS an appealing choice for those seeking to safeguard their digital identities.
  • 23
    Csper Reviews

    Csper

    Csper

    $50 per month
    Csper is a security-oriented platform aimed at streamlining the creation, deployment, and oversight of Content Security Policy (CSP) for web applications, offering automated tools and valuable insights that safeguard users from prevalent web threats like cross-site scripting. It includes a range of features such as a CSP generator that automatically produces policy headers for any site, browser extensions that aid in the real-time construction and refinement of policies, and an evaluator that examines existing setups to identify misconfigurations and security vulnerabilities. This platform empowers developers to swiftly create, test, and implement CSP rules, while also enabling them to track their efficacy through actionable feedback and detailed reporting, significantly lowering the complexities that typically accompany manual CSP configuration. Csper prioritizes user-friendliness and automation, enabling teams to grasp, implement, and sustain CSP in mere minutes, all while making sure that the policies adapt effectively as applications change. Overall, Csper serves as a comprehensive solution for enhancing web security with minimal hassle.
  • 24
    Axcient x360Cloud Reviews
    Safeguard everything with Axcient x360, the solution that consolidates multiple vendor services into a singular platform for MSPs seeking robust business availability. For years, managed service providers have juggled various vendors, but Axcient x360 simplifies this complexity by offering a unified experience designed specifically for client data protection. With the Axcient x360 portal, MSPs gain access to a comprehensive dashboard that facilitates management of BCDR, Cloud to Cloud Backup, and Secure Sync & Share, all from one location. The platform enhances efficiency with support for Single Sign-On (SSO), Multi-Factor Authentication (MFA), and multi-tenant management, ultimately boosting MSP productivity while lowering the total cost of managed services (TCOMS). Axcient x360 empowers MSPs to safeguard every aspect of their operations—ensuring business continuity, cloud backup, and secure sharing—through a streamlined interface. In addition, this solution equips MSPs with the industry's most secure backup and disaster recovery technology stack, demonstrating Axcient's commitment to providing a proven suite for business availability. By integrating these essential features, Axcient x360 not only protects client data but also strengthens the overall service offering of managed service providers.
  • 25
    Arista NDR Reviews
    In today's digital landscape, adopting a zero trust networking strategy is essential for organizations aiming to establish a strong cybersecurity framework. This approach emphasizes the need for complete oversight and control over every device, application, or user accessing enterprise resources. Arista’s principles of zero trust networking, aligned with NIST 800-207 guidelines, enable clients to tackle these challenges through three foundational elements: visibility, ongoing diagnostics, and enforcement mechanisms. The Arista NDR platform provides continuous diagnostics across the entire enterprise threat landscape, analyzing vast amounts of data, detecting anomalies, and responding to threats in mere seconds. Unlike traditional security measures, the Arista solution is engineered to replicate the workings of the human brain, allowing it to identify malicious activity and adapt over time. This innovative design enhances the ability of security professionals to gain deeper insights into existing threats and formulate effective response strategies. As cyber threats evolve, leveraging such advanced technologies becomes increasingly critical for maintaining organizational security.
MongoDB Logo MongoDB