Best IT Security Software for Google Chrome

Find and compare the best IT Security software for Google Chrome in 2024

Use the comparison tool below to compare the top IT Security software for Google Chrome on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    CatBlock Reviews

    CatBlock

    CatBlock

    Free
    Ad-blocking extension that replaces ads with photos of cats. CatBlock can also be used as a standalone ad blocking extension! Available for Google Chrome, Opera, and Mozilla Firefox desktop browsers. We have used AdBlock's code and replaced all the ads that you don't see with photos of cats. The AdBlock fork founders all have previous experience with AdBlock and have contributed regularly to the project in the past. The block, like AdBlock before it, is 100% open-source and licensed under the GNU GPLv3. You can find our code on GitHub. For any questions or problems, we regularly check our support site. A public Discord server is also available for anyone to join and receive help with the block. You can also use any other set images from Flickr if you don't want to see cats!
  • 2
    Malwarebytes Browser Guard Reviews
    Blocks trackers and annoying ads while filtering out scams and annoying ads. Free download for Chrome, Edge and Firefox browsers. Malwarebytes Browser Guard eliminates unsafe and unwanted content, ensuring a faster browsing experience. It is the first browser extension to detect and stop tech support scams. We fight the bad guys so that you don't have. By blocking third-party advertisements and other unwanted content, web pages load faster. This will save you time and bandwidth. It identifies and blocks browser hijackers, browser lockers, and other scare tactics that tech support scammers use in order to con you out. Tech support scammers are put to the test. Blocks third-party ad tracking programs that track you online and target you with the exact same ads over and again. Removes annoying ads that often point at content of questionable value.
  • 3
    AntiBrowserSpy Reviews

    AntiBrowserSpy

    Abelssoft Ascora GmbH

    $29.90 one-time payment
    We are monitored and spied upon every time we surf the Internet. Online services can track and use cookies to determine where a visitor is from, what operating system they are using, and what browser they are using. AntiBrowserSpy is a Windows tool that dries up involuntary data flows and creates a muzzle for web browsers. The browser cloak or invisibility of this tool prevents Chrome, Firefox, Opera, and Microsoft Edge from being accessed. It is based on the user's typical browser "fingerprint" that allows the tool to recognize the user. The range of functions includes a Google Analytics Blocker, a local browser cleaning (cache cookies and history), and a Google Analytics Blocker. The integrated BrowserCheck also checks your browser settings after every session and informs you if any changes have occurred.
  • 4
    Protective.ai Reviews

    Protective.ai

    Protective.ai

    $38 per month
    Protective.ai is a tool that helps developers and startups improve their data protection, while increasing user trust and adoption. It's now easier than ever to connect third-party apps with your favorite platforms. This means that customer information, e mails, docs, as well as internal conversations, are stored and processed by tens to hundreds of companies with different data security standards and privacy standards. AI is used to analyze cloud security, privacy policies, social signals, and determine the data protection level for more than 10K business applications & integrations. Our score will help you understand which apps are protecting your data with care and which ones need to improve security and privacy. We expose the actual risks of cloud vulnerabilities and promiscuous privacy policy terms. This is not just a self-reported compliance. Our PRO solution provides ongoing monitoring, alerts and protection against unsafe integrations for R&D, marketing and sales managers.
  • 5
    Padloc Reviews

    Padloc

    Padloc

    $3.49 per month
    Not only are passwords sensitive information that we deal with in our digital lives, but so is secret notes and license keys. Padloc allows you to store any type of data, including credit card details, license keys, secret notes, license keys, and other sensitive documents. Your data is encrypted from the beginning to ensure that no one can read it. You can share your passwords with family, friends, or colleagues. No problem! Padloc makes it easy for you to share and manage sensitive data within your family, your business, or any other type of organization. Trust is built on transparency and openness. Padloc is being developed completely openly. The source code is available under an open-source license, so anyone can view it, give feedback, or even make contributions at any time.
  • 6
    Passit Reviews

    Passit

    Passit

    Free
    A password manager can make you safer online. Our modern security features lock down passwords without allowing anyone to access them. Passit's code is open-source, so anyone can see how it works. This makes us more trustworthy and helps us create a safer product overall. You can easily access your passwords online and share them with others. Just in case, you can also view passwords that are already in use offline. Passit can import and export CSV files containing passwords. To share passwords, add other users to groups in a self-hosted instance.
  • 7
    Password.link Reviews

    Password.link

    Password.link

    €8.99 per month
    The link can only once be opened. This means that it cannot be opened more than once. After it has been viewed, the encrypted secret is deleted automatically from our database. It is impossible to view it again. Leaving secrets in plain text exposes them even to threats long after the message is gone. A one-time link is a way to ensure that there are no valid credentials in email inboxes, or archived instant messages. The link contains half of the encryption key and is never shared with anyone. Without the original link, it is impossible to view the secret. You can use our service to create a unique link to the credentials. This will ensure that no one sees them except the recipient. You can also set up notifications to be sent via various channels so that you know when credentials have been viewed and by whom.
  • 8
    InPrivy Reviews

    InPrivy

    InPrivy

    €30 per year
    Share sensitive information easily with clients, co-workers and friends. Use InPrivy for sharing passwords and sensitive information in a safe way. Your confidential data will not be visible in chats or emails. It is important to keep your private data secure. This includes passwords, API keys and credit card information. Your data will be visible for a long period of time even if you send them via email or messengers. Use InPrivy to share your data in a secure manner. InPrivy is 100% German-made, with no ads and no excessive user tracking. We guarantee strong protection of your sensitive data. You can access the site from any device, without needing to install any apps. Only you know the link to the secret information that you created. It is your responsibility to give it to the person who needs it. These links are protected with SSL encryption and can only be used once. Strong AES256 encryption protects the secret information.
  • 9
    ShieldApps Cyber Privacy Suite Reviews

    ShieldApps Cyber Privacy Suite

    ShieldApps

    $77.90 per 3 devices
    What you do on your computer and online should be your business. In most cases, third parties are tracking your web habits and personal information to monetize or steal your identity. It takes powerful software all day long to protect against malicious cyber attacks. Cyber attacks are becoming more common in our increasingly digitalized world. Today, we share so much personal information online that it is difficult to protect against malicious hacking attempts. Our comprehensive software ensures that you and your family are always safe when using your devices or browsing the web. Cyber Privacy Suite protects you from harmful privacy threats, and identifies proactively where your data is vulnerable or exposed.
  • 10
    Fakespot Reviews

    Fakespot

    Fakespot

    Free
    Fakespot will protect you from being ripped off while shopping online. Join the secure online shopping revolution to get the truth before you buy about products, reviews and sellers. Fakespot is there to protect you when you shop online, whether at home or via mobile. Fakespot’s new browser app lets you browse the open web and, when you land on sites we support, Fakespot’s features will be enabled to help you make informed purchases. Share via other browsers and shopping apps. Share to analyze functionality remains for users who are coming from our old app. Since Fakespot was founded, we have analyzed more than 9 billion product and seller ratings. Our analysis helps you to make informed decisions, so that you will love everything you purchase and never return a thing. Fakespot is always up-to-date with the latest threats, and our algorithms are constantly updated to protect you. Fakespot offers safe, secure shopping, saving you time, money and headaches.
  • 11
    Cloaked Reviews

    Cloaked

    Cloaked

    $10 per month
    Create unlimited identities to make your data invisible. The next level of privacy protection online and for travel. Create virtual identities and unique contact information to replace your personal data. {Every website, company, or person can have a stored identity you can use forever or delete anytime.|You can store an identity for any website, company or person. You can use it forever or delete it at any time.} Cloaked is a great way to protect your personal information. Available for Chromium-based browsers such as Google Chrome and Brave. One tap is all it takes to create identities using the mobile app. Sign in anywhere using your mobile device or browser. The generated phone numbers are routed through an encrypted server, making your personal number inaccessible to recipients. Unique sets of login and contact credentials that protects your personal information. It's impossible for businesses to create a central profile of you with unique identities. Unlock powerful features that will keep your communication organized.
  • 12
    Wink Reviews

    Wink

    Wink

    $499 per month
    Wink allows any institution to offer a superior experience in identity and payments through biometrics. Wink's platform offers facial and voice recognition based multi-factor authentication, payments, and can eliminate passwords and other technologies that are device or memory-based. Integrate Wink streaming checkout to eliminate fraud using our unique voice- and face-based user recognition. Improve conversions and eliminate cart abandoned by simply smiling at the consumer to check out. Long checkout forms and forgotten logins are a thing of past. The industry's very first multi-factor authentication combines the convenience of face-id with the security of digital voice printing. Our unique, patented, one-way anonymous encryption ensures privacy protection. The unique Wink ID represents a user's voice and face data as a 3-D model.
  • 13
    Axcient x360Cloud Reviews
    Protect everything with Axcient 360. MSPs have been forced to use multiple vendors for business availability for too long. Axcient 360 is the only platform that provides a single experience for MSPs to protect client information. MSPs can use the Axcient portal x360 to manage BCDR, Cloud to Cloud Backup, Secure Sync & share, and Secure Sync. SSO, MFA, multi-tenant management and SSO are all supported by Axcient 360. This allows MSPs to increase productivity and reduce the total cost of managed services (TCOMS). MSPs have one platform to protect everything with Axcient 360 - cloud to cloud backup, secure sync, share, and business continuity. MSPs can protect their customers and themselves with single sign-on (SSO), multifactor authentication (MFA), multi-tenant management, and secure sync and share.
  • 14
    DRM-X Reviews

    DRM-X

    Haihaisoft

    DRM-X 4.0 content security platform with new security architecture. Securely distribute protected audio/video, PDF, web pages, images, and Javascript to Windows and Mac, iPhone/iPad, Android, and Android. DRM-X 4.0 protection can eliminate the problem of piracy preventing you from selling or delivering these contents. DRM-X is Haihaisoft's digital rights management system platform. Haihaisoft offers DRM as a service. The copy protection platform includes File Encryption and Audio/Video Encryption as well as PDF Encryption and Web Page (HTML DRM Encryption). All of these features are available with DRMX 4.0 advanced DRM features. You can also manage rights, users, and license profiles online through your DRMX account. DRM-X 4.0, a new DRM software platform, is based on Xvast browser. It features a new security architecture, online and offline playback, and improved user experience. DRM-X allows dynamic watermarking of digital content.
  • 15
    Arista NDR Reviews
    Organizations looking to establish a strong cybersecurity program need to adopt a zero trust network approach to security. No matter what device, application or user accesses an enterprise resource, zero trust ensures that all activity on the network is visible and controlled. Based on NIST 800-207, Arista's zero trust network principles help customers address this challenge by focusing on three cornerstones: visibility and continuous diagnostics. Enforcement is also part of the Zero Trust Networking Principles. The Arista NDR platform provides continuous diagnostics for the entire enterprise's threat landscape, processes countless data points, detects abnormalities and threats, and responds if necessary - all in a matter a few seconds. Because it mimics the human brain, the Arista solution is different from traditional security. It detects malicious intent and learns over the course of time. This gives defenders greater visibility into threats and how to respond.
  • 16
     Acronis Cyber Protect Cloud Reviews
    Your clients will be less affected by downtime and data loss at a lower price. Acronis Cyber Protect Cloud is unique in that it seamlessly integrates cybersecurity, management, and data protection to protect endpoints, systems, and data. This synergy reduces complexity so service providers can better protect customers while keeping costs low. Next-generation cybersecurity. Advanced AI-based behavioral detection engine to prevent zero-day attacks. Reliable backup and recovery. Backup of full-image and file-levels, disaster recovery, metadata collection, and backup of files and other data for security forensics. MSP-ready protection management. URL filtering, vulnerability assessments, patch management are all available for increased control. Traditional endpoint protection products are not integrated and require more time to manage - updating and patching, maintaining licenses, checking compatibility after updates, managing multiple policies through a variety of user interfaces, and managing multiple policies.
  • 17
    Shelblock Reviews

    Shelblock

    Audivox

    Free
    You are exposed to hundreds upon hundreds of advertisements while browsing the web. How annoying is it to get an ad popping up while you're reading or watching a video? Ad-blockers are essential for all computer users. It's up to you whether you want it as a browser extension, or a desktop program. However, Shelblock is a good choice if you prefer the former. Block pop-ups, trackers, and ads Shelblock, a desktop ad blocker, promises to improve your browsing experience by blocking advertisements and website trackers from web browsers. It can also detect and block phishing attempts, and implement a customizable parental control policy. The application blocks ads and malicious sites by default, regardless of whether they are opened via a browser or an application.
  • 18
    Quest IT Security Search Reviews
    IT can have a difficult time seeing the unseeable. It can be difficult to find the right data and make sense out of billions of events that are being collected and reviewed from many sources, both on-premises and in the cloud. It can make all the difference in the event that there is a security breach. IT Security Search, a Google-like IT search engine, enables IT administrators to quickly respond and analyze security incidents. The web-based interface combines disparate IT data from many Quest compliance and security solutions into one console. This makes it simpler than ever to reduce complexity when searching, analyzing, and maintaining critical IT information scattered across multiple information silos. Role-based access allows auditors, help desk staff, IT mangers and other stakeholders to access the reports they need.
  • 19
    DNSWatch Reviews
    WatchGuard DNSWatch, a Cloud-based service that adds DNS-level filtering, detects and blocks potentially dangerous connections and protects networks and employees against damaging attacks. WatchGuard analysts triage critical alerts and provide an easy-to-understand accounting with detailed insights about possible infection. DNSWatch redirects employees away from malicious sites when they click the link. It also offers resources to reinforce phishing education. Hackers use DNS to attack unsuspecting victims. Therefore, careful examination of DNS requests can help to identify and intercept attacks. DNSWatch adds DNS-level filtering to our Total Security Suite. This provides an additional layer of security to prevent malware infections. Your users can be prevented from connecting to known malicious DNS addresses. Users are then automatically blocked and redirected to a safe landing site.
  • 20
    ThreatSync Reviews
    It can be difficult to manage security across an organization, whether you have 10 branch offices or distributed businesses with 10 employees. SMBs and distributed enterprises must have visibility into their network and endpoint data. They also need to be able quickly and efficiently to use actionable insights to eliminate threats. ThreatSync, an essential component of TDR, collects threat data from WatchGuard Firebox, Host Sensor, and enterprise-grade threat intelligence feeds. It then analyzes this data using a proprietary algorithm and assigns a threat score and rank. This powerful correlation engine allows cloud-based threat prioritization, empowering IT teams to respond quickly and confidently to threats. Collects and correlates threat events data from the Firebox or Host Sensor.
  • 21
    Trellix Intelligent Sandbox Reviews
    Advanced detection for zero-day, stealthy malware. Combine static code analysis, dynamic analysis (malware Sandboxing), machine learning to increase zero day threat and ransomware detection. Immediately share threat intelligence across your entire infrastructure--including multi-vendor ecosystems--to reduce time from threat encounter to containment. Validate threats and gain critical indicators of compromise (IoCs), which are essential for investigation and threat hunting. You can choose between physical or virtual appliances or public cloud deployments in Microsoft Azure. Trellix Intelligent Sandbox can be used with existing Trellix solutions and third-party email gateways. A tight product integration allows for efficient alert management, policy enforcement, and maintains throughput. Integration is further enhanced by OpenIOC and STIX support over TAXII.
  • 22
    Stands Fair AdBlocker Reviews
    Stands is an AdBlocker Fair that blocks popups, malware, ads, and trackers. It is lightweight, fast, and can speed up your browsing. You can agree to allow ads on certain websites. They can be sustainable and respect your choice. Advertisers and publishers both gain value from your browsing of the internet. Stands allows you to decide how many ads you are okay with. Stands stop companies from profiling you and selling your data without your consent. They also protect against malware, adware and trackers. Stands works behind-the scenes to alter the way ads are delivered to your browser. It ensures that you only see safe ads on websites that follow your preferences and participate in our fair advertising program. We are very concerned about your privacy. We are committed to privacy and have built Stands with this in mind. Our servers are encrypted and we have no way to link with you or your online activities.
  • 23
    AdClear Reviews

    AdClear

    SEVEN Networks

    Free
    AdClear Content Blocker prevents annoying ads from appearing in any browser or mobile app. It also protects you against malware-infected ads. AdClear Content Blocker has built-in DNS protection. This allows you to choose from a variety of DNS servers, or create your own. AdClear is the best non-root adblocker available for Android users. AdClear's technology blocks advertisers from affecting your browsing and app experience. Our adblocker blocks YouTube ads better than any other on the market. We also block encrypted ads. AdClear's Firewall, Doze, and adblocker combine to save battery, bandwidth, loading times, and protect users from malware-infected advertisements. It's also free! AdClear is here to help you keep advertisers away.
  • 24
    Better PopUp Blocker Reviews
    Original of Better Popup Blocker 2.1.6 has been modified and improved for everyone's convenience. A regular expression to recognize domains. Smarter popup block function. Block overlay content in a video player (remove ad). Add more iFrame block popup (more effective). Improved compatible script for filtering popup events. Improved popup feature, change default setting value.
  • 25
    Ads Killer Reviews

    Ads Killer

    Ads Killer

    Free
    Blocks banners, text ads and video ads. Ads Killer, Freedom from online ads! Are you tired of annoying ads? You want an extension that is simple and straightforward, with no confusing settings. Ads Killer blocks nearly all types of advertising on the Internet. Ads Killer works instantly. Just click "install" to go to any site and ads will be immediately blocked. Blocks all ads including banners and text ads as well as rich media (animated ads), pop ups, and web bugs tracking systems. It speeds up page loading and saves visitors traffic by not wasting time downloading ads. Protects against malicious and fraudulent websites. Ads Killer updates more frequently than other blockers so new ads won't bother your eyes. Protection against Internet bugs and surveillance. Advertising companies won't be able to track you anymore. Ads Killer doesn't ask for personal information. It also does not monitor your online activities.