Best IT Security Software for Google Chrome

Find and compare the best IT Security software for Google Chrome in 2024

Use the comparison tool below to compare the top IT Security software for Google Chrome on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    AVG AntiTrack Reviews
    Your fingerprint gets larger and more accurate the more you browse. Websites can be 99% certain who you are regardless of whether you're logged into or not. If we see someone trying to follow you, we will warn you and block them immediately. Or we'll make fake fingerprints to throw them off. Advertisers cannot build a portfolio by connecting dots as they browse. We make sure they don't connect the wrong dots. If retailers think you are willing to pay, prices online can be raised. We make sure they don't know about your shopping habits. AVG AntiTrack also erases browsing history and tracking cookies so that people on the other side of your screen don't know what else you've done online.
  • 2
    Ziroh Mail Reviews
    Even if you don’t exchange confidential email, isn’t it annoying that your email service provider has access to your emails backdoor? They can access it to any third party at any time. They create the rules with loopholes. What can a single eCommerce receipt reveal about you? What your taste in clothes is, what money you have in your wallet, how you prefer to pay, where you live, what device you use and so forth. It's alarming, isn't? It is because thousands of scammers and companies already are. Third parties have access to every detail about you. They can use it to get to understand you better, manipulate your buying habits, and sometimes impersonate and impersonate you online. You don't need to be confident in your email platform. Just do a simple search. All major email platforms have been hacked. You still feel safe? This privacy layer is quick and non-intrusive. It protects your email messages wherever they are and wherever they reach.
  • 3
    Bitdefender TrafficLight Reviews
    It is a cross-browser addon that intercepts, processes and filters all Web traffic. This prevents any malicious content from being blocked and increases browser security. You won't have to worry about any suspicious websites ever again. TrafficLight inspects and blocks all pages you visit to prevent malware and phishing attempts every time you visit them. Safe search results protect you from harm. Bitdefender TrafficLight will keep you informed about any malware or fraudulent websites in your search results.
  • 4
    KeeWeb Reviews

    KeeWeb

    KeeWeb

    Free
    Desktop apps look great on every platform: macOS and Windows, as well as Linux. Desktop apps allow you to open local files. You can switch between dark and lighter themes, depending on what you prefer. You can mark items with color and quickly find them using the colors tab. You can open multiple files and search for an entry or view all items in one file. Search works for all files. All you need is one search box. Drag and drop attachments and database files directly into the app. You can hide fields when you don't need them. They will be stored in memory in a safer manner than normal fields. You can create passwords of any length using only the symbols that you choose. You can refine your search by specifying fields, searching for passwords, history, and using powerful regular expressions syntax.
  • 5
    Feeltr Reviews

    Feeltr

    Feeltr

    €2.5 per month
    Because you are tired obscene ads, viruses, and data gathering. Because you want to browse at maximum speed and in complete confidence. It's more elegant, quicker, and safer. We created it because you wanted it. A simple, innovative tool. Feeltr allows you to communicate freely without your actions being monitored, without your data being threatened, without the content that you view being difficult to access and without being distracted by intrusive ads or solutions that analyze every move. We created Feeltr to revolutionize your Internet connection. You can now get rid of intrusive ads. Feeltr works with all web browsers. Be safe from malicious email. Feeltr can be used with webmail and software. Avoid hidden viruses. Feeltr works with office suites on your computer and in the cloud. Block information brokers that steal and monetize private data.
  • 6
    IE Tab Reviews

    IE Tab

    IE Tab

    $19 one-time payment
    IE Tab seamlessly and transparently runs them in Chrome, no more browser switching. IE Tab allows you to restrict its use so that it only appears on sites that require it. Chrome and IE Tab can be used to protect against Zero-Day IE Bugs. Full support for group policies. Set the URLs that you want to open in IE Tab, and then deploy them via group policy. Our customers include Fortune 500 Companies, Government Organizations, Non-Profits, Schools, and More. Every day, users from all over the world use IE Tab to perform their jobs. IE Tab will automatically open URLs if you provide filters. Use our ADMX Templates to configure Auto URL filters and lockdown other user features.
  • 7
    DigiRisk Reviews

    DigiRisk

    DigiRisk

    €15 per month
    DigiRisk.com gives you the benefit of a version that is installed and maintained by us. All you need is a browser such as Chrome, FireFox or another web browser. DigiRisk is responsive and works perfectly on tablets. You can quickly fill out your unique document on-site, take photos of your work units, risks, etc. A participatory approach, with the option to involve staff, and simplified access when entering health and safety records and signing prevention plans online, etc. Evarisk is the world's first open-source DigiRisk client. We use it daily, and we improve it with the feedback from our customers.
  • 8
    [D/Wallet] Reviews
    Manage your digital identity and assets with a streamlined interface. Our blockchain-based platform securely manages infrastructure without exposing credential-generating data, allowing access only to permitted participants, and ensuring all actions and business processes are tamper-proof, and permanently recorded as blockchain transactions. It is ideal for wide adoption because it eliminates the unpredictable and fluctuating fees associated with blockchain operations. It also simplifies the user's experience by eliminating the need to manage the gas fees. This allows users to focus more on their transactions and interactions in the blockchain ecosystem. The strong encryption of digital signings ensures that users' data is protected. Using social logins simplifies access. This integration offers a seamless and highly secure user experience. It reduces friction.
  • 9
    Easy Ad Blocker Reviews

    Easy Ad Blocker

    Easy Ad Blocker

    Free
    Easy Ad Blocker automatically removes ads, banners, and pop-ups to save you bandwidth, time, and patience. Easy Ad Blocker protects your data against the multitude of trackers, activity analyzers and other tracking tools that are swarming the web. Easy Ad Blocker will protect you from online scams and phishing sites. Easy Ad Blocker protects children online by blocking pornography, and other inappropriate content.
  • 10
    Nexus Lifecycle Reviews
    Ensure that your entire software supply chain is protected. Developers can use a Chrome browser extension to see if an open-source component is vulnerable when they select from public repositories. Developers can integrate to the most popular IDEs to quickly select the best components based upon real-time intelligence, and then move to an approved version in one click. Nexus Lifecycle integrates Eclipse, IntelliJ and Visual Studio. Nexus Lifecycle integrates to GitHub, GitLab and Atlassian Bitbucket in order to automatically generate pull request for components that violate open-source policies. Developers can see which versions they should use to fix violations. No more guessing which version to upgrade to. Because Nexus Intelligence is the only automated dependency management solution that can eliminate noise, developers can trust that the PRs are accurate.
  • 11
    Akeyless Vault Reviews
    Secure vaults allow you to automate and protect access to credentials, keys and tokens across your DevOps tools, Cloud platforms, and API-Keys using your Cloud platforms.
  • 12
    TruSTAR Reviews
    TruSTAR's cloud-native Intelligence Management Platform transforms intelligence from third parties and historical events for seamless integration. It also accelerates automation across core detection and orchestration tools. TruSTAR transforms intelligence to enable seamless integration and actionable automation across your entire ecosystem of tools and teams. TruSTAR is platform-independent. You can get investigation context and enrichment within your mission-critical security tools. Our Open API allows you to connect to any app, anywhere. Automate detection, triage and investigation from one endpoint. Enterprise security management is about managing data to enable automation. TruSTAR normalizes intelligence and prepares it for orchestration, greatly reducing the complexity of playbooks. Spend less time wrangling data and more time catching bad guys. TruSTAR was designed to offer maximum flexibility.
  • 13
    IBM Security Trusteer Reviews
    IBM Security Trusteer allows you to identify customers and protect yourself against malicious users across all channels. IBM®, Security Trusteer®, helps organizations detect fraud, authenticate user and establish identity trust throughout the omnichannel customer journey. Trusteer uses cloud-based intelligence and patented machine learning to identify new and existing customers and improve the user experience. Trusteer is trusted by more than 500 companies to support their digital journeys and business growth. Transparently identify unauthorized access. Establish cross-organizational, actionable insights through real-time assessments. Reduce operational costs, assess risk, and improve security and efficiency. Behavioral biometrics, AI, and machine learning can help you outsmart account takeovers. This will allow you to build digital identity trust.
  • 14
    Island Reviews
    Island gives the enterprise complete control over the browser. This allows for greater visibility, governance, and productivity. You can control where and when users copy/paste data into or out of applications, check device posture before granting access to an application, prevent unauthorized screen captures from being taken, manage extension permissions, workflow enforcement. Policy-based storage, network tag, geo-fencing, policy-based storage, policy-based storage, policy-based management, workflow enforcement, workflow enforcement, workflow enforcement, workflow enforcement, workflow enforcement, workflow enforcement, workflow execution, workflow enforcement, workflow enforcement, work flow enforcement, workflow enforce, workflow compliance, You need to understand the whole story of user activity and experience. You can trace incidents down to the user's device, time and place. All browser data can be fed into your analytics platforms, so you have all the information you need. You can customize Island to reflect your company's brand, messaging, or workflows. Even insert browser-based RPA scripts can be used to protect sensitive data according to your specific governance requirements. Island is built on Chromium. This open-source project powers Chrome, Edge and other major browsers.
  • 15
    Iraje Privileged Access Manager Reviews
    Privileged accounts are available everywhere. There are many types and locations for privileged accounts. They are different from other accounts in that they can read, write, alter and modify. Privileged Access Management (PAM), refers to systems that manage, secure, manage, and monitor accounts of users with elevated permissions to corporate assets. Anyone with superuser privileges in an organization can crash your enterprise systems, change passwords, delete data, or create new accounts. This could be due to carelessness, incompetence, or malicious intent. Accounts with superuser privileges (including shared accounts) are essential. It is impossible to run enterprise IT systems without giving access to certain people for system-level tasks.
  • 16
    LessPass Reviews
    Stop wasting time synchronizing encrypted vaults. To access your passwords from any device, anywhere, anytime, or from any device, remember one master password. LessPass creates a unique password by using a site, login and a master password. LessPass doesn't require you to sync your password vault across all devices or to the cloud. You can change the generated password without having to change your master password. Increase the counter field in your options.
  • 17
    Phish Alerts Reviews
    Phish Alerts, a company based in the United States, offers a Chrome Extension that protects users against phishing attacks. It does this by identifying and blocking malicious sites that attempt to steal personal or financial data. Phishing is one of the most dangerous cyber threats that exists today. It can lead to identity theft or fraud as well as malware infection. Phish Alerts helps users avoid being lured into phishing websites using the latest technology to detect them and alert them in real time. Phish Alerts educates users about what to look out for in phishing emails or websites, and provides an additional layer of security when browsing the internet.
  • 18
    Red Access Reviews
    The core of hybrid work is browsing, which has become a primary target for attackers. Red Access secures hybrid workplaces with the first agentless browser security platform. It introduces a non-disruptive method to protect devices and browsing session in and out of the office. Red Access allows companies to secure all browsing activities of their staff on any browser, web application, device, and cloud service. This is done without affecting productivity or requiring the installation of a browser extension. No need to update browsers every time a zero-day is discovered. Integration with all web browsers and applications. Prevent modern threats to browsing, files, identities and data.
  • 19
    Symantec Web Isolation Reviews
    Symantec Web Isolation executes sessions away from the endpoints. It sends only a safe rendering to users' browsers, preventing zero-day malware delivered by websites from reaching your devices. Isolation is used in conjunction with Symantec Secure web gateways to redirect traffic from URLs or uncategorized sites with suspicious or potentially dangerous risk profiles. Web Isolation integrates with Symantec messaging products to isolate links in emails, preventing phishing attacks and credential attacks. Web Isolation protects users from emails that contain links to malicious websites. This prevents malware, ransomware, and other advanced attacks. It also prevents users submitting corporate credentials or other sensitive information to malicious websites that are unknown. Pages are rendered in read-only mode.
  • 20
    Google Advanced Protection Program Reviews
    The Advanced Protection Program protects users with sensitive information and high visibility from targeted online attacks. To defend against the wide range of threats that exist today, new protections are added automatically. Gmail blocks more than 100 million phishing attacks every day. But sophisticated phishing techniques can trick even the most savvy users to give their sign-in credentials away to hackers. Advanced Protection requires that you use a security code to verify your identity when signing in to your Google Account. Unauthorized users will not be able sign in without your username or password. Chrome's Safe Browsing protects 4 billion devices from risky websites, and Advanced Protection performs more stringent checks for each download. It can flag or block you from downloading files that could be harmful. Only apps from verified stores are allowed, such as Google Play Store or your device manufacturer's store.
  • 21
    Prompt Security Reviews
    Prompt Security allows enterprises to benefit from Generative AI adoption while protecting their applications, employees, and customers from the full spectrum of risks. Prompt Security inspects every prompt and model response at every touchpoint where Generative AI is used in an organization, from AI tools for employees to GenAI integrations into customer-facing products. This helps to protect against GenAI-specific threats, prevent the exposure and blocking of sensitive data. The solution provides enterprise leaders with full visibility and governance of the AI tools they use within their organization.
  • 22
    Doppel Reviews
    Detect phishing scams in websites, social media, mobile apps stores, gaming platforms and more. Next-gen computer vision and natural language models can identify the most impactful phishing attacks. Track enforcements using an audit trail that is automatically generated by our no-code interface. Stop fraudsters before they can scam your team and customers. Scan millions of sites, social media accounts and mobile apps. AI is used to classify brand infringements and phishing scams. Remove threats automatically as soon as they are detected. Doppel's system integrates with domain registrars and social media. It also integrates with digital marketplaces, app stores, dark web, digital marketplaces and other platforms. This gives you a comprehensive view and automated protection from external threats. This offers automated protection from external threats.
  • 23
    SURF Security Reviews
    Create a security gap, reduce the attack surface, and isolate your business against internal and external exploits while streamlining SaaS applications and accessing your information. Access to SaaS and on-premise apps is granted based on user identity and device. By encrypting content, sandboxing it, and rendering it, you can isolate your work environment from web and device threats. Enforcing enterprise security policies such as DLP, web filters, phishing protection and extension management. SURF applies Zero-Trust principles via the browser to protect everyone and everything within the enterprise, regardless of their role. By configuring a few policies, the IT and security teams are able to reduce the attack surface. Learn the benefits of using SURF in an information technology perspective.
  • 24
    LimaCharlie Reviews
    LimaCharlie SecOps Cloud Platform can help you build a flexible, scalable security program with the same speed as threat actors. LimaCharlie SecOps Cloud Platform offers comprehensive enterprise protection by integrating critical cybersecurity capabilities. It also eliminates integration challenges, allowing for more effective protection from today's threats. SecOps Cloud Platform is a unified platform that allows you to build customized solutions with ease. It's time to bring cybersecurity into the modern age with open APIs, automated detection and response mechanisms and centralized telemetry.
  • 25
    ManageEngine Browser Security Plus Reviews
    Browser Security software protects sensitive enterprise data from cyberattacks. Browser Security Plus is an enterprise browser security software that IT administrators can use to manage and secure their browsers across networks. It allows them to monitor browser usage trends, manage browser extensions and plug-ins and lock down enterprise browsers. Administrators can use this tool to protect their networks against cyberattacks such as ransomware, trojans, watering holes attacks, phishing attacks, viruses, ransomware, ransomware, and trojans. Get complete visibility into the browser usage trends and addons across your network. Identify which add-ons are susceptible to security breaches. Add-on Management allows you to manage and secure browser add-ons.