Best IT Security Software for HTML

Find and compare the best IT Security software for HTML in 2024

Use the comparison tool below to compare the top IT Security software for HTML on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    SonarQube Reviews
    SonarSource creates world-class products to ensure Code Quality and Security. SonarQube, our open-source and commercial code analysis tool - SonarQube -- supports 27 programming languages. This allows dev teams of all sizes to resolve coding issues in their existing workflows.
  • 2
    Kiuwan Code Security Reviews
    Top Pick
    Security Solutions for Your DevOps Process Automate scanning your code to find and fix vulnerabilities. Kiuwan Code Security is compliant with the strictest security standards, such OWASP or CWE. It integrates with top DevOps tools and covers all important languages. Static application security testing and source analysis are both effective, and affordable solutions for all sizes of teams. Kiuwan provides a wide range of essential functionality that can be integrated into your internal development infrastructure. Quick vulnerability detection: Simple and quick setup. You can scan your area and receive results in minutes. DevOps Approach to Code Security: Integrate Kiuwan into your Ci/CD/DevOps Pipeline to automate your security process. Flexible Licensing Options. There are many options. One-time scans and continuous scanning. Kiuwan also offers On-Premise or Saas models.
  • 3
    ALTCHA Reviews

    ALTCHA

    BAU Software s.r.o.

    0
    ALTCHA is a CAPTCHA alternative which uses a proof of work mechanism to protect websites and online services against spam. ALTCHA uses a mechanism of proof-of-work to protect your website, online services, and APIs from spam and unwanted material. Unlike other solutions ALTCHA is open-source, self-hosted and free. It does not require external services and does not use fingerprinting or cookies.
  • 4
    CodeSandbox Reviews

    CodeSandbox

    CodeSandbox

    $12 per month
    CodeSandbox aims to make it easier for you to express your ideas with code, and to validate them. It also removes the hassles of setting up development tooling and sharing your project. Join us to help build the future of web coding. Over 4M developers use the platform each month. This includes organizations like Shopify and Atlassian. Since its launch, creators have created over 35M apps. It's used in thousands of open-source projects like React, Vue and Babel. You can invite your friends, colleagues, or team to join you or simply view your creation by using a URL. Use any of 1M+ packages for building real, powerful applications quickly and efficiently. Import and run repos directly from GitHub or choose from hundreds of templates to start in seconds. Boxy, CodeSandbox's AI-powered coding assistant, is now available to all Pro subscriptions.
  • 5
    Snappytick Reviews

    Snappytick

    Snappycode Audit

    $549 per month
    Snappy Tick Source Edition is a source-code review tool that helps to identify vulnerabilities in source code. We offer Source Code Review and Static Code Analysis tools. An In-line auditing approach will help you identify the most important security issues in your application. It will also verify that there are adequate security controls. SnappyTick Standard Edition (DAST), is a Dynamic application security tool that performs grey box and black box testing. Analyze the responses and requests to find vulnerabilities in an application. This can be done while the applications are still running. SnappyTick has amazing features. Multilingual scanning is possible. The best reporting that highlights the exact source files, line numbers, subsections, and even lines that are affected.
  • 6
    sysPass Reviews
    Multi-user password manager that is intuitive, secure, and intuitive. sysPass will guide you through many features without any prior knowledge. To provide a better user experience, sysPass was built on top of HTML5 technology and PHP technologies. No spaghetti code, just designed to be maintained and tested. AES-256 CTR for stronger password encryption and RSA for securely sending data. Your data will be secure wherever you store it. You can audit the code and make improvements to it. Then you can be confident in how it behaves. It is a powerful web application that allows password management to be done securely and collaboratively. It offers many options to help you share passwords among teams, departments, customers, and customers. These include ACLs, profiles (custom fields), preset values, public links, and ACLs. The web interface allows you to configure options such as LDAP auth and mail, auditing, backup, export, import/export, and more.
  • 7
    FortiIsolator Reviews
    FortiIsolator helps organizations protect their most important, high-value targets from threats. Remote browser isolation allows users browse the web in a safe environment. FortiIsolator provides a complete solution for remote browser isolation that does not require installation on the user's device or computer. The end-user is protected from any web activity by a remote isolation environment. Clientless browser isolation renders safe content quickly for the end-user. This advanced layer of protection will increase the security of your high-value data. By rendering lighter-weight content, you can prevent PC issues and allow personnel to focus on support.
  • 8
    urlscan.io Reviews

    urlscan.io

    urlscan.io

    $500 per month
    urlscan.io offers a free service for scanning and analyzing websites. When a URL has been submitted to urlscan.io an automated process will browse the URL as if it were a regular user, and record any activity created by this page navigation. This includes the domains, IPs, and resources (JavaScripts, CSSs, etc.). The information requested from these domains as well as the page itself is also included. urlscan.io takes a screenshot of the webpage and records the DOM, JavaScript global variables and cookies created by the site, among other observations. If the site targets users of any of the 900+ brands tracked by urlscan.io then it will be highlighted in the scan results as potentially malicious. Our mission is to enable anyone to confidently and easily analyze unknown and potentially malignant websites. You can use urlscan.io in the same way you would use malware sandboxes to analyze suspicious files.
  • 9
    GoAccess Reviews
    GoAccess is a real-time, interactive web log analyzer that runs in a terminal or browser on Unix-like operating systems. It is designed for rapid analysis and provides immediate HTTP statistics. This makes it ideal for system admins who need to quickly understand server performance. The tool supports a variety of web log formats including those from Apache Nginx Elastic Load Balancing CloudFront Caddy CloudFront and Amazon S3. Users can easily set the log format, and analyze logs. GoAccess is written in C and only requires ncurses to run, ensuring millisecond-level update speed. It allows users to customize color schemes on the terminal and web-based dashboards. GoAccess is capable of generating comprehensive real-time HTML and JSON reports. This allows for analytics, monitoring, data visualization, and monitoring.
  • 10
    DexProtector Reviews
    Instant protection for iOS apps and Android apps against static and dynamic attacks With over ten million installations, DexProtector is a global leader in app defense and SDK protection. DexProtector is unique in its approach to protecting your apps. The native engine for Runtime Application Self Protection (RASP), works at the system level within the app. It then interacts directly with OS components. This allows it to control key processes and protect the most sensitive parts your libraries and apps. DexProtector creates layers of protection that stack on top of each other, protecting your code and assets. This protects your apps from real-time attacks and hardens them. One-click integration with your CI/CD. No coding required. Your apps and the communication channel with servers are protected. Secures your app from the operating system. Protects your app from both static and dynamic attacks
  • 11
    ELC Information Security Reviews
    Secure your workforce by educating your employees. More than 24 topics. Monthly and annual training in phishing and ransomware. Social engineering and more. The best defense is to be proactive. Customizations for security awareness include script edits and branding, as well as company-specific policies and contact information. Our security awareness training is compatible on smartphones, tablets and desktops. Customized security awareness training tailored to your company can save you time and increase productivity. We are committed to helping you and your employees adapt as the cybersecurity landscape rapidly changes. All our clients receive end-to-end customer support throughout the license period. Integration and customization takes only a few days, not several weeks. Learning management hosting, reporting, and tracking. We have everything you need to start today.
  • 12
    TrustDecision Reviews
    Identify unique devices and global historic data in real-time to distinguish between genuine users and possible threats. Device characteristics can change with time, making it difficult to recognize the same device. It is important to collect enough data while still respecting the privacy of users, especially in light of stringent data protection laws. It is important to stay up-to date and adaptable, as new devices and OSs are released regularly. Associating multiple profiles of devices with a single person to provide accurate cross-device tracking. Manipulate user-agent data sent by browsers and apps to imitate legitimate devices. It's difficult to maintain a unique ID for a device that has been tampered with or modified. Distinguishing each device, even under challenging conditions such as factory resets or tampered devices, detection of group control tool, script-based manipulations and app reinstalls.
  • 13
    SysTools Exchange Log Analyzer Reviews
    The option to save the scan file is available for loading the exchange log. Export Exchange files scanned into multiple file formats. Export Exchange files as PDF, MSG and HTML. Exchange log analyzer allows you to repair corrupt Exchange logs. Exchange log file can be analyzed with all its data. It does not limit the size of the edb.log. EDB file required to open and analyze Exchange log files. Supports multiple Exchange versions for extracting emails from Exchange database file. Exchange Log files can be filtered by date. The Exchange Log Analyzer can be used by a user to view and load the transaction edb.log from the Exchange server. The software will analyze the Exchange log file, and then provide a view to all the required information such as emails from Exchange Server 2016 2013, 2010, and 2007. To perform log analysis, you will also need an EDB file.
  • 14
    Cisco Secure Email Encryption Service Reviews
    Email remains the most popular tool for business collaboration, despite the growth of instant messaging, text messaging, and social networks. Email is unsecured, which exposes sensitive data to malicious attacks. The Cisco Secure Envelope Service (formerly Cisco Registered Envelope Service), provides enhanced security for traditional email tools. It is fully integrated with most email technologies, and users' daily email routines. Encryption can be triggered either by a policy or by a data loss prevention tool. Cisco Secure Email creates a key for encryption, then wraps it in an HTML envelope before delivering it to the recipient. When Envelope Storage has been enabled, the key as well as the message are temporarily stored in the Secure Email Encryption Service. The recipient clicks the link to view the message on any device. Secure Email Encryption Service uses technology that utilizes the most reliable email encryption algorithm available.
  • 15
    Checkmarx Reviews
    The Checkmarx Software Security Platform is a centralized platform for managing your software security solutions. This includes Static Application Security Testing, Interactive Application Security Testing and Software Composition Analysis. It also provides application security training and skill development. The Checkmarx Software Security Platform is designed to meet the needs of every organization. It offers a wide range of options, including on-premises and private cloud solutions. Customers can immediately start securing code without having to adapt their infrastructure to one method. The Checkmarx Software Security Platform is a powerful tool that transforms secure application development. It offers industry-leading capabilities and one powerful resource.
  • 16
    EBIOS Risk Manager Reviews
    Enjoy the strength of the EBIOS Risk Manager software, which is certified by the ANSSI. You can easily implement the various workshops and generate the reports and results you need for your cyber risk analysis. For the tooling of EBIOS Risk Manager, the Agile Risk Manager software was developed in partnership by ANSSI. ANSSI organizes a labeling procedure to ensure that the method's solutions are appropriate. Agile Risk Manager supports you in the management and implementation of risk analysis using EBIOS Risk Manager methodology. Use the strength of adaptable tooling to concentrate on the core values of EBIOS Risk Management, knowledge, agility, commitment. Agile Risk Manager is designed for clients who require a strong client solution, but also allows for efficient collaboration.
  • 17
    Resec Reviews
    Hackers love to target organizations via email, with over 300 billion emails being sent each day. Resec for Email offers superior protection against advanced threats from both cloud-based and on-premise mail services. Our solution allows users to open attachments and emails safely, without any delay and without unnecessary latency. Fully supported encryption of attachments increases security, reduces falsely blocked emails, and lowers IT overhead. Every email is considered a threat. Resec protects your organization from known and unknown malware attacks. No client-based footprint or agents. Flexible according to group-level policies. Easy to use and maintain. Superior protection against malware and ransomware attacks via emails and attachments.
  • 18
    CyberSiARA Reviews
    Prevention is always more cost-effective when it comes to fraud. CyberSiARA's intuitive traffic testing provides a proactive cyber-security approach that stops fraud at its tracks. The traffic classification capability distinguishes between real users and potential attackers using interactive enforcement challenges in real-time. This stops both automated and user-driven attacks. CyberSiARA uses powerful processes for traffic analysis to determine user intention. The system uses interactive challenges to test suspicious activity by identifying fraud indicators in traffic behavior. This allows legitimate users to have a seamless experience while attacks of all kinds are defeated. Innovative challenge strategies are used to stop traffic designed to overcome authentication challenges.
  • 19
    Symantec Web Isolation Reviews
    Symantec Web Isolation executes sessions away from the endpoints. It sends only a safe rendering to users' browsers, preventing zero-day malware delivered by websites from reaching your devices. Isolation is used in conjunction with Symantec Secure web gateways to redirect traffic from URLs or uncategorized sites with suspicious or potentially dangerous risk profiles. Web Isolation integrates with Symantec messaging products to isolate links in emails, preventing phishing attacks and credential attacks. Web Isolation protects users from emails that contain links to malicious websites. This prevents malware, ransomware, and other advanced attacks. It also prevents users submitting corporate credentials or other sensitive information to malicious websites that are unknown. Pages are rendered in read-only mode.
  • 20
    Syhunt Hybrid Reviews
    Syhunt dynamically injects information into web applications, analyzes the response and determines if the code is vulnerable. This automates web application security testing while protecting your organization's Web infrastructure from various types of web application threats. Syhunt Hybrid adheres to simple GUI standards that prioritize ease of use and automates the scanning process. This requires minimal or no user interaction before or during the scans, despite its large number of customization options. Compare previous scan sessions to determine if vulnerabilities have changed, remained the same or been removed. Create a comparison report to show the evolution of vulnerabilities in a target over time.
  • 21
    AppSec Labs Reviews
    AppSec labs is an application security company that ranks among the top 10 companies in the world. Our mission is to provide cutting-edge penetration testing, training/academy, and consulting. From design to production, we provide full-cycle application security consulting. Penetration testing services and security assessments for desktop, mobile, and web applications. Hands-on training in secure coding, penetration testing, and other security-related topics on multiple platforms. We work with clients from a variety of industries. We work with a variety of clients, including high-profile companies and small start-ups. We work with a wide range of companies in the fields of finance, technology, commerce, HLS and more. This allows us to assign the most suitable, experienced and naturally inclined team member to every client, ensuring the highest level service.
  • Previous
  • You're on page 1
  • Next