Best IT Security Software for Notus

Find and compare the best IT Security software for Notus in 2024

Use the comparison tool below to compare the top IT Security software for Notus on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Google Cloud Platform Reviews
    Top Pick

    Google Cloud Platform

    Google

    Free ($300 in free credits)
    55,132 Ratings
    See Software
    Learn More
    Google Cloud is an online service that lets you create everything from simple websites to complex apps for businesses of any size. Customers who are new to the system will receive $300 in credits for testing, deploying, and running workloads. Customers can use up to 25+ products free of charge. Use Google's core data analytics and machine learning. All enterprises can use it. It is secure and fully featured. Use big data to build better products and find answers faster. You can grow from prototypes to production and even to planet-scale without worrying about reliability, capacity or performance. Virtual machines with proven performance/price advantages, to a fully-managed app development platform. High performance, scalable, resilient object storage and databases. Google's private fibre network offers the latest software-defined networking solutions. Fully managed data warehousing and data exploration, Hadoop/Spark and messaging.
  • 2
    Forcepoint DLP Reviews
    Data protection doesn't have to be a hindrance to business productivity. Forcepoint's focus is on unified policies and user risk. This makes data security intuitive and frictionless. The industry's most comprehensive pre-defined policy library allows you to view and control all your data. Ensure regulatory compliance in 80+ countries, including GDPR, CCPA, and more. Boldon James and Azure Information Protection allow data classification. You can replace broad, general rules with personalized, adaptive data security that doesn’t slow down your employees. You can only block actions where you are required, which will increase productivity. Protect PII, PHI, company financials and credit card data. Protect intellectual property (IP), in both structured and unstructured forms. Stop low and slow data theft even when users are not connected to the internet.
  • 3
    FortiGate IPS Reviews
    Comprehensive threat protection with an intrusion prevention system. An intrusion prevention (IPS) system is an essential component of any network's core security capabilities. It protects against known threats as well as zero-day attacks, including malware and other vulnerabilities. Many solutions can be deployed inline as a bump in a wire and perform deep packet inspections of traffic at wire speed. This requires high throughput, low latency, and high throughput. FortiGate, an industry-recognized platform for delivering this technology to Fortinet, is the channel through which it is delivered. FortiGate security processors offer unparalleled high performance. FortiGuard Labs provides industry-leading threat intelligence. This creates a proven record in protecting against known and zero-day threats. FortiGate IPS is a key component in the Fortinet Security Fabric. It protects the entire infrastructure without compromising performance.
  • 4
    IBM QRadar EDR Reviews
    Secure endpoints against cyberattacks. Detect anomalous behavior in real-time and remediate. IBM®, QRadar®, EDR remediates known or unknown endpoint threats with ease-of-use intelligent automation, requiring little to no human interaction. With attack visualization storyboards, you can make quick, informed decisions and use automated alert management. A user-friendly interface and AI capabilities that are constantly learning put security staff in control, and help to safeguard business continuity. The average organization manages thousands of endpoints, which are the most vulnerable and exploited parts of any network. As malicious and automated cyber activities targeting endpoints increase, organizations that rely solely on traditional endpoint protection methods are left struggling to protect themselves against attackers who easily exploit zero-day vulnerabilities and launch a barrage ransomware attacks.
  • 5
    Lansweeper Reviews

    Lansweeper

    Lansweeper

    $495.00/year
    1 Rating
    Lansweeper can help you discover your IT and build your central IT Asset System of Record. You can easily audit all assets within your company's network using the Lansweeper Deepscan IP scanner engine. You can create a network inventory that includes all hardware, software, and users. Scan Windows, Linux, or Mac devices. Keep track of all your licenses, serial numbers, and warranties from major brands such as Dell, IBM and HP. Detect Unauthorized Local Admins and unify Office 365/AD User Data. Get the netbios domain, check for Windows Updates and more. You can discover all assets in your IT environment you didn't know about and take full control over your network. Get your free trial to get started with IT asset management.
  • 6
    Splunk Cloud Platform Reviews
    Splunk is a secure, reliable, and scalable service that turns data into answers. Our Splunk experts will manage your IT backend so you can concentrate on your data. Splunk's cloud-based data analytics platform is fully managed and provisioned by Splunk. In as little as two days, you can go live. Software upgrades can be managed to ensure that you have the most recent functionality. With fewer requirements, you can tap into the data's value in days. Splunk Cloud is compliant with FedRAMP security standards and assists U.S. federal agencies, their partners, and them in making confident decisions and taking decisive actions at rapid speed. Splunk's mobile apps and augmented reality, as well as natural language capabilities, can help you increase productivity and contextual insight. Splunk solutions can be extended to any location by simply typing a phrase or tapping a finger. Splunk Cloud is designed to scale, from infrastructure management to data compliance.
  • 7
    Qualys VMDR Reviews
    The industry's most flexible, extensible and scalable solution for vulnerability management. Qualys' VMDR is fully cloud-based and provides global visibility into your IT assets and how to protect them. Enterprises are empowered with visibility into cyber risk exposure and can use it to prioritize assets, vulnerabilities, or groups of assets according to business risk. Security teams can take steps to reduce risk. This helps businesses measure their true risk and track the progress of risk reduction. You can identify, assess, prioritize, patch and fix critical vulnerabilities in real-time across your global hybrid IT, OT and IoT landscape. Qualys TruRisk™, which measures risk across assets, vulnerabilities, and groups, can help you organization prevent risk exposure and track the risk reduction over time.
  • 8
    Nessus Reviews
    Top Pick
    More than 30,000 organizations around the world trust Nessus as the most widely used security technology on the planet. It is also the gold standard in vulnerability assessment. Since the beginning, we have worked closely with the security community. Nessus is continuously optimized based on community feedback in order to provide the best vulnerability assessment solution available. Twenty years later, we are still focused on community collaboration and product innovations to provide the most complete and accurate vulnerability data. This will ensure that you don't miss critical issues that could expose your organization's vulnerabilities. Today, Nessus has been trusted by over 30,000 organizations around the world as the best vulnerability assessment tool and security technology.
  • 9
    CrowdStrike Falcon Reviews
    Top Pick
    The Falcon Platform is flexible, extensible, and adaptable when it comes to your endpoint security requirements. You can choose from the bundles listed above or any of these modules. Additional modules can be added to Falcon Endpoint Protection packages. Individual modules can be purchased without the need for a Falcon Endpoint Protection bundle. Customers who have more stringent compliance requirements or operational requirements will find our specialized products useful.
  • 10
    Trellix Endpoint Security (HX) Reviews
    Trellix Endpoint Security HX performs targeted, fast forensic investigations on thousands of endpoints. Protect and empower your employees with an integrated security system that protects all endpoints. Trellix Endpoint Security Solutions apply proactive threat intelligence, defenses and protections across the entire attack cycle to keep your organization more resilient and safer. Keep your endpoints safe in today's dynamic threats landscape. Discover how our integrated suites of endpoint protection technology can help you monitor threats and avert them by combining machine learning and actionable intelligence. Endpoint security is a practice that involves safeguarding data and workflows on the devices that connect to the network. Endpoint protection platforms (EPPs) examine files as they enter your network.
  • 11
    Microsoft Defender for IoT Reviews

    Microsoft Defender for IoT

    Microsoft

    $0.001 per device per month
    Continuous asset discovery, vulnerability management, threat detection, and continuous asset discovery for your Internet of Things and operational technology devices (OT). Ensure IoT/OT innovation by accelerating IoT/OT innovation through comprehensive security across all IoT/OT devices. Microsoft Defender for IoT is an agentless, network-layer security solution that can be quickly deployed by end-user organizations. It works with diverse industrial equipment and integrates with Microsoft Sentinel and other SOC tools. You can deploy on-premises and in Azure-connected environments. Microsoft Defender for IoT is a lightweight agent that embeds device-layer security in new IoT/OT initiatives. Passive, agentless network monitoring allows you to get a complete inventory and analysis of all your IoT/OT assets. This is done without any impact on the IoT/OT networks. Analyze a variety of industrial protocols to identify the device details, including manufacturer, type, firmware level, IP or Media Access Control address.
  • 12
    ManageEngine AD360 Reviews
    AD360 is an integrated identity management (IAM), solution that manages user identities, controls access to resources, enforces security, and ensures compliance. AD360 allows you to perform all your IAM tasks using a simple and easy-to-use interface. All these functions are available for Windows Active Directory, Exchange Servers and Office 365. You can choose the modules that you need and get started addressing IAM issues across hybrid, on-premises, and cloud environments with AD360. You can easily provision, modify, and deprovision mailboxes and accounts for multiple users from one console. This includes Exchange servers, Office 365, G Suite, and Office 365. To bulk provision user accounts, you can use customizable templates for user creation and import data from CSV.
  • 13
    Delinea Privilege Manager Reviews
    Privilege Manager is the most complete endpoint privilege elevation and control solution, and it operates at cloud speed. By removing administrative rights from local endpoints and implementing policies-based controls on applications, you can prevent malware exploiting these applications. Privilege Manager prevents malware attacks and does not cause any friction for end users. This slows down productivity. Privilege Manager is available on-premises or in the cloud. Fast-growing companies and teams can manage hundreds to thousands of machines using Privilege Manager. Privilege Manager makes it easier than ever for executives and auditors to manage endpoints. It includes built-in application control, real time threat intelligence, and actionable reports.
  • 14
    Active Directory Reviews

    Active Directory

    Microsoft

    $1 per user per month
    Active Directory stores information about objects in the network and makes it easy for administrators and users find and use this information. Active Directory uses a structured database store to organize directory information in a hierarchical, logical way. This data store, also known by the directory, contains information about Active Directory object. These objects usually include shared resources like servers, volumes and printers as well as the network user account and computer accounts. See Directory data store for more information on Active Directory. Active Directory security is integrated through logon authentication. This allows for access control to objects within the directory. Administrators can manage their directory and organization through one network logon. Authorized network users have access to all resources on the network. The management of complex networks can be made easier by policy-based administration.
  • 15
    HCL BigFix Reviews
    HCL BigFix is the AI Digital+ endpoint management platform that leverages AI to improve employee experience and intelligently automate infrastructure management. HCL BigFix offers complete solutions to secure and manage endpoints across nearly 100 different operating systems, ensure continuous compliance with industry benchmarks, and revolutionize vulnerability management with award-winning cybersecurity analytics. HCL BigFix is the single solution to secure any endpoint, in any cloud, across any industry. HCL BigFix is the only endpoint management platform enabling IT Operations and Security teams to fully automate discovery, management & remediation – whether on-premise, virtual, or cloud – regardless of operating system, location, or connectivity. Unlike complex tools that cover a limited portion of your endpoints and take days or weeks to remediate, BigFix can find and fix endpoints faster than any other solution – all while enabling greater than 98% first-pass patch success rates.
  • 16
    Rapid7 InsightVM Reviews
    You can better understand the risks in your current environment and work with technical teams. InsightVM's shared view and common language can bring together traditionally siloed groups and help drive impact. You can take a proactive approach to security by tracking and establishing metrics that will help you track progress and create accountability. InsightVM not only provides visibility into the vulnerabilities in your modern IT environment--including local, remote, cloud, containerized, and virtual infrastructure--but also clarity into how those vulnerabilities translate into business risk and which are most likely to be targeted by attackers. InsightVM isn't a magic bullet. It provides the shared view and common language that are needed to bring together traditionally siloed groups and drive impact. It supports proactive vulnerability management through tracking and metrics that provide accountability for remediators, demonstrate the impact across teams, celebrate progress, and encourage celebrations.
  • 17
    Tenable One Reviews
    Tenable One unifies security visibility and insight across the attack surface. This allows modern organizations to isolate and eliminate priority cyber exposures, from IT infrastructure, cloud environments, critical infrastructure, and everywhere else. The only AI-powered exposure platform in the world. Tenable's leading vulnerability management sensors allow you to see every asset on your entire attack surface, from cloud environments to operational technology, infrastructure to containers and remote workers to web-apps. Tenable's machine learning-powered predictions, which include more than 20 trillion aspects related to threat, vulnerability and misconfiguration information, reduce remediation effort by allowing you to focus on the most important risks. By communicating objective measures of risks, you can drive improvements to reduce the likelihood of a business impacting cyber event occurring.
  • 18
    Nexpose Reviews
    Software to manage vulnerability and help you act in the moment of impact Every day, vulnerabilities are discovered. It takes constant intelligence to identify them, locate them and prioritize them for your company. Once you have confirmed that your exposure has been reduced, you can confirm it. Rapid7's on-premises vulnerability management software Nexpose monitors your exposures and adapts to new threats using fresh data. This allows you to always take action at the point of impact. InsightVM, our platform-based vulnerability management system, offers more advanced capabilities, such as Remediation Workflow or Rapid7's universal Insight Agent. How old is your data? Is it only a few days? A few days? Nexpose will never let you wait for intel to be available. Our vulnerability management software gives you a live view on your constantly changing network.
  • 19
    Delinea Secret Server Reviews
    Our enterprise-grade Privileged Access Management solution (PAM), will protect your privileged accounts. Available on-premise and in the cloud. Solutions for privileged account discovery, turnkey installations, auditing and reporting tools as well as out-of-the box auditing and reporting help you get up and running quickly. You can manage multiple databases, software applications and hypervisors. You can create endless customizations by utilizing cloud and on-premise PAM. You can either work with professionals or your own experts. Secure administrator, root, service, and application privileges across your enterprise. Secure your privileged credentials in a central vault. To prevent sprawl and get a complete view of your privilege access, identify all service, administrator, root, and application accounts. Provision and deprovision, password complexity and rotation credentials.
  • 20
    Microsoft Defender for Endpoint Reviews
    You can gain an edge over sophisticated threats such as ransomware and nation state attacks. To prioritize risks and improve your security posture, give time back to defenders. You can move beyond endpoint silos and improve your security by establishing a foundation for XDR (zero trust) and other principles. Microsoft Defender for Endpoint provides industry-leading endpoint protection for Windows, macOS Linux, Android, iOS and network devices. It helps you quickly stop attacks, scale security resources, and improve your defenses. It is delivered at cloud scale with built-in AI which analyzes the largest threat intelligence in the industry. Our comprehensive solution allows you to discover all endpoints and network devices in your environment. It provides endpoint protection, endpoint protection, mobile threat defense, endpoint detection, and response (EDR) all in one, unified platform.
  • 21
    VMware vSphere Reviews
    Get the power of enterprise workload engine. Boost workload performance and improve security for your business. vSphere provides essential services for a modern hybrid cloud. The new vSphere is rearchitected using native Kubernetes, allowing it to run both existing enterprise applications and modern containerized apps in a unified way. Transform your on-premises infrastructure by integrating cloud services. Boost productivity through central management, global insight and automation. Add-on cloud services can boost your productivity. Accelerate networking functions to meet the throughput and latencies of distributed workloads. Free up GPU resources to train AI/ML models faster and for higher complexity models.
  • 22
    Trend Micro Deep Security Reviews
    You can get streamlined with a complete range of workload security capabilities. Protect your cloud-native apps, platforms, data, and data in any environment using one agent. Deep Security seamlessly works in the cloud thanks to its strong API integration with Azure, AWS, and other platforms. Deep Security protects sensitive enterprise workloads without you having to create and maintain your own security infrastructure. You can accelerate and maintain compliance in hybrid and multi-cloud environments. AWS and Azure offer many compliance certifications. However, you are still responsible to secure the workloads that you place in the cloud. With one security product, you can secure servers across the cloud and data center. You no longer need to worry about product updates or hosting. Quick Start AWS CloudFormation templates are available for NIST or AWS Marketplace. These host-based security controls can be deployed automatically even if auto-scaling is enabled.
  • 23
    Microsoft Intune Reviews
    Modernize IT service delivery to your workplace. Microsoft Intune enables you to simplify modern workplace management and achieve digital transform with Microsoft Intune. Microsoft Intune creates the most productive Microsoft 365 environment that allows users to work on any device or app they choose while protecting their data. Securely manage iOS and macOS devices using a single management solution. Automate deployment, provisioning and policy management. App delivery and updates can be automated. A highly scalable, distributed cloud service architecture ensures you stay up-to-date. The intelligent cloud provides insights and baselines that will help you to set security policies and configure settings. Protect data by ensuring that you don't have to manage the devices of employees or partners who access work files. Intune app protection policies provide granular control over Office 365 data on mobile devices.
  • 24
    Palo Alto Networks DNS Security Service Reviews
    Palo Alto Networks DNS Security Service is a cloud-based analytics platform that provides your firewall access to DNS signatures generated by advanced predictive analysis and machinelearning. It also includes malicious domain data from a growing threat information sharing community. The DNS Security subscription service will increase your protection against DNS threats. DNS Security now offers individually configurable and extensible DNS Security Signature Categories. This allows you to create separate security policies based upon the risk factors associated certain types of DNS traffic. DNS Security now protects against additional DNS-based threats such as those that rely upon dynamic DNS hosted domains and recently registered domains.
  • 25
    Tufin Reviews
    Tufin allows organizations to automate their security policy visibility and risk management across their multi-vendor hybrid environment. Customers have visibility and control over their network. They can also ensure compliance with security standards throughout their development and workflows. Your organization's business agility will be improved by eliminating the security bottleneck. Manual approaches to managing network changes can be slow and error-prone, leading to potential security risks. Tufin's policy based automation is used by organizations around the globe to automate visibility, provisioning, and maximize business agility. In today's fragmented and complex networks, it is difficult to maintain and demonstrate compliance with industry regulations and internal policies. Tufin allows enterprises to maintain audit readiness and ensure continuous compliance.
  • Previous
  • You're on page 1
  • 2
  • Next