Best IT Security Software for Python

Find and compare the best IT Security software for Python in 2024

Use the comparison tool below to compare the top IT Security software for Python on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    New Relic Reviews
    Top Pick
    See Software
    Learn More
    Enhance IT Security with New Relic: Protect your enterprise with advanced threat detection and resilient defenses. Strengthen your security posture using New Relic’s powerful observability platform, crafted to give software engineers full visibility and control across the security landscape. Our solution provides real-time monitoring and sophisticated threat detection, allowing you to proactively detect and mitigate vulnerabilities before they affect your business. Integrate security insights seamlessly with your overall IT operations to ensure compliance, reduce risks, and safeguard vital assets. Boost your incident response, streamline security management, and align your security approach with organizational goals. With New Relic, reinforce your enterprise against emerging threats and foster a culture of proactive security and resilience.
  • 2
    Criminal IP Reviews

    Criminal IP

    AI SPERA

    $65/month
    1 Rating
    See Software
    Learn More
    Criminal IP is a cyber threat intelligence search engine that detects vulnerabilities in personal and corporate cyber assets in real time and allows users to take preemptive actions. Coming from the idea that individuals and businesses would be able to boost their cyber security by obtaining information about accessing IP addresses in advance, Criminal IP's extensive data of over 4.2 billion IP addresses and counting to provide threat-relevant information about malicious IP addresses, malicious links, phishing websites, certificates, industrial control systems, IoTs, servers, CCTVs, etc. Using Criminal IP’s four key features (Asset Search, Domain Search, Exploit Search, and Image Search), you can search for IP risk scores and vulnerabilities related to searched IP addresses and domains, vulnerabilities for each service, and assets that are open to cyber attacks in image forms, in respective order.
  • 3
    Files.com Reviews
    Top Pick
    See Software
    Learn More
    6,000+ companies trust Files.com to automate and secure business critical transfers. We obsess about security, compliance, reliability, and performance so your critical business processes just work every time. Easily manage any transfer flow without writing scripts or code, and onboard workloads and partners effortlessly. We support standard file transfer protocols (FTP, SFTP, AS2) for working with external partners and also provide native apps for high performance internal transfers. As a fully Cloud-Native SaaS, there are no servers for you to buy or maintain, there is no installation required, and high availability and redundancy are built in and free. Our InfoSec Program is audited annually by Kirkpatrick Price, a leading information security CPA firm. Our audit covers the scope of the entire Files.com business (not just datacenter operations) and names Files.com specifically. Beware of smaller competitors who try to pass off someone else’s audit as their own. Technical capabilities include encryption at-rest and in-transit, four types of two-factor authentication, nine enterprise identity (SSO) integrations, configurable password and session policies, and a perfect “A+” score from Qualys SSL Labs.
  • 4
    Kamatera Reviews
    Our comprehensive suite of cloud services allows you to build your cloud server your way. Kamatera’s infrastructure is specialized in VPS hosting. With 24 data centers around the world, including 8 in the US, as well as in Europe, Asia and the Middle East, you can choose from. Our enterprise-grade cloud server can meet your requirements at any stage. We use cutting edge hardware, including Ice Lake Processors, NVMe SSDs, and other components, to deliver consistent performance and 99.95% uptime. With a robust service such as ours, you'll get a lot of great features like fantastic hardware, flexible cloud setup, Windows server hosting, fully managed hosting and data security. We also offer consultation, server migration and disaster recovery. We have a 24/7 live support team to assist you in all time zones. With our flexible and predictable pricing plans, you only pay for the services you use.
  • 5
    Debricked Reviews
    Debricked's tool allows for greater use of Open Source while minimizing the risks. This makes it possible to maintain a high development pace while remaining secure. The service uses state-of-the-art machine learning to ensure that data quality is excellent and can be instantly updated. Debricked is a unique Open Source Management tool that combines high precision (over 90% in supported language) with flawless UX and scalable automation. Debricked has just released Open Source Select, a brand new feature that allows open source projects to be compared, evaluated, and monitored to ensure quality and community health.
  • 6
    SonarQube Reviews
    SonarSource creates world-class products to ensure Code Quality and Security. SonarQube, our open-source and commercial code analysis tool - SonarQube -- supports 27 programming languages. This allows dev teams of all sizes to resolve coding issues in their existing workflows.
  • 7
    Mend.io Reviews

    Mend.io

    Mend.io

    $12,000 per year
    1 Rating
    Mend.io’s enterprise suite of app security tools, trusted by leading companies such as IBM, Google and Capital One, is designed to help build and manage an mature, proactive AppSec programme. Mend.io is aware of the AppSec needs of both developers and security teams. Mend.io, unlike other AppSec tools that force everyone to use a unified tool, helps them work together by giving them different, but complementary tools - enabling each team to stop chasing vulnerability and start proactively management application risk.
  • 8
    Backslash Security Reviews
    Ensure the security and integrity of your code. Identify externally accessible data flows and vulnerabilities to effectively mitigate risk. By identifying the real attack paths that lead to reachable code we allow you to fix only code and open source software that are in use and reachable. Avoid overloading development teams with irrelevant vulnerability. Prioritize risk-mitigation efforts more effectively to ensure a focused and efficient approach to security. Reduce the noise CSPM and CNAPP create by removing non-reachable packages. Analyze your software components and dependencies to identify any known vulnerabilities or outdated library that could pose a risk. Backslash analyses both direct and transitive package, ensuring coverage of 100%. It is more effective than existing tools that only focus on direct packages.
  • 9
    Sematext Cloud Reviews
    Top Pick
    Sematext Cloud provides all-in-one observability solutions for modern software-based businesses. It provides key insights into both front-end and back-end performance. Sematext includes infrastructure, synthetic monitoring, transaction tracking, log management, and real user & synthetic monitoring. Sematext provides full-stack visibility for businesses by quickly and easily exposing key performance issues through a single Cloud solution or On-Premise.
  • 10
    Queue-it Reviews
    Top Pick
    Queue-it empowers the world's biggest brands to deliver on their busiest days. The virtual waiting room lets you control online traffic in high-demand situations to deliver superior experiences and treat visitors fairly. When online visitors exceed your capacity, they are redirected to a customizable waiting room and then throttled back to your website or app in a controlled first-come, first-served order. Additionally, the virtual waiting room gives you full control over traffic inflow to your site & app, acting as a security checkpoint where you block bots & abuse. You can validate customers based on unique identifiers like user ID or email address, ensuring only verified customers access your products. And enhanced analytics give you insight into the quantity & quality of your traffic so you can adapt bot mitigation for your next sale.
  • 11
    Aid4Mail Reviews
    Top Pick

    Aid4Mail

    Fookes Software Ltd

    $59.95
    12 Ratings
    Aid4Mail is a leading email processing tool from Switzerland. It comes in three editions: 1. Use Converter to collect and convert emails accurately, fast, and reliably. It supports all popular mail services (e.g. Office 365, Gmail, Yahoo! Mail) and mailbox file formats (e.g. PST, OST, OLM, mbox). It’s also a popular solution for preparing mail ingestion into archival, eDiscovery and forensics platforms. 2. Investigator adds powerful search queries based on Gmail and Microsoft 365 syntax, native pre-acquisition filters and Python scripting. Use its forensic features to recover deleted and hidden email, and process corrupt or unknown mail formats. 3. Enterprise adds support for Google Vault, Mimecast, and Proofpoint exports. Use it to migrate your company mail to live accounts (IMAP, Microsoft 365, Gmail). You can integrate its CLI seamlessly with your own tools. Enterprise offers flexible licensing options including installation on a server or on a shareable flash drive. Aid4Mail is used by Fortune 500 companies, government agencies and legal professionals around the world.
  • 12
    Kiuwan Code Security Reviews
    Top Pick
    Security Solutions for Your DevOps Process Automate scanning your code to find and fix vulnerabilities. Kiuwan Code Security is compliant with the strictest security standards, such OWASP or CWE. It integrates with top DevOps tools and covers all important languages. Static application security testing and source analysis are both effective, and affordable solutions for all sizes of teams. Kiuwan provides a wide range of essential functionality that can be integrated into your internal development infrastructure. Quick vulnerability detection: Simple and quick setup. You can scan your area and receive results in minutes. DevOps Approach to Code Security: Integrate Kiuwan into your Ci/CD/DevOps Pipeline to automate your security process. Flexible Licensing Options. There are many options. One-time scans and continuous scanning. Kiuwan also offers On-Premise or Saas models.
  • 13
    System Frontier Reviews
    Delegate granular management of servers, workstations, network devices and users to non-admins. Turn PowerShell, Python and other scripts into web tools to empower Tier 1 support teams. Every action maintains an audit trail and protects your IT operations with RBAC.
  • 14
    SecureStack Reviews

    SecureStack

    SecureStack

    $500/mo
    SecureStack can detect common security issues in your CI/CD pipeline and prevent them from getting into your applications. SecureStack automatically embeds security with every git push. Our technology is designed to check every aspect of your application security. We look for missing security controls and correct encryption. We also test the effectiveness of your WAF. All this was done in less than 60 seconds. You can see what hackers can see when they look at your applications. Compare your development, staging, and production environments to quickly identify critical differences and find solutions to high-priority issues. We help you to decompose your web app so you can see all the resources used behind the scenes.
  • 15
    Snyk Reviews
    Snyk is the leader in developer security. We empower the world’s developers to build secure applications and equip security teams to meet the demands of the digital world. Our developer-first approach ensures organizations can secure all of the critical components of their applications from code to cloud, leading to increased developer productivity, revenue growth, customer satisfaction, cost savings and an overall improved security posture. Snyk is a developer security platform that automatically integrates with a developer’s workflow and is purpose-built for security teams to collaborate with their development teams.
  • 16
    YAG-Suite Reviews

    YAG-Suite

    YAGAAN

    From €500/token or €150/mo
    The YAG Suite is a French-made innovative tool that takes SAST to the next level. YAGAAN is a combination of static analysis and machine-learning. It offers customers more than a sourcecode scanner. It also offers a smart suite to support application security audits and security and privacy through DevSecOps design processes. The YAG-Suite supports developers in understanding the vulnerability causes and consequences. It goes beyond traditional vulnerability detection. Its contextual remediation helps them to quickly fix the problem and improve their secure coding skills. YAG-Suite's unique 'code mining' allows for security investigations of unknown applications. It maps all relevant security mechanisms and provides querying capabilities to search out 0-days and other non-automatically detectable risks. PHP, Java and Python are currently supported. Next languages in roadmap are JS, C and C++.
  • 17
    LoginID Reviews
    LoginID's SKDs and APIs allow sites and apps to easily integrate our FIDO/FIDO2-certified multi-factor authentication solution. By leveraging the native biometrics on the end user's device, our platform creates a private/public key pair that enables strong customer authentication. The end user does not need to install any additional apps and the private key never leaves the secure area of their device. LoginID's transaction confirmation service is perfect for online merchants because it prompts a biometric action for each transaction which is then cryptographically signed. We are in alignment with PSD2, GDPR, CCPA, and HIPPA standards. LoginID has SDKs for iOS, Android, React-Native, Web, Python, Java, and Node as well as a WordPress Plugin.
  • 18
    Contrast Security Reviews
    Modern software development must be as fast as the business. The modern AppSec toolbox lacks integration, which creates complexity that slows down software development life cycles. Contrast reduces the complexity that hinders today's development teams. Legacy AppSec uses a single-size-fits all approach to vulnerability detection and remediation that is inefficient, costly, and expensive. Contrast automatically applies the most efficient analysis and remediation technique, greatly improving efficiency and effectiveness. Separate AppSec tools can create silos that hinder the collection of actionable intelligence across an application attack surface. Contrast provides centralized observability, which is crucial for managing risks and capitalizing upon operational efficiencies. This is both for security and development teams. Contrast Scan is a pipeline native product that delivers the speed, accuracy and integration required for modern software development.
  • 19
    SOOS Reviews

    SOOS

    SOOS

    $0 per month
    ​SOOS is the easy-to-setup software supply chain security solution. Maintain your SBOM and manage SBOMs from your vendors. Continuously monitor, find, and fix vulnerabilities and license issues. With the fastest time to implementation in the industry, you can empower your entire team with SCA and DAST–no scan limits.​
  • 20
    Vault Vision Reviews

    Vault Vision

    Vault Vision

    $25/month for 10k users
    User auth for web and mobile apps with industry-leading security and passwordless login convenience for end users. Vault Vision's low-code user authentication platform allows applications to securely manage user auth and login management. Our platform helps application owners increase user login engagement with passwordless application logins powered by mobile passkeys, two factor auth (2FA), multi-factor auth (MFA), face id auth, fingerprint auth, USB key auth, pin based auth, SSO with email, OIDC logins for Apple, Google and Microsoft, and more.
  • 21
    Descope Reviews

    Descope

    Descope

    $0.05 per user per month
    Descope is a CIAM platform meant for developers and IT teams. Customers can easily create frictionless and secure user journey flows for each user interaction using our no-code workflow builder and SDKs. Descope allows developers to spend more time working on core app projects by abstracting the details of authentication methods, session management, and risk management. Our platform makes it easy to manage users, tenants, RBAC, SCIM provisioning, and identity federation without any hassle. Customers use Descope to enhance user experience with passwordless authentication, improve security with risk-based MFA, and centralize user identities across all business-facing apps.
  • 22
    CodeSandbox Reviews

    CodeSandbox

    CodeSandbox

    $12 per month
    CodeSandbox aims to make it easier for you to express your ideas with code, and to validate them. It also removes the hassles of setting up development tooling and sharing your project. Join us to help build the future of web coding. Over 4M developers use the platform each month. This includes organizations like Shopify and Atlassian. Since its launch, creators have created over 35M apps. It's used in thousands of open-source projects like React, Vue and Babel. You can invite your friends, colleagues, or team to join you or simply view your creation by using a URL. Use any of 1M+ packages for building real, powerful applications quickly and efficiently. Import and run repos directly from GitHub or choose from hundreds of templates to start in seconds. Boxy, CodeSandbox's AI-powered coding assistant, is now available to all Pro subscriptions.
  • 23
    System Locker Reviews

    System Locker

    System Locker

    $10/year
    You can control the distribution and access to your software product. You have many options to make your software product flexible. You can create short-term access keys, notify users when updates become available, view access logs, and even allow resellers to purchase new keys without having to contact you. Choose from registration-required or key-only authentication for each application. Your users will appreciate the speed if key-only authentication is what you prefer. Users can choose to verify their email address or their Discord account if they are required to register on System Locker. Our commitment to reliability is strong, even though hundreds of new users join every single day.
  • 24
    Akto Reviews
    Akto is an open source, instant API security platform that takes only 60 secs to get started. Akto is used by security teams to maintain a continuous inventory of APIs, test APIs for vulnerabilities and find runtime issues. Akto offers tests for all OWASP top 10 and HackerOne Top 10 categories including BOLA, authentication, SSRF, XSS, security configurations, etc. Akto's powerful testing engine runs variety of business logic tests by reading traffic data to understand API traffic pattern leading to reduced false positives. Akto can integrate with multiple traffic sources - Burpsuite, AWS, postman, GCP, gateways, etc.
  • 25
    Hacker AI Reviews
    Hacker AI is an artificial Intelligence system that scans source code for security vulnerabilities that could be exploited or hacked by hackers. Organizations can identify these vulnerabilities and take steps to fix them or prevent security breaches. Hacker AI was created by a French company located in Toulouse, which uses a GPT-3 method. Please zip your project source code and upload it. You will receive the vulnerability report via email within 10 minutes. Hacker AI is still in beta and the results it produces are not useful without guidance from a cybersecurity expert with code analysis background. We don't sell or use your source code for malicious purposes. It is strictly used to detect vulnerabilities. You can request a non-disclosure agreement from us if necessary. A private instance can also be requested.
  • Previous
  • You're on page 1
  • 2
  • 3
  • Next