Best IT Security Software with a Free Trial of 2026 - Page 80

Find and compare the best IT Security software with a Free Trial in 2026

Use the comparison tool below to compare the top IT Security software with a Free Trial on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Forescout Medical Device Security Reviews
    Forescout Medical Device Security, a dedicated healthcare solution, is part of Forescout Continuum. The CyberMDX Healthcare Security suite was formerly known as this solution. It provides continuous, real-time visibility and discovery of all medical devices connected to your clinical network. The solution then evaluates the risk of each device by taking into account known exposures, attack potential, and operational criticality. Continuous, real-time discovery and analysis of your connected medical devices, clinical network, and devices behind firewalls or serial gateways. Clear and concise risk assessment for each connected medical device, based on known exposures and attack potential. Also includes operational criticality using AI and rule-based attack detection. Each connected medical device has its own security policy and access. Smart isolation blocks device access to prevent unauthorized nodes.
  • 2
    Deep Freeze Reboot to Restore Reviews
    Faronics' Reboot to Restore Technology ensures that endpoints remain impervious to damage, with Deep Freeze serving as the pinnacle of workstation security. By utilizing this technology, our solution safeguards both configuration files and the core operating systems on servers or workstations. After installation, the software creates a baseline, which defines the state the computer will return to after a reboot. Its patented technology effectively reroutes cloned data away from the hard drive to an allocation table, while preserving the integrity of the original data. The evolution of Reboot to Restore stems from the demand for an efficient, user-friendly alternative to traditional solutions. Computers that are commonly accessed by multiple users, such as those found in schools, libraries, hospitals, and public kiosks, are vulnerable to various system and security threats. Users often face challenges like unwanted files or malware infections when trying to install new programs, emphasizing the importance of a reliable restoration solution in shared environments. Consequently, this technology not only enhances security but also streamlines system management for environments with high user turnover.
  • 3
    TACHYON Endpoint Security 5.0 Reviews
    Advanced anti-virus solution that blocks cyber threats like malware, spyware, ransomware and others. Protect your system and other important information with enhanced monitoring and protection.
  • 4
    Spectra Reviews

    Spectra

    Sectona Technologies Pvt Ltd

    Sectona was founded with the goal of creating cross-platform privileged access technology that is modernly designed and simplified. Our primary focus is to detect and prevent breaches that are caused by insider threats and/or privileged attacks. Sectona's cross-platform & fully integrated Privileged access Management (PAM), solution Spectra allows enterprises to achieve greater security by adopting a new PAM approach. Sectona works with customers from all sectors.
  • 5
    Netacea Bot Management Reviews
    Netacea is a pioneering server-side detection and mitigation approach that helps us understand bot behavior better than anyone else. Our technology is easy to implement and supports many integrations. This provides comprehensive protection against malicious bots across your website, mobile app, and APIs without compromising your website infrastructure, reliance upon hardware, or disruptive code changes. Our team of experts and revolutionary machine-learning powered Intent Analytics™, engine help us quickly distinguish between bots and humans. This allows us to prioritize genuine users. Netacea works in close collaboration with your security functions, from implementation to providing accurate detection and equipping you with actionable threat information.
  • 6
    NeuShield Data Sentinel Reviews
    The War on Ransomware has ended. NeuShield Data Sentinel is more than just a ransomware detection and blocker. Our anti-ransomware technology is the only one that can restore your data from malicious software attacks. Data Sentinel uses Mirror Shielding™ to protect files, ensuring that you can immediately recover your data from any ransomware attack. Patented technology that creates a barrier around protected files to prevent them from being modified. Mirror Shielding™, which makes attackers believe they have access the original data files of a computer, but they only see a mirror image. You can quickly restore access to your computer's operating system files and settings after a ransomware attack by restoring them to a known good condition. One-Click Restore can also be used to remove unknown and known malware. Protects the boot section of a drive to stop aggressive ransomware taking over the boot process.
  • 7
    SearchInform FileAuditor Reviews
    DCAP solution (datacentric audit and protection), for automated file system audit, search and detection of access violations, as well as monitoring for changes in critical data.
  • 8
    Topicus KeyHub Reviews
    Topicus KeyHub provides Privileged Access Management to individuals. With privileged access management, you can gain easy and secure access containers, sensitive data, and production environments. KeyHub allows you to access your data in real-time and enforces least privilege rules.
  • 9
    Cerber Security Reviews
    Cerber Security vigorously defends WordPress from hacker attacks, spam, malware, and other threats. Blazingly fast and reliable in design A set of specialized request inspection algorithms screens incoming requests for malicious codes patterns and traffic anomalies. Bot detection engine detects and mitigates automated attacks. Reduces code injection and brute force attacks. GEO country rules restrict access. Both REST API and ordinary user numbers are blocked. Restricted access to REST API, XML-RPC. It uses a global list IP addresses that are known to be involved in malicious activity. Detects bots using heuristics and content-based algorithms. Compares IP address against a real-time list of IP addresses that are known to be disseminating spam, attacks on phishing and other malicious activity. Every file and folder on your website is thoroughly scanned for trojans, malware, and viruses. Automatically removes viruses and malware. Monitors suspicious, new, or changed files.
  • 10
    Fairwinds Insights Reviews
    Protect and optimize mission-critical Kubernetes apps. Fairwinds Insights, a Kubernetes configuration validation tool, monitors your Kubernetes containers and recommends improvements. The software integrates trusted open-source tools, toolchain integrations and SRE expertise, based on hundreds successful Kubernetes deployments. The need to balance the speed of engineering and the reactive pace of security can lead to messy Kubernetes configurations, as well as unnecessary risk. It can take engineering time to adjust CPU or memory settings. This can lead to over-provisioning of data centers capacity or cloud compute. While traditional monitoring tools are important, they don't offer everything necessary to identify and prevent changes that could affect Kubernetes workloads.
  • 11
    Cymulate Reviews
    Continuous Security Validation across the Full Kill Chain. Security teams can use Cymulate's breach- and attack simulation platform to quickly identify security gaps and then remediate them. Cymulate's full kill-chain attack vectors simulations analyze every area of your organization, including email, web apps, and endpoints to ensure that no threats slip by the cracks.
  • 12
    TozID Reviews
    A platform for Customer Identity Management and SSO with privacy and end to end encryption. You can centralize access control without increasing your security risk. Our cryptography-at-the-edge approach delivers identity protection where you need it - secure your customer's accounts with strong encryption and a customizable UI, or streamline protected access for your business and employees with SSO. All the features you'd expect, including SAML & OIDC Support along with push-based MFA. These are some of the key features that we think you will love!
  • 13
    Traefik Reviews
    What is Traefik Enterprise Edition and how does it work? TraefikEE, a cloud-native loadbalancer and Kubernetes Ingress controller, simplifies the networking complexity for application teams. TraefikEE is built on top of open-source Traefik and offers exclusive distributed and high availability features. It also provides premium bundled support for production-grade deployments. TraefikEE can support clustered deployments by dividing it into controllers and proxies. This increases security, scalability, and high availability. You can deploy applications anywhere, on-premises and in the cloud. Natively integrate with top-notch infrastructure tools. Dynamic and automatic TraefikEE features help you save time and ensure consistency when deploying, managing and scaling your applications. Developers have the ability to see and control their services, which will improve the development and delivery of applications.
  • 14
    Cyberwatch Reviews
    All your vulnerabilities can be managed, from detection to correction. Cyberwatch allows you to have a complete and contextualized listing of technologies and assets in your Information System. Cyberwatch continuously monitors for vulnerabilities that have been published by authorities (CERT-FR, NVG ...)) and are present on your IT assets. Cyberwatch assesses vulnerabilities based upon their CVSS score, existence of exploits, and the context of the affected machine. Cyberwatch allows you to make the right decisions with simple actions and dashboards (comment, exclude ...).). Cyberwatch natively embeds the Patch Management module compatible with your infrastructure (WSUS/RedHat Satellite ). Your information system can be controlled and your compliance rules defined. Cyberwatch allows you to create a complete and contextualized list containing assets and technologies within your Information System. Cyberwatch lets you define your goals thanks to an encyclopedia that includes pre-sets.
  • 15
    Kogni Reviews
    Kogni's Discover feature allows enterprises to find and detect sensitive and critical information. Find sensitive data from any source, in whatever format, and of any type. Kogni's sensitive data discovery software automates data discovery and classification. Kogni's easy-to-implement software allows seamless integration with your company's data warehouse. Kogni's sensitive information discovery tool can help you accelerate compliance with industry standards and international data regulations. Reduce the risk of data leakage and the costs of non-compliance to data protection and privacy regulations such as HIPAA, GDPR and CCPA, PCI and PII. Scans and pin-points sensitive information from more than 10 data sources. This tool creates a comprehensive dashboard of sensitive information with a variety of special features. Your sensitive data classification groups can be customized to meet your company's requirements. Supports a wide variety of data types and formats.
  • 16
    Oversecured Reviews
    Enterprise vulnerability scanner for Android apps and iOS apps. It allows developers and app owners to secure every new version of their mobile apps by integrating Oversecured in the development process.
  • 17
    ArvanCloud Reviews
    ArvanCloud CDN consists of tens to PoP sites at important locations around the globe to deliver online content to users, from the nearest geographical point at the highest quality and speed. You can create unlimited cloud servers with ArvanCloud Cloud Computing infrastructure in just a few clicks. You can create multiple cloud storage disks per server and manage your cloud data center communications with Firewall and private or public networks. ArvanCloud allows you secure any type of data stored on Cloud Storage. You can access a reliable storage system anywhere in the world and have no worries about data loss. ArvanCloud Container-Based Platform as a Service conforms to Kubernetes standards. You are only a few commands away from an operational product with ArvanCloud Container-Based Platform as a Service.
  • 18
    ManageEngine Identity Manager Plus Reviews
    A secure, single sign-on (SSO) solution for enterprises. ManageEngine's Identity Manager Plus, the IT division at Zoho, allows end users to access the applications they need in one click. IT administrators can also manage and monitor application access using a single console. Users can gain secure, one-click access for enterprise applications. To access all their applications, users only need to log in once. Allow SSO to hundreds popular applications from our app catalog, or any SAML-based internal app using custom integrations. Track who accessed which application, when, and from what source. Find out which applications are most used, inactive users, etc. You can import users directly from G Suite or Azure AD. Or you can use the Zoho Directory built-in to onboard contractors and temporary employees. You can configure SSO for applications, add users and enable application access to users. You can also track application access from one central console.
  • 19
    Email Shield Reviews
    Email Shield is a cloud-based security add-in that protects email accounts. It helps businesses in a variety of industries, including banking, fintech and eCommerce. It verifies and tracks trusted contacts, allowing users to expose potentially dangerous emails and ensuring financial transactions are safe. Email Shield allows accounts payable agents (AP) to scan emails, AP recipients, and attachments, and then approve, escalate, reject, or accept payment and request account changes. The system modifies the personal information in an active message, including the subject, body and sender. This protects against wire fraud, vendor fraud, and wire fraud.
  • 20
    SureLog Reviews
    SureLog SIEM offers a powerful suite of capabilities designed for modern log and event management, providing real-time analysis of log event data to identify and thwart security threats. By integrating events from diverse log sources, SureLog Enterprise efficiently correlates and aggregates these events into standardized alerts, enabling swift notifications to your IT and security personnel. Among its advanced features are real-time event management, behavioral analytics for entities and users, machine learning integration, incident management, threat intelligence, and comprehensive reporting tools. With an extensive library of over 2000 preconfigured correlation rules, SureLog Enterprise supports a wide array of security, privacy, and compliance scenarios. Additionally, it offers thorough visibility into logs, data flow, and events across various environments, including on-premise systems, IoT devices, and cloud infrastructures. Compliance with regulations such as PCI, GDPR, HIPAA, SOX, and PIPEDA is streamlined through pre-built reporting capabilities, ensuring organizations can automatically identify threats and maintain robust security measures. This comprehensive approach not only enhances security posture but also simplifies the complexity of managing diverse compliance requirements across different sectors.
  • 21
    Data Theorem Reviews
    Take stock of your applications, APIs, and hidden assets within your expansive multi-cloud framework. Develop tailored policies for various asset categories, utilize automated attack tools, and evaluate security weaknesses. Address security concerns prior to launching into production, ensuring compliance for both applications and cloud data. Implement automatic remediation processes for vulnerabilities, with options to revert changes to prevent data leaks. Effective security identifies issues swiftly, while exceptional security eliminates them entirely. Data Theorem is dedicated to creating outstanding products that streamline the most complex aspects of contemporary application security. At the heart of Data Theorem lies the Analyzer Engine, which empowers users to continuously exploit and penetrate application vulnerabilities using both the analyzer engine and proprietary attack tools. Furthermore, Data Theorem has created the leading open-source SDK, TrustKit, which is utilized by countless developers. As our technology ecosystem expands, we enable customers to easily safeguard their entire Application Security (AppSec) stack. By prioritizing innovative solutions, we aim to stay at the forefront of security advancements.
  • 22
    Code Dx Reviews
    Code Dx empowers organizations to swiftly deliver more secure software solutions. Our ASOC platform ensures that you remain at the cutting edge of speed and innovation while maintaining robust security, all made possible through automation. The rapid pace of DevOps often presents challenges for security measures, as the pressure to catch up can elevate the risk of breaches. Business executives are urging DevOps teams to accelerate their innovation to stay aligned with emerging technologies, such as Microservices. Development and operations teams strive to work as efficiently as possible to comply with the demands of rapid and continuous development cycles. However, as security efforts attempt to match this speed, they often find themselves overwhelmed by numerous disparate reports and an excess of data to analyze, leading to potential oversights of critical vulnerabilities. By centralizing and harmonizing application security testing across all development pipelines, organizations can achieve a scalable, repeatable, and automated approach that enhances security without hindering speed. This strategic alignment not only protects assets but also fosters a culture of secure innovation.
  • 23
    Cloud Security Cockpit Reviews
    Manage your risk effectively by safeguarding your sensitive information from dangerous misconfigurations that can result in breaches and regulatory violations. With Cloud Security Cockpit®, you can establish straightforward yet effective controls to oversee Salesforce security, mirroring the stringent standards applied to other critical cloud platforms. Instead of managing security on a granular level, Cloud Security Cockpit® streamlines the process, enabling rapid implementation of controls for Salesforce. This tool is invaluable for DevSecOps, as it integrates security operations with application development seamlessly, allowing both areas to advance collaboratively without hindering ongoing operations or development cycles. Additionally, compliance reporting and management require minimal effort, taking just a few clicks. You can quickly leverage the existing security measures you have implemented, empowering your team to establish security controls correctly from the outset, and ensuring alignment with your organizational security strategy. In this way, you not only enhance security but also foster a culture of proactive risk management.
  • 24
    Censornet CASB Reviews
    Censornet CASB empowers your organization to uncover, analyze, safeguard, and oversee user engagement with cloud services. With a comprehensive CASB solution, you can attain total oversight and command, ensuring the protection of your contemporary mobile workforce. This solution seamlessly integrates with Web Security to provide visibility and defense throughout every phase of an attack. CASB facilitates the identification and oversight of both approved and unapproved cloud applications through a vast array of business applications. The inline and API "multimode" CASB approach enhances visibility and security while effectively eliminating blind spots. Coupled with Web Security, it offers thorough attack visibility and protection. This solution automatically counters emerging multi-channel attack methods. As cloud applications, whether sanctioned or not, continue to reshape how teams and users connect, share, and collaborate, the evolving threat landscape has made Cloud Access Security Brokers an essential component of modern cybersecurity strategies. Consequently, the necessity for a robust CASB solution is more critical than ever before.
  • 25
    ThreatModeler Reviews
    ThreatModeler™, an enterprise threat modeling platform, is an automated solution that reduces the effort required to develop secure applications. Today's information security professionals have a pressing need to create threat models of their organizations' data and software. We do this at the scale of their IT ecosystem and with the speed of innovation. ThreatModeler™, which empowers enterprise IT organizations, allows them to map their unique security requirements and policies directly into the enterprise cyber ecosystem. This provides real-time situational awareness of their threat portfolio and risks. InfoSec executives and CISOs gain a complete understanding of their entire attack landscape, defense-in depth strategy, and compensating control, which allows them to strategically allocate resources and scale up their output.
MongoDB Logo MongoDB