Best IT Security Software with a Free Trial of 2026 - Page 81

Find and compare the best IT Security software with a Free Trial in 2026

Use the comparison tool below to compare the top IT Security software with a Free Trial on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Email Shield Reviews
    Email Shield is a cloud-based security add-in that protects email accounts. It helps businesses in a variety of industries, including banking, fintech and eCommerce. It verifies and tracks trusted contacts, allowing users to expose potentially dangerous emails and ensuring financial transactions are safe. Email Shield allows accounts payable agents (AP) to scan emails, AP recipients, and attachments, and then approve, escalate, reject, or accept payment and request account changes. The system modifies the personal information in an active message, including the subject, body and sender. This protects against wire fraud, vendor fraud, and wire fraud.
  • 2
    SureLog Reviews
    SureLog SIEM offers a powerful suite of capabilities designed for modern log and event management, providing real-time analysis of log event data to identify and thwart security threats. By integrating events from diverse log sources, SureLog Enterprise efficiently correlates and aggregates these events into standardized alerts, enabling swift notifications to your IT and security personnel. Among its advanced features are real-time event management, behavioral analytics for entities and users, machine learning integration, incident management, threat intelligence, and comprehensive reporting tools. With an extensive library of over 2000 preconfigured correlation rules, SureLog Enterprise supports a wide array of security, privacy, and compliance scenarios. Additionally, it offers thorough visibility into logs, data flow, and events across various environments, including on-premise systems, IoT devices, and cloud infrastructures. Compliance with regulations such as PCI, GDPR, HIPAA, SOX, and PIPEDA is streamlined through pre-built reporting capabilities, ensuring organizations can automatically identify threats and maintain robust security measures. This comprehensive approach not only enhances security posture but also simplifies the complexity of managing diverse compliance requirements across different sectors.
  • 3
    Data Theorem Reviews
    Take stock of your applications, APIs, and hidden assets within your expansive multi-cloud framework. Develop tailored policies for various asset categories, utilize automated attack tools, and evaluate security weaknesses. Address security concerns prior to launching into production, ensuring compliance for both applications and cloud data. Implement automatic remediation processes for vulnerabilities, with options to revert changes to prevent data leaks. Effective security identifies issues swiftly, while exceptional security eliminates them entirely. Data Theorem is dedicated to creating outstanding products that streamline the most complex aspects of contemporary application security. At the heart of Data Theorem lies the Analyzer Engine, which empowers users to continuously exploit and penetrate application vulnerabilities using both the analyzer engine and proprietary attack tools. Furthermore, Data Theorem has created the leading open-source SDK, TrustKit, which is utilized by countless developers. As our technology ecosystem expands, we enable customers to easily safeguard their entire Application Security (AppSec) stack. By prioritizing innovative solutions, we aim to stay at the forefront of security advancements.
  • 4
    Code Dx Reviews
    Code Dx empowers organizations to swiftly deliver more secure software solutions. Our ASOC platform ensures that you remain at the cutting edge of speed and innovation while maintaining robust security, all made possible through automation. The rapid pace of DevOps often presents challenges for security measures, as the pressure to catch up can elevate the risk of breaches. Business executives are urging DevOps teams to accelerate their innovation to stay aligned with emerging technologies, such as Microservices. Development and operations teams strive to work as efficiently as possible to comply with the demands of rapid and continuous development cycles. However, as security efforts attempt to match this speed, they often find themselves overwhelmed by numerous disparate reports and an excess of data to analyze, leading to potential oversights of critical vulnerabilities. By centralizing and harmonizing application security testing across all development pipelines, organizations can achieve a scalable, repeatable, and automated approach that enhances security without hindering speed. This strategic alignment not only protects assets but also fosters a culture of secure innovation.
  • 5
    Cloud Security Cockpit Reviews
    Manage your risk effectively by safeguarding your sensitive information from dangerous misconfigurations that can result in breaches and regulatory violations. With Cloud Security Cockpit®, you can establish straightforward yet effective controls to oversee Salesforce security, mirroring the stringent standards applied to other critical cloud platforms. Instead of managing security on a granular level, Cloud Security Cockpit® streamlines the process, enabling rapid implementation of controls for Salesforce. This tool is invaluable for DevSecOps, as it integrates security operations with application development seamlessly, allowing both areas to advance collaboratively without hindering ongoing operations or development cycles. Additionally, compliance reporting and management require minimal effort, taking just a few clicks. You can quickly leverage the existing security measures you have implemented, empowering your team to establish security controls correctly from the outset, and ensuring alignment with your organizational security strategy. In this way, you not only enhance security but also foster a culture of proactive risk management.
  • 6
    Censornet CASB Reviews
    Censornet CASB empowers your organization to uncover, analyze, safeguard, and oversee user engagement with cloud services. With a comprehensive CASB solution, you can attain total oversight and command, ensuring the protection of your contemporary mobile workforce. This solution seamlessly integrates with Web Security to provide visibility and defense throughout every phase of an attack. CASB facilitates the identification and oversight of both approved and unapproved cloud applications through a vast array of business applications. The inline and API "multimode" CASB approach enhances visibility and security while effectively eliminating blind spots. Coupled with Web Security, it offers thorough attack visibility and protection. This solution automatically counters emerging multi-channel attack methods. As cloud applications, whether sanctioned or not, continue to reshape how teams and users connect, share, and collaborate, the evolving threat landscape has made Cloud Access Security Brokers an essential component of modern cybersecurity strategies. Consequently, the necessity for a robust CASB solution is more critical than ever before.
  • 7
    ThreatModeler Reviews
    ThreatModeler™, an enterprise threat modeling platform, is an automated solution that reduces the effort required to develop secure applications. Today's information security professionals have a pressing need to create threat models of their organizations' data and software. We do this at the scale of their IT ecosystem and with the speed of innovation. ThreatModeler™, which empowers enterprise IT organizations, allows them to map their unique security requirements and policies directly into the enterprise cyber ecosystem. This provides real-time situational awareness of their threat portfolio and risks. InfoSec executives and CISOs gain a complete understanding of their entire attack landscape, defense-in depth strategy, and compensating control, which allows them to strategically allocate resources and scale up their output.
  • 8
    Trend Cloud One Reviews
    Cloud security made simple with the Trend Cloud One platform. Save time and gain visibility. Automated deployments and discovery lead to operational efficiency and accelerated, simplified compliance. Builder's choice. We offer a wide range of APIs and turn-key integrations that allow you to choose the cloud and platforms you want, and then deploy them the way you like. One tool with the breadth, depth and innovation needed to meet and manage cloud security needs now and in the future. Cloud-native security is able to deliver new functionality every week without affecting access or experience. It seamlessly complements and integrates existing AWS, Microsoft Azure™, VMware®, and Google Cloud™. Automate the discovery of public, virtual, and private cloud environments, while protecting the network layer. This allows for flexibility and simplicity when it comes to securing the cloud during the migration and expansion processes.
  • 9
    Cybriant Reviews
    Cybriant empowers organizations to make well-informed business choices while maintaining efficiency in the design, execution, and management of their cyber risk management initiatives. We offer a wide-ranging and tailored array of strategic and managed cybersecurity solutions. Our offerings encompass Risk Assessments, vCISO Counseling, 24/7 Managed SIEM with LIVE Monitoring, Analysis, and Response, as well as 24/7 Managed EDR, Real-Time Vulnerability Scanning, and Patch Management. Our mission is to provide top-tier cybersecurity strategies and tactics that are accessible to mid-market companies and beyond. Cybriant /sī-brint/: embodies the concept of being cyber resilient. We provide enterprise-level cybersecurity services that are thorough, adaptable, and cover the complete security spectrum. Ensure the safety of your clients with Cybriant's continuous security monitoring services. Become a part of our Strategic Alliance Partner Program today, and enhance your brand by offering these vital services under your own name. By doing so, you can not only expand your market reach but also elevate your company's reputation in the cybersecurity field.
  • 10
    Stacklet Reviews
    Stacklet is a Cloud Custodian-based solution that provides a complete out-of-the box solution that offers powerful management capabilities and advanced features for businesses to realize their potential. Stacklet was developed by Cloud Custodian's original developer. Cloud Custodian is used today by thousands of globally recognized brands. The project's community includes hundreds of active contributors, including Capital One, Microsoft, and Amazon. It is growing rapidly. Stacklet is a best-of breed solution for cloud governance that addresses security, cost optimization and regulatory compliance. Cloud Custodian can be managed at scale across thousands cloud accounts, policies, and regions. Access to best-practice policy sets that solve business problems outside-of-the box. Data and visualizations for understanding policy health, resource auditing trends, and anomalies. Cloud assets can be accessed in real-time, with historical revisions and changed management.
  • 11
    SISA ProACT Reviews

    SISA ProACT

    SISA Information Security

    It is time to rewire security operations. SISA's Managed detect and response solution is flexible and adaptable to changing threat landscapes. It delivers 10x value by speeding up investigation times and optimizing operational costs. The platform provides a single experience via integrated portals: GUI interface and Client site appliance. Agent for resource monitoring is also available. The "conscious" algorithm continuously reviews security events to reduce the dwell time from ticket to resolution. Digital forensics provides timely and actionable information that can be used to assist with everything from breach investigations to damage assessment and remediation. Brand intel solution that can initiate takedowns of unauthorized apps and content. This is based on in-depth, laser-focused research on the dark and worldwide web. You can quickly and efficiently respond to endpoints with custom response solutions, such as host isolation or traffic blocking.
  • 12
    Edgio Reviews
    Securely deliver web applications in sub-second time, stream high-quality OTT and live events or quickly distribute large files to customers around the world. Edgio experts support you in security, web application, CDN and managed streaming services. Edgio Uplynk - Optimize streaming using our streaming management and orchestration tool, Edgio Uplynk. Our OTT/live event team will also help you. Cut costs, improve ad revenues, and deliver high-quality experiences Edgio Delivery: Power streaming media and large files downloads with one of the largest, most advanced global CDNs. Edgio Open Edge: Enhance the viewing experience by embedding Edgio's fully-managed CDN into your network.
  • 13
    Portworx Reviews
    Kubernetes can be run in production using the #1 Kubernetes platform. It offers persistent storage, backup, data security, capacity management, and DR. You can easily backup, restore, and migrate Kubernetes applications to any cloud or data centre. Portworx Enterprise Storage Platform provides end-to-end storage, data management, and security for all Kubernetes projects. This includes container-based CaaS and DBaaS as well as SaaS and Disaster Recovery. Container-granular storage, disaster recovery and data security will all be available to your apps. Multi-cloud migrations are also possible. You can easily solve enterprise requirements for Kubernetes data service. Your users can easily access a cloud-like DbaaS without losing control. Operational complexity is eliminated by scaling the backend data services that power your SaaS app. With a single command, add DR to any Kubernetes application. All your Kubernetes apps can be easily backed up and restored.
  • 14
    Hyperproof Reviews
    Hyperproof automates repetitive compliance operations so your team can concentrate on the bigger issues. Hyperproof also has powerful collaboration features that make it simple for your team to coordinate their efforts, gather evidence, and work directly alongside auditors from one interface. There is no more uncertainty in audit preparation or compliance management. Hyperproof gives you a complete view of your compliance programs, including progress tracking, program monitoring, and risk management.
  • 15
    RevBits Endpoint Security Reviews
    Real-time Endpoint Threat Identification, Isolation and Removal RevBits Endpoint Security is an intuitive, high-performance security program that blocks sophisticated attacks. RevBits Endpoint Security is unique in that it performs a three-phase analysis on threats. The comprehensive RevBits Endpoint Detection and Response module (EDR) is feature-rich and provides complete control and access from anywhere. Ransomware and malware attacks are examples of failed endpoint security. RevBIts Endpoint Security provides better protection and will make organizations safer by preventing malware from lateral movement.
  • 16
    Centreon Reviews
    Centreon is a global provider for business-aware IT monitoring to ensure high performance and continuous operations. The company's AIOps-ready platform, which is holistic and ready for use in today's complex hybrid cloud infrastructures, is designed to meet the needs of these distributed clouds. Centreon monitors all aspects of the IT Infrastructure, from Cloud-to Edge for a clear and comprehensive view. Centreon eliminates blind spots by monitoring all equipment, middleware, and applications that are part modern IT workflows. This includes legacy assets on-premise, private and public clouds, and all the way to edge of the network where smart devices and customers come together to create business value. Centreon is always up-to-date and can support even the most dynamic environments. It has auto-discovery capabilities that allow it to keep track of Software Defined Network (SDN), AWS or Azure cloud assets and Wi-Fi access points, as well as any other component of today’s agile IT infrastructure.
  • 17
    Privacera Reviews
    Multi-cloud data security with a single pane of glass Industry's first SaaS access governance solution. Cloud is fragmented and data is scattered across different systems. Sensitive data is difficult to access and control due to limited visibility. Complex data onboarding hinders data scientist productivity. Data governance across services can be manual and fragmented. It can be time-consuming to securely move data to the cloud. Maximize visibility and assess the risk of sensitive data distributed across multiple cloud service providers. One system that enables you to manage multiple cloud services' data policies in a single place. Support RTBF, GDPR and other compliance requests across multiple cloud service providers. Securely move data to the cloud and enable Apache Ranger compliance policies. It is easier and quicker to transform sensitive data across multiple cloud databases and analytical platforms using one integrated system.
  • 18
    Cisco Cyber Vision Reviews
    Your industrial operations are at risk from cyber threats due to the deeper integration of IT, cloud, and industrial control networks (ICS). Cisco Cyber Vision was specifically designed for OT and IT teams to collaborate to ensure production continuity and safety. Now you can deploy Industrial Internet of Things technologies and reap the benefits of industry digitization efforts. Start your OT security project with an accurate list of your industrial assets, communication patterns, and network topologies. Your SOC (security operation center) should have OT context. This will allow you to leverage the money and time you have spent on IT cybersecurity to protect your OT network. You can take OT security to the next step: Provide detailed information to comply regulations and facilitate collaboration between IT and OT experts.
  • 19
    CentreStack Reviews
    CentreStack enhances workforce mobility by providing cloud file sharing and mobile access, while ensuring that security permissions and the user experience remain consistent with traditional file servers. By leveraging Active Directory and inheriting permissions, it seamlessly integrates the existing on-premise security of IT infrastructure with the flexibility of cloud mobility, making it an unparalleled solution. This platform not only transforms file servers to support productivity and collaboration for mobile workers using various devices like smartphones and tablets, but it also allows for the option to either upgrade an existing file server for mobile access or migrate data and security permissions to a chosen cloud environment. In both scenarios, CentreStack prioritizes a user-friendly file server experience, bolstered by improved usability, security measures, compliance standards, and data control. Furthermore, enterprises have the choice to uphold their security and compliance by retaining their data within on-premise file servers, without needing to engage in cloud replication, ensuring that they can maintain their established protocols and practices. This flexibility makes CentreStack a strategic asset in adapting to the evolving landscape of mobile workforce demands.
  • 20
    Avira Protection Cloud Reviews
    Through our global network of sensors, Avira monitors cyber threats as they arise in real-time. The Avira Protection Cloud generates intelligence concerning the threats we detect and promptly shares it with our technology partners. Our Dynamic File Analysis utilizes various sandbox methods for behavioral profiling, enabling the grouping of malware based on similarities in their behavior and the detection of sophisticated threats. With robust rules in place, the system can pinpoint behavior patterns unique to specific malware families and strains, as well as uncover the precise malicious intentions of the malware. Additionally, Avira’s enhanced scanning engine serves as a highly effective tool for recognizing families of known malware. It employs proprietary definitions, heuristic algorithms, and advanced content extraction and de-obfuscation techniques to accurately identify malicious software. This comprehensive approach ensures that we remain a step ahead in the ever-evolving landscape of cyber threats.
  • 21
    Cisco SecureX Reviews
    SecureX is a cloud-driven platform seamlessly integrating our Cisco Secure suite with your infrastructure, enabling significant reductions in dwell time and reliance on manual tasks. This innovative solution fosters simplicity, transparency, and productivity by eliminating obstacles that hinder your team's ability to access vital information and take necessary actions. Each Cisco Secure product comes equipped with XDR capabilities and more, providing an interconnected platform that harmonizes your current ecosystem while also being compatible with external solutions. Users can take advantage of a cohesive dashboard for unified visibility, ensuring that you remain informed about incidents thanks to a consistent ribbon that is always accessible. By consolidating global intelligence with local insights into a single perspective, SecureX streamlines threat investigations and incident management processes. Additionally, it offers automation of routine tasks through prebuilt workflows tailored to common scenarios, or you can create custom workflows using our intuitive no-to-low code, drag-and-drop interface, enhancing operational efficiency even further. With SecureX, organizations can transform their security response strategy, empowering teams to focus on more strategic initiatives.
  • 22
    Fidelis Elevate Reviews
    You can't protect what you don't see. Fidelis Elevate™, XDR solution allows you to: Gain visibility to all network traffic, email, web traffic, endpoint activity, and enterprise IoT devices; quickly detect, prevent, and respond to adversary activities and advanced threats; align attacker TTPs with the MITRE ATT&CK™; framework to identify attacker's next move and take appropriate action. Machine-learning can be used to gain strong indicators about advanced threats and possible zero-day attacks so that you can proactively address them before they are too late Fidelis Elevate XDR automatically validates and correlates network detection alerts against all Fidelis managed ends in your environment. Reduce false positives and respond to the most important alerts. Look north-south traffic, data exfiltration and lateral movement.
  • 23
    CyberArk Endpoint Privilege Manager Reviews
    Your security needs to be as adaptable as your operations are. The Endpoint Privilege Manager provides real-time adjustments, granting users immediate local admin access when required. Cybercriminals relentlessly seek out your weaknesses, but we counteract this threat by automatically preventing credential theft before it can inflict harm. With countless ransomware variations circulating today, our solution is effective in thwarting 100% of such attacks. It allows for the temporary elevation of user privileges for particular tasks, seamlessly and instantly, while keeping help desk involvement to a minimum. Prevent ransomware from hindering your progress. Gain control over local admin accounts without interfering with daily tasks. Operate securely from any location and device, ensuring the protection of your assets and your organization's reputation. Safeguard every endpoint while maintaining smooth operational flow. By prioritizing security, you can enhance productivity without compromising safety.
  • 24
    CyberArk Customer Identity Reviews
    Enhance customer satisfaction by providing straightforward and safe access to your websites and applications, fostering loyalty towards your brand. The demand for exceptional digital interactions has never been greater, yet the risk landscape continues to expand. By utilizing CyberArk Customer Identity, you can confidently grant access to your platforms while ensuring security. Experience seamless integration, user-friendly access controls, and a smooth sign-on process. This platform brings together privacy, consent, and identity verification in one cohesive solution. With pre-built widgets and open APIs, it minimizes development time and effort. It ensures secure access to business applications for both human users and machine identities, particularly within the DevOps pipeline. Reducing complexity eases the burden on your IT team while enhancing the protection of your business assets. Ultimately, you can offer secure single sign-on capabilities for your applications and services, thereby streamlining the user experience. This comprehensive approach not only safeguards data but also fosters a trusting relationship with your customers.
  • 25
    Entrust Identity Enterprise Reviews
    Strong digital security is possible with the world's most trusted on-prem identity and access management (IAM). Identity Enterprise is an integrated IAM platform which supports a wide range of consumer, worker, and citizen use cases. Identity Enterprise is ideal for high-assurance applications that require zero trust for thousands or millions users. It can be deployed on-premises as well as virtual appliances. Never trust, always verify. Your organization and user communities are protected both within and outside the perimeter. High assurance use case coverage includes credential-based access, smart cards issuance and best-in class MFA. This will protect your workforce, consumers, and citizens. User friction can be reduced with adaptive risk-based authentication and passwordless login. You can use digital certificates (PKI), which provide a higher level security, whether you have a physical smartcard or a virtual one.
MongoDB Logo MongoDB