Best Free IT Security Software of 2026 - Page 20

Find and compare the best Free IT Security software in 2026

Use the comparison tool below to compare the top Free IT Security software on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    BreachAware Reviews

    BreachAware

    BreachAware

    $31.35 per month
    Our clients not only enhance their cybersecurity measures but also experience significant savings in both time and finances throughout the process. Organizations ranging from small businesses to large enterprises globally rely on breachaware's intelligence to safeguard their entities and personnel against various threats. We meticulously monitor over 100 categories of personal and financial data that may be exposed during third-party data breaches, including emails, usernames, passwords, biometric data, and behavioral information. Our analysis encompasses millions of domains affected by breaches worldwide, including more than 400 top-level domains. We consistently identify, evaluate, and oversee publicly compromised personal data by processing billions of leaked credentials to provide you with the best protection. If we detect any of your personal information related to your domain in new breaches, we will promptly inform you, as it is always better to be aware than to be in the dark. Additionally, you can access historical insights related to your domain whenever you wish, giving you actionable intelligence to bolster your privacy and security measures. Protecting your organization and its information has never been more crucial, and our services are designed to empower you in this digital landscape.
  • 2
    Saasment Reviews

    Saasment

    Saasment

    $89 per month
    Saasment addresses security vulnerabilities to minimize human errors in managing digital assets. We streamline security protocols to safeguard your company's sensitive information effectively. Our services include fraud deterrence and comprehensive protection against emerging threats that specifically target e-commerce platforms such as Shopify and Wix. With our automated cloud Chief Information Security Officer (CISO) services, you can concentrate on expanding your business while securing valuable partnerships. We help you pinpoint risks to gain insights into the security vulnerabilities present within your cloud and SaaS applications. You can then create a tailored security strategy that aligns with the identified risks in your environment. Once the strategy is developed, we assist in implementing the necessary solutions, elevating your business to achieve top-tier security through our SaaS security platform. Our commitment includes ongoing monitoring to ensure your organization remains devoid of vulnerabilities and risks. Additionally, we support businesses in identifying and rectifying misconfigurations across over 40 applications, while also facilitating continuous compliance tracking to uphold regulatory standards. By partnering with us, you can ensure a robust security posture that evolves alongside your business needs.
  • 3
    RiskProfiler Reviews

    RiskProfiler

    RiskProfiler

    $4999
    RiskProfiler can help you identify shadow risks and increase your brand's reputation and cyber risk rating by using the power of AI. RiskProfiler tracks your digital presence on the dark, surface and deep webs. You can eliminate shadow risks before hackers do. The collected reconnaissance information is used for the discovery and fingerprinting of an organization's digital footprint. Assets are then grouped based on fingerprint information. Risk Profiler's proprietary attack simulator runs passive scans and identifies security problems per asset without any complicated deployments, configurations or disruption of business operations. AI Models are used for filtering out false positives and providing actionable insights based upon threats across the surface, dark, and deep web.
  • 4
    HexaVault Reviews
    Safeguard all your passwords and crucial personal details, such as banking and credit card information, insurance and investment records, identity documents like passports and national IDs, as well as utility accounts and membership subscriptions. What makes HexaVault distinct from other digital vaults and password managers is its use of predefined templates tailored for different kinds of information. You can swiftly locate the information you need with the constantly accessible search bar, making it easy to retrieve your bank account details or login credentials—just type in a few letters to find what you're looking for. When you want to add new information, simply click the new information button and select a template that corresponds to the type of data you wish to input. Each template consists of a set arrangement of fields designed for specific information categories, and you also have the option to create custom templates to suit your needs. The templates are organized into various categories for streamlined access, ensuring that managing your sensitive information is both efficient and user-friendly. This innovative approach not only enhances security but also simplifies the process of keeping your personal data organized.
  • 5
    Microsoft Family Safety Reviews

    Microsoft Family Safety

    Microsoft

    $9.99 per month
    Empower your family to establish healthy habits and safeguard those you care about. Implement screen time restrictions that encompass all devices, applications, and games. Once screen time is exhausted, you can decide whether to extend it or not, depending on what suits your family's needs. Foster a secure environment for your children to navigate the online world. Utilize the app's content filtering features to set appropriate boundaries, restrict access to unsuitable apps and games, and confine browsing to child-friendly sites via Microsoft Edge on platforms like Xbox, Windows, and Android. Maintain connections with your family members even when separated by utilizing location sharing and tracking. Share your whereabouts with loved ones, track their locations on a map, and save frequently visited spots. Additionally, gain insights into your family's driving behavior, including how often the driver uses their phone, their maximum speed, and the frequency of hard braking events, ensuring safety on the road. By taking these steps, you can help foster a healthier and more connected family dynamic.
  • 6
    RapidFort Reviews

    RapidFort

    RapidFort

    $5,000 per month
    RapidFort streamlines the process of software deployment by automatically removing unnecessary components, resulting in more efficient, compact, and secure workloads. This innovative solution significantly cuts down on vulnerability management and patching tasks, allowing developers to concentrate on creating new features. By analyzing container setups, RapidFort determines essential components needed for operation, thereby bolstering the security of production workloads while sparing developers from the burden of managing irrelevant code. Users can deploy their containers seamlessly across various environments—be it development, testing, or production—and utilize any container orchestration tool, such as Kubernetes or Docker Compose. After profiling the containers, RapidFort highlights the packages that are necessary, facilitating the removal of those that are superfluous. Typical efficiency gains can range from 60% to 90%. Additionally, RapidFort offers users the flexibility to create and tailor remediation profiles, allowing them to selectively decide what components to keep or discard, further enhancing the customization and security of their deployments. This comprehensive approach not only simplifies management but also empowers teams to optimize their resources effectively.
  • 7
    Normalyze Reviews

    Normalyze

    Normalyze

    $14,995 per year
    Our platform for data discovery and scanning operates without the need for agents, making it simple to integrate with any cloud accounts, including AWS, Azure, and GCP. You won't have to handle any deployments or management tasks. We are compatible with all native cloud data repositories, whether structured or unstructured, across these three major cloud providers. Normalyze efficiently scans both types of data within your cloud environments, collecting only metadata to enhance the Normalyze graph, ensuring that no sensitive information is gathered during the process. The platform visualizes access and trust relationships in real-time, offering detailed context that encompasses fine-grained process names, data store fingerprints, and IAM roles and policies. It enables you to swiftly identify all data stores that may contain sensitive information, uncover every access path, and evaluate potential breach paths according to factors like sensitivity, volume, and permissions, highlighting vulnerabilities that could lead to data breaches. Furthermore, the platform allows for the categorization and identification of sensitive data according to industry standards, including PCI, HIPAA, and GDPR, providing comprehensive compliance support. This holistic approach not only enhances data security but also empowers organizations to maintain regulatory compliance efficiently.
  • 8
    Adaware Protect Reviews
    Adaware Protect serves as a comprehensive security suite that incorporates the Adaware Safe Browser, enhancing your online safety. This suite ensures that your entire computer is shielded from potentially harmful websites, effectively blocking unsafe sites while providing visibility into applications attempting to reach malicious or questionable URLs. With a simple click, you can prevent hackers and spyware from gaining access to your camera and microphone, making it convenient to secure your setup before a video call. The Adaware Safe Browser enhances your web experience by offering a quicker and more private means of navigating online. It eliminates ads to enhance browsing speed and blocks cookies and trackers to safeguard your privacy. Additionally, it features a private search option to keep your search activities confidential. You can customize your favorite features to maximize your PC's efficiency while benefiting from the ability to scan and eliminate unnecessary files and applications through Adaware Protect. In today's digital landscape, maintaining the security of your computer is simpler than ever before! With Adaware Protect, you can confidently explore the internet, knowing that your personal information and devices are well-protected.
  • 9
    Adaware Antivirus Reviews

    Adaware Antivirus

    Adaware

    $14.59 per year
    Adaware Antivirus provides robust protection for your computer against various online threats, allowing you to concentrate on what truly matters, whether it's socializing with friends, managing your email, or enjoying videos. The Windows version of Adaware Antivirus offers features like the ability to schedule daily scans, access real-time security, and tackle suspicious activities, ensuring your Windows devices remain secure. By downloading the free edition, you can utilize its security features across all your favorite devices. With award-winning malware protection, it effectively defends against viruses, ransomware, spyware, and other malicious software. You can browse and shop online with confidence, as it prevents hackers from gaining access to sensitive information on your Windows devices, including those running Windows 10, all at no cost. It also includes email protection and advanced antispam filters to shield your inbox. Furthermore, with malicious URL detection, you can steer clear of online scams, while scanning all downloads to prevent potential harm to your PC. In addition, it actively blocks harmful processes and infected files, offering real-time defense for your digital activities.
  • 10
    Kaduu Reviews

    Kaduu

    Kaduu

    $50 per company per month
    Kaduu provides insights into the timing, location, and methods through which stolen or inadvertently released data appears in dark web markets, forums, botnet logs, IRC, social media, and various other platforms. Additionally, its alert service is designed to identify potential threats prior to their escalation into serious incidents. Utilizing AI technologies, Kaduu delivers dark web analysis, immediate threat notifications, and pre-attack indicators to enhance security measures. With a quick setup process, users gain instant access to continuous reporting capabilities. Those with significant online presence face heightened risks of social engineering attacks, including phishing schemes. Furthermore, Kaduu enables monitoring for any references to credit card details, such as names or partial numbers, that may surface on the Dark Web, ensuring comprehensive protection against data breaches. This proactive approach not only safeguards sensitive information but also empowers organizations to mitigate risks effectively.
  • 11
    Kaspersky Anti-Ransomware Tool Reviews
    Kaspersky's Anti-Ransomware Tool provides comprehensive protection against ransomware throughout the entire attack lifecycle, from initial delivery to final execution, utilizing advanced technologies within a robust multi-layered security framework. With a ransomware attack occurring every five seconds, this free tool offers effective defense against notorious threats like Maze, Conti, REvil, Netwalker, DoppelPaymer, WannaCry, Petya, Bad Rabbit, Locky, TeslaCrypt, Rakhni, Rannoh, and many more. It seamlessly integrates with your existing security measures, enhancing their effectiveness without conflict. This lightweight solution harnesses the power of Kaspersky’s state-of-the-art endpoint protection technologies, including cloud-assisted behavior detection, to promptly neutralize ransomware and crypto-malware threats. Additionally, it features a dedicated ransomware scanner, functioning as an all-encompassing remedy for preventing ransomware incidents. The Kaspersky Anti-Ransomware Tool is adept at thwarting both local and remote encryption attempts on user data, ensuring a comprehensive safeguard against potential data loss. With its user-friendly interface and strong performance, it stands as a vital asset in maintaining cybersecurity.
  • 12
    Trend Micro HouseCall Reviews
    Discover the top free online virus scanner that effectively uncovers hidden dangers lurking on both your PC and Mac. It’s essential to determine whether your files are secure and to prevent harmful software that may exist outside of your files. Many threats can compromise your device's safety before you even become aware of them. HouseCall provides a solution to restore your device to its normal functioning state. The comprehensive report generated will outline the threats that have targeted your device, allowing you to take prompt action. HouseCall offers you the flexibility to select from a quick scan or a more thorough full scan, and you even have the option to create a custom scan tailored to your needs. This service allows you to identify and eliminate viruses, worms, spyware, and various other malicious threats completely free of charge. HouseCall efficiently detects new threats on your Windows or Mac computers without interfering with your existing security software. You can trust HouseCall to keep your device free from harmful files and prevent their proliferation. Additionally, HouseCall for Home Networks extends its scanning capabilities to all devices connected to your home network, identifying vulnerabilities and providing recommendations for addressing them effectively.
  • 13
    SpywareBlaster Reviews
    Safeguard your computer from spyware and various forms of unwanted software! It's straightforward, reliable, and highly regarded. Spyware, adware, browser hijackers, and dialers rank among the most troublesome and widespread dangers on the Internet today. Merely visiting a website might result in your device becoming the unsuspecting target of these disruptive programs! SpywareBlaster is designed to enhance your system's security while allowing you to enjoy the positive aspects of the web. Unlike many other applications, SpywareBlaster does not need to operate in the background at all times. It seamlessly integrates with your existing software to bolster your system's defense. It prevents the installation of ActiveX-based spyware and blocks potentially harmful programs. Additionally, it limits the activities of risky websites and stops tracking through cookies. SpywareBlaster is compatible with any software already present on your computer, providing an extra, robust layer of security to whatever you may currently have installed, ensuring a safer online experience.
  • 14
    Inigo.io Reviews
    GraphQL is impressive, and we are enhancing its capabilities even further. Inigo serves as an easy-to-integrate platform compatible with any GraphQL server, enhancing your API usage by addressing security, compliance, analytics, and continuous delivery, enabling companies to expand with assurance. DIY GraphQL solutions often lead to unnecessary security risks and operational hurdles. Inigo streamlines your experience by alleviating these burdens with user-friendly tools that save you valuable time. Custom-developed solutions can be both time-intensive and costly. Our improved CI/CD integration tools allow developers to concentrate on their primary responsibilities without distraction. As organizations scale GraphQL, they encounter distinct operational obstacles. Our solutions resolve development and delivery challenges while a self-serve workflow ensures your projects progress smoothly. Are you anxious about DDoS attacks, data breaches, or access management? Now you can effectively address all your GraphQL security concerns. Safeguard against vulnerabilities associated with GraphQL parsers and resolvers, and foster a more secure and efficient API ecosystem. Inigo empowers you to confidently navigate the complexities of GraphQL without the typical headaches.
  • 15
    TraceSecurity Reviews

    TraceSecurity

    TraceSecurity

    Free
    The Cybersecurity Assessment Tool (CSAT) serves as an excellent resource for evaluating your organization's cybersecurity posture. After obtaining your results, you will have the opportunity to pinpoint essential next steps and integrate them into a strategic plan to enhance your defenses against potential threats. Our tool complies with the standards set by the Automated Cybersecurity Examination Tool (ACET) and enables you to generate both our standard report and the NCUA ACET report seamlessly. Providing a comprehensive step-by-step approach, our cybersecurity assessment tool thoroughly assesses your organization's overall readiness against cyber threats. It adheres to the NIST cybersecurity framework, facilitating a straightforward self-assessment to gauge your preparedness while offering in-depth reporting and actionable recommendations for improving your security. Utilize our CSAT to ascertain your organization's cybersecurity maturity level, tailored to your specific size and complexity, and take proactive measures to safeguard your digital assets. By leveraging this tool, you can significantly bolster your organization's defenses against evolving cyber risks.
  • 16
    Kubescape Reviews
    Kubernetes is an open-source platform that provides developers and DevOps with an end-to-end security solution. This includes security compliance, risk analysis, security compliance and RBAC visualizer. It also scans images for vulnerabilities. Kubescape scans K8s clusters, Kubernetes manifest files (YAML files, and HELM charts), code repositories, container registries and images, detecting misconfigurations according to multiple frameworks (such as the NSA-CISA, MITRE ATT&CK®), finding software vulnerabilities, and showing RBAC (role-based-access-control) violations at early stages of the CI/CD pipeline. It instantly calculates risk scores and displays risk trends over time. Kubescape is one of the most popular Kubernetes security compliance tools for developers. Its easy-to-use interface, flexible output formats and automated scanning capabilities have made Kubescape one of the fastest growing Kubernetes tools. This has saved Kubernetes admins and users precious time, effort and resources.
  • 17
    Passwarden Reviews

    Passwarden

    KeepSolid

    $3.99 per month
    KeepSolid Inc. boasts nine years of expertise in security services and is trusted by over 35 million users globally. This extensive knowledge has led to the creation of Passwarden, a solution designed to adhere to the highest industry standards and safety regulations. Migrating data from different browsers and password managers to the Passwarden app is incredibly straightforward. If you already have credentials stored in Passwarden, it conveniently auto-fills them, streamlining the login experience. You can utilize Passwarden on any device or seamlessly integrate it into your browser, maximizing its security features. With Passwarden, you can rest assured that your data will be securely managed and protected from third-party access, including from the company itself. Given the sensitive nature of your passwords, maintaining security is crucial. To achieve this, Passwarden utilizes robust client-side data encryption with AES-256 and EC p-384 protocols, ensuring that your personal information and passwords remain inaccessible to unauthorized parties. Additionally, Passwarden continuously evolves its features to enhance user experience and security further.
  • 18
    KeepSolid DNS Firewall Reviews

    KeepSolid DNS Firewall

    KeepSolid

    $.1.99 per month
    Taking preventive measures is far more effective than dealing with issues after they arise, particularly in the realm of cybersecurity. It’s wise to identify and eliminate malware domains before they can compromise your device, wouldn’t you agree? The DNS Firewall serves as an ideal solution for this challenge! It effectively prevents malware by blocking access to known harmful websites, ensuring that malware cannot infiltrate your system. KeepSolid DNS Firewall safeguards your online activities by actively blocking malicious domains in real-time while you navigate the internet. You can customize the types of websites or content you want to restrict, including categories like gambling, games, fraudulent news, and adult content, or even create a personalized block list. Additionally, KeepSolid DNS Firewall is adept at identifying and thwarting phishing websites that aim to capture your personal information, which are frequently utilized in email scams, providing you with enhanced online security. With its user-friendly and straightforward interface, the app requires no technical expertise to operate. Setting it up is a breeze, taking only a few simple steps to get started. This makes it accessible for anyone looking to bolster their cybersecurity measures.
  • 19
    MonoDefense Reviews

    MonoDefense

    KeepSolid

    $11.99 per month
    Safeguard your digital information, privacy, and lifestyle with just a single click. MonoDefense offers a suite of security applications designed to cover every aspect of your online existence. With these four essential tools, you can securely store your login information, shield your browsing habits, protect against dubious DNS threats, and effortlessly access your favorite content. This comprehensive package makes it virtually impossible for anyone to monitor or spy on your activities. Enjoy secure internet surfing, anonymous data sharing, and private communications across social media and forums. Don’t put yourself at risk of becoming a victim of online harassment, targeted bullying, or ideological persecution for your views. Engage in digital conversations and share your opinions openly and without anxiety. We commit to defending your data, personal details, and devices from cyber threats. Utilizing AES-256 encryption, your internet traffic, passwords, and sensitive information will be obscured from prying eyes. Additionally, robust firewall features will help you steer clear of harmful websites while enhancing your online security. With MonoDefense, you can navigate the internet with confidence and peace of mind.
  • 20
    Guardian Reviews

    Guardian

    Guardian

    $0.99 per day
    Guardian offers the most reliable and secure method to safeguard your privacy and data while utilizing applications and surfing the internet on your iOS device. By routing traffic through its firewall servers, Guardian conceals your IP address from the websites you visit, complicating the efforts of advertisers to follow your activities. It ensures robust protection for your passwords, financial details, and other sensitive information with strong AES-256 encryption, making it difficult for hackers to access your data no matter where you are. In addition to providing an extra layer of encryption for all outgoing network traffic, Guardian also filters out unwanted junk, enhancing your mobile browsing experience. You can confidently grant permissions to specific applications on your device, knowing that any attempts to transmit data to unauthorized trackers will be effectively thwarted. Furthermore, Guardian blocks unwanted connections from location trackers, email trackers, generic data trackers, and various other online irritants, ensuring a more secure and enjoyable online presence. This comprehensive protection not only preserves your privacy but also allows you to navigate the digital world with peace of mind.
  • 21
    REI3 Reviews

    REI3

    Lean Softworks GmbH

    Free
    REI3 is an open platform for business applications that is free to use and open-source. Anyone can create, publish and use applications. You can manage your time, assets, projects and passwords with a wide variety of professionally designed applications. REI3 is available on all major platforms, and can be deployed in the cloud or on-premise.
  • 22
    Akamai MFA Reviews
    Make authentication resistant to phishing as straightforward as using a mobile push notification. Safeguard employee accounts and protect sensitive data from breaches by implementing phish-proof multi-factor authentication (MFA). Eliminate the risk of MFA bypass attacks by utilizing the most trusted standard in multi-factor authentication. Ensure that MFA remains impervious to phishing attempts through the use of end-to-end encryption. Forget about cumbersome physical security keys; instead, streamline the onboarding process with self-service enrollment and an intuitive smartphone application. Experience top-tier authentication with FIDO2, enhancing security without the need for additional hardware. This solution not only lightens the load for administrators but also offers FIDO2 MFA security that utilizes seamless push notifications on any smartphone, effectively countering phishing threats. You can choose from various authentication methods, including secure push notifications, standard push, TOTP, and SMS, all of which easily integrate with leading identity providers and identity solutions for a cohesive MFA experience. The system automates user provisioning workflows to ensure immediate updates in response to changes within the identity provider. Additionally, comprehensive reporting capabilities keep administrative teams updated on all authentication activities, enhancing oversight and security management. This holistic approach to authentication ensures both ease of use and robust protection against modern threats.
  • 23
    WinZip SafeShare Reviews

    WinZip SafeShare

    WinZip

    $34.95 one-time payment
    Experience a contemporary method of sharing that prioritizes confidence and security in an easy-to-use platform designed for simplicity. This robust tool empowers users to share, compress, and encrypt files seamlessly through a straightforward interface. Effortlessly distribute files to multiple destinations while benefiting from enhanced security measures, including military-grade encryption and time-sensitive sharing options. Take advantage of expanded cloud services featuring providers like OpenStack, SwiftStack, Alibaba, Wasabi, HP, Oracle, Azure, WebDAV, CenturyLink, IONOS, and OVH. Merge several PDF documents into a single file for convenient saving, zipping, or sharing purposes. Optimize your workflow by sharing directly through Slack IM, and effectively manage files shared via WinZip or ZipShare. Furthermore, users can open, view, re-share, or remove files at their discretion, while keeping track of Zip files shared through WinZip or ZipShare. Enhance your communication by emailing anyone directly from WinZip, incorporating contacts from various supported sources into a unified address book for easier access. This streamlined approach not only simplifies sharing but also enhances productivity across your collaborative efforts.
  • 24
    BotDelive Reviews
    BotDelive provides a two-factor authentication (2FA) and push notification service through instant messaging bots designed specifically for developers. To get started, simply create an account on BotDelive and obtain your API credentials. Once you have that, you can dive into our API documentation to begin the integration process! You'll find that incorporating 2FA requires just two API endpoints. As a cloud communication platform tailored for developers, BotDelive facilitates the sending and receiving of 2FA and push notifications through popular chat applications using its APIs. Typically, developers are required to compel users to download an app for notifications. However, since chat applications are already present on millions of devices, why not take advantage of them? BotDelive streamlines the 2FA process, allowing users to authorize their accounts simply by responding to yes or no questions. With BotDelive, you can authenticate users more efficiently than using traditional email and password methods; just ask for the password once, and the service will manage all subsequent requests on your behalf. Additionally, you can send crucial push notifications seamlessly through chat applications, ensuring that your communications reach users reliably. By choosing BotDelive, you’re opting for a dependable solution that enhances user experience and security.
  • 25
    OpenSSH Reviews
    OpenSSH stands out as the leading tool for establishing remote logins using the SSH protocol. By encrypting all communications, it effectively protects against eavesdropping, connection hijacking, and various attacks. Furthermore, OpenSSH boasts a comprehensive range of secure tunneling features, multiple authentication methods, and advanced configuration options. Remote tasks are facilitated with commands like ssh, scp, and sftp, while key management is handled through utilities such as ssh-add, ssh-keysign, ssh-keyscan, and ssh-keygen. On the server side, components include sshd, sftp-server, and ssh-agent. This powerful software is developed by a small group of contributors from the OpenBSD project and is distributed under a BSD-style license. Although OpenSSH is integrated into numerous commercial applications, very few companies contribute financially to its development. Support for OpenSSH can be directed to the OpenBSD Foundation. Given the vulnerabilities of telnet and rlogin, it is essential that all operating systems come with built-in SSH protocol support. The SSH protocol exists in two distinct and incompatible versions, namely SSH 1 and SSH 2, which can lead to compatibility issues in certain environments. As security becomes increasingly critical, the adoption of OpenSSH continues to grow across various sectors.
MongoDB Logo MongoDB