Best Free IT Security Software of 2026 - Page 40

Find and compare the best Free IT Security software in 2026

Use the comparison tool below to compare the top Free IT Security software on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Centreon Reviews
    Centreon is a global provider for business-aware IT monitoring to ensure high performance and continuous operations. The company's AIOps-ready platform, which is holistic and ready for use in today's complex hybrid cloud infrastructures, is designed to meet the needs of these distributed clouds. Centreon monitors all aspects of the IT Infrastructure, from Cloud-to Edge for a clear and comprehensive view. Centreon eliminates blind spots by monitoring all equipment, middleware, and applications that are part modern IT workflows. This includes legacy assets on-premise, private and public clouds, and all the way to edge of the network where smart devices and customers come together to create business value. Centreon is always up-to-date and can support even the most dynamic environments. It has auto-discovery capabilities that allow it to keep track of Software Defined Network (SDN), AWS or Azure cloud assets and Wi-Fi access points, as well as any other component of today’s agile IT infrastructure.
  • 2
    Verified.Me Reviews
    SecureKey Technologies Inc. has introduced Verified.Me, a robust solution designed to assist you in confirming your digital identity, enabling swift access to desired online services and products, whether you are shopping online, visiting in person, or making phone calls. This innovative platform provides Canadians with a reliable and user-friendly method for digital identity verification. Developed in collaboration with seven prominent financial institutions in Canada, including BMO, CIBC, Desjardins, National Bank of Canada, RBC, Scotiabank, and TD, Verified.Me is a comprehensive digital identity verification network. The network is continuously improving, with intentions to incorporate additional digital identity and service providers, ultimately simplifying your experiences. Recently, SecureKey has made the Verified.Me service available in a convenient, browser-based format, allowing for even easier access to its features. As the service evolves, users can expect further enhancements that will streamline their identity verification processes.
  • 3
    Secfense Reviews
    Secure your company, employees, and customers with stronger authentication. 2FA can be deployed in minutes and not weeks. 2FA (and other user access policies) are built into the infrastructure and not fixed to applications. Allowing the use of all 2FA methods on the market, now and in the future, without changing the core. Protection is available to all employees, including those who work in the public, private, and on-premise sectors. Secfense is installed between your users and the applications they access. It tracks traffic patterns that are related to authentication. It can then enforce multifactor authentication logon and other sensitive actions, without interfering in applications existing code or databases. The platform always has the most current 2FA methods. Secfense and applied methods are not affected by application changes. You can control session expiration rules across all applications. Do not rely on VPNs. Instead, trust users and their devices.
  • 4
    Sandboxie Reviews
    Sandboxie is a software that offers sandbox-based isolation for 32- and 64-bit Windows NT-based systems. It has been under the development of David Xanatos since its transition to open-source status; prior to that, it was managed by Sophos, which obtained it from Invincea, the company that previously acquired it from its original creator, Ronen Tzur. By creating an isolated operating environment, Sandboxie allows users to run or install applications without making permanent changes to the local or mapped drives. This virtual isolation enables safe testing of untrusted applications and secure web browsing. Following its open-source release, Sandboxie is available in two versions: the classic build featuring a MFC-based user interface and the Plus build that comes with enhanced features and a completely new Q't based interface. Most of the new functionalities are directed towards the Plus version, but many can also be accessed in the classic version by modifying the sandboxie.ini file. This flexibility makes it easier for users to benefit from updates while still maintaining a preference for the traditional interface.
  • 5
    NoDistribute Reviews
    To initiate a scan, simply select your file, and it will be examined using over 35 different antivirus programs. The outcomes of these scans are kept confidential and are not shared with any third parties. For added security, you can utilize temporary email addresses at no cost. To ensure your privacy and that of your files, you might prefer not to disclose their contents to antivirus providers. Our platform utilizes a trustworthy API from VirusCheckMate, which has established a solid reputation since its inception in 2014. If you're curious about their offerings, you can learn more by visiting VirusCheckMate.net. Since we began operating in 2013, we have maintained a strict policy of not distributing any scan results. You're welcome to conduct your own assessments of our service to confirm that privacy is upheld. Every day, we attract a high volume of visitors interested in past scan results and new file analyses. While we offer a complimentary service that allows for up to three scans daily, we would greatly appreciate your support by purchasing a scan key to help sustain our operations. Additionally, by opting to contribute, you will be ensuring that we can continue providing this valuable service to users in the future.
  • 6
    Secuvy AI Reviews
    Secuvy, a next-generation cloud platform, automates data security, privacy compliance, and governance via AI-driven workflows. Unstructured data is treated with the best data intelligence. Secuvy, a next-generation cloud platform that automates data security, privacy compliance, and governance via AI-driven workflows is called Secuvy. Unstructured data is treated with the best data intelligence. Automated data discovery, customizable subjects access requests, user validations and data maps & workflows to comply with privacy regulations such as the ccpa or gdpr. Data intelligence is used to locate sensitive and private information in multiple data stores, both in motion and at rest. Our mission is to assist organizations in protecting their brand, automating processes, and improving customer trust in a world that is rapidly changing. We want to reduce human effort, costs and errors in handling sensitive data.
  • 7
    Cyscale Reviews
    In less than five minutes, you can map, secure, and monitor your cloud resources across various platforms. Our agentless CSPM solution leverages the innovative Security Knowledge Graphβ„’ to enhance operational efficiency and reduce costs while providing scalable and consistent protection and governance. Professionals from various sectors trust Cyscale to make impactful contributions by applying their expertise where it is needed most. With our service, you gain visibility through different infrastructure layers, amplifying your efforts to create organization-wide benefits. Cyscale enables you to connect diverse environments seamlessly and visualize your entire cloud inventory comprehensively. By identifying and eliminating obsolete or overlooked cloud resources, you can reduce your invoices from providers and optimize overall organizational costs. Upon signing up, you will receive precise correlations across your cloud accounts and assets, allowing you to promptly respond to alerts and prevent potential fines associated with data breaches. Additionally, our solution facilitates ongoing monitoring to ensure that your cloud environment remains efficient and compliant.
  • 8
    AuthPass Reviews
    AuthPass is a free and open-source password manager that supports the widely-used and reliable Keepass formats (kdbx 3.x and kdbx 4.x πŸŽ‰οΈ). It allows you to store your passwords securely, share them across various devices, and access them effortlessly whenever you need to log in. πŸ—„ Consolidate all your passwords in one convenient location. 🧬 Create strong, random passwords for each of your online accounts. πŸ” Access your vault quickly using biometric authentication. πŸ” Monitor your accounts across the internet with ease. πŸ–₯ Available on multiple platforms, including Mac, iPhone, iPad, Android devices, Linux, Windows, and through a web interface. πŸ“‚ Open and manage multiple password files simultaneously, such as one for work and another for personal use, or share files with colleagues. ✍ Autofill functionality for your passwords is available on Android 9 and later, with browser support starting from Android 10. With AuthPass, managing your credentials has never been more streamlined or secure.
  • 9
    CTemplar Reviews

    CTemplar

    CTemplar

    $8 per month
    We prioritize user anonymity by not retaining personal information, ensuring that your identity remains concealed. Our robust encryption and cutting-edge technologies protect the privacy of your communications. Iceland boasts some of the most stringent privacy regulations, facilitating both anonymous use and the prompt deletion of data. CTemplar's unique 4-Wall Protection system provides comprehensive security for your information. You can set a designated phrase in your account to help identify and prevent phishing attempts. Additionally, we offer anonymous payment options through Monero, although our payment processor for XMR is still in development, necessitating support contact for such transactions. For convenience, automatic payments can also be carried out using Bitcoin and credit cards. Our servers are situated in Iceland, where we benefit from abundant renewable energy resources, operating entirely on green energy sourced from geothermal and hydropower. This commitment to sustainability enhances our service while contributing positively to the environment.
  • 10
    Conjurers Encrypter Reviews
    Conjurers Encrypter 4, often referred to as CE 4, is a robust and user-friendly freeware application designed for file encryption. This tool enables users to effortlessly secure their essential and private information by encrypting both files and folders. The encryption process involves transforming data into a coded format that is inaccessible to unauthorized individuals unless they possess the corresponding secret key. While CE is typically utilized for safeguarding sensitive documents, employing encryption is also an effective means of preventing prying eyes from accessing your personal belongings. Additionally, once files are encrypted, you can send them to others via the internet with confidence, knowing that the information will remain unreadable to anyone except the intended recipient, even in the face of potential threats like network sniffing. Consequently, CE 4 not only enhances data security but also promotes privacy in digital communications.
  • 11
    CrowdSec Reviews
    CrowdSec, a free, open-source, and collaborative IPS, analyzes behaviors, responds to attacks, and shares signals across the community. It outnumbers cybercriminals. Create your own intrusion detection system. To identify cyber threats, you can use behavior scenarios. You can share and benefit from a crowdsourced, curated cyber threat intelligence platform. Define the type and location of the remediation you wish to apply. Use the community's IP blocklist to automate your security. CrowdSec can be run on containers, virtual machines, bare metal servers, containers, or directly from your code using our API. Our cybersecurity community is destroying cybercriminals' anonymity. This is our strength. You can help us create and distribute a qualified IP blocklist that protects everyone by sharing IP addresses you have been annoyed by. CrowdSec can process massive amounts of logs faster than Fail2ban, and is 60x faster than Fail2ban.
  • 12
    Citrio Reviews
    Citrio is a sleek and efficient browser that showcases impressive performance capabilities. With its quick launch time, seamless navigation, and responsive add-ons, Citrio guarantees an unmatched web surfing experience. Prioritizing user privacy, Citrio does not collect any personal information from its users. The browser is equipped with robust security features, including built-in malware and phishing protection, along with automatic updates that ensure your system is always protected with the latest security patches. Citrio supports a wide array of add-ons and extensions available in the web store, allowing users to enhance its functionality according to their needs. This adaptability makes Citrio a versatile tool suitable for everyone. Additionally, Citrio features an integrated Download Manager that grants users complete control over their downloads. You can conveniently access all downloaded files directly through the browser at any time, making it easier to manage your content. Furthermore, the built-in download accelerator significantly improves download speeds, boosting them by as much as five times, ensuring a swift and efficient downloading experience. Overall, Citrio combines speed, security, and customization for a superior browsing journey.
  • 13
    Comodo Secure DNS Reviews
    This infrastructure features a fully cloud-based, load-balanced, and geo-distributed Anycast DNS system, ensuring high availability and operational efficiency across more than 25 countries. Web security is provided at the DNS layer, serving as the first line of defense for all internet-connected devices. It effectively blocks various threats, including phishing attempts, malware domains, harmful sites, botnets, command-and-control callback events, spyware, drive-by-downloads, XSS-injected pages, cookie theft, anonymizers, TOR activity, encrypted files, and all forms of web-borne attacks. This comprehensive solution safeguards, regulates, and monitors users' web traffic, regardless of their internet connection point, whether by company, location, endpoint, mobile device, IP address, subnet, or user identity. Users can customize the experience by adding their own logo, displaying different pages for each category, or modifying messages to align with their specific requirements. Gain real-time visibility of all internet-connected activities and set up scheduled reports to be delivered directly to your inbox. Additionally, it provides seamless protection for mobile devices across various cellular networks, including 2G, 3G, 4G, and LTE, as well as Wi-Fi connections. With this robust security framework, organizations can better manage their online presence and respond swiftly to emerging threats.
  • 14
    ByteFence Reviews
    Bytefence offers cutting-edge anti-malware software that identifies and eliminates a range of threats including trojans, worms, spyware, and various high-risk malware types. Renowned for its efficacy, ByteFence serves as a powerful shield against crapware and bundleware that can seep into unwanted programs and advertisements. With its real-time protection feature, users are consistently safeguarded from harmful infections and undesired software. The software boasts strong defenses against all forms of malware, efficiently scanning and eradicating dangerous trojans, worms, and spyware. For many years, Byte Technologies has led the way in malware detection and removal technology, and today, we safeguard millions of users with advanced systems that can foresee and counteract emerging malware threats. Our application is specifically crafted for ease of installation, configuration, and operation, ensuring a user-friendly experience. In the event that assistance is required, our dedicated support team is quick to respond, ready to provide help. Additionally, we present a comprehensive array of online resources and complimentary support for our products during the trial phase, ensuring that users have everything they need for a smooth experience. We remain committed to continuous improvement and innovation in the fight against malware.
  • 15
    Maltiverse Reviews

    Maltiverse

    Maltiverse

    $100 per month
    Cyber Threat Intelligence made easy for all types and independent cybersecurity analysts. Maltiverse Freemium online resource for accessing aggregated sets indicators of compromise with complete context and history. If you are dealing with a cyber security incident that requires context, you can access the database to search for the content manually. You can also link the custom set of threats to your Security Systems such as SIEM, SOAR or PROXY: Ransomware, C&C centres, malicious URLs and IPs, Phishing Attacks and Other Feeds
  • 16
    GreyNoise Reviews
    We analyze, label, and analyze data from IPs that scan the internet, and saturate security instruments with noise. This unique perspective allows analysts to spend less time focusing on innocuous or irrelevant activity and more time on emerging threats and targeted activities. GreyNoise allows analysts to identify events that are not worth their time. GreyNoise indicators are most likely to be associated with opportunistic web scanning or common business services, and not targeted threats. This context allows analysts to focus on the most important things. It's possible that your device has been compromised by scanning the internet. GreyNoise alerts analysts when an IP is found in our collection. This helps security teams quickly respond to any compromises. GreyNoise Query Language, (GNQL) allows security teams to find tradecraft across the internet. Our tags show IPs that are looking for and exploiting vulnerability. Security teams can monitor the progression of threat activity to assess their exposure.
  • 17
    Ceeyu Reviews

    Ceeyu

    Ceeyu

    €195/month
    Ceeyu specializes in identifying vulnerabilities within your company's IT infrastructure and supply chain (Third Party Risk Management or TPRM) by integrating automated digital footprint mapping, comprehensive attack surface scanning, and thorough cybersecurity risk assessments, complemented by online questionnaire-based evaluations. By revealing your external attack surface, Ceeyu empowers organizations to detect and manage cybersecurity risks proactively. An increasing number of security breaches originate from your company’s digital assets, which include not only traditional network devices and servers but also cloud services and organizational intelligence accessible online. Cybercriminals exploit these components of your digital footprint to infiltrate your network, rendering firewalls and antivirus solutions less effective. Moreover, it is essential to identify cybersecurity risks present in your supply chain. Many cyber-attacks and GDPR violations can be linked to third parties with whom you share sensitive data or maintain digital connections, emphasizing the need for vigilance in these relationships. By addressing these vulnerabilities, your company can enhance its overall security posture.
  • 18
    LessPass Reviews
    Avoid spending unnecessary time syncing your encrypted vault; instead, rely on a single master password that grants you access to all your passwords, no matter the device or location. LessPass generates a distinct password by utilizing a combination of the site, login, and your master password, simplifying your password management. There's no need for syncing across devices or to the cloud, as LessPass operates entirely offline! You can modify the generated password without altering your master password by simply adjusting the counter field in your settings, ensuring both convenience and security. This innovative approach eliminates the hassle of remembering multiple passwords while keeping your online presence secure.
  • 19
    iBoostUp Reviews
    iBoostUp is a powerful Mac optimization program that places a strong emphasis upon security. Spyware Doctor uses cloud-based signature scanning and advanced algorithms to detect malicious apps. HID Implant Guard alerts and protects against modified peripherals such as USB drives and Lightning cables that could compromise your Mac. BoostUp offers a behavioral Keylogger Guard, an ARP Cache Poisoning Detector, and an Application Uninstaller to delete all traces of uninstalled applications. It also offers a Duplicate File Finder that allows you to free up disk space by removing duplicate content files. iBoostUp is a great tool for Mac users who want their system to run at its best and protect their privacy from various threats. We are not affiliated to Symantec Corporation or Norton, iAntiVirus or PC Tools. Instead, we were founded by ex-employees who have a wealth knowledge in this field.
  • 20
    DMARCOFF Reviews
    Safeguard your brand against phishing and spoofing threats using DMARCOFF. Detect unusual activities, get real-time alerts, and respond without delay. With DMARCOFF, you can: - Keep track of your DMARC performance - Make certain that your email domain is securely defended - Detect harmful emails dispatched from your domain - Access a weekly DMARC report that provides comprehensive insights into your domain’s sending activities - View your reports in an easy-to-understand format - Receive notifications about any problems in your preferred manner and timing, ensuring you stay informed at all times.
  • 21
    CyberRiskAI Reviews
    Initiate a cybersecurity risk evaluation with CyberRiskAI. We provide a swift, precise, and cost-effective solution for organizations aiming to uncover and address their cybersecurity vulnerabilities. Our AI-driven evaluations equip businesses with essential insights into possible weaknesses, allowing you to focus your security resources and safeguard your sensitive information. Enjoy a thorough cybersecurity audit and risk appraisal. Our all-inclusive risk assessment tool comes with a customizable template. We utilize the NIST framework for cybersecurity audits. Designed for quick and straightforward implementation, our service is largely automated, offering a hassle-free experience. You can streamline your quarterly cybersecurity audits through automation. All collected data remains confidential and is securely stored. Upon completion of the audit, you will possess comprehensive information necessary to address your organization’s cybersecurity threats effectively. Armed with these critical insights into potential weaknesses, your team will be well-equipped to enhance security measures and mitigate risks effectively.
  • 22
    Phish Alerts Reviews
    Phish Alerts is a company that provides a Chrome extension designed to safeguard users against phishing attacks by detecting and blocking harmful websites that attempt to obtain their personal or financial information. As one of the most prevalent and perilous cyber threats today, phishing attacks can result in identity theft, financial fraud, or the installation of malware. To combat this issue, Phish Alerts employs advanced technology and comprehensive databases to identify and notify users of potential threats in real-time, helping them steer clear of phishing traps. Additionally, the company offers educational resources that inform users about the signs of phishing emails and websites, enhancing their online security. By incorporating these protective measures, Phish Alerts not only aims to shield users from cyber threats but also empowers them to navigate the internet more safely and confidently.
  • 23
    Hexway Pentest Suite Reviews
    Hexway Hive & Apiary allows you to efficiently collaborate with your team and generate detailed reports that can be used for action. It also helps you build better relationships with customers.
  • 24
    Securaa Reviews
    Securaa is an all-encompassing no-code platform for security automation that boasts over 200 integrations, more than 1,000 automated tasks, and 100+ playbooks. By utilizing Securaa, organizations can seamlessly oversee their security applications, resources, and operations without the complexities of coding. This platform empowers clients to efficiently utilize features such as Risk Scoring, Integrated Threat Intelligence, Asset Explorer, Playbooks, Case Management, and Dashboards to automate Level 1 tasks, serving as the primary tool for streamlining daily investigations, triage, enrichment, and response activities, which can reduce the time spent on each alert by over 95%. Moreover, Securaa enhances the productivity of security analysts by more than 300%, making it an indispensable asset for modern security operations. Its user-friendly interface ensures that businesses can focus on their core objectives while trusting their security processes to an efficient automation system.
  • 25
    [D/Wallet] Reviews
    Take control of your online identity, verifiable credentials, and digital assets with an efficient system. Our blockchain-driven platform securely oversees infrastructure, safeguarding credential-generating data from exposure, and granting access solely to authorized users, while ensuring that every action and business transaction is immutable and permanently logged as blockchain entries. By removing the unpredictable and often high fees typically linked to blockchain transactions, it paves the way for broader acceptance and utilization. Furthermore, it enhances the user experience by eliminating the complexities of managing gas fees, allowing individuals to concentrate on their transactions and engagements within the blockchain network. Users enjoy the robust encryption of digital signatures that ensures their information remains confidential, and the incorporation of social log-ins further streamlines the access process. This integration not only delivers a smooth and secure user journey but also minimizes any potential obstacles that might arise. By focusing on user-centric design, we aim to foster greater trust and ease in digital interactions.
MongoDB Logo MongoDB