Best IT Security Software in Asia

Find and compare the best IT Security software in Asia in 2024

Use the comparison tool below to compare the top IT Security software in Asia on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Quest KACE Reviews

    Quest KACE

    Quest Software

    As low as $3/mo/device
    2 Ratings
    KACE is an endpoint management solution that offers a single point of control for managing IT systems across the entire organization. From initial deployment to ongoing maintenance, KACE is designed to fulfill all endpoint security and deployment needs—helping businesses quickly deploy, monitor, and manage their devices using a unified inventory database. KACE improves device security with on-demand hardware and software discovery, patch management, compliance reporting, and real-time monitoring of mobile endpoints. KACE is a Unified Endpoint Management solution that offers a single point of control for managing IT systems across the entire organization, inside or outside your network. This comprehensive solution takes the stress out of keeping devices secure and compliant so you can do more. Unified Endpoint Management by KACE. Where Next Meets Now.
  • 2
    USB-LOCK-RP Reviews

    USB-LOCK-RP

    Advanced Systems International

    $20 per client/one-time
    2 Ratings
    USB Control & Lockdown Software to Block USB devices Access and Lock USB Ports within Windows Systems. Centralized USB Device Management, Monitoring, and Whitelisting to Protect Computers within a Network. Endpoint Security Management's USB Device Control program is an important component of Endpoint Security Management. It focuses on protecting computer systems and data assets against threats from unauthorized USB device use. To protect networks that store sensitive information or control machinery, it is necessary to control USB device access to endpoints. Latest version v12.968 (released: September 26, 2021 - Centralized USB Device Management - Secures Computers in Groups or Specific Computers. - Whitelists specific devices by Hardware ID and blocks the rest -Automatically apply Group 1 protection settings to unassigned clients. NEW! -Automatic Authorizations Mode, Whitelist USB devices across the network automatically. NEW -Receives alerts & logs USB device connections in the network. -Exports Status and Alerts Reports to csv format (Comma-separated value) - Presents Full Screen Locking on Blocking Devices (includes company logo). - Monitors and Encrypts File Transfers From Endpoints to USB.
  • 3
    FastPass SSPR Reviews

    FastPass SSPR

    FastPassCorp

    $0.20/user/month
    2 Ratings
    FastPass strengthens user protection against identity theft. The integration of FastPass SSPR and FastPass IVM within FastPass Enterprise enhances productivity for both end-users and help desk support, concurrently serving as a defense against social engineering threats aimed at the service desk. To thwart password theft at the help desk, a secure IT workflow is imperative. FastPass IVM, available as a certified cloud or on-premises solution, delivers dynamic and contextual verification. Tailored to specific user groups based on security policies, this solution leverages insights into the user's device usage and multi-factor authentication (MFAs), establishing a secure defense against hacker attempts. FastPass SSPR presents an advanced self-service solution for password resets and unlocks. Seamlessly accommodating passwords from AD, Entra, SAP, IBM, Oracle, LDAP, and other systems, it ensures a secure approach to user authentication. MFA and manager approval for verification in addition to Q/A. Password reset for WFH users with local password cache update.
  • 4
    Innvikta Reviews

    Innvikta

    Innvikta Cybersecurity Solutions

    Free
    2 Ratings
    One-off, off-the-shelf training cannot validate your unique vision of cybersecurity. In this rapidly changing threat environment, a customized and continuous curriculum that speaks to YOUR co-workers about YOUR security policy is needed. Innvikta’s Security Awareness Training Platform(InSAT) enables organizations to deliver an effective training program. Features include Attack replication, Just-in-time training, auto-enrollment into courses, dynamic landing pages, etc. Our unique business model allows us to provide our clients with customized training content specific to their security policies. This allows for a highly relatable and engaging learning experience for the users.
  • 5
    Security Score Reviews
    OPSWAT Security Score can help you identify weak points in your computer security and fix issues that make you vulnerable to cyber attacks. 1. Download the free OPSWAT Security Score App and click it to run. No installation required! 2. Find out your security score and identify risks 3. Fix Your Security Issues
  • 6
    VyprVPN Reviews

    VyprVPN

    Golden Frog

    $5 per month
    2 Ratings
    Sign up now to save 44% You can connect in one click and enjoy privacy, security, and unlimited internet access. VPNs encrypt your internet connection to protect it and your privacy. VyprVPN was created in response to government surveillance. Our strong encryption protects your information from hackers, identity theft, and malware. It prevents your ISP from tracking you every move and stops advertisers from selling or collecting your valuable data. VyprVPN allows you to escape censorship. To hide your location and bypass internet restrictions imposed by governments, workplaces, and organizations, change your IP address. Our servers disguise your identity and protect your traffic from being leaked to your ISP's DNS servers. VyprVPN offers an app that can be used for both public wi-fi and home streaming. VyprVPN can be installed on all devices to keep you connected and secure.
  • 7
    Sumo Logic Reviews

    Sumo Logic

    Sumo Logic

    $270.00 per month
    2 Ratings
    Sumo Logic is a cloud-based solution for log management and monitoring for IT and security departments of all sizes. Integrated logs, metrics, and traces allow for faster troubleshooting. One platform. Multiple uses. You can increase your troubleshooting efficiency. Sumo Logic can help you reduce downtime, move from reactive to proactive monitoring, and use cloud-based modern analytics powered with machine learning to improve your troubleshooting. Sumo Logic Security Analytics allows you to quickly detect Indicators of Compromise, accelerate investigation, and ensure compliance. Sumo Logic's real time analytics platform allows you to make data-driven business decisions. You can also predict and analyze customer behavior. Sumo Logic's platform allows you to make data-driven business decisions and reduce the time it takes to investigate operational and security issues, so you have more time for other important activities.
  • 8
    Hypervault Reviews

    Hypervault

    Hypervault

    €3.8 / month / user
    2 Ratings
    Hypervault helps teams and companies securely manage more than just passwords, in the most efficient way. Easily organize and access your data in separate Workspaces and Folders. For the lack of anything better, stop messing around with plain secure notes. Our handy templates for many data types and formats allow you to securely store and manage any type of sensitive data in the most structured way. Hypervault has pre-formatted data templates for devices, networks, API keys, licenses, computer accounts, databases, ftp's, email-settings, ... No more need to store everything that is not a password in a meaningless secure note.
  • 9
    DriveStrike Reviews

    DriveStrike

    DriveStrike

    $0.99 per month
    2 Ratings
    DriveStrike is simple to use, implement, and manage. DriveStrike allows you to perform remote wipe, remote lock, or remote locate commands on any platform. Mobile device management MDM for mobile platforms. Integrated drive encryption support. Our support team is available to answer any questions, help you install our services, or manage your account. It's never been easier to protect your data and devices. We are happy to answer any questions you may have or help you understand how to best protect your data. Protect your business with a device- and data protection platform that keeps all devices protected with a single solution. Your Workstations, iPads and iPads, Smartphones as well as Tablets, Tablets, Tablets, and Laptops will be protected, organized, secure, & protected.
  • 10
    Sucuri Reviews

    Sucuri

    Sucuri

    $9.99 per month
    2 Ratings
    Our dedicated researchers monitor active malware campaigns. We aim to provide the best malware removal services with a team of highly trained analysts. Our best-in-class tools and scripts scan your website in real time for malware. To detect any anomalies in the source code, our security analysts inspect it. Our incident response team can detect and fix any hack. We can provide immediate assistance if you require it. Choose the plan that best suits your needs. Talk to us about our one-time priority cleaning service. We are experts in eliminating complex malware infections. No matter how complex or frequent the malware infections are, we guarantee a fixed price. All website security packages include unlimited cleanups, pages and databases for a year. Sucuri is the perfect fit for your site, regardless of whether it uses a CMS. We specialize in open-source content management and can fix any website malware infection.
  • 11
    Delivery Trust Reviews

    Delivery Trust

    Identillect Technologies

    $5.95 per month
    2 Ratings
    Senders retain complete control. They can restrict recipients' rights to print, forward, or download content and even retract it at any time. Identillect is constantly updated to keep up with regulatory changes. Both senders and recipients will find it easy. Recipients don't need to register or subscribe. Identillect's patented vCard technology can be used to streamline secure communications from Outlook. You can set the level of security you want, and enforce enterprise policies across the entire network by limiting recipient permissions. This add-in gives you access to all Delivery Trust®, Web Only capabilities and features. The DELIVERY TRUST® O365 Addin makes it easy to secure your communications and responds while on the move. It is easy to use and requires no training. This add-in gives you access to all DELIVERY TRUTH® - Web Only capabilities and features.
  • 12
    StaffCop Reviews

    StaffCop

    Atom Security

    $69.00/one-time/user
    2 Ratings
    StaffCop is a fully integrated solution that focuses specifically on the detection and response of insider threats. It uses a combination of advanced behavioral analysis, context-rich logging and insider activity to provide a unique and comprehensive solution. Collect All activity events should be collected at the end points to allow for future analysis, notifications, and decision making. Analyze Automated and statistical analysis of data to identify anomalies in user behavior, identify insiders, and disloyal workers. Alert Alerts automatically sent to employees about security violations and dangerous or unproductive activities. Report Pre-configured and self-made reports are available for periodic e-mailing. A powerful constructor makes it easy to create reports. Block To reduce the risk of malware infection, you can block access to "negative" websites by running applications and removable USB-storages. This will increase employee productivity and decrease the risk of malware being transmitted. Review Search for keywords and regular expressions to find all data, drilldown & easy correlation
  • 13
    Rublon Reviews

    Rublon

    Rublon

    $1/month/user
    2 Ratings
    Rublon allows your workforce to securely connect to your organization's servers, networks, and applications. Multi-factor authentication makes it easy to protect your data and comply with data protection regulations such as GDPR. Rublon can be deployed across your organization, enabling multi-factor authentication (MFA) for all cloud apps, VPNs servers, workstations, on-premise and internal apps.
  • 14
    IPQualityScore Reviews

    IPQualityScore

    IPQualityScore

    $49.99 per month
    2 Ratings
    IPQualityScore's suite fraud prevention tools automate quality controls to prevent bots and fake accounts, fraudsters chargebacks & malicious users, without interfering with the user experience. With industry-leading IP reputation data and user validation, you can detect bad actors and block cyber threats. For smoother operations and less headaches, proactive Prevent Fraud™.
  • 15
    Routee Reviews

    Routee

    AMD Telecom

    $0.01 one-time fee
    2 Ratings
    Routee is an intelligent omnichannel communication platform. (CPaaS), Routee offers advanced Web and API automation for all industry sectors. Routee's services are powered by AMD Telecom's strong infrastructure. They enable businesses to optimize marketing and business processes. -SMS Marketing: Custom-made messages based upon customers' individual preferences -Email Marketing: personalized newsletters and email campaigns based upon audience behavioral data -Transactional email: automated emails to customers regarding important data about their transactions -Marketing Automation: Rich forms & customer data capture. Automate repetitive marketing tasks and track marketing campaigns. -Two factor authentication: A second layer of security that includes fallback via SMS, Voice, Viber, and Missed Call -Cloud IVR: Multilingual capabilities, including the ability to convert speech into text and text to human-sounding text -Push Notifications: personalized web and mobile push notifications based on segmentation.
  • 16
    NordLocker Reviews

    NordLocker

    Tefincom

    $1.49 per month
    2 Ratings
    Leading-edge encryption at your fingertips. We use the most sophisticated ciphers and principals, including Argon2, AES256 and ECC (with Poly1305, EdDSA, and XChaCha20), to ensure your files are secure. Think about all the personal files that you would rather keep private. You can prevent them from falling into the wrong hands or being used in malicious ways. Finances, IDs, passwords. This information could lead to identity theft and loss of money. NordLocker provides top-notch security for sensitive data. NordLocker secures your sensitive data from prying eyes, so it doesn't matter if it's your diary and secret music collection. NordLocker will protect your files and show your professionalism when you share your work with clients.
  • 17
    BrainStorm QuickHelp Reviews
    Equip your team with the only learning platform that’s purpose-built for software adoption. Accelerate onboarding, reduce support, deepen engagement, and grow usage. Whether you’re a Solution Provider onboarding new clients, an IT team needing a more scalable way to manage end-user training, or an L&D team focused on onboarding employees to the company tech stack, BrainStorm will make your results better. Activate un-engaged users – BrainStorm is the only learning platform that proactively targets licensed users who haven’t logged in yet. When you convert dark users, your usage impact moves from incremental to exponential. Accelerate adoption – Don’t just teach users how, teach them when and why to use features and applications. BrainStorm is built to automate training that gets people to change the way they work. Course authoring: Upload and assemble your learning assets into BrainStorm Flows™, adaptive workflows that deliver relevant, timely learning to every learner. Role-based learning: Custom-content flows organized by groups ensure the right content is teed up for the right audience. Targeted communications: Attract and activate unengaged learners through timely communications.
  • 18
    Chromnius Browser Reviews
    Chromnius Web Browser is updated with the most recent security updates and smart features to block display, pop-up ads, and trackers. Chromnius automatically protects against security issues such as phishing or dangerous sites.
  • 19
    Kleptofinder Reviews

    Kleptofinder

    Kleptofinder

    $10 for 100 credits
    2 Ratings
    Kleptofinder is a tool that can help you protect your images from being used without permission. It searches them online to show you exactly which websites and social media profiles are using them. To put it simply, it's a tool that scours the internet, finds pictures and remembers them. Unlike other tools Kleptofinder does not require you to upload any images manually. Simply paste your website or link your Instagram account, select the security pack that suits your needs and and let our AI do a magic. You will be presented with a list of websites where your pictures are republished, all with a single click of a button. Kleptofinder is an Artificial Intelligence tool, made for a single purpose of finding NFTs or pictures stolen from YOUR website or Instagram account. It’s a unique piece of software, requiring NO manual uploads, NO risk of privacy loss and NO time wasted.
  • 20
    Fortect Reviews

    Fortect

    Fortect

    $35.14 per year
    2 Ratings
    Fortect is a system repair solution that can fix all your problems. It fixes freezes, crashes and the dreaded Blue Screen of Death. It also reverses the damage caused by viruses while restoring Windows back to full working order. Phase one is a quick system scan that identifies all issues with Windows, including system performance. Phase two fixes the registry, replaces corrupted or missing system files and cleans up your hard drive. Fortect's free scan will help you identify Windows issues, recover from viruses, and optimize your computer. Fortect keeps up with the constant evolution of computer issues. Your system will always perform at its best thanks to a database of updated files and fixes. Powerful technology that repairs and optimizes any PC in a safe manner. Start Fortect to get a free system report that will reveal your PC's problems, including a free scan and fix for viruses and spyware.
  • 21
    OpenVPN Reviews

    OpenVPN

    OpenVPN

    $15 per user per year
    2 Ratings
    Others have virtualized software to run on their hardware appliances, but our solution was designed and optimized to run as a single software application. Our VPN server software is available in many formats to make it easier to deploy your VPN. Are you looking to expand your datacenter to an IaaS Cloud? Remote access to private Cloud resources and applications, or create a multicloud private overlay network? Install our VPN Server on Cloud to do it securely, quickly, and easily. Are you ready to transform your datacenter into a virtualized environment. If so, we made it easier to install our Server software by packaging it as a virtual appliance in two of the most popular hypervisor solutions: Microsoft Hyper-V and VMware ESXi 5.0. VPN Server is available for both 32-bit Linux Operating Systems and 64-bit Linux Operating Systems. Red Hat Enterprise Linux and CentOS, Ubuntu, Debian and openSUSE are supported.
  • 22
    RoboForm Reviews
    RoboForm securely stores your passwords and logs in with just a click or tap. AutoFill is a quick and easy way to save time on long web forms. RoboForm's random password generator creates a strong, unique password for each site. Forget about using weak passwords or duplicate passwords. Share your Login information securely with other RoboForm users. Enter the email address of the recipient and click "Send". RoboForm employs AES256 bit encryption with PBKDF2 SHA256 to protect your data. Two-factor authentication (2FA) is available to allow you to access your account. Your email address and Master Password are required to create your RoboForm Account. Your data is protected by the Master Password. It is the only password you will need to remember. You can add your passwords manually, import from your browser, a CSV or any other password management software. RoboForm automatically saves your new passwords when you log in to online accounts.
  • 23
    Avira Prime Reviews

    Avira Prime

    Avira Operations

    $9.99 per month
    2 Ratings
    Cross-platform and multi-device security is the ultimate in security. Ransomware, viruses, hackers, and phishing email are just a few of the many ways your business could be at risk every day if it isn't properly protected. Avira Prime offers the ultimate security, including complete endpoint protection, online privacy, and optimized speed & performance. You can protect all your endpoints against online threats and malware in real-time. Unlimited VPN, privacy settings, password management, and unlimited VPN will protect your business data and online usage. You can optimize your digital experience by ensuring faster speeds, more memory, cleaner PCs, and better performance. All our products are available on all platforms, including PCs, Macs, Androids, iOS, web browsers, and Macs. All your needs are covered by one solution. Avira Prime scans your entire system in one click. It finds malware, weak passwords and outdated apps. It also detects vulnerable networks.
  • 24
    RescueTime Reviews

    RescueTime

    RescueTime

    $9 per month
    2 Ratings
    RescueTime allows you to set a personal daily Focus Work goal that you can track while you work on your computer. RescueTime keeps track of what you are working on and alerts when you lose focus or try to do too many things at once. Focus Sessions are for those times when you need to be focused. RescueTime blocks distractions and provides reports on how focused you are. RescueTime's reports will give you a clear view of your work day and show you where your time is going. You can use this information to improve your work/life balance and understand how you spend your time. Find out what distracts and how it affects your work. You can create better habits based upon your unique work style. Look at your strengths and determine where you can improve.
  • 25
    Comodo Advanced Endpoint Protection Reviews
    Comodo Advanced Endpoint Security (AEP) protects your computer from malware. Malicious applications often attempt to bypass its protection. Comodo AEP has strong self-protection countermeasures to prevent malicious applications from taking control of or bypassing Comodo AEP services. AEP intercepts system calls that could pose a threat to applications. Terminate Process and Create Remote Thread are two examples of calls that might be a concern to AEP. CreateFile is another less obvious, but potentially more dangerous call. It can do much more than just create files. These calls are intercepted by Comodo AEP and allowed to proceed only if they don't cause harm to the Comodo process. Comodo AEP also includes a kernel mode driver, which it uses to stop attempts to modify the system's kernel directly.