Best IT Security Software in Germany

Find and compare the best IT Security software in Germany in 2026

Use the comparison tool below to compare the top IT Security software in Germany on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    OnPage Reviews

    OnPage

    OnPage

    $13.99 per user per month
    1 Rating
    OnPage is an incident management system that integrates with a secure smartphone app. This allows response teams to get the most from their digital technology investments. OnPage's solid escalation features and on-call capabilities, as well as persistent notifications, ensure that critical alerts are not missed by IT and physician teams. OnPage is trusted by organizations to manage all their critical notifications, whether they are looking to minimize IT infrastructure downtime or reduce incident response times for healthcare providers. OnPage incident management improves critical communications in a variety of industries, including healthcare, IT support and manufacturing. OnPage's incident management platform ensures that critical notifications are received by the right people at the right time. You can track the status of each message with full-time-stamped audit trails.
  • 2
    Send It Secure Reviews

    Send It Secure

    Protected Trust

    $15 per month
    Send and receive encrypted emails that comply with HIPAA and GLBA requirements. Protected Trust Email Encryption has been rebranded as Send It Secure by Protected Trust. You might remember us as either Protected Trust Email Encryption or simply Protected Trust. With the expansion of our email encryption capabilities and an increase in our service offerings, we felt it was the perfect moment to introduce a new identity for our email encryption product. This rebranding aligns with our commitment to providing a trusted product in the market, and we are thrilled to enhance your experience with improvements tailored to your needs. Acknowledged as a leading solution for the secure transfer of sensitive information, we prioritize your trust and the safeguarding of your data. We're eager to share our refreshed email encryption solution, Send It Secure by Protected Trust, and look forward to supporting your secure communication needs more effectively than ever before.
  • 3
    PBHS SecureMail Reviews

    PBHS SecureMail

    PBHS

    $10 per month per account
    Ensure data privacy compliance effortlessly with PBHS Secure Mail, a robust HIPAA-compliant encrypted messaging platform designed for healthcare professionals such as doctors, dentists, and hospitals. Enjoy the convenience of not having to install, configure, or maintain any software, as PBHS Secure Mail is accessible from any device and location. Sharing important documents, radiographs, CT scans, and messages is straightforward, with everything organized for easy access by all team members involved in a case. Getting started is hassle-free; simply log in using your ADA Membership ID. Additionally, our optional Outlook Plug-in allows seamless sending and receiving of messages directly through Microsoft Outlook on your computer, ensuring that treatment letters and private communications from your practice management software are encrypted. Moreover, radiographs sent from your digital x-ray systems to Outlook are also protected. You can continue your usual email practices with colleagues and patients without compromising HIPAA compliance, allowing for a smooth transition to secure communications. This way, you can focus on providing quality care while maintaining the highest standards of data security.
  • 4
    LuxSci Reviews

    LuxSci

    Lux Scientiae

    $4 per/user/month
    LuxSci's mission is to keep personal data safe while reliably protecting the world’s communications. LuxSci specializes in providing HIPAA-compliant web and email communications services. LuxSci creates uniquely secure and customizable enterprise-grade environments and solutions that enable organizations to confidently meet their specific business and security needs at scale. Our services include Secure Email, Web, and Forms.
  • 5
    MailHippo Reviews

    MailHippo

    MailHippo

    $4.95 per month
    Sending and receiving HIPAA-compliant emails has never been so simple and cost-effective. With MailHippo, you can securely transmit sensitive information and attachments without any complicated setup or configurations; just register and start using it immediately. The platform employs end-to-end encryption to ensure that your emails and attachments remain protected, both while being sent and stored. Additionally, MailHippo seamlessly integrates with your existing email address and works with any email service provider. It is optimized for use on smartphones and tablets, making it highly convenient. You also receive a special link that allows you to collect secure emails from anyone easily. Take advantage of our limited-time Beta program to access our secure encrypted email messaging service for FREE and experience the peace of mind that comes with HIPAA compliance!
  • 6
    Ansys Cloud Direct Reviews
    Ansys Cloud Direct’s powerful, easy-to-access HPC cloud solution will change the way you think about simulation. Unlike other simulation cloud solutions, Ansys Cloud Direct is simple to set up and navigate, will not break your workflow and does not require cloud experts to operate. Ansys Cloud Direct is all about Workflow, Performance, Support.
  • 7
    Vaporstream Reviews
    Vaporstream provides a secure platform for confidential conversations, allowing users to send messages that disappear while ensuring compliance with regulations. You retain full authority over who can view your sensitive corporate data, including when it can be shared, copied, or saved, both within your organization and after it has been delivered to recipients. Enjoy the ease of standard mobile applications combined with the privacy, reliability, and functionality that your business needs. With our cutting-edge content controls and robust security measures, you can engage in private communications that vanish, all while adhering to necessary compliance standards. Experience disappearing messages without sacrificing regulatory compliance. You can manage your records effectively and seamlessly incorporate them into your existing workflows. Ensure secure communications even with external partners through our mobile application, which is complemented by a desktop client. We prioritize your privacy by enabling you to erase entire conversations, not just individual messages, ensuring that your communications remain confidential.
  • 8
    Pryv.io Reviews
    Software for Privacy and Personal Data Management - A ready-to use solution for consent management and personal data. Pryv.io provides a solid foundation upon which to build your digital health solution. It allows you to collect, store and share personal data, as well as rightfully use it. - Maintained, developed and maintained by Pryv. Features - Pryv.io core system is available for production - User registration and authentication Granular consent-based access control rights - Data model for privacy, aggregation, and sharing - Complete data life-cycle: Collect - Store - Change - Delete - REST & Socket.io API Software integration and configuration made easy - Interoperability and seamless connectivity
  • 9
    RMail Reviews

    RMail

    RPost

    $7/month/user
    RMail®, the e-security platform from RPost®, is a global leader in 2000. RMail is a specialist in elegantly simple email encryption for privacy, compliance, legal e–delivery proof secure file sharing, email rights management, email impostor protection and email encryption. RMail's transmission security services are often used by businesspeople and business systems that need to send sensitive or consumer-regulated information. These RMail services can be used for messages that require additional functionality beyond standard email. They include (a) an easier-to-use and more automated email encryption to ensure privacy compliance; (b) a verifiable proof record of who sent what email to whom; (c) assurance and peaceof mind in relation to delivery and open status email of important and time-deadline emails, (d) need to have a timestamped proof that content was delivered; (f) the need to securely share large files.
  • 10
    Virtru Reviews
    Effortlessly manage access to crucial information that moves in and out of your organization through email, file-sharing platforms, and various other applications. This is made possible by the Trusted Data Format and Virtru’s top-tier Zero Trust Data Control platform. Virtru seamlessly integrates within the tools your teams rely on, securing operations in Google, Microsoft 365, Salesforce, Zendesk, and beyond. We democratize military-grade encryption, making it available to all. You can implement Virtru throughout your organization in under a day, helping you achieve your compliance objectives. With precise access controls, we protect your most important asset — your data — at every stage of its lifecycle, no matter where it goes. Collaborate securely within Docs, Sheets, and Slides, share and store files in Drive, communicate through Gmail and Google Meet, and ensure the security of messages sent via enterprise and custom applications. Additionally, you can effortlessly safeguard emails and documents shared through Outlook, reinforcing the protection of your sensitive information. This holistic approach not only enhances security but also streamlines your workflow across different platforms.
  • 11
    ins2outs Reviews

    ins2outs

    ins2outs

    $25 per month
    ins2outs is an advanced cloud-based SaaS platform designed for integrated compliance management, enabling organizations to establish, implement, and sustain various management systems such as quality, information security, privacy, environment, and AI within a cohesive framework. By merging robust software with pre-configured "know-how" sets aligned to standards like ISO 13485/21 CFR 820, ISO 27001, ISO 27701, IEC 62304, and ISO 42001, along with expert consulting services, it empowers organizations to create organized documentation—comprising policies, processes, procedures, instructions, and document templates. Additionally, it facilitates workflow management through automated role-based training, timely push notifications, compliance KPIs, customizable documentation logic, version control, and detailed audit trails, all securely hosted in the cloud. Users benefit from the ability to operate interconnected systems that fulfill various regulatory and standard obligations, while collaboratively managing electronic documentation with built-in traceability and export capabilities. This comprehensive approach not only enhances compliance but also streamlines operational efficiency across different regulatory environments.
  • 12
    iionLife Reviews
    iionLife, developed by iionHealth, serves as a complimentary patient portal tailored for professionals in behavioral health. This effective, fully HIPAA-compliant platform allows practitioners to enhance the care they provide beyond traditional office settings. With features like standardized assessment instruments such as the PHQ-9, it supports comprehensive tracking of patient outcomes, journaling, monitoring of activities, and secure messaging capabilities. Additionally, it encompasses valuable tools such as Community of Care, Care Plan, Reference Library, and Accounting, making it a versatile resource for both providers and patients. The platform not only streamlines communication but also fosters a more engaged patient experience.
  • 13
    AlertEnterprise Reviews
    AlertEnterprise offers an integrated platform that combines cyber-physical security by bridging the gaps between IT, OT, and physical security systems, aimed at preventing, detecting, and mitigating risks. Our solution dismantles security silos, providing a comprehensive perspective on threats and vulnerabilities while simultaneously improving workforce safety, safeguarding data privacy, and enhancing user experience. As the sole SaaS provider capable of seamlessly connecting physical security with IT, OT, and HR systems, we enable organizations to empower their workforce and achieve unprecedented operational efficiency through a zero-trust cyber-physical platform focused on identity, access governance, and security measures. What's more, there's no coding necessary to utilize our features. For compliance professionals or those involved in investigations, our platform replaces cumbersome logs and manual audits with self-service options, pre-defined checks, structured workflows, and more. Facility owners will also benefit by having the ability to generate reports, monitor mandatory training, and access an automatic audit trail at any time they require it, ensuring a streamlined management process. This comprehensive approach not only facilitates better security practices but also fosters a more agile organizational environment.
  • 14
    TF2000 Reviews

    TF2000

    ComputerProx

    $79 one-time payment
    The ComputerProx TF2000 is a device that automates the locking process of your computer when you step away, enhancing security effortlessly. Utilizing ultrasound technology, it senses your presence and locks the system automatically when you are out of range, eliminating the need for any manual keystrokes. This means no more frustrating timeout settings that can mistakenly activate while you are still nearby. The device is designed to accurately detect when you are present, ensuring that it won’t inadvertently lock the computer at inappropriate times. Connecting via the USB port, the TF2000 is recognized by the system as a keyboard, allowing it to send commands as keystrokes without the need for additional drivers. Users can easily customize the individual keystrokes and timing using the provided configuration tool. Moreover, in addition to the 'walk-away' feature, the TF2000 also incorporates a 'walk-to' sequence, which triggers specific keystrokes when you approach the computer. For instance, when nearing the PC running Windows XP, the TF2000 automatically sends the CTRL-ALT-DEL combination, preparing the system for user authentication seamlessly. This advanced functionality not only streamlines your workflow but also enhances the overall security of your computer.
  • 15
    Chetu Reviews
    Chetu is a global software development company that provides businesses worldwide with cost-effective, custom technology solutions and support services. With a unique software delivery model designed to meet the needs of the client, Chetu's one-stop-shop model spans the entire software technology spectrum. Including its global headquarters in Sunrise, Florida, Chetu maintains sixteen locations throughout the U.S., Europe, and Asia, and has over 2,200 software experts worldwide with industry-specific expertise in over 40 verticals. Chetu is your trusted backend technology partner. We help your business develop desktop, mobile, and web-based apps quickly with on-demand developers who are focused on your business's progress.
  • 16
    Forescout Medical Device Security Reviews
    Forescout Medical Device Security, a dedicated healthcare solution, is part of Forescout Continuum. The CyberMDX Healthcare Security suite was formerly known as this solution. It provides continuous, real-time visibility and discovery of all medical devices connected to your clinical network. The solution then evaluates the risk of each device by taking into account known exposures, attack potential, and operational criticality. Continuous, real-time discovery and analysis of your connected medical devices, clinical network, and devices behind firewalls or serial gateways. Clear and concise risk assessment for each connected medical device, based on known exposures and attack potential. Also includes operational criticality using AI and rule-based attack detection. Each connected medical device has its own security policy and access. Smart isolation blocks device access to prevent unauthorized nodes.
  • 17
    HIPAA Vault Reviews
    Our hosting and cloud solutions that adhere to HIPAA regulations are ideally suited for healthcare providers and organizations seeking reliable and secure cloud and website hosting options. At HIPAA Vault, our managed services guarantee response times of under 15 minutes for urgent alerts and an impressive first call resolution rate of 90%. Our team of dedicated IT experts addresses a wide range of needs, from basic support inquiries and maintenance to more intricate challenges like advanced firewall setups and comprehensive system monitoring. This approach can lead to lower operating costs while ensuring you benefit from the latest security advancements and regulatory compliance. For those requiring a Windows environment, our HIPAA Compliant Windows Hosting plan offers an excellent choice for peace of mind. Additionally, we provide tailored HIPAA-compliant email messaging solutions to suit your business requirements, ensuring security, convenience, and adaptability in all aspects of your operations. By choosing our services, you’re investing in a robust infrastructure that prioritizes both compliance and efficiency.
  • 18
    BridgeHead Reviews
    Assisting healthcare organizations in unifying essential patient, clinical, and administrative information, while ensuring its protection and easy accessibility for staff to achieve a comprehensive view. Break down your data silos by consolidating patient and administrative data from across the entire healthcare organization. Maximize your healthcare data storage capabilities by effectively using all available storage resources and minimizing overall ownership costs. Protect your healthcare data while guaranteeing efficient restoration in the event of cyber threats, data loss, corruption, or disasters. Improve patient care and outcomes by equipping your staff with straightforward access to a complete view of a patient’s medical history. Phase out outdated or legacy applications while still keeping access to the data they hold, thereby conserving time, finances, and resources. Additionally, embrace a digital transformation of your entire clinical testing procedures to expedite testing operations on a larger scale. This holistic approach not only enhances operational efficiency but also fosters a culture of innovation within the healthcare environment.
  • 19
    Verifiable Reviews
    A cutting-edge provider data engine that offers instantaneous verifications and robust automation, streamlining the processes of credentialing and managing provider networks. This solution serves as a centralized hub for overseeing all provider data, workflows, onboarding, and network management tasks, along with various other related operations. By replacing traditional manual verification methods with automated solutions, organizations can enhance efficiency, reduce costs, and improve compliance by minimizing the risk of human error. Experience rapid verifications and sophisticated network oversight tailored to the specific requirements of your business. The system features advanced credentialing and compliance tracking that alerts you to potential gaps before they escalate into significant problems. Ensure that you have the most precise and current data available through our unique real-time lookups, conveniently accessible via an API designed for seamless integration. Ultimately, this healthcare API not only meets your needs but also provides a user-friendly experience, allowing for customization and effortless integration with your existing systems and workflows. Enjoy the benefits of having a powerful tool that enhances operational efficiency while maintaining high standards of accuracy.
  • 20
    MediCat Reviews
    Ensuring cybersecurity and data protection in mobile healthcare applications is crucial for safeguarding sensitive information and preventing data breaches. Users deserve assurance that their data privacy is a priority. MediCat eliminates the need for complex user configurations during onboarding, offering a smooth authentication process for everyday use. This technology guarantees adherence to stringent healthcare regulations, including GDPR and HIPAA. Healthcare providers and hospitals utilize MediCat to develop secure mobile applications while effectively safeguarding sensitive data. The platform has undergone rigorous evaluations and received endorsements from cybersecurity auditors and data privacy experts in the healthcare sector. If you share your contact details, one of our specialists will reach out to you promptly. With a strong emphasis on data protection and a seamless user experience, MediCat's technology, which comprises a mobile SDK, can be seamlessly integrated into any mobile application. By prioritizing user-friendly security measures, MediCat allows healthcare professionals to focus on patient care while ensuring compliance and protection of sensitive information.
  • 21
    Blackwell Security Reviews
    Blackwell's highly specialized security operations are specifically crafted to provide comprehensive protection and swift responses tailored to the distinct requirements of healthcare organizations. Safeguard your entire ecosystem with complete MDR signals, personalized healthcare intelligence, and cutting-edge security tools that guarantee around-the-clock defense against sophisticated cyber threats. Dedicated to the healthcare sector, Blackwell Security offers managed security operations that empower you to minimize risk, uphold compliance, and foster a secure healthcare continuum. Enhance your current tools, broaden your SOC team, and collaborate with expert healthcare threat hunters to ensure ongoing visibility, prevent incidents, and maintain compliance with your existing infrastructure. By leveraging specialized guidance, elevate your organization's cybersecurity maturity to streamline and fortify your security protocols, address vulnerabilities in your cyber compliance framework, and proactively initiate enhancements throughout your program. Moreover, this approach not only strengthens your security posture but also enhances overall operational efficiency within your organization.
  • 22
    Cynerio Reviews
    We cover all threats with automated security and risk reduction on every Healthcare IoT device, from medical/IoMT devices to Enterprise IoT systems and OT systems. This ensures patient safety, data confidentiality and operational continuity. Cynerio promotes proactive and preventive cybersecurity through automated risk reduction, threat mitigation and attack prevention tools. We also offer step-by-step remediation programs based on a zero trust framework that incorporates clinical context to make hospitals secure fast. Hospital networks are extremely vulnerable to IoT devices from Healthcare. Insecure devices increase cyber attack surface and pose a major threat to patient safety as well as the operational continuity of hospitals.
  • 23
    Aithent Reviews
    Businesses and governmental entities of various scales rely on Aithent's knowledge and innovative solutions to address their operational hurdles and fulfill their digital transformation requirements. By enhancing operational workflows, Aithent aids in reducing risks linked to fraud, anti-money laundering (AML), and disputes. The company has significantly improved operational efficiency and overall performance through the innovative development and implementation of technology. Furthermore, the Aithent Dispute Manager facilitates collaboration among branches and call centers located in different regions, ensuring a consistent investigation process for every dispute and safeguarding the integrity of your institution's brand. This unified approach not only strengthens brand reputation but also enhances customer trust and satisfaction across all platforms.
  • 24
    HEAL Security Reviews
    A comprehensive cybersecurity solution that aggregates and correlates information from meticulously selected, powerful datasets, offering you an all-encompassing context. This unified platform stands out for its unparalleled cyber threat and vulnerability intelligence tailored for the healthcare sector, equipping you with the essential insights needed to make pivotal decisions and the tools required for prompt action. The HEAL Security cybersecurity platform consists of three fundamental products, each sharing the same foundational cyber threat intelligence and collaborating seamlessly to enhance your team's situational awareness. Gain access to crucial data and advanced analytical capabilities, enabling you to quickly uncover profound insights, identify vulnerabilities, evaluate technology, and stay updated with relevant news—all consolidated in one efficient location to outpace emerging threats. Essential cybersecurity information vital for your organization is presented on a single screen, continuously refreshed in real-time, thereby empowering your team to make well-informed decisions swiftly and effectively. This integrated approach not only streamlines the decision-making process but also fortifies your organization's security posture against evolving cyber threats.
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB