Best Network Security Software in New Zealand

Find and compare the best Network Security software in New Zealand in 2024

Use the comparison tool below to compare the top Network Security software in New Zealand on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    VaultCore Reviews

    VaultCore

    Fornetix

    $1,118 per year
    VaultCore™ is a next-generation, highly scalable enterprise key management solution from Fornetix®. It integrates seamlessly with existing platforms, automates policy, and empowers administrators with a centralized, organized control that can be easily applied across all environments. Request a demo to experience VaultCore's products: - Quick, seamless integration with existing technology - Separation Of Duties (a best practice). - Powerful automation allows for centralized control of policy - Increased security of data in motion, at rest, and in use - Significant reduction in the costs associated with data breaches -- lost businesses, recovery time, reputational damage - Simplified compliance, regulatory enforcement - Scalable to more than 100 million keys (more that enough to meet any industry or government's requirements) - Reporting capabilities to meet compliance requirements - Ease in Use
  • 2
    Noction Flow Analyzer (NFA) Reviews
    Noction Flow Analyzer is a network monitoring, alerting, and analytics tool that can ingest NetFlow, IPFIX and sFlow data. Engineers can use the NetFlow analyzer to optimize their network and applications performance, control bandwidth usage, plan network capacity, monitor and alert, perform detailed BGP peering analysis and improve security.
  • 3
    Trend Micro Cloud One Reviews
    Trend Micro Cloud One, a security services platform for cloud builders, delivers the broadest and deepest cloud security offering in one solution, enabling you to secure your cloud infrastructure with clarity and simplicity. By considering your cloud projects and objectives holistically, Trend Micro Cloud One provides powerful security, while you leverage all of the benefits and efficiencies the cloud offers your business. Comprised of multiple services designed to meet specific cloud security needs, Trend Micro Cloud One gives you the flexibility to solve your challenges today, and the innovation to evolve with your cloud services in the future. You no longer have to find point products to meet the unique requirements of your infrastructure or work with the processes you’ve already implemented. With a comprehensive set of services, designed specifically for the cloud, Trend Micro Cloud One secures the different parts of your environment within one simple platform, seamlessly complementing and integrating with existing AWS, Microsoft® Azure™, VMware®, and Google Cloud™ toolsets.
  • 4
    Sectrio Reviews
    Sectrio is a comprehensive OT/IoT cybersecurity solution that identifies and secures connected infrastructure. It provides a safety net to mitigate threats and unprecedented visibility across device types and systems, enabling businesses make informed decisions about their security posture. It uses a robust detection strategy that uses signatures, heuristics and machine learning-based anomaly detectors to identify and remediate threats in converged networks. This includes IoT, OT, IoT and Cloud environments. It protects your infrastructure against sophisticated attacks like zero day, APTs and malware. Our multi-layered approach to securing a constrained ecosystem and our consulting services have helped our customers stay safe from advanced threats.
  • 5
    Twingate Reviews

    Twingate

    Twingate

    $10 per user per month
    The way we work has changed. People can now work anywhere and not only from their office. Applications are now hosted in the cloud and not on-premise. The company network perimeter is now distributed across the internet. Traditional, network-centric VPNs for remote access are not only difficult to maintain and outdated, but also expose businesses to security risks. It is expensive and time-consuming to purchase, deploy, and maintain VPN infrastructure. Hackers can expose entire networks if they are unable to secure access at the application level. Twingate allows organizations to quickly implement a zero trust network that is more secure than VPNs. Twingate is a cloud-based service that allows IT teams to quickly set up a software-defined perimeter without having to change infrastructure. It also centrally manages user access to internal apps, no matter if they are in the cloud or on-prem.
  • 6
    Shieldoo Reviews

    Shieldoo

    Cloudfield

    $0,49 per hour/server/user
    Shieldoo, a next-generation private network that allows remote connection from anywhere, was built using the well-known open-source Nebula tool. The Shieldoo secure network is composed of nodes, lighthouses, and an admin centre. The nodes are the user device, the server, the cloud stack, and the LAN acces box. Two nodes can discover each other via a lighthouse, and then connect peer to peer. Shieldoo makes it easy to build complex security infrastructures. The wizard will help you set up your security infrastructure. Administration is handled in the admin centre. You only pay for the users and servers that are accessed in the network each month. The complete feature set is available to you: unlimited admin accounts, MFA, domain of your choice, and unlimited SSO.
  • 7
    PureDome Reviews

    PureDome

    PureDome

    $8.45 per user per month
    PureDome is a secure connectivity solution specifically designed to enhance network security for businesses. It simplifies access management, granting authorized team members exclusive access to company assets. With seamless integration of user roles, including secure remote access, data access control, and team management, our unified cloud platform streamlines network infrastructure management, centralizing operations for businesses. Securely access your corporate network from anywhere with PureDome's reliable remote access. We provide 24/7 support through live chat and ticket assistance, ensuring expert help whenever you need it. Experience top-notch security and support with PureDome! Main Features: Secure Remote Access Dedicated IPs for Individual CustomersUser & Device Management Network Segmentation Centralized Management & Analytics Plan Customization
  • 8
    Horangi Warden Reviews

    Horangi Warden

    Horangi Cyber Security

    $300.00/month
    Warden is a Cloud Security Posture Management solution (CSPM) that allows organizations to configure AWS infrastructure in accordance with internationally recognized compliance standards. It does not require any cloud expertise. Warden is a fast and secure way to innovate. Warden is available on AWS Marketplace. You can use its 1-Click deployment feature to launch Warden, and then pay for it on AWS.
  • 9
    Primo VPN Reviews

    Primo VPN

    IAInnocationLab

    $3 per month
    VPN solution for your connectivity requirements supports OSX versions, including Catalina (10.15). PPTP MAC over OSX versions including Catalina (10.15). PPTP VPN Protocol for Catalina. L2TP Protocol over IPSec Protocol. L2TP/IPSecVPN Protocol fast and reliable. Multiple connections, supports multiple VPN connections simultaneously. Original MAC OS protocol. Based on the original MAC OS VPN protocols. Secured credentials storage and all credentials stored within keychain mac secured infrastructure.
  • 10
    Spam Marshall Reviews

    Spam Marshall

    ITA Networks

    $749 one-time payment
    Spam Marshall has been keeping Exchange servers spam-free ever since 2003. Hundreds of small and medium-sized companies around the world have come to depend on Spam Marshall as their first line defense in keeping corporate inboxes clean. Spam Marshall's customs rules engine technology (CuRE), is a cutting-edge tool that prevents spammers from infiltrating Exchange Servers. SpamMarshall features include real-time monitoring, use of content filters, grey listing, anti-phishing, PTR Check and incoming emails rate control. Domain type checks, domain age check are just a few. Spa Marshall gives administrators all the tools they need to customize filtering options. Spam Marshall is easy to install and is flexible, scalable and affordable. Spam Marshall is available for as low as $749 and runs seamlessly on Exchange 2000 and 2003, 2007 and 2010, and any other SMTP server. It supports Windows 2000, 2003, 2007 and 2008 and is available both in x386 or 64bit versions.
  • 11
    SNOK Reviews

    SNOK

    SecureNok

    $0.01
    SNOK™, a cybersecurity monitoring system and detection system, is designed for industrial networks and control systems. SNOK™, which detects targeted industrial attacks like espionage and sabotage, as well as other security interruptions in control system, is able to detect them. SNOK™, which combines network monitoring with endpoint monitoring, components such as HMI's and Servers, is unique in that it combines both network and endpoint monitoring.
  • 12
    CloudFish Reviews

    CloudFish

    CloudFish

    $9.09 one-time payment
    Cloud-Fish provides a solid defense against data breaches and cyber-attacks for your business. It protects sensitive data across all platforms. Your confidential business information, intellectual property, and customer data are stored on the computers and mobile devices of your employees, as well as on any external cloud servers your company uses. This sensitive information must be secured to protect your business from financial risks, regulatory violations, or reputation setbacks. How can you ensure security of sensitive data that is distributed across multiple platforms? Your company has both regional and global offshore offices. You have very little control and visibility over what is happening in your offshore company. Who is sharing which information? You will need to be able to monitor the situation and have a way to respond in case of a cyber-attack.
  • 13
    Specops Password Auditor Reviews
    Authentication is essential. Our password audit tool scans your Active Directory to identify password-related vulnerabilities. Multiple interactive reports are generated from the collected data. These reports contain user and password policy information. Specops Password Inspector is a free, read-only program that can be downloaded for no cost. Analyze domain password policies and fine-grained password policies to determine if they allow users to create secure passwords. To identify password vulnerabilities in accounts, such as expired passwords and identical passwords, you can generate reports. Specops Password Audior provides additional insights and allows you to assess the effectiveness of your policies against a brute force attack. The product overview contains a complete list.
  • 14
    UpGuard Reviews

    UpGuard

    UpGuard

    $5,249 per year
    The new standard for third-party risk management and attack surface management. UpGuard is the best platform to protect your organization's sensitive information. Our security rating engine monitors millions upon millions of companies and billions upon billions of data points each day. Monitor your vendors and automate security questionnaires to reduce third- and fourth-party risk. Monitor your attack surface, detect leaked credentials, and protect customer information. UpGuard analysts can help you scale your third-party risk management program and monitor your organization and vendors for potential data leaks. UpGuard creates the most flexible and powerful tools for cybersecurity. UpGuard's platform is unmatched in its ability to protect your most sensitive data. Many of the most data-conscious companies in the world are growing faster and more securely.
  • 15
    RDS-Shield Reviews

    RDS-Shield

    Marty Soft Conception

    $299 one-time payment
    RDS-Shield, a Windows Service that manages a lot server events, has an intuitive Administration interface. You don't need to install Java, update PHP or download MS C++ libraries. It all comes with you and is so powerful. It's easy to download, install, and then discover. GPO & AD are not necessary. Simply put: All users in this group will now be in the Highly secured user environment. However, this account will also be in the Secured user session. Other users will still work in Kiosk Mode. You can import Applocker's rules easily without opening GPO. Allow Homeland Access, set Working Hours and control intrusion attempts. You get what you say immediately. Your decisions are immediately applied, without reboot, without logoff/logon required for connected users, and will apply for future accounts as well as unconnected users. Are you ready to drive more Security Rules with a few clicks?
  • 16
    DefendX Control Reviews

    DefendX Control

    DefendX Software

    $8000 one-time fee
    Secure corporate files and control storage resources. You can think of us as the camera in your office supply room. Your files and storage assets are being exposed to theft, loss, and misuse by those who are responsible for maintaining them. These threats can lead to revenue loss and increase risk. It is your responsibility to identify it and stop it. Storage consumption can be managed using both hard and soft user limits. Advanced file blocking policies can be used to prevent unwanted files from getting into your environment. Policy governance is maintained through thorough discovery, real-time alerts and automated quarantine/removal actions. Audit trails provide extensive evidence that can be used to support legal holds and investigations. You can protect yourself against theft and other malicious activities by monitoring user behavior and file activity.
  • 17
    Intelligent Management Center Reviews

    Intelligent Management Center

    Hewlett Packard Enterprise

    $2000.00/one-time
    Aruba AirWave, the only multi-vendor wired/wireless network management solution, is designed with mobile devices and users in mind. AirWave provides IT with the insight it needs to support today's digital workplace by proactively monitoring all things connected. As network management becomes more complex the risks of compromised data flow have increased. The HPE Intelligent Management Center, (IMC), provides comprehensive management across campus core networks and data center networks. IMC transforms network data into actionable information that helps keep your network and business moving. Service management solutions and HPE network support telco networks from core to edge, allowing operators to reap the benefits of 5G. The management of the Fibre Channel (FC), storage area network (SAN), and data center can be simplified. HPE IMC Branch Intelligent Management System. Remote management of Customer Premises Equipment (CPE) via the Internet.
  • 18
    ScoutDNS Reviews

    ScoutDNS

    ScoutDNS

    $15 per month
    The DNS Layer provides content filtering and malware protection. ScoutDNS is used by organizations of all sizes to increase visibility, comply with content obligations and reduce malware exposure. You can manage 67 content categories. Search results for image and video images are restricted to Google and Bing networks. YouTube Strict and Moderate modes are supported with G Suite support. Block streaming media, P2P and social networks. Blocks ransomware, malware, and phishing websites. Stop hidden malware and objectionable contents in embedded ads. Easy to deploy and automatic updates to the latest threats. Full log reporting and dashboard. Create and mange multiple whitelist/blacklists.
  • 19
    Sqreen Reviews

    Sqreen

    Sqreen

    $499 per month
    Every app has security built in. Everywhere. App security platform that allows teams to protect applications, increase visibility, and secure code. Protect your applications by stopping data breaches, blocking account takeovers, and blocking business logic attacks. Streamlining incident response management, increasing visibility and automating your application inventory will increase visibility. Secure code by identifying and fixing vulnerabilities, integrating security into the SDLC, and finding and fixing critical threats. You can protect, monitor and test your applications from one platform. This allows you to apply a holistic security strategy. To provide more robust security without compromising on performance, analyze application execution logic in real time. Sandboxed microagents can dynamically adapt to new threats and applications without the need for maintenance.
  • 20
    RBLTracker Reviews

    RBLTracker

    RBLTracker

    $8.00/month
    RBLTracker is an easy-to-use, 24/7 blacklist monitoring tool for email, website and social media. We combine monitoring data from hundreds different data sources. You will receive multi-channel, real-time notifications when any of your hosts are listed. We offer both a monthly and a customizable, pay-per-check option. Integrate our API directly into your provisioning and monitoring processes. You can manage thousands of IP addresses as easily as one IP address. You can be sure that your customers will be able to reach you securely with our help. RBLTracker is a leader for blacklist monitoring. We perform over 650,000 checks per day, for thousands, in more than 45 countries. RBLTracker is the only company that provides URIBL, Safe Browsing and Threat Exchange and DNS Security Monitoring for your email, websites and social media. You can manage thousands of IP addresses as easily as one.
  • 21
    Lynis Enterprise Reviews

    Lynis Enterprise

    CISOfy

    $90 per year
    Lynis Enterprise provides security scanning for Linux, macOS and Unix systems. It allows you to quickly identify and resolve issues so that you can refocus on your business and projects. It is quite unusual for a company only to focus on a few operating system. We are a specialist in Linux and Unix security, in a field that offers so many software and services. Lynis' primary goal is to perform a system health check. It can also detect vulnerabilities and weaknesses in configuration management. Lynis Enterprise allows you to perform security auditing and compliance testing. It also helps to apply system hardening. It includes Lynis Enterprise in its core and focuses on Unix-based environments such as Linux, macOS or other Unix-based systems.
  • 22
    PerfectMail Antispam Reviews

    PerfectMail Antispam

    PerfectMail

    $499 one-time payment
    PerfectMail has a better than 99% accuracy rate with false positives (wanted spam blocked) at less that 0.1%. PerfectMail learns about users and their regular email peers and never blocks their mail. PerfectMail will only have issues with suspicious e-mails from new senders. This eliminates the risk of antispam filtering. The basic structure of most spam filters is: Receive e-mail, queue and filter, then deliver or deliver a non-delivery response. This model can cause mail to be delayed, and recipients or senders may not realize that they have been blocked. PerfectMail filters messages in real-time, so it does not need to wait for them to arrive. PerfectMail will notify the sender if their message has been blocked. PerfectMail's antispam engine uses C, the fastest programming language in existence.
  • 23
    Themis Reviews

    Themis

    Cossack Labs

    $0.01
    Secure Cell is a multi-mode cryptographic container that can store anything, from encrypted files to database records. Secure Cell can be used to encrypt data at rest. Secure Cell is built around AES256-GCM, AES256-CTR. Secure Message is a simple encrypted messaging system that can be used for a wide range of applications. Secure Message allows you to send encrypted and signed data between users, from client to client, to protect against MITM attacks and prevent single secret leakage. Based on ECC+ ECDSA / RSA+ PSS+ PKCS#7. Zero-knowledge proof protocol to compare secrets over untrusted channels without exposing leaks or reuse attacks. Secure Comparator is used to authenticate users. No password (or hash) is transmitted over the network. Secure Session is a session oriented encrypted data exchange with forward secrecy to provide better security and more demanding infrastructures.
  • 24
    VIPole Reviews

    VIPole

    VIPole

    $5.99 per month
    Chat window clearing, message editing and deleting, complete history wiping, auto-delete, chat window clearing, and message deletion. Remotely disconnecting devices, fake secret phrase and auto lock. Contact authorization, configurable contact authorization, hidden and blacklisted contacts, individual visibility settings, configurable contact authorization. Track the progress of your colleagues and yourself by assigning tasks. Securely share passwords with contacts by storing and organizing them. Encourage collaboration by setting goals and monitoring the resolution of issues.
  • 25
    NopSec Reviews
    Cyber defenders can now manage the complex processes that make cyber exposure impossible to manage. NopSec's platform provides cyber defenders with an end-to-end way to bring these processes together. It allows them to identify, prioritize, remediate and simulate cyber exposures and then report them. You can't protect what's in your environment if you don't know. To manage cyber risk, adaptive cyber management requires complete visibility of your IT assets. Nopsec helps you avoid potential blind spots caused by unmanaged cyber risk and cyber exposures.