Best Microsoft Family Safety Alternatives in 2024
Find the top alternatives to Microsoft Family Safety currently available. Compare ratings, reviews, pricing, and features of Microsoft Family Safety alternatives in 2024. Slashdot lists the best Microsoft Family Safety alternatives on the market that offer competing products that are similar to Microsoft Family Safety. Sort through Microsoft Family Safety alternatives below to make the best choice for your needs
-
1
1Password
1Password
16,079 Ratings1Password is a password manager that's secure, scalable, easy-to-use, and trusted by some of the most prestigious companies in the world. 1Password makes it easy to keep your employees safe online with its simple interface. Good security habits will become second nature once 1Password is a part of your employees' workflow. 1Password Advanced Protection now available with 1Password Business You can set Master Password policies, enforce two factor authentication across the entire team, limit access with firewall rules, review sign in attempts, and require that your team use the latest version 1Password. Our award-winning apps can be downloaded for Mac, iOS and Linux as well as Windows, Android, and Windows. 1Password syncs seamlessly between devices so that your employees have access to their passwords at all times. Your risk is reduced and your productivity increases when everyone uses 1Password. -
2
ShieldApps Cyber Privacy Suite
ShieldApps
$77.90 per 3 devicesWhat you do on your computer and online should be your business. In most cases, third parties are tracking your web habits and personal information to monetize or steal your identity. It takes powerful software all day long to protect against malicious cyber attacks. Cyber attacks are becoming more common in our increasingly digitalized world. Today, we share so much personal information online that it is difficult to protect against malicious hacking attempts. Our comprehensive software ensures that you and your family are always safe when using your devices or browsing the web. Cyber Privacy Suite protects you from harmful privacy threats, and identifies proactively where your data is vulnerable or exposed. -
3
BrowseControl
CurrentWare Inc.
$3.99 PUPM 1 RatingBrowseControl web filtering software blocks websites based on URLs and categories. Granular internet restriction policies can be customized for each user, department, or organizational unit. Includes other device restriction features such as an app blocker, port filter, and internet restriction scheduler. BrowseControl’s security policies are enforced by a software agent that is installed on your user’s computers. This allows the solution to continue blocking websites and applications even when computers are taken off-site. -
4
McAfee LiveSafe
McAfee
$39.99 per year 2 RatingsMcAfee®, LiveSafe™, is the best protection for your computers, Macs and smartphones. McAfee LiveSafe offers award-winning antivirus protection, as well as many other features, to protect your computer, mobile devices, and identity. We keep you safe so that you can concentrate on what is important. Protect your computer from viruses and other threats with both online and offline protection. One subscription protects your Macs, PCs, smartphones, tablets, and computers. When you connect to public Wi-Fi, keep your browsing habits and data secure. McAfee LiveSafe is a standout among our security solutions. Its combination of privacy, identity tools, and antivirus features will protect you against all types of threats. When you sign up for auto-renewal** you will have access to our secure VPN. This provides bank-grade encryption to protect your online activities and personal information. -
5
Cisdem AppCrypt
Cisdem
$29.99 one-time paymentAppCrypt for Mac is a reliable tool to protect your data and prevent unwanted websites. AppCrypt allows you to lock any application using one password. You can also ban purchases in iTunes or App Store, block others from viewing your photos and videos in Photos, disable games apps, and encrypt chatting records on WhatsApp. All applications can be locked with one password. AppCrypt blocks access to distracting or harmful websites in Chrome browser and Safari browser. It can block the entire domain, or just specific URLs. Blocklist can be used to filter out inappropriate websites. Allowlist allows you to access websites that are useful for your study or work. AppCrypt allows you to set up a schedule when you can access the app or website. Predefined sessions can be set up at any time and day of your choosing. -
6
ManageEngine DataSecurity Plus
Zoho
$745 per yearManageEngine DataSecurity Plus lets you take control of sensitive data. Take a look at the most recent user activity, file activity, as well as access trends. The four Ws of every access are who accessed it, when and from where. The most important events, such as sudden permissions changes, file deletions and renaming events, are those that matter the most. Identify the most active users, most frequently accessed files, as well as the most modified files within your file system. You can set up instant alerts to notify you of sudden spikes in folder or file access or modification events. Receive real-time notifications when multiple attempts are made to access critical files. After business hours, monitor changes to sensitive files. Monitor only critical files, folders and shares. Receive real-time alerts when files are modified in an unauthorized manner. To detect unusual activity and misuse of privileges, configure threshold-based alerts that monitor user-generated events. -
7
iLocker
Protectstar
$376 per yeariLocker makes your Mac more flexible and safer, even if you are sharing your Mac with others. iLocker Mac protects each app from unauthorized access, including Apple Mail, Photos Contacts Safari and Games. iLocker Mac protects the apps you choose. It also records failed attempts to access protected apps so that you can see the date and time. To improve security, the automatic exit feature locks down the app after a certain time when you are away from the keyboard. There is only one way to protect the app you want. You can just drag and drop your apps onto the button. You can now unlock your Mac instantly. Apple Pay is a secure way to make online purchases. Access system settings and locked Notes quickly. You can even switch users with a single touch. -
8
BroShield is the best choice if you want to rid your system of unwanted spyware. This provides you with a powerful anti-snooping feature and detects harmful viruses. BroShield protects your computer. BroShield protects your computer and gives you full control over the internet. You can monitor what content your child is exposed to. You have the power to restrict access to adult websites and other harmful content. You can control internet access time. Many illegal websites still exist on the internet. We must make sure that our children are not exposed to porn, gambling, or other inappropriate websites. These sites can contain viruses and other undesirable things. BroShield is available 24/7 to monitor the computer for potential threats and viruses. BroShield's smart fail-safe feature is designed to detect remote snooping activities and prevent your computer from being compromised.
-
9
Antivirus protection and WiFi Security VPN go hand in hand. You need both antivirus protection and WiFi Security VPN to stay safe online. While antivirus protects your devices and VPN protects your connection by keeping you browsing private, both work together to provide you with security and privacy while you work, share, bank, browse, and bank. Webroot protects usernames, account numbers, and other personal information from online threats. Our cloud-based protection keeps your family and you safe every time you connect. Webroot is the most efficient, lightweight and cost-effective antivirus product on the market. You can stay safe at home and on the move. Access your files on your mobile device securely and easily. Privacy protection and system maintenance tool that erases all past online activity to protect privacy.
-
10
iSafeSend
iSafeSend
iSafeSend allows you to securely send sensitive information via email. iSafeSend creates a unique link that you can use to access your confidential or sensitive information. This unique link is only available for a short time. Once it expires, it is deleted and cannot be accessed again. iSafeSend allows multiple unique links to be sent in separate emails. Using iSafeSend, users can create shareable links which, when clicked on, allow recipients to access the sensitive data you are sharing. This data can only once be viewed and it is deleted after that. These links cannot be viewed more than once. Therefore, recipients should not forward them to others. You can specify the number days before the links expire, and the number you wish to create. Each link generated can only be viewed once. -
11
Norton AntiTrack
Norton
$34.99 per yearYou can browse without losing speed, even on sites that restrict access to other tools. Clearing cookies doesn't stop companies from using your digital fingerprint to profile you. You can monitor tracking attempts and see how we keep your data more private with a dashboard. Your subscription starts when your purchase is complete (or when you pay). To get protection, you must install the software on each device. NortonLifeLock reserves the right to cancel any special offer. Subscribing means you are purchasing an automatic renewal subscription. -
12
Island
Island
Island gives the enterprise complete control over the browser. It delivers a level governance, visibility and productivity that was simply not possible before. Controlling where and when users copy/paste into or out of applications. Checking device posture before granting access to an application. Preventing unauthorized screen captures. Understand the full story of user activity and experience. Trace incidents to the user, device and time. All browser data can be fed into your analytics platform so that you have everything you need in one place. Island can be customized to match your company's brand, messaging and workflows. You can even insert browser-based RPAs to protect sensitive data, based on the unique governance requirements. Island is built using Chromium, which is the same open-source software that powers Chrome, Edge and other mainstream browsers. -
13
Avast Online Security & Privacy
Avast
FreeProtect your browser data from malicious websites and phishing attacks, and receive step-by-step privacy guidance. Our browser extension is a great privacy starter pack. Protect your browser from online threats and phishing scams. Protect your online activity, block online snooping, and receive step-by-step privacy advice. In seconds, identify and block phishing scams. Safer search engine results will show you which sites are safe before you visit them. Receive real-time threat alerts whenever you come in contact with suspicious web pages. Protect your online activity, block online snooping, and receive step-by-step privacy advice. Your online activities will remain anonymous and private. Our Privacy Advisor will help you optimize your privacy settings across all your favorite platforms. Our new Privacy Advisor feature will help you get privacy advice and manage your privacy settings across all your favorite online platforms. -
14
Intrusta
iSubscribed
$24.99 one-time paymentDigital security should be simple for you, we believe. We are here to protect you so you can click, surf, and browse without worry. We are your partner. We identify, analyze, and prevent threats so that you can get on with your day. Intrusta's goal to simplify online security is ours. We make it easy to use our software, pay your bill, or chat with a customer service representative. We have moved on from confusing billing practices and shocking price hikes. We will tell you upfront what you pay and when. You shouldn't be surprised when renewal time comes around. We are perpetual learners and have a knack to improve. Our knowledge helps us keep up with changing threats. We are proud of our outstanding support. We are reliable, empathetic and always available to help. We can help you with any technical, product, or payment problem. -
15
Adaware Protect
Adaware
FreeAdaware Protect is an all-in-one suite which includes Adaware Secure Browser to improve your online security. Adaware Protect protects your computer from dangerous websites. Adaware Protect blocks dangerous websites and allows you to see which applications attempt to access unknown URLs. Adaware Protect can be used to prevent hackers and spyware accessing your microphone and camera. One click is all it takes to start a video conference. Adaware Safe browser allows you to navigate the internet faster and more privately. For a faster browsing experience, block ads. To prevent being tracked, block trackers and cookies. Our private search allows you to hide your search history. To optimize your computer's performance, choose your favorite features. Adaware Protect can scan and remove any unnecessary files or applications from your computer. It's never been easier to keep your computer safe! -
16
Microsoft Defender for Individuals
Microsoft
The Microsoft Defender app is now available for download as part of your Microsoft 365 subscription. It provides easy-to-use online security for you, your family and your devices. One centralized view allows you to monitor and manage your security status across all your devices and computers. Anti-phishing and antivirus protection can help protect your family and you from online threats. Receive real-time alerts that include recommended actions and information about how you can stay safe online. All your online security status can be viewed from one central location. All your data and device protections for your family are available in one place. You can easily add or remove devices. You and your family can rest easy knowing that malware protection is available. You get continuous protection with antivirus scans for your devices and apps. You can control what files and apps are scanned by identifying trusted ones. Receive real-time alerts about security changes that affect you and your family. -
17
Coro eliminates the need to constantly worry about security tools being overlooked and the security tool overload. There's no need to go through everything 10 times per day. Coro will monitor your security and alert you when you need to act. Coro will analyze the threats to your business and take action to eliminate them. Then, Coro will guide you on the next steps to improve your security. Coro is your central control point for sensitive data and practice data. It allows you to enforce a wide variety of security, compliance, and governance policies. Every email is scanned for malware, phishing, and ransomware, and we automatically eliminate any threats. We automatically detect and block insider threats, account hacking, and other malicious activities. We scan every file, email, and data share for PII/PCI/PHI and prevent confidential information from being leaked.
-
18
SentryBay Armored Client
SentryBay
You can now download the missing piece of the security stack jigsaw in just one click to complete your armored defense against cyberattacks. The Armored Client provides instant patented protection for applications and data, without the need to detect or respond to threats. It does this by using kernel-level prevention of data exfiltration even if there are threats, as well as secure wrapping applications and injected security. The Armored Client uses a multilayered approach to protect endpoint devices that are being used remotely to access your data and applications, and to allow secure online browsing. All corporate apps, regardless of whether they are managed, BYOD, or unmanaged, are targeted at the endpoint and run in secure sessions. -
19
Webroot Internet Security Plus
Webroot
$35.99 per yearAntivirus protection and WiFi Security VPN go hand in hand. You need both antivirus protection and WiFi Security VPN to stay safe online. Both antivirus protect your devices and VPN protect your connection by keeping you browsing private. They both work together to provide you with security and privacy while you work, bank, share, bank, and browse the internet. Webroot SecureAnywhere®, Internet Security Plus offers cloud-based protection against online threats for all of your devices, keeping you safe no matter where or how you connect. It scans faster and uses less system resources. It protects you in real-time by instantly identifying new threats and blocking them as soon as they occur. -
20
HiddenApp
HiddenApp
HiddenApp helps organizations protect their Apple, Chromebook, Windows, and Android fleet of devices against loss or theft through a suite of location tracking, device monitoring, and advanced recovery features. -
21
We are GOOSE VPN. The European VPN. We are on a mission! We work with you to give you control over your online life so you can enjoy it safely and without limitations. Compare prices and find the best deals worldwide. Grab that local deal! VPN stands for Virtual Private Network. It is a secure tunnel that connects your device to the internet. Once you connect to a secure GOOSE VPN server your internet traffic flows through an encrypted tunnel that no one can see, including hackers, governments, and your internet provider. You can move anonymously over the internet, and you can choose your location. This bypasses blockades and censorship, as well as stalker pop-up ads.
-
22
WinSweeper
Solvusoft
$39.95 per yearWinSweeper permanently erases all traces of your internet history and computer activities. Your computer records every website you visit, every photo or video you view, and every message you send. All this information is available for anyone to view. WinSweeper Software is installed on your computer so you don't have to worry about anyone spying on you. Each section is accessed by clicking on the appropriate link. This will display a list of all relevant sectors, programs, browsers, and components that you can clean. You can choose to clean all of them or just select a few. Once you have decided what privacy scanning should be performed, click the "Start Scan" button. The process of cleaning is quick and shows progress bars for both the current task as well as the overall process. -
23
OSE
Open Seas
Compromised organizations can face significant barriers to restoring customer trust and brand reputation after being hacked. OSE alerts you to any attacks on your critical systems and warns you if they happen so that you can stop them before they cause damage to your brand, reputation, IP, and customer trust. OSE provides an audit of an attack, listing the changes made and what they were before resolving it quickly. OSE reporting is helpful in ISO 27000 compliance. OSE (Operating System Security Enforcer), implements your Security Policy. This can be either an out-of-the-box OSE standard or your customized version. Applying the security policy to all Unix, Linux, and Windows corporate servers. -
24
SpyShelter
SpyShelter
$25 per yearSpyShelter Anti Keylogger monitors the behavior of all current actions on your computer and allows you to block any malware attempts to take place. SpyShelter can stop both custom-made and commercial keyloggers. This technology is unique and cannot be detected by anti-virus software. SpyShelter doesn't rely on fingerprint databases, so you won't have to worry about zero day malware. Your registry, RAM, and all applications will be protected as soon as SpyShelter is installed. SpyShelter's fast algorithm processing is faster than other security software. This makes it more suitable for older computers. SpyShelter Anti Keylogger offers solid protection against both known and unknown "zero day" spy and monitoring software. This includes keyloggers screen loggers webcam loggers and keyloggers. -
25
McAfee Total Protection
McAfee
$19.99 per yearMcAfee®, Total Protection provides protection for your security needs today, so that you can live your life online. Safe browsing, premium antivirus. Secure VPN and ID theft protection. McAfee is more than antivirus software. It offers peace of mind. McAfee protects what is most important - you. McAfee has protected over 500 million devices using its award-winning antivirus. However, we understand that you need a solution to protect your privacy and personal information, as well as help you navigate safely online. Multi-layered identity protection protects your accounts by notifying you if your information is leaked online and automatically generating complex passwords. Secure VPN turns unsecured networks into your private network, protecting your credit card information and personal data. Search results and social media pages can be contaminated by color-coded links that expose fraudulent and dangerous sites. We'll even direct you to safety if your misclicks are detected. -
26
Your attack surface is the sum total of all attack vectors that can be used against your perimeter defenses. It is simply the amount of information that you are exposing the outside world. The attack surface is the most important thing hackers will need to exploit to break into your network. When attacking targets, professional hackers usually follow the cyber kill chains. Typically, the first step in this process is to survey the target's attack surfaces. This is called advanced reconnaissance. By reducing the attack surface, you can reduce the risk and prevent attacks from ever happening. The cyber kill chain is a method for categorizing and tracking all stages of a cyberattack, from early reconnaissance to the exfiltration data.
-
27
AccessPatrol
CurrentWare Inc.
$3.99 PUPM 1 RatingAccessPatrol is a data loss prevention and device control software for preventing data leakage to portable storage hardware. With AccessPatrol you can restrict a variety of peripherals including USB portable storage devices, optical media, Bluetooth, WiFi, FireWire, and cell phones. Access permissions for USB devices can be set to Allow, Read Only, or Blocked. Peripheral devices can be identified based on Vendor ID, Serial Number, and PNP Device ID. Specific USBs, External Hard drives, Imaging devices, and portable devices can be added to an Allowed List to enforce the exclusive use of company-approved devices. -
28
TEMASOFT FileMonitor
Temasoft
With unrivalled accuracy, track file access and monitor file copy operations in real-time on shared and local files. Our file monitoring technology is more than just basic audit operations like read, write, or attribute changed. It can record and transmit the entire context surrounding complex activities such as file copy (locally or over the network or USB devices), file archived or file uploaded through browsers, or file attached to emails. It is much easier to monitor shares and get a better understanding of what happens to your important files. TEMASOFT FileMonitor can be customized to meet your specific needs. More information is available on our support page. The product offers more than just the main tracking capabilities. -
29
Trust Lockdown
White Cloud Security
We stop all unknowns automatically because we only focus on what you trust, and run on your endpoints. Trust Lockdown is the first to stop unknown items like new ransomware variants and advanced attacks. Stop the 'Break Fix' cycle that is consuming your time and money. Trust Lockdown also eliminates the need to patch your apps every day. Trust Lockdown allows you to do your app patches on a regular basis and not just when you need them. This gives you more time and money for other things, which will allow you to be more productive. Our protection works even if your device is not connected to the internet. Our endpoint protection works regardless of whether you choose to use our cloud-based or appliance-based service. It provides the same protection offline and disconnected from the internet. This is essential in today's mobile environment and the use of portable devices. -
30
AVG AntiVirus Business Edition
Avast
$44.99 per year 17 RatingsUnrecognized files are downloaded to one of your computers. A copy will be sent to Threat Labs experts to determine if it is safe. It checks webpages before they open in your web browser. To help you surf the internet with more confidence, it displays a safety rating in search engine results. Cloud-based proactive AI Detection and Real-Time Outbreak Detection provide better protection against the latest malware. Protects against online security threats such as spam, viruses, hackers, and malware Anti-Spyware protects you from spyware and adware which track personal information. Our Windows file server security keeps it private, secure, and out of hackers' reach. Advanced File Shredder securely deletes files in order to prevent unintended recovery. It scans your computer when you're not using it to ensure that it doesn't get in your way. It does all the work so that you and your employees can concentrate on your business without any costly delays or distractions. -
31
Sign up now to save 44% You can connect in one click and enjoy privacy, security, and unlimited internet access. VPNs encrypt your internet connection to protect it and your privacy. VyprVPN was created in response to government surveillance. Our strong encryption protects your information from hackers, identity theft, and malware. It prevents your ISP from tracking you every move and stops advertisers from selling or collecting your valuable data. VyprVPN allows you to escape censorship. To hide your location and bypass internet restrictions imposed by governments, workplaces, and organizations, change your IP address. Our servers disguise your identity and protect your traffic from being leaked to your ISP's DNS servers. VyprVPN offers an app that can be used for both public wi-fi and home streaming. VyprVPN can be installed on all devices to keep you connected and secure.
-
32
Aobo Internet Filter for Mac
EaseMon
$29.99 per monthAobo Filter Professional for Mac OS X is a piece Internet Filtering Software. It blocks inappropriate websites, games, and other harmful applications from Mac. Aobo Filter Mac has the ability to log website visits. This allows you to retrieve and identify visited sites from any web browser. Many offices and organizations consider computers an essential tool. Many employees have difficulty using it properly. They are often watching inappropriate videos, shopping online, or playing computer games. This can lead to low productivity. It is important to block inappropriate websites and applications. -
33
GlassWire
GlassWire
$35.88/year/ user Monitor the volume of data your PC is using for every single app, thanks to GlassWire's network monitoring graph. Keep track of the volume of data you received and sent in the past and who or what your PC is talking to. Detect spyware, malware, badly behaving apps, and bandwidth hogs, then block their connections with our powerful firewall. Monitor devices on your network and get alerted when new unknown devices join your WiFi. GlassWire warns you of network-related changes to your PC or unusual changes to your apps that could indicate malware. -
34
Webroot Security for Chromebook
Webroot
$14.99 per yearYou won't have to worry about your children online with Webroot®, Security for Chromebook™. Our Chromebook protection will keep your children safe, no matter what they are doing online: reading, browsing the web, playing new games, or connecting with friends via social media. Protection against known threats such as ransomware, malware, and other malicious software. Webroot protects usernames, account numbers, and other personal information from online threats. Online shopping, browsing, and banking are safer. -
35
Trusted Knight Protector Home
Trusted Knight Corporation
$34.95 per user per yearProtecting your identity, your family's online reputation, and all your sensitive information is the easiest and most effective way of protecting your identity. This alarming statistic is because every year, at least 24,000,000 new malware variants (malware that has been slightly modified to avoid detection by antivirus software), are discovered on computers. Your computer may already be infected by this type of malware. Protector Home is the best solution to protect your personal data, even if it is. It takes only minutes to install and automatically protects all your online sessions. Protector Home provides more than traditional protection. It offers the security and benefits your family requires, even if you have already lost your computer. -
36
360 Security Guard
360 Security Guard
360 Security Guard is a leading security antivirus product that can detect and kill all types of Trojan viruses. It is committed to protecting users' computers security. We have many features that will improve your computer's efficiency. You can scan the computer in multiple dimensions, including garbage collection, computer running speed, system abnormalities and computer security risks. This will quickly assess the system's status. To detect the threat situation immediately, 38 layers of protection barriers are added layer after layer, creating an all-weather, all-weather cyberspace defense. You can get the most recent information about popular games and events in real-time, gather multiple media, unify the entrance. Get the latest and most popular games, download and install them, and get access to them through 360 exclusive distribution channels. -
37
It is as simple as entering your email. We will set you up with a mSpy account so that you can monitor their activities in no time. We have multiple plans to suit your needs. Relax. After you have paid for your subscription you can log into your Control Panel to view their activity. We could go on about all the reasons why mSpy the best monitoring app is on the planet. We prefer to let the numbers speak for themselves. All you need in a mobile tracking application is here. mSpy was created to provide a remote mobile phone tracking solution that is simple to use and works immediately.
-
38
Trend Micro Maximum Security
Trend Micro
$39.95 per yearTrend Micro Maximum Security is compatible with Windows 11. This means that you can shop, play, and bank online without worrying about being hacked by fraudulent and malicious websites. Our cloud-based AI technology provides proactive protection against ever-evolving threats from malware infections. Trend Micro can protect you against known and unknown attacks, helping you stay ahead of the constantly changing threat landscape. You get multi-device protection against ransomware and viruses, as well as dangerous websites and identity thieves. Folder Shield Plus protects your digital assets and files locally as well as on cloud-synced folders. -
39
ZoneAlarm Extreme Security NextGen
Check Point
$44.95 per year 3 RatingsZoneAlarm for Business offers comprehensive, advanced, and flexible solutions for unmanaged businesses such as small businesses, Telco’s, government municipalities, and other businesses with little to no IT resources available. With its easy deployment and maintenance, ZoneAlarm for Business offers you Check Point’s vigorous multi-platform protection and support, made simple. ZoneAlarm Extreme Security NextGen is the comprehensive, ultimate PC and mobile security solution for all your business security needs, using Check Point’s cutting-edge enterprise-grade technology. Next-gen antivirus with award-winning Anti-Ransomware, advanced phishing protection, and secure browsing experience. Our advanced cyber security solutions use business-class protection to secure millions of home users’ PCs and mobile devices against the latest worldwide cyber threats. This powerful weapon is extremely effective at spotting malicious files and cyberattacks that evade traditional antiviruses. -
40
Securer way to surf the internet TunnelBear encrypts the internet connection to protect your online activity on any network. Simply open TunnelBear, choose a country, then flip the switch. TunnelBear will quietly work in the background while you connect to ensure your data is secure. Hackers can steal passwords, and other data via insecure public WiFi. TunnelBear blocks them to protect you. All you do online is visible to internet providers and network owners. TunnelBear is a tool that makes it impossible for them to see anything. Some content is restricted to certain regions. TunnelBear allows you to see content anywhere by changing your virtual location. Ad services track your behavior across websites using your IP address. TunnelBear blocks them by assigning a new IP. Some governments block apps and websites that are popular. TunnelBear allows you to change your virtual location to unblock them.
-
41
MemberProtect
InetSolution
MemberProtect allows professional programmers to integrate into secure online systems such as ACH, Online Banking and wire transfer applications. MemberProtect is the most trusted authentication, data encryption and user management system in the banking and credit union industry today. Based on roles and privileges model. Supports millions of users and organisations. Extremely precise application security. Strong encryption that protects databases down to the column level. Encrypt all email messages and flat files on your network. All data accesses should be logged, even if they fail. Even beyond firewalls, SSL and operating systems, protect member data from hackers and unauthorized staff. Use MemberProtect to create secure connections with third party APIs. Access to any web-based service, including LDAP support. -
42
TF2000
ComputerProx
$79 one-time paymentThe ComputerProxTM TF2000 automates locking the computer when you are away. The TF2000 uses ultrasound technology to detect your presence. The TF2000 locks the system automatically when you leave the vicinity of the computer. There are no awkward timeout settings that incorrectly lock the computer when you are not there. The TF2000 detects your presence and will not lock it inadvertently. The TF2000 connects to the computer via the USB port. It can be configured by the system just like a keyboard. Commands are sent to the computer as keystrokes, so no drivers are needed. Our configuration tool allows you to configure the individual keystrokes as well as the specified delays. The TF2000 also has a walk-away' sequence that allows keystrokes be sent when you approach the computer. Under Windows XP, the TF2000 sends the CTRL/ALT-DEL sequence to the user when they approach the computer. This allows the user to authenticate by opening the PC. -
43
CryptoDefender
BlockSafe Technologies
$5.99 per 2 devices per monthThis prevents malware from spying upon what you type. The kernel and wallet application use military-grade encryption to secure keystrokes. The password you use to decrypt or logon your secret key is now secure. To prevent malware from spying on your clipboard, copy and paste the contents. The destination address to which crypto transactions are sent is not altered. Screen-scraping malware is prevented from taking secretly screenshots of information. Displays hidden frames and frames that originate from a potentially dangerous domain. This neutralizes hackers' favorite trick to download malware onto your computer. CryptoColor visual verification indicates that CryptoDefender™, which highlights what you type in a specific color, is protecting your input. -
44
Tripwire
Fortra
Cybersecurity for Industrial and Enterprise Organizations. The industry's most trusted foundational security controls will protect you from cyberattacks. Tripwire is able to detect threats, identify vulnerabilities, and harden configurations instantly. Tripwire Enterprise is trusted by thousands of organizations as the heart of their cybersecurity programs. You can join them and have complete control of your IT environment using sophisticated FIM/SCM. Reduces the time required to detect and limit damage caused by anomalies, threats, and suspicious behavior. You have a clear, unrivalled view of your security system status and can assess your security posture at any time. Integrates with existing toolsets of both IT and security to close the gap between IT & security. Policies and platforms that go beyond the box enforce regulatory compliance standards. -
45
The Advanced Protection Program protects users with sensitive information and high visibility from targeted online attacks. To defend against the wide range of threats that exist today, new protections are added automatically. Gmail blocks more than 100 million phishing attacks every day. But sophisticated phishing techniques can trick even the most savvy users to give their sign-in credentials away to hackers. Advanced Protection requires that you use a security code to verify your identity when signing in to your Google Account. Unauthorized users will not be able sign in without your username or password. Chrome's Safe Browsing protects 4 billion devices from risky websites, and Advanced Protection performs more stringent checks for each download. It can flag or block you from downloading files that could be harmful. Only apps from verified stores are allowed, such as Google Play Store or your device manufacturer's store.
-
46
Net Monitor for Employees
EduIQ.com
$99.95 one-time paymentSoftware that tracks employee activity has become a vital tool to improve productivity in the office. Many times, team members spend their time surfing the web or watching irrelevant content. Many companies use employee monitoring to detect and prevent data breaches that could lead to huge financial losses. It's a great way to increase worker engagement and optimize work processes. Computer monitoring provides companies with a complete picture of work in and out of the workplace. Computer surveillance software can help organizations reduce risk and increase profitability. The data can be used to analyze bottlenecks, unusual patterns, or other potential issues. -
47
Bitdefender TrafficLight
Bitdefender
FreeIt is a cross-browser addon that intercepts, processes and filters all Web traffic. This prevents any malicious content from being blocked and increases browser security. You won't have to worry about any suspicious websites ever again. TrafficLight inspects and blocks all pages you visit to prevent malware and phishing attempts every time you visit them. Safe search results protect you from harm. Bitdefender TrafficLight will keep you informed about any malware or fraudulent websites in your search results. -
48
IntelliTrack Network
Soni-Soft
IntelliTrack Security Control, a software suite designed for Security Control Teams operating in multi-location environments, is available. IntelliTrack Security Control, an integrated software suite, is required to support all businesses and organizations in their Disaster Recovery Planning process. Security Teams can access information such as staff details, keyholders and alarm activation details, as well as details about business assets and safe and lock details. This allows them to make informed decisions regarding security control. Proactive Security Management is about knowing how your branches and stores are set up. IntelliTrack Security Control software will allow your teams to know who, when, and how to contact key personnel in the event of a disaster or other incident. -
49
Internet Lock
TopLang Software
$29.95/one-time/ user Internet Lock provides access control and password protection for your internet connections. Internet Lock allows you to fully control your internet connections and programs. Internet Lock allows you to restrict or password protect internet access. You can also schedule internet access. It protects internet programs on specific IP addresses or domains. You can limit access to the websites you specify or prevent them from accessing unwelcome websites. Internet Lock can be used to block internet connections and programs. Internet Lock will block programs from accessing the internet. Internet Lock can be used to password protect internet connections and programs. To access protected programs, users must enter the correct password. Internet Lock displays a window asking users to enter their password when a password-protected program attempts to connect to the internet. If the user cannot provide the correct password, Internet Lock will pop up. -
50
ITsMine Beyond DLP
ITsMine
ITsMine Beyond DLP™, which goes beyond traditional Data Loss Prevention, (DLP), protects organizations from all data threats. Endpoint agents and policies have no effect on employee productivity. Protection is available even after data exfiltration. Data loss incidents are becoming more frequent and more damaging than ever before, be they intentional or accidental, or from external or internal factors. Beyond DLP™, a new security approach, allows organizations to track and secure their data anywhere it is. This includes their internal network as well as external networks. No matter where your data is stored, maintain your high security standards. You can empower employees to be productive while controlling the use and whereabouts your sensitive data. Compliance with data protection regulations is easy, including GDPR, CCPA and PCI to HIPPA. Access control options for sensitive data, data breach detection, and reporting options are all available.