Best RollBack Rx Pro Alternatives in 2025

Find the top alternatives to RollBack Rx Pro currently available. Compare ratings, reviews, pricing, and features of RollBack Rx Pro alternatives in 2025. Slashdot lists the best RollBack Rx Pro alternatives on the market that offer competing products that are similar to RollBack Rx Pro. Sort through RollBack Rx Pro alternatives below to make the best choice for your needs

  • 1
    DriveStrike Reviews
    See Software
    Learn More
    Compare Both
    DriveStrike is simple to use, implement, and manage. DriveStrike allows you to perform remote wipe, remote lock, or remote locate commands on any platform. Mobile device management MDM for mobile platforms. Integrated drive encryption support. Our support team is available to answer any questions, help you install our services, or manage your account. It's never been easier to protect your data and devices. We are happy to answer any questions you may have or help you understand how to best protect your data. Protect your business with a device- and data protection platform that keeps all devices protected with a single solution. Your Workstations, iPads and iPads, Smartphones as well as Tablets, Tablets, Tablets, and Laptops will be protected, organized, secure, & protected.
  • 2
    SpamTitan Reviews
    Top Pick
    See Software
    Learn More
    Compare Both
    SpamTitan email security protects businesses, schools, smbs and MSPs from spam. SpamTitan email security protects against spam, phishing, day-zero attacks and viruses, malware, ransomware and other threats to email. It helps to control mail flow, clean it, protect against spam, and protect against unwanted email. We offer easy-to-use, yet powerful email security for businesses, smbs, and MSPs that is Office365-friendly. SpamTitan Email Security is available for a free, fully supported trial. SpamTitan – Premium functionality included * CEO Impersonation protection * Spearphishing Protection/ Phishing * Link analysis * Full Sanding * Zero Day Attacks protection * Mail Spooling * Spoofing protection * Ransomware and Malware Protection * SPF/DKIM/DMARC checking * Encryption * Fully multi-tenant environment * Ability to rebrand entire UI * Full REST API * Set up documents and support SpamTitan Email Security is the best solution in the G2 Crowd Email Security. Start your free trial today!
  • 3
    Bacula Enterprise Reviews
    Bacula Enterprise offers a single platform that provides cloud backup and recovery software for the Modern Data Center. Bacula Enterprise backup & recovery software is ideal for medium and large businesses. It offers unique innovation, modern architecture and business value benefits, as well as low cost of ownership. Bacula Enterprise corporate backup software solution uses unique technologies that increase the interoperability of Bacula Enterprise into many IT environments, such as managed service providers, software vendors, cloud providers, enterprise data centers, and cloud providers. Bacula Enterprise is used by thousands of organizations around the world in mission-critical environments such as NASA, Texas A&M University and Unicredit. Bacula offers more security features than other vendors and advanced hybrid Cloud connectivity to Amazon S3, Google, Oracle, and many others.
  • 4
    PhishTitan Reviews
    Powerful Inline Phishing Protection for M365. Harness the power of AI and our LLM to defeat phishing. PhishTitan is next generation inline phishing protection and remediation, powered by TitanHQ, the global leaders in email cybersecurity. Our learning model and AI integrates directly with Microsoft 365, both catching and remediating sophisticated phishing and BEC attacks that Microsoft misses. It provides users with in-the-moment warning banners to help them decide whether an email is malicious or safe, continually enhancing the human firewall. Post delivery remediation (PDR) allows you to remove all of these phishing emails from your users inbox removing risk instantly. The removed email goes to the junk folder. Our curated and unique email threat intelligence data is unmatched in its simplicity, visibility, coverage and accuracy. Risk free deployment in 6 minutes. PhishTitan will filter your email to identify phishing threats and protect your users and business. That’s how you avoid that one wrong click that can lead to disaster – all it takes is 6 minutes!
  • 5
    RollBack Rx Server Reviews
    RollBack Rx Server Edition, a robust Windows Server backup utility, provides IT professionals with an instant backup capability that can quickly restore mission critical systems to any number of multiple restore points at unrivaled speeds. RollBack Rx Server Edition makes it easy to quickly and safely install service patches and sandbox updates. It also offers a failsafe approach for system recovery. RollBack Rx Server Edition provides unparalleled background protection and real time recovery speeds. This allows you to keep a locally backed up sector-map repository that contains complete multiple instances (or "snapshots"), of the server state. These snapshots can be scheduled at any time you choose -- even every minute -- and can count in the thousands. This continuous snapshot-taking can be scheduled to happen in the background without any perceptible impact on server response times.
  • 6
    Skybox Security Reviews
    Skybox's risk-based vulnerability management approach starts with new vulnerability data from your entire network, including physical IT, multicloud and operational technology (OT). Skybox assesses vulnerabilities without the need to scan. Skybox uses a variety of sources including asset and patch management systems as well as network devices. Skybox also collects, centralizes and merges data from multiple scanners to provide you with the most accurate vulnerability assessments. - Centralize and improve vulnerability management processes, from discovery to prioritization to remediation - Harness power vulnerability and asset data, network topology, and security controls - Use network simulation and attack simulation to identify exposed vulnerabilities - Augment vulnerability data by incorporating intelligence on the current threat environment - Learn your best remedy option, including patching and IPS signatures, as well as network-based changes
  • 7
    Trend Micro Maximum Security Reviews
    Trend Micro Maximum Security is compatible with Windows 11. This means that you can shop, play, and bank online without worrying about being hacked by fraudulent and malicious websites. Our cloud-based AI technology provides proactive protection against ever-evolving threats from malware infections. Trend Micro can protect you against known and unknown attacks, helping you stay ahead of the constantly changing threat landscape. You get multi-device protection against ransomware and viruses, as well as dangerous websites and identity thieves. Folder Shield Plus protects your digital assets and files locally as well as on cloud-synced folders.
  • 8
    Trend Micro HouseCall Reviews
    This is the best online virus scanner you can use to find hidden threats on your Mac and PC. Find out if your files contain malicious software and block it from being installed. Before you know it, threats can cause damage to your device. HouseCall can help you get your device back on track. The detailed report will allow you to see which threats have been targeting your device and can take immediate action. HouseCall allows you to choose whether you want a quick scan or a full scan. You can also create a custom scan. Free scans to detect and fix viruses, trojans, spyware, and other malicious threats. HouseCall will quickly detect new threats on your Windows and Mac computers, without affecting your existing security software. HouseCall can keep malicious files from your computer and prevent them from spreading. HouseCall for Home Networks scans your network devices for vulnerabilities and suggests how to fix them.
  • 9
    OSE Reviews
    Compromised organizations can face significant barriers to restoring customer trust and brand reputation after being hacked. OSE alerts you to any attacks on your critical systems and warns you if they happen so that you can stop them before they cause damage to your brand, reputation, IP, and customer trust. OSE provides an audit of an attack, listing the changes made and what they were before resolving it quickly. OSE reporting is helpful in ISO 27000 compliance. OSE (Operating System Security Enforcer), implements your Security Policy. This can be either an out-of-the-box OSE standard or your customized version. Applying the security policy to all Unix, Linux, and Windows corporate servers.
  • 10
    Fortres 101 Reviews
    Fortres 101's file and desktop lockdown security restricts Windows operation to a specific area. Affordable, effortless, powerful. Fortres 101 blocks downloads and software installation, including malware and viruses. Fortres 101 allows you to block or restrict local hard drives, removable media drives, and any file, folder, and application. Central Control is Fortres 101's complete administration tool. Central Control makes it easy to configure and manage Fortres 101 from a single screen, anywhere on the network. Find out more.
  • 11
    Stronghold Antivirus Reviews
    Stronghold Antivirus is an antispyware and antivirus software that provides superior real-time proactive (on-access), and on-demand protection for your computer at home and office. Stronghold Antivirus detects and eliminates over 3.500.000 known viruses, spywares, adwares, trojans rootkits, and other threats. It uses a regularly updated database of malicious footprints to do this. Active on-access shield protection protects against unknown threats. Stronghold Antivirus is easy to use and pleasing to the eyes. Professionals will enjoy the additional features. Despite being powerful, it is very lightweight and won't consume any noticeable system resources. You can create any scan area, customize on-demand or on-access protection modules and schedule scanning with separate settings. You can also add programs to white and/or black lists and manage them.
  • 12
    G DATA Reviews
    G DATA prepares your optimally for cyber threats. It opens up all possibilities for the digital future. G DATA was the first company to develop antivirus software. It was launched in 1987. We protect our customers from all types of cybercrime today with end-to–end solutions and services using the latest security software and AI technologies. We also offer online security awareness training to teach employees safe behavior. G DATA customer support is available 24 hours a day, with support teams and the G DATA SafetyLab working together at the same place. Independent tests have shown that G DATA IT security solutions offer the highest attack detection rates to effectively combat Trojans, malware, and other unknown viruses.
  • 13
    Google Advanced Protection Program Reviews
    The Advanced Protection Program protects users with sensitive information and high visibility from targeted online attacks. To defend against the wide range of threats that exist today, new protections are added automatically. Gmail blocks more than 100 million phishing attacks every day. But sophisticated phishing techniques can trick even the most savvy users to give their sign-in credentials away to hackers. Advanced Protection requires that you use a security code to verify your identity when signing in to your Google Account. Unauthorized users will not be able sign in without your username or password. Chrome's Safe Browsing protects 4 billion devices from risky websites, and Advanced Protection performs more stringent checks for each download. It can flag or block you from downloading files that could be harmful. Only apps from verified stores are allowed, such as Google Play Store or your device manufacturer's store.
  • 14
    AVG AntiVirus Business Edition Reviews
    Top Pick
    Unrecognized files are downloaded to one of your computers. A copy will be sent to Threat Labs experts to determine if it is safe. It checks webpages before they open in your web browser. To help you surf the internet with more confidence, it displays a safety rating in search engine results. Cloud-based proactive AI Detection and Real-Time Outbreak Detection provide better protection against the latest malware. Protects against online security threats such as spam, viruses, hackers, and malware Anti-Spyware protects you from spyware and adware which track personal information. Our Windows file server security keeps it private, secure, and out of hackers' reach. Advanced File Shredder securely deletes files in order to prevent unintended recovery. It scans your computer when you're not using it to ensure that it doesn't get in your way. It does all the work so that you and your employees can concentrate on your business without any costly delays or distractions.
  • 15
    McAfee Total Protection Reviews
    McAfee®, Total Protection provides protection for your security needs today, so that you can live your life online. Safe browsing, premium antivirus. Secure VPN and ID theft protection. McAfee is more than antivirus software. It offers peace of mind. McAfee protects what is most important - you. McAfee has protected over 500 million devices using its award-winning antivirus. However, we understand that you need a solution to protect your privacy and personal information, as well as help you navigate safely online. Multi-layered identity protection protects your accounts by notifying you if your information is leaked online and automatically generating complex passwords. Secure VPN turns unsecured networks into your private network, protecting your credit card information and personal data. Search results and social media pages can be contaminated by color-coded links that expose fraudulent and dangerous sites. We'll even direct you to safety if your misclicks are detected.
  • 16
    MemberProtect Reviews
    MemberProtect allows professional programmers to integrate into secure online systems such as ACH, Online Banking and wire transfer applications. MemberProtect is the most trusted authentication, data encryption and user management system in the banking and credit union industry today. Based on roles and privileges model. Supports millions of users and organisations. Extremely precise application security. Strong encryption that protects databases down to the column level. Encrypt all email messages and flat files on your network. All data accesses should be logged, even if they fail. Even beyond firewalls, SSL and operating systems, protect member data from hackers and unauthorized staff. Use MemberProtect to create secure connections with third party APIs. Access to any web-based service, including LDAP support.
  • 17
    Defencebyte Reviews

    Defencebyte

    Defencebyte

    $39 per year
    To ensure your computer's safety and performance, download our antivirus software. You can give your computer a new lease on life by removing all unnecessary files and programs. Your antivirus online purchase will keep your computer free from unwanted software. You can trust defencebyte to keep your computer safe online no matter what. We are available to assist you 24/7 if you have any questions about your online antivirus purchase. You can give your computer a better level of protection by downloading an antivirus for Windows. Windows computers are most commonly targeted by hackers and viruses. Ransomware can target your system and critical data. With defencebyte security, you can create a secure digital environment that protects your networks and systems. Ransomware traces are removed. Protects both devices and networks.
  • 18
    Sophos Home Reviews
    The malware that targets fortune 500 companies also attacks private users. Sophos Home employs the same award-winning security measures that keep these companies safe. Sophos Home scans your computer and removes any malware that might be slowing it down. By blocking ransomware and viruses from stealing and destroying files, documents, or photos, you can keep your private information secure. Sophos Home protects you from hackers and phishing so you can surf the internet with confidence. It starts with a deep scan of your computer and cleaning it clean to remove any hidden threats. Your system is cleaned of any malware. Removes trojans rootkits, spyware and other malware. Protects against viruses and malware, trojans. Worms, bots. Unwanted apps.
  • 19
    iPrism Web Security Reviews
    iPrism Web Security combines fine-grained content filtering with threat detection and mitigation methods to provide powerful protection against Advanced Persistent Threats (botnets, viruses, and others). iPrism Web Security is easy to use and "set it and forget". It is self-contained to provide advanced threat protection, policy enforcement, and requires almost no maintenance. Our comprehensive reporting makes managing your network easy. iPrism employs a unique combination of iGuard's automated intelligence and human analysis to block malware, Crypto-Locker, and other inappropriate sites. It improves user productivity by reducing latency and false negative rates. This innovative approach ensures that you have the most up-to-date, advanced web protection available 24/7 and is supported by world-class customer service.
  • 20
    360 Security Guard Reviews
    360 Security Guard is a leading security antivirus product that can detect and kill all types of Trojan viruses. It is committed to protecting users' computers security. We have many features that will improve your computer's efficiency. You can scan the computer in multiple dimensions, including garbage collection, computer running speed, system abnormalities and computer security risks. This will quickly assess the system's status. To detect the threat situation immediately, 38 layers of protection barriers are added layer after layer, creating an all-weather, all-weather cyberspace defense. You can get the most recent information about popular games and events in real-time, gather multiple media, unify the entrance. Get the latest and most popular games, download and install them, and get access to them through 360 exclusive distribution channels.
  • 21
    McAfee LiveSafe Reviews
    McAfee®, LiveSafe™, is the best protection for your computers, Macs and smartphones. McAfee LiveSafe offers award-winning antivirus protection, as well as many other features, to protect your computer, mobile devices, and identity. We keep you safe so that you can concentrate on what is important. Protect your computer from viruses and other threats with both online and offline protection. One subscription protects your Macs, PCs, smartphones, tablets, and computers. When you connect to public Wi-Fi, keep your browsing habits and data secure. McAfee LiveSafe is a standout among our security solutions. Its combination of privacy, identity tools, and antivirus features will protect you against all types of threats. When you sign up for auto-renewal** you will have access to our secure VPN. This provides bank-grade encryption to protect your online activities and personal information.
  • 22
    Cisdem AppCrypt Reviews
    Cisdem AppCrypt is an easy-to-use tool to help you lock apps and block websites. Available for Mac, Windows, and mobile devices, this tool can help you protect privacy, improve productivity, and put parental controls. A password is required to bypass restrictions (such as unlocking apps or unblocking websites). - Lock individual apps with a password - Automatically re-lock apps after a period of inactivity - Lock all apps except those specified by you (on Mac only) - Block specific websites, such as youtube.com - Block specific webpages - Block URLs by keywords - Restrict certain categories, such as news sites and social media - Allow you to set schedules for site blocking and app locking - Require a password to quit Cisdem AppCrypt, unlock apps, unblock sites, or change schedules - Support configuration important and export, making it easy to set up the tool on multiple machines
  • 23
    Trust Lockdown Reviews
    We stop all unknowns automatically because we only focus on what you trust, and run on your endpoints. Trust Lockdown is the first to stop unknown items like new ransomware variants and advanced attacks. Stop the 'Break Fix' cycle that is consuming your time and money. Trust Lockdown also eliminates the need to patch your apps every day. Trust Lockdown allows you to do your app patches on a regular basis and not just when you need them. This gives you more time and money for other things, which will allow you to be more productive. Our protection works even if your device is not connected to the internet. Our endpoint protection works regardless of whether you choose to use our cloud-based or appliance-based service. It provides the same protection offline and disconnected from the internet. This is essential in today's mobile environment and the use of portable devices.
  • 24
    Win Guardian Reviews

    Win Guardian

    Bit Guardian

    $12.49 per 6 months
    Win Guardian is an all-in-one Windows utility that enhances PC performance and security. It offers robust malware security by performing dedicated scans that detect and eliminate malicious file, protecting users from potential financial and data losses. The software extends security features to web browsers, protecting users across Internet Explorer, Google Chrome and Mozilla Firefox. This ensures a secure online experience. Win Guardian performs a deep cleaning of the system to remove junk files, privacy traces, and other accumulated data. This prevents system slowdowns. It also cleans invalid registry entry, optimizing PC functionality. Win Guardian, developed by Bit Guardian GmbH is easy to use, with a straightforward installation and activation process. Users can download the setup and follow the installation instructions. They can then activate the software by using the provided license key.
  • 25
    Trusted Knight Protector Home Reviews

    Trusted Knight Protector Home

    Trusted Knight Corporation

    $34.95 per user per year
    Protecting your identity, your family's online reputation, and all your sensitive information is the easiest and most effective way of protecting your identity. This alarming statistic is because every year, at least 24,000,000 new malware variants (malware that has been slightly modified to avoid detection by antivirus software), are discovered on computers. Your computer may already be infected by this type of malware. Protector Home is the best solution to protect your personal data, even if it is. It takes only minutes to install and automatically protects all your online sessions. Protector Home provides more than traditional protection. It offers the security and benefits your family requires, even if you have already lost your computer.
  • 26
    Microsoft Family Safety Reviews
    You and your family can create healthy habits and protect those you love. You can set screen time limits for apps, games, and devices. You can decide whether to add or remove screen time as your screen time runs out based on what is best for you and the family. Your children can explore the internet in a safe environment. You can use the app's content filtering settings on Android, Windows, and Xbox to set healthy boundaries and block inappropriate apps and games. Limit your browsing to kid-friendly sites using Microsoft Edge on Android, Windows, and Xbox. Family location sharing and tracking allows you to stay connected even when your are away. You can share your location with family members, track them on a map and save the places they frequent most. You can get insights into how your family is doing on a road trip, such as how often they use their phone, top speed and how often they brake hard.
  • 27
    AccessPatrol Reviews

    AccessPatrol

    CurrentWare Inc.

    $5 PUPM
    AccessPatrol is a data loss prevention and USB device control software for preventing data leakage to removable media devices, cloud services, and other data egress ponts. With AccessPatrol you can restrict a variety of peripherals including USB portable storage devices, optical media, Bluetooth, WiFi, FireWire, and cell phones. USB device access permissions can be set to Allow, Read Only, or Blocked. Peripheral devices can be identified based on Vendor ID, Serial Number, and PNP Device ID. Specific USBs, External Hard drives, Imaging devices, and portable devices can be added to an Allowed List to enforce the exclusive use of company-approved devices.
  • 28
    Xeams Reviews

    Xeams

    Synametrics Technologies

    $20.00/year/user
    Xeams, a secure and powerful complete email server for Windows, Linux Solaris, MacOSX, and other flavors UNIX, is available. Xeams supports SMTP and POP3, as well as IMAP. It has a powerful spam filtering engine which eliminates up to 99 percent of junk mail upon installation. It is very user-friendly because it offers a flexible approach to email.
  • 29
    Norton AntiTrack Reviews
    You can browse without losing speed, even on sites that restrict access to other tools. Clearing cookies doesn't stop companies from using your digital fingerprint to profile you. You can monitor tracking attempts and see how we keep your data more private with a dashboard. Your subscription starts when your purchase is complete (or when you pay). To get protection, you must install the software on each device. NortonLifeLock reserves the right to cancel any special offer. Subscribing means you are purchasing an automatic renewal subscription.
  • 30
    BrowseControl Reviews
    BrowseControl web filtering software blocks websites based on URLs and categories. Granular internet restriction policies can be customized for each user, department, or organizational unit. Includes other device restriction features such as an app blocker, port filter, and internet restriction scheduler. BrowseControl’s security policies are enforced by a software agent that is installed on your user’s computers. This allows the solution to continue blocking websites and applications even when computers are taken off-site.
  • 31
    ThreatSentry Reviews
    Do not ignore unaddressed vulnerabilities or insider misuse. ThreatSentry combines a state of the art Web Application Firewall with a port-level firewall with advanced behavioral filtering in order to block unwanted IIS traffic. ThreatSentry provides enterprise-grade, multilayered protection and compliance (i.e. PCI DSS for Microsoft IIS (5/6/7/8/10), at a small-business cost! ThreatSentry can be used as a native module within IIS7-10 (or ISAPI extension/filter in IIS 6 or IIS 5 respectively) and Snap-in into the Microsoft Management Console. It is extremely easy to use and protects network weak points caused by configuration errors, lapses in patch management, and new and progressive attack techniques. Get a ThreatSentry evaluation for free today! We will guide you one-on-1 through installation and configuration. Click here to book.
  • 32
    SpyShelter Reviews

    SpyShelter

    SpyShelter

    $25 per year
    SpyShelter Anti Keylogger monitors the behavior of all current actions on your computer and allows you to block any malware attempts to take place. SpyShelter can stop both custom-made and commercial keyloggers. This technology is unique and cannot be detected by anti-virus software. SpyShelter doesn't rely on fingerprint databases, so you won't have to worry about zero day malware. Your registry, RAM, and all applications will be protected as soon as SpyShelter is installed. SpyShelter's fast algorithm processing is faster than other security software. This makes it more suitable for older computers. SpyShelter Anti Keylogger offers solid protection against both known and unknown "zero day" spy and monitoring software. This includes keyloggers screen loggers webcam loggers and keyloggers.
  • 33
    Driver Genius Reviews

    Driver Genius

    Driver Genius

    $29.95 per 3 PCs per year
    To make your system more stable and smoother, you can update your drivers in just one click. After reinstalling Windows, you can easily restore all drivers. Double insurance: System restore point + Driver rollback. You can always roll back to the previous driver. Clear out invalid driver packages to free up space. Ask about the hardware information and current status of your computer. Real-time monitoring of voltage and temperature. The system will retain the hardware data even if you replace it. After you have changed operating systems, get your network back up and running immediately. If your computer is not able to connect to the Internet, the offline driver update tool will quickly install the driver.
  • 34
    Quantum Armor Reviews

    Quantum Armor

    Silent Breach

    From $49/asset/month
    1 Rating
    Your attack surface is the sum total of all attack vectors that can be used against your perimeter defenses. It is simply the amount of information that you are exposing the outside world. The attack surface is the most important thing hackers will need to exploit to break into your network. When attacking targets, professional hackers usually follow the cyber kill chains. Typically, the first step in this process is to survey the target's attack surfaces. This is called advanced reconnaissance. By reducing the attack surface, you can reduce the risk and prevent attacks from ever happening. The cyber kill chain is a method for categorizing and tracking all stages of a cyberattack, from early reconnaissance to the exfiltration data.
  • 35
    IntelliTrack Network Reviews
    IntelliTrack Security Control, a software suite designed for Security Control Teams operating in multi-location environments, is available. IntelliTrack Security Control, an integrated software suite, is required to support all businesses and organizations in their Disaster Recovery Planning process. Security Teams can access information such as staff details, keyholders and alarm activation details, as well as details about business assets and safe and lock details. This allows them to make informed decisions regarding security control. Proactive Security Management is about knowing how your branches and stores are set up. IntelliTrack Security Control software will allow your teams to know who, when, and how to contact key personnel in the event of a disaster or other incident.
  • 36
    MiniTool ShadowMaker Reviews
    MiniTool ShadowMaker can be used to provide professional backup services and disaster recovery solutions. It is the best backup tool that can back up OS, files, folders, and partitions. This backup software allows you to quickly restore data after a disaster.
  • 37
    Kaspersky Anti-Virus Reviews
    Top Pick
    It blocks the latest viruses, ransomware and spyware as well as cryptolockers. This also helps to stop cryptocurrency mining malware from affecting your computer's performance. Antivirus protection that works in real time. Blocks ransomware, cryptolockers & more. Prevents the spread of cryptomining malware. Your PC will perform as it was designed.
  • 38
    Total Upkeep Reviews

    Total Upkeep

    BoldGrid

    $2.50 per month
    Total Upkeep is a backup, fault protection and migration solution which allows you to easily secure, restore or move your website. Use Total Upkeep for a quick restoration of your website after server crashes, hacks, rouge upgrades, and other threats. Install Total Upkeep and select the date and time of automatic backups. You can download, restore or delete backups in a single click. Total Upkeep can be set to automatically backup and rollback your website if an upgrade fails. Install Total Upkeep on two WordPress sites. Create a backup archive and restore it on your second website. WordPress core, plugins and themes can all be updated automatically. You can set Auto Backups so that they run before the update.
  • 39
    AVG Internet Security Reviews
    You can have total security online. AVG Internet Security is an award-winning antivirus that offers customizable firewalls, remote access protection against hackers, as well as award-winning antivirus. AVG Internet Security protects you from viruses and malware, keeps emails safe, protects passwords and webcams from hackers, and allows you to shop and bank online with no worries. Advanced Antivirus scans your computer for viruses, ransomware and spyware. If suspicious software behavior is detected on your computer, Behavior shield will send alerts. AI Detection proactively detects malware samples to protect your computer from new threats. CyberCapture automatically uploads malware samples to our antivirus software for analysis. This prevents new threats. You can stay safe online by scanning downloads, emails, and links for potential threats. Also, avoid unsecure Wi-Fi networks. Link Scanner scans links for suspicious content to avoid dangerous websites.
  • 40
    BroShield Reviews
    BroShield is the best choice if you want to rid your system of unwanted spyware. This provides you with a powerful anti-snooping feature and detects harmful viruses. BroShield protects your computer. BroShield protects your computer and gives you full control over the internet. You can monitor what content your child is exposed to. You have the power to restrict access to adult websites and other harmful content. You can control internet access time. Many illegal websites still exist on the internet. We must make sure that our children are not exposed to porn, gambling, or other inappropriate websites. These sites can contain viruses and other undesirable things. BroShield is available 24/7 to monitor the computer for potential threats and viruses. BroShield's smart fail-safe feature is designed to detect remote snooping activities and prevent your computer from being compromised.
  • 41
    eScan Reviews

    eScan

    MicroWorld Technologies

    $58.95/one-time/user
    eScan's next generation antivirus solution protects your home network from malware, viruses, ransomware, and other threats using a layered approach. eScan is able to block a wide range of attacks thanks to its unique combination of modern and basic techniques. It includes web filtering, signature-based Malware detection and behavior analysis, as well as innovative techniques such deep learning malware detection, exploit prevention and heuristic scanning. eScan provides business endpoint protection, endpoint detection and response solutions (EDR), as well as anti-spam solutions email and multi-factor authentication.
  • 42
    Kaspersky Internet Security Reviews
    Our advanced, one-license security suite protects you from malware, financial scammers, and webcam spies. - Blocks viruses and cryptolockers, attacks, and more Prevents online trackers from collecting your data Detect spyware on your Android device Protect payments with bank-grade encryption* - Blocks unauthorized access to your webcam* - Encrypts data that you send and receive online - VPN**
  • 43
    Barracuda Web Security Gateway Reviews
    Barracuda Web Security Gateway allows organizations to use online tools and applications without being exposed to web-borne malware, viruses, lost productivity, or misused bandwidth. It is a comprehensive solution to web security and management. It combines award-winning spyware, virus, and malware protection with a powerful policy engine and reporting engine. Advanced features allow organizations to adapt to new requirements such as remote filtering, social-network regulation, and visibility into SSL encrypted traffic. Remote user licenses can be purchased for unlimited access to the corporate network. This allows you to control content and access policies on mobile devices. Virtual appliances are also available for the Barracuda Web Security Gateway. Barracuda Content Shield is a hosted web security solution.
  • 44
    OpenText Security Suite Reviews
    OpenText™, Security Suite powered by OpenText™ EnCase™, offers 360-degree visibility across all devices, including laptops, desktops, and servers, for proactive discovery and remediation. It also allows for discreet, forensically sound data collection and investigation. Security Suite is the industry standard for digital investigations and incident response. Security Suite has agents deployed on over 40 million endpoints and clients that include 78 Fortune 100 companies. EnCase solutions are designed to help law enforcement, government agencies, and enterprises address a variety of issues, including file analytics, endpoint detection, response (EDR), and digital forensics. They offer the most trusted cybersecurity and digital forensics software. Security Suite solves problems that are often overlooked or left unsolved at the endpoint. It restores confidence for customers and companies with its unparalleled reliability and breadth.
  • 45
    GhostVolt Reviews

    GhostVolt

    GhostVolt Ltd

    $20 per year
    GhostVolt is a privacy App which provides a secure, collaborative working environment for you and your team. GhostVolt stops unauthorised access to all your documents and helps fight against data theft and cybercriminals who want to steal your files and use them for ransomware, blackmail, and other criminal attacks. Control every user's permission with pre-set roles or customize what they can and can't do with every file. Also grant or restrict access to folders of your choice at any time. With powerful reporting tools you can also track and export the complete history of every user action or the history of any file. Take control of your data and get back to work, with GhostVolt.
  • 46
    GamaScan Reviews
    GamaSec provides a unique combination of cyber security, remediation-as-a-service and financial assurance to minimize the risk of website attacks for small and medium-sized businesses. SMBs have the same security and resilience benefits as large corporations. GamaSec offers a combination online vulnerability scanning, daily malware detection and blacklist monitoring to maximize protection. This will significantly reduce the risk of your website being hacked. GamaSec reports are virtually free from false positives, simplifying remediation and allowing our security experts to fix and remove any malware or website vulnerability. GamaSec provides a PCI-certified cloud-based Web Application Firewall (WAF), and advanced Distributed Denial of Service protection to protect your website against all types of web attacks. GamaSec provides a data breach limited warranty which covers up to $50,000 for costs related to data restoration.
  • 47
    McAfee WebAdvisor Reviews
    McAfee WebAdvisor helps you stay safe while browsing and searching the web. WebAdvisor protects you from malware and phishing attempts as you surf the web. It does not affect your browsing performance. Protect yourself against malicious sites that may contain spyware, viruses, adware, and phishing scams. McAfee WebAdvisor is free and will help you enjoy worry-free web surfing. McAfee WebAdvisor offers misclick protection to block malware and phishing websites if you click on a malicious URL, typo protection that protects against incorrectly typed web addresses and points you in the right direction, safer downloading that scans your downloads and alerts if there is a risk, security check to make sure your firewall and antivirus are active before you surf, and safe browsing that uses a color-coded system that lets you know which links you can click.
  • 48
    NerveCenter Reviews
    Sometimes, primary utility power outages can occur. These are often caused by weather or poor infrastructure. Reliable backup power op UPS power is essential to maintain network uptime as networks grow in size, complexity, and importance. UPS batteries can lose their capacity as early as three to five years. Although UPS battery manufacturers might advertise a 10-year battery life, or a life span, external factors can cause battery degradation and shorten its life. Internal cell resistance (via temperatures) - To verify the health of low-capacity cells. Inter-Cell Resistance is a way to ensure that cells have conduction path integrity. This allows for hot spots, fires and abrupt shut downs through temperature monitoring. A properly monitored UPS battery system will have a longer life span, use less energy to charge, and require less maintenance. Increase network uptime and prevent outages due to UPS failures, UPS capacity issues, and drained UPS batteries.
  • 49
    CySight Reviews
    CySight’s revolutionary Actionable Intelligence, trusted by Fortune 500 globally, enables organizations with the most cost-effective and secure way to tackle the increasing density, complexity, and expanse of modern physical and cloud networking. Deploying cyber network intelligence, CySight empowers network and security teams to substantially accelerate incident response by eliminating blindspots, analyzing network telemetry to discover anomalies, uncover cyber-threats, and quantifying asset usage and performance. CySight’s Dropless Collection method enables unsurpassed visibility of network Big-Data which is retained in the smallest footprint, accelerating machine learning, artificial intelligence and automation to fully utilize all metadata no matter the amount, size, or type.
  • 50
    AnVir Task Manager Pro Reviews

    AnVir Task Manager Pro

    AnVir Software

    $49.95 one-time payment
    Windows task manager processes. Windows xp slow startup. Windows startup programs. Vista tweaks. You can control everything on your computer, remove Trojans and speed up your computer. AnVir Task Manager Pro makes it easy to access all its features from one interface. It saves money by not having to purchase multiple packages to complete a family of tasks. Windows Task Manager cannot terminate processes that are not allowed to be terminated. Temperature of the CPU, video card, and external USB HDD. Speed of download and upload, data transfer for network connections. Locate locked files and DLL. Log the process start and stop. Graph of processor activity, memory usage and disk activity for each process. Threads, handles and performance counters. Startup manager: Manage all programs running at startup, including Internet Explorer toolbars and Scheduler tasks.