Best Siwenoid Alternatives in 2024
Find the top alternatives to Siwenoid currently available. Compare ratings, reviews, pricing, and features of Siwenoid alternatives in 2024. Slashdot lists the best Siwenoid alternatives on the market that offer competing products that are similar to Siwenoid. Sort through Siwenoid alternatives below to make the best choice for your needs
-
1
DriveStrike
DriveStrike
2 RatingsDriveStrike is simple to use, implement, and manage. DriveStrike allows you to perform remote wipe, remote lock, or remote locate commands on any platform. Mobile device management MDM for mobile platforms. Integrated drive encryption support. Our support team is available to answer any questions, help you install our services, or manage your account. It's never been easier to protect your data and devices. We are happy to answer any questions you may have or help you understand how to best protect your data. Protect your business with a device- and data protection platform that keeps all devices protected with a single solution. Your Workstations, iPads and iPads, Smartphones as well as Tablets, Tablets, Tablets, and Laptops will be protected, organized, secure, & protected. -
2
Keeper Security
Keeper Security
1,542 RatingsPassword security is the foundation of cybersecurity. Keeper's powerful password security platform will protect your business from cyberthreats and data breaches related to passwords. Research shows that 81% of data breaches can be attributed to weak passwords. Password security platforms are an affordable and easy way for companies to address the root cause of most data breaches. Your business can significantly reduce the risk of data breaches by implementing Keeper. Keeper creates strong passwords for all websites and apps, then secures them on all devices. Each employee receives a private vault to store and manage their passwords, credentials and files, as well as private client data. Employees will save time and frustration by not having to remember, reset, reuse, or remember passwords. Industry compliance is achieved through strict and customizable role-based access controls. This includes 2FA, usage auditing, and event reporting. -
3
SafeGuard Cyber
SafeGuard Cyber
SafeGuard Cyber is a SaaS security platform providing cloud-native defense for critical cloud communication applications that organizations are increasingly reliant upon, such as Microsoft Teams, Slack, Zoom, Salesforce, and social media. A blind-spot is growing for security operations as adoption of these tools increases, creating more risk and vulnerability to ransomware, business compromise, and confidential information leakage. Email security lacks the ability to both create visibility outside of email, and primarily defend against malicious files and links. CASB/SASE solutions are difficult to deploy and manage, and the control function is typically left “open” to prevent false positives from affecting business productivity Our platform’s agentless architecture creates a portable security layer wherever your workforce communicates, no matter the device or network. Manage day-to-day business communication risk extending beyond email and into enterprise collaboration applications. Secure your business by protecting the human attack vector from advanced social engineering and targeted threats. -
4
Bacula Enterprise
Bacula Systems
Bacula Enterprise offers a single platform that provides cloud backup and recovery software for the Modern Data Center. Bacula Enterprise backup & recovery software is ideal for medium and large businesses. It offers unique innovation, modern architecture and business value benefits, as well as low cost of ownership. Bacula Enterprise corporate backup software solution uses unique technologies that increase the interoperability of Bacula Enterprise into many IT environments, such as managed service providers, software vendors, cloud providers, enterprise data centers, and cloud providers. Bacula Enterprise is used by thousands of organizations around the world in mission-critical environments such as NASA, Texas A&M University and Unicredit. Bacula offers more security features than other vendors and advanced hybrid Cloud connectivity to Amazon S3, Google, Oracle, and many others. -
5
Acunetix is the market leader for automated web application security testing and is the preferred tool for many Fortune 500 customers. Acunetix can detect and report on a wide range of web application vulnerabilities. Acunetix's industry-leading crawler fully supports HTML5/JavaScript and Single-page applications. This allows auditing of complex, authenticated apps. Acunetix is the only technology that can automatically detect out of-band vulnerabilities. It is available online as well as on-premise. Acunetix includes integrated vulnerability management capabilities to help enterprises manage, prioritize and control all types of vulnerability threats. These features are based on business criticality. Acunetix is compatible with popular Issue Trackers, WAFs, and is available online on Windows, Linux, and Online
-
6
EventSentry
NETIKUS.NET ltd
$85.00/one-time Hybrid SIEM solutions combine real-time log monitoring with comprehensive system and network monitoring to provide users with a complete view of their servers, endpoints, and networks. The security event log normalization and correlation engine with descriptive emails alerts provides additional context. It presents cryptic Windows security incidents in easy-to-understand reports that provide insight beyond what is available as raw events. EventSentry's NetFlow component visualizes network traffic and can detect malicious activity. It also provides insight into bandwidth usage. EventSentry's ADMonitor component makes it easy to keep track of Active Directory changes. It records all changes to Group Policy objects and provides a complete user inventory that can be used to identify old accounts. There are many integrations and multi-tenancy options. -
7
You need to protect every device, including laptops and mobile devices, on your network as more business operations are going digital. Select Tier combines multi-layered technologies and flexible cloud management with centralized application, web, and device controls to protect sensitive data at every endpoint. Our security doesn't slow down your system. The Remediation Engine can undo most malicious actions if you are attacked. Users can continue working without interruption. You can be assured of world-class security, including post execution Behavior Detection (and Machine Learning) technologies. This will help to reduce attack risk and keep your endpoints safe and secured. There is no need to download frequent updates. Easy migration from third-party endpoint security, ensuring a smooth transition. You can be sure of optimal configuration with our post-deployment quality audit service.
-
8
WipeDrive
WipeDrive
$19.95/one-time/ drive WipeDrive is a tool that allows individuals, businesses, and government agencies to securely and permanently erase data off hard drives, removable media, mobile devices, and other storage devices. It's a cost-effective and secure way to recycle and retire computer storage. WipeDrive is the global leader in secure data destruction. -
9
Xeams
Synametrics Technologies
$20.00/year/ user Xeams, a secure and powerful complete email server for Windows, Linux Solaris, MacOSX, and other flavors UNIX, is available. Xeams supports SMTP and POP3, as well as IMAP. It has a powerful spam filtering engine which eliminates up to 99 percent of junk mail upon installation. It is very user-friendly because it offers a flexible approach to email. -
10
Manages users, groups, and roles. Authentication, delegation authorization, auditing. Access control based on role, entitlements, and time-based rules. Manages access control policies for Web and Java resources. Manages access control policies to protect fine-grained application data and/or features. Flexible deployment options and central administration. Specific features designed to assist in compliance with privacy legislation. Integration with existing security infrastructure. Provides the foundation for Java Security Services orb2
-
11
Cisdem AppCrypt
Cisdem
$29.99 one-time paymentAppCrypt for Mac is a reliable tool to protect your data and prevent unwanted websites. AppCrypt allows you to lock any application using one password. You can also ban purchases in iTunes or App Store, block others from viewing your photos and videos in Photos, disable games apps, and encrypt chatting records on WhatsApp. All applications can be locked with one password. AppCrypt blocks access to distracting or harmful websites in Chrome browser and Safari browser. It can block the entire domain, or just specific URLs. Blocklist can be used to filter out inappropriate websites. Allowlist allows you to access websites that are useful for your study or work. AppCrypt allows you to set up a schedule when you can access the app or website. Predefined sessions can be set up at any time and day of your choosing. -
12
It all seemed to happen in a matter of hours. Your organization became an Enterprise of Things (EoT). PCs, mobile devices and cloud workloads. Agentless IoT devices and OT devices. Device diversity is good for security, but it comes at the expense of security. Your users can connect from anywhere in the world. The truth is that every thing that touches your enterprise exposes it to risk. It is essential to see it and protect it. Forescout is a great place to start. We are the only company that actively defends Enterprise of Things at Scale.
-
13
GlassWire
GlassWire
$35.88/year/ user Monitor the volume of data your PC is using for every single app, thanks to GlassWire's network monitoring graph. Keep track of the volume of data you received and sent in the past and who or what your PC is talking to. Detect spyware, malware, badly behaving apps, and bandwidth hogs, then block their connections with our powerful firewall. Monitor devices on your network and get alerted when new unknown devices join your WiFi. GlassWire warns you of network-related changes to your PC or unusual changes to your apps that could indicate malware. -
14
Alexio Defender
Alexio Corporation & Healthcare Compliance Network
$24.99 per user, per monthWe can help you secure your data. 92% of Canadians worry about data security and privacy. alexio can help you strengthen your systems and human defenses. Flatten costs: alexio uses automation to automate most updates, repetitive tasks, monitoring, and other tasks. This makes it exponentially more efficient, secure and doesn't cost you extra for manual labour. Automated maintenance. Automated maintenance. We offer award-winning automation that applies maintenance items according to needs. This keeps systems and major applications current, which makes them safer and less likely to fail. Continuous security. Alexio offers multi-layered security. Antivirus is only one component. We go beyond that, using machine learning, AI, and automation to help you secure your systems constantly. Security reporting. The alexio team believes if you don't report on it, it is not reliable. Alexio provides daily evidence that security measures are in place. -
15
Ransomware Defender
ShieldApps Software Development
$49.99 one-time paymentRansomware Defender from ShieldApps is a unique solution that deals with ransomware. Ransomware Defender is specially designed to detect and block ransomware before it causes any damage. It blacklists and stops both unique and common ransomware. Ransomware Defender is installed and stands guard 24 hours a day using active protection algorithms that are enhanced with user-friendly notifications and alerts. Ransomware Defender is fully automatic and takes care of all threats using an advanced Scan > Discover > Lock Down mechanism. This protects against detected threats and works with all major antiviruses and antimalware products. Ransomware Defender includes a scheduled automatic scan, a secure file eraser, lifetime updates, and support! It detects and removes all known ransomware before it can cause damage to your computer. This program will scan your computer and locate hidden ransomware in high- and low-level folders. -
16
NetLib Encryptionizer
NetLib Security
Transparent Data Encryption for all Editions (Express to Enterprise) of SQL Server. No programming required. Developer friendly: can be easily bundled with SQL Server-based applications. An economical alternative to upgrading from SQL Server Enterprise. Assists in compliance with various regulations. Protects intellectual property and data. -
17
Island
Island
Island gives the enterprise complete control over the browser. It delivers a level governance, visibility and productivity that was simply not possible before. Controlling where and when users copy/paste into or out of applications. Checking device posture before granting access to an application. Preventing unauthorized screen captures. Understand the full story of user activity and experience. Trace incidents to the user, device and time. All browser data can be fed into your analytics platform so that you have everything you need in one place. Island can be customized to match your company's brand, messaging and workflows. You can even insert browser-based RPAs to protect sensitive data, based on the unique governance requirements. Island is built using Chromium, which is the same open-source software that powers Chrome, Edge and other mainstream browsers. -
18
Aobo Internet Filter for Mac
EaseMon
$29.99 per monthAobo Filter Professional for Mac OS X is a piece Internet Filtering Software. It blocks inappropriate websites, games, and other harmful applications from Mac. Aobo Filter Mac has the ability to log website visits. This allows you to retrieve and identify visited sites from any web browser. Many offices and organizations consider computers an essential tool. Many employees have difficulty using it properly. They are often watching inappropriate videos, shopping online, or playing computer games. This can lead to low productivity. It is important to block inappropriate websites and applications. -
19
LogPoint provides a simple and quick security analytics implementation. It also offers a user-friendly interface which can be integrated with any IT infrastructure. LogPoint's modern SIEM and UEBA offers advanced analytics and ML driven automation capabilities that enable customers to secure build-, manage and transform their businesses. This allows for lower costs to deploy a SIEM solution either on-premise or in the cloud. The solution can be integrated with all devices on your network to provide a comprehensive and correlated overview over events in your IT infrastructure. LogPoint's Modern SIEM software translates all data into a common language that allows you to compare events across different systems. A common language makes it easy to search, analyze, and report on data.
-
20
Anti-Executable
Faronics
By blocking unauthorized executables, you can stop threats from ever starting. Faronics Anti-Executable stops unknown threats from bypassing your antivirus solution. It protects against sophisticated threats such as zero-day attacks, mutating malicious software, and advanced persistent threats. This requires an approach that goes beyond traditional antivirus solutions. By ensuring that only approved applications are allowed on a computer, it also ensures that you are protected from any unknown threats. Faronics Anti-Executable provides security and flexibility to protect your endpoints. Faronics Anti-Executable ensures that your servers are always protected. Faronics Anti-Executable protects your identity and keeps your computer safe against malware. Faronics Anti-Executable offers security beyond antivirus by preventing unauthorized programs - malicious, unlicensed, or simply undesirable - from ever executing. -
21
Matrix42 EgoSecure Data Protection
Matrix42
Everything works as it did before, but now it's secure. All-round protection for your devices, applications, and sensitive company data. Your data remains secure. Digital networking and device diversity allow for greater flexibility, but they also increase the risk to malware, data loss, theft, and other threats. Traditional antivirus and firewall protection are no longer sufficient to close security gaps. You can quickly see all data flows within the network with a click of a mouse and trigger the appropriate protection measures. Insight Analysis - This analyzes the network's security to determine the best protection measures. As a dashboard, you can view the analysis results. It is not possible to draw conclusions about individual users' activities. Reports can be generated automatically and sent via e-mail. -
22
Dhound
IDS Global
$30 per monthYour business is connected to sensitive data or critical infrastructure. You understand the costs of an attacker finding a vulnerability. You are required to follow security regulations set forth by law. SOC2, HIPAA, PCI DSS, etc.) You are required to conduct pentests conducted by a third party company. Your clients promise partnership only if you provide reliable and secure solutions. You keep your promises and guarantee your system security through penetration testing. Pen test is a fake hacking attack, but it is performed by security knights who are dedicated to protecting your web security. Penetration testing, also known as ethical hacking or pen test, is performed by Dhound so that you can let out your worries and feel confident in the security of your system. Dhound's ethical hacking does not only look for vulnerabilities, unlike vulnerability assessment. It would be too simple for us. We use hackers' mindsets and techniques to stay ahead of our adversaries. But we don't worry! -
23
LanScope Cat
Interfocus
Your users can purchase new apps and devices, and they can access your network from any location, at any time. You can manage your IT before it gets out-of-control. LanScope Cat gives you greater visibility into your assets, and how users use them. Although user activity monitoring can be complex, LanScope Cat allows you to see who did what on which device. A warning is displayed to the user if an operational violation, such as the uploading of customer lists to a USB, is detected. The illicit operation is stopped. LanScope Cat allows you to monitor your remote and onsite workforce. IT devices can be difficult to manage and secure, which can cause problems for IT managers. LanScope Cat can lower security risks by solving an age-old problem. LanScope Cat protects data, applications, and devices while providing actionable insights into user behavior. -
24
AccessPatrol
CurrentWare Inc.
$3.99 PUPM 1 RatingAccessPatrol is a data loss prevention and device control software for preventing data leakage to portable storage hardware. With AccessPatrol you can restrict a variety of peripherals including USB portable storage devices, optical media, Bluetooth, WiFi, FireWire, and cell phones. Access permissions for USB devices can be set to Allow, Read Only, or Blocked. Peripheral devices can be identified based on Vendor ID, Serial Number, and PNP Device ID. Specific USBs, External Hard drives, Imaging devices, and portable devices can be added to an Allowed List to enforce the exclusive use of company-approved devices. -
25
DriveCrypt
Securstar
$59.95DRIVECRYPT protects all data on notebooks or desktop computers securely and quickly, without the need for users to worry about security. This disk encryption product can be used by any organization, large or small, to protect client lists, product specifications and confidential corporate memos. Stock information and business plans can also be protected. DRIVECRYPT automatically encrypts data as it is read from the hard drive before it is loaded into the memory. Data is automatically encrypted after it is written back to the disk. The disk encryption/decryption process is completely transparent to the user or any application program because the data is processed by an operating system extension, "on the fly" as it transfers back and forth between the hard disk and memory. Users don't have to remember to decrypt, re-encrypt, or alter the normal operation of their PC. -
26
Barracuda Web Security Gateway
Barracuda Networks
Barracuda Web Security Gateway allows organizations to use online tools and applications without being exposed to web-borne malware, viruses, lost productivity, or misused bandwidth. It is a comprehensive solution to web security and management. It combines award-winning spyware, virus, and malware protection with a powerful policy engine and reporting engine. Advanced features allow organizations to adapt to new requirements such as remote filtering, social-network regulation, and visibility into SSL encrypted traffic. Remote user licenses can be purchased for unlimited access to the corporate network. This allows you to control content and access policies on mobile devices. Virtual appliances are also available for the Barracuda Web Security Gateway. Barracuda Content Shield is a hosted web security solution. -
27
iLocker
Protectstar
$376 per yeariLocker makes your Mac more flexible and safer, even if you are sharing your Mac with others. iLocker Mac protects each app from unauthorized access, including Apple Mail, Photos Contacts Safari and Games. iLocker Mac protects the apps you choose. It also records failed attempts to access protected apps so that you can see the date and time. To improve security, the automatic exit feature locks down the app after a certain time when you are away from the keyboard. There is only one way to protect the app you want. You can just drag and drop your apps onto the button. You can now unlock your Mac instantly. Apple Pay is a secure way to make online purchases. Access system settings and locked Notes quickly. You can even switch users with a single touch. -
28
Data Rover
Data Rover
Data Rover is an Advanced User Data and Security Management for any Data-Driven Organisation. A single solution for Infrastructure and Security managers that allows data users to explore, manage, process, and protect their data effectively and efficiently, by simultaneously addressing the two primary needs related to the use of data: Cyber Security and Data Management. Data Rover plays a key role in business asset protection and corporate data management policy definition. The software is designed for companies that need to ensure compliance with personal data protection regulations and provides detailed analysis of data access permissions. User Access Rights & Auditing Provides invaluable information about access privileges to files and folders. It allows you to analyse the effective permissions of the users, i.e. the real ones. It identifies not only who can access data, but also who did exactly what, when, and from where. Data Housekeeping Helps you identify and distinguish valuable assets from junk information that becomes unnecessary ballast and an unjustified cost to the company. Data Exchange Provides the company with an advanced data exchange and tracking system exclusively designed for the business. -
29
Promisec Endpoint Manager
Promisec
PEM provides a fundamental capability for IT organizations responsible for software patches updates across company endpoints. PEM gives you unified visibility and control of what's happening on your servers and endpoints, so you can respond quickly to any potential threat. PEM gives you full visibility across all files, processes, registry, processes, network connections, third-party products, OS versions, and other information in your organization. PEM uses proprietary agentless technology to rapidly inspect your entire enterprise and identify, analyze, and remedy security gaps. The solution can be used for compliance and cyber purposes, and it can run on any network. -
30
MemberProtect
InetSolution
MemberProtect allows professional programmers to integrate into secure online systems such as ACH, Online Banking and wire transfer applications. MemberProtect is the most trusted authentication, data encryption and user management system in the banking and credit union industry today. Based on roles and privileges model. Supports millions of users and organisations. Extremely precise application security. Strong encryption that protects databases down to the column level. Encrypt all email messages and flat files on your network. All data accesses should be logged, even if they fail. Even beyond firewalls, SSL and operating systems, protect member data from hackers and unauthorized staff. Use MemberProtect to create secure connections with third party APIs. Access to any web-based service, including LDAP support. -
31
OneLogin, a trusted identity management (IAM), solution for modern enterprises, helps you secure company information and empower your employees. OneLogin is a great solution for companies that want to simplify business logins and strengthen enterprise security. OneLogin features include single sign-on (SS), user provisioning, unified directory, user provisioning and adaptive authentication. Compliance reporting is also available.
-
32
CloudJacketXi
SECNAP
CloudJacketXi, a Flexible Managed Security-as-a-Service Platform. No matter if you are an established company or a start-up SMB, our service offerings can be customized to meet your needs. We are experts in flexible cybersecurity and compliance offerings. Our services are available to clients in many verticals, including government, legal, medical and hospitality. Here's a quick overview on the various layers of protection that can tailor to your organization's needs. Flexible Layers: Our flexible security-as-a-service platform allows for a layered approach where you can choose exactly what your organization needs. Intrusion Prevention System; Intrusion Detection System Security Information and Event Management Internal Threat Detection Lateral Threat Detection Vulnerability Management Data Loss Prevention All monitored and managed by SOC. -
33
Saint Security Suite
Carson & SAINT
$1500.00/year/ user This integrated solution can perform active, passive, and agent-based assessments. It also allows for flexibility in evaluating risk according to each business. SAINT's remarkable, flexible, and scalable scanning capabilities make it stand out from other solutions in this market. SAINT has partnered up with AWS to allow its customers to benefit from AWS's efficient scanning. SAINT also offers Windows scanning agents for subscribers. Security teams can easily schedule scans, configure them with a lot of flexibility, and fine-tune their settings with advanced options. -
34
indeni
indeni
Indeni's security infrastructure platform automates firewall health monitoring and automatically detects license expirations or misconfigurations before they impact network operations. It prioritizes issues automatically so that you only get the most important alerts. Indeni takes a snapshot of your cloud environment before it is built. Our cloud security analysis tool, Cloudrail, reviews your infrastructure-as-code files so you can identify violations earlier in development when they're easier to fix. Continuous detection of HA unreadiness due to cross-device inconsistencies with security policies, forwarding table, and other configurations. Consistent measurement that device configuration skews against locally-defined organizational standards. Collect relevant configuration and performance data from firewalls, load balancers and other security infrastructure. -
35
OSE
Open Seas
Compromised organizations can face significant barriers to restoring customer trust and brand reputation after being hacked. OSE alerts you to any attacks on your critical systems and warns you if they happen so that you can stop them before they cause damage to your brand, reputation, IP, and customer trust. OSE provides an audit of an attack, listing the changes made and what they were before resolving it quickly. OSE reporting is helpful in ISO 27000 compliance. OSE (Operating System Security Enforcer), implements your Security Policy. This can be either an out-of-the-box OSE standard or your customized version. Applying the security policy to all Unix, Linux, and Windows corporate servers. -
36
Coro eliminates the need to constantly worry about security tools being overlooked and the security tool overload. There's no need to go through everything 10 times per day. Coro will monitor your security and alert you when you need to act. Coro will analyze the threats to your business and take action to eliminate them. Then, Coro will guide you on the next steps to improve your security. Coro is your central control point for sensitive data and practice data. It allows you to enforce a wide variety of security, compliance, and governance policies. Every email is scanned for malware, phishing, and ransomware, and we automatically eliminate any threats. We automatically detect and block insider threats, account hacking, and other malicious activities. We scan every file, email, and data share for PII/PCI/PHI and prevent confidential information from being leaked.
-
37
360 Security Guard
360 Security Guard
360 Security Guard is a leading security antivirus product that can detect and kill all types of Trojan viruses. It is committed to protecting users' computers security. We have many features that will improve your computer's efficiency. You can scan the computer in multiple dimensions, including garbage collection, computer running speed, system abnormalities and computer security risks. This will quickly assess the system's status. To detect the threat situation immediately, 38 layers of protection barriers are added layer after layer, creating an all-weather, all-weather cyberspace defense. You can get the most recent information about popular games and events in real-time, gather multiple media, unify the entrance. Get the latest and most popular games, download and install them, and get access to them through 360 exclusive distribution channels. -
38
iPrism Web Security
EdgeWave
iPrism Web Security combines fine-grained content filtering with threat detection and mitigation methods to provide powerful protection against Advanced Persistent Threats (botnets, viruses, and others). iPrism Web Security is easy to use and "set it and forget". It is self-contained to provide advanced threat protection, policy enforcement, and requires almost no maintenance. Our comprehensive reporting makes managing your network easy. iPrism employs a unique combination of iGuard's automated intelligence and human analysis to block malware, Crypto-Locker, and other inappropriate sites. It improves user productivity by reducing latency and false negative rates. This innovative approach ensures that you have the most up-to-date, advanced web protection available 24/7 and is supported by world-class customer service. -
39
Net Monitor for Employees
EduIQ.com
$99.95 one-time paymentSoftware that tracks employee activity has become a vital tool to improve productivity in the office. Many times, team members spend their time surfing the web or watching irrelevant content. Many companies use employee monitoring to detect and prevent data breaches that could lead to huge financial losses. It's a great way to increase worker engagement and optimize work processes. Computer monitoring provides companies with a complete picture of work in and out of the workplace. Computer surveillance software can help organizations reduce risk and increase profitability. The data can be used to analyze bottlenecks, unusual patterns, or other potential issues. -
40
Microsoft Family Safety
Microsoft
$9.99 per monthYou and your family can create healthy habits and protect those you love. You can set screen time limits for apps, games, and devices. You can decide whether to add or remove screen time as your screen time runs out based on what is best for you and the family. Your children can explore the internet in a safe environment. You can use the app's content filtering settings on Android, Windows, and Xbox to set healthy boundaries and block inappropriate apps and games. Limit your browsing to kid-friendly sites using Microsoft Edge on Android, Windows, and Xbox. Family location sharing and tracking allows you to stay connected even when your are away. You can share your location with family members, track them on a map and save the places they frequent most. You can get insights into how your family is doing on a road trip, such as how often they use their phone, top speed and how often they brake hard. -
41
Avast Online Security & Privacy
Avast
FreeProtect your browser data from malicious websites and phishing attacks, and receive step-by-step privacy guidance. Our browser extension is a great privacy starter pack. Protect your browser from online threats and phishing scams. Protect your online activity, block online snooping, and receive step-by-step privacy advice. In seconds, identify and block phishing scams. Safer search engine results will show you which sites are safe before you visit them. Receive real-time threat alerts whenever you come in contact with suspicious web pages. Protect your online activity, block online snooping, and receive step-by-step privacy advice. Your online activities will remain anonymous and private. Our Privacy Advisor will help you optimize your privacy settings across all your favorite platforms. Our new Privacy Advisor feature will help you get privacy advice and manage your privacy settings across all your favorite online platforms. -
42
ShieldApps Webcam Blocker
ShieldApps
$29.99 one-time paymentShieldApps Webcam Blocker is a highly sophisticated security program that uses advanced privacy enhancement algorithms. It's packaged in an easy-to-use interface that provides protection with just one click. ShieldApps' Webcam Blocker stops hackers from accessing or using information collected via a webcam or microphone against you. The user-friendly interface allows you to easily control Webcam and Microphone-blocking features with just one click. ShieldApps' Webcam Blocker provides an additional layer of protection for your computer, and is proactive in protecting your privacy. After selecting the options, any attempt to access your webcam from the outside or inside will be denied. -
43
Adaware Protect
Adaware
FreeAdaware Protect is an all-in-one suite which includes Adaware Secure Browser to improve your online security. Adaware Protect protects your computer from dangerous websites. Adaware Protect blocks dangerous websites and allows you to see which applications attempt to access unknown URLs. Adaware Protect can be used to prevent hackers and spyware accessing your microphone and camera. One click is all it takes to start a video conference. Adaware Safe browser allows you to navigate the internet faster and more privately. For a faster browsing experience, block ads. To prevent being tracked, block trackers and cookies. Our private search allows you to hide your search history. To optimize your computer's performance, choose your favorite features. Adaware Protect can scan and remove any unnecessary files or applications from your computer. It's never been easier to keep your computer safe! -
44
OpenText Security Suite
OpenText
OpenText™, Security Suite powered by OpenText™ EnCase™, offers 360-degree visibility across all devices, including laptops, desktops, and servers, for proactive discovery and remediation. It also allows for discreet, forensically sound data collection and investigation. Security Suite is the industry standard for digital investigations and incident response. Security Suite has agents deployed on over 40 million endpoints and clients that include 78 Fortune 100 companies. EnCase solutions are designed to help law enforcement, government agencies, and enterprises address a variety of issues, including file analytics, endpoint detection, response (EDR), and digital forensics. They offer the most trusted cybersecurity and digital forensics software. Security Suite solves problems that are often overlooked or left unsolved at the endpoint. It restores confidence for customers and companies with its unparalleled reliability and breadth. -
45
Intrusta
iSubscribed
$24.99 one-time paymentDigital security should be simple for you, we believe. We are here to protect you so you can click, surf, and browse without worry. We are your partner. We identify, analyze, and prevent threats so that you can get on with your day. Intrusta's goal to simplify online security is ours. We make it easy to use our software, pay your bill, or chat with a customer service representative. We have moved on from confusing billing practices and shocking price hikes. We will tell you upfront what you pay and when. You shouldn't be surprised when renewal time comes around. We are perpetual learners and have a knack to improve. Our knowledge helps us keep up with changing threats. We are proud of our outstanding support. We are reliable, empathetic and always available to help. We can help you with any technical, product, or payment problem. -
46
modus
Vircom
$12 per user per monthModusCloud offers clients access to enterprise security technology and infrastructure used by some the most secure companies in the world. This is combined with our expert knowledge and understanding of smaller businesses' needs. We offer a hosted email security solution that includes email threat protection, email continuity with Emergency Inbox and policy-enforced encryption. All of this is managed with an intuitive and simple user interface. ModusCloud is a cloud-based email security solution. The message filtering activities, including detection of suspicious mail, take place at an external data centre. This protects users from external threats and is managed by highly skilled personnel. Following a simple setup wizard, organizations can register their mail servers, domains and users. -
47
ZoneAlarm Extreme Security NextGen
Check Point
$44.95 per year 3 RatingsZoneAlarm for Business offers comprehensive, advanced, and flexible solutions for unmanaged businesses such as small businesses, Telco’s, government municipalities, and other businesses with little to no IT resources available. With its easy deployment and maintenance, ZoneAlarm for Business offers you Check Point’s vigorous multi-platform protection and support, made simple. ZoneAlarm Extreme Security NextGen is the comprehensive, ultimate PC and mobile security solution for all your business security needs, using Check Point’s cutting-edge enterprise-grade technology. Next-gen antivirus with award-winning Anti-Ransomware, advanced phishing protection, and secure browsing experience. Our advanced cyber security solutions use business-class protection to secure millions of home users’ PCs and mobile devices against the latest worldwide cyber threats. This powerful weapon is extremely effective at spotting malicious files and cyberattacks that evade traditional antiviruses. -
48
Intruder
Intruder
Intruder, an international cyber security company, helps organisations reduce cyber exposure by providing an easy vulnerability scanning solution. The cloud-based vulnerability scanner from Intruder finds security holes in your digital estate. Intruder protects businesses of all sizes with industry-leading security checks and continuous monitoring. -
49
VoodooShield
VoodooShield
$20 per yearAll cybersecurity products have a weak spot. They can only offer a single level of protection. This means that they can either be too aggressive or too relaxed at any given moment, leading to false positives and breaches. VoodooShield addresses this problem by dynamically adapting its security posture based on user behavior and activity. We are able offer a stronger and more secure lock than any other product. Our antimalware context engine is a highly developed and refined algorithm that analyzes every feature of every attack chain event to determine whether benign or malicious events can be allowed. VoodooShield is able to provide very robust ransomware, script and LOLBin protection, as well as fileless malware protection capabilities. -
50
Seraphic can protect any browser version on any device from phishing and spear-phishing, clickjacking and man-in-the-middle attacks, as well as Zero-day and unpatched N-Day attacks. This allows your end-users to use any combination of browsers they like, and allows you to centrally manage corporate policy for browsing and enterprise/private apps environments. Seraphic also features robust policy and governance controls, including state-of-the-art DLP engines that scan all outbound and input data in any format for any file. This ensures complete privacy first.