Best SoftControl Alternatives in 2024
Find the top alternatives to SoftControl currently available. Compare ratings, reviews, pricing, and features of SoftControl alternatives in 2024. Slashdot lists the best SoftControl alternatives on the market that offer competing products that are similar to SoftControl. Sort through SoftControl alternatives below to make the best choice for your needs
-
1
PhishTitan
TitanHQ
12 RatingsPowerful Inline Phishing Protection for M365. Harness the power of AI and our LLM to defeat phishing. PhishTitan is next generation inline phishing protection and remediation, powered by TitanHQ, the global leaders in email cybersecurity. Our learning model and AI integrates directly with Microsoft 365, both catching and remediating sophisticated phishing and BEC attacks that Microsoft misses. It provides users with in-the-moment warning banners to help them decide whether an email is malicious or safe, continually enhancing the human firewall. Post delivery remediation (PDR) allows you to remove all of these phishing emails from your users inbox removing risk instantly. The removed email goes to the junk folder. Our curated and unique email threat intelligence data is unmatched in its simplicity, visibility, coverage and accuracy. Risk free deployment in 6 minutes. PhishTitan will filter your email to identify phishing threats and protect your users and business. That’s how you avoid that one wrong click that can lead to disaster – all it takes is 6 minutes! -
2
SpamTitan
TitanHQ
800 RatingsSpamTitan email security protects businesses, schools, smbs and MSPs from spam. SpamTitan email security protects against spam, phishing, day-zero attacks and viruses, malware, ransomware and other threats to email. It helps to control mail flow, clean it, protect against spam, and protect against unwanted email. We offer easy-to-use, yet powerful email security for businesses, smbs, and MSPs that is Office365-friendly. SpamTitan Email Security is available for a free, fully supported trial. SpamTitan – Premium functionality included * CEO Impersonation protection * Spearphishing Protection/ Phishing * Link analysis * Full Sanding * Zero Day Attacks protection * Mail Spooling * Spoofing protection * Ransomware and Malware Protection * SPF/DKIM/DMARC checking * Encryption * Fully multi-tenant environment * Ability to rebrand entire UI * Full REST API * Set up documents and support SpamTitan Email Security is the best solution in the G2 Crowd Email Security. Start your free trial today! -
3
Keeper Security
Keeper Security
1,542 RatingsPassword security is the foundation of cybersecurity. Keeper's powerful password security platform will protect your business from cyberthreats and data breaches related to passwords. Research shows that 81% of data breaches can be attributed to weak passwords. Password security platforms are an affordable and easy way for companies to address the root cause of most data breaches. Your business can significantly reduce the risk of data breaches by implementing Keeper. Keeper creates strong passwords for all websites and apps, then secures them on all devices. Each employee receives a private vault to store and manage their passwords, credentials and files, as well as private client data. Employees will save time and frustration by not having to remember, reset, reuse, or remember passwords. Industry compliance is achieved through strict and customizable role-based access controls. This includes 2FA, usage auditing, and event reporting. -
4
USB Control & Lockdown Software to Block USB devices Access and Lock USB Ports within Windows Systems. Centralized USB Device Management, Monitoring, and Whitelisting to Protect Computers within a Network. Endpoint Security Management's USB Device Control program is an important component of Endpoint Security Management. It focuses on protecting computer systems and data assets against threats from unauthorized USB device use. To protect networks that store sensitive information or control machinery, it is necessary to control USB device access to endpoints. Latest version v12.968 (released: September 26, 2021 - Centralized USB Device Management - Secures Computers in Groups or Specific Computers. - Whitelists specific devices by Hardware ID and blocks the rest -Automatically apply Group 1 protection settings to unassigned clients. NEW! -Automatic Authorizations Mode, Whitelist USB devices across the network automatically. NEW -Receives alerts & logs USB device connections in the network. -Exports Status and Alerts Reports to csv format (Comma-separated value) - Presents Full Screen Locking on Blocking Devices (includes company logo). - Monitors and Encrypts File Transfers From Endpoints to USB.
-
5
SafeGuard Cyber
SafeGuard Cyber
SafeGuard Cyber is a SaaS security platform providing cloud-native defense for critical cloud communication applications that organizations are increasingly reliant upon, such as Microsoft Teams, Slack, Zoom, Salesforce, and social media. A blind-spot is growing for security operations as adoption of these tools increases, creating more risk and vulnerability to ransomware, business compromise, and confidential information leakage. Email security lacks the ability to both create visibility outside of email, and primarily defend against malicious files and links. CASB/SASE solutions are difficult to deploy and manage, and the control function is typically left “open” to prevent false positives from affecting business productivity Our platform’s agentless architecture creates a portable security layer wherever your workforce communicates, no matter the device or network. Manage day-to-day business communication risk extending beyond email and into enterprise collaboration applications. Secure your business by protecting the human attack vector from advanced social engineering and targeted threats. -
6
Coro eliminates the need to constantly worry about security tools being overlooked and the security tool overload. There's no need to go through everything 10 times per day. Coro will monitor your security and alert you when you need to act. Coro will analyze the threats to your business and take action to eliminate them. Then, Coro will guide you on the next steps to improve your security. Coro is your central control point for sensitive data and practice data. It allows you to enforce a wide variety of security, compliance, and governance policies. Every email is scanned for malware, phishing, and ransomware, and we automatically eliminate any threats. We automatically detect and block insider threats, account hacking, and other malicious activities. We scan every file, email, and data share for PII/PCI/PHI and prevent confidential information from being leaked.
-
7
CimTrak Integrity Suite
Cimcor
Compliance standards and regulations require that you secure your enterprise from both internal and external threats. CimTrak's auditing, change management, and reporting capabilities enable private and public companies alike to meet or exceed the most stringent compliance requirements. CimTrak covers all compliance requirements, including PCI, SOX and HIPAA. CIS, NIST, CIS, and many others. CimTrak's File and System Integrity Monitoring helps protect your important files from accidental or malicious changes that could cause damage to your IT infrastructure, compromise your data, or violate regulations like PCI. IT environments are subject to change. CimTrak provides integrity monitoring, proactive response to incidents, change control, auditing, and auditing capabilities all in one cost-effective file integrity monitoring tool. -
8
BlueFiles
Forecomm
What can you do today if you need to quickly send confidential files or emails to customers, partners, employees, or other people outside your company's secure network? CNIL strongly recommends that businesses and organizations "use data encryption during transfers" and "train people in the risks." Data encryption is an integral part of modern data protection strategies. BlueFiles is a specialized encryption that allows companies to encode data so that it is indecipherable to anyone except the intended recipient. BlueFiles offers a guarantee on all digital data transfers: 100% confidentiality, integrity of the BlueFiles file and remote control of files sent. You can also track your files. We need to communicate securely over the internet without exposing our sensitive data. This will save us time, money, and effort. Companies must encrypt personal data flows in accordance with the GDPR law or risk high fines. -
9
Microsoft Defender for Individuals
Microsoft
The Microsoft Defender app is now available for download as part of your Microsoft 365 subscription. It provides easy-to-use online security for you, your family and your devices. One centralized view allows you to monitor and manage your security status across all your devices and computers. Anti-phishing and antivirus protection can help protect your family and you from online threats. Receive real-time alerts that include recommended actions and information about how you can stay safe online. All your online security status can be viewed from one central location. All your data and device protections for your family are available in one place. You can easily add or remove devices. You and your family can rest easy knowing that malware protection is available. You get continuous protection with antivirus scans for your devices and apps. You can control what files and apps are scanned by identifying trusted ones. Receive real-time alerts about security changes that affect you and your family. -
10
McAfee LiveSafe
McAfee
$39.99 per year 2 RatingsMcAfee®, LiveSafe™, is the best protection for your computers, Macs and smartphones. McAfee LiveSafe offers award-winning antivirus protection, as well as many other features, to protect your computer, mobile devices, and identity. We keep you safe so that you can concentrate on what is important. Protect your computer from viruses and other threats with both online and offline protection. One subscription protects your Macs, PCs, smartphones, tablets, and computers. When you connect to public Wi-Fi, keep your browsing habits and data secure. McAfee LiveSafe is a standout among our security solutions. Its combination of privacy, identity tools, and antivirus features will protect you against all types of threats. When you sign up for auto-renewal** you will have access to our secure VPN. This provides bank-grade encryption to protect your online activities and personal information. -
11
AVG Internet Security
Avast
$3.29 per month 6 RatingsYou can have total security online. AVG Internet Security is an award-winning antivirus that offers customizable firewalls, remote access protection against hackers, as well as award-winning antivirus. AVG Internet Security protects you from viruses and malware, keeps emails safe, protects passwords and webcams from hackers, and allows you to shop and bank online with no worries. Advanced Antivirus scans your computer for viruses, ransomware and spyware. If suspicious software behavior is detected on your computer, Behavior shield will send alerts. AI Detection proactively detects malware samples to protect your computer from new threats. CyberCapture automatically uploads malware samples to our antivirus software for analysis. This prevents new threats. You can stay safe online by scanning downloads, emails, and links for potential threats. Also, avoid unsecure Wi-Fi networks. Link Scanner scans links for suspicious content to avoid dangerous websites. -
12
CryptoDefender
BlockSafe Technologies
$5.99 per 2 devices per monthThis prevents malware from spying upon what you type. The kernel and wallet application use military-grade encryption to secure keystrokes. The password you use to decrypt or logon your secret key is now secure. To prevent malware from spying on your clipboard, copy and paste the contents. The destination address to which crypto transactions are sent is not altered. Screen-scraping malware is prevented from taking secretly screenshots of information. Displays hidden frames and frames that originate from a potentially dangerous domain. This neutralizes hackers' favorite trick to download malware onto your computer. CryptoColor visual verification indicates that CryptoDefender™, which highlights what you type in a specific color, is protecting your input. -
13
ShieldApps Webcam Blocker
ShieldApps
$29.99 one-time paymentShieldApps Webcam Blocker is a highly sophisticated security program that uses advanced privacy enhancement algorithms. It's packaged in an easy-to-use interface that provides protection with just one click. ShieldApps' Webcam Blocker stops hackers from accessing or using information collected via a webcam or microphone against you. The user-friendly interface allows you to easily control Webcam and Microphone-blocking features with just one click. ShieldApps' Webcam Blocker provides an additional layer of protection for your computer, and is proactive in protecting your privacy. After selecting the options, any attempt to access your webcam from the outside or inside will be denied. -
14
Sign up now to save 44% You can connect in one click and enjoy privacy, security, and unlimited internet access. VPNs encrypt your internet connection to protect it and your privacy. VyprVPN was created in response to government surveillance. Our strong encryption protects your information from hackers, identity theft, and malware. It prevents your ISP from tracking you every move and stops advertisers from selling or collecting your valuable data. VyprVPN allows you to escape censorship. To hide your location and bypass internet restrictions imposed by governments, workplaces, and organizations, change your IP address. Our servers disguise your identity and protect your traffic from being leaked to your ISP's DNS servers. VyprVPN offers an app that can be used for both public wi-fi and home streaming. VyprVPN can be installed on all devices to keep you connected and secure.
-
15
You need to protect every device, including laptops and mobile devices, on your network as more business operations are going digital. Select Tier combines multi-layered technologies and flexible cloud management with centralized application, web, and device controls to protect sensitive data at every endpoint. Our security doesn't slow down your system. The Remediation Engine can undo most malicious actions if you are attacked. Users can continue working without interruption. You can be assured of world-class security, including post execution Behavior Detection (and Machine Learning) technologies. This will help to reduce attack risk and keep your endpoints safe and secured. There is no need to download frequent updates. Easy migration from third-party endpoint security, ensuring a smooth transition. You can be sure of optimal configuration with our post-deployment quality audit service.
-
16
VaultCore
Fornetix
$1,118 per yearVaultCore™ is a next-generation, highly scalable enterprise key management solution from Fornetix®. It integrates seamlessly with existing platforms, automates policy, and empowers administrators with a centralized, organized control that can be easily applied across all environments. Request a demo to experience VaultCore's products: - Quick, seamless integration with existing technology - Separation Of Duties (a best practice). - Powerful automation allows for centralized control of policy - Increased security of data in motion, at rest, and in use - Significant reduction in the costs associated with data breaches -- lost businesses, recovery time, reputational damage - Simplified compliance, regulatory enforcement - Scalable to more than 100 million keys (more that enough to meet any industry or government's requirements) - Reporting capabilities to meet compliance requirements - Ease in Use -
17
east-tec SafeBit
east-tec
$29.95 one-time paymenteast-tec SafeBit is a disk encryption program that protects your data from unauthorized access and information leaks. It features on-the-fly disk encryption, by creating virtual disk drives, where you can [hide files & folders](/safebit/hide-folders/), keep them encrypted all the time, but still work with these files just like you work with normal files. east-tec SafeBit is a disk encryption program that protects your confidential information from unauthorized access and data breaches. It's a great addition to computer privacy software. It allows you to install and execute programs in encrypted vaults. This will ensure that all your traces are encrypted inside the safe. Use east-tec SafeBit to encrypt files and folders on-the-fly. On-the-fly encryption is when data is automatically encrypted before it is saved, and decrypted after it is loaded. This is done without user intervention. -
18
MemberProtect
InetSolution
MemberProtect allows professional programmers to integrate into secure online systems such as ACH, Online Banking and wire transfer applications. MemberProtect is the most trusted authentication, data encryption and user management system in the banking and credit union industry today. Based on roles and privileges model. Supports millions of users and organisations. Extremely precise application security. Strong encryption that protects databases down to the column level. Encrypt all email messages and flat files on your network. All data accesses should be logged, even if they fail. Even beyond firewalls, SSL and operating systems, protect member data from hackers and unauthorized staff. Use MemberProtect to create secure connections with third party APIs. Access to any web-based service, including LDAP support. -
19
LanScope Cat
Interfocus
Your users can purchase new apps and devices, and they can access your network from any location, at any time. You can manage your IT before it gets out-of-control. LanScope Cat gives you greater visibility into your assets, and how users use them. Although user activity monitoring can be complex, LanScope Cat allows you to see who did what on which device. A warning is displayed to the user if an operational violation, such as the uploading of customer lists to a USB, is detected. The illicit operation is stopped. LanScope Cat allows you to monitor your remote and onsite workforce. IT devices can be difficult to manage and secure, which can cause problems for IT managers. LanScope Cat can lower security risks by solving an age-old problem. LanScope Cat protects data, applications, and devices while providing actionable insights into user behavior. -
20
Antivirus protection and WiFi Security VPN go hand in hand. You need both antivirus protection and WiFi Security VPN to stay safe online. While antivirus protects your devices and VPN protects your connection by keeping you browsing private, both work together to provide you with security and privacy while you work, share, bank, browse, and bank. Webroot protects usernames, account numbers, and other personal information from online threats. Our cloud-based protection keeps your family and you safe every time you connect. Webroot is the most efficient, lightweight and cost-effective antivirus product on the market. You can stay safe at home and on the move. Access your files on your mobile device securely and easily. Privacy protection and system maintenance tool that erases all past online activity to protect privacy.
-
21
Trend Micro Maximum Security
Trend Micro
$39.95 per yearTrend Micro Maximum Security is compatible with Windows 11. This means that you can shop, play, and bank online without worrying about being hacked by fraudulent and malicious websites. Our cloud-based AI technology provides proactive protection against ever-evolving threats from malware infections. Trend Micro can protect you against known and unknown attacks, helping you stay ahead of the constantly changing threat landscape. You get multi-device protection against ransomware and viruses, as well as dangerous websites and identity thieves. Folder Shield Plus protects your digital assets and files locally as well as on cloud-synced folders. -
22
Adaware Protect
Adaware
FreeAdaware Protect is an all-in-one suite which includes Adaware Secure Browser to improve your online security. Adaware Protect protects your computer from dangerous websites. Adaware Protect blocks dangerous websites and allows you to see which applications attempt to access unknown URLs. Adaware Protect can be used to prevent hackers and spyware accessing your microphone and camera. One click is all it takes to start a video conference. Adaware Safe browser allows you to navigate the internet faster and more privately. For a faster browsing experience, block ads. To prevent being tracked, block trackers and cookies. Our private search allows you to hide your search history. To optimize your computer's performance, choose your favorite features. Adaware Protect can scan and remove any unnecessary files or applications from your computer. It's never been easier to keep your computer safe! -
23
Webroot Security for Chromebook
Webroot
$14.99 per yearYou won't have to worry about your children online with Webroot®, Security for Chromebook™. Our Chromebook protection will keep your children safe, no matter what they are doing online: reading, browsing the web, playing new games, or connecting with friends via social media. Protection against known threats such as ransomware, malware, and other malicious software. Webroot protects usernames, account numbers, and other personal information from online threats. Online shopping, browsing, and banking are safer. -
24
Sophos Home
Sophos
$44.99 per yearThe malware that targets fortune 500 companies also attacks private users. Sophos Home employs the same award-winning security measures that keep these companies safe. Sophos Home scans your computer and removes any malware that might be slowing it down. By blocking ransomware and viruses from stealing and destroying files, documents, or photos, you can keep your private information secure. Sophos Home protects you from hackers and phishing so you can surf the internet with confidence. It starts with a deep scan of your computer and cleaning it clean to remove any hidden threats. Your system is cleaned of any malware. Removes trojans rootkits, spyware and other malware. Protects against viruses and malware, trojans. Worms, bots. Unwanted apps. -
25
Block Ransomware and Backup
xSecuritas, Inc
$49/user/ year There are many ways to stop ransomware, malware, or viruses. These malicious programs are constantly evolving, so blocking malicious programs based on patterns alone could infect your computer with other malware. There is a way. You can try the "Block Ransomware" and "Backup" product. Ransomware, malware and viruses are all possible. It can infiltrate your computer, but it cannot damage your files. This product allows you set the Desktop, Documents, and other folders as protected folders. Only authorized programs (e.g. MS Office programs) can modify files in the protected folder. Unauthorized programs cannot open the file as read only or stop the unauthorized program running. Malicious programs cannot be accessed to the protected directory. When you modify or create documents, backup files can be created automatically. These backup files are stored in a specific folder. Not all programs can modify these backup files unless you permit it. -
26
Anti-Executable
Faronics
By blocking unauthorized executables, you can stop threats from ever starting. Faronics Anti-Executable stops unknown threats from bypassing your antivirus solution. It protects against sophisticated threats such as zero-day attacks, mutating malicious software, and advanced persistent threats. This requires an approach that goes beyond traditional antivirus solutions. By ensuring that only approved applications are allowed on a computer, it also ensures that you are protected from any unknown threats. Faronics Anti-Executable provides security and flexibility to protect your endpoints. Faronics Anti-Executable ensures that your servers are always protected. Faronics Anti-Executable protects your identity and keeps your computer safe against malware. Faronics Anti-Executable offers security beyond antivirus by preventing unauthorized programs - malicious, unlicensed, or simply undesirable - from ever executing. -
27
ZoneAlarm Extreme Security NextGen
Check Point
$44.95 per year 3 RatingsZoneAlarm for Business offers comprehensive, advanced, and flexible solutions for unmanaged businesses such as small businesses, Telco’s, government municipalities, and other businesses with little to no IT resources available. With its easy deployment and maintenance, ZoneAlarm for Business offers you Check Point’s vigorous multi-platform protection and support, made simple. ZoneAlarm Extreme Security NextGen is the comprehensive, ultimate PC and mobile security solution for all your business security needs, using Check Point’s cutting-edge enterprise-grade technology. Next-gen antivirus with award-winning Anti-Ransomware, advanced phishing protection, and secure browsing experience. Our advanced cyber security solutions use business-class protection to secure millions of home users’ PCs and mobile devices against the latest worldwide cyber threats. This powerful weapon is extremely effective at spotting malicious files and cyberattacks that evade traditional antiviruses. -
28
AVG AntiVirus Business Edition
Avast
$44.99 per year 17 RatingsUnrecognized files are downloaded to one of your computers. A copy will be sent to Threat Labs experts to determine if it is safe. It checks webpages before they open in your web browser. To help you surf the internet with more confidence, it displays a safety rating in search engine results. Cloud-based proactive AI Detection and Real-Time Outbreak Detection provide better protection against the latest malware. Protects against online security threats such as spam, viruses, hackers, and malware Anti-Spyware protects you from spyware and adware which track personal information. Our Windows file server security keeps it private, secure, and out of hackers' reach. Advanced File Shredder securely deletes files in order to prevent unintended recovery. It scans your computer when you're not using it to ensure that it doesn't get in your way. It does all the work so that you and your employees can concentrate on your business without any costly delays or distractions. -
29
Panda Fusion
WatchGuard Technologies
Fusion combines our Endpoint Protection Plus and Systems Management solutions to protect, manage, and support all your corporate devices. Cloud-delivered solutions allow for rapid deployment without the need for costly server infrastructure investments or maintenance. Maximum Security: Continuous protection of all office endpoints, inside and out. - Proactive Support & Maintenance: Rapid incident management, troubleshooting. - Centralized Control & Management: Permanent visibility to all hardware, software, and other IT infrastructure components. -
30
SecureCircle
SecureCircle
SecureCircle's Zero Trust data security protects all data, even those that are not hosted on SaaS. This eliminates data breaches and insider threat. SecureCircle's Data Access Security Broker protects and monitors data. This includes data egressing via enterprise cloud services and managed repositories. SecureCircle enforces access controls on all data locations, including cloud and endpoint devices. SecureCircle provides the only Zero Trust data protection in the world, ensuring data is protected transparently and consistently at scale. -
31
The Advanced Protection Program protects users with sensitive information and high visibility from targeted online attacks. To defend against the wide range of threats that exist today, new protections are added automatically. Gmail blocks more than 100 million phishing attacks every day. But sophisticated phishing techniques can trick even the most savvy users to give their sign-in credentials away to hackers. Advanced Protection requires that you use a security code to verify your identity when signing in to your Google Account. Unauthorized users will not be able sign in without your username or password. Chrome's Safe Browsing protects 4 billion devices from risky websites, and Advanced Protection performs more stringent checks for each download. It can flag or block you from downloading files that could be harmful. Only apps from verified stores are allowed, such as Google Play Store or your device manufacturer's store.
-
32
DriveCrypt
Securstar
$59.95DRIVECRYPT protects all data on notebooks or desktop computers securely and quickly, without the need for users to worry about security. This disk encryption product can be used by any organization, large or small, to protect client lists, product specifications and confidential corporate memos. Stock information and business plans can also be protected. DRIVECRYPT automatically encrypts data as it is read from the hard drive before it is loaded into the memory. Data is automatically encrypted after it is written back to the disk. The disk encryption/decryption process is completely transparent to the user or any application program because the data is processed by an operating system extension, "on the fly" as it transfers back and forth between the hard disk and memory. Users don't have to remember to decrypt, re-encrypt, or alter the normal operation of their PC. -
33
Bodi
Pilixo
$20 per monthAny company can be affected by a data breach at any time. No organization is immune from a malicious attacker, disgruntled ex-employee, or careless insider. Protects users from clicking on malicious links, stopping malware from spreading, regardless of whether the vector is email, Skype attachments, websites, or Slack. Real-time alerts to stop data theft based on specific keywords, file actions, special formats like SSN or credit card number and unauthorized privilege changes. Analyze the usage of applications, web browsing, printing, and other data. You can also see the time and duration of each usage. You can view and search for keywords on each device and record video. Remote control of the endpoint is possible to select the correct device. Employee Monitoring helps you stop malware from spreading, regardless of platform. -
34
Trusted Knight Protector Home
Trusted Knight Corporation
$34.95 per user per yearProtecting your identity, your family's online reputation, and all your sensitive information is the easiest and most effective way of protecting your identity. This alarming statistic is because every year, at least 24,000,000 new malware variants (malware that has been slightly modified to avoid detection by antivirus software), are discovered on computers. Your computer may already be infected by this type of malware. Protector Home is the best solution to protect your personal data, even if it is. It takes only minutes to install and automatically protects all your online sessions. Protector Home provides more than traditional protection. It offers the security and benefits your family requires, even if you have already lost your computer. -
35
Protectstar Camera Guard
Protectstar
$8.90 per yearStop spying and unattractive taping. Mark Zuckerberg and James Comey, former FBI chief, as well as millions of Facebook users, are all recording over their webcams. Everyone and everything is being spied upon. Since Edward Snowden's first NSA documents were published in June 2013, we have known that. Not only have hackers found ways to abuse the webcam without warning the user, but the latest malware is also highly dangerous as it specifically targets the control of the integrated device's camera. With just one click you can activate protection and Camera Guard will monitor and block any processes that attempt to access the camera of your device. Security breaches are reported. You can easily select which apps on your device have access to your webcam or camera. Deep Detective is an intelligent and versatile detective which monitors all macOS device accesses. -
36
Internet attackers can attack the IT infrastructure of large and small organizations, threatening your reputation as well as exposing your business and you to costly fines. How can you ensure your security protection is adequate to protect against these threats? It is difficult to identify the entry points for system attacks and requires dedicated resources to ensure a strong, secure network. NCR Network and Security Services is a comprehensive solution that protects networks and detects threats well before they occur. It can be integrated with other NCR solutions like Aloha.
-
37
Clearswift Secure email Gateway (SEG), provides powerful protection for an organization's emails against inbound cyber-attacks, and outbound data loss prevention. Email is the most popular method of communication in organizations. Cybercriminals can use it to steal your sensitive data and infiltrate your systems. Our Secure Email Gateway protects you against known and unknown malware as well as advanced threats such phishing. IT teams must ensure that all information shared via email within and outside of an organization is secure, appropriate, and compliant. Clearswift's unrivalled level of inspection and granular policies controls ensure that your emails are treated with the best security. This ensures that your communications are safe and uninterrupted and minimizes business disruptions.
-
38
Avast Small Business Solutions deliver next-gen endpoint protection for business Windows PCs, Mac, and Windows servers that you can manage anywhere via a web browser. Go about your business knowing you are backed by effective cybersecurity built for small companies. Control your IT security from anywhere, powered by the cloud, advanced AI, and a global threat detection network. Avast Small Business Solutions consist of: * Avast Essential Business Security helps deliver device security for small businesses that want remote visibility and centrally controlled protection against viruses, phishing, ransomware, and advanced cyberattacks. * Avast Premium Business Security combines our next-gen antivirus with VPN and USB control to help your employees and their devices stay more private and safer online, as well as offline. * Avast Ultimate Business Security includes our award-winning next-gen antivirus with online privacy tools and patch management automation software to help keep your devices, data, and applications updated and secure.
-
39
We are GOOSE VPN. The European VPN. We are on a mission! We work with you to give you control over your online life so you can enjoy it safely and without limitations. Compare prices and find the best deals worldwide. Grab that local deal! VPN stands for Virtual Private Network. It is a secure tunnel that connects your device to the internet. Once you connect to a secure GOOSE VPN server your internet traffic flows through an encrypted tunnel that no one can see, including hackers, governments, and your internet provider. You can move anonymously over the internet, and you can choose your location. This bypasses blockades and censorship, as well as stalker pop-up ads.
-
40
It all seemed to happen in a matter of hours. Your organization became an Enterprise of Things (EoT). PCs, mobile devices and cloud workloads. Agentless IoT devices and OT devices. Device diversity is good for security, but it comes at the expense of security. Your users can connect from anywhere in the world. The truth is that every thing that touches your enterprise exposes it to risk. It is essential to see it and protect it. Forescout is a great place to start. We are the only company that actively defends Enterprise of Things at Scale.
-
41
CyberGatekeeper
InfoExpress
Protecting your company is a complicated task that requires the right tools. Organizations must be aware of their security requirements. InfoExpress offers a variety of appliances to meet NAC requirements. All appliances support enforcement, which allows access to mobile, desktop, IoT devices and networks without network changes. Administrators are the only ones who can receive support. Administrators can send an email to the support address to open a support ticket. InfoExpress offers network security solutions that increase productivity and security by providing better visibility, increased security, and automating device access and mobile access to networks. Hundreds of security conscious-organizations use InfoExpress products to secure their networks, data and client information. -
42
OpaqueVEIL
TecSec
The core of TecSec’s Constructive Key Management® (CKM) system, CKM®, has a new name! TecSec has changed the name of its core technology to avoid confusion between CKM® the product and CKM® the standard in an ever-changing market. OpaqueVEIL® now refers to CKM®, the Runtime Environment (RTE), and is the core product of the VEIL®. Like its predecessor, the VEIL®, suite is a standards-based, patented cryptographic key management system that provides access control and information security through cryptography. OpaqueVEIL®, which is the underlying technology for all CKM Enabled products, consists of a set of software components that can be used to enable CKM technology. OpaqueVEIL® hides the inner workings of cryptography key management and makes the results easy and programer-friendly. -
43
XyLoc Security Server
Ensure Technologies
The XyLoc®, Security Server (XSS), is a server-based platform with a web GUI that centrally manages and monitors XyLoc users as well as protected workstations across the enterprise. XSS allows IT managers and administrators to implement and manage XyLoc across multiple networks segments and user groups. It also allows for detailed reporting and compliance auditing. XyLoc administration, reporting and management is simplified. Logs all log-on, secure walks-away and return activities. Integrates seamlessly into XyLoc Single Log-On for full SSO management. Activity reporting is also possible. Secure, fast access to information in a shared computer environment with multiple users (e.g. "Kiosk Accounts") It provides compliance reporting (e.g. HIPAA) with encrypted audit logs. Scales easily to support thousands of users. Active Directory®, (AD) supports Schema Extension and SQL Server®. -
44
Kaspersky Internet Security
Kaspersky
$39.99 per year 2 RatingsOur advanced, one-license security suite protects you from malware, financial scammers, and webcam spies. - Blocks viruses and cryptolockers, attacks, and more Prevents online trackers from collecting your data Detect spyware on your Android device Protect payments with bank-grade encryption* - Blocks unauthorized access to your webcam* - Encrypts data that you send and receive online - VPN** -
45
Webroot Internet Security Plus
Webroot
$35.99 per yearAntivirus protection and WiFi Security VPN go hand in hand. You need both antivirus protection and WiFi Security VPN to stay safe online. Both antivirus protect your devices and VPN protect your connection by keeping you browsing private. They both work together to provide you with security and privacy while you work, bank, share, bank, and browse the internet. Webroot SecureAnywhere®, Internet Security Plus offers cloud-based protection against online threats for all of your devices, keeping you safe no matter where or how you connect. It scans faster and uses less system resources. It protects you in real-time by instantly identifying new threats and blocking them as soon as they occur. -
46
TACHYON Endpoint Security 5.0
INCA Internet
$37/Year/ User Advanced anti-virus solution that blocks cyber threats like malware, spyware, ransomware and others. Protect your system and other important information with enhanced monitoring and protection. -
47
CWIS Antivirus Scanner
Cobweb Security
1 RatingYour website is protected 100% with our 24/7 security monitoring. We will immediately repair or clean up your website if hackers infect it. Our situation room offers 24/7/365 monitoring of the website. Our software engineers will immediately notify you if there is an attack and repair your website as soon as possible. Website cleanup and repair within 12hrs. Reports & Alerts via email. 24/7 Technical support. CWIS Premium will provide you with the best protection for a reasonable price. You will be given recommendations for security hardening. -
48
Defencebyte
Defencebyte
$39 per yearTo ensure your computer's safety and performance, download our antivirus software. You can give your computer a new lease on life by removing all unnecessary files and programs. Your antivirus online purchase will keep your computer free from unwanted software. You can trust defencebyte to keep your computer safe online no matter what. We are available to assist you 24/7 if you have any questions about your online antivirus purchase. You can give your computer a better level of protection by downloading an antivirus for Windows. Windows computers are most commonly targeted by hackers and viruses. Ransomware can target your system and critical data. With defencebyte security, you can create a secure digital environment that protects your networks and systems. Ransomware traces are removed. Protects both devices and networks. -
49
McAfee WebAdvisor
McAfee
6 RatingsMcAfee WebAdvisor helps you stay safe while browsing and searching the web. WebAdvisor protects you from malware and phishing attempts as you surf the web. It does not affect your browsing performance. Protect yourself against malicious sites that may contain spyware, viruses, adware, and phishing scams. McAfee WebAdvisor is free and will help you enjoy worry-free web surfing. McAfee WebAdvisor offers misclick protection to block malware and phishing websites if you click on a malicious URL, typo protection that protects against incorrectly typed web addresses and points you in the right direction, safer downloading that scans your downloads and alerts if there is a risk, security check to make sure your firewall and antivirus are active before you surf, and safe browsing that uses a color-coded system that lets you know which links you can click. -
50
Stronghold Antivirus
Security Stronghold
Stronghold Antivirus is an antispyware and antivirus software that provides superior real-time proactive (on-access), and on-demand protection for your computer at home and office. Stronghold Antivirus detects and eliminates over 3.500.000 known viruses, spywares, adwares, trojans rootkits, and other threats. It uses a regularly updated database of malicious footprints to do this. Active on-access shield protection protects against unknown threats. Stronghold Antivirus is easy to use and pleasing to the eyes. Professionals will enjoy the additional features. Despite being powerful, it is very lightweight and won't consume any noticeable system resources. You can create any scan area, customize on-demand or on-access protection modules and schedule scanning with separate settings. You can also add programs to white and/or black lists and manage them.