Best Trust Lockdown Alternatives in 2025
Find the top alternatives to Trust Lockdown currently available. Compare ratings, reviews, pricing, and features of Trust Lockdown alternatives in 2025. Slashdot lists the best Trust Lockdown alternatives on the market that offer competing products that are similar to Trust Lockdown. Sort through Trust Lockdown alternatives below to make the best choice for your needs
-
1
1Password
1Password
16,089 Ratings1Password is a password manager that's secure, scalable, easy-to-use, and trusted by some of the most prestigious companies in the world. 1Password makes it easy to keep your employees safe online with its simple interface. Good security habits will become second nature once 1Password is a part of your employees' workflow. 1Password Advanced Protection now available with 1Password Business You can set Master Password policies, enforce two factor authentication across the entire team, limit access with firewall rules, review sign in attempts, and require that your team use the latest version 1Password. Our award-winning apps can be downloaded for Mac, iOS and Linux as well as Windows, Android, and Windows. 1Password syncs seamlessly between devices so that your employees have access to their passwords at all times. Your risk is reduced and your productivity increases when everyone uses 1Password. -
2
SpamTitan
TitanHQ
801 RatingsSpamTitan email security protects businesses, schools, smbs and MSPs from spam. SpamTitan email security protects against spam, phishing, day-zero attacks and viruses, malware, ransomware and other threats to email. It helps to control mail flow, clean it, protect against spam, and protect against unwanted email. We offer easy-to-use, yet powerful email security for businesses, smbs, and MSPs that is Office365-friendly. SpamTitan Email Security is available for a free, fully supported trial. SpamTitan – Premium functionality included * CEO Impersonation protection * Spearphishing Protection/ Phishing * Link analysis * Full Sanding * Zero Day Attacks protection * Mail Spooling * Spoofing protection * Ransomware and Malware Protection * SPF/DKIM/DMARC checking * Encryption * Fully multi-tenant environment * Ability to rebrand entire UI * Full REST API * Set up documents and support SpamTitan Email Security is the best solution in the G2 Crowd Email Security. Start your free trial today! -
3
Keeper Security
Keeper Security
1,542 RatingsPassword security is the foundation of cybersecurity. Keeper's powerful password security platform will protect your business from cyberthreats and data breaches related to passwords. Research shows that 81% of data breaches can be attributed to weak passwords. Password security platforms are an affordable and easy way for companies to address the root cause of most data breaches. Your business can significantly reduce the risk of data breaches by implementing Keeper. Keeper creates strong passwords for all websites and apps, then secures them on all devices. Each employee receives a private vault to store and manage their passwords, credentials and files, as well as private client data. Employees will save time and frustration by not having to remember, reset, reuse, or remember passwords. Industry compliance is achieved through strict and customizable role-based access controls. This includes 2FA, usage auditing, and event reporting. -
4
Skybox Security
Skybox Security
1 RatingSkybox's risk-based vulnerability management approach starts with new vulnerability data from your entire network, including physical IT, multicloud and operational technology (OT). Skybox assesses vulnerabilities without the need to scan. Skybox uses a variety of sources including asset and patch management systems as well as network devices. Skybox also collects, centralizes and merges data from multiple scanners to provide you with the most accurate vulnerability assessments. - Centralize and improve vulnerability management processes, from discovery to prioritization to remediation - Harness power vulnerability and asset data, network topology, and security controls - Use network simulation and attack simulation to identify exposed vulnerabilities - Augment vulnerability data by incorporating intelligence on the current threat environment - Learn your best remedy option, including patching and IPS signatures, as well as network-based changes -
5
USB Control & Lockdown Software to Block USB devices Access and Lock USB Ports within Windows Systems. Centralized USB Device Management, Monitoring, and Whitelisting to Protect Computers within a Network. Endpoint Security Management's USB Device Control program is an important component of Endpoint Security Management. It focuses on protecting computer systems and data assets against threats from unauthorized USB device use. To protect networks that store sensitive information or control machinery, it is necessary to control USB device access to endpoints. Latest version v12.968 (released: September 26, 2021 - Centralized USB Device Management - Secures Computers in Groups or Specific Computers. - Whitelists specific devices by Hardware ID and blocks the rest -Automatically apply Group 1 protection settings to unassigned clients. NEW! -Automatic Authorizations Mode, Whitelist USB devices across the network automatically. NEW -Receives alerts & logs USB device connections in the network. -Exports Status and Alerts Reports to csv format (Comma-separated value) - Presents Full Screen Locking on Blocking Devices (includes company logo). - Monitors and Encrypts File Transfers From Endpoints to USB.
-
6
Anti-Executable
Faronics
By blocking unauthorized executables, you can stop threats from ever starting. Faronics Anti-Executable stops unknown threats from bypassing your antivirus solution. It protects against sophisticated threats such as zero-day attacks, mutating malicious software, and advanced persistent threats. This requires an approach that goes beyond traditional antivirus solutions. By ensuring that only approved applications are allowed on a computer, it also ensures that you are protected from any unknown threats. Faronics Anti-Executable provides security and flexibility to protect your endpoints. Faronics Anti-Executable ensures that your servers are always protected. Faronics Anti-Executable protects your identity and keeps your computer safe against malware. Faronics Anti-Executable offers security beyond antivirus by preventing unauthorized programs - malicious, unlicensed, or simply undesirable - from ever executing. -
7
Qualys TruRisk Platform
Qualys
$500.00/month Qualys TruRisk Platform, formerly Qualys Cloud Platform. The revolutionary architecture behind Qualys IT, security and compliance cloud apps. Qualys TruRisk Platform provides a continuous, always on assessment of your global security, compliance, and IT posture. You can see all your IT assets in 2 seconds, no matter where they are located. With automated, built in threat prioritization and patching, as well as other response capabilities, this is a complete end-to-end solution. Qualys TruRisk Platform sensor are always active, whether on premises, endpoints, mobile, containers, or in the cloud. This gives you continuous visibility of your IT assets in just 2 seconds. The sensors are self-updating and centrally managed, they can be remotely deployed, and they can also be virtual appliances or lightweight agents. Qualys TruRisk Platform is an end-toend solution that allows you to avoid the costs and complexity of managing multiple security vendors. -
8
Comprehensive cybersecurity and patch automation for growing businesses Avast Ultimate Business Security includes our award-winning next-gen antivirus with online privacy tools and patch management automation software to help keep your devices, data, and applications updated and secure. Key Benefits: * Remote Management with online management console * Device Protection with next-gen antivirus * Data Protection with Firewall, Ransomware Shield, USB Protection, Password Protection * Online Security and Privacy with VPN, Web Shield, end Web Control * Patch Management
-
9
BlackFog
BlackFog
$19.95/year/ user Protect your intellectual property, avoid ransomware and industrial espionage risks and stop malicious activity within your organization. To ensure compliance with data protection regulations worldwide, prevent cyberattacks on all endpoints. Monitor data exfiltration from any network and prevent data loss. BlackFog's data privacy technology on devices can prevent data loss and data breaches. Protect your network from unauthorised collection and transmission user data from all devices. We are the industry leader in ransomware prevention and data privacy. Our preventative approach is not limited to perimeter defense. It focuses on preventing data exfiltration from your devices. Our enterprise ransomware prevention software and data privacy software dramatically reduces the chance of data breaches and stops ransomware from disrupting organizations. In real-time, you can access detailed analytics and impact assessments. -
10
Webroot Business Endpoint Protection
Webroot
$30 per year 1 RatingEndpoint protection software is required to protect your business. It must be stronger and more intelligent than traditional antivirus. Endpoint protection or endpoint security is a general term for cybersecurity services that protect network endpoints such as laptops, desktops and smartphones, tablets, servers and virtual environments. These services can include antimalware and web filtering. Endpoint protection is essential for businesses to protect their critical systems, intellectual property, customers, employees, and guests from ransomware and other cyberattacks. You may be asking yourself, "Do I really need endpoint protection?" The truth is that criminals are constantly inventing new ways to attack networks, steal data, and take advantage of employee trust. Although smaller businesses may believe they are not at risk, this is false. Small businesses with 100 employees and fewer are now at the same risk as larger enterprises with 20,000 employees. -
11
Panda Fusion
WatchGuard Technologies
Fusion combines our Endpoint Protection Plus and Systems Management solutions to protect, manage, and support all your corporate devices. Cloud-delivered solutions allow for rapid deployment without the need for costly server infrastructure investments or maintenance. Maximum Security: Continuous protection of all office endpoints, inside and out. - Proactive Support & Maintenance: Rapid incident management, troubleshooting. - Centralized Control & Management: Permanent visibility to all hardware, software, and other IT infrastructure components. -
12
SpyShelter
SpyShelter
$25 per yearSpyShelter Anti Keylogger monitors the behavior of all current actions on your computer and allows you to block any malware attempts to take place. SpyShelter can stop both custom-made and commercial keyloggers. This technology is unique and cannot be detected by anti-virus software. SpyShelter doesn't rely on fingerprint databases, so you won't have to worry about zero day malware. Your registry, RAM, and all applications will be protected as soon as SpyShelter is installed. SpyShelter's fast algorithm processing is faster than other security software. This makes it more suitable for older computers. SpyShelter Anti Keylogger offers solid protection against both known and unknown "zero day" spy and monitoring software. This includes keyloggers screen loggers webcam loggers and keyloggers. -
13
USBSecure Enterprise
Lugrain Software
$ 298 for 10 PCs 1 RatingUSBSecure Enterprise is a USB port security software for enterprise networks. USBSecure Enterprise protects your network from unwanted USB devices. Whitelists allow you to define the allowed USB devices per user. Centralized management, but no dedicated server required. USBSecure Enterprise also supports standalone machines. Supported devices: USB devices, Bluetooth devices, eSATA and FireWire devices, SD cards, floppy and CD/DVD drives. -
14
Kaspersky Security Cloud
Kaspersky
$53.99 per year 1 RatingAll our top apps and features in one place. 6 premium apps & products for Windows, macOS Android, iOS, and iOS - all in one location & packed full of 100s of features. Anti-ransomware, parental controls, mobile security, password management and VPN*. Privacy tools, data leak detection and Home Wi-Fi security are all available remotely. Find out if your private account data has been leaked and get advice on what you should do next. You will be notified immediately if any unknown app attempts to connect with your webcam or microphone. To keep you safe, you can also receive personalized alerts and warnings directly to your devices. Cloud-based security keeps your devices safe and secure. You can view metrics that show the health of your hard drive and make predictions about how to fix them. Specially designed tools make it easy to manage storage space and battery life for your Android devices. -
15
Ransomware Defender
ShieldApps Software Development
$49.99 one-time paymentRansomware Defender from ShieldApps is a unique solution that deals with ransomware. Ransomware Defender is specially designed to detect and block ransomware before it causes any damage. It blacklists and stops both unique and common ransomware. Ransomware Defender is installed and stands guard 24 hours a day using active protection algorithms that are enhanced with user-friendly notifications and alerts. Ransomware Defender is fully automatic and takes care of all threats using an advanced Scan > Discover > Lock Down mechanism. This protects against detected threats and works with all major antiviruses and antimalware products. Ransomware Defender includes a scheduled automatic scan, a secure file eraser, lifetime updates, and support! It detects and removes all known ransomware before it can cause damage to your computer. This program will scan your computer and locate hidden ransomware in high- and low-level folders. -
16
ESET Endpoint Security
ESET
$38 per user per year 5 RatingsThis EDR solution will help you uncover the hidden potential in your network. This tool uses ESET's multilayered Endpoint Protection Platform to detect and respond to endpoints. All layers send relevant information to ESET Enterprise Inspector which analyzes large amounts of real-time data from endpoints. It can quickly identify and fix any security problem in the network. ESET Enterprise Inspector offers a unique reputation-based detection system that is transparent to security teams. To allow fine-tuning, all rules can be easily edited via XML. You can create new rules to meet the specific needs of your enterprise environment, including SIEM integrations. ESET's endpoint response and detection tool makes it easy to suppress false alarms. You can adjust the sensitivity of detection rules according to different computer groups or users. Combine criteria such as file name/path/hash/command line/signer to fine-tune the trigger conditions. -
17
eScan
MicroWorld Technologies
$58.95/one-time/ user eScan's next generation antivirus solution protects your home network from malware, viruses, ransomware, and other threats using a layered approach. eScan is able to block a wide range of attacks thanks to its unique combination of modern and basic techniques. It includes web filtering, signature-based Malware detection and behavior analysis, as well as innovative techniques such deep learning malware detection, exploit prevention and heuristic scanning. eScan provides business endpoint protection, endpoint detection and response solutions (EDR), as well as anti-spam solutions email and multi-factor authentication. -
18
Avast Small Business Solutions deliver next-gen endpoint protection for business Windows PCs, Mac, and Windows servers that you can manage anywhere via a web browser. Go about your business knowing you are backed by effective cybersecurity built for small companies. Control your IT security from anywhere, powered by the cloud, advanced AI, and a global threat detection network. Avast Small Business Solutions consist of: * Avast Essential Business Security helps deliver device security for small businesses that want remote visibility and centrally controlled protection against viruses, phishing, ransomware, and advanced cyberattacks. * Avast Premium Business Security combines our next-gen antivirus with VPN and USB control to help your employees and their devices stay more private and safer online, as well as offline. * Avast Ultimate Business Security includes our award-winning next-gen antivirus with online privacy tools and patch management automation software to help keep your devices, data, and applications updated and secure.
-
19
Kaspersky Anti-Virus
Kaspersky
$29.99 per year 20 RatingsIt blocks the latest viruses, ransomware and spyware as well as cryptolockers. This also helps to stop cryptocurrency mining malware from affecting your computer's performance. Antivirus protection that works in real time. Blocks ransomware, cryptolockers & more. Prevents the spread of cryptomining malware. Your PC will perform as it was designed. -
20
SecureCircle
SecureCircle
SecureCircle's Zero Trust data security protects all data, even those that are not hosted on SaaS. This eliminates data breaches and insider threat. SecureCircle's Data Access Security Broker protects and monitors data. This includes data egressing via enterprise cloud services and managed repositories. SecureCircle enforces access controls on all data locations, including cloud and endpoint devices. SecureCircle provides the only Zero Trust data protection in the world, ensuring data is protected transparently and consistently at scale. -
21
SentryBay Armored Client
SentryBay
You can now download the missing piece of the security stack jigsaw in just one click to complete your armored defense against cyberattacks. The Armored Client provides instant patented protection for applications and data, without the need to detect or respond to threats. It does this by using kernel-level prevention of data exfiltration even if there are threats, as well as secure wrapping applications and injected security. The Armored Client uses a multilayered approach to protect endpoint devices that are being used remotely to access your data and applications, and to allow secure online browsing. All corporate apps, regardless of whether they are managed, BYOD, or unmanaged, are targeted at the endpoint and run in secure sessions. -
22
Apozy Airlock
Apozy
$9/month/ user Apozy Airlock. The browser endpoint detection platform and response platform that neutralizes all web attacks in just one click. The Internet can be dangerous. It doesn't have it to be. Airlock plugs the gap in the EPP/EDR. It protects your browser and delivers a safe, secure, and lightning-fast internet connection. Airlock is powered by the first visually-aware native browser isolate platform with over 6 petabytes visual data. It prevents web attacks in real-time. Airlock stops spearfishing from happening. Airlock's technology protects anyone clicking on malicious links by sandboxing them. -
23
You need to protect every device, including laptops and mobile devices, on your network as more business operations are going digital. Select Tier combines multi-layered technologies and flexible cloud management with centralized application, web, and device controls to protect sensitive data at every endpoint. Our security doesn't slow down your system. The Remediation Engine can undo most malicious actions if you are attacked. Users can continue working without interruption. You can be assured of world-class security, including post execution Behavior Detection (and Machine Learning) technologies. This will help to reduce attack risk and keep your endpoints safe and secured. There is no need to download frequent updates. Easy migration from third-party endpoint security, ensuring a smooth transition. You can be sure of optimal configuration with our post-deployment quality audit service.
-
24
Defencebyte
Defencebyte
$39 per yearTo ensure your computer's safety and performance, download our antivirus software. You can give your computer a new lease on life by removing all unnecessary files and programs. Your antivirus online purchase will keep your computer free from unwanted software. You can trust defencebyte to keep your computer safe online no matter what. We are available to assist you 24/7 if you have any questions about your online antivirus purchase. You can give your computer a better level of protection by downloading an antivirus for Windows. Windows computers are most commonly targeted by hackers and viruses. Ransomware can target your system and critical data. With defencebyte security, you can create a secure digital environment that protects your networks and systems. Ransomware traces are removed. Protects both devices and networks. -
25
Trend Micro Maximum Security
Trend Micro
$39.95 per yearTrend Micro Maximum Security is compatible with Windows 11. This means that you can shop, play, and bank online without worrying about being hacked by fraudulent and malicious websites. Our cloud-based AI technology provides proactive protection against ever-evolving threats from malware infections. Trend Micro can protect you against known and unknown attacks, helping you stay ahead of the constantly changing threat landscape. You get multi-device protection against ransomware and viruses, as well as dangerous websites and identity thieves. Folder Shield Plus protects your digital assets and files locally as well as on cloud-synced folders. -
26
ZoneAlarm Extreme Security NextGen
Check Point
$44.95 per year 3 RatingsZoneAlarm for Business offers comprehensive, advanced, and flexible solutions for unmanaged businesses such as small businesses, Telco’s, government municipalities, and other businesses with little to no IT resources available. With its easy deployment and maintenance, ZoneAlarm for Business offers you Check Point’s vigorous multi-platform protection and support, made simple. ZoneAlarm Extreme Security NextGen is the comprehensive, ultimate PC and mobile security solution for all your business security needs, using Check Point’s cutting-edge enterprise-grade technology. Next-gen antivirus with award-winning Anti-Ransomware, advanced phishing protection, and secure browsing experience. Our advanced cyber security solutions use business-class protection to secure millions of home users’ PCs and mobile devices against the latest worldwide cyber threats. This powerful weapon is extremely effective at spotting malicious files and cyberattacks that evade traditional antiviruses. -
27
CyberGatekeeper
InfoExpress
Protecting your company is a complicated task that requires the right tools. Organizations must be aware of their security requirements. InfoExpress offers a variety of appliances to meet NAC requirements. All appliances support enforcement, which allows access to mobile, desktop, IoT devices and networks without network changes. Administrators are the only ones who can receive support. Administrators can send an email to the support address to open a support ticket. InfoExpress offers network security solutions that increase productivity and security by providing better visibility, increased security, and automating device access and mobile access to networks. Hundreds of security conscious-organizations use InfoExpress products to secure their networks, data and client information. -
28
Microsoft Defender for Individuals
Microsoft
The Microsoft Defender app is now available for download as part of your Microsoft 365 subscription. It provides easy-to-use online security for you, your family and your devices. One centralized view allows you to monitor and manage your security status across all your devices and computers. Anti-phishing and antivirus protection can help protect your family and you from online threats. Receive real-time alerts that include recommended actions and information about how you can stay safe online. All your online security status can be viewed from one central location. All your data and device protections for your family are available in one place. You can easily add or remove devices. You and your family can rest easy knowing that malware protection is available. You get continuous protection with antivirus scans for your devices and apps. You can control what files and apps are scanned by identifying trusted ones. Receive real-time alerts about security changes that affect you and your family. -
29
McAfee LiveSafe
McAfee
$39.99 per year 2 RatingsMcAfee®, LiveSafe™, is the best protection for your computers, Macs and smartphones. McAfee LiveSafe offers award-winning antivirus protection, as well as many other features, to protect your computer, mobile devices, and identity. We keep you safe so that you can concentrate on what is important. Protect your computer from viruses and other threats with both online and offline protection. One subscription protects your Macs, PCs, smartphones, tablets, and computers. When you connect to public Wi-Fi, keep your browsing habits and data secure. McAfee LiveSafe is a standout among our security solutions. Its combination of privacy, identity tools, and antivirus features will protect you against all types of threats. When you sign up for auto-renewal** you will have access to our secure VPN. This provides bank-grade encryption to protect your online activities and personal information. -
30
GhostVolt
GhostVolt Ltd
$20 per yearGhostVolt is a privacy App which provides a secure, collaborative working environment for you and your team. GhostVolt stops unauthorised access to all your documents and helps fight against data theft and cybercriminals who want to steal your files and use them for ransomware, blackmail, and other criminal attacks. Control every user's permission with pre-set roles or customize what they can and can't do with every file. Also grant or restrict access to folders of your choice at any time. With powerful reporting tools you can also track and export the complete history of every user action or the history of any file. Take control of your data and get back to work, with GhostVolt. -
31
MemberProtect
InetSolution
MemberProtect allows professional programmers to integrate into secure online systems such as ACH, Online Banking and wire transfer applications. MemberProtect is the most trusted authentication, data encryption and user management system in the banking and credit union industry today. Based on roles and privileges model. Supports millions of users and organisations. Extremely precise application security. Strong encryption that protects databases down to the column level. Encrypt all email messages and flat files on your network. All data accesses should be logged, even if they fail. Even beyond firewalls, SSL and operating systems, protect member data from hackers and unauthorized staff. Use MemberProtect to create secure connections with third party APIs. Access to any web-based service, including LDAP support. -
32
McAfee Total Protection
McAfee
$19.99 per yearMcAfee®, Total Protection provides protection for your security needs today, so that you can live your life online. Safe browsing, premium antivirus. Secure VPN and ID theft protection. McAfee is more than antivirus software. It offers peace of mind. McAfee protects what is most important - you. McAfee has protected over 500 million devices using its award-winning antivirus. However, we understand that you need a solution to protect your privacy and personal information, as well as help you navigate safely online. Multi-layered identity protection protects your accounts by notifying you if your information is leaked online and automatically generating complex passwords. Secure VPN turns unsecured networks into your private network, protecting your credit card information and personal data. Search results and social media pages can be contaminated by color-coded links that expose fraudulent and dangerous sites. We'll even direct you to safety if your misclicks are detected. -
33
The Advanced Protection Program protects users with sensitive information and high visibility from targeted online attacks. To defend against the wide range of threats that exist today, new protections are added automatically. Gmail blocks more than 100 million phishing attacks every day. But sophisticated phishing techniques can trick even the most savvy users to give their sign-in credentials away to hackers. Advanced Protection requires that you use a security code to verify your identity when signing in to your Google Account. Unauthorized users will not be able sign in without your username or password. Chrome's Safe Browsing protects 4 billion devices from risky websites, and Advanced Protection performs more stringent checks for each download. It can flag or block you from downloading files that could be harmful. Only apps from verified stores are allowed, such as Google Play Store or your device manufacturer's store.
-
34
Sign up now to save 44% You can connect in one click and enjoy privacy, security, and unlimited internet access. VPNs encrypt your internet connection to protect it and your privacy. VyprVPN was created in response to government surveillance. Our strong encryption protects your information from hackers, identity theft, and malware. It prevents your ISP from tracking you every move and stops advertisers from selling or collecting your valuable data. VyprVPN allows you to escape censorship. To hide your location and bypass internet restrictions imposed by governments, workplaces, and organizations, change your IP address. Our servers disguise your identity and protect your traffic from being leaked to your ISP's DNS servers. VyprVPN offers an app that can be used for both public wi-fi and home streaming. VyprVPN can be installed on all devices to keep you connected and secure.
-
35
Sealit
Sealit Technologies
You shouldn't be concerned about whether your accounts and devices will be compromised when you implement a Zero Trust security system. Sealit will ensure that your sensitive data, including files and emails, remains fully protected in any scenario. To encrypt sensitive emails, you only need to click one time from your existing inbox. You only need one click to encrypt any file on your desktop. As we add strong protection to sensitive data, we ensure that your workflow doesn't get disrupted. Cyberattacks on businesses are almost always caused by human error. You need to put in place a system to reduce the risk. Our patent-pending end to end encryption ensures that every aspect of your business is protected. Our app uses biometrics to provide seamless protection. Biometrics are not like passwords. They can't be taken from you and you always have them with you. -
36
Promisec Endpoint Manager
Promisec
PEM provides a fundamental capability for IT organizations responsible for software patches updates across company endpoints. PEM gives you unified visibility and control of what's happening on your servers and endpoints, so you can respond quickly to any potential threat. PEM gives you full visibility across all files, processes, registry, processes, network connections, third-party products, OS versions, and other information in your organization. PEM uses proprietary agentless technology to rapidly inspect your entire enterprise and identify, analyze, and remedy security gaps. The solution can be used for compliance and cyber purposes, and it can run on any network. -
37
Vali Cyber
Vali Cyber
We understand you are under pressure to protect against a constantly growing threat landscape, while also being constrained in terms of staff and budget. Vali Cyber can help. ZeroLock™, a security software built for Linux, reduces the amount of time it takes to deploy, configure, and manage Linux and cloud security. We deliver the lowest TCO and best ROI (Total cost of ownership) for your security investment by combining competitive pricing with significant overhead reductions to free up valuable resource. We know how important it is to have a frictionless deployment. ZeroLock™ is compatible with any Linux distribution that uses kernel version 3.5 and higher. Choose your orchestration tool to deploy across your entire environment quickly and easily. -
38
Stronghold Antivirus
Security Stronghold
Stronghold Antivirus is an antispyware and antivirus software that provides superior real-time proactive (on-access), and on-demand protection for your computer at home and office. Stronghold Antivirus detects and eliminates over 3.500.000 known viruses, spywares, adwares, trojans rootkits, and other threats. It uses a regularly updated database of malicious footprints to do this. Active on-access shield protection protects against unknown threats. Stronghold Antivirus is easy to use and pleasing to the eyes. Professionals will enjoy the additional features. Despite being powerful, it is very lightweight and won't consume any noticeable system resources. You can create any scan area, customize on-demand or on-access protection modules and schedule scanning with separate settings. You can also add programs to white and/or black lists and manage them. -
39
CrowdStrike Falcon
CrowdStrike
8 RatingsCrowdStrike Falcon, a cloud-native security platform, provides advanced protection from a wide range cyber threats including malware, ransomware and sophisticated attacks. It uses artificial intelligence (AI), machine learning, and incident response to detect and respond in real-time to threats. The platform uses a lightweight, agent-based solution that continuously monitors the endpoints to detect malicious activity. This provides visibility and protection with minimal impact on system performance. Falcon's cloud architecture ensures rapid updates, scalability and rapid threat response in large, distributed environments. Its comprehensive security capabilities help organizations detect, prevent, and mitigate cyber risks. This makes it a powerful tool in modern enterprise cybersecurity. -
40
Adaware Protect
Adaware
FreeAdaware Protect is an all-in-one suite which includes Adaware Secure Browser to improve your online security. Adaware Protect protects your computer from dangerous websites. Adaware Protect blocks dangerous websites and allows you to see which applications attempt to access unknown URLs. Adaware Protect can be used to prevent hackers and spyware accessing your microphone and camera. One click is all it takes to start a video conference. Adaware Safe browser allows you to navigate the internet faster and more privately. For a faster browsing experience, block ads. To prevent being tracked, block trackers and cookies. Our private search allows you to hide your search history. To optimize your computer's performance, choose your favorite features. Adaware Protect can scan and remove any unnecessary files or applications from your computer. It's never been easier to keep your computer safe! -
41
Clearswift Secure email Gateway (SEG), provides powerful protection for an organization's emails against inbound cyber-attacks, and outbound data loss prevention. Email is the most popular method of communication in organizations. Cybercriminals can use it to steal your sensitive data and infiltrate your systems. Our Secure Email Gateway protects you against known and unknown malware as well as advanced threats such phishing. IT teams must ensure that all information shared via email within and outside of an organization is secure, appropriate, and compliant. Clearswift's unrivalled level of inspection and granular policies controls ensure that your emails are treated with the best security. This ensures that your communications are safe and uninterrupted and minimizes business disruptions.
-
42
ThreatSentry
Privacyware
$649.00Do not ignore unaddressed vulnerabilities or insider misuse. ThreatSentry combines a state of the art Web Application Firewall with a port-level firewall with advanced behavioral filtering in order to block unwanted IIS traffic. ThreatSentry provides enterprise-grade, multilayered protection and compliance (i.e. PCI DSS for Microsoft IIS (5/6/7/8/10), at a small-business cost! ThreatSentry can be used as a native module within IIS7-10 (or ISAPI extension/filter in IIS 6 or IIS 5 respectively) and Snap-in into the Microsoft Management Console. It is extremely easy to use and protects network weak points caused by configuration errors, lapses in patch management, and new and progressive attack techniques. Get a ThreatSentry evaluation for free today! We will guide you one-on-1 through installation and configuration. Click here to book. -
43
Bodi
Pilixo
$20 per monthAny company can be affected by a data breach at any time. No organization is immune from a malicious attacker, disgruntled ex-employee, or careless insider. Protects users from clicking on malicious links, stopping malware from spreading, regardless of whether the vector is email, Skype attachments, websites, or Slack. Real-time alerts to stop data theft based on specific keywords, file actions, special formats like SSN or credit card number and unauthorized privilege changes. Analyze the usage of applications, web browsing, printing, and other data. You can also see the time and duration of each usage. You can view and search for keywords on each device and record video. Remote control of the endpoint is possible to select the correct device. Employee Monitoring helps you stop malware from spreading, regardless of platform. -
44
Webroot Security for Chromebook
Webroot
$14.99 per yearYou won't have to worry about your children online with Webroot®, Security for Chromebook™. Our Chromebook protection will keep your children safe, no matter what they are doing online: reading, browsing the web, playing new games, or connecting with friends via social media. Protection against known threats such as ransomware, malware, and other malicious software. Webroot protects usernames, account numbers, and other personal information from online threats. Online shopping, browsing, and banking are safer. -
45
Trusted Knight Protector Home
Trusted Knight Corporation
$34.95 per user per yearProtecting your identity, your family's online reputation, and all your sensitive information is the easiest and most effective way of protecting your identity. This alarming statistic is because every year, at least 24,000,000 new malware variants (malware that has been slightly modified to avoid detection by antivirus software), are discovered on computers. Your computer may already be infected by this type of malware. Protector Home is the best solution to protect your personal data, even if it is. It takes only minutes to install and automatically protects all your online sessions. Protector Home provides more than traditional protection. It offers the security and benefits your family requires, even if you have already lost your computer. -
46
GlassWire
GlassWire
$35.88/year/ user Monitor the volume of data your PC is using for every single app, thanks to GlassWire's network monitoring graph. Keep track of the volume of data you received and sent in the past and who or what your PC is talking to. Detect spyware, malware, badly behaving apps, and bandwidth hogs, then block their connections with our powerful firewall. Monitor devices on your network and get alerted when new unknown devices join your WiFi. GlassWire warns you of network-related changes to your PC or unusual changes to your apps that could indicate malware. -
47
Seraphic can protect any browser version on any device from phishing and spear-phishing, clickjacking and man-in-the-middle attacks, as well as Zero-day and unpatched N-Day attacks. This allows your end-users to use any combination of browsers they like, and allows you to centrally manage corporate policy for browsing and enterprise/private apps environments. Seraphic also features robust policy and governance controls, including state-of-the-art DLP engines that scan all outbound and input data in any format for any file. This ensures complete privacy first.
-
48
ITsMine Beyond DLP
ITsMine
ITsMine Beyond DLP™, which goes beyond traditional Data Loss Prevention, (DLP), protects organizations from all data threats. Endpoint agents and policies have no effect on employee productivity. Protection is available even after data exfiltration. Data loss incidents are becoming more frequent and more damaging than ever before, be they intentional or accidental, or from external or internal factors. Beyond DLP™, a new security approach, allows organizations to track and secure their data anywhere it is. This includes their internal network as well as external networks. No matter where your data is stored, maintain your high security standards. You can empower employees to be productive while controlling the use and whereabouts your sensitive data. Compliance with data protection regulations is easy, including GDPR, CCPA and PCI to HIPPA. Access control options for sensitive data, data breach detection, and reporting options are all available. -
49
AVG Internet Security
Avast
$3.29 per month 6 RatingsYou can have total security online. AVG Internet Security is an award-winning antivirus that offers customizable firewalls, remote access protection against hackers, as well as award-winning antivirus. AVG Internet Security protects you from viruses and malware, keeps emails safe, protects passwords and webcams from hackers, and allows you to shop and bank online with no worries. Advanced Antivirus scans your computer for viruses, ransomware and spyware. If suspicious software behavior is detected on your computer, Behavior shield will send alerts. AI Detection proactively detects malware samples to protect your computer from new threats. CyberCapture automatically uploads malware samples to our antivirus software for analysis. This prevents new threats. You can stay safe online by scanning downloads, emails, and links for potential threats. Also, avoid unsecure Wi-Fi networks. Link Scanner scans links for suspicious content to avoid dangerous websites. -
50
Webroot Internet Security Plus
Webroot
$35.99 per yearAntivirus protection and WiFi Security VPN go hand in hand. You need both antivirus protection and WiFi Security VPN to stay safe online. Both antivirus protect your devices and VPN protect your connection by keeping you browsing private. They both work together to provide you with security and privacy while you work, bank, share, bank, and browse the internet. Webroot SecureAnywhere®, Internet Security Plus offers cloud-based protection against online threats for all of your devices, keeping you safe no matter where or how you connect. It scans faster and uses less system resources. It protects you in real-time by instantly identifying new threats and blocking them as soon as they occur.