Here's our list of apps for Computer Security Software. Filters help you narrow down the results to find exactly what you’re looking for.

182 Software options

Cisco Secure Endpoint is a detection and response security solution that provides XDR capabilities, endpoint investigations, incident management, and more to prevent cyber attacks. With integrated vulnerability management and built in ThreatX hunting, Cisco Scure Endpoint pinpoints the origin of attacks to keep systems functional while thwarting... Read more about Cisco Secure Endpoint
ActiveLock continuously authenticates the workforce by the way they type to ensure only authorized users are accessing company endpoints. To secure the workforce, cybersecurity teams trust TypingDNA ActiveLock to ensure no one other than the authorized employee can ever access company devices, especially in remote environments. ActiveLock... Read more about TypingDNA ActiveLock
Jscrambler provides the most advanced JavaScript polymorphic obfuscation techniques combined with code locks, self-defending capabilities, and threat monitoring. Jscrambler's Webpage Integrity provides real-time visibility of client-side attacks, with precise and actionable detail of injected code. Read more about JScrambler
WhiteSource is the leading solution for agile open source security and license compliance management. It integrates with your development environments and DevOps pipeline to detect open source libraries with security or compliance issues in real-time. Read more about WhiteSource
Liongard gives MSPs an operational advantage that delivers both higher profits and an exceptional customer experience. Our Deep Data Platform unlocks the intelligence hidden deep within IT systems by transforming messy, hard-to-reach data into a unified, actionable source of intelligence. Read more about Liongard
McAfee cloud security software offers a scalable solution for IT teams in small and medium-sized companies. McAfee offer a number of SaaS products that provide desktop, email and web security for small businesses. Some of the McAfee for Small Business security products include: McAfee Email Protection, McAfee Web Protection, McAfee Total Protection... Read more about McAfee Cloud Security
Endpoint Protector is a data loss prevention tool which assists businesses of all sizes with data encryption and file scanning. Key features of the platform include compliance management and reporting, policy management, device control, and sensitive data identification. Read more about Endpoint Protector
HackEDU is a cloud-based solution, which helps businesses manage training programs for software developers. Primarily designed to help development teams improve code quality and maintain compliance, HackEDU offers customized programs, certifications, progress tracking, and more. Read more about HackEDU
Cisco Umbrella is a cloud security software that provides businesses with tools to identify cybersecurity threats and manage remote access to cloud applications. Supervisors can use DNS layer technology to block malicious domains, applications, and IP addresses from a centralized platform. Read more about Cisco Umbrella
VMware Carbon Black Endpoint platform empowers security teams to detect and respond to advanced threats with less operational friction. Read more about Carbon Black Endpoint
Advanced SystemCare Ultimate is an antivirus solution for Windows PCs that provides real-time browsing protection and prevents threats such as Trojans, ransomware, and spyware from invading the user's machine and putting their privacy and data at risk. Read more about Advanced SystemCare Ultimate
Maintain complete visibility across your digital environments leveraging the graph-based, API-powered and data-driven JupiterOne. Simplify compliance evidence collection, shorten the time between findings and remediation and manage configuration of your critical resources. Read more about JupiterOne
Spybot is an endpoint security suite, which helps enterprises detect and remove corrupt files, track unauthorized access to data, and protect systems from malware attacks. Features include anti-virus and anti-spyware, automated signature updates, task scheduling, and command-line tools. Read more about Spybot
Acronis Cyber Protect is a cloud-based software that helps businesses leverage artificial intelligence (AI) technology to detect cybersecurity threats across IT assets and endpoint systems. Supervisors can perform vulnerability assessments, deploy security patches, and remotely prevent threats. Read more about Acronis Cyber Protect
Beyond DLP is a data protection platform to track and protect scattered data. ITsMine's software brings data protection to enterprises in a clear API-based solution. Read more about Beyond DLP
The ASPIA platform enables automated and simplified security assessment and vulnerability management. Using ASPIA, enterprise security workflows can be automated and orchestrated to measure and improve efficiency and accuracy. Read more about ASPIA
CWIS Antivirus Scanner is a web-based antivirus software that helps businesses in the IT industry streamline network security processes, such as website protection, vulnerability testing, and malware removal. It lets staff members fix hacked websites, detect spyware, perform blacklist checks, and more from a unified platform. Read more about CWIS Antivirus Scanner
EventLog Analyzer is a web-based security information and event management (SIEM) solution, which assists small to large organizations with the monitoring of network devices, servers and applications. Key features include auditing, traffic analysis, threat detection, and compliance management. Read more about ManageEngine EventLog Analyzer
ManageEngine Vulnerability Manager Plus is a prioritization-driven threat and vulnerability management software for enterprises that offers built-in patching. Read more about ManageEngine Vulnerability Manager Plus
MacKeeper is an antivirus solution that helps Mac users protect networks and digital assets from targeted attacks, malware, and other online threats. The application enables IT teams to block viruses, schedule scans, inspect files, and remove spyware, adware, and ransomware from systems. Read more about MacKeeper
PA File Sight is Windows-based ransomware protection and access auditing software used to protect secure data and files. Organizations can use the software to detect and stop ransomware attacks, prevent data loss and leaks, and audit file access. Read more about PA File Sight
Bravura Identity is an integrated solution for managing identities, groups and security entitlements across systems and applications. It ensures that users are granted access quickly, that entitlements are appropriate to business need and that access is revoked once no longer needed. Read more about Hitachi ID Bravura Identity
CipherCloud enables companies to securely adopt cloud applications while ensuring data privacy & overcoming regulatory compliance and security risks. Read more about CipherCloud
VaultCore is an encryption key management software designed to help corporate businesses, government administrations, and military organizations secure data by deploying key encryption across cloud, virtual, and on-premise environments Read more about VaultCore
Tanium Endpoint Platform is an on-premise and cloud-based computer security software that helps businesses manage incidents, track asset inventory, handle vulnerability, and more from within a unified platform Read more about Tanium Endpoint Platform
Cynet 360 is an all-in-one security platform that provides endpoint threat detection and response for networks that require advanced protection. It gives network administrators visibility over all networked devices, users, and events. Cyber security technology is viable for companies of all sizes. Read more about Cynet 360
CODA Footprint is a SaaS multi-tenant attack surface reduction solution that covers vulnerability management, contextual risk scoring and prioritized remediation in an all-in-one package. Read more about CODA Footprint
CAST Highlight is a SaaS software intelligence product for rapid application portfolio analysis and Software Composition Analysis (SCA). Read more about CAST Highlight
Cisco Cloudlock is an API-based cloud access security broker (CASB) that helps accelerate use of the cloud. It secures identities, data, and apps, and combats account compromises, breaches, and cloud app ecosystem risks. Read more about Cisco Cloudlock
ManageEngine PAM360 empowers enterprises looking to stay ahead of this growing risk with a robust privileged access management (PAM) program that ensures no privileged access pathway to mission-critical assets is left unmanaged, unknown, or unmonitored. Read more about ManageEngine PAM360
Quantum Network Security is a scalable suite of solutions that protect against Gen V cyber attacks across networks, endpoints, clouds, data centers, and more. The suite provides a unified management platform, SandBlast threat prevention, hyper-scale networking, plus VPN and IoT security. Quantum Network Security also offers security gateway... Read more about Quantum Network Security
CySight enables organizations to tackle the increasing density, complexity, and expanse of modern physical and cloud networking. Deploying cyber network intelligence, CySight allows network and security teams to substantially accelerate incident response by eliminating blindspots, analyzing network telemetry to discover anomalies, uncover... Read more about CySight
Pareto Security is an app that regularly checks Mac's security configuration. With Pareto Security for business, managers can non-intrusively check that team has correctly configured security on Mac. Read more about Pareto Security
The easiest password manager you've ever used. Using a smartphone instead of a master password makes heylogin 2-factor secure by design. Just one swipe and you're logged in to any website. Read more about heylogin
IObit Uninstaller is software that removes unwanted programs, plugins, and suspicious files from computers, allowing for safer browsing and improved device performance. The system also offers an intelligent scan that performs a thorough and optimized cleanup. Read more about IObit Uninstaller
Dhound is a web security monitoring and threat detection system for websites, applications, servers, and clouds, with tools for tracking logins, auditing outgoing traffic, detecting threats, marking trusted sources, monitoring WordPress sites, and setting up alerts for suspicious and warning events. Read more about Dhound
Fyde is a cloud-based network security solution designed to assist enterprises with providing partners and contractors privileged access to corporate resources and applications. Key features include policy management, application segmentation, threat detection, and identity management. Read more about Fyde
StackRox is a container security platform designed to help government agencies and businesses protect cloud-based applications, detect threats, and manage vulnerabilities, compliance requirements, configurations, and more. Administrators can gain visibility into risks on a centralized dashboard. Read more about StackRox
CloudJacketX is a managed security-as-a-service platform designed to help businesses detect and respond to cybersecurity threats. It lets IT teams ensure protection against data breaches by monitoring the organization's network in real-time. Read more about CloudJacketX
SaaS Vulnerability Scanner is a computer security platform designed to help businesses manage, detect and prioritize vulnerabilities across the network infrastructure. Organizations can use the interface to schedule and configure assessments to include or exclude specific ports from external scans. Read more about SaaS Vulnerability Scanner
Clearswift SECURE Email Gateway is a computer security software that helps busiensses manage data encryption, compliance, threat protection, and other operations on a centralized platform. It enables staff members to utilize the inspection engine to disassemble communication and manage data security across zip files and embedded documents. Read more about Clearswift SECURE Email Gateway
condignum is a cloud-based compliance management solution designed to help businesses of all sizes and industries handle security requirements and risks. It allows administrators to automatically evaluate complex issues using knowledge databases within the platform. Read more about condignum
Hex-Rays develops and supports the IDA disassembler. This famous software analysis tool, which is a de-facto standard in the software security industry, is an indispensable item in the toolbox of a software analyst, security expert, software developer, or software engineer. Read more about IDA Pro
Faronics Anti-Executable provides security beyond an antivirus by blocking unauthorized programs whether malicious, unlicensed or simply unwanted from ever executing. Read more about Anti-Executable
Cyber Hawk is the enabling technology that allows businesses to begin offering new, high-value internal cybersecurity services to all clients. Read more about Cyber Hawk
Hitachi ID Bravura Privilege cloud architected PAM & PSM solution secures access to elevated privileges including administrator accounts & security groups. Read more about Hitachi ID Bravura Privilege
Shieldoo's secure network is a revolutionary new tool designed to connect securely from anywhere with next-gen encryption and anonymity. Read more about Shieldoo
Live Ensure protects users by securing and authenticating their identities through a synthesized multi-factor approach. Users are confident that their credentials are protected whilst on your site. Your users are protected from phishing, pharming or man-in-middle attacks. Read more about LiveEnsure
CloudPassage® Halo® is the world’s leading security and compliance automation platform that provides instant visibility and continuous protection for servers. Read more about CloudPassage Halo

Related categories