Here's our list of apps for Computer Security. Filters help you narrow down the results to find exactly what you’re looking for.

125 Software options

ManageEngine Vulnerability Manager Plus is a prioritization-driven threat and vulnerability management software for enterprises that offers built-in patching. Read more about ManageEngine Vulnerability Manager Plus
SaaS Vulnerability Scanner is a computer security platform designed to help businesses manage, detect and prioritize vulnerabilities across the network infrastructure. Organizations can use the interface to schedule and configure assessments to include or exclude specific ports from external scans. Read more about SaaS Vulnerability Scanner
Clearswift SECURE Email Gateway is a computer security software that helps busiensses manage data encryption, compliance, threat protection, and other operations on a centralized platform. It enables staff members to utilize the inspection engine to disassemble communication and manage data security across zip files and embedded documents. Read more about Clearswift SECURE Email Gateway
Cynet 360 is an all-in-one security platform that provides endpoint threat detection and response for networks that require advanced protection. It gives network administrators visibility over all networked devices, users, and events. Cyber security technology is viable for companies of all sizes. Read more about Cynet 360
Live Ensure™ protects users by securing and authenticating their identities through a synthesized multi-factor approach. Users are confident that their credentials are protected whilst on your site. Your users are protected from phishing, pharming or man-in-middle attacks. Read more about LiveEnsure
CloudPassage® Halo® is the world’s leading security and compliance automation platform that provides instant visibility and continuous protection for servers. Read more about CloudPassage Halo
BlueFiles enables users to send encrypted files securely while maintaining full control over recipients, access periods, downloads, and printing Read more about BlueFiles
Cornerstone MFT is a cloud-based solution, which assists enterprises, financial services and healthcare organizations with managing security and file transfers across servers. Key features include process automation, compliance management, collaboration, and data encryption. Read more about Cornerstone MFT Server
StackRox is a container security platform designed to help government agencies and businesses protect cloud-based applications, detect threats, and manage vulnerabilities, compliance requirements, configurations, and more. Administrators can gain visibility into risks on a centralized dashboard. Read more about StackRox
Evidian is a cloud-based and on-premise identity and access management suite that helps enterprises across government, telecommunication, healthcare, and various other industries securely manage and authenticate user identities. Read more about Evidian
Quantum Network Security is a scalable suite of solutions that protect against Gen V cyber attacks across networks, endpoints, clouds, data centers, and more. The suite provides a unified management platform, SandBlast threat prevention, hyper-scale networking, plus VPN and IoT security. Quantum Network Security also offers security gateway... Read more about Quantum Network Security
PerimeterX offers a suite of products, Bot Defender, Code Defender, and Page Defender to protect businesses from online attacks. It uses behavioral fingerprinting, machine learning, and predictive analytics to recognize real users while blocking automated attacks. The suite can protect against web scraping, carding, browser extensions, digital... Read more about PerimeterX
iPrism Web Security is a secure web gateway designed to help businesses detect threats and secure against malware attacks. The platform enables managers to classify URLs, identify botnets, and protect the system from advanced persistent threats (APTs). Read more about iPrism Web Security
RedShield is a cybersecurity software designed to help government agencies and businesses across healthcare and finance industries streamline network security and risk assessment operations using artificial intelligence (AI) technology. It enables IT teams to identify and remove vulnerabilities from online applications and APIs, perform penetration... Read more about RedShield
CrowdSec is an open-source and collaborative multiplayer firewall. Analyze behaviors, respond to attacks & share signals across the community. Security should be available to everyone. We make it happen. For free. Read more about Crowdsec
Protect students across Mac, Windows, Chromebook, iOS, Kindle ad Android with dynamic web filtering and intelligent reporting. Read more about Qustodio for Schools
Design & build a robust identification and authentication security innovation for passwordless multi-factor security across systems with our swIDch Auth SDK. Read more about swIDch Auth SDK
Hex-Rays develops and supports the IDA disassembler. This famous software analysis tool, which is a de-facto standard in the software security industry, is an indispensable item in the toolbox of a software analyst, security expert, software developer, or software engineer. Read more about IDA Pro
Open Source Self-Sovereign Identity (SSI) solutions (B2B/G) for any use case - including authentication, identification, credentialing and digital signatures. Read more about SSI Kit
Sealit protects your data, no matter how it's shared. End-to-end email and file encryption for small businesses or individuals. Read more about Sealit
Verimatrix Code Protection solution injects powerful, automated, and self-defending security directly into your app. It secures the app from being modified and can be easily implemented at any stage of the development process. It's critical to maintain customer trust by building SDKs and apps that won’t become an entry point for hackers. Read more about Verimatrix Code Protection
DIARIO is capable of scanning documents without them ever leaving the perimeter of the company or user, using an artificial intelligence engine with 100% Telefónica TECH technology. It accepts all types of different documents, from Microsoft Word to Adobe Acrobat and more. Read more about DIARIO
Faronics Anti-Executable provides security beyond an antivirus by blocking unauthorized programs whether malicious, unlicensed or simply unwanted from ever executing. Read more about Anti-Executable
CODA Footprint is a SaaS multi-tenant attack surface reduction solution that covers vulnerability management, contextual risk scoring and prioritized remediation in an all-in-one package. Read more about CODA Footprint

Related categories