Home

/

Computer Security Software

/

Page 3

Find the best Endpoint Security Software - Page 3

Compare Products

Showing 51 - 75 of 222 products

Enginsight
Enginsight

Enginsight helps protect businesses from the ever-evolving landscape of cyber threats and ensures the security and stability of their IT infrastructure. From vulnerability management to intrusion detection and prevention, the platform covers all aspects of...Read more about Enginsight

5.0

(6 reviews)

Invicti
Invicti

Invicti, formerly Netsparker, is a cloud-based and on-premise solution designed to help businesses manage the entire application security lifecycle through automated vulnerability assessments. Key features include maintenance schedules, OWASP top ten prote...Read more about Invicti

RG System
RG System

RG System is a network monitoring solution designed for managed service providers (MSPs), independent software vendors (ISVs) and office automation companies to monitor, secure and manage IT infrastructures. RG System is a modular solution containing 4 i...Read more about RG System

Kloudle
Kloudle

Kloudle is a cloud security solution that helps automates critical aspects of cloud security. Kloudle customers see gains of about 20% per engineer as all the security janitorial work is handled by it. Critical tasks that are automated include: • Buil...Read more about Kloudle

4.9

(8 reviews)

Splunk Enterprise
Splunk Enterprise

The Splunk Enterprise platform allows users to process and index most forms of data in their native format. It includes data indexing tools, which enable users to locate specific data across large data sets. The software is designed to serve users with li...Read more about Splunk Enterprise

CWIS Antivirus Scanner
CWIS Antivirus Scanner

Designed for businesses in the IT industry, CWIS Antivirus Scanner is a web-based software that helps identify malware, detect vulnerabilities, track security upgrades, and more from a unified platform. It lets staff members monitor backdoor scripts, condu...Read more about CWIS Antivirus Scanner

5.0

(5 reviews)

heylogin
heylogin

heylogin is the password solution for your business. A smartphone swipe instead of a master password makes your everyday life passwordless and two-factor secure. You don't need IT knowledge to use heylogin. heylogins simple structured administration give...Read more about heylogin

5.0

(5 reviews)

Aruba AirWave
Aruba AirWave

Aruba AirWave provides complete visibility into your wireless network, including information on every device connected to it and the ability to locate a mobile device with GPS. The platform also tracks performance metrics such as throughput, jitter, and la...Read more about Aruba AirWave

UserLock
UserLock

UserLock provides Multi-Factor Authentication and Access Management on Active Directory user accounts. Verify the identity of all users and secure access to Windows Logins, RDP, RD Gateway, VPN, IIS, and Cloud Applications. UserLock Single Sign-On extend...Read more about UserLock

Coro
Coro

Coro is a cybersecurity solution that helps businesses in various industrial verticals including IT, healthcare, transportation, and legal services secure devices, users, and data against online threats via a unified portal. The application automatically i...Read more about Coro

ZoneAlarm Pro
ZoneAlarm Pro

ZoneAlarm Pro is a PC and internet security solution that helps users detect and remove spyware, viruses, Trojan horses and more. Key features of this platform include antivirus signatures, web resources, two-way firewall, full stealth mode and zero-hour p...Read more about ZoneAlarm Pro

Access Server
Access Server

Free to try and up to 3 connected users - OpenVPN Access Server is a full-featured SSL VPN software solution that integrates OpenVPN server capabilities, enterprise management capabilities, simplified OpenVPN Connect UI, and OpenVPN Client software package...Read more about Access Server

ConnectWise SIEM
ConnectWise SIEM

ConnectWise SIEM (formerly Perch) is a threat detection and response management solution that allows organizations to design, deploy and manage custom cybersecurity programs. The platform includes a threat hunting functionality with drill-down capabilities...Read more about ConnectWise SIEM

Bitdefender GravityZone
Bitdefender GravityZone

Bitdefender GravityZone is a cloud-based solution that helps businesses protect physical workstations against various cyber threats including data breaches, ransomware, phishing and more. Key features include patch management, mobile support, antivirus pro...Read more about Bitdefender GravityZone

Guardz
Guardz

Guardz was specifically built to empower MSPs with the tools to holistically secure and insure SMEs against ever-evolving threats such as phishing, ransomware attacks, data loss, and user risks by leveraging AI and a multilayered approach. By combining ro...Read more about Guardz

5.0

(4 reviews)

SpyShelter
SpyShelter

SpyShelter provides robust protection for Windows PC users, safeguarding against a diverse array of malware, spyware, and other spying threats in real-time. What sets SpyShelter apart is its enhanced application control functionality, giving users precis...Read more about SpyShelter

5.0

(4 reviews)

ManageEngine Vulnerability Manager Plus
ManageEngine Vulnerability Manager Plus

Vulnerability Manager Plus is an on-premise cyber security solution that empowers IT administrators and security teams with an integrated console to perform vulnerability assessment, security configuration management, patch management, web server hardening...Read more about ManageEngine Vulnerability Manager Plus

System Mechanic Ultimate Defense
System Mechanic Ultimate Defense

System Mechanic Ultimate Defense is a suite of 18 PC optimization tools that cleans up and optimizes Windows to run faster and better. Use System Mechanic to fix registry errors, remove junk files, fix long startup times, and improve web browsing performan...Read more about System Mechanic Ultimate Defense

PA File Sight
PA File Sight

PA File Sight is ransomware protection and access auditing software that can be installed on Windows devices. Various types of organizations can use this tool to meet compliance requirements, detect and stop ransomware attacks, prevent data loss/leaks, and...Read more about PA File Sight

4.8

(5 reviews)

CAST Highlight
CAST Highlight

CAST Highlight is a SaaS software intelligence product for performing smarter application portfolio governance. It automatically understands source code of hundreds of applications in hours for Cloud Readiness, Software Composition Analysis (Open Source ri...Read more about CAST Highlight

5.0

(3 reviews)

CODA Footprint
CODA Footprint

CODA Footprint is a SaaS attack surface reduction and vulnerability as well as risk management platform that optimizes both discovery and evaluation of active software vulnerabilities. The CODA Footprint platform offers a comprehensive and optimized view ...Read more about CODA Footprint

5.0

(3 reviews)

condignum
condignum

condignum is a SaaS solution, which enables businesses to manage compliance, risks and security requirements from within a unified platform. Supervisors can add widgets and track the status of iterations using a centralized dashboard. condignum allows org...Read more about condignum

5.0

(3 reviews)

Cynet 360
Cynet 360

Cynet is a tech-enabled service and software provider that provides protection for internal networks with a fully integrated solution for endpoint security, vulnerability management, deception, threat intelligence, network analytics and user and entity beh...Read more about Cynet 360

5.0

(3 reviews)

VaultCore
VaultCore

VaultCore is an encryption key management software designed to help businesses and government administrations secure data by deploying key encryption across virtual and on-premise environments. With VaultCore, administrators can automatically schedule and ...Read more about VaultCore

5.0

(3 reviews)

Beyond DLP
Beyond DLP

Due to increased risk and HIPAA regulation demands for DLP and file tracking, PharmScript, provider of long-term care pharmacy services to healthcare facilities across 10 states was required to implement a regulatory compliant data protection solution that...Read more about Beyond DLP

4.8

(5 reviews)

12345...9