Suggested Categories:

IoT Security Software
IoT (Internet of Things) security software is designed to protect connected devices and networks from cyber threats, ensuring the confidentiality, integrity, and availability of data transmitted between IoT devices. These tools monitor and secure devices, applications, and networks that are part of the IoT ecosystem, which includes sensors, actuators, smart appliances, wearables, and industrial equipment. IoT security software includes features such as threat detection, data encryption, access control, device authentication, and vulnerability management to mitigate risks from cyberattacks, unauthorized access, and data breaches. It is essential for industries like healthcare, manufacturing, transportation, and smart cities, where the IoT devices are widely used and often contain sensitive or critical data.
Data Center Security Software
Data center security software enables IT security professionals and organizations to secure their data center infrastructure including racks, networks, server endpoints, and more. Data center security tools provide all aspects of security for data centers. Data center security software helps protect the physical and virtual infrastructure of data centers from unauthorized access, cyber threats, and data breaches. Data center security software ensures that sensitive information and critical systems are safeguarded from external and internal threats by providing real-time alerts, logging activities, and implementing compliance with security standards.
Home Care Software
Home care software helps agencies and caregivers manage the delivery of in-home healthcare and support services efficiently. It provides tools for scheduling visits, tracking caregiver assignments, managing client records, and handling billing and payroll. The software often includes features like care plan management, electronic visit verification (EVV), medication tracking, and real-time communication between caregivers, clients, and supervisors. By automating administrative tasks and improving coordination, it enhances care quality and compliance with healthcare regulations. This solution is essential for home care providers aiming to optimize operations, ensure patient safety, and deliver personalized care.
Home Design Software
Home design software enables users to create professional-grade designs for new homes or home renovations and remodels. Home design software can be used by professional architects, interior designers, decorators, or individual homeowners.
Home Builder Software
Home builder software facilitates the monitoring of home-building projects, their progress, scheduling and costs, while providing customer management tools.
Home Inspection Software
Home inspection software provides inspection checklist tools and housing management features which enable inspectors to create, manage, send and deliver housing reports.
IT Security Software
IT security software is designed to protect information technology (IT) systems, networks, and data from cyber threats, such as malware, hacking, and unauthorized access. These tools provide various features such as antivirus protection, firewalls, encryption, intrusion detection and prevention systems, and vulnerability management to ensure the integrity, confidentiality, and availability of sensitive information. IT security software helps organizations detect, prevent, and respond to security incidents, mitigate risks, and ensure compliance with industry regulations. It is critical for businesses and individuals to safeguard against cyberattacks, data breaches, and other security vulnerabilities.
Home Health Care Software
Home health care software helps organizations manage and streamline the delivery of healthcare services to patients in their homes. These platforms often include features for scheduling, patient records management, care plan creation, and real-time communication between caregivers, patients, and healthcare providers. Home health care software can also facilitate electronic visit verification (EVV), ensuring that caregivers are providing the required services as scheduled. Billing and documentation tools ensure compliance with healthcare regulations and improve operational efficiency. By using home health care software, businesses can enhance patient care, ensure accurate tracking of services, and improve coordination among healthcare professionals.
Private Duty Home Care Software
Private duty home care software helps agencies and organizations manage home healthcare services for clients, including scheduling, care plans, billing, and employee management. These platforms typically provide features for tracking patient care, managing caregivers' schedules, ensuring compliance with healthcare regulations, and processing payments. Private duty home care software often includes tools for documenting care activities, monitoring patient progress, and managing billing and invoicing.
Application Security Software
Application security software is designed to protect applications from cyber threats by identifying vulnerabilities, preventing attacks, and ensuring data integrity throughout the application’s lifecycle. This software typically includes features like static and dynamic analysis, runtime protection, and vulnerability scanning to detect and address potential security issues such as SQL injection, cross-site scripting (XSS), and unauthorized access. It helps organizations maintain secure applications by implementing best practices for secure coding, performing penetration testing, and monitoring for security breaches. Application security software is crucial for organizations to safeguard sensitive data, comply with regulations, and minimize the risk of exploitation.
Database Security Software
Database security software tools enable organizations to secure their databases, and ensure security compliance with database operations.
Website Security Software
Website security software enables the protection of websites from cyber threats, online attacks and hackers through DDoS protection features and web application firewalls.
Cloud Security Software
Cloud security software consists of tools, software, and services designed to protect data, applications, and infrastructure associated with cloud environments. It addresses unique security challenges posed by the cloud, such as data breaches, unauthorized access, and compliance with regulatory standards. These solutions often include features like encryption, identity and access management, intrusion detection systems, and security information and event management (SIEM). By implementing cloud security software, organizations can safeguard their cloud-based assets from cyber threats and ensure the integrity and confidentiality of sensitive information. As businesses increasingly adopt cloud services, robust cloud security measures have become essential for maintaining operational continuity and customer trust.
Computer Security Software
Computer security software helps protect devices, networks, and sensitive data from unauthorized access, cyberattacks, and other security threats. These tools provide a range of protective features such as antivirus, firewall, encryption, malware detection, and intrusion prevention systems. Computer security software is essential for safeguarding against viruses, ransomware, spyware, and phishing attacks, ensuring the integrity, confidentiality, and availability of data. Many security solutions also offer real-time monitoring, automated updates, and threat intelligence to detect and mitigate new vulnerabilities as they emerge. Businesses and individuals rely on computer security software to reduce risks, comply with regulations, and maintain a secure computing environment.
Data Security Software
Data security software is designed to protect sensitive data from unauthorized access, theft, or corruption. It includes a variety of tools and features such as encryption, access control, data masking, and backup and recovery to ensure that data remains secure at rest, in transit, and during processing. These solutions help organizations comply with data protection regulations, such as GDPR and HIPAA, by safeguarding personal, financial, and business data. Data security software often integrates with other IT security systems to provide comprehensive protection against cyberattacks, insider threats, and data breaches, ensuring that critical information remains protected.
Container Security Software
Container security software is software designed to protect containerized applications and environments from security vulnerabilities, threats, and attacks. Containers, which are used to deploy and run applications in isolated environments, present unique security challenges due to their dynamic and ephemeral nature. Container security software helps secure containerized environments by providing capabilities such as vulnerability scanning, runtime protection, access control, and image security. These tools monitor container configurations and activity to detect anomalies, ensure compliance with security policies, and mitigate risks like container escapes or unauthorized access. By enhancing the security of containers and container orchestration platforms (like Kubernetes), these solutions enable organizations to securely deploy and manage applications in cloud-native and microservices environments.
API Security Software
API security software is designed to protect APIs from security threats such as unauthorized access, data breaches, and denial-of-service attacks. These tools monitor, authenticate, and secure the connections between APIs and the systems they interact with, ensuring that only authorized users and systems can access the data or services offered by the API. Features typically include encryption, rate limiting, authentication (such as OAuth, JWT), API traffic monitoring, threat detection, and automated security testing. API security software is crucial for businesses that rely on APIs to connect with third-party services, mobile apps, or microservices, as it helps mitigate risks and maintain data integrity.
Network Security Software
Network security software is a type of software that helps protect computers, networks, and data from malicious attacks and unauthorized access. It is typically used by businesses to protect their confidential information and keep systems safe. It can also be used by individuals to protect their personal information and devices from potential threats.
Physical Security Software
Physical security software is a suite of tools designed to manage and monitor the security of physical spaces, assets, and individuals within an organization. These platforms often integrate with hardware systems such as access control systems, surveillance cameras, alarms, and sensors to provide a comprehensive security solution. Features of physical security software can include real-time monitoring, incident reporting, visitor management, access control, and remote security management. The software can also provide detailed analytics on security incidents, track access logs, and manage emergency response protocols. By helping organizations secure their physical premises, physical security software enhances safety, prevents unauthorized access, and ensures regulatory compliance.
Email Security Software
Email security software protects organizations from cyber threats such as phishing, malware, and spam by filtering incoming and outgoing email traffic. It uses advanced threat detection, encryption, and data loss prevention (DLP) to safeguard sensitive information. These tools also offer features like email authentication (DMARC, SPF, DKIM) and real-time threat intelligence to block emerging attacks. By securing email communications, businesses can prevent data breaches, ensure regulatory compliance, and maintain user trust. Email security software is essential for mitigating human error, which is one of the leading causes of data breaches.
View more categories (20) for "security home"

198 Products for "security home" with 1 filter applied:

  • 1
    Cloud Maker

    Cloud Maker

    Cloud Maker

    Diagram Driven Cloud Infrastructure - Drag and drop design, automated deployment and the benefits of Infrastructure-as-Code, without the complexity! Cloud Maker lets Solution Architects and DevOps Engineers rapidly diagram infrastructure, check for security issues with Cloud Maker Overwatch, and deploy to the Cloud at the click of a button. Under the hood, we automatically generate Infrastructure-as-Code so that you get all the benefits without having to write a single line of code. Key...
    Starting Price: $27/user/month
  • 2
    Hava

    Hava

    Hava

    Create interactive cloud diagrams in minutes from multiple cloud vendors. Discover what's actually configured and running, view security, open ports, and traffic ingress/egress. Fully automated, no tedious drawing required. Once you connect Hava securely to your cloud accounts, within minutes you will have a set of logically laid out infrastructure diagrams grouped by VPCs or resource zones, detailing all the resources and their connectivity. Selecting each resource will reveal all...
    Starting Price: $49 per month
  • 3
    Cloud Assessor

    Cloud Assessor

    Cloud Assessor

    AWS Cloud audit made easy, over 60+ AWS services supported. We automatically detect AWS cloud misconfigurations and security problems within your AWS cloud and explain why you violate AWS best practices. The app runs as a standalone CloudFormation stack within your AWS account, you host everything in your VPC and remain the owner of your data. Install it to continuously keep your AWS environment clean and secure and start training your team on AWS best practices. Each alert is documented...
    Starting Price: $0.40 per hour
  • 4
    Ametnes Cloud
    Introducing Ametnes: Streamlined Data Application Deployment and Management Experience the future of data application deployment with Ametnes. Our cutting-edge solution revolutionizes the way you handle data applications in your private environment. Say goodbye to the complexities and security concerns of manual deployment. Ametnes addresses these challenges head-on by automating the entire process, ensuring a seamless and secure experience for our valued customers. With our intuitive...
  • 5
    MontyCloud DAY2
    ​MontyCloud offers an autonomous CloudOps platform designed to simplify cloud management and operations. It enables IT teams to provision, manage, and operate AWS infrastructure efficiently without the need for specialized cloud skills. It provides comprehensive visibility into cloud inventories, security, compliance, and costs, empowering organizations to optimize their cloud environments effectively. ​Provide cloud project workspaces and sandbox environments for users to access cloud services...
  • 6
    Microsoft Copilot in Azure
    Microsoft Copilot in Azure is an AI-powered assistant that helps users simplify operations, optimize resources, and streamline cloud management across Azure environments. Integrated deeply within the Azure ecosystem, it assists in designing, operating, and troubleshooting workloads through natural language interaction. Copilot automatically recommends service configurations, cost optimizations, and security improvements based on your organization’s policies and environment. It enables users...
  • 7
    Coralogix

    Coralogix

    Coralogix

    ... and flows between system components and trigger dynamic alerts so you know when a pattern deviates from the norm without static thresholds or the need for pre-configurations. Connect any data, in any format, and view your insights anywhere including our purpose-built UI, Kibana, Grafana, SQL clients, Tableau, or using our CLI and full API support. Coralogix has successfully completed relevant security and privacy compliances by BDO including GDPR, SOC 2, PCI, HIPAA, and ISO 27001/27701.
  • 8
    Checkmk

    Checkmk

    Checkmk

    Checkmk is a comprehensive IT monitoring system that enables system administrators, IT managers, and DevOps teams to identify issues across their entire IT infrastructure (servers, applications, networks, storage, databases, containers) and act quickly to resolve them More than 2,000 commercial customers and many more open source users worldwide use Checkmk daily. Key product features: • Service state monitoring with almost 2,000 checks 'out of the box' • Log and event-based...
    Starting Price: $0/year
  • 9
    Enterprise File Fabric

    Enterprise File Fabric

    Storage Made Easy

    The Enterprise File Fabric™ provides a private, secure, policy-driven multi-cloud content and collaboration solution. It does not ship with storage, it works with a Companies existing storage portfolio whether that is on-cloud or on-premises. The Enterprise File Fabric™ unifies, secures and makes any type of storage (including object storage) easily accessible for end users. It is available in three main product variants: 1.The Enterprise File Fabric for Compliance provides a 'single pane...
    Starting Price: $5 per user per month
  • 10
    CloudEndure

    CloudEndure

    CloudEndure

    Backup any workload to the cloud with CloudEndure, a disaster recovery and live migration software. CloudEndure features protection for the users' critical workloads and minimization of downtime while reducing maintenance costs. Easy to use, CloudEndure allows users to migrate complex workloads including legacy applications and databases without disrupting business.
  • 11
    Centilytics

    Centilytics

    Centilytics

    Centilytics is an Intelligent cloud management platform that aims to democratize the cloud and bring cloud management to every user out there. We provide governance, security, optimization solutions to bring down your cloud bills while putting you firmly in charge of your cloud infra.
  • 12
    dinCloud

    dinCloud

    dinCloud

    dinCloud is a Cloud Services Provider (CSP) that helps organizations rapidly migrate to the cloud through a strong network of Value Added Resellers (VARs) and Managed Service Providers (MSPs). Each customer’s hosted private cloud offers hosted workspaces and cloud infrastructure that the customer controls through direct and open access. dinCloud’s subscription-based services are tailored to fit a range of business models resulting in reduced cost, enhanced security, control, and productivity.
  • 13
    Beamy

    Beamy

    Beamy

    ... risks for companies (GDPR, security, and underperformance, to name a few) that must be addressed and governed. All large organizations will have to face this decentralization to accelerate their digitalization. Beamy continuously detects and monitors all SaaS apps used within your organization. Get the most of your SaaS stack by visualizing what is used, understanding shadow IT risks, and streamlining decision-making.
  • 14
    Nutanix Cloud Manager
    A unified solution for providing intelligent operations, self-service and orchestration, security compliance and visibility, and control of cloud costs. Nutanix Cloud Manager brings simplicity and ease of use to building and managing cloud deployments and delivers faster time to value for our customers. Streamline management, deployment, and scale applications with self-service and centralized role-based IT governance. Drive financial accountability and unify security operations...
  • 15
    Azure Automanage
    Azure Automanage offers a unified solution to simplify IT management. With point-and-click simplicity, automate operations and apply consistent best practices across the entire lifecycle of Windows Server and Linux servers in Azure or in hybrid environments enabled by Azure Arc. Automated best-practice configuration of virtual machines in Azure or hybrid environments through Azure Arc. Proactive drift detection and remediation for improved workload uptime. Automatically applied security...
  • 16
    Azure Virtual Network Manager
    Significantly reduce your operational overhead with Azure Virtual Network Manager, a central management service for your virtual network resources. Easily manage your virtual network infrastructure while scaling your cloud-based workloads. Use the centralized solution to create and manage complex network topologies and network security rules globally across subscriptions. Apply security and connectivity configurations for all your virtual networks across regions and subscriptions. Manage...
    Starting Price: $0.10 per hour
  • 17
    Kops.dev

    Kops.dev

    Kops.dev

    ... microservices. Automatically sets up container registries, handles permissions, and manages credentials for deploying images within your cluster. Manages service settings by handling YAML configurations automatically and requiring only essential input from you. Simplifies database setup, including creating data stores, managing firewalls, and securely attaching credentials to service pods. Automatically configures host attachments and manages TLS certificates to securely expose your services.
  • 18
    Nutanix Prism
    ... learning-driven alerts, root cause analysis, and intelligent resource scheduling to optimize performance and proactively address issues. Additionally, Prism's self-service capabilities allow users to provision resources securely and efficiently, supporting scalability and maintaining strong security controls. By integrating these functionalities, Nutanix Prism enhances operational efficiency and simplifies the complexities associated with managing hybrid multi-cloud environments.
  • 19
    AI Cloud Insights

    AI Cloud Insights

    Expert Cloud Consulting

    AI Cloud Insights is an intelligent cloud management platform designed to monitor, analyze, and optimize your AWS infrastructure. Backed by Expert Cloud Consulting, an AWS Advanced Tier Partner, the platform delivers cutting-edge AI-driven capabilities across security analysis, resource activity monitoring, and cost management—all in one place. With real-time insights, automated threat detection, and an AI chatbot for instant queries, users can ensure secure, compliant, and cost-efficient cloud...
    Starting Price: $49/month
  • 20
    ArchFormation

    ArchFormation

    ArchFormation

    ...Ops best practices, and ensures enterprise-level security, making it ideal for startups, developers, and organizations aiming to accelerate cloud adoption without vendor lock-in.
    Starting Price: $49/month
  • 21
    HAWK

    HAWK

    TO THE NEW

    HAWK is an end-to-end multi-cloud management and log analytics platform built to centralize automation, governance, monitoring, and cost-optimization of cloud infrastructure. It offers a unified dashboard that delivers full visibility into cloud resources, real-time recommendations for cost savings, a complete inventory of infrastructure usage, security, and compliance audits (such as IAM, CIS, and encryption checks), pre-configured onboarding/off-boarding workflows, and actionable insights...
  • 22
    Shoreline

    Shoreline

    Shoreline.io

    Shoreline is the Cloud Reliability platform — the only platform that lets DevOps engineers build automations in an afternoon, and fix issues forever. Shoreline reduces on-call complexity by running across clouds, Kubernetes clusters, and VMs allowing operators to manage their entire fleet as if it were a single box. Debugging and repairing issues is easy with advanced tooling for your best SREs, automated runbooks for the broader team, and a platform that makes building automations 30X...
  • 23
    Ansys Cloud Direct
    ... the hardware barrier. Ansys Cloud Direct is a scalable and cost-effective approach to HPC in the cloud. To leverage the combined benefits of cloud computing and best-in-class engineering simulation, Ansys partnered with Microsoft® Azure™ to create a secure cloud solution. Within Ansys Mechanical, Ansys Fluent, Ansys Electronics Desktop, Ansys SPEOS, Ansys Discovery, Ansys LS-Dyna, Ansys LST, Ansys CFX and Ansys Lumerical, you can easily access HPC in the cloud directly from the applications
  • 24
    nOps

    nOps

    nOps.io

    FinOps on nOps We only charge for what we save. ✓Continuous Cloud waste reduction ✓Continuous Container cluster optimization ✓Continuous RI management to save up to 40% over on-demand resources ✓Spot Orchestrator to reduce cost over on-demand resources Most organizations don’t have the resources to focus on reducing cloud spend. nOps is your ML-powered FinOps team. nOps reduces cloud waste, helps you run workloads on spot instances, automatically manages reservations, and helps...
    Starting Price: $99 per month
  • 25
    gridscale

    gridscale

    gridscale

    ... a 100% SLA. At gridscale, we take the security of your infrastructure and your data seriously. We are not only subject to the strictest data protection in the world under German law, but we also build our infrastructure and features to assure maximum security. Do you run your own data center, but want to avoid purchasing extra servers for special activities, such as TV commercials or customer projects with high workloads? gridscale supports you with its flexibility and transparency.
    Starting Price: €47.09 per server per month
  • 26
    Flexera One
    Flexera One is a SaaS platform designed to optimize IT spend, compliance, and risk management across complex hybrid IT environments. It unifies visibility and control of hardware, software, SaaS, and cloud assets, leveraging data from the Technology Intelligence Platform and Technopedia®. By delivering actionable insights, Flexera One helps organizations reduce costs, improve security, and meet sustainability goals. It strengthens vendor negotiations through intelligent analytics and ensures...
  • 27
    RavenDB Cloud
    RavenDB Cloud delivers the world's leading database for modern applications as a fully automated cloud service run by the same developers that build and maintain the database engine. Stringent security features are built in and time-consuming tasks such as infrastructure provisioning, database setup, ensuring availability, backups, and more have been automated to the point where your overhead is reduced dramatically. Our built in GUI and simple API lets you focus more of your resources...
  • 28
    Connectria

    Connectria

    Connectria

    Connectria provides TRiA Cloud Management which is a comprehensive cloud governance to optimize spending, manage performance, and ensure continuous security & compliance. It’s the only Cloud Management Platform (CMP) that allows you to manage multiple clouds – from legacy IBM i environments through x86 – into today’s hyper-scale AWS, Azure and GCP clouds – under a single dashboard-driven platform. There isn’t another CMP in the market that is as robust as the TRiA Cloud Management Platform...
    Starting Price: $199 per month
  • 29
    Hyperglance

    Hyperglance

    Hyperglance

    The cloud management platform you’ll wish you’d found sooner. Visualize inventory. Reduce costs. Monitor compliance. Automate remediation. Trusted by engineers, architects, security, and FinOps teams in the world's largest private & public sector organizations. REDUCE COSTS BY 30%: Take FinOps to the next level with best-in-class cost optimization, analysis and forecasting tools that typically deliver sustained cost savings of 25-30%. VISUALIZE & OPTIMIZE: Explore powerful...
    Starting Price: From $1,458/month
  • 30
    Unisys CloudForte
    We are living in an increasingly digital world as organizations everywhere look to the cloud to be a catalyst for transformation. Now is the time to assess your cloud strategy. Are you using cloud technology to its full potential? What other ways can you benefit from its power? Can you do so while minimizing security risk and upholding compliance? You can, with Unisys Cloud and Infrastructure Solutions. Our 100% vendor-agnostic approach ensures you experience the best capabilities among a broad...