Suggested Categories:

IoT Security Software
IoT (Internet of Things) security software is designed to protect connected devices and networks from cyber threats, ensuring the confidentiality, integrity, and availability of data transmitted between IoT devices. These tools monitor and secure devices, applications, and networks that are part of the IoT ecosystem, which includes sensors, actuators, smart appliances, wearables, and industrial equipment. IoT security software includes features such as threat detection, data encryption, access control, device authentication, and vulnerability management to mitigate risks from cyberattacks, unauthorized access, and data breaches. It is essential for industries like healthcare, manufacturing, transportation, and smart cities, where the IoT devices are widely used and often contain sensitive or critical data.
Data Center Security Software
Data center security software enables IT security professionals and organizations to secure their data center infrastructure including racks, networks, server endpoints, and more. Data center security tools provide all aspects of security for data centers. Data center security software helps protect the physical and virtual infrastructure of data centers from unauthorized access, cyber threats, and data breaches. Data center security software ensures that sensitive information and critical systems are safeguarded from external and internal threats by providing real-time alerts, logging activities, and implementing compliance with security standards.
Home Care Software
Home care software helps agencies and caregivers manage the delivery of in-home healthcare and support services efficiently. It provides tools for scheduling visits, tracking caregiver assignments, managing client records, and handling billing and payroll. The software often includes features like care plan management, electronic visit verification (EVV), medication tracking, and real-time communication between caregivers, clients, and supervisors. By automating administrative tasks and improving coordination, it enhances care quality and compliance with healthcare regulations. This solution is essential for home care providers aiming to optimize operations, ensure patient safety, and deliver personalized care.
Home Design Software
Home design software enables users to create professional-grade designs for new homes or home renovations and remodels. Home design software can be used by professional architects, interior designers, decorators, or individual homeowners.
Home Builder Software
Home builder software facilitates the monitoring of home-building projects, their progress, scheduling and costs, while providing customer management tools.
Home Inspection Software
Home inspection software provides inspection checklist tools and housing management features which enable inspectors to create, manage, send and deliver housing reports.
IT Security Software
IT security software is designed to protect information technology (IT) systems, networks, and data from cyber threats, such as malware, hacking, and unauthorized access. These tools provide various features such as antivirus protection, firewalls, encryption, intrusion detection and prevention systems, and vulnerability management to ensure the integrity, confidentiality, and availability of sensitive information. IT security software helps organizations detect, prevent, and respond to security incidents, mitigate risks, and ensure compliance with industry regulations. It is critical for businesses and individuals to safeguard against cyberattacks, data breaches, and other security vulnerabilities.
Home Health Care Software
Home health care software helps organizations manage and streamline the delivery of healthcare services to patients in their homes. These platforms often include features for scheduling, patient records management, care plan creation, and real-time communication between caregivers, patients, and healthcare providers. Home health care software can also facilitate electronic visit verification (EVV), ensuring that caregivers are providing the required services as scheduled. Billing and documentation tools ensure compliance with healthcare regulations and improve operational efficiency. By using home health care software, businesses can enhance patient care, ensure accurate tracking of services, and improve coordination among healthcare professionals.
Private Duty Home Care Software
Private duty home care software helps agencies and organizations manage home healthcare services for clients, including scheduling, care plans, billing, and employee management. These platforms typically provide features for tracking patient care, managing caregivers' schedules, ensuring compliance with healthcare regulations, and processing payments. Private duty home care software often includes tools for documenting care activities, monitoring patient progress, and managing billing and invoicing.
Application Security Software
Application security software is designed to protect applications from cyber threats by identifying vulnerabilities, preventing attacks, and ensuring data integrity throughout the application’s lifecycle. This software typically includes features like static and dynamic analysis, runtime protection, and vulnerability scanning to detect and address potential security issues such as SQL injection, cross-site scripting (XSS), and unauthorized access. It helps organizations maintain secure applications by implementing best practices for secure coding, performing penetration testing, and monitoring for security breaches. Application security software is crucial for organizations to safeguard sensitive data, comply with regulations, and minimize the risk of exploitation.
Database Security Software
Database security software tools enable organizations to secure their databases, and ensure security compliance with database operations.
Website Security Software
Website security software enables the protection of websites from cyber threats, online attacks and hackers through DDoS protection features and web application firewalls.
Cloud Security Software
Cloud security software consists of tools, software, and services designed to protect data, applications, and infrastructure associated with cloud environments. It addresses unique security challenges posed by the cloud, such as data breaches, unauthorized access, and compliance with regulatory standards. These solutions often include features like encryption, identity and access management, intrusion detection systems, and security information and event management (SIEM). By implementing cloud security software, organizations can safeguard their cloud-based assets from cyber threats and ensure the integrity and confidentiality of sensitive information. As businesses increasingly adopt cloud services, robust cloud security measures have become essential for maintaining operational continuity and customer trust.
Computer Security Software
Computer security software helps protect devices, networks, and sensitive data from unauthorized access, cyberattacks, and other security threats. These tools provide a range of protective features such as antivirus, firewall, encryption, malware detection, and intrusion prevention systems. Computer security software is essential for safeguarding against viruses, ransomware, spyware, and phishing attacks, ensuring the integrity, confidentiality, and availability of data. Many security solutions also offer real-time monitoring, automated updates, and threat intelligence to detect and mitigate new vulnerabilities as they emerge. Businesses and individuals rely on computer security software to reduce risks, comply with regulations, and maintain a secure computing environment.
Data Security Software
Data security software is designed to protect sensitive data from unauthorized access, theft, or corruption. It includes a variety of tools and features such as encryption, access control, data masking, and backup and recovery to ensure that data remains secure at rest, in transit, and during processing. These solutions help organizations comply with data protection regulations, such as GDPR and HIPAA, by safeguarding personal, financial, and business data. Data security software often integrates with other IT security systems to provide comprehensive protection against cyberattacks, insider threats, and data breaches, ensuring that critical information remains protected.
Container Security Software
Container security software is software designed to protect containerized applications and environments from security vulnerabilities, threats, and attacks. Containers, which are used to deploy and run applications in isolated environments, present unique security challenges due to their dynamic and ephemeral nature. Container security software helps secure containerized environments by providing capabilities such as vulnerability scanning, runtime protection, access control, and image security. These tools monitor container configurations and activity to detect anomalies, ensure compliance with security policies, and mitigate risks like container escapes or unauthorized access. By enhancing the security of containers and container orchestration platforms (like Kubernetes), these solutions enable organizations to securely deploy and manage applications in cloud-native and microservices environments.
API Security Software
API security software is designed to protect APIs from security threats such as unauthorized access, data breaches, and denial-of-service attacks. These tools monitor, authenticate, and secure the connections between APIs and the systems they interact with, ensuring that only authorized users and systems can access the data or services offered by the API. Features typically include encryption, rate limiting, authentication (such as OAuth, JWT), API traffic monitoring, threat detection, and automated security testing. API security software is crucial for businesses that rely on APIs to connect with third-party services, mobile apps, or microservices, as it helps mitigate risks and maintain data integrity.
Network Security Software
Network security software is a type of software that helps protect computers, networks, and data from malicious attacks and unauthorized access. It is typically used by businesses to protect their confidential information and keep systems safe. It can also be used by individuals to protect their personal information and devices from potential threats.
Physical Security Software
Physical security software is a suite of tools designed to manage and monitor the security of physical spaces, assets, and individuals within an organization. These platforms often integrate with hardware systems such as access control systems, surveillance cameras, alarms, and sensors to provide a comprehensive security solution. Features of physical security software can include real-time monitoring, incident reporting, visitor management, access control, and remote security management. The software can also provide detailed analytics on security incidents, track access logs, and manage emergency response protocols. By helping organizations secure their physical premises, physical security software enhances safety, prevents unauthorized access, and ensures regulatory compliance.
Email Security Software
Email security software protects organizations from cyber threats such as phishing, malware, and spam by filtering incoming and outgoing email traffic. It uses advanced threat detection, encryption, and data loss prevention (DLP) to safeguard sensitive information. These tools also offer features like email authentication (DMARC, SPF, DKIM) and real-time threat intelligence to block emerging attacks. By securing email communications, businesses can prevent data breaches, ensure regulatory compliance, and maintain user trust. Email security software is essential for mitigating human error, which is one of the leading causes of data breaches.
View more categories (20) for "security home"

198 Products for "security home" with 1 filter applied:

  • 1
    Cloud Custodian

    Cloud Custodian

    Cloud Custodian

    Cloud Custodian enables you to manage your cloud resources by filtering, tagging, and then applying actions to them. The YAML DSL allows the definition of rules to enable well-managed cloud infrastructure that's both secure and cost-optimized. Replace ad-hoc cloud-specific scripts with simpler syntax, and Cloud Custodian will apply those policies to your infrastructure. Custodian supports managing AWS, Azure, and GCP public cloud environments with Kubernetes, Tencent Cloud, and Open...
    Starting Price: Free
  • 2
    DragonOps

    DragonOps

    DragonOps

    .../CD, DNS/HTTPS setup, logging, monitoring, secure secrets management, and much more, all tailored to your needs with no prior cloud knowledge required. Experience cost-effective, secure, and fully managed AWS hosting with DragonOps, and get your SaaS up and running in just 20 minutes.
  • 3
    3DS OUTSCALE

    3DS OUTSCALE

    Dassault Systèmes

    Outscale is an innovative Cloud provider offering scalable, performant and secure Private, On-Premise and Public Clouds with stellar client services and robust data centers around the globe. Founded in 2010, a strategic partner of Dassault Systèmes, OUTSCALE is certified CMSP Advanced by Cisco Systems, 100% ICT by Intel and AltaVault by NetApp. The company provides Enterprise-Class Cloud Computing services that are compliant with regulatory and local requirements. OUTSCALE helps companies...
  • 4
    RackWare

    RackWare

    RackWare

    Gain flexibility and control access across any physical, virtual or cloud environment. RackWare helps enterprises migrate to the cloud, protect their workloads through backup and disaster recovery, and manage multiple physical, virtual, and cloud environments on a single pane of glass. RackWare’s Hybrid Cloud Platform (HCP) is a multi-function solution that enables enterprises to migrate workloads to the cloud, configure disaster recovery, and provide comprehensive oversight and management...
  • 5
    Cloudockit

    Cloudockit

    UMAknow

    Effortlessly produce editable architecture diagrams by selecting the level of details you wish to see in your diagrams. Create a complete Word, PDF, Excel or HTML document and continuously receive up-to-date and accurate information. Effortlessly monitor changes in your environment while saving time and energy. Truly understand what is deployed in your cloud environment and easily find misconfigurations and potential security threats. Easily keep track of your cloud spending and never exceed...
    Starting Price: $295 per year
  • 6
    Bitnami

    Bitnami

    Bitnami

    ... IT organizations with an enterprise offering that is secure, compliant, continuously maintained and customizable to your organizational policies. Discover and deploy continuously validated third party and open-source solutions deployable on VMware endpoints.
  • 7
    STAX

    STAX

    Stax-WMS

    Stax automates AWS to accelerate your business. With a secure platform to govern cloud management, your engineers can focus on what your business was created to do. Stax delivers an enterprise-grade foundation out of the box, so you can begin deploying applications in a matter of weeks. Our pay-as-you go model means no upfront capital expenditure, and a platform that can scale as your business grows. Increase productivity by reducing the time needed to maintain your cloud ecosystem...
  • 8
    apiculus

    apiculus

    IndiQus Technologies

    ... to the core, apiculus® is secure, always in high availability and can be scaled at any time to meet your customers' growing workloads. apiculus® lets cloud service providers create competitive value by setting up a cloud business that goes beyond IaaS. apiculus® Billing enables cloud service providers to set up and manage subscription billing and monetise an anything as a service (XaaS) cloud making it a robust cloud billing software.
  • 9
    Atos OneCloud
    ..., and innovative talents in an end-to-end set of services to help our clients navigate their cloud journey securely. Atos OneCloud modernizes enterprise applications to be agile, mobile, and rooted in analytics, across public, private, and hybrid cloud environments.
  • 10
    CloudPlex

    CloudPlex

    CloudPlex

    CloudPlex is an enterprise cloud enablement platform that meets both the technical and business needs of the enterprise for running their applications in the cloud. It handles all key aspects of managing apps including governance, security, orchestration and cost management. The platform manages cloud-native, container-based and legacy applications on all major public clouds in a unified manner. It enables a completely automated application provisioning and orchestration process. Cloud...
  • 11
    Cirrusform

    Cirrusform

    Trigya Technologies

    ... their Data Center in AWS Cloud. Cirrusform can be learned in 2-3 days time by any semi-tech or developer and can start to Provision, Manage, Automate & Secure AWS Cloud Infrastructure. No Cloud Specialists required.
  • 12
    Cycleops

    Cycleops

    Stackmasters

    Take a shortcut to DevOps success. Compose, deploy and monitor your Stacks without writing a single line of code. Cycleops is an online Cloud Management Platform with built-in full stack Orchestration, Monitoring and Reporting. Cycleops comes with easy-to-use tools to setup and control workflows around resources and workloads residing in the Cloud. Streamline and speed up your software development. Break internal silos and develop a culture of sharing between Development and Operations...
  • 13
    Mutable Public Edge Cloud
    ... into more reliable online collaborations and real-time technology applications. Mutable Cloud harnesses 5G networks’ ultra low latency to provide constant connectivity between wired and wireless devices locally on the edge. Terminate user requests before reaching the Public Internet, lowering latency and boosting security. Unleash unique cost and performance benefits by deploying applications on ARM & GPU architecture.
  • 14
    Finisterra

    Finisterra

    Finisterra

    Finisterra revolutionizes AWS infrastructure management by automating Terraform code, enabling rapid deployment and reducing manual coding errors. Designed for CTOs, engineering teams, and IT departments, it streamlines operations, frees developers to focus on core tasks, and accelerates disaster recovery and region migrations. With seamless AWS and GitHub integration, Finisterra ensures increased visibility, error minimization, and data security, keeping infrastructure and credentials within...
  • 15
    IO River

    IO River

    IO River

    ... Multi CDN management orchestration to a single interface, security (WAF, Rate Limiting, etc), traffic control (Load Balancing, QoS, etc.), Orchestrated edge compute code & more.
  • 16
    BMC Multi-Cloud Management
    Ensure smooth migrations to the cloud with guidance on how to assess what to migrate, what it will cost, and how to keep it secure. IT and business owners are often surprised and unprepared for the large monthly or annual expenses from cloud providers. With buyers of public cloud services throughout the organization, it is challenging for IT to keep costs under control. Every business is under competitive pressure to provide services across multi-cloud, multi-device, and multi
  • 17
    Glyph

    Glyph

    Glyph

    Glyph is an advanced UI/UX application built specifically with AWS cloud DevOps and architects in mind. Offering a powerful and interactive map of your AWS account as well as access to other supplementary services, Glyph will help you understand your cloud like never before.
  • 18
    Cloudways

    Cloudways

    Cloudways

    ... in minutes. We help agencies and businesses to build and manage web apps more collaboratively and efficiently. We are committed to delivering fast performance, ironclad security, and seamless scalability for your websites. We offer expert 24/7/365 problem-solving for everyone. For a closer partnership, choose the Advanced Support add-on that enhances your support experience or the Premium Support add-on where our Senior Support Engineers work as an extension of your in-house team.
    Starting Price: $11.00/month/user
  • 19
    pCloud

    pCloud

    pCloud

    pCloud is a cloud-based digital asset management platform and cloud storage that provides access to all your digital content including images, video, audio, docs, and more- anytime, anywhere, on any device. Keep all of your important files safe and centralized in one place. You can share with team members, clients, etc. across the globe and give them controlled access and permissions to your digital library. It has a user-friendly interface that clearly shows where everything is located...
    Leader badge
    Starting Price: € 4.99 /mo
  • 20
    CoreStack

    CoreStack

    CoreStack

    CoreStack, an AI-powered multi-cloud governance solution, empowers enterprises to rapidly achieve Continuous and Autonomous Cloud Governance at Scale. CoreStack enables enterprises to realize outcomes such as 40% decrease in cloud costs and 50% increase in operational efficiencies by governing operations, security, cost, access, and resources. CoreStack also assures 100% compliance with standards such as ISO, FedRAMP, NIST, HIPAA, PCI-DSS, AWS CIS & Well Architected Framework (WAF). Core...
    Starting Price: $49.00 per month
  • 21
    System On Grid

    System On Grid

    System On Grid

    We are redefining internet by converging cloud infrastructure by merging Orbits (VPS – Virtual Private Servers) with Web Hosting which provides dedicated and scalable resources, security, isolation, and automation backed by very high reliability and 99.99% uptime guarantee. Our Orbits come with different specs and different flavors like CentOS, Ubuntu, Debian, Fedora, Free BSD, Net BSD etc. providing a lot of flexibility. The backend uses Intel E-5 processors, KVM hypervisor and Openstack...
    Starting Price: $8 per month
  • 22
    Nerdio
    ... of up to 75% – paired with the unmatched security of Microsoft Azure and expert-level Nerdio support. Nerdio Manager for MSP is a multi-tenant Azure Virtual Desktop and Windows 365 deployment, management, and optimization platform for Managed Service Providers that allows for automatic provisioning in under an hour (or connect to an existing deployment in minutes), management of all customers in a simple admin portal, and cost-optimization with Nerdio’s Advanced Auto-scaling.
    Starting Price: $100 per month
  • 23
    Platform9

    Platform9

    Platform9

    ... into a fully featured private cloud. It delivers a familiar management experience for virtualization teams—with the ability to run VMs and containers side by side—and enterprise-grade features including High Availability, live migration, Dynamic Resource Rebalancing, Software Defined Networking, Self Service, and secure multi-tenancy. Hundreds of enterprises, including Rackspace Technology, Cloudera, and Juniper Networks use Platform9 today.
  • 24
    Certero for Cloud
    ... migration, optimization and retirement. Certero for Cloud is on the Certero unified platform, purpose built to enable holistic IT management from desktop to datacenter, to SaaS & Cloud; all on one single, efficient management platform. Certero also offers Certero for SaaS, and on-premise ITAM, SAM, Mobile asset management solutions, all combined on the Certero platform for convenience & a central data source for reporting. Certero are fully ISO27001 Certified for Information Management Security.
  • 25
    PyraCloud

    PyraCloud

    Software One

    ...! Streamline procurement processes. View, track and manage all software transactions, orders, invoices and contracts in one platform. Track spend and simplify complex contract management, renewals and global EA True-ups. Gain insights into your current and predicted future spend. Understand business demand, track software usage and govern resources. Identify potential cost savings, improve compliance and enable better security of cloud resources.
  • 26
    Kyligence

    Kyligence

    Kyligence

    Let Kyligence Zen take care of collecting, organizing, and analyzing your metrics so you can focus more on taking action Kyligence Zen is the go-to low-code metrics platform to define, collect, and analyze your business metrics. It empowers users to quickly connect their data sources, define their business metrics, uncover hidden insights in minutes, and share them across their organization. Kyligence Enterprise provides diverse solutions based on on-premise, public cloud, and private...
  • 27
    SoftNAS

    SoftNAS

    Buurst

    SoftNAS is a cloud-native, software-defined, full-featured enterprise cloud NAS filer product line for primary data storage, secondary storage and hybrid cloud data integration. It enables existing applications to securely migrate to and connect with the cloud without re-engineering. With enterprise-class NAS features like: high-availability, deduplication, compression, thin-provisioning, snapshots, replication, cloning, encryption (at rest and in transit), LDAP and Active Directory...
  • 28
    Contegix

    Contegix

    Contegix

    Contegix helps organizations collaborate in our digital world. We are Atlassian Platinum Partners dedicated to Advance All things Atlassian, active members of the Drupal Community, and offer outsourced IT service desk solutions. We can help your business reach its goals through consulting, application management, and highly secure and compliant hosting services. If you're using Atlassian tools, built your website on Drupal, or need to eliminate help desk tasks from your IT teams' plates, we...
  • 29
    Cloudify

    Cloudify

    Cloudify Platform

    Manage all private and public environments from one platform using a single CI/CD plugin that connects to ALL automation toolchains. Including Jenkins, Kubernetes, Terraform, Cloud Formation, Azure ARM and more. No installation, no downloads … and on us for the first 30 days. Built-in integration with infrastructure orchestration domains including AWS Cloud formation, Azure ARM, Ansible and Terraform. Service Composition Domain-Specific Language (DSL) – simplifies the relationship between...
  • 30
    iKala Cloud
    ... security assessment, and the service of sensitive data management. 24/7 customer service team with prompt technical support always stands by for you. Google will also fully support our customers once have great damage in any time. iKala Cloud provides numerous professional GCP trainings for our customers about GCP core infrastructure and more. Customized courses: 1 on 1 or a small group can be discussed according to every needs.