Suggested Categories:

Military and Defense Software
Military and defense software supports critical operations, logistics, and decision-making within military and defense organizations, enhancing strategic planning and mission execution. This software manages a range of functions, from intelligence gathering and data analysis to equipment maintenance and supply chain management. Advanced features, such as real-time situational awareness, threat detection, and secure communication, enable rapid response and coordination across units. Often incorporating encryption and compliance protocols, military software ensures the security of sensitive information and adheres to strict regulatory standards. Ultimately, military and defense software increases operational efficiency, strengthens defense capabilities, and enables informed decision-making in high-stakes environments.
Mobile Threat Defense Software
Mobile threat defense software protects mobile devices such as smartphones and tablets from cyber threats by detecting, preventing, and responding to security risks. It safeguards against malware, phishing attacks, network vulnerabilities, device misconfigurations, and unauthorized access. The software continuously monitors device behavior, application activity, and network connections to identify suspicious actions in real time. Integration with mobile device management and security information systems allows centralized control and rapid incident response. Ultimately, mobile threat defense software enhances the security posture of mobile environments, protecting sensitive data and ensuring compliance.
Social Engineering Defense Software
Social engineering defense platforms are security solutions designed to prevent, detect, and mitigate social engineering attacks, which manipulate individuals into disclosing confidential information or performing actions that compromise security. These platforms provide features such as phishing simulations, training modules to educate employees on recognizing suspicious behavior, and tools for analyzing and identifying potential threats. By educating users and continuously testing their awareness through simulated attacks, social engineering defense platforms help organizations build a more resilient workforce.
IT Security Software
IT security software is designed to protect information technology (IT) systems, networks, and data from cyber threats, such as malware, hacking, and unauthorized access. These tools provide various features such as antivirus protection, firewalls, encryption, intrusion detection and prevention systems, and vulnerability management to ensure the integrity, confidentiality, and availability of sensitive information. IT security software helps organizations detect, prevent, and respond to security incidents, mitigate risks, and ensure compliance with industry regulations. It is critical for businesses and individuals to safeguard against cyberattacks, data breaches, and other security vulnerabilities.
IT Management Software
IT management software is software used to help organizations and IT teams improve operational efficiency. It can be used for tasks such as tracking assets, monitoring networks and equipment, managing workflows, and resolving technical issues. It helps streamline processes to ensure businesses are running smoothly. IT management software can also provide accurate reporting and analytics that enable better decision-making.
  • 1
    True Defense

    True Defense

    True Defense

    True Defense specializes in providing efficient, cost effective, solutions for our customers by integrating our design capabilities with our extensive business and technical experience.
    Starting Price: $19.95/month
  • 2
    FastPass SSPR

    FastPass SSPR

    FastPassCorp

    ...Tailored to individual user groups based on security policies, this solution incorporates information about the user's device usage and multi-factor authentication (MFAs), creating a robust defense against hackers. FastPass SSPR provides an advanced self-service solution for password resets and unlocks. It seamlessly supports passwords from AD, Entra, SAP, IBM, Oracle, LDAP, and other systems. All types of MFA and manager approval for verification.
    Starting Price: $0.20/user/month
  • 3
    XGen Security

    XGen Security

    Trend Micro

    Go beyond next-gen with XGen™ security, a new class of security software that addresses the full range of ever-changing threats—now and in the future. Instead of using separate, siloed security solutions that don’t share information, XGen™ security provides a cross-generational blend of threat defense techniques and a connected threat defense that can protect your organization from all of the unseen threats.
  • 4
    BloxOne Threat Defense
    BloxOne Threat Defense maximizes brand protection by working with your existing defenses to protect your network and automatically extend security to your digital imperatives, including SD-WAN, IoT and the cloud. It powers security orchestration, automation and response (SOAR) solutions, slashes the time to investigate and remediate cyberthreats, optimizes the performance of the entire security ecosystem and reduces the total cost of enterprise threat defense. ...
  • 5
    Epicor Kinetic

    Epicor Kinetic

    Epicor Software

    ...Kinetic supports the needs of leading manufacturers across multiple industries, including Industrial Machinery, Fabricated Metals, Electronics and High Tech, Plastics and Rubber, Automotive, Aerospace and Defense, Medical Device, Consumer Products, Furniture and Fixtures, Measuring and Controlling Devices, and more. Embrace future-ready business, digital transformation, and flexible deployment with this singular, AI-powered ERP solution.
  • 6
    PowerDMARC

    PowerDMARC

    PowerDMARC

    PowerDMARC is a comprehensive email security solution designed to protect your brand reputation and safeguard your email communications. By leveraging advanced technologies such as DMARC, SPF, DKIM, BIMI, MTA-STS, and TLS-RPT, PowerDMARC offers a robust defense against email threats like spoofing, phishing, and ransomware. Our user-friendly platform simplifies complex configurations, empowering you to easily manage and monitor your email security posture. With AI-powered threat intelligence, you gain valuable insights to proactively identify and mitigate emerging threats. Trusted by over 2000 organizations globally, including Fortune 100 companies and governments, PowerDMARC is your trusted partner in securing your email infrastructure.
    Starting Price: $8 per month
    Partner badge
  • 7
    Infocon Systems

    Infocon Systems

    Infocon Systems

    ...Our user-friendly web service and our team of EDI specialists will ensure that your EDI experience is easy, simple, and painless. We provide EDI services for companies in all sectors of the global economy . These industries include retail, grocery, automobile, transportation, defense, healthcare, pharmaceuticals, and agriculture to name a few. Specifically, in the Defense industry, we provide EDI services with trading partners such as the Army Airforce Exchange.
  • 8
    CMstat

    CMstat

    CMstat

    ...CMstat’s EPOCH DM data management software is a rapidly deployable and quickly usable solution for the management of all the contract data deliverables, like CDRLs and SDRLs, associated with government programs and commercial projects in the aviation, aerospace, defense, marine, naval, transportation, mobility, and heavy equipment industries.
    Starting Price: $60,000 one-time payment
  • 9
    Quantum Armor

    Quantum Armor

    Silent Breach

    Your attack surface is the sum of every attack vector that can be used to breach your perimeter defenses. In other words, it is the total quantity of information you are exposing to the outside world. Typically, the larger the attack surface, the more opportunities hackers will have to find a weak link which they can then exploit to breach your network. Professional hackers typically follow the cyber kill chain when attacking a target, and surveying the target's attack surface is normally the very first step in this process; what is known as advanced reconnaissance. ...
    Starting Price: From $49/asset/month
  • 10
    MonoDefense

    MonoDefense

    KeepSolid

    Protect your online data, privacy, and way of life in one hit of a button. MonoDefense is a bundle of security apps that aim to protect all areas of your digital life. Store your account credentials, safeguard browsing activity, defend against suspicious DNS traffic, and unblock access to the desired content with these 4 ultimate solutions. Render any online surveillance and spying after you is impossible. Ensure secure web-surfing, untraceable data exchange, and anonymous communications on social media, forums, etc. ...
    Starting Price: $11.99 per month
  • 11
    Trend Micro Mobile Security
    Stay safe, no matter where you go or what you do. Enjoy advanced security and privacy. Live your mobile life more safely with powerful protection for all your mobile devices. Improve performance. Take advantage of optimization features to make your mobile devices work better. Avoid online scams and fraud. Flag malicious phishing emails and scam websites. Trust in experience. Enjoy peace of mind thanks to mobile solutions built on nearly 30 years of security expertise. Stop threats, rely on...
    Starting Price: Free
  • 12
    IPVanish

    IPVanish

    IPVanish

    ...Keep your internet activity private with our anonymous IP addresses, and we’ll help keep network hackers, ISPs, and advertisers out of your connection. Secure your Wi-Fi connection and armor your location data with VPN. The best data defense pairs security with convenience. Safeguard access to your most important files with encrypted backup, automated syncing, and remote wiping controls.
    Starting Price: $3.99 per month
  • 13
    ManageEngine Endpoint Central
    ...Its next-gen antivirus (NGAV) feature, powered by AI-driven behavioural detection, provides 24/7 protection against ransomware, malware, and zero-day threats. Endpoint Central further strengthens enterprise defenses with a broad set of security capabilities, including vulnerability assessment and mitigation, peripheral device control, data loss prevention, application control, endpoint privilege management, encryption with FileVault and BitLocker, and browser security.
    Starting Price: $795.00/one-time
  • 14
    Nasdaq Boardvantage
    ...Create single or multi-day meetings in seconds, add details, attach files, track board member attendance, and initiate remote meetings. Protect information with encryption and multiple layers of defense to protect the confidentiality, integrity, and availability of data. Quickly build and distribute Board and Committee Evaluations, Conflict of Interest, and general questionnaires. Manage files, contacts, approvals, signatures, unanimous written consents, and more. Manage collaboration with notifications, annotations, unanimous consent votes, e-signatures, and in-app email with added security. ...
  • 15
    Cynet All-in-One Cybersecurity Platform
    Cynet empowers MSPs and MSSPs with a comprehensive, fully managed cybersecurity platform that consolidates essential security functions into a single, easy-to-use solution. Cynet simplifies cybersecurity management, reduces operational overhead, and lowers costs by eliminating the need for multiple vendors and complex integrations. The platform provides multi-layered breach protection, offering robust security for endpoints, networks, and SaaS/Cloud environments. Cynet’s advanced...
  • 16
    Game Warden

    Game Warden

    Second Front Systems

    Meeting the security and compliance requirements to deliver SaaS solutions to the Department of Defense is a daunting task, often taking years and costing millions of dollars to accomplish. This barrier drives away countless commercial software companies from working with the DoD, and prevents the military, the world’s largest procurer of IT, from buying high quality commercial SaaS products. Second Front Systems’ Game Warden DevSecOps platform and secure cloud hosting environment removes the burden from commercial software companies by enabling them to leverage our security controls and DoD-approved platform to accelerate software delivery. ...
  • 17
    Fortifyedge IoT Platform
    ...Employing our IoT edge computing, tiny machine learning to detect anomalies wherever your assets reside. Fortifyedge is a USAF AFWERX SBIR Awardee, USAF TechStars Accelerator Alumni Company and Multi Award winner for Cyber and Physical security for defense, critical infrastructure and NIST, Behavioral Authentication for first responders. Protecting your critical infrastructure Fortifyedge IoT Platform. Improved situational awareness of responding personnel for incident awareness and analysis. Positive identification at entry control points and then track individual personnel in the secure zone
  • 18
    Abusix Mail Intelligence
    Abusix Mail Intelligence is an innovative set of blocklists (RBL/DNSBL) that adds real-time threat data to your existing email protection. Considered as the first line of defense, blocklists help to prevent email-borne threats such as spam and malware from entering your network. We’re the first line of defense for your mail servers which allows you to save bandwidth and CPU caused by the more costly in-depth spam and virus analysis required for later content filtering. Abusix Mail Intelligence prevents outbound spam by helping you identify risky or compromised accounts by using our AuthBL. ...
  • 19
    11:11 Cloud Backup

    11:11 Cloud Backup

    11:11 Systems

    Internal and external threats to data are on the rise. This is why smart organizations are deploying “defense in depth” strategies to ensure quick recovery of data. iland Secure Cloud Backup provides integrated, secure, and cost-effective protection for your on-premises and cloud data, including Microsoft 365 data, to ensure you are back online following a data loss event. With multiple layers of defense including security, cloud backup, and air-gapped Insider Protection, iland Secure Cloud Backup can help customers remove single points of failure to minimize the time and business impact of data loss. ...
  • 20
    ESET PROTECT Elite
    ESET PROTECT Elite is an enterprise-grade cybersecurity solution that integrates extended detection and response with comprehensive multilayered protection. It offers advanced threat defense using adaptive scanning, machine learning, cloud sandboxing, and behavioral analysis to prevent zero-day threats and ransomware. The platform includes modern endpoint protection for computers and smartphones, server security for real-time data protection, and mobile threat defense. It also features full disk encryption, helping organizations comply with data protection regulations. ...
    Starting Price: $275 one-time payment
  • 21
    Datto SIRIS

    Datto SIRIS

    Datto, a Kaseya company

    ...Born for the MSP with a cloud first architecture that delivers an all-in-one solution that spans backup to DRaaS, all administered from a secure, multi-tenant cloud portal. Immutable backups and the secure Datto Cloud make SIRIS your best line of defense against ransomware. Patented Inverse Chain Technology™ fundamentally changes the way backup and recovery is done allowing for every incremental snapshot to be a fully constructed recovery point. Does deleting backups either accidentally or maliciously mean you can’t recover? Think again with Cloud Deletion Defense™ that undeletes the unthinkable.
  • 22
    AMPRO

    AMPRO

    AMPRO Software

    The AMPRO suite of products is Australian-made and owned maintenance software solutions servicing a diverse range of industries. These industries include water treatment, electricity distribution, food production, mining, drilling, farming, hotels and resorts, defense departments and companies servicing the department of defense, marine and facilities to name just a few. AMPRO Applications offers the stress-free hosting solution, allowing you to concentrate on what you do and we worry about ensuring you have 99% up-time of your AMPRO Server. AMPRO Remote is the app that allows you to take your work with you. ...
    Starting Price: $2675 one-time payment
  • 23
    Cisco Secure Email Threat Defense
    Advanced protection to safeguard your inboxes. Email is still the No. 1 threat vector. Expand the scope of your defenses to detect dangerous threats and rapidly respond to and remediate new threats in real time. Identify the malicious techniques used in attacks targeting your organization. Understand the specific business risks and categorize threats to gain insight into the parts of your organization that are most vulnerable to attack. AI-driven threat detection uses multiple detection engines to simultaneously evaluate different portions of an incoming email. ...
  • 24
    Trellix ePolicy Orchestrator (ePO)
    Benefit from a centralized security management platform that helps orchestrate and manage all your endpoints, from a single console. Unify defense strategy, bring together different endpoints with native controls and reduce security operations dependency on multiple tools. Comprehensive platform, helps security operations teams to plan and scale their operations model all while benefiting from true API integrations. Threat Intelligence Exchange (TIE) and Advanced Threat Defense (ATP) integrations helps in effective sandboxing and thus identifying and stopping cyber attacks beforehand. ...
  • 25
    AssetSmart

    AssetSmart

    AssetSmart

    Founded in 1971, AssetSmart provides a comprehensive suite of integrated asset management, service management, and material management solutions for aerospace, defense, electronics, manufacturing, and government organizations. AssetSmart is owned by PMSC and is based at 31355 Oak Crest Drive, Suite 100, Westlake Village, CA 91361. AssetSmart has been supporting some of the largest defense and IT integrators for over 30 years. Leveraging forty years of asset management solutions experience, AssetSmart® delivers 360-degree asset portfolio visibility and cross-functional process automation in an integrated, enterprise-class application suite. ...
  • 26
    Shield34

    Shield34

    Shield34

    ...Continue working with your existing Selenium scripts. Create new scripts using Selenium API. Addresses the Selenium flaky tests issues by using self healing, smart defenses, error recovery mechanisms and dynamic element locators. Provides AI based anomaly detection and root cause analysis to quickly analyze failed tests and see what changed and what caused the failure. Eliminate Flaky Tests. Flaky tests are a huge pain! Shield34 adds defense-and-recovery AI algorithms to every Selenium command, including dynamic element locator, eliminating false positive results, driving self-healing and maintenance-free testing. ...
  • 27
    ijura

    ijura

    ijura

    Ijura Enterprise is a cloud-deployed next-generation mobile threat defense solution that protects end-user devices and IoT in the data network. Our cloud-based solution protects smartphones, laptops (with SIM), tablets, and IoT devices from malicious content and cybercriminal threats. With three patents already filed, our innovation addresses mobile security in a holistic fashion. This means we solve the vulnerabilities where sophisticated attacks bypass security layers while ensuring the end-user has a seamless experience when accessing their corporate data and personal apps. ...
  • 28
    ESET Cloud Office Security
    ...New users are protected automatically. Provides advanced protection for Microsoft 365 applications against malware, spam, or phishing attacks with ultimate zero-day threat defense and an easy-to-use cloud management console. Now using an enhanced, award-winning engine with improved performance, this essential component filters all spam emails and keeps user mailboxes free of unsolicited or undesired messages.
    Starting Price: $119.50 per year
  • 29
    Proofpoint Email Protection
    ...And it detects and blocks threats that don’t involve malicious payload, such as impostor email—also known as business email compromise (BEC)—using our Advanced BEC Defense. You can also automatically tag suspicious email to help raise user awareness. And you can track down any email in seconds.
  • 30
    Keeper Security

    Keeper Security

    Keeper Security

    Keeper Security is transforming the way people and organizations around the world secure their passwords and passkeys, secrets and confidential information. Keeper’s easy-to-use cybersecurity platform is built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Keeper’s solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance. Trusted by millions of individuals and...
    Leader badge
    Starting Price: $2.00 per user, per month
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • Next