Best IT Security Software in Germany - Page 10

Compare the Top IT Security Software in Germany as of November 2025 - Page 10

  • 1
    NextDNS

    NextDNS

    NextDNS

    NextDNS protects you from all kinds of security threats, blocks ads and trackers on websites and in apps and provides a safe and supervised Internet for kids, on all devices and on all networks. Determine your threat model and fine-tune your security strategy by enabling 10+ different types of protections. Use the most trusted threat intelligence feeds containing millions of malicious domains, all updated in real-time. Go beyond the domain, we analyze DNS questions and answers on-the-fly (in a matter of nanoseconds) in order to detect and block malicious behavior. With usually only a few hours between domain registration and the start of an attack, our threat intelligence system is built to catch malicious domains earlier than classic security solutions. Block ads and trackers on websites and in apps, including the most devious ones. Use the most popular ads & trackers blocklists, millions of domains all updated in real-time.
    Starting Price: $39 per month
  • 2
    Faddom

    Faddom

    Faddom

    Faddom offers real-time, agentless application dependency mapping to give IT teams instant, risk-free visibility into hybrid environments. No credentials, no software installs, and no firewall changes. Faddom maps servers, applications, cloud resources, and traffic flows within an hour of deployment. This always-live mapping supports security audits, change impact analysis, cloud migration, IT documentation, and incident response. Faddom provides continuous infrastructure clarity without disruption, enabling better planning, control, and compliance. Trusted by organizations across industries, Faddom is built for speed, security, and simplicity. Deploy fast. Discover more. Stay in control.
    Starting Price: $0
  • 3
    Hakware Archangel
    Hakware Archangel is an Artificial Intelligence based vulnerability scanner and pentesting tool. Archangel scanner enables organizations to monitor their networks, systems, and applications for security vulnerabilities with advanced Artificial intelligence continuously testing your environment. Why use Archangel? -Identify vulnerabilities before cyber criminals do -Our vulnerability scanning mitigates the risks of a data breach, which will come with a range of costs, including remediation, the loss of customers as a result of reputational damage and fines -Vulnerability scanning is not explicitly required by the GDPR (General Data Protection Regulation) or POPI (Protection Of Personal Information Act), but the -Regulation does require organisations that process personal data to ensure that they have implemented appropriate technical and organisational security measures – which includes identifying vulnerabilities -The international standard for information security, ISO 27001
    Starting Price: $100
  • 4
    Atomic Mail

    Atomic Mail

    Atomic Mail

    Atomic Mail is a secure and user-centric email hosting provider, dedicated to offering privacy-first email services. With features such as alias creation, robust security measures, and seamless account recovery, AtomicMail ensures your email experience is both private and hassle-free. Creation of Aliases (Hide-my-email): Maintain your privacy by creating multiple email aliases; Spam Free, No Ads; Email Password Protection; End-to-End Encryption: only you and your intended recipient can read the message; Zero Access Encryption: Atomic Mail cannot access your emails; Account Recovery with Seed Phrase: Recover access to your account with a unique seed phrase. Can regain control of your email account without compromising security.
    Starting Price: $0
  • 5
    CurrentWare

    CurrentWare

    CurrentWare

    Protect your business with our simple employee monitoring & security solutions. Protect your sensitive data with the robust data loss prevention and user activity monitoring features in the CurrentWare suite. Block unauthorized USB devices to prevent data theft, proactively block high-risk websites, monitor computer activity for anomalous behavior, and more. CurrentWare’s workplace internet filtering and monitoring software prevents the misuse of the internet in the workplace. Effortlessly restrict internet access and track employee web browsing to enforce your internet use policies. Use CurrentWare’s remote workforce management software to improve the productivity and security of your employees, no matter where they work. With CurrentWare you can monitor remote employee internet usage, block websites, and restrict USBs even when PCs disconnect from your network. Whether on-campus or taken home, CurrentWare’s computer monitoring and web filtering for schools ensures student safety.
    Starting Price: $14 PUPM
  • 6
    NxFilter

    NxFilter

    NxFilter

    NxFilter is a free, lightweight DNS filtering solution designed to deliver excellent performance without causing latency issues in your network. It offers advanced features such as Active Directory integration, DNS over HTTPS support, screen time management, data caps, user-level reporting, remote user filtering, and clustering. NxFilter is suitable for various environments, including commercial enterprises, nonprofits, schools, hospitals, and family protection, providing multiple filtering policies based on users and groups. The software caches DNS responses from upstream servers, reducing DNS traffic and enhancing efficiency. It supports user authentication methods, including Active Directory integration, and offers URL keyword filtering to block specific search terms in search engines. NxFilter is known for its stability, often running for months without requiring restarts, and is scalable to accommodate several thousand users.
    Starting Price: Free
  • 7
    BrowserTotal

    BrowserTotal

    BrowserTotal

    BrowserTotal is a free web-based tool designed to help cybersecurity professionals assess and strengthen browser security. It performs over 120 security tests directly within the browser, analyzing configurations, vulnerabilities, and phishing resilience using built-in AI-driven insights. The platform can evaluate browser extensions, plugins, and even packages, identifying potential risks through static and dynamic analysis powered by large language models. Additionally, BrowserTotal includes a secure sandbox for safely inspecting suspicious URLs and offers a feature for cloning and simulating phishing pages for training and testing purposes. Overall, BrowserTotal provides comprehensive browser security analysis, actionable recommendations, and interactive threat simulations without requiring any software installation or setup.
    Starting Price: $0
  • 8
    Dynatrace

    Dynatrace

    Dynatrace

    The Dynatrace software intelligence platform. Transform faster with unparalleled observability, automation, and intelligence in one platform. Leave the bag of tools behind, with one platform to automate your dynamic multicloud and align multiple teams. Spark collaboration between biz, dev, and ops with the broadest set of purpose-built use cases in one place. Harness and unify even the most complex dynamic multiclouds, with out-of-the box support for all major cloud platforms and technologies. Get a broader view of your environment. One that includes metrics, logs, and traces, as well as a full topological model with distributed tracing, code-level detail, entity relationships, and even user experience and behavioral data – all in context. Weave Dynatrace’s open API into your existing ecosystem to drive automation in everything from development and releases to cloud ops and business processes.
    Starting Price: $11 per month
  • 9
    ConnectWise Cybersecurity Management
    Define and Deliver Comprehensive Cybersecurity Services. Security threats continue to grow, and your clients are most likely at risk. Small- to medium-sized businesses (SMBs) are targeted by 64% of all cyberattacks, and 62% of them admit lacking in-house expertise to deal with security issues. Now technology solution providers (TSPs) are a prime target. Enter ConnectWise Cybersecurity Management (formerly ConnectWise Fortify) — the advanced cybersecurity solution you need to deliver the managed detection and response protection your clients require. Whether you’re talking to prospects or clients, we provide you with the right insights and data to support your cybersecurity conversation. From client-facing reports to technical guidance, we reduce the noise by guiding you through what’s really needed to demonstrate the value of enhanced strategy.
  • 10
    LoginRadius

    LoginRadius

    LoginRadius

    LoginRadius empowers businesses to deliver a delightful customer experience without compromising security. Using our customer identity platform, companies can offer a streamlined login process while protecting digital accounts and complying with data privacy regulations. LoginRadius serves over 3,000 businesses with a monthly reach of 700 million users worldwide. Key platform features include registration services, adaptive security, integration with third-party applications, and customer insights. The company has been named an industry leader in customer identity and access management (CIAM) by Gartner, KuppingerCole, and Computer Weekly. Microsoft is a major technology partner and investor. LoginRadius is headquartered in Vancouver, Canada, with additional offices in Toronto, USA, United Kingdom, Australia, and India. LoginRadius Services: API Authentication OAuth Data Management Secure Login Single Sign On SAML SSO Social Sign On Two Factor Authentication
  • 11
    F-Secure Anti-Virus
    You need advanced detection and protection technology to protect your computer against modern and complex threats. F‑Secure Anti‑Virus provides protection against viruses, spyware, infected email attachments and other malware. Automatic updates and real-time response guarantee the fastest protection against all new threats. F‑Secure Anti‑Virus is easy to install and it does not slow down your computer. Protect your PC against viruses, spyware and other malware. Keep your security always up to date with automatic updates. Make sure you have advanced malware removal technology. Use your computer safely without slowing it down.
    Starting Price: $35.99 per year
  • 12
    LogMeIn Central
    LogMeIn Central is a powerful remote monitoring and management (RMM) platform designed to help IT teams maintain and secure their infrastructure from anywhere. It offers fast, reliable remote access for both PCs and Macs via mobile devices or desktops, enabling seamless support regardless of location. The platform provides features such as user management with group permissions, two-factor authentication, and computer grouping by location or function. LogMeIn Central integrates antivirus management powered by Bitdefender and a security center to help mitigate risks and prevent unauthorized data access. It also monitors computer health to detect critical issues and ensure smooth operation. Suitable for internal IT teams and managed service providers, it enables efficient management of endpoints through a single dashboard.
  • 13
    Cisco Meraki
    Network security is hard. Current solutions are complex and tedious to implement. Learn how to simplify security with Cisco Meraki! Trusted by influential brands around the world. With over a million active networks and counting, organizations far and wide count on Meraki to help deliver premium, reliable experiences. All Cisco Meraki devices are centrally and securely managed from the cloud using a single web-based dashboard. Our feature-rich, intuitive architecture enables customers to save time, reduce operating costs, and solve new business problems. The industry standard for easy-to-manage, fast and dependable Wi-Fi. Protect and securely connect what matters most, regardless of location. Uncompromising performance and reliability at the heart of your network. Remote monitoring and identity-based configuration for all your devices.
    Starting Price: $40.00
  • 14
    BrainStorm QuickHelp
    Equip your team with the only learning platform that’s purpose-built for software adoption. Accelerate onboarding, reduce support, deepen engagement, and grow usage. Whether you’re a Solution Provider onboarding new clients, an IT team needing a more scalable way to manage end-user training, or an L&D team focused on onboarding employees to the company tech stack, BrainStorm will make your job easier, and your results better. Activate dark users – BrainStorm is the only learning platform that proactively targets licensed users who haven’t logged in yet. When you convert dark users, your usage impact moves from incremental to exponential. Accelerate adoption – Don’t just teach users how, teach them when and why to use features and applications. BrainStorm is built to automate training that gets people to change the way they work. Expand feature use – Drive deeper and broader feature adoption. Help more users move beyond the basics.
  • 15
    Avast Free Antivirus
    Get award-winning free antivirus that comes with advanced privacy and security tools. Avast Free Antivirus can help protect you against advanced online threats, backed by one of the globe’s biggest Cyber Safety networks. And we’ve been proud winners of different awards over the years. Avast Free Antivirus is more than just an antivirus — it also includes these specialist tools: • 6 layers of security - Effortlessly run smart scans on software, files, and apps to help find vulnerabilities, plus analyze suspicious files in the cloud, get threat alerts, and more. • Wi-Fi network security - Connect more safely to any Wi-Fi network, even unsecured public networks, plus see who’s using your home Wi-Fi and help block intruders with a click. • Protection against ransomware attacks - Help protect your information. Don't let your personal photos, files, and documents fall victim to hackers using ransomware. • Easy to install and use
    Starting Price: $0
  • 16
    Trust Swiftly

    Trust Swiftly

    Trust Swiftly

    Only ask what you need to with 10 identity verification methods. Trusted by businesses that block more than 1% of transactions or spend more than 1-hour reviewing customers. Approve more real customers while blocking fraudulent users and risky transactions. Automate identity proofing and populate fraud solutions with more user data. Accept or reject based on user data and leverage it to fight chargebacks. Building a system for reviews or enhanced user authentication takes a lot of time. With Trust Swiftly, we provide multiple methods for your customers to verify themselves and automatically populate it in Sift, allowing for robust workflows. Whether you are an eCommerce store, app, or marketplace, we have the verification levels for you. Require verification adaptively depending on Sift scores or business rules by applying friction smartly.
    Starting Price: $0.01 per verification
  • 17
    Canary Mail

    Canary Mail

    Canary Mail

    Email, meet AI. Canary can write your emails, prioritize what needs attention, silence spam & much more. Say hello to your Inbox Copilot!
    Starting Price: $20/month
  • 18
    Checkpoint Anti-Spam and Email Security

    Checkpoint Anti-Spam and Email Security

    Check Point Software Technologies

    Check Point Anti-Spam & Email Security provides comprehensive protection for messaging infrastructure. A multidimensional approach protects email infrastructure, provides highly accurate anti-spam coverage and defends organizations from a wide variety of virus and malware threats delivered within email. Comprehensive email security with 97% spam detection. Advanced anti-spam protection, including content-based and via IP reputation. Offers antivirus protection with both zero-hour and signature-based detection. Email IPS protection against Denial of Service (DoS), buffer over-flow attacks. Simplified configuration and management of mail security. Simple configuration with low management-overhead. Full user control with no user installation required. Real-time detection and updates provide immediate protection from outbreaks. Integrated into the Check Point Infinity Architecture. Activate Anti-spam and email security on any check point security gateway.
  • 19
    Zscaler

    Zscaler

    Zscaler

    Zscaler, creator of the Zero Trust Exchange platform, uses the largest security cloud on the planet to make doing business and navigating change a simpler, faster, and more productive experience. The Zscaler Zero Trust Exchange enables fast, secure connections and allows your employees to work from anywhere using the internet as the corporate network. Based on the zero trust principle of least-privileged access, it provides comprehensive security using context-based identity and policy enforcement. The Zero Trust Exchange operates across 150 data centers worldwide, ensuring that the service is close to your users, co-located with the cloud providers and applications they are accessing, such as Microsoft 365 and AWS. It guarantees the shortest path between your users and their destinations, providing comprehensive security and an amazing user experience. Use our free service, Internet Threat Exposure Analysis. It’s fast, safe, and confidential.
  • 20
    CloudBees

    CloudBees

    CloudBees

    CloudBees is a complete software delivery platform. Self-service scalable, repeatable, compliant workflows help developers innovate faster. See how we help you release faster better safer software. Manage, release, and measure features at scale. Visibility should be more than a singular pipeline. Orchestrate your software delivery business end to end. Learn why 'meta' orchestration is a game-changer. Measure, analyze, and communicate how software delivery impacts business performance. Get answers about software delivery analytics. Ensure assets are always compliant at every stage, including in production, and automatically know what risks must be addressed. Stop rewriting scripts, fixing bugs, and waiting for builds. Serve yourself with fast, secure workflows, and feature management. Automatically enforce governance, security, and compliance without hindering flexibility. You're confident and developers are happier. Treat software delivery as a business. Proactively manage risk.
  • 21
    Trend Vision One

    Trend Vision One

    Trend Micro

    Stopping adversaries faster and taking control of your cyber risks starts with a single platform. Manage security holistically with comprehensive prevention, detection, and response capabilities powered by AI, leading threat research and intelligence. Trend Vision One supports diverse hybrid IT environments, automates and orchestrates workflows, and delivers expert cybersecurity services, so you can simplify and converge your security operations. The growing attack surface is challenging. Trend Vision One brings comprehensive security to your environment to monitor, secure, and support. Siloed tools create security gaps. Trend Vision One serves teams with these robust capabilities for prevention, detection, and response. Understanding risk exposure is a priority. Leveraging internal and external data sources across the Trend Vision One ecosystem enables greater command of your attack surface risk. Minimize breaches or attacks with deeper insight across key risk factors.
  • 22
    Xenex

    Xenex

    XeneX.ai

    XeneX combines a highly flexible total solution with deeply integrated security tools and the peace-of-mind provided by 24/7 availability of world-class security experts. Gartner’s SOC Visibility Triad is a multi-component approach to network-centric threat detection & response. XeneX takes this one step further with its innovative SOC-as-a-Service solution that evolves from “data and dashboards” towards “clarity and correlation. XeneX’s Security Operations Center-as-a-Service integrates virtually everything needed, “out of the box” including our powerful, proprietary XDR+ engine. This is a complete Cloud Security Operation Center (SOC) solution and an advanced global security team providing total peace-of-mind. XeneX integrates powerful cross-correlation (XDR) technologies that take threat detection and response to the next level. Read on below to find out more.
  • 23
    SafeNetClub

    SafeNetClub

    SSH Invest Holding GmbH

    SafeNetClub is an antivirus software that protects your PC against cyber threats. The application is connected with a realtime virus database to scan the system, all incoming traffic and files to avoid damage of the computer, spy attacks and data theft. SafeNetClub blocks all attempts to steal user related data like passwords, credit card details and other sensitive information of the user from being stolen in Internet. SafeNetClub is easy to install and provides a simple user-friendly interface. The system check can be started on click, but is also active in background while you are surfing in internet. If you visit a suspicious website that would trying to attempt your personal data or sending to your PC a spy virus, it will be blocked. The virus database will be updated daily. SafeNetClub is designed to provide the best security by using the lowest CPU of your PC as possible. Your hardware will not be overloaded by the system files running on background.
    Starting Price: $10 per month
  • 24
    Seceon

    Seceon

    Seceon

    Seceon’s platform enables over 250 MSP/MSSP partners and their 7,000 customers to reduce risks and run efficient security operations. Cyber attacks and insider threats are rampant across many industries. Seceon streamlines security operations with a single pane of glass featuring full visibility of all attack surfaces, prioritized alerts, and easy-to-automate responses for remediating attacks and breaches. The platform also includes continuous compliance posture management and reporting. Seceon aiSIEM, combined with aiXDR, is a comprehensive cybersecurity management platform that visualizes, detects ransomware detection, and eliminates threats in real-time, with continuous security posture improvement, compliance monitoring and reporting, and policy management.
  • 25
    WatchGuard Endpoint Protection Platform (EPP)
    The WatchGuard EPP product goes beyond signature-based antivirus to stop malware, ransomware and threats that leverage unknown, zero day vulnerabilities. Even better, it's managed with an intuitive Cloud-based console and lightweight agent that doesn't interfere with endpoint performance. Endpoints are protected from viruses, malware, spyware and phishing with WatchGuard EPP. We use a comprehensive set of security techniques including signatures, local cache, and even our own proprietary intelligence feeds derived from the malware previously detected with our EDR products. This enables us to find zero day exploits using behavioral heuristics and known indicators of attacks as “contextual rules." WatchGuard EPP centralizes next-generation antivirus for all your Windows, macOS and Linux desktops, laptops, and servers, in addition to the leading virtualization systems.
  • 26
    FortiClient

    FortiClient

    Fortinet

    Multilayered endpoint security with behavior based analysis for prevention against known and unknown threats. Complete real-time visibility of all your global software inventory. Here, there, anywhere. Cloud-delivered FortiClient endpoint protection service designed for small and medium-sized business. Integrated endpoint protection platform that provides automated next-generation threat protection, visibility and control of your software and hardware inventory across the entire security fabric. Identify & remediate vulnerable or compromised hosts across your attack surface. As a key piece of the Fortinet Security Fabric, FortiClient integrates endpoints into the fabric for early detection and prevention of advanced threats. Security events including zero-day malware, botnet detections, and vulnerabilities are reported in real-time.
  • 27
    SV3

    SV3

    Building Intelligence

    SV3 is a cloud-based, SAFETY-Act-certified software solution that enables secure access for visitors, vehicles and vendors. Whether it be at the lobby or loading dock of a building, warehouse or multi-tenanted environment, SV3's trusted access program ensures safe operations without gaps in your security system.
  • 28
    Mimecast Advanced Email Security
    Mimecast Advanced Email Security is a robust solution designed to protect organizations from a wide range of email-based threats, including phishing, malware, impersonation attacks, and spam. Leveraging cutting-edge AI and machine learning, Mimecast provides real-time threat detection and prevention to safeguard sensitive information and ensure business continuity. It offers advanced filtering and scanning of incoming and outgoing emails, reducing the risk of data breaches, and helps organizations comply with regulatory requirements. With comprehensive reporting and management tools, Mimecast enables IT teams to efficiently monitor and respond to potential threats, making it a trusted choice for businesses seeking enhanced email security.
  • 29
    Proofpoint Email Protection
    Proofpoint Email Protection solutions—deployed as a cloud service or on-premises—protect against malware and threats that don't involve malware, including impostor email, or business email compromise (BEC). Granular email filtering controls spam, bulk "graymail" and another unwanted email. And continuity capabilities keep email communications flowing when your email server fails. Proofpoint Email Protection is the industry-leading email gateway, which can be deployed as a cloud service or on premises. It catches both known and unknown threats that others miss. Powered by NexusAI, our advanced machine learning technology, Email Protection accurately classifies various types of email. And it detects and blocks threats that don’t involve malicious payload, such as impostor email—also known as business email compromise (BEC)—using our Advanced BEC Defense. You can also automatically tag suspicious email to help raise user awareness. And you can track down any email in seconds.
  • 30
    Forcepoint DLP

    Forcepoint DLP

    Forcepoint

    Data protection does not have to get in the way of business productivity. Forcepoint’s focus on unified policies, user risk, and automation makes data security frictionless and intuitive. View and control all of your data with the industry's largest pre-defined policy library. Ensure regulatory compliance across 80+ countries for GDPR, CCPA and more. Deploy data classification with Boldon James and Azure Information Protection. Replace broad, sweeping rules with individualized, adaptive data security that doesn’t slow down your employees. Block actions only where you need to, and drive productivity. Protect PII and PHI, company financials, trade secrets, credit card data, and other pieces of sensitive customer data-even in images. Follow intellectual property (IP) in both structured and unstructured forms, and stop low & slow data theft even when user devices are off-network.