Best IT Security Software in Germany - Page 18

Compare the Top IT Security Software in Germany as of November 2025 - Page 18

  • 1
    Digital Defense
    Providing best-in-class cyber security doesn’t mean blindly chasing the latest trends. It does mean a commitment to core technology and meaningful innovation. See how our vulnerability and threat management solutions provide organizations like yours with the security foundation needed to protect vital assets. Eliminating network vulnerabilities doesn’t have to be complicated, even though that’s what some companies would have you believe. You can build a powerful, effective cybersecurity program that is affordable and easy to use. All you need is a strong security foundation. At Digital Defense, we know that effectively dealing with cyber threats is a fact of life for every business. After more than 20 years of developing patented technologies, we’ve built a reputation for pioneering threat and vulnerability management software that’s accessible, manageable, and solid at its core.
  • 2
    WebARX

    WebARX

    WebARX

    Protect websites from plugin vulnerabilities. WebARX is not just a security plugin – it is much more. Block malicious traffic with our lightweight web application firewall. Create your own firewall rules with WebARX firewall engine. Monitor your websites for possible security issues and vulnerabilities. WebARX is actively updated and helps you adapt the latest security practices. Generate weekly security reports and stay alerted when anything needs your immediate attention.
    Starting Price: $14.99 per month
  • 3
    Portnox Security

    Portnox Security

    Portnox Security

    Portnox CLEAR is the only cloud-native network access control (NAC) solution that unifies essential network and endpoint security capabilities: device discovery, network authentication, access control, network hardware administration, risk mitigation and compliance enforcement. As a cloud service, Portnox CLEAR eliminates the need for on-going maintenance such as upgrades and patches and requires no on-site appliances. As such, the platform can be easily deployed, scaled and managed by lean, resource-constrained IT teams across any corporate network - no matter how complex.
  • 4
    Amazon Cognito
    Amazon Cognito lets you add user sign-up, sign-in, and access control to your web and mobile apps quickly and easily. Amazon Cognito scales to millions of users and supports sign-in with social identity providers, such as Facebook, Google, and Amazon, and enterprise identity providers via SAML 2.0. Amazon Cognito User Pools provide a secure user directory that scales to hundreds of millions of users. As a fully managed service, User Pools are easy to set up without any worries about standing up server infrastructure. With Amazon Cognito, your users can sign in through social identity providers such as Google, Facebook, and Amazon, and through enterprise identity providers such as Microsoft Active Directory via SAML. Amazon Cognito User Pools is a standards-based Identity Provider and supports identity and access management standards, such as Oauth 2.0, SAML 2.0, and OpenID Connect. HIPAA eligible and PCI DSS, SOC, ISO/IEC 27001, ISO/IEC 27017, ISO/IEC 27018, and ISO 9001 compliant.
  • 5
    AWS IoT

    AWS IoT

    Amazon

    There are billions of devices in homes, factories, oil wells, hospitals, cars, and thousands of other places. With the proliferation of devices, you increasingly need solutions to connect them, and collect, store, and analyze device data. AWS has broad and deep IoT services, from the edge to the cloud. AWS IoT is the only cloud vendor to bring together data management and rich analytics in easy-to-use services designed for noisy IoT data. AWS IoT offers services for all layers of security, including preventive security mechanisms, like encryption and access control to device data, and service to continuously monitor and audit configurations. AWS brings AI and IoT together to make devices more intelligent. You can create models in the cloud and deploy them to devices where they run 2x faster compared to other offerings. Optimize operations by easily creating digital twins of real-world systems. Run analytics on volumes of IoT data easily—without building an analytics platform.
  • 6
    Akamai Cloud
    Akamai Cloud (formerly Linode) is the world’s most distributed cloud computing platform, designed to help businesses deploy low-latency, high-performance applications anywhere. It delivers GPU acceleration, managed Kubernetes, object storage, and compute instances optimized for AI, media, and SaaS workloads. With flat, predictable pricing and low egress fees, Akamai Cloud offers a transparent and cost-effective alternative to traditional hyperscalers. Its global infrastructure ensures faster response times, improved reliability, and data sovereignty across key regions. Developers can scale securely using Akamai’s firewall, database, and networking solutions, all managed through an intuitive interface or API. Backed by enterprise-grade support and compliance, Akamai Cloud empowers organizations to innovate confidently at the edge.
  • 7
    GoDMARC

    GoDMARC

    Neuailes Global Technologies

    Actively block phishing Boost Email Deliverability Get Visibility - DMARC. To secure your inbox and boost email deliverability check your domain status below. What is DMARC? DMARC is an email authentication protocol designed to offer email domain owners the ability to safeguard their dedicated domain from unauthorized usage. DMARC at a Glance Professional DMARC Services. The most commonly used technical term DMARC is the abbreviation for Domain-based Message Authentication Reporting & Conformance. It is a modus operandi that makes the use of Sender Policy Framework (SPF) and Domain Keys Identified Mail (DKIM) in order to identify the legitimacy of a message in the form of an email. Both SPF and DKIM play an important role and DMARC requires them for the specific purpose. It aims to improve and monitor domain protection from the varied fraudulent emails send by fraud minds active in the different corners of the world. With DMARC you can instruct receiving servers
    Starting Price: $144
  • 8
    Avatao

    Avatao

    Avatao

    Avatao’s security training goes beyond simple tutorials and videos offering an interactive job-relevant learning experience to developer teams, security champions, pentesters, security analysts and DevOps teams. With 750+ challenges and tutorials in 10+ languages, the platform covers a wide range of security topics across the entire security stack from OWASP Top 10 to DevSecOps and Cryptography. The platform immerses developers in high-profile cases and provides them with real, in-depth experience with challenging security breaches. Engineers will actually learn to hack and patch the bugs themselves. This way Avatao equips software engineering teams with a security mindset that increases their capability to reduce risks and react to known vulnerabilities faster. This in turn increases the security capability of a company to ship high-quality products.
  • 9
    Sophos Firewall
    The world's best visibility, protection, and response. Superior visibility into risky activity, suspicious traffic, and advanced threats helps you regain control of your network. Powerful next-gen protection technologies like deep learning and intrusion prevention keep your organization secure. Automatic threat response instantly identifies and isolates compromised systems on your network to stop threats from spreading. XG Firewall makes it easy to extend your secure network to employees anywhere. Sophos Connect provides an intuitive VPN connection client that’s easy to deploy and configure. Give your remote workers secure access to resources on the corporate network from Windows and macOS devices. Our small, ultra-affordable XG 86(w) and SD-RED devices provide the ultimate in SOHO protection with always-on dedicated or split-tunnel VPN that’s easy to deploy and manage with a variety of flexible options.
  • 10
    McAfee Small Business Security
    McAfee Small Business Security offers comprehensive protection and 24/7 technical support with easy, flexible security management. Protect the devices used for your business from the latest online threats. Guard your PCs, Macs, smartphones and tablets against viruses, malware and the latest online threats. Safeguard your customer data and sensitive information from hackers and thieves and keep your business's devices running at top performance without being weighed down by malware. McAfee Small Business Security includes protection for five PCs or Macs plus unlimited iOS and Android devices.* Increase the number of devices as your business grows to ensure you and your employees stay protected. Shield your Android devices from viruses, data loss and risky apps, and remotely track, lock or wipe a lost or stolen iOS or Android device. Keep your business and customer data protected with email, web and firewall protection. Block spam and dangerous emails.
    Starting Price: $94.99 per year
  • 11
    F5 BIG-IP Advanced WAF
    Advanced Web Application Firewall (WAF) protect your apps with behavioral analytics, proactive bot defense, and application-layer encryption of sensitive data. Use the ROI Estimator from F5 and Forrester to find out how Advanced WAF can improve your security posture and save you money. The F5 F5 BIG-IP Advanced WAF provides a powerful set of security features that will keep your Web Applications safe from attack. Many WAFs offer a basic level of protection from attack at the higher layers of the OSI stack, but the F5 Advanced WAF takes things even further and offers some serious security features like Anti Bot Mobile SDK, Credential Stuffing threat feeds, Proactive Bot Defense, and Datasafe to name a few. Protect your apps, APIs, and data against the most prevalent attacks such as zero-day vulnerabilities, app-layer DoS attacks, threat campaigns, application takeover, and bots.
  • 12
    Heimdal Patch & Asset Management
    Heimdal Patch & Asset Management is an automatic software updater and digital asset tracking solution that will automatically install updates based on your configured policies, without the need for manual input. As soon as 3rd party vendors release new patches, our technology silently deploys them to your endpoints, without the need for reboots or user interruption. In addition to this, Heimdal Patch & Asset Management allows your sysadmins to see any software assets in your inventory, alongside their version and number of installs. Users can also install software on their own, saving time and resources. Automating your patch management routine helps you save valuable time and resources. Heimdal Patch & Asset Management makes vulnerability and patch management cost-effective and time-efficient.
  • 13
    SafeNet Trusted Access
    SafeNet Trusted Access, Identity-as-a-Service. SafeNet Trusted Access is a cloud-based access management solution that makes it easy to manage access to both cloud services and enterprise applications with an integrated platform combining single sign-on, multi-factor authentication and scenario-based access policies. Businesses and organizations looking to accelerate the deployment of cloud services for end users encounter hurdles to efficiently managing online identities and access security, while ensuring user convenience and regulatory compliance. SafeNet Trusted Access simplifies user access to cloud services, streamlines cloud identity management, and helps eliminate password hassles for IT and users, while providing a single pane view of access events across your app estate to ensure that the right user has access to the right application at the right level of trust.
  • 14
    GamaShield

    GamaShield

    GamaSec

    Web applications and Web Malware are proving to be the weakest link in overall corporate security. Organizations need a Web application scanning solution that can scan for security loopholes in Web-based applications to prevent would-be hackers from gaining unauthorized access to corporate applications and data and to prevent the injection suspicious files and malware. GamaSec's Web application scanner, which protects applications and servers from hackers, is an automated security service that searches for software vulnerabilities within Web applications. A Web application scanner crawls the entire website, analyzes in-depth each & every file, and displays the entire website structure. The scanner performs an automatic audit for common security vulnerabilities while launching a series of simulated Web attacks.
  • 15
    Jamf Connect
    In an increasingly mobile workforce, with employees working from different locations on different devices, organizations need to be able to manage and secure those devices and their company information without the challenges of binding to on-premises Active Directory. With Jamf Connect, a user can unbox their Mac, power it on and access all of their corporate applications after signing on with a single set of cloud-identity credentials. See how cloud identity is changing Mac security and discover the vital role of Jamf Connect to facilitate the process. Download this overview to learn how Jamf Connect allows for simple provisioning of users from a cloud identity service during an Apple provisioning workflow, complete with multi-factor authentication. See the cost, time and resource savings of an identity management solution. As security and deployment needs evolve, businesses must adopt a new approach to identity as part of their enterprise strategy.
    Starting Price: $2 per user per month
  • 16
    Quad9

    Quad9

    Quad9

    Quad9 is a free service that replaces your default ISP or enterprise Domain Name Server (DNS) configuration. When your computer performs any Internet transaction that uses the DNS (and most transactions do), Quad9 blocks lookups of malicious host names from an up-to-the-minute list of threats. This blocking action protects your computer, mobile device, or IoT systems against a wide range of threats such as malware, phishing, spyware, and botnets, and it can improve performance in addition to guaranteeing privacy. The Quad9 DNS service is operated by the Swiss-based Quad9 Foundation, whose mission is to provide a safer and more robust Internet for everyone. When your devices use Quad9 normally, no data containing your IP address is ever logged in any Quad9 system.
  • 17
    Heimdal Ransomware Encryption Protection
    Heimdal Ransomware Encryption Protection is a revolutionary 100% signature-free component, ensuring market-leading detection and remediation of any type of ransomware, whether fileless or file-based. It can detect any encryption attempts without signatures or behavioral patterns. Your ransomware-free experience starts here. This module was engineered to be universally compatible with any antivirus. Ransomware Encryption Protection extends the functionality of your antivirus instead of displacing it. The module’s built-in white- and blacklisting capacities, allows Ransomware Encryption Protection to distinguish between autonomic and routine system-wide processes and malicious attempts, thus decreasing the false-positive rate.
  • 18
    Zemana AntiMalware
    Scan your PC in fast and effective way for malware, spyware, virus detection and removal. Detects and removes annoying browser add-on's, adware, unwanted apps and toolbar and any type of malware on your PC. We are developing this product based on your feedback. Don't let malware take away your PC! Zemana is a cyber-security company that keeps you safe from identity theft, credit card fraud, ransomware and other dangers of the online world. This is a privately held company, formed in 2007 by three college graduates. They wanted to offer more refined security solutions because at that time there were no products on the market that could defeat the rapidly growing level of new hacking variants. This is how our pioneer product Zemana AntiLogger came to life. Instead of just updating a virus database with known virus variants, Zemana AntiLogger was based on behavioral characteristics, so any unexpected and suspicious activity on a computer was blocked automatically.
    Starting Price: $24.95 per year
  • 19
    Glary Utilities

    Glary Utilities

    Glary Utilities

    Glarysoft's Glary Utilities is one of the most consistently popular and most frequently recommended system utilities. Restore your PC to peak performance with Glary Utilities Pro. Glary Utilities PRO is a powerful and top all-in-one utility to fix, speed up, maintain and protect your PC. It optimizes the performance of your computer, solves problems, protect your privacy and helps you to customize your system to suit your needs. Malware Hunter is an award-winning product that provides comprehensive protection against all types of threats, secures your data, protects your privacy and ensures your PC remains virus-free. Glarysoft Files Recovery is aimed at both beginners and experts who lost data. It allows users to restore files from the recycle bin, virus-damaged files, permanently deleted files, or even formatted lost. It not only recover from computers, USB-drives, but also from external memory cards, such as camera storage devices.
    Starting Price: $19.97 per year
  • 20
    Veeam Kasten for Kubernetes
    Leading Kubernetes Data Protection and Mobility Trusted by the world’s largest organizations, Veeam Kasten delivers secure, Kubernetes-native data protection and application mobility for the most complete set of distributions and platforms at enterprise scale. We give operations and application teams the confidence to withstand the unexpected and deliver faster, all without complex scripting, unsupported tools, and legacy solutions.
  • 21
    AxCrypt

    AxCrypt

    AxCrypt

    AxCrypt is an award-winning and easy to use, file and password encryption software, available on Windows, Mac, iOS and Android. Use AxCrypt to encrypt and protect your sensitive files, passwords and business data. AxCrypt comes with several unique features, including: ✅ Mobile Encryption ✅ Automatic Cloud Encryption ✅ Password Manager ✅ Automatic Encryption ✅ Encrypted File Sharing ✅ Master Key AxCrypt has been consistently awarded as the ‘Best Encryption Software’ by PC Mag for 7 years in a row, starting in 2016. AxCrypt is available on Windows, Mac, iOS and Android, and integrates with popular cloud storage providers such as Google Drive, OneDrive, and Dropbox. "Advanced encryption in a superbly simple setting" - PCMag Editor's choice 2023 With AxCrypt you easily and securely protect all your important files, in an interface that is clean and simple to use. AxCrypt implements strong AES-256 encryption.
    Starting Price: $3.63 per month
  • 22
    F5 BIG-IQ Centralized Management
    Effective management, orchestration, visibility, and compliance, relies on consistent app services and security policies across on-premises and cloud deployments. Easily control all your BIG-IP devices and services with a single, unified management platform. With 87 percent of organizations deploying apps in multiple clouds and architectures, effective management of applications, and the services and devices that power them is no small feat. Moreover, none of the customers surveyed in the 2020 State of Application Services Report could state with confidence the number of applications running in their deployment environments. This management challenge grows with ever-expanding application portfolios and the additional appliances and services needed to support them. Analyze, troubleshoot, auto-scale and control every app, service and F5 device (virtual and physical) in any environment, all from a centralized, role-specific single pane of glass.
  • 23
    ThreatDefence

    ThreatDefence

    ThreatDefence

    Our XDR (Extended Detection and Response) cyber security platform provides deep visibility and threat detection across your endpoints, servers, cloud and your digital supply chain. We deliver the platform to you as fully managed service supported by our 24×7 Security Operations, with low cost and fastest enrollment time in the industry. Our platform is the foundation of effective cyber threat detection and response services. Providing deep visibility, great threat detection, sophisticated behavior analytics and automated threat hunting, the platform adds efficiency and value to your security operations capability. Leveraging our proprietary detection methodologies, including AI-empowered machine learning, our platform uncovers suspicious and anomalous behavior revealing even the most hidden threats. The platform creates high fidelity detections, flagging real threats and assisting SOC analysts and investigators to focus on what really matters.
    Starting Price: $5 per user per month
  • 24
    Avira Antivirus Pro
    Welcome to best-in-class malware protection. Advanced detection system for preventing novel ransomware and zero-day exploits. Complete web protection for safe online shopping and banking. Enhanced performance to keep your system fast and optimized. Our intuitive interface gives you both control over your security and the freedom to automate all your tasks. Install with two clicks, scan with a click, or set it and forget it, it’s your choice. Buy and bank online, wherever you are. Next-level ID-theft protection means there won’t be any surprises on your bank statements. Blocks even the most sophisticated phishing attacks on your credit cards, bank details, and passwords. Immunizes you against banking trojans, infected websites, and fake shopping carts. Avira Antivirus Pro includes unlimited, complimentary access to customer support via a toll-free number or email, and offers you a no-ad policy for an optimum experience.
    Starting Price: $4.99 per month
  • 25
    Gridinsoft Anti-Malware
    Modern-day malware has adopted many different shapes and ways of attacking Windows and stealing the information we store on our PC or use to browse the Internet. That's why we offer you Gridinsoft Anti-malware, a tool developed to protect us.
    Starting Price: $29
  • 26
    Avast Ultimate
    As one of today’s most pressing cyberthreats, ransomware kidnaps your sensitive files and holds them hostage unless you pay up. To keep your files and data safe, learn what ransomware is, how it works, and how you can prevent it from infecting your devices with a world-class anti-malware tool like Avast One. Our most advanced protection is your lightest, toughest defense against viruses, ransomware, spyware, zero-second threats, home Wi-Fi network vulnerabilities, and more. Protect all of your phones, computers, and tablets with Avast Premium Security. Keep everything you do online completely private with our VPN’s bank-grade encryption — browse, bank, message, and shop without having to worry about hackers or anyone else seeing what you do online or stealing your data. Easily eliminate junk for a cleaner, faster, more efficient computer or phone. You’ll also get quick-glance overviews of your device’s health, one-click maintenance care, bloatware removal, and much more.
    Starting Price: $69 .99 per device per year
  • 27
    Jit

    Jit

    Jit

    DevOps ain’t easy! We are hearing more and more about the breakdown and friction where Dev meets Ops, so let’s not even talk about all the other shift-left domains that add another layer of complexity in the middle like DevSecOps. Where this comes with the need to implement and integrate dozens of security tools in their SDLC. But what if it doesn’t have to be difficult? Jit's DevSecOps Orchestration Platform allows high-velocity Engineering teams to own product security while increasing dev velocity. With a unified and friendly developer experience, we envision a world where every cloud application is born with Minimal Viable Security (MVS) embedded and iteratively improves by adding Continuous Security into CI/CD/CS.
  • 28
    SureView

    SureView

    SureView Systems

    Security Organizations using SureViews Operations SaaS suite process events, quickly, consistently and securely, delivering better security outcomes. SureView provides a single screen to coordinate every alarm and event that comes into your SOC (Security Operations Center)—from any system, any device, any source. Everything needed for efficient response is right there—geospatial mapping, action plans, nearby cameras, call lists, etc. Alarms are automatically grouped and prioritized so operators receive the urgent ones first. No more jumping from one system to another, every event is handled in a similar, consistent way, driving productivity and improving security outcomes. SureView’s Field Operations tool seamlessly connects your teams in the SOC and the field–providing real-time location and status information about field staff and critical assets.
    Starting Price: $150 per user per month
  • 29
    MailRoute

    MailRoute

    MailRoute

    Stop Ransomware, spam and phishing, other viruses and threats for SMB, Enterprise, Healthcare, and Government agencies and contractors. API-level integration for Microsoft Office 365 & GCC High, Google Workplace, other email hosts and all servers. MailRoute stops email-instigated attacks on your information and hardware, with cost-effective, multi-layered protection. We offer CMMC, NIST 800-171, HIPAA, DFARS compliant and DISA accepted email security services. No single point of failure. Wholly owned solution includes geo-distributed datacenters with redundant network feeds, power sources and cooling, for 99.999% uptime. MailRoute prevents forgeries and email spoofing by identifying malicious messages with email authentication tools through assisted and managed DNS changes. Continually managed and updated email-network security stops cybercrime and threats like downtime, ensuring cost-predictability and reliability.
    Starting Price: $2 per user per month
  • 30
    OneTrust Privacy Automation
    Go beyond compliance and build trust through transparency, choice, and control. People demand greater control of their data, unlocking an opportunity for organizations to use these moments to build trust and deliver more valuable experiences. We provide privacy and data governance automation to help organizations better understand their data across the business, meet regulatory requirements, and operationalize risk mitigation to provide transparency and choice to individuals. Achieve data privacy compliance faster and build trust in your organization. Our platform helps break down silos across processes, workflows, and teams to operationalize regulatory compliance and enable trusted data use. Build proactive privacy programs rooted in global best practices, not reactive to individual regulations. Gain visibility into unknown risks to drive mitigation and risk-based decision making. Respect individual choice and embed privacy and security by default into the data lifecycle.