Suggested Categories:

IoT Security Software
IoT (Internet of Things) security software is designed to protect connected devices and networks from cyber threats, ensuring the confidentiality, integrity, and availability of data transmitted between IoT devices. These tools monitor and secure devices, applications, and networks that are part of the IoT ecosystem, which includes sensors, actuators, smart appliances, wearables, and industrial equipment. IoT security software includes features such as threat detection, data encryption, access control, device authentication, and vulnerability management to mitigate risks from cyberattacks, unauthorized access, and data breaches. It is essential for industries like healthcare, manufacturing, transportation, and smart cities, where the IoT devices are widely used and often contain sensitive or critical data.
Data Center Security Software
Data center security software enables IT security professionals and organizations to secure their data center infrastructure including racks, networks, server endpoints, and more. Data center security tools provide all aspects of security for data centers. Data center security software helps protect the physical and virtual infrastructure of data centers from unauthorized access, cyber threats, and data breaches. Data center security software ensures that sensitive information and critical systems are safeguarded from external and internal threats by providing real-time alerts, logging activities, and implementing compliance with security standards.
IT Security Software
IT security software is designed to protect information technology (IT) systems, networks, and data from cyber threats, such as malware, hacking, and unauthorized access. These tools provide various features such as antivirus protection, firewalls, encryption, intrusion detection and prevention systems, and vulnerability management to ensure the integrity, confidentiality, and availability of sensitive information. IT security software helps organizations detect, prevent, and respond to security incidents, mitigate risks, and ensure compliance with industry regulations. It is critical for businesses and individuals to safeguard against cyberattacks, data breaches, and other security vulnerabilities.
Application Security Software
Application security software is designed to protect applications from cyber threats by identifying vulnerabilities, preventing attacks, and ensuring data integrity throughout the application’s lifecycle. This software typically includes features like static and dynamic analysis, runtime protection, and vulnerability scanning to detect and address potential security issues such as SQL injection, cross-site scripting (XSS), and unauthorized access. It helps organizations maintain secure applications by implementing best practices for secure coding, performing penetration testing, and monitoring for security breaches. Application security software is crucial for organizations to safeguard sensitive data, comply with regulations, and minimize the risk of exploitation.
Database Security Software
Database security software tools enable organizations to secure their databases, and ensure security compliance with database operations.
Website Security Software
Website security software enables the protection of websites from cyber threats, online attacks and hackers through DDoS protection features and web application firewalls.
Cloud Security Software
Cloud security software consists of tools, software, and services designed to protect data, applications, and infrastructure associated with cloud environments. It addresses unique security challenges posed by the cloud, such as data breaches, unauthorized access, and compliance with regulatory standards. These solutions often include features like encryption, identity and access management, intrusion detection systems, and security information and event management (SIEM). By implementing cloud security software, organizations can safeguard their cloud-based assets from cyber threats and ensure the integrity and confidentiality of sensitive information. As businesses increasingly adopt cloud services, robust cloud security measures have become essential for maintaining operational continuity and customer trust.
Computer Security Software
Computer security software helps protect devices, networks, and sensitive data from unauthorized access, cyberattacks, and other security threats. These tools provide a range of protective features such as antivirus, firewall, encryption, malware detection, and intrusion prevention systems. Computer security software is essential for safeguarding against viruses, ransomware, spyware, and phishing attacks, ensuring the integrity, confidentiality, and availability of data. Many security solutions also offer real-time monitoring, automated updates, and threat intelligence to detect and mitigate new vulnerabilities as they emerge. Businesses and individuals rely on computer security software to reduce risks, comply with regulations, and maintain a secure computing environment.
Data Security Software
Data security software is designed to protect sensitive data from unauthorized access, theft, or corruption. It includes a variety of tools and features such as encryption, access control, data masking, and backup and recovery to ensure that data remains secure at rest, in transit, and during processing. These solutions help organizations comply with data protection regulations, such as GDPR and HIPAA, by safeguarding personal, financial, and business data. Data security software often integrates with other IT security systems to provide comprehensive protection against cyberattacks, insider threats, and data breaches, ensuring that critical information remains protected.
Container Security Software
Container security software is software designed to protect containerized applications and environments from security vulnerabilities, threats, and attacks. Containers, which are used to deploy and run applications in isolated environments, present unique security challenges due to their dynamic and ephemeral nature. Container security software helps secure containerized environments by providing capabilities such as vulnerability scanning, runtime protection, access control, and image security. These tools monitor container configurations and activity to detect anomalies, ensure compliance with security policies, and mitigate risks like container escapes or unauthorized access. By enhancing the security of containers and container orchestration platforms (like Kubernetes), these solutions enable organizations to securely deploy and manage applications in cloud-native and microservices environments.
API Security Software
API security software is designed to protect APIs from security threats such as unauthorized access, data breaches, and denial-of-service attacks. These tools monitor, authenticate, and secure the connections between APIs and the systems they interact with, ensuring that only authorized users and systems can access the data or services offered by the API. Features typically include encryption, rate limiting, authentication (such as OAuth, JWT), API traffic monitoring, threat detection, and automated security testing. API security software is crucial for businesses that rely on APIs to connect with third-party services, mobile apps, or microservices, as it helps mitigate risks and maintain data integrity.
Network Security Software
Network security software is a type of software that helps protect computers, networks, and data from malicious attacks and unauthorized access. It is typically used by businesses to protect their confidential information and keep systems safe. It can also be used by individuals to protect their personal information and devices from potential threats.
Physical Security Software
Physical security software is a suite of tools designed to manage and monitor the security of physical spaces, assets, and individuals within an organization. These platforms often integrate with hardware systems such as access control systems, surveillance cameras, alarms, and sensors to provide a comprehensive security solution. Features of physical security software can include real-time monitoring, incident reporting, visitor management, access control, and remote security management. The software can also provide detailed analytics on security incidents, track access logs, and manage emergency response protocols. By helping organizations secure their physical premises, physical security software enhances safety, prevents unauthorized access, and ensures regulatory compliance.
Email Security Software
Email security software protects organizations from cyber threats such as phishing, malware, and spam by filtering incoming and outgoing email traffic. It uses advanced threat detection, encryption, and data loss prevention (DLP) to safeguard sensitive information. These tools also offer features like email authentication (DMARC, SPF, DKIM) and real-time threat intelligence to block emerging attacks. By securing email communications, businesses can prevent data breaches, ensure regulatory compliance, and maintain user trust. Email security software is essential for mitigating human error, which is one of the leading causes of data breaches.
Secure Web Gateways
Secure web gateways protect users and organizations from online threats by monitoring and controlling web traffic between internal networks and the internet. They filter malicious websites, block unauthorized access, and prevent data leaks by enforcing security policies in real time. These gateways use technologies such as URL filtering, malware scanning, sandboxing, and data loss prevention to safeguard users across devices and locations. Cloud-based versions extend protection to remote and hybrid workforces without relying on traditional network perimeters. Ultimately, secure web gateways ensure safe, compliant, and controlled internet access while maintaining high performance and user productivity.
Security Awareness Training Programs
Security awareness training programs are platforms designed to help employees, partners, and other stakeholders recognize and respond to security threats and best practices. These programs typically focus on topics like phishing, password management, data protection, and secure browsing habits, aiming to create a culture of security within an organization. By providing interactive modules, quizzes, and real-world scenarios, these programs ensure that participants can identify potential risks and mitigate them effectively. Many security awareness training platforms offer tracking and reporting features, allowing organizations to monitor progress and measure the effectiveness of their training efforts. The goal is to reduce the likelihood of security breaches caused by human error and ensure that individuals are well-informed about their role in maintaining cybersecurity.
Cloud Access Security Brokers (CASB)
Cloud Access Security Brokers (CASBs) are software applications that sit between a cloud service provider and an organization. Their purpose is to provide visibility and control over the use of cloud services, ensuring that data remains secure while enabling users to access the resources they need from any device. CASBs operate in real-time and can be used with multiple cloud platforms, such as SaaS, IaaS, or PaaS. They also provide granular access controls on user activities within the cloud system, allowing administrators to create rules around data sharing.
Zero Trust Security Software
Zero trust security software, also known as zero trust networking software, provides a security solution based on the zero trust methodology. Zero trust security solutions enable organizations to enforce security policies on a "zero trust" basis for both internal and external users, and allow security teams to track, monitor, and analyze user behavior and usage across the network to identify potential threats.
School Safety Software
School safety software is a digital platform designed for educational institutions (K-12, higher education, and campuses) to prevent, manage, and respond to safety, security, and well-being incidents. It typically covers visitor and access control, student behavior monitoring, emergency notification & lockdown, incident reporting, and analytics on safety trends. Many solutions integrate with campus systems (e.g., student/visitor databases, video surveillance, PA systems) as well as mobile apps for staff and first responders. By centralizing workflow, alerts, and documentation, school safety software helps institutions improve response times, increase situational awareness, enforce policy, and create safer environments. It also supports compliance with standards, drills, audits and after-incident reviews.
DNS Security Software
DNS security software enables organizations to protect their DNS against threats and malware. DNS security solutions streamline the process of securing DNS servers against attacks.

131 Products for "security" with 2 filters applied:

  • 1
    Teramind

    Teramind

    Teramind

    Teramind provides a user-centric security approach to monitoring your employees’ digital behavior. Our software streamlines employee data collection in order to identify suspicious activity, improve employee productivity, detect possible threats, monitor employee efficiency, and ensure industry compliance. We help reduce security incidents using highly customizable Smart Rules that can alert, block or lockout users when rule violations are detected, to keep your business running securely...
    Starting Price: $12/month/user
  • 2
    Red Points

    Red Points

    Red Points

    Red Points is the most widely used solution to combat online fraud. Over 1,300 companies rely on our AI-led technology to fight online counterfeits, piracy, and impersonation. They leverage Red Points to recover their digital revenue, maintain control, and improve their brand's value. The solution gives brands full visibility of their online presence. With offices in New York, Barcelona, Beijing, and Salt Lake City, Red Points has disrupted an industry traditionally led by service...
    View Software
    Visit Website
  • 3
    Docubee

    Docubee

    Docubee

    Docubee is an intelligent contract automation platform that allows you to quickly and painlessly generate, manage, share, and sign contracts. Featuring powerful conditional logic-based workflows, generative AI technology, and an easily adaptable interface, Docubee makes it easy to automate your most complex contracts and agreements. Gather information, generate and share documents, collect secure eSignatures, and audit progress all within one secure and easy-to-use platform. Spend less time...
    Starting Price: $9 per month
    Partner badge
    View Software
    Visit Website
  • 4
    RemotePeople

    RemotePeople

    RemotePeople

    RemotePeople is a leading Employer of Record (EOR) platform, trusted by top global companies to manage their international workforce. We help businesses efficiently recruit, hire, pay, and manage employees and contractors across 150+ countries, ensuring compliance with local labor laws and payroll regulations. Our platform simplifies global expansion, offering secure and compliant solutions that allow you to confidently scale your team worldwide. Remote People Services: Employer...
    Leader badge
    Starting Price: $199
    Partner badge
  • 5
    Tabs3

    Tabs3

    Tabs3 Software

    Tabs3 Software by ProfitSolv offers a reliable, easy-to-use, seamlessly integrated suite of products that help small to midsized law firms become more organized and productive. Flexible solutions include legal billing, practice management, accounting, payment processing, CRM, and website services. Tabs3 products are designed with security and advanced performance in mind and are trusted by tens of thousands of legal professionals who use them daily. Choose from Tabs3 Cloud, hosted, and on...
    Starting Price: $40/user/month
  • 6
    ManageEngine DataSecurity Plus
    ManageEngine DataSecurity Plus enables organizations to gain deep visibility and control into how sensitive data is stored and shared across the enterprise. It monitors file integrity, detects insider threats, tracks and controls file movement across USBs, email, and cloud apps, etc. The solution also supports automated incident response, file permission analysis, ransomware detection, and regulatory compliance, helping businesses maintain a resilient and secure data environment.
    Starting Price: $745/year
  • 7
    Shape Software

    Shape Software

    Shape Software

    Shape is purpose-built sales and marketing automation software that comes with pre-built features that can be configured for any business. The easy-to-use interface empowers your teams and consolidates all aspects of your business in one AI platform. Shape provides a collaborative space for your teams to stay aligned and efficient in everything they do, whether it's streamlining your sales pipeline, engaging more prospects with marketing sequences and digital ads, nurturing customer...
    Leader badge
    Starting Price: $119
  • 8
    WikiLocks

    WikiLocks

    WikiLocks

    WikiLocks works the way you do, within your most common applications. Simply select the data you wish to protect, assign access to individuals or groups, and distribute the newly protected document. The protection follows your document throughout its lifecycle, no matter how it is accessed, copied, pasted and attached.
    Starting Price: $40
  • 9
    ProTempus

    ProTempus

    ProTempus

    ProTempus is a secure and cloudless law office practice management software solution purpose-built for solo and small law firms. Equipped with a powerful technology that keeps data on the local network (and not floating on the cloud), ProTempus enables authorized staff to access valuable data through a sharable database. Plus, this world-class and fully comprehensive system includes quick time capture, expanded contact and party management, precise billing, document management, AR, AP, GL...
    Starting Price: $100.00/month
  • 10
    E3:Universal

    E3:Universal

    Paraben Corporation

    Don’t get caught up in tools that are unmanageable. The E3 Platform gets you processing all types of digital evidence quickly with an Easy interface, Efficient engines, and Effective workflow. E3:UNIVERSAL version that is designed to do all data types from hard drive data, smartphones, and IoT data. The need to change around your tool based on what type of digital data you have is a thing of the past. The E3 Forensic Platform seamlessly adds a large variety of evidence into a single...
    Leader badge
    Starting Price: $6,295
  • 11
    CB Exchange Server Sync

    CB Exchange Server Sync

    Connecting Software

    CB Exchange Server Sync is the solution for secure synchronization and migration of data between Exchange Servers. It enables easy synchronization of multiple Outlook accounts hosted in Exchange Server or Office 365. Fully customizable to your business needs. It can be used as one-way or two-way synchronization of calendars, emails, tasks, contacts, and public folders. This solution supports seamless migration of your entire Exchange / Outlook model to Office 365, or other Exchange versions...
    Starting Price: $4.99 per user/per month
  • 12
    Aderant Drive
    Aderant Drive enables data-rich law firm client portals that provide firms and their clients with a platform to collaborate and interact with information in a secure environment. Leveraging firm’s existing technology and the security protocols of the Office 365 ecosystem, Drive removes the technical challenges of creating and managing law firm extranets while improving client service with increased responsiveness, transparency, and value.
  • 13
    Square 9

    Square 9

    Square 9

    Paper-based work is a soul-crushing, profit-sapping drag on individual, team, and company productivity. Paper literally smothers innovation, creating a competitive disadvantage. The Square 9 AI-powered intelligent information processing platform takes the paper out of work and makes it easier to get things done with digital workflows that automate many aspects of how you work today. We make it easy by extracting information from scans or PDFs, storing documents in a searchable archive,...
    Leader badge
    Starting Price: $50/month/user
  • 14
    Assembly Neos

    Assembly Neos

    Assembly Software

    Neos, powered by Assembly Software, is an AI-driven, cloud-based case management platform that combines the best of pioneering case management software Needles and TrialWorks. It transforms the way firms work by combining customizable automation, powerful case and document management, and embedded AI with real-time dashboards, automated reporting, native intake, seamless integrations, and unmatched security to maximize productivity. Key Features & Benefits • Embedded Artificial...
    Starting Price: $99 per user per month
  • 15
    Intradyn

    Intradyn

    Intradyn

    Capture and archive emails, social media messages, and text messages in real-time, empowering your organization to manage its digital footprint effectively. Intradyn's email archiving solutions have a proven track record of protecting organizations against potential litigation, eDiscovery requests, and Right to Know inquiries. Our text message archiving solution captures, saves, categorizes, and indexes all mobile content to facilitate quick retrieval when needed. Our archiving...
    Starting Price: $4 per user per month
  • 16
    SmartAdvocate

    SmartAdvocate

    SmartAdvocate

    SmartAdvocate is a fully customizable, award-winning legal case management system with built-in Artificial Intelligence and made to handle the challenges of today’s fast paced, highly competitive and technologically demanding legal landscape. SmartAdvocate’s robust, exclusive Internet-based built-in features, enable firms to manage, store, track and communicate like never before, ensuring that they achieve the highest level of success. With 150+ integration partnerships, firms can...
    Leader badge
    Starting Price: $109 per month per SaaS user
  • 17
    Justice Accelerator
    Justice Accelerator offers a holistic solution, integrating comprehensive Courts, Arbitration and Conciliation Management centers, simplifies case management and optimizes the dispute resolution process. Its Digital Inheritance Platform is where you can securely create, manage and register digital wills – in short: ensure a seamless and organized process for your testamentary arrangements. JA comes with a comprehensive and easy to use Membership Management portal that allows institutions...
  • 18
    ContractZen

    ContractZen

    ContractZen

    Secure governance software with advanced contract management, board meeting management, entity management, e-signature, and virtual data rooms (VDR). Loved by hundreds of customers in over 30 countries, ContractZen is your number one solution for effective corporate governance, due diligence readiness, and peace of mind. • Contract Management: Easy-to-use contract repository with AI-powered search capabilities, and automatic and recurring email reminders. • Board Portal: 100% paperless...
    Starting Price: $9.50/month/user
  • 19
    DocStor

    DocStor

    IST Management Services

    IST DocStor is a state-of-the-art, fully secure information management software system that will put an end to your company’s paperwork, filing and compliance nightmares. Lifetime upgrades are included free of charge. A single application as a go-to source to store, manage, and access enterprise-wide records and content that easily integrates into existing IT infrastructures and effortlessly and securely accepts all file types associated with common business systems. Document management systems...
    Starting Price: $35 per month
  • 20
    BrandShield

    BrandShield

    BrandShield

    ... of digital threats such as phishing attempts, executive impersonation, counterfeit products, trademark infringements, and more. BrandShield was established to revolutionize the way companies can protect their digital assets outside their security perimeter. Ever since the launch, we have introduced groundbreaking innovative features and services to provide the most automated and relevant solutions for the 21st century, such as Patterns detection, built-in enforcement case management, etc.
  • 21
    Acviss

    Acviss

    Acviss Technologies

    ...-based tracking system. Our AI and Machine learning algorithms scan the digital landscape to detect and eliminate fake listings, ads and offers that infringe brand IPR. Our loyalty program enables brands to engage with and reward their customers for staying by their side. By providing real-time insights into the customers' interactions, brands will be able to build a healthy relationship with the audience. Our Products * Certify Unique, Non-cloneable security codes that can help your customers
  • 22
    OneSpan Sign
    OneSpan Sign is a secure and reliable electronic signature solution that powers some of the world's most trusted brands. Top analyst firms and regulated industries recognize OneSpan Sign as a flexible and scalable solution that enables them to manage identities, secure access, verify transactions, and protect assets across the enterprise, financial, e-commerce, government, and healthcare markets. Available in the cloud or on-premises, OneSpan Sign seamlessly captures signatures at the point...
    Starting Price: $20.00/month/user
  • 23
    Contract Assistant

    Contract Assistant

    Blueridge Software

    Blueridge Software's Contract Assistant is a hybrid contract management platform solution that enables businesses to review and create contracts. Contract Assistant is deployable on-premise or in the cloud as a web application. With Contract Assistant, users can store contract templates and manage contract information in a centralized database. Contract Assistant provides users with security features such as field-level security, contract record-level security, and more. Enterprise Edition...
    Starting Price: $899 one-time payment
  • 24
    iManage

    iManage

    iManage

    Transforming how professionals work combining artificial intelligence, security and risk mitigation with market leading document and email management. The iManage Cloud is a modern cloud architecture designed to support the unique needs of professional work product management. Users can work effectively on high or low bandwidth connections and even when disconnected. iManage Cloud delivers an optimized user experience when working with large files, fully secured and back-up across a network...
  • 25
    sslTrus

    sslTrus

    NicSRS Pte. Ltd

    sslTrus offers industry-leading digital certificate solutions, encompassing products like SSL certificates, S/MIME certificates, code signing certificates, private CA, IAM, and email encryption solutions, all providing robust support for your information and network security! Additionally, sslTrus provides certificate lifecycle management, an automation solution for overseeing the entire lifecycle of SSL certificates. It seamlessly automates tasks such as automatic renewal, push, deployment...
    Starting Price: $3.99
  • 26
    Relativity

    Relativity

    Relativity

    One platform for all your legal & compliance needs. Start & finish e-discovery in one secure, cloud platform. When you juggle data between multiple systems, things can get messy fast. RelativityOne streamlines your e-discovery process, from collect through production. Move from collect to production all in RelativityOne – cutting costs and reducing risk along the way. Rely on comprehensive AI capabilities to gain insights quickly. Enjoy unparalleled security, scale, performance, and innovation...
  • 27
    Magnet AXIOM Cyber

    Magnet AXIOM Cyber

    Magnet Forensics

    Enterprise organizations large and small use Magnet Forensics’ solutions to close cases quickly with powerful analytics that surface intelligence & insights while also being able to leverage automation and the cloud to reduce downtime and enable remote collaboration at scale. Some of the world’s largest corporations use Magnet Forensics to investigate IP theft, fraud, employee misconduct and incident response cases such as ransomware, business email compromise and phishing attacks. The...
  • 28
    RTG Bills

    RTG Bills

    RTG Data Systems

    ... of their respective owners. RTG Bills Online is a timekeeping and billing application for law firms that works inside your Web browser. It's the ultimate in Billing Made Easy®! Easy to use, full-featured legal billing. Zero software installation required. Works with any modern Web browser. Secure Web site (https) protects your data as it travels on the Internet. Many users can work at the same time, from different locations. Low monthly fee - starting at $15.95 per month.
    Starting Price: $95.00/one-time
  • 29
    Workstorm

    Workstorm

    Workstorm

    Workstorm is the enterprise collaboration platform that gives teams the efficiency they need to do more work in less time. Built by professionals for professionals, the company's fully integrated, customizable collaboration platform combines workflow efficiency with data security. The platform combines all forms of communication including: messaging, email, video conferencing, calendar, screen sharing, and file sharing, to name a few. Video keeps remote teams connected – but it takes more than...
    Starting Price: $12.50 per user per month
  • 30
    PerfectLaw

    PerfectLaw

    Executive Data Systems

    PerfectLaw® provides law firms with a true all-in-one practice management solution that unifies case management, timekeeping, billing, accounting, and document management within a single database. Available on-premises or in the cloud, PerfectLaw is also available as a browser-based application, ensuring secure access from anywhere. Key features include matter management, automated billing, workflow automation, and mobile access, enabling attorneys and staff to work more efficiently. Firms gain...
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next