Suggested Categories:

IoT Security Software
IoT (Internet of Things) security software is designed to protect connected devices and networks from cyber threats, ensuring the confidentiality, integrity, and availability of data transmitted between IoT devices. These tools monitor and secure devices, applications, and networks that are part of the IoT ecosystem, which includes sensors, actuators, smart appliances, wearables, and industrial equipment. IoT security software includes features such as threat detection, data encryption, access control, device authentication, and vulnerability management to mitigate risks from cyberattacks, unauthorized access, and data breaches. It is essential for industries like healthcare, manufacturing, transportation, and smart cities, where the IoT devices are widely used and often contain sensitive or critical data.
Data Center Security Software
Data center security software enables IT security professionals and organizations to secure their data center infrastructure including racks, networks, server endpoints, and more. Data center security tools provide all aspects of security for data centers. Data center security software helps protect the physical and virtual infrastructure of data centers from unauthorized access, cyber threats, and data breaches. Data center security software ensures that sensitive information and critical systems are safeguarded from external and internal threats by providing real-time alerts, logging activities, and implementing compliance with security standards.
IT Security Software
IT security software is designed to protect information technology (IT) systems, networks, and data from cyber threats, such as malware, hacking, and unauthorized access. These tools provide various features such as antivirus protection, firewalls, encryption, intrusion detection and prevention systems, and vulnerability management to ensure the integrity, confidentiality, and availability of sensitive information. IT security software helps organizations detect, prevent, and respond to security incidents, mitigate risks, and ensure compliance with industry regulations. It is critical for businesses and individuals to safeguard against cyberattacks, data breaches, and other security vulnerabilities.
Application Security Software
Application security software is designed to protect applications from cyber threats by identifying vulnerabilities, preventing attacks, and ensuring data integrity throughout the application’s lifecycle. This software typically includes features like static and dynamic analysis, runtime protection, and vulnerability scanning to detect and address potential security issues such as SQL injection, cross-site scripting (XSS), and unauthorized access. It helps organizations maintain secure applications by implementing best practices for secure coding, performing penetration testing, and monitoring for security breaches. Application security software is crucial for organizations to safeguard sensitive data, comply with regulations, and minimize the risk of exploitation.
Database Security Software
Database security software tools enable organizations to secure their databases, and ensure security compliance with database operations.
Website Security Software
Website security software enables the protection of websites from cyber threats, online attacks and hackers through DDoS protection features and web application firewalls.
Cloud Security Software
Cloud security software consists of tools, software, and services designed to protect data, applications, and infrastructure associated with cloud environments. It addresses unique security challenges posed by the cloud, such as data breaches, unauthorized access, and compliance with regulatory standards. These solutions often include features like encryption, identity and access management, intrusion detection systems, and security information and event management (SIEM). By implementing cloud security software, organizations can safeguard their cloud-based assets from cyber threats and ensure the integrity and confidentiality of sensitive information. As businesses increasingly adopt cloud services, robust cloud security measures have become essential for maintaining operational continuity and customer trust.
Computer Security Software
Computer security software helps protect devices, networks, and sensitive data from unauthorized access, cyberattacks, and other security threats. These tools provide a range of protective features such as antivirus, firewall, encryption, malware detection, and intrusion prevention systems. Computer security software is essential for safeguarding against viruses, ransomware, spyware, and phishing attacks, ensuring the integrity, confidentiality, and availability of data. Many security solutions also offer real-time monitoring, automated updates, and threat intelligence to detect and mitigate new vulnerabilities as they emerge. Businesses and individuals rely on computer security software to reduce risks, comply with regulations, and maintain a secure computing environment.
Data Security Software
Data security software is designed to protect sensitive data from unauthorized access, theft, or corruption. It includes a variety of tools and features such as encryption, access control, data masking, and backup and recovery to ensure that data remains secure at rest, in transit, and during processing. These solutions help organizations comply with data protection regulations, such as GDPR and HIPAA, by safeguarding personal, financial, and business data. Data security software often integrates with other IT security systems to provide comprehensive protection against cyberattacks, insider threats, and data breaches, ensuring that critical information remains protected.
Container Security Software
Container security software is software designed to protect containerized applications and environments from security vulnerabilities, threats, and attacks. Containers, which are used to deploy and run applications in isolated environments, present unique security challenges due to their dynamic and ephemeral nature. Container security software helps secure containerized environments by providing capabilities such as vulnerability scanning, runtime protection, access control, and image security. These tools monitor container configurations and activity to detect anomalies, ensure compliance with security policies, and mitigate risks like container escapes or unauthorized access. By enhancing the security of containers and container orchestration platforms (like Kubernetes), these solutions enable organizations to securely deploy and manage applications in cloud-native and microservices environments.
API Security Software
API security software is designed to protect APIs from security threats such as unauthorized access, data breaches, and denial-of-service attacks. These tools monitor, authenticate, and secure the connections between APIs and the systems they interact with, ensuring that only authorized users and systems can access the data or services offered by the API. Features typically include encryption, rate limiting, authentication (such as OAuth, JWT), API traffic monitoring, threat detection, and automated security testing. API security software is crucial for businesses that rely on APIs to connect with third-party services, mobile apps, or microservices, as it helps mitigate risks and maintain data integrity.
Network Security Software
Network security software is a type of software that helps protect computers, networks, and data from malicious attacks and unauthorized access. It is typically used by businesses to protect their confidential information and keep systems safe. It can also be used by individuals to protect their personal information and devices from potential threats.
Physical Security Software
Physical security software is a suite of tools designed to manage and monitor the security of physical spaces, assets, and individuals within an organization. These platforms often integrate with hardware systems such as access control systems, surveillance cameras, alarms, and sensors to provide a comprehensive security solution. Features of physical security software can include real-time monitoring, incident reporting, visitor management, access control, and remote security management. The software can also provide detailed analytics on security incidents, track access logs, and manage emergency response protocols. By helping organizations secure their physical premises, physical security software enhances safety, prevents unauthorized access, and ensures regulatory compliance.
Email Security Software
Email security software protects organizations from cyber threats such as phishing, malware, and spam by filtering incoming and outgoing email traffic. It uses advanced threat detection, encryption, and data loss prevention (DLP) to safeguard sensitive information. These tools also offer features like email authentication (DMARC, SPF, DKIM) and real-time threat intelligence to block emerging attacks. By securing email communications, businesses can prevent data breaches, ensure regulatory compliance, and maintain user trust. Email security software is essential for mitigating human error, which is one of the leading causes of data breaches.
Secure Web Gateways
Secure web gateways protect users and organizations from online threats by monitoring and controlling web traffic between internal networks and the internet. They filter malicious websites, block unauthorized access, and prevent data leaks by enforcing security policies in real time. These gateways use technologies such as URL filtering, malware scanning, sandboxing, and data loss prevention to safeguard users across devices and locations. Cloud-based versions extend protection to remote and hybrid workforces without relying on traditional network perimeters. Ultimately, secure web gateways ensure safe, compliant, and controlled internet access while maintaining high performance and user productivity.
Security Awareness Training Programs
Security awareness training programs are platforms designed to help employees, partners, and other stakeholders recognize and respond to security threats and best practices. These programs typically focus on topics like phishing, password management, data protection, and secure browsing habits, aiming to create a culture of security within an organization. By providing interactive modules, quizzes, and real-world scenarios, these programs ensure that participants can identify potential risks and mitigate them effectively. Many security awareness training platforms offer tracking and reporting features, allowing organizations to monitor progress and measure the effectiveness of their training efforts. The goal is to reduce the likelihood of security breaches caused by human error and ensure that individuals are well-informed about their role in maintaining cybersecurity.
Cloud Access Security Brokers (CASB)
Cloud Access Security Brokers (CASBs) are software applications that sit between a cloud service provider and an organization. Their purpose is to provide visibility and control over the use of cloud services, ensuring that data remains secure while enabling users to access the resources they need from any device. CASBs operate in real-time and can be used with multiple cloud platforms, such as SaaS, IaaS, or PaaS. They also provide granular access controls on user activities within the cloud system, allowing administrators to create rules around data sharing.
Zero Trust Security Software
Zero trust security software, also known as zero trust networking software, provides a security solution based on the zero trust methodology. Zero trust security solutions enable organizations to enforce security policies on a "zero trust" basis for both internal and external users, and allow security teams to track, monitor, and analyze user behavior and usage across the network to identify potential threats.
School Safety Software
School safety software is a digital platform designed for educational institutions (K-12, higher education, and campuses) to prevent, manage, and respond to safety, security, and well-being incidents. It typically covers visitor and access control, student behavior monitoring, emergency notification & lockdown, incident reporting, and analytics on safety trends. Many solutions integrate with campus systems (e.g., student/visitor databases, video surveillance, PA systems) as well as mobile apps for staff and first responders. By centralizing workflow, alerts, and documentation, school safety software helps institutions improve response times, increase situational awareness, enforce policy, and create safer environments. It also supports compliance with standards, drills, audits and after-incident reviews.
DNS Security Software
DNS security software enables organizations to protect their DNS against threats and malware. DNS security solutions streamline the process of securing DNS servers against attacks.

63 Products for "security" with 2 filters applied:

  • 1
    Shape Software

    Shape Software

    Shape Software

    Shape is purpose-built sales and marketing automation software that comes with pre-built features that can be configured for any business. The easy-to-use interface empowers your teams and consolidates all aspects of your business in one AI platform. Shape provides a collaborative space for your teams to stay aligned and efficient in everything they do, whether it's streamlining your sales pipeline, engaging more prospects with marketing sequences and digital ads, nurturing customer...
    Leader badge
    Starting Price: $119
    View Software
    Visit Website
  • 2
    Resco Field Sales+
    Resco Field Sales+ is a no-code mobile solution designed to help sales teams manage customer data, track opportunities, and streamline order processing, all while on the move. Tailored for industries like retail, manufacturing, and professional services, it ensures your team can work efficiently both online and offline. With offline functionality and secure data synchronization, your team can access and update customer information, orders, and reports—even in remote or low
    Starting Price: $55/month per user
    View Software
    Visit Website
  • 3
    Squaretalk

    Squaretalk

    Squaretalk

    ...-handling features, automated transcripts, sentiment analysis, contact management, customizable workflows, advanced reporting, and enterprise-grade security. With local numbers in over 150 popular and niche destinations, we enable businesses to establish and maintain a local presence, build trust, and support their global expansion. Discover how Squaretalk’s cloud contact center platform can enhance your team’s connection rates and performance.
    Leader badge
    Starting Price: $25/month/user
    Partner badge
    View Software
    Visit Website
  • 4
    GoldMine CRM
    GoldMine has removed the headaches of many CRM platforms. Because our interface is so common, your employees will feel right at home. Less time training means more time doing. Don’t “rent” your CRM System when you can OWN it and save BIG. Most companies save up to 70%. With one easy payment, its yours…forever! Take control, save money and have peace of mind you will never get “shut off”. CRM becomes much more powerful when you combine it with other powerful apps. Our cloud option will...
    Starting Price: $60 per user per month
  • 5
    Driftrock

    Driftrock

    Driftrock

    Capture 3x more leads. Track and convert leads from 20+ sources. 1. Connect or create 20+ lead sources, Driftrock forms and chatbots. 2. Track every lead from source, ad or keyword through to the conversion, lead validation and campaign optimization to increase lead quality. 3. Increase list conversion rate with segmentation and automated audience nurturing. 4. Keep your CRM in sync with Facebook, Google and LinkedIn Custom Audiences. 5. Use Driftrock customer segments to create...
    Starting Price: $49
  • 6
    AuraVMS

    AuraVMS

    AuraVMS

    As a buyer of commodity materials, you send out countless quotation requests every month. Talking to multiple vendors, giving them requirements, gathering their quotations, compiling all responses, and then negotiating takes a lot valuable time. It costs you money, because it takes extra 2 or 4 or 10 days to close certain requirements. AuraVMS helps you in collecting and comparing quotations. You first onboard your suppliers with very few details (and no intervention needed from them),...
    Starting Price: $4.99/month
  • 7
    VT Writer

    VT Writer

    VisibleThread

    VT Writer is part of VisibleThread's RFP Software. It is an AI writing assistant for RFP and proposal teams. It is 100% secure, no data outside your firewall. It is built for the enterprise. It is designed for team adoption and productivity. Trusted by leading Government Agencies and Enterprises. Optimize your RFP content by scoring objective metrics such as grade level, passive voice, and grammar. Create and enhance content securely using AI.
  • 8
    Moxtra

    Moxtra

    Moxtra

    Moxtra’s Client Interaction Platform has been built in partnership with several of the world’s leading financial institutions. These organizations use the platform to power their digital business — with rigorous compliance, privacy, security, and auditability. Moxtra enables the seamless extension of business processes. For enhanced security, the solution can be deployed as a private cloud, shared multi-tenant cloud, or on-premise service. All interactions on Moxtra are self...
    Starting Price: $120 per month
  • 9
    Box

    Box

    Box

    Store, sign, and secure your content on Box, the leading Intelligent Content Management platform. Built for the AI-first era, Box simplifies your tech stack and conserves cost with one secure, end-to-end solution for the entire content lifecycle. ✓ Unlock the value of your content with AI: Pair top AI models with your organization’s content to find information, extract insights, build custom AI agents, and automate the work that slows you down ✓ Get unlimited collaboration: Create, manage...
    Leader badge
    Starting Price: $5 per month
  • 10
    CxCRM

    CxCRM

    Callippus Solutions

    ... and accessibility is highly flexible, secure and can scale to millions of contacts. The solution is built from the ground up using J2EE technology. J2EE lends itself to near linear scalability while keeping the Total Cost of Ownership to the bare minimum. Application is completely web-enabled with role based access control. Tight security controls, audit logs and configurable logging levels help administer these products effectively.
  • 11
    Rollio

    Rollio

    Rollio

    ... by Salesforce.com) and passed the Salesforce Security Review.
  • 12
    Eltropy

    Eltropy

    Eltropy

    Integrate Digital Communication with your existing workflow. Eltropy mirrors the same workflow that customers’ different departments already have in place. We are passionate about automation and provide a wide range of Text Messaging templates that can be scheduled and personalized depending on the use case and recipient. Collections teams can send automated reminders via Text Messaging when loan payments are due. Set it and forget it and include a secure link so that customers can make...
  • 13
    Yesware

    Yesware

    Yesware

    Win More Business with the Easiest to Use Sales Software. Everything you need to prospect, schedule meetings and follow up. Nothing more (actually, great support too!). 100% free to install. No credit card required. Easily connect with your buyers via email, phone and social channels. Quickly schedule more meetings with your target buyers. Manage your follow up with the right message, at the right time. Deliver more new business, renewals, upsells, and cross sells. Data security and regulatory...
    Starting Price: $12 per month per user
  • 14
    ProgComm

    ProgComm

    ProgComm

    ProgComm is a comprehensive B2B platform designed with multiple levels and tiers, integrating end-to-end solutions for ordering and invoicing, embedded credit functionalities, and detailed customer analytics. It boosts efficiency through AI-driven insights, automating sales processes, expense tracking, and ledger analysis. Featuring a top-tier user interface and experience, it guarantees ISO 27001 certified data security and is optimized for rapid deployment and seamless integration.
  • 15
    Responsive

    Responsive

    Responsive

    Responsive (formerly RFPIO) is the global leader in strategic response management software, transforming how organizations share and exchange critical information. Our commitment to product innovation and customer success empowers companies to accelerate growth, mitigate risk and improve the employee experience by leveraging intelligent technologies to quickly and accurately manage RFPs, RFIs, security questionnaires (VSQs), due diligence questionnaires (DDQs), risk assessments and all other...
  • 16
    LinkPoint Connect

    LinkPoint Connect

    LinkPoint360

    LinkPoint360 solutions simplify email integration and CRM record maintenance with integrated inbox access. Record emails with just one click. View real-time CRM data without ever leaving your email. Empower your users with meeting notes, sync, and edit options with an eye on productivity without sacrificing security. Use LinkPoint360 to view, record, create, and sync between email and Salesforce/Microsoft CRM with simple and seamless email integration for any platform. LinkPoint360 designs...
    Starting Price: $16 per month
  • 17
    Evercontact

    Evercontact

    One More Company

    ... accounts, centralized address books, CSV downloads and CRM integration. Your personal information belongs to you and you alone. Evercontact is GDPR compliant when it comes to user security and data privacy. Our service is available for Gmail, Outlook and Office 365.
    Starting Price: $5.00/month/user
  • 18
    FastDox

    FastDox

    FastDox

    Receive crucial documentation from customers in minutes. They simply upload or take a photo of their sensitive information and send it across securely instantly. Unlimited amount of document uploads of any size. Upload and send documents from anywhere zero hassle. Auto-edge cropping and dynamic document alignment. Stand out from the competition and offer your customers a seamless onboarding experience. With the platform doing the hard work for you, you can focus on delivering outstanding...
    Starting Price: £40 per user
  • 19
    Funel.io

    Funel.io

    Funel.io

    Funel.io, a cutting-edge client management platform for businesses immersed of marketing and sales. Unveil an array of ingenious AI tools, such as the prowess of buyer persona generators and an adept spam checker. Tailored to redefine efficiency, Funel.io seamlessly navigates your workflow journey, from the intricacies of client onboarding to the pulse of daily updates. Enriched with the power of blockchain technology, Funel.io adds an additional layer of data security, ensuring...
    Starting Price: $299
  • 20
    PiERP

    PiERP

    PiERP

    PiERP cloud ERP software is designed to excel in overcoming business challenges by fusing IT potential with measurable results and achievements. Our holistic strategy enables swift navigation through obstacles, igniting your enterprise's cloud potential. Experience unparalleled efficiency, improved collaboration, enhanced security, and increased productivity with PiERP. Our ERP solution offers rapid deployment, ensuring seamless implementation within just 30 days. It integrates various...
  • 21
    Analyzer

    Analyzer

    Strategy Companion

    .... Business executives can examine the overall performance of the company or the success of a specific division in an instant. The opportunities are endless. With Analyzer™, business users are able to make better decisions based on real-time data through a secure, scalable, and social business intelligence solution.
    Starting Price: $150 per user per month
  • 22
    Encryptik
    Authora's Encrypted Data Gateway Engine, "EDGE", is an OpenPGP compliant command-line application. Edge elegentlyr integrates cryptogrphic functions into your existing business prosseses. Edge is platform independent and runs on Windows and on a variety of UNIX systems. Every command can be automated and integrated with existing process. EDGE can work on foreground and on background (UNIX background process). Encryptik provides the best defense and allows you to layer the threat response,...
    Starting Price: $20 per user per month
  • 23
    MethodosIT Quotation Management System
    The Quotation Management System is an easy-to-use and flexible application that allows a company to create, submit and track quotes and invoices. The Quotation Management System is an open-source web-based application. It can be downloaded as a Windows installer executable which makes the installation a very simple task. Manage all of your quotation records in one user-friendly system as well as maintain the necessary standards for tracking. Generate an automatic quotation in a PDF format...
  • 24
    Primo Dialler

    Primo Dialler

    Primo Dialler

    At Primo Dialler we don’t believe in ordinary. We like to go that little bit extra and design our hosted dialler solutions to be the best. Our secure platform is used by thousands of users around the world. Increase your conversions by up to 300% today with our no-commitment feature-rich hosted dialler. Our aim is to develop a long term relationship with you and provide you with the expertise you need to make your call centre operates to its optimum level.
    Starting Price: $0.05/month/user
  • 25
    Tilkee

    Tilkee

    Tilkee

    There is a better way than an attachment or a shared drive to send your key, strategic documents! Simplify file creation and sharing (contracts, quotes etc.) - Avoid sending tedious emails and attachments to your contacts and ensure the secure delivery of your most sensitive documents. Send and share all your documents with your contacts from one centralised, shared, organised space. Add, delete and replace documents in a few clicks and make the relationship with your customers, prospects...
    Starting Price: $19 per user per month
  • 26
    TenderEyes

    TenderEyes

    Tradax Group

    .... Integrated Public Procurement Portals and smarter opportunity identification, qualification tracking and approval. Dedicated secure library with auto-population, easy search and access to tender documentation, questions and responses.
  • 27
    Virtual Proposal Center
    The Virtual Proposal Center (VPC) is a collaborative, browser-based application enabling a geographically dispersed, multi-partner proposal team to have a common work center with access to the tools and information needed to create successful proposals. VPC is above all easy to use, secure, and flexible. Intuitive document, workflow and configuration management features, combined with a powerful search tool, make VPC an indispensable part of the proposal development process. Founded in 1996...
  • 28
    iDashboards

    iDashboards

    iDashboards

    iDashboards provides easy-to-use, visually appealing, and cost-effective data visualization software for clients in a wide variety of industries. Our Operational Success Platform easily integrates with key data sources and users can quickly and effectively view and analyze critical performance metrics -- ultimately leading to enhanced decision-making capabilities. Increase transparency, reduce resource burdens, and improve decision-making with secure and shareable dashboards.
  • 29
    Talisma CRM
    Productivity tools enable faster and more efficient customer engagements. Building a centralized source of truth increases the effectiveness of responses. With our tools to identify customer characteristics which enable likeliness of products and customers with intention to purchase. Improve the ROI by multi-step omnichannel marketing campaigns. Industry Domain CRM for Banking, Insurance, Mutual Funds and Securities. On-premise, Private and Public Cloud Deployment on your choice.
  • 30
    GOT CRM

    GOT CRM

    Got Softwares

    Impossible will happen when there is a better way for Sales. Collaborate, Teleport and manage your customers from the Worlds best GOT CRM 2020. Stay On Top Of Your Business with Simple And Secure GOT CRM Trusted By 2000 customers From Around The World. GOT CRM provides synergetic integration of 60+ social apps. Trial Us. You will feel the flexibility of continuing our CRM for long term. Start your free trial today for 15 days. No Credit Card Required. No hidden cost charged.
    Starting Price: $10 per user per month
  • Previous
  • You're on page 1
  • 2
  • 3
  • Next