Suggested Categories:

IT Security Software
IT security software is designed to protect information technology (IT) systems, networks, and data from cyber threats, such as malware, hacking, and unauthorized access. These tools provide various features such as antivirus protection, firewalls, encryption, intrusion detection and prevention systems, and vulnerability management to ensure the integrity, confidentiality, and availability of sensitive information. IT security software helps organizations detect, prevent, and respond to security incidents, mitigate risks, and ensure compliance with industry regulations. It is critical for businesses and individuals to safeguard against cyberattacks, data breaches, and other security vulnerabilities.
IoT Security Software
IoT (Internet of Things) security software is designed to protect connected devices and networks from cyber threats, ensuring the confidentiality, integrity, and availability of data transmitted between IoT devices. These tools monitor and secure devices, applications, and networks that are part of the IoT ecosystem, which includes sensors, actuators, smart appliances, wearables, and industrial equipment. IoT security software includes features such as threat detection, data encryption, access control, device authentication, and vulnerability management to mitigate risks from cyberattacks, unauthorized access, and data breaches. It is essential for industries like healthcare, manufacturing, transportation, and smart cities, where the IoT devices are widely used and often contain sensitive or critical data.
Data Center Security Software
Data center security software enables IT security professionals and organizations to secure their data center infrastructure including racks, networks, server endpoints, and more. Data center security tools provide all aspects of security for data centers. Data center security software helps protect the physical and virtual infrastructure of data centers from unauthorized access, cyber threats, and data breaches. Data center security software ensures that sensitive information and critical systems are safeguarded from external and internal threats by providing real-time alerts, logging activities, and implementing compliance with security standards.
Application Security Software
Application security software is designed to protect applications from cyber threats by identifying vulnerabilities, preventing attacks, and ensuring data integrity throughout the application’s lifecycle. This software typically includes features like static and dynamic analysis, runtime protection, and vulnerability scanning to detect and address potential security issues such as SQL injection, cross-site scripting (XSS), and unauthorized access. It helps organizations maintain secure applications by implementing best practices for secure coding, performing penetration testing, and monitoring for security breaches. Application security software is crucial for organizations to safeguard sensitive data, comply with regulations, and minimize the risk of exploitation.
Website Security Software
Website security software enables the protection of websites from cyber threats, online attacks and hackers through DDoS protection features and web application firewalls.
Cloud Security Software
Cloud security software consists of tools, software, and services designed to protect data, applications, and infrastructure associated with cloud environments. It addresses unique security challenges posed by the cloud, such as data breaches, unauthorized access, and compliance with regulatory standards. These solutions often include features like encryption, identity and access management, intrusion detection systems, and security information and event management (SIEM). By implementing cloud security software, organizations can safeguard their cloud-based assets from cyber threats and ensure the integrity and confidentiality of sensitive information. As businesses increasingly adopt cloud services, robust cloud security measures have become essential for maintaining operational continuity and customer trust.
Database Security Software
Database security software tools enable organizations to secure their databases, and ensure security compliance with database operations.
Data Security Software
Data security software is designed to protect sensitive data from unauthorized access, theft, or corruption. It includes a variety of tools and features such as encryption, access control, data masking, and backup and recovery to ensure that data remains secure at rest, in transit, and during processing. These solutions help organizations comply with data protection regulations, such as GDPR and HIPAA, by safeguarding personal, financial, and business data. Data security software often integrates with other IT security systems to provide comprehensive protection against cyberattacks, insider threats, and data breaches, ensuring that critical information remains protected.
Network Security Software
Network security software is a type of software that helps protect computers, networks, and data from malicious attacks and unauthorized access. It is typically used by businesses to protect their confidential information and keep systems safe. It can also be used by individuals to protect their personal information and devices from potential threats.
API Security Software
API security software is designed to protect APIs from security threats such as unauthorized access, data breaches, and denial-of-service attacks. These tools monitor, authenticate, and secure the connections between APIs and the systems they interact with, ensuring that only authorized users and systems can access the data or services offered by the API. Features typically include encryption, rate limiting, authentication (such as OAuth, JWT), API traffic monitoring, threat detection, and automated security testing. API security software is crucial for businesses that rely on APIs to connect with third-party services, mobile apps, or microservices, as it helps mitigate risks and maintain data integrity.
Computer Security Software
Computer security software helps protect devices, networks, and sensitive data from unauthorized access, cyberattacks, and other security threats. These tools provide a range of protective features such as antivirus, firewall, encryption, malware detection, and intrusion prevention systems. Computer security software is essential for safeguarding against viruses, ransomware, spyware, and phishing attacks, ensuring the integrity, confidentiality, and availability of data. Many security solutions also offer real-time monitoring, automated updates, and threat intelligence to detect and mitigate new vulnerabilities as they emerge. Businesses and individuals rely on computer security software to reduce risks, comply with regulations, and maintain a secure computing environment.
Container Security Software
Container security software is software designed to protect containerized applications and environments from security vulnerabilities, threats, and attacks. Containers, which are used to deploy and run applications in isolated environments, present unique security challenges due to their dynamic and ephemeral nature. Container security software helps secure containerized environments by providing capabilities such as vulnerability scanning, runtime protection, access control, and image security. These tools monitor container configurations and activity to detect anomalies, ensure compliance with security policies, and mitigate risks like container escapes or unauthorized access. By enhancing the security of containers and container orchestration platforms (like Kubernetes), these solutions enable organizations to securely deploy and manage applications in cloud-native and microservices environments.
Physical Security Software
Physical security software is a suite of tools designed to manage and monitor the security of physical spaces, assets, and individuals within an organization. These platforms often integrate with hardware systems such as access control systems, surveillance cameras, alarms, and sensors to provide a comprehensive security solution. Features of physical security software can include real-time monitoring, incident reporting, visitor management, access control, and remote security management. The software can also provide detailed analytics on security incidents, track access logs, and manage emergency response protocols. By helping organizations secure their physical premises, physical security software enhances safety, prevents unauthorized access, and ensures regulatory compliance.
Email Security Software
Email security software protects organizations from cyber threats such as phishing, malware, and spam by filtering incoming and outgoing email traffic. It uses advanced threat detection, encryption, and data loss prevention (DLP) to safeguard sensitive information. These tools also offer features like email authentication (DMARC, SPF, DKIM) and real-time threat intelligence to block emerging attacks. By securing email communications, businesses can prevent data breaches, ensure regulatory compliance, and maintain user trust. Email security software is essential for mitigating human error, which is one of the leading causes of data breaches.
Secure Web Gateways
Secure web gateways protect users and organizations from online threats by monitoring and controlling web traffic between internal networks and the internet. They filter malicious websites, block unauthorized access, and prevent data leaks by enforcing security policies in real time. These gateways use technologies such as URL filtering, malware scanning, sandboxing, and data loss prevention to safeguard users across devices and locations. Cloud-based versions extend protection to remote and hybrid workforces without relying on traditional network perimeters. Ultimately, secure web gateways ensure safe, compliant, and controlled internet access while maintaining high performance and user productivity.
Security Awareness Training Programs
Security awareness training programs are platforms designed to help employees, partners, and other stakeholders recognize and respond to security threats and best practices. These programs typically focus on topics like phishing, password management, data protection, and secure browsing habits, aiming to create a culture of security within an organization. By providing interactive modules, quizzes, and real-world scenarios, these programs ensure that participants can identify potential risks and mitigate them effectively. Many security awareness training platforms offer tracking and reporting features, allowing organizations to monitor progress and measure the effectiveness of their training efforts. The goal is to reduce the likelihood of security breaches caused by human error and ensure that individuals are well-informed about their role in maintaining cybersecurity.
Zero Trust Security Software
Zero trust security software, also known as zero trust networking software, provides a security solution based on the zero trust methodology. Zero trust security solutions enable organizations to enforce security policies on a "zero trust" basis for both internal and external users, and allow security teams to track, monitor, and analyze user behavior and usage across the network to identify potential threats.
Cloud Access Security Brokers (CASB)
Cloud Access Security Brokers (CASBs) are software applications that sit between a cloud service provider and an organization. Their purpose is to provide visibility and control over the use of cloud services, ensuring that data remains secure while enabling users to access the resources they need from any device. CASBs operate in real-time and can be used with multiple cloud platforms, such as SaaS, IaaS, or PaaS. They also provide granular access controls on user activities within the cloud system, allowing administrators to create rules around data sharing.
DNS Security Software
DNS security software enables organizations to protect their DNS against threats and malware. DNS security solutions streamline the process of securing DNS servers against attacks.
Security Compliance Software
Security compliance software enables organizations to manage, track, and comply with cybersecurity compliance regulations and frameworks. Security compliance software provides tools for companies to audit their security posture and policies and achieve compliance certifications such as ISO 27001, ISO 27002, ISO 27017, CSA STAR, SOC 2, PCI DSS, FedRAMP, NIST 800-171, NIST 800-53, and more.

38 Products for "security" with 3 filters applied:

  • 1
    Moxtra

    Moxtra

    Moxtra

    ...Moxtra is engineered to meet the stringent security requirements of regulated industries, with encryption, and the ability to support the unique best practices of each business.
    Starting Price: $120 per month
  • 2
    Eltropy

    Eltropy

    Eltropy

    ...Seamlessly add Secure Chat, Video, Voice, CoBrowse, and Conversational Bots to your member and customer.
  • 3
    Box

    Box

    Box

    Store, sign, and secure your content on Box, the leading Intelligent Content Management platform. Built for the AI-first era, Box simplifies your tech stack and conserves cost with one secure, end-to-end solution for the entire content lifecycle. ✓ Unlock the value of your content with AI: Pair top AI models with your organization’s content to find information, extract insights, build custom AI agents, and automate the work that slows you down ✓ Get unlimited collaboration: Create, manage, and share files from anywhere, with anyone ✓ Protect your content: Secure your sensitive files and data, thanks to granular access controls, intelligent threat detection, and adherence to stringent compliance requirements ✓ Scale with 1,500+ integrations: Work from anywhere across all your team’s favorite apps and extend the power of Box with APIs
    Leader badge
    Starting Price: $5 per month
  • 4
    Yesware

    Yesware

    Yesware

    ...Quickly schedule more meetings with your target buyers. Manage your follow up with the right message, at the right time. Deliver more new business, renewals, upsells, and cross sells. Data security and regulatory compliance is one of our highest priorities. We invest heavily in technology and partner relationships to keep our customer data secure.
    Starting Price: $12 per month per user
  • 5
    Shape Software

    Shape Software

    Shape Software

    Shape is purpose-built sales and marketing automation software that comes with pre-built features that can be configured for any business. The easy-to-use interface empowers your teams and consolidates all aspects of your business in one AI platform. Shape provides a collaborative space for your teams to stay aligned and efficient in everything they do, whether it's streamlining your sales pipeline, engaging more prospects with marketing sequences and digital ads, nurturing customer...
    Leader badge
    Starting Price: $119
    View Software
    Visit Website
  • 6
    Rollio

    Rollio

    Rollio

    ...Customer interactions are one of the most valuable assets for a business and need to be treated with utmost care. Rollio is SOC2 Type 2 compliant, built on Heroku (owned by Salesforce.com) and passed the Salesforce Security Review.
  • 7
    Funel.io

    Funel.io

    Funel.io

    ...Tailored to redefine efficiency, Funel.io seamlessly navigates your workflow journey, from the intricacies of client onboarding to the pulse of daily updates. Enriched with the power of blockchain technology, Funel.io adds an additional layer of data security, ensuring the safeguarding of your valuable information. Elevate your professionalism with features like the proposals and invoice creator, empowering you to craft sophisticated and personalized documents that leave a lasting impression on your clients. Stay connected through the real-time updates module, fostering frequent and fluid communication between your team and clients. ...
    Starting Price: $299
  • 8
    AuraVMS

    AuraVMS

    AuraVMS

    As a buyer of commodity materials, you send out countless quotation requests every month. Talking to multiple vendors, giving them requirements, gathering their quotations, compiling all responses, and then negotiating takes a lot valuable time. It costs you money, because it takes extra 2 or 4 or 10 days to close certain requirements. AuraVMS helps you in collecting and comparing quotations. You first onboard your suppliers with very few details (and no intervention needed from them),...
    Starting Price: $4.99/month
  • 9
    PiERP

    PiERP

    PiERP

    ...PiERP is robust and secure, seamlessly integrating various APIs and third-party software. It features highly adaptable and configurable workflow automation, facilitating adjustments as your organization expands.
  • 10
    Evercontact

    Evercontact

    One More Company

    ...Our subscription plans allow for unlimited contact updates, multiple email accounts, centralized address books, CSV downloads and CRM integration. Your personal information belongs to you and you alone. Evercontact is GDPR compliant when it comes to user security and data privacy. Our service is available for Gmail, Outlook and Office 365.
    Starting Price: $5.00/month/user
  • 11
    FastDox

    FastDox

    FastDox

    Receive crucial documentation from customers in minutes. They simply upload or take a photo of their sensitive information and send it across securely instantly. Unlimited amount of document uploads of any size. Upload and send documents from anywhere zero hassle. Auto-edge cropping and dynamic document alignment. Stand out from the competition and offer your customers a seamless onboarding experience. With the platform doing the hard work for you, you can focus on delivering outstanding service. ...
    Starting Price: £40 per user
  • 12
    Responsive

    Responsive

    Responsive

    ...Our commitment to product innovation and customer success empowers companies to accelerate growth, mitigate risk and improve the employee experience by leveraging intelligent technologies to quickly and accurately manage RFPs, RFIs, security questionnaires (VSQs), due diligence questionnaires (DDQs), risk assessments and all other complex information requests (RFXs). With Responsive, frontline teams deliver superior responses by automating the completion of questionnaires, documents and spreadsheets while collaborating with stakeholders, improving processes with data insights, and quickly accessing approved content across popular business applications.
  • 13
    Rethink Workflow

    Rethink Workflow

    Rethink Workflow, Inc.

    Rethink Workflow is a free, simple, powerful, and secure business process automation tool that allows NGOs, businesses, and enterprises to create forms and design workflows online.
    Starting Price: $2.99/month/user
  • 14
    ProgComm

    ProgComm

    ProgComm

    ...It boosts efficiency through AI-driven insights, automating sales processes, expense tracking, and ledger analysis. Featuring a top-tier user interface and experience, it guarantees ISO 27001 certified data security and is optimized for rapid deployment and seamless integration.
  • 15
    Driftrock

    Driftrock

    Driftrock

    Capture 3x more leads. Track and convert leads from 20+ sources. 1. Connect or create 20+ lead sources, Driftrock forms and chatbots. 2. Track every lead from source, ad or keyword through to the conversion, lead validation and campaign optimization to increase lead quality. 3. Increase list conversion rate with segmentation and automated audience nurturing. 4. Keep your CRM in sync with Facebook, Google and LinkedIn Custom Audiences. 5. Use Driftrock customer segments to create...
    Starting Price: $49
  • 16
    Ideagen Huddle
    Ideagen Huddle is a cloud-based platform that provides a safe and unique workspace environment for your team, partners and external stakeholders. Companies in highly regulated industries can review work, securely share sensitive information and collaborate efficiently which allows you to maintain complete control of the document - meeting your project goals on time and to budget, every time. With Ideagen Huddle, you get an easier way to collaborate and co-edit documents, control file versions, collaborate with clients, and organize team tasks. ...
    Leader badge
    Starting Price: $11.00/month/user
  • 17
    Primo Dialler

    Primo Dialler

    Primo Dialler

    At Primo Dialler we don’t believe in ordinary. We like to go that little bit extra and design our hosted dialler solutions to be the best. Our secure platform is used by thousands of users around the world. Increase your conversions by up to 300% today with our no-commitment feature-rich hosted dialler. Our aim is to develop a long term relationship with you and provide you with the expertise you need to make your call centre operates to its optimum level.
    Starting Price: $0.05/month/user
  • 18
    GOT CRM

    GOT CRM

    Got Softwares

    Impossible will happen when there is a better way for Sales. Collaborate, Teleport and manage your customers from the Worlds best GOT CRM 2020. Stay On Top Of Your Business with Simple And Secure GOT CRM Trusted By 2000 customers From Around The World. GOT CRM provides synergetic integration of 60+ social apps. Trial Us. You will feel the flexibility of continuing our CRM for long term. Start your free trial today for 15 days. No Credit Card Required. No hidden cost charged.
    Starting Price: $10 per user per month
  • 19
    TenderEyes

    TenderEyes

    Tradax Group

    ...Effectively create wider team working, talking, sharing, learning and innovation. Integrated Public Procurement Portals and smarter opportunity identification, qualification tracking and approval. Dedicated secure library with auto-population, easy search and access to tender documentation, questions and responses.
  • 20
    iDashboards

    iDashboards

    iDashboards

    ...Our Operational Success Platform easily integrates with key data sources and users can quickly and effectively view and analyze critical performance metrics -- ultimately leading to enhanced decision-making capabilities. Increase transparency, reduce resource burdens, and improve decision-making with secure and shareable dashboards.
  • 21
    DemoHop

    DemoHop

    DemoHop

    ...Unlike a giant Zoom or Teams meeting, DemoHop brings hundreds or thousands of people on all at once, but allows the to connect, circulate and meet in small groups. Easy to setup, proven to make connections happen, turnkey to launch and affordable. Plus built for the enterprise with all the expected security and reporting capabilities.
  • 22
    Proposal Kit

    Proposal Kit

    Cyber Sea

    ...Save costs with a single low-cost purchase instead of incurring ongoing monthly fees. All our proposal packages include templates and layouts for all types of businesses and situations including healthcare and medical, transportation, logistics, security, pitching new business opportunities, business restructuring, crisis management, etc. Our staff is available to assist in helping you put together any kind of proposal document you need. Install locally or on your network or cloud. Contract and proposal writing for any business. Proposals and contracts for many situations. 15,000 page content library.
    Starting Price: $69.00/one-time/user
  • 23
    AvoCadata DatatoLeads
    Unlock the full potential of your data with DatatoLeads, the ultimate destination for buying and selling data in a secure and efficient manner. Our white label solutions empower businesses to operate their own branded data commerce platform, seamlessly integrating with existing systems. Whether you're looking to acquire fresh consumer lists, homeowner information, or specific business leads, DatatoLeads provides meticulously enriched data to meet diverse industry needs.
    Starting Price: $1
  • 24
    Homerun

    Homerun

    Homerun Presales

    ....​ -- Analytics ​& Reporting: Understand team utilization and measure impact and progress to ​uplevel your team's performance. -- Data ​Integration: Connect Homerun to other business systems to keep data, teams, and systems in sync. -- Security: SSO; SOC2/GDPR certified
    Starting Price: Contact for details
  • 25
    Yapster

    Yapster

    Yapster

    ...With two-way communication up and down the business, teams can send 1 to 1 and group messages, initiate flash polls, and post to a social newsfeed from their mobile phones. Yapster gives its customers full control of the platform to create a secure, closed environment. It also integrates with existing HR and operations systems, which makes administration effortless.
    Starting Price: Free
  • 26
    Privia

    Privia

    Privia

    Privia is the government contractor’s go-to solution for developing high-quality, stand-out proposals faster and easier. What makes Privia unique? Privia is designed specifically for the proposal team; to facilitate the process workflow, synchronize the teams assignments and deadlines, and empower team collaboration. Over 10,000 users from small, mid-size, and enterprise organizations leverage Privia every day to improve productivity, save time and deliver the proposal quality today's...
  • 27
    GaggleAMP

    GaggleAMP

    GaggleAMP

    GaggleAMP simplifies social media management and boosts employee advocacy. The platform enables managers to curate content for company and employee social media handles, aided by AI. Employees improve their personal brand while promoting the company, leading to higher brand awareness, press opportunities, lead generation, and marketing campaign success. To see how impactful an employee advocacy program could be for your company, visit our ROI calculator on our website.
    Starting Price: $500/month/50 seats
  • 28
    WISO MeinBüro

    WISO MeinBüro

    Buhl Data Service

    The flexible online office software for sustainable business success. Write convincing offers, tax office-compliant invoices and legally secure reminders right away. Easily do your accounting at the same time. Plan, manage and control all business activities and make your day-to-day work easier. Companies that create more time for the execution of services and the sale of products and thus want to make everyday work easier should use WISO MeinBüro. With the comprehensive functionalities of our intelligent office software, we support companies in the planning, management and control of all company activities. ...
    Starting Price: €6 per month
  • 29
    Thales Sentinel
    Sentinel Software Monetization solutions combine licensing, protection, and entitlement​​​​​​​ management to drive business growth. Let Sentinel help you extract the most value from your software. Our software solutions help customers generate new revenue streams, improve operational efficiency, increase customer satisfaction, and gain valuable business insights. Based on award-winning technology, Sentinel has a strong global customer base with over 10,000 customers, in 30 industries located...
  • 30
    Dialpad Connect
    ...The platform integrates seamlessly with popular business apps like Salesforce, Zendesk, Microsoft Teams, and Google Workspace to streamline workflows. Designed for businesses of all sizes, Dialpad Connect delivers enterprise-grade reliability with 100% uptime SLA and robust disaster recovery. Security and privacy are core priorities, meeting standards like GDPR, HIPAA, and SOC 2 compliance. Dialpad Connect helps companies elevate customer experiences while boosting team productivity.
    Leader badge
    Starting Price: $15 user/month
  • Previous
  • You're on page 1
  • 2
  • Next