Suggested Categories:

IT Security Software
IT security software is designed to protect information technology (IT) systems, networks, and data from cyber threats, such as malware, hacking, and unauthorized access. These tools provide various features such as antivirus protection, firewalls, encryption, intrusion detection and prevention systems, and vulnerability management to ensure the integrity, confidentiality, and availability of sensitive information. IT security software helps organizations detect, prevent, and respond to security incidents, mitigate risks, and ensure compliance with industry regulations. It is critical for businesses and individuals to safeguard against cyberattacks, data breaches, and other security vulnerabilities.
IoT Security Software
IoT (Internet of Things) security software is designed to protect connected devices and networks from cyber threats, ensuring the confidentiality, integrity, and availability of data transmitted between IoT devices. These tools monitor and secure devices, applications, and networks that are part of the IoT ecosystem, which includes sensors, actuators, smart appliances, wearables, and industrial equipment. IoT security software includes features such as threat detection, data encryption, access control, device authentication, and vulnerability management to mitigate risks from cyberattacks, unauthorized access, and data breaches. It is essential for industries like healthcare, manufacturing, transportation, and smart cities, where the IoT devices are widely used and often contain sensitive or critical data.
Data Center Security Software
Data center security software enables IT security professionals and organizations to secure their data center infrastructure including racks, networks, server endpoints, and more. Data center security tools provide all aspects of security for data centers. Data center security software helps protect the physical and virtual infrastructure of data centers from unauthorized access, cyber threats, and data breaches. Data center security software ensures that sensitive information and critical systems are safeguarded from external and internal threats by providing real-time alerts, logging activities, and implementing compliance with security standards.
Application Security Software
Application security software is designed to protect applications from cyber threats by identifying vulnerabilities, preventing attacks, and ensuring data integrity throughout the application’s lifecycle. This software typically includes features like static and dynamic analysis, runtime protection, and vulnerability scanning to detect and address potential security issues such as SQL injection, cross-site scripting (XSS), and unauthorized access. It helps organizations maintain secure applications by implementing best practices for secure coding, performing penetration testing, and monitoring for security breaches. Application security software is crucial for organizations to safeguard sensitive data, comply with regulations, and minimize the risk of exploitation.
Database Security Software
Database security software tools enable organizations to secure their databases, and ensure security compliance with database operations.
Website Security Software
Website security software enables the protection of websites from cyber threats, online attacks and hackers through DDoS protection features and web application firewalls.
Cloud Security Software
Cloud security software consists of tools, software, and services designed to protect data, applications, and infrastructure associated with cloud environments. It addresses unique security challenges posed by the cloud, such as data breaches, unauthorized access, and compliance with regulatory standards. These solutions often include features like encryption, identity and access management, intrusion detection systems, and security information and event management (SIEM). By implementing cloud security software, organizations can safeguard their cloud-based assets from cyber threats and ensure the integrity and confidentiality of sensitive information. As businesses increasingly adopt cloud services, robust cloud security measures have become essential for maintaining operational continuity and customer trust.
Computer Security Software
Computer security software helps protect devices, networks, and sensitive data from unauthorized access, cyberattacks, and other security threats. These tools provide a range of protective features such as antivirus, firewall, encryption, malware detection, and intrusion prevention systems. Computer security software is essential for safeguarding against viruses, ransomware, spyware, and phishing attacks, ensuring the integrity, confidentiality, and availability of data. Many security solutions also offer real-time monitoring, automated updates, and threat intelligence to detect and mitigate new vulnerabilities as they emerge. Businesses and individuals rely on computer security software to reduce risks, comply with regulations, and maintain a secure computing environment.
Data Security Software
Data security software is designed to protect sensitive data from unauthorized access, theft, or corruption. It includes a variety of tools and features such as encryption, access control, data masking, and backup and recovery to ensure that data remains secure at rest, in transit, and during processing. These solutions help organizations comply with data protection regulations, such as GDPR and HIPAA, by safeguarding personal, financial, and business data. Data security software often integrates with other IT security systems to provide comprehensive protection against cyberattacks, insider threats, and data breaches, ensuring that critical information remains protected.
Container Security Software
Container security software is software designed to protect containerized applications and environments from security vulnerabilities, threats, and attacks. Containers, which are used to deploy and run applications in isolated environments, present unique security challenges due to their dynamic and ephemeral nature. Container security software helps secure containerized environments by providing capabilities such as vulnerability scanning, runtime protection, access control, and image security. These tools monitor container configurations and activity to detect anomalies, ensure compliance with security policies, and mitigate risks like container escapes or unauthorized access. By enhancing the security of containers and container orchestration platforms (like Kubernetes), these solutions enable organizations to securely deploy and manage applications in cloud-native and microservices environments.
API Security Software
API security software is designed to protect APIs from security threats such as unauthorized access, data breaches, and denial-of-service attacks. These tools monitor, authenticate, and secure the connections between APIs and the systems they interact with, ensuring that only authorized users and systems can access the data or services offered by the API. Features typically include encryption, rate limiting, authentication (such as OAuth, JWT), API traffic monitoring, threat detection, and automated security testing. API security software is crucial for businesses that rely on APIs to connect with third-party services, mobile apps, or microservices, as it helps mitigate risks and maintain data integrity.
Network Security Software
Network security software is a type of software that helps protect computers, networks, and data from malicious attacks and unauthorized access. It is typically used by businesses to protect their confidential information and keep systems safe. It can also be used by individuals to protect their personal information and devices from potential threats.
Physical Security Software
Physical security software is a suite of tools designed to manage and monitor the security of physical spaces, assets, and individuals within an organization. These platforms often integrate with hardware systems such as access control systems, surveillance cameras, alarms, and sensors to provide a comprehensive security solution. Features of physical security software can include real-time monitoring, incident reporting, visitor management, access control, and remote security management. The software can also provide detailed analytics on security incidents, track access logs, and manage emergency response protocols. By helping organizations secure their physical premises, physical security software enhances safety, prevents unauthorized access, and ensures regulatory compliance.
Email Security Software
Email security software protects organizations from cyber threats such as phishing, malware, and spam by filtering incoming and outgoing email traffic. It uses advanced threat detection, encryption, and data loss prevention (DLP) to safeguard sensitive information. These tools also offer features like email authentication (DMARC, SPF, DKIM) and real-time threat intelligence to block emerging attacks. By securing email communications, businesses can prevent data breaches, ensure regulatory compliance, and maintain user trust. Email security software is essential for mitigating human error, which is one of the leading causes of data breaches.
Secure Web Gateways
Secure web gateways protect users and organizations from online threats by monitoring and controlling web traffic between internal networks and the internet. They filter malicious websites, block unauthorized access, and prevent data leaks by enforcing security policies in real time. These gateways use technologies such as URL filtering, malware scanning, sandboxing, and data loss prevention to safeguard users across devices and locations. Cloud-based versions extend protection to remote and hybrid workforces without relying on traditional network perimeters. Ultimately, secure web gateways ensure safe, compliant, and controlled internet access while maintaining high performance and user productivity.
Security Awareness Training Programs
Security awareness training programs are platforms designed to help employees, partners, and other stakeholders recognize and respond to security threats and best practices. These programs typically focus on topics like phishing, password management, data protection, and secure browsing habits, aiming to create a culture of security within an organization. By providing interactive modules, quizzes, and real-world scenarios, these programs ensure that participants can identify potential risks and mitigate them effectively. Many security awareness training platforms offer tracking and reporting features, allowing organizations to monitor progress and measure the effectiveness of their training efforts. The goal is to reduce the likelihood of security breaches caused by human error and ensure that individuals are well-informed about their role in maintaining cybersecurity.
Cloud Access Security Brokers (CASB)
Cloud Access Security Brokers (CASBs) are software applications that sit between a cloud service provider and an organization. Their purpose is to provide visibility and control over the use of cloud services, ensuring that data remains secure while enabling users to access the resources they need from any device. CASBs operate in real-time and can be used with multiple cloud platforms, such as SaaS, IaaS, or PaaS. They also provide granular access controls on user activities within the cloud system, allowing administrators to create rules around data sharing.
Zero Trust Security Software
Zero trust security software, also known as zero trust networking software, provides a security solution based on the zero trust methodology. Zero trust security solutions enable organizations to enforce security policies on a "zero trust" basis for both internal and external users, and allow security teams to track, monitor, and analyze user behavior and usage across the network to identify potential threats.
School Safety Software
School safety software is a digital platform designed for educational institutions (K-12, higher education, and campuses) to prevent, manage, and respond to safety, security, and well-being incidents. It typically covers visitor and access control, student behavior monitoring, emergency notification & lockdown, incident reporting, and analytics on safety trends. Many solutions integrate with campus systems (e.g., student/visitor databases, video surveillance, PA systems) as well as mobile apps for staff and first responders. By centralizing workflow, alerts, and documentation, school safety software helps institutions improve response times, increase situational awareness, enforce policy, and create safer environments. It also supports compliance with standards, drills, audits and after-incident reviews.
DNS Security Software
DNS security software enables organizations to protect their DNS against threats and malware. DNS security solutions streamline the process of securing DNS servers against attacks.
  • 1
    NinjaOne

    NinjaOne

    NinjaOne

    NinjaOne automates the hardest parts of IT, delivering visibility, security, and control over all endpoints for more than 20,000 customers. The NinjaOne automated endpoint management platform is proven to increase productivity, reduce security risk, and lower costs for IT teams and managed service providers. The company seamlessly integrates with a wide range of IT and security technologies. NinjaOne is obsessed with customer success and provides free and unlimited onboarding, training...
    Leader badge
    View Software
    Visit Website
  • 2
    Comet Backup

    Comet Backup

    Comet Backup

    Start running backups and restores in less than 15 minutes! Fast, secure backup software for businesses and IT providers. Comet is a flexible, all-in-one backup platform available in 13 languages. You choose your backup destination, server location, configuration and setup. Backup to your own storage/location, SFTP, FTP or cloud storage provider (Wasabi, Amazon AWS, Google Cloud Storage, Microsoft Azure, Backblaze B2, or other S3-compatible cloud providers). Comet’s modern ‘chunking...
    Leader badge
    Starting Price: $19 per month
    Partner badge
    View Software
    Visit Website
  • 3
    Kamatera

    Kamatera

    Kamatera

    .... With a robust service like ours, you can expect plenty of great features, such as fantastic hardware, flexible and scalable cloud setup, fully managed hosting, windows server hosting, data security and safety, consultation, server migration, and disaster recovery. Our technical staff is always on duty, with 24/7 live support to assist you across all time zones. And our flexible, predictable pricing plans means you’ll only pay for what you use with our hourly or monthly billing options.
    Starting Price: $4 per month
    View Software
    Visit Website
  • 4
    Commvault Cloud
    Commvault Cloud is a comprehensive cyber resilience platform designed to protect, manage, and recover data across diverse IT environments, including on-premises, cloud, and SaaS applications. Powered by Metallic AI, it offers advanced features such as AI-driven threat detection, automated compliance tools, and rapid recovery capabilities like Cleanroom Recovery and Cloudburst Recovery. The platform ensures continuous data security through proactive risk scanning, threat hunting, and cyber...
  • 5
    Percona XtraBackup
    Percona XtraBackup is a free, open source, complete online backup solution for all versions of Percona Server for MySQL, MySQL, and MariaDB. Percona XtraBackup performs online non-blocking, tightly compressed, highly secure backups of InnoDB, XtraDB, and HailDB storage engines on transactional systems, so that applications remain fully available during planned maintenance windows. Percona XtraBackup can perform streaming, compressed, and incremental MySQL backups. Percona XtraDB Cluster (PXC...
    Leader badge
    Starting Price: Free
  • 6
    Compass

    Compass

    Cobalt Iron

    Forget the days of managing data protection events through multiple, disconnected backup products. With Compass, you can set policies, view operations, and track granular performance for all your workloads. Compass is secure by design and the only data backup solution endorsed by Sheltered Harbor for both on-prem and cloud. It's architected to eliminate vulnerabilities in the backup process that expose data to cyberattack. If disaster strikes, your backup is ready to help you recover...
  • 7
    Acronis Cyber Protect
    Managing cyber protection in a constantly evolving threat landscape is a challenge. Safeguard your data from any threat with Acronis Cyber Protect (includes all features of Acronis Cyber Backup) – the only cyber protection solution that natively integrates data protection and cybersecurity. - Eliminate gaps in your defenses with integrated backup and anti-ransomware technologies. - Safeguard every bit of data against new and evolving cyberthreats with advanced MI-based protection...
    Starting Price: $85
  • 8
    Avast Business Hub
    The Business Hub is an integrated, cloud-based security platform for businesses and IT service providers to manage all Avast Business solutions deployed in their networks. It provides real-time visibility of threats, comprehensive reporting, and management capabilities, all from a single pane of glass. Formerly known as CloudCare, the Business Hub is an easy-to-use cloud security platform with a refreshing new UI.
    Leader badge
    Starting Price: $36.99
  • 9
    Bacula Enterprise

    Bacula Enterprise

    Bacula Systems

    ... and functionality of Bacula Enterprise into a wide range of IT environments such as enterprise data centers, managed service providers, software vendors or cloud providers. Thousands of organizations worldwide use Bacula Enterprise in mission-critical environments, including NASA, Texas A&M University, Unicredit, Swisscom, Sky, and many more. Bacula provides additional security features over other vendors and offers advanced, hybrid Cloud connectivity to Amazon, S3, Google, Oracle and many more.
  • 10
    Asigra

    Asigra

    Asigra

    Asigra helps IT teams increase their data recovery confidence through our unsurpassed reliability, security, manageability, and affordability in data protection software. Asigra's Enterprise Backup and Disaster Recovery (BDR) software platform was designed for Managed Service Providers (MSPs) to host and operate their own Backup as a Service solution. The easy to manage platform offers users the ability to white-label it to match your brand, while its breakthrough Hybrid Cloud Backup...
  • 11
    Unitrends Backup
    Unitrends Unified Backup platform protects your data no matter where it lives. A complete and agile platform, Unitrends offers protection for on-premises infrastructure, cloud-based workloads, SaaS applications and remote endpoints devices like PCs and workstations. Integrations with remote management, security and IT documentation tools provide end-to-end protection from human error, cyberthreats and inject automation and artificial intelligence to simplify complex systems. Managed through...
  • 12
    V2 Cloud

    V2 Cloud

    V2 Cloud Solutions

    V2 Cloud offers powerful, secure, and fully managed virtual desktops accessible from anywhere. Our platform is purpose-built for Independent Software Vendors, Managed Service Providers, IT professionals, and business owners looking to streamline operations, improve security, and scale efficiently. With V2 Cloud, you can easily start your desktops and apps in the cloud, enabling secure remote work from anywhere. Plus, you can access fully managed IT services, proactive security...
    Starting Price: $40 per month
  • 13
    Carbonite

    Carbonite

    OpenText

    ... and access files from any device via a secure, web-based dashboard. Meet data retention requirements. Business cloud backup that meets your needs. Whether you’re restoring a single file or your entire folder system, just a few clicks will have you on your way. Advanced encryption keeps your data secure in transit and in storage, so it never exists in an unprotected state. Other companies charge extra for support. Carbonite Safe includes support from our award-winning team of specialists.
    Starting Price: $6 per month
  • 14
    AhsayCBS

    AhsayCBS

    Ahsay Systems Corporation Limited

    Ahsay Backup Software is specifically designed for Managed Service Providers, System Integrators, or IT Consulting Companies. It enables them to offer secure managed, cloud-hosted, and on-premises backup services to clients and earn a stable recurring income. The whole solution is built on a client-server architecture: The server-side centralized management console (AhsayCBS) can be installed on your backup server hosted in your data center or on a cloud platform like Microsoft Azure. We...
    Starting Price: $1.50 / month
  • 15
    euBackups

    euBackups

    euBackups

    Cloud-hosted GDPR compliant business backups. Take the complexity out of backing up your systems, employee devices and critical data. Secure and robust infrastructure with German servers. Start your Free 30 day trial today.
    Starting Price: $26.75 per month
  • 16
    IBackup

    IBackup

    Pro Softnet

    Being a small business, you may have multiple computers, laptops, mobile devices and servers. The data on these devices, including always running applications like quickbooks or your Microsoft Exchange - You cannot afford to lose them. So, how do you protect all of your critical data cost effectively, securely and easily? IBackup gives you automatic and continuous cloud backup, for multiple devices, at one price. With us, you can be at peace, knowing your files are being safely backed up...
    Starting Price: $9.95 per month
  • 17
    OpenText Server Backup
    OpenText Server Backup gives your business a secure, all-in-one solution for protecting physical, virtual, and legacy systems with flexible local, cloud, or hybrid deployment and rapid, near-zero-downtime recovery via bare-metal restores, granular file and application-aware options, and push-button cloud failover with automated failback. Managed through a single pane of glass, it supports optional integrated hardware appliances or virtual-machine-based configurations, customizable scheduling...
  • 18
    NAKIVO Backup & Replication
    NAKIVO Backup & Replication offers complete data protection for virtual, physical, cloud, and SaaS environments including VMware vSphere, Microsoft Hyper-V, Nutanix AHV, Proxmox VE, Amazon EC2, Windows and Linux physical machines and servers, files shares/NAS, Oracle database, and Microsoft 365. You can install the NAKIVO solution on Linux and Windows OS, or deploy it as a pre-configured virtual appliance (VA) or Amazon Machine Image (AMI). You can also install the solution on NAS to...
    Starting Price: $229/ socket; $25 workload/y
  • 19
    BDRSuite

    BDRSuite

    Vembu Technologies

    .... BDRSuite is designed to help businesses keep their data secure and ensure it is easily recoverable in the event of data loss or ransomware attacks. With BDRSuite, businesses can achieve reliable data protection and ensure business continuity – all at an affordable price.
    Starting Price: $1.20/month
  • 20
    KeepItSafe

    KeepItSafe

    KeepItSafe

    KeepItSafe delivers comprehensive data availability and Data Protection-as-a-Service solutions for cloud backup, disaster recovery, mobile endpoint, and SaaS applications. With 20+ global data center locations, KeepItSafe is SOC 2, HIPAA, and PCI compliant and offers custom managed and monitored services including 24/7 support. The industry’s most secure, scalable, and easy-to-manage cloud backup and on-demand data recovery service — offering Backup-as-a-Service (BaaS) with fully managed...
  • 21
    NovaStor DataCenter
    ... smoothly from day one. With advanced features like: multi-streaming, multithreading, VM replication, VM snapshots, granular restore, multi-tenant support, unlimited VM support and auditable reports, you get a comprehensive backup and recovery solution without the complexity or expense of comparable backup solutions. Securely scales to protect unlimited amounts of data against data loss.
    Starting Price: $2500.00/year
  • 22
    Vinchin Backup & Recovery
    Vinchin Backup & Recovery, a comprehensive next-generation backup solution self-developed by Vinchin, supports the world’s most mainstream virtual environments including VMware, Hyper-V, XenServer, XCP-ng, oVirt, RHV, Oracle OLVM, Sangfor HCl, OpenStack, Huawei FusionCompute(Xen Based), H3C CAS/UIS, ZStack, Proxmox, database including Oracle DB, MySQL, SQL Server, PostgreSQL, Postgres Pro, MariaDB, Windows and Linux physical machines, file shares/NAS, and supports cross-platforms recovery or...
  • 23
    Morro Data CloudNAS
    Morro Data CloudNAS Global File Services enable companies with two or more offices to share their files in real-time and no VPN or sync software required. Cloud NAS combines the local network performance of a NAS with the reliability, scalability, and accessibility of the cloud for a cloud-first solution. It allows businesses to quickly and efficiently have unlimited file storage, collaborate with multiple office file sync & lock, and get instant disaster recovery. Morro Data CloudNAS...
    Starting Price: $129.00/month
  • 24
    Appranix

    Appranix

    Appranix

    Appranix empowers enterprises to achieve cloud application resilience against any cloud application downtime. Average ransomware attack costs 4.54M USD and takes about 26 days to recover. 14% of cloud application downtime occurs due to misconfigurations. Appranix's unique approach delivers unprecedented resilience for distributed and dynamic cloud workloads. Our patented continuous cloud infrastructure backup, cloud-native data backup and replication along with automated recovery-as-code...
    Starting Price: $25/unit/month
  • 25
    Infomaniak

    Infomaniak

    Infomaniak Network

    Infomaniak is a major cloud player in Europe and the leading developer of web technologies in Switzerland. From the design of data centers and products to the orchestration of cloud infrastructures, Infomaniak is a Swiss cloud player that controls its value chain from end to end and is exclusively owned by its employees. This independence enables it to guarantee the security, confidentiality and sovereignty of the data of more than one million users in more than 208 countries. At the heart...
  • 26
    Datashelter

    Datashelter

    Datashelter

    We're excited to introduce Datashelter, your server backup automation service, tailored for freelancers, VSEs, and SMBs. Datashelter is founded on three core principles: - Effortless Installation: Activate your backup with just two clicks from your dashboard. Yes, it's that straightforward! 🚀 - Proactive Alerting: Stay ahead of the curve with immediate alerts for any unforeseen issues, from skipped backups to data integrity concerns. Your peace of mind is our priority! 🚨 - Secured...
    Starting Price: €9/month
  • 27
    BackupVault

    BackupVault

    Blueraq Networks

    BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup for servers, laptops, PCs, Microsoft 365 and Google Workspace accounts. And we’re based 100% in the UK (for both our support and data centres) and trusted by thousands of organisations worldwide. Our primary client base is in the UK business market (SMEs) and public services, including schools and councils. We have a very friendly and experienced team who are available in the UK 24/7 to...
    Starting Price: £20 per month
  • 28
    BACKUP EAGLE

    BACKUP EAGLE

    Schmitz RZ Consult GmbH

    BACKUP EAGLE Backup Monitoring, Reporting, Audit & Compliance for IBM Spectrum Protect, IBM Spectrum Protect Plus, DellEMC NetWorker, Veeam, Rubrik, SEP sesam, IBM BRMS, RMAN, CommVault and more. Everything that can be automatically created for your backup environment is provided directly by BACKUP EAGLE®. Reliable detection of missing backups and application servers without any backup. Various analyses about backups and restores, backup clients, backup servers and backup devices. Different...
  • 29
    Zmanda

    Zmanda

    Zmanda

    Zmanda is a proven, reliable, high-performance enterprise backup and recovery solution. Zmanda provides a comprehensive solution at 50% less than the competition. You also get 24*7 support with a 2x higher NPS than the industry average. Since 2005, Zmanda has been trusted by enterprises, governments, and educational institutions worldwide. Zmanda enables you to back up to cloud, NAS, and disk. Zmanda supports advanced features, such as ransomware protection with air gap, client-side...
    Starting Price: $499
  • Previous
  • You're on page 1
  • Next