Results for: security scanner

Suggested Categories:

Vulnerability Scanners
Vulnerability scanners enable organizations to perpetually track and monitor applications and systems to detect security flaws, threats, and vulnerabilities. Vulnerability scanners scan for vulnerabilities by drawing from a fresh database of vulnerabilities.
Document Scanner Software
Document scanner apps are software applications that enable users to scan documents using a device such as a smartphone, tablet, or computer. Document scanning software and apps can scan documents and save them as various file types. Some document scanners come equipped with optical character recognition (OCR) functionality and/or AI that allows for natural language understanding and intelligent document processing and indexing.
Receipt Scanner Software
Receipt scanner apps and software enable users to scan receipts using a mobile device, computer, or scanner. Receipt scanning software may also offer features such as receipt management, OCR, AI, and other intelligent processing capabilities so that receipts and expenses can be classified correctly and expense reports can be created.
IP Scanners
IP scanners are software tools used to identify and assess a range of devices connected to a network. Scanners query all connected devices, gathering information such as IP addresses and device manufacturers. The gathered data can then be analyzed in order to detect any potential threats or faults within the network.
Barcode Scanner Apps
Barcode scanner apps and software are tools that can be utilized to read barcodes from physical products, items, or documents. By pointing the camera on a mobile device at a barcode, the app or software is able to interpret it into information which can then be used for various purposes such as identifying a product or tracking inventory. Barcode scanners have been around for decades and are widely used in many businesses for data collection and inventory management. In recent years, the technology has become more accessible to consumers with the emergence of mobile applications that enable easy scanning capabilities. Barcode scanner apps and software offer an efficient way to capture accurate and reliable information quickly and conveniently.
Cookie Scanners
Cookie scanners automatically scan a website to find all cookies, tracking tags, and other tracking scripts and pixels in order to compile a list of trackers so that organizations can present this list to customers and users to get their consent and remain compliant with data privacy regulations.
IT Security Software
IT security software is designed to protect information technology (IT) systems, networks, and data from cyber threats, such as malware, hacking, and unauthorized access. These tools provide various features such as antivirus protection, firewalls, encryption, intrusion detection and prevention systems, and vulnerability management to ensure the integrity, confidentiality, and availability of sensitive information. IT security software helps organizations detect, prevent, and respond to security incidents, mitigate risks, and ensure compliance with industry regulations. It is critical for businesses and individuals to safeguard against cyberattacks, data breaches, and other security vulnerabilities.
IoT Security Software
IoT (Internet of Things) security software is designed to protect connected devices and networks from cyber threats, ensuring the confidentiality, integrity, and availability of data transmitted between IoT devices. These tools monitor and secure devices, applications, and networks that are part of the IoT ecosystem, which includes sensors, actuators, smart appliances, wearables, and industrial equipment. IoT security software includes features such as threat detection, data encryption, access control, device authentication, and vulnerability management to mitigate risks from cyberattacks, unauthorized access, and data breaches. It is essential for industries like healthcare, manufacturing, transportation, and smart cities, where the IoT devices are widely used and often contain sensitive or critical data.
Data Center Security Software
Data center security software enables IT security professionals and organizations to secure their data center infrastructure including racks, networks, server endpoints, and more. Data center security tools provide all aspects of security for data centers. Data center security software helps protect the physical and virtual infrastructure of data centers from unauthorized access, cyber threats, and data breaches. Data center security software ensures that sensitive information and critical systems are safeguarded from external and internal threats by providing real-time alerts, logging activities, and implementing compliance with security standards.
Application Security Software
Application security software is designed to protect applications from cyber threats by identifying vulnerabilities, preventing attacks, and ensuring data integrity throughout the application’s lifecycle. This software typically includes features like static and dynamic analysis, runtime protection, and vulnerability scanning to detect and address potential security issues such as SQL injection, cross-site scripting (XSS), and unauthorized access. It helps organizations maintain secure applications by implementing best practices for secure coding, performing penetration testing, and monitoring for security breaches. Application security software is crucial for organizations to safeguard sensitive data, comply with regulations, and minimize the risk of exploitation.
Website Security Software
Website security software enables the protection of websites from cyber threats, online attacks and hackers through DDoS protection features and web application firewalls.
Cloud Security Software
Cloud security software consists of tools, software, and services designed to protect data, applications, and infrastructure associated with cloud environments. It addresses unique security challenges posed by the cloud, such as data breaches, unauthorized access, and compliance with regulatory standards. These solutions often include features like encryption, identity and access management, intrusion detection systems, and security information and event management (SIEM). By implementing cloud security software, organizations can safeguard their cloud-based assets from cyber threats and ensure the integrity and confidentiality of sensitive information. As businesses increasingly adopt cloud services, robust cloud security measures have become essential for maintaining operational continuity and customer trust.
Database Security Software
Database security software tools enable organizations to secure their databases, and ensure security compliance with database operations.
Data Security Software
Data security software is designed to protect sensitive data from unauthorized access, theft, or corruption. It includes a variety of tools and features such as encryption, access control, data masking, and backup and recovery to ensure that data remains secure at rest, in transit, and during processing. These solutions help organizations comply with data protection regulations, such as GDPR and HIPAA, by safeguarding personal, financial, and business data. Data security software often integrates with other IT security systems to provide comprehensive protection against cyberattacks, insider threats, and data breaches, ensuring that critical information remains protected.
Network Security Software
Network security software is a type of software that helps protect computers, networks, and data from malicious attacks and unauthorized access. It is typically used by businesses to protect their confidential information and keep systems safe. It can also be used by individuals to protect their personal information and devices from potential threats.
API Security Software
API security software is designed to protect APIs from security threats such as unauthorized access, data breaches, and denial-of-service attacks. These tools monitor, authenticate, and secure the connections between APIs and the systems they interact with, ensuring that only authorized users and systems can access the data or services offered by the API. Features typically include encryption, rate limiting, authentication (such as OAuth, JWT), API traffic monitoring, threat detection, and automated security testing. API security software is crucial for businesses that rely on APIs to connect with third-party services, mobile apps, or microservices, as it helps mitigate risks and maintain data integrity.
Computer Security Software
Computer security software helps protect devices, networks, and sensitive data from unauthorized access, cyberattacks, and other security threats. These tools provide a range of protective features such as antivirus, firewall, encryption, malware detection, and intrusion prevention systems. Computer security software is essential for safeguarding against viruses, ransomware, spyware, and phishing attacks, ensuring the integrity, confidentiality, and availability of data. Many security solutions also offer real-time monitoring, automated updates, and threat intelligence to detect and mitigate new vulnerabilities as they emerge. Businesses and individuals rely on computer security software to reduce risks, comply with regulations, and maintain a secure computing environment.
Container Security Software
Container security software is software designed to protect containerized applications and environments from security vulnerabilities, threats, and attacks. Containers, which are used to deploy and run applications in isolated environments, present unique security challenges due to their dynamic and ephemeral nature. Container security software helps secure containerized environments by providing capabilities such as vulnerability scanning, runtime protection, access control, and image security. These tools monitor container configurations and activity to detect anomalies, ensure compliance with security policies, and mitigate risks like container escapes or unauthorized access. By enhancing the security of containers and container orchestration platforms (like Kubernetes), these solutions enable organizations to securely deploy and manage applications in cloud-native and microservices environments.
Physical Security Software
Physical security software is a suite of tools designed to manage and monitor the security of physical spaces, assets, and individuals within an organization. These platforms often integrate with hardware systems such as access control systems, surveillance cameras, alarms, and sensors to provide a comprehensive security solution. Features of physical security software can include real-time monitoring, incident reporting, visitor management, access control, and remote security management. The software can also provide detailed analytics on security incidents, track access logs, and manage emergency response protocols. By helping organizations secure their physical premises, physical security software enhances safety, prevents unauthorized access, and ensures regulatory compliance.
Email Security Software
Email security software protects organizations from cyber threats such as phishing, malware, and spam by filtering incoming and outgoing email traffic. It uses advanced threat detection, encryption, and data loss prevention (DLP) to safeguard sensitive information. These tools also offer features like email authentication (DMARC, SPF, DKIM) and real-time threat intelligence to block emerging attacks. By securing email communications, businesses can prevent data breaches, ensure regulatory compliance, and maintain user trust. Email security software is essential for mitigating human error, which is one of the leading causes of data breaches.
View more categories (20) for "security scanner"

68 Products for "security scanner" with 2 filters applied:

  • 1
    Proton Mail

    Proton Mail

    Proton AG

    ...Protected by Swiss privacy laws and trusted by over 50,000 businesses, Proton Mail keeps your business data confidential and under your control. With Proton Mail and Calendar, your team can securely manage their inbox and schedule, while your organization maintains a professional presence with support for custom email domains and personalized branding. And with the Easy Switch tool, migrating from Google or Microsoft is seamless, no IT expertise required.
    Leader badge
    Starting Price: $6.99/user/month
    View Software
    Visit Website
  • 2
    HERE Enterprise Browser

    HERE Enterprise Browser

    Here Enterprise Inc.

    ...The company is backed by major banks and IQT, the not-for-profit strategic investor that accelerates the introduction of groundbreaking technologies to enhance the national security of America and its allies.
    View Software
    Visit Website
  • 3
    Apple Notes
    Notes is the best place to jot down quick thoughts or to save longer notes filled with checklists, images, web links, scanned documents, handwritten notes, or sketches. And with iCloud, it’s easy to keep all your devices in sync, so you’ll always have your notes with you.
  • 4
    MSI Afterburner
    ...While increasing your GPU’s clock frequency and voltage, the fan speed control will enable you to find the perfect balance between performance and temperature. OC Scanner is an automated function that will find the highest stable overclock settings for your card. Giving you a free performance boost for a smooth in-game experience thanks to higher FPS.
  • 5
    Creativity 365

    Creativity 365

    Kdan Mobile Software

    Creativity 365 is a holistic content creation suite featuring 5 apps including Animation Desk, Write-on Video, NoteLedge, Markup, and Pocket Scanner. It empowers you to create jaw-droppingly beautiful, and professional content seamlessly - even while on the go. With the Creativity 365 subscription, you will get an all-access pass to all premium features in the suite across smartphones, tablets and desktops, along with 1TB of Kdan Cloud storage and credits for file conversion.
    Starting Price: $9.99 per month
  • 6
    ONLYOFFICE Docs

    ONLYOFFICE Docs

    Ascensio System SIA

    ONLYOFFICE is an open-source project that offers cloud-based and self-hosted solutions for business of all sizes. The key product is ONLYOFFICE Docs, a secure office suite that seamlessly integrates into the most popular platforms, e.g. Odoo, Alfresco, Confluence, Pipedrive, Redmine, SuiteCRM and more. When integrated, ONLYOFFICE Docs provides the users of your business app with editors for documents, spreadsheets, presentations, forms, PDFs and diagrams. The ONLYOFFICE suite makes it possible to collaborate on office files in real time. ...
    Leader badge
    Starting Price: Free
    View Software
    Visit Website
  • 7
    Tuta

    Tuta

    Tuta

    Tuta offers a highly secure, encrypted email, calendar, and contacts service designed to give users complete control over their data. With end-to-end encryption powered by quantum-safe cryptography, Tuta ensures that all your communications are private and safe from surveillance. The platform is easy to use, supports mobile apps for Android and iOS, and is ad-free, offering a seamless experience across multiple devices.
    Starting Price: €1.20 per month
  • 8
    Brosix

    Brosix

    Brosix

    Brosix Instant Messenger (IM) supports businesses to streamline and secure their team communication through private team communication networks. Brosix provides businesses with all of the tools they need to increase team productivity in one user friendly and fully encrypted platform, including file transfer, screen sharing, group and private chat, virtual whiteboard and more. Brosix IM’s private networks help businesses to increase team collaboration and efficiency, reduce overhead, and guarantee data privacy. ...
    Leader badge
    Starting Price: $4 per month
  • 9
    MyChat

    MyChat

    Network Software Solutions

    Secure instant messaging system with own server that can work in local area network and over the Internet. Providing collaboration tools for employee engagement. Built-in knowledge base, important notifications with return receipts, Bulletin board, broadcast messages, flexible server management, the system for user rights to access MyChat features, voice/video calls, screen sharing calls, Kanban project management, conferences, private dialogues, extended contact list, available for all platforms: Windows, macOS, Linux, Android, iOS, WEB.
    Starting Price: $6/per user/one-time
  • 10
    Zoho Notebook
    ...Each Note Card type is designed to complement the type of note you're taking. Jot, list, record, sketch, and snap what you need to remember with Text Card. Safely and securely share your notes with friends and co-workers. Share notes and collaborate securely with the people you trust—and only them. This is the Notebook you'll never lose because it syncs to the cloud and across your devices. It's always backed-up and always up to date. We don't sell your info. We don't do ads. Our business model ensures our ability to act in your best interest while storing and securing your data.
  • 11
    WebCatalog Desktop
    ...It lets you transform any website into a standalone desktop app, eliminate browser tab overload, and easily switch between multiple accounts for the same service without constant logins. Each app runs in its own secure sandbox, safeguarding your data and preventing cross-site tracking. With unified notifications, customizable layouts, workspace grouping, and cross-platform sync, WebCatalog Desktop delivers a seamless, organized, and distraction-free digital workflow.
    Starting Price: Free
    View Software
    Visit Website
  • 12
    Citadel Team

    Citadel Team

    Thales SIX GTS

    As easy to use as your personal communication apps, Citadel Team is compatible on all your terminals and offers all the standard features of instant communication. Operated by Thales and hosted in France, Citadel Team offers a high level of security and guarantees a model without data resell. Activated when necessary, with the end-to-end encryption option, only your devices can read your conversations. Deploy, control and manage your corporate fleet from the Citadel Team administration console, while guaranteeing the identity of your users via their professional e-mail. Increased team reactivity, centralized conversations and file sharing in private or public personalized spaces for your projects. ...
  • 13
    Bluenote

    Bluenote

    Bluenote

    ...Intelligent password strength algorithms that tell you whether your passwords are really dependable. And there's a lot more. Dropbox and Tweet Boost (for Twitter) connectivity, password lock, distraction-free full screen. And it all comes with automatic security and encryption, so your data is bullet-proof without any extra work.
    Starting Price: $4.99 one-time payment
  • 14
    Thinkfree Office
    Thinkfree Office: Seamless MS Office integration, top-tier security, and swift support for a streamlined workflow with many professional features. - On-premise: Robust security and data control excellence - Co-edit: Documents, sheets, and presentations in real-time using collaborative tools - Web Browser-Based Document Editor: Integrated with existing platforms - Languages Available: The software supports 14 languages, including English and Korean - Compatibility: Compatible with Microsoft Office, word processors, spreadsheets, and presentation programs. ...
  • 15
    Tuta Calendar
    ...This means your data belongs to you, and no one else can access it. The intuitive, clean design allows for easy organization of appointments, business meetings, and repeating tasks. Push notifications are sent securely, so no third party can track you. Two-factor authentication can be enabled to protect your login credentials from malicious attacks. Tuta Calendar is available with free and open source desktop clients. You can share calendars and events with your family, organization, or company with a few taps.
    Starting Price: €3 per month
  • 16
    Wimi

    Wimi

    Wimi

    ...It is the European leader in project management and online collaboration software. Wimi offers a range of tools built to keep businesses in sync, boost team productivity, improve collaboration, and secure critical data. Top features include unified workspaces, a drive solution, team communication, file sharing, task management, project calendar, video/audio calls, reporting, and access rights management. Your data is secured on Wimi as it adheres to the highest industry standards for security such as multi-factor authentification and encryption. 55,000 companies are already using Wimi everyday : try it by yourself, start your 14-day free trial !
    Leader badge
    Starting Price: €3.00/month/user
  • 17
    Canary Mail

    Canary Mail

    Canary Mail

    Email, meet AI. Canary can write your emails, prioritize what needs attention, silence spam & much more. Say hello to your Inbox Copilot!
    Starting Price: $20/month
  • 18
    IceWarp

    IceWarp

    IceWarp

    The only office rule is, there is no office. Business email, TeamChat for project teamwork, real-time office document collaboration and online meetings. All in our secure cloud and for half the usual cost. Chat in teams organized around projects, upload files, mention coworkers, comment on posted emails, pin important posts. Integration with email enables sharing received messages directly to TeamChat room for colleagues‘ attention. Skyrocket your office work effectivity with Desktop Client and Desktop Office documents on Windows as well as Linux devices. ...
    Starting Price: $312.00/year/user
  • 19
    Reflect

    Reflect

    Reflect

    Reflect is a note-taking app that helps you think better by mirroring the way your brain works. It prioritizes frictionless thought capture and recall, and encrypts your notes to make them secure. Reflect syncs all of your notes in real-time across your devices, and allows you to capture snippets from your browser or Kindle. It also connects to all of your calendars so that you never miss a meeting or agenda again. Think of the convenience of Apple Notes with 100x the power.
    Starting Price: $10/month
  • 20
    Meet Hour

    Meet Hour

    Meet Hour

    Meet Hour allows healthcare providers to extend the reach of their practice by providing secure, easy-to-join telehealth visits to patients from any device or location. During the pandemic, almost 50% of all patient interactions have been virtual. Can use from any device (mobile app or desktop) without downloading via a browser. Extremely simple and easy to use for both clinicians and patients. Conducts secure online sessions between patients and doctors.
    Starting Price: $6.59 per user per month
  • 21
    iCloud

    iCloud

    Apple

    ...They’re safe, up to date, and available wherever you are. If you lose a device, use Find My iPhone on iCloud.com to locate it, turn on Lost Mode, or erase it remotely. Securely store your files in iCloud Drive so you can share them with friends and colleagues. Add or edit photos and videos on one device, see them on all your devices.
  • 22
    Microsoft 365

    Microsoft 365

    Microsoft

    ...With Microsoft Designer, users can create stunning visuals, while Clipchamp adds professional-grade video editing capabilities. Built-in Microsoft Defender provides advanced security for personal data and devices. Microsoft 365 empowers individuals to imagine, create, and accomplish with greater efficiency and confidence.
    Leader badge
    Starting Price: $9.99/month
  • 23
    Snappy

    Snappy

    Snappy

    ...Snappy is perfect for clipping stuff from your screen, visual note taking, reference information between windows - on top of the many creative uses you'll discover along the way. One of Snappy's key aspects is centered around collecting pieces of content (snaps), which are securely stored on your computer and neatly organized. This is great for fueling your inspiration and keeping track of your snapshots, while keeping the desktop clean. Sharing a snap is simple, secure and fast. With SnappyLink you get a unique URL to send around, visible on all devices. Aditionally, you can set a password for your shared snap and/or set a self-destruct timer on it.
  • 24
    Calendar.online

    Calendar.online

    Calendar.online

    For your calendar you get several access links for which you can set individual permissions (e.g. read or write). For increased security, each access link can be additionally protected with a password. Due to the easy access via links and the extensive rights management, Calendar.online is optimally suited to work on a calendar with several people in an uncomplicated way. Structure your calendar with colored sub-calendars. For each access link, you can also define which sub-calendars are readable and writable. ...
    Starting Price: $7.90 per month
  • 25
    Cap

    Cap

    Cap

    ...Additionally, it provides unlimited recording time and cloud storage, facilitating seamless collaboration and sharing among team members. Cap emphasizes user ownership and privacy by allowing recordings to be stored in custom S3 buckets, ensuring data security.
    Starting Price: $6 per month
  • 26
    Anytype

    Anytype

    Any Association

    Anytype is a no-code, all-in-one app that respects user privacy and data ownership. Anyone can use Anytype to build a space - a safe place for your notes, documents, tasks, project planners, databases, and more. Anytype uses an object-oriented approach towards data management, wherein any unit of data can be linked to any other unit in a graph format. Our community loves us for the elegant interface and focus on data sovereignty. The software ensures full encryption of data and does...
  • 27
    Savvyshot

    Savvyshot

    Bigvaria

    ... 🎨 Background Options: Enhance visuals with preset backgrounds, gradients, or custom images. ✏️ Powerful Annotation Tools: Add shapes, lines, arrows, and text to highlight key details. 🔒 Privacy First: All screenshots stay securely on your device—nothing is uploaded. ⚡ Optimized Speed: Built for fast performance to keep up with your workflow.
    Starting Price: $19.99/device
  • 28
    Microsoft Outlook
    ...The built-in Microsoft Copilot assists with writing emails, summarizing long threads, and managing tasks to boost productivity. Outlook also offers enterprise-grade security, filtering out spam, phishing, and malware to keep your data safe. Whether on desktop, mobile, or web, Outlook helps you manage communication and time with clarity and confidence.
  • 29
    Vivaldi

    Vivaldi

    Vivaldi Technologies

    ...Vivaldi also offers a range of built-in tools, such as a notes and bookmarks manager, and the ability to take and share screenshots. Additionally, Vivaldi is designed to be fast and secure, with support for features like built-in ad-blocking and privacy protection. Overall, Vivaldi offers a unique and customizable browsing experience for users who want more control and flexibility.
  • 30
    MindForger

    MindForger

    MindForger

    ...MindForger aims to mimic human mind, learning, recalling, recognition, associations, forgetting, in order to achieve synergy with your mind to make your searching, reading and writing more productive. MindForger ensures that you own your personal data. It respects privacy and enables security of your knowledge. MindForger seeks knowledge hidden in your remarks to enable its mining. MindForger starts where editors and search engines end. It thinks as you search, browse, read and write.
  • Previous
  • You're on page 1
  • 2
  • 3
  • Next