Join the 1500 companies using G2 Track to manage SaaS spend, usage, contracts & compliance.

Best Other IT Security Software

G2 Grid® for Other IT Security
Leaders
High Performers
Contenders
Niche
Momentum Leaders
Momentum Score
Market Presence
Satisfaction
content
Star Rating

Other IT Security reviews by real, verified users. Find unbiased ratings on user satisfaction, features, and price based on the most reviews available anywhere.

Compare Other IT Security Software

Results: 133
G2 takes pride in showing unbiased ratings on user satisfaction. G2 does not allow for paid placement in any of our ratings.
Results: 133
Filter Results
Filter by:
Sort by
Star Rating
Sort By:

    Esker on Demand is a cloud-based document process and information exchange service that enables companies to automate the processing and exchange of crucial business documents it include rapid project go live, increased profitability, pay only for what you use, and low risk.

    Apple Support Number offers Apple customer service for MacBook, iPad, iPhone and iTunes.

    Outlook Password Recovery software is a software that can to reset forgotten Outlook PST password, support to recover longer and multilingual password and unlock protected PST file within seconds and get data from protected PST file without any data defeat.

    The majority of attacks and exposure to malicious content occurs during the normal course of web browsing activities, which requires the ability to allow safe, secure web access for all users. URL Filtering with PAN-DB automatically prevents attacks that leverage the web as an attack vector, including phishing links in emails, phishing sites, HTTP-based command and control, malicious sites and pages that carry exploit kits.

    Prey is a cross-platform anti-theft and management solution for laptops, tablets and phones used to protect over 8 million devices, all around the world. Its solid tracking technology helps people and companies keep track of their assets 24/7, and proves to be crucial in the recovery of stolen devices and in the prevention of data breaches. What can you do with Prey anti-theft: MONITOR EFFICIENTLY Global view with location history to keep an eye on all devices, plus Control Zones to delimit areas on a map, like an office, and receive alerts if any assigned device moves in or out. MITIGATE DATA LOSS Data protection features provide the chance to avoid leaks by wiping custom directories remotely or retrieving files from compromised devices with corporate information. PREVENT THEFT Prey’s Missing Evidence reports will provide location, pictures, nearby Wifi networks and more data crucial when retrieving stolen devices and finding the culprit. MANAGE EFFORTLESSLY Smoothly manage thousands of devices by categorizing them with labels and perform bulk tasks with ease using Mass Actions: Alarm, Lock, Message Alerts, Wipe. INTEGRATE YOUR FLEET Organize devices from all types and operating systems under a single platform. Android, Windows, Linux, Chromebook, iOS, macOS, laptops, tablets, and mobiles, we got it. TRACKING CAPABILITIES ► Control Zones: Mark an area on a map, and get alerts when your mobile devices enter or leave it. ► Missing Device Reports: Receive evidence reports with location, nearby networks, pictures, and everything else you need to locate a device. ► GPS Geolocation: Pin-point accuracy reflected on a map, with gps coordinates on each report. ► Aware Tracking: Select between a smart and automatic periodic location tracking, or the on-demand alternative. ► Security Alarm: It will ring like gangbusters, even if your android phone's sound is silenced. ► Re Lock: Keep curious hands away from your lost mobile device, block it remotely. ► Front and Back Camera: Take silent snaps and discover who is holding your device. ► Security Camouflage: Go silent with the camouflage mode, hide the app on your android phone. ► Security Message Alert: Display a message on the screen to contact the current user. ► Location History: DATA PROTECTION ► Wipe: Boom, gone. Simply select what you want to delete, and safeguard your privacy. ► File Retrieval: That document you worked on for countless nights? We can retrieve it. DEVICE MANAGEMENT: ► Group Labelling: Create custom labels and group devices according to users, status, or area. ► Advanced Search: Filter the devices you are looking for with our advanced search system. ► Custom APK: Deploy and configure Prey with ease using customized installers. ► Mass Actions: All security actions can be deployed in mass to ensure smooth large-scale management.

    WildFire cloud-based threat analysis service is the industrys most advanced analysis and prevention engine for highly evasive zero-day exploits and malware. The cloud-based service employs a unique multi-technique approach combining dynamic and static analysis, innovative machine learning techniques, and a groundbreaking bare metal analysis environment to detect and prevent even the most evasive threats.

    This is a rescue application which retrieves deleted data from a Mac hard drive. A number of storage devices it can support ranges from SSDs, USB, external hard drives, Time Machine and password protected media. Compatible with macOS Sierra 10.12.

    mSpy is a computer security for parental control. Helps parents to give attention to their children online activities. It checks WhatsApp, Facebook, massage and snapchat messages.

    Threats do not discriminate between application delivery vectors, requiring an approach that has full visibility into all application traffic, including SSL encrypted content, with full user context. Threat Prevention leverages the visibility of our next-generation firewall to inspect all traffic, automatically preventing known threats, regardless of port, protocol or SSL encryption.

    RansomFree is the first and only free anti-ransomware tool designed to detect and stop 99% of ransomware from encrypting files. The software uses behavioral and proprietary deception techniques to target the core behaviors typical of ransomware attacks.

    Rocket Servergraph reduces the cost and complexity of monitoring/reporting of backup environment across heterogeneous platforms and applications.

    Suhosin is an advanced protection system for PHP 5 installations. It is designed to protect servers and users from known and unknown flaws in PHP applications and the PHP core.

    Swift PC Optimizer helps to identify and clean most common problems on Windows based computer. It automatically detects internet junk files, registry errors, cookies and other files that need to be deleted from user’s computer to enhance overall performance of computer. It removes unnecessary items and maintains health of Windows System. It keeps your PC clean, stable and running like new. It will also help you to identify and remove unwanted startup item so that your PC boots up faster then before. Very easy to use, audio notification,

    AWS Security Hub gives you a comprehensive view of your high-priority security alerts and compliance status across AWS accounts.

    CertCentral facilitates better certificate lifecycle management by consolidating tasks for issuing, installing, inspecting, remediating, and renewing certificates into one scalable software suite.

    One Identity offers identity and access management solutions.

    SysInfoTools Outlook Duplicates Removal Software is a software that remove duplicates email and content and help to minimize PST file size spport MS Outlook version.

    Voimakas Outlook PST Recovery is a software that recover emails from corrupted PST file save them into new PST files or existing PST file with whole emails items and attachments and also recovers deleted Outlook emails items without any data defeat.

    AutoFocus contextual threat intelligence service accelerates analysis, correlation and prevention workflows. Unique, targeted attacks are automatically prioritized with full context, allowing security teams to respond to critical attacks faster, without additional IT security resources.

    Symantec CloudSOC CASB Gateway is a software that provide a solution for website security from Extended Validation (EV) SSL/TLS Certificates and malware scanning, to DDoS mitigation and performance optimization.

    Track, audit, analyze, and report all the critical changes made to your Active Directory environment such as what exactly changed, along with the new and old values, when the change was made, where the change happened in your Active Directory to meet your organization's compliance and regulatory needs.

    Astra is website security suite that protects websites from hackers, bots & 80+ internet threats.

    Belkasoft Evidence Center makes it easy for an investigator to acquire, search, analyze, store and share digital evidence found inside computer and mobile devices.

    The Predictive Abuse-Prevention Solution for Email Service Providers BlackBox is the world's most comprehensive resource for finding potentially problematic email addresses, allowing ESPs to preemptively score the quality of their senders' lists and manage senders more effectively.

    CycleCloud software suite provides cloud orchestration, provisioning, and data management for Big Data, and large computing applications.

    Falcon Sandbox performs deep analysis of evasive and unknown threats, enriches the results with threat intelligence and delivers actionable indicators of compromise (IOCs), enabling your security team to better understand sophisticated malware attacks and strengthen their defenses.

    FlowTraq is a security visibility tool that enables (network) security operators to hunt for threats, discover data leaks, spot hacker-controlled systems, and investigate security breaches.

    Your business can’t afford downtime, which can result in revenue loss, damaged reputation and regulatory penalties. IBM Cloud Resiliency Orchestration can help transform your disaster recovery (DR) to simplify management and reduce risk, cost and DR testing time. Now you can combine the disaster recovery monitoring, reporting, testing and workflow automation capabilities of your on-premise, public cloud, and private cloud workloads in a scalable, easier-to-use solution built on industry standards. Built-in analytics help keep daily business operations running smoothly and proactively avoid disruptions.

    Cyber security Experts providing solutions for Individuals, families and businesses of all sizes.

    Notes Storage Format (NSF) file is an IBM Lotus Notes database file. The NSF files stores users emails, notes, contacts, calendars, etc.

    What Does NoMoreCaptchas Do? NoMoreCaptchas stops bots that try to register and log in to websites, leave spam comments on blogs and social sites and send spam message emails through contact forms. Use it wherever you would use a CAPTCHA code. Bots are detected by their behavior, which is detected during page load. Even the most advanced bots can’t successfully fake being human, so we detect their behavior with our cloud-based algorithms and block them from your site. NoMoreCaptchas is a great plugin for eliminating bots at the user login or contact form. The plugin comes in 7 flavors from WordPress, Drupal, Joomla, .Net, ASP, PHP, and JSP.

    Internal integrity checks ensure event data is read-only and any tampering can be detected for your compliance and security needs

    SysInfoTools PST Merge is a tool that combine multiple PST files into a single PST file, merge Outlook personal folders data, copy or move the content from multiple Microsoft Outlook PST files into a selected Outlook file or create a new PST file.

    Only with Quest InTrust, you can monitor all user workstation and administrator activity from logons to logoffs and everything in between.

    Reduce uncertainty by identifying attackers in your network before they make their next move. Boost confidence in your network visibility with timely, accurate and actionable intelligence.

    SecureBridge is a tool that represents clients and servers for SSH, SFTP and SSL protocols as a network security solution, it protects any TCP traffic using SSH or SSL secure transport layer protocols, that provide authentication for both client and server, strong data encryption, and data integrity verification.

    SureLock offers a quick and easy way to lockdown off-the-shelf mobile devices. Tablets, Smartphones, Smartwatches or even desktop computers can be used as dedicated purpose devices.

    System Frontier is like a proxy server for admin rights. It enables organizations to empower IT support staff with delegated, fine-grained permissions to manage systems and execute automation tasks. Using a real-time web console, help desk staff, developers, vendors or any other support personnel can safely manage Windows servers and workstations without agents or complicated user interfaces.

    SystemSaver Enterprise allows you to securely and permanently delete all company or personal data while leaving the operating system and programs intact. It's perfect for reusing computers within your organization or recycling them for other purposes.

    TEMASOFT Ranstop is an effective anti-ransomware tool for companies. Based on behavior analysis, Ranstop protects computers and networks against present and future ransomware of any type.

    Alyne is a SaaS software that enable organisations of all industries and sizes mature their cyber security, risk management and compliance capabilities and cost effectively measure maturity in extended enterprise.

    Apility.io is a threat Intel SaaS to help companies rank if users have been classified as 'abusers' by one or more public blacklists.

    Aquro is a platform for prototyping, developing, launching, and maintaining iOS and Android apps.

    Generating complex Active Directory Reports just got easier for your Active Directory Auditing and Reporting needs. All you need is Vyapin's Active Directory reporting solution ARK for Active Directory (ARKAD) for the Microsoft Active Directory Enterprise.

    Vyapin Exchange Server Reporting and Analytics software is a must-have tool for administrators to audit and report on Exchange Server’s Mailboxes, Public Folders, Usage, Security and Server configuration.