Best Other IT Security Software

G2 Grid® for Other IT Security
Leaders
High Performers
Contenders
Niche
Market Presence
Satisfaction
content

Subcategories

Star Rating

Other IT Security reviews by real, verified users. Find unbiased ratings on user satisfaction, features, and price based on the most reviews available anywhere.

Compare Other IT Security Software

Results: 125
G2 takes pride in showing unbiased ratings on user satisfaction. G2 does not allow for paid placement in any of our ratings.
Results: 125
Filter Results
Filter by:
Sort by
Star Rating
Sort By:

    Prey is a cross-platform anti-theft and management solution for laptops, tablets and phones used to protect over 8 million devices, all around the world. Its solid tracking technology helps people and companies keep track of their assets 24/7, and proves to be crucial in the recovery of stolen devices and in the prevention of data breaches. What can you do with Prey anti-theft: MONITOR EFFICIENTLY Global view with location history to keep an eye on all devices, plus Control Zones to delimit areas on a map, like an office, and receive alerts if any assigned device moves in or out. MITIGATE DATA LOSS Data protection features provide the chance to avoid leaks by wiping custom directories remotely or retrieving files from compromised devices with corporate information. PREVENT THEFT Prey’s Missing Evidence reports will provide location, pictures, nearby Wifi networks and more data crucial when retrieving stolen devices and finding the culprit. MANAGE EFFORTLESSLY Smoothly manage thousands of devices by categorizing them with labels and perform bulk tasks with ease using Mass Actions: Alarm, Lock, Message Alerts, Wipe. INTEGRATE YOUR FLEET Organize devices from all types and operating systems under a single platform. Android, Windows, Linux, Chromebook, iOS, macOS, laptops, tablets, and mobiles, we got it. TRACKING CAPABILITIES ► Control Zones: Mark an area on a map, and get alerts when your mobile devices enter or leave it. ► Missing Device Reports: Receive evidence reports with location, nearby networks, pictures, and everything else you need to locate a device. ► GPS Geolocation: Pin-point accuracy reflected on a map, with gps coordinates on each report. ► Aware Tracking: Select between a smart and automatic periodic location tracking, or the on-demand alternative. ► Security Alarm: It will ring like gangbusters, even if your android phone's sound is silenced. ► Re Lock: Keep curious hands away from your lost mobile device, block it remotely. ► Front and Back Camera: Take silent snaps and discover who is holding your device. ► Security Camouflage: Go silent with the camouflage mode, hide the app on your android phone. ► Security Message Alert: Display a message on the screen to contact the current user. ► Location History: DATA PROTECTION ► Wipe: Boom, gone. Simply select what you want to delete, and safeguard your privacy. ► File Retrieval: That document you worked on for countless nights? We can retrieve it. DEVICE MANAGEMENT: ► Group Labelling: Create custom labels and group devices according to users, status, or area. ► Advanced Search: Filter the devices you are looking for with our advanced search system. ► Custom APK: Deploy and configure Prey with ease using customized installers. ► Mass Actions: All security actions can be deployed in mass to ensure smooth large-scale management.

    Esker on Demand is a cloud-based document process and information exchange service that enables companies to automate the processing and exchange of crucial business documents it include rapid project go live, increased profitability, pay only for what you use, and low risk.

    Apple Support Number offers Apple customer service for MacBook, iPad, iPhone and iTunes.

    Outlook Password Recovery software is a software that can to reset forgotten Outlook PST password, support to recover longer and multilingual password and unlock protected PST file within seconds and get data from protected PST file without any data defeat.

    The majority of attacks and exposure to malicious content occurs during the normal course of web browsing activities, which requires the ability to allow safe, secure web access for all users. URL Filtering with PAN-DB automatically prevents attacks that leverage the web as an attack vector, including phishing links in emails, phishing sites, HTTP-based command and control, malicious sites and pages that carry exploit kits.

    mSpy is a computer security for parental control. Helps parents to give attention to their children online activities. It checks WhatsApp, Facebook, massage and snapchat messages.

    This is a rescue application which retrieves deleted data from a Mac hard drive. A number of storage devices it can support ranges from SSDs, USB, external hard drives, Time Machine and password protected media. Compatible with macOS Sierra 10.12.

    Threats do not discriminate between application delivery vectors, requiring an approach that has full visibility into all application traffic, including SSL encrypted content, with full user context. Threat Prevention leverages the visibility of our next-generation firewall to inspect all traffic, automatically preventing known threats, regardless of port, protocol or SSL encryption.

    Rocket Servergraph reduces the cost and complexity of monitoring/reporting of backup environment across heterogeneous platforms and applications.

    Suhosin is an advanced protection system for PHP 5 installations. It is designed to protect servers and users from known and unknown flaws in PHP applications and the PHP core.

    Swift PC Optimizer helps to identify and clean most common problems on Windows based computer. It automatically detects internet junk files, registry errors, cookies and other files that need to be deleted from user’s computer to enhance overall performance of computer. It removes unnecessary items and maintains health of Windows System. It keeps your PC clean, stable and running like new. It will also help you to identify and remove unwanted startup item so that your PC boots up faster then before. Very easy to use, audio notification,

    Ready-to-deploy change auditing & reporting solution for MS Exchange environment

    SysInfoTools Outlook Duplicates Removal Software is a software that remove duplicates email and content and help to minimize PST file size spport MS Outlook version.

    Voimakas Outlook PST Recovery is a software that recover emails from corrupted PST file save them into new PST files or existing PST file with whole emails items and attachments and also recovers deleted Outlook emails items without any data defeat.

    Track, audit, analyze, and report all the critical changes made to your Active Directory environment such as what exactly changed, along with the new and old values, when the change was made, where the change happened in your Active Directory to meet your organization's compliance and regulatory needs.

    Belkasoft Evidence Center makes it easy for an investigator to acquire, search, analyze, store and share digital evidence found inside computer and mobile devices.

    The Predictive Abuse-Prevention Solution for Email Service Providers BlackBox is the world's most comprehensive resource for finding potentially problematic email addresses, allowing ESPs to preemptively score the quality of their senders' lists and manage senders more effectively.

    CycleCloud software suite provides cloud orchestration, provisioning, and data management for Big Data, and large computing applications.

    FlowTraq is a security visibility tool that enables (network) security operators to hunt for threats, discover data leaks, spot hacker-controlled systems, and investigate security breaches.

    Cyber security Experts providing solutions for Individuals, families and businesses of all sizes.

    Notes Storage Format (NSF) file is an IBM Lotus Notes database file. The NSF files stores users emails, notes, contacts, calendars, etc.

    What Does NoMoreCaptchas Do? NoMoreCaptchas stops bots that try to register and log in to websites, leave spam comments on blogs and social sites and send spam message emails through contact forms. Use it wherever you would use a CAPTCHA code. Bots are detected by their behavior, which is detected during page load. Even the most advanced bots can’t successfully fake being human, so we detect their behavior with our cloud-based algorithms and block them from your site. NoMoreCaptchas is a great plugin for eliminating bots at the user login or contact form. The plugin comes in 7 flavors from WordPress, Drupal, Joomla, .Net, ASP, PHP, and JSP.

    Internal integrity checks ensure event data is read-only and any tampering can be detected for your compliance and security needs

    SysInfoTools PST Merge is a tool that combine multiple PST files into a single PST file, merge Outlook personal folders data, copy or move the content from multiple Microsoft Outlook PST files into a selected Outlook file or create a new PST file.

    Only with Quest InTrust, you can monitor all user workstation and administrator activity from logons to logoffs and everything in between.

    Reduce uncertainty by identifying attackers in your network before they make their next move. Boost confidence in your network visibility with timely, accurate and actionable intelligence.

    SecureBridge is a tool that represents clients and servers for SSH, SFTP and SSL protocols as a network security solution, it protects any TCP traffic using SSH or SSL secure transport layer protocols, that provide authentication for both client and server, strong data encryption, and data integrity verification.

    SureLock offers a quick and easy way to lockdown off-the-shelf mobile devices. Tablets, Smartphones, Smartwatches or even desktop computers can be used as dedicated purpose devices.

    System Frontier is like a proxy server for admin rights. It enables organizations to empower IT support staff with delegated, fine-grained permissions to manage systems and execute automation tasks. Using a real-time web console, help desk staff, developers, vendors or any other support personnel can safely manage Windows servers and workstations without agents or complicated user interfaces.

    SystemSaver Enterprise allows you to securely and permanently delete all company or personal data while leaving the operating system and programs intact. It's perfect for reusing computers within your organization or recycling them for other purposes.

    TEMASOFT Ranstop is an effective anti-ransomware tool for companies. Based on behavior analysis, Ranstop protects computers and networks against present and future ransomware of any type.

    Wind River is a Internet of Things (IoT) software company.

    Alyne is a SaaS software that enable organisations of all industries and sizes mature their cyber security, risk management and compliance capabilities and cost effectively measure maturity in extended enterprise.

    Apility.io is a threat Intel SaaS to help companies rank if users have been classified as 'abusers' by one or more public blacklists.

    Aquro is a platform for prototyping, developing, launching, and maintaining iOS and Android apps.

    Generating complex Active Directory Reports just got easier for your Active Directory Auditing and Reporting needs. All you need is Vyapin's Active Directory reporting solution ARK for Active Directory (ARKAD) for the Microsoft Active Directory Enterprise.

    Vyapin Exchange Server Reporting and Analytics software is a must-have tool for administrators to audit and report on Exchange Server’s Mailboxes, Public Folders, Usage, Security and Server configuration.

    BitRaser is a certified and secure data erasure software. The software helps to permanently delete confidential files which can not be recovered from any data recovery software.

    The BitSight Security Ratings Platform gathers terabytes of data on security outcomes from sensors deployed across the globe. From our data, we see indicators of compromise, infected machines, improper configuration, poor security hygiene and potentially harmful user behaviors. BitSight’s sophisticated algorithms analyze the data for severity, frequency, duration, and confidence and then map it to a company's known networks, creating an overall rating of that organization’s security performance. These objective ratings, based on externally accessible data, give visibility into a company's security posture over time.

    BlackBerry Jarvis is a powerful binary static analysis Software-as-a-Service (SaaS) tool that can help automakers secure their software supply chain.

    Blueliv is a leading cyber threat intelligence provider with a world-class in-house Labs team. We scour the web, the deep web and the dark internet to deliver fresh, targeted and actionable threat intelligence to organizations to protect their networks from the outside in. Our scalable cloud-based platform turns global threat data into sophisticated and relevant intelligence, enabling organizations to save time and resource by improving their incident response performance and empowering their Security Operations team with real-time intelligence. Configure a solution bespoke to your needs with a choice of ten modules.

    Boldon James Email Classifier provides to label emails in accordance with sensitivity. It provides that data protection from accidental loss, customers can ensure files and emails are only sent to those customers want to receive.

    Cloud based solution for secure calling through a library of tested algorithms.

    CA Transaction Manager enables you to implement a comprehensive 3D Secure program to provide your cardholders with robust eCommerce payment security, personalized one-to-one marketing and better customer service.

    For comprehensive security in your devices, you need the higher level security protocols and trust services included in the Certicom Security Architecture modules

    With Change Auditor, you get complete, real-time IT auditing, in-depth forensics and comprehensive security monitoring on all key configuration, user and administrator changes for Microsoft Active Directory, Azure AD, Exchange, Office 365, Exchange Online, file servers and more.

    CalCom Hardening Solution (CHS) for Microsoft OMS is a server hardening automation solution designed to reduce operational costs and increase the server's security and compliance posture.

    CloudABIS is a scalable, cloud-based biometric matching system that removes the burden and cost associated with building and maintaining a reliable biometric identification system. CloudABIS supports fingerprint, finger vein, face and iris recognition.

    Crowd GPS scanner is a security app against unethical GPS tracking. Crowd GPS scanner examines the user's’ surroundings and ensures they are not being tracked with any such GPS tracker.