BlackBox

BlackBox Alternatives & Competitors

Looking for alternatives to BlackBox? Tons of people want Other IT Security software. What's difficult is finding out whether or not the software you choose is right for you.

content

Top 20 Alternatives & Competitors to BlackBox

    #1
    #1
  1. Esker on Demand

    (16)4.6 out of 5
    Esker on Demand is a cloud-based document process and information exchange service that enables companies to automate the processing and exchange of crucial business documents it include rapid project go live, increased profitability, pay only for what you use, and low risk.
  2. Esker on Demand is a cloud-based document process and information exchange service that enables companies to automate the processing and exchange of crucial business documents it include rapid project go live, increased profitability, pay only for what you use, and low risk.

    Esker review by Sara H.
    "Intuitive AP Automation System: The UI is very easy to use and easy to train reviewers/approvers on."
    #2
    #2
  3. Apple Support Number

    (14)4.4 out of 5
    Apple Support Number offers Apple customer service for MacBook, iPad, iPhone and iTunes.
  4. Apple Support Number offers Apple customer service for MacBook, iPad, iPhone and iTunes.

    Apple Support Number review by Darrell H.
    "Apple, The Good Apple: Reliable and 24/7 for certain escalations. I was able to use this in highliting benefits of apple support to guide friends and customers to an alternative route to getting support from apple. "
    #3
    #3
  5. Prey

    (12)4.5 out of 5
    Prey is an Anti-Theft and management application that helps you keep track and secure your laptop, phone and tablet.
  6. Prey is an Anti-Theft and management application that helps you keep track and secure your laptop, phone and tablet.

    Prey review by Greta Jazmine M.
    "Great mobile location tool! : Prey is the most complete mobile application for locating our devices, whether due to loss or theft, allows the management and tracking of our devices regardless of your system, whether it is Android or any other through a single account and the best thing is that it has a mode of camouflage so if the phone is stolen they will not realize that it is running and will give essential information to determine its location, that is why it is so simple but very powerful and useful."
    See all Prey reviews
    #4
    #4
  7. Outlook Password Recovery

    (8)3.9 out of 5
    Outlook Password Recovery software is a software that can to reset forgotten Outlook PST password, support to recover longer and multilingual password and unlock protected PST file within seconds and get data from protected PST file without any data defeat.
  8. Outlook Password Recovery software is a software that can to reset forgotten Outlook PST password, support to recover longer and multilingual password and unlock protected PST file within seconds and get data from protected PST file without any data defeat.

    Outlook Password Recovery review by Consultant
    "Saves so much time : It helps when I can't remember a password. I'd have to say the one thing that I like most about Outlook Password Recovery is the fact that I can recover a password that I commonly use instead of having to continuously change it. It gets to be very annoying. It's hard to set a secure password over and over."
    #5
    #5
  9. Palo Alto Networks URL Filtering PAN-DB

    (6)4.8 out of 5
    The majority of attacks and exposure to malicious content occurs during the normal course of web browsing activities, which requires the ability to allow safe, secure web access for all users. URL Filtering with PAN-DB automatically prevents attacks that leverage the web as an attack vector, including phishing links in emails, phishing sites, HTTP-based command and control, malicious sites and pages that carry exploit kits.
  10. The majority of attacks and exposure to malicious content occurs during the normal course of web browsing activities, which requires the ability to allow safe, secure web access for all users. URL Filtering with PAN-DB automatically prevents attacks that leverage the web as an attack vector, including phishing links in emails, phishing sites, HTTP-based command and control, malicious sites and pages that carry exploit kits.

    Palo Alto Networks URL Filtering PAN-DBf review by Jennifer A.
    "PaloAlto URL Filter ROCKS!: The visibility into what is actually happening on the network with respect to URL traffic."
    #6
    #6
  11. mSpy

    (4)4.8 out of 5
    mSpy is a computer security for parental control. Helps parents to give attention to their children online activities. It checks WhatsApp, Facebook, massage and snapchat messages.
  12. mSpy is a computer security for parental control. Helps parents to give attention to their children online activities. It checks WhatsApp, Facebook, massage and snapchat messages.

    mSpy review by Melanie S.
    "GREAT!! Can securely keep the best people on the team.: I can see every word someone says to the person they are texting. I can see what people are saying without moving from my chair."
    See all mSpy reviews
    #7
    #7
  13. Stellar Phoenix Mac Data Recovery

    (4)4.4 out of 5
    This is a rescue application which retrieves deleted data from a Mac hard drive. A number of storage devices it can support ranges from SSDs, USB, external hard drives, Time Machine and password protected media. Compatible with macOS Sierra 10.12.
  14. This is a rescue application which retrieves deleted data from a Mac hard drive. A number of storage devices it can support ranges from SSDs, USB, external hard drives, Time Machine and password protected media. Compatible with macOS Sierra 10.12.

    Stellar Phoenix Mac Data Recovery review by Michael J.
    "Life saver product!: The fact that you can delete files, remove them from your trash can, and then somehow get them back is amazing! For a fraction of the cost of an actual service too!"
    #8
    #8
  15. Rocket Servergraph

    (3)5.0 out of 5
    Rocket Servergraph reduces the cost and complexity of monitoring/reporting of backup environment across heterogeneous platforms and applications.
  16. Rocket Servergraph reduces the cost and complexity of monitoring/reporting of backup environment across heterogeneous platforms and applications.

    Rocket Servergraph review by Parul P.
    "Great software: New installation up and running less than 30 Mins. Start collecting information right away. Great GUI tool for TSM admin who does not like command line. It gives great stats. Database usage is less compare to other DB. I use this software everyday. Great Dashboard. Constant update. Support is also great. Very telanted staff "
    #9
    #9
  17. Swift PC Optimizer

    (3)4.8 out of 5
    Swift PC Optimizer helps to identify and clean most common problems on Windows based computer. It automatically detects internet junk files, registry errors, cookies and other files that need to be deleted from user’s computer to enhance overall performance of computer. It removes unnecessary items and maintains health of Windows System. It keeps your PC clean, stable and running like new. It will also help you to identify and remove unwanted startup item so that your PC boots up faster then before. Very easy to use, audio notification,
  18. Swift PC Optimizer helps to identify and clean most common problems on Windows based computer. It automatically detects internet junk files, registry errors, cookies and other files that need to be deleted from user’s computer to enhance overall performance of computer. It removes unnecessary items and maintains health of Windows System. It keeps your PC clean, stable and running like new. It will also help you to identify and remove unwanted startup item so that your PC boots up faster then before. Very easy to use, audio notification,

    Swift PC Optimizer review by Akash K.
    "Swift Pc Optimizer | Product by Securebit Technologies: Swift pc optimizer works windows based computer only. It easy to use. No need to study before installing. clean interface, easy design and user friendly options. Now i can enjoy super fast Personal computer speed."
    #10
    #10
  19. Suhosin

    (3)4.5 out of 5
    Suhosin is an advanced protection system for PHP 5 installations. It is designed to protect servers and users from known and unknown flaws in PHP applications and the PHP core.
  20. Suhosin is an advanced protection system for PHP 5 installations. It is designed to protect servers and users from known and unknown flaws in PHP applications and the PHP core.

    Suhosin review by Aixvani Jesus G.
    "Lo necesario para proteger tu instalacion PHP.: - Protege de errores en la programación de código PHP, reduciendo vulnerabilidades que permitan a atacantes externos obtener privilegios en el servidor. - Protege a servidores y usurarios de los defectos o vulnerabilidades conocidos o desconocidos del código PHP. - Protege en ejecución bajas contra bufferoverflows o las vulnerabilidades de la secuencia del formato. - Posee una extensión de gran alcance de PHP que pone todas las otras protecciones en ejecución. - Ambos módulos se pueden usar por separado o en conjunto. - Permite bloquear o desactivar funciones de PHP en caso de ser necesario. - Ideal para proteger la segurdad de su codigo si usa hosting compartido. "
    #11
    #11
  21. Palo Alto Networks Threat Prevention

    (3)5.0 out of 5
    Threats do not discriminate between application delivery vectors, requiring an approach that has full visibility into all application traffic, including SSL encrypted content, with full user context. Threat Prevention leverages the visibility of our next-generation firewall to inspect all traffic, automatically preventing known threats, regardless of port, protocol or SSL encryption.
  22. Threats do not discriminate between application delivery vectors, requiring an approach that has full visibility into all application traffic, including SSL encrypted content, with full user context. Threat Prevention leverages the visibility of our next-generation firewall to inspect all traffic, automatically preventing known threats, regardless of port, protocol or SSL encryption.

    Palo Alto Networks Threat Prevention review by Consultant in Information Technology and Services
    "PANOS Threat Prevention Benefits: I like the PANOS Threat Prevention service provided in Palo Alto Firewalls which are very easy to configure and use. Updates are really very quick and there is no need of manual intervention require and excellent protection from zero day threats"
    #12
    #12
  23. Outlook PST Recovery

    (2)4.3 out of 5
    Voimakas Outlook PST Recovery is a software that recover emails from corrupted PST file save them into new PST files or existing PST file with whole emails items and attachments and also recovers deleted Outlook emails items without any data defeat.
  24. Voimakas Outlook PST Recovery is a software that recover emails from corrupted PST file save them into new PST files or existing PST file with whole emails items and attachments and also recovers deleted Outlook emails items without any data defeat.

    Outlook PST Recovery review by setu s.
    "Amazing feature: Ease of use, fast recovery, create multiple pst's , can be done on your own without IT knowledge."
    #13
    #13
  25. ManageEngine Exchange Reporter Plus

    (2)3.0 out of 5
    Ready-to-deploy change auditing & reporting solution for MS Exchange environment
  26. Ready-to-deploy change auditing & reporting solution for MS Exchange environment

    ManageEngine Exchange Reporter Plus review by User in Restaurants
    "Really beautiful mail client: I really love the sleek interface of the mail client and how easy it is to navigate. Also having an eyecatching @zoho.com is very nice."
    #14
    #14
  27. Outlook Duplicate Remover Software

    (2)4.8 out of 5
    SysInfoTools Outlook Duplicates Removal Software is a software that remove duplicates email and content and help to minimize PST file size spport MS Outlook version.
  28. SysInfoTools Outlook Duplicates Removal Software is a software that remove duplicates email and content and help to minimize PST file size spport MS Outlook version.

    Outlook Duplicate Remover Software review by Debbie D.
    "Time saving and easy to use: How fast it removes the duplicates and being able to create a new folder to put the items in."
    #15
    #15
  29. Wind River Systems, Inc.

    (1)4.5 out of 5
    Wind River is a Internet of Things (IoT) software company.
  30. Wind River is a Internet of Things (IoT) software company.

    Wind River Systems, Inc. review by User in Information Services
    "Wind River provides top notch service: When it comes to network simulation and diagnostics, i realized that they send the best technical personell to come and troubleshoot the glitches we encounter in my department. I recommend their services to IT companies especially fresh startups because of its low pricing packages."
    #16
    #16
  31. NoMoreCaptchas

    (1)5.0 out of 5
    NoMoreCaptchas is a user authentication that stops bots that try to register and log in to websites, leave spam comments on blogs and social sites and send spam message emails through contact forms.
  32. NoMoreCaptchas is a user authentication that stops bots that try to register and log in to websites, leave spam comments on blogs and social sites and send spam message emails through contact forms.

    NoMoreCaptchas review by Administrator in Information Technology and Services
    "Great for Fighting Bots: It's quick to install and setup. Takes about 3 minutes."
    #17
    #17
  33. Belkasoft Evidence Center

    (1)5.0 out of 5
    Belkasoft Evidence Center makes it easy for an investigator to acquire, search, analyze, store and share digital evidence found inside computer and mobile devices.
  34. Belkasoft Evidence Center makes it easy for an investigator to acquire, search, analyze, store and share digital evidence found inside computer and mobile devices.

    Belkasoft Evidence Center review by Chaitanya T.
    "Excellent software for Digital Forensics Analysis : Loved the software. Used it for analysing my phone backup and ram dump data. I use it for analysing RAM Dump and extracting all the artefacts. Well organised software with all different data carving techniques The result can be generated to reports."
    #18
    #18
  35. System Frontier

    (1)5.0 out of 5
    Role based access control for remote Windows server management and automation.
  36. Role based access control for remote Windows server management and automation.

    System Frontier review by Stevan A.
    "excellent product: very easy to setup and use. A wide range of functionality & reporting"
    #19
    #19
  37. TEMASOFT Ranstop

    (1)5.0 out of 5
    TEMASOFT Ranstop is an effective anti-ransomware tool for companies. Based on behavior analysis, Ranstop protects computers and networks against present and future ransomware of any type.
  38. TEMASOFT Ranstop is an effective anti-ransomware tool for companies. Based on behavior analysis, Ranstop protects computers and networks against present and future ransomware of any type.

    TEMASOFT Ranstop review by User in Computer Networking
    "5 STAR ANTI RANSOMWARE SOLUTION: Compatibility with many other security products like Malwarebytes, norton, kaspersky etc. Very good interface Restore feature of encrypted files in case of a miss which rarely happens. I think till now no other solution provides this feature. "
    #20
    #20
  39. SecureBridge

    (1)3.5 out of 5
    SecureBridge is a tool that represents clients and servers for SSH, SFTP and SSL protocols as a network security solution, it protects any TCP traffic using SSH or SSL secure transport layer protocols, that provide authentication for both client and server, strong data encryption, and data integrity verification.
  40. SecureBridge is a tool that represents clients and servers for SSH, SFTP and SSL protocols as a network security solution, it protects any TCP traffic using SSH or SSL secure transport layer protocols, that provide authentication for both client and server, strong data encryption, and data integrity verification.

    SecureBridge review by Puskar K.
    "Implementation was bit confusing: The best part of it is its components can be uses in conjunction with data access components to prevent data interception or modification in an untrused network. Then another thing is it provide authentication to both clients and server with data integrity verification. "