Network Security Software

Categories Categories

Compare the Top Network Security Software for 2019

  • 1
    SaltStack Icon

    SaltStack

    SaltStack

    SaltStack Enterprise provides DevOps, IT Ops, Net Ops, and Security teams with event-driven automation and orchestration for natively integrated configuration management, infrastructure security and compliance, and control over clouds and containers. Exercise complete authority over any system—on-premise, in the cloud, and across the network—with event-driven IT orchestration and automation. Escape compliance hell. Enforce security policy across your hybrid infrastructure, then use SaltStack event-driven automation for SecOps to keep it secure. Use next-gen automation to amplify the impact of your entire IT team. Drive efficiency and deliver business value at scale.

  • 2
    Vulnerability Control Icon

    Vulnerability Control

    Skybox Security

    The Skybox approach to risk-based vulnerability management starts with fresh vulnerability data from your entire network — physical IT, multi–cloud and operational technology (OT). Skybox uses a wide range of sources, including asset and patch management systems and network devices, to assess vulnerabilities without a scan. We also collect, centralize and merge data from multiple scanners to give you the most accurate vulnerability assessments on demand. - Centralize and enhance vulnerability management processes from discovery to prioritization and remediation - Harness the power vulnerability and asset data, as well as network topology and security controls - Use network modeling and attack simulation to find exposed vulnerabilities - Augment vulnerability data with intelligence on the current threat landscape - Know your best remediation option, including patching, IPS signatures and network–based changes

  • 3
    Acunetix Icon

    Acunetix

    Acunetix

    Acunetix is the market leader in automated web application security testing, and is the tool of choice for many Fortune 500 customers. Acunetix detects and reports on a wide array of web application vulnerabilities. The Acunetix industry leading crawler fully supports HTML5 and JavaScript and Single-page applications, allowing auditing of complex, authenticated applications. Acunetix provides the only technology on the market that can automatically detect out-of-band vulnerabilities and is available both as an online and on premise solution. Acunetix also includes integrated vulnerability management features to extend the enterprise’s ability to comprehensively manage, prioritise and control vulnerability threats – ordered by business criticality. Acunetix integrates with popular Issue Trackers and WAFs and is available on Windows, Linux and Online

    Starting Price: $4,495 yearly
  • 4
    Domotz Pro Icon

    Domotz Pro

    Domotz

    Domotz is the premier Remote Network Monitoring and Management platform for IoT. We offer powerful network management software for MSP's, Integrators, Security Professionals, and Business Owners. Domotz enables the complete solution to cost-effectively manage and monitor your customers’ networks with plug and play setup, a friendly UX, and a comprehensive feature set, accessible from any desktop browser or mobile device.

    Starting Price: $3 per month Partner badge
  • 5
    EventSentry Icon

    EventSentry

    NETIKUS.NET ltd

    Hybrid SIEM solution combining real-time (event) log monitoring with comprehensive system health & network monitoring provides users with a complete picture of their servers and endpoints. The included security event log normalization & correlation engine with descriptive email alerts provides additional context and presents cryptic Windows security events in easy to understand reports that offer insight beyond what is available from raw events. EventSentry's NetFlow component visualizes network traffic, can detect malicious activity and offers insight into bandwith usage. Keeping track of Active Directory changes is easy with EventSentry's ADMonitor component that records all changes to AD & Group Policy objects and provides a complete user inventory to help identify obsolete accounts. Various integrations & multi-tenancy available.

    Starting Price: $85.00/one-time
  • 6
    Infocyte HUNT Icon

    Infocyte HUNT

    Infocyte

    The Infocyte Managed Detection and Response platform helps security teams proactively hunt, detect, and respond to cyber threats and vulnerabilities resident within their network—across physical, virtual, and serverless assets. Our MDR platform provides asset and application discovery, automated threat hunting, and on-demand incident response capabilities. Combined, these proactive cyber security practices help organizations control attacker dwell time, reduce overall cyber risk, maintain compliance, and streamline security operations.

    Starting Price: $2/node/month
  • 7
    NordVPN Icon

    NordVPN

    NordVPN

    We help companies keep their networks and Internet connections secure. Our VPN service adds an extra layer of protection to secure your communications. We do this by applying strong encryption to all incoming and outgoing traffic so that no third parties can access your confidential information. Protect your organization against security breaches. Secure remote team access. Simplify business network security. Access region-specific online content from anywhere in the world

    Starting Price: $60.00/year/user
  • 8
    AdRem NetCrunch Icon

    AdRem NetCrunch

    AdRem Software

    NetCrunch 10 is a smart, agentless network monitoring and management software system that is capable of monitoring every device in a network. Developed by AdRem Software, NetCrunch 10 helps businesses of all sizes to remotely monitor network services, switches, routers, bandwidth utilization, and traffic flow as well as visualize their system performance. AdRem NetCrunch 10 offers a wide variety of features, including capacity monitoring, service desk management, Windows diagnostic tools, remote access, IP address monitoring, progress report, and more. This all-in-one solution provides support for all leading OS types, such as Linux, Windows, VMWare ESX/ESXi, Mac OS X, and BSD.

    Starting Price: $1160.00/year
  • 9
    WebTitan Icon

    WebTitan

    TitanHQ

    WebTitan is an advanced web filter providing protection from HTTP and HTTPS security threats as well as advanced DNS filtering control to businesses, MSP's and schools globally. WebTitan blocks malware, ransomware, phishing, day-zero attacks and other cyber threats, as well as providing web content control. With 25 years of security experience, WebTitan protects over 8,500 businesses and MSPs from online threats. Try a free trial of WebTitan today with free support and on-boarding.

    Starting Price: $1.01
  • 10
    Horangi Web Security Services Icon

    Horangi Web Security Services

    Horangi Cyber Security

    Horangi Web Security Services provides users with rapid delivery of Incident Response and threat detection to protect their digital assets. Horangi Web Security Services features web scanning, security and threat detection, open source intelligence, (OSINT) analysis, third-party integrations, and security reporting. Horangi Web Security Services also features three major security modules: Horangi Storyfier, Horangi Hunter, and Horangi Scanner.

    Starting Price: $50.00/month
  • 11
    REVE Antivirus Icon

    REVE Antivirus

    REVE Antivirus

    REVE Antivirus is a Cyber Security product for home users and enterprises. The REVE Antivirus product suite comprises of the following products: REVE Antivirus REVE Internet Security REVE Total Security REVE Windows Sever Security REVE Antivirus for Mac REVE Antivirus for Linux REVE Endpoint Security The product has received certification from OPSWAT and VB 100. It is also a Microsoft approved antivirus software.

    Starting Price: $19.00/year
  • 12
    Jscrambler Icon

    Jscrambler

    Jscrambler

    Jscrambler provides enterprise-grade security solutions that secure the client-side of web and mobile applications. Jscrambler's Code Integrity module applies the most advanced JavaScript obfuscation techniques combined with polymorphic behavior, code locks, self-defending and self-healing capabilities, and threat monitoring. With these security layers, JavaScript applications become self-defensive and resilient to tampering and reverse-engineering, which enables preventing abuse, enforcing license agreements, and protecting intellectual property and important algorithms. Jscrambler's Webpage Integrity module provides real-time visibility of client-side attacks and enables preventing DOM tampering, supply chain attacks, and customer hijacking. The Jscrambler dashboard displays precise and actionable detail of the injected code to enable an immediate response. Trusted by the Fortune 500 and over 43.000 companies and individuals across 145 countries

  • 13
    GlassWire Icon

    GlassWire

    GlassWire

    GlassWire is an endpoint firewall software for Windows PCs and Android phones. Visualize your device network activity, then block data hogs, malware, and other badly behaving applications.

    Starting Price: $49.00/one-time/user
  • 14
    CPTRAX for Windows Icon

    CPTRAX for Windows

    Visual Click Software

    Server File Activity Tracking - Audit who is creating, accessing, moving, and deleting your files and folders. Track file permission changes. Real-time alerts about critical file activities. Workstation File Activity Tracking - Audit who is copying files to USB or other removable drives. Track who is uploading files from a browser. Email alert when a removable device is connected. Active Directory Auditing - Keep audit logs and get real-time alerts of important Active Directory changes without dealing with SACLs or Windows Event Logs. Server Authentication Auditing - Track authentications into Windows Servers and Citrix sessions. Review all failed logon attempts. Workstation Logon/Logoff Tracking - Get visibility on workstation logons/logoffs, including locks, unlocks and password changes. Review all failed logon attempts. GPO Auditing - Track creation, deletion, and linking of Group Policy Objects. Alerts on specific events including Pattern alerting.

  • 15
    TraceCSO Icon

    TraceCSO

    TraceSecurity

    Our TraceCSO software is the GRC platform for compiliance and cybersecurity solutions. While our services are the perfect way to ensure cybersecurity and compliance via 3rd party review on a yearly bases, they are also the perfect launching point to begin using TraceCSO software. With a series of modules that work together to ensure you have a full picture of your cybersecurity environment, TraceCSO can take care of Risk Management, Vulnerability Management, Training Management and more!

    Starting Price: $4,000/annual
  • 16
    MailWasher Pro Icon

    MailWasher Pro

    Firetrust

    MailWasher is a program to help you get rid of spam and viruses in your e-mail. MailWasher allows you to preview all aspects of your e-mail on the server before you download it to your computer, thus protecting you from spam, viruses, phishing attacks, and other nuisances. You can then delete unwanted e-mail before it gets to you. Other features help identify and protect you against viruses and worms. Included are comprehensive antispam tools and many other features.

    Starting Price: $29.96
  • 17
    Axonius Cybersecurity Asset Management Icon

    Axonius Cybersecurity Asset Management

    Axonius

    Axonius is the cybersecurity asset management platform that gives organizations a comprehensive asset inventory, uncovers security solution coverage gaps, and automatically validates and enforces security policies. By seamlessly integrating with more than 125 security and management solutions, Axonius is deployed in minutes, improving cyber hygiene immediately. Covering millions of devices at customers like the New York Times, Schneider Electric, and AppsFlyer, Axonius was named the Most Innovative Startup of 2019 at the prestigious RSAC Innovation Sandbox and was named Rookie Security Company of the Year by SC Magazine. For more visit Axonius.com.

  • 18
    JumpCloud DaaS Icon

    JumpCloud DaaS

    JumpCloud

    JumpCloud® Directory-as-a-Service® is Active Directory® and LDAP reimagined. JumpCloud securely manages and connects your users to their systems, applications, files, and networks. JumpCloud manages users and their systems – whether Mac, Linux, or Windows – and provides access to cloud and on-prem resources such as Office 365™, G Suite, AWS™ cloud servers, Salesforce™, and Jira® among thousands of others. The same login also connects users to networks and file shares via RADIUS and Samba, respectively, securing your organization’s WiFi and file server access. Leveraging cloud-based directory services, IT organizations can choose the best IT resources for the business enabling users to be as productive as possible.

    Starting Price: $3.00/month/user
  • 19
    SolarWinds RMM Icon

    SolarWinds RMM

    SolarWinds

    SolarWinds Remote Monitoring & Management (RMM) is an easy-to-use remote monitoring and management platform that offers a comprehensive set of tools to maintain, secure, and improve IT operations. SolarWinds RMM features include remote access, network path visualization, automated monitoring and maintenance, prescriptive data analytics, data-breach risk intelligence, and more. SolarWinds RMM is also available for download as Android and iOS mobile apps to allow users to manage issues anywhere.

  • 20
    EventLog Analyzer Icon

    EventLog Analyzer

    ManageEngine

    EventLog Analyzer by Manage Engine is the industry's most cost-effective security information and event management (SIEM) software solution. This secure and powerful cloud-based solution meets all critical SIEM capabilities that include compliance reporting, log analysis, log aggregation, user activity monitoring, file integrity monitoring, event correlation, log forensics, log retention, and real-time alerting. By leveraging Manage Engine's EventLog Analyzer, users can prevent data breaches, mitigate sophisticated cyber-attacks, and identify the root cause of security incidents.

  • 21
    Axence nVision  Icon

    Axence nVision

    Axence

    Axence nVision is a professional solution designed to manage IT infrastructure regardless of size. A feature-packed system, Axence nVision provides all the functions required for seamless and efficient IT infrastruction management. It offers a set of five modules, which includes Network Monitoring for full IT infrastructure monitoring, Inventory for fast hardware and software audit, Users activity monitoring, Helpdesk for providing interactive IT technical support, and Dataguard for data leak protection.

  • 22
    Marshal Icon

    Marshal

    Onehub

    Make cloud data private and secure with Marshal, an online privacy tool by Onehub. Marshal can be set up in seconds with no need of any software for installation. Marshal enables users to find threats within minutes with a redacted threat report for a quick and immediate action. Marshal also features end-to-end encryption and proprietary stream-based cloud scanning.

  • 23
    Kaseya VSA Icon

    Kaseya VSA

    Kaseya

    Kaseya VSA is a next-generation remote monitoring and management (RMM) software for Managed Service Providers (MSP) and IT enterprises. With VSA, users get access to the fastest remote control powerful discovery, reliable patch management, and monitoring and security tools in a single solution. Thus, helping to increase IT staff productivity, service reliability, and systems security.

  • 24
    LogicMonitor Icon

    LogicMonitor

    LogicMonitor

    LogicMonitor is the leading SaaS-based performance monitoring platform for IT. Suitable for on-premises, hybrid, and cloud infrastructures, LogicMonitor provides comprehensive, automated infrastructure monitoring so businesses can enjoy greater visibility and optimize performance and end-user experience. It features powerful real-time dashboards, network device configurations, full data center visibility, network scanning, and flexible alerting and reporting.

  • 25
    ConnectWise Automate Icon

    ConnectWise Automate

    ConnectWise

    Solve IT problems at the speed of business with ConnectWise Automate. A robust remote monitoring and management (RMM) platform, ConnectWise Automate helps boost the effectiveness of IT teams. It offers teams the ability to discover all devices and users that need to be proactively monitored, remove delivery roadblocks, and support more endpoints without adding headaches or head count.

  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next
Oh no! Some styles failed to load. Please try reloading this page, or contact support.

Get latest updates about Open Source Projects, Conferences and News.

Sign Up No, Thank you