Best IT Security Software for Nonprofit - Page 5

Find and compare the best IT Security software for Nonprofit in 2026

Use the comparison tool below to compare the top IT Security software for Nonprofit on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Errsole Reviews
    Errsole is a free open-source logger for Node.js applications. It comes with a built-in log viewer to view, filter, and search your application logs. 1) Minimal Setup: Just include the Errsole package in your code—no need for dedicated servers, software installations, or complicated configurations. 2) Logger++: Errsole automatically collects all logs from the Node.js console. Additionally, it provides advanced logging functions that support multiple log levels and the ability to attach metadata to logs. 3) Store Anywhere: Store your logs wherever you want—whether in a file or any database of your choice. You can also configure log rotation to specify how long logs should be retained. 4) Log Viewer: View, filter, and search through your logs using the built-in Web Dashboard. Secure authentication and team management features ensure that only you and your team can access the logs. 5) Critical Error Notifications: Get immediate notifications when your app crashes or encounters critical errors. The notification includes the error message, the app name, the environment, the server name, and a direct link to view the error in your logs.
  • 2
    DNS Shield Reviews

    DNS Shield

    AReTori Solutions Ltd.

    $1.99
    Designed to enhance privacy on all Apple devices, this app encrypts DNS queries and routes them through no-logging DNS servers, ensuring your online activities remain private and secure. Unlike VPNs, it offers system-wide protection that covers all apps and services on your device, not just the browser. The app boasts an easy setup process and lets users switch DNS servers quickly without vendor lock-in, providing flexibility and control. It reduces exposure to harmful websites by blocking or minimizing connections to unsafe domains. Regular automatic updates keep the DNS provider list current for optimal protection. The comprehensive in-app help system guides users through features and troubleshooting. Most importantly, the app operates without collecting data or tracking user activity, respecting your privacy. This solution is ideal for Apple users seeking strong, lightweight DNS-based security without the complexity of VPNs.
  • 3
    ProHoster Reviews
    Top Pick

    ProHoster

    $2.50 per month
    59 Ratings
    ProHoster.Info - Hosting is a service that allows you to publish information on a server that is always accessible via the Internet. Our servers host the websites and provide the technology necessary to view them on the internet. You will also receive a domain name, DDoS protection and an SSL certificate when you purchase website hosting from us. Unlimited hosting that is reliable and fast with DDOS protection. Also, you get a free domain name, SSL certificate, website builder, and domain. You will need more resources and functionality for projects where regular hosting is not sufficient. Virtualization, such as KVM or OVZ, is possible. This is a great solution for non-standard projects that have higher power requirements and require full root access. Professional DDoS protection against all types of attacks. Rapid response and display of threats. Huge channel handling capacity.
  • 4
    MIRACL Reviews
    Top Pick
    Protect your users. Make their journey easier. MIRACL Trust provides a safer and smoother authentication experience. Only one step. No passwords. No problem. Multi-factor authentication is slow and cumbersome. MIRACL is a safer and more efficient alternative to traditional MFA. Logging in takes only 2 seconds and error rates as low at 1/10th of passwords. No passwords necessary. All you need is a PIN and you are in. Our cryptographic technology ensures that users' information is always safe. MIRACL Trust provides a simple login experience that puts users first and makes it easy to roll out your data quickly.
  • 5
    GlassWire Reviews

    GlassWire

    GlassWire

    $35.88/year/user
    Monitor the volume of data your PC is using for every single app, thanks to GlassWire's network monitoring graph. Keep track of the volume of data you received and sent in the past and who or what your PC is talking to. Detect spyware, malware, badly behaving apps, and bandwidth hogs, then block their connections with our powerful firewall. Monitor devices on your network and get alerted when new unknown devices join your WiFi. GlassWire warns you of network-related changes to your PC or unusual changes to your apps that could indicate malware.
  • 6
    ManageEngine Network Configuration Manager Reviews
    Top Pick
    Network Configuration Manager (NCM) is a multi-vendor solution for network configuration management (NCCM), which can be used to manage switches, routers, firewalls, and other devices. NCM automates and takes complete control of the entire device configuration management life cycle. You can schedule device configuration backups, track user activities, spot changes, and compare configuration versions all from one central web GUI. You can monitor configuration changes, receive instant notifications, and prevent unauthorized modifications to keep your network environment safe, stable, and compliant. Standard practices and policies should be established. Device configurations should be checked for violations. Then, you can quickly apply corrective measures to ensure compliance. Automate repetitive, time-consuming configuration management tasks. Also, centrally apply configuration changes to devices.
  • 7
    Xecrets Ez Reviews

    Xecrets Ez

    Axantum Software AB

    €15/year
    Xecrets Ez is a simple desktop application that allows you to encrypt files on Windows, Mac or Linux. It is compatible with AxCrypt and uses the same code. However, it is less complex, and focuses on delivering only the core functionality without any bells and whistles. It's a great option for personal daily use at a much lower cost than AxCrypt. Xecrets Ez is not dependent on Internet, administrative privileges, or installation. It allows you to encrypt and decrypt files and open them for editing with just a few clicks or drag-and-drop. It is a frontend for Xecrets Cli which is an open-source and free command-line program that handles encryption, decryption, and secure wiping. The command line is also available for download and can be used separately to script and integrate into other software.
  • 8
    SharePass Reviews
    Top Pick
    Secrets and confidential information should be shared with care. SharePass is the perfect solution for businesses who want to automate secret management and keep it all in one place securely online or on your phone - no matter where you're at. SharePass enables you to send encrypted links from sender to receiver with various settings. The settings include expiration restrictions, availability and IP restrictions which can be set through our patent-pending platform-independent sharing system. With its cutting-edge encryption and security measures, SharePass is committed to keeping your personal information safe. We cannot see what your secrets are, the only people who know are the ones sharing them. In this era of identity theft, SharePass will protect you and prevent your data from leaking to the dark web by eliminating all evidence that it was ever there. SharePass supports single sign-on with Office365, Google Workspace, MFA & integration for Yubikeys so maximum security is guaranteed.
  • 9
    Verosint Reviews

    Verosint

    Verosint

    $1/user/month
    Verosint's Real-Time, Intelligent ITDR platform provides a fast, efficient approach to detect, investigate and remediate attacks on workforce and customer accounts and identity systems. With unified observability and AI powered behavioral analytics, we detect advanced threats and provide continuous protection for your organization and users. With Verosint you’re able to: -Protect against the fastest growing and most costly attacks that traditional identity system miss, including Okta, Ping, Microsoft, and Google -Reduce the time to identify and remediate identity security threats (lower MTTD and MTTR) -Gain productivity and efficiency with full incident visibility, real-time threat detection, and automated remediation so your team can focus on what matters most -Close staffing and skills gaps by leveraging behavioral analytics, identity intelligence and AI insights to cut through complexity and noise to surface threats In less than 60 minutes, you can get immediate protection from identity based attacks such as: -Credential stuffing, Account Takeover and Brute-Force attacks, -Session Sharing and Hijacking, -MFA Fatigue and Location Mis-match, -Recently Attacked emails and credentials, -Dormant accounts and more.
  • 10
    Relianoid Reviews

    Relianoid

    Relianoid

    $1,356 one-time payment
    4 Ratings
    Our ADC solution is designed to take your online services to new levels of performance, security, and reliability. It ensures seamless traffic distribution and resource utilization as well as enhanced protection against cyber threats. Our ADC solution provides you with massive scalability and high availability for your services, apps, and networks. Multi-core compatibility, unlimited throughput, connections and farms, and optimized to support multi-core. Installation is not required, allowing for a rapid consolidation of production and a seamless deployment. Integrate easily into your infrastructure for a cost-saving and productive setup. Shared hardware resources can reduce costs associated with physical equipment, making this a budget-friendly solution. Ready for 64-bit platforms to provide better performance, and a robust environment. It allows for more performance resources than other architectures.
  • 11
    ManageEngine Firewall Analyzer Reviews
    Top Pick
    Firewall Analyzer is a firewall management tool that automates firewall rule administration. It tracks configuration and rule changes, schedules configuration backups, and helps to manage firewall policies. Performs periodic security audits, generates alerts for security events, tracks VPN use, generates VPN reports and displays the current security status firewalls. Employee internet usage is monitored to generate live, historical bandwidth reports. Alerts when bandwidth is exceeded. Collects, consolidates and analyzes firewall logs in order to generate security and bandwidth reports.
  • 12
    Pandora FMS Reviews
    Top Pick
    With more than 50,000 customer installations across the five continents, Pandora FMS is a truly all-in-one monitoring solution, covering all traditional silos for specific monitoring: servers, networks, applications, logs, synthetic/transactional, remote control, inventory, etc. Pandora FMS allows you to quickly find and solve problems. It scales them so that they can be derived either from on-premise, multi-cloud, or both. You now have the ability to use your entire IT stack and analytics to solve any problem, even those that are difficult to find. You can control and manage any technology and application with more than 500 plugins, including SAP, Oracle, Lotus or Citrix, Jboss, VMware, AWS and SQL Server.
  • 13
    NeoCertified Secure Email Reviews
    Top Pick
    NeoCertified secures sensitive information via our secure email app across our versatile Cloud-based platform. It works on any web browser through Microsoft Office 365/Outlook plug ins and Gmail integration. You can also download the iPhone + Android mobile apps directly to your mobile devices. Since 2002, we have been providing federally compliant, secure mail solutions. We have helped businesses send and get secure emails from any web browser or mobile device. NeoCertified works with all email providers, giving businesses the flexibility and guaranteed protection they need.
  • 14
    E3:Universal Reviews
    Top Pick

    Paraben Corporation

    $6,295
    24 Ratings
    Do not get lost in unmanageable tools. The E3 Platform allows you to quickly process all types of digital evidence with an easy interface, efficient engines, and an effective workflow. E3:UNIVERSAL version is designed to handle all data types, including hard drive data, smartphones and IoT data. No more need to adjust your tool according to the type of digital data that you have. The E3 Forensic Platform seamlessly integrates a wide range of evidence into one interface. It allows you to search, analyze, review, and report on digital data from all digital sources. Computer forensics is focused on bits and bytes in a file system. This can contain valuable data that could be crucial to your investigation. The E3 Forensic Platform can be used to break down data from old FAT file systems to newer file systems such as Xboxes.
  • 15
    RECOGNITO Reviews
    Top Pick
    RECOGNITO is a global leader and trusted provider of Face Biometrics and ID Document Verification solutions. Recognito is a global leader in AI products and solutions, founded in 2019, serving over 200+ identification solution providers and customers across a variety of industry. Recognito SDK is the world's leading face-based identity verification solution with NIST FRVT Top Algorithm. - Product • Face Recognition SDK : NIST FRVT Top in 1:1 and 1:N • Face Liveness SDK : DeepFake, Deepfake Detection, 3D Passive Liveness Detection • ID Document Verification SDK : ID, Passport Document OCR and MRZ, Barcode Analysis - Features • On-premises, Fully Offline and On-Device SDK • Compact Library-type SDK to facilitate on-premise installation. • Simple and comprehensive API. - Platform Android, iOS, Windows and Linux platforms.
  • 16
    NetFlow Analyzer Reviews
    Top Pick
    NetFlow Analyzer provides real-time visibility to network bandwidth performance and leverages flow technologies. NetFlow Analyzer provides a comprehensive view of your network bandwidth usage and traffic patterns. It has been used to optimize thousands of networks worldwide. NetFlow Analyzer provides a single solution that analyzes, reports, and collects data about your network's bandwidth usage. NetFlow Analyzer can help you optimize bandwidth usage across more than a million interfaces worldwide. It also provides network forensics, network traffic analysis, and network forensics. To gain control over the most used applications, you can reconfigure policies using traffic shaping via ACLs and class-based policies. NetFlow Analyzer uses Cisco NBAR technology to provide deep visibility into Layer 7 traffic. It can also identify applications that use dynamic port numbers, or hide behind known ports.
  • 17
    Quick License Manager (QLM) Reviews
    Top Pick

    Soraco Technologies

    $200 one-time payment
    15 Ratings
    Quick License Manager (QLM), a licensing protection framework, creates professional and secure keys to protect your software from piracy. You can create perpetual, subscription, or trial license keys. Licenses can be locked by node or floating/concurrent. Protect applications created in.NET and ASP.NET. C++, VB6, VBA. Delphi, Excel, MS Access, Word, Outlook addins, Android OS X, Linux. A state-of the-art graphical user interface allows you to manage license keys. Just a few lines of code can protect your application. You can send email notifications to your customers using selected triggers. e-Commerce integration allows you to automate the licensing process and the ordering process. Analytics to analyze usage behavior. Your customers can use the Self-Help portal. Check for updates for your application. To allow your customers to request a trial licence, you can use the Trial Registration Form.
  • 18
    Oz Liveness Reviews
    Top Pick

    Oz Forensics

    $2,625/year/12,500 transaction
    14 Ratings
    Oz Liveness is a world-leading facial recognition and authentication software that is used by private and public organizations around the world to reduce the risk of biometric fraud. It prevents deepfake attacks and spoofing attacks. Oz Liveness uses advanced algorithms to detect many forms of biometric spoofing. This includes 3D and 2D masks, photos and videos displayed on iPads or laptops, and photos and videos. Our technology has been approved by the industry's most stringent testing standard, ISO30107 certification. This certification helps organizations verify that they are dealing with a real person within seconds. It also lowers compliance risk and fraud risk.
  • 19
    AirDroid Business Reviews
    Top Pick

    Sand Studio

    $12 /device/year
    13 Ratings
    AirDroid Business, an enterprise-grade Mobile Device Management(MDM) solution, is designed to help businesses manage and control Android devices fleets from a central dashboard. With AirDroid Business, businesses can easily monitor device usage, deploy apps and updates, and remotely troubleshoot issues. It offers features such as kiosk mode, security policy, alerts & notifications, location tracking, file transfer in bulk, and more. It aims to simplify the device management process, increase productivity and efficiency, and reduce management costs.
  • 20
    Kiuwan Code Security Reviews
    Top Pick
    Security Solutions for Your DevOps Process Automate scanning your code to find and fix vulnerabilities. Kiuwan Code Security is compliant with the strictest security standards, such OWASP or CWE. It integrates with top DevOps tools and covers all important languages. Static application security testing and source analysis are both effective, and affordable solutions for all sizes of teams. Kiuwan provides a wide range of essential functionality that can be integrated into your internal development infrastructure. Quick vulnerability detection: Simple and quick setup. You can scan your area and receive results in minutes. DevOps Approach to Code Security: Integrate Kiuwan into your Ci/CD/DevOps Pipeline to automate your security process. Flexible Licensing Options. There are many options. One-time scans and continuous scanning. Kiuwan also offers On-Premise or Saas models.
  • 21
    ThreatAdvice Breach Prevention Platform Reviews
    Top Pick
    Data security is the biggest threat to your business and the most difficult to manage. ThreatAdvice vCISO is our flagship comprehensive cybersecurity solution. The vCISO solution gives you oversight over all your cybersecurity needs and ensures that you have the right protocols in place to reduce the chance of a cybersecurity incident. ThreatAdvice vCISO offers cybersecurity training and education for employees, as well as intelligence on potential cyber threats. Our proprietary dashboard provides a comprehensive cybersecurity monitoring solution. Do you find this interesting? Register for a free demo today!
  • 22
    6clicks Reviews
    Top Pick
    6clicks offers a straightforward solution for establishing your risk and compliance program, ensuring adherence to various standards such as ISO 27001, SOC 2, PCI-DSS, HIPAA, NIST, and FedRamp, among others. Numerous organizations rely on 6clicks to effectively automate their risk and compliance initiatives, facilitating processes like audits, vendor risk assessments, incident management, and policy enforcement. Users can effortlessly import standards, regulations, and templates from a vast content library, leverage AI-driven tools to minimize manual effort, and connect 6clicks with over 3,000 familiar applications. Designed to cater to businesses of all sizes, 6clicks is also utilized by consultants through a premier partner program that includes the option for white labeling. Founded in 2019, the company has expanded its presence with offices located in the United States, the United Kingdom, India, and Australia, continually evolving to meet the needs of its diverse clientele.
  • 23
    Imunify360 Reviews
    Imunify360 provides security solutions for web-hosting servers. Imunify360 is more than antivirus and WAF. It combines an Intrusion Prevention & Detection system with an Application Specific Web Application Firewall, Real time Antivirus protection, and Patch Management components into one security suite. Imunify360 is fully automated and displays all statistics in an intuitive dashboard.
  • 24
    FlashStart Reviews

    FlashStart

    FlashStart Group Srl

    $0.90/month
    4 Ratings
    It is very difficult to find data to show people who don’t care about malware. Although people may not be able to provide the exact details, almost everyone is aware that it's a serious threat. FlashStart blocks botnets, ransomware, malware, and other threats using global, top-class protection streams. You can block any web content that you find inappropriate by using content filtering. These sites could be dangerous, distracting, and unsavoury. Pro+ includes a secure, downloadable app. All devices are protected by centralized FlashStart protection at the home-office, cafe, and anywhere else. No router dependency. The idea is to optimize the filter to meet your individual needs. This is not an appliance. It is a lightweight application that runs on the existing IT systems of the end user. It should allow a low latency performance of less than 5ms.
  • 25
    Fusion Framework System Reviews
    Fusion Framework System software from Fusion Risk Management allows you to understand how your business functions, how it works and how to fix it. Our platform allows you to easily, visually, and interactively explore every aspect of your business, so that you can identify key risks and points of failure. Fusion's flexible, integrated platform capabilities allow you to achieve greater resilience and efficiency. They can be tailored to meet your specific needs. We are there to help you wherever you are in your journey to more resilient operations. - Map product delivery and service processes that are critical to your business. - Use objective risk insights to help you audit, analyze and improve your business operations - Plan, organize, and measure resilience and risk management activities with confidence Automation can be leveraged to reduce manual, repetitive, and time-consuming tasks, allowing teams to focus on higher-value activities.