Best Free IT Security Software of 2025 - Page 14

Find and compare the best Free IT Security software in 2025

Use the comparison tool below to compare the top Free IT Security software on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Asigra Reviews
    Asigra empowers IT departments to enhance their confidence in data recovery by providing unmatched reliability, top-notch security, ease of management, and cost-effectiveness in data protection solutions. The Enterprise Backup and Disaster Recovery (BDR) software platform from Asigra is specifically tailored for Managed Service Providers (MSPs) to effectively implement and manage their own Backup as a Service offerings. This user-friendly platform allows for easy customization to align with your brand identity, while its innovative Hybrid Cloud Backup architecture integrates a Cloud-optimized scale-out framework, a robust Cloud backup and recovery software platform, along with a Cloud API and management system. As a result, IT teams can efficiently manage, scale, and deliver comprehensive data protection services, ensuring they meet the evolving demands of their clients and stakeholders.
  • 2
    Ezeelogin Reviews

    Ezeelogin

    Ezeelogin

    $1.99 per month
    You can quickly set up a self-hosted Jump host (also known as "Bastion Host", or "Jump server") to manage SSH access on your Linux servers, Routers and Switches. Jump box software includes features such as 2-factor authentication, SAML authentication, SSH session recording and Identity and Access Management, RBAC, Privileged Access Management, (PAM), SSH Key Rotation, Root Password Management, and many more. It will help you meet security compliances like PCI, NIST and ISO 27001 and more. To learn more, visit us.
  • 3
    Vector by Datadog Reviews
    Gather, transform, and direct all your logs and metrics with a single, user-friendly tool. Developed in Rust, Vector boasts impressive speed, efficient memory utilization, and is crafted to manage even the most intensive workloads. The aim of Vector is to serve as your all-in-one solution for transferring observability data from one point to another, available for deployment as a daemon, sidecar, or aggregator. With support for both logs and metrics, Vector simplifies the process of collecting and processing all your observability information. It maintains neutrality towards specific vendor platforms, promoting a balanced and open ecosystem that prioritizes your needs. Free from vendor lock-in and designed to be resilient for the future, Vector’s highly customizable transformations empower you with the full capabilities of programmable runtimes. This allows you to tackle intricate scenarios without restrictions. Understanding the importance of guarantees, Vector explicitly outlines the assurances it offers, enabling you to make informed decisions tailored to your specific requirements. In this way, Vector not only facilitates data management but also ensures peace of mind in your operational choices.
  • 4
    Edgenexus Load Balancer (ADC/WAF/GSLB) Reviews
    We offer the most user-friendly technology without sacrificing performance or features. We back it up with exceptional support and care delivered under a fair, cost-effective pricing model Our technology is used by small startups with big ideas, small budgets, and global enterprises. We love them all! Easy to use Load balancing, WAF, GSLB and SSO/Pre-Authentication. It is also the only true ADP Application Delivery Platform that allows for the enhancement of functionality and longevity using the app store or apps you create in-house.
  • 5
    Bitcanopy Reviews

    Bitcanopy

    Bitcanopy

    $75 per month
    Automated security measures for AWS provide a hands-free approach to gaining insights and implementing remediation for AWS infrastructure. It is crucial to ensure that AWS Config is enabled across all regions to maintain oversight. Additionally, measures should be taken to identify and halt public access to S3 buckets, whether through read, write, or full control permissions. Automatic enforcement of encryption for S3 objects and volumes is also essential. Furthermore, blocking login attempts from unauthorized IP addresses can enhance security. Non-compliant development resources must be curtailed, and it is advisable to remove any unused elastic load balancers. Implementing an IP restriction policy on AWS resources should be done automatically to reinforce security. Newly created internet-facing Elastic Load Balancers (ELBs) should be deleted unless they align with security protocols. Ports should only remain open in accordance with established policies. For RDS, it is necessary to terminate any unencrypted instances that are publicly accessible. Continuous monitoring and remediation against over a hundred rules are vital, ensuring compliance with AWS CIS benchmarks and adherence to best practices in AWS management. This comprehensive approach ensures a robust security posture for your cloud environment.
  • 6
    FileAudit Reviews

    FileAudit

    IS Decisions

    $826 one-time payment
    Actively monitor, audit, report, notify, and react to all interactions with files and folders on Windows Servers and within cloud environments. Keep a close watch, in real time, on access to sensitive documents located on both Windows Servers and cloud storage. With robust filtering options, you can swiftly obtain the information you require, while tracking the IP address and machine name allows for precise identification of access instances. Configure email notifications and automated responses for various access events, such as denied access, file deletions, or activities linked to specific users, machines, or IP addresses, as well as large-scale actions like copying, deleting, or moving multiple files. Maintain a searchable, secure, and always-accessible audit trail for thorough reviews. Assess the access patterns and usage of files stored both on-premises and in the cloud to gain valuable insights. Additionally, set up centralized reporting schedules based on various criteria to streamline your oversight process. This comprehensive approach not only enhances security but also ensures compliance with organizational policies.
  • 7
    SaferPass Reviews

    SaferPass

    Lookout

    $29.99 per user
    Store your password once and access it securely across all your devices, including PC, Mac, iOS, or Android, through browsers like Chrome, Safari, and Edge, as well as within mobile applications. SaferPass offers an offline mode, enabling you to retrieve your password even when you lack internet connectivity. Setting it up is straightforward, whether you're on a desktop or using a smartphone. Once logged in, SaferPass can automatically fill in your login details and passwords, saving you both time and effort by accurately completing every required field. Coupled with our password generator, we create robust, unique passwords and autofill them for any account you may have. Additionally, we have introduced an innovative feature called Secure Me, which allows you to remotely log out of your computer or tablet, ensuring the complete security of all your accounts and files. With Secure Me, you can relax knowing that your laptop can be left unattended or borrowed without compromising your security. This level of convenience and safety transforms how you manage your passwords across multiple platforms.
  • 8
    Cloudbric Reviews
    Our cloud SWAP has been vetted as one of the best solutions to threats such as cross site scripting (XSS), SQL injections, and Distributed Denial of Service. Cloudbric's logic-based SWAP, which includes pattern matching, semantic, heuristic analysis, and core rulesets, is fully automated and simple to use. This means that there is no need to update security policies or sign signatures often. Private WAF deployments can also be customized with customization options. Our service ensures your website. Your website will remain online and be protected from distributed denial-of-service attacks (DDoS). Cloudbric actively blocks layers 3, 4 and 7 DDoS attacks that can scale up to 20Tbps*
  • 9
    SureMDM Reviews

    SureMDM

    42Gears Mobility Systems

    $3.49 per month
    Ensure the security, oversight, and administration of both company-owned and employee-owned devices to mitigate security threats and address maintenance issues throughout the entire device lifecycle. SureMDM, developed by 42Gears, stands out as a user-friendly and robust mobile device management (MDM) solution compatible with various platforms including Android, iOS/iPadOS, Windows, Linux, macOS, Wear OS, VR, and IoT. This comprehensive tool allows businesses to safeguard and oversee devices intended for dedicated use, as well as personal devices that access corporate information (BYOD). SureMDM effectively encompasses all facets of enterprise mobility management via unified endpoint management, which includes Mobile Application Management, Mobile Device Management, and Mobile Content Management. In addition, SureMDM subscriptions provide access to SureLock for kiosk mode, SureFox for a secure browsing experience, and SureVideo for reliable digital signage solutions, making it an all-in-one platform for managing mobile devices. With these features, organizations can streamline their mobile strategies while enhancing productivity and security.
  • 10
    Nagios Network Analzyer Reviews

    Nagios Network Analzyer

    Nagios Enterprises

    $1995.00
    Network Analyzer gives administrators an in-depth view of all network traffic sources and possible security threats. This allows system administrators to quickly gather high-level information about the health of the network and highly granular data to complete and thorough network analysis. Network Analyzer gives you a central view of all your network traffic and bandwidth data, as well as potential network compromises. The home dashboard gives you an overview of important netflow and sflow data sources, server system metrics, abnormal network behavior, and other network issues. It is a quick way to assess the health of your network. Users can drill down to view specific information on IPs, source ports, destination ports, or any combination thereof. Network Analyzer's advanced alerting capabilities and reporting capabilities give IT staff a better understanding of their network. For further analysis and tracking, you can access and archive highly detailed and down-to-the packet data.
  • 11
    BeachheadSecure Reviews

    BeachheadSecure

    Beachhead Solutions

    $36.00/year
    BeachheadSecure is the sole web-managed endpoint security solution that can implement encryption and enforce security policies—such as erasing compromised data—across a variety of devices including Windows and Mac PCs, iPhones and iPads, Android devices, and USB drives through a single, user-friendly cloud administration console. This cloud-driven data security platform equips cybersecurity and IT professionals with essential tools for encryption, remote access management, and monitoring capabilities specifically designed to continuously and effectively safeguard sensitive data on all types of devices. The foundation of robust security is effective encryption, and BeachheadSecure offers a simple and intuitive method for deploying and managing comprehensive encryption solutions across clients' devices. However, the challenge of protecting remote data persists if access credentials are breached. In response to this concern, BeachheadSecure features immediate remote data access control, allowing users to swiftly revoke or restore data access with just a click from the administration console, ensuring that security measures are both efficient and responsive to potential threats. This proactive approach not only enhances data protection but also instills confidence in users regarding the integrity of their sensitive information.
  • 12
    SpyShelter Reviews

    SpyShelter

    SpyShelter

    $25 per year
    SpyShelter Anti Keylogger monitors the behavior of all current actions on your computer and allows you to block any malware attempts to take place. SpyShelter can stop both custom-made and commercial keyloggers. This technology is unique and cannot be detected by anti-virus software. SpyShelter doesn't rely on fingerprint databases, so you won't have to worry about zero day malware. Your registry, RAM, and all applications will be protected as soon as SpyShelter is installed. SpyShelter's fast algorithm processing is faster than other security software. This makes it more suitable for older computers. SpyShelter Anti Keylogger offers solid protection against both known and unknown "zero day" spy and monitoring software. This includes keyloggers screen loggers webcam loggers and keyloggers.
  • 13
    UltraDNS Reviews

    UltraDNS

    Vercara

    $49.00 per month
    UltraDNS is a robust, cloud-based authoritative DNS service designed for enterprises, providing reliable and swift query responses for websites and essential online resources. This managed DNS solution guarantees complete website uptime and incorporates advanced security features for enhanced protection. As users around the globe demand uninterrupted and secure digital interactions, the complexities of DNS management have escalated significantly. The rise of Internet of Things (IoT) devices, coupled with various online threats, has made it challenging for organizations to devise an effective DNS strategy tailored to their IT requirements. It is increasingly difficult to maintain a knowledgeable in-house team for DNS management, and securing the necessary resources to establish a coherent strategy that aligns with current Internet challenges is often unfeasible. Ensure your website and digital assets remain accessible at all times with UltraDNS, which is supported by a commitment to 100% uptime and top-tier service-level agreements, all on a worldwide platform. This commitment empowers businesses to focus on their core operations while trusting that their online presence is managed by experts in the field.
  • 14
    InstantCard Reviews

    InstantCard

    InstantCard

    $5.80 per card
    Acquire the ID cards you require effortlessly and without complications. We won't attempt to sell your organization a printer or any card stock, as our focus is solely on your needs. Our team of skilled designers will craft a bespoke template tailored to your requirements, steering clear of generic options to ensure that your employee ID cards meet your exact specifications. With an unlimited selection of templates available, you can incorporate all necessary identification features precisely where you want them. Enjoy the convenience of same-day shipping for your employee ID badges, which applies even to smaller orders, thanks to the InstantCard system's design that accommodates single-card requests. This approach simplifies the ID card ordering process for businesses of all sizes. You have the flexibility to input each employee's details individually or upload them in bulk through a spreadsheet. Moreover, with no minimum batch size, you will receive the cards you need precisely when you need them, making our service reliable and efficient for every organization. Experience the ease of ordering, knowing that our customer support is always ready to assist with any queries you may have.
  • 15
    Relution Reviews

    Relution

    Relution

    $2 per month
    Oversee devices running iOS, Android, and Windows 10/11 with a focus on security through tailored restrictions and configurations. Utilize tools such as Apple DEP & VPP, Android Enterprise, and Samsung Knox for comprehensive management. Maintain an inventory of both native and public apps across Apple, Android, and Windows platforms, while also reviewing, approving, and publishing applications for mobile device usage. Facilitate access to enterprise applications for employees, partners, and external stakeholders by creating a customized app store that reflects your corporate branding. Streamline the management of Apple iOS and Android tablets to ensure secure deployment of the appropriate educational apps. Organizations of all sizes, including companies, authorities, and teams, reap the benefits of Relution's Mobile Device and App Management services. Resellers, educational institutions, and IT retailers rely on Relution to enhance their service offerings to clients. Renowned as a vital IT solution in the realm of digital education, Relution has established itself as the go-to mobile device management platform for over a decade, ensuring privacy compliance and facilitating cross-platform device management. With its user-friendly interface and robust features, Relution not only simplifies device management but also empowers educational environments to thrive in a digital age.
  • 16
    Logz.io Reviews

    Logz.io

    Logz.io

    $89 per month
    Open source is a passion for engineers. We supercharged the top open-source monitoring tools, including Jaeger, Prometheus and ELK, and combined them into a scalable SaaS platform. You can collect and analyze all your logs, metrics, traces and other data on one platform for end to end monitoring. You can visualize your data using customizable and easy-to-use monitoring dashboards. Logz.io's AI/ML human-coach automatically detects and corrects any errors or exceptions in your logs. Alerting to Slack and PagerDuty, Gmail and other endpoints allows you to quickly respond to new events. Centralize your metrics at any scale on Prometheus-as-a-service. Unified with logs, traces. Just three lines of code are required to add to your Prometheus config file to start forwarding your metrics and data to Logz.io.
  • 17
    SolarWinds Papertrail Reviews

    SolarWinds Papertrail

    SolarWinds

    $7 per month
    Logging into servers to manually check log files is a practice of the past. SolarWinds® Papertrail™ centralizes log management by gathering logs from various applications, devices, and platforms into one accessible location. With Papertrail, users can effortlessly view, search, and monitor events in real time through a unified interface, eliminating the need for traditional tools like grep or AWK. This innovative tool examines incoming logs for irregularities and provides instant alerts and summaries, offering immediate insights into both system activity and application performance. Discover how Papertrail can unlock the potential of the logs you've been collecting all along. Additionally, SolarWinds® Papertrail™ offers a robust cloud-based log management solution that easily consolidates logs from a multitude of sources, including applications, servers, network devices, and services. The platform includes features such as rapid search capabilities, customizable system groups, collaborative access for teams, long-term archiving options, as well as charts and analytics exports, along with monitoring webhooks to ensure you stay informed. Embrace the future of log management and enhance your operational efficiency with Papertrail’s comprehensive features.
  • 18
    IBM NS1 Connect Reviews
    IBM NS1 Connect offers premium, authoritative DNS & advanced traffic steering to deliver the high-performance, reliable, secure network connectivity that businesses need to meet increasingly sophisticated customer expectations through our: Global anycast network: Providing massive capacity & scale needed to keep users reliably connected across the world. API-first Architecture: Easily integrate & automate all NS1 Connect function. HTTPS Redirects: Manage every element of your HTTPS redirects from one platform. GSLB and RUM-based traffic steering: Balance loads at a global scale & reduce latency with near-real-time device performance data DDoS Attack Protection: Ensuring sufficient capacity to absorb traffic spikes & controls in place to guard against automated “junk” queries. NS1 Connect offers add-on options to suite your business needs including: DNS Insights: Providing the data you need to quickly identify & deal with misconfigurations impacting application performance. Dedicated DNS: Stay up & running with a native secondary DNS resolution infrastructure for seamless continuity of operations. DNS Traffic Steering: Optimize connections to applications, services & content based on geography, RUM data, load and more.
  • 19
    DNS Manager Reviews
    DNS Manager is a versatile automation tool tailored for multiple tenants, aimed at providing sophisticated DNS services to businesses and hosting providers while streamlining the management of DNS records. It is incredibly fast, intuitive, and facilitates seamless virtualization, making it an ideal solution for today's digital landscape.
  • 20
    Tines Reviews

    Tines

    Tines

    $0/user/year
    Tines provides no-code automation technology for the most secure companies around the globe. Automation works best when it is built by subject-matter experts and not distant developers. Our drag-and drop technology is intuitive, yet extremely powerful and flexible. It allows frontline staff to address repetitive manual processes. Tines allows users gather information from both internal and external sources to trigger multi-step workflows. Tines can be integrated with any technology that has an API. This is in keeping with our belief of easy-to-use and powerful technology. Customers don't have to use a set of integrations; they can connect to any tool in their stack. This allows them to protect their business. Tines frees our customers from repetitive, burdensome processes so they can focus on protecting their business against the next threat.
  • 21
    Acra Reviews

    Acra

    Cossack Labs

    $10000 per year
    Simplifying data leakage prevention in your application is now easier than ever with the Acra encryption suite, which offers robust data protection for distributed systems, as well as web and mobile applications, utilizing PostgreSQL, MySQL, and KV backends through targeted encryption methods. The encryption of sensitive and personal information is not only a regulatory requirement under laws such as GDPR, HIPAA, CCPA, and PCI DSS but also aligns with the best practices established within the industry. Nonetheless, incorporating cryptography into distributed applications can often prove to be a complex endeavor, frequently resulting in limited security benefits and various architectural compromises. Acra aims to transform this landscape by offering a singular solution that encompasses nine essential data security controls, designed to effectively reduce data leakage risks while ensuring comprehensive defense mechanisms throughout the entire data lifecycle in the application. The integration of Acra is straightforward, requiring minimal changes to your existing codebase, and it enhances data security while decreasing mean time to detection (MTTD) and mean time to recovery (MTTR). Additionally, Acra equips developers with an integration library that enables the encryption of any record using keys from AcraServer, further streamlining the security process. Ultimately, Acra is positioned as a vital tool for any organization striving to maintain data integrity and compliance in today's digital landscape.
  • 22
    Reshift Reviews

    Reshift

    Reshift Security

    $99 per month
    Reshift is the ultimate solution designed specifically for Node.js developers to enhance the security of their custom code. By utilizing this tool, developers are four times more likely to resolve issues before their code is committed. It seamlessly integrates security into the development process by detecting and addressing security vulnerabilities at compile time. This innovative security tool collaborates with developers without hindering their workflow. Reshift's integration with developers’ IDE allows for real-time identification of security concerns, enabling fixes prior to code merging. For those who are new to the world of security, Reshift simplifies the incorporation of security measures into the development pipeline. Tailored for expanding software companies aiming to advance their security, this tool is particularly suited for small to medium-sized businesses that may not have extensive security knowledge. With Reshift, you can enhance code security while simultaneously gaining insights into secure coding practices. Furthermore, Reshift offers comprehensive resources and best practices, empowering developers to learn about security as they write their code. This dual focus on education and practical application makes Reshift an invaluable asset for any development team.
  • 23
    Bacula Enterprise Reviews
    Bacula Enterprise offers a single platform that provides cloud backup and recovery software for the Modern Data Center. Bacula Enterprise backup & recovery software is ideal for medium and large businesses. It offers unique innovation, modern architecture and business value benefits, as well as low cost of ownership. Bacula Enterprise corporate backup software solution uses unique technologies that increase the interoperability of Bacula Enterprise into many IT environments, such as managed service providers, software vendors, cloud providers, enterprise data centers, and cloud providers. Bacula Enterprise is used by thousands of organizations around the world in mission-critical environments such as NASA, Texas A&M University and Unicredit. Bacula offers more security features than other vendors and advanced hybrid Cloud connectivity to Amazon S3, Google, Oracle, and many others.
  • 24
    Axis GatePass Visitor Management System Reviews
    The software oversees the management of activities at both Entry and Exit points within an organization. It systematically keeps track of Visitors, contract labor, Vehicles, assets, and materials. The authorization workflow is designed to validate and grant permissions for all transactions occurring within the application. Additionally, the software establishes a robust access-control framework for visitors, contract workers, and employees alike. It includes a visitor management component that issues visitor passes (badges) for the authorized entry and exit of visitors, vehicles, and materials. These passes can be customized to include photographs and barcodes for enhanced security. Axis Gatepass employs cutting-edge technologies and devices, such as facial recognition, fingerprint scanning, GSM modems, OCR-enabled visiting card scanners, digital pens, time and attendance devices, and HID tags, to deliver a comprehensive and forward-thinking solution. Furthermore, Axis Gatepass is a unified web-based visitor management system that offers various versions and modules compatible with Desktop, Web, and Android mobile platforms, ensuring flexibility and accessibility for users. This adaptability allows organizations to tailor the system to meet their specific operational needs.
  • 25
    dmarcian Reviews
    Founded in 2012 by a primary author of the DMARC specification, dmarcian is dedicated to upgrading the entire world’s email by making DMARC accessible to all with superior tooling, educational resources, and knowledgeable support. Used by thousands and recommended by support teams around the globe, our DMARC Management Platform grants you visibility into and control over how your email domains are used. Our platform provides actionable insights and alerts for organizations of any size to deploy DMARC and its supporting technologies of SPF and DKIM, visualize email delivery data, and manage a secure domain services infrastructure. Rectify email security vulnerabilities, improve domain and brand reputation, and meet the growing demand of DMARC compliance requirements with our best-in-class offerings.