Best Free IT Security Software of 2026 - Page 29

Find and compare the best Free IT Security software in 2026

Use the comparison tool below to compare the top Free IT Security software on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Themis Reviews

    Themis

    Cossack Labs

    $0.01
    Secure Cell serves as a versatile cryptographic container designed for the secure storage of various types of data, ranging from encrypted documents to database entries. It effectively encrypts data that is at rest and utilizes advanced encryption standards such as AES-256-GCM and AES-256-CTR. For encrypted communication, Secure Message offers a straightforward solution that caters to a broad spectrum of applications, enabling users to send encrypted and signed messages securely between individuals or from client to server, thus mitigating the risk of man-in-the-middle (MITM) attacks and preventing the leakage of singular secrets. It employs a combination of ECC with ECDSA and RSA integrated with PSS and PKCS#7 for robust security. Additionally, the Secure Comparator allows users to verify identities through a zero-knowledge proof protocol, facilitating secret comparisons over untrusted channels without exposing sensitive information or risking reuse attacks. Meanwhile, Secure Session provides an encrypted data exchange mechanism that is session-based and incorporates forward secrecy, enhancing security for more sophisticated infrastructures. By integrating these technologies, users can ensure a higher level of safety and confidentiality in their digital communications and data management.
  • 2
    Effivity Reviews

    Effivity

    Effivity Technologies

    $30 per month
    Effivity is a cloud-based or on-premise QHSE/FSMS/ISMS program that helps you implement a robust Quality – Occupational Health & Safety – Environment Management System. It conforms to all ISO 9001, ISO 14001 and ISO 45001 standards. Effivity makes ISO compliance easy, quick and cost-effective. It also allows for collaboration and time-savings. This is validated by more than 120 countries.
  • 3
    Cofense PhishMe Reviews
    It is essential for your staff to be trained to quickly identify and report phishing emails. Cofense PhishMe™ offers simulations that reflect the latest threats capable of evading Secure Email Gateways (SEGs), equipping your team to act as vigilant human threat detectors. By fostering resilient employees who are aware of current phishing tactics, your organization can establish an effective defense mechanism. With Cofense PhishMe Playbooks, you can easily set up a comprehensive year-long training program, which includes various phishing simulation scenarios, tailored landing pages, attachments, and valuable educational resources, all achievable in just a few clicks. Our Smart Suggest feature employs sophisticated algorithms and proven best practices to propose scenarios that align with ongoing threats, industry standards, and the history of your program. Ultimately, enhancing your phishing defense hinges on improving reporting and resilience rates. Elevate user engagement and transform them into proactive defenders with Cofense Reporter™, our convenient one-click reporting tool, making it easier than ever for staff to participate in safeguarding your organization's digital environment. This collective effort not only strengthens your defenses but also fosters a culture of vigilance within your workplace.
  • 4
    VIPole Reviews

    VIPole

    VIPole

    $5.99 per month
    The ability to edit and erase messages, as well as automatically delete them, clear chat windows, and completely wipe history is essential. Users can remotely disconnect devices, utilize a false secret phrase, and enable auto-lock and auto-logout features when inactive. There are options to hide contacts and create blacklists, along with tailored visibility settings for each contact and the ability to configure contact permissions. Tasks can be assigned to oneself and coworkers, with progress tracking to ensure accountability. Additionally, users can securely store and manage passwords, sharing them with contacts when necessary. Collaboration is enhanced by establishing team goals and overseeing the resolution of various issues, fostering a productive work environment. This comprehensive set of features significantly improves communication and organization within any team.
  • 5
    NGINX Reviews
    NGINX Open Source is the web server that supports over 400 million websites globally. Built upon this foundation, NGINX Plus serves as a comprehensive software load balancer, web server, and content caching solution. By opting for NGINX Plus instead of traditional hardware load balancers, organizations can unlock innovative possibilities without being limited by their infrastructure, achieving cost savings of over 80% while maintaining high performance and functionality. It can be deployed in a variety of environments, including public and private clouds, bare metal, virtual machines, and container setups. Additionally, the integrated NGINX Plus API simplifies the execution of routine tasks, enhancing operational efficiency. For today's NetOps and DevOps teams, there is a pressing need for a self-service, API-driven platform that seamlessly integrates with CI/CD workflows, facilitating faster app deployments regardless of whether the application utilizes a hybrid or microservices architecture, which ultimately streamlines the management of the application lifecycle. In a rapidly evolving technological landscape, NGINX Plus stands out as a vital tool for maximizing agility and optimizing resource utilization.
  • 6
    ManageEngine Password Manager Pro Reviews
    Password Manager Pro is a vault that stores and manages sensitive information, such as passwords, documents, and digital identities. Password Manager Pro has many benefits. It can be used to eliminate password fatigue and security breaches by creating a secure vault that allows for password storage and access. Automating frequent password changes in critical systems can improve IT productivity. Provide preventive and detective security controls via approval workflows and real-time alerts about password access. Security audits and regulatory compliance such a SOX, HIPAA, and PCI are met.
  • 7
    Array APV Series Reviews
    Array APV Series application delivery controllers are crucial for ensuring the availability, scalability, performance, security, and management needed to maintain applications and servers operating within optimal conditions. They incorporate both local and global server load balancing, along with link load balancing, to guarantee maximum resilience for your applications. Additionally, features such as connection multiplexing, SSL offloading, caching, and compression collaborate to create the quickest possible experience for end-users. By establishing connections on APV Series ADCs, applications benefit from the protective measures of Array’s WebWall® application security suite. These controllers are offered as physical or virtual appliances and can also be deployed on popular public cloud platforms. Designed to fulfill technical specifications, Array ADCs remain user-friendly for IT teams of any size and are cost-effective for businesses of all scales, ensuring that every organization can enhance its application delivery capabilities effectively. Ultimately, this versatility makes them an invaluable asset for optimizing application performance and security.
  • 8
    Apache Syncope Reviews

    Apache Syncope

    Apache Software Foundation

    Apache Syncope is an open-source platform designed for the management of digital identities within corporate settings, built on Java EE technology and distributed under the Apache 2.0 license. The concept of identity management (IdM) involves overseeing user information across various systems and applications, blending business processes with IT requirements. Computers rely on data records that pertain to individuals, which include essential technical details necessary for the creation and maintenance of accounts. Have you ever been employed by a company, joined an organization, or simply set up a new Google account? Businesses, institutions, and cloud service providers rely on applications that require your personal information to operate effectively, such as your username, password, email address, first name, last name, and additional details. In summary, Identity Management is responsible for the administration of identity data throughout what is referred to as the Identity Lifecycle, ensuring that each user's information is accurately maintained and utilized. This comprehensive process not only enhances security but also facilitates smoother interactions across various platforms and services.
  • 9
    Intelligent Discovery Reviews

    Intelligent Discovery

    Ldaptive

    $199 per month
    Intelligent Discovery simplifies the management of your AWS security protocols. Our top-tier tool for AWS vulnerability scanning and remediation enables rapid detection of potential threats while ensuring your infrastructure remains unaffected. By proactively identifying, addressing, and mitigating security risks through an intuitive interface, you can stay one step ahead of attackers seeking to exploit vulnerabilities. Features such as automated security auditing, security log management, and customizable controls enhance your operational efficiency significantly. In a dynamic and expanding environment, our integrated capacity, cost, and volume management tools help maintain performance without financial strain. As your organization grows, navigating compliance complexities becomes imperative; our clearly defined organizational rule sets and customization streamline this process. Additionally, regular and systematic monitoring of security logs, inventory, and change logs consolidates your inventory management into a single, efficient interface while ensuring robust oversight and control. This holistic approach not only strengthens your security posture but also reinforces your compliance efforts as you scale.
  • 10
    Sophos UTM Reviews
    Sophos UTM elevates threat prevention to unprecedented heights. At the core of Sophos Sandstorm is an advanced deep learning neural network, a sophisticated type of machine learning that effectively identifies both familiar and unfamiliar malware without depending on traditional signatures. Notably, Sophos UTM 9.4 stands out as one of the pioneering products to incorporate our state-of-the-art next-gen cloud sandboxing technology. Sandstorm significantly enhances protection against ransomware and targeted attacks while providing comprehensive visibility and analytical capabilities. It swiftly and accurately detects evasive threats before they infiltrate your network. Furthermore, it delivers exceptional value by offering enterprise-quality protection without the burden of exorbitant costs or complexities. You can fortify your web servers and Microsoft Enterprise Applications against cyber threats while ensuring secure access for external users through reverse proxy authentication. Additionally, our unique all-in-one solution guarantees complete SMTP and POP message protection from spam, phishing attempts, and data breaches, enhancing your overall cybersecurity posture. Ultimately, Sophos UTM equips businesses with robust tools to safeguard their digital assets effectively.
  • 11
    HAProxy Enterprise Reviews
    HAProxy Enterprise, the industry's most trusted software load balancer, is HAProxy Enterprise. It powers modern application delivery at all scales and in any environment. It provides the highest performance, observability, and security. Load balance can be determined by round robin or least connections, URI, IP addresses, and other hashing methods. Advanced decisions can be made based on any TCP/IP information, or HTTP attribute. Full logical operator support is available. Send requests to specific application groups based on URL, file extension, client IP, client address, health status of backends and number of active connections. Lua scripts can be used to extend and customize HAProxy. TCP/IP information and any property of the HTTP request (cookies headers, URIs, etc.) can be used to maintain users' sessions.
  • 12
    Splunk On-Call Reviews

    Splunk On-Call

    Cisco

    $27.00/month/user
    Enhance team efficiency by directing alerts to the appropriate individuals, facilitating swift collaboration and resolution of issues. By ensuring that alerts reach the right recipients, you can minimize the time taken to acknowledge and rectify incidents. Our complete ChatOps experience seamlessly integrates with your existing tools, offering incident timelines and reporting functionalities that support blameless post-incident analysis. Foster engagement by meeting individuals in their work environments; our mobile-first solutions utilize machine learning to provide on-call accessibility from any location. Splunk On-Call streamlines incident management processes, alleviating alert fatigue and promoting higher uptime rates. Utilize Splunk On-Call to optimize your on-call schedules and escalation frameworks, automating everything from rotations to overrides. Our platform delivers contextual alert details, machine learning-based suggestions, and enhances collaboration to efficiently tackle issues, all while meticulously documenting crucial remediation information for future reference. This allows teams to not only resolve incidents promptly but also to learn from them to improve future responses.
  • 13
    SparrowIQ Reviews

    SparrowIQ

    Solana Networks

    $19 per month
    SparrowIQ is a comprehensive network traffic monitoring solution crafted to enable IT teams to swiftly identify and resolve network problems while gaining insights into application performance and its impact on user experience. Featuring an acclaimed ‘resource efficient’ design, it integrates robust performance monitoring capabilities within a user-friendly and easily deployable framework, thereby reducing the administrative burden on overextended IT personnel. Tailored specifically for small to medium-sized enterprises, SparrowIQ meets the demands for high-quality monitoring solutions similar to those used by larger organizations, all while accommodating the limited technical resources, time, and financial constraints that these businesses often face. This innovative approach allows smaller firms to maintain competitive operational standards without the hefty investments typically associated with traditional monitoring systems. By streamlining the troubleshooting process, SparrowIQ empowers organizations to enhance their overall network performance and user satisfaction.
  • 14
    Simply Sync Password  Reviews

    Simply Sync Password

    GoodWorks Communications

    $20 per user per month
    Simply Sync Password allows organizations the ability to sync their passwords and active directory properties between their local Active Directory site and an external Active Directory site or other external systems. Simply Sync Password is a great alternative to the more complex and expensive process of establishing a trust relationship between Active Directory sites, or deploying an AD FS infrastructure. While AD FS is great if you have large organizations, it doesn't work well for smaller and medium-sized businesses. The Password Capture agent's role is to intercept password changes that occur on domain controllers. The Password Capture Agent must also be installed on all domain controllers, as you don't know the domain controller that a user will use to reset their password. The Password Capture Agent doesn't interfere with the password changing process. It simply intercepts the change request as they happen.
  • 15
    LevelBlue USM Anywhere Reviews
    Enhance your security posture with LevelBlue USM Anywhere, a cutting-edge open XDR platform tailored to adapt to the dynamic nature of your IT environment and the increasing demands of your enterprise. Featuring advanced analytics, comprehensive security orchestration, and automation capabilities, USM Anywhere provides integrated threat intelligence that accelerates and sharpens threat detection while facilitating smoother response management. Its unparalleled flexibility is highlighted by a wide array of integrations, known as BlueApps, which improve its detection and orchestration capabilities across numerous third-party security and productivity applications. Additionally, these integrations allow for seamless triggering of automated and orchestrated responses, making security management more efficient. Take advantage of a 14-day free trial today to see how our platform can transform your approach to cybersecurity and help you stay ahead of potential threats.
  • 16
    WSO2 Identity Server Reviews
    WSO2 Identity Server API-driven is built on open standards and offers the option of cloud, hybrid, or on-premise deployments. It is highly extensible and can support complex IAM requirements. WSO2 Identity Server allows you to do single sign-on as well as identity federation. It is backed up by strong and adaptive authentication. Securely expose APIs and manage identities by connecting with heterogeneous user accounts. Open-source IAM can be used to innovate quickly and to build secure Customer IAM solutions (CIAM) to deliver a user-friendly experience.
  • 17
    Praetorian Chariot Reviews
    Chariot is the first offensive security platform that can comprehensively catalog Internet-facing assets, contextualize their value, identify and validate real compromise paths, test your detection response program, and generate policy-as code rules to prevent future exposures. We are a concierge managed service and work as an extension to your team to help reduce the burden of daily blocking and tackling. Your account is assigned to dedicated offensive security experts who will assist you throughout the entire attack lifecycle. Before you submit a ticket to your team, we remove the noise by verifying that every risk is accurate and important. Our core value is to only signal when it matters and to guarantee zero false positives. Partner Praetorian to get the upper hand over attackers Our combination of security expertise and technology automation allows us to put you back on your offensive.
  • 18
    RMail Reviews

    RMail

    RPost

    $7/month/user
    RMail®, the e-security platform from RPost®, is a global leader in 2000. RMail is a specialist in elegantly simple email encryption for privacy, compliance, legal e–delivery proof secure file sharing, email rights management, email impostor protection and email encryption. RMail's transmission security services are often used by businesspeople and business systems that need to send sensitive or consumer-regulated information. These RMail services can be used for messages that require additional functionality beyond standard email. They include (a) an easier-to-use and more automated email encryption to ensure privacy compliance; (b) a verifiable proof record of who sent what email to whom; (c) assurance and peaceof mind in relation to delivery and open status email of important and time-deadline emails, (d) need to have a timestamped proof that content was delivered; (f) the need to securely share large files.
  • 19
    AgenaRisk Reviews
    AGENARISK leverages cutting-edge advancements in Bayesian artificial intelligence and probabilistic reasoning to address intricate, high-stakes challenges and enhance decision-making processes. By utilizing AgenaRisk models, users can forecast outcomes, conduct diagnostics, and make informed decisions by integrating data and insights regarding complex causal relationships and dependencies present in the real world. Our clientele employs AgenaRisk to tackle a wide range of issues associated with risk and uncertainty, such as operational risk, actuarial studies, intelligence analysis, system safety and reliability, health-related risks, cybersecurity threats, and strategic financial planning. AgenaRisk is committed to designing and promoting innovative products that utilize Bayesian Network technology. The effectiveness of our technology and methodology has been recognized and published in leading academic journals spanning AI, machine learning, actuarial science, decision science, and cognitive science. As we continue to evolve, we aim to remain at the forefront of risk modeling and decision-making solutions, directly impacting various industries.
  • 20
    Mezmo Reviews
    You can instantly centralize, monitor, analyze, and report logs from any platform at any volume. Log aggregation, custom-parsing, smart alarming, role-based access controls, real time search, graphs and log analysis are all seamlessly integrated in this suite of tools. Our cloud-based SaaS solution is ready in just two minutes. It collects logs from AWS and Docker, Heroku, Elastic, and other sources. Running Kubernetes? Log in to two kubectl commands. Simple, pay per GB pricing without paywalls or overage charges. Fixed data buckets are also available. Pay only for the data that you use on a monthly basis. We are Privacy Shield certified and comply with HIPAA, GDPR, PCI and SOC2. Your logs will be protected in transit and storage with our military-grade encryption. Developers are empowered with modernized, user-friendly features and natural search queries. We save you time and money with no special training.
  • 21
    Archeo Reviews
    Easily locate messages related to your business and gain a comprehensive overview through an intuitive web interface. Archeo offers valuable insights that empower you to manage your business processes effectively. With all text-based content logged and searchable by free text, finding your messages is straightforward. Information is logged to a REST API within Azure, making it available across all your applications and integrations. Additionally, you can create customized graphs and dashboards to visualize your workflows and transactions in detail. This accessibility allows anyone in your organization to utilize the application, enabling end users to monitor and manage their own business processes seamlessly. Ultimately, Archeo enhances collaboration and efficiency within your team.
  • 22
    BlueFiles Reviews
    When you need to swiftly share a confidential file or email with a customer, partner, or employee outside your organization and beyond the secure network, it is crucial to follow best practices. The CNIL strongly recommends that businesses and organizations implement data encryption during transfers and ensure personnel are educated about potential risks. Data encryption plays a vital role in contemporary data protection strategies. By utilizing specialized encryption solutions such as BlueFiles, companies can transform their data into a format that is unreadable to anyone except the intended recipient. BlueFiles offers a solid guarantee for all your digital data transfers, ensuring file integrity, complete confidentiality, remote file control, and tracking capabilities. This method not only saves time and enhances user experience but also reduces costs, allowing for secure communication over the Internet without the threat of sensitive data exposure. Additionally, under GDPR regulations, organizations must take proactive measures to encrypt personal data transfers to avoid severe penalties, emphasizing the importance of compliance in today’s digital landscape. By adopting these practices, businesses can foster trust and security in their communications.
  • 23
    WebDefender Reviews

    WebDefender

    Cobweb Security

    $6.90 per month
    WebDefender is a comprehensive security plugin designed specifically for WordPress websites, offering a variety of features including monitoring, protection, malware detection, and site cleaning. Clients can select from three different pricing tiers: free, professional, and premium, allowing them to find the best fit for their business needs. The PHP antivirus scanner provided by WebDefender can be seamlessly installed on any PHP-based website, ensuring robust security monitoring and the ability to identify malware and vulnerabilities. Any issues or harmful software that are detected can be efficiently removed using our specialized cleanup tool. Additionally, for Linux-based web servers, our all-inclusive antivirus platform offers monitoring capabilities, malware detection, and removal services. It also includes an intuitive cleaning tool designed to eliminate all identified malicious code from the server environment. The professional version boasts a SaaS control panel that can manage multiple servers while encompassing all the features of WebDefender Security & Protection, along with several advanced options to enhance security further. This makes WebDefender an ideal choice for those seeking to improve their website's security effectively.
  • 24
    FortKnoxster Reviews
    Security experts have created a one-stop E2E encrypted platform. Crypto Suite™, is the only crypto app you need. This app is the most secure for all your crypto needs. All your private and valuable stuff in one place. Communications, cryptocurrencies, and private files. Blockchain integration and end-to-end encryption ensure that you are in complete control. It's easy to manage your crypto. FortKnoxster is your one-stop secure platform. It is easy to share crypto and to invite your friends. FortKnoxster's wallet is completely non-custodial. Only you have access to your funds. We do not have access to your funds, nor does anyone else. Only you have the private encryption keys to your money. All your tokens and coins can be stored in one secure mobile wallet. We support multiple blockchains, and thousands of assets. BTC, ETH and FKX, ERC20 or BEP20, NFT collectibles, and other assets can be purchased at your own terms.
  • 25
    Mimecast DMARC Analyzer Reviews
    Enhance your email security by blocking malware and phishing threats while boosting your email deliverability! Safeguard your brand from misuse and scams while gaining comprehensive visibility into your email operations using DMARC Analyzer. DMARC, an email validation framework, was developed collaboratively by tech giants like PayPal, Google, Microsoft, and Yahoo!. By implementing DMARC, organizations can gain valuable insights and exert control over their email communications. This tool enables businesses to protect their identities from phishing and spoofing attempts effectively. DMARC Analyzer, a leader in the field, has been assisting clients since the DMARC standard was established in 2012. Their user-friendly software simplifies DMARC analysis and serves as an expert consultant, helping you transition to a reject policy as swiftly as possible. With a SaaS offering, DMARC Analyzer empowers organizations to navigate the complexities of DMARC deployment effortlessly. The solution ensures complete visibility and governance throughout all email avenues, making the process as straightforward as possible for users. Ultimately, DMARC Analyzer is dedicated to enhancing your email security and operational efficiency.