Best Free IT Security Software of 2025 - Page 39

Find and compare the best Free IT Security software in 2025

Use the comparison tool below to compare the top Free IT Security software on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    ArvanCloud Reviews
    ArvanCloud CDN consists of tens to PoP sites at important locations around the globe to deliver online content to users, from the nearest geographical point at the highest quality and speed. You can create unlimited cloud servers with ArvanCloud Cloud Computing infrastructure in just a few clicks. You can create multiple cloud storage disks per server and manage your cloud data center communications with Firewall and private or public networks. ArvanCloud allows you secure any type of data stored on Cloud Storage. You can access a reliable storage system anywhere in the world and have no worries about data loss. ArvanCloud Container-Based Platform as a Service conforms to Kubernetes standards. You are only a few commands away from an operational product with ArvanCloud Container-Based Platform as a Service.
  • 2
    Email Shield Reviews
    Email Shield is a cloud-based security add-in that protects email accounts. It helps businesses in a variety of industries, including banking, fintech and eCommerce. It verifies and tracks trusted contacts, allowing users to expose potentially dangerous emails and ensuring financial transactions are safe. Email Shield allows accounts payable agents (AP) to scan emails, AP recipients, and attachments, and then approve, escalate, reject, or accept payment and request account changes. The system modifies the personal information in an active message, including the subject, body and sender. This protects against wire fraud, vendor fraud, and wire fraud.
  • 3
    ThreatModeler Reviews
    ThreatModeler™, an enterprise threat modeling platform, is an automated solution that reduces the effort required to develop secure applications. Today's information security professionals have a pressing need to create threat models of their organizations' data and software. We do this at the scale of their IT ecosystem and with the speed of innovation. ThreatModeler™, which empowers enterprise IT organizations, allows them to map their unique security requirements and policies directly into the enterprise cyber ecosystem. This provides real-time situational awareness of their threat portfolio and risks. InfoSec executives and CISOs gain a complete understanding of their entire attack landscape, defense-in depth strategy, and compensating control, which allows them to strategically allocate resources and scale up their output.
  • 4
    Portworx Reviews
    Kubernetes can be run in production using the #1 Kubernetes platform. It offers persistent storage, backup, data security, capacity management, and DR. You can easily backup, restore, and migrate Kubernetes applications to any cloud or data centre. Portworx Enterprise Storage Platform provides end-to-end storage, data management, and security for all Kubernetes projects. This includes container-based CaaS and DBaaS as well as SaaS and Disaster Recovery. Container-granular storage, disaster recovery and data security will all be available to your apps. Multi-cloud migrations are also possible. You can easily solve enterprise requirements for Kubernetes data service. Your users can easily access a cloud-like DbaaS without losing control. Operational complexity is eliminated by scaling the backend data services that power your SaaS app. With a single command, add DR to any Kubernetes application. All your Kubernetes apps can be easily backed up and restored.
  • 5
    Centreon Reviews
    Centreon is a global provider for business-aware IT monitoring to ensure high performance and continuous operations. The company's AIOps-ready platform, which is holistic and ready for use in today's complex hybrid cloud infrastructures, is designed to meet the needs of these distributed clouds. Centreon monitors all aspects of the IT Infrastructure, from Cloud-to Edge for a clear and comprehensive view. Centreon eliminates blind spots by monitoring all equipment, middleware, and applications that are part modern IT workflows. This includes legacy assets on-premise, private and public clouds, and all the way to edge of the network where smart devices and customers come together to create business value. Centreon is always up-to-date and can support even the most dynamic environments. It has auto-discovery capabilities that allow it to keep track of Software Defined Network (SDN), AWS or Azure cloud assets and Wi-Fi access points, as well as any other component of today’s agile IT infrastructure.
  • 6
    Verified.Me Reviews
    SecureKey Technologies Inc. has introduced Verified.Me, a robust solution designed to assist you in confirming your digital identity, enabling swift access to desired online services and products, whether you are shopping online, visiting in person, or making phone calls. This innovative platform provides Canadians with a reliable and user-friendly method for digital identity verification. Developed in collaboration with seven prominent financial institutions in Canada, including BMO, CIBC, Desjardins, National Bank of Canada, RBC, Scotiabank, and TD, Verified.Me is a comprehensive digital identity verification network. The network is continuously improving, with intentions to incorporate additional digital identity and service providers, ultimately simplifying your experiences. Recently, SecureKey has made the Verified.Me service available in a convenient, browser-based format, allowing for even easier access to its features. As the service evolves, users can expect further enhancements that will streamline their identity verification processes.
  • 7
    Secfense Reviews
    Secure your company, employees, and customers with stronger authentication. 2FA can be deployed in minutes and not weeks. 2FA (and other user access policies) are built into the infrastructure and not fixed to applications. Allowing the use of all 2FA methods on the market, now and in the future, without changing the core. Protection is available to all employees, including those who work in the public, private, and on-premise sectors. Secfense is installed between your users and the applications they access. It tracks traffic patterns that are related to authentication. It can then enforce multifactor authentication logon and other sensitive actions, without interfering in applications existing code or databases. The platform always has the most current 2FA methods. Secfense and applied methods are not affected by application changes. You can control session expiration rules across all applications. Do not rely on VPNs. Instead, trust users and their devices.
  • 8
    Sandboxie Reviews
    Sandboxie is a software that offers sandbox-based isolation for 32- and 64-bit Windows NT-based systems. It has been under the development of David Xanatos since its transition to open-source status; prior to that, it was managed by Sophos, which obtained it from Invincea, the company that previously acquired it from its original creator, Ronen Tzur. By creating an isolated operating environment, Sandboxie allows users to run or install applications without making permanent changes to the local or mapped drives. This virtual isolation enables safe testing of untrusted applications and secure web browsing. Following its open-source release, Sandboxie is available in two versions: the classic build featuring a MFC-based user interface and the Plus build that comes with enhanced features and a completely new Q't based interface. Most of the new functionalities are directed towards the Plus version, but many can also be accessed in the classic version by modifying the sandboxie.ini file. This flexibility makes it easier for users to benefit from updates while still maintaining a preference for the traditional interface.
  • 9
    NoDistribute Reviews
    To initiate a scan, simply select your file, and it will be examined using over 35 different antivirus programs. The outcomes of these scans are kept confidential and are not shared with any third parties. For added security, you can utilize temporary email addresses at no cost. To ensure your privacy and that of your files, you might prefer not to disclose their contents to antivirus providers. Our platform utilizes a trustworthy API from VirusCheckMate, which has established a solid reputation since its inception in 2014. If you're curious about their offerings, you can learn more by visiting VirusCheckMate.net. Since we began operating in 2013, we have maintained a strict policy of not distributing any scan results. You're welcome to conduct your own assessments of our service to confirm that privacy is upheld. Every day, we attract a high volume of visitors interested in past scan results and new file analyses. While we offer a complimentary service that allows for up to three scans daily, we would greatly appreciate your support by purchasing a scan key to help sustain our operations. Additionally, by opting to contribute, you will be ensuring that we can continue providing this valuable service to users in the future.
  • 10
    Secuvy AI Reviews
    Secuvy, a next-generation cloud platform, automates data security, privacy compliance, and governance via AI-driven workflows. Unstructured data is treated with the best data intelligence. Secuvy, a next-generation cloud platform that automates data security, privacy compliance, and governance via AI-driven workflows is called Secuvy. Unstructured data is treated with the best data intelligence. Automated data discovery, customizable subjects access requests, user validations and data maps & workflows to comply with privacy regulations such as the ccpa or gdpr. Data intelligence is used to locate sensitive and private information in multiple data stores, both in motion and at rest. Our mission is to assist organizations in protecting their brand, automating processes, and improving customer trust in a world that is rapidly changing. We want to reduce human effort, costs and errors in handling sensitive data.
  • 11
    Cyscale Reviews
    In less than five minutes, you can map, secure, and monitor your cloud resources across various platforms. Our agentless CSPM solution leverages the innovative Security Knowledge Graph™ to enhance operational efficiency and reduce costs while providing scalable and consistent protection and governance. Professionals from various sectors trust Cyscale to make impactful contributions by applying their expertise where it is needed most. With our service, you gain visibility through different infrastructure layers, amplifying your efforts to create organization-wide benefits. Cyscale enables you to connect diverse environments seamlessly and visualize your entire cloud inventory comprehensively. By identifying and eliminating obsolete or overlooked cloud resources, you can reduce your invoices from providers and optimize overall organizational costs. Upon signing up, you will receive precise correlations across your cloud accounts and assets, allowing you to promptly respond to alerts and prevent potential fines associated with data breaches. Additionally, our solution facilitates ongoing monitoring to ensure that your cloud environment remains efficient and compliant.
  • 12
    AuthPass Reviews
    AuthPass is a free and open-source password manager that supports the widely-used and reliable Keepass formats (kdbx 3.x and kdbx 4.x 🎉️). It allows you to store your passwords securely, share them across various devices, and access them effortlessly whenever you need to log in. 🗄 Consolidate all your passwords in one convenient location. 🧬 Create strong, random passwords for each of your online accounts. 🔐 Access your vault quickly using biometric authentication. 🔍 Monitor your accounts across the internet with ease. 🖥 Available on multiple platforms, including Mac, iPhone, iPad, Android devices, Linux, Windows, and through a web interface. 📂 Open and manage multiple password files simultaneously, such as one for work and another for personal use, or share files with colleagues. ✍ Autofill functionality for your passwords is available on Android 9 and later, with browser support starting from Android 10. With AuthPass, managing your credentials has never been more streamlined or secure.
  • 13
    CTemplar Reviews

    CTemplar

    CTemplar

    $8 per month
    We prioritize user anonymity by not retaining personal information, ensuring that your identity remains concealed. Our robust encryption and cutting-edge technologies protect the privacy of your communications. Iceland boasts some of the most stringent privacy regulations, facilitating both anonymous use and the prompt deletion of data. CTemplar's unique 4-Wall Protection system provides comprehensive security for your information. You can set a designated phrase in your account to help identify and prevent phishing attempts. Additionally, we offer anonymous payment options through Monero, although our payment processor for XMR is still in development, necessitating support contact for such transactions. For convenience, automatic payments can also be carried out using Bitcoin and credit cards. Our servers are situated in Iceland, where we benefit from abundant renewable energy resources, operating entirely on green energy sourced from geothermal and hydropower. This commitment to sustainability enhances our service while contributing positively to the environment.
  • 14
    Conjurers Encrypter Reviews
    Conjurers Encrypter 4, often referred to as CE 4, is a robust and user-friendly freeware application designed for file encryption. This tool enables users to effortlessly secure their essential and private information by encrypting both files and folders. The encryption process involves transforming data into a coded format that is inaccessible to unauthorized individuals unless they possess the corresponding secret key. While CE is typically utilized for safeguarding sensitive documents, employing encryption is also an effective means of preventing prying eyes from accessing your personal belongings. Additionally, once files are encrypted, you can send them to others via the internet with confidence, knowing that the information will remain unreadable to anyone except the intended recipient, even in the face of potential threats like network sniffing. Consequently, CE 4 not only enhances data security but also promotes privacy in digital communications.
  • 15
    CrowdSec Reviews
    CrowdSec, a free, open-source, and collaborative IPS, analyzes behaviors, responds to attacks, and shares signals across the community. It outnumbers cybercriminals. Create your own intrusion detection system. To identify cyber threats, you can use behavior scenarios. You can share and benefit from a crowdsourced, curated cyber threat intelligence platform. Define the type and location of the remediation you wish to apply. Use the community's IP blocklist to automate your security. CrowdSec can be run on containers, virtual machines, bare metal servers, containers, or directly from your code using our API. Our cybersecurity community is destroying cybercriminals' anonymity. This is our strength. You can help us create and distribute a qualified IP blocklist that protects everyone by sharing IP addresses you have been annoyed by. CrowdSec can process massive amounts of logs faster than Fail2ban, and is 60x faster than Fail2ban.
  • 16
    Citrio Reviews
    Citrio is a sleek and efficient browser that showcases impressive performance capabilities. With its quick launch time, seamless navigation, and responsive add-ons, Citrio guarantees an unmatched web surfing experience. Prioritizing user privacy, Citrio does not collect any personal information from its users. The browser is equipped with robust security features, including built-in malware and phishing protection, along with automatic updates that ensure your system is always protected with the latest security patches. Citrio supports a wide array of add-ons and extensions available in the web store, allowing users to enhance its functionality according to their needs. This adaptability makes Citrio a versatile tool suitable for everyone. Additionally, Citrio features an integrated Download Manager that grants users complete control over their downloads. You can conveniently access all downloaded files directly through the browser at any time, making it easier to manage your content. Furthermore, the built-in download accelerator significantly improves download speeds, boosting them by as much as five times, ensuring a swift and efficient downloading experience. Overall, Citrio combines speed, security, and customization for a superior browsing journey.
  • 17
    Comodo Secure DNS Reviews
    This infrastructure features a fully cloud-based, load-balanced, and geo-distributed Anycast DNS system, ensuring high availability and operational efficiency across more than 25 countries. Web security is provided at the DNS layer, serving as the first line of defense for all internet-connected devices. It effectively blocks various threats, including phishing attempts, malware domains, harmful sites, botnets, command-and-control callback events, spyware, drive-by-downloads, XSS-injected pages, cookie theft, anonymizers, TOR activity, encrypted files, and all forms of web-borne attacks. This comprehensive solution safeguards, regulates, and monitors users' web traffic, regardless of their internet connection point, whether by company, location, endpoint, mobile device, IP address, subnet, or user identity. Users can customize the experience by adding their own logo, displaying different pages for each category, or modifying messages to align with their specific requirements. Gain real-time visibility of all internet-connected activities and set up scheduled reports to be delivered directly to your inbox. Additionally, it provides seamless protection for mobile devices across various cellular networks, including 2G, 3G, 4G, and LTE, as well as Wi-Fi connections. With this robust security framework, organizations can better manage their online presence and respond swiftly to emerging threats.
  • 18
    ByteFence Reviews
    Bytefence offers cutting-edge anti-malware software that identifies and eliminates a range of threats including trojans, worms, spyware, and various high-risk malware types. Renowned for its efficacy, ByteFence serves as a powerful shield against crapware and bundleware that can seep into unwanted programs and advertisements. With its real-time protection feature, users are consistently safeguarded from harmful infections and undesired software. The software boasts strong defenses against all forms of malware, efficiently scanning and eradicating dangerous trojans, worms, and spyware. For many years, Byte Technologies has led the way in malware detection and removal technology, and today, we safeguard millions of users with advanced systems that can foresee and counteract emerging malware threats. Our application is specifically crafted for ease of installation, configuration, and operation, ensuring a user-friendly experience. In the event that assistance is required, our dedicated support team is quick to respond, ready to provide help. Additionally, we present a comprehensive array of online resources and complimentary support for our products during the trial phase, ensuring that users have everything they need for a smooth experience. We remain committed to continuous improvement and innovation in the fight against malware.
  • 19
    Maltiverse Reviews

    Maltiverse

    Maltiverse

    $100 per month
    Cyber Threat Intelligence made easy for all types and independent cybersecurity analysts. Maltiverse Freemium online resource for accessing aggregated sets indicators of compromise with complete context and history. If you are dealing with a cyber security incident that requires context, you can access the database to search for the content manually. You can also link the custom set of threats to your Security Systems such as SIEM, SOAR or PROXY: Ransomware, C&C centres, malicious URLs and IPs, Phishing Attacks and Other Feeds
  • 20
    GreyNoise Reviews
    We analyze, label, and analyze data from IPs that scan the internet, and saturate security instruments with noise. This unique perspective allows analysts to spend less time focusing on innocuous or irrelevant activity and more time on emerging threats and targeted activities. GreyNoise allows analysts to identify events that are not worth their time. GreyNoise indicators are most likely to be associated with opportunistic web scanning or common business services, and not targeted threats. This context allows analysts to focus on the most important things. It's possible that your device has been compromised by scanning the internet. GreyNoise alerts analysts when an IP is found in our collection. This helps security teams quickly respond to any compromises. GreyNoise Query Language, (GNQL) allows security teams to find tradecraft across the internet. Our tags show IPs that are looking for and exploiting vulnerability. Security teams can monitor the progression of threat activity to assess their exposure.
  • 21
    Ceeyu Reviews

    Ceeyu

    Ceeyu

    €195/month
    Ceeyu specializes in identifying vulnerabilities within your company's IT infrastructure and supply chain (Third Party Risk Management or TPRM) by integrating automated digital footprint mapping, comprehensive attack surface scanning, and thorough cybersecurity risk assessments, complemented by online questionnaire-based evaluations. By revealing your external attack surface, Ceeyu empowers organizations to detect and manage cybersecurity risks proactively. An increasing number of security breaches originate from your company’s digital assets, which include not only traditional network devices and servers but also cloud services and organizational intelligence accessible online. Cybercriminals exploit these components of your digital footprint to infiltrate your network, rendering firewalls and antivirus solutions less effective. Moreover, it is essential to identify cybersecurity risks present in your supply chain. Many cyber-attacks and GDPR violations can be linked to third parties with whom you share sensitive data or maintain digital connections, emphasizing the need for vigilance in these relationships. By addressing these vulnerabilities, your company can enhance its overall security posture.
  • 22
    LessPass Reviews
    Avoid spending unnecessary time syncing your encrypted vault; instead, rely on a single master password that grants you access to all your passwords, no matter the device or location. LessPass generates a distinct password by utilizing a combination of the site, login, and your master password, simplifying your password management. There's no need for syncing across devices or to the cloud, as LessPass operates entirely offline! You can modify the generated password without altering your master password by simply adjusting the counter field in your settings, ensuring both convenience and security. This innovative approach eliminates the hassle of remembering multiple passwords while keeping your online presence secure.
  • 23
    iBoostUp Reviews
    iBoostUp is a powerful Mac optimization program that places a strong emphasis upon security. Spyware Doctor uses cloud-based signature scanning and advanced algorithms to detect malicious apps. HID Implant Guard alerts and protects against modified peripherals such as USB drives and Lightning cables that could compromise your Mac. BoostUp offers a behavioral Keylogger Guard, an ARP Cache Poisoning Detector, and an Application Uninstaller to delete all traces of uninstalled applications. It also offers a Duplicate File Finder that allows you to free up disk space by removing duplicate content files. iBoostUp is a great tool for Mac users who want their system to run at its best and protect their privacy from various threats. We are not affiliated to Symantec Corporation or Norton, iAntiVirus or PC Tools. Instead, we were founded by ex-employees who have a wealth knowledge in this field.
  • 24
    DMARCOFF Reviews
    Safeguard your brand against phishing and spoofing threats using DMARCOFF. Detect unusual activities, get real-time alerts, and respond without delay. With DMARCOFF, you can: - Keep track of your DMARC performance - Make certain that your email domain is securely defended - Detect harmful emails dispatched from your domain - Access a weekly DMARC report that provides comprehensive insights into your domain’s sending activities - View your reports in an easy-to-understand format - Receive notifications about any problems in your preferred manner and timing, ensuring you stay informed at all times.
  • 25
    CyberRiskAI Reviews
    Initiate a cybersecurity risk evaluation with CyberRiskAI. We provide a swift, precise, and cost-effective solution for organizations aiming to uncover and address their cybersecurity vulnerabilities. Our AI-driven evaluations equip businesses with essential insights into possible weaknesses, allowing you to focus your security resources and safeguard your sensitive information. Enjoy a thorough cybersecurity audit and risk appraisal. Our all-inclusive risk assessment tool comes with a customizable template. We utilize the NIST framework for cybersecurity audits. Designed for quick and straightforward implementation, our service is largely automated, offering a hassle-free experience. You can streamline your quarterly cybersecurity audits through automation. All collected data remains confidential and is securely stored. Upon completion of the audit, you will possess comprehensive information necessary to address your organization’s cybersecurity threats effectively. Armed with these critical insights into potential weaknesses, your team will be well-equipped to enhance security measures and mitigate risks effectively.