Best IT Security Software in Australia - Page 34

Find and compare the best IT Security software in Australia in 2025

Use the comparison tool below to compare the top IT Security software in Australia on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Vault Vision Reviews

    Vault Vision

    Vault Vision

    $25/month for 10k users
    User auth for web and mobile apps with industry-leading security and passwordless login convenience for end users. Vault Vision's low-code user authentication platform allows applications to securely manage user auth and login management. Our platform helps application owners increase user login engagement with passwordless application logins powered by mobile passkeys, two factor auth (2FA), multi-factor auth (MFA), face id auth, fingerprint auth, USB key auth, pin based auth, SSO with email, OIDC logins for Apple, Google and Microsoft, and more.
  • 2
    Authkey Reviews
    Authkey.io stands as an exceptional Enterprise Omni Channel API platform, offering an extensive suite of communication tools and APIs meticulously designed to empower businesses in their quest for efficient and secure customer engagement. SMS API:A seamless communication symphony with its event-based messaging prowess. This facet encompasses the seamless orchestration of Bulk SMS delivery, transactional messages, one-time passwords (OTP), and the authentication process through call-based interfaces. Voice API: This dynamic capability ensures the delivery of OTPs through vocal messages, providing an alternative avenue that ensures the recipient's prompt access. Email API: Reliable and rapid delivery of emails, serving critical functions such as password verification, account creation, OTP distribution, and email validation. WhatsApp Business API: The contemporary business landscape requires a direct conduit to reach the massive audience on the WhatsApp API facilitate this engagement, enabling businesses to establish a direct line of communication with their audience. Two-Factor Authentication (2FA) API: Seamlessly dispatching OTPs, verifying logins, and bolstering the security architecture of business software, CRM systems.
  • 3
    Panoptica Reviews
    Panoptica makes it easy for you to secure containers, APIs and serverless functions and manage your software bills of material. It analyzes both internal and external APIs, assigns risk scores, and then reports back to you. Your policies determine which API calls the gateway allows or disables. Cloud-native architectures enable teams to develop and deploy software faster, keeping up with today's market. However, this speed comes at a cost: security. Panoptica fills these gaps by integrating automated policy-based security and visibility at every stage of the software-development process. The number of attack points has increased significantly with the decentralized cloud-native architectures. Changes in the computing landscape have also increased the risk of security breaches. Here are some reasons why comprehensive security is so important. A platform that protects all aspects of an application's lifecycle, from development to runtime, is essential.
  • 4
    Descope Reviews

    Descope

    Descope

    $0.05 per user per month
    Descope is a CIAM platform meant for developers and IT teams. Customers can easily create frictionless and secure user journey flows for each user interaction using our no-code workflow builder and SDKs. Descope allows developers to spend more time working on core app projects by abstracting the details of authentication methods, session management, and risk management. Our platform makes it easy to manage users, tenants, RBAC, SCIM provisioning, and identity federation without any hassle. Customers use Descope to enhance user experience with passwordless authentication, improve security with risk-based MFA, and centralize user identities across all business-facing apps.
  • 5
    CyberHoot Autopilot Reviews

    CyberHoot Autopilot

    CyberHoot

    $199/month flat-rate 2500 usrs
    Explore the comprehensive capabilities of CyberHoot's Autopilot, a unified security management platform designed to optimize efficiency. This solution integrates seamlessly to offer streamlined security training, phishing simulation, and dark web surveillance, all while simplifying the client integration process for MSPs. Leveraging the innovative, zero-configuration HootPhish technology, Autopilot automates the scheduling of regular training and phishing assessments. It revolutionizes user engagement by eliminating passwords, instead granting access to tasks via straightforward email links, significantly enhancing ease of use. Autopilot offers a competitive flat rate of $199/month for up to 2500 users.
  • 6
    DNSSense Reviews
    DNSEye detects malicious network traffic and reports if this traffic can be blocked using your other security devices. DNS is used in all protocols, including HTTP, HTTPS and IoT. DNS traffic provides information on your entire network, irrespective of the network protocol. DLP products cannot detect data exfiltration attacks using DNS tunnelling. DNS log analysis is required for an effective solution. 80% of malware domains do not currently have an IP address. Only the DNS log can detect malware requests without an IP address. DNSservers generate a large number of difficult-to-understand logs. DNSEye allows for the collection, enrichment and AI-based classifying of DNS logs. Its advanced SIEM integration saves time and EPS because it transfers only the data needed by SOC teams to SIEM. DNSEye collects logs from a variety of DNS servers, including many different brands and models. This can be done without requiring any changes to your network structure.
  • 7
    Neurodactyl Reviews

    Neurodactyl

    Neurodactyl

    USD 0.01 per verification
    Neurodactyl SDK allows system integrators to integrate biometric fingerprint recognition, verification or identification into their products and services. The SDK is based upon deep learning technologies, and matches fingerprints with high accuracy: flats, roll, latents, and photo images. It creates a fixed-size, compatible template for all types of fingerprints. The algorithm's recognition accuracy is top-tier in the NIST PFT III competition.
  • 8
    Letterbox Reviews
    Who has access to your emails? In the case of traditional emails, they can be viewed by you, the recipient, all email service providers, and potentially others. However, with end-to-end encryption, only the sender and intended recipients have the ability to read those messages. The iOS application Letterbox simplifies the use of end-to-end encryption, is compatible with a majority of email services, and utilizes the standard encryption protocol OpenPGP. While Letterbox functions similarly to other common email applications, it highlights the security status of both incoming and outgoing messages, allowing users to differentiate between confidential and insecure emails. As a free open-source email client on iOS, Letterbox is part of an ongoing research initiative at Freie Universität Berlin. Though still under development, users will soon be able to access the app on their devices through Apple's TestFlight platform, ensuring that secure communication is more accessible than ever. This advancement aims to enhance user awareness regarding email security while providing a user-friendly experience.
  • 9
    Protecto Reviews

    Protecto

    Protecto

    Usage based
    As enterprise data explodes and is scattered across multiple systems, the oversight of privacy, data security and governance has become a very difficult task. Businesses are exposed to significant risks, including data breaches, privacy suits, and penalties. It takes months to find data privacy risks within an organization. A team of data engineers is involved in the effort. Data breaches and privacy legislation are forcing companies to better understand who has access to data and how it is used. Enterprise data is complex. Even if a team works for months to isolate data privacy risks, they may not be able to quickly find ways to reduce them.
  • 10
    OPNsense Reviews
    Traditional packet filters are gradually becoming outdated, as even open-source solutions are shifting towards Next-Generation Firewalls. OPNsense stands out as a leading option for features like intrusion detection, application control, web filtering, and antivirus protection. No network, regardless of its size, is immune to potential attacks; even devices in home networks, such as washing machines and smartwatches, are at risk and need robust security measures. Firewalls play a crucial role in a comprehensive security strategy, shielding systems from both established and emerging threats. The effectiveness of a firewall is maximized when its capabilities are well understood, it operates intuitively, and is strategically placed within the network infrastructure. OPNsense rises to the occasion by fulfilling these essential requirements in various ways. This book serves as an invaluable guide for anyone looking to comprehend, install, and configure an OPNsense firewall effectively. Ultimately, understanding the intricacies of OPNsense can empower users to create a more secure digital environment.
  • 11
    Mindgard Reviews
    Mindgard, the leading cybersecurity platform for AI, specialises in securing AI/ML models, encompassing LLMs and GenAI for both in-house and third-party solutions. Rooted in the academic prowess of Lancaster University and launched in 2022, Mindgard has rapidly become a key player in the field by tackling the complex vulnerabilities associated with AI technologies. Our flagship service, Mindgard AI Security Labs, reflects our dedication to innovation, automating AI security testing and threat assessments to identify and remedy adversarial threats that traditional methods might miss due to their complexity. Our platform is supported by the largest, commercially available AI threat library, enabling organizations to proactively protect their AI assets across their entire lifecycle. Mindgard seamlessly integrates with existing security ecosystem platforms, enabling Security Operations Centers (SOCs) to rapidly onboard AI/ML solutions and manage AI-specific vulnerabilities and hence risk.
  • 12
    Vaultody Reviews
    Vaultody is a leading digital security platform, specializing in advanced asset protection and management for businesses and financial institutions. Using Secure Multiparty Computation (MPC) and robust encryption, Vaultody secures digital assets like cryptocurrencies, private keys, certificates, and sensitive information against unauthorized access and cyber threats. Designed for seamless integration in enterprise environments, Vaultody’s comprehensive key management system ensures secure transactions and reliable asset control from anywhere in the world. With global accessibility, multi-signature authentication, and powerful automation, Vaultody delivers unmatched digital security, making it the preferred solution for efficient and secure digital asset management.
  • 13
    Errsole Reviews
    Errsole is a free open-source logger for Node.js applications. It comes with a built-in log viewer to view, filter, and search your application logs. 1) Minimal Setup: Just include the Errsole package in your code—no need for dedicated servers, software installations, or complicated configurations. 2) Logger++: Errsole automatically collects all logs from the Node.js console. Additionally, it provides advanced logging functions that support multiple log levels and the ability to attach metadata to logs. 3) Store Anywhere: Store your logs wherever you want—whether in a file or any database of your choice. You can also configure log rotation to specify how long logs should be retained. 4) Log Viewer: View, filter, and search through your logs using the built-in Web Dashboard. Secure authentication and team management features ensure that only you and your team can access the logs. 5) Critical Error Notifications: Get immediate notifications when your app crashes or encounters critical errors. The notification includes the error message, the app name, the environment, the server name, and a direct link to view the error in your logs.
  • 14
    RiskSeal Reviews

    RiskSeal

    RiskSeal

    $499 per month
    RiskSeal, an AI-powered SaaS Platform, helps online lenders identify valuable customers, automate lending decisions and prevent defaults. Our Digital Credit Scoring System allows lenders to identify potential defaulters and fraudsters, as well as find valuable customers by using digital footprint analysis. We create a detailed digital user profile by analyzing the user's email, phone number, and IP address. This data is collected from over 400 data points. What online lending companies get with RiskSeal Digital footprints. Signals from 100+ social networks that can be used to gain unmatched insights about your clients. - Data enrichment. Digital signals are transformed into 300+ tailored datapoints for automated decision-making. - Trust engine in real-time. Onboarding is streamlined with thorough pre-KYC checks. - Risk score. Advanced name verification with an easy-to-use score of risk for multiple categories.
  • 15
    Kinde Reviews
    Authentication is a pivotal moment in your customer's journey. With Kinde, you can take full control. We provide passwordless authentication, social logins, and enterprise SSO to give your users flexible, secure access. You can fully customize the UI with your own designs and domains, ensuring a seamless, on-brand experience. For complex needs, our powerful workflows let you run custom code during authentication. Plus, you can easily organize business customers using our organizations feature, allowing you to fine-tune the experience for each one. Beyond authentication, Kinde helps you monetize your business quickly. You can effortlessly create subscription plans and collect revenue. Our platform is built to support B2C, B2B, and B2B2C business models, with robust organization management and flexible billing logic that scales as you grow.
  • 16
    Twilio Verify Reviews

    Twilio Verify

    Twilio

    $0.05/successful verification
    Verify offers 100% protection against SMS pumping fraud. Verify is an API that allows for multichannel verification of users. Fraud Guard provides protection against SMS pumping fraud. Terms and conditions apply. One turnkey API that provides a multi-channel solution for user verification. Add seamless two-factor verification to your onboarding flow and login flow using a single API. This API does the work of an OTP delivery solution. Fraud Guard has already prevented over 398,000,000* fraud attempts, saving customers over $46 million. Fraud Guard is the first to market innovation that offers 100% protection from SMS pumping fraud. Integrate a ready-to-use solution that takes care of all your connectivity needs, channels, code creation, fraud monitoring and more, using native software. Reduce fraud across all your channels with phone number validation that uses a single API endpoint to validate users, detect fraud and reduce friction.
  • 17
    ALTCHA Reviews

    ALTCHA

    BAU Software s.r.o.

    0
    ALTCHA is a CAPTCHA alternative which uses a proof of work mechanism to protect websites and online services against spam. ALTCHA uses a mechanism of proof-of-work to protect your website, online services, and APIs from spam and unwanted material. Unlike other solutions ALTCHA is open-source, self-hosted and free. It does not require external services and does not use fingerprinting or cookies.
  • 18
    Attaxion Reviews

    Attaxion

    Attaxion

    $129 per month
    We help security teams automate the control of their entire external attack surface. This simplifies vulnerability management and brings shadow IT to light. Attaxion allows you to discover all external assets and vulnerabilities, before attackers can exploit them. Map your entire attack surface, and collect actionable vulnerability intelligence that is laser-focused to guide and orchestrate remediation. Get a live inventory of all your assets that are exposed to the Internet, including their vulnerabilities and technologies. Prioritize security problems based on AI insights into their severity, exploitability and affected assets. Analyze security flaws, automate remediation tasks and monitor progress. Machine learning can track new assets and issues as your digital perimeter, and threat landscape, evolve. Get a real time inventory of your exposed assets at a fraction the cost of other EASM solutions.
  • 19
    Logmanager Reviews

    Logmanager

    Logmanager

    $0.09 GB/ month
    Logmanager is a centralized log management platform enhanced with SIEM capabilities that radically simplifies responses to cyberthreats, legal compliance, and troubleshooting. By transforming diverse logs, events, metrics, and traces into actionable insights, it helps security and operations teams respond swiftly to any incident. Experience effortless self-management and customization, peerless functionality, and the flexibility to take control of your entire technology stack. – Effortlessly aggregate and standardize log files from diverse sources into one unified platform. – Enjoy rapid deployment, 140+ built-in integrations, and effortless scalability. – Get real-time visibility into security events to quickly detect, analyze, and address threats. – Use dozens of predefined security dashboards or customize your own views. – Set up alerts based on multiple trigger conditions or custom-defined rules. – Transparent pricing with no hidden fees. Pay as you go, scale as you grow.
  • 20
    Palisade Reviews

    Palisade

    Palisade Technologies

    $29.99
    Palisade is the only DMARC automation solution designed specifically for MSPs. We make managing email security and compliance straightforward by allowing MSPs to oversee multiple domains with ease, simplify authentication processes, and transform detailed DMARC reports into actionable strategies. All through a single pane of glass. Boost efficiency, lower operational costs, and unlock new revenue opportunities while ensuring exceptional email security for your clients.
  • 21
    Phishing Club Reviews
    Phishing Club is a self-hosted phishing simulation platform built for modern security needs. It provides organizations complete control over their phishing infrastructure through a single binary deployment. Key differentiators: - Self-hosted architecture ensuring full data sovereignty - Multi-stage phishing campaigns with defense evasion - Automated domain and TLS certificate management - Flexible delivery through SMTP or API integration - No artificial limits on campaigns or recipients The platform is designed for red teams requiring advanced capabilities, privacy-focused companies running phishing simulations, and security providers offering phishing services. All data remains on your infrastructure with comprehensive privacy controls.
  • 22
    PasswordFree Reviews

    PasswordFree

    Identité

    $4.99/month
    Instant One-Click Login with 2FA/MFA security. 90% of customers abandon their carts because of login friction. PasswordFree replaces passwords with instant, one click logins that offer advanced 2FA/MFA protection. No long forms, no passwords--just seamless access to your customers. Why PasswordFree? Instant Login – Sign in with just one click for a smooth online shopping experience OTP One-Time Images - More secure than SMS and email OTPs 2FA/MFA security - Prevents credential stealing & unauthorized entry Checkout Verification – Stops fake orders and chargebacks from happening Protection against fake accounts - Blocks bots, credential sharing and fake accounts Customizable UI - Matches your store's design effortlessly Compatible with desktop, mobile and all Shopify themes Keep your store secure while allowing customers to log in, register and check out instantly. Try PasswordFree for FREE for 14 Days
  • 23
    QSE Reviews

    QSE

    QSE Group

    $19.90/month
    QSE Group offers innovative quantum-proof data protection services designed to secure your data from evolving cyber threats, including potential risks posed by quantum computing. Their decentralized, immutable cloud storage ensures that your data remains safe from ransomware and other attacks, while their proprietary encryption technology remains future-proof. The platform’s Entropy as a Service (EaaS) provides quantum-resilient randomness for encryption key generation, ensuring data security both now and in the future. By integrating seamlessly into your existing infrastructure, QSE offers a simple yet robust solution for businesses seeking long-term protection without the need for major overhauls. The system is built to scale, offering flexibility from small business needs to enterprise-level demands.
  • 24
    tenfold Reviews

    tenfold

    tenfold

    $.09/managed identity/month
    tenfold is an efficient, no-code Identity Governance & Administration (IGA) solution that simplifies the management of IT access and privileges. Designed for rapid deployment with its off-the-shelf plugins, tenfold helps organizations avoid long and costly setup processes, enabling full operational functionality in just weeks. The platform empowers businesses to manage user access with features like user lifecycle management, role-based access, and end-user self-service. It also includes essential tools for managing data access governance, user access reviews, and approval workflows. With tenfold, organizations can gain full control over IT privileges, mitigate access risks, and ensure the right people have secure access to the right resources at all times. The solution supports separation of duties to enhance security and compliance, allowing businesses to reduce risks while improving operational efficiency.
  • 25
    Login AlertX Reviews

    Login AlertX

    Login AlertX

    Free
    Login AlertX is designed to enhance your Windows PC security by providing instant email notifications each time your system is accessed via login or unlock. The app operates unobtrusively in the background, with easy system tray access and an automatic startup option to ensure no access goes unnoticed. Users can tailor their notification emails by configuring SMTP details, sender and recipient addresses, and customizing email subjects. Login AlertX avoids notification overload by tracking session states to prevent duplicate alerts. The premium version adds advanced security features, including webcam snapshots and audio recordings to capture who accessed your device. It also offers frequent alerts for every login event and delivers detailed system and network information in each notification. Sensitive settings like SMTP credentials are encrypted and stored securely on your local machine, ensuring privacy. The app is regularly audited for security vulnerabilities and prioritizes data protection and minimal data collection.