Alternatives to Assuria ALM-FIM

Compare Assuria ALM-FIM alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Assuria ALM-FIM in 2026. Compare features, ratings, user reviews, pricing, and more from Assuria ALM-FIM competitors and alternatives in order to make an informed decision for your business.

  • 1
    AdRem NetCrunch

    AdRem NetCrunch

    AdRem Software

    NetCrunch is a powerful, scalable, all-in-one network monitoring system built for modern IT environments. It supports agentless monitoring of thousands of devices, covering SNMP, servers, virtualization (VMware, Hyper-V), cloud (AWS, Azure, GCP), traffic flows (NetFlow, sFlow), logs, and custom data via REST or scripts. With 670+ monitoring packs and dynamic views, it automates discovery, configuration, alerting, and automates self-healing actions for efficient remote remediation in response to alerts. Its node-based licensing eliminates sensor sprawl and complexity, providing a clear, cost-effective path to scale. Real-time dashboards, policy-driven setup, advanced alert tuning and 40+ alert actions including remote script execution, service restart, process kill or device reboot-make NetCrunch ideal for organizations replacing legacy tools like PRTG, SolarWinds, or WhatsUp Gold. Fast to deploy and future-proof. Can be installed on-prem, self-hosted in the cloud, or mixed.
    Leader badge
    Partner badge
    Compare vs. Assuria ALM-FIM View Software
    Visit Website
  • 2
    ManageEngine EventLog Analyzer
    ManageEngine EventLog Analyzer is an on-premise log management solution designed for businesses of all sizes across various industries such as information technology, health, retail, finance, education and more. The solution provides users with both agent based and agentless log collection, log parsing capabilities, a powerful log search engine and log archiving options. With network device auditing functionality, it enables users to monitor their end-user devices, firewalls, routers, switches and more in real time. The solution displays analyzed data in the form of graphs and intuitive reports. EventLog Analyzer's incident detection mechanisms such as event log correlation, threat intelligence, MITRE ATT&CK framework implementation, advanced threat analytics, and more, helps spot security threats as soon as they occur. The real-time alert system alerts users about suspicious activities, so they can prioritize high-risk security threats.
    Compare vs. Assuria ALM-FIM View Software
    Visit Website
  • 3
    ManageEngine ADAudit Plus
    ADAudit Plus helps keep your Windows Server ecosystem secure and compliant by providing full visibility into all activities. ADAudit Plus provides a clear picture of all changes made to your AD resources including AD objects and their attributes, group policy, and more. AD auditing helps detect and respond to insider threat, privilege misuse, and other indicators of compromise, and in short, strengthens your organization's security posture. Gain granular visibility into everything that resides in AD, including objects such as users, computers, groups, OUs, GPOs, schema, and sites, along with their attributes. Audit user management actions including creation, deletion, password resets, and permission changes, along with details on who did what, when, and from where. Keep track of when users are added or removed from security and distribution groups to ensure that users have the bare minimum privileges.
    Compare vs. Assuria ALM-FIM View Software
    Visit Website
  • 4
    Paessler PRTG

    Paessler PRTG

    Paessler GmbH

    Paessler PRTG is an all-inclusive monitoring software solution developed by Paessler. Equipped with an easy-to-use, intuitive interface with a cutting-edge monitoring engine, PRTG optimizes connections and workloads as well as reduces operational costs by avoiding outages while saving time and controlling service level agreements (SLAs). The solution is packed with specialized monitoring features that include flexible alerting, cluster failover solution, distributed monitoring, in-depth reporting, maps and dashboards, and more. PRTG monitors your entire IT infrastructure. All important technologies are supported: • SNMP: ready-to-use and custom options • WMI and Windows Performance Counters • SSH: for Linux/Unix and macOS systems • Traffic analysis using flow protocols or packet sniffing • HTTP requests • REST APIs returning XML or JSON • Ping, SQL, and many more
    Leader badge
    Starting Price: $2149 for PRTG 500
  • 5
    CimTrak Integrity Suite
    Securing your enterprise against internal and external threats is key to meeting compliance standards and regulations. CimTrak’s change management, auditing, and reporting capabilities allow private and public companies to meet or exceed even the most rigorous compliance mandates. From PCI, SOX, HIPAA, CIS, NIST, and many more, CimTrak has you covered. File and System Integrity monitoring helps protect your critical files from changes, whether malicious or accidental, that can take down your critical IT infrastructure, threaten critical data, or cause non-compliance with regulations such as PCI. Change is inevitable in the IT environment. CimTrak delivers integrity monitoring, proactive incident response, change control, and auditing capabilities in one easy to use and cost-effective file integrity monitoring tool.
  • 6
    Datadog

    Datadog

    Datadog

    Datadog is the monitoring, security and analytics platform for developers, IT operations teams, security engineers and business users in the cloud age. Our SaaS platform integrates and automates infrastructure monitoring, application performance monitoring and log management to provide unified, real-time observability of our customers' entire technology stack. Datadog is used by organizations of all sizes and across a wide range of industries to enable digital transformation and cloud migration, drive collaboration among development, operations, security and business teams, accelerate time to market for applications, reduce time to problem resolution, secure applications and infrastructure, understand user behavior and track key business metrics.
    Leader badge
    Starting Price: $15.00/host/month
  • 7
    FileVantage

    FileVantage

    CrowdStrike

    Gain central visibility into all critical file changes with relevant, intuitive dashboards displaying valuable information on what changes, who changed it, and how the files and folders were changed. FileVantage provides IT staff additional context with added threat intelligence and detection data. Staff can quickly target file change data with any relevant adversary activity. Oversee all file changes with summary and detailed view dashboards - reduce alert fatigue by quickly targeting changes to critical files and systems. See unauthorized modifications to all relevant critical system, configuration and content files. Use pre-defined and custom policies to gain added efficiency and reduce alert volume. Create new policies based on all critical files, folders and registries, as well as users and processes.
  • 8
    Netwrix Change Tracker
    Netwrix Change Tracker provides critical and fundamental cyber security prevention and detection. It does this by leveraging the required security best practice disciplines of system configuration and integrity assurance combined with the most comprehensive and intelligent change control solution available. Netwrix Change Tracker will ensure that your IT systems remain in a known, secure and compliant state at all times. Netwrix Change Tracker includes context-based File Integrity Monitoring and File Whitelisting to assure all change activity is automatically analyzed and validated. Complete and certified CIS and DISA STIG configuration hardening ensures all systems remain securely configured at all times and, coupled with the most intelligent change control technology, provides unparalleled change noise reduction along with the ultimate reassurance that the changes occurring within your production environment are consistent, safe and as required.
  • 9
    Qualys File Inventory Monitoring (FIM)
    Gain real-time, file-level control of risks for accurate monitoring and compliance with a single agent and central dashboard. Continuously monitor critical assets for changes across diverse cloud and on-premises environments of all sizes, including large global enterprises. Prioritize alerts and reduce noise with threat intelligence from Trusted Sources and File Reputation context. Includes File Access Management (FAM) to trigger alerts when critical host files, not intended for regular use, are accessed. Also, agentless network device support to alert on network configuration deviations. Pre-configured monitoring profiles to comply with PCI DSS 4.0, NERC CIP, FISMA, SOX, NIST, HIPAA 2023, CIS18, GDPR, and more.
  • 10
    WZSysGuard

    WZSysGuard

    WZIS Software Pty Ltd

    It's for Linux/AIX/Solaris/MacOS/FreeBSD, has the more reliable FIM function, and more effective Intrusion Detection, plus commands execution protection against software-based key-stealing attacks. WZSysGuard is a robust UNIX/Linux intrusion detection and file integrity verification software that offers advanced protection for your system. Unlike other tools, it reduces false alarms and ensures complete coverage of security-sensitive files. WZSysGuard uses a SHA 384-bit checksum algorithm to detect file changes, even those made through non-filesystem interfaces, such as during maintenance when the system is booted from a DVD or network. It not only detects critical file changes but also identifies new filesystem mounts, network services, and kernel module loads. With a web-based security trap detection interface, WZSysGuard provides a comprehensive security solution that works with minimal overhead and maximum accuracy.
  • 11
    Powertech Database Monitor for IBM i
    With real-time visibility into every change users make across all systems, security administrators can virtually eliminate the risk of undetected data corruption. See what users are changing across systems. By combining data from multiple, connected systems, you have a centralized view for reporting and archiving, making database security management easier. Maintain an audit trail of all system changes made in a secure database that helps you meet the requirements of some of the most stringent security regulations. Use filters to monitor and record changes to only your sensitive data. Define which fields contain data to be monitored and set the criteria for triggering a notification. Both powerful and easy-to-use, Powertech Database Monitor for IBM i automatically monitors user activity in real time on your IBM i databases. The ability to process events by exception helps you reduce manual database security and file integrity monitoring in order to streamline workflows.
  • 12
    Explorer++

    Explorer++

    Explorer++

    Explorer++ is a lightweight and fast file manager for Windows. Explorer++ is a small and fast file manager for Windows. With tabs, bookmarks, and advanced file operations, it allows you to be much more productive! Currently, the method Explorer++ uses to monitor directories for changes only works in real filesystem folders. That means that if you create a file in a library, for example, Explorer++ won’t pick up the change. A unified system to persist data in a single format would have clear advantages. Explorer++ would still need to be able to load data from the registry/XML config file (at least initially), but the general process of loading and saving data would be a lot simpler. In Explorer++, column results are retrieved in a background thread. That stops the application from hanging while data is being retrieved. With the option to save to the registry or a configuration file, Explorer++ is completely portable.
  • 13
    Security Auditor

    Security Auditor

    Core Security (Fortra)

    Simplified security policy management and file integrity monitoring software. Security Auditor centralizes security administration across your cloud, on premise, or hybrid environment. Our agentless technology allows you to quickly enforce security policy adherence and mitigate the risks of security misconfiguration, a leading cause of data breaches. Security Auditor automatically protects new systems as they come online and continuously monitors those systems, identifying any configuration settings that don’t match your requirements. You'll be notified of any policy exceptions and can make changes yourself from an easy-to-use, web-based console, which simplifies tasks and compliance reporting requirements. Or if you prefer more automation, you can run the FixIt function and let Security Auditor do the work for you. Security Auditor simplifies the identification and security configuration for your elastic cloud infrastructure.
  • 14
    RegAlyzer
    RegAlyzer is a tool to browse and change the registry. It was created because of a few features we missed in the original regedit tool, from support for exotic value types over the background and regular expression search to better bookmarks, displaying .reg files in the accustomed style, and a history view. RegAlyzer 2, currently available as a release candidate, will support a multi-tabbed interface, value interpretations, constant names for values, and snapshots of hives to track changes. RegAlyzer includes a database of some common registry locations including details that help interpret registry values, by providing constant names and descriptive texts. RegAlyzer allows you to track changes to your registry by comparing its current state against snapshots you have made. RegAlyzer 2 brings a new bookmark manager that offers hierarchical storage for bookmarks. RegAlyzer locates inactive hives on other drives and allows you to use the registry inside.
    Starting Price: €29.99 one-time payment
  • 15
    uFlysoft Registry Cleaner
    uFlysoft Registry Cleaner is freeware, a powerful combination of registry cleaner and system optimizer for Windows. Cleaning registry errors, removing junk files, and running registry defragmentation, and system optimization, can effectively speed up your PC and protect it from crashes, slowdowns, and errors. Make registry cleanup and system maintenance easier than ever! Totally free to scan, clean invalid registry keys, and repair registry errors. One click to optimize your Windows system. The restore feature makes it more convenient and safe. Also serves as a free uninstaller, startup manager, etc. Operating system, designed for Windows XP/2003/Vista/7/8/8.1. uFlysoft Registry Cleaner is a professional registry repair software and the best registry cleaner, which can run a complete or customized registry scan and repair errors like invalid entries. Be brave to make a change to your registry! uFlySoft Registry Cleaner will make an automatic backup for each registry change.
  • 16
    OSSEC

    OSSEC

    OSSEC

    OSSEC is fully open source and free, you can tailor OSSEC for your security needs through its extensive configuration options, adding custom alert rules and writing scripts to take action when alerts occur. Atomic OSSEC helps organizations meet specific compliance requirements such as NIST and PCI DSS. It detects and alerts on unauthorized file system modification and malicious behavior that could make you non-compliant. The Atomic OSSEC open source-based detection and response system adds thousands of enhanced OSSEC rules, real-time FIM, frequent updates and software integrations, built-in active response, a graphical user interface (GUI), compliance tools, and expert professional support. It’s a versatile XDR and compliance all-in-one security solution.
  • 17
    WinFindr

    WinFindr

    Great Software Company OÜ

    WinFindr is an easy to use, yet powerful data searching tool for Windows. WinFindr allows you to search for files, folders, registry keys and registry entries with multiple search terms at the same time. You can also search using wildcards and regular expressions. It’s freeware, fast and lightweight - the portable version is less than 2 MB! Key Features Search for files, folders, registry keys and registry entries, all at the same time. Supports searching with normal search words, file masks and regular expressions. Supports searching with multiple search terms at the same time. Also supports negative search terms, which allows you to skip any data. Save the found results in TXT, CSV or HTML file format. Supports command line parameters. Supports Windows Dark Mode. Comes with builtin translations. Has a portable version and a Windows Command Prompt version. WinFindr is freeware, lightweight and easy to use. No bells and whistles, no nonsense.
  • 18
    Samhain

    Samhain

    Samhain Design Labs

    Samhain is an open-source, host-based intrusion detection system (HIDS) that provides file integrity checking and log file monitoring/analysis, as well as port monitoring, detection of rogue SUID executables, and hidden processes. Samhain been designed to monitor multiple hosts with potentially different operating systems, providing centralized logging and maintenance, although it can also be used as a standalone application on a single host. Beltane is a web-based central management console for the Samhain file integrity/intrusion detection system. It enables the administrator to browse client messages, acknowledge them, and update centrally stored file signature databases.
  • 19
    CSAM Registries

    CSAM Registries

    CSAM Health

    CSAM’s Registries platform (previously MedSciNet Registries) provides a rich and versatile online environment for hosting registries, featuring powerful tools for all phases of the project’s life cycle, from data collection to analysis. CSAM’s Registries system design draws on our decade long experience of developing web-based software for medical research and offers a sophisticated online application package for hosting, maintaining, and monitoring registry projects of every size and scope. CSAM’s standard registry system implementation features a complete set of components required for setting up a fully functional registry. The system provides support for sophisticated data entry forms, flexible workflow structures, and advanced data validation, monitoring, and analysis.
  • 20
    Beyond Compare

    Beyond Compare

    Beyond Compare

    Compare files and folders using simple, powerful commands that focus on the differences you're interested in and ignore those you're not. Merge changes, synchronize files, and generate reports. Directly access FTP sites, media devices, WebDAV resources, svn repositories and cloud storage. All from your Windows, macOS or Linux workstation. Beyond Compare includes built-in comparison viewers for a variety of data types. In addition to text, compare tables, images, binary files, registry hives, and much more. Beyond Compare allows you to quickly and easily compare your files and folders. By using simple, powerful commands you can focus on the differences you're interested in and ignore those you're not. You can then merge the changes, synchronize your files, and generate reports for your records. You can compare entire drives and folders at high speed, checking just sizes and modified times.
  • 21
    Alertica

    Alertica

    Alertica

    Alertica is a cloud-based server monitoring platform that delivers real-time alerts when files on monitored servers are accessed, modified, uploaded, or deleted, helping teams detect suspicious behavior before it escalates into security incidents. It enables organizations to define custom monitoring rules for specific files, folders, or entire servers and route alerts to the appropriate teams through channels such as email, Slack, or SMS. It supports a wide range of environments across cloud, on-premises, or hybrid infrastructure, and is designed to work without installing agents or consuming server resources. It focuses on early threat detection and operational visibility by flagging events such as executable uploads, configuration changes, mass deletions, log overflows, or unusual file size violations. Alertica monitors only file metadata such as names, sizes, and timestamps rather than file contents, preserving data privacy.
    Starting Price: $20 per month
  • 22
    Glarysoft Registry Repair
    The highly intelligent engine that finds invalid registry entries. High scanning speed with detailed results. Make backups of any registry change made. Improve system performance and stability. Fast, thorough, and safe scanning engine. A perfect solution allows you to safely scan, clean, and repair registry problems. Fast, simple, and straightforward. It analyzes more than a dozen of different areas in your registry and can identify up to 18 types of errors. It can also thoroughly scans the Windows registry for errors, invalid entries, Regedit optimization, etc. It creates a backup copy every time you repair the registry and also lets you add safe registry keys to a white list, so you can use it to restore the registry to the current status in case you encounter some system failure. With a fast, thorough, and safe scanning engine, it scans Windows Registry quickly with comprehensive analysis, a quick scan takes only a little time to finish.
  • 23
    Symantec Data Center Security
    Complete server protection, monitoring, and workload micro-segmentation for private cloud and physical on-premises data center environments. Security hardening and monitoring for private cloud and physical data centers with support for Docker containers. Agentless Docker container protection with full application control and integrated management. Block zero-day exploits with application whitelisting, granular intrusion prevention, and real-time file integrity monitoring (RT-FIM). Secure OpenStack deployments with full hardening of Keystone identity service module. Data center security: monitoring. Continuous security monitoring of private cloud and physical on-premises data center environments. Optimize security performance in VMware environments with agentless antimalware protection, network intrusion prevention, and file reputation services.
  • 24
    TrueFort

    TrueFort

    TrueFort

    Attackers will always find a way in. Insulate your environment against spreading compromise by enforcing a positive security model that curbs lateral movement. TrueFort gives security teams the scalable workload protection platform they need to secure hybrid environments. Next-gen firewalls and IP address-based controls are completely ineffective in modern infrastructure. Whether your workloads execute in the cloud, in virtual infrastructure, or on physical servers, TrueFort protects against advanced attacks with workload hardening, integrity monitoring, detection and response, and identity-based segmentation. Only TrueFort combines environment-wide security observability with real-time response, service account behavior analytics, file integrity monitoring, and CIS-certified hardening and file integrity monitoring that highlights differences between file and binary versions.
  • 25
    AML Free Registry Cleaner
    AML Free Registry Cleaner is a registry cleaning software. It will safely clean and repair Windows registry problems with a few clicks and enable you to enjoy a cleaner and more efficient PC. The registry is the nerve center of your PC, and problems with the Windows registry are a common cause of Windows crashes and error messages. With a detailed startup manager, you can see what all programs start automatically with Windows and optionally disable them. AML Free Registry Cleaner also finds and removes common junk files that accumulate over time. It comes pre-configured with 22 types of file extensions that can usually be considered disposable, and you can extend the range by adding your own file types. AML Free Registry Cleaner also allows you to search for words in the entire registry. AML Free Registry Cleaner also provides a detailed overview of running programs and processes.
  • 26
    Panzura

    Panzura

    Panzura

    The explosion of unstructured data has turned your work environment into an unmanageable and expensive data swamp where you can’t find, trust, or easily use the files you need. Panzura changes that by transforming all your storage into the most secure, and easy-to-use cloud data management platform on the planet. – Enable immediate, efficient performance and global data consistency, at scale. – Unlock secure, data access from edge to core to cloud without any performance penalty. – Empower a truly collaborative working experience, anywhere. – Gain true multi-cloud redundancy and data protection with cloud mirroring. Innovation can seem impossible when you’re drowning in data. Panzura simplifies and consolidates your data management, improving access and visibility, empowering collaboration, and letting you drive better outcomes, in less time.
  • 27
    Misk

    Misk

    Misk

    You can transfer an existing domain registration to Misk in a few easy steps. Search for your name to see if it's available. Register with our domain essentials package to use our DNS, hosting, and email. Use us as your neutral registrar while pointing your domain's nameservers to your hosting company. Includes ICANN and registry fees, and easy ownership transfers for most domains. Point your domain to any hosting company, Redirect visitors to another website, and point additional domains to your main one. Managing multiple names is time-consuming, We provide detailed reports, summaries, and the ability to make many changes at once. We do not use your domain search data for any other purpose. Clarity on when your domain is deleted after the expiration date and renewal grace periods. We follow strict guidelines to promote competition and keep your registration safe. A copy of your domain ownership details is stored with the domain registry, securing your ownership.
    Starting Price: $15 per year
  • 28
    Atomicorp Enterprise OSSEC
    Atomic Enterprise OSSEC is the commercially enhanced version of the OSSEC Intrusion Detection System brought to you by the sponsors of the OSSEC project. OSSEC is the world’s most popular open source host-based intrusion detection system (HIDS) used by tens of thousands of organizations. Atomicorp extends OSSEC with a management console (OSSEC GUI), advanced file integrity management (FIM), PCI compliance auditing and reporting, expert support and more. - Intrusion Detection - File Integrity Monitoring - Log Management - Active Response - OSSEC GUI and Management - OSSEC Compliance Reporting - PCI, GDPR, HIPAA, and NIST compliance - Expert OSSEC Support Get expert support for OSSEC servers and agents as well as help developing OSSEC rules. More info on Atomic Enterprise OSSEC is available at: https://www.atomicorp.com/atomic-enterprise-ossec/
  • 29
    AppProfileSafe

    AppProfileSafe

    IT-Consulting Kinner

    AppProfileSafe is an enterprise-grade Windows tool for application-level backup and restore of Registry data, files, and NTFS ACLs. Unlike USMT (deprecated since Windows 11 24H2), it operates per application using XML-based App Definitions — backing up exactly what each app needs, nothing more. Features include dry run simulation with diff reports showing every Registry key, file, and ACL that would change before committing. A tamper-evident HMAC hash-chained audit trail records every operation with integrity verification. The path mapping engine rewrites Registry and file paths when usernames or drive letters differ between source and target. The Community Edition is free forever — full GUI, unlimited apps, simulation, mapping, and audit logging. No registration, no time limit. Enterprise adds CLI automation, SIEM integration (CEF, LEEF, JSON, Syslog), compliance reporting, and a redaction engine. Built on .NET 8 for Windows 10/11 and Server 2016–2025.
    Starting Price: €8/month/user
  • 30
    AB Handshake

    AB Handshake

    AB Handshake

    AB Handshake offers a game-changing solution for telecom service providers that eliminates fraud on inbound and outbound voice traffic. We validate each call using our advanced system of interaction between operators. This means 100% accuracy and no false positives. Every time a call is set up, the call details are sent to the Call Registry. The validation request arrives at the terminating network before the actual call. Cross-validation of call details from two networks allows detecting any manipulation. Call registries run on simple common use hardware, no additional investment needed. The solution is installed within the operator’s security perimeter and complies with security and personal data processing requirements. Practice occurring when someone gains access to a business's PBX phone system and generates profit from the international calls at the business's expense.
  • 31
    DataProvider.com

    DataProvider.com

    DataProvider.com

    DataProvider.com provides a unified platform that transforms the open web into a structured, searchable database of over 700 million domains filtered by more than 200 variables and 10,000 values, with monthly updates and four years of historical data. Its core search engine lets you use natural-language queries and detailed filters alongside proprietary data scores to contextualize results. You can instantly access prebuilt “recipes” datasets, build custom dashboards, and enrich or expand your lists with business registry numbers, contact details, and registry data, even for inactive sites. Specialized tools include Know Your Customer for tracking domain changes across client lists; reverse DNS to map IP addresses to companies; traffic index for daily and monthly popularity metrics; SSL catalog for granular certificate insights; and technology detection via a browser extension to uncover hidden tech stacks.
  • 32
    Wise Care 365

    Wise Care 365

    WiseCleaner

    Free to clean up disk and fix registry problems on your PC. Protect your privacy and make your PC more secure. Provide a better solution for optimizing and accelerating your computer! Take prompt action once some applications attempt to make modifications without your permission. This protector will identify and stop any processes that try to secretly change the Windows registry. Wise Care 365 is definitely the preferred option for billions of Windows users who want to keep their Windows PC at peak performance. Speed up a slow computer and free up more valuable hard disk space in seconds. Over time, your computer’s hard disk drive and registry will become cluttered. Wise Care 365 can defrag the drive and registry to make them organized, thus making your computer run faster and more stable. You are going to be amazed by its blazing defrag speed. It optimizes PC's performance, defrags disks and the Windows registry, and manages the startup process as well as services.
    Starting Price: $29.96 one-time payment
  • 33
    Informatica Data Privacy Management
    Discover your data, assess risk, and monitor suspicious access to automate protection, transparency and response, all in one solution. Prioritize data privacy and protection investments, policies, processes, and programs. Analyze value across fields, applying metadata from targeted database sources to enable risk visibility. Build a subject registry and automate identity mapping to report on data subjects (DSARs). Provide detailed summaries with APIs to third-party solutions, applying controls for objects and more. Discover where sensitive data resides, and where it’s moved to other data stores and cloud apps. Remediate by risk priority; simulate risks to assess impact for guided decisions and apply controls. Use a rich array of dashboard drill-downs to get broad visibility into data risks and control gaps. Integrated data subject reports, automated risk remediation, and visualizations and alerts.
  • 34
    XYplorer

    XYplorer

    XYplorer

    XYplorer is a file manager for Windows. It features tabbed browsing, a powerful file search, a versatile preview, a highly customizable interface, optional dual pane, and a large array of unique ways to efficiently automate frequently recurring tasks. It’s fast, light, and portable. XYplorer is a portable file manager. It doesn’t require any installation, stores all configuration data in the application data folder, and running it doesn’t change your system or registry. Take it with you and start it from a USB stick. File management to go. XYplorer has been designed to make you faster. Numerous usability enhancements in an attractive interface help to streamline your workflow and increase your efficiency. You will definitely save a lot of time. You can fine-tune the app to look and behave exactly as you want it. This ranges from fonts and colors to custom toolbar buttons and even file icons and program associations. And every bit of it is fully portable.
    Starting Price: $39.95 one-time payment
  • 35
    Eusing Cleaner

    Eusing Cleaner

    Eusing Software

    Eusing Cleaner is a free system optimization and privacy cleaner tool. It allows you to find and remove the unused files in your system, invalid registry entries, delete your internet history and provides plug-in support to clean the history for over 150 third-party applications. You can select the items that you want to be cleaned and also specify cookies that should not be deleted. With simply one click, Eusing Cleaner can erase the cache, cookies, history, typed URLs, autocomplete memory, index.dat from your browsers, and Window's temp folder, run history, search history, recycle bin, and recent documents, etc. It also includes an option to overwrite deleted data multiple times, so it cannot be easily recovered. Additionally, it contains a fully featured registry cleaner. It will scan your Windows registry for invalid or obsolete information and provide a list of the errors found. After fixing the invalid entries, your system will be more stable and run faster.
  • 36
    StasherX

    StasherX

    SC Next IT Computers SRL

    StasherX is a smart, lightweight Windows utility designed for users who value privacy without sacrificing performance. It combines military-grade encryption with intelligent automation and cutting-edge AI. Key Features: Selective Application Visibility (Granular Application Access Control): Industry-Unique Feature: StasherX allows you to define a "Trusted Apps" list. While a folder remains 100% invisible to users and the OS, you can grant specific software (e.g., a backup tool like Acronis, a media server like Plex, or a crypto app) full access to the data. The Benefit: Your data stays hidden from prying eyes without breaking your automated workflows or backup routines. Uninstall Guard: A unique security barrier that prevents unauthorized removal. If a password is set, the app won't leave your PC without it. Performance Tuning: Automatically cleans up redundant system tasks and background processes, ensuring your Windows machine runs faster and leaner.
  • 37
    Chainkit

    Chainkit

    Chainkit

    Go beyond static File Integrity Monitoring (FIM). Automate integrity in motion and at rest—in real-time. With eXtended Integrity Monitoring (XIM) from Chainkit. Chainkit detects threats faster and in real-time, which in turn reduces the amount of time that undetected attacks linger in your data. Chainkit dramatically increases the visibility of attacks within your data. It detects anti-forensic tampering techniques that attackers use to evade detection. Chainkit seeks out malware hidden within your data and provides full transparency on tampered logs. Chainkit preserves the integrity of artifacts required by forensic investigators. Chainkit enhances attestation for ISO, NIST and related log or audit trail compliance requirements. Chainkit can help you reach and maintain compliance for all security compliance regulations. We provide customers with a more comprehensive audit-readiness posture.
    Starting Price: $50 per month
  • 38
    Blindata

    Blindata

    Blindata

    Blindata covers all the functions of a Data Governance program: Business Glossary, Data Catalog & Data Lineage build an integrated and complete view on your Data. Data Classification module gives a semantic meaning to the data while the Data Quality, Issue Management & Data Stewardship modules improve the reliability and trust on data. Moreover, privacy compliance can leverage specific features: registry of processing activities, centralized privacy note management, consent registry with Blockchain integrated notarization. Blindata Agent can connect to different data sources, collecting metadata such data structures (Tables, Views, Fields, …), data quality metrics, reverse lineage, etc. Blindata has a modular and entirely API based architecture allowing systematic integration with the most critical business systems (DBMS, Active Directory, e-commerce, Data Platforms). Blindata is available as SaaS, can be installed “on Premise” or purchased on AWS Marketplace.
    Starting Price: $1000/year/user
  • 39
    LANGuardian

    LANGuardian

    NetFort Technologies

    NetFort LANGuardian is deep-packet inspection software that monitors network and user activity. Phenomenal visibility – discover what’s really happening on your network. Be it sluggish networks, intrusion attempts, or file-encrypting ransomware, a single instance of LANGuardian provides all the visibility and detail you need to immediately detect and resolve any issues. Easy to deploy, no major changes to the network, no agents, clients, or logs required. Netfort’s unique metadata provides readable, interpretable detail that can be retained for long periods without expensive storage. Search by username, IP address or subnet, file name, or web address. Drill down to get readable detail; ideal for multiple network security and operational use cases. See detail like usernames, file and folder names, domains, URIs, SQL queries.
  • 40
    BrandCat

    BrandCat

    BrandCat

    BrandCat is a modern brand-protection and trademark-monitoring platform built for IP lawyers, fintech companies, startups, and any organization whose brand or product might be imitated for phishing or fraud. It continuously monitors new trademark filings across major registries (USPTO, EUIPO, WIPO, SwissReg, CIPO, and more) and automatically detects look-alike domains, clone websites, and phishing attempts using AI-based similarity and SimHash analysis. BrandCat helps businesses protect their brand identity and their customers from impersonation, scams, and trademark misuse - all from a unified dashboard with alerts, search tools, and detailed similarity reports.
  • 41
    Tripwire

    Tripwire

    Fortra

    Cybersecurity for Enterprise and Industrial Organizations. Protect against cyberattacks with the industry’s best foundational security controls. Detect threats, identify vulnerabilities and harden configurations in real time with Tripwire. Thousands of organizations trust Tripwire Enterprise to serve as the core of their cybersecurity programs. Join them and regain complete control over your IT environment with sophisticated FIM and SCM. Shortens the time it takes to catch and limit damage from threats, anomalies, and suspicious changes. Gives you deep, unparalleled visibility into your security system state and know your security posture at all times. Closes the gap between IT and security by integrating with both teams' existing toolsets. Out-of-the-box platforms and policies enforce regulatory compliance standards.
  • 42
    PowerAdmin Storage Monitor
    PA Storage Monitor runs as a service, so it is monitoring your system as soon as the computer is started, there is no need to log in or start a program manually. Powerful and flexible actions that run in response to your alert criteria. Report on file ages, types, owners, duplicates, etc. Scan and catalog terabytes of file information and predict when disks will run out of space. Monitor and alert on user and directory sizes. Reduce costs by finding files that aren't used. Alert on changed files, low disk space, etc. Centrally monitor and report on multiple servers. Disk space monitoring with disk full prediction report. Volume cataloger with powerful reporting, file, and directory change monitoring for intrusion detection or configuration management. Specific file size monitoring, user and directory quota monitoring. Create rich schedulable reports about what is stored. Many alert types and other configurable actions.
    Starting Price: $4 per year
  • 43
    Revo Registry Cleaner Pro

    Revo Registry Cleaner Pro

    VS Revo Group Ltd.

    Discover a powerful Registry Cleaner with 15+ scanning categories to find and eliminate invalid and unnecessary Registry Items. Tailor your cleaning process with custom key inclusions/exclusions and 4 different depth scan modes. Customize your Windows experience using the 50 Registry tweaks. Optimize, fine-tune, and resolve issues effortlessly, and achieve a smoother system performance. The Registry Watcher monitors specified Registry keys in real-time, instantly identifying processes responsible for system modifications. Review, save, and export registry modifications, and apply filters based on operation type or data content. Create personalized backups for specific keys, perform full Registry backups, or automate scheduled backups to ensure additional safety. Our scheduled Auto Clean feature can be set up for your daily, weekly, or monthly cleanup with your preferred scan mode. There is also a Portable version available.
    Starting Price: $14.99/year/user
  • 44
    Cargo

    Cargo

    Cargo

    Cargo is the Rust package manager. Cargo downloads your Rust package's dependencies, compiles your packages, makes distributable packages, and uploads them to crates.io, the Rust community’s package registry. You can contribute to this book on GitHub. To get started with Cargo, install Cargo (and Rust) and set up your first crate. The commands will let you interact with Cargo using its command-line interface. A Rust crate is either a library or an executable program, referred to as either a library crate or a binary crate, respectively. Loosely, the term crate may refer to either the source code of the target or to the compiled artifact that the target produces. It may also refer to a compressed package fetched from a registry. Your crates can depend on other libraries from crates.io or other registries, git repositories, or subdirectories on your local file system. You can also temporarily override the location of a dependency.
  • 45
    RemoteExec

    RemoteExec

    IS Decisions

    RemoteExec remotely installs applications, executes programs/scripts and updates files and folders on Windows systems throughout the network. RemoteExec quickly and easily deploys applications packaged in .msi format to hundreds or (tens of) thousands of Windows systems. You simply need to specify the .msi path and the action to take (install/uninstall/repair/update), select the target computers, and launch the deployment in a click. RemoteExec allows remote execution of programs (.exe, .bat, .cmd), scripts (.vbs, .js) and files associated to executables (.txt, .doc, .wav, .reg, .inf, .msi, …). With RemoteExec, you can deploy Service Packs, updates, patches and hotfixes to all required Windows systems in minutes. RemoteExec allows remote modification of the registry on all Windows systems throughout the network, or of a specific subset of computers.
    Starting Price: $437.80 for 20 systems
  • 46
    AWS Service Catalog
    AWS Service Catalog allows organizations to create and manage catalogs of IT services that are approved for use on AWS. These IT services can include everything from virtual machine images, servers, software, and databases to complete multi-tier application architectures. AWS Service Catalog allows you to centrally manage deployed IT services and your applications, resources, and metadata. This helps you achieve consistent governance and meet your compliance requirements while enabling users to quickly deploy only the approved IT services they need. With AWS Service Catalog AppRegistry, organizations can understand the application context of their AWS resources. You can define and manage your applications and their metadata, to keep track of cost, performance, security, compliance and operational status at the application level. AWS Service Catalog AppRegistry provides a single repository for collecting and managing your application resources on AWS.
  • 47
    Registry Recycler

    Registry Recycler

    Registry Recycler

    Registry Recycler is the answer to your each question, if you are in search of a tool that has the ability to keep your system fast and lag free by frequently identifying the broken threads within your registry database and renovating them. Registry Recycler is a free registry cleaner that scans the registry against corrupt, damaged, and invalid registry entries. There are unserviceable entries that play role in slackening your PC operations. The utility aims to repair your registry against bad registry data and threatening errors. It deeply scans the registry to find and fix errors in missing reference entries. Registry Recycler could certainly be preferred, as it thoroughly examines the registry and draws each registry error out of it. It comes with other value added features (Defragmenter, Startup Management, and Automatic Backup) with the ability to enhance system performance. A user-friendly interface and simple structure makes Registry Recycler very easy to use.
  • 48
    CodeSee

    CodeSee

    CodeSee

    Quickly identify cross-code dependencies and navigate between files and folders. With insights to improve your understanding of the codebase and guide onboarding, planning, and reviews. Auto-generated, self-updating software architecture diagrams that sync to the codebase as your code evolves. With features to help you understand how files and folders are connected, see how a change fits into the larger architecture, and more. CodeSee Maps are automatically generated and updated every time a code change is merged, so you never have to worry about manually refreshing your Map. Using the Maps Insights panel, you can quickly visualize the most active areas of the codebase and get details on individual files and folders, including their age and how many lines of code they represent. Create visual walkthroughs of your code, using Tours to communicate ideal code paths, user flows, and more—and Tour Alerts will help you to ensure your Tours are always up to date.
  • 49
    Hexowatch
    Hexowatch is your AI sidekick to monitor any website for visuals, content, source code, technology, availability or price changes. Access archived snapshots, get change alerts and extract data from any website in minutes. Manually checking multiple websites every day is time-consuming, repetitive and tedious. Hexowatch works 24/7 to help spot trends, spy on your competitors, visually check your website, keep an archive of every change and turn any website into your own private data source accessing changes as a downloadable csv file, google sheets or via Zapier. Monitor any website and get started in minutes - no software, proxies or programing required. Monitor web pages for any visual changes. Select a part of the screen or the whole page. Monitor specific HTML elements or the content of any field for changes. Monitor web pages for the presence or absence of specific keywords. Monitor changes to the tech stack or 3rd party scripts used on the web page.
    Starting Price: $14.99 per month
  • 50
    SolarWinds Security Event Manager
    Improve your security posture and quickly demonstrate compliance with a lightweight, ready-to-use, and affordable security information and event management solution. Security Event Manager (SEM) will be another pair of eyes watching 24/7 for suspicious activity and responding in real time to reduce its impact. Virtual appliance deployment, intuitive UI, and out-of-the-box content means you can start getting valuable data from your logs with minimal expertise and time. Minimize the time it takes to prepare and demonstrate compliance with audit proven reports and tools for HIPAA, PCI DSS, SOX, and more. Our licensing is based on the number of log-emitting sources, not log volume, so you won’t need to be selective about the logs you gather to keep costs down.
    Starting Price: $3800 one-time fee