Alternatives to Login AlertX

Compare Login AlertX alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Login AlertX in 2025. Compare features, ratings, user reviews, pricing, and more from Login AlertX competitors and alternatives in order to make an informed decision for your business.

  • 1
    SpamTitan

    SpamTitan

    TitanHQ

    SpamTitan email security is an email spam filter for businesses, smbs, MSPs, and schools. SpamTitan email security blocks spam as well as phishing and day-zero attacks, viruses, malware, ransomware, and other email threats. Helps control mail flow, clean it, and protect against unwanted email. We provide easy-to-use yet advanced email security for businesses, smbs and MSPs that are Office365 friendly. SpamTitan - Premium functionality included: • CEO Impersonation protection • Phishing/ Spear phishing protection • Link analysis • Full Sandboxing • Zero Day Attacks protection • Mail Spooling • Spoofing protection • Malware and Ransomware protection • SPF/DKIM/DMARC checking • Encryption • Fully multitenant environment • Ability to rebrand the entire UI • Full REST API: • Comprehensive support and set up docs Try a FREE, fully supported trial of SpamTitan Email Security today.
    Leader badge
    Compare vs. Login AlertX View Software
    Visit Website
  • 2
    StrongDM

    StrongDM

    StrongDM

    StrongDM is a People-First Access platform that gives technical staff a direct route to the critical infrastructure they need to be their most productive. End users enjoy fast, intuitive, and auditable access to the resources they need, and administrators leverage simplified workflows to enhance security and compliance postures. - We open up a clear, direct path that gives individualized access to the right people and keeps everyone else out. - Total visibility into everything that’s ever happened in your stack. Security and Compliance teams can easily answer who did what, where, and when. - Admins have precise control over what each user has access to—without these controls ever getting in the way of productivity - IT, InfoSec, and Administrators have precise controls. Unauthorized access is eliminated because users never see resources they don’t have permission to use. -All past, present, and future infrastructure is supported - Responsive 24/7/365 customer support.
    Compare vs. Login AlertX View Software
    Visit Website
  • 3
    PhishTitan

    PhishTitan

    TitanHQ

    Powerful Inline Phishing Protection for M365. Harness the power of AI and our LLM to defeat phishing. PhishTitan is next generation inline phishing protection and remediation, powered by TitanHQ, the global leaders in email cybersecurity. Our proprietary large learning model and AI integrates directly with Microsoft 365, both catching and remediating sophisticated phishing and BEC attacks that Microsoft misses. It provides users with in-the-moment warning banners to help them decide whether an email is malicious or safe, continually enhancing the human firewall. Risk free deployment in 6 minutes. PhishTitan will filter your email to identify phishing threats and protect your users and business. That’s how you AVOID that one wrong click that can lead to disaster – all it takes is 6 minutes! The TitanHQ team has been a category leader in the email security field for over 20 years. Bringing the experience of working with over 12,000 customers to our new phishing solution.
  • 4
    USB-LOCK-RP

    USB-LOCK-RP

    Advanced Systems International

    USB Control & Lockdown Software to Block USB Devices Access and Lock USB Ports in Windows Systems. Centralized USB Device Management, Monitoring and Whitelisting to Protect Computers in a Network. USB Device Control is an important part of Endpoint Security Management and focuses in the protection of computer systems and data assets from threats posed by unauthorized USB device usage. Controlling USB devices access to endpoints is required to secure networks that control machinery or store sensitive information. - Centralized USB Device Management. - Secures Groups of Computer or Specific Computers. - Whitelists Specific Devices by Hardware ID and Blocks the rest. -Automatically apply Group 1 protection settings to unassigned clients. NEW! - Receives Alerts & Logs Device Connections in the Network Automatically. -Export Status and Alerts Reports to csv format (Comma-separated value)NEW! -Automatic Authorizations Mode, Whitelist USB devices across the network automatically. NEW
    Starting Price: $20 per client/one-time
  • 5
    CPTRAX for Windows

    CPTRAX for Windows

    Visual Click Software

    Server File Activity Tracking - Audit who is creating, accessing, moving, and deleting your files and folders. Track file permission changes. Real-time alerts about critical file activities. Malicious activity containment (Ransomware, mass file deletes, etc.) Workstation File Activity Tracking - Audit who is copying files to USB or other removable drives. Track who is uploading files from a browser or via FTP. Block files from being created on USB/removable device. Email alerts when a removable device is connected. Active Directory Auditing - Keep audit logs and get real-time alerts of important Active Directory changes without dealing with SACLs or Windows Event Logs. Server Authentication Auditing - Track authentications into Windows Servers and Citrix sessions. Review all failed logon attempts. Workstation Logon/Logoff Tracking - Get visibility on workstation logons/logoffs, including locks, unlocks and password changes. Review all failed logon attempts.
  • 6
    EventSentry

    EventSentry

    NETIKUS.NET ltd

    Hybrid SIEM solution combining real-time (event) log monitoring with comprehensive system health & network monitoring provides users with a complete picture of their servers and endpoints. The included security event log normalization & correlation engine with descriptive email alerts provides additional context and presents cryptic Windows security events in easy to understand reports that offer insight beyond what is available from raw events. EventSentry's NetFlow component visualizes network traffic, can detect malicious activity and offers insight into bandwith usage. Keeping track of Active Directory changes is easy with EventSentry's ADMonitor component that records all changes to AD & Group Policy objects and provides a complete user inventory to help identify obsolete accounts. Various integrations & multi-tenancy available.
    Starting Price: $85.00/one-time
  • 7
    ManageEngine DataSecurity Plus
    Take charge of your sensitive data with ManageEngine DataSecurity Plus. Get a snapshot of recent user activity, file activity, and access trends. Know the essential four Ws for every access: Who accessed what, when, and from where. Focus on events that matter most, such as sudden permission changes, file deletions, and renaming events. Identify the most active users, most accessed files, and most modified files within your file server. rigger instant alerts whenever there's sudden spikes in file or folder access or modification events. Get real-time notifications whenever there's multiple failed access attempts to critical files. Monitor changes made to sensitive files after business hours. Selectively monitor critical files, folders, shares, and user activities. Get real-time alerts whenever unauthorized modifications are made to critical files. Spot privilege misuse and unusual activity by configuring threshold-based alerts to monitor user-generated events.
    Starting Price: $745 per year
  • 8
    AVG Internet Security
    Get total security that keeps you safe online with award-winning antivirus, a customizable firewall, remote access protection against hackers, and more. AVG Internet Security blocks viruses and malware, keeps your emails secure, protects your personal files, passwords, and webcam from hackers, and lets you shop and bank online without worry. Advanced Antivirus scans your PC for viruses, ransomware, spyware, and other types of malware. Behavior shield sends alerts if suspicious software behavior is detected on your PC. AI Detection proactively identifies malware samples to protect you from new threats. CyberCapture blocks new threats by having our antivirus software automatically upload them for analysis. Stay safe when you go online by scanning links, downloads, and email attachments for threats and avoiding unsecure Wi-Fi networks. Link Scanner avoid dangerous websites by scanning links for anything suspicious.
    Starting Price: $3.29 per month
  • 9
    FileAudit

    FileAudit

    IS Decisions

    Proactively track, audit, report, alert on and respond to, all access to files and folders on Windows Servers and in the cloud. Monitor, in real time, access to sensitive files stored on both Windows Servers and in the cloud. Powerful filtering helps you find the answers you need quickly; tracking IP address and machine name pinpoints the exact access. Set up email alerts and a triggered response for access events (access denied - file deletion - a specific user, machine or IP address - time of access) and mass access events such as the copy, deletion or movement of bulk files. Review a searchable, secure and always-available audit trail. Analyze the access to and usage of files stored both on-premises and in the cloud. Schedule centralized reports according to multiple criteria.
    Starting Price: $826 one-time payment
  • 10
    Coro

    Coro

    Coro Cybersecurity

    Coro puts an end to the security tool sprawl and to the constant worry that things have been overlooked. No need to check everything 10 times a day. Coro will take care of the ongoing security, and will alert you only when you need to take action. Coro analyses the threats to your entire business, takes action to eliminate the risk, and guides you on what to do next to improve your security posture. Coro is the central control point for sensitive data, practice data, and user activity, enabling you to enforce a wide range of security, compliance and governance policies. We scan every email for phishing, malware, ransomware and automatically eliminate threats. We automatically identify and block insider threats, accounts hacking, and malicious activities. We scan every file and email, or any data share for PII/PCI/PHI, and prevent confidential information leakage.
    Starting Price: $8.99 per user per month
  • 11
    Xeams

    Xeams

    Synametrics Technologies

    Xeams is, a secure and powerful complete mail server for Windows, Linux, Solaris, MacOSX and other flavors of UNIX. Xeams supports SMTP, POP3, and IMAP. It features a powerful spam filtering engine that eliminates up to 99% of junk email upon installation. The software offers a flexible approach to email, making it a very user-friendly server. Xeams can block 99% percent of all junk messages right out of the box. The filtering rules are fully customizable and get better as Xeams adapts to your email environment. IMAP and POP3 servers built right into the system to easily fetch emails from an email repository to a client's machine. Xeams can be used as an email firewall in front of another server, such as MS Exchange, or as a full email server requiring no other software to process emails. Use Xeams in front of your Office 365 infrastructure to gain additional filtering, reporting and archiving capabilities that you don't get with Office 365 alone.
    Starting Price: $20.00/year/user
  • 12
    Ransomware Defender

    Ransomware Defender

    ShieldApps Software Development

    ShieldApps’ Ransomware Defender deals with known ransomware in a way no other solution can. Specially designed for detecting and blocking ransomware prior to any damage, Ransomware Defender blacklists and stops both common and unique ransomware. Once installed, Ransomware Defender stands guard 24/7 utilizing active protection algorithms enhanced with user-friendly alerts and notifications systems. Ransomware Defender is fully automated, taking care of all threats via an advanced Scan > Detect > Lock Down mechanism that proactively stands guard to detected threats, and works alongside all main antiviruses and anti-malware products! Ransomware Defender also features a scheduled automatic scan, secured file eraser, lifetime updates and support! Detects and removes any known ransomware before it can take action and harm your PC. The program will deep-scan your device and find hidden ransomware in both high and low-level folders.
    Starting Price: $49.99 one-time payment
  • 13
    iLocker

    iLocker

    Protectstar

    With iLocker, you can make your Mac not only even more safe but also more flexible if you share your Mac with others. iLocker Mac password-protects each app, such as Apple Mail, Photos, Contacts, Safari, and Games, from unauthorized access. You pick which apps will be protected, and iLocker Mac keeps them secure. In addition, it tracks failed attempts to access the protected apps, so you'll know when it happened with the date and time. The automatic exit feature locks the app after some time when you're away from the keyboard to improve security. There is only one more comfortable way to protect any app you need. Just drag-drop your apps, click on the button, and don't worry about anything. Now you can unlock your Mac in an instant. Use Apple Pay to make secure online purchases. Quickly access system settings and locked notes. And even switch between users, all with the touch of a finger.
    Starting Price: $376 per year
  • 14
    Senturo

    Senturo

    Senturo

    Senturo safeguards Apple, Chromebook, Windows, and Android devices against loss, theft, and unauthorized access with powerful location tracking, device monitoring, and advanced recovery tools, while enhancing mobile device and data security through robust remote security policies and actions such as remote lock to protect your fleet. IT Fleet location tracking Senturo’s intuitive global map view built on Google Maps lets you monitor your entire device fleet at a glance. Pinpoint the real-time location of any device or review its movement history over the past year, ensuring you stay informed and in control. Monitoring and incident detection Ensure your devices stay where they belong. With geofencing and IP whitelisting, you’ll receive instant email alerts if a device leaves your approved area or connects to an unauthorized network, keeping your assets secure. Multi-OS messaging Send critical updates or alerts to your entire fleet in seconds.
    Starting Price: $25 per month
  • 15
    CWIS Antivirus Scanner

    CWIS Antivirus Scanner

    Cobweb Security

    We ensure 100% protection for your website by providing 24/7 security monitoring. If any hackers attack or virus injection occurs, we will clean and repair your website instantly. 24/7/365 monitoring of your website in our situation room. If an attack occurs, our software engineers will get an instant notification and protect, clean (if needed) and fix your website in the shortest possible time. Website clean-up and repair within 12 hours. Reports & Alerts via email. 24/7 Technical support. With CWIS Premium, you will get the best protection at the most reasonable price. You will receive recommendations for security hardening.
  • 16
    Kaspersky Security Cloud
    Get our best apps & features under one account. 6 premium products & apps for Windows, macOS, Android & iOS – all in one place & packed with 100s of features. Includes antivirus, anti-ransomware, mobile security, password management, VPN* & parental controls. Plus privacy tools, data leak detection, Home Wi-Fi security & payment protection – all easy to manage remotely. Find out if your private accounts data is leaked & get advice on what to do next. Get notified in real time if an unknown app attempts to connect to your webcam or mic*. Plus get personalized alerts & warnings sent straight to your devices to keep you safe. Take advantage of cloud-based security that keeps your devices fast and easy to use. Predict & fix issues with your hard drive by viewing metrics that report on its health. Manage storage space and battery life on your Android devices with specially built tools.
    Starting Price: $53.99 per year
  • 17
    Radiant Security

    Radiant Security

    Radiant Security

    Sets up in minutes and works day one to boost analyst productivity, detect real incidents, and enable rapid response. Radiant’s AI-powered SOC co-pilot streamlines and automates tedious tasks in the SOC to boost analyst productivity, uncover real attacks through investigation, and enable analysts to respond more rapidly. Automatically inspect all elements of suspicious alerts using AI, then dynamically selects & performs dozens to hundreds of tests to determine if an alert is malicious. Analyze all malicious alerts to understand detected issues’ root causes and complete incident scope with all affected users, machines, applications, and more. Stitch together data sources like email, endpoint, network, and identity to follow attacks wherever they go, so nothing gets missed. Radiant dynamically builds a response plan for analysts based on the specific containment and remediation needs of the security issues uncovered during incident impact analysis.
  • 18
    MemberProtect

    MemberProtect

    InetSolution

    MemberProtect is designed for professional programmers to easily integrate into secure online systems, such as ACH, Online Banking, and wire transfer applications. MemberProtect is the most trusted user authentication, data encryption, and user management framework in the banking and credit union industries today. Based on roles & privileges model. Supports millions of users and organizations. Extremely granular application security. Powerful encryption that secures databases at the column level. Encrypt email messages and flat files stored anywhere on your network. Thorough logging, even failed attempts, of all data access. Protect member data from hackers & unauthorized staff, even beyond the limitations of firewalls, SSL, and operating systems. Leverage MemberProtect to develop secure connections with third-party APIs. Access to any web-based system, including support for LDAP.
  • 19
    east-tec SafeBit
    East-tec SafeBit is an on-the-fly disk encryption software that protects your confidential data by creating secure, password-protected virtual drives. These encrypted safes work like regular drives in Windows, letting you use your files normally while keeping them fully secure. The software automatically encrypts files as they’re saved and decrypts them when accessed, using strong AES 256-bit encryption to ensure data is unreadable to unauthorized users, even if your device is lost or stolen. Your data stays protected even during unexpected shutdowns or crashes. SafeBit is versatile, allowing you to create encrypted vaults on local drives, USB sticks, and other removable media, with options to open them automatically at startup. It also offers extra security features like storing passwords on a USB key, an emergency hotkey to quickly close safes, and a virtual keyboard to prevent keylogging during password entry.
  • 20
    Trusted Knight Protector Home

    Trusted Knight Protector Home

    Trusted Knight Corporation

    The easiest and most effective way to protect your identity, your family’s online presence, and all of your sensitive information. This is an alarming statistic considering each year at least 24 million new malware variants (this is malware that is slightly changed to avoid detection by antivirus software) are found on computers. The truth is, your computer is probably already infected with this type of malware, which is why you need Protector Home - the solution that goes beyond detection, to protect your personal information even if your computer is already infected. Takes only a minute to install and automatically protects your online sessions. Protector Home goes beyond traditional protection to bring you the benefits and security your family needs, even if your computers have already been compromised.
    Starting Price: $34.95 per user per year
  • 21
    Google Advanced Protection Program
    The Advanced Protection Program safeguards users with high visibility and sensitive information from targeted online attacks. New protections are automatically added to defend against today’s wide range of threats. Gmail blocks over 100 million phishing attempts every day. But sophisticated phishing tactics can trick the most savvy users into giving their sign-in credentials to hackers. Advanced Protection requires you to use a security key to verify your identity and sign in to your Google account. Unauthorized users won’t be able to sign in without your username and password. Safe browsing on Chrome protects 4 billion devices against risky sites, and Advanced Protection performs even more stringent checks before each download. It flags or even blocks you from downloading, files that may be harmful. Only app installations from verified stores, like Google Play Store and your device manufacturer’s app store, are allowed.
  • 22
    AntiBrowserSpy

    AntiBrowserSpy

    Abelssoft Ascora GmbH

    As soon as we surf the Internet we are being monitored and spied on. By means of cookies and tracking, the online services called up can automatically determine from which country a visitor comes, what operating system is used and which browser is used. Our Windows tool AntiBrowserSpy dries up the involuntary data flow and sets up a muzzle for the web browser. The browser cloak of invisibility of the tool prevents the browsers: Chrome, Firefox, Opera and Microsoft Edge, that the user is recognized based on his typical browser "fingerprint". A Google Analytics Blocker and a local browser cleaning (cache, cookies and history) complete the range of functions. In addition, the integrated BrowserCheck checks after each surfing session whether something has changed in the browser settings, for example, due to an update, and informs you immediately if there are any deviations.
    Starting Price: $29.90 one-time payment
  • 23
    Matrix42 EgoSecure Data Protection
    Everything runs as before, but securely. All-round protection for all your devices, applications and sensitive company data. Your data remains secure. While digital networking and device diversity offer more flexibility, they also increase the risk of malware, data loss, and theft. Traditional firewall and antivirus protection is no longer enough to close security gaps. With just a mouse-click you get a graphically prepared overview of all data flows in the network and automatically trigger appropriate protective measures. Insight Analysis – determines the overall situation of your company network with regard to data security so that you can derive the optimum protective measures. The analysis results are available to you as a clearly structured dashboard. Conclusions about the activities of individual users are not possible. The reports can be generated automatically and sent by e-mail.
  • 24
    Rohos Logon Key

    Rohos Logon Key

    Tesline-Service

    Two-factor authentication solution that converts any USB drive into a security token for your computer and allows you to access Windows securely. Works also with RFID, OTP, U2F tokens by replacing the Windows login password. Replaces weak password-based login with a hardware Security Key: USB flash drive, Google Authenticator OTP, FIDO U2F or industrial RFID access cards. The computer is password-protected, but you don’t need to enter it manually each time you log in, unlock/resume or authorize changes. Rohos uses NIST-approved data-security principles and encryption: the password is not stored on the authentication key in open form. USB key copy protection prevents the creation of key copies without authorization. All data on the key is encrypted with AES-256 bit key length.
    Starting Price: $32 one-time payment
  • 25
    VIPRE Privacy Shield

    VIPRE Privacy Shield

    VIPRE Security Group

    VIPRE Privacy Shield is a privacy-focused tool designed to help users protect their personal data and online identity from prying eyes. It offers powerful features like data file shredding, which permanently deletes sensitive files to prevent recovery, and a history cleaner that removes browsing history, cookies, and other digital footprints. VIPRE Privacy Shield also includes webcam and microphone blockers, ensuring that unauthorized apps or malware can’t access these devices without permission. With easy-to-use controls and customizable settings, VIPRE Privacy Shield empowers users to take charge of their digital privacy, protecting against identity theft and data exposure risks across all online activities.
  • 26
    AccessPatrol

    AccessPatrol

    CurrentWare Inc.

    AccessPatrol is a data loss prevention and USB device control software that provides a proactive solution for preventing data breaches caused by illicit data transfers. AccessPatrol controls a variety of peripherals, including… - Storage devices such as USB flash drives and external hard drives - Wireless Devices such as Bluetooth, Infrared, and WiFi - Communication Ports such as Serial and Parallel ports - Imaging Devices such as Scanners or Cameras, and… - Other Devices such as network share drives, printers, and mobile phones File operations alerts and permissions can be configured to alert IT administrators to suspicious file operations and proactively prevent data transfers to unauthorized users. The security policies are enforced by a software agent that is installed on your user’s computers. This keeps devices restricted and monitored even when the computers are taken off of the network.
    Starting Price: $5 PUPM
  • 27
    Bodi

    Bodi

    Pilixo

    A data breach can happen to any company, at anytime. Whether it’s a malicious attacker, a disgruntled former employee or a careless insider, no organization is immune. Prevents users from accidentally clicking on a malicious link stopping malware in its tracks irrespective of the vector – email, Skype, attachments, websites, Slack, etc. Stop data theft with real-time alerts based on defined keywords, file actions, special formats such as SSN or credit card number, and unauthorized privilege change. Detailed analysis of application usage, web browsing, printing, etc. as well as time and length of usage. Full video recording and keyword searching of each device in case you need to review and analyze. Full remote control capabilities of the endpoint to correct device. Employee Monitoring prevents users from clicking on malicious links helping you to stop malware in its tracks, irrespective of the platform.
    Starting Price: $20 per month
  • 28
    OSE

    OSE

    Open Seas

    Once hacked, compromised organizations face huge barriers to rebuilding customer trust and brand reputation. OSE detects & alerts to attacks on your critical systems as they occur so you can stop them before damage is done to your organization's IP, brand and reputation with the ensuing loss of customer trust. OSE provides an audit of an attack listing what was changed, what it was before making it quick to resolve. OSE reporting helps with ISO 27000 compliance. OSE (Operating system Security Enforcer) implements your defined Security Policy which can either be an out of the box OSE standard or your personalized version. Rolling-out & apply the security policy on all Unix, Linux & Windows corporate servers. The Autonomous OSE Agent is permanently located on a Unix/Linux server. It is persistent, even in case of network failure. It can also group a set of servers monitored by OSE Agents.
  • 29
    McAfee Total Protection
    McAfee® Total Protection is the protection for today's security needs, so you can enjoy life online. Includes premium antivirus, safe browsing. With ID theft protection and secure VPN. It’s more than just antivirus software—it’s peace of mind. At McAfee, we protect what matters – you. We protect over 500 million devices with award-winning antivirus, but understand that you need a solution that protects your personal info, privacy, and helps you navigate safely online. Our multi-layered identity protection helps secure your accounts by alerting you if your info gets leaked online and generating & storing complex passwords automatically. Keep your credit card and personal info safe from prying eyes everywhere you go by turning unsecured networks into your own private connection with our secure VPN. Color-coded links expose dangerous and fraudulent sites on search results and social media pages—we’ll even steer you back to safety if you misclick.
    Starting Price: $19.99 per year
  • 30
    iBoostUp

    iBoostUp

    iBoostUp

    iBoostUp is a powerful Mac optimization tool with a strong emphasis on security. Security features include Spyware Doctor, which uses both cloud-based signature scanning and advanced heuristic techniques to detect malicious apps, and HID Implant Guard, which alerts and protects against modified peripherals like USB drives or Lightning cables that could compromise your Mac. BoostUp also provides a behavioral Keylogger Guard, n ARP Cache Poisoning Detector to scan for suspicious network activity, an Application Uninstaller to remove all traces of uninstalled apps, and a Duplicate File Finder to free up disk space by removing identical content files. All in all, iBoostUp is an ideal tool for Mac users who want to optimize their system's performance and safeguard their privacy and security against various types of threats. We are not affiliated with Symantec Corporation, Norton, iAntiVirus, or PC Tools, but was instead founded by ex-employees with a wealth of expertise in this field.
  • 31
    Sealit

    Sealit

    Sealit Technologies

    When implementing a Zero Trust security model you shouldn’t question if your accounts or devices will get get compromised - assume they will. With Sealit, the sensitive data in your emails and files will remain fully protected even in that scenario. It takes one click from your existing inbox to encrypt your sensitive emails. It takes one click to encrypt any file format on your desktop. We made sure your workflow isn’t disrupted as we add a strong layer of protection to your sensitive data. Human error accounts for over 90 percent of cyber attacks on businesses, so you need to have a system in place to minimize the risk. Our patent-pending end-to-end encryption ensures each facet of your business is protected. Our app uses biometrics as authentication which provides you a seamless protection experience. Unlike passwords, biometrics cannot be taken away from you, there’s nothing you need to remember, and you always have it with you.
  • 32
    Secure CommNet

    Secure CommNet

    Radient Software

    Your licenses are still valid. You'll still have excellent email technical support. And you'll still be able to purchase new or additional licenses for CommNet and Secure CommNet. Your trust is vital. Thank you for sticking with Radient Software through the years! Welcome! CommNet and Secure CommNet (with SSH2 support) are communications software for Windows that integrate modem dial-up and Internet Telnet into fast, full-featured and easy-to-use applications. It has the communication features you really need and it's been tested for over 20 years. There's no risk to trying it -- you can download a free 30-day trial at any time. Telnet and modem dial-up. Telnet Host Mode Server to allow other Telnet clients to connect to your system. Zmodem and FTP during Telnet connections.
    Starting Price: $29 one-time payment
  • 33
    Win Guardian

    Win Guardian

    Bit Guardian

    Win Guardian is a comprehensive Windows utility designed to enhance PC performance and security. It offers robust malware protection by conducting dedicated scans to detect and eliminate malicious files, safeguarding users from potential data and financial losses. The software extends its security features to web browsing, providing protection across Internet Explorer, Google Chrome, and Mozilla Firefox, ensuring a secure online experience. To maintain optimal system performance, Win Guardian performs deep cleaning to remove junk files and privacy traces that accumulate over time, preventing system slowdowns. Additionally, it cleans invalid registry entries, further optimizing PC functionality. Developed by Bit Guardian GmbH, Win Guardian is user-friendly, with straightforward installation and activation processes. Users can easily download the setup, follow the installation prompts, and activate the software using a provided license key.
    Starting Price: $12.49 per 6 months
  • 34
    TF2000

    TF2000

    ComputerProx

    The ComputerProx TF2000 automates the locking of the PC when you step away. The TF2000 uses ultrasound to detect your presence. When you leave the proximity of the PC, the TF2000 automatically locks the system without requiring any keystrokes from you! No need for awkward timeout settings that mistakenly lock the PC when you are present. The TF2000 can detect your presence and will not lock the system inadvertently. The TF2000 attaches to the PC via the USB port and is configured by the system as a keyboard. Commands are simply sent to the PC as keystrokes therefore no special drivers are required! The individual keystrokes and specified delays are all configurable using our configuration tool. In addition, to the 'walk-away' command, the TF2000 has a 'walk-to' sequence which allows keystrokes to be sent when you approach the PC. For example, under Windows XP the TF2000 sends the CTRL-ALT-DEL sequence when the user approaches the PC. This readies the PC for user authentication.
    Starting Price: $79 one-time payment
  • 35
    Kaspersky Endpoint Security
    With more of your business operations going digital, you need to protect every server, laptop and mobile device on your network. Select tier combines multi-layered technologies with flexible cloud management and centralized application, web and device controls to protect your sensitive data on every endpoint. Security shouldn’t slow you down, so our security has minimal impact on system performance. And if you’re attacked, the Remediation Engine undoes most malicious actions, so users can keep working without interruption. Delivering world-class security – including post execution Behavior Detection and Machine Learning technologies – to help reduce your attack risk and keep all your endpoints safe and secure, with less need to download frequent updates. Provides straightforward migration from third-party endpoint protection, helping to make your transition error-free. Our post-deployment quality assurance audit service will ensure optimum configuration.
    Starting Price: $40.00/one-time/user
  • 36
    DriveCrypt

    DriveCrypt

    Securstar

    DRIVECRYPT securely and easily protects all proprietary data on notebooks and desktop computers 100% of the time without users having to think about security. Any organization, from a small company to a large international firm with thousands of users in the field, can effectively protect business plans, client lists, product specifications, confidential corporate memos, stock information, and much more with this disk encryption product. As data is read from the hard disk, DRIVECRYPT automatically decrypts the data before it is loaded into memory. When data is written back to the hard disk, it is automatically re-encrypted. The disk encryption/decryption process is completely transparent to the user or any application program because the data is processed by an operating system extension, "on the fly" as it transfers back and forth between the hard disk and memory. Consequently, users don't need to remember to decrypt or re-encrypt their data, or change the normal operation of the PC.
  • 37
    OneLogin

    OneLogin

    OneLogin

    Secure critical company information and empower employees with OneLogin, a trusted identity and access management (IAM) solution for the modern enterprise. Designed to strengthen enterprise security while simplifying business logins, OneLogin is an excellent solution for companies looking to enforce security policies with ease. OneLogin includes top-rated features such as single sign-on (SS), unified directory, user provisioning, adaptive authentication, mobile identitiy, compliance reporting, and more.
  • 38
    AVP Total Security
    1] 360* online protection: Secure your devices against emerging threats like viruses, malware, adware, ransomware, and spyware with our best antivirus security, and experience 360* online protection. 2] Login & Identity Encryption: Have peace of mind when our highly secure login credentials vault stands as the first line of defense between hackers and your login information, usernames, and passwords in a password-protected vault. 3] Advance Shopping & Banking Protection: Enjoy uninterrupted shopping and secure payments while using your browser with our safe browsing and anti-tracking feature that blocks suspicious scripts to block phishing attempts. 4] Dark Web Scanning To Keep Hackers Away: Search the dark web to find out if your personal information, like email passwords and credentials, is exposed to the dark web and is compromised using our dark web scanning.
  • 39
    ShieldApps Webcam Blocker
    ShieldApps’ Webcam Blocker equips you with highly sophisticated security software that utilizes advanced privacy enhancement algorithms – packaged in a simple interface that allows single-click protection. ShieldApps Webcam Blocker prevents hackers from accessing and using information collected through a webcam and microphone against you. The clean and user-friendly design will give you easy, one-click control over both Webcam and microphone-blocking features. ShieldApps Webcam Blocker adds another layer of protection to your computer and a proactive privacy approach. Upon selecting the options any external or internal attempt to access the webcam will be denied.
    Starting Price: $29.99 one-time payment
  • 40
    Kaspersky Internet Security
    Whatever you do online – on your PC, Mac & Android devices – our advanced, one-license security suite helps protect you from malware, webcam spies, financial scammers & more. - Blocks viruses, cryptolockers, attacks & more - Prevents online trackers collecting your data* - Detects spyware hiding on your Android device - Protects payments, with bank-grade encryption* - Blocks unauthorized access to your webcam* - Encrypts data you send & receive online – VPN**
    Starting Price: $39.99 per year
  • 41
    Webroot Security for Chromebook
    Webroot Security for Chromebook is a tailored security solution designed to protect Chromebooks from malware, phishing, and unsafe websites. It blocks malicious downloads and apps while safeguarding personal information and browser activity. The software includes on-demand scanning and real-time activity monitoring, helping users identify and resolve threats quickly. It features a password manager to keep logins and payment information secure and organized. Specifically built for Chromebook, it addresses security gaps not covered by built-in protections. Webroot Security for Chromebook is simple to use and offers affordable protection with a 70-day money-back guarantee.
    Starting Price: $14.99 per year
  • 42
    Protectstar Camera Guard
    Put an end to spying and unsightly taping. Not only millions of users but also the founder of Facebook, Mark Zuckerberg, and former FBI chief James Comey are taping over the webcam of their devices. Everything and everyone is being spied on. We have known this since June 2013, when the first NSA documents by whistleblower Edward Snowden were published. But not only hackers found ways to misuse the webcam without a warning signal to the user: Also, the latest malware is highly dangerous because it specifically targets control of the integrated device camera. Then, with just one click, protection is enabled, and Camera Guard blocks and monitors processes that try to access your device's camera. Any security breach is reported. You can easily choose which apps on your device can access your camera or webcam. With Deep Detective, we have created an intelligent and versatile detective that monitors all accesses of the macOS device.
    Starting Price: $8.90 per year
  • 43
    indeni

    indeni

    indeni

    Indeni’s security infrastructure automation platform monitors firewall health and auto-detects issues like misconfigurations or expired licenses before they affect network operations. It automatically prioritizes issues so you only receive the most important alerts. Indeni protects your cloud environment by taking a snapshot of it before it’s built. Our cloud security analysis tool, Cloudrail, reviews your infrastructure-as-code files so you can identify violations earlier in development when they’re easier to fix. Constant detection of HA unreadiness from cross-device inconsistencies in security policies, forwarding tables, and other configurations and state. Consistent measurement of device configuration skew against locally-defined organizational standards. Collect relevant performance and configuration data from leading firewalls, load balancers, and other security infrastructure.
  • 44
    Avast Small Business Solutions
    Avast Small Business Solutions deliver next-gen endpoint protection for business Windows PCs, Mac, and Windows servers that you can manage anywhere via a web browser. Our robust, easy-to-use security for devices, data, and applications is designed to keep small organizations and their employees safer online. Avast antivirus with multiple layers of security, online privacy, and remote-control features provides powerful cybersecurity controlled via a cloud-based management console. Avast Small Business Solutions are managed via cloud-based management console Avast Business Hub and consist of: * Avast Essential Business Security   * Avast Premium Business Security - combines our next-gen antivirus with VPN and USB control) * Avast Ultimate Business Security - award-winning next-gen antivirus with online privacy tools and patch management automation software
    Starting Price: $39.99/device/year
  • 45
    Acium

    Acium

    Acium

    ​Acium is an AI-driven Unified Browser Security (UBS) platform designed to provide comprehensive protection and management for web browsers across organizations. Recognizing that browsers are primary targets for cyber threats, Acium offers centralized control over browser security policies, ensuring consistent enforcement across Chrome, Edge, and Safari. It delivers real-time threat detection, monitoring browser activities to identify and neutralize risks such as malicious extensions and unauthorized data access. By automatically discovering and securing every web application in use, Acium mitigates shadow IT risks and prevents data leaks across web apps and generative AI tools. Its AI-powered protection operates seamlessly, allowing teams to work without interruption while maintaining robust security. Additionally, Acium's solution is designed for rapid deployment, enabling organizations to manage thousands of devices and enforce security policies efficiently.
  • 46
    Syspeace

    Syspeace

    Treetop Innovation

    Syspeace protects Windows Servers from potentially harmful incidents, like hacking and brute force attacks. Making it a essential complement to firewalls and anti-virus solutions. Syspeace is free to download and try for 30 days. When you ready; our per-computer licenses are affordable and flexible – you only pay for what you need. And also: All updates are included. Imagine this. Your company has a physical facility. If someone repeatedly tries to gain access with a fake key or invalid key card, you would expect that your security guards would provide protection and not let the intruder through. For your servers, you might think antivirus and firewall protection would be enough? Unfortunately, antivirus and firewall software only help against attacks at some gates of your facility, but does not take action against intruders.
    Starting Price: $4.20/month/server
  • 47
    Island

    Island

    Island

    Island puts the enterprise in complete control of the browser, delivering a level of governance, visibility, and productivity that simply wasn’t possible before. Like controlling where and when users copy/paste data in or out of applications, checking device posture before granting application access, preventing unauthorized screen captures, managing extension permissions, workflow enforcement, policy-based storage, network tagging, geo-fencing, etc. Understand the entire story of your user activity and experience. Trace incidents down to the user, device, time, and place. And feed all browser data into your analytics platforms so everything you need to know is in one place. Customize Island to match your brand, messaging, and company-specific workflows. Even Insert browser-based RPA scripts that protect sensitive data based on your unique governance needs. Island is built on Chromium, the same open-source project that powers Chrome, Edge, and other mainstream browsers.
  • 48
    Bitdefender Premium Security
    Everything you need, right when you need it: best protection, unlimited VPN, password manager, and priority support. Multi-platform. You get the most innovative technologies that predict, prevent, detect and remediate even the latest cyber-threats, anywhere in the world. Bitdefender Premium Security gives you the best protection against cyber threats across operating systems. This premium security & privacy pack comes with the multi-awarded Bitdefender Total Security. It also includes a powerful VPN with unlimited traffic and a feature-rich multiplatform Password Manager. Bitdefender`s unbeatable multi-layered protection keeps your devices safe from all new and existing cyber threats. Bitdefender security software reacts instantly to online threats with no compromise to your system’s performance. Bitdefender Premium Security takes care of your online privacy and personal information.
    Starting Price: $65.86 per year
  • 49
    iSafeSend

    iSafeSend

    iSafeSend

    Use iSafeSend to encrypt and safely send sensitive information via email. iSafeSend generates a unique one-time use link to your sensitive or confidential information. This unique link is accessible for a limited time and once it has been accessed or reaches its expiry date, it is deleted and can no longer be accessed. iSafeSend allows you to send multiple unique links in separate emails for the same confidential information. iSafeSend enables users to create shareable links that when clicked, give recipients access to the sensitive data that you are sharing. This data can only be viewed once, and after being viewed, it is deleted. Since these links can only be viewed once, recipients should not forward the links to other people. Specify the number of days until the links expire and select the number of links you wish to generate. Remember, each generated link can only be viewed once.
  • 50
    Defencebyte

    Defencebyte

    Defencebyte

    Download our antivirus software, and our range of PC security and optimization tools to get the best performance and safety for your system. Give your computer a new lease of life by removing unnecessary files and software. Your antivirus online purchase will help you keep your PC free of unwanted software. No matter what you’re doing online, with defencebyte you’ll stay safe and secure. If you have any issues with your online antivirus purchase for PC we’re here to help any time of day. By downloading an antivirus for Windows you’ll be able to give your computer a higher level of protection. Windows computers are the most highly targeted by hackers and viruses. Safeguard your system and crucial data from ransomware reach! Ensure a secure digital environment for your systems & networks with defencebyte security. Scans and eradicates ransomware traces. Protects devices as well as networks.
    Starting Price: $39 per year