Alternatives to MetaDefender Kiosk
Compare MetaDefender Kiosk alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to MetaDefender Kiosk in 2025. Compare features, ratings, user reviews, pricing, and more from MetaDefender Kiosk competitors and alternatives in order to make an informed decision for your business.
-
1
Fortinet
Fortinet
Fortinet is a global leader in cybersecurity solutions, known for its comprehensive and integrated approach to safeguarding digital networks, devices, and applications. Founded in 2000, Fortinet provides a wide range of products and services, including firewalls, endpoint protection, intrusion prevention systems, and secure access solutions. At the core of its offerings is the Fortinet Security Fabric, a unified platform that seamlessly integrates security tools to deliver visibility, automation, and real-time threat intelligence across the entire network. Trusted by businesses, governments, and service providers worldwide, Fortinet emphasizes innovation, scalability, and performance, ensuring robust defense against evolving cyber threats while supporting digital transformation and business continuity. -
2
MetaDefender OT Security
OPSWAT
Designed for enterprise-level deployments, MetaDefender OT Security provides full visibility into your OT assets and networks, continuously discovering assets, and monitoring for threats, vulnerabilities, supply chain violations, and non-compliance issues. Critical networks are home to devices of varying ages, makes, models, operating systems, and countries of origin, and without a clear understanding of where they are and how they’re communicating, protecting them and your distributed networks from potential cyberattacks further complicates an already complex problem. OPSWAT MetaDefender OT Security is an AI-powered industrial asset and OT network visibility solution that enables OT personnel to protect their critical environments and supply chain through asset discovery, inventory management, network visibility, and vulnerability and risk management. With its intuitive OT interface, MetaDefender OT Security goes from easy out-of-the-box installation to providing visibility. -
3
TXOne Security Inspection
TXOne Networks
Ensure asset integrity with rapid, installation-free asset and device scans, allowing for the defense of air-gapped environments and improved supply chain security. The OT zero trust-based malware inspection and cleanup tool prevents insider threats and supply chain attacks. OT zero trust begins the moment a device enters your work site, be it for onboarding or in the hands of trusted personnel. Put a stop to insider threats and prevent supply chain attacks by flexibly securing integrity from the very beginning of the asset life cycle. Even after onboarding, some endpoints, air-gapped and stand-alone assets, continue to require specialized protection. Many of them are highly sensitive and cannot accept installation or changes to their configurations. It provides all this with no installation required. To eliminate the shadow OT, asset information will be collected during every scan and sent to the central management console. -
4
Dragos Platform
Dragos
The Dragos Platform is the most trusted industrial control systems (ICS) cybersecurity technology–providing comprehensive visibility of your ICS/OT assets and the threats you face, with best-practice guidance to respond before a significant compromise. Built by practitioners for practitioners, the Dragos Platform ensures your cybersecurity team is armed with the most up-to-date defensive tools to combat industrial adversaries, codified by our experts on the front lines every day hunting, combatting, and responding to the world’s most advanced ICS threats. The Dragos Platform analyzes multiple data sources including protocols, network traffic, data historians, host logs, asset characterizations, and anomalies to provide unmatched visibility of your ICS/OT environment. The Dragos Platform rapidly pinpoints malicious behavior on your ICS/OT network, provides in-depth context of alerts, and reduces false positives for unparalleled threat detection.Starting Price: $10,000 -
5
Claroty
Claroty
Powered by our Continuous Threat Detection (CTD) and Secure Remote Access (SRA) solutions, our platform provides a full range of industrial cybersecurity controls that integrate seamlessly with your existing infrastructure, scale effortlessly, and have the industry's lowest total cost of ownership (TCO). The comprehensive industrial cybersecurity controls our platform provides revolve around the REVEAL, PROTECT, DETECT, CONNECT framework. Our platform's features empower you to achieve effective industrial cybersecurity, regardless of where you are on your industrial cybersecurity journey. The Claroty Platform is deployed across multiple industries, each with unique operational and security needs. Effective industrial cybersecurity starts with knowing what needs to be secured. Our platform removes the barriers that limit industrial networks from securely connecting to what enables the rest of the business to operate and innovate with an acceptable level of risk. -
6
Frenos
Frenos
Frenos is the world's first autonomous Operational Technology (OT) security assessment platform, designed to proactively assess, prioritize, and defend critical infrastructure without impacting operations. Purpose-built for OT environments, it autonomously evaluates and mitigates risks across all sixteen critical infrastructure sectors. The platform utilizes a digital network twin and an AI reasoning agent to analyze potential adversarial tactics, techniques, and procedures, providing contextual, prioritized remediation guidance specific to OT settings. This approach enables organizations to efficiently reduce risk and enhance security posture. Frenos has established partnerships with industry leaders such as Claroty, Forescout, NVIDIA, Dragos, Palo Alto Networks, Tenable, and Rapid7. Frenos was established to help enterprises safeguard their most valuable crown jewels, from oil rigs and medical devices to electric substations and financial transaction applications. -
7
GREYCORTEX Mendel
GREYCORTEX
Current network security tools leave networks vulnerable because of a lack of detection for advanced threats, lack of visibility, and a lack of integration. This means threats hide in the network, infected devices and misconfigurations go unnoticed, and analysts must switch between different platforms to stop attacks when they are finally detected. GREYCORTEX Mendel is an NDR (Network Detection and Response) solution for network security monitoring in IT and industrial (OT) networks. It combines advanced detection methods to analyze network traffic and alert you on any malicious activities, common and unknown advanced threats and network operational issues. It perfectly visualizes network communications at the user, device and application levels, enabling systems analysts and network administrators to quickly and efficiently resolve security and operational incidents. -
8
Palo Alto Networks Industrial OT Security
Palo Alto Networks
Palo Alto Networks' Industrial OT Security solution is designed to protect operational technology environments by leveraging advanced AI, real-time threat detection, and zero trust architecture. This cloud-delivered, agentless platform offers comprehensive visibility into OT assets, ensuring seamless security across industrial systems without disrupting operations. It helps protect legacy systems, remote workers, and critical infrastructure in harsh environments while providing continuous monitoring and risk assessment. The solution is optimized for the complexity of modern OT environments, offering features such as deep learning anomaly detection, inline threat prevention, and compliance with industry regulations. Additionally, OT environments can achieve a 351% ROI, with deployment times 15 times faster and management complexity reduced by 95%. -
9
Bayshore Networks
Bayshore Networks
Bayshore Networks builds solutions to support the real world that ICS/OT Security professionals must confront today, exponential growth in security threats, and a limited resource of human capital that understands security and the production environment. Bayshore Networks® is the cyber protection leader for Industrial control systems, Internet of Things (IIOT). We offer hardware and software solutions in our modular ICS security platform that allow you to grow as needed. Bayshore Networks® offers control and protection for industrial Operational Technology (OT), and transforms OT data for IT applications. Incorporating open, standard, and industrial proprietary protocols at a deep level, Bayshore inspects OT protocol content and context, validating every command and parameter against logic-rich policies. Addressing zero day, internal, and rapidly evolving threats, Bayshore can actively protect industrial endpoints and process control automation systems. -
10
SCADAfence
SCADAfence
SCADAfence is the global technology leader in OT & IoT cyber security. SCADAfence offers a full suite of industrial cybersecurity products that provides full coverage of large-scale networks, offering best-in-class network monitoring, asset discovery, governance, remote access and IoT device security. SCADAfence offers a full suite of industrial cybersecurity products that provides full coverage of large-scale networks, offering best-in-class network monitoring, asset discovery, governance, remote access and IoT device security. Reduce your organization's mean time to detect (MTTD) and mean time to recovery (MTTR) by working with a team of seasoned veterans who are OT security subject matter experts. In your monthly OT security report, you will have a better understanding of each OT asset in your network while providing you with proper remediation of threats before the vulnerabilities can be exposed. -
11
NP-View
Network Perception
Network Perception’s NP-View is an OT cybersecurity platform that enables security teams to gain network visibility through automated topology map generation to proactively identify access and segmentation risks, maintain compliance, and ensure a high-security posture in an offline manner with no risk to operations. A lightweight, non-invasive network visualization platform for OT networks that enables security teams to rapidly identify network vulnerabilities, assess risks, and ensure compliance. NP-View provides a complete network view without the need to install an agent or write to the OT network. Designed for both technical and non-technical users. Support a range of firewalls, routers, and switches commonly used in OT environments. NP-View runs on-premise in an offline mode and does not require an internet connection. Have comprehensive network maps dynamically updated and maintained to give you an accurate point of reference to your cyber security environment. -
12
Waterfall Security
Waterfall Security Solutions Ltd.
Waterfall Security Solutions is an industrial cybersecurity company, protecting critical industrial networks since 2007 with a lineup of hardware and software products. Waterfall has revolutionized how entire industries protect physical assets and industrial processes from cyberattacks. Waterfall’s patented, unidirectional products enable safe IT/OT integration, remote access, remote monitoring & diagnostics, cloud connectivity, and tamper-proof forensics, without the risks and threats that always accompany firewalled connectivity. Waterfall has a growing list of customers worldwide including power plants, nuclear plants, onshore/offshore platforms, refineries, rail systems, manufacturing plants, utility companies, and more. Waterfall’s products integrate with a very wide range of industrial systems and are widely recognized for simplifying compliance with security regulations, standards, and best practices. -
13
Secure remote access to your ICS and OT assets, and easily enforce cybersecurity controls at scale with our zero-trust network access solution made for industrial networks and harsh environments. Securing remote access to operational technology assets has never been easier, or more scalable. Operate with better efficiency and get peace of mind with Cisco Secure Equipment Access. Empower your operations team, contractors, and OEMs to remotely maintain and troubleshoot ICS and OT assets with an easy-to-use industrial remote access solution. Configure least-privilege access based on identity and context policies. Enforce security controls such as schedules, device posture, single sign-on, and multifactor authentication. Stop struggling with complex firewalls and DMZ setups. Secure Equipment Access embeds ZTNA into your Cisco industrial switches and routers so you can reach more assets, reduce the attack surface, and deploy at scale.
-
14
Microsoft Defender for IoT
Microsoft
Accelerate digital transformation with comprehensive security across your IoT/OT infrastructure. Microsoft Defender for IoT offers agentless network detection and response (NDR) that is rapidly deployed, works with diverse IoT, OT, and industrial control system (ICS) devices, and interoperates with Microsoft 365 Defender, Microsoft Sentinel, and external security operations center (SOC) tools. Deploy on-premises or via cloud. For IoT device builders, Defender for IoT offers lightweight agents for stronger device-layer security. Use passive, agentless network monitoring to safely gain a complete inventory of all your IoT/OT assets, with zero impact on IoT/OT performance. Analyze diverse and proprietary industrial protocols to visualize your IoT/OT network topology and see communication paths, and then use that information to accelerate network segmentation and zero trust initiatives.Starting Price: $0.001 per device per month -
15
Mission Secure
Mission Secure
Protecting OT networks and safeguarding operations with a patented OT cybersecurity platform and 24/7 expert managed services. As IT and OT systems converge, organizations are left exposed. This convergence leaves operations and operational technology (OT) networks vulnerable to new cyber threats and risks that cannot be overcome with traditional IT security solutions. Other IT cybersecurity solutions only provide visibility and detection; we’ve developed the first integrated OT cybersecurity protection platform backed by an expert managed services team that stops OT cyber threats head-on. Protect your productivity, assets, and OT network. Proprietary technology-based assessments to baseline overall OT security posture. A patented platform built to protect operational networks in a digital age. OT cybersecurity as a turnkey service, we can be there to manage your protections around the clock. Extended network monitoring and passive pen testing. -
16
Cisco Cyber Vision
Cisco
The deeper integration between IT, cloud and industrial control networks (ICS) is exposing your industrial operations to cyber threats. Cisco Cyber Vision has been specifically developed for OT and IT teams to work together to ensure production continuity, resilience and safety. You can now deploy Industrial Internet of Things (IIoT) technologies and capture the benefits of your industry digitization efforts. Kick-start your OT security project by building an accurate list of all your industrial assets, communication patterns and network topologies. Feed your SOC (security operations center) with OT context and leverage the time and money you have invested in IT cybersecurity to secure your OT network. Take OT security to the next level: Have detailed information to comply with regulations and enable effective collaboration between OT and IT experts. -
17
Sectrio
Sectrio
Sectrio was launched as Subex Secure in the year 2016 to meet the growing needs of businesses in securing their Internet of Things and Operational Technology footprint on a single platform. To meet this objective, Subex invested in building the world’s largest adaptable honeypot network ground-up while simultaneously building an agile product with features aligned to the needs of our growing customer base. Subex Secure was rebranded as Sectrio in September 2021 to reflect the arrival of the next phase of our product and innovation evolution. Today, Sectrio has deployments across North America, the Middle East, APAC, and Indian markets. Our customer base is spread across verticals. Sectrio also is home to the largest number of cybersecurity domain specialists including the industry’s leading threat research team. -
18
CyberArk Privileged Access Manager
CyberArk
Keep your business safe by preventing the malicious use of privileged accounts and credentials – a common path to an organization’s most valuable assets. The CyberArk PAM as a Service solution leverages leading automation technologies to protect your business as it grows. Attackers never stop seeking ways in. Manage privileged access to minimize risk. Prevent credential exposure and keep critical assets from falling into the wrong hands. Maintain compliance with recorded key events and tamper-resistant audits. Privileged Access Manager easily integrates with a host of applications, platforms and automation tools. -
19
Tenable OT Security
Tenable
Safeguard critical systems without disrupting operations. Unify the visibility of every asset in your converged environment from a single interface. Proactively identify weak points in your OT environment. Eradicate your high-risk exposures before they’re exploited. Automate asset discovery and create visual asset maps for a unified view of network assets, including workstations, servers, industrial controllers, and IoT devices. Use connector engines to specifically target applications that manage IoT devices and relationships for a complete inventory. Manage your assets by tracking their firmware and OS versions, internal configuration, applications and users, serial numbers, and backplane configuration for both OT and IT-based equipment. Leverage an advanced multi-detection engine to identify network anomalies, enforce security policies, and track local changes on devices with high-risk events. -
20
Acreto
Acreto
Acreto delivers the first fully integrated end-to-end virtual security platform that can protect any technology, on any network, anywhere. The platform enables companies to consolidate security vendors, reduce operational complexity, and cut costs. Acreto integrates eight security product categories into a single, simple platform, next-generation firewall, zero-trust network access, secure web gateway, segmentation, application security, OT/ICS security, and Network Access Control (NAC). This comprehensive approach provides consistent security for all technologies, eliminating the need for multiple products and complex integrations. Acreto's platform is designed to be simple, accessible, and affordable for small and mid-sized organizations, empowering them to execute advanced security without experts and unlimited budgets. The platform offers immediate visibility and inventory of the entire infrastructure, as well as guaranteed cyber insurance with full coverage at reduced rates. -
21
OPSWAT MetaDefender
OPSWAT
MetaDefender layers an array of market-leading technologies to protect critical IT and OT environments and shrinks the overall attack surface by detecting and preventing sophisticated known and unknown file-borne threats like advanced evasive malware, zero-day attacks, APTs (advanced persistent threats), and more. MetaDefender easily integrates with existing cybersecurity solutions at every layer of your organization’s infrastructure. With flexible deployment options purpose-built for your specific use case, MetaDefender ensures files entering, being stored on, and exiting your environment are safe—from the plant floor to the cloud. This solution uses a range of technologies to help your organization develop a comprehensive threat prevention strategy. MetaDefender protects organizations from advanced cybersecurity threats in data that originates from a variety of sources, such as web, email, portable media devices, and endpoints.Starting Price: $0 -
22
MetaDefender Vault
OPSWAT
Transferring files into and out of any environment exposes systems to breach and infection. Portable media are often used to conduct these transfers, bypassing security protocols. MetaDefender Vault is a secure file storage and retrieval solution that protects critical data and keeps threats at bay. It limits access within an organization and provides important tracking and auditing information. Prevent zero-day attacks and ensure your organization can handle false negatives through a variety of options. Lock any new file in a time-specific quarantine, continuously re-scan with multiple antimalware engines, and implement role-based access rules to reduce exposure. Enforce workflow processes that require authentication and restrict access and sharing of files, by job role and file type. Control the list of supervisors authorized to perform certain actions like lock access to any file that has not been pre-approved. -
23
Darktrace
Darktrace
Darktrace is a cybersecurity platform powered by AI, providing a proactive approach to cyber resilience. Its ActiveAI Security Platform delivers real-time threat detection, autonomous responses to both known and novel threats, and comprehensive visibility into an organization’s security posture. By ingesting enterprise data from native and third-party sources, Darktrace correlates security incidents across business operations and detects previously unseen threats. This complete visibility and automation reduce containment time, eliminate alert fatigue, and significantly enhance the efficiency of security operations. -
24
OTORIO Titan
OTORIO
Titan by OTORIO empowers industrial organizations and critical infrastructure operators to proactively reduce risks to their operational environments. Featuring a unique, patent-pending IT/OT cybersecurity digital twin, Titan aggregates information from diverse operational and security systems to create a digital representation of the operational environment. Then, applying OTORIO’s powerful, non-intrusive breach and attack simulation engine, Titan enables organizations to quickly understand their security posture and proactively address vulnerabilities and exposures before they become breaches. Ensure safe, resilient, and compliant business operations. -
25
Karamba SafeCAN
Karamba Security
SafeCAN is a patented ultra-light network security solution that authenticates and encrypts communications between ECUs, with zero network overhead. SafeCAN validates the sender and data integrity of every message, blocking communication from unauthorized ECUs and physical hacks. SafeCAN also authenticates in-vehicle communications to prevent over-the-air (OTA) malware downloads. SafeCAN adds zero network overhead by exchanging encryption keys at the factory, unlike solutions that swap keys while the car is running. Other technologies also add network traffic by sending extra validation messages. SafeCAN circumvents this by embedding validation data in the redundant bits of every message, to avoid adding payloads. SafeCAN is backward compatible so you do not need to make any changes to the ECU application, network protocols, or chipset. It is hardware-agnostic and requires no changes to the message format. Most importantly, it will not burden your already-saturated car networks. -
26
OTbase
Langner
OTbase is a productivity and collaboration tool for your journey towards secure and resilient OT networks. It enables users in cyber security and engineering roles to stay on top of hyper-complex OT networks with hundreds of thousands of devices. OTbase not just inventories your OT systems automatically, it also acts as a plattform to streamline, plan, and document your digital transformation journey. OTbase provides full transparency on all aspects of your OT networks, from minute configuration details to high level KPIs in a CISO dashboard. OTbase enables cyber security experts, control engineers, maintenance experts, plant planners, process engineers, and SOC analysts to get the information they need in an instant. -
27
Nozomi Networks
Nozomi Networks
Nozomi Networks Guardian™ delivers visibility, security and monitoring of your OT, IoT, IT, edge and cloud assets. Guardian sensors send data to Vantage for consolidated security management anywhere, anytime from the cloud. They can also send data to the Central Management Console for aggregated data analysis at the edge or in the public cloud. The world’s top companies rely on Guardian to protect their critical infrastructure, energy, manufacturing, mining, transportation, building automation and other sites around the world. Nozomi Networks Vantage™ leverages the power and simplicity of software as a service (SaaS) to deliver unmatched security and visibility across your OT, IoT, and IT networks. Vantage accelerates digital transformation for the largest and most complex distributed networks. You can protect any number of OT, IoT, IT, edge and cloud assets, anywhere. Its scalable SaaS platform enables you to consolidate all of your security management into a single application. -
28
Ordr Platform
Ordr
Automatically identify, classify, and locate all network-connected devices and systems. Within a few hours of deployment—via network tap or SPAN—we passively discover high-fidelity information about every connected device including make, location, serial number, and application/port usage. This visibility is provided in real time for any new connected device and can be integrated with asset inventory solutions. Understand vulnerabilities, recalls, weak passwords or certificates associated with every device. Ordr also provides deep insight into device utilization so teams can ensure data-driven moves, adds, and changes as teams scale their capacity. These device insights are also critical to determine the longevity of certain devices, and allows teams to schedule maintenance tickets and support procurement decisions. We automatically group fleet devices, and monitor usage for tracking and comparison purposes. We also integrate with identity systems like Active Directory. -
29
Tectia
SSH Communications Security
We are a cybersecurity company dedicated to safeguarding mission-critical data in transit, in use, and at rest for leading organizations around the world. Assess your SSH key estate and related SSH key risks with our self-service tool SSHerlock. SSHerlock is an SSH key and post-quantum resilience discovery and audit self-service tool and can be used free of charge. Passwordless authentication, operational technology (OT) security, defensive cybersecurity, and more. What are the top trends that will shape cybersecurity in the upcoming year? PrivX is perfect for securing, managing and tracking superuser and power user access in the hybrid cloud - by also eliminating risky privileged passwords from critical infrastructures. UKM Zero Trust manages and automates the lifecycle of millions of encryption keys for risk mitigation and audit success - also by making access keyless. Software-based NQX features matchless performance and security. -
30
Nuvolo
Nuvolo
Nuvolo offers a comprehensive Connected Workplace solution designed to optimize workplace management across industries like healthcare, retail, public sector, and more. The platform integrates facilities maintenance, space planning, corporate real estate, capital projects, sustainability, and OT security into a unified system. This solution enables businesses to manage resources more efficiently, enhance collaboration, and streamline operations with advanced features like real-time data access, customizable workflows, and enhanced security for operational technology. With a focus on seamless integration, Nuvolo helps organizations transform their workplace experience and drive operational excellence. -
31
BUFFERZONE
Bufferzone Security
BUFFERZONE provides a patented containment and disarming solution that defends endpoints against advanced malware and zero-day attacks while maximizing user and IT productivity. By isolating potentially malicious content coming from browsers, email and removable media, BUFFERZONE defends individuals and organizations from advanced threats that evade detection. BUFFERZONE disarms content for securely transferring it from the container to the native endpoint and secure network zones, and provides critical intelligence for enterprise-wide security analytics. Easy to deploy and configure, BUFFERZONE is a lightweight solution that provides cost-effective containment for up to thousands of endpoints. -
32
Ransomware Defender
ShieldApps Software Development
ShieldApps’ Ransomware Defender deals with known ransomware in a way no other solution can. Specially designed for detecting and blocking ransomware prior to any damage, Ransomware Defender blacklists and stops both common and unique ransomware. Once installed, Ransomware Defender stands guard 24/7 utilizing active protection algorithms enhanced with user-friendly alerts and notifications systems. Ransomware Defender is fully automated, taking care of all threats via an advanced Scan > Detect > Lock Down mechanism that proactively stands guard to detected threats, and works alongside all main antiviruses and anti-malware products! Ransomware Defender also features a scheduled automatic scan, secured file eraser, lifetime updates and support! Detects and removes any known ransomware before it can take action and harm your PC. The program will deep-scan your device and find hidden ransomware in both high and low-level folders.Starting Price: $49.99 one-time payment -
33
Microsoft Defender for Endpoint
Microsoft
Gain the upper hand against sophisticated threats like ransomware and nation-state attacks. Put time back in the hands of defenders to prioritize risks and elevate your security posture. Advance beyond endpoint silos and mature your security based on a foundation for XDR and Zero Trust. Microsoft Defender for Endpoint delivers industry-leading endpoint security for Windows, macOS, Linux, Android, iOS, and network devices and helps to rapidly stop attacks, scale your security resources, and evolve your defenses. It’s delivered at cloud scale, with built-in AI that reasons over the industry’s broadest threat intelligence. Our comprehensive solution enables discovery of all endpoints and even network devices, such as routers, in your environment. It offers vulnerability management, endpoint protection, endpoint detection and response (EDR), mobile threat defense, and managed hunting all in a single, unified platform. -
34
Ivanti Neurons for Mobile Threat Defense delivers cloud-based, real-time zero-day protection for corporate and employee-owned devices by defending against device, network, application, and phishing attacks and remediating threats automatically. It identifies and blocks malicious URLs at the time of click across email, SMS, social media, and other channels, then notifies users of blocked content. Built into Ivanti Neurons for MDM and Endpoint Manager Mobile clients, it requires no end-user action to deploy or activate, enabling 100 percent adoption and allowing admins to enforce compliance policies that prevent disabling or removal. Advanced machine learning continuously analyzes device traffic, installed apps, and zero-day exploits, providing threat-assessment scores, analytics, and detailed reports. Continuous app visibility lets you score, allow, or deny apps based on risk factors like behaviors, certificates, and network communications.
-
35
FortiProxy
Fortinet
As attacks become more versatile, organizations need an integrated approach to secure from malicious web traffic, websites, and viruses. Fortinet's secure web gateway, FortiProxy, addresses these issues with one, unified product to protect against web attacks with URL filtering, advanced threat defense, and malware protection. Defend end-users from internet-borne threats and enforce policy compliance. Secure Web Gateway addresses a set of overlapping security problems within one product. Using one solution which protects against web attacks with URL filtering, advanced threat defense and malware protection to defend users from internet-borne threats and help enforce internet policy compliance. FortiProxy is a secure web proxy that protects employees against internet-borne attacks by incorporating multiple detection techniques such as web filtering, DNS filtering, data loss prevention, antivirus, intrusion prevention, and advanced threat protection. -
36
Webroot Advanced Email Threat Protection provides multi-layered filtering to secure both inbound and outbound email communications. It defends businesses against phishing, ransomware, Business Email Compromise (BEC), impersonation, and other malicious email-borne threats. The solution includes attachment quarantine with forensic analysis in a secure cloud sandbox and link protection that rewrites URLs and performs time-of-click analysis. It also supports secure delivery features like message retraction to remove malicious emails already delivered within Microsoft 365. With customizable filtering policies and an easy-to-use portal, administrators can tailor protections to meet organizational needs. The platform helps ensure compliance with GDPR, HIPAA, and other regulatory requirements.
-
37
TIPS Kiosk Management Software
DynaTouch
TIPS™ Kiosk Management Software: Effortless Control for Self-Service Kiosks TIPS™ Kiosk Management Software is the industry-leading software solution for seamlessly managing and securing public-facing self-service systems. Our platform empowers organizations to deliver engaging, web-enabled content and applications on self-service kiosks, shared workstations, and digital signage systems with ease in a controlled, secure environment. Designed to run on Windows 7 or later, TIPS™ provides a locked-down and streamlined environment by eliminating access to the network and operating system. With support for multiple hardware configurations, we offer unparalleled flexibility, maintenance and support. Key Benefits: Network & Internet Security Administration Portal Analytics & Reporting User Session Management Peripheral Management Graphical User Interface Remote Monitoring Remote Updating ADA & Section 508 Compliance -
38
CourtWorks
CourtWorks
CourtWorks provides Judges and Court personnel with an organized, secure web-based record of an offender’s file. CourtWorks provides a secure online account for managing referred defendants/probationers. Probation Officers have a one-click view of a defendant’s status, secure and efficient communication between. CourtWorks is an online management and resource tool for all the important information that a defendant. The CourtWorks platform organizes the defendant’s file in a secure online environment that is accessible to all authorized parties. Judges, Probation Officers and the defendants themselves have any time controlled access to the information as well as upcoming events. New documents and other information regarding the defendant’s progress, which is uploaded by agencies are updated into the defendant’s file automatically and displayed in an attractive, easy to understand and intuitive dashboard. -
39
SandBlast Threat Extraction
Check Point Software Technologies
The SandBlast Threat Extraction technology is a capability of SandBlast Network and the Harmony Endpoint protection solutions. It removes exploitable content, reconstructs files to eliminate potential threats, and delivers sanitized content to users in a few seconds to maintain business flow. Reconstruct files with known safe elements in web-downloaded documents and emails. Immediate delivery of sanitized versions of potentially malicious files to maintain business flow. Access to original files after background analysis of attack attempts. SandBlast Network and Harmony Endpoint utilize Threat Extraction technology to eliminate threats and promptly deliver safe, sanitized content to its intended destination. Original files are accessible after undergoing background analysis by the Threat Emulation Engine. SandBlast Threat Extraction supports the most common document types used in organizations today. -
40
Lumen Defender
Lumen
Lumen Defender is an AI- and ML-powered network threat detection and prevention service designed to proactively block evolving cyber threats at the network edge. Leveraging threat intelligence from Black Lotus Labs, Lumen's in-house threat research team, Defender analyzes over 200 billion NetFlow sessions daily to identify and intercept malicious activities such as malware, ransomware, phishing, and botnets before they can compromise business networks. Operating without the need for additional hardware or complex configurations, it integrates seamlessly with Lumen's Internet On-Demand services, providing real-time monitoring, customizable threat blocking based on severity levels, and detailed reporting through an intuitive web portal. Available in Essentials and Plus tiers, Lumen Defender offers features like automatic blocking of high-risk IP addresses, customizable allow/deny lists, and alert notifications, enabling businesses to enhance their cybersecurity posture efficiently.Starting Price: $0.04 per hour -
41
CleanINTERNET
Centripetal
While traditional cybersecurity solutions remediate threats as they emerge, CleanINTERNET® shields against threats proactively, preventing them from reaching your network in the first place. The largest collection of high-confidence, high-fidelity commercial threat intelligence in the world, is operationalized so your defenses adapt and defend in parallel with the threat landscape. Applying over 100 billion indicators of compromise from real-time intelligence feeds, updated every 15 minutes, to protect your network. The fastest packet filtering technology on the planet is integrated at your network’s edge with no latency, enabling the use of billions of threat indicators so malicious threats are dynamically blocked from entering your network. Highly skilled analysts augmented by AI technology monitor your network, providing automated shielding based on real-time intelligence, and validated by human expertise. -
42
SUPERAntiSpyware
SUPERAntiSpyware
Protect your PC from malicious threats from malware, spyware, ransomware, trojans, keyloggers, and more. Boost Microsoft Defender. Fixes parts of your operating system, registry, task manager, broken internet connections, etc. caused by malware. Receive notifications when product and database updates are available. Scans run in the background and can start when your PC is sleeping. Quarantines potential threats and completely removes them, even the stubborn ones. Can restore quarantined items, if not harmful. Fixes parts of your operating system, registry, task manager, broken internet connections, etc. caused by malware. System Investigator identifies spoofed and malicious files. Shows installed applications, browser plugins, and lets you track system changes over time.Starting Price: $29.95 per year -
43
Reality Defender
Reality Defender
Reality Defender provides best-in-class detection against advanced threats posed by deepfakes and AI-generated disinformation. Our industry-leading solutions for enterprises, government, and institutional clients help protect against everything from advanced voice fraud in call centers to media verification in newsrooms. With repeated successes in combating financial fraud and defending governments, our clients trust Reality Defender to help detect deepfake-driven threats. -
44
MCP Defender
MCP Defender
MCP Defender is an open source desktop application that functions as an AI firewall, designed to monitor and protect Model Context Protocol (MCP) communications. It acts as a secure proxy between AI applications and MCP servers, analyzing all communications for potential threats in real-time. It automatically scans and protects all MCP tool calls, providing advanced LLM-powered detection of malicious activity. Users can manage the signatures used during scanning, allowing for customizable security measures. MCP Defender identifies and blocks common AI security threats, including prompt injection, credential theft, arbitrary code execution, and remote command injection. It supports integration with various AI applications such as Cursor, Claude, Visual Studio Code, and Windsurf, with more applications to be supported in the future. It offers intelligent threat detection, alerting users as soon as it identifies any malicious activity being performed by AI apps.Starting Price: Free -
45
RedyRef
RedyRef
REDYREF's KIOSK MANUFACTURING expertise covers all areas of self-service kiosks. This includes kiosk applications ranging from digital directories to QSR self-ordering, ticketing, bill payment, and wayfinding. REDYREF's digital kiosks are suitable for applications across industries and environments. KIOSK SOFTWARE and a full line of application-specific integrations, such as peripherals and components, are available in order to customize the self-service kiosk solution that best meets the needs of our customers. Our KIOSK HARDWARE includes options that range from modular, floor-standing bill payment kiosks to wall-mounted digital directories and custom-designed QSR kiosks. If your organization can dream it, REDYREF is here to help you do it. From design and engineering to manufacturing and servicing, we provide everything kiosk, all under one roof. -
46
Arista NDR
Arista
Today, a zero trust networking approach to security is paramount for organizations looking to build a robust cybersecurity program. Irrespective of which device, application, or user is accessing an enterprise resource, zero trust focuses on complete visibility and control over all activity on the network. Arista’s zero trust networking principles, based on NIST 800-207, help customers address this challenge with three cornerstones: visibility, continuous diagnostics, and enforcement. The Arista NDR platform delivers continuous diagnostics for the entire enterprise threat landscape, processes countless points of data, senses abnormalities or threats, and reacts if necessary—all in a matter of seconds. The Arista solution stands out from traditional security because it is designed to mimic the human brain. It recognizes malicious intent and learns over time, giving defenders greater visibility and insight into what threats exist and how to respond to them. -
47
SAINTcloud
Carson & SAINT Corporations
The cost of defending your most critical technology resources and information rises every year. Increased threats and tight budgets challenge even the most robust risk-management program. Carson & SAINT developed SAINTcloud vulnerability management to provide all of the power and capability offered in our fully-integrated vulnerability management solution, SAINT Security Suite, without the need to implement and maintain on-premise infrastructure and software. This means you can spend more time reducing risks and less time managing the tools you use. No software to install – set up and running in minutes. Full vulnerability scanning, penetration testing, social engineering, configuration, compliance, and reporting in one product. Role-based access controls for separation of duties and accountability. Internal host and remote site scans from the cloud. -
48
Appgate
Appgate
Bringing together a set of differentiated cloud- and hybrid-ready security and analytics products and services. Today, Appgate secures more than 1,000 organizations across 40 countries. A Focused Approach to Zero Trust. Distributed, on-demand IT created a security problem. With more assets to defend and more complexity to overcome, security leaders are stuck solving today’s problems with yesterday’s solutions. Become a smaller target, making resources invisible and resilient to threat actors. Adopt an identity-centric, Zero Trust mindset that factors in context before granting access. Proactively detect and remove internal and external threats targeting your organization. Global enterprises and government agencies trust our industry-leading, proven secure access solutions. Strengthen and simplify network security with the most comprehensive, feature-rich ZTNA solution available. Reduce risk while providing consumers with seamless, secure network access to your digital services. -
49
Cerber Security
Cerber Tech
Cerber Security vigorously defends WordPress against hacker attacks, spam, and malware. Blazingly fast and reliable by design. A set of specialized request inspection algorithms screen incoming requests for malicious code patterns and traffic anomalies. Bot detection engine identifies and mitigates automated attacks. Mitigates brute force and code injection attacks. Restricts access with GEO country rules. Prevents both REST API and ordinary user enumerations. Restricts access to REST API and XML-RPC. Uses a global list of IP addresses known for malicious activity. Detects bots by using heuristic and content-based algorithms. Checks IP against a real-time database of IP addresses known for disseminating spam, phishing attacks and other forms of malicious activity. Thoroughly scans every file and folder on your website for malware, trojans, and viruses. Automatically removes malware and viruses. Monitors new, changed, and suspicious files. -
50
Venusense IPS
Venusense
It contains Venustech’s accumulation and research results in intrusion attack identification, making it reach the international leading level in precise blocking. It can actively block a variety of in-depth attack behaviors such as network worms, spyware, Trojan horse software, overflow attacks, database attacks, advanced threat attacks, and brute force, which makes up for the lack of in-depth defense effects of other security products. Venusense IPS constantly updates detection capability through features, behaviors, sandboxes, and algorithms, while maintaining the advantages of traditional IPS, it defends against advanced persistent attacks (such as unknown malicious files, unknown Trojan horse channels), 0 day attacks, sensitive information leakage behaviors, precision attacks, enhanced anti-WEB scanning, etc.