Best Free IT Security Software of 2026 - Page 39

Find and compare the best Free IT Security software in 2026

Use the comparison tool below to compare the top Free IT Security software on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Tigera Reviews
    Security and observability tailored for Kubernetes environments. Implementing security and observability as code is essential for modern cloud-native applications. This approach encompasses cloud-native security as code for various elements, including hosts, virtual machines, containers, Kubernetes components, workloads, and services, ensuring protection for both north-south and east-west traffic while facilitating enterprise security measures and maintaining continuous compliance. Furthermore, Kubernetes-native observability as code allows for the gathering of real-time telemetry, enhanced with context from Kubernetes, offering a dynamic view of interactions among components from hosts to services. This enables swift troubleshooting through machine learning-driven detection of anomalies and performance issues. Utilizing a single framework, organizations can effectively secure, monitor, and address challenges in multi-cluster, multi-cloud, and hybrid-cloud environments operating on either Linux or Windows containers. With the ability to update and deploy security policies in mere seconds, businesses can promptly enforce compliance and address any emerging issues. This streamlined process is vital for maintaining the integrity and performance of cloud-native infrastructures.
  • 2
    Pulsedive Reviews
    Pulsedive provides threat intelligence platform and data products that can be used to aid security teams in their threat intelligence research, processing and management. Start by searching any domain, URL, or IP at pulsedive.com. Our community platform allows you to enrich and investigate indicators for compromise (IOCs), analyze threats and query across the Pulsedive database. You can also submit IOCs in bulk. What we do differently - On-demand, perform passive or active scanning of every ingested IOC - Sharing of risk evaluations and factors with our users based upon first-hand observations - Pivot any data property or value Analyze threat infrastructure and properties shared by different threats Our API and Feed products allow for automation and integration of data within security environments. For more information, visit our website.
  • 3
    Comodo Dragon Platform Reviews
    Our entirely cloud-based framework offers immediate protection against hidden threats while safeguarding your endpoints from recognized threat signatures. Comodo has pioneered a novel strategy for endpoint security, specifically designed to address the shortcomings of outdated security solutions. The Dragon platform establishes the essential principles for comprehensive next-generation endpoint protection. You can effortlessly enhance your cybersecurity and operational efficiency with the Dragon Platform’s streamlined agent, which utilizes artificial intelligence (AI) and Auto Containment to neutralize all threats effectively. Comodo provides every aspect of cybersecurity necessary to implement breach protection, ensuring immediate value from the outset. With a 100% reliable verdict achieved within 45 seconds for 92% of signatures through analysis, and a four-hour service level agreement for the remaining 8% addressed by human specialists, the platform stands out in the industry. Regular automatic signature updates further facilitate deployment throughout your entire system, significantly reducing operational expenses while ensuring robust security measures are in place. This solution not only enhances protection but also streamlines the process to keep your organization secure effortlessly.
  • 4
    LOGZEN Reviews
    LogZEN is an application designed for monitoring syslog data that is archived in Elasticsearch. This tool features a Python-based backend that offers a ReST API, as well as a frontend interface for users. Currently, the project is undergoing a reorganization, resulting in the absence of a stable version available for installation. LogZEN is categorized as free software, allowing users the freedom to redistribute and modify it in accordance with the GNU General Public License endorsed by the Free Software Foundation. As the project evolves, users can look forward to future enhancements and features that will improve their experience.
  • 5
    SecurEnds Reviews
    SecurEnds cloud software allows the world's most innovative companies to automate: User access reviews, Access certifications, entitlement audits, access requests, and identity analytics. Use the SecurEnds connectors and files to load employee data from a Human Resources Management System (e.g. ADP, Workday. Ultipro. Paycom). To pull identities across enterprise applications (e.g. Active Directory, Salesforce. Oracle, and databases (e.g. SQL Server, MySQL and PostreSQL) and cloud applications (e.g. AWS, Azure and Jira), you can use flex connectors and built-in connectors. As often as necessary, you can perform user access reviews by role and attribute. To track any changes since last campaign, application owners can use delta campaigns. To perform access updates, application owners can send remediation tickets directly. Auditors have the ability to access dashboards and remediations.
  • 6
    DCS AML Reviews
    DCS is a tool to combat money laundering and terrorist funding. DCS integrates Artificial Intelligence, which allows your organization detect suspicious activity in an efficient and precise way.
  • 7
    NetApp Cloud Volumes ONTAP Reviews
    Experience enterprise-level storage solutions tailored to the locations of your applications. Cloud Volumes ONTAP allows you to maximize the efficiency of your cloud storage expenditures and operational performance, all while improving data safety, security, and regulatory adherence. With Cloud Volumes ONTAP, you can effortlessly estimate your storage expenses on platforms like AWS, Azure, or Google Cloud by utilizing a straightforward, user-friendly calculator that is completely free to use. This tool is designed to help you make informed decisions about your cloud storage needs.
  • 8
    Gravwell Reviews
    Gravwell is an all you can ingest data fusion platform that allows for complete context and root cause analysis for security and business data. Gravwell was created to provide machine data benefits to all customers, large or small, binary or text, security or operational. An analytics platform that can do things you've never seen before is possible when experienced hackers team up with big data experts. Gravwell provides security analytics that go beyond log data to industrial processes, vehicle fleets, IT infrastructure or all of it. Do you need to track down an access breach? Gravwell can run facial recognition machine-learning against camera data to identify multiple subjects who enter a facility with one badge-in. Gravwell can also correlate building access logs. We are here to help people who require more than text log searching and want it sooner than they can afford.
  • 9
    NeuShield Data Sentinel Reviews
    The War on Ransomware has ended. NeuShield Data Sentinel is more than just a ransomware detection and blocker. Our anti-ransomware technology is the only one that can restore your data from malicious software attacks. Data Sentinel uses Mirror Shielding™ to protect files, ensuring that you can immediately recover your data from any ransomware attack. Patented technology that creates a barrier around protected files to prevent them from being modified. Mirror Shielding™, which makes attackers believe they have access the original data files of a computer, but they only see a mirror image. You can quickly restore access to your computer's operating system files and settings after a ransomware attack by restoring them to a known good condition. One-Click Restore can also be used to remove unknown and known malware. Protects the boot section of a drive to stop aggressive ransomware taking over the boot process.
  • 10
    Topicus KeyHub Reviews
    Topicus KeyHub provides Privileged Access Management to individuals. With privileged access management, you can gain easy and secure access containers, sensitive data, and production environments. KeyHub allows you to access your data in real-time and enforces least privilege rules.
  • 11
    Cerber Security Reviews
    Cerber Security vigorously defends WordPress from hacker attacks, spam, malware, and other threats. Blazingly fast and reliable in design A set of specialized request inspection algorithms screens incoming requests for malicious codes patterns and traffic anomalies. Bot detection engine detects and mitigates automated attacks. Reduces code injection and brute force attacks. GEO country rules restrict access. Both REST API and ordinary user numbers are blocked. Restricted access to REST API, XML-RPC. It uses a global list IP addresses that are known to be involved in malicious activity. Detects bots using heuristics and content-based algorithms. Compares IP address against a real-time list of IP addresses that are known to be disseminating spam, attacks on phishing and other malicious activity. Every file and folder on your website is thoroughly scanned for trojans, malware, and viruses. Automatically removes viruses and malware. Monitors suspicious, new, or changed files.
  • 12
    Metasploit Reviews
    Sharing knowledge is a potent force, particularly in the realm of cybersecurity. The partnership between the open source community and Rapid7 has given rise to Metasploit, a tool that not only assists security teams in validating vulnerabilities and conducting security assessments but also enhances their overall security awareness. This collaboration equips defenders with the resources they need to maintain a proactive stance, enabling them to anticipate threats and remain several steps ahead of potential attackers. Ultimately, this synergy fosters a more resilient security posture for organizations everywhere.
  • 13
    F5 Distributed Cloud DNS Reviews
    F5 Distributed Cloud DNS guarantees optimal performance and reliability for your applications, streamlining DNS services across various cloud platforms and contemporary applications. This solution offers a globally distributed, SaaS-based primary DNS that ensures your applications achieve the highest levels of scalability and responsiveness across the globe. With automatic capacity scaling, you can deploy and manage applications anywhere with ease, as our DNS is designed on a worldwide data plane that adapts to fluctuating demands seamlessly. The rapid deployment process allows for configuration and provisioning within minutes, utilizing a unified set of APIs and a single user interface that simplifies the DNS setup for any application deployment. Additionally, it incorporates multiple layers of security, featuring dynamic protection and automatic failover mechanisms to safeguard against distributed denial-of-service (DDoS) attacks and potential manipulation of domain responses, ensuring the integrity of your applications. This comprehensive approach not only enhances security but also boosts overall operational efficiency.
  • 14
    ArvanCloud Reviews
    ArvanCloud CDN consists of tens to PoP sites at important locations around the globe to deliver online content to users, from the nearest geographical point at the highest quality and speed. You can create unlimited cloud servers with ArvanCloud Cloud Computing infrastructure in just a few clicks. You can create multiple cloud storage disks per server and manage your cloud data center communications with Firewall and private or public networks. ArvanCloud allows you secure any type of data stored on Cloud Storage. You can access a reliable storage system anywhere in the world and have no worries about data loss. ArvanCloud Container-Based Platform as a Service conforms to Kubernetes standards. You are only a few commands away from an operational product with ArvanCloud Container-Based Platform as a Service.
  • 15
    Email Shield Reviews
    Email Shield is a cloud-based security add-in that protects email accounts. It helps businesses in a variety of industries, including banking, fintech and eCommerce. It verifies and tracks trusted contacts, allowing users to expose potentially dangerous emails and ensuring financial transactions are safe. Email Shield allows accounts payable agents (AP) to scan emails, AP recipients, and attachments, and then approve, escalate, reject, or accept payment and request account changes. The system modifies the personal information in an active message, including the subject, body and sender. This protects against wire fraud, vendor fraud, and wire fraud.
  • 16
    ThreatModeler Reviews
    ThreatModeler™, an enterprise threat modeling platform, is an automated solution that reduces the effort required to develop secure applications. Today's information security professionals have a pressing need to create threat models of their organizations' data and software. We do this at the scale of their IT ecosystem and with the speed of innovation. ThreatModeler™, which empowers enterprise IT organizations, allows them to map their unique security requirements and policies directly into the enterprise cyber ecosystem. This provides real-time situational awareness of their threat portfolio and risks. InfoSec executives and CISOs gain a complete understanding of their entire attack landscape, defense-in depth strategy, and compensating control, which allows them to strategically allocate resources and scale up their output.
  • 17
    Portworx Reviews
    Kubernetes can be run in production using the #1 Kubernetes platform. It offers persistent storage, backup, data security, capacity management, and DR. You can easily backup, restore, and migrate Kubernetes applications to any cloud or data centre. Portworx Enterprise Storage Platform provides end-to-end storage, data management, and security for all Kubernetes projects. This includes container-based CaaS and DBaaS as well as SaaS and Disaster Recovery. Container-granular storage, disaster recovery and data security will all be available to your apps. Multi-cloud migrations are also possible. You can easily solve enterprise requirements for Kubernetes data service. Your users can easily access a cloud-like DbaaS without losing control. Operational complexity is eliminated by scaling the backend data services that power your SaaS app. With a single command, add DR to any Kubernetes application. All your Kubernetes apps can be easily backed up and restored.
  • 18
    Centreon Reviews
    Centreon is a global provider for business-aware IT monitoring to ensure high performance and continuous operations. The company's AIOps-ready platform, which is holistic and ready for use in today's complex hybrid cloud infrastructures, is designed to meet the needs of these distributed clouds. Centreon monitors all aspects of the IT Infrastructure, from Cloud-to Edge for a clear and comprehensive view. Centreon eliminates blind spots by monitoring all equipment, middleware, and applications that are part modern IT workflows. This includes legacy assets on-premise, private and public clouds, and all the way to edge of the network where smart devices and customers come together to create business value. Centreon is always up-to-date and can support even the most dynamic environments. It has auto-discovery capabilities that allow it to keep track of Software Defined Network (SDN), AWS or Azure cloud assets and Wi-Fi access points, as well as any other component of today’s agile IT infrastructure.
  • 19
    Verified.Me Reviews
    SecureKey Technologies Inc. has introduced Verified.Me, a robust solution designed to assist you in confirming your digital identity, enabling swift access to desired online services and products, whether you are shopping online, visiting in person, or making phone calls. This innovative platform provides Canadians with a reliable and user-friendly method for digital identity verification. Developed in collaboration with seven prominent financial institutions in Canada, including BMO, CIBC, Desjardins, National Bank of Canada, RBC, Scotiabank, and TD, Verified.Me is a comprehensive digital identity verification network. The network is continuously improving, with intentions to incorporate additional digital identity and service providers, ultimately simplifying your experiences. Recently, SecureKey has made the Verified.Me service available in a convenient, browser-based format, allowing for even easier access to its features. As the service evolves, users can expect further enhancements that will streamline their identity verification processes.
  • 20
    Secfense Reviews
    Secure your company, employees, and customers with stronger authentication. 2FA can be deployed in minutes and not weeks. 2FA (and other user access policies) are built into the infrastructure and not fixed to applications. Allowing the use of all 2FA methods on the market, now and in the future, without changing the core. Protection is available to all employees, including those who work in the public, private, and on-premise sectors. Secfense is installed between your users and the applications they access. It tracks traffic patterns that are related to authentication. It can then enforce multifactor authentication logon and other sensitive actions, without interfering in applications existing code or databases. The platform always has the most current 2FA methods. Secfense and applied methods are not affected by application changes. You can control session expiration rules across all applications. Do not rely on VPNs. Instead, trust users and their devices.
  • 21
    Sandboxie Reviews
    Sandboxie is a software that offers sandbox-based isolation for 32- and 64-bit Windows NT-based systems. It has been under the development of David Xanatos since its transition to open-source status; prior to that, it was managed by Sophos, which obtained it from Invincea, the company that previously acquired it from its original creator, Ronen Tzur. By creating an isolated operating environment, Sandboxie allows users to run or install applications without making permanent changes to the local or mapped drives. This virtual isolation enables safe testing of untrusted applications and secure web browsing. Following its open-source release, Sandboxie is available in two versions: the classic build featuring a MFC-based user interface and the Plus build that comes with enhanced features and a completely new Q't based interface. Most of the new functionalities are directed towards the Plus version, but many can also be accessed in the classic version by modifying the sandboxie.ini file. This flexibility makes it easier for users to benefit from updates while still maintaining a preference for the traditional interface.
  • 22
    NoDistribute Reviews
    To initiate a scan, simply select your file, and it will be examined using over 35 different antivirus programs. The outcomes of these scans are kept confidential and are not shared with any third parties. For added security, you can utilize temporary email addresses at no cost. To ensure your privacy and that of your files, you might prefer not to disclose their contents to antivirus providers. Our platform utilizes a trustworthy API from VirusCheckMate, which has established a solid reputation since its inception in 2014. If you're curious about their offerings, you can learn more by visiting VirusCheckMate.net. Since we began operating in 2013, we have maintained a strict policy of not distributing any scan results. You're welcome to conduct your own assessments of our service to confirm that privacy is upheld. Every day, we attract a high volume of visitors interested in past scan results and new file analyses. While we offer a complimentary service that allows for up to three scans daily, we would greatly appreciate your support by purchasing a scan key to help sustain our operations. Additionally, by opting to contribute, you will be ensuring that we can continue providing this valuable service to users in the future.
  • 23
    Secuvy AI Reviews
    Secuvy, a next-generation cloud platform, automates data security, privacy compliance, and governance via AI-driven workflows. Unstructured data is treated with the best data intelligence. Secuvy, a next-generation cloud platform that automates data security, privacy compliance, and governance via AI-driven workflows is called Secuvy. Unstructured data is treated with the best data intelligence. Automated data discovery, customizable subjects access requests, user validations and data maps & workflows to comply with privacy regulations such as the ccpa or gdpr. Data intelligence is used to locate sensitive and private information in multiple data stores, both in motion and at rest. Our mission is to assist organizations in protecting their brand, automating processes, and improving customer trust in a world that is rapidly changing. We want to reduce human effort, costs and errors in handling sensitive data.
  • 24
    Cyscale Reviews
    In less than five minutes, you can map, secure, and monitor your cloud resources across various platforms. Our agentless CSPM solution leverages the innovative Security Knowledge Graph™ to enhance operational efficiency and reduce costs while providing scalable and consistent protection and governance. Professionals from various sectors trust Cyscale to make impactful contributions by applying their expertise where it is needed most. With our service, you gain visibility through different infrastructure layers, amplifying your efforts to create organization-wide benefits. Cyscale enables you to connect diverse environments seamlessly and visualize your entire cloud inventory comprehensively. By identifying and eliminating obsolete or overlooked cloud resources, you can reduce your invoices from providers and optimize overall organizational costs. Upon signing up, you will receive precise correlations across your cloud accounts and assets, allowing you to promptly respond to alerts and prevent potential fines associated with data breaches. Additionally, our solution facilitates ongoing monitoring to ensure that your cloud environment remains efficient and compliant.
  • 25
    AuthPass Reviews
    AuthPass is a free and open-source password manager that supports the widely-used and reliable Keepass formats (kdbx 3.x and kdbx 4.x 🎉️). It allows you to store your passwords securely, share them across various devices, and access them effortlessly whenever you need to log in. 🗄 Consolidate all your passwords in one convenient location. 🧬 Create strong, random passwords for each of your online accounts. 🔐 Access your vault quickly using biometric authentication. 🔍 Monitor your accounts across the internet with ease. 🖥 Available on multiple platforms, including Mac, iPhone, iPad, Android devices, Linux, Windows, and through a web interface. 📂 Open and manage multiple password files simultaneously, such as one for work and another for personal use, or share files with colleagues. ✍ Autofill functionality for your passwords is available on Android 9 and later, with browser support starting from Android 10. With AuthPass, managing your credentials has never been more streamlined or secure.