search Where Thought Leaders go for Growth

Computer Security Software

IT service tools are essential for companies. To effectively protect against all ever-changing cyber-attacks, computer security software remains the best option.

Computer Security : related categories

Our selection of 44 computer security software

EventLog Analyzer

Real-Time Network Security Log Management

star star star star star-half-outlined
4.8
Based on 12 reviews
info-circle-outline
Appvizer calculates this overall rating to make your search for the best software easier. We've based it on user-generated verified reviews on industry-leading websites.
check-circle Free version
check-circle Free trial
check-circle Free demo

Pricing on request

Log management software that collects, analyzes, and reports on log data. Monitor security threats, network activity, and compliance easily.

chevron-right See more details See less details

EventLog Analyzer offers real-time log monitoring, customizable dashboards, and automated alerts. It supports log data from various sources and helps in identifying anomalies and potential security threats. Its reporting capabilities assist in compliance audits and forensic investigations.

Read our analysis about EventLog Analyzer
Learn more

To EventLog Analyzer product page

Specops Password Policy

Enhanced Password Management for Enterprises

star star star star star-half-outlined
4.8
Based on 37 reviews
info-circle-outline
Appvizer calculates this overall rating to make your search for the best software easier. We've based it on user-generated verified reviews on industry-leading websites.
close-circle Free version
check-circle Free trial
check-circle Free demo

Pricing on request

Enhance security with customizable password policies. Control password complexity and expiration rules with ease.

chevron-right See more details See less details

Specify password requirements by user group or domain. Set custom password length, history, and character requirements. Get compliance reports and mitigate risks.

Read our analysis about Specops Password Policy
Learn more

To Specops Password Policy product page

Merox

Streamline Operations with Advanced HR Management

No user review
close-circle Free version
close-circle Free trial
close-circle Free demo

Pricing on request

Protect your computer with advanced security features, including antivirus and firewall protection, with this top-rated software.

chevron-right See more details See less details

Merox offers comprehensive protection against all types of cyber threats, including malware, phishing, and ransomware attacks. Its intuitive interface and automatic updates ensure that your computer is always secure.

Read our analysis about Merox
Learn more

To Merox product page

iLock Security Services

Advanced Access Control for Enhanced Security Solutions

star star star star star
5.0
Based on 1 reviews
info-circle-outline
Appvizer calculates this overall rating to make your search for the best software easier. We've based it on user-generated verified reviews on industry-leading websites.
close-circle Free version
close-circle Free trial
close-circle Free demo

Pricing on request

Protect your computer with advanced security features, including malware detection and removal, firewall protection, and data encryption.

chevron-right See more details See less details

iLock Security Services provides comprehensive protection against cyber threats, ensuring your sensitive data remains safe and secure. With real-time scanning and automatic updates, you can trust that your computer is always protected. Plus, our intuitive interface makes it easy to customize your security settings to fit your unique needs.

Read our analysis about iLock Security Services
Learn more

To iLock Security Services product page

XyLoc Security Server

Advanced Access Management for Optimal Security

No user review
close-circle Free version
close-circle Free trial
close-circle Free demo

Pricing on request

Protect your computer with advanced security features.

chevron-right See more details See less details

XyLoc Security Server offers comprehensive protection for your computer, including encryption, access control, and intrusion detection. With its user-friendly interface, you can customize security settings and monitor activity in real-time. Keep your data safe and secure with XyLoc Security Server.

Read our analysis about XyLoc Security Server
Learn more

To XyLoc Security Server product page

inWebo

Highly Secure Authentication Solution for Enterprises

No user review
close-circle Free version
close-circle Free trial
close-circle Free demo

Pricing on request

Enhance your computer security with two-factor authentication, single sign-on, and user self-management.

chevron-right See more details See less details

With inWebo, your users can securely access all your applications with just one password. The software offers two-factor authentication, allowing you to easily and securely verify user identity. Additionally, inWebo offers user self-management, giving users the ability to manage their own credentials and reduce help desk calls.

Read our analysis about inWebo
Learn more

To inWebo product page

Splunk Enterprise Security

Advanced Threat Detection for Security Intelligence

star star star star star-half-outlined
4.3
Based on +200 reviews
info-circle-outline
Appvizer calculates this overall rating to make your search for the best software easier. We've based it on user-generated verified reviews on industry-leading websites.
close-circle Free version
close-circle Free trial
close-circle Free demo

Pricing on request

Advanced security software with real-time threat detection and customizable dashboards.

chevron-right See more details See less details

Splunk Enterprise Security offers a comprehensive suite of tools for threat management, including machine learning and analytics for faster detection and response. Its customizable dashboards allow for easy tracking of security events and compliance reporting, making it a top choice for enterprises in need of robust security measures.

Read our analysis about Splunk Enterprise Security
Learn more

To Splunk Enterprise Security product page

DatAlert

Advanced Network Monitoring & Threat Detection Solution

No user review
close-circle Free version
close-circle Free trial
close-circle Free demo

Pricing on request

Protect your computer with advanced security features that monitor and alert you of any suspicious activity.

chevron-right See more details See less details

The software's cutting-edge technology detects and responds to potential threats in real-time, giving you peace of mind while you work. Its customizable features also allow you to tailor the level of protection to your specific needs.

Read our analysis about DatAlert
Learn more

To DatAlert product page

Data Classification

Advanced Classification Tools for Precision Data Management

No user review
close-circle Free version
close-circle Free trial
close-circle Free demo

Pricing on request

This Computer Security software provides a powerful data classification system that identifies and categorizes sensitive information.

chevron-right See more details See less details

With this software, users can easily classify and label data based on its level of sensitivity. The system is highly customizable, allowing for the creation of unique classification schemes. The software also includes robust reporting and auditing features, ensuring compliance with regulations and policies.

Read our analysis about Data Classification
Learn more

To Data Classification product page

Stormshield Endpoint security

Comprehensive Endpoint Protection and Compliance

No user review
close-circle Free version
close-circle Free trial
close-circle Free demo

Pricing on request

Comprehensive computer security software with advanced threat detection and prevention capabilities. Protects endpoints from malware, ransomware, and other cyber attacks.

chevron-right See more details See less details

Designed for enterprise-level security, Stormshield Endpoint Security offers real-time protection against known and unknown threats. Its advanced behavioral analysis engine detects and blocks suspicious activities, while its centralized management console allows for easy deployment and monitoring of security policies across all endpoints.

Read our analysis about Stormshield Endpoint security
Learn more

To Stormshield Endpoint security product page

E MAIL SECURITY

Advanced Protection for Secure Email Management

No user review
close-circle Free version
close-circle Free trial
close-circle Free demo

Pricing on request

Protect your computer from malicious emails with this software. Advanced features include real-time scanning, spam filtering, and attachment blocking.

chevron-right See more details See less details

With this software, you can rest easy knowing your emails are secure. Its real-time scanning feature detects and removes threats before they can harm your computer. The spam filtering feature keeps unwanted emails out of your inbox, while the attachment blocking feature ensures that potentially harmful files are not downloaded onto your system.

Read our analysis about E MAIL SECURITY
Learn more

To E MAIL SECURITY product page

Filtrage Web Olfeo

Efficient Web Filtering Solution for Enterprises

No user review
close-circle Free version
close-circle Free trial
close-circle Free demo

Pricing on request

Secure your network with advanced web filtering technology. Protect against malware, phishing, and inappropriate content.

chevron-right See more details See less details

Filtrage Web Olfeo provides real-time analysis and customizable policies to ensure safe and compliant web browsing. Its intuitive interface allows for easy management and reporting.

Read our analysis about Filtrage Web Olfeo
Learn more

To Filtrage Web Olfeo product page

IPdiva Secure

Advanced Access Control for Unmatched Connectivity

No user review
close-circle Free version
close-circle Free trial
close-circle Free demo

Pricing on request

Advanced computer security software with multi-factor authentication, access control, and encryption features to protect sensitive data.

chevron-right See more details See less details

IPdiva Secure provides a comprehensive suite of security features that ensure only authorized users can access your data. Its multi-factor authentication system adds an extra layer of protection, while its access control and encryption features keep your data safe from unauthorized access or tampering.

Read our analysis about IPdiva Secure
Learn more

To IPdiva Secure product page

Tenable.sc

Comprehensive Risk Management Platform for Enterprises

No user review
close-circle Free version
close-circle Free trial
close-circle Free demo

Pricing on request

Comprehensive computer security software that provides real-time visibility and risk management capabilities.

chevron-right See more details See less details

Tenable.sc offers continuous monitoring, compliance checks, and vulnerability assessments to help organizations identify and prioritize security risks. Its customizable dashboards and reporting capabilities provide actionable insights to improve overall security posture.

Read our analysis about Tenable.sc
Learn more

To Tenable.sc product page

Tenable.io

Comprehensive Cyber Risk Management for Businesses

star star star star star-half-outlined
4.6
Based on 177 reviews
info-circle-outline
Appvizer calculates this overall rating to make your search for the best software easier. We've based it on user-generated verified reviews on industry-leading websites.
close-circle Free version
close-circle Free trial
close-circle Free demo

Pricing on request

Protect your organization with comprehensive computer security software that detects vulnerabilities and threats.

chevron-right See more details See less details

Tenable.io provides real-time visibility and prioritization of potential risks, with customizable dashboards and reporting for actionable insights. Stay ahead of security threats with continuous monitoring and rapid remediation.

Read our analysis about Tenable.io
Learn more

To Tenable.io product page

Protection Suite Enterprise

Comprehensive Endpoint Protection for Advanced Security

No user review
close-circle Free version
close-circle Free trial
close-circle Free demo

Pricing on request

Comprehensive computer security software with advanced features for protection against malware, spyware, and phishing attacks.

chevron-right See more details See less details

Protection Suite Enterprise provides real-time threat detection and response, customizable security policies, and centralized management for easy deployment and monitoring. Its multi-layered security approach ensures all endpoints are protected against the latest threats, making it an ideal solution for businesses of all sizes.

Read our analysis about Protection Suite Enterprise
Learn more

To Protection Suite Enterprise product page

Mcafee MVISION Cloud

Advanced Cloud Data Protection and Compliance Solution

No user review
close-circle Free version
close-circle Free trial
close-circle Free demo

Pricing on request

Cloud-based computer security software that protects against data loss and threats from cloud applications.

chevron-right See more details See less details

Mcafee MVISION Cloud allows for real-time monitoring and control of data flowing to and from cloud services, ensuring compliance with regulations and preventing data leaks. Its advanced threat detection and remediation capabilities provide a comprehensive security solution for businesses.

Read our analysis about Mcafee MVISION Cloud
Learn more

To Mcafee MVISION Cloud product page

McAfee ePolicy Orchestrator

Comprehensive Endpoint Management Solution

star star star star star-half-outlined
4.5
Based on 42 reviews
info-circle-outline
Appvizer calculates this overall rating to make your search for the best software easier. We've based it on user-generated verified reviews on industry-leading websites.
close-circle Free version
close-circle Free trial
close-circle Free demo

Pricing on request

Enhance your computer security with advanced management tools. Keep your network safe and up-to-date with automated policies and reporting.

chevron-right See more details See less details

McAfee ePolicy Orchestrator offers a powerful suite of features to manage security threats. From policy enforcement to real-time alerts, this software streamlines your security operations. Plus, with customizable dashboards and detailed reporting, you can quickly identify and address potential risks.

Read our analysis about McAfee ePolicy Orchestrator
Learn more

To McAfee ePolicy Orchestrator product page

McAfee MVISION Endpoint

Advanced Endpoint Protection for Businesses

No user review
close-circle Free version
close-circle Free trial
close-circle Free demo

Pricing on request

This computer security software provides comprehensive endpoint protection, including threat prevention, detection, and response capabilities.

chevron-right See more details See less details

With its centralized management console, real-time visibility, and machine learning-based analytics, this software allows organizations to proactively identify and mitigate security risks, while also simplifying compliance efforts.

Read our analysis about McAfee MVISION Endpoint
Learn more

To McAfee MVISION Endpoint product page

Deep Security

Advanced Threat Protection for Enterprise Cloud

No user review
close-circle Free version
close-circle Free trial
close-circle Free demo

Pricing on request

Protect your computer with advanced security features that keep your data safe from cyber threats.

chevron-right See more details See less details

Deep Security offers comprehensive security measures that include intrusion prevention, anti-malware, and firewall protection. With real-time monitoring and alerts, you can rest assured that your computer is always protected.

Read our analysis about Deep Security
Learn more

To Deep Security product page

Computer Security software: purchase guide

What is online computer security software?

Definition

Computer security software provides a solution to the problem of cybersecurity. Faced with all the potential threats facing the company, it is essential to use this type of tool. This allows you to protect yourself as much as possible from any attack and react quickly if the system is ever affected. 

How does it work?

By using computer security software, the threat detection process becomes automated. The same applies to the detection of viruses and malicious attacks. Once all these infections have been detected, a few programs integrated into the software support their resolution before the system is affected. Many functionalities are provided by these tools, including web control, applications used on the computer or mobile devices. 

What are the main features of SaaS computer security software? 

File protection 

For companies, ransomwares are among their greatest enemies. The latter encrypt all their data and keep it until they receive a ransom. In this case, companies cannot access any of their files, completely stopping their production. By using computer security software, structures will have a tool capable of intercepting ransomware and blocking all types of threats. 

User authentication 

This feature is intended to ensure the identity of each profile browsing a terminal. Who has access to the files? Does he have the right to do so? The software controls all access by means of a password to be encrypted, for example. This will prevent unwanted intrusions and therefore threats to the system.

Only authorized persons can therefore access the files.  

Sending alerts 

In general, the software asks managers to define different events to report in case of suspicious access. It can be a file deletion, a download of large data or simply access to a specific document. All these actions are detected by the tool and sent to the company's IT departments. The latter can therefore decide whether or not the action was authorized. This will allow them to react immediately if there is a security breach.  

Activity records 

Depending on the previous functionality, this one offers the archiving of activities done within the company. The software generates logs that can be consulted at any time on these actions as well as all those performed on computer systems. The goal is to know precisely who does what and when.

It is a tool for monitoring staff.  

Who uses computer security software?

Computer security software protects your computer from all potential threats. It can be a virus, hacking or ransomware. All the structures concerned by these problems can use this type of solution to avoid the immediate cessation of their activities or even the permanent destruction of their computer systems. Some software is also suitable for auto-entrepreneurs wishing to protect their data, as well as for individuals.   

Why use computer security software in a company? 

Advantages

  • The user can receive reports on access to all files and directories, providing visibility into all IT activities within the company.
  • Protecting your computer effectively becomes easy, even for beginners 
  • It allows malware to be detected quickly, which optimizes the company's IT security.  

Disadvantages 

  • Free software offers incomplete security operations 

How to choose online computer security software?

  • The quality of alerts: for these tools to be effective, it is essential that the alerts sent are usable and of good quality. Otherwise, the chances of the system being affected are relatively high.  
  • The ability to detect anomalies: the speed of the software to detect intrusions will determine its performance. Indeed, the more easily threats are intercepted, the lower the risk of harm. 
  • Price: computer security software does not have to be expensive to be effective. It is just a matter of finding a tool that can meet the user's expectations. 

The best free and open-source computer security software

  • TrueCrypt
  • Amanda
  • Areca Backup 
  • PacketFence
  • SmoothWall

The most popular computer security software 

For self-entrepreneurs, freelancers and self-employed people

  • FileAudit
  • SolarWinds
  • Zmanda

For VSEs 

  • Spyware Defender
  • Malwarebytes
  • Ad-Aware

For SMEs

  • Kaspersky
  • Glary Utilities
  • RogueKiller

In a world where hacking is on the rise, cybersecurity software is strongly recommended to analyze and interpret all potential alerts that weigh on your system. These solutions protect both users' files and the proper functioning of their daily activities. 

Computer Security softwares: Q&A

How does a computer security software work?

chevron-right

Computer security software works by detecting and protecting against potential threats such as viruses, malware, and spyware. It typically scans your computer files and network traffic to identify any suspicious activity and prevent it from causing harm.

What features should I look for when looking for computer security software?

chevron-right

Look for computer security software with features such as real-time protection, anti-phishing, anti-spam, firewall, and automatic updates. A good software should also have a user-friendly interface and provide easy-to-understand reports on its performance.

What are the benefits of computer security for my company?

chevron-right

Computer security software helps protect your company's sensitive data from cyber-attacks, which can lead to financial loss, reputational damage, and legal liabilities. It also helps ensure compliance with industry regulations and enhances customer trust.

What are the best computer security software options?

chevron-right

Some of the best computer security software options include Norton Security, McAfee Total Protection, Kaspersky Total Security, and Bitdefender Antivirus Plus. These software options offer comprehensive protection against various types of cyber threats.

What are the free computer security software alternatives I could try?

chevron-right

Some free computer security software alternatives include Avast Free Antivirus, AVG Antivirus Free, and Microsoft Defender. These options provide basic protection against viruses and malware, but may not offer the same level of comprehensive protection as paid software options.