The Best 2735 Security Alternatives

  • Batch File Encryptor icon

    Batch File Encryptor

    Encrypt and decrypt whole files or their parts using AES, 3-DES, RC2, and DES symmetric algorithms. You can encrypt files with a single password or specify cryptographic...

  • SSL Enforcer icon

    SSL Enforcer

    SSL Enforcer - Force SSL/TLS encryption for any browser or app. Block all unsecure connections. Today any network activity involves a number of requests to the web....

  • Nexpose icon

    Nexpose

    Learn about our vulnerability management software, Nexpose. See how our vulnerability scanner prioritizes vulnerabilities and speeds up remediation.

  • Pyruse icon

    Pyruse

    Light-weight and extra-configurable peruser of systemd journal logs: ban IP, send immediate email, daily report… all based on a single JSON configuration file.

  • HeatShield icon

    HeatShield

    HeatShield is a network firewall management service and SSH brute force blocker for Linux servers.

  • e.guardo Smart Defender icon

    e.guardo Smart Defender

    e.guardo protects your RDP, MSSQL, FTP, SMTP, EXCHANGE, OWA, LYNC, MICROSOFT DYNAMICS CRM, SHAREPOINT and many more services from Brute Force and Dictionary Attacks

  • Hacked Leaks Checker icon

    Hacked Leaks Checker

    Check account security issues related to stolen data that could allow hackers to violate your private data.

  • ScreenWings icon

    ScreenWings

    ScreenWings helps stop dangerous loggers from spying. FEATURES * protect up to six screens * very stable and portable application * minimalistic user interface...

  • GuardedID icon

    GuardedID

    GuardedID takes a proactive approach to stopping malicious keylogging programs by encrypting every keystroke at the point of typing the keys, and rerouting those...

  • Check Point Endpoint Security icon

    Check Point Endpoint Security

    Check Point is a leader in network security software, firewall solutions, VPN solutions, endpoint security, network protection, security management, data protection and...

  • RootkitRevealer icon

    RootkitRevealer

    RootkitRevealer is an advanced rootkit detection utility. It runs on Windows NT 4 and higher and its output lists Registry and file system API discrepancies that may...

  • Vba32 AntiRootkit icon

    Vba32 AntiRootkit

    Vba32 AntiRootkit is designed to analyze the computer for the anomalies that arise due to the presence of malware in the system. Due to this, you will be able to detect...

  • tallow icon

    tallow

    Tallow is a fail2ban/lard replacement that uses systemd's native journal API to scan for attempted ssh logins, and issues temporary IP bans for clients that violate...

  • Redborder icon

    Redborder

    redborder is an Open Source, Big Data cybersecurity and traffic analysis platform accompanied by a set of active probes managed in an integrated manner. Can be deployed...

  • Virtual Access Point icon

    Virtual Access Point

    Share your Internet through Wi-Fi. Virtual AP is an easy-to-use software, that turns any LAN-connected PC or laptop into a Wi-Fi wireless access point. So anyone...

  • Ethtool icon

    Ethtool

    ethtool - utility for controlling network drivers and hardware

  • RapidSupport icon

    RapidSupport

    RapidSupport allows you to effortlessly support your clients no matter where they are located! It works through most firewalls and routers without any special...

  • Okta icon

    Okta

    Provide secure identity management and single sign-on to any application, whether in the cloud, on-premises or on a mobile device for your employees, partners and...

  • Keycloak icon

    Keycloak

    Open Source Identity and Access Management for modern Applications and Services.

  • IDM365 icon

    IDM365

    IDM365 is a suite of processes and tools that provide easy implementation and continued maintenance of identity and access management roles. IDM365 follows the...