---
description: Page 4 - Discover the best Network Security Software for your organisation. Compare top Network Security Software tools with customer reviews, pricing and free demos.
image: https://gdm-localsites-assets-gfprod.imgix.net/images/software_advice/og_logo-55146305bbe7b450bea05c18e9be9c9a.png
title: Page 4 - Best Network Security Software - 2026 Reviews, Pricing & Demos
---

Breadcrumb: [Home](/) > [Network Security Software](https://www.softwareadvice.co.uk/directory/4170/network-security/software) > [Page 4](https://www.softwareadvice.co.uk/directory/4170/network-security/software?page=4)

# Network Security Software

Canonical: https://www.softwareadvice.co.uk/directory/4170/network-security/software

Page: 4 / 11\
Prev: [Previous page](https://www.softwareadvice.co.uk/directory/4170/network-security/software?page=3)\
Next: [Next page](https://www.softwareadvice.co.uk/directory/4170/network-security/software?page=5)

-----

## Products

1. [Black Duck](https://www.softwareadvice.co.uk/software/264429/black-duck-hub) — 4.3/5 (31 reviews) — From small businesses to large enterprises, the amount of open source code being used in software applications today ...
2. [Coro](https://www.softwareadvice.co.uk/software/287338/coronet) — 4.6/5 (30 reviews) — Coro is a cybersecurity solution that helps businesses in various industrial verticals including IT, healthcare, tran...
3. [GateKeeper Enterprise](https://www.softwareadvice.co.uk/software/183910/gatekeeper-enterprise) — 5.0/5 (30 reviews) — Shared computer access control with 2FA and automatic user-switching. Login to shared computers using phoneless-2FA a...
4. [Dark Web ID](https://www.softwareadvice.co.uk/software/426822/dark-web-id) — 3.7/5 (30 reviews) — Designed for MSP and internal teams, Dark Web ID is a cloud-based threat monitoring solution that protects organizati...
5. [Cloudbric](https://www.softwareadvice.co.uk/software/129844/cloudbric) — 4.6/5 (29 reviews) — Cloudbric is a cloud-based web security provider, offering a web application firewall (WAF), DDoS protection and SSL....
6. [CyberArk Privileged Access Management Solutions](https://www.softwareadvice.co.uk/software/398430/cyberark-privilege) — 4.3/5 (27 reviews) — Cyberark Privilege is designed to help businesses across banking, federal, insurance and healthcare industries contro...
7. [SiteLock](https://www.softwareadvice.co.uk/software/112461/sitelock) — 3.3/5 (27 reviews) — SiteLock is a cloud-based security platform, which helps accelerate website performance, conversions and protects the...
8. [Invicti](https://www.softwareadvice.co.uk/software/174628/netsparker-security-scanner) — 4.7/5 (26 reviews) — Invicti is an application security platform designed to identify, validate and prioritize vulnerabilities in web appl...
9. [Heimdal DNS Security](https://www.softwareadvice.co.uk/software/372292/heimdal-threat-prevention) — 4.8/5 (26 reviews) — Heimdal Threat Prevention is an advanced DNS security solution that adds hunting on top of traditional endpoint detec...
10. [ManageEngine Log360](https://www.softwareadvice.co.uk/software/435342/manageengine-log360) — 4.7/5 (26 reviews) — Log360 is a SIEM or security analytics solution that helps you combat threats on premises, in the cloud, or in a hybr...
11. [Radware Bot Manager](https://www.softwareadvice.co.uk/software/231925/shieldsquare-bot-prevention) — 4.6/5 (24 reviews) — Radware Bot Manager (formerly SheildSquare) is a security solution that provides websites with protection from bots, ...
12. [ManageEngine Password Manager Pro](https://www.softwareadvice.co.uk/software/376425/manageengine-password-manager-pro) — 4.3/5 (23 reviews) — ManageEngine Password Manager Pro is an enterprise-grade privileged password management solution. It securely stores ...
13. [Rublon](https://www.softwareadvice.co.uk/software/235282/rublon) — 4.7/5 (23 reviews) — Rublon provides cloud-based multi-factor authentication (MFA) for your workforce. Use Rublon to enable secure local a...
14. [Netsurion](https://www.softwareadvice.co.uk/software/134470/eventtracker) — 3.6/5 (23 reviews) — Netsurion Managed Threat Protection provides the necessary synergy between people, process, and technology to truly d...
15. [ITarian](https://www.softwareadvice.co.uk/software/149941/itarian) — 3.8/5 (23 reviews) — ITarian is a cloud-based IT and remote access management solution designed to help organizations connect with clients...
16. [Electric AI](https://www.softwareadvice.co.uk/software/380630/electric-ai) — 3.7/5 (23 reviews) — Electric is revolutionizing business IT management. Electric offers businesses a 50% decrease in IT cost and uniform ...
17. [KACE](https://www.softwareadvice.co.uk/software/364128/kace) — 4.0/5 (23 reviews) — KACE® by Quest supports your unified endpoint management (UEM) strategy by helping you discover and track every devic...
18. [Red Sentry](https://www.softwareadvice.co.uk/software/334574/red-sentry) — 4.8/5 (22 reviews) — Red Sentry provides penetration testing services designed for organizations that want clear, practical insight into t...
19. [vRx](https://www.softwareadvice.co.uk/software/185131/topia) — 4.9/5 (22 reviews) — \&lt;-- Patch Everything You Need --\&gt; Automatically or manually install all prioritized updates for which a patch i...
20. [Hackrate](https://www.softwareadvice.co.uk/software/329884/hackrate-bug-bounty-platform) — 5.0/5 (21 reviews) — Hackrate Bug Bounty platform helps organizations to identify software vulnerabilities in a cost-efficient way. A bug ...
21. [RoboShadow](https://www.softwareadvice.co.uk/software/357317/robo-shadow-cyber-platform) — 5.0/5 (21 reviews) — RoboShadow is a full security management platform built to be Free / Ultra Low Cost but deliver enterprise grade Vuln...
22. [NG Firewall](https://www.softwareadvice.co.uk/software/240333/ng-firewall) — 4.8/5 (20 reviews) — NG Firewall is a cloud-based network security solution that helps businesses monitor network activities and view the ...
23. [Specops Password Auditor](https://www.softwareadvice.co.uk/software/57890/specops-password-auditor) — 4.8/5 (20 reviews) — Specops Password Auditor is a password audit tool that can identify password-related vulnerabilities within Active Di...
24. [Darktrace](https://www.softwareadvice.co.uk/software/307875/darktrace) — 4.5/5 (20 reviews) — Darktrace is a global leader in AI for cybersecurity that keeps organizations ahead of the changing threat landscape ...
25. [Constellix](https://www.softwareadvice.co.uk/software/305090/constellix) — 4.8/5 (19 reviews) — DNS is no longer a simple point-and-click domain management service. It has evolved into a critical optimization tool...

-----

Page: 4 / 11\
Prev: [Previous page](https://www.softwareadvice.co.uk/directory/4170/network-security/software?page=3)\
Next: [Next page](https://www.softwareadvice.co.uk/directory/4170/network-security/software?page=5)

## Related Categories

- [Cloud Security Software](https://www.softwareadvice.co.uk/directory/4329/cloud-security/software)
- [Computer Security Software](https://www.softwareadvice.co.uk/directory/4528/security/software)
- [Network Monitoring Tools](https://www.softwareadvice.co.uk/directory/4307/network-monitoring/software)
- [Endpoint Protection Software](https://www.softwareadvice.co.uk/directory/4777/endpoint-protection-software/software)
- [Vulnerability Management Software](https://www.softwareadvice.co.uk/directory/4286/vulnerability-management/software)

## Links

- [View on SoftwareAdvice](https://www.softwareadvice.co.uk/directory/4170/network-security/software)
- [All Categories](https://www.softwareadvice.co.uk/directory)

-----

## Structured Data

<script type="application/ld+json">
  {"@context":"https://schema.org","@graph":[{"name":"SoftwareAdvice UK","address":{"@type":"PostalAddress","addressLocality":"Egham","addressRegion":"ENG","postalCode":"TW20 9AH","streetAddress":"Tamesis, The Glanty, Staines-upon-Thames Egham TW20 9AH United Kingdom"},"description":"Software Advice helps businesses in the UK find the best software with confidence. Compare software options and learn more from our research and user reviews.","email":"info@softwareadvice.co.uk","url":"https://www.softwareadvice.co.uk/","logo":"https://dm-localsites-assets-prod.imgix.net/images/software_advice/logo-white-d2cfd05bdd863947d19a4d1b9567dde8.svg","@id":"https://www.softwareadvice.co.uk/#organization","@type":"Organization","parentOrganization":"Gartner, Inc.","sameAs":[]},{"name":"SoftwareAdvice UK","url":"https://www.softwareadvice.co.uk/","@id":"https://www.softwareadvice.co.uk/#website","@type":"WebSite","publisher":{"@id":"https://www.softwareadvice.co.uk/#organization"},"potentialAction":{"query":"required","target":"https://www.softwareadvice.co.uk/search/?q={search_term_string}","@type":"SearchAction","query-input":"required name=search_term_string"}},{"name":"Network Security Software","description":"Page 4 - Discover the best Network Security Software for your organisation. Compare top Network Security Software tools with customer reviews, pricing and free demos.","url":"https://www.softwareadvice.co.uk/directory/4170/network-security/software?page=4","about":{"@id":"https://www.softwareadvice.co.uk/directory/4170/network-security/software?page=4#itemlist"},"breadcrumb":{"@id":"https://www.softwareadvice.co.uk/directory/4170/network-security/software?page=4#breadcrumblist"},"@id":"https://www.softwareadvice.co.uk/directory/4170/network-security/software?page=4#webpage","@type":["WebPage","CollectionPage"],"isPartOf":{"@id":"https://www.softwareadvice.co.uk/#website"},"inLanguage":"en-GB","mainEntity":{"@id":"https://www.softwareadvice.co.uk/directory/4170/network-security/software?page=4#itemlist"},"publisher":{"@id":"https://www.softwareadvice.co.uk/#organization"}},{"@id":"https://www.softwareadvice.co.uk/directory/4170/network-security/software?page=4#breadcrumblist","@type":"BreadcrumbList","itemListElement":[{"name":"Home","position":1,"item":"/","@type":"ListItem"},{"name":"Network Security Software","position":2,"item":"https://www.softwareadvice.co.uk/directory/4170/network-security/software","@type":"ListItem"},{"name":"Page 4","position":3,"item":"https://www.softwareadvice.co.uk/directory/4170/network-security/software?page=4","@type":"ListItem"}]}]}
</script><script type="application/ld+json">
  {"name":"Page 4 - Best Network Security Software - 2026 Reviews, Pricing &amp; Demos","@context":"https://schema.org","@id":"https://www.softwareadvice.co.uk/directory/4170/network-security/software?page=4#itemlist","@type":"ItemList","itemListElement":[{"name":"Black Duck","position":1,"description":"From small businesses to large enterprises, the amount of open source code being used in software applications today is increasing substantially. Black Duck is the industry's leading solution for open source management and license compliance. The comprehensive  Black Duck Knowledge Base contains over 4.5 million open source projects and 2,750 open source licenses, enabling our software to identify and mitigate critical risks in your applications and containers. Black Duck finds vulnerabilities and provides specific remediation guidance for eliminating these risks. In addition to source code, Black Duck Binary Analysis scans binary code for open source components. The tool continues to automatically monitor for new vulnerabilities that emerge throughout the development life cycle. For developers, security personnel, and legal teams alike, Black Duck provides the most complete security coverage and license compliance in the industry.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/87dcb539-5cd1-4a3a-81c1-2fcf60604328.jpeg","url":"https://www.softwareadvice.co.uk/software/264429/black-duck-hub","@type":"ListItem"},{"name":"Coro","position":2,"description":"Coro is a cybersecurity solution that helps businesses in various industrial verticals including IT, healthcare, transportation, and legal services secure devices, users, and data against online threats via a unified portal. The application automatically identifies and blocks phishing attempts across public networks, emails and applications’ access/share requests.\n\nCoro allows organizations to manage access to practice and confidential data and enforce compliance with security and governance policies. It offers a host of features such as a centralized dashboard, reports, threat monitoring, real-time notification and more. Additionally, administrators can define default actions like restoration/deletion of quarantined files and monitor activities of users across departments. \n\nCoro’s integrated ransomware and malware detection system automatically scans and quarantines documents, emails and cloud apps like Microsoft 365, Dropbox and Salesforce. It is available for free and on monthly/annual subscriptions. Support is provided via phone, email and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/b7bb65fb-d004-4062-bff9-6fa16d33474d.png","url":"https://www.softwareadvice.co.uk/software/287338/coronet","@type":"ListItem"},{"name":"GateKeeper Enterprise","position":3,"description":"Shared computer access control with 2FA and automatic user-switching. Login to shared computers using phoneless-2FA and automatically lock computers. If a new user logs in with the same account, the solution will automatically start a new session and log out the previous user's session. All with automatic computer lock when users leave. Perfect for high-tempo environments. \n\nGateKeeper Enterprise is a proximity-based access control solution that helps businesses minimize unauthorized data exploitation via user authentication, password management and more. Professionals can utilize the admin console to manage access control lists for specific devices, assign users to workstations and deploy various security policies such as two-factor authentication across the system.\n\n\nGatekeeper Enterprise allows organizations to monitor ongoing activities and maintain audit logs in compliance with industry regulations. Managers can provide employees with wireless access keys/tokens to unlock assigned system devices and automate the login process. Additionally, it lets users track the location of network devices and generate analytical reports. \n\n\nGatekeeper Enterprise comes with an administrative dashboard, which enables businesses to view real-time event logs and filter data based on credentials, computers or activity. Pricing is based on the number of users and support is extended via phone, email and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/fb1ed6b7-9294-4aa8-a6a5-aadc0e23d6c0.png","url":"https://www.softwareadvice.co.uk/software/183910/gatekeeper-enterprise","@type":"ListItem"},{"name":"Dark Web ID","position":4,"description":"Designed for MSP and internal teams, Dark Web ID is a cloud-based threat monitoring solution that protects organizations from cybersecurity breaches on the dark web. Dark Web ID monitors the dark web for threat intelligence about stolen credentials and organizational data to help businesses identify potential security breaches. Features include threat monitoring and response, real-time data analysis and validation, security alerts, and more.\n\n\nDark Web ID assists MSP and internal IT teams with monitoring the transfer of stolen credentials across hidden chat rooms, private websites, P2P networks, social media platforms, black market sites, and more. With threat response, Dark Web IT will alert organizations when customer or employee credentials are found and take the necessary action to inform teams before any breaches occur.\n\n\nDark Web ID provides flexible threat reporting and is able to integrate with third-party cybersecurity platforms using an integrated API.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/6de1646f-1b5d-40f7-ada6-4494ba1c0a0c.png","url":"https://www.softwareadvice.co.uk/software/426822/dark-web-id","@type":"ListItem"},{"name":"Cloudbric","position":5,"description":"Cloudbric is a cloud-based web security provider, offering a web application firewall (WAF), DDoS protection and SSL. Its comprehensive set of security services protect against vulnerabilities including cyberattacks, data leakage, website vandalism and Distributed Denial of Service (DDoS) attacks, all of which can cause data loss or downtime.\n\n\nCloudbric is especially suitable for content management system (CMS) users working with WordPress, Drupal and Zoomla, as well as coding-based websites.\n\n\nCloudbric requires no hardware, and subscribers only need to change their DNS information. In addition, the payment plan is based on traffic bandwidth, not by security features.  Customers receive free servicing for up to 4GB monthly traffic.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/2fe575dd-bf61-428b-a92d-fe1d4994b1ac.png","url":"https://www.softwareadvice.co.uk/software/129844/cloudbric","@type":"ListItem"},{"name":"CyberArk Privileged Access Management Solutions","position":6,"description":"Cyberark Privilege is designed to help businesses across banking, federal, insurance and healthcare industries control access for administrative and privileged accounts. The application enables organizations to reduce information leaks, assess risks and generate custom reports via a unified platform.\n\n\nIt lets administrators prevent unauthorized users from accessing privileged account credentials using access control capability. Cyberark Privilege allows supervisors to synchronize users’ privileged account passwords and SSH keys across multiple devices including smartphones, tablets or PCs. Additionally, it offers a host of features such as onboarding, permissions management, task tracking, configurable workflows, threat detection and analytics.\n\n\nCyberark Privilege comes with an API, which facilitates integration with several third-party platforms, such as ServiceNow, OneLogin, Docker Cloud, SAP, Splunk, Workday and more. Pricing is available on request and support is extended via phone, email and documentation.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/e64cd799-8ecc-42d4-ad8c-c52ef4914cdd.png","url":"https://www.softwareadvice.co.uk/software/398430/cyberark-privilege","@type":"ListItem"},{"name":"SiteLock","position":7,"description":"SiteLock is a cloud-based security platform, which helps accelerate website performance, conversions and protects the online business against hackers. Designed for all industries, the platform provides solutions for vulnerability management, database protection and compliance maintenance across all applications.\n\n\nKey features of SiteLock include search engine monitoring and spam blacklists, detecting malware and automatically initiating the removal process, protection of the WordPress database and vulnerability patching of core client management systems.\n\n\nSiteLock’s TrueCode (SAST), static application security testing module, helps find common vulnerabilities in all applications with in-depth analysis. Its TrueShield Web Application Firewall (WAF) filters out malicious traffic and prevents attacks. The software offers compatibility with any hosting environment and maintains compliance with Payment Card Industry (PCI) data security standards.\n\n\nSiteLock allows application programming interface (API) integration and comes with an iOS mobile application. It is available on a monthly subscription and extends 24/7 customer support via phone, email, chat.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/6dc6f5dd-7237-4f5c-a5cf-b4098df41023.png","url":"https://www.softwareadvice.co.uk/software/112461/sitelock","@type":"ListItem"},{"name":"Invicti","position":8,"description":"Invicti is an application security platform designed to identify, validate and prioritize vulnerabilities in web applications and APIs. It incorporates Application Security Posture Management capabilities to support security operations across large application portfolios. The platform is used by organizations in sectors such as government, IT, telecommunications, financial services and healthcare to help maintain compliance standards and manage security at scale.\n\nThe platform includes Dynamic Application Security Testing, Static Application Security Testing, Software Composition Analysis, container security scanning and API security testing. Its scanning engine validates detected vulnerabilities to confirm they are exploitable. It identifies websites, applications, APIs and hidden assets within an organization and prioritizes high-risk applications for testing. The Application Security Posture Management feature consolidates findings from various security tools, providing a centralized view for vulnerability management and risk assessment.\n\nInvicti offers AI-powered remediation guidance, identifying the exact code locations of vulnerabilities and providing detailed resolution steps for developers. It supports integration with various development and security tools through a REST API and is compatible with CI/CD pipelines and DevOps workflows. The platform includes flexible deployment options and role-based access control to manage security across extensive application environments while maintaining accuracy and performance.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/d386ac3d-34c6-4fa7-a326-728dc8167276.png","url":"https://www.softwareadvice.co.uk/software/174628/netsparker-security-scanner","@type":"ListItem"},{"name":"Heimdal DNS Security","position":9,"description":"Heimdal Threat Prevention is an advanced DNS security solution that adds hunting on top of traditional endpoint detection and response. It achieves this by filtering traffic at the levels of the DNS, HTTP, and HTTPS on both your endpoints and your network. \nDesigned to enrich any existing antivirus, Heimdal Threat Prevention goes beyond standard signature-based detection. Its machine learning-powered capabilities allow it to spot both known and unknown malware strains for complete protection against cyberattacks.  With as much as 97% of malware being polymorphic these days, this is particularly important in a successful digital security strategy. \nThrough proprietary DarkLayer GUARD and VectorN Detection technologies, Heimdal Threat Prevention allows you to gain code-autonomous protection against multiple attack vectors. This includes data leaks, network malware, and even ransomware. \nDarkLayer GUARD adds advanced endpoint and network traffic filtering capabilities paired with a unique Threat to Process Correlation (TTPC) feature that allows you to identify threats, regardless of whether they are a user or a process. VectorN Detection with the AI component that adds machine learning-driven intelligence to the pre-existing attack vector database. \nTo give you all-around protection, Heimdal Threat Prevention is available in both Endpoint and Network modules. These can be installed either separately depending on what layer of protection you need, or as a package deal. \nOn the one hand, Heimdal Threat Prevention Endpoint is an advanced DNS filtering tool that can detect and stop DNS hijacking, exploits, and other related cyberattacks. It also allows your sysadmins to block web content depending on certain categories, such as Adult, Social Media, and more. In this way, company-owned devices will remain secure even when employees are working remotely and connect to unsecured Wi-Fi networks. \nHeimdal Threat Prevention Network on the other hand is built to protect your organization’s online perimeter. By using artificial intelligence and logging traffic, the module can spot hidden threats without the need to install any solutions on company endpoints. This comes in handy when employees are bringing their own and potentially compromised devices into the office.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/8b30f433-b55c-4ed8-99be-0b82a71721e5.png","url":"https://www.softwareadvice.co.uk/software/372292/heimdal-threat-prevention","@type":"ListItem"},{"name":"ManageEngine Log360","position":10,"description":"Log360 is a SIEM or security analytics solution that helps you combat threats on premises, in the cloud, or in a hybrid environment. It also helps organizations adhere to compliance mandates such as PCI DSS, HIPAA, GDPR and more. You can customize the solution to cater to your unique use cases and protect your sensitive data.\n\nWith Log360, you can monitor and audit activities that occur in your Active Directory, network devices, employee workstations, file servers, databases, Microsoft 365 environment, cloud services and more. Log360 correlates log data from different devices to detect complex attack patterns and advanced persistent threats. The solution also comes with a machine learning based behavioral analytics that detects user and entity behavior anomalies, and couples them with a risk score. The security analytics are presented in the form of more than 1000 pre-defined, actionable reports. Log forensics can be performed to get to the root cause of a security challenge.\n\nThe built-in incident management system allows you to automate the remediation response with intelligent workflows and integrations with popular ticketing tools.\n\nThe solution can be installed on-premises and is also available on the cloud as Log360 Cloud.  Support is offered via phone, email and other online resources.\n\nFeatures include:\n- Identify malicious communications with blacklisted IPs, URLs, and domains by corroborating data from threat intelligence services.\n- Monitor widely-used public cloud platforms, including Amazon Web Services (AWS), Microsoft Azure, and Salesforce.\n-  Monitor file and folder creation, deletion, modification, and permission changes in Windows file servers, NetApp file servers, EMC file servers, Linux and more.\n- Monitor and audit critical Active Directory changes in real time.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/da71bee5-cb9b-4189-af5f-2d22ba015486.png","url":"https://www.softwareadvice.co.uk/software/435342/manageengine-log360","@type":"ListItem"},{"name":"Radware Bot Manager","position":11,"description":"Radware Bot Manager (formerly SheildSquare) is a security solution that provides websites with protection from bots, web scraping, content theft, and spam. The solution uses machine learning to detect and mitigate new threats from bots.\n\nRadware Bot Manager protects websites and mobile apps by building signatures for each unique visitor and monitoring for suspicious activity. Fingerprints are built for each unique visitor as they browse to distinguish genuine users from potential security threats.\n\nThe system classifies visitors as human, a bot, or search engine crawler based on bot detection tests done on historical website traffic. Plugins for WordPress and Drupal are available.\n\nRadware Bot Manager pricing is based on the number of page views.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/ea426faf-e188-4a4b-82b5-9ccc038b352b.jpeg","url":"https://www.softwareadvice.co.uk/software/231925/shieldsquare-bot-prevention","@type":"ListItem"},{"name":"ManageEngine Password Manager Pro","position":12,"description":"ManageEngine Password Manager Pro is an enterprise-grade privileged password management solution. It securely stores and manages sensitive information such as shared passwords, documents, and digital identities. Password Manager Pro is a complete solution to control, manage, monitor, and audit the entire life cycle of privileged access. In a single package, it offers three solutions - privileged account management, remote access management, and privileged session management.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/b277f6af-1b08-4a21-a0d9-861949693d0f.jpeg","url":"https://www.softwareadvice.co.uk/software/376425/manageengine-password-manager-pro","@type":"ListItem"},{"name":"Rublon","position":13,"description":"Rublon provides cloud-based multi-factor authentication (MFA) for your workforce. Use Rublon to enable secure local and remote access to networks, servers and applications. SMBs and enterprises use Rublon to protect their information and to comply with data protection regulations like HIPAA and GDPR.\n\nRublon's numerous connectors allow you to enable MFA with almost any technology used in your business: VPNs (Array Barracuda, AWS, Check Point, Cisco, Citrix, F5, Fortinet, OpenVPN, Palo Alto, Pulse Connect, SonicWall, Sophos), RDP, RDS (RD Gateway & Web Access), Windows Logon, SSH, Linux Desktop, any cloud application via SAML as well as on-premise apps.\n\nUse Active Directory or OpenLDAP as an identity provider for all your MFA logins.\n\nEnable one-click access to cloud applications using Rublon's SSO Portal.\n\nVerify user logins using software- and hardware-based authentication methods: U2F/WebAuthn Security Keys, Mobile Push, Mobile Passcode (TOTP), SMS Passcode, Email Link. Rublon Authenticator is required for Mobile Push and Mobile Passcode (available for iPhone and Android).\n\nUse Rublon's Admin Console to set global and application-specific policies that define available authentication methods, authorized networks and remembered devices.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/5d6c6ce5-0987-4c60-8285-b631e15eacdc.png","url":"https://www.softwareadvice.co.uk/software/235282/rublon","@type":"ListItem"},{"name":"Netsurion","position":14,"description":"Netsurion Managed Threat Protection provides the necessary synergy between people, process, and \ntechnology to truly deliver world-class cybersecurity today. What does this mean to you and your business? \nTo be covered today, you have to prevent, detect, and respond to active threats and even predict future \nattacks before they happen. Yet even more than ever, your business relies on digital and remote capabilities. You \nneed to run fast and lean but cannot afford to risk gaps in cybersecurity.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/7425e21c-45d3-4792-a80a-eaf5f6229329.png","url":"https://www.softwareadvice.co.uk/software/134470/eventtracker","@type":"ListItem"},{"name":"ITarian","position":15,"description":"ITarian is a cloud-based IT and remote access management solution designed to help organizations connect with clients/employees to monitor devices, troubleshoot issues and handle operations. The patch management functionality lets administrators remotely scan operating systems and install updates.\n\n\nITarian offers remote monitoring and management functionality, which assists professionals with keeping a track of device status, performance and active resources using built-in wizards and a centralized dashboard. Features include remote file access, audit logs, white-label capabilities, file transfer, role-based access and multiple user groups. Additionally, users can handle remote devices, mange processes and browse folders or files across connected devices.\n\n\nTicket management module in ITarian assists managers with designing custom workflows to streamline various operations such as responding to customer queries, assigning tickets to agents and escalating issues. It is available as a free version and annual subscriptions. Support is provided via phone, email, and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/e8d859b2-c7bc-4d24-b459-ed6d4b0ffd91.png","url":"https://www.softwareadvice.co.uk/software/149941/itarian","@type":"ListItem"},{"name":"Electric AI","position":16,"description":"Electric is revolutionizing business IT management. Electric offers businesses a 50% decrease in IT cost and uniform security across devices, apps, and networks, whether you're on-site or remote. Electric provides real-time IT help to 50,000 users and centralized IT administration to over 900 customers.\n\nReduce the amount of time spent on onboarding chores from 8 to 7 minutes and help new team members succeed right away. Manage the functionality of your systems, networks, and software from a single spot. Electric can provide you with proactive ideas, so you won't have to go through it alone.\n\nGive your team access to the approximately 200 IT specialists who make up Electric's elite IT squadron. Less than 10 minutes passed before the first response. Time to start a massive project? Whether you're contemplating an office transfer or working on ISO certification, Electric is on it.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/b7ff74a2-312b-4322-b158-613c24e7deb1.png","url":"https://www.softwareadvice.co.uk/software/380630/electric-ai","@type":"ListItem"},{"name":"KACE","position":17,"description":"KACE® by Quest supports your unified endpoint management (UEM) strategy by helping you discover and track every device in your environment, automate administrative tasks, keep compliance requirements up-to-date and secure your network from a range of cyberthreats. Discover, manage and secure all your endpoints from one console as you co-manage your traditional and modern endpoints, including Windows, Mac, Linux, ChromeOS, and iOS and Android devices. \n\nDesigned for those seeking simplified total endpoint management: Inventory, service desk, asset management, license compliance, security, mobility, and more. 50 devices? 50,000? KACE does that. KACE Unified Endpoint Manager unites traditional endpoint management with modern management in a shared intuitive interface. \n\nVisibility\nGet a complete inventory of all devices accessing your network and easily address security risks. How? Agentlessly, Agent-based, Modern Managed - KACE does it all.\n\nDevices\nSupport a range of device types for users working from home, on the go or in the office. Windows, Mac, Linux, iOS, Android, ChromeOS. \n\nAutorenew\nUse automated features to reduce IT team stress and limit impact to your users’ workflow.\n\nDeployment and discovery\nEasily scan for devices hitting your network and quickly deploy ready-to-use devices directly from the vendor.\n\nGranular inventory\nAccess a detailed inventory of data on every device in your environment, using either traditional or modern management.\n\nFlexible configuration\nDefine specific policies and administrative functions that can be applied to a single device or group of devices.\n\nApplication distribution\nAutomatic track, deploy and maintain current versions on software, keeping your environment secure and compliant.\n\nPatch management\nSecure your environment using minimal resources with set-it-and-forget-it patch identification and deployment.\n\nPowerful mobile device control\nRemotely locate, lock, erase or factory reset any enrolled mobile device.\n\nApp store integration\nProvision and deploy required apps from the store or those developed in-house according to enterprise distribution programs. Manually or automatically identify out-of-date apps and push updates.\n\nReporting\nUse existing templates or build ad-hoc reports on your entire endpoint fleet or just a subset of devices. Format reports to meet any compliance or organizational needs.\n\nBuilt-in help desk\nEnable users to easily report endpoint issues and quickly get a resolution, reducing the impact to their workflow and streamlining IT efforts.\n\nComprehensive device coverage\nFully manage all operating systems as well as printers, projectors, IoT devices and more from a single console.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/30ec5e4a-8d78-42f3-ae66-3a8b2687d3b9.png","url":"https://www.softwareadvice.co.uk/software/364128/kace","@type":"ListItem"},{"name":"Red Sentry","position":18,"description":"Red Sentry provides penetration testing services designed for organizations that want clear, practical insight into their security posture. Instead of relying solely on automated tools, Red Sentry uses experienced ethical hackers to simulate real-world attacks and determine whether vulnerabilities can actually be exploited.\n\nThis approach helps teams move beyond long lists of scanner findings and focus on issues that pose meaningful risk to the business. Testing can be performed across applications, APIs, cloud infrastructure, and networks, with results documented in structured reports that explain impact, severity, and recommended next steps.\n\nRed Sentry is commonly used by security, IT, and compliance teams that need defensible testing results to support internal decision-making, customer assurance, and regulatory requirements such as SOC 2 or ISO 27001.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/394d0ea1-a32b-4c88-b6f6-14d618fdffab.png","url":"https://www.softwareadvice.co.uk/software/334574/red-sentry","@type":"ListItem"},{"name":"vRx","position":19,"description":"<-- Patch Everything You Need -->\nAutomatically or manually install all prioritized updates for which a patch is available across your OS and Apps. Focus on the vulnerabilities that have a real probability of being exploited instead of solving problems that don’t exist.\n\n<-- Close Security Gaps -->\nvRx's Patchless Protection reduces the risk of a security breach even if a patch is not available. Using in-memory protection, vRx deploys a force-field around vulnerable applications so you can keep unpatched applications secure.\n\n<-- Boost the Security of Your Remote Workforce -->\nvRx provides a cloud-based, real-time inventory that gives you a full catalogue of your endpoints no matter their location. Get an exacting view of your organization’s digital structure.\n\n- Enjoy Your Lunch Break -\nvRx's automation capabilities, along with many other efficiency maximizing tools, streamline vulnerability management so you can enjoy your lunch break to its fullest extent. Rapidly reduce your risk exposure from the vantage point of a clear user-interface and a clear mind.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/09d8c5f2-5265-4242-9659-1dc572b6fd35.png","url":"https://www.softwareadvice.co.uk/software/185131/topia","@type":"ListItem"},{"name":"Hackrate","position":20,"description":"Hackrate Bug Bounty platform helps organizations to identify software vulnerabilities in a cost-efficient way.\n\nA bug bounty is about utilizing the power of crowdsourced security to secure businesses. During a bug bounty program, an organization offers rewards to ethical hackers for reporting vulnerabilities.\n\nCybersecurity threats are evolving, and malicious hackers don’t follow\na predefined security methodology. These risks impact your company’s growth. So how can you protect confidential information? How can you avoid your website being hacked? This next-generation security testing can help you to prevent potential data breaches and reduce cybersecurity risks.\n\n\nThis global community of ethical hackers is a guarantee against software bugs.\nThe bug bounty program helps businesses build trust with all of their stakeholders.\nWith incentivized security testing, teams can optimize their costs on cybersecurity.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/ed22b2cf-56b6-4703-bfd3-8678cf718471.png","url":"https://www.softwareadvice.co.uk/software/329884/hackrate-bug-bounty-platform","@type":"ListItem"},{"name":"RoboShadow","position":21,"description":"RoboShadow is a full security management platform built to be Free / Ultra Low Cost but deliver enterprise grade Vulnerability Assessment Capabilities.\n\nRoboShadow allows any organisation, anywhere on the planet, to get an Internal / External Vulnerability Assessment (70% of a $10,000 - $20,000 penetration test) completely free of charge.  Additional functionality is available, such as Cyber Heal which not only detects  vulnerabilities, but allows users to remediate them from a single platform.  Features inc.  External Vulnerability Scanner,  Zero Trust Device management, Azure AD / 365 integration and much more.\n\nThe platform is built in an intuitive way whereby users don't have to be an IT Genius to get results on our platform to get great results.  The platform is also built around the MSP model so users can ask their service providers to join with no cost to them either. \n\nFor  budget constrained users, they will find a full enterprise grade Cyber Audit Platform so they can narrow the Cyber Gap for you and your team.  For those who have more on their plate, they have some premium plans to ease the Cyber Overhead.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/7f3b016f-7efe-45a5-a414-faedfffe13a6.png","url":"https://www.softwareadvice.co.uk/software/357317/robo-shadow-cyber-platform","@type":"ListItem"},{"name":"NG Firewall","position":22,"description":"NG Firewall is a cloud-based network security solution that helps businesses monitor network activities and view the status of firewall servers. The application enables managers to gain insights into the activities of remote workers and business units, generate custom reports and filter website traffic.\n\nNG Firewall offers a variety of features such as user management, content filtering, performance optimization, analytics and more. The centralized dashboard allows employees to view information related to network statuses, CPU load, interface usage, sessions per minute, map distribution and other metrics. Additionally, the application lets IT teams define custom policies and identify and block various threats including malware, spam messages and other cyberattacks.\n\nNG Firewall supports integration with various third-party applications such as Webroot, Bitdefender, Novastar and more. Pricing is available on an annual subscription and support is extended via phone, email and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/cf6a55a3-6422-466f-8a0c-ea621bbd9b3c.png","url":"https://www.softwareadvice.co.uk/software/240333/ng-firewall","@type":"ListItem"},{"name":"Specops Password Auditor","position":23,"description":"Specops Password Auditor is a password audit tool that can identify password-related vulnerabilities within Active Directory accounts. Designed to improve password security and help organizations meet compliance requirements, this tool can generate reports that list accounts with expired, reused, and blank passwords. It can proactively prevent data breaches caused by compromised passwords. Specops Password Auditor is compatible with Windows 8 and above, or Server 12 and above.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/a1c1dda3-4f68-4244-9a2b-5267b6b2ec7e.jpeg","url":"https://www.softwareadvice.co.uk/software/57890/specops-password-auditor","@type":"ListItem"},{"name":"Darktrace","position":24,"description":"Darktrace is a global leader in AI for cybersecurity that keeps organizations ahead of the changing threat landscape every day. Founded in 2013, Darktrace provides the essential cybersecurity platform protecting organizations from unknown threats using its proprietary AI that learns from the unique patterns of life for each customer in real-time. The Darktrace ActiveAI Security Platform™ delivers a proactive approach to cyber resilience with pre-emptive visibility into security posture, real-time threat detection, and autonomous response – securing the business across cloud, email, identities, operational technology, endpoints, and network. Breakthrough innovations from our R&D teams in Cambridge, UK, and The Hague, Netherlands have resulted in over 200 patent applications filed. Darktrace’s platform and services are supported by over 2,400 employees around the world who protect nearly 10,000 customers across all major industries globally.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/c32604d5-57d2-45db-b8ce-a4592ee5ffdb.png","url":"https://www.softwareadvice.co.uk/software/307875/darktrace","@type":"ListItem"},{"name":"Constellix","position":25,"description":"DNS is no longer a simple point-and-click domain management service. It has evolved into a critical optimization tool for network administrators and DevOps alike.\n?\nAt Constellix, we augment our managed DNS services with built-in network monitoring, health checks, performance monitoring, and query analytics. We ingest data from these sources and use it to optimize how traffic flows to your cloud services, data centers, and CDN services.\n\nWe provide enterprise DNS management and failover, load balancing, and GeoDNS. Some of the DNS management tools are traffic steering, sonar monitoring, and real-time traffic anomaly detection.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/f0c23d26-2661-4185-bb5e-42c3b57f529d.png","url":"https://www.softwareadvice.co.uk/software/305090/constellix","@type":"ListItem"}],"numberOfItems":25}
</script>
