---
description: Page 9 - Discover the best Network Security Software for your organisation. Compare top Network Security Software tools with customer reviews, pricing and free demos.
image: https://gdm-localsites-assets-gfprod.imgix.net/images/software_advice/og_logo-55146305bbe7b450bea05c18e9be9c9a.png
title: Page 9 - Best Network Security Software - 2026 Reviews, Pricing & Demos
---

Breadcrumb: [Home](/) > [Network Security Software](https://www.softwareadvice.co.uk/directory/4170/network-security/software) > [Page 9](https://www.softwareadvice.co.uk/directory/4170/network-security/software?page=9)

# Network Security Software

Canonical: https://www.softwareadvice.co.uk/directory/4170/network-security/software

Page: 9 / 11\
Prev: [Previous page](https://www.softwareadvice.co.uk/directory/4170/network-security/software?page=8)\
Next: [Next page](https://www.softwareadvice.co.uk/directory/4170/network-security/software?page=10)

-----

## Products

1. [Cisco ACI](https://www.softwareadvice.co.uk/software/393860/cisco-aci) — 4.0/5 (1 reviews) — Cisco ACI is a software-defined networking (SDN) solution that facilitates data center automation and application agi...
2. [Defend](https://www.softwareadvice.co.uk/software/229228/defend) — 4.0/5 (1 reviews) — Plurilock DEFEND is deployed as a low-level, lightweight software agent on Windows and Mac OS systems. Plurilock DEFE...
3. [OpenText Network Node Manager](https://www.softwareadvice.co.uk/software/407262/network-node-manager-i) — 5.0/5 (1 reviews) — Network Node Manager i is a network management software that provides real-time visibility into the performance and a...
4. [Netacea Bot Management](https://www.softwareadvice.co.uk/software/354582/netacea) — 5.0/5 (1 reviews) — Netacea Bot Management is a bot attack protection solution for businesses. It uses machine learning to detect malicio...
5. [Wiz](https://www.softwareadvice.co.uk/software/415533/wiz) — 5.0/5 (1 reviews) — Wiz enables organizations globally to rapidly identify and remove critical risks in cloud environments. Wiz secures e...
6. [Fidelis Elevate](https://www.softwareadvice.co.uk/software/307619/fidelis-elevate) — 5.0/5 (1 reviews) — Fidelis Elevate, an Open XDR (Extended Detection and Response) platform, enables cyber security by automating defense...
7. [CyberCAST](https://www.softwareadvice.co.uk/software/506505/CyberCAST) — 5.0/5 (1 reviews) — CyberCAST is a cybersecurity software that helps enhance an organization's managed security services. The platform pr...
8. [Eye Security](https://www.softwareadvice.co.uk/software/518178/Eye-Security) — 5.0/5 (1 reviews) — Eye Security is a cybersecurity solution designed to offer protection to businesses of various sizes and sectors. Thi...
9. [Ericsson NetCloud Manager](https://www.softwareadvice.co.uk/software/449682/NetCloud) — 5.0/5 (1 reviews) — Ericsson NetCloud Manager is an AI-powered, cloud-native application optimized for cellular networks. It enables secu...
10. [NetBrain](https://www.softwareadvice.co.uk/software/443525/netbrain) — 5.0/5 (1 reviews) — NetBrain is a network automation platform that enhances the efficiency and scalability of NetOps workflows. It aims t...
11. [Illumio](https://www.softwareadvice.co.uk/software/342219/illumio-asp) — 5.0/5 (1 reviews) — Illumio is the a Zero Trust Segmentation company that stops breaches and ransomware from spreading across hybrid IT e...
12. [Plixer One](https://www.softwareadvice.co.uk/software/488657/Plixer-One) — 5.0/5 (1 reviews) — Plixer One is a network performance monitoring platform. It provides visibility and insights across on-premises, mult...
13. [Enterprise Security](https://www.softwareadvice.co.uk/software/404532/enterprise-security) — 5.0/5 (1 reviews) — Enterprise Security is a data protection system that aims to safeguard sensitive information in various locations. Th...
14. [Vectra AI Platform](https://www.softwareadvice.co.uk/software/451251/Cognito) — 4.0/5 (1 reviews) — The Vectra AI Platform is a Network Detection and Response (NDR) solution designed to protect networks from advanced ...
15. [iPrism Web Security](https://www.softwareadvice.co.uk/software/78015/iprism) (0 reviews) — iPrism Web Security is a cloud and on-premise web security platform, which helps manage web threats and user producti...
16. [LONI](https://www.softwareadvice.co.uk/software/203464/mobilenoc) (0 reviews) — LONI is a network monitoring software designed to help engineers and managers in the IT sector administer and manage ...
17. [DDoS-GUARD](https://www.softwareadvice.co.uk/software/223603/ddos-guard) (0 reviews) — DDoS-GUARD is a network security software designed to help businesses protect websites against distributed denial-of-...
18. [Genian NAC](https://www.softwareadvice.co.uk/software/232747/genian-nac) (0 reviews) — Genian NAC is a network access control software designed to help businesses of all sizes detect IP-enabled devices an...
19. [Area 1](https://www.softwareadvice.co.uk/software/241946/area-1-horizon) (0 reviews) — Area 1 Horizon is a secure email gateway software designed to help businesses detect and mitigate phishing attacks ac...
20. [swIDch Auth SDK](https://www.softwareadvice.co.uk/software/320674/otac) (0 reviews) — swIDch Auth SDK provides multiple robust authentication features such as FIDO-certified biometric authentication, mOT...
21. [Crowdsec](https://www.softwareadvice.co.uk/software/267630/crowdsec) (0 reviews) — CrowdSec aims to provide a crowd-sourced approach to common infrastructure defense problems. It does so by distributi...
22. [strongDM](https://www.softwareadvice.co.uk/software/270142/strongdm) (0 reviews) — strongDM is a database management software tool designed for SMBs and agencies. It aims to provide technical staff, i...
23. [SpamTitan Plus](https://www.softwareadvice.co.uk/software/336936/spamtitan-plus) (0 reviews) — SpamTitan Plus is an anti-phishing solution that helps businesses with identifying, neutralizing, and blocking suspic...
24. [Cisco Secure Network Analytics](https://www.softwareadvice.co.uk/software/429228/cisco-secure-network-analytics-stealthwatch) (0 reviews) — Cisco Secure Network Analytics is a cloud-based and on-premise solution, designed to help small to large enterprises ...
25. [IBM Security zSecure](https://www.softwareadvice.co.uk/software/350402/ibm-security-zsecure) (0 reviews) — IBM Security zSecure is a suite of products designed to simplify mainframe security administration, automate auditing...

-----

Page: 9 / 11\
Prev: [Previous page](https://www.softwareadvice.co.uk/directory/4170/network-security/software?page=8)\
Next: [Next page](https://www.softwareadvice.co.uk/directory/4170/network-security/software?page=10)

## Related Categories

- [Cloud Security Software](https://www.softwareadvice.co.uk/directory/4329/cloud-security/software)
- [Computer Security Software](https://www.softwareadvice.co.uk/directory/4528/security/software)
- [Network Monitoring Tools](https://www.softwareadvice.co.uk/directory/4307/network-monitoring/software)
- [Endpoint Protection Software](https://www.softwareadvice.co.uk/directory/4777/endpoint-protection-software/software)
- [Vulnerability Management Software](https://www.softwareadvice.co.uk/directory/4286/vulnerability-management/software)

## Links

- [View on SoftwareAdvice](https://www.softwareadvice.co.uk/directory/4170/network-security/software)
- [All Categories](https://www.softwareadvice.co.uk/directory)

-----

## Structured Data

<script type="application/ld+json">
  {"@context":"https://schema.org","@graph":[{"name":"SoftwareAdvice UK","address":{"@type":"PostalAddress","addressLocality":"Egham","addressRegion":"ENG","postalCode":"TW20 9AH","streetAddress":"Tamesis, The Glanty, Staines-upon-Thames Egham TW20 9AH United Kingdom"},"description":"Software Advice helps businesses in the UK find the best software with confidence. Compare software options and learn more from our research and user reviews.","email":"info@softwareadvice.co.uk","url":"https://www.softwareadvice.co.uk/","logo":"https://dm-localsites-assets-prod.imgix.net/images/software_advice/logo-white-d2cfd05bdd863947d19a4d1b9567dde8.svg","@type":"Organization","@id":"https://www.softwareadvice.co.uk/#organization","parentOrganization":"Gartner, Inc.","sameAs":[]},{"name":"SoftwareAdvice UK","url":"https://www.softwareadvice.co.uk/","@type":"WebSite","@id":"https://www.softwareadvice.co.uk/#website","publisher":{"@id":"https://www.softwareadvice.co.uk/#organization"},"potentialAction":{"query":"required","target":"https://www.softwareadvice.co.uk/search/?q={search_term_string}","@type":"SearchAction","query-input":"required name=search_term_string"}},{"name":"Network Security Software","description":"Page 9 - Discover the best Network Security Software for your organisation. Compare top Network Security Software tools with customer reviews, pricing and free demos.","url":"https://www.softwareadvice.co.uk/directory/4170/network-security/software?page=9","about":{"@id":"https://www.softwareadvice.co.uk/directory/4170/network-security/software?page=9#itemlist"},"breadcrumb":{"@id":"https://www.softwareadvice.co.uk/directory/4170/network-security/software?page=9#breadcrumblist"},"@type":["WebPage","CollectionPage"],"@id":"https://www.softwareadvice.co.uk/directory/4170/network-security/software?page=9#webpage","mainEntity":{"@id":"https://www.softwareadvice.co.uk/directory/4170/network-security/software?page=9#itemlist"},"isPartOf":{"@id":"https://www.softwareadvice.co.uk/#website"},"inLanguage":"en-GB","publisher":{"@id":"https://www.softwareadvice.co.uk/#organization"}},{"@type":"BreadcrumbList","itemListElement":[{"name":"Home","position":1,"item":"/","@type":"ListItem"},{"name":"Network Security Software","position":2,"item":"https://www.softwareadvice.co.uk/directory/4170/network-security/software","@type":"ListItem"},{"name":"Page 9","position":3,"item":"https://www.softwareadvice.co.uk/directory/4170/network-security/software?page=9","@type":"ListItem"}],"@id":"https://www.softwareadvice.co.uk/directory/4170/network-security/software?page=9#breadcrumblist"}]}
</script><script type="application/ld+json">
  {"name":"Page 9 - Best Network Security Software - 2026 Reviews, Pricing &amp; Demos","@context":"https://schema.org","@type":"ItemList","itemListElement":[{"name":"Cisco ACI","position":1,"description":"Cisco ACI is a software-defined networking (SDN) solution that facilitates data center automation and application agility. It is built on top of the Cisco Nexus 9000 platform and is designed to simplify the application development lifecycle. This solution is designed for IT professionals and supports workloads of any size, in any location, on-premise or remote, and in private or public cloud environments. \n\nCisco ACI consists of a main architectural component called the Cisco Application Policy Infrastructure Controller (APIC). The controller’s main features include application-centric network policies, topology monitoring, third-party integration, health scores for critical managed objects, and more.\n\nPricing information is provided by Cisco. Support is provided via phone or online.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/1a8e3cfe-aacd-4962-ae96-681633a87840.webp","url":"https://www.softwareadvice.co.uk/software/393860/cisco-aci","@type":"ListItem"},{"name":"Defend","position":2,"description":"Plurilock DEFEND is deployed as a low-level, lightweight software agent on Windows and Mac OS systems. Plurilock DEFEND monitors all keyboard and pointer activity on the workstation or endpoint, using behavioral biometrics to verify the identity of the logged-in user every 3-5 seconds. The outcomes of these regular checks can be used to lock the workstation when a user’s identity can no longer be confirmed or to provide detailed identity input to SIEM systems or other security frameworks for further action.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/5a7c5efe-6cec-4fe5-b15a-51a1237cf708.png","url":"https://www.softwareadvice.co.uk/software/229228/defend","@type":"ListItem"},{"name":"OpenText Network Node Manager","position":3,"description":"Network Node Manager i is a network management software that provides real-time visibility into the performance and availability of network infrastructure. It offers a range of features to help organizations monitor and manage their network devices, applications, and services. It can be deployed on-premises, in the cloud, or in hybrid environments, depending on the needs of the organization. It is designed to be flexible and scalable, allowing users to easily add capacity as needed.\n\nNNMi is used by organizations in a variety of industries, including healthcare, financial services, and government. It can help organizations improve network performance, reduce downtime, and increase productivity.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/ee159029-2ebd-466e-8194-59791d94aeec.jpeg","url":"https://www.softwareadvice.co.uk/software/407262/network-node-manager-i","@type":"ListItem"},{"name":"Netacea Bot Management","position":4,"description":"Netacea Bot Management is a bot attack protection solution for businesses. It uses machine learning to detect malicious bots, respond to attacks, and adapt to evolving threats. Netacea provides real-time threat data and can build on existing security stacks. Businesses can use this scalable solution to protect websites, mobile apps, and APIs. It integrates with third-party solutions such as Akamai, Magento, CloudFlare, and others. No hardware is required to use this solution. \n\nNetacea Bot Management includes an Intent Analytics engine that identifies the reasons behind bot activity and sophisticated attacks. It can protect against credential stuffing, account takeover, data scraping, and other types of threats. Netacea mitigates unwanted bot traffic without affecting human traffic. The platform includes dashboards, risk scoring, and reputation analysis to help businesses make informed decisions.\n\nPricing information is provided on request by Netacea. Support is provided by phone, email, and other online resources.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/7fbf81c6-5592-420b-b7a4-1c1069353078.png","url":"https://www.softwareadvice.co.uk/software/354582/netacea","@type":"ListItem"},{"name":"Wiz","position":5,"description":"Wiz enables organizations globally to rapidly identify and remove critical risks in cloud environments.\n\nWiz secures everything organizations build and run in the cloud. Founded in 2020, Wiz is the fastest-growing software company in the world, scaling from $1M to $200M ARR in 2 years. \n\nWiz is a CNAPP that consolidates CSPM, KSPM, CWPP, vulnerability management, IaC scanning, CIEM, DSPM, and container and Kubernetes security into a single platform.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/c8e9e142-5db8-4181-9e0c-61cfa621362c.png","url":"https://www.softwareadvice.co.uk/software/415533/wiz","@type":"ListItem"},{"name":"Fidelis Elevate","position":6,"description":"Fidelis Elevate, an Open XDR (Extended Detection and Response) platform, enables cyber security by automating defense operations across various network architectures. It extends security controls to the cloud and endpoints and uses threat intelligence, analytics, machine learning, threat hunting, and deception technologies to gain insights into threats impacting environment. This process enables security teams to continually handle defenses and neutralize threats before they cause any damage to business operations. The solution centralizes cybersecurity intelligence for IT, IoT (Internet of Things), data centers, and cloud systems into a unified view, with full visibility and control, ensuring that end users detect post-breach attacks. \n\nFidelis Elevate is the XDR platform that offers Active Directory defense, field contextual traffic analysis, integrated deception technology, active threat detection with MITRE ATT&CK mapping, AI-based sandbox analysis, in-band traffic decryption network DLP and risk-aware terrain mapping. With integrated network, endpoint, and cloud visibility and analysis, it automatically maps cyber terrain and evaluates the risk of every asset and network path.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/7cb9365f-59d8-485d-8469-660915078e60.png","url":"https://www.softwareadvice.co.uk/software/307619/fidelis-elevate","@type":"ListItem"},{"name":"CyberCAST","position":7,"description":"CyberCAST is a cybersecurity software that helps enhance an organization's managed security services. The platform provides insights into an organization's threat susceptibility. It is designed for businesses across various industries, looking to secure their operations and stay competitive with the evolving cyber threats.\n\nThe software features a quantitative security risk score that benchmarks the organization's security posture against industry standards. This provides a foundation for developing a tailored cybersecurity strategy. CyberCAST also generates a strategic and tactical roadmap. This roadmap aims to improve the security score over time, focussing on strengthening and maturing the organization's cybersecurity framework. The platform tracks the security program's maturity and allows the organizations to measure progress and the impact of implemented measures.\n\nCyberCAST integrates with leading industry technology providers to support comprehensive reporting and the detection of new security incidents. The software also offers easy onboarding and highly visual reporting. This ensures buy-in from key stakeholders, such as executive leadership and the board of directors.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/03318c29-2550-4b4e-adc7-9bc0e54bff66.png","url":"https://www.softwareadvice.co.uk/software/506505/CyberCAST","@type":"ListItem"},{"name":"Eye Security","position":8,"description":"Eye Security is a cybersecurity solution designed to offer protection to businesses of various sizes and sectors. This product provides a comprehensive security approach that is both accessible and efficient.\n\nThis solution offers round-the-clock monitoring to detect potential threats across different endpoints and cloud platforms. In the event of a security incident, the team behind Eye Security responds swiftly to minimize the impact of the attack. This response is hands-on, eliminating the need for email instructions or call center interactions.\n\nEye Security also includes a feature that offers cyber insurance coverage, which is designed to maintain business continuity in the face of potential threats. The product's key features encompass intelligent threat detection and a rapid, human-led response mechanism. Thus, Eye Security provides a comprehensive security package that is both efficient and accessible to organizations of all sizes.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/373b939c-2c29-4db7-ad3d-240661d484df.jpeg","url":"https://www.softwareadvice.co.uk/software/518178/Eye-Security","@type":"ListItem"},{"name":"Ericsson NetCloud Manager","position":9,"description":"Ericsson NetCloud Manager is an AI-powered, cloud-native application optimized for cellular networks.  It enables secure, scalable management of endpoints that support public and private cellular connectivity—whether at fixed locations, in vehicles, and IoT devices operating in challenging connectivity environments.  NetCloud Manager enables lean IT operations to deploy Wireless WAN solutions with zero-touch provisioning, real-time monitoring, and centralized control accessible via browser or mobile app.  \n\nThe platform also orchestrates secure access service edge (SASE) implementations through NetCloud SASE services, which enforce zero-trust access and traffic steering policies with a unified policy engine—establishing a robust zero-trust foundation and comprehensive protection for any organization.   \n\nAI-driven features—including the NetCloud Virtual Assistant (ANA), provide guidance and accelerate issue resolution. Backed by global cloud infrastructure and unified visibility, NetCloud Manager empowers IT teams to confidently deploy, scale, and secure Wireless WANs.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/24f24abe-43b0-4dc4-907e-d1898446e8e7.png","url":"https://www.softwareadvice.co.uk/software/449682/NetCloud","@type":"ListItem"},{"name":"NetBrain","position":10,"description":"NetBrain is a network automation platform that enhances the efficiency and scalability of NetOps workflows. It aims to reduce operational costs and risks by automating a significant portion of tickets, thus decreasing repair time and increasing uptime. The platform offers advanced features such as digital twin, dynamic mapping, automation frameworks, intent-based automation, and an automation library. It also supports public cloud and multi-vendor networks.\n\nNetBrain provides solutions for various use cases, including network outage prevention, diagnostic automation, protected change enforcement, application performance monitoring, and hybrid cloud visibility. Its key features include impact analysis automation for changes, configuration drift verification, and defense against network attacks and performance issues. The platform also continuously evaluates network design, fault tolerance, performance, compliance, and security.\n\nNetBrain is trusted by a large number of global businesses and is used across various industries, including financial services, healthcare, and government. The platform aims to fundamentally transform NetOps workflows, making them more efficient, scalable, and cost-effective.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/a06e0c63-7f74-4582-8ec8-cc64ca1a95ef.png","url":"https://www.softwareadvice.co.uk/software/443525/netbrain","@type":"ListItem"},{"name":"Illumio","position":11,"description":"Illumio is the a Zero Trust Segmentation company that stops breaches and ransomware from spreading across hybrid IT environments. The Illumio Zero Trust Segmentation Platform provides real-time visibility into all communications between workloads and devices across endpoints, private clouds, data centers, public clouds, containers, and multi-clouds. \n\nThe platform allows setting granular segmentation policies to control communications between workloads, isolate high-value assets, and enable breach containment. Key products include Illumio Core, Illumio CloudSecure, Illumio Endpoint, and Illumio for Microsoft Azure Firewall. Illumio Core builds a map of all communication flows between workloads and devices. It then allows creating policies to allow or block traffic and isolate critical systems. Illumio CloudSecure extends segmentation policies to workloads in public cloud environments. Illumio Endpoint enforces segmentation on end-user devices. Illumio for Azure Firewall integrates with Azure Firewall to visualize and control traffic flows in Azure environments.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/625cc9da-750f-421d-9a89-248816e95ba7.png","url":"https://www.softwareadvice.co.uk/software/342219/illumio-asp","@type":"ListItem"},{"name":"Plixer One","position":12,"description":"Plixer One is a network performance monitoring platform. It provides visibility and insights across on-premises, multi-cloud, and hybrid IT environments. The platform is powered by Scrutinizer technology. Plixer One offers cost-effective solutions for a wide range of industries. It empowers organizations to optimize network performance and enhance security.\n\nThe Plixer One platform features advanced capabilities. These include rapid identification of network issues, streamlined traffic monitoring through correlation and consolidation of traffic flows and metadata, and frictionless implementation without the need for intrusive and costly network appliances. The platform's integrated solutions for Network Performance Monitoring (NPMD) and Network Detection and Response (NDR) deliver network visibility and contextual forensic data. This enables organizations to make informed decisions and take proactive measures to ensure business resilience and growth.\n\nPlixer One's approach to network monitoring and security leverages NetFlow/IPFIX data. It provides real-time insights and enables rapid issue resolution. By consolidating diverse network data, the platform empowers users to identify root causes quickly, prioritize network strategies, and enhance asset management through comprehensive endpoint intelligence. Plixer One's versatility and cost-effectiveness make it a suitable choice for organizations seeking to optimize network performance and strengthen their security posture.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/07f37316-15ef-4ea9-8255-bc4379d2f6d6.png","url":"https://www.softwareadvice.co.uk/software/488657/Plixer-One","@type":"ListItem"},{"name":"Enterprise Security","position":13,"description":"Enterprise Security is a data protection system that aims to safeguard sensitive information in various locations. This solution empowers organizations to leverage data for improved customer experiences, informed decision-making, and innovation. By implementing robust security measures, Enterprise Security helps mitigate the risks associated with data breaches and unauthorized access and ensures data protection and confidentiality. With its focus on safeguarding sensitive data, Enterprise Security enables organizations to utilize information assets for their operational needs while minimizing the potential negative impacts of data breaches and unauthorized access.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/de8f7e99-62a1-456e-8835-a3e7ac4d3de3.png","url":"https://www.softwareadvice.co.uk/software/404532/enterprise-security","@type":"ListItem"},{"name":"Vectra AI Platform","position":14,"description":"The Vectra AI Platform is a Network Detection and Response (NDR) solution designed to protect networks from advanced cyber threats using artificial intelligence. It provides security for data centers, remote locations, cloud environments, identities, and IoT/OT infrastructure across various industries, including financial services, healthcare, higher education, and the public sector.\n\nThe platform uses artificial intelligence models and patented technologies to analyze network traffic in real-time. It processes large volumes of sessions and monitors numerous IPs daily. Its Attack Signal Intelligence technology identifies and correlates threats across different domains, reducing alert noise and minimizing manual tasks. The system addresses a wide range of MITRE ATT&CK techniques and is referenced in the MITRE D3FEND framework.\n\nThe platform supports deployment as on-premises, SaaS, or hybrid models. It is designed for quick implementation, with network and identity/cloud coverage activated efficiently. The solution operates without agents and is compatible with various security tools, including SIEM, EDR, and SOAR platforms, to enhance threat detection capabilities.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/a636e443-2215-4f7c-b435-e7042b68ac72.png","url":"https://www.softwareadvice.co.uk/software/451251/Cognito","@type":"ListItem"},{"name":"iPrism Web Security","position":15,"description":"iPrism Web Security is a cloud and on-premise web security platform, which helps manage web threats and user productivity across the internet. It enables midsize businesses to streamline secure communications through the real-time analysis of traffic, applications, protocols and networks.\n\n\niPrism Web Security’s key features include content filtering and security, anti-virus scanning, policy management, traffic analysis, application filtering, outbound anti-botnet protection, remote filtering, instant blocks, anti-circumvention and anonymous browsing protection.\n\n\nThe platform also offers email alerts, a drill-down interface and a centralized dashboard, which has reporting tools for the creation of standard and customizable management reports. Support is extended via phone, an online forum, email and documentation, and pricing is available on request.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/262c0304-0cd9-4675-84dd-34174ec08b29.png","url":"https://www.softwareadvice.co.uk/software/78015/iprism","@type":"ListItem"},{"name":"LONI","position":16,"description":"LONI is a network monitoring software designed to help engineers and managers in the IT sector administer and manage network infrastructure using mobile or IoT devices. The platform enables administrators to record changes regarding meetings and notifications across virtual local area networks (VLAN) in the ticketing system.\n\nIT professionals can manage firewall policies to secure systems against distributed denial-of-service (DDoS) or cyber-attacks. LONI offers a load balancing module, which allows teams to handle virtual IP addresses (VIPs), nodes, servers and IP pools on a unified interface. Additionally, managers can monitor networks based on simple network management protocols (SNMPs) to automate configuration compliance.\n\nLONI lets businesses view MAC addresses, latency timers, incident-related information, impact of cyber-attacks and status of layer 1, 2 or 3 devices across various locations. Pricing is available on request and support is extended via phone, email and online contact form.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/57c6c52d-8e12-420f-baef-c844994b0b2a.jpeg","url":"https://www.softwareadvice.co.uk/software/203464/mobilenoc","@type":"ListItem"},{"name":"DDoS-GUARD","position":17,"description":"DDoS-GUARD is a network security software designed to help businesses protect websites against distributed denial-of-service (DDoS) attacks. The platform enables administrators to monitor suspicious activities in real-time and block malicious traffic sources.\n\nTeams can hide web server location and IP addresses from intruders and facilitate WebSockets protection on a unified interface. DDoS-GUARD allows managers to host websites using DDoS-protected servers and manage access control lists. Additionally, operators can handle file and database backups, blacklisted/whitelisted addresses and cPanel hosting in a centralized dashboard.\n\nDDoS-GUARD lets businesses process and optimize requests to the web server using HTTPS traffic scrubbing functionality. Pricing is based on monthly subscriptions and support is extended via phone, email, live chat, knowledge base and tutorials.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/435ccf97-be29-4b68-9887-e7a2499acd30.png","url":"https://www.softwareadvice.co.uk/software/223603/ddos-guard","@type":"ListItem"},{"name":"Genian NAC","position":18,"description":"Genian NAC is a network access control software designed to help businesses of all sizes detect IP-enabled devices and monitor asset information to manage vulnerabilities. The platform enables administrators to analyze heterogeneous work environments and identify non-compliant or misconfigured devices.\n\nManagers can configure role-based permissions among staff members and gain insights into contextual access information based on what, who, when, where and how attributes. Additionally, Genian NAC allows teams to track the number of devices connected with different ports, utilization level and connection status on a unified interface.\n\nGenian NAC offers an application programming interface (API), which lets businesses integrate the system with several IP security systems including Firewall, virtual private network (VPN), security information and event management (SIEM) and Syslog. Pricing is based on a one-time license and monthly as well as annual subscriptions and support is extended via knowledge base, forums, video tutorials, phone and email.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/73f40d96-4a3e-4b59-bda9-6152e1273c52.png","url":"https://www.softwareadvice.co.uk/software/232747/genian-nac","@type":"ListItem"},{"name":"Area 1","position":19,"description":"Area 1 Horizon is a secure email gateway software designed to help businesses detect and mitigate phishing attacks across web pages, emails and networks. It provides business email compromise (BEC) filtering functionality, enabling managers to identify spoofed users and targets.\n\nAdministrators can gain insights into active phishing campaigns and receive notifications regarding blocked web-based advertisements. Area 1 Horizon allows teams to block phishing command-and-control (C2) communications and prevent data exfiltration processes. Additionally, operators can use web crawling, user impersonation and sandbox testing to discover malware and phishing attacks. \n\nArea 1 Horizon offers an application programming interface (API), which lets businesses integrate the system with several third-party applications including Splunk, IBM QRadar, Sumo Logic, LogRhythm and Palo Alto Networks. Support is extended via phone, email and an online contact form.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/e20c7724-8626-48c1-88d0-c2c67587dadb.png","url":"https://www.softwareadvice.co.uk/software/241946/area-1-horizon","@type":"ListItem"},{"name":"swIDch Auth SDK","position":20,"description":"swIDch Auth SDK provides multiple robust authentication features such as FIDO-certified biometric authentication, mOTP authentication for easy mobile application, and the world’s first one-way dynamic code OTAC login. \n\nswIDch Auth SDK's various functions are verified by FIDO alliance providing super secure passwordless authentication. The SDK also provides mobile OTP function that runs on a mobile application including the use of PIN inputs or fingerprint recognition, alongside mobile OTP which generates a one-time OTP number providing the same level of solid security as standard OTPs.\n\nFor an extra level of added security, swIDch Auth SDK provides login functions based on swIDch’s unparalleled  authentication technology, OTAC (One-Time Authentication Code). Even in a networkless environment, OTAC can identify users and devices by generating a one-time random code, providing an impenetrable authentication environment in cyber security.\n\nswIDch Auth SDK unprecedented pricing policy aims to empower organisations to develop innovative products and services, especially regarding authentication, identity and access management. The Pioneer membership, which consists of a one-pack license, is $5,000 whilst its Enterprise membership charges $45,000 allowing Unlimited Licensing for internal systems and 20 licenses for reselling. Both these memberships come with technical support services to help with any queries and technical requirements.\n\nswIDch Auth SDK is designed to empower System Integration companies, security solution vendors, organisations and enterprises, who want to deploy their developers and security teams to provide reliable all-in-one authentication based on proven international standard authentication security technology. Save time and increase efficiency with swIDch Auth SDK.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/ca86be52-cbd8-41d4-b08e-4c46e5926ad1.jpeg","url":"https://www.softwareadvice.co.uk/software/320674/otac","@type":"ListItem"},{"name":"Crowdsec","position":21,"description":"CrowdSec aims to provide a crowd-sourced approach to common infrastructure defense problems. It does so by distributing free & open-source software allowing users to protect themselves and share information about malevolent actors within its user network.\n\nThis platform uses a decoupled approach (detect here, remedy there) and an inference engine that leverages leaky buckets, YAML & Grok patterns to identify aggressive behaviors. It acquires signals from various data sources like logs or cloud trails, Kafka, etc., normalizes them, enriches them to apply heuristics and triggers a bouncer to deal with the threat, if need be. Since it’s written in Go, it’s compatible with almost any environment, fast in execution, and resource conservative.\n\nCrowdSec captures all aggression signals (timestamp, IP, behavior) and sends them for curation. That way, it establishes a reliable IP blacklist that is constantly redistributed to the network members in order to achieve a form of digital herd Immunity. An IP caught aggressing WordPress sites will quickly be banned by all members using CrowdSec that subscribed to the WordPress defense collection.\n\nWhile CrowdSec is in charge of the detection, the reaction is performed by “bouncers” that aim to be deployable at any level of the applicative / infrastructure stack:\n- via Nftables/Iptables/Pf based on an IP set \n- via Nginx LUA scripting\n- via WordPress plugin\nOr GCP/AWS/Azure firewall, slack or scripting, notifications, etc.\n\nBouncers can enforce several types of remediation such as blocking, sending a captcha, notifying, lower rights, speed, send a 2FA request, etc. Chained leaky buckets can help sort opportunistic attacks from targeted ones. \n\nThis approach, combined with a declarative configuration and a stateless behavior, makes it an efficient tool to enhance the security of modern stacks (containers, k8s, serverless and more generally automatically deployed infrastructures).\n\nWhenever an attack is locally blocked/detected by Crowd watch, the “meta” information of the attack is shared amongst participants (source IP, date, and triggered scenario) for redistribution to network members.\n\nSome other notable features include:\n- a public hub to find, share and amend parsers, scenarios, and blockers\n- permissive open-source license (MIT) to stay business-friendly\n- Communication channels to interact with each other","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/5360345c-9716-4719-bc5b-e72bada903c2.png","url":"https://www.softwareadvice.co.uk/software/267630/crowdsec","@type":"ListItem"},{"name":"strongDM","position":22,"description":"strongDM is a database management software tool designed for SMBs and agencies. It aims to provide technical staff, including CTOs, CIOs, DevOps, and infrastructure engineers, secure access to their company's resources. It blends authentication, authorization, observability, and networking into a single dashboard for easy, secure, and convenient management access across the tech stack.\n\nThe tool facilitates SSO logins and management for any database, server, protocol, or environment. It comes with a NoSQL database, real-time monitoring, security audits, vulnerability protection, and audit trails for every SSH, RDP session, and query — all rolled into one.\n\nstrongDM lets administrators set up two-factor or multi-factor authentication, providing users with just-in-time access to the resources they need. Thanks to its granular audit trail, they can check team and individual user activity. They can also restrict access and grant role-based permissions.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/fc9c7ad6-1099-438c-a99e-e6c8710e321c.png","url":"https://www.softwareadvice.co.uk/software/270142/strongdm","@type":"ListItem"},{"name":"SpamTitan Plus","position":23,"description":"SpamTitan Plus is an anti-phishing solution that helps businesses with identifying, neutralizing, and blocking suspicious or malicious links. The main features of SpamTitan Plus include time-of-click analysis, malicious link neutralization, URL inspection, and URL rewriting.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/63a0fb5e-2805-4807-88a8-86141963bd37.png","url":"https://www.softwareadvice.co.uk/software/336936/spamtitan-plus","@type":"ListItem"},{"name":"Cisco Secure Network Analytics","position":24,"description":"Cisco Secure Network Analytics is a cloud-based and on-premise solution, designed to help small to large enterprises determine, manage, and respond to threats. IT teams can conduct network traffic analysis and protect critical information through telemetry data. \n\nThe solution allows professionals to identify unknown malware, data exfiltration, or policy violations and identify them through context-rich alerts providing details about user, device type, location or timestamp. Supervisors can examine encrypted traffic for potential threats and track compliance violations. Cisco Secure Network Analytics lets professionals build custom alerts to detect any unauthorized access to the network and define segmentation policies. With its behavioral analytics module, users can determine users and their activity across the network. Cisco Secure Network Analytics also helps IT professionals investigate when servers, workstations, and other network hosts exhibit anomalies. \n\nPricing is available on request and support is extended via email, phone and documentation.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/91b23207-b6bf-4208-b71e-ff70d6e76b75.jpeg","url":"https://www.softwareadvice.co.uk/software/429228/cisco-secure-network-analytics-stealthwatch","@type":"ListItem"},{"name":"IBM Security zSecure","position":25,"description":"IBM Security zSecure is a suite of products designed to simplify mainframe security administration, automate auditing processes, and enforce security policies to reduce risk. This solution supports IBM Z hardware, software, virtualization, and standard enterprise security management (ESM) tools. \n\nIBM Security zSecure includes the following products IBM Z Multi-Factor Authentication, zSecure Command Verifier, zSecure Audit, zSecure Alert, zSecure Admin, zSecure Visual, zSecure CICS Toolkit, and zSecure Manager for RACF z/VM. The suite helps organizations strengthen user controls, detect internal and external threats, access real-time alerts, monitor compliance, and more.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/0c9cb3be-9a1b-4a71-8bd5-1fc9228fa645.jpeg","url":"https://www.softwareadvice.co.uk/software/350402/ibm-security-zsecure","@type":"ListItem"}],"@id":"https://www.softwareadvice.co.uk/directory/4170/network-security/software?page=9#itemlist","numberOfItems":25}
</script>
