search Where Thought Leaders go for Growth

Computer Security Software

IT service tools are essential for companies. To effectively protect against all ever-changing cyber-attacks, computer security software remains the best option.

Computer Security : related categories

Our selection of 40 computer security software

EventLog Analyzer

Real-Time Network Security Log Management

star star star star star-half-outlined
4.8
Based on 12 reviews
info-circle-outline
Appvizer calculates this overall rating to make your search for the best software easier. We've based it on user-generated verified reviews on industry-leading websites.
check-circle Free version
check-circle Free trial
check-circle Free demo

Pricing on request

Manage logs with ease. Analyze and troubleshoot system issues, security threats, and network anomalies efficiently.

chevron-right See more details See less details

EventLog Analyzer simplifies log management for your IT infrastructure. It provides real-time event correlation and log analysis to identify security threats and suspicious activities. With its intuitive interface, you can easily manage logs across multiple platforms, troubleshoot system issues, and ensure compliance with regulatory requirements.

Read our analysis about EventLog Analyzer
Learn more

To EventLog Analyzer product page

Merox

Secure your brand and email domains (DMARC)

No user review
close-circle Free version
close-circle Free trial
close-circle Free demo

Pricing on request

Protect your computer from cyber threats with our top-rated security software. Enjoy real-time protection and automatic updates.

chevron-right See more details See less details

Merox offers a comprehensive set of tools to keep your computer safe from malware, viruses, and other online threats. With intelligent scanning and real-time protection, you can browse the web and download files with confidence. Plus, our software is updated automatically to stay ahead of the latest threats.

Read our analysis about Merox

Benefits of Merox

check SaaS Platform developed and hosted in France

check Secured, multi-tenant and multi-langue platform

check 24/7 Support based in France. Contract with SLA

Learn more

To Merox product page

iLock Security Services

Advanced IT Security Solutions for Peace of Mind

star star star star star
5.0
Based on 1 reviews
info-circle-outline
Appvizer calculates this overall rating to make your search for the best software easier. We've based it on user-generated verified reviews on industry-leading websites.
close-circle Free version
close-circle Free trial
close-circle Free demo

Pricing on request

Protect your computer with advanced security software. Keep your data safe from hackers and malware.

chevron-right See more details See less details

iLock Security Services provides real-time protection against viruses, spyware, and ransomware. Its advanced firewall blocks unauthorized access to your computer and network. The software also includes a password manager to keep your login credentials secure.

Read our analysis about iLock Security Services
Learn more

To iLock Security Services product page

XyLoc Security Server

Advanced Security Management for IT Infrastructure

No user review
close-circle Free version
close-circle Free trial
close-circle Free demo

Pricing on request

Protect your computer from cyber threats with advanced security software. Keep your data safe from hackers and viruses.

chevron-right See more details See less details

XyLoc Security Server offers comprehensive protection against cyber attacks. It uses advanced algorithms to detect and prevent malware and other threats. With its user-friendly interface, you can easily manage your security settings and stay up-to-date with the latest threats.

Read our analysis about XyLoc Security Server
Learn more

To XyLoc Security Server product page

inWebo

Dynamic Multi-Factor Authentication Solution

No user review
close-circle Free version
close-circle Free trial
close-circle Free demo

Pricing on request

Advanced computer security software with multi-factor authentication and user-friendly interface.

chevron-right See more details See less details

inWebo offers an innovative approach to computer security with its multi-factor authentication system. It ensures that only authorized users can access sensitive data. The user-friendly interface simplifies the process of setting up and managing access policies.

Read our analysis about inWebo
Learn more

To inWebo product page

Splunk Enterprise Security

Advanced Threat Detection and Analytics Solution

star star star star star-half-outlined
4.3
Based on +200 reviews
info-circle-outline
Appvizer calculates this overall rating to make your search for the best software easier. We've based it on user-generated verified reviews on industry-leading websites.
close-circle Free version
close-circle Free trial
close-circle Free demo

Pricing on request

Enhance your computer security with software that detects and responds to threats in real-time, providing comprehensive protection for your system.

chevron-right See more details See less details

Designed to keep your system safe from cyber-attacks, the software monitors and analyses data to identify potential threats before they can cause harm. With real-time alerts, you can respond quickly to security incidents and prevent data breaches.

Read our analysis about Splunk Enterprise Security
Learn more

To Splunk Enterprise Security product page

DatAlert

Advanced Threat Detection Software for IT Teams

No user review
close-circle Free version
close-circle Free trial
close-circle Free demo

Pricing on request

Protect your computer from potential threats with advanced monitoring and alerting features.

chevron-right See more details See less details

DatAlert provides real-time monitoring of all computer activity, detecting and alerting on potential threats such as malware, data leakage, and suspicious behaviour. Its advanced analytics and reporting capabilities allow for quick and efficient threat investigation and response.

Read our analysis about DatAlert
Learn more

To DatAlert product page

Data Classification

Dynamic Data Classification Software Solution

No user review
close-circle Free version
close-circle Free trial
close-circle Free demo

Pricing on request

Protect your data with advanced classification and secure your business from internal and external threats.

chevron-right See more details See less details

Our computer security software provides comprehensive data classification capabilities, allowing you to easily identify sensitive information and apply appropriate security measures. With our solution, you can prevent data leaks and ensure compliance with regulatory requirements.

Read our analysis about Data Classification
Learn more

To Data Classification product page

Stormshield Endpoint security

Advanced Endpoint Protection for Enhanced IT Security

No user review
close-circle Free version
close-circle Free trial
close-circle Free demo

Pricing on request

Protect your devices from cyber threats with advanced endpoint security.

chevron-right See more details See less details

Stormshield Endpoint Security offers comprehensive protection against malware, ransomware, phishing attacks, and more. Its advanced features include behavioural analysis, application control, and device control to prevent unauthorized access and ensure compliance with security policies.

Read our analysis about Stormshield Endpoint security
Learn more

To Stormshield Endpoint security product page

E MAIL SECURITY

Protect Your Communications with Email Safeguard

No user review
close-circle Free version
close-circle Free trial
close-circle Free demo

Pricing on request

Protect your computer with cutting-edge software that secures your email from cyber threats.

chevron-right See more details See less details

Our Computer Security software, designed to protect your email against phishing, malware, and spam attacks, is easy to use and provides robust protection for your business. With advanced features like encryption and authentication, you can rest assured that your confidential information is safe and secure.

Read our analysis about E MAIL SECURITY
Learn more

To E MAIL SECURITY product page

Filtrage Web Olfeo

Advanced Web Filtering Solution for Enterprises

No user review
close-circle Free version
close-circle Free trial
close-circle Free demo

Pricing on request

Enhance your online security with advanced web filtering and protection against malware, phishing and data leaks.

chevron-right See more details See less details

Filtrage Web Olfeo provides an easy-to-use interface to monitor and control web usage, with real-time analysis and customisable policies for maximum security. Protect your business from cyber threats and ensure compliance with industry regulations.

Read our analysis about Filtrage Web Olfeo
Learn more

To Filtrage Web Olfeo product page

IPdiva Secure

Enhanced Remote Access Control Solution

No user review
close-circle Free version
close-circle Free trial
close-circle Free demo

Pricing on request

Protect your computer with cutting-edge security software. Stay safe from online threats and keep your data private with this powerful SaaS tool.

chevron-right See more details See less details

IPdiva Secure offers advanced features such as multi-factor authentication, secure remote access, and real-time monitoring. With its user-friendly interface and customizable settings, you can easily manage your security needs and ensure your online safety.

Read our analysis about IPdiva Secure
Learn more

To IPdiva Secure product page

Tenable.sc

Comprehensive Vulnerability Management Solution

No user review
close-circle Free version
close-circle Free trial
close-circle Free demo

Pricing on request

Protect your computer with advanced security software that scans for vulnerabilities and threats.

chevron-right See more details See less details

Tenable.sc is a powerful SaaS tool that offers comprehensive security features such as vulnerability scanning, threat detection, and compliance management. With Tenable.sc, you can ensure your computer systems are secure from potential threats and meet industry compliance standards.

Read our analysis about Tenable.sc
Learn more

To Tenable.sc product page

Tenable.io

Cloud-Based Cyber Exposure Platform for Enterprises

star star star star star-half-outlined
4.6
Based on 177 reviews
info-circle-outline
Appvizer calculates this overall rating to make your search for the best software easier. We've based it on user-generated verified reviews on industry-leading websites.
close-circle Free version
close-circle Free trial
close-circle Free demo

Pricing on request

Comprehensive computer security software providing vulnerability management, asset discovery, and compliance monitoring.

chevron-right See more details See less details

Tenable.io offers a range of features to ensure the security of your computer systems. With vulnerability management, you can identify and prioritize potential threats, while asset discovery allows you to keep track of all devices on your network. Compliance monitoring ensures that your systems meet industry regulations.

Read our analysis about Tenable.io
Learn more

To Tenable.io product page

Protection Suite Enterprise

Comprehensive Endpoint Protection Software Suite

No user review
close-circle Free version
close-circle Free trial
close-circle Free demo

Pricing on request

Advanced computer security software for businesses. Protects against cyber threats and data breaches.

chevron-right See more details See less details

The Protection Suite Enterprise provides comprehensive protection against a wide range of cyber threats, including malware, phishing, and ransomware. Its advanced features include firewalls, intrusion detection, and encryption to keep your sensitive data safe. With easy deployment and management, it's the ideal solution for businesses of all sizes.

Read our analysis about Protection Suite Enterprise
Learn more

To Protection Suite Enterprise product page

Mcafee MVISION Cloud

Advanced Cloud Protection for Seamless Data Management

No user review
close-circle Free version
close-circle Free trial
close-circle Free demo

Pricing on request

Cloud-based security solution for enterprises. Protects data and applications across multiple cloud services.

chevron-right See more details See less details

Mcafee MVISION Cloud provides real-time visibility and control over data in cloud services, and helps prevent data loss and malware threats. Its advanced security features, such as encryption and access controls, ensure that data remains secure while in the cloud. The platform also offers compliance management tools to help organisations meet regulatory requirements.

Read our analysis about Mcafee MVISION Cloud
Learn more

To Mcafee MVISION Cloud product page

McAfee ePolicy Orchestrator

Comprehensive Endpoint Management Platform

star star star star star-half-outlined
4.5
Based on 42 reviews
info-circle-outline
Appvizer calculates this overall rating to make your search for the best software easier. We've based it on user-generated verified reviews on industry-leading websites.
close-circle Free version
close-circle Free trial
close-circle Free demo

Pricing on request

Manage your computer security with ease.

chevron-right See more details See less details

McAfee ePolicy Orchestrator simplifies the management of your computer security by allowing you to easily manage policies, updates, and reporting across all devices. With its user-friendly interface, you can quickly identify and resolve security issues, ensuring your data is always protected.

Read our analysis about McAfee ePolicy Orchestrator
Learn more

To McAfee ePolicy Orchestrator product page

McAfee MVISION Endpoint

Advanced Endpoint Protection for Enterprise Security

No user review
close-circle Free version
close-circle Free trial
close-circle Free demo

Pricing on request

Comprehensive computer security software that protects endpoints from threats, with real-time visibility and control.

chevron-right See more details See less details

McAfee MVISION Endpoint detects and blocks advanced threats, including fileless attacks, with machine learning and behavioural analysis. It also provides granular control over application and device usage, and integrates with other security products.

Read our analysis about McAfee MVISION Endpoint
Learn more

To McAfee MVISION Endpoint product page

Deep Security

Advanced Endpoint Protection for Enterprises

No user review
close-circle Free version
close-circle Free trial
close-circle Free demo

Pricing on request

Protect your computer with powerful security software that defends against online threats and malware.

chevron-right See more details See less details

Deep Security provides comprehensive protection against a wide range of threats, including viruses, spyware, and ransomware. Its advanced features include real-time scanning, behavioural analysis, and firewall protection, ensuring that your computer is always secure. With Deep Security, you can rest assured that your data and privacy are protected.

Read our analysis about Deep Security
Learn more

To Deep Security product page

Enteprise Security Suite

Comprehensive Cyber Defence for Enterprises

No user review
close-circle Free version
close-circle Free trial
close-circle Free demo

Pricing on request

Comprehensive computer security software with advanced threat protection and real-time monitoring.

chevron-right See more details See less details

Enterprise Security Suite offers a wide range of features, including malware protection, firewall, intrusion detection and prevention, and data encryption. It also provides real-time monitoring and reporting, ensuring that potential threats are identified and dealt with quickly.

Read our analysis about Enteprise Security Suite
Learn more

To Enteprise Security Suite product page

Computer Security software: purchase guide

What is online computer security software?

Definition

Computer security software provides a solution to the problem of cybersecurity. Faced with all the potential threats facing the company, it is essential to use this type of tool. This allows you to protect yourself as much as possible from any attack and react quickly if the system is ever affected. 

How does it work?

By using computer security software, the threat detection process becomes automated. The same applies to the detection of viruses and malicious attacks. Once all these infections have been detected, a few programs integrated into the software support their resolution before the system is affected. Many functionalities are provided by these tools, including web control, applications used on the computer or mobile devices. 

What are the main features of SaaS computer security software? 

File protection 

For companies, ransomwares are among their greatest enemies. The latter encrypt all their data and keep it until they receive a ransom. In this case, companies cannot access any of their files, completely stopping their production. By using computer security software, structures will have a tool capable of intercepting ransomware and blocking all types of threats. 

User authentication 

This feature is intended to ensure the identity of each profile browsing a terminal. Who has access to the files? Does he have the right to do so? The software controls all access by means of a password to be encrypted, for example. This will prevent unwanted intrusions and therefore threats to the system.

Only authorized persons can therefore access the files.  

Sending alerts 

In general, the software asks managers to define different events to report in case of suspicious access. It can be a file deletion, a download of large data or simply access to a specific document. All these actions are detected by the tool and sent to the company's IT departments. The latter can therefore decide whether or not the action was authorized. This will allow them to react immediately if there is a security breach.  

Activity records 

Depending on the previous functionality, this one offers the archiving of activities done within the company. The software generates logs that can be consulted at any time on these actions as well as all those performed on computer systems. The goal is to know precisely who does what and when.

It is a tool for monitoring staff.  

Who uses computer security software?

Computer security software protects your computer from all potential threats. It can be a virus, hacking or ransomware. All the structures concerned by these problems can use this type of solution to avoid the immediate cessation of their activities or even the permanent destruction of their computer systems. Some software is also suitable for auto-entrepreneurs wishing to protect their data, as well as for individuals.   

Why use computer security software in a company? 

Advantages

  • The user can receive reports on access to all files and directories, providing visibility into all IT activities within the company.
  • Protecting your computer effectively becomes easy, even for beginners 
  • It allows malware to be detected quickly, which optimizes the company's IT security.  

Disadvantages 

  • Free software offers incomplete security operations 

How to choose online computer security software?

  • The quality of alerts: for these tools to be effective, it is essential that the alerts sent are usable and of good quality. Otherwise, the chances of the system being affected are relatively high.  
  • The ability to detect anomalies: the speed of the software to detect intrusions will determine its performance. Indeed, the more easily threats are intercepted, the lower the risk of harm. 
  • Price: computer security software does not have to be expensive to be effective. It is just a matter of finding a tool that can meet the user's expectations. 

The best free and open-source computer security software

  • TrueCrypt
  • Amanda
  • Areca Backup 
  • PacketFence
  • SmoothWall

The most popular computer security software 

For self-entrepreneurs, freelancers and self-employed people

  • FileAudit
  • SolarWinds
  • Zmanda

For VSEs 

  • Spyware Defender
  • Malwarebytes
  • Ad-Aware

For SMEs

  • Kaspersky
  • Glary Utilities
  • RogueKiller

In a world where hacking is on the rise, cybersecurity software is strongly recommended to analyze and interpret all potential alerts that weigh on your system. These solutions protect both users' files and the proper functioning of their daily activities.

Computer Security softwares: Q&A

How does a computer security software work?

chevron-right

Computer security software works by scanning your computer for vulnerabilities and threats, and then taking action to prevent them. It can include features such as antivirus, firewall, and anti-malware protection. It can also protect your computer from phishing attacks and other online threats.

What features should I look for when looking for computer security software?

chevron-right

When looking for computer security software, you should look for features such as antivirus protection, firewall protection, anti-malware protection, and anti-phishing protection. You should also consider whether the software offers real-time protection, automatic updates, and scanning options.

What are the benefits of computer security for my company?

chevron-right

Computer security software can provide many benefits for your company, such as protecting your company's data from cyber-attacks, preventing downtime due to malware infections, and improving your company's overall security posture. It can also help you comply with industry regulations and protect your customers' data.

What are the best computer security software options?

chevron-right

Some of the best computer security software options include Norton, McAfee, Kaspersky, Bitdefender, and Avast. Each of these software options offers a range of features to protect your computer from various threats.

What are the free computer security software alternatives I could try?

chevron-right

Some free computer security software alternatives you could try include Avira, AVG, and Avast. These software options offer basic features such as antivirus and anti-malware protection, but may not offer the same level of protection as paid software options. It is important to consider your specific security needs before choosing a software option.