'IT Security' Reviews and Ratings
What is 'IT Security' market?
IT Security refers to products and services that protect digital systems and data from cyber threats and unauthorized access. This category includes markets that focus on network security, identity management, data protection, and cloud security, enabling organizations to reduce risk, ensure compliance, and operate securely in a digital world.
Product Listings
Filter by
Trend Micro Deep Security is a software designed to provide advanced security for physical, virtual, and cloud environments. The software offers features such as intrusion prevention, firewall, application control, web reputation, integrity monitoring, and anti-malware. It is developed to address business challenges related to safeguarding servers and virtual desktops from vulnerabilities, malicious attacks, and unauthorized changes. By integrating multiple protection modules, the software helps organizations manage risks, enforce compliance requirements, and maintain the security of workloads across diverse infrastructures.
Cisco Meraki MX appliances are security and SD-WAN software solutions designed to simplify the management of network infrastructure for organizations. These appliances provide features such as firewall protection, intrusion detection and prevention, VPN capabilities, content filtering, and automatic updates. The software enables centralized cloud-based management, allowing users to configure, monitor, and maintain network security across multiple sites from a single interface. It addresses business needs for secure connectivity, optimized network performance, and scalable administration by integrating advanced networking functionality with automated policy enforcement and real-time analytics. The software supports both wired and wireless environments and helps organizations manage bandwidth usage, secure remote access, and ensure business continuity.
Skyhigh Cloud Native Application Protection Platform CNAPP is the industry’s first platform to extend Cloud Access Security Broker CASB, bringing application and data context to converge Cloud Security Posture Management CSPM with IaaS Data Loss Prevention DLP for IaaS public clouds. Skyhigh CNAPP provides consistent data protection, threat prevention, governance, and compliance throughout the cloud-native application development lifecycle. Skyhigh CNAPP is consolidated into a fully converged platform and managed from the same single console as the rest of the Skyhigh SSE services.
The SonicWall NSa series hybrid mesh firewalls deliver enterprise-class security purpose-built for mid-market & distributed enterprises, with simplicity & low TCO. It supports Zero-Touch Deployment & centralized management to streamline installation & administration. To protect against sophisticated threats, it combines advanced networking with multi-engine Capture Advanced Threat Protection, including patented Real Time Deep Memory Inspection for 0-day detection. High-performance deep packet inspection & TLS/SSL decryption maintain strong security without compromising performance. Built-in secure SD-WAN optimizes broadband & cloud connectivity without additional appliances, while advanced reporting and analytics provide actionable visibility. Broad integration with SonicWall & third-party solutions, plus an embedded cyber warranty through Cysurance, offers no-cost financial protection for qualifying deployments & helps reduce cyber insurance expenses & strengthen overall risk posture
Sucuri Website Firewall (WAF) is a software designed to protect websites from a range of security threats and vulnerabilities. The software provides features such as real-time website traffic monitoring, protection against distributed denial-of-service (DDoS) attacks, and prevention of unauthorized access through filtering of malicious requests. It helps mitigate exploits targeting website code and optimizes website performance by caching content and reducing load on origin servers. The software addresses the business problem of maintaining website availability and integrity by automatically blocking attempts to exploit common vulnerabilities and providing virtual patching. Through continuous monitoring and analysis, it helps ensure that websites remain secure from various online threats.
Ivanti Connect Secure (ICS) is a widely deployed SSL VPN that provides authenticated remote and mobile access to enterprise and cloud resources, with support for SSO, MFA, and SAML‑based identity federation to streamline user access and strengthen authentication controls. ICS leverages a unified access client and offers per‑app VPN and HTML5 access options to accommodate diverse endpoints and use cases. Integration with leading MDM/UEM platforms enables device compliance checks that help enforce access policies across managed devices.
SRX Series is a software developed by Juniper Networks that integrates security and networking functions for enterprise and service provider environments. The software provides firewall, intrusion prevention, automated threat intelligence, and secure connectivity capabilities. It manages traffic inspection, controls access, and enforces network segmentation to address risks and support compliance requirements. SRX Series is designed to help organizations protect infrastructure by detecting threats, blocking unauthorized access, and enabling secure communication within distributed and multi-cloud networks. The software is used to reduce operational complexity by consolidating multiple security features into a single platform, facilitating centralized policy management, and improving visibility across a network.
Qualys Web Application Scanning (WAS) secures web applications & APIs and reduces risks across the entire web attack surface through comprehensive discovery, continuous monitoring & automated remediation.
1. Comprehensive discovery across hybrid, cloud-native or on-prem environments and internal & external networks for unknown, orphaned and forgotten web apps & APIs.
2. Continuous monitoring, consolidated detection and risk-based prioritization of runtime vulnerabilities, misconfigurations, sensitive data & PII exposures, OWASP Top 10 risks, manual PEN test, web malware, in addition to compliance against regulatory standards like PCI DSS, GDPR, and HIPAA.
3. Automated remediation workflows with integration into CI/CD pipelines and ITSM to support Shift Left & Shift Right testing, reduce time to remediate, and promote collaboration between DevSecOps, AppSec, IT Ops teams.
Forcepoint Web Security (Appliance) is a software designed to provide protection for organizations against web-based threats by analyzing and filtering internet traffic. The software features real-time threat prevention, URL filtering, malware detection, and data loss prevention. It enables administrators to monitor and manage employee internet usage, enforce security policies, and block access to malicious or inappropriate websites. By inspecting incoming and outgoing web communications, the software aims to reduce risks associated with phishing, ransomware, and other online attacks. Forcepoint Web Security (Appliance) also supports integration with directory services and offers reporting tools to help ensure compliance with regulatory requirements and internal protocols. This software addresses the business challenge of safeguarding sensitive data and maintaining secure internet usage in corporate environments.
Patch My PC Patch Management is a software that enables organizations to streamline the process of deploying, managing, and updating third-party applications across endpoints. The software integrates with Microsoft Configuration Manager and Intune, allowing IT teams to automate patching processes for supported applications. It includes features such as automatic update packaging, custom deployment configuration, and reporting capabilities to help address the challenges of keeping software up to date, reducing security risks associated with unpatched applications, and decreasing manual workloads for IT staff. Patch My PC Patch Management supports a wide range of enterprise applications, aiming to improve software compliance and endpoint security in business environments.
InsightAppSec is a software developed to identify and manage security risks within web applications. It automates the detection of vulnerabilities by performing dynamic application security testing, scanning for common issues such as cross-site scripting, SQL injection, and other exploitable flaws. The software provides actionable reporting and integrates with development workflows to help organizations remediate risks efficiently. InsightAppSec features centralized management to oversee multiple applications and environments, facilitating the prioritization and tracking of vulnerabilities. The software addresses the business problem of reducing application security risks and enhancing visibility into the security posture of web applications throughout the software development lifecycle.
Cloudflare Access is a software solution that provides secure access management for internal applications and resources by verifying user identity and device posture before granting entry. This software integrates with identity providers, supports multi-factor authentication, and enables administrators to set granular access policies based on user and group attributes. It functions as a gateway to protect applications without relying on traditional VPNs, reducing potential attack surfaces. Cloudflare Access is designed to support secure remote work by ensuring that only authorized users can reach sensitive systems, thereby addressing challenges related to network security, remote access control, and compliance requirements for organizations.
Carbon Black App Control is a software designed to provide application whitelisting and endpoint protection by allowing organizations to control which applications are permitted to run on their systems. The software enables centralized management and monitoring of executable files and scripts, helping reduce the attack surface by enforcing strict policies on software execution. Carbon Black App Control addresses the business problem of unauthorized software installations and potential malicious activity by ensuring that only approved applications run on endpoints, thereby supporting compliance requirements and contributing to overall security posture. The software features real-time visibility into application usage and change control, helping organizations efficiently prevent unwanted changes and maintain system integrity.
Absolute Secure Access is a software designed to provide secure connectivity and protection for endpoint devices in remote and hybrid work environments. The software focuses on maintaining secure, resilient connections between users and corporate resources, regardless of location or network condition. It incorporates features such as encrypted network tunnels, real-time diagnostics, policy enforcement, and threat management to help organizations manage devices, ensure data privacy, and support compliance requirements. Absolute Secure Access addresses challenges related to secure remote access, network visibility, and the safeguarding of sensitive organizational information across distributed workforces.
Acunetix is a software designed for automated web application security testing. It identifies vulnerabilities such as SQL injection, cross-site scripting, and other common security issues in websites and web applications. The software enables organizations to assess risk by scanning for security flaws across a range of platforms and technologies, providing detailed reports and guidance for remediation. It integrates with development and issue tracking environments to facilitate continuous security assessments throughout the software development lifecycle. Acunetix assists businesses in meeting compliance standards by enabling regular and thorough vulnerability assessments, helping reduce the risk of exploitation in online assets.
Imperva Web Application Firewall Gateway is a software that provides security for web applications by monitoring and filtering HTTP traffic between applications and clients. The software is designed to protect applications from attacks such as SQL injection, cross-site scripting, and other vulnerabilities by analyzing incoming requests and blocking malicious activity. It features automated threat detection, customizable security policies, and integration with identity management systems. The software helps organizations address risks related to unauthorized data access and application downtime, supporting compliance requirements and enabling continuous monitoring and reporting of security events.
Forcepoint Next-Gen Firewall is a software that provides network security through features such as advanced threat protection, intrusion prevention, and secure SD-WAN connectivity. It offers centralized management capabilities to streamline policy control and monitoring across distributed environments. The software is designed to help organizations manage network access, detect suspicious activity, and respond to potential threats in real time. Forcepoint Next-Gen Firewall supports integration with cloud and on-premises infrastructure, enabling policy enforcement and data protection across different network segments. It addresses business needs related to safeguarding network resources, reducing complexity in security operations, and ensuring regulatory compliance within enterprise networks.
Symantec Advanced Threat Protection is a software designed to identify, analyze, and remediate complex cybersecurity threats across various environments, including endpoints, networks, and email systems. The software integrates multiple threat detection technologies to provide visibility into suspicious activities and targeted attacks, enabling organizations to coordinate response actions and prevent potential breaches. By leveraging centralized management and correlation of threat intelligence, the software assists businesses in addressing vulnerabilities, reducing response times, and enhancing overall security posture against advanced malware and zero-day threats.
Symantec ProxySG is a software solution that delivers secure web gateway functionality for organizations seeking to control and protect their internet traffic. The software focuses on advanced threat protection, policy enforcement, and data security by providing granular visibility into web traffic and enabling policy-based filtering and inspection. It supports encrypted traffic inspection and integrates with directory services for user authentication. Symantec ProxySG assists businesses in mitigating risks from web-based threats and ensuring compliance with internal and regulatory requirements by allowing administrators to define access controls and monitor usage. The software addresses challenges related to secure web access and data leakage prevention in enterprise environments.
Chainalysis Reactor is a software designed for tracing blockchain transactions and analyzing cryptocurrency activity. The software enables users to investigate and visualize relationships between digital assets, addresses, and entities across multiple blockchains. By providing visual mapping and data analysis capabilities, the software supports compliance teams, investigators, and analysts in examining cryptocurrency transactions for risk assessment, fraud detection, and compliance procedures. The software facilitates case management through the ability to document findings and export reports. It also integrates external data sources to enrich its investigative workflows. Chainalysis Reactor aims to address challenges related to transparency, security, and regulation in the cryptocurrency sector by supporting investigations into digital asset activity.















