Best Other IT Security Software

Products Buyer's Guide
7.6
mSpy
★★★★★

mSpy

mSpy is a computer security for parental control. Helps parents to give attention to their children online activities. It checks WhatsApp, Facebook, massage and snapchat messages.

Does not work on Android 12 - issues getting a refund - Administrator in Accounting

Ease of use
Support
Ease of Setup
9.2
Outlook PST Recovery
★★★★★

Outlook PST Recovery

Voimakas Outlook PST Recovery is a software that recover emails from corrupted PST file save them into new PST files or existing PST file with whole emails items and attachments and also recovers deleted Outlook emails items without any data defeat.

Great app to recover lost emails - User in Retail

Ease of use
Support
Ease of Setup
8.8
Stellar Phoenix Mac Data Recovery
★★★★★

Stellar Phoenix Mac Data Recovery

This is a rescue application which retrieves deleted data from a Mac hard drive. A number of storage devices it can support ranges from SSDs, USB, external hard drives, Time Machine and password protected media. Compatible with macOS Sierra 10.12.

Great Product and Will Save You From Stress! - Brandon C.

Ease of use
Support
Ease of Setup
8.0
SiteOwl
★★★★★

SiteOwl

SiteOwl is the world's first unified, digital platform for security integrators and system managers that provides an end-to-end solution to help users design, install, and manage their security systems. SiteOwl brings modern technology to the job site by equipping designers, field technicians, and integrator customers with a suite of mobile and cloud-based applications to efficiently manage security system design, installations, and service ...

Exceptional Communication Tool - Hector R.

Ease of use
Support
Ease of Setup
10.0
Rocket Servergraph
★★★★★

Rocket Servergraph

Rocket Servergraph reduces the cost and complexity of monitoring/reporting of backup environment across heterogeneous platforms and applications.

Great software - Parul P.

Ease of use
Support
Ease of Setup
9.6
Suhosin
★★★★★

Suhosin

Suhosin is an advanced protection system for PHP 5 installations. It is designed to protect servers and users from known and unknown flaws in PHP applications and the PHP core.

Indispensible security tool for PHP5 servers / legacy applications - BenoГ®t d.

Ease of use
Support
Ease of Setup
8.6
Message Classification
★★★★★

Message Classification

Protect your organization's information assets by allowing users to classify and label all emails at the point of creation.

Useful software for classifying company documents - Umit Y.

Ease of use
Support
Ease of Setup
10.0
SecureBridge
★★★★★

SecureBridge

SecureBridge is a tool that represents clients and servers for SSH, SFTP and SSL protocols as a network security solution, it protects any TCP traffic using SSH or SSL secure transport layer protocols, that provide authentication for both client and server, strong data encryption, and data integrity verification.

SecureBridge is the best way to add SSL access to MySQL databases from Delphi. - Matthew V.

Ease of use
Support
Ease of Setup
8.0
Symantec Encrypted Traffic Management
★★★★★

Symantec Encrypted Traffic Management

Most cyber threats hide in encrypted communications up to 70 percent of all traffic. Symantec Proxy and SSL Visibility Appliance decrypt traffic, support infrastructure security to maintain privacy and data integrity.

Symantec in the Classroom - User in Education Management

Ease of use
Support
Ease of Setup
8.0
Rocket Aldon
★★★★★

Rocket Aldon

Rocket Aldon Lifecycle Manager software automates everything that happens from the time a change request arises until the time of delivering software into production.

Using Rocket Aldon for Iseries Code Promotion and Versioning - User in Automotive

Ease of use
Support
Ease of Setup
6.0
Passport Photo Maker
★★★★★

Passport Photo Maker

Passport Photo Maker is the ultimate software tool that helps you prepare and print ID photos in no time.

Nice software for passport size photo - User in Computer Software

Ease of use
Support
Ease of Setup
5.0
Quest Intrust
★★★★★

Quest Intrust

Only with Quest InTrust, you can monitor all user workstation and administrator activity from logons to logoffs and everything in between.

Quest Intrust - Multibuilding S.

Ease of use
Support
Ease of Setup
4.0
OWAGuard
★★★★★

OWAGuard

OWAGuard is a exchange server authentication security solution designed to protect Outlook Web App users and businesses from a variety of logon and password attacks, and real-time reporting and alerts of suspicious OWA logon activity.

Excellent Security measures - User in Renewables & Environment

Ease of use
Support
Ease of Setup
10.0
PST Merge Tool
★★★★★

PST Merge Tool

SysInfoTools PST Merge is a tool that combine multiple PST files into a single PST file, merge Outlook personal folders data, copy or move the content from multiple Microsoft Outlook PST files into a selected Outlook file or create a new PST file.

PST Merge Tool: the best choice for always keeping your outlook info integrated - Richard V.

Ease of use
Support
Ease of Setup
10.0
SuperTokens
★★★★★

SuperTokens

SuperTokens manages user sessions in the most secure way possible by minimising the chances of session attacks (such as XSS, Session fixation, compromised JWT signing key, CSRF etc) and enabling robust ways of detecting session theft (we use rotating refresh tokens - as recommended by IETF in RFC 6819). We've made it highly customisable and incredibly easy to integrate - saving your developer's time in the process.What is user session ...

SuperTokens! Must have app for Session Management - Aliyah M.

Ease of use
Support
Ease of Setup

Languages supported: English

Platforms: Mac, Win, Linux

Price: $$$$$

Business Size: 1

0.0
Lotus Notes Security Removal
★★★★★

Lotus Notes Security Removal

Notes Storage Format (NSF) file is an IBM Lotus Notes database file. The NSF files stores users emails, notes, contacts, calendars, etc.

Lotus Notes - not the best - User in Investment Management

Ease of use
Support
Ease of Setup
0.0
SystemSaver
★★★★★

SystemSaver

SystemSaver Enterprise allows you to securely and permanently delete all company or personal data while leaving the operating system and programs intact. It's perfect for reusing computers within your organization or recycling them for other purposes.

Decent product - User in Accounting

Ease of use
Support
Ease of Setup
B2B Software Guide