Results for: protect

Suggested Categories:

Brand Protection Software
Brand protection software is designed to safeguard a company’s intellectual property, online presence, and reputation from unauthorized use or infringement. It helps detect and prevent counterfeit goods, fraudulent websites, and trademark violations, ensuring that a brand’s identity remains secure across digital platforms. These tools use advanced technologies like AI and machine learning to monitor online marketplaces, social media, and other channels for potential threats. By identifying infringements quickly, brand protection software minimizes the risk of financial loss and reputational damage. Ultimately, it supports a brand's ability to maintain control over its products and messaging in an increasingly digital world.
DDoS Protection Services
DDoS protection services safeguard websites and online resources from Distributed Denial of Service (DDoS) attacks that flood networks with malicious traffic to disrupt access. These services use advanced filtering, traffic analysis, and rate-limiting to detect and mitigate large volumes of unwanted traffic, ensuring legitimate users can still access the site. DDoS protection often includes real-time monitoring, alerts, and automated responses to handle attacks swiftly and minimize downtime. By deploying DDoS protection, businesses maintain website performance and uptime, protecting user experience and brand reputation. Overall, these services provide a critical layer of defense against cyber threats that can otherwise lead to financial and operational losses.
Cloud Workload Protection Platforms
Cloud workload protection platforms help organizations secure applications, workloads, and data running across public, private, and hybrid cloud environments. They continuously monitor workloads for vulnerabilities, misconfigurations, and malicious activities to prevent breaches and data loss. These platforms provide visibility across virtual machines, containers, and serverless functions, offering automated threat detection and compliance enforcement. By integrating with cloud infrastructure and DevOps pipelines, they enable consistent security policies throughout the application lifecycle. Ultimately, cloud workload protection platforms ensure scalable, real-time protection for modern cloud-native environments.
Endpoint Protection Software
Endpoint protection software is a software platform that provides the solution to secure endpoints—such as laptops, desktops, smartphones, and tablets—against cyber threats and attacks. These platforms provide real-time monitoring and defense mechanisms to protect devices from malware, ransomware, phishing, and other types of threats. Endpoint protection software typically includes antivirus, anti-malware, firewall, encryption, and intrusion prevention features to prevent unauthorized access and ensure data security. It also allows for centralized management, enabling IT teams to enforce security policies, update software, and monitor the health of all devices in the network. By using endpoint protection software, organizations can safeguard their devices and networks from cyber risks while maintaining compliance with security standards.
Ransomware Protection Software
Ransomware protection software, also known as anti-ransomware software, is a software security solution designed to detect, prevent, and mitigate ransomware attacks that encrypt files and demand payment for their release. These tools use advanced threat detection techniques, including behavioral analysis, machine learning, and heuristic scanning, to identify and block malicious activity before it can cause harm. Many solutions offer real-time monitoring, automatic backups, and rollback features to restore compromised files without paying a ransom. Additionally, they provide endpoint protection, email filtering, and anti-exploit mechanisms to safeguard against phishing and other attack vectors. Effective ransomware protection software is essential for businesses and individuals to defend against financial loss, data breaches, and operational disruptions.
Protective Intelligence Platforms
Protective intelligence platforms are advanced systems designed to identify, assess, and mitigate potential threats to individuals, organizations, or assets. They leverage real-time data collection, AI-driven analysis, and predictive analytics to detect and address risks before they materialize. These platforms often integrate multiple data sources, such as social media, open-source intelligence, and internal security systems, to provide comprehensive threat visibility. Their goal is to enable proactive decision-making by delivering actionable insights to security teams. By streamlining threat detection and response, protective intelligence platforms enhance organizational safety and resilience.
Client-Side Protection Platforms
Client-side protection platforms are security tools designed to protect users from threats that can arise when interacting with websites. These platforms monitor and secure the client-side environment, such as web browsers, against vulnerabilities like cross-site scripting (XSS), malicious JavaScript, and other client-side attacks. They provide features such as real-time threat detection, script monitoring, and content security policies (CSP) enforcement to ensure that the web content being loaded is safe and hasn't been tampered with. By securing the client side, these platforms help prevent data breaches, session hijacking, and unauthorized access to sensitive information during web interactions. This protection is crucial for maintaining the integrity and security of online user experiences.
Account Takeover Protection Software
Account takeover protection software is a type of security software designed to protect online accounts from unauthorized access.
Active Shooter Protection Software
Active shooter protection software is designed to help organizations and individuals better prepare for actively violent situations. It provides resources such as real-time threat monitoring, automated safety alerts, and crisis response plans.
eCommerce Fraud Protection Software
eCommerce fraud protection software is designed to help online retailers detect and prevent fraudulent activities, protecting revenue and customer trust. It uses advanced algorithms, machine learning, and real-time data analysis to identify suspicious transactions and patterns indicative of fraud. The software often includes tools for monitoring customer behavior, verifying payment information, and flagging high-risk activities before they lead to chargebacks or financial loss. By automating fraud detection and integrating seamlessly with eCommerce platforms, it reduces manual checks and speeds up the review process. eCommerce fraud protection software is essential for online businesses to safeguard against losses, enhance customer security, and maintain a seamless shopping experience.
Employee Identity Theft Protection Software
Employee identity theft protection software and services allow organizations to offer their employees with effective identity theft protection in order to protect the employee from identity theft, as well as protect the organization from threats related to employee identity theft.
Digital Risk Protection (DRP) Platforms
Digital risk protection platforms are software tools designed to monitor and mitigate potential online threats to businesses. They use advanced algorithms and machine learning techniques to analyze data from various sources, such as social media, the dark web, and public databases. These platforms provide real-time alerts about potential risks, such as data breaches, brand impersonation, or social engineering attacks. They also offer proactive measures to prevent or mitigate these risks, such as removing malicious content or blocking unauthorized access attempts. With the rise of cybercrime and online fraud, digital risk protection platforms have become essential for organizations looking to protect their digital assets and reputation.
Advanced Threat Protection (ATP) Software
Advanced threat protection (ATP) software is designed to detect, prevent, and respond to sophisticated cyber threats in real-time. It employs advanced techniques such as machine learning, behavioral analysis, and threat intelligence to identify and mitigate potential security risks. The software offers comprehensive protection across various endpoints, networks, and cloud environments, ensuring a multi-layered defense strategy. It also provides detailed reporting and analytics, enabling organizations to understand threat patterns and improve their security posture. By integrating these capabilities, advanced threat protection software helps organizations safeguard sensitive data, maintain regulatory compliance, and enhance overall cybersecurity resilience.
Runtime Application Self-Protection (RASP) Software
Runtime Application Self-Protection (RASP) software is a security solution designed to protect applications in real time while they are running, providing active defense against attacks by detecting and mitigating vulnerabilities as they occur. Unlike traditional security tools, which primarily focus on perimeter defense or static scanning, RASP operates within the application itself and monitors its behavior during runtime. It can automatically block malicious activity, such as SQL injection, cross-site scripting (XSS), and unauthorized access, by analyzing both application traffic and the application's internal behavior. RASP is particularly valuable for protecting web applications, mobile apps, and APIs from advanced threats, ensuring the security of applications even if they are deployed in dynamic or cloud environments.
Data-Centric Audit Protection (DCAP) Software
Data-Centric Audit Protection (DCAP) software helps organizations safeguard sensitive data by focusing on monitoring, protecting, and auditing data at its source, regardless of where it is stored or used. It offers real-time visibility into data access and usage, ensuring that any unauthorized or suspicious activity is detected and addressed promptly. The software typically includes features like data classification, encryption, access controls, and detailed audit trails to enhance data security and compliance with regulatory standards. By centralizing data governance and protection, DCAP software minimizes the risk of data breaches and ensures that organizations maintain tight control over their most sensitive information. Ultimately, it improves data security, supports compliance efforts, and enables better risk management.
Cloud-Native Application Protection Platforms (CNAPP)
Cloud-native application protection platforms (CNAPP) are a type of security software designed to protect applications hosted in the cloud. These platforms use various techniques to detect and prevent malicious activities such as unauthorized access, data exfiltration, and abuse of user privileges. They provide full visibility into the activity within applications and services, enabling organizations to quickly spot anomalous behavior or uncover threats. Cloud-native application protection platforms can also be used to strengthen compliance with industry regulations and standards.
Data Security Software
Data security software is designed to protect sensitive data from unauthorized access, theft, or corruption. It includes a variety of tools and features such as encryption, access control, data masking, and backup and recovery to ensure that data remains secure at rest, in transit, and during processing. These solutions help organizations comply with data protection regulations, such as GDPR and HIPAA, by safeguarding personal, financial, and business data. Data security software often integrates with other IT security systems to provide comprehensive protection against cyberattacks, insider threats, and data breaches, ensuring that critical information remains protected.
Email Security Software
Email security software protects organizations from cyber threats such as phishing, malware, and spam by filtering incoming and outgoing email traffic. It uses advanced threat detection, encryption, and data loss prevention (DLP) to safeguard sensitive information. These tools also offer features like email authentication (DMARC, SPF, DKIM) and real-time threat intelligence to block emerging attacks. By securing email communications, businesses can prevent data breaches, ensure regulatory compliance, and maintain user trust. Email security software is essential for mitigating human error, which is one of the leading causes of data breaches.
Computer Security Software
Computer security software helps protect devices, networks, and sensitive data from unauthorized access, cyberattacks, and other security threats. These tools provide a range of protective features such as antivirus, firewall, encryption, malware detection, and intrusion prevention systems. Computer security software is essential for safeguarding against viruses, ransomware, spyware, and phishing attacks, ensuring the integrity, confidentiality, and availability of data. Many security solutions also offer real-time monitoring, automated updates, and threat intelligence to detect and mitigate new vulnerabilities as they emerge. Businesses and individuals rely on computer security software to reduce risks, comply with regulations, and maintain a secure computing environment.
Website Security Software
Website security software protects websites from cyber threats such as malware, hacking attempts, DDoS attacks, and data breaches. It continuously monitors website traffic, scans for vulnerabilities, and blocks suspicious activity in real time. Many solutions include firewalls, bot protection, SSL management, and automated malware removal to keep sites safe and compliant. Website security software also provides dashboards and reports to help teams understand risks and stay ahead of emerging threats. Overall, it ensures websites remain fast, secure, and trustworthy for users.

7794 Products for "protect"

  • 1
    Protect

    Protect

    Protect

    Protect is eCommerce Protection with a Cause. We build software that enhances online stores and protects both merchants and shoppers! We are most known for our fast loading, high attachment rates, many features in one, and support for causes and charities.
  • 2
    ESET PROTECT Advanced
    ESET Protect Advanced is a comprehensive cybersecurity solution designed for businesses of all sizes. It offers advanced endpoint protection against ransomware, zero-day threats, and sophisticated attacks with ESET LiveSense technology. It includes full disk encryption for legal compliance and data protection. The solution features proactive cloud-based threat defense using adaptive scanning, machine learning, cloud sandboxing, and behavioral analysis to prevent new threats. ...
    Starting Price: $275/month/5 devices
    View Software
    Visit Website
  • 3
    DriveStrike

    DriveStrike

    DriveStrike

    ...Integrated drive encryption support as well as mobile device management MDM for mobile platforms. Our professional support team is always available to answer your questions and help you install our services or manage your account and devices. Protecting your data and devices has never been easier or more cost effective. If you have questions or need help understanding how best to protect your data please contact us and we will gladly answer your questions. Protect your business with a device and data protection platform that keeps all devices safe with a single solution and Dashboard. ...
    Starting Price: $0.99 per month
    Partner badge
    View Software
    Visit Website
  • 4
    Validian Protect
    Validian’s technology secures data in use, in memory, in databases, at rest, in transit and against interception by untrusted operating systems. It works on all devices, operating systems and technology platforms — and everywhere in between. Our unique Application & Data Protection Software, ValidianProtect, is a powerful, flexible, scaleable and rapidly integrated cyber security middleware. Seamlessly securing data in use, in memory, in databases, at rest, in transit and against interception by untrusted operating systems is a major breakthrough in cyber security. Dynamically rotating symmetrical keys for encrypting and decrypting data in memory, in databases, in storage, in transit and against interception by untrusted operating systems make Validian Protect unique with new industry-shaping features in data protection. ...
  • 5
    Office Protect
    Office Protect is a Microsoft 365 security add-on that helps MSPs offer managed security more easily and efficiently. It lets you quickly set best practice security settings for all your tenants at the same time, monitors activity 24/7, and alerts you to suspicious events in a timely fashion. By using Office Protect, you're raising clients baseline security, improving your security offer, and showing your value to customers.
    Starting Price: $1 USD/Office 365 seat
  • 6
    Jamf Protect

    Jamf Protect

    Jamf Protect

    Endpoint protection built exclusively for Mac. Prevent macOS malware, detect and remediate Mac-specific threats, and monitor endpoints for compliance with Jamf Protect. Built for Mac to protect Mac. Jamf Protect puts the spotlight on Apple, helping security and IT teams with Mac in organizations of all sizes. Scale your teams through tools that understand the Mac platform.
    Starting Price: $5 per user, per month
  • 7
    UltraDDoS Protect
    ...But the damage doesn’t end there: Nearly half of reported attacks are conducted in concert with a breach, often leaving behind virus infections, data theft, malware activation, and now – ransomware attacks. Mitigating the DDoS attacks of today and tomorrow requires more than just technology. UltraDDoS Protect provides you with powerful analytics, top-tier DDoS mitigation, and layer 7 protection that allows you to suppress threats before they become attacks. UltraDDoS Protect is relied upon by companies of all sizes to keep their infrastructure and proprietary information safe and available.
  • 8
    CrowdBlink Protect
    CrowdBlink Protect has been used by essential businesses during the shutdown to conduct daily assessments of their employees for symptoms of COVID-19, allowing them to safely continue operating. Now, as we begin to reopen the economy other organizations are beginning to use the same system to reopen safely. From construction, manufacturing, and retirement/senior care facilities to child care centres, office buildings, and more CrowdBlink Protect is the easy, affordable solution to help you keep your community safe. ...
    Starting Price: $49 per location per month
  • 9
    ESET PROTECT
    Protect your company endpoints, business data and users with ESET's multilayered technology. ESET PROTECT platform offers customizable security solutions, easy to manage from a cloud console. Cyber risk management and visibility into your IT environment. Stay one step ahead of any known or unknown threats. Up-to-date information and customized notifications allow the IT staff to react promptly to any risks that may have developed.
    Starting Price: $239 per year
  • 10
    Axiom Protect

    Axiom Protect

    Axiom Protect

    To empower your multiple IT systems( On-premise, cloud or hybrid) by embedding multifactor security to suit each individual system, service, workflow and user's preference. Central Control to meet your business needs and regulatory compliance comes from policies and settings. Default to Custom all with simple clicks. Inbuild Complex Password Source to external LDAP/Active Directory synchronized user and operator sources for consolidation. Bringing trust through user's devices makes...
  • 11
    BlackBerry Protect
    ...Malware and grayware are identified by application sandboxing and code analysis, plus app-security testing. All applications are scanned and validated before being pushed to the device or the user seeking access. All mobile endpoints BlackBerry UEM manages are protected from zero-day threats without reliance on end users to install, log in or maintain third-party apps or configure settings manually. Choose a single-point connectivity solution. Download once, distribute locally. Hybrid deployment facilitates security-related communication between the cloud and local infrastructure without exposing your network.
  • 12
    Calamu Protect

    Calamu Protect

    Calamu Protect

    Calamu Protect automatically fragments data across multiple separate storage locations while at rest, in an environment called a data harbor, which instantly nullifies the impact of a data breach or ransomware attack. Protects against data theft and extortion. Fragmented data is worthless to cyber attackers. Automatically self-heals from cyber attacks.
  • 13
    Adaware Protect
    Adaware Protect is the all-in-one suite that includes Adaware Safe Browser to increase your online security. Adaware Protect's online security keeps your entire computer safe from suspicious websites. Adaware Protect blocks unsafe sites and lets you see what applications try to access malicious or unknown URLs. With one click, Adaware Protect allows you to block hackers and spyware from accessing your camera and microphone.
    Starting Price: Free
  • 14
    Protect AI

    Protect AI

    Protect AI

    Protect AI performs security scans on your ML lifecycle and helps you deliver secure and compliant ML models and AI applications. Enterprises must understand the unique threat surface of their AI & ML systems across the lifecycle and quickly remediate to eliminate risks. Our products provide threat visibility, security testing, and remediation.
  • 15
    PK Protect
    PK Protect is a data protection platform designed to help organizations safeguard sensitive information across diverse environments. It provides robust tools for data discovery, classification, encryption, and monitoring, ensuring that critical data is protected both at rest and in transit. With automated policies and compliance controls, PK Protect enables businesses to meet regulatory requirements like GDPR and HIPAA while minimizing the risk of data breaches. ...
  • 16
    PingOne Protect

    PingOne Protect

    Ping Identity

    Prevent account takeover, new account fraud, and MFA fatigue with PingOne Protect. By evaluating multiple attack vectors, assigning risk scores, and providing insights, PingOne Protect triggers mitigation tools to block attacks and allow legitimate users to authenticate easily. PingOne Protect’s intelligence-based policies combine the results of multiple risk predictors to calculate an overall risk score. The score correlates to policies that determine the type and amount of friction to introduce into the user flow, such as CAPTCHA, password resets, selfie verification, and push notifications. ...
  • 17
    Protect Me

    Protect Me

    Meow Enterprises

    Protect Me is an advanced security assistant application offering a range of security solutions. The app provides various features designed to enhance user safety and security. The data safety section indicates that the developer has provided information about the types of data that may be collected and shared, as well as the security practices the app may follow.
    Starting Price: Free
  • 18
    Guardz

    Guardz

    Guardz

    ...With 24/7 AI + human-led MDR, Guardz utilizes agentic AI to triage at machine speed while expert analysts validate, mitigate, and guide response, giving MSPs scalable protection without adding headcount. Our mission is simple: give MSPs the scale, confidence, and clarity they need to stay ahead of attackers and deliver protection to every SMB they serve.
    Partner badge
    View Software
    Visit Website
  • 19
    Venn

    Venn

    Venn

    Venn is the leader in BYOD Security. Venn’s Blue Border™ is patented technology that protects company data and applications on BYOD computers used by contractors and remote employees - without VDI. With Venn, work lives in a company-controlled Secure Enclave (installed on the user’s PC or Mac) where all data is encrypted and access is managed. Work applications run locally within the Enclave (no hosting or virtualization) and are protected and isolated from any personal use on the same computer. ...
    Leader badge
    Partner badge
    View Software
    Visit Website
  • 20
    cside

    cside

    cside

    cside is the leading client-side intelligence platform. Protecting organizations from advanced client-side threats such as script injection, data skimming, and browser-based attacks, risks often overlooked by traditional security measures. Leveraging client-side intelligence to provide evidence to fight chargeback fraud cases. It also addresses the growing challenge of web supply chain risk, ensuring real-time visibility and control over third-party scripts running in user environments. cside provides proactive, proxy-based protection that helps organizations meet compliance requirements like PCI DSS 4.0.1, safeguard sensitive data, and uphold user privacy, all without compromising performance.
    Leader badge
    Starting Price: $99 per month
    Partner badge
    View Software
    Visit Website
  • 21
    1Password

    1Password

    1Password

    ...Using 1Password makes it easy for your employees to stay safe online. Once 1Password is part of their workflow, good security habits will become second nature. 1Password Advanced Protection is now available with 1Password Business. Set Master Password policies, enforce two-factor authentication team-wide, restrict access with firewall rules, review sign-in attempts and require your team to use the latest version of 1Password. Our award-winning apps are available for Mac, iOS, Linux, Windows, and Android. 1Password syncs seamlessly across devices, so your employees always have access to their passwords. ...
    Leader badge
    Starting Price: $3.99/month/user
    View Software
    Visit Website
  • 22
    ThreatLocker

    ThreatLocker

    ThreatLocker

    The ThreatLocker suite of security tools are powerful and designed so that everyone from businesses to government agencies to academic institutions can directly control exactly what applications run on their networks. We envision a future in which all organizations can chart their own course free from the influence of cybercriminals and the damage their incursions cause, and our team of veteran cybersecurity professionals created ThreatLocker to make this vision a reality. The team at...
    Leader badge
    Partner badge
    View Software
    Visit Website
  • 23
    DataDome

    DataDome

    DataDome

    DataDome protects businesses from cyberfraud and bot attacks in real time, securing digital experiences across websites, mobile apps, ads, and APIs. Named a Leader in the Forrester Wave for Bot Management, DataDome is powered by AI that analyzes 5 trillion signals daily, delivering unmatched protection without compromising performance. Its Cyberfraud Protection Platform seamlessly integrates into any tech stack, offering record-fast time to value.
    Starting Price: $1590 per month
    View Software
    Visit Website
  • 24
    SOCRadar Extended Threat Intelligence
    SOCRadar provides a unified, cloud-hosted platform designed to enrich your cyber threat intelligence by contextualizing it with data from your attack surface, digital footprint, dark web exposure, and supply chain. We help security teams see what attackers see by combining External Attack Surface Management, Cyber Threat Intelligence, and Digital Risk Protection into a single, easy-to-use solution. This enables your organization to discover hidden vulnerabilities, detect data leaks, and shut down threats like phishing and brand impersonation before they can harm your business. By combining these critical security functions, SOCRadar replaces the need for separate, disconnected tools. ...
    View Software
    Visit Website
  • 25
    Safetica

    Safetica

    Safetica

    .... ✔️ Cloud Security: Protect Microsoft 365, cloud, and file-sharing platforms to secure sensitive cloud-based data.
    Leader badge
    Partner badge
    View Software
    Visit Website
  • 26
    Zengo Wallet
    ...Zengo’s unparalleled security is due to its industry-first, enterprise-grade, self-custodial Multi-Party Computation security, a secure recovery model, and premium Zengo Pro offerings. Unlike hardware wallet whose security depends on a single-factor protection (seed phrase vulnerability), Zengo had 0 wallets ownership compromised since its launch in 2018. Zengo is trusted by over 1 million customers, on both mobile and desktop apps.
    Leader badge
    Starting Price: Free
    View Software
    Visit Website
  • 27
    ConnectWise SIEM

    ConnectWise SIEM

    ConnectWise

    ConnectWise SIEM (formerly Perch) offers threat detection and response backed by an in-house Security Operations Center (SOC). Defend against business email compromise, account takeovers, and see beyond your network traffic. Our team of threat analysts does all the tedium for you, eliminating the noise and sending only identified and verified treats to action on. Built with multi-tenancy, ConnectWise SIEM helps you keep clients safe with the best threat intel on the market.
    Starting Price: $10 per month
    View Software
    Visit Website
  • 28
    Sumsub

    Sumsub

    Sumsub

    ...With Sumsub’s customizable KYC, KYB, AML, Transaction Monitoring and Fraud Prevention solutions, you can orchestrate your verification process, welcome more customers worldwide, meet compliance requirements, reduce costs and protect your business. Sumsub achieves the highest conversion rates in the industry—91.64% in the US, 95.86% in the UK, and 97.89% in Hong Kong—while verifying users in less than 50 seconds on average. Sumsub’s methodology follows FATF recommendations, the international standard for AML/CTF rules and local regulatory requirements (FINMA, FCA, CySEC, MAS, BaFin). ...
    Starting Price: $1.35 per verification
    View Software
    Visit Website
  • 29
    Fraud.net

    Fraud.net

    Fraud.net, Inc.

    Fraudnet's AI-driven platform empowers enterprises to prevent threats, streamline compliance, and manage risk in real-time. Our sophisticated machine learning models continuously learn from billions of transactions to identify anomalies and predict fraud attacks. Our unified solutions: comprehensive screening for smoother onboarding & improved compliance, continuous monitoring to proactively identify new threats, & precision fraud detection across channels and payment types. With dozens...
    View Software
    Visit Website
  • 30
    SenseIP

    SenseIP

    SenseIP

    ...They face no tedious process. SenseIP delivers clear, fast, accessible IP protection that matches the pace of innovation. No expensive lawyers are needed.
    Starting Price: $0
    View Software
    Visit Website
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next