Results for: trojan

Suggested Categories:

IT Security Software
IT security software is designed to protect information technology (IT) systems, networks, and data from cyber threats, such as malware, hacking, and unauthorized access. These tools provide various features such as antivirus protection, firewalls, encryption, intrusion detection and prevention systems, and vulnerability management to ensure the integrity, confidentiality, and availability of sensitive information. IT security software helps organizations detect, prevent, and respond to security incidents, mitigate risks, and ensure compliance with industry regulations. It is critical for businesses and individuals to safeguard against cyberattacks, data breaches, and other security vulnerabilities.

60 Products for "trojan"

  • 1
    Trojan

    Trojan

    Trojan Trading

    Trojan is a decentralized trading platform that facilitates seamless and secure on-chain transactions. By leveraging advanced technology, it offers users a competitive edge in trading. The platform features a Telegram bot designed for simplicity and efficiency, enabling users to commence trading swiftly. Additionally, Trojan provides a referral program that allows users to earn passive income by sharing the platform with others.
    Starting Price: Free
  • 2
    Trojan Killer

    Trojan Killer

    Gridinsoft

    GridinSoft Trojan Killer will perform the complete cleanup of your system from viruses. Plus, we will help you restore the ideal performance of your PC. Is a virus removal tool: fast, effective and reliable. For more convenient use we make it portable now – so that it is easy to run it on any computer. Even when internet is blocked! This antimalware solution effective for any cyber threats.
    Starting Price: $35.95 per year
  • 3
    F-Secure SAFE
    Real-time protection against viruses, trojans, ransomware, and spyware. Automatic security measures secure your online banking and payments. Prevents you from accidentally connecting to harmful websites. Keep your children safe from harmful content and moderate their screen time. SAFE secures your online life. Manage your subscription and add protection to your PC, Mac, Android, and iOS devices easily through your My F‑Secure account.
  • 4
    Venusense IPS

    Venusense IPS

    Venusense

    It contains Venustech’s accumulation and research results in intrusion attack identification, making it reach the international leading level in precise blocking. It can actively block a variety of in-depth attack behaviors such as network worms, spyware, Trojan horse software, overflow attacks, database attacks, advanced threat attacks, and brute force, which makes up for the lack of in-depth defense effects of other security products. Venusense IPS constantly updates detection capability through features, behaviors, sandboxes, and algorithms, while maintaining the advantages of traditional IPS, it defends against advanced persistent attacks (such as unknown malicious files, unknown Trojan horse channels), 0 day attacks, sensitive information leakage behaviors, precision attacks, enhanced anti-WEB scanning, etc.
  • 5
    AnVir Task Manager Pro
    Windows task manager processes, windows xp slow startup, windows startup programs, Vista tweaks. Control everything running on the computer, remove Trojans, speed up computer. AnVir Task Manager Pro provides convenience by offering all of its features in a single interface. It saves money because users won't have to buy multiple packages to perform a family of related tasks. Terminate processes that can not be terminated via Windows Task Manager. Temperature of CPU, video card, external USB HDD. ...
    Starting Price: $49.95 one-time payment
  • 6
    ByteFence

    ByteFence

    ByteFence

    Bytefence's innovative Anti-malware software detects and removes trojans, worms, spyware, crapware, and other high-risk malware. ByteFence is the best protection against crapware and bundleware that infiltrate potentially unwanted programs and ads. Real-time protection keeps you protected all the time from dangerous infections and unwanted software. Robust protection against all malware. Scans and removes harmful trojans, worms, and spyware.
  • 7
    ClamAV

    ClamAV

    ClamAV

    ...ClamAV supports multiple file formats and signature languages, as well as file and archive unpacking. Access to ClamAV versions that work with your operating system. ClamAV® is an open-source antivirus engine for detecting trojans, viruses, malware & other malicious threats. ClamAV® is an open-source (GPL) anti-virus engine used in a variety of situations, including email and web scanning, and endpoint security. It provides many utilities for users, including a flexible and scalable multi-threaded daemon, a command-line scanner, and an advanced tool for automatic database updates. ...
  • 8
    Sophos Home
    ...Surf the web with confidence, knowing Sophos Home protects your online shopping and banking from phishing and hacking. Starts with a deep scan and clean of your computers for hidden threats. Removes malware lurking on your system. Eliminates viruses, trojans, rootkits, spyware, and more. Protects against viruses, malware, trojans, worms, bots, unwanted apps, and more – even ones no one’s heard of yet.
    Starting Price: $44.99 per year
  • 9
    bucketAV

    bucketAV

    bucketAV

    Forget the hassle of complex configuration. Detect viruses, trojans, ransomware, and malware at your convenience with a ready-to-deploy solution for your cloud infrastructure. Protect Amazon S3 or Cloudflare R2 from viruses, trojans, ransomware, and other kinds of malware. Keep your files virus-free with a solution that runs on its own within your cloud infrastructure and effortlessly scales. You don’t need to search far and wide.
    Starting Price: $0.025 per hour
  • 10
    HitmanPro
    Cleans malware, viruses, trojans, worms, keyloggers, rootkits, trackers, spyware, and more. HitmanPro is the malware remover of choice for tens of millions of people. Because it does five things very, actually, exceptionally, well. Stops complex attacks and exploits in real-time while increasing privacy including HitmanPro. You can download HitmanPro in two seconds (unless you still have dial-up internet).
    Starting Price: $24 one-time payment
  • 11
    MalwareFox

    MalwareFox

    MalwareFox

    ...We believe that the computing experience should be safe and secure where private data is protected. Spyware Removal Tool takes care of privacy by removing spy programs. Due to its polymorphic nature, Antivirus programs often miss out on Trojan infections. MalwareFox's Trojan Remover can get rid of such infections from your computer.
    Starting Price: $27.99 per year
  • 12
    IObit Cloud

    IObit Cloud

    IObit Cloud

    ...IObit Cloud is an advanced automated threat analysis system. We use the latest Cloud Computing technology and Heuristic Analyzing mechanic to analyze the behavior of spyware, adware, trojans, keyloggers, bots, worms, hijackers and other security-related risks in a fully automated mode.
  • 13
    SUPERAntiSpyware

    SUPERAntiSpyware

    SUPERAntiSpyware

    Protect your PC from malicious threats from malware, spyware, ransomware, trojans, keyloggers, and more. Boost Microsoft Defender. Fixes parts of your operating system, registry, task manager, broken internet connections, etc. caused by malware. Receive notifications when product and database updates are available. Scans run in the background and can start when your PC is sleeping. Quarantines potential threats and completely removes them, even the stubborn ones.
    Starting Price: $29.95 per year
  • 14
    R&S®Browser in the Box

    R&S®Browser in the Box

    Rohde & Schwarz Cybersecurity

    ...Browser in the Box offers proactive protection against cyberattacks. Thanks to the secure separation of the browser from the rest of the PC, you and your corporate network are protected against Trojan horses, ransomware, ATPs and zero-day attacks. Java, JavaScript, Flash and the opening of dangerous links are no longer a threat.
  • 15
    Recover My Files
    Recover My Files data recovery software recovers deleted files emptied from the Windows Recycle Bin, files lost due to the format or re-install of a hard drive, or files removed by a virus, Trojan infection, unexpected system shutdown or software failure. Recover My Files enables you to view the data recovery results Recover My Files is fast and easy. No technical or data recovery software skills are required to undelete files. Use Recover My Files to perform hard drive data recovery, or if you are trying to unformat and recover data from floppy disk, zip drive, smart media, compact flash or other removable media. ...
  • 16
    NeSSi2

    NeSSi2

    NeSSi2

    ...The deployment of these networks is progressing at an exponential rate as different kinds of participants such as corporations, public authorities and individuals rely on sophisticated and complex services and communication systems. With regard to information security, this leads to new challenges as large amounts of data, which may hold malicious content such as worms, viruses, or Trojans, are transferred over open networks. Network security measures dealing with these threats can be implemented in the network itself as well as at hosts connected to access routers of the network. The host-based approach has its merits, especially with respect to the scalability of a resulting security framework; for example, placing security capabilities such as firewalls or virus scanners on individual hosts does not inhibit the traffic travelling through the network.
  • 17
    360 Security Guard

    360 Security Guard

    360 Security Guard

    As an industry-leading security antivirus product, 360 Security Guard can accurately detect and kill all kinds of Trojan viruses, and is always committed to protecting users' computer security. Not only that, we have also developed a variety of features to improve the efficiency of your computer use. Scan the computer from multiple dimensions, including garbage cleaning, computer running speed, system abnormalities, and computer security risks, and quickly assess the computer system status. 38 layers of protection barriers are added layer by layer to sense the threat situation at the first time, forming an all-round, all-weather cyberspace defense system. ...
  • 18
    Cryptomathic Authenticator
    Strong authentication provides a long-term, strategic solution for protecting against online attacks, such Phishing, Trojans, etc. Digital authentication is about putting measures in place to confirm an individual is who they say they are, so that only the right individual has access to certain information. Strong Customer Authentication systems should be flexible to easily allow different authentication mechanisms to be used depending on the protection profile of users or changes to the security landscape. ...
  • 19
    G DATA

    G DATA

    G Data Software

    ...G DATA customer support is available 24/7/365, with support teams and the G DATA SecurityLab working hand-in-hand at the same location. Independent tests prove that G DATA IT security solutions provide best attack detection rates for effectively combating Trojans, malware and even unknown viruses.
  • 20
    NANO Antivirus

    NANO Antivirus

    NANO Security

    Effective and fast anti-virus solution that provides maximum protection of your computer against all types of malware - cryptolockers, screen blockers, bank trojans, potentially unwanted programs, adware, spyware, etc. During development we have studied the modern requirements to antivirus programs and created a product that meets all these needs. NANO Antivirus Sky Scan allows you to check files with cloud scanner. In addition, by using NANO Antivirus Sky Scan you can easily manage NANO Antivirus installed on your device, quickly receive information about the system protection status and read our latest news directly inside the application. ...
    Starting Price: $8.99 per 100 days
  • 21
    SimpleumSafe
    Nowadays it is not enough "only" to encrypt your data to be protected. If you want to view, organize, or edit the encrypted files, they also must be protected. It is important not to leave any trace on the system, and even if a Trojan looks over your shoulder, it can not copy all your files to the Internet. SimpleumSafe goes a different way than most other encryption programs. After authorization with a password, the files are not provided in the file system. Otherwise they would be completely vulnerable from this moment on. SimpleumSafe makes its own file system and has its own finder. ...
    Starting Price: $37.99 one-time payment
  • 22
    Tencent Cloud Workload Protection
    ...Centralized data management helps you stay up to date on asset risks. CWP uses machine learning algorithms to detect malicious files such as WebShell backdoors and binary trojans. Detected files are access controlled and quarantined to prevent reuse.
  • 23
    Systweak Antivirus

    Systweak Antivirus

    Systweak Antivirus

    With a combination of advanced security features like real-time protection, exploit and malware protection, regular updates, USB Stick protection, Systweak Antivirus keeps you and your data safe. Exploit & malware protection ensures that your system stays safe from malware, viruses, zero-day threats, PUP, Trojan & adware. With real-time protection, instantly detect and neutralize threats, adware, viruses & apps that may try to sneak past your system security. Detect & remove malicious startup items to protect your system against programs that can compromise the security of your system. Exploit Protection is the part of Systweak Antivirus multi-layered, next-gen protection. ...
    Starting Price: $39.95 per device per year
  • 24
    OneKey

    OneKey

    OneKey

    ...After careful security considerations, we use industry-leading encryption algorithms to ensure that each user's assets can be properly encrypted and kept locally. Hardware wallets can upgrade your asset security to a new level, physically isolate hackers, Trojan horses, and virus software attacks. All transfer operations must be reviewed by the hardware wallet, so you don’t have to worry about the loss or theft of your mobile phone. We choose to grow with users, not capital. Suggestions to us through various channels will be heard. Restricted by human hands, not all needs can be met, but we will try our best to give the best solution at the moment.
  • 25
    K7 Antivirus For Mac
    ...Scans all files in real-time as they are used and blocks/clears infected files. Intuitive user-interface with one-click options to perform key tasks. Detects both Mac and non-Mac threats, viruses, spyware, trojans, worms and adware, on your computer, network drives, external disks and downloaded from the internet or received by email. Quick and daily updates, OS X-style notifications for immediate attention to threats.
    Starting Price: $15 per device per year
  • 26
    K7 Cloud Endpoint Security
    ...K7 Cloud Endpoint Security (K7 CEPS) is the easiest way to protect and manage all enterprise endpoints in an environment without a clear IT perimeter. Knowledgeable and proactive customer support ensures that cybersecurity never gets in the way of 24/7 operations. Robust protection against ransomware, Trojans, phishing, APTs and zero-day attacks designed to target the enterprise. Time and location restrictions are eliminated with the cloud console that enables control over enterprise cybersecurity with just a browser. Protect even the devices of employees who never visit the office with hassle-free remote deployment.
    Starting Price: $70 one-time payment
  • 27
    Proxmox Mail Gateway

    Proxmox Mail Gateway

    Proxmox Server Solutions

    ...The flexible architecture combined with the userfriendly, web-based management interface, allows IT professionals and businesses to control all incoming and outgoing emails with ease, and to protect their users from spam, viruses, phishing and trojans. Organizations of any size can easily deploy and implement the anti-spam and anti-virus platform in just a few minutes. The full featured mail proxy is deployed between the firewall and the internal mail server, and allows to control all email traffic from a single platform. Proxmox helps you to easily maintain a secure and professional email communication, ensure business continuity, and gain high business reputation as well as customer satisfaction.
    Starting Price: €149 per year
  • 28
    AhnLab TS Engine
    AhnLab TS Engine Suite is a next-generation integrative engine capable of offering an effective response to a wide spectrum of the latest security threats, including viruses, malicious codes, Trojan horses, spyware programs, and phishing. It ensures flexible and stable services for your system, by offering the AhnLab TS Engine Suite API which enables easy link and implementation with all types of applications and solutions. Easy to apply to your system or service with its customizing modules. Provides anti-virus and anti-spyware for your system or service. ...
  • 29
    Bitdefender Total Security
    ...Bitdefender complete protection takes care of your online privacy and personal information. Absolute power in the most efficient anti-malware solution available today. Bitdefender Total Security works against all e-threats, from viruses, worms and Trojans, to ransomware, zero-day exploits, rootkits and spyware. Your data and privacy are safe.
    Starting Price: $39.98 per 5 devices per year
  • 30
    Litecoin

    Litecoin

    Litecoin

    ...Wallet encryption allows you to secure your wallet, so that you can view transactions and your account balance, but are required to enter your password before spending litecoins. This provides protection from wallet-stealing viruses and trojans as well as a sanity check before sending payments.
  • Previous
  • You're on page 1
  • 2
  • Next