Oh no! Some styles failed to load. 😵 Please try reloading this page

Compare the Top IT Security Software for Mac of 2021

  • 1
    ConnectWise Fortify
    Define and Deliver Comprehensive Cyber Security Services. Security threats continue to grow, and your clients are most likely at risk. Small- to medium-sized businesses (SMBs) are targeted by 64% of all cyberattacks, and 62% of them admit lacking in-house expertise to deal with security issues. Now technology solution providers (TSPs) are a prime target. Enter Continuum Fortify, a ConnectWise solution—the advanced cybersecurity solution you need to deliver the managed detection and response protection your clients require. Whether you’re talking to prospects or clients, we provide you with the right insights and data to support your cybersecurity conversation. From client-facing reports to technical guidance, we reduce the noise by guiding you through what’s really needed to demonstrate the value of enhanced strategy.
    View Software
    Visit Website
  • 2
    Trustifi

    Trustifi

    Trustifi

    Trustifi offers industry-leading solutions for email security that helps small, mid-size, and enterprise organizations manage threat detection, regulatory compliance, data encryption & more. Easily deployed on: Outlook, Gmail, or any email server by relay **Advanced Threat Protection**: -Malware and ransomware virus detection, BEC attack prevention and alerts **Data Loss Prevention**: -100% compliant with HIPAA/HITECH, PII, GDPR, FSA, FINRA, LGPD, CCPA, and more **Encryption**: -NSA-grade. Select Enterprise customers have access to company branding and product white labeling. Plus one-on-one team training. Encryption needs aren’t one-size-fits-all, so your email security platform shouldn’t be either. Customized solutions are available upon request, often without charge.
    Leader badge
    Partner badge
    View Software
    Visit Website
  • 3
    Perimeter 81

    Perimeter 81

    Perimeter 81

    Perimeter 81 is transforming the world of secure network access and helping businesses of all industries and sizes smoothly transition to the cloud. Unlike hardware-based firewall and traditional VPN technology, Perimeter 81’s cloud-based and user-centric Secure Network as a Service utilizes the Zero Trust approach and SASE model framework to offer greater network visibility, seamless onboarding, and automatic integration with all the major cloud providers. Named a Gartner Cool Vendor, Perimeter 81 is considered by industry leaders to be winning the “SASE space race".
    Starting Price: $8 per user per month
    Partner badge
    View Software
    Visit Website
  • 4
    N‑able Passportal
    N‑able™ Passportal™ provides simple yet secure password and documentation management tailored for the operations of an MSP and ITSP. The platform is cloud-based and offers channel partners automated password protection and makes storing, managing, and retrieving passwords and client knowledge quick and easy from virtually any connected device. The N‑able™ Passportal™ product suite also offers value-added service products including Documentation Manager™, Blink™ and Site™ all of which promote compliance with industry regulations and help protect businesses from data breaches, cybersecurity threats, and network vulnerabilities.
    Leader badge
    Starting Price: $18.00/month
    View Software
    Visit Website
  • Need Some Help?

    Talk with a software expert for free. Get a list of software that's great for you in less than 15 minutes.

    Talk to an Advisor
  • 5
    Avast Business Hub
    The Business Hub is an integrated, cloud-based security platform for businesses and IT service providers to manage all Avast Business solutions deployed in their networks. It provides real-time visibility of threats, comprehensive reporting, and management capabilities, all from a single pane of glass. Formerly known as CloudCare, the Business Hub is an easy-to-use cloud security platform with a refreshing new UI.
    Leader badge
    Starting Price: $36.99
    View Software
    Visit Website
  • 6
    ManageEngine Desktop Central
    ManageEngine's Desktop Central is a Unified Endpoint Management Solution, that takes care of enterprise mobility management (including all features of mobile application management and mobile device management), as well as client management for a diversified range of endpoints - mobile devices, laptops, computers, tablets, server machines etc. With ManageEngine Desktop Central, users can automate their regular desktop management routines like distributing software, installing patches, managing IT assets, imaging and deploying OS, and more.
    Starting Price: $795.00/one-time
    View Software
    Visit Website
  • 7
    GoAnywhere MFT

    GoAnywhere MFT

    HelpSystems

    GoAnywhere MFT provides secure managed file transfer for enterprises. Deployable on-premise, in the cloud, or in hybrid environments, GoAnywhere MFT software enables organizations to exchange data among employees, customers, and trading partners, as well as between systems, securely. GoAnywhere MFT was a recipient of the 2017 Cybersecurity Excellence Award for Secure File Transfer.
    Leader badge
    Partner badge
    View Software
    Visit Website
  • 8
    NinjaRMM

    NinjaRMM

    NinjaRMM, LLC

    If you're looking to support your clients and manage IT more efficiently, turn to NinjaRMM. The world's first security centric remote monitoring and management (RMM) platform, NinjaRMM enables IT professionals to monitor and manage the entire IT stack with full automation all within a single pane of glass. The platform features search and connect through TeamViewer, antivirus integration, real-time alerts, managed patching, automation, software inventory, and reporting.
    Leader badge
    Starting Price: $3.00 per device
    Partner badge
  • 9
    Fusion Framework System

    Fusion Framework System

    Fusion Risk Management

    Fusion Risk Management's software, the Fusion Framework System, enables you to understand how your business works, how it breaks, and how to put it together again. Our platform provides easy, visual, and interactive ways to explore every aspect of your business so you can identify single points of failure and key risks. Achieve resilience with greater speed and efficiency with Fusion’s flexible and integrated suite of platform capabilities that can be tailored to best fit the needs of your organization. We meet you wherever you are on your journey for more resilient operations. - Map critical service and product delivery processes as they actually are - Leverage objective risk insights that help you audit, analyze, and improve your business operations - Plan, orchestrate, and measure risk management and resilience activities with confidence - Leverage automation to reduce the burden of manual, time-consuming, repetitive tasks, freeing teams for higher value activities
  • 10
    Hexnode UEM

    Hexnode UEM

    Mitsogo Inc

    Hexnode UEM is a Unified Endpoint Management solution that manages devices across multiple platforms from a single pane of glass. With a user-centric approach, the management process is streamlined throughout the entire device lifecycle- starting from enrollment up until device retirement. Trusted by SMBs to Fortune 500 companies around the world, Hexnode offers a wealth of tools perfect for today's increasingly mobile, modern teams. These include endpoint management for all types of devices (including iOS, Android, Windows, macOS, tvOS, and fireOS), an intuitive dashboard for greater visibility and control over mobile devices across the enterprise, web filtering for security, location tracking and so much more.
    Starting Price: $1 per device/month
    Partner badge
  • 11
    N‑able N‑central
    Join the thousands of MSPs and IT professionals who use N-able™ N-central® to remotely monitor and manage devices and complex networks. Key features include: • Monitor almost any device, including support for Windows, Linux, and macOS • Gain complete insight across your network and cloud services without the need for extra network monitoring software • Create automated patch management policies to ensure devices are up to date • Streamline your workflow with drag-and-drop scripting in automation manager—no need to write a line of code • Provide remote support across devices and platforms with the integrated Take Control feature • Integrate your existing PSA software or use N-able MSP Manager to manage tickets and billing • Manage security with integrated backup, EDR, AV, and disk encryption • Available as an on-premises or hosted cloud solution to fit your business
  • 12
    N‑able RMM
    N‑able RMM® is a cloud-based IT solution that makes it easy for MSPs to deliver valuable technology services within hours, not weeks or months. Clear graphical dashboards place alerts front and center so you can focus on what needs you most. Built-in remote access and security features help you support and protect from day one. And when you’re ready, grow your business with additional security layers and add-ons services to expand your offering. N‑able RMM features include remote access, network path visualization, automated monitoring and maintenance, prescriptive data analytics, data-breach risk intelligence, and more. N‑able RMM is also available for download as Android and iOS mobile apps to allow users to manage issues anywhere.
  • 13
    IRI Voracity

    IRI Voracity

    IRI, The CoSort Company

    Voracity is the only high-performance, all-in-one data management platform accelerating AND consolidating the key activities of data discovery, integration, migration, governance, and analytics. Voracity helps you control your data in every stage of the lifecycle, and extract maximum value from it. Only in Voracity can you: 1) CLASSIFY, profile and diagram enterprise data sources 2) Speed or LEAVE legacy sort and ETL tools 3) MIGRATE data to modernize and WRANGLE data to analyze 4) FIND PII everywhere and consistently MASK it for referential integrity 5) Score re-ID risk and ANONYMIZE quasi-identifiers 6) Create and manage DB subsets or intelligently synthesize TEST data 7) Package, protect and provision BIG data 8) Validate, scrub, enrich and unify data to improve its QUALITY 9) Manage metadata and MASTER data. Use Voracity to comply with data privacy laws, de-muck and govern the data lake, improve the reliability of your analytics, and create safe, smart test data
  • 14
    FlexNet Code Insight
    Take control of your open source software management. Empower your organization to manage open source software (OSS) and third-party components. FlexNet Code Insight helps development, legal and security teams to reduce open source security risk and manage license compliance with an end-to-end system. FlexNet Code Insight is a single integrated solution for open source license compliance and security. Find vulnerabilities and remediate associated risk while you build your products and during their entire lifecycle. Manage open source license compliance, add automation to your processes, and implement a formal OSS strategy that balances business benefits and risk management. Integrate with build tools, CI/CD and SCM tools, artifact repositories, external repositories or build your own integrations using the FlexNet Code Insight REST API framework to make code scanning easy and effective.
  • 15
    Bacula Enterprise

    Bacula Enterprise

    Bacula Systems

    Bacula Enterprise delivers Physical, Virtual, Container and Hybrid Cloud Backup & Recovery software for the Modern Data Center - all from a single platform. Designed for medium and large organizations, Bacula Enterprise backup and recovery software brings unique innovation, modern architecture, business value benefits and low cost of ownership. Bacula Enterprise corporate data backup software solution uses exclusive technologies that increase the interoperability, power, flexibility and functionality of Bacula Enterprise into a wide range of IT environments such as enterprise data centers, managed service providers, software vendors or cloud providers. Thousands of organizations worldwide use Bacula Enterprise in mission-critical environments, including NASA, Texas A&M University, Unicredit, Swisscom, Sky, and many more. Bacula provides additional security features over other vendors and offers advanced, hybrid Cloud connectivity to Amazon, S3, Google, Oracle and many more.
  • 16
    Red Points

    Red Points

    Red Points

    Red Points is the world’s first brand intelligence platform. By combining online brand protection, copyright enforcement, and distributor monitoring capabilities, Red Points gives you full visibility into brands’ presence online. Over 900 brands rely on Red Points to fight fakes, piracy and distribution abuse online, allowing them to maintain control, improve their brand value, and increase revenues. From our offices in Barcelona, New York, Salt Lake City and Beijing our company has transformed an industry traditionally led by intellectual property lawyers and services-focused companies into a scalable, cost-effective technology solution. We serve leading global brands as well as smaller innovators across a variety of sectors, from sports, cosmetics, fashion, entertainment and many more. The key to our success is our investment in technology and product to make our solution incredibly intuitive, effective and easy to use.
  • 17
    FileCloud

    FileCloud

    CodeLathe

    #1 Enterprise File Sharing, Sync, Backup & Remote Access. Get complete data ownership, control and governance. Self-host it on-premises or on cloud. Run your own private Dropbox-like file sharing and sync solution, integrated with your IT infrastructure and storage. We host FileCloud for you on a world class infrastructure in the region of your choice. No installation. We take care of all the technical details. Run FileCloud on your infrastructure, with full control over your data. Self-host FileCloud on AWS, AWS GovCloud and Azure. Pre-built FileCloud images are available on AWS and Azure marketplaces. Supports local storage (Disk, Network Shares, CIFS/NFS) and cloud storage. Can connect to multiple storage endpoints. Supports AWS S3, Azure Blob, Wasabi, EMC ECS and other S3 compatible storage systems. Both primary (managed) and file gateway (Network share) storage modes are supported.
    Starting Price: $50.00/year/user
  • 18
    Kiuwan Code Security
    Security Solutions For Your DevOps Process. Automatically scan your code to identify and remediate vulnerabilities. Compliant with the most stringent security standards, such as OWASP and CWE, Kiuwan Code Security covers all important languages and integrates with leading DevOps tools. Effective static application security testing and source code analysis, with affordable solutions for teams of all sizes. Kiuwan includes a variety of essential functionality in a single platform that can be integrated directly into your internal development infrastructure. Fast Vulnerability Detection: Easy and instant setup. Start scanning and get results in just minutes. DevOps Approach To Code Security: Integrate Kiuwan with your Ci/CD/DevOps pipeline to automate your security process. Flexible Licensing Options: Plenty of options, one time scans or continuous scanning. Kiuwan also offers a Saas or On-Premise model.
  • 19
    GoodAccess

    GoodAccess

    Cloud VPN with zero-trust network access control

    GoodAccess is a cloud VPN that enables creating a resilient virtual network (Software Defined Perimeter) with identity-based access control in less than 10 minutes. The solution is designed to meet the needs of small and midsize businesses who want to securely interconnect remote workers, applications, data centers, clouds, and offices. With GoodAccess, businesses can deploy private gateway with dedicated static IP, benefit from easily understandable web dashboard when managing users, devices and their access rights (SSO; Google, Azure), unify 2FA/multi-factor authentication on the network level and utilize access logs for greater network visibility.
    Starting Price: $3 per user/month
  • 20
    Imatag

    Imatag

    IMATAG

    IMATAG protects your visual content online, such as product images, brand visuals, licensed content, or sensitive files. It comes in two flavours: - IMATAG LEAKS, the first online solution for the identification of photo or video leaks, - and IMATAG MONITOR, the most reliable visual search solution to track the use of your content on the internet. How it works: The software discreetly places an imperceptible identifier at the pixel level of images or videos. This invisible watermark allows to identify your content on the web regardless if it has been resized, cropped or trimmed, posted on social media or copied via a screenshot. Used as a tracker, it is also able to trace the origin of a leak. Supports images (photos, renders, design), videos, and PDF. Available as SaaS via Web UI or API, or on premise software.
  • 21
    Fraud.net

    Fraud.net

    Fraud.net

    Fraud.net delivers the world’s most advanced infrastructure for fraud management – powered by a sophisticated collective intelligence network, world-class artificial intelligence, and a modern, cloud-based platform that helps you: * Unify fraud data from any source with a single connection * Detect fraudulent activity for 99.5%+ transactions in real-time * Optimize fraud management by uncovering hidden insights in terabytes of data Recognized in Gartner’s 2021 Market Guide for Online Fraud Detection, Fraud.net is a real-time, enterprise-strength fraud prevention and analytics solution organized around its business customers’ needs. Through a single point of command, it unifies and analyzes data from disparate systems and sources, tracks digital identities and behaviors, and then deploys the latest tools and technologies to stamp out fraudulent activity while allowing good transactions to sail through. Contact us today for a free trial.
  • 22
    Kasm Workspaces

    Kasm Workspaces

    Kasm Technologies

    Kasm Workspaces is a container streaming platform for delivering browser, desktop and application workloads to the web browser. Kasm is changing the way that businesses deliver digital workspaces using our open-source web-native container streaming technology to establish a modern devops delivery of Desktop as a Service (DaaS), application streaming, and browser isolation. Kasm is not just a service, it is a highly configurable platform, with a robust developer API that can be customized for your use-case, at any scale. Workspaces is truly wherever the work is. It can be deployed in the cloud (Public or Private), on-premise (Including Air-Gapped Networks), or in a hybrid configuration.
    Leader badge
    Starting Price: $0 Free Community Edition
    Partner badge
  • 23
    FusionAuth

    FusionAuth

    FusionAuth

    We built FusionAuth from the ground up to easily integrate with any app, language, and framework. Every feature (yes, every single one) is exposed as an API giving you complete flexibility to handle any use case. You get every feature and acronym you need: registration & login, passwordless, SSO, MFA, SAML, OIDC, OAuth, JWT, social login and more. Comply with GDPR, HIPAA, COPPA, and PCI requirements in seconds. FusionAuth installs on any platform, any computer, anywhere. Host it yourself or use FusionAuth Cloud, our fully managed SaaS hosting service.
    Starting Price: $125/month
  • 24
    SpamTitan Email Security
    SpamTitan email security is an email spam filter for businesses, smbs, MSPs, and schools. SpamTitan email security blocks spam as well as phishing and day-zero attacks, viruses, malware, ransomware, and other email threats. Helps control mail flow, clean it, and protect against unwanted email. We provide easy-to-use yet advanced email security for businesses, smbs and MSPs that are Office365 friendly. Try a FREE, fully supported trial of SpamTitan Email Security today. SpamTitan - Premium functionality included: • CEO Impersonation protection • Phishing/ Spear phishing protection • Link analysis • Full Sandboxing • Zero Day Attacks protection • Mail Spooling • Spoofing protection • Malware and Ransomware protection • SPF/DKIM/DMARC checking • Encryption • Fully multitenant environment • Ability to rebrand the entire UI • Full REST API: • Comprehensive support and set up docs SpamTitan Email Security has been the top solution in the G2 Crowd Email Security
    Leader badge
    Starting Price: $0.80 Per User Per Month
  • 25
    TurnKey Lender

    TurnKey Lender

    TurnKey Lender

    TurnKey Lender is a global leader in ULM (Unified Lending Management) solutions and services. The company provides an end-to-end system that automates every step of the lending process, from the loan application and borrower evaluation to origination, underwriting, servicing, collection, reporting, compliance, and more. The system is powered by proprietary deep neural networks and machine learning algorithms that allow for unmatched credit decisioning accuracy and overall security. TurnKey Lender offers award-winning Loan Origination Software powered by proprietary AI-driven technology, machine learning algorithms, and deep neural networks. With this system, loan decisions can be made in under 30 seconds with superior decisioning quality. It is achieved with the help of the TurnKey Lender decisioning engine which allows for in-depth adjustment of the scorecard and decision rules. The system fully automates all steps of the lending process through the loan's disbursal.
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next