Best IT Security Software in Germany - Page 98

Find and compare the best IT Security software in Germany in 2026

Use the comparison tool below to compare the top IT Security software in Germany on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Rixon Reviews

    Rixon

    Rixon

    $99 per month
    Enhance your data security and address privacy issues with the swift, cloud-native vaultless tokenization platform. Understanding that your organization not only meets but surpasses compliance standards provides you with the necessary tranquility to concentrate on what truly matters for your enterprise. Companies today are grappling with rising operational expenses, the looming threat of ransomware, and persistent compliance evaluations. Rixon empowers you with confidence and security, allowing you to showcase the value of your business to the world effectively. The Rixon privacy platform is designed to drive favorable business results by equipping organizations with essential tools to manage security, compliance, and privacy initiatives for both the organization and its supported applications. By utilizing our innovative patented tokenization technique, Rixon effectively eradicates the risk of sensitive data exposure within your applications. Sensitive data is safely captured and transformed into intelligent security tokens, creating a robust defense against unauthorized access to your information. This comprehensive approach not only protects your data but also strengthens your overall business resilience.
  • 2
    SaaS Alerts Reviews

    SaaS Alerts

    SaaS Alerts, a Kaseya company

    In the realm of cybersecurity, being proactive is essential. Our software-as-a-service security solution is specifically crafted to ensure you remain at the forefront. Utilizing advanced technology, we automatically identify and prevent unauthorized actions within your clients' applications. No other service providers offer this exceptional level of security. Managed Service Providers (MSPs) are particularly vulnerable to cyber threats, so it's crucial to safeguard your operations by receiving automatic notifications to your executive team whenever any suspicious, high-risk activities are detected within your MSP toolkit. You have the ability to tailor security event thresholds across a wide range of applications, ensuring you receive immediate alerts for any atypical user behavior, empowering you to swiftly address potential threats on behalf of your customers. This proactive approach not only enhances your security posture but also builds trust with your clients, reinforcing your reputation in the industry.
  • 3
    Rootly Reviews
    Rootly redefines incident management with a fully integrated, AI-powered platform designed to simplify and accelerate the entire reliability workflow. From intelligent on-call management to automated incident response and retrospectives, it eliminates repetitive tasks so engineers can focus on problem-solving. The platform’s AI SRE module performs real-time root cause analysis, suggests fixes, and predicts resolution steps based on millions of real-world incidents. Through seamless integrations with Slack, Microsoft Teams, Jira, and Zoom, Rootly embeds reliability directly into team workflows. Its automation engine streamlines communication, tracking, and reporting, cutting resolution times by up to 50%. Built for scalability, Rootly adapts to teams of any size—from startups to Fortune 500 enterprises—without sacrificing simplicity. Users can also publish automated status pages to keep customers informed and reduce inbound support. With award-winning support and reliability baked in, Rootly enables organizations to strengthen uptime, operational efficiency, and engineering wellness.
  • 4
    Boman.ai Reviews
    Boman.ai seamlessly integrates into your CI/CD pipeline with just a few commands and requires minimal setup, eliminating the need for extensive planning or specialized knowledge. This solution combines SAST, DAST, SCA, and secret scanning into a single, cohesive integration that supports various programming languages. By leveraging open-source scanners, Boman.ai significantly reduces your application security costs, sparing you from the need to invest in costly security tools. Its AI/ML capabilities enhance the accuracy of results by eliminating false positives and providing correlation for effective prioritization and remediation. The SaaS platform features a comprehensive dashboard that consolidates all scan results in one accessible location, allowing for easy correlation and insightful analysis to enhance your application security posture. Users can efficiently manage the vulnerabilities identified by the scanner, enabling prioritization, triage, and effective remediation of security issues. With Boman.ai, you can streamline your security processes and gain a clearer understanding of your application's vulnerabilities.
  • 5
    Kondukto Reviews

    Kondukto

    Kondukto

    $12,000 per annually
    The versatile design of the Kondukto platform enables you to swiftly and effectively establish customized workflows for managing risks. You can leverage over 25 integrated open-source tools that are prepared to execute SAST, DAST, SCA, and Container Image scans in just minutes, all without requiring installation, upkeep, or updates. Safeguard your organizational knowledge against shifts in personnel, scanners, or DevOps tools. Centralize all security data, metrics, and activities in one location for your control. Prevent vendor lock-in and protect your historical data when transitioning to a different AppSec tool. Automatically validate fixes to foster better cooperation and minimize distractions. Enhance productivity by streamlining communications between AppSec and development teams, thus allowing them to focus on their core tasks. This holistic approach promotes a more agile response to evolving security challenges.
  • 6
    Agency Reviews
    Genuine cybersecurity encompasses more than just applications; with Agency, you gain access to a top-tier security team dedicated to thwarting, addressing, and recovering from potential threats. Our experts swiftly elevate the security of your personal devices to match enterprise-level standards. Founded by seasoned professionals with a wealth of experience in securing large organizations, Agency is comprised of skilled individuals. By partnering with Agency, you can effortlessly communicate your upgraded security measures, ensuring compliance with third-party standards is both quick and simple. We facilitate immediate onboarding for your team, offering clear and comprehensive subscription plans. Moreover, Agency stands ready to assist you in regaining stability whenever challenges arise, ensuring your security remains robust and responsive. This commitment to excellence is what sets Agency apart in the realm of cybersecurity.
  • 7
    LLIMAGER Reviews

    LLIMAGER

    e-Forensics Inc

    $425
    LLIMAGER was created to meet the need for a simple, low-cost "live" forensic image solution for Mac computers. It is capable of capturing an entire synthesized disk including the volume unallocated, as macOS views the disk with its partitions installed. The application was designed to be easy-to-use and intuitive for digital forensics examiners at the entry level. The application uses built-in Mac utilities to provide a versatile solution that is compatible with a variety of macOS versions both old and new. This ensures the tool is functional across a wide range of system configurations and upgrades. FEATURES INCLUDE Powerful and fast "Live" imaging CLI-based application Supports Intel, Apple Silicone, T2 Chips and APFS File Systems. Full Acquisition Log Hashed DMG images using MD5 or SHA-256 Choose between Encrypted and Decrypted DMGs to be used in commercial forensics software Unlimited Technical Support
  • 8
    Securden Unified PAM MSP Reviews
    MSPs must purchase multiple solutions to enforce complete access governance. We have combined all required modules into a single unified solution to solve the most critical challenges faced by managed IT services providers. MSPs are able to generate recurring revenue streams in addition to deploying robust controls for access. Remote access based on JIT can be granted to third parties as well as employees. Track and record all activity for complete control. Reduce the attack surface of external and internal threats. Automate privileged-access provisioning to reduce the load on helpdesks and eliminate downtime. Implement robust privileged-access workflows to instantly increase efficiency.
  • 9
    AdwCleaner Reviews

    AdwCleaner

    Malwarebytes

    $6.67 per month
    The leading adware remover globally efficiently identifies and eliminates unnecessary applications and junkware to ensure that your online activities remain smooth and free of interruptions. Malwarebytes AdwCleaner utilizes advanced technology specifically designed to spot and eradicate these unwelcome additions. It has become the preferred option for both home users and IT professionals alike. This tool effectively removes unwanted browser toolbars and bundled software that may introduce spyware and potentially unwanted programs (PUPs). By using this cleaner, you regain control over your web browsing experience. Additionally, it operates with minimal impact on your system's memory and processing power, requiring no installation—simply download it, launch the application, and begin scanning with just a click. Its user-friendly approach makes maintaining a clutter-free digital environment easier than ever.
  • 10
    Passage by 1Password Reviews
    Effortlessly integrate a passwordless authentication system into your application or website with minimal coding. You can either completely overhaul your current authentication process or create a new one that ensures reliable passwordless verification and effective customer identity management. By eliminating passwords, you can fully harness the security, business advantages, and enhanced user experience that come with default passkey logins, while still providing alternative passwordless options. Enhance your existing authentication process to allow users the choice between signing in with passkeys or using their conventional username and password. This transition not only empowers your business but also helps customers adapt to the emerging passwordless era. You can easily migrate your current users to the Passage platform with a straightforward import method, or implement just-in-time provisioning to facilitate a gradual transition over time, ensuring a smooth shift to modern authentication practices. Embracing this change will position your business at the forefront of innovation in user authentication.
  • 11
    Oz Biometry Reviews
    Created by experts at Oz Forensics, the biometric module utilizes cutting-edge artificial intelligence techniques and undergoes regular enhancements through ongoing data updates. In 2020, their face recognition algorithm recorded exceptional accuracy rates on the LFW dataset during testing at the University of Massachusetts, showcasing its effectiveness. The Oz Biometry module provides rapid identification capabilities, achieving speeds of under one second with an impressive accuracy of 99.87%. With the advent of front-facing cameras on smartphones since the early 2010s, facial biometrics have emerged as a convenient method for user authentication. This technology can be employed not only during the registration phase but also for searching and verifying identities against extensive biometric databases. Additionally, facial biometrics play a crucial role in the KYC (Know Your Customer) process, where selfie images are matched with document photos to verify user identity and check their status against biometric “black” and “white” lists. This integration of facial recognition into daily security measures enhances both user experience and safety.
  • 12
    First Strike Reviews

    First Strike

    1Strike.io

    $1000/month
    The First Strike (1Strike.io) platform operates as a SaaS solution and stands out as the sole European Breach and Attack Simulation tool that integrates Generative AI technology. Its ready-to-use templates are designed to: -> address critical risk factors directly, -> optimize the utilization of time and IT resources, -> enhance the safeguarding processes for digital assets. By consistently, strategically, cyclically, and automatically implementing ethically sound sequences of techniques and scenarios that emulate hacker activities, the platform effectively identifies potential vulnerabilities before they can be exploited in real-world attacks. First Strike is a unique, budget-friendly BAS platform that can be set up in just minutes, rather than requiring months, making it exceptionally accessible. This solution is ideally suited for "One Man Show CISO" professionals who are tasked with enhancing cyber resilience within medium-sized enterprises and rapidly growing companies looking to scale their operations securely. Its efficiency and effectiveness make it a vital resource for organizations aiming to proactively manage their cybersecurity risks.
  • 13
    Password Pusher Reviews

    Password Pusher

    Password Pusher

    Free
    Password Pusher serves as a secure platform for sharing passwords and other confidential information among individuals. Through this tool, users can generate a distinct, temporary URL that automatically becomes inactive after a specified duration or after a predetermined number of accesses, which helps maintain the confidentiality and security of shared data. This service is frequently utilized by both individuals and organizations to exchange login details or sensitive information with coworkers, clients, or collaborators. By using Password Pusher, users can avoid the risks associated with less secure communication methods, such as email, making it a straightforward and practical choice for secure password sharing. Ultimately, its user-friendly interface and effective security features make it an ideal solution for anyone needing to share sensitive information safely.
  • 14
    Plurilock AI Cloud DLP Reviews

    Plurilock AI Cloud DLP

    Plurilock Security

    $36/user/year
    Plurilock AI Cloud is a cloud native yet endpoint capable data loss prevention (DLP). It also provides passwordless SSO, CASB and CASB. It is specifically designed for cloud-centric businesses that rely on an army SaaS applications in order to succeed. Plurilock AI Cloud DLP allows companies that lack the resources to manage and configure (much less to pay for) the "defaults" of incumbent DLP solutions to still benefit from full-featured DLP. This is done at a cost-effective level that makes DLP available to companies who don't have specialized IT staff. Plurilock AI Cloud-based DLP is a part of the Plurilock AI Platform, which grows with companies, and has an expansion path for continuous, real-time, authentication and user/entity behaviour analytics (UEBA) to detect and respond to biometric threats in real-time. Info-Tech rated Plurilock AI as the best in the industry for customer satisfaction based on feedback from actual customers.
  • 15
    EchoMark Reviews

    EchoMark

    EchoMark

    $ 19 per month
    Collaboration and communication meet privacy and security. Other companies try to prevent data leakage by limiting information flow, but we use invisible personalized watersmarks in emails and documents to allow seamless sharing while also being easily traceable. EchoMark's invisible solution allows you to track down the source of information, whether it is via email, photo, or printout. The use of advanced features such as computer vision detection and natural language versioning helps to ensure successful tracking. EchoMark will watermark your documents and emails automatically once you have set up the parameters. Upload the original document if you suspect that a leak occurred or have spotted a document on the internet. EchoMark uses computer vision to compare each marked copy with the leaked fragment.
  • 16
    StegAI Reviews

    StegAI

    StegAI

    $90 per month
    StegAI watermarks safeguard your digital assets against unauthorized use. By staying proactive, you can combat deepfakes, information leaks, and piracy effectively. With StegAI's API, your unreleased products and proprietary information remain confidential. You can track leaks back to specific individuals or organizations. This technology provides provenance for verifying authenticity, documenting history, and ensuring copyright protection. Additionally, watermarking AI-generated content ensures that the markers remain intact, even after modifications. It offers a scalable solution for protecting digital images, videos, and documents across various platforms and formats. This means that regardless of how your content is shared, you can maintain control over its integrity and ownership.
  • 17
    WebTotem Reviews

    WebTotem

    WebTotem

    $20 per site per month
    Lay aside your concerns regarding data and financial losses and rest easy, as WebTotem handles everything on your behalf. By utilizing WebTotem, you can conserve both time and resources that would otherwise go to hiring security experts or attempting to secure your websites independently. Say goodbye to intricate setups, technical jargon, or the need for extra coding; your websites can be safeguarded in just five minutes. With a server-side scanner that removes malware with a single click, you will also receive alerts about any new, altered, or deleted files. Additionally, enjoy ongoing external surveillance for issues like downtime, web reputation, SSL status, domain expiration, and much more. The system continuously detects and resolves vulnerabilities while providing AI-driven proactive defense against intrusions and emerging threats. Ultimately, WebTotem ensures that your online presence remains secure and resilient against the ever-evolving landscape of cyber risks.
  • 18
    Perium Reviews

    Perium

    Perium BV

    $500
    Perium stands out as a highly accessible platform designed for comprehensive risk management solutions. This all-encompassing platform allows users to swiftly access an intuitive and adaptable system for managing risks and generating reports. With Perium, you can effortlessly comply with various standards related to security, privacy, and digital resilience, ensuring the protection of sensitive data belonging to employees, customers, suppliers, and your organization in a fast, straightforward, and intelligent manner. As the platform evolves, it continually incorporates new standards to enhance its offerings, including ISO27001, ISO27002, BIO, NEN7510, NTA7516, NEN7512, NEN7513, ISO27701, HKZ, ISO9001, ISO50001, DigiD, DNB Good Practice, BIC, ISQM, PCI-DSS, Suwinet, Wpg, IBP Onderwijs, NIS2 Directive, DORA, PIMS, ISMS, NCSC Handreiking, NIST CSF, NIST AI, NVZ Gedragslijn, Cloud Control Matrix, and Horizontaal Toezicht. As a result, users can expect an ever-expanding array of compliance options that keeps pace with the evolving landscape of risk management and regulatory requirements.
  • 19
    4n6 Outlook Forensics Wizard Reviews
    The 4n6 Outlook Forensics Wizard stands out as a highly reliable, efficient, and user-friendly tool designed for opening and examining Outlook email data files. Tailored specifically for forensic investigators, this application excels in gathering evidence from Outlook data files. With its sophisticated features, the Outlook Forensics Software offers a comprehensive preview of data files through various viewing modes. Users will find it straightforward to navigate this application without encountering any issues. Additionally, the software comes with a host of premium advantages: 1. Facilitates the opening, viewing, and analysis of an unlimited number of Outlook Data Files. 2. Eliminates the necessity of having the Outlook application installed for email data analysis. 3. The Outlook Forensics Wizard ensures complete safety and is free from any potential risks. 4. Fully compatible with all Outlook versions, including Outlook 2019 and beyond. 5. Enables in-depth analysis of Outlook email data through multiple analytical modes. 6. With its intuitive interface, even users with minimal technical expertise can effectively utilize the software.
  • 20
    P0 Security Reviews

    P0 Security

    P0 Security

    $25 per month
    Find and fix the vulnerabilities, and request and grant privileged permission. You shouldn't have to choose between infrastructure security and developer velocity. Process access escalation requests in minutes. No more tickets, better permissions and automatic expiration. P0 Security allows engineers to request fine-grained, just-in time access to any cloud resources, without having to become experts in cloud IAM. DevOps can automate the provisioning and expiry access without having to update static IDP group. Developers can have just-in time, short-lived and finely-grained access for troubleshooting or deploying services on a production stack (AWS GCP Kubernetes). Automate periodic access review of your cloud environment and accelerate compliance for SOC2 or ISO 27001 without overburdening teams. Give engineers and customer success teams short-term and just-in time access to customer data stored in a cloud or data warehouse.
  • 21
    TECH5 Reviews
    As society shifts towards a more digital, online, and mobile conception of identity, there is a pressing need for a solution that fosters trust among citizens regarding the organizations that manage their data. TECH5 presents T5-Digital ID, a comprehensive and inclusive technology designed for identity issuance and verification. This innovative solution creates a robust connection between the digital credential and its holder through biometric measures, ensuring that the rightful owner maintains control over their identity. With T5-Digital ID, individuals have the autonomy to determine which information they wish to share and under which conditions. Our development process began with the foundational analogy of traditional physical ID documents, prompting us to explore five critical questions about the origins and future of identity. We took this analysis a step further by creating an ecosystem that eliminates the need for costly physical smart cards and their associated reading infrastructure, ultimately streamlining the identity verification process. In doing so, we aim to establish a more user-friendly and secure identity management landscape for everyone.
  • 22
    PHP Secure Reviews
    PHP Secure is an online code scanner that scans your PHP code to find critical security vulnerabilities. Online scanner for free: - Quickly find web app vulnerabilities - Provides explicit reports and recommends fixes for vulnerabilities - No special knowledge is required to use the product. - Reduces risks, saves money, and increases productivity PHP Secure Scanner can be used to analyze sites built on Php, Laravel framework, CMS Wordpress Drupal and Joomla. PHP Secure detects and blocks the most dangerous and common types of attacks. -SQL injection vulnerabilities Command Injection -Cross-Site Scripting (XSS) Vulnerabilities -PHP Serialize Injections Remote Code Executions -Double Escaping -Directory Crossing ReDos (Regular Expression of Denial of Services)
  • 23
    Formica Reviews

    Formica

    Formica

    $199 per month
    Utilizing a combination of rules and workflows along with a user-friendly drag & drop interface greatly enhances your team's productivity and simplifies the management of intricate rules. An AI-driven self-learning model, informed by customer and user behavior, enables you to swiftly identify genuine actions versus anomalies. You can effectively manage millions of transactions in real time, automatically executing actions based on your established rules while also scrutinizing specific cases of interest. Bringing your entire team onto a unified platform fosters convenience, allowing for the seamless onboarding of an unlimited number of team members. Additionally, a detailed alarm management dashboard empowers you to assess and probe into high-risk transactions and potential fraud events. This innovative fraud detection solution can seamlessly integrate with an API gateway, making it compatible with any software or application utilized by your organization, thus providing a comprehensive defense against fraudulent activities. Ultimately, having a robust system in place not only protects your business but also enhances overall operational efficiency.
  • 24
    4n6 DBX Forensics Wizard Reviews
    4n6 DBX Forensics Software enables investigators to scrutinize and analyze DBX files comprehensively, even without Outlook Express. This specialized DBX File Forensics Software facilitates the extraction of data into various widely-used file formats and email services. Users can view DBX file contents through four distinct modes: Content, Attributes, Message Headers, and Hexadecimal View Attributes. The intuitive graphical user interface provides two main modules for exploring DBX files: Folder Selection and File Selection. The File Selection option allows for the examination of a single file, whereas the Folder Selection option enables the analysis of an entire directory containing multiple DBX files. Furthermore, this software can securely save the extracted evidence from DBX files in multiple formats, including email files like PST, EML, and MBOX, as well as document formats such as PDF and HTML. By offering these functionalities, it proves invaluable in the process of data extraction and preservation for forensic investigations. Additionally, its versatility ensures that investigators can efficiently manage their findings across various platforms and storage solutions.
  • 25
    Zillya! Antivirus for Business Reviews
    Zillya! Antivirus for Business offers comprehensive cyber threat protection for organizations, enabling centralized management of antivirus software. This innovative solution is specifically designed to provide robust cyber defense for corporate clients, ensuring their systems are shielded from various online threats. One of the product's standout features is its ability to deliver total protection across the organization while allowing for streamlined management of antivirus services. The networked workstations within the organization benefit from an internet security-class product that receives daily virus signature updates. Moreover, Zillya! Antivirus for Business not only enhances security but also simplifies the management and customization process for IT administrators. The centralized update system means that individual PCs do not need to access the Internet for antivirus database updates, making it a highly efficient solution for businesses. As a result, organizations can focus on their core functions while maintaining a strong defense against cyber threats.