Best IT Security Software in Europe - Page 35

Find and compare the best IT Security software in Europe in 2025

Use the comparison tool below to compare the top IT Security software in Europe on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    tenfold Reviews

    tenfold

    tenfold

    $.09/managed identity/month
    tenfold is an efficient, no-code Identity Governance & Administration (IGA) solution that simplifies the management of IT access and privileges. Designed for rapid deployment with its off-the-shelf plugins, tenfold helps organizations avoid long and costly setup processes, enabling full operational functionality in just weeks. The platform empowers businesses to manage user access with features like user lifecycle management, role-based access, and end-user self-service. It also includes essential tools for managing data access governance, user access reviews, and approval workflows. With tenfold, organizations can gain full control over IT privileges, mitigate access risks, and ensure the right people have secure access to the right resources at all times. The solution supports separation of duties to enhance security and compliance, allowing businesses to reduce risks while improving operational efficiency.
  • 2
    Login AlertX Reviews

    Login AlertX

    Login AlertX

    Free
    Login AlertX is designed to enhance your Windows PC security by providing instant email notifications each time your system is accessed via login or unlock. The app operates unobtrusively in the background, with easy system tray access and an automatic startup option to ensure no access goes unnoticed. Users can tailor their notification emails by configuring SMTP details, sender and recipient addresses, and customizing email subjects. Login AlertX avoids notification overload by tracking session states to prevent duplicate alerts. The premium version adds advanced security features, including webcam snapshots and audio recordings to capture who accessed your device. It also offers frequent alerts for every login event and delivers detailed system and network information in each notification. Sensitive settings like SMTP credentials are encrypted and stored securely on your local machine, ensuring privacy. The app is regularly audited for security vulnerabilities and prioritizes data protection and minimal data collection.
  • 3
    SafeLine WAF Reviews

    SafeLine WAF

    Chaitin Tech

    $0/month
    SafeLine is one of the most popular WAF solutions globally, serving thousands of paid users and hundreds of thousands of active users daily. Utilizing a cutting-edge machine learning engine, it delivers nearly flawless detection rates and minimal false positives by deeply analyzing HTTP traffic semantics. The platform provides comprehensive bot mitigation features such as CAPTCHA challenges and adaptive protections against malicious crawlers. It also defends against large-scale HTTP Flood DDoS attacks by intelligently managing traffic flows and enforcing access controls. SafeLine’s unified identity management supports seamless integration across various cloud and on-premises environments. With an easy-to-use, wizard-driven interface and modular design, organizations can deploy and maintain enterprise-grade protection effortlessly. Pricing transparency ensures users understand exactly what they pay for, with options suited for personal use up to large-scale deployments. SafeLine’s open-source roots foster community-driven improvements, continuously enhancing its capabilities.
  • 4
    Devolutions Workspace Reviews

    Devolutions Workspace

    Devolutions

    $3/month/user
    Passwords are a ubiquitous aspect of the workplace, found across various applications, websites, and servers. Devolutions Workspace consolidates these credentials into a single interface that is compatible with Windows, macOS, Linux, iOS, Android, and web browsers. It allows users to autofill their credentials, manage entries with role-based access control (RBAC), and handle urgent access requests—all without exposing the actual passwords. Within Workspace, features such as multi-factor authentication (MFA) via Devolutions Authenticator, secure messaging within the app, and an offline mode enhance security and convenience. Administrators have the ability to enforce robust security policies, while users benefit from a seamless login process that minimizes friction. The backbone of this setup is the Workforce Password Management package, which links Workspace to a centralized credential storage solution, whether through the cloud-based Devolutions Hub or the self-hosted Devolutions Server, tailored to your infrastructure requirements. This integrated approach empowers growing teams to effectively manage their password environment, reducing chaos and improving access governance while avoiding the complexities and expenses associated with traditional solutions. In the end, Devolutions Workspace not only simplifies password management but also fosters a more secure and efficient working environment.
  • 5
    TaskCall Reviews

    TaskCall

    TaskCall

    $9/user/month
    TaskCall is a comprehensive platform tailored for automated incident response and management, specifically aimed at IT and DevOps teams. It provides a variety of features including on-call management, AIOps capabilities, automated workflows, real-time call routing, analytics, tools for stakeholder communication, and integration options. This solution is relied upon by various sectors such as retail, healthcare, financial services, and government entities. By utilizing TaskCall, organizations can enhance their ability to identify, react to, and resolve incidents efficiently, thereby reducing downtime and fostering improved collaboration among team members. Moreover, its robust analytics tools empower teams to continuously optimize their incident management processes.
  • 6
    NetBird Reviews

    NetBird

    NetBird

    $5/user/month
    NetBird is a cutting-edge open-source platform for Zero Trust Networking, created by engineers specifically for their peers. It offers a streamlined approach to establishing secure private networks by harnessing the powerful WireGuard® protocol. In contrast to conventional VPNs, NetBird facilitates decentralized, low-latency, and high-throughput private networks, all managed through a single console that prioritizes identity-based access control. By integrating effortlessly with your Identity Provider for Single Sign-On (SSO) and Multi-Factor Authentication (MFA), it enables direct, encrypted peer-to-peer connections among devices, servers, and clouds, eliminating central bottlenecks or single points of failure. The lightweight clients allow for easy scalability and enhanced privacy, ensuring that traffic does not traverse management services. NetBird is compatible with numerous integrations, including CrowdStrike, Intune, SentinelOne, pfSense, and others. It is perfectly suited for Zero Trust remote access, multi-cloud connectivity, dynamic posture assessments, comprehensive auditing, and multi-tenant management for Managed Service Providers (MSPs), all accessible from a single, intuitive platform. Furthermore, its focus on security and efficiency makes it an attractive choice for organizations looking to enhance their network infrastructure.
  • 7
    RateYourCyber Reviews

    RateYourCyber

    RateYourCyber

    £799
    RateYourCyber empowers organizations to achieve enterprise-level cybersecurity maturity through an intuitive, data-driven platform built for accessibility and precision. It offers professional assessments that benchmark performance across eight critical security and business continuity domains, identifying both strengths and vulnerabilities. Each assessment includes detailed executive summaries, industry comparisons, and a 3-year roadmap outlining weekly improvement tasks with timelines and budget considerations. The system continuously monitors vulnerabilities, tracks progress, and generates professional reports ready for audits, investors, or regulatory bodies. Beyond assessments, RateYourCyber provides third-party risk management tools and compliance documentation tailored to each organization’s size, industry, and ESG requirements. Its interactive analytics dashboards and maturity-tracking visualizations make communicating progress easy and board-ready. By automating strategic planning and continuous monitoring, it eliminates the need for expensive consultants and complex GRC software. RateYourCyber enables growing businesses to maintain transparency, demonstrate compliance, and strengthen their cybersecurity posture with clarity and confidence.
  • 8
    CloudNine Reviews

    CloudNine

    CloudNine Discovery

    $35.00/month
    CloudNine is an innovative cloud-based platform designed to automate eDiscovery processes, enhancing the efficiency of litigation discovery, audits, and investigations by enabling users to manage document reviews, uploads, and creation from a centralized interface. Its extensive array of professional services encompasses discovery consulting, computer forensics, managed review, online hosting, information governance, litigation support, and project management, which together significantly lower the costs associated with eDiscovery processing. By utilizing CloudNine’s self-service eDiscovery software, law firms and corporations can optimize their workflows, ultimately saving both time and financial resources through the consolidation of their data collection, processing, and review needs. Additionally, this platform empowers users with greater control over their eDiscovery tasks, leading to more effective case management and strategic decision-making.
  • 9
    Riskified Reviews

    Riskified

    Riskified

    $0.01/month
    Riskified serves as a sophisticated solution for preventing fraud in the eCommerce sector, aiming to enhance sales while minimizing operational expenses. This dependable end-to-end software for card-not-present (CNP) transactions assists companies in safeguarding against online fraud by analyzing, validating, and guaranteeing their orders. Each approval through Riskified comes with a chargeback guarantee, providing protection in instances of fraud. Furthermore, the platform’s rapid and seamless review mechanism empowers retailers to increase their sales and confidently enter new markets, allowing for greater business growth and opportunity. Through these features, Riskified not only protects businesses but also fosters a more secure online shopping environment.
  • 10
    BalanceNG Reviews

    BalanceNG

    Inlab Networks

    $350 one-time payment
    Inlab Networks has developed BalanceNG, a reliable multithreading software load-balancer. Available for Linux, Solaris, and Mac OS X operating systems, BalanceNG is easy to integrate into data center networks. It offers top quality packet processing performance and makes this the ideal solution for hosting companies, network operators, product designers, and telco product developers. Inlab Networks' BalanceNG comes with a highly-specialized IP stack for IPv6/IPv4 and an independent active/passive Cluster environment that is based upon VRRP and the "bngsync” session table synchronization protocol.
  • 11
    Scalyr Reviews

    Scalyr

    Scalyr

    $35/month
    Scalyr is the log management platform and observability platform for new stack. Scalyr was designed to deal with the complexity and scale of modern cloud architectures. It allows engineers to quickly solve problems and concentrate on what they love, coding. Scalyr has made logs a benefit with 96% of searches being completed in less than one second and thousands upon thousands of active users. Scalyr's rapidly growing customer base includes NBCUniversal and Business Insider as well as Valentino, Giphy and Zalando. The company is the best-rated in its category in G2 Crowd and is a Gartner 2018 cool vendor. It was also named a 2018 Forbes Cloud 100 Rising Star. Visit us at www.scalyr.com or follow us on Twitter (@scalyr).
  • 12
    Arbutus Audit Analytics Reviews

    Arbutus Audit Analytics

    Arbutus Software

    $2,000.00/one-time/user
    Arbutus Audit Analytics assists audit, risk, and compliance professionals in navigating the complex challenges they encounter. This solution empowers users to conduct thorough data analyses, fulfill their audit requirements, enhance collaboration within teams, address data-related obstacles, and reduce dependence on IT resources. There are two versions of Arbutus Audit Analytics available: the Centralized/Enterprise edition and the Desktop/Team edition, each tailored to meet specific organizational needs. With these offerings, professionals can streamline their workflows and improve overall efficiency in their auditing processes.
  • 13
    EventSentry Reviews

    EventSentry

    NETIKUS.NET ltd

    $85.00/one-time
    Hybrid SIEM solutions combine real-time log monitoring with comprehensive system and network monitoring to provide users with a complete view of their servers, endpoints, and networks. The security event log normalization and correlation engine with descriptive emails alerts provides additional context. It presents cryptic Windows security incidents in easy-to-understand reports that provide insight beyond what is available as raw events. EventSentry's NetFlow component visualizes network traffic and can detect malicious activity. It also provides insight into bandwidth usage. EventSentry's ADMonitor component makes it easy to keep track of Active Directory changes. It records all changes to Group Policy objects and provides a complete user inventory that can be used to identify old accounts. There are many integrations and multi-tenancy options.
  • 14
    Jamf Now Reviews

    Jamf Now

    Jamf

    $2.00/month/user
    Jamf Now, previously Bushel, offers an on-demand mobile device management solution that is specifically designed for iPhones, iPads and Macs in the office. This device management platform is fast, easy to use, and affordable. It allows Apple users to easily set up, manage, protect, and secure their workplace. Jamf Now allows you to easily set up company email accounts, protect sensitive information, and automatically install apps for work.
  • 15
    LogicMonitor Reviews
    LogicMonitor is the leading SaaS-based, fully-automated observability platform for enterprise IT and managed service providers. Cloud-first and hybrid ready. LogicMonitor helps enterprises and managed service providers gain IT insights through comprehensive visibility into networks, cloud, applications, servers, log data and more within one unified platform. Drive collaboration and efficiency across IT and DevOps teams, in a fully secure, intelligently automated platform. By providing end-to-end observability for enterprise businesses, LogicMonitor connects coders to consumers, customer experience to the cloud, infrastructure to applications and business insights into instant actions. Maximize uptime, optimize end-user experience, predict what comes next, and keep your business fearlessly moving forward.
  • 16
    ManageEngine Mobile Device Manager Plus Reviews
    ManageEngine Mobile Device Manager Plus (MDM) is designed to empower enterprises with mobility. ManageEngine MDM, a leading enterprise mobile device management software, is capable of managing multiple mobile platforms using a single interface. It supports iOS, Android, and Windows devices. The solution is available both on-premise or in the cloud and includes features such as mobile device management, app management, and device containerization.
  • 17
    Loupe Reviews

    Loupe

    Loupe

    $25.00/month
    Loupe helps you identify issues in your application. Loupe is a logging and application monitoring tool for Java and.NET. It helps software teams find and fix errors quickly. Loupe also provides visibility into key metrics and events for all applications and allows users to dig deeper into specific sessions, events, users, or machines. Loupe can be deployed either on-premises or as a hosted cloud solution.
  • 18
    AuthStack Reviews

    AuthStack

    Buckhill

    €41.25 per month
    AuthStack is a robust, enterprise-level Single Sign-On (SSO) and Identity Access Management (IAM) solution that can be hosted anywhere. It efficiently manages user logins not only for your own websites and applications but also for third-party platforms, simplifying the process by allowing users to authenticate just once with a single password and profile. Instead of juggling numerous logins for different services, AuthStack streamlines user identity management into a singular experience. For those whose websites or applications support SAML, integrating with AuthStack is straightforward and requires no custom development. In cases where SAML support is absent, a complimentary Connector Framework is available, and assistance with integration can be provided if needed. Additionally, transitioning to AuthStack does not necessitate migrating your current user databases, as the Connector Framework can seamlessly interface with various data sources, including LDAP, MySQL, SOAP, and REST APIs, to verify credentials against existing user records. This means you can enhance security and user convenience without overhauling your existing systems.
  • 19
    Frugal Testing Reviews
    Evaluate your web application, REST API, and mobile application effortlessly with just three straightforward steps. Start by inputting your API endpoints or URLs for testing. Next, set up your load testing parameters, including the number of simultaneous users, testing duration, and bandwidth simulation requirements. Select from various global locations to initiate your load tests, and we will handle the rest! Once your tests are complete, your results will be readily available for review. You can analyze your data while the tests are ongoing, check JMeter logs, or save your findings as a PDF at any point. There's no need for installation; you can craft scenarios directly in your browser, all operated from the cloud. With a pay-as-you-go model, you can simulate hundreds of thousands of concurrent users from diverse locations and apply bandwidth simulations. As your tests progress, examine the results to identify any performance bottlenecks. Detailed reports can be downloaded anytime you need them. There’s no need for migration from JMeter, as you can import any JMX project into Frugal Testing and export it whenever you choose. Consistently enhance both your product and business operations with the insights gained from Frugal Testing, ensuring you are always moving towards success.
  • 20
    Bodi Reviews

    Bodi

    Pilixo

    $20 per month
    Data breaches can affect any organization at any moment, regardless of its size or industry. Whether the threat comes from a hostile hacker, a disgruntled ex-employee, or an unwitting insider, every company faces potential risks. Implementing protective measures can help prevent users from inadvertently clicking on harmful links, effectively halting malware before it spreads, no matter the delivery method—be it through email, messaging platforms, attachments, or websites. Additionally, proactive monitoring can thwart data theft by providing instant notifications based on specific keywords, file activities, sensitive formats like Social Security numbers or credit card details, and unauthorized changes in access privileges. A thorough examination of application use, web surfing, and printing activities, along with the duration of these actions, offers insights into potential vulnerabilities. Furthermore, the ability to record video and search for keywords on each device allows for in-depth reviews and assessments when necessary. With full remote control over each endpoint, organizations can swiftly rectify device issues. Ultimately, employee monitoring serves as a crucial line of defense, helping to prevent malicious clicks and effectively mitigate the risk of malware, regardless of the platform being utilized.
  • 21
    Asigra Reviews
    Asigra empowers IT departments to enhance their confidence in data recovery by providing unmatched reliability, top-notch security, ease of management, and cost-effectiveness in data protection solutions. The Enterprise Backup and Disaster Recovery (BDR) software platform from Asigra is specifically tailored for Managed Service Providers (MSPs) to effectively implement and manage their own Backup as a Service offerings. This user-friendly platform allows for easy customization to align with your brand identity, while its innovative Hybrid Cloud Backup architecture integrates a Cloud-optimized scale-out framework, a robust Cloud backup and recovery software platform, along with a Cloud API and management system. As a result, IT teams can efficiently manage, scale, and deliver comprehensive data protection services, ensuring they meet the evolving demands of their clients and stakeholders.
  • 22
    Ezeelogin Reviews

    Ezeelogin

    Ezeelogin

    $1.99 per month
    You can quickly set up a self-hosted Jump host (also known as "Bastion Host", or "Jump server") to manage SSH access on your Linux servers, Routers and Switches. Jump box software includes features such as 2-factor authentication, SAML authentication, SSH session recording and Identity and Access Management, RBAC, Privileged Access Management, (PAM), SSH Key Rotation, Root Password Management, and many more. It will help you meet security compliances like PCI, NIST and ISO 27001 and more. To learn more, visit us.
  • 23
    Learningbank Reviews
    User-friendly, intuitive LMS & onboarding platform. Save time with automation, build engaging content or use ready-made learning modules. Collect your digital and physical training in one place and report progress easily. Perfect match for companies with 100+ employees. Read more & get a free demo.
  • 24
    Vector by Datadog Reviews
    Gather, transform, and direct all your logs and metrics with a single, user-friendly tool. Developed in Rust, Vector boasts impressive speed, efficient memory utilization, and is crafted to manage even the most intensive workloads. The aim of Vector is to serve as your all-in-one solution for transferring observability data from one point to another, available for deployment as a daemon, sidecar, or aggregator. With support for both logs and metrics, Vector simplifies the process of collecting and processing all your observability information. It maintains neutrality towards specific vendor platforms, promoting a balanced and open ecosystem that prioritizes your needs. Free from vendor lock-in and designed to be resilient for the future, Vector’s highly customizable transformations empower you with the full capabilities of programmable runtimes. This allows you to tackle intricate scenarios without restrictions. Understanding the importance of guarantees, Vector explicitly outlines the assurances it offers, enabling you to make informed decisions tailored to your specific requirements. In this way, Vector not only facilitates data management but also ensures peace of mind in your operational choices.
  • 25
    Edgenexus Load Balancer (ADC/WAF/GSLB) Reviews
    We offer the most user-friendly technology without sacrificing performance or features. We back it up with exceptional support and care delivered under a fair, cost-effective pricing model Our technology is used by small startups with big ideas, small budgets, and global enterprises. We love them all! Easy to use Load balancing, WAF, GSLB and SSO/Pre-Authentication. It is also the only true ADP Application Delivery Platform that allows for the enhancement of functionality and longevity using the app store or apps you create in-house.