Software > IT Security

IT Security Software

Protecting the company's own IT infrastructure is essential. Risks such as extortion Trojans, DDoS attacks and cyber attacks of other kinds are omnipresent. IT security solutions are needed to ensure that the company's own website and IT are not endangered, for example, by hackers or force majeure (damage to IT can also be caused by lightning). According to the EU General Data Protection Regulation (GDPR), companies are required, among other things, to take appropriate measures to protect personal data. IT security software solutions are, for example, antivirus software, antispam software, backup and data protection software, encryption software, access control and authentication software and other IT security software.

Are you looking for a suitable IT security software?

Search software in IT Security

  • Windows based
  • macOS
  • Unix based
  • Mainframe based
  • Mobile
show price
  • with demo version
  • multi-client compatible
  • with customizing
  • On-premises (local installation)
  • SaaS, web based, cloud

Software categories:

Access Control and Authorization

In this current market overview, you will find software solutions on the subject of access control and authorization concepts, e.g. for security checks and continuous monitoring.


Antispam software is used to protect against unsolicited commercial and malicious emails and includes various filters, syntactic detection and other features.


Antivirus software generally provides protection against ransomware, crypto Trojans, extortion software and similar malware.


Software solutions for access control or authentication can use biometric data, among other things, and are often also used for personnel time recording.


The backup software listed here is suitable for companies of all types. Programs for automatic data backup are available for a wide range of operating systems.


In this section you will find solutions for cyber and Internet security. The software usually includes protection against DoS attacks, eavesdropping, spoofing, tampering and much more.

Data Privacy

Current software solutions for data protection management, password management, IT baseline protection, data analysis, and electronic guides are listed here.


Data security concepts in companies should always include encryption procedures. Here you will find, among other things, crypto systems for e-mails, texts, audio and image files.

ISMS - Information Security Management

In this section we present a current market overview of information / IT security management systems that include e.g. assessment tools or monitoring of hardware interfaces.

IT Monitoring

The software listed here is used for monitoring and performance monitoring of networks and computers as part of the service and for proof of service level agreements.

Miscellaneous IT Security

The solutions listed here are suitable for software-supported IT emergency planning, for IT vulnerability analyses or for preventing the execution of unwanted macros.