Top 15 Most Popular Threat Prevention Softwares | May 2024

Here are the top 15 most popular threat prevention softwares as derived from our TpSort Score which is a continually popular score, it denotes an estimated popularity of a software.

1. Change Auditor Dell Software

Change Auditor Dell Software Real-time change auditing, in-depth forensics and comprehensive reporting on all key configuration, user and administrator changes in a central console.......

2. Exabeam

Exabeam Threats are going unnoticed. SIEM technologies today aren’t capable of detecting subtle anomalies and tracking entire attack chains — missing threats and flooding you with false positives.Introducing User Behavior Intelligence. By combining session tracking, behavior analysis and risk scoring, we help you automatically detect cyber attacks and improve operational security......

3. Securonix

Securonix Securonix is working to radically transform all areas of data security with actionable security intelligence. Our purpose-built advanced security analytics technology mines, enriches, analyzes, scores and visualizes customer data into actionable intelligence on the highest risk threats from within and outside their environment. Using signature-less anomaly detection techniques that track......

4. Fortscale

Fortscale Fortscale is an innovative cyber security company, comprised of an enthusiastic team of cyber security, big data analytics and intelligence experts.While you are reading these lines, we are working hard on developing a new analytics platform to help you protect your organization better than ever. Chances are, your organization is......

5. Castle

Castle Simple developer-friendly APIs lets you send activity from web and mobile apps. Castle builds behavior models over what's normal for your site and each user account. When there is a potential account takeover, the customer is notified and can resolve the incident without involving the site administrator. The security analytics......

6. IBM QRadar

IBM QRadar IBM® Security QRadar® SIEM consolidates log source event data from thousands of devices endpoints and applications distributed throughout a network. It performs immediate normalization and correlation activities on raw data to distinguish real threats from false positives. As an option, this software incorporates IBM Security X-Force® Threat Intelligence which supplies......

7. Rapid7

Rapid7 Rapid7 is engineering better security to help companies reduce risk of breach, detect and respond to attacks, and build effective cybersecurity programs.At Rapid7, we offer advanced capabilities for vulnerability management, penetration testing, endpoint controls assessment, and incident detection and investigation. Our threat intelligence is informed by more than 200,000 members......

8. McAfee ESM

McAfee ESM McAfee Enterprise Security Manager delivers intelligent, fast, and accurate security and information (SIEM) and log management.Real-time visibility into all activity on systems, networks, databases, and applicationsMcAfee Enterprise Security Manager delivers a real-time understanding of the world outside—threat data, reputation feeds, and vulnerability status—as well as a view of the systems,......

9. FireEye Threat Analytics Platform

FireEye Threat Analytics Platform Information technology systems and applications produce a continuous stream of event and log details that can reveal suspicious behavior. Threat analytics offers the ability to proactively filter through huge amounts of data and identify real threats. The Threat Analytics Platform (TAP) applies threat intelligence, expert rules, and advanced security data......

10. Palo Alto AutoFocus

Palo Alto AutoFocus ACTIONABLE INTELLIGENCE HAS ARRIVED.Introducing AutoFocus™. Available exclusively to Palo Alto Networks customers through a limited-time Community Access program.The challenge with too much dataSecurity practitioners have been inundated with an overwhelming volume of security data and alerts, making it virtually impossible to quickly identify and respond to advanced, targeted threats before......

11. Symantec Endpoint Protection

Symantec Endpoint Protection Symantec Endpoint Protection provides business antivirus protection with advanced threat prevention, delivering unmatched defense against malware for laptops, desktops and servers. Key Features Provides unmatched protection from the market leader in endpoint security Seamlessly integrates antivirus, antispyware, firewall, intrusion prevention, device and application control Requires only a single agent Powerful......

12. Proofpoint

Proofpoint Proofpoint, Inc. (NASDAQ: PFPT) helps the largest and most successful companies in the world protect and govern their most sensitive data. Proofpoint is an innovative security-as-a-service vendor that delivers data protection solutions that help medium- and large-sized organizations protect their data from attack and enable them to effectively meet......

13. Snusbase.com

Snusbase.com The industry leading database lookup. We pride ourselves in being faster than all of our competitors, wile maintaing a very large selection of private and public databases.......

14. Kaspersky Mobile Security

Kaspersky Mobile Security Kaspersky Mobile Security and Kaspersky Tablet Security deliver the latest security technologies to protect Android smartphones and tablets from viruses, Internet threats, phishing sites, spyware and spam. It includes easy-to-use, advanced privacy features and – if your phone is lost or stolen – you can remotely protect your data and......

15. HP ArcSight

HP ArcSight A comprehensive Security Information & Event Management (SIEM) solution that enables cost-effective compliance and provides advanced security analytics to identify threats and manage risk, so you can protect your business.How Mature Are Your Security Operations?See how your organization stacks up by taking a 4-minute, free and anonymous IT security assessment.......