Best IT Security Software in New Zealand - Page 11

Find and compare the best IT Security software in New Zealand in 2025

Use the comparison tool below to compare the top IT Security software in New Zealand on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    GoDaddy Website Security Reviews
    Safeguard your website and enjoy tranquility with our offerings. With Ultimate plans, a complimentary SSL Certificate is now part of the package. We provide comprehensive monitoring, alerts, and site cleaning, along with enhanced security measures and improved speed. Our expedited website repair service ensures the quickest response time available. Enjoy monitoring and alerts for unlimited pages on a single site, with access to security analysts for tackling complex issues and advanced security monitoring. Additionally, we offer Google blacklist monitoring and removal, brand reputation oversight, and unlimited malware elimination and hack repairs. Our trusted site seal guarantees a 100% clean site, backed by a 30-day money-back guarantee. This service is compatible with various CMS platforms and custom-coded websites, ensuring advanced protection and speed acceleration. Furthermore, our CDN performance enhancer and Advanced DDoS mitigation are included in Deluxe, Ultimate, and Express plans, providing a robust defense against potential threats.
  • 2
    PhishTitan Reviews
    Powerful Inline Phishing Protection for M365. Harness the power of AI and our LLM to defeat phishing. PhishTitan is next generation inline phishing protection and remediation, powered by TitanHQ, the global leaders in email cybersecurity. Our learning model and AI integrates directly with Microsoft 365, both catching and remediating sophisticated phishing and BEC attacks that Microsoft misses. It provides users with in-the-moment warning banners to help them decide whether an email is malicious or safe, continually enhancing the human firewall. Post delivery remediation (PDR) allows you to remove all of these phishing emails from your users inbox removing risk instantly. The removed email goes to the junk folder. Our curated and unique email threat intelligence data is unmatched in its simplicity, visibility, coverage and accuracy. Risk free deployment in 6 minutes. PhishTitan will filter your email to identify phishing threats and protect your users and business. That’s how you avoid that one wrong click that can lead to disaster – all it takes is 6 minutes!
  • 3
    Accountable Reviews

    Accountable

    Accountable HQ

    $399.00/month
    4 Ratings
    Accountable can supercharge your risk management and empower your team. Simplify the process of managing risk across all levels of your organization, become compliant with HIPAA, GDPR, CCPA and more privacy laws, and build trust with your customers and partners. Get a snapshot of your compliance in real-time with our intuitive dashboards Monitor and track employees as they take their requiredd Security Awareness trainings through our online video courses. Determine potential risks and address compliance shortcomings through our guided security risk and data impact assessments. We will provide all the required privacy and security policies for your organization. Send and manage vendor contracts such as Business Associate Agreements and Data Processing Agreements through our vendor center. Share compliance, security, and privacy reports with those inside and outside your organization who need a high level view of your risk management program.
  • 4
    Acronis Cyber Protect Reviews
    Acronis Cyber Protect gives you the peace of mind to know your business is covered, with zero-day malware and ransomware protection, backup and forensic investigations. Cyberthreats are evolving at an incredible rate — and simple data backup and cybersecurity tools are no longer enough to contain them. Acronis’ all-in-one cyber protection solutions combine cybersecurity, data backup, disaster recovery, and more to ensure the integrity of the data and systems you rely on. If you’re like other businesses, you probably use a complex patchwork of solutions to defend against data loss and other cyberthreats — but this approach is tough to manage and leads to security gaps. Acronis’ integrated cyber protection solutions safeguard entire workloads with greater efficiency and a fraction of the complexity, freeing up resources and enabling you to focus on protection and enablement rather than juggling tools. Protect entire workloads without the friction. Getting started with Acronis' cyber protection solutions is simple and painless. Provision multiple systems with just a click, and manage everything — from backup policies to vulnerability assessments and patching — through a single pane of glass.
  • 5
    Esper Reviews
    Esper transforms the way companies manage device fleets. Esper's advanced capabilities include remote control and debugging, Pipelines, Esper SDK, APIs, Blueprints, dynamic configuration and Seamless Provisioning. Esper goes beyond traditional MDM and into the modern age of DevOps. Esper was named one of Deloitte Fast500 in 2023. It supports some of the most innovative brands around, including those in retail, hospitality and logistics, healthcare, education and more. The traditional mobile device management solutions (like MDMs and MAMs), as well as mobility solutions like EMMs and UEMs, were not designed for the modern hardware fleets that are growing today. Esper provides a single pane-of-glass for both Android and iOS devices.
  • 6
    MSP360 RMM Reviews
    MSP360 RMM enables users to efficiently manage all aspects of their IT infrastructure within a single dashboard. Features include system resource monitoring, software deployment, patch management, alerting, remote access, scripting, and more. Licensed per admin with unlimited endpoints.
  • 7
    Scalefusion MDM Reviews

    Scalefusion MDM

    ProMobi Technologies

    $24.00 per device per year
    4 Ratings
    Scalefusion is a leading Mobile Device & Endpoint Management software helping businesses globally to secure and manage their device fleet. Scalefusion simplifies the management of a diverse fleet of Android, iOS, macOS, Windows & Linux devices. Our platform extends support to various deployment scenarios such as dedicated-device, COPE (Corporate-owned, Personally Enabled), and BYOD (Bring Your Own Device). Scalefusion was launched in 2015 by ProMobi Technologies. Scalefusion has grown and evolved in the last 6 years while accomplishing quite a number of accolades in the form of impressive client reviews, global expansion, and customer acquisition.
  • 8
    Zoho Vault Reviews
    You can forget about remembering passwords. Let us do it for you. Zoho Vault, a password manager that protects your passwords and autofills them across all websites and applications, is secure. Vault offers unlimited password storage, seamless autofill, and fine-grained admin controls. Clear security insights into your passwords, both personal and business. You can quickly identify weak passwords and make changes in just a few mouse clicks. Securely store, share, manage, and manage passwords with different access privileges. You can also add documents, notes, credit cards and software licenses to your password vault. You can organize passwords and other confidential information into folders and subfolders to make it easy to manage and share bulk passwords. Users can log in to their daily apps without having to remember passwords. Our catalog supports hundreds of cloud apps and offers options for custom integration.
  • 9
    Corner Bowl Event Log Manager Reviews

    Corner Bowl Event Log Manager

    Corner Bowl Software Corporation

    $84
    4 Ratings
    A Centralized Windows Event Log Management Software Tool for Enterprises. A Centralized Log Consolidator. A real-time Windows Event Log, Syslog, and Application Log Monitor software tool. A Log Analyzer Tool. A Windows Syslog Server. An Azure Active Directory Auditing Software Software Tool. Compliance Reporting Software for JSIG, NIST, CJIS PCI/DSS. HIPAA, SOX. GDPR, CIS Microsoft 365 Security & Compliance and more. 80+ pre-built reports. A Windows Event Log Viewer that is enhanced with advanced search and filtering capabilities. Windows Event Logs, Syslogs and text-based Application Logs on Windows, Linux and the cloud-based Azure Active Directory Audit Logs are supported. Log entries can be saved to a local or remote log repository once they have been harvested. Event Log Manager offers 5 methods to centralize log entries, including MySQL, Microsoft SQL Server and elasiticsearch.
  • 10
    BackBox Reviews
    Network engineers save time with the BackBox Automation Platform for Network Teams by quickly automating and auditing time consuming manual tasks. With a library of over 3,000 pre-built automations and a script-free way to build new ones BackBox makes it easy to get started on your automation journey. BackBox is a point-and-click automation solution for firewall and network device backups, OS updates and patching, configuration compliance audits and remediation, network vulnerability management, network configuration change management, and more.
  • 11
    ESET NOD32 Antivirus Reviews
    Swift and efficient, essential for gamers and everyday users alike who seek an uninterrupted experience. Simply install it and forget about it. It safeguards both Windows and macOS systems. Nowadays, having access to information about every facet of your life is commonplace. Ensuring the online safety of your family and home should be included in that assurance. The ESET HOME app grants you thorough control over your entire internet security, accessible whenever and wherever you need it. Stay informed with a variety of advantages at your fingertips. Receive crucial notifications regarding security and licenses. Access detailed information about your security status while on the move. Monitor the security conditions of your protected devices continuously. Effortlessly download protection for new devices, instantly shielding them from potential threats. Set up security software on any Windows device without the hassle of entering your license key or login details. Additionally, you can add, manage, and share licenses with loved ones, allowing you to oversee who else has access. This way, you maintain control over the digital safety of your household.
  • 12
    Fusion Framework System Reviews
    Fusion Framework System software from Fusion Risk Management allows you to understand how your business functions, how it works and how to fix it. Our platform allows you to easily, visually, and interactively explore every aspect of your business, so that you can identify key risks and points of failure. Fusion's flexible, integrated platform capabilities allow you to achieve greater resilience and efficiency. They can be tailored to meet your specific needs. We are there to help you wherever you are in your journey to more resilient operations. - Map product delivery and service processes that are critical to your business. - Use objective risk insights to help you audit, analyze and improve your business operations - Plan, organize, and measure resilience and risk management activities with confidence Automation can be leveraged to reduce manual, repetitive, and time-consuming tasks, allowing teams to focus on higher-value activities.
  • 13
    ITarian Reviews
    Empower your team to oversee and control the security, efficiency, and management of your complete IT infrastructure through a unified platform, all without any expense to you. The robust ITarian platform offers a streamlined approach to operations, enhances productivity, and optimizes the use of IT resources. Equip your IT personnel with enhanced monitoring and management functionalities. Increase IT efficiency by integrating roles, functions, and tools seamlessly. Ensure maximum uptime through proactive identification and resolution of issues. Streamline daily operations by automating routine tasks using custom scripts, thereby allowing your staff to focus on more strategic initiatives. This holistic approach not only improves workflows but also fosters innovation within your organization.
  • 14
    Microsoft Entra ID Reviews
    Microsoft Entra ID, previously known as Azure Active Directory, serves as a robust cloud-based identity and access management solution that integrates essential directory services, application access control, and sophisticated identity protection measures. Enhance your organization's security with this cloud identity solution, which effectively links employees, clients, and partners to their applications, devices, and valuable data. Utilize robust authentication methods and risk-adjusted access policies to secure resource access without sacrificing user experience. Ensure a quick and straightforward sign-in process throughout your multicloud infrastructure to boost user productivity, minimize password management time, and enhance overall efficiency. Centralize the management of all identities and access to applications, whether they reside in the cloud or on-premises, to gain better visibility and control over your organization’s resources. This comprehensive approach not only protects sensitive information but also fosters a seamless and efficient working environment for all users.
  • 15
    Dropbox Passwords Reviews
    Dropbox Passwords is presently in a limited beta phase and is accessible exclusively to select Dropbox users. In this beta version, Dropbox Passwords enhances password security by consolidating all of your credentials into a single, secure location, facilitating quick logins to websites and applications by automatically filling in both usernames and passwords. Additionally, you can effortlessly generate and save strong, unique passwords whenever you create new accounts. Key features include: - One-click sign-ins for apps and websites - Password storage during website and app logins - Seamless access to your passwords across all devices via automatic synchronization With this innovative password management tool from Dropbox, you can ensure you never face account lockouts again, allowing you to log into your preferred banking, streaming, and online shopping platforms securely—making the checkout process a breeze. Passwords employs zero-knowledge encryption to safeguard your sensitive information, ensuring that your passwords remain shielded from unauthorized access, with access granted solely to you. This added layer of security means you can have peace of mind while navigating the digital landscape.
  • 16
    ARCON | Privileged Access Management Reviews
    The ARCON | Privileged Access Management (PAM) solution offers comprehensive oversight of your entire IT ecosystem, enabling you to create contextual security tailored to your most valuable resource: data. With its detailed access management, you have the flexibility to design your security framework according to your preferences, allowing you to grant or revoke access at your discretion, whenever necessary. Achieve rule- and role-based access control across all target systems while adhering to the principle of 'least privilege', which ensures that access to data is granted solely on a 'need-to-know' basis. This capability empowers your administrators to effectively manage, monitor, and regulate privileged accounts down to each individual user. Establish a cohesive access control and governance structure to keep track of privileged identities, whether they reside on-premises, in the cloud, within a distributed data center, or in a hybrid setting. Additionally, the system automates the randomization and updating of passwords, helping to mitigate risks associated with shared credentials while enhancing overall security. Such features collectively bolster your organization’s resilience against potential security threats.
  • 17
    Trellix Endpoint Security (HX) Reviews
    Trellix Endpoint Security (HX) enables rapid and precise forensic investigations throughout numerous endpoints. By implementing a comprehensive security framework, you can safeguard and strengthen your workforce across all endpoints. Trellix's Endpoint Security solutions leverage proactive threat intelligence and robust defenses throughout every stage of the attack lifecycle, enhancing your organization's safety and resilience. In today's ever-evolving threat landscape, it is crucial to maintain the security of your endpoints. Discover how our cohesive suite of endpoint protection technologies equips you with actionable intelligence, machine learning capabilities, and more, allowing you to consistently monitor threats and prevent attacks. The essence of endpoint security lies in the protection of data and workflows related to each device connected to your network. Endpoint protection platforms (EPP) function by scrutinizing files as they infiltrate the network, ensuring a safer digital environment for all users. By investing in advanced security solutions, organizations can stay one step ahead of potential cyber threats and enhance their overall security posture.
  • 18
    FortiSIEM Reviews
    Robust Security Information and Event Management (SIEM) is essential in today's landscape where cyberattacks occur around the clock. The increasing intricacy and expansion of enterprise environments—including infrastructure, applications, virtual machines, cloud services, endpoints, and IoT devices—result in a significantly larger attack surface. This challenge is exacerbated by a shortage of skilled professionals and limited resources, making security a collective concern; however, visibility, event correlation, and remediation often fall to others. For effective security, organizations require real-time visibility into all devices and infrastructure, along with contextual understanding—identifying which devices pose threats and assessing their potential impact to manage risks effectively, rather than getting lost in the confusion generated by numerous security tools. As the complexity of security management escalates, the array of components that need constant protection and monitoring—encompassing endpoints, IoT devices, infrastructure, various security tools, applications, virtual machines, and cloud environments—continues to expand relentlessly, necessitating a proactive and integrated approach to safeguard against evolving threats.
  • 19
    Hornetsecurity VM Backup Reviews
    VM Backup is a virtual machine backup solution that supports Hyper-V and VMware environments. It is used by more than 40,000 businesses worldwide. The solution is designed for IT departments, resellers, consultants, and Managed Services Providers (MSPs). It provides robust, streamlined enterprise-level functionality. It is characterized by its ease of use, rapidity and affordability. You can reduce RTO and RPO to minutes with its WAN-optimized Replication (CDP). This allows you to drastically reduce the time that your virtual machines go down and the amount data lost in the event of a disaster. Virtual machine backup software with powerful features for HyperV and VMware.
  • 20
    Authsignal Reviews

    Authsignal

    Authsignal

    $99 USD Per Month
    3 Ratings
    Drop Authsignal into your identity stack to secure customer journeys and deliver world-class user authentication experiences. Focused on enabling product and fraud teams to orchestrate customer journeys and mitigate fraud, Authsignal makes it easy to deploy passkeys. Delivering class-leading drop-in authentication experiences, product teams leverage Authsignal to drop authentication (Passkeys, push, SMS authentication) challenges anywhere in the user experience. Seamlessly authenticate identity, secure customer journeys, and protect customer data with a unified customer experience. Gain a single view of customer activity and stream identity data with audit trails. Passkeys, CIAM, IAM, Authentication, Passwordless Authentication, Multifactor Authentication, Passkey
  • 21
    ZoneAlarm Extreme Security NextGen Reviews
    ZoneAlarm for Business offers comprehensive, advanced, and flexible solutions for unmanaged businesses such as small businesses, Telco’s, government municipalities, and other businesses with little to no IT resources available. With its easy deployment and maintenance, ZoneAlarm for Business offers you Check Point’s vigorous multi-platform protection and support, made simple. ZoneAlarm Extreme Security NextGen is the comprehensive, ultimate PC and mobile security solution for all your business security needs, using Check Point’s cutting-edge enterprise-grade technology. Next-gen antivirus with award-winning Anti-Ransomware, advanced phishing protection, and secure browsing experience. Our advanced cyber security solutions use business-class protection to secure millions of home users’ PCs and mobile devices against the latest worldwide cyber threats. This powerful weapon is extremely effective at spotting malicious files and cyberattacks that evade traditional antiviruses.
  • 22
    ScaleGrid Reviews

    ScaleGrid

    ScaleGrid

    $8 per month
    3 Ratings
    ScaleGrid is a fully managed Database-as-a-Service (DBaaS) platform that helps you automate your time-consuming database administration tasks both in the cloud and on-premises. ScaleGrid makes it easy to provision, monitor, backup, and scale open-source databases. It offers advanced security, high availability, query analysis, and troubleshooting support to improve your deployments' performance. The following databases are supported: - MySQL - PostgreSQL - Redis™. - MongoDB®, database - Greenplum™ (coming soon) ScaleGrid supports both public and privately-owned clouds such as AWS, Azure and Google Cloud Platform (GCP), DigitalOcean and Linode, Oracle Cloud Infrastructure, (OCI), VMware, and OpenStack. ScaleGrid is used by thousands of developers, startups, as well as enterprise customers such as Accenture, Meteor and Atlassian. It handles all your database operations at any scale, so you can concentrate on your application performance.
  • 23
    SoapUI Reviews

    SoapUI

    SmartBear

    $599 per year
    3 Ratings
    SoapUI testing tools, available in both open source and commercial versions, simplify the process of creating, managing, and executing comprehensive tests for REST, SOAP, GraphQL APIs, JMS, JDBC, and various web services, allowing for quicker software delivery. For those in development and testing roles eager to enhance their capabilities in delivering REST and SOAP APIs, SoapUI Open Source serves as the most straightforward and user-friendly starting point for API testing. With the next-generation tool designed for streamlining validation of REST, SOAP, GraphQL, microservices, and other backend services, teams can seamlessly integrate API testing into their continuous delivery pipelines. As the backbone of modern software development, APIs, or Application Programming Interfaces, facilitate the connection and transfer of data and logic between different systems and applications. Effective testing of these APIs can significantly enhance the overall efficiency of your testing strategy, enabling even faster software delivery while ensuring higher quality outputs. This ensures that teams remain competitive in a rapidly evolving tech landscape.
  • 24
    MYKI Reviews

    MYKI

    MYKI

    $5 per user per month
    3 Ratings
    MYKI offers a secure solution for password management by keeping your credentials stored locally instead of in the cloud. By utilizing MYKI, you can take charge of your digital identity and ensure that your sensitive information remains safe across all your devices. This offline password manager combines the robust security typically found in standalone applications with the user-friendly features of cloud-based systems. MYKI proficiently manages and synchronizes your data locally on devices that have the MYKI app installed, eliminating the risk of cloud breaches. Unlike traditional services, MYKI's approach makes it exceedingly challenging for cybercriminals to access your confidential information, as it does not rely on cloud storage. The app facilitates seamless peer-to-peer syncing between your devices, allowing you to keep your data updated without the need for a master password. Instead, you can quickly access MYKI using your fingerprint, Face ID, or a PIN code. Furthermore, MYKI offers the ability to securely store and automatically input your two-factor authentication tokens while you navigate online, ensuring both security and ease of use. This innovative approach to password management redefines convenience while prioritizing your security needs.
  • 25
    Tutanota Reviews

    Tutanota

    Tutanota

    €1.20 per month
    3 Ratings
    Everyone deserves secure email communication, and Tutanota stands as the most robust option available, designed for ease of use while prioritizing privacy. By signing up for free, you can regain control over your inbox. With features like end-to-end encryption and two-factor authentication, the security of your emails is unprecedented. The integrated encryption ensures that your mailbox is solely yours, preventing anyone from accessing or deciphering your information. Being open source allows security professionals to audit the code that safeguards your emails, enhancing trust. Our Android application is free from Google services, positioning Tutanota as the premier open source email platform. Accessible via both iOS and Android, your secure messages are always at your fingertips. Our swift web client and comprehensive applications ensure that sending encrypted emails is a seamless experience. We prioritize your email safety by providing a service free from intrusive advertisements, continuously working to deliver encryption that allows you to concentrate on what truly matters. From our straightforward and minimalistic interface to customizable options, Tutanota is dedicated to meeting your email requirements effectively.