---
description: Page 5 - Discover the best Network Security Software in New Zealand. Compare top Network Security Software tools with customer reviews, pricing and free demos.
image: https://gdm-localsites-assets-gfprod.imgix.net/images/software_advice/og_logo-55146305bbe7b450bea05c18e9be9c9a.png
title: Page 5 - Best Network Security Software in New Zealand - 2026 Reviews, Pricing & Demos
---

Breadcrumb: [Home](/) > [Network Security Software](https://www.softwareadvice.co.nz/directory/4170/network-security/software) > [Page 5](https://www.softwareadvice.co.nz/directory/4170/network-security/software?page=5)

# Network Security Software

Canonical: https://www.softwareadvice.co.nz/directory/4170/network-security/software

Page: 5 / 11\
Prev: [Previous page](https://www.softwareadvice.co.nz/directory/4170/network-security/software?page=4)\
Next: [Next page](https://www.softwareadvice.co.nz/directory/4170/network-security/software?page=6)

-----

## Products

1. [ZoneAlarm Pro](https://www.softwareadvice.co.nz/software/78876/zonealarm-pro) — 4.7/5 (18 reviews) — ZoneAlarm Pro is a PC and internet security solution that helps users detect and remove spyware, viruses, Trojan hors...
2. [DataDome](https://www.softwareadvice.co.nz/software/223561/datadome-bot-mitigation) — 4.5/5 (18 reviews) — DataDome is setting the new standard in online fraud and bot management. With a mission to free the web from fraudule...
3. [SPAMfighter Exchange Module](https://www.softwareadvice.co.nz/software/157171/spamfighter) — 4.2/5 (18 reviews) — SPAMfighter is an on-premise solution that assists small to medium sized businesses with identifying and preventing s...
4. [DSRAZOR for Windows](https://www.softwareadvice.co.nz/software/367776/dsrazor-for-windows) — 4.8/5 (17 reviews) — DSRAZOR for Windows provides security access management solutions to organizations of all sizes to help them minimize...
5. [Red Sift OnDMARC](https://www.softwareadvice.co.nz/software/193612/red-sift) — 4.9/5 (17 reviews) — Red Sift OnDMARC is an automated DMARC application designed to prevent the malicious use of business domains for spoo...
6. [nVision](https://www.softwareadvice.co.nz/software/187135/nvision) — 4.5/5 (17 reviews) — We developed Axence nVision® to improve and simplify the work of IT departments. Axence nVision® monitors your networ...
7. [Cisco Umbrella](https://www.softwareadvice.co.nz/software/432062/cisco-umbrella) — 4.4/5 (17 reviews) — Cisco Umbrella is a cloud-delivered network security solution designed to provide DNS-layer protection and threat def...
8. [GoDMARC](https://www.softwareadvice.co.nz/software/248889/godmarc) — 4.6/5 (17 reviews) — GoDMARC is a comprehensive SaaS solution and Managed Services that enables enterprises to deploy DMARC services with ...
9. [ESET PROTECT MDR](https://www.softwareadvice.co.nz/software/354381/eset-protect-mdr) — 4.8/5 (16 reviews) — ESET PROTECT MDR offers comprehensive managed detection and response services designed to secure businesses with 250+...
10. [EcoTrust](https://www.softwareadvice.co.nz/software/421252/ecotrust) — 4.9/5 (16 reviews) — EcoTrust introduces an innovative CAASM platform that redefines cybersecurity by focusing on prioritizing critical bu...
11. [Aruba AirWave](https://www.softwareadvice.co.nz/software/425098/aruba-airwave) — 4.7/5 (15 reviews) — Aruba AirWave provides complete visibility into your wireless network, including information on every device connecte...
12. [USM Anywhere](https://www.softwareadvice.co.nz/software/124618/alienvalut-usm) — 4.4/5 (14 reviews) — USM Anywhere is a cloud-based security platform which helps midsize to large enterprises with risk detection, vulnera...
13. [Cisco Secure Endpoint](https://www.softwareadvice.co.nz/software/402086/cisco-secure-endpoint) — 4.6/5 (14 reviews) — Cisco Secure Endpoint is an advanced malware protection solution that helps enterprises secure emails, web traffic an...
14. [Blumira](https://www.softwareadvice.co.nz/software/210259/blumira) — 4.9/5 (14 reviews) — Blumira’s cloud SIEM platform offers both automated threat detection and response, enabling organizations of any size...
15. [Alert Logic MDR](https://www.softwareadvice.co.nz/software/180949/alert-logic) — 4.5/5 (14 reviews) — Alert Logic Log Manager is a cloud-based log management solution. The solution provides security as a service for var...
16. [Senturo](https://www.softwareadvice.co.nz/software/205978/hiddenapp) — 4.7/5 (13 reviews) — Senturo: Total Device Protection and Fleet Management Senturo is an advanced, all-in-one platform designed to safegua...
17. [BlueCat](https://www.softwareadvice.co.nz/software/112464/BlueCat) — 4.5/5 (13 reviews) — BlueCat provides core services and solutions that help our customers, and their teams, deliver change-ready networks....
18. [RG System Suite](https://www.softwareadvice.co.nz/software/153289/rg-system) — 4.8/5 (13 reviews) — RG System Suite is a SaaS platform designed for MSPs, office administrators and software publishers who need to monit...
19. [Mailinblack](https://www.softwareadvice.co.nz/software/185461/mailinblack) — 4.5/5 (13 reviews) — Mailinblack is a cloud-based and on-premise email security solution designed to help businesses monitor incoming emai...
20. [HackerOne](https://www.softwareadvice.co.nz/software/363397/hackerone) — 4.6/5 (12 reviews) — HackerOne is a hacker-powered cybersecurity platform that enables organizations within the government and financial s...
21. [ManageEngine Browser Security Plus](https://www.softwareadvice.co.nz/software/435315/manageengine-browser-security-plus) — 4.3/5 (12 reviews) — Browser Security Plus is an enterprise browser security solution crafted by ManageEngine, that empowers IT administra...
22. [Astra Pentest](https://www.softwareadvice.co.nz/software/362981/astra-pentest) — 4.8/5 (11 reviews) — Astra is a leading penetration testing company that provides PTaaS and continuous threat exposure management. Our com...
23. [LogPoint](https://www.softwareadvice.co.nz/software/207274/logpoint) — 4.9/5 (11 reviews) — LogPoint provides a quick analysis of your enterprise data to help businesses securely detect and respond to threats ...
24. [Portnox CLEAR](https://www.softwareadvice.co.nz/software/355474/portnox-clear) — 4.1/5 (11 reviews) — Portnox Clear is a cloud-based network access control solution that helps businesses monitor endpoint risks, detect c...
25. [Total Network Inventory](https://www.softwareadvice.co.nz/software/157042/total-network-inventory) — 4.7/5 (11 reviews) — Total Network Inventory is an on-premises software inventory and PC audit management solution designed for businesses...

-----

Page: 5 / 11\
Prev: [Previous page](https://www.softwareadvice.co.nz/directory/4170/network-security/software?page=4)\
Next: [Next page](https://www.softwareadvice.co.nz/directory/4170/network-security/software?page=6)

## Related Categories

- [Cloud Security Software](https://www.softwareadvice.co.nz/directory/4329/cloud-security/software)
- [Computer Security Software](https://www.softwareadvice.co.nz/directory/4528/security/software)
- [Network Monitoring Tools](https://www.softwareadvice.co.nz/directory/4307/network-monitoring/software)
- [Endpoint Protection Software](https://www.softwareadvice.co.nz/directory/4777/endpoint-protection-software/software)
- [Vulnerability Management Software](https://www.softwareadvice.co.nz/directory/4286/vulnerability-management/software)

## Links

- [View on SoftwareAdvice](https://www.softwareadvice.co.nz/directory/4170/network-security/software)
- [All Categories](https://www.softwareadvice.co.nz/directory)

-----

## Structured Data

<script type="application/ld+json">
  {"@context":"https://schema.org","@graph":[{"name":null,"address":{"@type":"PostalAddress","addressLocality":null,"addressRegion":null,"postalCode":null,"streetAddress":null},"description":"Software Advice helps businesses in New Zealand find the best software. Compare software options and learn more from our research and user reviews.","email":"info@softwareadvice.co.nz","url":"https://www.softwareadvice.co.nz/","logo":"https://dm-localsites-assets-prod.imgix.net/images/software_advice/logo-white-d2cfd05bdd863947d19a4d1b9567dde8.svg","@id":"https://www.softwareadvice.co.nz/#organization","@type":"Organization","parentOrganization":"Gartner, Inc.","sameAs":[]},{"name":null,"url":"https://www.softwareadvice.co.nz/","@id":"https://www.softwareadvice.co.nz/#website","@type":"WebSite","publisher":{"@id":"https://www.softwareadvice.co.nz/#organization"},"potentialAction":{"query":"required","target":"https://www.softwareadvice.co.nz/search/?q={search_term_string}","@type":"SearchAction","query-input":"required name=search_term_string"}},{"name":"Network Security Software","description":"Page 5 - Discover the best Network Security Software in New Zealand. Compare top Network Security Software tools with customer reviews, pricing and free demos.","url":"https://www.softwareadvice.co.nz/directory/4170/network-security/software?page=5","about":{"@id":"https://www.softwareadvice.co.nz/directory/4170/network-security/software?page=5#itemlist"},"breadcrumb":{"@id":"https://www.softwareadvice.co.nz/directory/4170/network-security/software?page=5#breadcrumblist"},"@id":"https://www.softwareadvice.co.nz/directory/4170/network-security/software?page=5#webpage","@type":["WebPage","CollectionPage"],"isPartOf":{"@id":"https://www.softwareadvice.co.nz/#website"},"inLanguage":"en-NZ","mainEntity":{"@id":"https://www.softwareadvice.co.nz/directory/4170/network-security/software?page=5#itemlist"},"publisher":{"@id":"https://www.softwareadvice.co.nz/#organization"}},{"@id":"https://www.softwareadvice.co.nz/directory/4170/network-security/software?page=5#breadcrumblist","@type":"BreadcrumbList","itemListElement":[{"name":"Home","position":1,"item":"/","@type":"ListItem"},{"name":"Network Security Software","position":2,"item":"https://www.softwareadvice.co.nz/directory/4170/network-security/software","@type":"ListItem"},{"name":"Page 5","position":3,"item":"https://www.softwareadvice.co.nz/directory/4170/network-security/software?page=5","@type":"ListItem"}]}]}
</script><script type="application/ld+json">
  {"name":"Page 5 - Best Network Security Software in New Zealand - 2026 Reviews, Pricing &amp; Demos","@context":"https://schema.org","@id":"https://www.softwareadvice.co.nz/directory/4170/network-security/software?page=5#itemlist","@type":"ItemList","itemListElement":[{"name":"ZoneAlarm Pro","position":1,"description":"ZoneAlarm Pro is a PC and internet security solution that helps users detect and remove spyware, viruses, Trojan horses and more. Key features of this platform include antivirus signatures, web resources, two-way firewall, full stealth mode and zero-hour protection.\n\n\nDesigned for small to midsize businesses, ZoneAlarm Pro provides protection against phishing, worms, bots and rootkits. It also enables users to prevent identity theft by guarding personal data and browser protection. Additionally, its advanced-access protection module enables security from supply-chain management (SCM) and raw data access attacks.\n\n\nZoneAlarm Pro’s scan mode allows users to perform custom anti-virus scans and ensure up-to-date protection. It can either be deployed on-premise or hosted in the cloud. Pricing is available on yearly subscription and support is extended via documentation, email and online help desk.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/1e3e8929-c06c-4c8c-84a0-47f98e078588.png","url":"https://www.softwareadvice.co.nz/software/78876/zonealarm-pro","@type":"ListItem"},{"name":"DataDome","position":2,"description":"DataDome is setting the new standard in online fraud and bot management. With a mission to free the web from fraudulent traffic so that sensitive data remains safe and online platforms can perform at optimum speed, we protect mobile apps, websites and APIs from online fraud, including scraping, scalping, credential stuffing and account takeover, Layer 7 DDoS attacks and carding fraud. \n\nOur AI-powered bot detection engine processes more than a TRILLION pieces of data every day, from 25 worldwide points of presence, to protect the largest global e-commerce businesses in real time.\n\nEasily deployed and ultra-scalable, DataDome is the core component of your application security at the edge. It is compatible with 100% of web infrastructure technologies, thanks to strong technical and business partnerships with all the market leaders. It runs anywhere, in any cloud, and is compatible with multi-cloud and multi-CDN setups.\n\nDataDome detects, on average, a new bad bot every millisecond. Our customers rely on our AI-powered bot detection engine to detect, classify and block all automated threats across their mobile applications, websites and APIs in real time, without them having to think about it.\nHowever, behind the scenes, our threat intelligence and bot SOC teams are always at work. 24/7, they actively monitor the billions of requests processed by our AI to detect any situation requiring human intervention.\n\nDataDome’s cybersecurity technology protects 130+ customers worldwide, including TripAdvisor, Rakuten, The New York Times, Kurt Geiger, Footlocker, BlaBlaCar and Adevinta.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/2f0b2a8a-6e89-40cb-8b01-a1dff45c1e11.jpeg","url":"https://www.softwareadvice.co.nz/software/223561/datadome-bot-mitigation","@type":"ListItem"},{"name":"SPAMfighter Exchange Module","position":3,"description":"SPAMfighter is an on-premise solution that assists small to medium sized businesses with identifying and preventing spam, phishing, malware and email fraud. Key features include language filtering, statistics, account protection and reporting. \n\n\nThe SPAMfighter platform comes with an activity dashboard, which allows administrators to view subscription validity, processed emails, total number of email blocked, spam ratio and email addresses on whitelists or blacklists. Its language filtering tool enables users to block emails written in languages such as English, German, French, Spanish, Chinese, Italian, Greek, Dutch, Swedish, Norwegian, Bulgarian, Portugese and more.\n\n\nSPAMfighter integrates with Microsoft applications including Outlook, Windows Mail and Thunderbird. It is available on a one-time purchase and support is provided via phone and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/15a1c54f-f5f6-4058-adb0-d617b19f4f98.jpeg","url":"https://www.softwareadvice.co.nz/software/157171/spamfighter","@type":"ListItem"},{"name":"DSRAZOR for Windows","position":4,"description":"DSRAZOR for Windows provides security access management solutions to organizations of all sizes to help them minimize costs and challenge regarding internal security. DSRAZOR for Windows offers file permission recording, active directory reporting and active directory management tools, which helps businesses keep an eye on their data.\n\n\nUsers can see who has permission access for a particular file or folder in minutes with NTFS permissions. It allows users to easily modify, add and remove permissions and can also alter the file trustee status. Users can explore and remove old and used data from the directory. This helps to save time and effort by reviewing file permissions and preparing easy-to-read reports. The active directory reporting system gives comprehensive reports related to accounts that are expired, locked or disabled. It lets users know the accounts that are not in use for a particular period, where last sign-in failed and much more.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/549203aa-432c-4b45-92fa-a0a065ebfff2.png","url":"https://www.softwareadvice.co.nz/software/367776/dsrazor-for-windows","@type":"ListItem"},{"name":"Red Sift OnDMARC","position":5,"description":"Red Sift OnDMARC is an automated DMARC application designed to prevent the malicious use of business domains for spoofed messages.\n\nOnDMARC safeguards against unauthorized phishing attempts, scam emails, and other cyber attacks by preventing the impersonation of trusted business domains. This protection helps maintain brand reputation by reducing the risk of association with illicit payment requests, suspicious links, and malicious data harvesting techniques. Additionally, the software enhances the deliverability of authorized emails, decreasing the likelihood of legitimate messages being blocked by spam and security systems.\n\nThe core security measure of OnDMARC is the Domain-based Message Authentication, Reporting, and Conformance (DMARC) protocol. It also integrates DKIM and SPF, facilitating their deployment without the need for complicated DNS configuration. OnDMARC is suitable for any business with its own email domain, providing a comprehensive solution for email security.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/5969e028-d8f4-46f3-bf12-cd3cbe8edf5a.png","url":"https://www.softwareadvice.co.nz/software/193612/red-sift","@type":"ListItem"},{"name":"nVision","position":6,"description":"We developed Axence nVision® to improve and simplify the work of IT departments. Axence nVision® monitors your network and users, allows you to inventory your hardware and software, enables remote user support, and protects your company's data from leaks. We have taken special care to ensure ease of implementation, simplicity of use and simple enjoyment.\n\nWe are a Polish IT company that has been delivering award-winning products to more than 3,500 customers in Poland and around the world for 20 years. We operate globally - from universities in Canada and the stock exchange in Bulgaria to ministries in the Philippines and government services in many countries around the world.\n\nWe support IT departments in creating a secure and efficient IT environment, and are committed to supporting digital education and enhancing global IT security.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/58a574d6-8390-4f01-9785-83b451a93b51.png","url":"https://www.softwareadvice.co.nz/software/187135/nvision","@type":"ListItem"},{"name":"Cisco Umbrella","position":7,"description":"Cisco Umbrella is a cloud-delivered network security solution designed to provide DNS-layer protection and threat defense against cybersecurity risks. It is used by organizations in sectors such as government, financial services, manufacturing, healthcare, retail, education and hospitality. The platform helps secure remote workers, guest Wi-Fi networks and distributed networks from evolving threats.\n\nThe solution integrates DNS-layer security with secure web gateway capabilities, cloud access security broker functionality and cloud-delivered firewall protection. It includes data loss prevention features to safeguard sensitive information and malware protection to detect and remove threats from cloud file storage applications. Remote browser isolation and zero trust network access enable secure connections to private applications and SaaS platforms. Threat intelligence powered by Cisco Talos provides AI-driven detection of known and emerging threats. Unified policy management with rule-based controls simplifies deployment and administration.\n\nThe platform is FedRAMP authorized for government use and operates on a global cloud architecture with distributed DNS resolvers. Features include web content filtering, shadow IT discovery and app blocking to maintain visibility and control over network activity. It supports securing SD-WAN deployments, protecting mobile users and defending off-network endpoints.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/1a0beb4d-3425-4cd1-87ae-b148c191bbcc.png","url":"https://www.softwareadvice.co.nz/software/432062/cisco-umbrella","@type":"ListItem"},{"name":"GoDMARC","position":8,"description":"GoDMARC is a comprehensive SaaS solution and Managed Services that enables enterprises to deploy DMARC services with ease. Our solution is designed to provide a range of email authentication and security features that help safeguard your brand and your customers from the risks associated with email phishing attacks.\n\nOne of the key benefits of GoDMARC is that it is purpose-built to fulfill the authentication needs of enterprises, providing robust reporting and reducing false positives. With our solution, you can effectively stop phishing delivery and mitigate the risks associated with fraudulent emails.\n\nAnother key advantage of GoDMARC is that it reduces the complexity of DMARC deployment and management, making it easier for enterprises to comply with DMARC standards and achieve the strictest level of DMARC in a short period. Our Managed Services provide additional support, ensuring that our clients can easily implement and maintain DMARC compliance, while gaining complete visibility into email authentication status and identifying gaps in SPF and DKIM.\n\nBy deploying GoDMARC, enterprises can gain a competitive advantage by enhancing their email security, improving email deliverability, and reducing the risks associated with fraudulent emails. Our solution also provides greater visibility into email authentication status, allowing enterprises to monitor and track email activity, which is particularly important for companies that rely heavily on email communications.\n\nOverall, GoDMARC provides a comprehensive suite of email authentication and security features that enable enterprises to better protect their brand and their customers from the risks associated with email phishing attacks. With our solution, you can simplify the management of DMARC compliance, achieve the strictest level of DMARC in a short period, and gain greater visibility into your email ecosystem.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/ac885daa-e493-4b8e-837b-bfda1bfac4c5.png","url":"https://www.softwareadvice.co.nz/software/248889/godmarc","@type":"ListItem"},{"name":"ESET PROTECT MDR","position":9,"description":"ESET PROTECT MDR offers comprehensive managed detection and response services designed to secure businesses with 250+ employees. This advanced solution combines continuous threat monitoring, real-time threat intelligence, and expert incident response to protect your organization from cyber threats. ESET's team of cybersecurity professionals works around the clock to detect, analyze, and mitigate potential vulnerabilities, ensuring your systems remain secure. With features like rapid incident response, detailed reporting, and proactive threat hunting, ESET PROTECT MDR enhances your organization's ability to manage and reduce vulnerabilities effectively. Trust ESET to provide the expertise and technology needed to safeguard your digital assets and maintain a robust security posture.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/5a636085-1735-4764-b67d-d13b8edcfa00.png","url":"https://www.softwareadvice.co.nz/software/354381/eset-protect-mdr","@type":"ListItem"},{"name":"EcoTrust","position":10,"description":"EcoTrust introduces an innovative CAASM platform that redefines cybersecurity by focusing on prioritizing critical business risks. Our solution offers a consolidated view of vulnerabilities and attack surfaces, employing advanced AI to filter out noise and concentrate on what truly matters, enabling security teams to do more with less. It integrates data from over 50 technologies, providing a comprehensive view of cyber risks, enhancing operational efficiency, and improving security decision accuracy.\n\nOur platform not only identifies and holistically visualizes risks and vulnerabilities through 6 native scanners but also prioritizes the greatest risks based on technical and business contexts. This optimizes resource allocation, reducing the time needed for critical fixes and improving threat response capabilities. EcoTrust also delivers treatment recommendations generated by AI, speeding up the response to critical vulnerabilities and improving key cyber risk indicators.\n\nWe offer strategic, tactical, and operational dashboards and reports that provide valuable insights for decision-making, along with alert automation and a history of vulnerabilities accessible via consumption APIs. EcoTrust is the ultimate solution for businesses seeking a strong, efficient, and proactive security posture, perfectly adapting to local needs and global challenges in the cybersecurity landscape.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/85ed12fb-fba1-42f4-a63c-265bea647008.png","url":"https://www.softwareadvice.co.nz/software/421252/ecotrust","@type":"ListItem"},{"name":"Aruba AirWave","position":11,"description":"Aruba AirWave provides complete visibility into your wireless network, including information on every device connected to it and the ability to locate a mobile device with GPS. The platform also tracks performance metrics such as throughput, jitter, and latency for every device connected to the network. \n\nAruba AirWave provides the tools you need to ensure that your network is operating at peak performance and users can access the resources they need. It can be used to manage access control and mobility and allows you to create guest networks, filter web content, and enforce security policies on all devices connected to your network.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/66ac735d-085e-4f6c-bb09-a506f079f9c2.png","url":"https://www.softwareadvice.co.nz/software/425098/aruba-airwave","@type":"ListItem"},{"name":"USM Anywhere","position":12,"description":"USM Anywhere is a cloud-based security platform which helps midsize to large enterprises with risk detection, vulnerability assessment, security monitoring and threat response.\n\n\nThe security platform enables users to collect and detect information such as software services, number of users logged in and the operating system of assets. It comes with an active scanner, which lets users scan for known vulnerabilities, and an intrusion-detection system to conduct file integrity monitoring, gather operating system logs and perform rootkit checking. Further, its behavioral monitoring capability includes netflow information, bandwidth and traffic capture.\n\n\nAdditionally, USM users can participate in the open threat exchange (OTX) threat-sharing network and identify known malicious attackers. The solution integrates with third-party applications such as Jira, Office 365, Amazon Web Services, Palo Alto Networks and more.\n\n\nUSM Anywhere is available on a monthly subscription basis and comes with online and phone support.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/adf53927-f31f-47c4-be11-26cf1c8cdde6.png","url":"https://www.softwareadvice.co.nz/software/124618/alienvalut-usm","@type":"ListItem"},{"name":"Cisco Secure Endpoint","position":13,"description":"Cisco Secure Endpoint is an advanced malware protection solution that helps enterprises secure emails, web traffic and endpoints. The solution prevents threats at point of entry and continuously tracks files to detect and remove file-less malware, ransomware and all other kinds of intrusions. In addition, Cisco provides security services that helps businesses identify incoming threats from third-party interactions, assess vulnerabilities and create information security programs.\n\n\nCisco Secure Endpoint uses multiple preventive engines with a threat intelligence system to facilitate automated identification and virus blocking. It offers a complete overview and control of servers across multiple platforms such as Windows, Android, iOS, macOS and Linux. Features include malicious activity protection, malware exploit prevention and analysis of new threats via machine-learning, sandboxing and more. Additionally, the application suppresses attacks by separating an infected endpoint and blocking it across platforms and devices.\n\n\nCisco Endpoint integrates with various third-party applications such as Blackpoint SNAP Defense, IBM Resilient, CyberSponse SOAR and IBM BigFix. Pricing is available on request and support is extended via phone, email, documentation and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/c5debce5-a64f-44c2-9b31-fc9f5bfa0bce.png","url":"https://www.softwareadvice.co.nz/software/402086/cisco-secure-endpoint","@type":"ListItem"},{"name":"Blumira","position":14,"description":"Blumira’s cloud SIEM platform offers both automated threat detection and response, enabling organizations of any size to more efficiently defend against cybersecurity threats in near real-time. It eases the burden of alert fatigue, complexity of log management and lack of IT visibility. \n\nBlumira's cloud SIEM can be deployed in hours with broad integration coverage across cloud, endpoint protection, firewall and identity providers including Office 365, G Suite, Crowdstrike, Okta, Palo Alto, Cisco FTD and many others. Try Blumira for free at blumira.com/trial.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/1f785f6b-2d00-4843-af80-9503cad7d2b7.jpeg","url":"https://www.softwareadvice.co.nz/software/210259/blumira","@type":"ListItem"},{"name":"Alert Logic MDR","position":15,"description":"Alert Logic Log Manager is a cloud-based log management solution. The solution provides security as a service for various environments including Amazon Web Services, Microsoft Azure, Google Cloud Platform and hybrid environment.\n\n\nAlert Logic Log Manager is an automated solution that collects, aggregates and searches log data from web applications, servers and network assets. Key features include threat detection, forensics data management, compliance management, log monitoring, log analysis, log reports, log reviews and security alerts.\n\n\nAlert Logic Log Manager automatically deploys collectors in the cloud and hybrid infrastructure. Along with it, the solution integrates log data from various sources such as applications, workloads and network assets. It tracks user activities and suspicious behaviors across all the environments. In case of any threats, system analysts analyze the threats and alert users with the help of daily and monthly reports.\n\n\nAlert Logic provides its services on a monthly subscription basis and provides support via phone, email, knowledge base, training and community forums.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/d4e18fd4-916d-420e-b10d-affe08d1bfc5.png","url":"https://www.softwareadvice.co.nz/software/180949/alert-logic","@type":"ListItem"},{"name":"Senturo","position":16,"description":"Senturo: Total Device Protection and Fleet Management\n\nSenturo is an advanced, all-in-one platform designed to safeguard, monitor, and manage your organization’s mobile and desktop devices. Whether you operate in education, construction, healthcare, or any other industry that relies heavily on mobile technology, Senturo offers comprehensive support for Apple, Chromebook, Windows, and Android devices. From real-time tracking to compliance enforcement, Senturo helps you maintain a secure, efficient, and traceable IT fleet.\n\nComprehensive Device Security\nSenturo ensures your devices and data are always protected from theft, loss, and unauthorized access. Advanced tracking and monitoring features provide continuous visibility over your fleet, while proactive tools like geofencing, IP whitelisting, and automated notifications keep you informed of potential risks. Should a device go missing, Senturo’s recovery features, including remote lockdown, data wipe, and detailed tracking assistance, enable swift action to protect sensitive information and minimize downtime.\n\nIT Fleet Location Tracking\nSenturo’s intuitive, Google Maps-powered dashboard gives you complete visibility of your device fleet. Track device locations in real-time and access up to a year of historical movement data to ensure accountability and control. Whether you need to monitor an entire fleet across multiple sites or locate a single misplaced device, Senturo delivers the precision and insights you need.\n\nAdvanced Monitoring and Policy Compliance\nSenturo doesn’t just track devices—it actively secures them. Geofencing allows you to define specific zones for your devices, ensuring they remain within approved boundaries. Paired with IP whitelisting, Senturo ensures that your devices only connect to trusted networks. Real-time alerts notify your team the moment a device leaves a designated zone or connects to an unauthorized network. These proactive measures strengthen compliance with organizational policies and industry regulations, reducing the risk of violations.\n\nGeo-Compliance for Critical Operations\nSimplify the management of location-sensitive policies with Senturo’s geo-compliance capabilities. Enforce jurisdictional data protection rules, secure regional assets, and generate detailed location logs to streamline audits. These features are essential for industries like healthcare, education, and government, where strict compliance is often mandatory.\n\nStreamlined Mass Communication\nWith Senturo, you can instantly send critical updates or routine announcements to your entire fleet, ensuring seamless communication. Messages can be displayed prominently on device screens or read aloud, making it easy to reach all users, even in urgent situations.\n\nCentralized Multi-Platform Management\nManaging diverse devices has never been simpler. Senturo supports Apple, Android, Chromebook, and Windows devices, allowing you to oversee your entire fleet through a single, user-friendly platform.\n\nWhy Senturo is the Right Choice\nSenturo blends cutting-edge security, intuitive management tools, and actionable insights into a scalable, all-in-one solution. For schools managing thousands of student devices or businesses with a vast mobile fleet, Senturo delivers the tools needed to secure assets, optimize operations, and reduce risks.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/62b0795f-6de1-4716-bb25-0e43ffb224b3.png","url":"https://www.softwareadvice.co.nz/software/205978/hiddenapp","@type":"ListItem"},{"name":"BlueCat","position":17,"description":"BlueCat provides core services and solutions that help our customers, and their teams, deliver change-ready networks. With BlueCat, organizations can build reliable, secure, and agile mission-critical networks that can support network modernization initiatives such as cloud adoption, SD-WAN, SASE and automation of key network provisioning and administration tasks. BlueCat’s growing portfolio includes services and solutions for automated and unified DDI (DNS-DHCP-IPAM) management, network security, multi-cloud management, network observability, performance management and health. The company is headquartered in Toronto and New York and has additional offices in Germany, Iceland, Japan, Singapore, Serbia, and the United Kingdom. Learn more at bluecat.com.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/ea0fc425-c3c2-465c-999b-ec0f382594c7.jpeg","url":"https://www.softwareadvice.co.nz/software/112464/BlueCat","@type":"ListItem"},{"name":"RG System Suite","position":18,"description":"RG System Suite is a SaaS platform designed for MSPs, office administrators and software publishers who need to monitor, secure and manage their customers' IT infrastructures. It combines RMM monitoring, remote assistance, backup and cybersecurity in a single environment, offering centralised and consistent management of IT assets.\n\nFrom a single dashboard, technical teams can monitor the status of servers, workstations, network equipment and critical services, receive real-time alerts and automate tasks (application deployment, scripts, Windows updates). Integrated remote control allows for rapid intervention without prior installation and speeds up incident resolution.\n\nThe solution also incorporates Bitdefender technology to protect client environments, as well as two complementary backup modules for Microsoft 365 and local data. A sovereign password manager completes the ecosystem to centralise sensitive access. Available on web and mobile, hosted in France and designed for multi-tenancy, RG System Suite offers MSPs a unified platform to monitor and maintain their infrastructures with confidence.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/63d485e7-2cd0-4e9f-b880-369ffa9498c1.png","url":"https://www.softwareadvice.co.nz/software/153289/rg-system","@type":"ListItem"},{"name":"Mailinblack","position":19,"description":"Mailinblack is a cloud-based and on-premise email security solution designed to help businesses monitor incoming emails and protect inboxes from spam or virus attack. It enables administrators to identify threats and use filters to validate the recipient’s existence and sender's domain. \n\n\nMailinblack lets users configure security settings and block malicious senders. It also allows supervisors to retrieve pending emails and determine the number of authorized senders, blocked viruses and processed messages. The AI-based application provides a user authentication feature, human lock security system, which enables users to check incoming mails in the whitelist and confirm them by sending a custom verification request. \n\n\nMailinblack provides integration with Microsoft Office 365, letting users control message exchanges from the application. It comes with mobile applications for Android and iOS. Pricing is available on request and support is provided via email and documentation.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/32db288c-6801-4b2d-9cfb-8e6e260b1e12.png","url":"https://www.softwareadvice.co.nz/software/185461/mailinblack","@type":"ListItem"},{"name":"HackerOne","position":20,"description":"HackerOne is a hacker-powered cybersecurity platform that enables organizations within the government and financial service industries to identify, capture, and resolve security vulnerabilities that were discovered by hackers. HackerOne is designed to help users receive and monitor vulnerabilities through secure channels, conduct continuous vulnerability testing for specific features or in-house apps, and implement security assessments to ensure products meet security compliance requirements for secure product launches. HackerOne also provides advisory and triage services that help teams launch and scale security programs, validate vulnerabilities, and develop remediation plans.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/048fef9b-484d-42b7-9d56-60f5d0a5e097.png","url":"https://www.softwareadvice.co.nz/software/363397/hackerone","@type":"ListItem"},{"name":"ManageEngine Browser Security Plus","position":21,"description":"Browser Security Plus is an enterprise browser security solution crafted by ManageEngine, that empowers IT administrators to manage and bolster browser security across their networks seamlessly. Offering an array of features, this tool provides invaluable insights into browser usage patterns and add-on behaviors.\n\nUnified Command Center: IT administrators benefit from a centralized console that enables them to enforce robust security policies consistently across different browsers, ensuring a uniform and secure browsing environment enterprise-wide.\n\nTailored Security Policies: Browser Security Plus allows for the implementation of customized security policies for various browsers, providing a nuanced approach to addressing specific vulnerabilities and threats associated with diverse browser environments.\n\nEfficient Extension and Plug-in Oversight: Administrators gain precise control over browser extensions and plug-ins, mitigating potential security risks posed by unauthorized or vulnerable add-ons.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/b7527ef3-6536-472a-99c9-437fdf77b2f6.png","url":"https://www.softwareadvice.co.nz/software/435315/manageengine-browser-security-plus","@type":"ListItem"},{"name":"Astra Pentest","position":22,"description":"Astra is a leading penetration testing company that provides PTaaS and continuous threat exposure management. Our comprehensive cybersecurity solutions blend automation and manual expertise to run 15,000+ tests and compliance checks, ensuring complete safety regardless of the threat or attack location.\n\nWith a 360° view of an organization’s security posture, proactive, continuously delivered insights, real-time reporting, and AI-first defensive strategies, we aim to help CTOs shift left at scale through continuous pentests. The offensive scanner engine, seamless tech stack integrations, and expert support help make pentesting simple, effective, and hassle-free for 1000+ businesses worldwide.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/2d2e4f85-ddef-4533-87d5-af3eba481207.png","url":"https://www.softwareadvice.co.nz/software/362981/astra-pentest","@type":"ListItem"},{"name":"LogPoint","position":23,"description":"LogPoint provides a quick analysis of your enterprise data to help businesses securely detect and respond to threats with real-time application of correlation rules.\n\nLogPoint enables organizations to identify advanced threats and minimize investigation time with UEBA. It comes with a reporting module, which provides all the actionable intelligence required to facilitate decision-making processes.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/5d54b5f6-d3bd-47bd-be68-46324819507a.png","url":"https://www.softwareadvice.co.nz/software/207274/logpoint","@type":"ListItem"},{"name":"Portnox CLEAR","position":24,"description":"Portnox Clear is a cloud-based network access control solution that helps businesses monitor endpoint risks, detect compromised devices, and automate mitigation to high-risk devices. It allows staff members to configure essential security policies like two-factor authentication and define access control policies for wireless, wired and VPN connections.  Portnox Clear is used across a wide variety of industries such as in banking, defense, biotech, engineering, healthcare, and legal services.\n\nPortnox Clear enables IT professionals to set up role-based access, so only those who need access have access and guest accounts stay out of confidential company resources. The group-level policies allow administrators to create risk policies for multiple users and devices from within a centralized platform. Additionally, administrators can not only monitor device risks based on several custom criteria, such as encryption, location, firewall, certificates, updates and more, but they can automate mitigation of risk such as updating the firewall or uninstalling a risky application.\n\nPortnox Clear is vendor agnostic, so it works with your existing network infrastructure.  It also seamlessly integrates with several essential technology solutions such as MDM, AD,  SIEM, and many more.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/45e81243-0a43-460f-b6b8-902177a09f82.png","url":"https://www.softwareadvice.co.nz/software/355474/portnox-clear","@type":"ListItem"},{"name":"Total Network Inventory","position":25,"description":"Total Network Inventory is an on-premises software inventory and PC audit management solution designed for businesses of all sizes. It allows users to scan devices present on a network and provides a report detailing active operating systems, running processes, hardware, software and hotfixes.\n\nTotal Network Inventory helps users manage inventory, software assets, and logs. The solution groups network assets and allows users to attach comments or other information to them. The reports generated by the system can be copied, printed or exported for further use. It also offers search functionality that displays results in real time as the user types.\n\nUsers can manage and view the inventory log to see information about application installation, hardware connection and disk space usage. It allows users to select the exact time and date for the scheduled scans of different asset types. Users can specify different credentials for different asset types in order to increase security.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/035f4ba8-64e5-4c65-a469-88e49baab5de.png","url":"https://www.softwareadvice.co.nz/software/157042/total-network-inventory","@type":"ListItem"}],"numberOfItems":25}
</script>
