Suggested Categories:

Mac Cleaners Software
Mac cleaners are software tools that enable Mac OS X users to clean their Mac and get rid of unwanted files and junk items.
IT Security Software
IT security software is designed to protect information technology (IT) systems, networks, and data from cyber threats, such as malware, hacking, and unauthorized access. These tools provide various features such as antivirus protection, firewalls, encryption, intrusion detection and prevention systems, and vulnerability management to ensure the integrity, confidentiality, and availability of sensitive information. IT security software helps organizations detect, prevent, and respond to security incidents, mitigate risks, and ensure compliance with industry regulations. It is critical for businesses and individuals to safeguard against cyberattacks, data breaches, and other security vulnerabilities.
IoT Security Software
IoT (Internet of Things) security software is designed to protect connected devices and networks from cyber threats, ensuring the confidentiality, integrity, and availability of data transmitted between IoT devices. These tools monitor and secure devices, applications, and networks that are part of the IoT ecosystem, which includes sensors, actuators, smart appliances, wearables, and industrial equipment. IoT security software includes features such as threat detection, data encryption, access control, device authentication, and vulnerability management to mitigate risks from cyberattacks, unauthorized access, and data breaches. It is essential for industries like healthcare, manufacturing, transportation, and smart cities, where the IoT devices are widely used and often contain sensitive or critical data.
Data Center Security Software
Data center security software enables IT security professionals and organizations to secure their data center infrastructure including racks, networks, server endpoints, and more. Data center security tools provide all aspects of security for data centers. Data center security software helps protect the physical and virtual infrastructure of data centers from unauthorized access, cyber threats, and data breaches. Data center security software ensures that sensitive information and critical systems are safeguarded from external and internal threats by providing real-time alerts, logging activities, and implementing compliance with security standards.
Application Security Software
Application security software is designed to protect applications from cyber threats by identifying vulnerabilities, preventing attacks, and ensuring data integrity throughout the application’s lifecycle. This software typically includes features like static and dynamic analysis, runtime protection, and vulnerability scanning to detect and address potential security issues such as SQL injection, cross-site scripting (XSS), and unauthorized access. It helps organizations maintain secure applications by implementing best practices for secure coding, performing penetration testing, and monitoring for security breaches. Application security software is crucial for organizations to safeguard sensitive data, comply with regulations, and minimize the risk of exploitation.
Website Security Software
Website security software protects websites from cyber threats such as malware, hacking attempts, DDoS attacks, and data breaches. It continuously monitors website traffic, scans for vulnerabilities, and blocks suspicious activity in real time. Many solutions include firewalls, bot protection, SSL management, and automated malware removal to keep sites safe and compliant. Website security software also provides dashboards and reports to help teams understand risks and stay ahead of emerging threats. Overall, it ensures websites remain fast, secure, and trustworthy for users.
Cloud Security Software
Cloud security software consists of tools, software, and services designed to protect data, applications, and infrastructure associated with cloud environments. It addresses unique security challenges posed by the cloud, such as data breaches, unauthorized access, and compliance with regulatory standards. These solutions often include features like encryption, identity and access management, intrusion detection systems, and security information and event management (SIEM). By implementing cloud security software, organizations can safeguard their cloud-based assets from cyber threats and ensure the integrity and confidentiality of sensitive information. As businesses increasingly adopt cloud services, robust cloud security measures have become essential for maintaining operational continuity and customer trust.
Database Security Software
Database security software tools enable organizations to secure their databases, and ensure security compliance with database operations.
Data Security Software
Data security software is designed to protect sensitive data from unauthorized access, theft, or corruption. It includes a variety of tools and features such as encryption, access control, data masking, and backup and recovery to ensure that data remains secure at rest, in transit, and during processing. These solutions help organizations comply with data protection regulations, such as GDPR and HIPAA, by safeguarding personal, financial, and business data. Data security software often integrates with other IT security systems to provide comprehensive protection against cyberattacks, insider threats, and data breaches, ensuring that critical information remains protected.
Network Security Software
Network security software is a type of software that helps protect computers, networks, and data from malicious attacks and unauthorized access. It is typically used by businesses to protect their confidential information and keep systems safe. It can also be used by individuals to protect their personal information and devices from potential threats.
API Security Software
API security software is designed to protect APIs from security threats such as unauthorized access, data breaches, and denial-of-service attacks. These tools monitor, authenticate, and secure the connections between APIs and the systems they interact with, ensuring that only authorized users and systems can access the data or services offered by the API. Features typically include encryption, rate limiting, authentication (such as OAuth, JWT), API traffic monitoring, threat detection, and automated security testing. API security software is crucial for businesses that rely on APIs to connect with third-party services, mobile apps, or microservices, as it helps mitigate risks and maintain data integrity.
Computer Security Software
Computer security software helps protect devices, networks, and sensitive data from unauthorized access, cyberattacks, and other security threats. These tools provide a range of protective features such as antivirus, firewall, encryption, malware detection, and intrusion prevention systems. Computer security software is essential for safeguarding against viruses, ransomware, spyware, and phishing attacks, ensuring the integrity, confidentiality, and availability of data. Many security solutions also offer real-time monitoring, automated updates, and threat intelligence to detect and mitigate new vulnerabilities as they emerge. Businesses and individuals rely on computer security software to reduce risks, comply with regulations, and maintain a secure computing environment.
Container Security Software
Container security software is software designed to protect containerized applications and environments from security vulnerabilities, threats, and attacks. Containers, which are used to deploy and run applications in isolated environments, present unique security challenges due to their dynamic and ephemeral nature. Container security software helps secure containerized environments by providing capabilities such as vulnerability scanning, runtime protection, access control, and image security. These tools monitor container configurations and activity to detect anomalies, ensure compliance with security policies, and mitigate risks like container escapes or unauthorized access. By enhancing the security of containers and container orchestration platforms (like Kubernetes), these solutions enable organizations to securely deploy and manage applications in cloud-native and microservices environments.
Physical Security Software
Physical security software is a suite of tools designed to manage and monitor the security of physical spaces, assets, and individuals within an organization. These platforms often integrate with hardware systems such as access control systems, surveillance cameras, alarms, and sensors to provide a comprehensive security solution. Features of physical security software can include real-time monitoring, incident reporting, visitor management, access control, and remote security management. The software can also provide detailed analytics on security incidents, track access logs, and manage emergency response protocols. By helping organizations secure their physical premises, physical security software enhances safety, prevents unauthorized access, and ensures regulatory compliance.
Email Security Software
Email security software protects organizations from cyber threats such as phishing, malware, and spam by filtering incoming and outgoing email traffic. It uses advanced threat detection, encryption, and data loss prevention (DLP) to safeguard sensitive information. These tools also offer features like email authentication (DMARC, SPF, DKIM) and real-time threat intelligence to block emerging attacks. By securing email communications, businesses can prevent data breaches, ensure regulatory compliance, and maintain user trust. Email security software is essential for mitigating human error, which is one of the leading causes of data breaches.
Secure Web Gateways
Secure web gateways protect users and organizations from online threats by monitoring and controlling web traffic between internal networks and the internet. They filter malicious websites, block unauthorized access, and prevent data leaks by enforcing security policies in real time. These gateways use technologies such as URL filtering, malware scanning, sandboxing, and data loss prevention to safeguard users across devices and locations. Cloud-based versions extend protection to remote and hybrid workforces without relying on traditional network perimeters. Ultimately, secure web gateways ensure safe, compliant, and controlled internet access while maintaining high performance and user productivity.
Security Awareness Training Programs
Security awareness training programs are platforms designed to help employees, partners, and other stakeholders recognize and respond to security threats and best practices. These programs typically focus on topics like phishing, password management, data protection, and secure browsing habits, aiming to create a culture of security within an organization. By providing interactive modules, quizzes, and real-world scenarios, these programs ensure that participants can identify potential risks and mitigate them effectively. Many security awareness training platforms offer tracking and reporting features, allowing organizations to monitor progress and measure the effectiveness of their training efforts. The goal is to reduce the likelihood of security breaches caused by human error and ensure that individuals are well-informed about their role in maintaining cybersecurity.
Zero Trust Security Software
Zero trust security software, also known as zero trust networking software, provides a security solution based on the zero trust methodology. Zero trust security solutions enable organizations to enforce security policies on a "zero trust" basis for both internal and external users, and allow security teams to track, monitor, and analyze user behavior and usage across the network to identify potential threats.
Cloud Access Security Brokers (CASB)
Cloud Access Security Brokers (CASBs) are software applications that sit between a cloud service provider and an organization. Their purpose is to provide visibility and control over the use of cloud services, ensuring that data remains secure while enabling users to access the resources they need from any device. CASBs operate in real-time and can be used with multiple cloud platforms, such as SaaS, IaaS, or PaaS. They also provide granular access controls on user activities within the cloud system, allowing administrators to create rules around data sharing.
DNS Security Software
DNS security software enables organizations to protect their DNS against threats and malware. DNS security solutions streamline the process of securing DNS servers against attacks.
View more categories (20) for "mac security"

18 Products for "mac security" with 1 filter applied:

  • 1
    FAMCare Human Services

    FAMCare Human Services

    Global Vision Technologies

    FAMCare – Turning Human Services Data Into Funder-Ready Results FAMCare by Global Vision Technologies helps human service agencies prove impact and secure funding with powerful, real-time reporting. Trusted nationwide, FAMCare is HIPAA-compliant, SOC 2 Type II, and TX-RAMP Level 2 certified, ensuring your data stays secure and compliant. Built on the Visions 2.0 Low-Code Engine, FAMCare adapts to your unique programs—no coding, no costly redevelopment. From intake to outcomes, agencies...
    Starting Price: $20/mo/user plus platform
    View Software
    Visit Website
  • 2
    GivingTools

    GivingTools

    GivingTools

    Are you a nonprofit looking for an affordable online fundraising platform that includes features like donor-paid fees, free text giving, recurring gifts, and more? GivingTools is your answer! Highly secure and easy to use, GivingTools enables you to raise funds online through all sorts of appeals...from one-time and recurring gifts to capital campaign pledges, events, merchandise, and sign-ups. You can direct people to your giving page or you can embed your giving page or giving forms...
    Leader badge
    Starting Price: $0/month
  • 3
    Sumac

    Sumac

    Societ

    Sumac is powerful, customizable case management software built for nonprofits. It helps you streamline client intake, track services, and manage programs with ease. Whether you're supporting families, running a shelter, or delivering health or community services, Sumac adapts to your unique workflows. With extensions for donations, volunteers, grants, and memberships, Sumac can become a complete nonprofit CRM. Features include web-based intake forms, e-signatures, built-in email...
    Starting Price: $109 per month
  • 4
    CharityGiving

    CharityGiving

    CharityGiving

    CharityGiving is a donor-focused platform that makes giving safer, effortless, and convenient for donors. Donors have busy lives with many commitments. Charitable contributions are being made through mobile phones and tablets while on-the-go. Donors also have access to their very own CharityGiving account where they can track the history of their charitable contributions and the impact of their donations. Over 1 million donors use this service. Accept quick, secure donations anytime,...
  • 5
    CaseXellence

    CaseXellence

    Speridian Technologies

    CaseXellence is a low-code intelligent process automation platform that enables public sector enterprises to modernize and transform their legacy infrastructure. CaseXellence has pre-built verticalized solutions designed specifically for public sector automation with security, transparency, and traceability at the heart of the platform. Experience the next level of case management with CaseXellence, the comprehensive suite designed to meet the diverse needs across various sectors, including...
  • 6
    Ecclesiared

    Ecclesiared

    Ecclesiared

    The Ecclesiared parish management program is the most important catholic software in the world today. Thousands of parishes and dioceses have all their parish archives computerized thanks to a tool that takes care of, protects, and preserves parish information for life. Discover the most important parish software in the world. Important dioceses around the world use the software to standardize their documents and unify their administrative processes, communications, and tasks. In this way,...
    Starting Price: Free
  • 7
    Qomon

    Qomon

    Qomon

    Qomon is the modern Supporter Activation Platform trusted by more than 1500 organizations in 70 countries. We transform contact lists into visible outcomes: volunteers who show up, new donors who give, and campaigns that scale. Easy to use, privacy-first, and secure , Qomon helps mission-driven orgs mobilize both online and in the field. With Qomon, organizations stop losing momentum, achieve their missions and contribute to a future that reflects their vision. Who We Serve & How We...
    Leader badge
    Starting Price: $39 per month
  • 8
    PlanStreet

    PlanStreet

    PlanStreet

    No matter the size of your organization, our software has everything you need to manage and accelerate your performance. Our secure and scalable case management software has the flexibility to support your client’s needs and empower your agency. HIPAA and HITRUST security standard compliance ensure that your sensitive data and files are secure with PlanStreet. It is time to abandon manual forms and processes. Switch to PlanStreet and automate your client engagement, cases, forms, and...
    Starting Price: $100/user/month
  • 9
    EthosData

    EthosData

    EthosData Virtual Data Room

    Close your M&A, IPO or fundraising deal faster with EthosData. A simple, secure and quick data room service to simplify your transaction. Using our award-winning service of easy-to-use data rooms and experienced teams of professionals, multiple parties can work on a deal’s confidential information. Our virtual data room has been used by 100,000+ user and we have helped to close $900+ billion deal value. You focus on your deal. We'll focus on your documents.
    Starting Price: $180/month
  • 10
    CCIS Church Management Software

    CCIS Church Management Software

    CCIS Church Management Software

    CCIS Shield™ is the latest system church management system developed by CCIS Church Management Software. CCIS Shield™ is fully web enabled so access from anywhere with an Internet connection is possible. While CCIS Shield is accessible from any device, the user experience is best with a desktop/laptop computer or a tablet as a mobile device. CCIS Shield™ web application offers you a convenient and comprehensive membership financial management system that you can tailor to fit your church's...
    Starting Price: $29.99/month
  • 11
    Fundital

    Fundital

    Fundital

    Fundital is an AI-powered fundraising platform designed for nonprofits, businesses, startups, and individuals to manage auctions, raffles, crowdfunding, ticket sales, and e-commerce fundraising in one streamlined system. It includes built-in donor CRM, real-time analytics, impact tracking, gamification tools like leaderboards and badges, and automated messaging to boost donor engagement. Fundital also ensures secure transactions with fraud protection, automated ACH payouts, and transparent...
    Starting Price: $0
  • 12
    Neon Fundraise
    Take your mission to new heights with Neon Fundraise, a full suite of digital fundraising tools that can support anything from a single campaign to complex, national events. Create winning experiences for your donors, fundraisers, and staff with innovative tools that support year-over-year growth. Spend more time on your mission and less time managing your tech. Neon Fundraise offers easy-to-use tools that promote maximum adoption. Give your donors the confidence they need to give and give...
    Starting Price: $1,900
  • 13
    DaySchool

    DaySchool

    Snowman Software

    DaySchool® was created by Snowman Software in response to the administrative needs of midsize and smaller independent schools. DaySchool is a centralized, multi-user database containing all of a school’s constituent information. Unlimited user-defined fields and flexible reporting options allow each school to customize DaySchool to track data points relevant to their school in the admissions, development, classroom, and communications areas. Listed below are just a few of the features of...
  • 14
    FutureFund

    FutureFund

    FutureFund

    FutureFund is a comprehensive, donor-supported platform tailored exclusively for K-12 schools, PTAs, and booster clubs. It empowers schools to run effective, fee-free fundraisers and sell merchandise through a fully integrated e-commerce website. With user-friendly tools like customizable templates, student leaderboards, and AI-powered content creation, FutureFund simplifies the process of raising funds while engaging the entire school community. Schools can accept payments in various forms,...
  • 15
    Rethink Workflow

    Rethink Workflow

    Rethink Workflow, Inc.

    Rethink Workflow is a free, simple, powerful, and secure business process automation tool that allows NGOs, businesses, and enterprises to create forms and design workflows online.
    Starting Price: $2.99/month/user
  • 16
    CTARS

    CTARS

    CTARS

    CTARS is a web based client management system tailored for NDIS and OOHC providers. CTARS supports organisations to develop and manage personal client budgets, scheduling of services, billing and invoicing, day-to-day activity logging, goal tracking, medication management, incident management and reporting. CTARS allows an organisation to tailor the system to their business requirements, including configuring roles and permissions, form development, custom reporting, real time alerts...
    Starting Price: $10/month
  • 17
    Deltek Costpoint

    Deltek Costpoint

    Deltek Costpoint

    Increase profitability and improve project success for government contractors with Costpoint Manufacturing by bringing efficiency and digitalization to the operations process—from bid to shipment. Tie all data to financials in one secure system; paper processes are digitalized as data is captured, stored and analyzed in real-time, down to the project level. Consistently collect and allocate costs and simplify adherence to contract requirements by including traceability and contract flow...
  • 18
    Zealous

    Zealous

    Zealous

    Zealous is a multiple award-winning contest management solution! Save days of time and achieve peace of mind. Our platform is custom-built to dramatically reduce the amount of work required for administrators, judges and candidates. Automate your entire project with one platform to take submissions, make submissions and judge submissions. Customise your project to allow candidates to upload images, text, videos, documents, 3D models and much more. Automated emails are sent to...
    Leader badge
    Starting Price: $36 per month
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB
Gen AI apps are built with MongoDB Atlas
Atlas offers built-in vector search and global availability across 125+ regions. Start building AI apps faster, all in one place.
Try Free →