Best IT Security Software for Chromebook - Page 2

Compare the Top IT Security Software for Chromebook as of April 2025 - Page 2

  • 1
    Authsignal

    Authsignal

    Authsignal

    Authsignal delivers a suite of drop-in authentication and fraud tools to enable consumer-focused businesses to securely authenticate customer identity, mitigate fraud and deliver seamless customer experiences. Trusted by modern product and identity teams around the world, Authsignal plugs into your existing technology stack to streamline the authentication of any customer flow or action in seconds. Effortlessly safeguard customer transactions, mitigate risks, and implement rules all within a single, user-friendly workspace. Easily deploy Passkeys, passwordless authentication, and deliver authentication uplift programs to secure customer data in days. Leverage Authsignal's no-code rules engine to deploy rules and safeguard customer data. - Integrate via OpenID Connect (OIDC). - Integrate with Auth0 - Integrate with ForgeRock - Integrate with Microsoft Entra, Azure AD B2C Marketplace integrations - Veriff - MessageBird - iProove And many more
    Starting Price: $99 USD Per Month
  • 2
    NextDNS

    NextDNS

    NextDNS

    NextDNS protects you from all kinds of security threats, blocks ads and trackers on websites and in apps and provides a safe and supervised Internet for kids, on all devices and on all networks. Determine your threat model and fine-tune your security strategy by enabling 10+ different types of protections. Use the most trusted threat intelligence feeds containing millions of malicious domains, all updated in real-time. Go beyond the domain, we analyze DNS questions and answers on-the-fly (in a matter of nanoseconds) in order to detect and block malicious behavior. With usually only a few hours between domain registration and the start of an attack, our threat intelligence system is built to catch malicious domains earlier than classic security solutions. Block ads and trackers on websites and in apps, including the most devious ones. Use the most popular ads & trackers blocklists, millions of domains all updated in real-time.
    Starting Price: $39 per month
  • 3
    KACE by Quest

    KACE by Quest

    Quest Software

    KACE® by Quest supports your unified endpoint management (UEM) strategy by helping you discover and track every device in your environment, automate administrative tasks, keep compliance requirements up-to-date and secure your network from a range of cyberthreats. Discover, manage and secure all your endpoints from one console as you co-manage your traditional and modern endpoints, including Windows, Mac, Linux, ChromeOS, and iOS and Android devices. KACE is a Unified Endpoint Management solution that offers a single point of control for managing IT systems across the entire organization, inside or outside your network. This comprehensive solution takes the stress out of keeping devices secure and compliant so you can do more.
    Starting Price: As low as $3/mo/device
  • 4
    pCloud Pass

    pCloud Pass

    pCloud International

    pCloud Pass helps you keep your passwords and gives you Instant SECURE access to them on all your devices. Log in to sites and fill forms with a single click. Unlike traditional password managers that store your passwords in plaintext, we use a military-grade encryption algorithm to store your passwords in the most secure way possible! Our password generator is incredibly easy to use and can create unique passwords for every one of your accounts – without you ever having to worry about forgetting them. You can start with a trial version and continue using a Free one, OR consider upgrading to one of the unmatched Premium versions, as well as a one- time payment: Lifetime plan! Monthly and Annual subscriptions are available, the first starting at $2.99/month.
    Starting Price: $2.99 per user per month
  • 5
    Innvikta

    Innvikta

    Innvikta Cybersecurity Solutions

    Innvikta is proud to introduce InSAT, a cutting-edge Security Awareness Training platform that redefines the way organizations prepare for cyber threats. With InSAT, we offer a comprehensive platform that combines advanced cyber attack simulations with a feature-rich Learning Management System (LMS) featuring an extensive library of engaging training content. Together, these elements create an unparalleled learning experience that empowers your team to become formidable guardians against cyberattacks. At the heart of InSAT lies its revolutionary cyber attack simulation, a powerful tool that enables you to assess and enhance your team's resilience to multiple attack vectors. Gone are the days of one-dimensional training – InSAT challenges your users with realistic scenarios, ensuring they are prepared to face the ever-evolving threat landscape.
    Starting Price: Free
  • 6
    Securden Password Vault
    Store, manage, and share passwords, files, SSH keys, and DevOps secrets among IT teams. Enforce password security best practices. Ensure compliance with industry standards using comprehensive audit trails. • Centralized repository for passwords, SSH keys, DevOps secrets, and sensitive files. • Enforce password security best practices like periodic password resets. • Generate and assign unique & strong passwords to IT assets. • Share resources with IT teams and collaborate seamlessly • Eliminate hard-coded credentials with API-based application password management. • Control ‘Who’ has access to ‘What’ with granular controls. • One-click remote access to IT assets through native apps & web-based sessions. • Track all privileged activities with comprehensive Audit trails. • Demonstrate compliance with industry standards using customized reports on privileged access. • Check for breached passwords through dark web monitoring. • Auto-fill credentials on websites.
  • 7
    Spintly

    Spintly

    Spintly

    Truly wireless, cloud-based door access control system for a seamless, hassle-free, and contactless user experience. A modern access management system that combines the power of the cloud, smartphone, and wireless technology. Spintly is transforming the physical security industry with its fully wireless, cloud-based access control system. It removes the complexity of the process of deploying an access control solution in a building. With absolutely no wiring the installers can save more than 60% of their time and cost and be more productive. Our vision is to make the built world smarter and simpler by providing a frictionless access control experience to users and to make the building smarter with our fully wireless mesh platform for smart building devices. Spintly offers solutions to various industry segments with its fully wireless access control hardware along with cloud-based software.
  • 8
    Norton Password Manager
    Secures logins and more in your private, online vault. Creates complex passwords when you need them. Encrypts your information before it leaves your device. Use Safety Dashboard to help spot weaknesses in your logins. Create new, hard-to-break passwords with one click with Password Generator. Update and save them easily with Autochange. Your vault automatically keeps logins sync'd across all your devices. Access it quickly with Touch ID/Face ID or Android biometrics on your mobile devices.
  • 9
    Prey

    Prey

    Prey

    Prey is a cross-platform Device Tracking & Security tool to stay in control of remote assets. Mobile device tracking, management, and data protection available for laptops, tablets and mobiles. It offers a range of services for both personal and corporate use. The software and service are developed by the Chilean company Prey Inc., successor of the funding company Fork Ltd. Prey started in 2009 as a small tech company with a sole purpose: helping people keep track of their devices. 13 years later, our service evolved into a trusted multi-tool for both people and businesses. It's a service that protects over 8 million devices and their data every day, all around the world. We are experts at tracking, protecting and managing your work and play tech tools. And a proud team of people willing to support you.
    Starting Price: $1.2 per month
  • 10
    Quicklaunch

    Quicklaunch

    Quicklaunch

    QuickLaunch is the #1 leader in Identity and Access Management (IAM) for Higher Education. More than 500 organizations trust QuickLaunch’s platform to manage over 2,000,000 identities and integrate over 3,000 applications worldwide. CIOs, CTOs, and CISOs use QuickLaunch IAM technologies to engage with students, faculty, and staff and protect them throughout their journey. QuickLaunch’s technology is vital in protecting the user experience, driving both operational efficiencies and higher productivity for colleges, universities, and institutions. Improves cyber security posture by protecting user accounts from being hacked and thwarting ransomware and phishing cyber attacks. Automatically provisions students from the Student Information System and employees from the Human Resources system so they can quickly get access to the apps they need when they matriculate and join.
    Starting Price: $0.73 per month
  • 11
    Chargebacks911

    Chargebacks911

    Chargebacks911

    Chargebacks911® provides true end-to-end chargeback prevention and remediation technology. Their unique approach to risk mitigation and profit recovery is based on real-world experience and proven results. Cb911’s global, scalable solutions and exclusive technologies enhance every touchpoint in the chargeback chain. From standardized processes for banks & FIs, to award-winning chargeback prevention/revenue recovery for merchants, their patent-pending mix of AI and human analysis maximizes chargeback management. Designed for fast, flexible implementation, the company’s products are 100% agnostic for seamless integration with existing systems. Maintaining PCI1 (highest level) and SOC 2 compliance ensures all security standards are met or exceeded. Chargebacks911 boasts more integrations and partnerships—as well as more experience and data on the chargeback process—than any other provider. Cb911 has been named Best Chargeback Management Program, Best B2B Software and more
    Starting Price: $99 per month
  • 12
    ZeroTier

    ZeroTier

    ZeroTier

    ZeroTier simplifies global networking with a secure network overlay that connects and manages all your resources as if they were on the same LAN. Deployable in minutes from anywhere, our software-defined solution scales effortlessly, whether you’re connecting a handful of devices or an entire global network. With ZeroTier, you can: Establish private global networks for IoT deployments. Simplify networking across physical locations with software-defined solutions. Replace traditional VPNs to provide employees secure access to critical resources. Experience seamless connectivity and robust security with ZeroTier – the smarter way to network globally.
    Starting Price: $2/device per month
  • 13
    CapLinked

    CapLinked

    CapLinked

    As a leading Virtual Data Room platform, CapLinked makes it faster, safer, and easier to manage business transactions in the cloud. CapLinked’s secure platform provides companies with easy-to-use tools for capital raises, asset sales, mergers & acquisitions, real estate deals, investor & board reporting, business development negotiations, and other types of complex business transactions. The Wall Street Journal called CapLinked “the go-to place for setting up and closing deals,” and Inc. Magazine named CapLinked to its list of 5 Back-Office Tech Innovations. Founded in 2010 by Eric M. Jackson (PayPal’s first head of US marketing) and Christopher Grey (former private equity and investment banking executive), CapLinked is based in Los Angeles.
    Starting Price: $299/month
  • 14
    Cameyo

    Cameyo

    Cameyo

    Cameyo is the secure Virtual Application Delivery (VAD) platform for any Digital Workspace. Cameyo makes it simple, seamless, and secure to deliver Windows and internal web applications to any device from the browser without the need for virtual desktops or VPNs. By enabling organizations to provide their people with secure access to the business-critical apps they need to stay productive from anywhere, Cameyo helps make remote & hybrid work, work. Hundreds of enterprises and organizations utilize Cameyo’s Digital Workspace solution to deliver Windows and internal web applications to hundreds of thousands of users worldwide.
    Starting Price: $12.00/month/user
  • 15
    TraitWare

    TraitWare

    TraitWare

    TraitWare is Real Passwordless Multi-factor authentication (MFA) for True Zero Trust Access. TraitWare's enterprise-class, patented, plug-and-play solution combines Passwordless MFA and SSO – eliminating the need for usernames and passwords, while reducing friction for the user, and increasing security for your company. AND, you’ll save 60% or more on support budgets. With our QR solution, we can also eliminate the need for a username. Not only is our software convenient and easy to use, but it virtually eliminates vulnerabilities associated with traditional username and password logins. By replacing usernames and passwords we eliminate the ability to phish them. Leveraging our Direct login or our QR scan ties a user to the login, eliminating credential theft or sharing.
    Starting Price: $3 per month
  • 16
    LimaxLock

    LimaxLock

    LimaxLock

    LimaxLock MDM is designed to help you manage and secure all of android mobile devices from a single, easy-to-use platform. With our app, you'll have access to a wide range of features and tools that will allow you to: Enforce security policies across all devices Remotely wipe or lock lost or stolen devices Track the location of devices in real-time Monitor device usage and activity Securely distribute apps and content to devices LimaxLock MDM platform will enable the companies to protect data and other resources through device-level policies.It will provide all necessary features like device management, access of allowed applications and websites, single/multi-app mode, Kiosk browser, locking and unlocking of the device remotely, registration and authentic enrolment, application management, settings with a user restricted access, Enterprise App Store, location tracking, other permission access like Wi-Fi, overlay permission and Android For Work.
    Starting Price: $1/month per device
  • 17
    Portnox Security

    Portnox Security

    Portnox Security

    Portnox CLEAR is the only cloud-native network access control (NAC) solution that unifies essential network and endpoint security capabilities: device discovery, network authentication, access control, network hardware administration, risk mitigation and compliance enforcement. As a cloud service, Portnox CLEAR eliminates the need for on-going maintenance such as upgrades and patches and requires no on-site appliances. As such, the platform can be easily deployed, scaled and managed by lean, resource-constrained IT teams across any corporate network - no matter how complex.
  • 18
    Seraphic

    Seraphic

    Seraphic Algorithms

    Seraphic can secure any version of any browser on any device to prevent phishing, spear-phishing, clickjacking, CSS injection, man-in-the-middle, and Zero-day and unpatched N-Day attacks that other vendors cannot. This means that your end-users can leverage any combination of browsers they prefer and you can centrally manage corporate policy and governance for browsing as well as enterprise/private apps and SaaS environments. Seraphic also includes robust policy and governance controls including state of the art DLP engines that scans all outbound and inbound data in any format for any file with a complete privacy first approach.
  • 19
    Google Password Manager
    Manage your saved passwords in Android or Chrome. They’re securely stored in your Google Account and available across all your devices. Check the strength and security of your saved passwords. Find out if they’ve been compromised and get personalized advice when you need it.
  • 20
    Guardio

    Guardio

    Guardio

    Forget all about malware, phishing, and identity theft. Guardio is a lightweight extension designed to help you browse quickly and securely. It will clean your browser, speed it up, and protect your private information. How it works. Add in seconds. Remove threats. Browse as usual. Cleans the way you see the web. Removes malware, unwanted popups, and any other annoyances that ruin your day. Protects against online threats. Blocks phishing, malicious sites and scams that may result in identity theft or worse - so you can focus on what matters. Keeps your secrets secret. Be notified when personal data leaks publicly and fortify your accounts with security best practices. Under the hood. Dive deeper into the powerful technology powering Guardio. Safe web, Great technology. In order to effectively combat emerging threats from ever-evolving malicious actors, Guardio needs to stay on the bleeding edge of multiple technology disciplines. Machine Learning, Big Data, Cloud Infrastructure
    Starting Price: $9.99 per month
  • 21
    LoginTC

    LoginTC

    Cyphercor

    Cyphercor is a two factor authentication provider that offers a best-in-class solution that's effortless, intuitive, and cost-effective called "LoginTC". LoginTC adds an additional layer of security to your systems and applications including VPNs, Firewalls, remote desktop, active directory, and more with it's innovative 2fa software. LoginTC offers a wide range of two factor options for end-users to authenticate, including SMS, email, push notifications, hardware tokens, U2F, OTP, bypass codes, and more. LoginTC was built with the principle that administrators are users too, and offers a solution that's not just easy for end users day-to-day, but is also simple for administrators to manage and setup. In fact, if you aren't set-up in one hour, the first month of your subscription is on us. LoginTC can help you reduce your insurance costs and meet compliance regulations with ease.
    Starting Price: $3/month/user
  • 22
    TrustBuilder

    TrustBuilder

    TrustBuilder

    TrustBuilder is your reliable partner in cybersecurity. We go beyond the traditional software firm role, focusing on delivering robust and secure solutions that foster trust among enterprises. Through our Access Management Platform, TrustBuilder.io, our commitment is to ensure the secure digital journey of your employees, partners, and customers. With our advanced MFA and CIAM technology, we provide uninterrupted access while safeguarding identities. > TrustBuilder's SaaS MFA provides airtight, phishing-resistant security, passwordless experience, and seamless integration. > TrustBuilder's tailor made CIAM provides PBAC delivering fine grained authorization based on attributes with customisable workflows.
    Starting Price: € 10 per user / per year
  • 23
    Senturo

    Senturo

    Senturo

    Senturo safeguards Apple, Chromebook, Windows, and Android devices against loss, theft, and unauthorized access with powerful location tracking, device monitoring, and advanced recovery tools, while enhancing mobile device and data security through robust remote security policies and actions such as remote lock to protect your fleet. IT Fleet location tracking Senturo’s intuitive global map view built on Google Maps lets you monitor your entire device fleet at a glance. Pinpoint the real-time location of any device or review its movement history over the past year, ensuring you stay informed and in control. Monitoring and incident detection Ensure your devices stay where they belong. With geofencing and IP whitelisting, you’ll receive instant email alerts if a device leaves your approved area or connects to an unauthorized network, keeping your assets secure. Multi-OS messaging Send critical updates or alerts to your entire fleet in seconds.
    Starting Price: $25 per month
  • 24
    Guardian Digital

    Guardian Digital

    Guardian Digital

    Guardian Digital secures against email threats like phishing, zero-day exploits and ransomware attacks that define the modern threat landscape email users face every day. We believe email security is business security, as greater than 90% of all cyber attacks originate from an email. The most effective email protection is delivered through a purpose-driven solution designed to close critical security gaps in Microsoft 365 and Workspace, coupled with the expert setup, ongoing remote system management and accessible support required to improve IT security. With real-time cybersecurity business insights, we help you understand what your risk profile is today, and protect you from the dangers that all businesses face. EnGarde Cloud Email Security - Key Features: • Phishing, spoofing & impersonation protection • Link & file analysis • Zero-day attack protection • Malware & Ransomware protection • SPF/DKIM/DMARC checking • Encryption • Comprehensive management & support service
    Starting Price: Monthly & Annual Subscriptions
  • 25
    LoginID

    LoginID

    LoginID

    With just a few lines of code, LoginID enables websites and apps to integrate FIDO/FIDO2 certified multi-factor authentication via our easy to use SDKs and APIs. Our platform leverages the biometrics on the end user's device to create a private key, public key pair that allows for seamless strong customer authentication. No app installation is required and the private key is stored securely on the end user's device, never leaving. Additionally, LoginID offers Transaction Confirmation, where a transaction can be cryptographically signed providing proof of the user’s confirmation of that specific transaction, which is perfect for merchants who want payment authentication services. LoginID is aligned with PSD2, GDPR, CCPA, and HIPPA. We have SDKs for iOS, Android, React-Native, Web, Python, Java, and Node as well as a WordPress Plugin.
    Starting Price: Free
  • 26
    DesktopReady

    DesktopReady

    Anunta DesktopReady

    The first complete Virtual Desktop solution that provides both automation and services to deliver secure modern workspaces. Office is how you work instead of where you go. All data and applications are in the public cloud. Devices are owned by employees not IT, and computing is consumed on-demand. Desktop as a Service (DaaS) is a virtual desktop deployment model in which the virtual desktop infrastructure (VDI) technology is hosted on the cloud. It includes provisioning, patching and maintenance of the management plane and resources to host workloads. In DaaS, the storage, network resources, and other support infrastructure are hosted in the cloud. Desktop as a Service (DaaS) provides organizations access to enterprise applications and workloads hosted on public or private cloud. The workforce can access their desktops using a web-based browser securely on the device of their choice.
    Starting Price: $75 per month
  • 27
    Strong Network

    Strong Network

    Strong Network

    Strong Network allows the management of containers for DevOps online (as opposed to locally on developers laptop) and access them through a cloud IDE or a SSH connection (in the case of a local IDE). These containers provide a complete management of access keys and credentials to multiple types of resources, in addition to providing data loss prevention (DLP). In addition we combine the IDE with a secure chrome browser (remote browser isolation) such that any third party applications for DevOps can be accessed with DLP. This platform is a complete replacement for VDI/DaaS for code development. Our platform allows the provisioning and management of containers for development online (as opposed to locally on developers' laptops, using a solution like docker desktop for example) and enables accessing them through a cloud IDE or a SSH connection (in the case of a local IDE).
    Starting Price: $39
  • 28
    Authkey

    Authkey

    Authkey.io

    Authkey is a multi-channel CPaaS platform providing SMS API, WhatsApp Business API, Voice API, Email API, and Google RCS. It helps businesses send notifications, promotional messages, transactional messages, OTPs, 2FA, and more. Designed for responsiveness and ease of use, Authkey allows you to start without adding any credit cards. Authkey offers a free sandbox account for building, testing, and deploying. It supports easy-to-integrate APIs for all channels and over 1,000 automation options via Zapier, Pabbly, Integrately, and other partners. You can easily push bulk campaigns through all channels. WhatsApp Chatbot for intelligent customer query responses. Join over 200 active businesses working with us and grow together.
    Starting Price: $0
  • 29
    Singular

    Singular

    Singular

    Singular empowers marketers to futureproof their growth with next-gen attribution and analytics. We provide a holistic solution that combines mobile attribution with industry-leading cost aggregation, flexible ROI analytics, and automatic loading directly into your BI tools. With Singular you are able to - Measure and report on all the channels you work with - Analyze ROI by combining attribution with leading cost aggregation - Track and analyze across the entire user lifecycle - Block more fraud with best-in-class fraud prevention - Monitor a single managed pipeline with a plug-and-play solution to extract, transform and load analysis-ready marketing data into your chosen data warehouse Top marketers from LinkedIn, Rovio, Microsoft, Lyft, Twitter, EA, and more, rely on Singular for a complete view of their marketing performance.
  • 30
    Axonius

    Axonius

    Axonius

    Axonius gives customers the confidence to control complexity by providing a system of record for all digital infrastructure. With a comprehensive understanding of all assets including devices, identities, software, SaaS applications, vulnerabilities, security controls, and the context between all assets, customers are able to mitigate threats, navigate risk, decrease incident response time, automate action, and inform business-level strategy — all while eliminating manual, repetitive tasks. Recognized as creators of the Cyber Asset Attack Surface Management (CAASM) category and innovators in SaaS Management Platform (SMP) and SaaS Security Posture Management (SSPM), Axonius is deployed in minutes and integrates with hundreds of data sources to provide a comprehensive asset inventory, uncover gaps, and automatically enforce policies and automate action.