Best IT Security Software for Chromebook of 2024

Find and compare the best IT Security software for Chromebook in 2024

Use the comparison tool below to compare the top IT Security software for Chromebook on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    New Relic Reviews
    Top Pick

    New Relic

    New Relic

    Free
    2,461 Ratings
    See Software
    Learn More
    Around 25 million engineers work across dozens of distinct functions. Engineers are using New Relic as every company is becoming a software company to gather real-time insight and trending data on the performance of their software. This allows them to be more resilient and provide exceptional customer experiences. New Relic is the only platform that offers an all-in one solution. New Relic offers customers a secure cloud for all metrics and events, powerful full-stack analytics tools, and simple, transparent pricing based on usage. New Relic also has curated the largest open source ecosystem in the industry, making it simple for engineers to get started using observability.
  • 2
    Kroll Cyber Risk Reviews
    See Software
    Learn More
    We are the #1 incident response provider in the world. We protect, detect, and respond to cyberattacks by combining complete response capabilities and frontline threat information from over 3000 incidents per year with end-to-end expertise. Contact us immediately via our 24-hour cyber incident hotlines. Kroll's Cyber Risk specialists can help you tackle the threats of today and tomorrow. Kroll's protection solutions, detection and response are enriched with frontline threat intelligence from 3000+ incident cases each year. It is important to take proactive measures to protect your organization, as the attack surface is constantly increasing in scope and complexity. Enter Kroll's Threat Lifecycle Management. Our end-to-end solutions for cyber risk help uncover vulnerabilities, validate the effectiveness your defenses, update controls, fine-tune detectors and confidently respond any threat.
  • 3
    Control D Reviews

    Control D

    Control D

    $2/month
    6 Ratings
    See Software
    Learn More
    Control D is a customizable DNS filtering and traffic redirection platform that leverages Secure DNS protocols like DNS-over-HTTPS, DNS-over-TLS and DNS-over-QUIC, with support for Legacy DNS. With Control D you can: block malicious threats, block unwanted types of content network wide (ads & trackers, IoT telemetry, adult content, socials, and more), redirect traffic using transparent proxies and gain visibility on network events and usage patterns, with client level granularity. Think of it as your personal Authoritative DNS resolver for the entire Internet that gives you granular control over what domains get resolved, redirected or blocked.
  • 4
    Linewize Reviews
    Linewize is a combination of world-class technology and world leaders in online safety education. Our goal is to help students, families, and schools develop better digital habits and better communities. It uses AI and a team made up of highly-trained human moderators to detect student threats. Engaging your school community with cyber safety education and tools. Screen and content visibility for all devices in class, BYOD and personal. Linewize Monitor, the most advanced tool for student threat detection in K-12, helps Districts identify at-risk students. It's the only way to have all four iKeepSafe student privacy certificates, COPPA, FERPA and ATLIS.
  • 5
    Securden Unified PAM Reviews
    Privileges and associated credentials are extremely important as they grant access to your organization's most sensitive information. The type of sensitive information varies a lot based on the industry. For example, healthcare organizations hold a lot of patient data and banks and financial institutions hold payment details, customer data. It is important to lock down access to these privileged accounts. Often, these accounts are left unmanaged and spread around the entire organization. You need a Privileged Access Management solution like Securden Unified PAM that helps consolidate all privileged identities and accounts into a centralized vault for easy management. Restrict access to these privileged accounts and enforce principle of Just-in-time access. Users can launch one-click remote connections to IT assets they have access to. Monitor and manage remote sessions launched by users, third party vendors, IT admin with shadowing capabilities. Eliminate local admin rights from endpoints and use application control policies to efficiently enforce Zero-Trust without impacting productivity. Record and track all activities with comprehensive audit trails and actionable reports and ensure compliance with industry standards.
  • 6
    Thinfinity Workspace Reviews
    Top Pick
    Thinfinity Workspace 7.0's Technical Highlights: - Progressive Web App (PWA) technology for a seamless user experience - Integrated Thinfinity VNC, VirtualUI, and z/Scope for maximum versatility - HTML5 terminal emulation supporting DEC terminals, TN 5220, and TN 3270 protocols - Robust enterprise-grade audit logs for security and compliance management - Proprietary VNC protocol for real-time monitoring and troubleshooting IMPROVE USER EXPERIENCE - Deliver business-critical apps, desktops and files from a single web portal. - Provide simplified remote browser access for your users, while confining them to only the resources that they need. SIMPLIFY IT AND AVOID VPNs - Forget traditional VPN deployments and complexities. - Enable access from Chromebooks, mobile devices or any computer with a Web Browser. Zero setup. KEEP YOUR BUSINESS SECURE - Use enterprise-grade encrypted connections. - Integrate with your existing and external identity platforms. - Apply 2FA or MFA policies with all identity providers.
  • 7
    Psono Reviews
    Psono, a self-hosted and open-source password manager, prioritizes keeping your data secure. It encrypts and stores your credentials in a manner accessible only to you, while also offering encrypted access-sharing with your team. Boasting a range of features, Psono facilitates easier data management and password accessibility than ever before. Its multi-level encryption begins with client-side encryption, ensuring genuine end-to-end encryption for password sharing, and is further bolstered by SSL and storage encryption. The complete code is subject to transparent public audit possibilities, underscoring that true security stems from precise encryption rather than the obfuscation of security weaknesses. Opting for a self-hosted credential manager like Psono allows you enhanced access control and eliminates dependency on public services for data storage, asserting itself as one of the most secure password managers that genuinely prioritizes client online safety on user-hosted servers.
  • 8
    Kasm Workspaces Reviews
    Top Pick

    Kasm Workspaces

    Kasm Technologies

    $0 Free Community Edition
    121 Ratings
    Kasm Workspaces streams your workplace environment directly to your web browser…on any device and from any location. Kasm is revolutionizing the way businesses deliver digital workspaces. We use our open-source web native container streaming technology to create a modern devops delivery of Desktop as a Service, application streaming, and browser isolation. Kasm is more than a service. It is a platform that is highly configurable and has a robust API that can be customized to your needs at any scale. Workspaces can be deployed wherever the work is. It can be deployed on-premise (including Air-Gapped Networks), in the cloud (Public and Private), or in a hybrid.
  • 9
    Authsignal Reviews

    Authsignal

    Authsignal

    $99 USD Per Month
    7 Ratings
    Drop Authsignal into your identity stack to secure customer journeys and deliver world-class user authentication experiences. Focused on enabling product and fraud teams to orchestrate customer journeys and mitigate fraud, Authsignal makes it easy to deploy passkeys. Delivering class-leading drop-in authentication experiences, product teams leverage Authsignal to drop authentication (Passkeys, push, SMS authentication) challenges anywhere in the user experience. Seamlessly authenticate identity, secure customer journeys, and protect customer data with a unified customer experience. Gain a single view of customer activity and stream identity data with audit trails. Passkeys, CIAM, IAM, Authentication, Passwordless Authentication, Multifactor Authentication, Passkey
  • 10
    Opera Reviews
    Top Pick

    Opera

    Opera Software

    Free
    403 Ratings
    Opera is a free internet browser that comes with enormous benefits and strong customization options. Built on Chromium it take advantage of most of Google Chrome's extension library, including the best VPN completely free for users. These are just a few of the essential features that Opera offers to make browsing easier, more enjoyable, and less distracting thanks to the Ad blocker built-in. Opera's integrated virtual privacy network protects your privacy and reduces tracking. Opera browser offers you to easily connect with your social life through the most famous social network integrated directly in the sidebar (Facebook, Instagram, Telegram, Whatsapp, Twitter, VKontakte) and listen your favourite music with the music players built-in (Spotify, Youtube and Apple Music). With Opera browser you can also: - Search with Google and use the auto-fill prediction function - Send encrypted content and links (articles, images, and videos) between devices using My Flow - Toggle the integrated ad blocker on and off. Opera browser is available for MacOS, Linux, and Windows devices. It works on desktop versions of MacOS X 10.11 and later, Ubuntu 16.04 and later, and Windows 7 and later.
  • 11
    MIRACL Reviews
    Top Pick
    Protect your users. Make their journey easier. MIRACL Trust provides a safer and smoother authentication experience. Only one step. No passwords. No problem. Multi-factor authentication is slow and cumbersome. MIRACL is a safer and more efficient alternative to traditional MFA. Logging in takes only 2 seconds and error rates as low at 1/10th of passwords. No passwords necessary. All you need is a PIN and you are in. Our cryptographic technology ensures that users' information is always safe. MIRACL Trust provides a simple login experience that puts users first and makes it easy to roll out your data quickly.
  • 12
    Keeper Security Reviews
    Top Pick

    Keeper Security

    Keeper Security

    $2.00 per user, per month
    1,416 Ratings
    Password security is the foundation of cybersecurity. Keeper's powerful password security platform will protect your business from cyberthreats and data breaches related to passwords. Research shows that 81% of data breaches can be attributed to weak passwords. Password security platforms are an affordable and easy way for companies to address the root cause of most data breaches. Your business can significantly reduce the risk of data breaches by implementing Keeper. Keeper creates strong passwords for all websites and apps, then secures them on all devices. Each employee receives a private vault to store and manage their passwords, credentials and files, as well as private client data. Employees will save time and frustration by not having to remember, reset, reuse, or remember passwords. Industry compliance is achieved through strict and customizable role-based access controls. This includes 2FA, usage auditing, and event reporting.
  • 13
    10Duke Enterprise Reviews
    10Duke Enterprise is a cloud-based, scalable and flexible software licensing solution designed to enable software vendors to easily configure, manage and monetize the licenses they provide to their customers. 10Duke Enterprise enables you to gain a single point of license control for desktop, SaaS, and mobile apps, APIs, VMs and devices. It’s cloud-native, supports all license models, integrates with CRM & Ecommerce, has a built-in Customer Identity Management solution, and supports offline scenarios. 10Duke Enterprise is used by SMBs and Fortune 500 customers alike. 10Duke Enterprise is used across a wide range of industries by the fastest-growing software vendors that offer desktop, SaaS and mobile apps, devices, APIs and VMs. It's specifically designed for fast-growing software businesses looking to scale up licensing & minimize friction. › Vastly reduce internal license admin costs (up to 70%) › Improve how your customers can trial and access your products › Learn how and when your customers are using your licenses and product features to help drive license sales › Prevent revenue leakage by means of a real-time licensing and access control solution › Integrate with 3rd party systems like CRM & E-Commerce
  • 14
    Securden Password Vault Reviews
    Securden Password Vault is an enterprise-grade password management solution that allows you to securely store, organize, share, manage, and keep track of all human and machine identities. With a sleek access management system, Securden lets your IT teams share administrator credentials and effectively automate the management of privileged accounts in your organization. Securden seamlessly integrates with industry solutions like SIEM, SAML-based SSO, AD, and Azure AD among others to provide a smooth deployment in any organization. With Securden, organizations can rest easy as all their sensitive data is protected with strong encryption methods and supported by a robust high availability setup. Securden offers drilled-down granular access controls that allow users to grant access to accounts without revealing the underlying credentials in a just-in-time fashion. Securden Password Vault can be deployed both on-premise for self-hosting and on the cloud (SaaS).
  • 15
    Uniqkey Reviews

    Uniqkey

    Uniqkey

    $4.95 per employee, per month
    163 Ratings
    Uniqkey, a European company, excels in password and access management, empowering IT teams to control access within their organizations efficiently. It offers secure offline storage, automatic two-factor authentication, and Shadow IT management tools. Uniqkey's design complies with strict European GDPR standards, ensuring data privacy and security. Its platform is user-friendly, facilitating seamless integration into business operations, enhancing security and productivity. Uniqkey stands out by prioritizing data protection and regulatory compliance, making it a trustworthy partner for businesses aiming to bolster their cybersecurity infrastructure.
  • 16
    GoodAccess Reviews
    Top Pick

    GoodAccess

    GoodAccess

    $7 per user/month
    64 Ratings
    GoodAccess is a cloud VPN with zero-trust access controls specially designed for small and medium-sized enterprises. This solution is ideal for businesses that want to securely interconnect remote workers, local networks, SaaS apps and clouds. Businesses can use GoodAccess to deploy a private gateway with a dedicated static IP. They also have an easy-to-understand web dashboard for managing users, devices, and access rights (SSO, Google, Azure), unify 2FA/multifactor authentication at the network level, and use access logs to increase network visibility.
  • 17
    MiniAiLive Reviews
    Top Pick

    MiniAiLive

    lifetime license
    16 Ratings
    MiniAiLive provides Touchless Biometrics Authentication and ID Verification solutions. We offer security solutions that are based on cutting-edge technologies such as facial recognition, liveness detection and ID document recognition. We also ensure that our solutions are seamlessly integrated with the existing systems of our clients. MiniAiLive is a face recognition app that provides reliable and secure access control solutions. It also includes a passive liveness detection layer. Our app ensures only authorized individuals have access to sensitive areas, services, or accounts. It also minimizes the risk of unauthorized entry through spoofing and impersonation attempts.
  • 18
    SharePass Reviews
    Top Pick
    Secrets and confidential information should be shared with care. SharePass is the perfect solution for businesses who want to automate secret management and keep it all in one place securely online or on your phone - no matter where you're at. SharePass enables you to send encrypted links from sender to receiver with various settings. The settings include expiration restrictions, availability and IP restrictions which can be set through our patent-pending platform-independent sharing system. With its cutting-edge encryption and security measures, SharePass is committed to keeping your personal information safe. We cannot see what your secrets are, the only people who know are the ones sharing them. In this era of identity theft, SharePass will protect you and prevent your data from leaking to the dark web by eliminating all evidence that it was ever there. SharePass supports single sign-on with Office365, Google Workspace, MFA & integration for Yubikeys so maximum security is guaranteed.
  • 19
    ProHoster Reviews
    Top Pick

    ProHoster

    $2.50 per month
    38 Ratings
    Hosting is a service that allows you to publish information on a server that is always accessible via the Internet. Our servers host the websites and provide the technology necessary to view them on the internet. You will also receive a domain name, DDoS protection and an SSL certificate when you purchase website hosting from us. Unlimited hosting that is reliable and fast with DDOS protection. Also, you get a free domain name, SSL certificate, website builder, and domain. You will need more resources and functionality for projects where regular hosting is not sufficient. Virtualization, such as KVM or OVZ, is possible. This is a great solution for non-standard projects that have higher power requirements and require full root access. Professional DDoS protection against all types of attacks. Rapid response and display of threats. Huge channel handling capacity.
  • 20
    Trio Reviews
    Top Pick

    Trio

    Trio Technology

    $6.00/employee
    11 Ratings
    Trio is a unique mobile device management solution that can be used by businesses and educational institutions. It replaces traditional management methods with ones that are gapless, automated and secure. Trio, a unique mobile device management solution is here to meet and exceed your security and productivity needs. Trio is an endpoint management platform that manages devices, but also provides endpoint detection, response, and compliance monitoring.
  • 21
    Cipherise Reviews

    Cipherise

    Cipherise

    $30 per user per month
    6 Ratings
    Cipherise for developers. All you need to create powerful and user-friendly authentication. Your users will have the best experience possible. Multi-Factor Authentication. MFA is simple and highly secure, which is almost invisible to end users. No complex passwords. No more complicated passwords, usernames, or credential sharing Omni Channel. The user experience is consistent regardless of whether it's on a mobile, tablet, laptop, or PC. Hackers are no longer able to access centralized credential Honeypots. Bi-Directional authentication. Before the user authenticates to it, the service authenticates to them. Mobile Native. Mobile Native. Protect your valuable IP and Content. We make it easy for your customers to sign up and access your content from any device.
  • 22
    Spike Reviews
    Spike integrates all your workspace into one Inbox. This includes email, chat and calendar, calls, team collaboration, tasks, calls, and even calls. You can now do your work in one feed so you don't have to switch between apps. Spike's conversational email merges traditional email with instant messaging, eliminating cluttered email threads. Live collaboration and real-time communication allow for better interactions and a more human communication environment. Spike is available for iOS, Android, Mac and Windows.
  • 23
    FlashStart Reviews

    FlashStart

    FlashStart Group Srl

    $0.90/month
    5 Ratings
    It is very difficult to find data to show people who don’t care about malware. Although people may not be able to provide the exact details, almost everyone is aware that it's a serious threat. FlashStart blocks botnets, ransomware, malware, and other threats using global, top-class protection streams. You can block any web content that you find inappropriate by using content filtering. These sites could be dangerous, distracting, and unsavoury. Pro+ includes a secure, downloadable app. All devices are protected by centralized FlashStart protection at the home-office, cafe, and anywhere else. No router dependency. The idea is to optimize the filter to meet your individual needs. This is not an appliance. It is a lightweight application that runs on the existing IT systems of the end user. It should allow a low latency performance of less than 5ms.
  • 24
    pCloud Pass Reviews

    pCloud Pass

    pCloud International

    $2.99 per user per month
    3 Ratings
    pCloud Pass allows you to keep your passwords safe and gives you instant SECURE access on all your devices. You can log in to websites and fill out forms with one click. We use a military-grade encryption algorithm, which is different from traditional password managers that store passwords in plaintext. Our password generator is extremely easy to use. It can create unique passwords to all of your accounts without you ever having the worry of forgetting them. You can either start with a trial version, or continue to use a free one. Or, you could upgrade to the premium versions for a one-time payment: a Lifetime plan. Monthly and annual subscriptions are available. The first starts at $2.99/month.
  • 25
    NextDNS Reviews

    NextDNS

    NextDNS

    $39 per month
    3 Ratings
    NextDNS protects against all types of security threats, blocks trackers and ads on websites and apps, and provides a safe and supervised Internet experience for children, on all devices and across all networks. You can define your threat model and adjust your security strategy by activating 10+ types of protections. The most trusted threat intelligence feeds contain millions of malicious domains and are all updated in real time. We analyze DNS questions and answers in real-time, allowing us to detect and block malicious behaviour. Our threat intelligence system can catch malicious domains faster than traditional security solutions, with typically only a few hours between domain registrations and the beginning of an attack. Block trackers and ads on websites and apps, even the most malicious. Block the most popular ads and trackers blocklists. Millions of domains are all kept up-to-date in real time.