f-secure.com F-Secure
For full functionality of this site it is necessary to enable JavaScript. Here are the instructions how to enable JavaScript in your web browser.
๐จ f-secure.com F-Secure has been discontinued
๐ You can review its best alternatives below
or
view status details
f-secure.com F-Secure Alternatives & Competitors
The best f-secure.com F-Secure alternatives based on verified products, community votes, reviews and other factors.
Filter:
6
Open-Source Alternatives.
-
Understand how work gets done. Collect logs and screenshots from Windows, Mac OS and Chrome OS computers.
Key ActivTrak features:
User Activity Monitoring Behavior Analysis Real-Time Reporting Ease of Use
-
Symantec Email Security.cloud provides always-on, inbound and outbound email security against malware, targeted attacks, and advanced threats.
Key Symantec Email Security.cloud features:
Comprehensive Threat Protection Data Loss Prevention (DLP) Ease of Management Cloud-Based Service
-
PlexTrac is the #1 AI-powered platform for pentest reporting and threat exposure management, helping cybersecurity teams efficiently address the most critical threats and vulnerabilities.
Key PlexTrac features:
Comprehensive Reporting Collaboration and Integration Centralized Vulnerability Management User-Friendly Interface
-
Amazon GuardDuty offers continuous monitoring of your AWS accounts and workloads to protect against malicious or unauthorized activities.
Key Amazon GuardDuty features:
Comprehensive Threat Detection Managed Service Scalability Integration with AWS Services
-
Lookout is a cybersecurity company that predicts and stops mobile attacks before harm is done to an individual or an enterprise.
Key Lookout features:
Mobile Endpoint Security Cloud-based Protection User-Friendly Interface Enterprise Integration
-
Cisco Talos is a threat intelligence organization dedicated to providing protection before, during, and after cybersecurity attacks.
Key Cisco Talos features:
Threat Intelligence Comprehensive Security Portfolio Global Threat Coverage Proactive Threat Hunting
-
Powerful multilayered protection for desktops, laptops and smartphones .
Key ESET Endpoint Security features:
Antimalware Antiphishing and Antispam Network Attack Protection Device Control
-
Symantec Endpoint Encryption protects the sensitive information and ensure regulatory compliance with strong full-disk and removable media encryption with centralized management.
Key Symantec Endpoint Encryption features:
Comprehensive Encryption Centralized Management Industry Compliance Strong Authentication
-
Authentic8 puts you in control of the cloud by delivering the browser as a service.
Key Authentic8 Silo features:
Security Privacy Simplicity Compliance
-
Security solution to predict and remediate potential security risks across organizations and their partners.
Key SecurityScorecard features:
Comprehensive Risk Assessment Third-Party Risk Management Continuous Monitoring User-Friendly Interface
-
Cylance is an endpoint security platform that detects, prevents and blocks threats.
Key Cylance features:
Advanced AI Technology Low System Impact Behavior-based Detection Ease of Deployment
-
Security Orchestration, Automation & Response Platform.
Key SIRP features:
Integration Capability Automation Centralized Dashboard Risk-based Approach
-
McAfee Endpoint Security speeds threat de-tection and remediation with antimalware, fast scanning, instant threat detection and updates, and maximized CPU performance.
Key McAfee Endpoint Security features:
Comprehensive Protection Centralized Management Advanced Threat Detection Ease of Integration
-
Alert Logic Threat Manager is a cloud-based managed intrusion detection and vulnerability assessment solution.
Key Alert Logic Threat Manager features:
Comprehensive Threat Detection 24/7 Monitoring Expertise and Support Incident Response
f-secure.com F-Secure discussion
