Best IT Security Software for Linux of 2025 - Page 10

Find and compare the best IT Security software for Linux in 2025

Use the comparison tool below to compare the top IT Security software for Linux on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Onboardbase Reviews
    Onboardbase is a secret management platform that provides a single source of shared truth regarding app secrets and usage. It allows dev teams to securely share and work together with environment-specific configurations at every stage of development, synced across infrastructure and without compromising security. This allows developers to focus on building great apps and not managing secrets. Secrets are dynamically updated across your infrastructure and environments with 50+ integrations. Dev teams can track and audit how long, where, and when secrets are used. They can also revoke any usage with a click. Strong, always-on codebase scanning features prevent developers accidentally leaking secrets into production. This maintains a strong security model.
  • 2
    OXARI Reviews

    OXARI

    Infonet Projekt SA

    $7/month/user
    OXARI is an ITSM-class ServiceDesk system for professionals that is ITIL-compliant. It is also enriched with the toolset IT teams need. IMPLEMENTATION BENEFITS OXARI is a universal platform that allows the implementation of a professional ITSM Class system in accordance to the ITIL standard. The system provides tools for IT teams and features to manage complex business processes. - Modular design and modern user interface allow you to model any Asset Management or CMDB, ServiceDesk work logic, Workflow, Workflow, or MDM work logic. Access the system from any web browser. You can also design all user interface components yourself. MULTIPLE CONFIGURATIONS The main component of the system that allows for configuration flexibility is rule-based management. OXARI allows you create any number patterns that are composed of specific actions and rules.
  • 3
    Neurodactyl Reviews

    Neurodactyl

    Neurodactyl

    USD 0.01 per verification
    Neurodactyl SDK allows system integrators to integrate biometric fingerprint recognition, verification or identification into their products and services. The SDK is based upon deep learning technologies, and matches fingerprints with high accuracy: flats, roll, latents, and photo images. It creates a fixed-size, compatible template for all types of fingerprints. The algorithm's recognition accuracy is top-tier in the NIST PFT III competition.
  • 4
    OPNsense Reviews
    Traditional packet filters are gradually becoming outdated, as even open-source solutions are shifting towards Next-Generation Firewalls. OPNsense stands out as a leading option for features like intrusion detection, application control, web filtering, and antivirus protection. No network, regardless of its size, is immune to potential attacks; even devices in home networks, such as washing machines and smartwatches, are at risk and need robust security measures. Firewalls play a crucial role in a comprehensive security strategy, shielding systems from both established and emerging threats. The effectiveness of a firewall is maximized when its capabilities are well understood, it operates intuitively, and is strategically placed within the network infrastructure. OPNsense rises to the occasion by fulfilling these essential requirements in various ways. This book serves as an invaluable guide for anyone looking to comprehend, install, and configure an OPNsense firewall effectively. Ultimately, understanding the intricacies of OPNsense can empower users to create a more secure digital environment.
  • 5
    Phishing Club Reviews
    Phishing Club is a self-hosted phishing simulation platform built for modern security needs. It provides organizations complete control over their phishing infrastructure through a single binary deployment. Key differentiators: - Self-hosted architecture ensuring full data sovereignty - Multi-stage phishing campaigns with defense evasion - Automated domain and TLS certificate management - Flexible delivery through SMTP or API integration - No artificial limits on campaigns or recipients The platform is designed for red teams requiring advanced capabilities, privacy-focused companies running phishing simulations, and security providers offering phishing services. All data remains on your infrastructure with comprehensive privacy controls.
  • 6
    tenfold Reviews

    tenfold

    tenfold

    $.09/managed identity/month
    tenfold is an efficient, no-code Identity Governance & Administration (IGA) solution that simplifies the management of IT access and privileges. Designed for rapid deployment with its off-the-shelf plugins, tenfold helps organizations avoid long and costly setup processes, enabling full operational functionality in just weeks. The platform empowers businesses to manage user access with features like user lifecycle management, role-based access, and end-user self-service. It also includes essential tools for managing data access governance, user access reviews, and approval workflows. With tenfold, organizations can gain full control over IT privileges, mitigate access risks, and ensure the right people have secure access to the right resources at all times. The solution supports separation of duties to enhance security and compliance, allowing businesses to reduce risks while improving operational efficiency.
  • 7
    SafeLine WAF Reviews

    SafeLine WAF

    Chaitin Tech

    $0/month
    SafeLine is one of the most popular WAF solutions globally, serving thousands of paid users and hundreds of thousands of active users daily. Utilizing a cutting-edge machine learning engine, it delivers nearly flawless detection rates and minimal false positives by deeply analyzing HTTP traffic semantics. The platform provides comprehensive bot mitigation features such as CAPTCHA challenges and adaptive protections against malicious crawlers. It also defends against large-scale HTTP Flood DDoS attacks by intelligently managing traffic flows and enforcing access controls. SafeLine’s unified identity management supports seamless integration across various cloud and on-premises environments. With an easy-to-use, wizard-driven interface and modular design, organizations can deploy and maintain enterprise-grade protection effortlessly. Pricing transparency ensures users understand exactly what they pay for, with options suited for personal use up to large-scale deployments. SafeLine’s open-source roots foster community-driven improvements, continuously enhancing its capabilities.
  • 8
    Devolutions Workspace Reviews

    Devolutions Workspace

    Devolutions

    $3/month/user
    Passwords are a ubiquitous aspect of the workplace, found across various applications, websites, and servers. Devolutions Workspace consolidates these credentials into a single interface that is compatible with Windows, macOS, Linux, iOS, Android, and web browsers. It allows users to autofill their credentials, manage entries with role-based access control (RBAC), and handle urgent access requests—all without exposing the actual passwords. Within Workspace, features such as multi-factor authentication (MFA) via Devolutions Authenticator, secure messaging within the app, and an offline mode enhance security and convenience. Administrators have the ability to enforce robust security policies, while users benefit from a seamless login process that minimizes friction. The backbone of this setup is the Workforce Password Management package, which links Workspace to a centralized credential storage solution, whether through the cloud-based Devolutions Hub or the self-hosted Devolutions Server, tailored to your infrastructure requirements. This integrated approach empowers growing teams to effectively manage their password environment, reducing chaos and improving access governance while avoiding the complexities and expenses associated with traditional solutions. In the end, Devolutions Workspace not only simplifies password management but also fosters a more secure and efficient working environment.
  • 9
    NetBird Reviews

    NetBird

    NetBird

    $5/user/month
    NetBird is a cutting-edge open-source platform for Zero Trust Networking, created by engineers specifically for their peers. It offers a streamlined approach to establishing secure private networks by harnessing the powerful WireGuard® protocol. In contrast to conventional VPNs, NetBird facilitates decentralized, low-latency, and high-throughput private networks, all managed through a single console that prioritizes identity-based access control. By integrating effortlessly with your Identity Provider for Single Sign-On (SSO) and Multi-Factor Authentication (MFA), it enables direct, encrypted peer-to-peer connections among devices, servers, and clouds, eliminating central bottlenecks or single points of failure. The lightweight clients allow for easy scalability and enhanced privacy, ensuring that traffic does not traverse management services. NetBird is compatible with numerous integrations, including CrowdStrike, Intune, SentinelOne, pfSense, and others. It is perfectly suited for Zero Trust remote access, multi-cloud connectivity, dynamic posture assessments, comprehensive auditing, and multi-tenant management for Managed Service Providers (MSPs), all accessible from a single, intuitive platform. Furthermore, its focus on security and efficiency makes it an attractive choice for organizations looking to enhance their network infrastructure.
  • 10
    BalanceNG Reviews

    BalanceNG

    Inlab Networks

    $350 one-time payment
    Inlab Networks has developed BalanceNG, a reliable multithreading software load-balancer. Available for Linux, Solaris, and Mac OS X operating systems, BalanceNG is easy to integrate into data center networks. It offers top quality packet processing performance and makes this the ideal solution for hosting companies, network operators, product designers, and telco product developers. Inlab Networks' BalanceNG comes with a highly-specialized IP stack for IPv6/IPv4 and an independent active/passive Cluster environment that is based upon VRRP and the "bngsync” session table synchronization protocol.
  • 11
    Asigra Reviews
    Asigra empowers IT departments to enhance their confidence in data recovery by providing unmatched reliability, top-notch security, ease of management, and cost-effectiveness in data protection solutions. The Enterprise Backup and Disaster Recovery (BDR) software platform from Asigra is specifically tailored for Managed Service Providers (MSPs) to effectively implement and manage their own Backup as a Service offerings. This user-friendly platform allows for easy customization to align with your brand identity, while its innovative Hybrid Cloud Backup architecture integrates a Cloud-optimized scale-out framework, a robust Cloud backup and recovery software platform, along with a Cloud API and management system. As a result, IT teams can efficiently manage, scale, and deliver comprehensive data protection services, ensuring they meet the evolving demands of their clients and stakeholders.
  • 12
    Vector by Datadog Reviews
    Gather, transform, and direct all your logs and metrics with a single, user-friendly tool. Developed in Rust, Vector boasts impressive speed, efficient memory utilization, and is crafted to manage even the most intensive workloads. The aim of Vector is to serve as your all-in-one solution for transferring observability data from one point to another, available for deployment as a daemon, sidecar, or aggregator. With support for both logs and metrics, Vector simplifies the process of collecting and processing all your observability information. It maintains neutrality towards specific vendor platforms, promoting a balanced and open ecosystem that prioritizes your needs. Free from vendor lock-in and designed to be resilient for the future, Vector’s highly customizable transformations empower you with the full capabilities of programmable runtimes. This allows you to tackle intricate scenarios without restrictions. Understanding the importance of guarantees, Vector explicitly outlines the assurances it offers, enabling you to make informed decisions tailored to your specific requirements. In this way, Vector not only facilitates data management but also ensures peace of mind in your operational choices.
  • 13
    Edgenexus Load Balancer (ADC/WAF/GSLB) Reviews
    We offer the most user-friendly technology without sacrificing performance or features. We back it up with exceptional support and care delivered under a fair, cost-effective pricing model Our technology is used by small startups with big ideas, small budgets, and global enterprises. We love them all! Easy to use Load balancing, WAF, GSLB and SSO/Pre-Authentication. It is also the only true ADP Application Delivery Platform that allows for the enhancement of functionality and longevity using the app store or apps you create in-house.
  • 14
    SureMDM Reviews

    SureMDM

    42Gears Mobility Systems

    $3.49 per month
    Ensure the security, oversight, and administration of both company-owned and employee-owned devices to mitigate security threats and address maintenance issues throughout the entire device lifecycle. SureMDM, developed by 42Gears, stands out as a user-friendly and robust mobile device management (MDM) solution compatible with various platforms including Android, iOS/iPadOS, Windows, Linux, macOS, Wear OS, VR, and IoT. This comprehensive tool allows businesses to safeguard and oversee devices intended for dedicated use, as well as personal devices that access corporate information (BYOD). SureMDM effectively encompasses all facets of enterprise mobility management via unified endpoint management, which includes Mobile Application Management, Mobile Device Management, and Mobile Content Management. In addition, SureMDM subscriptions provide access to SureLock for kiosk mode, SureFox for a secure browsing experience, and SureVideo for reliable digital signage solutions, making it an all-in-one platform for managing mobile devices. With these features, organizations can streamline their mobile strategies while enhancing productivity and security.
  • 15
    Singular Reviews
    The key to success for today's marketers is understanding exactly where and how to invest their next ad dollar. Singular powers marketers to do just that by providing a complete view of marketing ROI with next-gen attribution, full-funnel marketing data, and best-in-class fraud prevention. With Singular's open integration framework, you are able to measure and report on all the channels you work with, including apps, web, SMS, referrals, email, and TV. Singular also empowers you to analyze your ROI by combining attribution with leading cost aggregation through powerful data connectors that allow yo to unlock marketing performance for every campaign, publisher, creative, and keyword. To keep your ad budgets focused on real users and avoid misreporting, Singular provides you with more detection methods and pre-attribution fraud rejection than any other. Still wondering? Top marketers from LinkedIn, Rovio, Microsoft, Lyft, Twitter, EA, and more, rely on Singular for a complete view of their marketing performance.
  • 16
    Nagios Network Analzyer Reviews

    Nagios Network Analzyer

    Nagios Enterprises

    $1995.00
    Network Analyzer gives administrators an in-depth view of all network traffic sources and possible security threats. This allows system administrators to quickly gather high-level information about the health of the network and highly granular data to complete and thorough network analysis. Network Analyzer gives you a central view of all your network traffic and bandwidth data, as well as potential network compromises. The home dashboard gives you an overview of important netflow and sflow data sources, server system metrics, abnormal network behavior, and other network issues. It is a quick way to assess the health of your network. Users can drill down to view specific information on IPs, source ports, destination ports, or any combination thereof. Network Analyzer's advanced alerting capabilities and reporting capabilities give IT staff a better understanding of their network. For further analysis and tracking, you can access and archive highly detailed and down-to-the packet data.
  • 17
    WebLOAD Reviews

    WebLOAD

    RadView Software

    RadView WebLOAD is a leading enterprise AI-based performance and load testing solution for testing web, mobile, and packaged applications. It supports over 150 protocols and technologies, including all common front-end frameworks, APIs, message queues, and databases, enabling load testing across any enterprise technology stack. RadView WebLOAD.AI, is available as SaaS and can also be self-hosted in the cloud or on-premise. It is highly scalable and can simulate hundreds of thousands of concurrent users from different locations and cloud platforms. Smart and easy generation of reliable tests and its powerful AI-based analytics capabilities, RadView WebLOAD makes performance teams highly successful in detecting and quickly resolving performance issues. With built-in integration into most of the popular Testing, CI/CD and APM tools, as well as a rich API that makes it easily pluggable into any delivery pipeline. Adding its built-in flexible deployment, it makes RadView WebLOAD easily adaptable into any development, testing, or operation environment, and processes.
  • 18
    Data Rover Reviews
    Data Rover is an Advanced User Data and Security Management for any Data-Driven Organisation. A single solution for Infrastructure and Security managers that allows data users to explore, manage, process, and protect their data effectively and efficiently, by simultaneously addressing the two primary needs related to the use of data: Cyber Security and Data Management. Data Rover plays a key role in business asset protection and corporate data management policy definition. The software is designed for companies that need to ensure compliance with personal data protection regulations and provides detailed analysis of data access permissions. User Access Rights & Auditing Provides invaluable information about access privileges to files and folders. It allows you to analyse the effective permissions of the users, i.e. the real ones. It identifies not only who can access data, but also who did exactly what, when, and from where. Data Housekeeping Helps you identify and distinguish valuable assets from junk information that becomes unnecessary ballast and an unjustified cost to the company. Data Exchange Provides the company with an advanced data exchange and tracking system exclusively designed for the business.
  • 19
    Saint Security Suite Reviews

    Saint Security Suite

    Carson & SAINT

    $1500.00/year/user
    This integrated solution can perform active, passive, and agent-based assessments. It also allows for flexibility in evaluating risk according to each business. SAINT's remarkable, flexible, and scalable scanning capabilities make it stand out from other solutions in this market. SAINT has partnered up with AWS to allow its customers to benefit from AWS's efficient scanning. SAINT also offers Windows scanning agents for subscribers. Security teams can easily schedule scans, configure them with a lot of flexibility, and fine-tune their settings with advanced options.
  • 20
    Centrifuge Analytics Reviews

    Centrifuge Analytics

    Culmen Internal LLC

    Call
    Centrifuge Analytics™, a big data discovery tool, allows you to connect, visualize, and collaborate without the need for complex data integration or a data science degree. It combines advanced link-analysis, interactive visualizations, and discovery features to simplify data pattern recognition and connection recognition. - A fully integrated solution that empowers analysts without any IT support. - Advanced link-analysis features like pattern identification, intelligent bundling, and other unique interactive visual features - 100% Browser footprint means there is no client-side data storage which simplifies security and client administration Patent-pending server side rendering engine that allows highly scalable network graphs Agile data integration - No need for a fixed ontology to store, stage or apply. Model-based analytics – Setup once and reuse – build on the experience of more experienced analysts
  • 21
    DNS Manager Reviews
    DNS Manager is a versatile automation tool tailored for multiple tenants, aimed at providing sophisticated DNS services to businesses and hosting providers while streamlining the management of DNS records. It is incredibly fast, intuitive, and facilitates seamless virtualization, making it an ideal solution for today's digital landscape.
  • 22
    xSecuritas Reviews

    xSecuritas

    xSecuritas, Inc

    $39
    xSecuritas provides advanced screen watermarking solutions to protect sensitive data from unauthorized access or leakage. The platform supports visible and invisible watermarks, allowing businesses to track and secure content by embedding metadata like user IDs, IP addresses, and sensitivity labels. It is compatible with VDI environments, remote desktops, and video conferencing tools, providing a comprehensive data protection strategy across all devices. xSecuritas also includes features to block screen captures and monitor printing activities, ensuring that all digital actions are logged and safeguarded. With customizable policies that can be enforced globally or per user group, xSecuritas offers flexible, secure protection for all business content.
  • 23
    WipeDrive Reviews

    WipeDrive

    WipeDrive

    $19.95/one-time/drive
    WipeDrive is a tool that allows individuals, businesses, and government agencies to securely and permanently erase data off hard drives, removable media, mobile devices, and other storage devices. It's a cost-effective and secure way to recycle and retire computer storage. WipeDrive is the global leader in secure data destruction.
  • 24
    ditno Reviews

    ditno

    ditno

    $25/endpoint/year
    Data is the most valuable asset of your company, so it is important to protect it. Network security is about zero trust. You should never trust anyone outside or within your network perimeter. Network security is becoming more difficult because network perimeters are blurring and endpoints continue proliferating. Cyberattacks are also being launched using machine learning and automation. Organizations are shifting to the cloud to protect their data in a hybrid cloud/on premises environment. This is without adding cost or complexity. A huge step towards secure environments is the combination of micro-segmentation and real-time network governance. You can improve your security posture through automation and data by choosing the right software solution. ditno is a cybersecurity management platform that offers a zero trust network approach to simplify and improve security.
  • 25
    Axonius Reviews
    Axonius gives IT and security teams the confidence to control complexity by providing a system of record for all digital infrastructure. With a comprehensive understanding of all assets including devices, identities, software, SaaS applications, vulnerabilities, security controls, and the context between them, customers are able to mitigate threats, navigate risk, decrease incident response time, automate action, and inform business-level strategy — all while eliminating manual, repetitive tasks.