Best IT Security Software for Linux of 2026 - Page 12

Find and compare the best IT Security software for Linux in 2026

Use the comparison tool below to compare the top IT Security software for Linux on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Sectrio Reviews
    Sectrio is a comprehensive OT/IoT cybersecurity solution that identifies and secures connected infrastructure. It provides a safety net to mitigate threats and unprecedented visibility across device types and systems, enabling businesses make informed decisions about their security posture. It uses a robust detection strategy that uses signatures, heuristics and machine learning-based anomaly detectors to identify and remediate threats in converged networks. This includes IoT, OT, IoT and Cloud environments. It protects your infrastructure against sophisticated attacks like zero day, APTs and malware. Our multi-layered approach to securing a constrained ecosystem and our consulting services have helped our customers stay safe from advanced threats.
  • 2
    ESET Cyber Security Reviews
    Experience robust and efficient security that operates seamlessly without causing any slowdowns, defending against various forms of malware. It provides protection for Mac, Windows, and Linux systems, shielding you from a variety of threats such as viruses, ransomware, worms, and spyware. You can take full advantage of your computer's capabilities, whether playing, working, or browsing the web, all without interruptions. Our security solution is user-friendly, making installation, renewal, and upgrades a breeze while ensuring routine tasks are easily managed. We appreciate your loyalty, and renewing your ESET subscription takes just a few clicks, allowing you to use your current license key for activation effortlessly. Additionally, you can modify your subscription preferences and eStore account details with ease. ESET offers proven multilayered protection against ransomware and other malware, trusted by over 110 million users globally. Enjoy gaming sessions free from annoying pop-ups, and benefit from battery-saving mode to stay connected longer. Your online safety and smooth computing experience are our top priorities.
  • 3
    ESET Smart Security Premium Reviews

    ESET Smart Security Premium

    ESET

    $59.99 per device per year
    Designed to meet the needs of users seeking comprehensive security, it offers advanced theft protection and streamlined password management. This solution provides security for devices running on Windows, Mac, Android, and Linux platforms. It ensures your data remains safe even in the unfortunate event of theft or loss of a laptop or USB drive. You only need to remember a single password while keeping all your others securely managed. With one license, you can safeguard your Windows, Mac, and Android devices, providing unparalleled security and ease of use. Our robust antivirus technology works tirelessly to protect your digital identity. It effectively shields your sensitive information from threats like ransomware and phishing attacks. Additionally, you can encrypt your files and portable storage devices for added security. Manage and store your passwords effortlessly while having Anti-Theft features to protect your laptop. Each license for ESET Smart Security Premium and ESET Internet Security also enables you to access our premium offerings for Mac, Android, and Linux systems. Note that the complete range of features will depend on the specific operating system you are securing, ensuring that you have the best protection tailored to your needs. This comprehensive approach guarantees that users have the tools needed for a secure digital experience across multiple platforms.
  • 4
    Enterprise Recon Reviews
    Enterprise Recon by Ground Labs is a leading, award-winning solution that empowers organizations to confidently discover, manage, and remediate sensitive personal data across their entire digital estate—from legacy systems to the modern cloud. Our technology provides the unparalleled visibility needed to reduce risk, simplify compliance, and maintain a strong security posture globally. Unmatched Discovery and Accuracy Powered by GLASS™ At the core of Enterprise Recon is GLASS Technology™, Ground Labs' proprietary pattern-matching engine. This is a crucial differentiator, designed specifically for data discovery: Fastest and Most Accurate: GLASS Technology™ allows Enterprise Recon to deliver the fastest and most accurate sensitive data discovery on the market, dramatically minimizing system overheads and the most common complaint in the industry: false positives. Deep Search Capabilities: It performs sophisticated, deep searches for over 300 pre-configured, out-of-the-box data types across various formats, including databases, documents, emails, compressed files, and even in-memory data, ensuring no sensitive asset is missed. Customization: Enables complete customisation of sensitive data types, enabling organizations to search for proprietary or highly-specific data patterns unique to their business or industry. Comprehensive Platform and Deployment Coverage Enterprise Recon is engineered for the complex, heterogeneous environments of the modern enterprise, offering unparalleled breadth in platform support: Broad OS Support: Supports sensitive data discovery on an extensive range of operating systems, including common platforms like Windows, macOS, and Linux, as well as legacy and specialized systems such as FreeBSD, Solaris and AIX
  • 5
    IRI FieldShield Reviews

    IRI FieldShield

    IRI, The CoSort Company

    IRI FieldShield® is a powerful and affordable data discovery and de-identification package for masking PII, PHI, PAN and other sensitive data in structured and semi-structured sources. Front-ended in a free Eclipse-based design environment, FieldShield jobs classify, profile, scan, and de-identify data at rest (static masking). Use the FieldShield SDK or proxy-based application to secure data in motion (dynamic data masking). The usual method for masking RDB and other flat files (CSV, Excel, LDIF, COBOL, etc.) is to classify it centrally, search for it globally, and automatically mask it in a consistent way using encryption, pseudonymization, redaction or other functions to preserve realism and referential integrity in production or test environments. Use FieldShield to make test data, nullify breaches, or comply with GDPR. HIPAA. PCI, PDPA, PCI-DSS and other laws. Audit through machine- and human-readable search reports, job logs and re-ID risks scores. Optionally mask data when you map it; FieldShield functions can also run in IRI Voracity ETL and federation, migration, replication, subsetting, and analytic jobs. To mask DB clones run FieldShield in Windocks, Actifio or Commvault. Call it from CI/CD pipelines and apps.
  • 6
    Beyond Identity Reviews

    Beyond Identity

    Beyond Identity

    $0/ User/ Month
    Beyond Identity provides the strongest authentication on the planet, eliminating passwords completely for customers, employees, and developers. Unique to Beyond Identity, users never have to pick up a second device to enroll or authenticate, passwords are completely eliminated from user flows and your database, and organizations can implement risk-based access controls using granular user and device risk captured in real-time. By default, Beyond Identity authenticates with invisible MFA that only leverages unphishable factors. This allows organizations to secure access to applications and critical data by eliminating account takeover, ransomware, and all credential-based attacks all while improving the user experience
  • 7
    LogMeOnce Reviews

    LogMeOnce

    LogMeOnce

    $3 per user per month
    An effective cyber security strategy must focus on both internal and external threats to ensure comprehensive protection. Both types of threats share a critical factor: the commitment of end users to follow established security protocols, policies, and best practices. External threats often take advantage of internal users' compliance with these security measures to infiltrate systems. While various tools like firewalls can mitigate external risks, the root cause often lies in inherent weaknesses within the organization. To effectively manage internal risks, it is essential to implement “automatic & enforceable” security policies and encourage users to follow secure access guidelines with reliable credentials. Fortunately, LogMeOnce's patented technology provides numerous solutions to safeguard your team members, credentials, and organization through advanced automated authentication. Furthermore, the LogMeOnce dashboard streamlines access management, unifying a user’s diverse array of applications into a powerful, cohesive platform for improved security and efficiency. This integration not only enhances protection but also simplifies the user experience, making it easier to maintain security standards across the board.
  • 8
    ManageEngine AD360 Reviews
    AD360 is an integrated identity management (IAM), solution that manages user identities, controls access to resources, enforces security, and ensures compliance. AD360 allows you to perform all your IAM tasks using a simple and easy-to-use interface. All these functions are available for Windows Active Directory, Exchange Servers and Office 365. You can choose the modules that you need and get started addressing IAM issues across hybrid, on-premises, and cloud environments with AD360. You can easily provision, modify, and deprovision mailboxes and accounts for multiple users from one console. This includes Exchange servers, Office 365, G Suite, and Office 365. To bulk provision user accounts, you can use customizable templates for user creation and import data from CSV.
  • 9
    Smallstep Reviews
    Smallstep is a Device Identity Platform™ designed to close a critical gap in Zero Trust security by authenticating devices, not just users. Using ACME Device Attestation, it creates hardware-bound credentials that prove a device’s authenticity and ownership with cryptographic certainty. These credentials protect access to corporate Wi-Fi, VPNs, SaaS tools, cloud workloads, source code, and sensitive data. Co-developed with Google and standardized at the IETF, ACME DA modernizes legacy approaches like SCEP with stronger guarantees and simpler automation. Smallstep works across macOS, Windows, Linux, iOS, and Android, making it ideal for heterogeneous environments. With deep integrations across enterprise IT and DevOps stacks, it delivers scalable, high-assurance device security without operational complexity.
  • 10
    CruzLog Reviews

    CruzLog

    Dorado Software

    $1350
    Next-gen log analysis, visualization, and collection for better troubleshooting, compliance management, and IT security. CruzLog is a suite of integrated tools that IT administrators and operators can use to collect, filter and analyze logs from network, server, and application servers for auditing, compliance, issue tracking, and compliance. CruzLog's extensive suite of IT resource management features, Cruz Operations Center (CruzOC), adds comprehensive log collection, data administration, and detailed visualization. They combine to provide a single console management tool for managing the network and datacenter operations of today's converging infrastructures. Cruz Operations Center (CruzOC), infrastructure administration for IT/IOT resources, is fully integrated. This allows for comprehensive and automated problem resolution through a single pane of glass. Log management allows you to store, analyze, visualize, and manage resource management data. This helps improve IT security and compliance.
  • 11
    Cruz IoT Device Director Reviews
    Cruz IoT Device Director is a comprehensive, scalable management tool that securely and efficiently monitors, manages, and onboards IoT devices from all vendors. IT staff can automate deployment of bulk IoT device, monitor alerts, notifications, troubleshoot devices, view audit logs, configure devices, and remotely push firmware updates across multiple devices through over-the air (OTA) updates.
  • 12
    StixMDM Reviews

    StixMDM

    Stix

    $0.99 per month
    StixMDM provides a dependable, secure, and cost-effective mobile device management (MDM) solution tailored for businesses. The platform emphasizes customer-friendliness and robust security across various platforms, making it suitable for sectors such as hospitality, retail, field services, restaurants, and education. Businesses can manage their mobile device fleets according to their specific requirements, allowing for bulk enrollment of devices and centralized app distribution. Companies can determine the level of control over each device, ranging from minimal oversight to complete lockdown, depending on their preferences. Employees are empowered to utilize their personal devices for work purposes, with Android's work profiles effectively distinguishing between business and personal applications, enabling them to seamlessly balance both work and leisure activities. This separation allows IT departments to manage corporate data while ensuring that employees maintain privacy over their personal applications, photos, and other information. Consequently, this arrangement offers reassurance to both users and IT staff alike. The process of establishing a work profile is straightforward, requiring just the installation of an EMM app from Google Play and following the intuitive setup wizard, resulting in a smooth transition for all parties involved. Ultimately, StixMDM aims to simplify mobile management while enhancing productivity and security for organizations.
  • 13
    Trust DNS Reviews

    Trust DNS

    Surfshark

    $2.50 per month
    A DNS (Domain Name System) changer converts web addresses such as Surfshark.com into the numerical IP addresses essential for machine communication. Typically, your DNS provider is your Internet Service Provider (ISP), which has the capability to monitor your web activity and retain your browsing history. By using a DNS changer, you can enhance your privacy since it encrypts your DNS requests and allows you to connect to public DNS servers provided by third parties. Changing your DNS settings is relatively straightforward; you can manually adjust them through your device’s Wi-Fi settings by editing the network configuration. Alternatively, you can simplify the process by using the Trust DNS app, which enables you to switch DNS servers with just one tap. There are two primary methods to utilize the Trust DNS app: you can either activate its server for improved browsing security or connect to one of the free third-party DNS servers that offer features like content filtering, ad blocking, and protection against malware. This flexibility ensures that users can choose an option that best suits their needs while enhancing their online experience.
  • 14
    ANY.RUN Reviews
    ANY.RUN is a cloud-based interactive sandbox designed to support DFIR and SOC teams in investigating cybersecurity threats. With support for Windows, Linux, and Android environments, it allows users to analyze malware behavior in real time. Trusted by more than 500,000 professionals, ANY.RUN enables teams to detect threats faster, handle more alerts, and collaborate effectively during malware investigations. Visit the official ANY.RUN website to explore more.
  • 15
    NeuVector Reviews

    NeuVector

    SUSE

    1200/node/yr
    NeuVector provides complete security for the entire CI/CD process. We provide vulnerability management and attack blocking in all production with our patented container firewall. NeuVector provides PCI-ready container security. You can meet your requirements in less time and with less effort. NeuVector protects IP and data in public and private cloud environments. Continuously scan the container throughout its lifecycle. Security roadblocks should be removed. Incorporate security policies from the beginning. Comprehensive vulnerability management to determine your risk profile. The only patentable container firewall provides immediate protection against known and unknown threats for zero days. NeuVector is essential for PCI and other mandates. It creates a virtual firewall to protect personal and private information on your network. NeuVector is a kubernetes-native container security platform which provides complete container security.
  • 16
    VyOS Reviews

    VyOS

    VyOS Networks

    $7500
    As a pioneer in open-source networking, VyOS Networks empowers enterprises with automated, secure, and scalable connectivity across cloud, edge, and physical hardware. Engineered for ultimate flexibility, our enterprise-class platform drives seamless automation and robust performance without the trap of proprietary vendor lock-in. We are dedicated to returning infrastructure ownership back to you through completely neutral and transparent solutions. VyOS Universal Router provides a single, consistent networking layer across all of them: • Same operating system • Same configuration model • Same CLI and APIs • Same automation workflows • Same operational model across tenants and regions Your network, your rules.
  • 17
    KernelCare Enterprise Reviews

    KernelCare Enterprise

    TuxCare

    $3.95 per month
    TuxCare's mission is to reduce cyber exploitation worldwide. TuxCare's automated live security patching solutions, long-term support services for Linux or open source software, allows thousands of organisations to quickly remediate vulnerabilities for increased security. TuxCare covers over one million of the world's most important enterprises, government agencies, service suppliers, universities, research institutions, and other organizations.
  • 18
    Fleet Reviews

    Fleet

    Fleet Device Management

    $4 per host per month
    Inquire about the various servers and laptops in your network, regardless of their operating systems or locations. Monitor and categorize your registered devices effectively. Look for key information and focus on specific targets as needed. Gather and disseminate valuable insights for operational teams, security personnel, help desk staff, and others involved. Fleet operates as a self-hosted and self-managed solution, allowing deployment within your own data centers or in cloud environments. Utilize fleetctl to write scripts and create scheduled queries that facilitate the integration of alerts and dashboards throughout your organization, enhancing overall efficiency and responsiveness. This platform empowers you to maintain a comprehensive overview of your hardware assets and their security status.
  • 19
    phoenixNAP Reviews

    phoenixNAP

    phoenixNAP

    $0.10/hour
    As a global IaaS solutions provider, phoenixNAP helps organizations of different sizes meet their IT performance, security, and scalability needs. Delivered from strategic edge locations in the U.S., Europe, Asia-Pacific, and Latin America, phoenixNAP's solutions are globally available, enabling businesses reach their target locales. Its colocation, HaaS, private and hybrid cloud, backup, disaster recovery, and security services are available on an opex-friendly model, providing flexibility and cost-efficiency. Based on world-class technologies, they provide redundancy, security, and advanced connectivity. Companies of all verticals and sizes can leverage phoenixNAP infrastructure for their evolving IT requirements at any stage of growth.
  • 20
    Krugle Reviews
    Security teams can quickly identify security issues from CVE, OWASP and Stackoverflow. Krugle is a tool that helps developers find important code fixes, share problem solving insight and troubleshoot complicated problems. Krugle Enterprise is used by support engineers to share fixes, verify details, and track down key resources. Krugle provides federated, continuously updated access to all the code and technical information that is important to your business. Krugle search can help your organization identify critical code patterns or application issues - instantly and on a large scale.
  • 21
    IRI DMaaS Reviews

    IRI DMaaS

    IRI, The CoSort Company

    $1000 per day
    IRI Data Masking as a Service is a professional services engagement to secure PII. Step 1: IRI agrees under NDA terms to classify, analyze, and report on the sensitive, at-risk data in your sources. We will discuss an initial cost estimate then hone it with you during data discovery. Step 2: Transfer the unprotected data to a secure on-premise or cloud-based staging area or provide remote, supervised access to IRI to the data sources(s) at issue. We'll use the tools in the award-winning IRI Data Protector suite to mask that data according to your business rules, on an ad hoc or recurring basis. Step 3: Our experts can also move newly-masked data to incremental replicas in production or to lower non-production environments. From either, the data is now safe for analytic initiatives, development, testing, or training. Tell us if you need additional services, like re-ID risk scoring (expert determination) of the de-identified data. This approach provides the benefits of proven data masking solution technology and services without the need to learn and customize new software from scratch. If you do want to use the software in-house, you will have everything pre-configured for easier long-term self-use and modification.
  • 22
    WithSecure Elements XDR Reviews
    WithSecure's modular Elements Cloud cyber security platform seamlessly integrates Extended Detection and Response (XDR), Exposure Management (XM) and Co-Security Services into a single unified solution. - WithSecure Elements XDR includes Elements Endpoint Security (your EPP+EDR), Identity Security for Microsoft Entra ID, Collaboration Protection for Microsoft 365, and Cloud Security for Azure as modules. You can flexibly choose which capabilities to include in your Elements XDR solution. - WithSecure Elements Exposure Management (XM) is a continuous and proactive solution that predicts and prevents breaches against your company’s assets and business operations. Elements XM provides visibility into your attack surface and enables the efficient remediation of its highest-impact exposures through a unified view, thanks to our exposure scoring and AI-enabled recommendations. Get one solution for 360° digital exposure management and visibility across your external attack surface and internal security posture, to proactively prevent cyber-attacks. Through our flexible Elements modules made of cutting-edge software and high-quality services, customers can find the optimal solution for their needs. Together, the modules offer end-to-end business and cloud coverage. In today's unpredictable, ever-changing business environment, our all-in-one security platform helps you build and maintain a resilient business. We believe in the European Way of cyber security and we do this together with our partners as the Elements Cloud is really geared to enable WithSecure’s partners to offer robust security products and managed security services to mid-sized and other resource constrained companies.
  • 23
    Maltego Reviews

    Maltego

    Maltego Technologies

    €5000 per user per year
    Maltego can be used by many users, including security professionals, forensic investigators and investigative journalists as well as researchers. You can easily gather information from disparate data sources. All information can be automatically linked and combined into one graph. Automately combine disparate data sources using point-and-click logic. Our intuitive graphical user interface allows you to enrich your data. You can detect patterns even in the largest graphs using entity weights. You can annotate your graph and then export it for further use. Maltego defaults to using our public Transform server. We have learned over the years that flexibility is important in choosing the right infrastructure for enterprise users.
  • 24
    Calico Cloud Reviews

    Calico Cloud

    Tigera

    $0.05 per node hour
    A pay-as-you-go security and observability software-as-a-service (SaaS) solution designed for containers, Kubernetes, and cloud environments provides users with a real-time overview of service dependencies and interactions across multi-cluster, hybrid, and multi-cloud setups. This platform streamlines the onboarding process and allows for quick resolution of Kubernetes security and observability challenges within mere minutes. Calico Cloud represents a state-of-the-art SaaS offering that empowers organizations of various sizes to secure their cloud workloads and containers, identify potential threats, maintain ongoing compliance, and address service issues in real-time across diverse deployments. Built upon Calico Open Source, which is recognized as the leading container networking and security framework, Calico Cloud allows teams to leverage a managed service model instead of managing a complex platform, enhancing their capacity for rapid analysis and informed decision-making. Moreover, this innovative platform is tailored to adapt to evolving security needs, ensuring that users are always equipped with the latest tools and insights to safeguard their cloud infrastructure effectively.
  • 25
    ImunifyAV Reviews

    ImunifyAV

    Imunify360

    $12 per server per month
    Ensuring that harmful code, whether from PHP platforms like WordPress, Joomla, or Drupal, or from traditional static HTML, is kept away from your files is crucial for safeguarding your websites. ImunifyAV serves as a free malware scanner that meticulously scans files to detect malicious code, promptly alerting you to any potential threats on your sites. It functions as a standard antivirus solution, performing routine background checks on files to maintain a clean server environment. Additionally, an On-Demand Antivirus feature allows both administrators and end-users to manually scan any specific folder for malware at their convenience. Utilizing antivirus solutions specifically designed for Linux servers is highly advisable to protect against malicious attacks, harmful bots, spam, and worms that could adversely impact daily operations and revenue. By implementing these security measures, you can significantly reduce the risk of website compromise and enhance the overall integrity of your online presence.
MongoDB Logo MongoDB