Best IT Security Software for Linux of 2026 - Page 24

Find and compare the best IT Security software for Linux in 2026

Use the comparison tool below to compare the top IT Security software for Linux on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Pica8 PICOS Reviews
    The unique PICOS open NOS, equipped with closely integrated control planes, provides network operators with precise and non-intrusive oversight of their enterprise applications, allowing for extensive and adaptable traffic analysis and real-time attack prevention. For achieving zero-trust networking and establishing software-defined perimeters, PICOS stands out as the optimal solution. Our premier open network operating system is compatible with open switches ranging from 1G to 100G interfaces, sourced from a diverse selection of Tier 1 manufacturers. This comprehensive licensing package delivers unparalleled support for enterprise functionalities available in the market. It incorporates the Debian Linux distribution, featuring an unchanged kernel to enhance DevOps programmability to its fullest extent. Furthermore, the Enterprise Edition is enhanced by AmpCon, an automation framework based on Ansible, which integrates Zero-Touch Provisioning (ZTP) with the Open Network Install Environment (ONIE), streamlining the deployment and management of open network switches throughout the enterprise. With such advanced capabilities, organizations can ensure their networks are not only efficient but also secure against evolving threats.
  • 2
    Kali Linux Reviews
    Kali Linux is a Debian-based, open-source distribution designed specifically for a variety of information security activities, including penetration testing, security research, computer forensics, and reverse engineering. While it's possible to take any Linux distribution and manually install penetration testing tools, this requires considerable setup and configuration efforts. Kali Linux is tailored to minimize this workload, enabling professionals to focus on their tasks right away. You can access a version of Kali from virtually anywhere, whether on mobile devices, Docker, ARM architectures, Amazon Web Services, the Windows Subsystem for Linux, virtual machines, or even bare metal installations. Thanks to metapackages that cater to specific security tasks and a user-friendly ISO customization process that is well-documented, creating an optimized version of Kali to suit your particular needs is straightforward. This makes it a versatile choice for both experienced users and newcomers alike, as comprehensive documentation ensures that everyone can find the guidance they require. Additionally, the active community surrounding Kali Linux continuously contributes to its improvement, further enhancing the resources available to users.
  • 3
    Puffin Reviews
    Many widely-used web browsers offer a variety of functionalities, yet frequently fail to ensure complete user safety. Utilizing our cutting-edge cloud technology, Puffin delivers all the advantages while maintaining robust security measures. Given that our devices remain highly susceptible to cyber threats, transitioning browsing activities to the cloud secures your phone, tablet, and computer from potential hijacking. This design prioritizes user experience, and as a result, it lightens the internal workload which enhances processing efficiency. Ultimately, choosing Puffin means accessing the web with peace of mind and improved performance.
  • 4
    AuthPass Reviews
    AuthPass is a free and open-source password manager that supports the widely-used and reliable Keepass formats (kdbx 3.x and kdbx 4.x šŸŽ‰ļø). It allows you to store your passwords securely, share them across various devices, and access them effortlessly whenever you need to log in. šŸ—„ Consolidate all your passwords in one convenient location. 🧬 Create strong, random passwords for each of your online accounts. šŸ” Access your vault quickly using biometric authentication. šŸ” Monitor your accounts across the internet with ease. šŸ–„ Available on multiple platforms, including Mac, iPhone, iPad, Android devices, Linux, Windows, and through a web interface. šŸ“‚ Open and manage multiple password files simultaneously, such as one for work and another for personal use, or share files with colleagues. āœ Autofill functionality for your passwords is available on Android 9 and later, with browser support starting from Android 10. With AuthPass, managing your credentials has never been more streamlined or secure.
  • 5
    FacePhi Reviews

    FacePhi

    FacePhi Biometria

    FacePhi provides an all-encompassing solution for digital onboarding, authentication, and security through a variety of biometric and antifraud systems, ensuring the best user experience available. This innovative synthesis of biometric technologies and security protocols forms a holistic approach to digital onboarding and identity verification, enabling users to access, authenticate, and manage a range of services and products across both mobile and web platforms. The framework is designed for effortless integration, allowing clients to select which components to implement, thus enhancing the overall experience for users. Utilizing facial recognition technology, the system determines a person's identity by examining their facial features, making it distinct from other biometric methods like iris scanning or fingerprinting, as it is non-intrusive and requires no active participation from the user; all that is needed is a simple capture of the individual's face via a webcam. This approach not only streamlines the authentication process but also prioritizes user convenience and privacy, making it an attractive option for businesses seeking to enhance their security measures.
  • 6
    Hyperledger Iroha Reviews
    Hyperledger Iroha is crafted to be straightforward and seamlessly integrated into infrastructure or IoT initiatives that demand distributed ledger technology. It showcases an uncomplicated framework, a modular design driven by domain specificity in C++, a focus on developing client applications, and introduces a novel consensus algorithm known as YAC, which is fault-tolerant. As a user-friendly blockchain platform, Hyperledger Iroha enables the creation of reliable, secure, and efficient applications, leveraging the advantages of a permissioned blockchain coupled with its crash fault-tolerant consensus mechanism. The platform is open-source and free to use, compatible with both Linux and Mac OS, and supports a variety of libraries for mobile and desktop environments. Hyperledger Iroha serves as a versatile permissioned blockchain solution, capable of managing digital assets, identities, and serialized data efficiently. Its potential applications span across multiple sectors, including interbank settlements, central bank digital currencies, payment solutions, national identification systems, and logistics management, making it a valuable asset in the evolving tech landscape. Notably, its design allows for scalability and adaptability, ensuring that it can meet the diverse needs of modern applications.
  • 7
    Hyperledger Indy Reviews
    Hyperledger Indy offers a suite of tools, libraries, and reusable components that facilitate digital identities based on blockchains or distributed ledgers, ensuring their compatibility across various administrative domains, applications, and isolated systems. This technology not only works seamlessly with other blockchain solutions but can also function independently, thus enhancing the decentralization of identity management. It is a distributed ledger specifically designed for decentralized identity, with built-in resistance to correlation. The platform supports Decentralized Identifiers (DIDs) that are unique and can be resolved through a ledger without any need for centralized authorities. Additionally, Indy features Pairwise Identifiers, which establish secure one-to-one relationships between two entities. The verifiable claims it utilizes are formatted for efficient exchange of digital identity attributes and are currently being standardized by the W3C. Moreover, it incorporates Zero Knowledge Proofs, which allow for the validation of certain claims without disclosing any extraneous information, further enhancing user privacy and security. This multifaceted approach positions Hyperledger Indy as a robust framework for the future of identity management in a digital landscape.
  • 8
    Leviathan Lotan Reviews

    Leviathan Lotan

    Leviathan Security Group

    Lotanā„¢ equips your organization with a distinctive ability to identify attacks at an earlier stage and with enhanced assurance. Given the vulnerability of exploits against contemporary countermeasures and the diversity of environments, application crashes frequently occur. Lotan scrutinizes these crashes to identify the underlying attack and facilitate an effective response. It gathers crash data through a straightforward registry modification on Windows or via a lightweight userland application for Linux systems. Furthermore, a RESTful API enables seamless sharing of evidence and insights with your existing Threat Defense and SIEM systems. This API delivers transparency into every aspect of Lotan's operational process, supplying comprehensive details essential for a swift and informed response to threats. By significantly improving the precision, frequency, and speed of threat detection, Lotan hampers adversaries' ability to operate unnoticed within your network, ultimately reinforcing your enterprise's security posture. Additionally, the combination of these features ensures a more resilient defense strategy against evolving cyber threats.
  • 9
    Panaseer Reviews
    Panaseer's continuous control monitoring platform is a powerful tool that can monitor and monitor all aspects of your organization. It provides trusted, automated insight into the organisation's security and risk posture. We create an inventory of all entities in your organization (devices and apps, people, accounts, and databases). The inventory identifies assets that are missing from different sources and identifies security risks. The platform provides metrics and measures that will help you understand your compliance and security status at all levels. The platform can ingest data from any source, cloud or on-premises. Data can be accessed across security, IT, and business domains using out-of-the box data connectors. It uses entity resolution to clean and normalise, aggregate and de-duplicate this data. This creates a continuous feed with unified assets and controls insights across devices and applications, people, database and accounts.
  • 10
    IBM Guardium Data Compliance Reviews
    Simplifies data regulations, improves visibility and streamlines the monitoring IBMĀ®, GuardiumĀ®, Data Compliance helps organizations meet regulatory compliance and audit requirements faster and easier, while safeguarding regulated information wherever it is located. IBM Guardium Data Compliance, available in IBMĀ®, GuardiumĀ®, Data Security Center, can reduce audit prep times for data compliance regulations and provide continuous visibility of data security control. It also solves data compliance and data monitoring challenges.
  • 11
    ActiveState Reviews
    ActiveState delivers Intelligent Remediation for vulnerability management, which enables DevSecOps teams to not only identify vulnerabilities in open source packages, but also to automatically prioritize, remediate, and deploy fixes into production without breaking changes, ensuring that applications are truly secured. We do this by helping you: - Understand your vulnerability blast radius so you can see every vulnerabilities’ true impact across your organization. This is driven by our proprietary catalog of 40M+ open source components that’s been built and tested for over 25 years. - Intelligently prioritize remediations so you can turn risks into action. We help teams move away from alert overload with AI-powered analysis that detects breaking changes, streamlines remediation workflows, and accelerates security processes. - Precisely remediate what matters - unlike other solutions, ActiveState doesn’t just suggest what you should do, we enable you to deploy fixed artifacts or document exceptions so you can truly drive down vulnerabilities and secure your software supply chain. The ActiveState platform centers on open source languages packaged as runtimes that can be deployed in various form factors. Low-to-no CVE container images are also available for plug-in and play needs.
  • 12
    WithSecure Elements Infinite Reviews
    WithSecure Elements Infinite provides a comprehensive suite of security tools and capabilities as a continuous Managed Detection and Response (MDR) service that includes responding 24/7 to cyber security incidents and improving customers security posture through Continuous Threat Exposure Management (CTEM). WithSecure's Detection and Response Team (DRT) swiftly addresses cyber threats to your organization within minutes. WithSecure Elements Infinite seamlessly integrates with your cyber security team, providing threat hunting expertise, helping your team learn and grow, and continuously enhancing your security measures. Our threat hunters dedicate up to 30% of their time to proactively hunting for threats and refining the tools and techniques they use for detection. The Detection and Response Team (DRT) thoroughly examines every alert or combination of alerts that represent a significant threat. Elements Infinite’s proprietary Endpoint Detection & Response (EDR) agent and log collectors feed data into our XDR detection platform, offering exceptional visibility into user, endpoint, cloud, and network activities. The primary service components cover the environments external attack surface(s), identity management systems (Entra ID), physical endpoints, corporate networks and cloud environments (AWS, Azure). WithSecure is a premier European cyber security company dedicated to helping our customers achieve compliance and effectiveness the European way.
  • 13
    Infection Monkey Reviews
    Deploy the Infection Monkey within your network to rapidly identify vulnerabilities in your security framework. This tool provides a visual representation of your network from an attacker's perspective, highlighting the systems that have been compromised. By infecting a random machine, you can effortlessly uncover potential security weaknesses. It enables you to simulate various scenarios such as credential theft and compromised devices, among other threats. The assessment carried out by the Infection Monkey yields a comprehensive report, offering tailored remediation strategies for each affected machine in your network. Additionally, it presents an overview of immediate security concerns and identifies possible issues, along with a detailed map showcasing the breached systems. The report also includes specific mitigation recommendations, including segmentation and password configurations, ensuring that your network is fortified against future attacks. This proactive approach not only helps in patching current vulnerabilities but also enhances your overall security posture.
  • 14
    NeSSi2 Reviews
    In today's communication networks, IP-based systems are increasingly central to connectivity. The rapid expansion of these networks is driven by a diverse range of users, including businesses, government bodies, and private individuals, all of whom depend on advanced and intricate services for their communication needs. This surge in network use presents significant challenges for information security, as vast quantities of data—potentially containing harmful elements like worms, viruses, or Trojans—are transmitted across public networks. To combat these threats, network security strategies can be applied both within the network and at the individual hosts connected to access routers. Adopting a host-based security approach has distinct advantages, particularly in terms of scalability; for instance, implementing security measures such as firewalls or antivirus software on separate hosts allows for uninterrupted data flow across the network. This flexibility enhances overall security without compromising network performance.
  • 15
    EnSecure Reviews
    Strong multi-factor customer authentication designed for secure first time log-in, transaction signing, document verification protection. -Performance and reliability across all usage levels​ saving costs​ -Agile integration with Soft OTP and Electronic Certificate, rapid adjustments to meet evolving needs​ -Minimal maintenance with automated updates, continuous operation and reduced operational overhead​ -Optimized for high performance, fast, secure log-ins & transaction processing​ -Top-tier security with asymmetric signing technology, multi-factor authentication, safeguarding against fraud ​ Unlimited usage under single license, no additional ​ server costs​ -Seamless user-friendly experience, easy integration into mobile apps, intuitive authentication processes​
  • 16
    RevBits Zero Trust Network Reviews
    The RevBits Zero Trust Network, (ZTN), helps you isolate and protect your internal assets by moving the network perimeter to the endpoint. RevBits Zero Trust Network, (ZTN), moves the network perimeter to the user. This helps protect and isolate internal network assets without the need for complex network segmentation. RevBits ZTN is focused on protecting network resources, such as applications, services, accounts, and assets. It trusts no one by default, regardless of whether they are inside or outside the network. Implementing a zero-trust architecture is now easier than ever.
  • 17
    CrowdSec Reviews
    CrowdSec, a free, open-source, and collaborative IPS, analyzes behaviors, responds to attacks, and shares signals across the community. It outnumbers cybercriminals. Create your own intrusion detection system. To identify cyber threats, you can use behavior scenarios. You can share and benefit from a crowdsourced, curated cyber threat intelligence platform. Define the type and location of the remediation you wish to apply. Use the community's IP blocklist to automate your security. CrowdSec can be run on containers, virtual machines, bare metal servers, containers, or directly from your code using our API. Our cybersecurity community is destroying cybercriminals' anonymity. This is our strength. You can help us create and distribute a qualified IP blocklist that protects everyone by sharing IP addresses you have been annoyed by. CrowdSec can process massive amounts of logs faster than Fail2ban, and is 60x faster than Fail2ban.
  • 18
    Fabasoft Secomo Reviews
    Fabasoft Secomo represents a robust encryption framework that provides genuine end-to-end encryption, ensuring that the encryption process occurs directly on the workplace or mobile device rather than being handled in the cloud. This design guarantees that the communication remains secure from the sender to the recipient. Adhering to the principle of "Continuous protection through encryption," Fabasoft ensures that only you can access your Fabasoft Secomo and its configurations. Notably, Fabasoft does not have any interfaces to the device or your encryption keys. The system comprises Fabasoft Secomo software and two highly reliable servers within a network, equipped with hardware security modules that comply with FIPS 140-2 Level 4 standards for physical security. Additionally, Fabasoft Secomo allows for client certificate authentication, empowering you to determine who has the ability to access the security appliance and interact with encrypted documents. Designed for user-friendliness, Fabasoft Secomo also features its own dedicated management interface, making it easy to operate and manage. This comprehensive approach to encryption not only enhances security but also offers peace of mind for users handling sensitive information.
  • 19
    ProMDM Reviews
    ProMDM provides mobile device management solutions that provide end-to-end control over all mobile devices across the IT infrastructure. It uses standard MDM specifications for iOS and Android devices. Features: Security Management Profile/Configuration Management Compliance Management Services Device Management Management of Dynamic Groups based on AD/LDAP group, device attributes or manual Device Reporting Health Check Services Lifecycle Management Services Mobile Certificate Mngmt Services Automate administrative tasks with the Health check service Administration of the role base SSO with Client Certificate Authentication to Exchange, Sharepoint, and Web Sites iOS SSO with Kerberos Safari and Native Apps (integration with ADFS, websites directly) MAM - Mobile App Management Samsung KNOX support Document management - Managed Media Support Photo sync for Android Tracking and GPS location Android for Work Support (ProMDM is a Google Partner certified)
  • 20
    AhnLab TS Engine Reviews
    The AhnLab TS Engine Suite is a state-of-the-art integrative engine designed to effectively combat a diverse range of contemporary security threats, such as viruses, malicious software, Trojan horses, spyware, and phishing attempts. By offering the AhnLab TS Engine Suite API, it facilitates seamless integration and application across various types of software solutions, ensuring both flexibility and stability in your system's operations. Its customizable modules make it simple to implement within your environment or services, while providing robust anti-virus and anti-spyware protection. This suite plays a crucial role in safeguarding your system against malware and significantly reducing potential damage. Additionally, it guarantees the reliability and stability of your services, adapting gracefully to diverse operating systems and product types. With rapid and precise detection and remediation capabilities, the AhnLab TS Engine Suite stands out as a comprehensive solution for security management. Users can trust that their systems will remain secure and resilient against evolving threats.
  • 21
    AhnLab TMS Reviews
    The advanced network-integrated threat management platform delivers thorough threat analysis utilizing a robust big data processing framework, alongside proficient management of network security policies for various products. AhnLab TMS stands out as a comprehensive network threat management solution that oversees multiple devices, scrutinizes diverse threat data, and facilitates a cohesive response to integrated systems. As the landscape of network environments continues to expand, encompassing mobile and IoT devices, the evolution of security threats becomes increasingly complex. Consequently, there is a growing demand for a unified threat management platform capable of effectively addressing and adapting to these evolving challenges, as conventional solutions often fall short. This platform ensures streamlined policy management for all integrated devices, adeptly handles the collection and oversight of a vast array of events, and offers meticulous analysis to bolster security measures. Ultimately, organizations benefit from enhanced situational awareness and improved response capabilities in the face of emerging threats.
  • 22
    AhnLab CPP Reviews
    A growing number of companies are shifting their operations to cloud platforms to enhance their digital transformation efforts. This transition necessitates a novel security solution that offers centralized oversight and administration for workloads within these cloud environments. AhnLab CPP serves as a cohesive cloud workload protection platform that emphasizes delivering tailored security, streamlined management, and adaptability for workloads across hybrid settings. It ensures extensive visibility and straightforward management for workloads operating on both on-premise and cloud servers, including AWS and Azure environments. The platform facilitates effortless operation through a single web-based management interface. With its modular CPP management, it allows for flexible configurations based on specific business needs. Additionally, it helps reduce costs by permitting targeted installation and utilization of security solutions. Moreover, it offers real-time malware scanning capabilities for both Windows and Linux servers while maintaining minimal resource and performance impact, ensuring that businesses can operate efficiently in a secure environment. Ultimately, AhnLab CPP represents a critical tool for organizations striving to safeguard their cloud workloads while embracing the advantages of digital innovation.
  • 23
    AhnLab V3 Endpoint Security Reviews
    As the threat landscape evolves at a rapid pace, numerous organizations are finding it challenging to effectively implement and oversee endpoint security solutions while maintaining compliance and safeguarding their security integrity. AhnLab V3 Endpoint Security offers a robust range of endpoint protection that empowers businesses to secure their critical assets with enhanced confidence and agility. Recognized for its affordability and ease of use, AhnLab V3 Endpoint Security stands out among the top endpoint protection options available today. This solution is designed to utilize minimal system resources, allowing for efficient performance without compromising security. By leveraging this potent product, businesses can elevate their threat protection capabilities to new heights. Additionally, when integrated with AhnLab's central management system, it enables device control, providing extensive oversight of removable media, including USB drives, Bluetooth devices, and CD/DVDs. This comprehensive approach not only strengthens security but also streamlines device management across the organization.
  • 24
    FreeIPA Reviews
    Administer Linux users and client machines within your domain from a single, centralized interface, whether through a command-line interface, a web-based user interface, or remote procedure call access. Facilitate Single Sign-On capabilities across all your systems, services, and applications while establishing Kerberos-based authentication and authorization policies to safeguard your identities. Manage essential services such as DNS, SUDO, SELinux, and autofs efficiently. The solution encompasses a comprehensive security information management framework that integrates various components, including Linux (Fedora), 389 Directory Server, MIT Kerberos, NTP, DNS, and the Dogtag certificate system, among others. This platform is built upon well-established open-source technologies and adheres to standard protocols to ensure reliability and security. FreeIPA not only provides a web interface and command-line tools for administration but also streamlines user management and enhances system security across distributed environments. By utilizing such an integrated approach, organizations can maintain robust security measures while simplifying user access management.
  • 25
    Gophish Reviews
    Gophish is an effective, open-source phishing toolkit that simplifies the process of assessing your organization's vulnerability to phishing attacks. With Gophish, users can effortlessly create or import highly realistic phishing templates. The comprehensive web interface features a fully functional HTML editor, allowing for seamless customization of templates directly from your browser. Once a campaign is launched, phishing emails are dispatched automatically in the background, and users have the flexibility to schedule campaigns for any desired time. Results are provided in nearly real-time, and they can be exported for inclusion in reports. Gophish boasts an attractive web interface that enhances user experience. You can easily import pre-existing websites and emails, activate email open tracking, and perform various other tasks with just a single click. Additionally, Gophish continuously updates results, enabling users to monitor a timeline for each recipient that tracks email openings, link clicks, credential submissions, and more. Every aspect of Gophish is crafted to operate smoothly and efficiently. Its intuitive setup and user-friendly design make achieving impactful results feel almost effortless, leaving users with the impression that it operates like magic. This ease of use not only promotes a streamlined phishing test process but also fosters a deeper understanding of potential vulnerabilities within the organization.
MongoDB Logo MongoDB