Best IT Security Software for Linux - Page 6

Compare the Top IT Security Software for Linux as of July 2025 - Page 6

  • 1
    Cameyo

    Cameyo

    Cameyo

    Cameyo is the secure Virtual Application Delivery (VAD) platform for any Digital Workspace. Cameyo makes it simple, seamless, and secure to deliver Windows and internal web applications to any device from the browser without the need for virtual desktops or VPNs. By enabling organizations to provide their people with secure access to the business-critical apps they need to stay productive from anywhere, Cameyo helps make remote & hybrid work, work. Hundreds of enterprises and organizations utilize Cameyo’s Digital Workspace solution to deliver Windows and internal web applications to hundreds of thousands of users worldwide.
    Starting Price: $12.00/month/user
  • 2
    Graylog

    Graylog

    Graylog

    Built on the Graylog Platform, Graylog Security is the industry’s best-of-breed threat detection, investigation, and response (TDIR) solution. It simplifies analysts’ day-to-day cybersecurity activities with an unmatched workflow and user experience while simultaneously providing short- and long-term budget flexibility in the form of low total cost of ownership (TCO) that CISOs covet. With Graylog Security, security analysts can: 1. Decrease risk and metrics like mean time to detect (MTTD) by aligning threat detection coverage to meet your security objectives 2. Reduce TCO with native data routing and data tiering functionality 3. Reduce key metrics like mean time to respond (MTTR) by quickly resolving the alerts that matter. Graylog Security is a robust, scalable solution that empowers analysts to detect and respond to cybersecurity threats efficiently. With integrated SOAR functionality, it automates repetitive tasks, orchestrates workflows, and accelerates incident response.
    Starting Price: $1550/month (10GB per day)
  • 3
    AppScan

    AppScan

    HCLSoftware

    HCL AppScan is a suite of application security testing platforms, technologies, and services that help organizations detect and remediate vulnerabilities throughout the software development lifecycle (SDLC). Powerful static, dynamic, interactive, and open-source scanning engines (DAST, SAST, IAST, SCA, API) quickly and accurately test code, web applications, APIs, mobile applications, containers, and open-source components with the help of AI and machine learning capabilities. Centralized dashboards provide visibility, oversight, compliance policies, and reporting. HCL AppScan’s scanning engines are maintained by expert security researchers and are continuously updated to remain current with recent technologies, vulnerabilities, and attack vectors. With HCL AppScan, organizations can manage their application security posture and reduce risk across their entire software supply chain.
    Starting Price: $296
  • 4
    Linode

    Linode

    Linode

    Simplify your cloud infrastructure with our Linux virtual machines and robust set of tools to develop, deploy, and scale your modern applications faster and easier. Linode believes that in order to accelerate innovation in the cloud, virtual computing must be more accessible, affordable, and simple. Our infrastructure-as-a-service platform is deployed across 11 global markets from our data centers around the world and is supported by our Next Generation Network, advanced APIs, comprehensive services, and vast library of educational resources. Linode products, services, and people enable developers and businesses to build, deploy, and scale applications more easily and cost-effectively in the cloud.
    Starting Price: $5 per month
  • 5
    TraitWare

    TraitWare

    TraitWare

    TraitWare is Real Passwordless Multi-factor authentication (MFA) for True Zero Trust Access. TraitWare's enterprise-class, patented, plug-and-play solution combines Passwordless MFA and SSO – eliminating the need for usernames and passwords, while reducing friction for the user, and increasing security for your company. AND, you’ll save 60% or more on support budgets. With our QR solution, we can also eliminate the need for a username. Not only is our software convenient and easy to use, but it virtually eliminates vulnerabilities associated with traditional username and password logins. By replacing usernames and passwords we eliminate the ability to phish them. Leveraging our Direct login or our QR scan ties a user to the login, eliminating credential theft or sharing.
    Starting Price: $3 per month
  • 6
    AuthX

    AuthX

    AuthX

    The most advanced authentication platform in the world. Log in online anytime, anywhere with your face, finger, palm, push or any other modality we support. It’s secure authentication that is simple, smart and occasionally magical. Use Authx to on any system and into any application from anywhere. Use any capability to log in and change preferred methodology anytime you like. Authx is secure, scalable and extremely easy to use. Register once and use everywhere. Enjoy Authx with all the time-saving solutions you need to securely authenticate. Authx is always secure and reliable and our experts are here to support you 24/7. Use Authx Mobile for iOS and Android and push an authentication right to your phone. Log in with your Face, Finger or Palm. Authx Mobile enables you to authenticate with Push as well as biometrics on your phone. You can log into your applications with a simple touch of your access card or in range with BLE.
    Starting Price: $2.99 per month
  • 7
    isorobot

    isorobot

    isorobot

    isorobot is an intelligent business management software, connecting people, processes, technology, assets, and capital to your business goals. Using our experience to help you build efficient, scalable systems within your business. isorobot is a business performance management software which carries the solutions that aims at sustainable excellence in which innovation, quality, efficiency, and sustainability are the key elements. The solutions are categorized based on core business domains, organizational maturity for a steady start and scale approach. isorobot also has an enterprise version to go big from day one for matured businesses. The basis of the isorobot model consists of people, process, technology, assets, and capital domains of any organization. It consists of a universal framework of concepts, thus enabling organizations to share information in an effective way, irrespective of the different sectors, cultures, and life stages in which they are located.
    Starting Price: $225 per user per month
  • 8
    Ambassador

    Ambassador

    Ambassador Labs

    Ambassador Edge Stack is a Kubernetes-native API Gateway that delivers the scalability, security, and simplicity for some of the world's largest Kubernetes installations. Edge Stack makes securing microservices easy with a comprehensive set of security functionality, including automatic TLS, authentication, rate limiting, WAF integration, and fine-grained access control. The API Gateway contains a modern Kubernetes ingress controller that supports a broad range of protocols including gRPC and gRPC-Web, supports TLS termination, and provides traffic management controls for resource availability. Why use Ambassador Edge Stack API Gateway? - Accelerate Scalability: Manage high traffic volumes and distribute incoming requests across multiple backend services, ensuring reliable application performance. - Enhanced Security: Protect your APIs from unauthorized access and malicious attacks with robust security features. - Improve Productivity & Developer Experience
  • 9
    Pi-hole

    Pi-hole

    Pi-hole

    You can run Pi-hole in a container, or deploy it directly to a supported operating system via our automated installer. Our intelligent, automated installer asks you a few questions and then sets everything up for you. Once complete, move on to step 3. Configure your router’s DHCP options to force clients to use Pi-hole as their DNS server, or manually configure each device​ to use the Pi-hole as their DNS server. By pairing your Pi-hole with a VPN, you can have ad-blocking on your cellular devices, helping with limited bandwidth data plans. Instead of browser plugins or other software on each computer, install Pi-hole in one place and your entire network is protected. Network-level blocking allows you to block ads in non-traditional places such as mobile apps and smart TVs, regardless of hardware or OS. Since advertisements are blocked before they are downloaded, network performance is improved and will feel faster.
    Starting Price: Free
  • 10
    Dr.Web

    Dr.Web

    Doctor Web

    Dr.Web uses a variety of technologies to protect computers from malware, including: A signature-based scanner that identifies known malware by its code A heuristics engine that detects unknown malware by its behavior A firewall that protects against network attacks A spam filter that blocks unwanted email Parental controls that restrict children's access to the internet A file shredder that permanently deletes files Dr.Web has a good reputation for detecting and removing malware. It has been awarded a number of independent test certifications, including VB100% from Virus Bulletin. However, Dr.Web has also been criticized for its high system resource usage and its clunky user interface. Overall, Dr.Web is a reliable and effective antivirus program. It is a good choice for users who are looking for a comprehensive malware protection solution. However, it is important to note that Dr.Web can be resource-intensive and its user interface can be a bit clunky.
    Starting Price: €7.90
  • 11
    Acunetix

    Acunetix

    Invicti Security

    As the market leader in automated web application security testing, Acunetix by Invicti is the go-to security tool for Fortune 500 companies. DevSecOps teams can cut through the noise to uncover unseen risks and mitigate dangerous exploits, detecting and reporting on a wide array of vulnerabilities. With an industry-leading crawler that fully supports HTML5, JavaScript, and Single-page applications, Acunetix enables the auditing of complex, authenticated applications for deeper insight into an organization's risk posture. It's a leader for a reason: the technology behind Acunetix delivers the only product on the market that can automatically detect out-of-band vulnerabilities to enable comprehensive management, prioritization, and control for vulnerability threats by criticality. Plus, it's available both online and as an on-prem solution, integrating with popular issue trackers and WAFs so that DevSecOps teams don't have to slow down when building innovative apps.
  • 12
    Cequence Security

    Cequence Security

    Cequence Security

    Start analyzing and protecting your APIs with passive, inline or API-based integration with any existing network component – API gateway, proxy, CDN or ingress controller. Predefined policies, fine-tuned using threat patterns observed in protecting billions of API transactions per day delivers unmatched, out-of-the-box protection. A rich user interface and an open, API-based architecture enables integration with threat intelligence feeds, CI/CD framework tools, other security components, and SIEM/SOAR/XDR solutions. Patented ML-based analysis eliminates JavaScript and SDK integration pen-alties such as extended development cycles, slow page loads and forced mobile-app upgrades. ML-based analysis generates a unique Behavioral Fingerprint to determine malicious intent and continually tracks attackers as they retool.
  • 13
    Zivver

    Zivver

    ZIVVER

    Zivver is the effortless, smart, secure digital communications platform powering the next generation of secure digital communications. Trusted by over 5,000 organizations globally, Zivver prevents data leaks caused by human error and ensures compliance. Zivver seamlessly integrates with all major email clients including Gmail, Outlook, and Microsoft 365 and features unparalleled zero-keys encryption, with smart features such as contextual machine learning powered business rules. Zivver allows anyone to share large files up to 5TB securely via their existing email client. Zivver is fully compliant with all leading data security standards, including ISO 27001, NTA 7516, GDPR, HIPPA.
    Starting Price: 0.99€/month/user
  • 14
    Portnox Security

    Portnox Security

    Portnox Security

    Portnox CLEAR is the only cloud-native network access control (NAC) solution that unifies essential network and endpoint security capabilities: device discovery, network authentication, access control, network hardware administration, risk mitigation and compliance enforcement. As a cloud service, Portnox CLEAR eliminates the need for on-going maintenance such as upgrades and patches and requires no on-site appliances. As such, the platform can be easily deployed, scaled and managed by lean, resource-constrained IT teams across any corporate network - no matter how complex.
  • 15
    ThreatDefence

    ThreatDefence

    ThreatDefence

    Our XDR (Extended Detection and Response) cyber security platform provides deep visibility and threat detection across your endpoints, servers, cloud and your digital supply chain. We deliver the platform to you as fully managed service supported by our 24×7 Security Operations, with low cost and fastest enrollment time in the industry. Our platform is the foundation of effective cyber threat detection and response services. Providing deep visibility, great threat detection, sophisticated behavior analytics and automated threat hunting, the platform adds efficiency and value to your security operations capability. Leveraging our proprietary detection methodologies, including AI-empowered machine learning, our platform uncovers suspicious and anomalous behavior revealing even the most hidden threats. The platform creates high fidelity detections, flagging real threats and assisting SOC analysts and investigators to focus on what really matters.
    Starting Price: $5 per user per month
  • 16
    Jit

    Jit

    Jit

    DevOps ain’t easy! We are hearing more and more about the breakdown and friction where Dev meets Ops, so let’s not even talk about all the other shift-left domains that add another layer of complexity in the middle like DevSecOps. Where this comes with the need to implement and integrate dozens of security tools in their SDLC. But what if it doesn’t have to be difficult? Jit's DevSecOps Orchestration Platform allows high-velocity Engineering teams to own product security while increasing dev velocity. With a unified and friendly developer experience, we envision a world where every cloud application is born with Minimal Viable Security (MVS) embedded and iteratively improves by adding Continuous Security into CI/CD/CS.
  • 17
    Seraphic

    Seraphic

    Seraphic Algorithms

    Seraphic can secure any version of any browser on any device to prevent phishing, spear-phishing, clickjacking, CSS injection, man-in-the-middle, and Zero-day and unpatched N-Day attacks that other vendors cannot. This means that your end-users can leverage any combination of browsers they prefer and you can centrally manage corporate policy and governance for browsing as well as enterprise/private apps and SaaS environments. Seraphic also includes robust policy and governance controls including state of the art DLP engines that scans all outbound and inbound data in any format for any file with a complete privacy first approach.
  • 18
    Backslash Security
    Ensure the security of your code and open sources. Identify externally reachable data flows and vulnerabilities for effective risk mitigation. By identifying genuine attack paths to reachable code, we enable you to fix only the code and open-source software that is truly in use and reachable. Avoid unnecessary overloading of development teams with irrelevant vulnerabilities. Prioritize risk mitigation efforts more effectively, ensuring a focused and efficient security approach. Reduce the noise CSPM, CNAPP, and other runtime tools create by removing unreachable packages before running your applications. Meticulously analyze your software components and dependencies, identifying any known vulnerabilities or outdated libraries that could pose a threat. Backslash analyzes both direct and transitive packages, ensuring 100% reachability coverage. It outperforms existing tools that solely focus on direct packages, accounting for only 11% of packages.
  • 19
    Reporter

    Reporter

    Security Reporter

    Security Reporter functions as an all-encompassing pentest reporting and collaboration platform, streamlining the complete pentest life cycle. By automating critical elements, it empowers security teams to enhance efficiency and provide actionable findings. The software boasts various features, including customizable reports, assessments, analytics and seamless integrations. This integration capability brings diverse tools under a unified source of truth, expediting remediation and optimizing the impact of security services and strategies. Minimize research time for repetitive tasks and formatting associated with security assessments and reporting using Security Reporter. Rapidly document findings based on templates or past discoveries. Effortlessly engage with clients by commenting, arranging retests, and discussing findings. With over 140+ tools integrated, leverage unique analytics and a multilanguage feature to generate reports in all languages.
  • 20
    TurnKey Lender

    TurnKey Lender

    TurnKey Lender

    TurnKey Lender is a one-stop lending infrastructure used by creditors in 50+ countries to automate all elements of their operations. The platform enables lenders to profitably grow their business while cutting operational costs and risks. It's a powerful AI-driven SaaS that automates over 90% of all lending processes and gives both B2C and B2B lenders a competitive edge. TurnKey Lender Platform has several pre-configured solutions packages including Commercial, Consumer, Pay Later, Auto, Mortgage, Leasing, Factoring. Built in constant collaboration with lenders worldwide, TurnKey Lender is the ultimate solution that answers real-life digital lending challenges in a sophisticated manner.
  • 21
    Endpoint Protector
    Endpoint Protector is an advanced, all-in-one Data Loss Prevention solution for Windows, macOS and Linux, that puts an end to data leaks and data theft and offers seamless control of portable storage devices. Endpoint Protector’s filtering capabilities for data at rest and in motion range from file type to predefined content based on dictionaries, regular expressions or data protection regulations such as GDPR, PCI DSS, CCPA, HIPAA, etc. Endpoint Protector features several specialized modules that can be mixed and matched based on client needs. The modules comprise: Content Aware Protection, Device Control, Enforced Encryption, and eDiscovery . It makes work more convenient, secure and enjoyable, offering an excellent ROI.
  • 22
    Zerto

    Zerto

    Zerto

    Zerto helps customers accelerate IT transformation by eliminating the risk and complexity of modernization and cloud adoption. By replacing multiple legacy solutions with a single IT Resilience Platform, Zerto is changing the way disaster recovery, backup and cloud are managed. At enterprise scale, Zerto’s software platform delivers continuous availability for an always-on customer experience while simplifying workload mobility to protect, recover and move applications freely across hybrid and multi-clouds. Zerto is trusted by over 6,000 customers globally and is powering resiliency offerings for Microsoft Azure, IBM Cloud, AWS, SunGard AS and more than 350 cloud services providers. Learn more at www.zerto.com
  • 23
    OpenIAM

    OpenIAM

    OpenIAM

    Identity Governance and Web Access Management. As new employees join your organization, you face the conundrum of ensuring that they are given rights to all the systems and resources they need to do their work on the day they join the firm. Similarly, when a person changes positions within the firm, access that is no longer relevant must be revoked and access that is needed for their new position must be granted. For the situation of users leaving the firm or being terminated, it is even more imperative that permissions be addressed. Access to sensitive applications and data must be disabled/removed in a timely manner with traceability to avoid the consequences of a disgruntled user.
  • 24
    SailPoint

    SailPoint

    SailPoint Technologies

    You can’t do business without technology and you can’t securely access technology without identity security. In today’s era of “work from anywhere”, managing and governing access for every digital identity is critical to the protection of your business and the data that it runs on. Only SailPoint Identity Security can help you enable your business and manage the cyber risk associated with the explosion of technology access in the cloud enterprise – ensuring each worker has the right access to do their job – no more, no less. Gain unmatched visibility and intelligence while automating and accelerating the management of all user identities, entitlements, systems, data and cloud services. Automate, manage and govern access in real-time, with AI-enhanced visibility and controls. Enable business to run with speed, security and scale in a cloud-critical, threat-intensive world.
  • 25
    Silverfort

    Silverfort

    Silverfort

    Silverfort’s Unified Identity Protection Platform is the first to consolidate security controls across corporate networks and cloud environments to block identity-based attacks. Using innovative agentless and proxyless technology, Silverfort seamlessly integrates with all existing IAM solutions (e.g., AD, RADIUS, Azure AD, Okta, Ping, AWS IAM), extending coverage to assets that could not previously have been protected, such as legacy applications, IT infrastructure, file systems, command-line tools, and machine-to-machine access. Our platform continuously monitors all access of users and service accounts across both cloud and on-premise environments, analyzes risk in real time, and enforces adaptive authentication and access policies.
  • 26
    pfSense

    pfSense

    Netgate

    The pfSense project is a free network firewall distribution, based on the FreeBSD operating system with a custom kernel and including third party free software packages for additional functionality. pfSense software, with the help of the package system, is able to provide the same functionality or more of common commercial firewalls, without any of the artificial limitations. It has successfully replaced every big name commercial firewall you can imagine in numerous installations around the world, including Check Point, Cisco PIX, Cisco ASA, Juniper, Sonicwall, Netgear, Watchguard, Astaro, and more.
  • 27
    Mullvad VPN
    You have a right to privacy. In a society increasingly determined to erode that right, a fast, trustworthy and easy-to-use VPN is a good first step toward reclaiming it. When you connect to the internet with Mullvad, we ensure that the traffic to and from your computer is encrypted to the highest standards even if you are using a public WiFi network at a cafe or hotel. We keep no activity logs, do not ask for personal information, and even encourage anonymous payments via cash or one of the cryptocurrencies we accept. Your IP address is replaced by one of ours, ensuring that your device's activity and location are not linked to you. Using Mullvad is straightforward and simple – just download and install the app. You won't need to waste time with setup configurations or a multi-step registration process. We built Mullvad with ease of use in mind. Privacy is fundamental to a well-functioning society because it allows norms, ethics, and laws to be safely discussed and challenged.
  • 28
    Parrot OS

    Parrot OS

    Parrot Security

    Parrot is a worldwide community of developers and security specialists that work together to build a shared framework of tools to make their job easier, standardized and more reliable and secure. Parrot OS, the flagship product of Parrot Security is a GNU/Linux distribution based on Debian and designed with Security and Privacy in mind. It includes a full portable laboratory for all kinds of cyber security operations, from pentesting to digital forensics and reverse engineering, but it also includes everything needed to develop your own software or keep your data secure. Always updated, frequently released with many hardening and sandboxing options available. Everything is under your complete control. Feel free to get the system, share with anyone, read the source code and change it as you want! this system is made to respect your freedom, and it ever will be.
  • 29
    Fortinet

    Fortinet

    Fortinet

    Fortinet is a global leader in cybersecurity solutions, known for its comprehensive and integrated approach to safeguarding digital networks, devices, and applications. Founded in 2000, Fortinet provides a wide range of products and services, including firewalls, endpoint protection, intrusion prevention systems, and secure access solutions. At the core of its offerings is the Fortinet Security Fabric, a unified platform that seamlessly integrates security tools to deliver visibility, automation, and real-time threat intelligence across the entire network. Trusted by businesses, governments, and service providers worldwide, Fortinet emphasizes innovation, scalability, and performance, ensuring robust defense against evolving cyber threats while supporting digital transformation and business continuity.
  • 30
    Lockystar

    Lockystar

    Lockystar

    Lockystar is a file encryption application. It allows you to encrypt individual files wherever they are: in your cloud or on your hard drive. It's an easy-to-use application, whose goal is to provide a robust security solution to as many people as possible. Lockystar is zero-knowledge and uses end-to-end encryption: no one but you can decrypt your files.