Suggested Categories:

IT Security Software
IT security software is designed to protect information technology (IT) systems, networks, and data from cyber threats, such as malware, hacking, and unauthorized access. These tools provide various features such as antivirus protection, firewalls, encryption, intrusion detection and prevention systems, and vulnerability management to ensure the integrity, confidentiality, and availability of sensitive information. IT security software helps organizations detect, prevent, and respond to security incidents, mitigate risks, and ensure compliance with industry regulations. It is critical for businesses and individuals to safeguard against cyberattacks, data breaches, and other security vulnerabilities.
IoT Security Software
IoT (Internet of Things) security software is designed to protect connected devices and networks from cyber threats, ensuring the confidentiality, integrity, and availability of data transmitted between IoT devices. These tools monitor and secure devices, applications, and networks that are part of the IoT ecosystem, which includes sensors, actuators, smart appliances, wearables, and industrial equipment. IoT security software includes features such as threat detection, data encryption, access control, device authentication, and vulnerability management to mitigate risks from cyberattacks, unauthorized access, and data breaches. It is essential for industries like healthcare, manufacturing, transportation, and smart cities, where the IoT devices are widely used and often contain sensitive or critical data.
Data Center Security Software
Data center security software enables IT security professionals and organizations to secure their data center infrastructure including racks, networks, server endpoints, and more. Data center security tools provide all aspects of security for data centers. Data center security software helps protect the physical and virtual infrastructure of data centers from unauthorized access, cyber threats, and data breaches. Data center security software ensures that sensitive information and critical systems are safeguarded from external and internal threats by providing real-time alerts, logging activities, and implementing compliance with security standards.
Application Security Software
Application security software is designed to protect applications from cyber threats by identifying vulnerabilities, preventing attacks, and ensuring data integrity throughout the application’s lifecycle. This software typically includes features like static and dynamic analysis, runtime protection, and vulnerability scanning to detect and address potential security issues such as SQL injection, cross-site scripting (XSS), and unauthorized access. It helps organizations maintain secure applications by implementing best practices for secure coding, performing penetration testing, and monitoring for security breaches. Application security software is crucial for organizations to safeguard sensitive data, comply with regulations, and minimize the risk of exploitation.
Website Security Software
Website security software protects websites from cyber threats such as malware, hacking attempts, DDoS attacks, and data breaches. It continuously monitors website traffic, scans for vulnerabilities, and blocks suspicious activity in real time. Many solutions include firewalls, bot protection, SSL management, and automated malware removal to keep sites safe and compliant. Website security software also provides dashboards and reports to help teams understand risks and stay ahead of emerging threats. Overall, it ensures websites remain fast, secure, and trustworthy for users.
Cloud Security Software
Cloud security software consists of tools, software, and services designed to protect data, applications, and infrastructure associated with cloud environments. It addresses unique security challenges posed by the cloud, such as data breaches, unauthorized access, and compliance with regulatory standards. These solutions often include features like encryption, identity and access management, intrusion detection systems, and security information and event management (SIEM). By implementing cloud security software, organizations can safeguard their cloud-based assets from cyber threats and ensure the integrity and confidentiality of sensitive information. As businesses increasingly adopt cloud services, robust cloud security measures have become essential for maintaining operational continuity and customer trust.
Database Security Software
Database security software tools enable organizations to secure their databases, and ensure security compliance with database operations.
Data Security Software
Data security software is designed to protect sensitive data from unauthorized access, theft, or corruption. It includes a variety of tools and features such as encryption, access control, data masking, and backup and recovery to ensure that data remains secure at rest, in transit, and during processing. These solutions help organizations comply with data protection regulations, such as GDPR and HIPAA, by safeguarding personal, financial, and business data. Data security software often integrates with other IT security systems to provide comprehensive protection against cyberattacks, insider threats, and data breaches, ensuring that critical information remains protected.
Network Security Software
Network security software is a type of software that helps protect computers, networks, and data from malicious attacks and unauthorized access. It is typically used by businesses to protect their confidential information and keep systems safe. It can also be used by individuals to protect their personal information and devices from potential threats.
API Security Software
API security software is designed to protect APIs from security threats such as unauthorized access, data breaches, and denial-of-service attacks. These tools monitor, authenticate, and secure the connections between APIs and the systems they interact with, ensuring that only authorized users and systems can access the data or services offered by the API. Features typically include encryption, rate limiting, authentication (such as OAuth, JWT), API traffic monitoring, threat detection, and automated security testing. API security software is crucial for businesses that rely on APIs to connect with third-party services, mobile apps, or microservices, as it helps mitigate risks and maintain data integrity.
Computer Security Software
Computer security software helps protect devices, networks, and sensitive data from unauthorized access, cyberattacks, and other security threats. These tools provide a range of protective features such as antivirus, firewall, encryption, malware detection, and intrusion prevention systems. Computer security software is essential for safeguarding against viruses, ransomware, spyware, and phishing attacks, ensuring the integrity, confidentiality, and availability of data. Many security solutions also offer real-time monitoring, automated updates, and threat intelligence to detect and mitigate new vulnerabilities as they emerge. Businesses and individuals rely on computer security software to reduce risks, comply with regulations, and maintain a secure computing environment.
Container Security Software
Container security software is software designed to protect containerized applications and environments from security vulnerabilities, threats, and attacks. Containers, which are used to deploy and run applications in isolated environments, present unique security challenges due to their dynamic and ephemeral nature. Container security software helps secure containerized environments by providing capabilities such as vulnerability scanning, runtime protection, access control, and image security. These tools monitor container configurations and activity to detect anomalies, ensure compliance with security policies, and mitigate risks like container escapes or unauthorized access. By enhancing the security of containers and container orchestration platforms (like Kubernetes), these solutions enable organizations to securely deploy and manage applications in cloud-native and microservices environments.
Physical Security Software
Physical security software is a suite of tools designed to manage and monitor the security of physical spaces, assets, and individuals within an organization. These platforms often integrate with hardware systems such as access control systems, surveillance cameras, alarms, and sensors to provide a comprehensive security solution. Features of physical security software can include real-time monitoring, incident reporting, visitor management, access control, and remote security management. The software can also provide detailed analytics on security incidents, track access logs, and manage emergency response protocols. By helping organizations secure their physical premises, physical security software enhances safety, prevents unauthorized access, and ensures regulatory compliance.
Email Security Software
Email security software protects organizations from cyber threats such as phishing, malware, and spam by filtering incoming and outgoing email traffic. It uses advanced threat detection, encryption, and data loss prevention (DLP) to safeguard sensitive information. These tools also offer features like email authentication (DMARC, SPF, DKIM) and real-time threat intelligence to block emerging attacks. By securing email communications, businesses can prevent data breaches, ensure regulatory compliance, and maintain user trust. Email security software is essential for mitigating human error, which is one of the leading causes of data breaches.
Secure Web Gateways
Secure web gateways protect users and organizations from online threats by monitoring and controlling web traffic between internal networks and the internet. They filter malicious websites, block unauthorized access, and prevent data leaks by enforcing security policies in real time. These gateways use technologies such as URL filtering, malware scanning, sandboxing, and data loss prevention to safeguard users across devices and locations. Cloud-based versions extend protection to remote and hybrid workforces without relying on traditional network perimeters. Ultimately, secure web gateways ensure safe, compliant, and controlled internet access while maintaining high performance and user productivity.
Security Awareness Training Programs
Security awareness training programs are platforms designed to help employees, partners, and other stakeholders recognize and respond to security threats and best practices. These programs typically focus on topics like phishing, password management, data protection, and secure browsing habits, aiming to create a culture of security within an organization. By providing interactive modules, quizzes, and real-world scenarios, these programs ensure that participants can identify potential risks and mitigate them effectively. Many security awareness training platforms offer tracking and reporting features, allowing organizations to monitor progress and measure the effectiveness of their training efforts. The goal is to reduce the likelihood of security breaches caused by human error and ensure that individuals are well-informed about their role in maintaining cybersecurity.
Zero Trust Security Software
Zero trust security software, also known as zero trust networking software, provides a security solution based on the zero trust methodology. Zero trust security solutions enable organizations to enforce security policies on a "zero trust" basis for both internal and external users, and allow security teams to track, monitor, and analyze user behavior and usage across the network to identify potential threats.
Cloud Access Security Brokers (CASB)
Cloud Access Security Brokers (CASBs) are software applications that sit between a cloud service provider and an organization. Their purpose is to provide visibility and control over the use of cloud services, ensuring that data remains secure while enabling users to access the resources they need from any device. CASBs operate in real-time and can be used with multiple cloud platforms, such as SaaS, IaaS, or PaaS. They also provide granular access controls on user activities within the cloud system, allowing administrators to create rules around data sharing.
DNS Security Software
DNS security software enables organizations to protect their DNS against threats and malware. DNS security solutions streamline the process of securing DNS servers against attacks.
Security Compliance Software
Security compliance software enables organizations to manage, track, and comply with cybersecurity compliance regulations and frameworks. Security compliance software provides tools for companies to audit their security posture and policies and achieve compliance certifications such as ISO 27001, ISO 27002, ISO 27017, CSA STAR, SOC 2, PCI DSS, FedRAMP, NIST 800-171, NIST 800-53, and more.
View more categories (20) for "linux secure"

73 Products for "linux secure" with 2 filters applied:

  • 1
    Unimus

    Unimus

    NetCore j.s.a. (Unimus)

    Unimus is a powerful, on-premise Network Automation and Configuration Management (NCM) solution designed for fast deployment and ease of use. As one of the most versatile NCM solutions available, it simplifies network management with features such as: 🔹 Disaster Recovery – Automated configuration backups ensure business continuity. 🔹 Change Management – Detect, review, and audit configuration changes with real-time notifications. 🔹 Configuration Auditing – Instantly search and validate...
    Leader badge
    Starting Price: $5.90 per device per year
    View Software
    Visit Website
  • 2
    Control D

    Control D

    Control D

    Control D is a customizable DNS filtering and traffic redirection platform that leverages Secure DNS protocols like DNS-over-HTTPS, DNS-over-TLS and DNS-over-QUIC, with support for Legacy DNS. - Block malicious threats - Block unwanted types of content network wide (ads & trackers, IoT telemetry, adult content, socials, and more) - Deploy in minutes on fleets of devices using RMM - Manage clients using sub-organizations - Gain visibility on network events and usage patterns, with...
    Leader badge
    Starting Price: $2/month
    View Software
    Visit Website
  • 3
    ThreatLocker

    ThreatLocker

    ThreatLocker

    The ThreatLocker suite of security tools are powerful and designed so that everyone from businesses to government agencies to academic institutions can directly control exactly what applications run on their networks. We envision a future in which all organizations can chart their own course free from the influence of cybercriminals and the damage their incursions cause, and our team of veteran cybersecurity professionals created ThreatLocker to make this vision a reality. The team at...
    Leader badge
    Partner badge
    View Software
    Visit Website
  • 4
    NinjaOne

    NinjaOne

    NinjaOne

    NinjaOne automates the hardest parts of IT, delivering visibility, security, and control over all endpoints for more than 20,000 customers. The NinjaOne automated endpoint management platform is proven to increase productivity, reduce security risk, and lower costs for IT teams and managed service providers. The company seamlessly integrates with a wide range of IT and security technologies. NinjaOne is obsessed with customer success and provides free and unlimited onboarding, training,...
  • 5
    New Relic

    New Relic

    New Relic

    There are an estimated 25 million engineers in the world across dozens of distinct functions. As every company becomes a software company, engineers are using New Relic to gather real-time insights and trending data about the performance of their software so they can be more resilient and deliver exceptional customer experiences. Only New Relic provides an all-in-one platform that is built and sold as a unified experience. With New Relic, customers get access to a secure telemetry cloud for...
    Leader badge
    Starting Price: Free
  • 6
    Site24x7

    Site24x7

    ManageEngine

    ManageEngine Site24x7 is a comprehensive observability and monitoring solution designed to help organizations effectively manage their IT environments. It offers monitoring for back-end IT infrastructure deployed on-premises, in the cloud, in containers, and on virtual machines. It ensures a superior digital experience for end users by tracking application performance and providing synthetic and real user insights. It also analyzes network performance, traffic flow, and configuration...
    Leader badge
    Starting Price: $9.00/month
  • 7
    NordVPN

    NordVPN

    Nord Security

    We help companies keep their networks and Internet connections secure. Our VPN service adds an extra layer of protection to secure your communications. We do this by applying strong encryption to all incoming and outgoing traffic so that no third parties can access your confidential information. Protect your organization against security breaches. Secure remote team access. Simplify business network security. Access region-specific online content from anywhere in the world
    Leader badge
    Starting Price: $3.29/month
  • 8
    CacheGuard

    CacheGuard

    CacheGuard Technologies

    CacheGuard-OS transforms a virtual or bare metal machine into a powerful and easy to handle network appliance. It's a Linux based Operating System built from scratch and especially designed to Secure and Optimize the network traffic. Great care has been taken by CacheGuard-OS developers to select the best of the best Open Source technologies to integrate into CacheGuard-OS. The result is a robust and trustworthy solution that can be up and running within minutes. ...
    Starting Price: $9.99 per month
  • 9
    Atera

    Atera

    Atera

    Atera, the first and only Agentic AI platform for IT management, offers IT teams and MSPs a digital workforce of AI agents to preemptively and autonomously manage their entire IT operations. Its all-in-one platform combines RMM, helpdesk, ticketing, and automation to reduce downtime, improve SLAs, and free IT teams to focus on strategic work over mundane tasks. At the core of Atera’s platform are two powerful AI agents built to enhance every layer of IT operations. AI Copilot helps...
    Leader badge
    Starting Price: 30-DAY FREE TRIAL
  • 10
    Barracuda Secure SD-WAN
    Unlike SD-WAN solutions that only provide connectivity—requiring a separate security solution—Barracuda CloudGen Firewall combines a complete set of SD-WAN capabilities with advanced, multi-layered security technologies in a single unit.
  • 11
    Proton VPN

    Proton VPN

    Proton AG

    Protect your business against damaging data breaches and easily comply with security frameworks like ISO 27001, GDPR, and HIPAA. Our software-only virtual private network easily integrates with your existing infrastructure to provide a flexible and scalable way to protect your organization. With our VPN Professional plan, you can securely access your LAN and SaaS resources by assigning and segmenting permissions to private dedicated VPN servers, allowing employees to access only what they...
    Starting Price: $6.99/user/month
  • 12
    Cloudbrink

    Cloudbrink

    Cloudbrink

    If you’ve ever dealt with slow VPNs, or clunky ZTNA agents that degrade app performance, you’re not alone. Many IT teams are stuck balancing security with usability—and often end up sacrificing both. Here is a different approach. The high-performance ZTNA service that is part of a personal SASE solution from Cloudbrink can upgrade or replace traditional VPNs while fixing the performance and complexity that come from other vendors in the ZTNA and SASE space. Built as a software-only...
  • 13
    UTunnel VPN and ZTNA
    UTunnel provides Cloud VPN, ZTNA, and Mesh Networking solutions for secure remote access and seamless network connectivity. ACCESS GATEWAY: Our Cloud VPN as a Service offers swift deployment of Cloud or On-Premise VPN servers. It utilizes OpenVPN and IPSec protocols, enables policy-based access control, and lets you deploy a Business VPN network effortlessly. ONE-CLICK ACCESS: A Zero Trust Application Access (ZTAA) solution that simplifies secure access to internal business...
    Leader badge
    Starting Price: $6/user/month
    Partner badge
  • 14
    Private Internet Access (PIA)

    Private Internet Access (PIA)

    Private Internet Access

    Browse anonymously with a private IP, and enable strong encryption to protect yourself from your ISP and public Wi-Fi networks. Enjoy unrestricted access to our anonymous VPN network. Unlock any geographic restrictions and protocol filters. Whether you're browsing or streaming, Private Internet Access will deliver. Private Internet Access has the largest network capacity across the globe to provide the highest speeds and most encryption. Private Internet Access is the only proven no-log VPN...
    Starting Price: $2.19 per month
  • 15
    Enginsight

    Enginsight

    Enginsight

    ...Automatic detection and unlimited IP inventory of all network devices, as well as their classification. Enginsight provides a comprehensive solution for monitoring and securing your Windows servers, Linux servers and end devices such as Windows PCs or Linux . Start your 15 day free trial now.
    Starting Price: $12.99 per month
  • 16
    Domotz

    Domotz

    Domotz

    Domotz is an IT Infrastructure Monitoring and Management Software on a mission to provide all service providers, MSPs, integrators, and enterprises with affordable network monitoring software that enables you to work smarter, build customer loyalty, and solve problems faster than ever. Domotz enables the complete solution to cost-effectively manage and monitor your customers’ networks with a plug-and-play setup, a friendly UX, and a comprehensive feature set accessible from any desktop...
  • 17
    OpenVPN

    OpenVPN

    OpenVPN

    Access Server gives you the ability to rapidly deploy a secure remote access solution with a web-based administration interface — all on general purpose computing hardware or virtual machines. Your team will have access to the built-in OpenVPN Connect App and bundled connection profiles. All without adding a ton of extra work to your IT to-do list. OpenVPN Access Server is a full-featured SSL self-hosted VPN software solution that integrates OpenVPN server capabilities, enterprise management capabilities, simplified OpenVPN Connect UI, and OpenVPN Client software packages that accommodate Windows, MAC, and Linux, mobile OS (Android and iOS) environments. ...
    Starting Price: Free Up to 3 Users
  • 18
    Portnox Security

    Portnox Security

    Portnox Security

    Portnox CLEAR is the only cloud-native network access control (NAC) solution that unifies essential network and endpoint security capabilities: device discovery, network authentication, access control, network hardware administration, risk mitigation and compliance enforcement. As a cloud service, Portnox CLEAR eliminates the need for on-going maintenance such as upgrades and patches and requires no on-site appliances. As such, the platform can be easily deployed, scaled and managed by...
  • 19
    HideMyAss
    ...Install HMA VPN on as many Windows, macOS, iOS, Android, and Linux devices as you want, and keep multiple connected at once: 5 normally, or 10 with the Family Plan. You can even set HMA up on your router to cover your whole home.
  • 20
    S3M Security Network Access Control
    S3M Security is a cybersecurity company that focuses on software development and provides value added services in network and information security. Founded by people with more than 20 years of experience in the industry, S3M Security operates in the USA, Europe and EMEA regions. Our team continues to develop new approaches and solutions every day to provide secure environments for organizations against increasing cyber threats and attacks.
  • 21
    ZeroTier

    ZeroTier

    ZeroTier

    ZeroTier simplifies global networking with a secure network overlay that connects and manages all your resources as if they were on the same LAN. Deployable in minutes from anywhere, our software-defined solution scales effortlessly, whether you’re connecting a handful of devices or an entire global network. With ZeroTier, you can: Establish private global networks for IoT deployments. Simplify networking across physical locations with software-defined solutions. Replace...
    Starting Price: $2/device per month
  • 22
    OPNsense

    OPNsense

    OPNsense

    Simple packet filters are becoming a thing of the past. Even the open-source domain is moving towards Next-Generation Firewalls. And OPNsense is a top player when it comes to intrusion detection, application control, web filtering, and anti-virus. No network is too insignificant to be spared by an attacker. Even home networks, washing machines, and smartwatches are threatened and require a secure environment. Firewalls are a component of the security concept. They protect against known and...
    Starting Price: Free
  • 23
    NordLayer

    NordLayer

    Nord Security

    NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. We help organizations of all sizes to fulfill scaling and integration challenges when building a modern secure remote access solution within an ever-evolving SASE framework. Quick and easy to integrate with existing infrastructure, hardware-free, and designed with ease of scale in mind, NordLayer meets the varying growth pace and ad-hoc...
    Starting Price: $8 per user per month
  • 24
    Arkime

    Arkime

    Arkime

    Arkime is an open source, large-scale, full packet capturing, indexing, and database system designed to augment existing security infrastructure by storing and indexing network traffic in standard PCAP format. It offers full network visibility, facilitating the swift identification and resolution of security and network issues. Security teams gain access to the necessary network visibility data essential for responding to and investigating incidents to expose the full attack scope. Designed...
    Starting Price: Free
  • 25
    VirtualMetric

    VirtualMetric

    VirtualMetric

    VirtualMetric is a powerful telemetry pipeline solution designed to enhance data collection, processing, and security monitoring across enterprise environments. Its core offering, DataStream, automatically collects and transforms security logs from a wide range of systems such as Windows, Linux, MacOS, and Unix, enriching data for further analysis. By reducing data volume and filtering out non-meaningful logs, VirtualMetric helps businesses lower SIEM ingestion costs, increase operational efficiency, and improve threat detection accuracy. ...
    Starting Price: Free
  • 26
    Big Network

    Big Network

    Big Network

    Big Network securely and simply connects networks and services between people, places, clouds and devices anywhere. We combine easy button simplicity for mesh-vpn, sdwan and cloud services. Big Network also provides broadband services, a cloud marketplace and a partner ecosystem. 83% of businesses will continue operating with hybrid workforces according to Accenture. Big Network provides the tools to securely and simply connect networks and services between users, teams, offices, homes,...
    Starting Price: $100 per month
  • 27
    NetScaler

    NetScaler

    Cloud Software Group

    Application delivery at scale can be complex. Make it simpler with NetScaler. Firmly on-prem. All-in on cloud. Good with hybrid. Whichever you choose, NetScaler works the same across them all. NetScaler is built with a single code base using a software-based architecture, so no matter which ADC form factor you choose — hardware, virtual machine, bare metal, or container — the behavior will be the same. Whether you are delivering applications to hundreds of millions of consumers, hundreds...
  • 28
    DataBahn

    DataBahn

    DataBahn

    DataBahn.ai is redefining how enterprises manage the explosion of security and operational data in the AI era. Our AI-powered data pipeline and fabric platform helps organizations securely collect, enrich, orchestrate, and optimize enterprise data—including security, application, observability, and IoT/OT telemetry—for analytics, automation, and AI. With native support for over 400 integrations and built-in enrichment capabilities, DataBahn streamlines fragmented data workflows and...
  • 29
    CloudView NMS

    CloudView NMS

    CloudView NMS

    ...It provides consistent geographical and logical view of your network (thousands of IP nodes), configuration, monitoring and troubleshooting. Full FCAPS functionality per TMN standards is provided, so it can be used in both enterprise and service provider networks with carrier-grade reliability and secure (over HTTPS/SSH) access for multiple concurrent users/operators with different profiles . The functions include network monitoring/management, server monitoring, apps/IoT monitoring, SCADA monitoring, network operations automation, website monitoring and much more. CloudView NMS scales for any network size. It is supported on multiple platforms, including Windows, Linux, Mac OS and Raspberry Pi. ...
    Starting Price: $295 full unlimited license
  • 30
    Genian NAC

    Genian NAC

    GENIANS

    Genians delivers a cybersecurity platform that ensures full network surveillance for all connected devices and provides dynamic access control to maintain compliance with IT security policies. It then leverages automation to orchestrate an organization’s entire security portfolio in concert with Device Platform Intelligence, Network Access Control (NAC), and Endpoint Detection and Response (EDR) to achieve an optimally-secure network edge. Genians Network Access Control (NAC) can secure...
    Starting Price: $0.2 to 1 per Active Device
  • Previous
  • You're on page 1
  • 2
  • 3
  • Next