Best Compliance Software for Linux - Page 7

Compare the Top Compliance Software for Linux as of May 2026 - Page 7

  • 1
    Vespia

    Vespia

    Vespia

    Vespia is an all-in-one AML solution for verifying and onboarding business customers and partners in under 30 seconds. We help AML-obligated businesses understand whom they are dealing with using the power of AI.
  • 2
    POA

    POA

    Sysmedac Technologies

    Organizations can recognize their strengths and weaknesses by using an efficient internal audit reporting software system. Having the appropriate tools to support people and processes, shorten audit cycles, and provide value to stakeholders is essential for future success with internal audit management solutions.
  • 3
    Bviser

    Bviser

    Bviser

    Bviser is board and committees meeting solution , we have tools for meetings, and we have more than 50 clients and more than 1500 users using our solution.
    Starting Price: $850/year
  • 4
    DoxAI

    DoxAI

    DoxAI Australia PTY Ltd

    DoxAI is your trusted process automation partner, enabling organisations to transition from outdated systems to cutting-edge AI technology. Our platform streamlines the collection, management, processing, and storage of data, enhancing security, reducing operational costs, and boosting customer engagement. DoxAI empowers providers to automate and secure every step of their data and document handling processes. Our suite of products supports end-to-end workflows ensuring privacy and compliance. We adhere to stringent information security standars to safeguard your sensitive data as part of our certifications - SOC2 Type 2, ISO27001, HIPAA, GDPR,PCI DSS and HIPAA. Our technology is available in UI, iFrame or API.
  • 5
    Tumult Analytics

    Tumult Analytics

    Tumult Analytics

    Built and maintained by a team of differential privacy experts, and running in production at institutions like the U.S. Census Bureau. Runs on Spark and effortlessly supports input tables containing billions of rows. Supports a large and ever-growing list of aggregation functions, data transformation operators, and privacy definitions. Perform public and private joins, filters, or user-defined functions on your data. Compute counts, sums, quantiles, and more under multiple privacy models. Differential privacy is made easy, thanks to our simple tutorials and extensive documentation. Tumult Analytics is built on our sophisticated privacy foundation, Tumult Core, which mediates access to sensitive data and means that every program and application comes with an embedded proof of privacy. Built by composing small, easy-to-review components. Provably safe stability tracking and floating-point primitives. Uses a generic framework based on peer-reviewed research.
  • 6
    NMTY Enterprise
    NMTY Enterprise helps you protect all your privacy-sensitive data within your organization, regardless if it is stored in databases or files. Make NMTY Enterprise part of your IT environment and immediately anonymize all data sources that need to be protected. NMTY Enterprise makes it possible to anonymize data regardless of how it is stored, from databases to individual files. Anonymize data stored in a database or in separate files such as CSV and XML. Data is always anonymized directly within the source. This prevents non-anonymized data from being duplicated unnecessarily. Connections to your data sources support integrated authentication and are always encrypted when stored. In addition to anonymizing datasets, it is also possible to directly anonymize data processed within documents and images. Our solutions are developed based on the latest innovations and integrate directly into your existing processes. This way we ensure we always achieve the maximum result.
  • 7
    PK Protect
    PK Protect is a data protection platform designed to help organizations safeguard sensitive information across diverse environments. It provides robust tools for data discovery, classification, encryption, and monitoring, ensuring that critical data is protected both at rest and in transit. With automated policies and compliance controls, PK Protect enables businesses to meet regulatory requirements like GDPR and HIPAA while minimizing the risk of data breaches. The platform integrates with various systems to provide a unified approach to managing data security across cloud, on-premises, and hybrid environments. By offering real-time visibility and proactive threat detection, PK Protect helps organizations maintain control over their sensitive data and reduce security vulnerabilities.
  • 8
    Oneleet

    Oneleet

    Oneleet

    We help companies build trust by creating real-world security controls, and then attesting to those controls with a SOC 2 report. Oneleet is a full-stack cybersecurity platform that makes effective cybersecurity easy and painless. We help businesses stay secure so that they can focus on providing value to their customers. We'll start by doing a scoping call to learn about your infrastructure, security concerns, & compliance needs. Then we'll build you out a custom security program that is stage-appropriate. We'll perform your penetration test with highly qualified OSCE-certified or OSWE-certified testers, only around 1,000 of whom exist worldwide. Finally, we'll take you through the SOC 2 auditing process with a 3rd party CPA. Oneleet has everything you need to become compliant and secure in one place. Having all tools under one roof makes the compliance journey smooth and seamless.
  • 9
    Cygnus Scan
    Cygnus Scan is an advanced Anti-Money Laundering (AML) screening and monitoring solution developed by Crowe UAE as part of their Cygnus GRC ecosystem. Tailored to meet the stringent requirements of international and UAE-specific AML regulations, it serves as a robust compliance tool for regulated industries such as fintech, insurance, real estate, legal services, and Designated Non-Financial Businesses and Professions (DNFBPs). Key Features of Cygnus Scan Sanction Screening: Real-time matching against global sanctions, watchlists, Politically Exposed Persons (PEP), and adverse media to ensure comprehensive compliance. Transaction Monitoring: Real-time detection and blocking of high-risk transactions, ensuring immediate response to suspicious activities. Risk Scoring: Continuous assessment of financial crime risks associated with customers and suppliers using advanced algorithms and risk parameters. For more information, Crowe UAE Website / Cygnus Scan website.
  • 10
    IBM PowerSC
    IBM PowerSC is a security and compliance solution optimized for virtualized environments on IBM Power servers running AIX, IBM i, or Linux. It integrates security features across different layers of the IBM Power server stack, enabling centralized management of security and compliance for all IBM AIX and Linux on Power endpoints. PowerSC supports industry standards such as PCI DSS, HIPAA, GDPR, and more, through prebuilt security profiles. Key features include real-time compliance monitoring, which provides immediate visibility to administrators when system changes violate configuration policy rules; trusted boot, which measures and attests the integrity of the boot image, operating system, and applications using virtual trusted platform module technology; trusted firewall, which ensures appropriate network isolation for virtual machines; trusted logging, which provides tamper-proof logging and convenient log backup and management; and multifactor authentication.
  • 11
    SafetyChain

    SafetyChain

    SafetyChain Software

    SafetyChain is the #1 Plant Management Platform that improves yield, maximizes productivity, and ensures compliance for process manufacturers. Trusted by over 1,500 facilities, SafetyChain is the only enterprise solution uniting production, quality, safety, and supplier management.
  • 12
    ZagTrader

    ZagTrader

    ZagTrader

    ZagTrader is an award-winning Global Markets Technology Platform that allows Banks, Brokers, and Investment Management companies to run and expand their worldwide operations on it. The platform integrates nearly all of the functionalities within the organization, which includes front, data, routing, risk management, compliance, reporting, and back office.
  • 13
    Nyxeia Information Governance Suite
    The Information Governance Suite is a set of products aimed at helping organizations to better discover, categorize, enhance, and govern their information assets regardless of the systems in which they are managed. Products in the suite include: - .discover, which connects to information systems to index and categorize unstructured and structured information assets - .policy, which allows organizations to create full lifecycle policies for information retention and disposal - .preserve, for digital asset preservation near the end of the asset lifecycle - .process, for automating content related actions like content categorization to help records teams deal with escalating workload The solution helps identify sensitive information that may reduce compliance with regulations like GDPR, as well as information that may be redundant, trivial, or obsolete.
  • 14
    SmartSearch

    SmartSearch

    SmartSearch

    SmartSearch is here to make AML, KYC and Identity Verification compliance easy. The most comprehensive features from an AML Provider. By simply entering the individual’s name, address and date of birth, SmartSearch will complete a full AML/KYC check - including automatic worldwide Sanction and PEP screening - giving you a clear pass or refer result in a matter of seconds. International verification is challenging due to regulatory, cultural and technological differences between countries. But thanks to our unique ability to integrate multiple data sources, we can verify international individuals and businesses. After initial AML/KYC checks have been completed, we continue to monitor all clients daily, alerting you if their Sanctions or PEP status changes. We can also complete retrospective checks on clients to ensure your firm remains compliant at all times.
  • 15
    CMX1 Platform
    Leverage the same Audit Software some of the world's best known brands trust. CMX1's ActivityStudio® makes it easy to develop and execute audit, self-assessment, inspection, evaluation, certification, checklist, and survey programs to ensure quality, safety, compliance and mitigate operational risk. With drag-and-drop policy and visual form building, automated scheduling, comprehensive scoring, ratings & reporting, and CAPA workflows, our clients describe ActivityStudio® as a game changer. The CMX1 Platform enables companies of all sizes to gain control and transparency over their supply chains, deliver quality products and services, and ensure compliance and drive performance across their locations. CMX1 is a user-friendly, cloud-based platform that 800,000+ users across 120 countries use to achieve and maintain Quality and Operational Excellence. Via a single platform, you can manage all your supply chain partners, products, and locations effectively and with confidence.
  • 16
    Credentially

    Credentially

    Credentially.io

    Credentially helps healthcare providers reduce organizational inefficiencies of credentialing and onboarding through automation. Thus, employers and physicians can spend more time taking care of patients and improve patient safety. Credentially's customers take 5 days to sign-up, validate and onboard clinicians compared to an industry average of 60 days.
  • 17
    Recite Me

    Recite Me

    Recite Me

    Recite Me Accessibility Toolbar is one of the leading WCAG & ADA Compliant Toolbars. Enabling users to customize and alter your websites design to fit their specific needs. Perfect for users who experience visual, cognitive and mobility impairments, in addition to a range of other disabilities. Furthermore, Recite Me offers an Accessibility Checker, which is free of charge and can be used to efficiently measure your websites accessibility. Allowing you to detect specific on-site accessibility issues, to fix them and improve your websites accessibility.
  • 18
    DigiAudit

    DigiAudit

    Otelier

    DigiAudit by Otelier is a cloud-based audit management system designed for hoteliers to streamline their end-of-day reporting and ensure audit compliance effortlessly. This platform automates signature workflows, significantly reducing operational costs by eliminating the need for printing, toner, and physical storage. Users benefit from enhanced accessibility, allowing them to manage and access documents from any location. Customizable dashboards and automated reporting features not only improve decision-making but also bolster operational efficiency. DigiAudit's transition to a paperless environment contributes to more sustainable operations, making it an invaluable tool for modern hospitality management.
  • 19
    Ivanti

    Ivanti

    Ivanti

    Ivanti offers integrated IT management solutions designed to automate and secure technology across organizations. Their Unified Endpoint Management platform provides intuitive control from a single console to manage any device from any location. Ivanti’s Enterprise Service Management delivers actionable insights to streamline IT operations and improve employee experiences. The company also provides comprehensive network security and exposure management tools to protect assets and prioritize risks effectively. Trusted by over 34,000 customers worldwide, including Conair and City of Seattle, Ivanti supports secure, flexible work environments. Their solutions enable businesses to boost productivity while maintaining strong security and operational visibility.
  • 20
    SAS Risk Management

    SAS Risk Management

    SAS Institute

    No matter how your financial institution prioritizes risk, SAS has proven methodologies and best practices to help you establish a risk-aware culture, optimize capital and liquidity, and meet regulatory demands. Put on-demand, high-performance risk analytics in the hands of your risk professionals to ensure greater efficiency and transparency. Strike the right balance between short- and long-term strategies. And confidently address changing regulatory requirements. SAS has proven methodologies and best practices to help you establish a risk-aware culture, optimize capital and liquidity, and efficiently meet regulatory demands. Deploy a broad range of scalable credit models to continuously manage your loan portfolios. Improve regulatory compliance and instill powerful balance sheet management capabilities. Simulate over multiple scenarios. Produce results faster with a richer analysis to inform business decision-making.
  • 21
    Powertech Policy Minder
    Powertech Policy Minder for IBM i is a security administration tool that automates critical tasks and provides comprehensive security compliance reporting. By automating security administration, Policy Minder saves time and eliminates labor-intensive manual tasks usually required to administer the details of security. Policy Minder for IBM i features a graphical user interface (GUI) in addition to the traditional green screen. Policy Minder provides an easy way to define your security policy on IBM i, whether you want to customize a security policy based on your organization's unique requirements or use a template based on cybersecurity best practices. Comparing your security policy to your system's current configuration is simple and automated. You can even schedule your policy checks so that they run automatically. The FixIt function automatically finds settings that are out of compliance and fixes them.
MongoDB Logo MongoDB