Best Compliance Software for Linux - Page 6

Compare the Top Compliance Software for Linux as of April 2026 - Page 6

  • 1
    ConnectSecure

    ConnectSecure

    ConnectSecure

    ConnectSecure is an all-in-one SaaS vulnerability and compliance management platform built for managed-service providers to secure client environments, manage risk, and scale security services profitably. It performs continuous vulnerability assessments and asset discovery across networks, servers, endpoints, cloud services, web apps, and external infrastructure; it includes both agent-based or “probe/lightweight” scanning and external attack-surface scanning. It identifies open ports, misconfigurations, out-of-date software, exposed systems, cloud-environment risks, and web-application vulnerabilities, surfacing over 230,000 known CVEs, daily updated from public vulnerability databases. ConnectSecure also automates patching for many applications, offers compliance-management tools aligned with major frameworks (e.g., GDPR, HIPAA, PCI DSS, CIS, NIST, ISO), and delivers continuous monitoring of cloud, on-premises, and hybrid environments.
  • 2
    Remedio

    Remedio

    Remedio

    Remedio is an AI-powered, autonomous device posture management platform that continuously discovers, monitors, and remediates security misconfigurations and configuration drift across enterprise IT and OT environments to reduce attack surface, enforce compliance, and harden endpoint security without disruption. It delivers real-time visibility into configuration risks on devices running Windows, macOS, and Linux, as well as cloud instances and servers, and automatically applies safe remediation actions that are instantly reversible, giving security teams confidence when closing gaps without business impact. Remedio simplifies policy validation and enforcement by benchmarking settings against security standards such as CIS, NIST, and MITRE frameworks and continuously re-applies policies across updates, user changes, and new devices to maintain consistent secure baselines. It provides centralized control and governance of Active Directory, Group Policy, MDM, and Intune settings.
  • 3
    ETALON
    ETALON is a free, open-source privacy engineering tool that replaces €15,000 in legal audits with a single command. Built in Rust. Ready for CI/CD. What it does: Scans 111,000+ known trackers across your codebase and live URLs Detects PII in database schemas, configs, and source code Auto-generates complete GDPR privacy policies from your code Maps personal data flows as Mermaid diagrams Verifies cookie consent compliance before and after user interaction Outputs SARIF for GitHub Code Scanning integration Built for AI agents: Native MCP server for Claude Desktop, Cursor, and Cline. JSON/SARIF output. Exit codes for quality gates. MIT licensed. Made in Hamburg.
    Starting Price: $0
  • 4
    CCH Tagetik

    CCH Tagetik

    Wolters Kluwer

    Companies trust CCH Tagetik Corporate Performance Management software to save time, lower costs and reduce risk. Get a faster close, more forward looking-planning and in-depth analytics by connecting data, processes and people with a single trusted source. CCH Tagetik Finance Transformation Platform, powered by the Analytic Information Hub, is the unified platform that connects finance and operations and streamlines your consolidation & close, planning, reporting & analytics, disclosures and compliance.
  • 5
    Corporater Business Management Platform
    Corporater enables medium and large organizations to manage their business with integrated software solutions for Governance, Performance, Risk, and Compliance (GPRC) built on the Business Management Platform. Seamlessly manage the areas of GPRC with a single tool. Gain clear view of business performance and strategy health. Keep track of inherent and residual risk values based on the accomplishment of control actions. Manage multiple regulatory compliance frameworks and regulations.
  • 6
    Riskonnect Active Risk Manager (ARM)
    Riskonnect Active Risk Manager is a comprehensive risk management software designed to provide a holistic view of risks at project, program, and enterprise levels. It helps organizations visualize and analyze risk relationships, prioritize mitigation efforts, and prevent small issues from escalating into major disruptions. The platform aggregates risk data from frontline projects to identify trends and emerging threats, enabling more informed decision-making. Users benefit from features like bowtie cause-and-effect analysis, dashboards, heat maps, and schedule & cost impact assessments. Active Risk Manager streamlines risk collaboration, optimizes contingency resource allocation, and automates risk lifecycle management with easy-to-use interfaces and API integrations. It supports industry standards and frameworks such as ISO 31000, COSO, and PMBOK, with flexible deployment options including secure cloud and on-premises configurations.
  • 7
    Teleport

    Teleport

    Teleport

    The Teleport Infrastructure Identity Platform modernizes identity, access, and policy for infrastructure, for both human and non-human identities, improving engineering velocity and resiliency of critical infrastructure against human factors and/or compromise. Teleport is purpose-built for infrastructure use cases and implements trusted computing at scale, with unified cryptographic identities for humans, machines and workloads, endpoints, infrastructure assets, and AI agents. Our identity-everywhere approach vertically integrates access management, zero trust networking, identity governance, and identity security into a single platform, eliminating overhead and operational silos.
  • 8
    Delphix

    Delphix

    Perforce

    Delphix is the industry leader in DataOps and provides an intelligent data platform that accelerates digital transformation for leading companies around the world. The Delphix DataOps Platform supports a broad spectrum of systems, from mainframes to Oracle databases, ERP applications, and Kubernetes containers. Delphix supports a comprehensive range of data operations to enable modern CI/CD workflows and automates data compliance for privacy regulations, including GDPR, CCPA, and the New York Privacy Act. In addition, Delphix helps companies sync data from private to public clouds, accelerating cloud migrations, customer experience transformation, and the adoption of disruptive AI technologies. Automate data for fast, quality software releases, cloud adoption, and legacy modernization. Source data from mainframe to cloud-native apps across SaaS, private, and public clouds.
  • 9
    ComplianceQuest

    ComplianceQuest

    ComplianceQuest

    Fastest growing Enterprise Quality, Health and Safety Management System (QHSE) natively built and run on the Salesforce platform. Unified QHSE solutions, which combine EQMS and EHS, help our customers of all sizes deliver quality products and services in the safest, most sustainable way by mitigating risk, problems, and inefficiencies while protecting customers, employees, suppliers and brand. Every organization – irrespective of its industry, geography or size – involves an interaction of activities and processes with the environment. These activities may have an adverse or favorable impact on the environment depending on the type of activity being carried out. Our Environment Management solution has been designed to minimize and mitigate these adverse impacts on environment, to such an extent that our already depleting biodiversity is protected, and nurture an ecosystem where all living organisms coexist sustainably.
    Starting Price: $30 per user per month
  • 10
    AssurX

    AssurX

    AssurX

    The AssurX platform is a versatile enterprise quality management system (EQMS) and regulatory compliance management platform. AssurX allows enterprises of any size or complexity to create a system that reliably communicates and coordinates quality and compliance information, documentation, and activities across the enterprise. AssurX allows regulated businesses to quickly identify and control risk exposure and avoid quality or noncompliance problems while improving workflow. AssurX QMS software is highly configurable to fit any established or dynamic business requirements. The system creates an electronic workflow of tasks, alerts, escalations, and approvals that can be automated to the desired level, mapping precisely to real-world operations. Begin with just the solutions and functionality you need now, then implement what you like whenever you’re ready. No other system is easier to deploy, configure, and modify.
  • 11
    axe Monitor

    axe Monitor

    Deque Systems

    Perform enterprise-level accessibility audits and meet your compliance needs with advanced reporting, monitoring, and management of accessibility issues against industry standards or customized guidelines. Axe Monitor helps ensure your large website becomes accessible and remains accessible. Dynamically scan, monitor and report on the accessibility status of your site across business and development teams. Modern web applications driven by large content management systems require automated tools capable of handling unexpected page hierarchies and linking structures. Axe Monitor is designed to follow links dynamically, and allows for scripting of basic user flows to trigger event-driven content and bypass user authentication. Large websites are constantly changing and adding new content. Axe Monitor links content creators, designers, developers and project managers to ensure accessibility throughout the workflow.
  • 12
    Commvault Cloud
    Commvault Cloud is a comprehensive cyber resilience platform designed to protect, manage, and recover data across diverse IT environments, including on-premises, cloud, and SaaS applications. Powered by Metallic AI, it offers advanced features such as AI-driven threat detection, automated compliance tools, and rapid recovery capabilities like Cleanroom Recovery and Cloudburst Recovery. The platform ensures continuous data security through proactive risk scanning, threat hunting, and cyber deception, while facilitating seamless recovery and business continuity with infrastructure-as-code automation. With a unified management interface, Commvault Cloud enables organizations to safeguard their critical data assets, maintain compliance, and swiftly respond to cyber threats, thereby minimizing downtime and operational disruptions.
  • 13
    GovEVA

    GovEVA

    GovEVA

    GovEVA, is a leading SaaS company dedicated to empowering organizations seeking sustainable growth through effective strategy and automation. With our innovative product, we provide a comprehensive solution to help companies implement Environmental, Social, and Governance (ESG) practices throughout their organization. Our unique approach, known as the "OUR 7 Step Approach," ensures a seamless and successful integration of ESG principles. Let's explore the steps: 1. Materiality Assessment 2. Current State Baseline 3. Measurement And Real-Timeline Tracking Of Quantitative ESG Parameters. 4. Gap Analysis 5. Strategic Roadmap For ESG Enhancement 6. Actions & KPIs 7. Reporting
  • 14
    IBSFINtech

    IBSFINtech

    IBSFINtech India Private Ltd.

    IBSFINtech is a global enterprise TreasuryTech company providing end-to-end digitization & automation solutions for corporates' Cash & Liquidity, Treasury, Risk, Trade Finance (TRTFM®) & Supply Chain Finance functions. Our product portfolio includes On-prem solutions, SaaS TMS - InTReaX™ & Supply Chain solution VNDZY®. Our prestigious list of clientele is spread across verticals and geographies, including, Vedanta Group, Mahindra, Sai Life Sciences Ltd, Bluestar Ltd, Polycab Ltd, and Future Group,. We have also been awarded a very prestigious award of the treasury ecosystem, “The Corporate Treasurer – House Awards”, recognizing IBSFINtech as the Software Provider for the APAC region in this niche space. The “Made-In-India” Comprehensive Risk Management solution offering enables a holistic approach toward Compliance, Financial, and Operational Risk management.
  • 15
    AML Manager
    This best-in-class anti-money laundering solution covers a complete range of compliance processes and practices, providing a fully integrated, time-saving solution to meet all the compliance and risk management needs of your financial institution. AML Manager combines technologically advanced features and a user-friendly, data-rich interface with powerful prevention and detailed tracking tools. It makes the investigation of suspicious activity simpler and more effective. Based on behavioral profiling and peer group analysis and rules, the intelligent transaction monitoring in AML Manager uncovers only those alerts with the highest degree of risk, which significantly minimizes the number of false positives. The easy-to-use investigation interface in AML Manager, with advanced drill-down and link analysis, makes it easy to uncover suspicious networks and associations. The interface supports profile investigation capabilities, such as peer-group comparison.
  • 16
    Datafisher LMS

    Datafisher LMS

    Datafisher

    Datafisher LMS is the most comprehensive and adaptable LMS that helps your business and team automate digital trainings, saving you time and money. Datafisher LMS comes with innovative features, integrations, and user experience, no matter where your team is located. With guaranteed value, our Datafisher LMS is perfect for any size company, from a small team to a large corporation. With an LMS in place, everyone can manage their own schedule, as the content is always available and accessible on any device, including as a mobile app LMS. It’s also easy to adapt your training to individual needs and to assign any content or training to a target group or individual. You never have to worry about managing progress with the ability to track, monitor and receive reports on all the users’ training progress.
    Starting Price: $460 per month
  • 17
    Cyberwatch

    Cyberwatch

    Cyberwatch

    Manage all your vulnerabilities, from their detection to their correction. Cyberwatch helps you to get a complete and contextualized list of assets and technologies in your Information System. Cyberwatch continuously searches for vulnerabilities published by the authorities (CERT-FR, NVD...) and present on your IT assets. Cyberwatch evaluates your vulnerabilities based on their CVSS score, the existence of an exploit, and the business context of the affected machine. Cyberwatch lets you make the right decisions using dashboards and simple actions (comment, exclude...). Cyberwatch natively embeds a Patch Management module, compatible with your infrastructure (WSUS / RedHat Satellite...). Define your compliance rules and control your information system. Cyberwatch helps you to get a complete and contextualized list of assets and technologies in your Information System. Cyberwatch allows you to define your objectives thanks to an encyclopedia of rules with pre-sets.
  • 18
    Interfacing Digital Business Platform
    Interfacing’s Digital Business Platform uses flow management technology that illustrates tasks and works in a flow diagram, focusing on the people performing the tasks and their individual roles. Digital Business Platform can help companies build, improve, and share processes from a central repository. Business rules can then be applied at any stage of the workflow to automate tasks or minimize manual intervention. The ability to track and provide status reports throughout each phase of a process allows for accurate performance and coordination across manual and systemized tasks. Having our Digital Business Platform along with our EPC system will definitely strengthen collaboration between IT development and operations, streamline test, automate workflows, and offer big bottom-line benefits. Interfacing’s digital business platform – Rapid Application Development (RAD) Tools, with its Low-Code Development methodology will optimize usage of your technical resources.
  • 19
    Stacklet

    Stacklet

    Stacklet

    Stacklet builds on the Cloud Custodian project to offer an out-of-the-box solution with powerful management capabilities and advanced features to help businesses realize value. Stacklet is built by the original developer and maintainer of Cloud Custodian. Cloud Custodian is used by thousands of well-known global brands today. The project’s community has hundreds of active contributors including Amazon, Microsoft and Capital One and is growing rapidly. Stacklet provides a best-of-breed solution for cloud governance addressing needs around Security, Cost Optimization and Regulatory Compliance. Tooling to manage Cloud Custodian at scale across thousands of cloud accounts, policies and regions. Access to best practice policy sets which solve business problems out-of-the-box. Data and visualizations to understand policy health, resource auditing, trends and anomalies. Real-time inventory, historical revisions and change management of cloud assets.
  • 20
    Hyperproof

    Hyperproof

    Hyperproof

    Hyperproof makes building out and managing your information security frameworks easy by automating repetitive compliance operation tasks so your team can focus on the bigger things. The Hyperproof solution also offers powerful collaboration features that make it easy for your team to coordinate efforts, collect evidence, and work directly with auditors in a single interface. Gone are the days of uncertainty around audit preparation and compliance management process. With Hyperproof you get a holistic view of your compliance programs with progress tracking, program health monitoring, and risk management.
  • 21
    Drata

    Drata

    Drata

    Drata is the world’s most advanced security and compliance automation platform with the mission to help companies earn and keep the trust of their users, customers, partners, and prospects. Drata helps hundreds of companies streamline their SOC 2 compliance through continuous, automated control monitoring and evidence collection, resulting in lower costs and less time spent preparing for annual audits. The company is backed by Cowboy Ventures, Leaders Fund, SV Angel, and many key industry leaders. Drata is based in San Diego, CA.
    Starting Price: $10,000/year
  • 22
    Vault Platform

    Vault Platform

    Vault Platform

    Designed to support a culture of trust and safety, Vault is revolutionising the way that misconduct is reported and resolved. Using advanced technology, Vault overcomes the main challenges companies face when trying have a meaningful impact on unacceptable behaviour in the workplace empowering individuals to speak up and report the misconduct and providing organisations with the tools internally to resolve the issues, before they have a chance to spread. The most advanced incident reporting tool you can give your workforce. The Vault App is a trusted and highly accessible way of capturing all relevant details of an incident, creating a frictionless experience encouraging people to come forward internally. A web-based interface that extends the reach of the Vault speak up platform to your entire business ecosystem including customers, supply chain partners, and members of the public.
  • 23
    IBM Guardium Data Compliance
    Simplifies data regulation needs, enhances visibility and streamlines monitoring IBM® Guardium® Data Compliance helps organizations to move through regulatory compliance and audit requirements more quickly and easily, safeguarding regulated data wherever it resides. Available in IBM® Guardium® Data Security Center, IBM Guardium Data Compliance can reduce audit prep time for data compliance regulations, provide continuous visibility of data security controls, and solve data compliance and data activity monitoring challenges.
  • 24
    FastDox

    FastDox

    FastDox

    Receive crucial documentation from customers in minutes. They simply upload or take a photo of their sensitive information and send it across securely instantly. Unlimited amount of document uploads of any size. Upload and send documents from anywhere zero hassle. Auto-edge cropping and dynamic document alignment. Stand out from the competition and offer your customers a seamless onboarding experience. With the platform doing the hard work for you, you can focus on delivering outstanding service. Unchain your staff from the shackles of admin and allow them to spend time building up your customer base. Our clients have seen an increase in sales of up to 35%. Work smarter not harder - dramatically reduce labour and keep business costs down. FastDox cuts postage costs by 95% and helps to ensure repeat business.
    Starting Price: £40 per user
  • 25
    IBM InfoSphere Optim Data Privacy
    IBM InfoSphere® Optim™ Data Privacy provides extensive capabilities to effectively mask sensitive data across non-production environments, such as development, testing, QA or training. To protect confidential data this single offering provides a variety of transformation techniques that substitute sensitive information with realistic, fully functional masked data. Examples of masking techniques include substrings, arithmetic expressions, random or sequential number generation, date aging, and concatenation. The contextually accurate masking capabilities help masked data retain a similar format to the original information. Apply a range of masking techniques on-demand to transform personally-identifying information and confidential corporate data in applications, databases and reports. Data masking features help you to prevent misuse of information by masking, obfuscating, and privatizing personal information that is disseminated across non-production environments.
  • 26
    Wibmo

    Wibmo

    Wibmo

    We enable banks and fintechs to leverage the full power of technology. Experience the future of secure, frictionless payments with Wibmo’s nextgen authentication platform. ACCOSA IVS is a payment authentication platform that uses 3-D secure 1.0 and EMV 3-D secure 2.X protocols for securing online payments. Coupled with its powerful Risk-Based Authentication (RBA) engine, it provides the frictionless experiences consumers expect. Powered by cutting-edge fraud prevention technology, ACCOSA IVS combines the prowess of EMV 3D secure protocol and a dynamic risk authentication engine to accurately calculate risk scores in real-time. Instantaneously identifies and counters emerging threats in real-time. Implemented with a scalable microservices architecture. Designed to scale for high-volume transactions. Displays your growth story with intuitive analytics. The ACCOSA IVS identity authentication platform combines the best of our consumer identity verification mechanics.
  • 27
    Effiya

    Effiya

    Effiya Technologies

    Effiya Technologies offers a suite of comprehensive solutions to manage anti-money laundering, transaction monitoring, fraud detection and sanctions screening in the banking and financial services sectors. These niche products are developed from deep business insights and understanding of application areas, leveraging latest technologies and software in the financial compliance space. At Effiya Technologies, we strive to apply our insights on machine learning and the expertise built over many years of consulting, to create business applications that can help our client organizations in optimizing their business operations, bring them closer to their customers, and deliver automation benefits by robotizing business processes. From counting trees for conservation projects to developing smart chat bots.
  • 28
    SeaCat

    SeaCat

    TeskaLabs

    Cyber-security and data privacy platform for mobile and IoT applications. Build and operate the app free from any cyber-security incident. SeaCat is a cyber-security platform created by experts, and it features all cyber-security and data privacy must-haves. SeaCat deployment is smooth and hassle-free. SeaCat improves your security level instantly, with no need for custom development. Cyber-security should not come at the cost of the user experience. SeaCat requires no pesky configurations or procedures on the part of the user; SeaCat employs all modern cyber-security features, such as biometrical authorization,  and hardware security modules. SeaCat cyber-security platform consists of a SeaCat SDK that is to be added to a mobile or IoT application, the SeaCat Gateway that is to be installed into the demilitarized zone (DMZ) in front of the application backend servers, and SeaCat PKI that is a service that provides enrolment, access, and identity management.
  • 29
    Vespia

    Vespia

    Vespia

    Vespia is an all-in-one AML solution for verifying and onboarding business customers and partners in under 30 seconds. We help AML-obligated businesses understand whom they are dealing with using the power of AI.
  • 30
    POA

    POA

    Sysmedac Technologies

    Organizations can recognize their strengths and weaknesses by using an efficient internal audit reporting software system. Having the appropriate tools to support people and processes, shorten audit cycles, and provide value to stakeholders is essential for future success with internal audit management solutions.
MongoDB Logo MongoDB