Business Software for Debian - Page 3

Top Software that integrates with Debian as of August 2025 - Page 3

Debian Clear Filters
  • 1
    MAKVES DCAP
    MAKVES DCAP is a comprehensive data-centric audit and protection solution designed to safeguard corporate information by controlling access to critical data, and ensuring compliance with regulations like GDPR, FZ-152, and PCI DSS. This system helps businesses by monitoring user access to files, tracking sensitive information, and identifying risks such as excessive access rights and unauthorized activity. MAKVES DCAP offers a centralized platform for auditing IT assets across various environments, including Active Directory, cloud storage, email servers, and more. It also automates data classification, behavioral analysis, and policy enforcement to prevent data breaches. With a focus on protecting unstructured data, the solution provides real-time recommendations and remediation tools directly in the system interface. Forms a transparent matrix of access to company information resources.
  • 2
    AWS Marketplace
    AWS Marketplace is a curated digital catalog that enables customers to discover, purchase, deploy, and manage third-party software, data products, AI agents, and services directly within the AWS ecosystem. It provides access to thousands of listings across categories like security, machine learning, business applications, and DevOps tools. With flexible pricing models such as pay-as-you-go, annual subscriptions, and free trials, AWS Marketplace simplifies procurement and billing by integrating costs into a single AWS invoice. It also supports rapid deployment with pre-configured software that can be launched on AWS infrastructure. This streamlined approach allows businesses to accelerate innovation, reduce time-to-market, and maintain better control over software usage and costs.
  • 3
    ProxySQL

    ProxySQL

    ProxySQL

    ProxySQL is built with an advanced multi-core architecture to support hundreds of thousands of concurrent connections, multiplexed to thousands of servers. ProxySQL supports sharding by user, schema or table by means of the advanced query rule engine or through customized plugins. The development team no longer needs to rewrite queries generated by ORMs or packaged software, ProxySQL's query rewriting feature can modify SQL statements on the fly. Battle-tested doesn't even begin to cover it — ProxySQL is war-tested. Performance is the priority and the numbers prove it. ProxySQL is an open source high performance, high availability, database protocol aware proxy for MySQL and PostgreSQL. ProxySQL is a robust SQL proxy solution that acts as a pivotal bridge between database clients and servers, offering a plethora of features designed to streamline database operations. ProxySQL empowers organizations to harness the full potential of their database infrastructure.
  • 4
    QuarkLink

    QuarkLink

    Crypto Quantique

    QuarkLink is a comprehensive IoT device security platform developed by Crypto Quantique, designed to simplify and accelerate the implementation of security-by-design principles across embedded systems. It provides a Software-as-a-Service (SaaS) solution that integrates seamlessly into existing software development workflows, including CI/CD pipelines, to manage device identities, secure boot processes, over-the-air firmware updates, and key and certificate lifecycle management. QuarkLink supports a wide range of hardware platforms, from microcontrollers running bare metal to industrial PCs operating Linux, and is compatible with major semiconductor manufacturers. QuarkLink's modular architecture allows for independent use of its components, including provisioning and secure boot, OTA updates and service onboarding, and fleet and certificate management.
  • 5
    Pinguzo

    Pinguzo

    Pinguzo

    Downtime can happen on your servers and websites. Get notified instantly to take corrective steps. More than 800 users are already using Pinguzo to monitor servers and their websites. Join for free and check your server's health and websites uptime, availability, and performance. Monitor your websites uptime, load time, average response times, etc. Install the Pinguzo agent and get detailed server information and graphs. We can send alerts over e-mail, SMS, PagerDuty, Pushbullet, Slack, HipChat, web-hooks, etc. You can set various parameters like if the Load Time is high for X minutes alert me after every Y minutes. View detailed uptime, downtime reports and graphs of your response times. For servers, you can view detailed information of your CPU, RAM, disk, network usage, etc. We verify the downtime from multiple locations. Pinguzo has been tested on CentOS, Debian, Ubuntu, Fedora, Scientific Linux, RHEL, openSUSE, Slackware, Gentoo, Archlinux.
  • 6
    Cockpit

    Cockpit

    Cockpit

    Cockpit is a web-based graphical interface for servers, intended for everyone, especially those who are new to Linux, familiar and expert admins. Thanks to Cockpit intentionally using system APIs and commands, a whole team of admins can manage a system in the way they prefer, including the command line and utilities right alongside Cockpit. See your server in a web browser and perform system tasks with a mouse. It’s easy to start containers, administer storage, configure networks, and inspect logs. Basically, you can think of Cockpit like a graphical “desktop interface”, but for individual servers. Have a favorite app or command-line tool that you use on your servers? Keep using the command line, Ansible, and your other favorite tools and add Cockpit to the mix with no issues. Cockpit uses the same system tooling you would use from the command line. You can switch back and forth between Cockpit and whatever else you like.
  • 7
    GNUPanel

    GNUPanel

    GNUPanel

    GNUPanel is a completely free replacement (GPL) for web hosting server automation software. The current version of GNUPanel is focused on Debian, however, a total revision of the code is contemplated, with many improvements and changes for the next few months. It is an application written mainly in PHP 5, born to run on Debian GNU/Linux servers in their 32 or 64-bit versions. It consists of a traditional web interface scheme with three levels of privileges, administrator, reseller and user with SSL access. The administrator can create public and private hosting plans, accept payments with Paypal, Digital Account or DineroMail, send messages to their users, use an integrated support ticket system, control transfer, disk space and establish account suspension policies. Users have all the usual functions, creation of mail and FTP accounts, databases, redirects, directory protection, etc.
  • 8
    Flockport

    Flockport

    Flockport

    One-click migration from your existing VM workloads. Get instant mobility of your applications across on-prem and clouds. Why settle for one-way cloud migration when you can have continuous mobility. Migrate from on-prem to the cloud, across clouds, or back. Embrace the cloud your way. Business continuity needs application mobility and a multi-cloud approach. Leave behind long drawn out and expensive VM migration projects. Instashift gives you single-click automation. No need to adopt complex approaches. Migrate your VMs complete with applications, databases, and states. Benefit from continuous mobility for your instashifted applications. Move to the cloud or back to on-prem in a click. Need to move thousands of VMs. Instashift gives you an automated solution that works seamlessly. A new innovation platform for sovereign and emerging cloud providers to deliver the same capabilities and flexibility users have come to expect from the public cloud.
  • 9
    AD Bridge

    AD Bridge

    BeyondTrust

    Extend Microsoft® Active Directory authentication, single sign-on capabilities, and group policy configuration management to Unix & Linux systems with AD Bridge. Consistent tools across the enterprise. Provide a single familiar toolset to manage both Windows and Unix/Linux systems. Streamline compliance processes. Provide thorough audit details to audit and compliance teams and manage group policies centrally. Extend security policies. Expand single sign-on (SSO) and file sharing, and control access to non-Windows systems. BeyondTrust AD Bridge centralizes authentication for Unix and Linux environments by extending Active Directory’s Kerberos authentication and single sign-on capabilities to these platforms. By extending group policy to non-Windows platforms, BeyondTrust provides centralized configuration management, reducing the risk and complexity of managing a heterogeneous environment. Extend native group policy management tools to include settings for Unix and Linux.
  • 10
    Clockwork

    Clockwork

    Clockwork

    Derive insights from Clockwork’s probe mesh. Cut through the fog of virtualization. Get an on-demand fitness report of your cloud resources. Uncover VM placement and colocation on physical servers. Identify underperforming VMs, network bottlenecks, etc. Understand performance under various loads and its impact on your apps. Compare detailed performance reports from AWS, GCP, and Azure. 6-month free trial. Shed light on your cloud infrastructure performance. How does your cluster compare? Browse audit reports by the anomaly, region, and instance type. Ultra-accurate and scalable time service. It’s tested and deployed in many environments. Monitor and visualize system-wide and individual clock performance with an intuitive interface. Visualize and analyze real-time and historical clock offsets and corrections. Built for cloud, hybrid-cloud, and on-prem environments. Deploy in minutes, sync anywhere.
  • 11
    Kuma

    Kuma

    Kuma

    The open-source control plane for service mesh, delivering security, observability, routing and more. Built on top of Envoy, Kuma is a modern control plane for Microservices & Service Mesh for both K8s and VMs, with support for multiple meshes in one cluster. Out of the box L4 + L7 policy architecture to enable zero trust security, observability, discovery, routing and traffic reliability in one click. Getting up and running with Kuma only requires three easy steps. Natively embedded with Envoy proxy, Kuma Delivers easy to use policies that can secure, observe, connect, route and enhance service connectivity for every application and services, databases included. Build modern service and application connectivity across every platform, cloud and architecture. Kuma supports modern Kubernetes environments and Virtual Machine workloads in the same cluster, with native multi-cloud and multi-cluster connectivity to support the entire organization.
  • 12
    GaraSign

    GaraSign

    Garantir

    There are many excellent enterprise security tools to choose from. Some are managed on-premise, others are consumed as a service, and others still use a hybrid model. The challenge enterprises face is not a lack of tools or solutions, but rather a lack of seamless interconnectivity between these privileged access management tools and a single place to manage and audit them. GaraSign is a platform that allows enterprises to securely and efficiently integrate their security systems in a way that does not disrupt existing business processes. By factoring out what’s common, GaraSign is able to centralize and simplify the management of your enterprise’s most sensitive areas, including privileged access management (PAM), privileged identity management, secure software development, code signing, data security, PKI & HSM solutions, DevSecOps, and more. Enterprise security leaders must attend to data security, privileged access management (PAM), privileged identity management, etc.
  • 13
    Fluent Bit

    Fluent Bit

    Fluent Bit

    Fluent Bit can read from local files and network devices, and can scrape metrics in the Prometheus format from your server. All events are automatically tagged to determine filtering, routing, parsing, modification and output rules. Built-in reliability means if you hit a network or server outage you will be able to resume from where you left off without data loss. Rather than serving as a drop-in replacement, Fluent Bit enhances the observability strategy for your infrastructure by adapting and optimizing your existing logging layer, as well as metrics and traces processing. Furthermore, Fluent Bit supports a vendor-neutral approach, seamlessly integrating with other ecosystems such as Prometheus and OpenTelemetry. Trusted by major cloud providers, banks, and companies in need of a ready-to-use telemetry agent solution, Fluent Bit effectively manages diverse data sources and formats while maintaining optimal performance.
  • 14
    Courier

    Courier

    Double Precision, Inc.

    The Courier mail transfer agent (MTA) is an integrated mail/groupware server based on open commodity protocols, such as ESMTP, IMAP, POP3, LDAP, SSL, and HTTP. Courier provides ESMTP, IMAP, POP3, webmail, and mailing list services within a single, consistent, framework. Individual components can be enabled or disabled at will. The Courier mail server now implements basic web-based calendaring and scheduling services integrated in the webmail module. Advanced groupware calendaring services will follow soon. The Courier mail server's source code should compile on most POSIX-based operating systems based on Linux, and BSD-derived kernels. The Courier mail server should also compile on Solaris and AIX, with some help from Sun's or IBM's freeware add-on tools for their respective operating systems. The Courier mail server evolved out of several related projects, that merged together (more on that later). The Courier mail server implements SMTP extensions for mailing list management.
    Starting Price: Free
  • 15
    Cyrus IMAP

    Cyrus IMAP

    The Cyrus Team

    Cyrus IMAP is an email, contacts and calendar server. Cyrus is free and open source. Features: Speed Security Efficiency Search CardDAV and CalDAV support Robust data storage Replication Scalable for large installations Flexible filtering support through Sieve Supports antivirus and antispam toolkits Handles deliverability: SPF, DKIM, DMARC Extensive authentication options, through Cyrus SASL JMAP support Long list of supported standards
    Starting Price: Free
  • 16
    SecHard

    SecHard

    SecHard

    SecHard is a multi-module software for implementing zero-trust architecture. SecHard provides automated security hardening auditing, scoring, and remediation for servers, clients, network devices, applications, databases, and more. A powerful identity and access management software to get compliant with zero trust and to prevent attacks like privilege abuse, ransomware, and more. SecHard solves the risk awareness problem in asset management. Automated discovery, access, identification, and remediation features provide ultra-wide visibility for all regulations. With the passive scanning method, SecHard operates the vulnerability detection and management processes for all IT assets without creating any risks. SecHard auto-discovers the certificates in the company’s environment report the expiration dates of these certificates, and it can automatically renew some of these certificates through well-known certificate authorities.
  • 17
    Azure Marketplace
    Azure Marketplace is a comprehensive online store that provides access to thousands of certified, ready-to-use software applications, services, and solutions from Microsoft and third-party vendors. It enables businesses to discover, purchase, and deploy software directly within the Azure cloud environment. The marketplace offers a wide range of products, including virtual machine images, AI and machine learning models, developer tools, security solutions, and industry-specific applications. With flexible pricing options like pay-as-you-go, free trials, and subscription models, Azure Marketplace simplifies the procurement process and centralizes billing through a single Azure invoice. It supports seamless integration with Azure services, enabling organizations to enhance their cloud infrastructure, streamline workflows, and accelerate digital transformation initiatives.
  • 18
    Catalogic DPX

    Catalogic DPX

    Catalogic Software

    Reliable, rapid, and low-cost backup and recovery. Protect and recover your data from human errors, disasters, and ransomware attacks. Fast recovery-in-place from disk, tape and cloud. Agentless backup for virtual environments enhancements including single file recovery to restore specific files or directories from VMware and Microsoft Hyper-V agentless backups. Enhancements to vStor, our software-defined backup appliance, including appliance configuration via the HTML5 interface, replication management, and S3 Object Lock for protecting cloud backups against early deletion and ransomware. More cloud storage backup and archive targets including Backblaze B2 Cloud Storage with S3 Object Lock, and Amazon S3 Glacier and Glacier Deep Archive support.
  • 19
    Certa Hosting

    Certa Hosting

    Certa Hosting

    Your website is monitored day and night by our tech team to protect and optimise its performance. That security is taken care of so you can concentrate on running your online business services. We're so sure you'll love working with us, we offer a full refund if you're not completely satisfied with our cheap web hosting plans. You've got nothing to lose by giving us a try. No more slow page loading. Our hosting plans are built on the latest server technology in a state-of-the-art UK data centre for speed, quality and peace of mind utilising the latest version cPanel services. Our customers have rated us five star on Trustpilot, Serchen, and Reviews. Try us out today to find out why so many businesses trust us to look after their website.
    Starting Price: $3.50 per month
  • 20
    InfernoVM

    InfernoVM

    InfernoVM

    InfernoVM offers high-performance VPS KVM, RDP hosting, and dedicated servers designed to meet the needs of businesses, developers, and individuals. Our platform provides dedicated resources, full root access, and robust security features, ensuring a seamless experience for users worldwide. With 24/7 support and enterprise-level DDoS protection, InfernoVM guarantees reliable uptime, fast speed, and scalability for any application. We accept cryptocurrency payments, making it easy for users to get started while maintaining privacy. Unlock the power of affordable, customizable hosting solutions with InfernoVM—perfect for web hosting, gaming, remote work, and more. 🚀
    Starting Price: $30/month