Best IT Management Software for Linux - Page 40

Compare the Top IT Management Software for Linux as of May 2026 - Page 40

  • 1
    IBM Sterling Connect:Direct
    IBM® Sterling Connect:Direct provides security-hardened, point-to-point file transfers to lessen dependency on unreliable File Transfer Protocol (FTP) transfers. It is optimized for high-volume delivery of files within and among enterprises. The solution ensures more reliable movement of files, from batch integration and movement of large images or catalogs to synchronization with remote locations. Sterling Connect:Direct also supports hybrid cloud deployment through certified containers which ensures easy and consistent deployment life-cycle management. IBM Certified Containers for Sterling Connect:Direct are enterprise-grade, security-rich product editions with integrated common software services for consistent deployment life-cycle management including easy install and configure options, management of upgrades and roll-back, scalability, and security. Supports a wide range of platforms including IBM z/OS, OpenVMS, i5/OS, HP NonStop, Microsoft Windows, UNIX and Linux.
  • 2
    Forcepoint Trusted Gateway System
    Forcepoint Trusted Gateway System Secure data transfers for your mission-critical files, every time. Reliably transfer unstructured files transfer. PDF and Microsoft Office files between and within different classification levels for international, federal, state, and local entities. Comply with Raise the Bar initiatives Achieve breach-resilient, mission-safe architectural design that meets the U.S. Government’s Raise the Bar requirements. Streamline file transfer processes and eliminate air gap risks inherent to portable media. System and security administrators with the appropriate permissions perform administration, monitoring, and auditing from the server. Further reduce operational infrastructure cost by adding Forcepoint Trusted Print Delivery and Trusted Mail System. Forcepoint is widely deployed and listed on the NCDSMO baseline list, and supports transfer environments with 38+ networks.
  • 3
    wolfSSL

    wolfSSL

    wolfSSL

    wolfSSL is an open source internet security company who's primary product is the wolfSSL embedded SSL Library. Its primary users are programmers building security functionality into their applications and devices. wolfSSL employs the dual licensing model, like MySQL, so it is available under commercial license terms for our commercial users and open source for the open source community. Support and consulting are also available from wolfSSL. wolfSSL is the most popular SSL/TLS security option for the IoT. We secure devices against the IoT's most prevalent threat vector, which is the MITM (man in the middle) attack. wolfSSL is also popular for use in heavy load server side or cloud environments, where cryptography performance is vital. Government applications also consume wolfSSL embedded SSL, as it is FIPS 140-2 enabled. Over 2 Billion applications and devices are secured with wolfSSL products.
  • 4
    SUSE Enterprise Storage
    Unified, infinitely scalable and simple to manage storage solution designed for modern data centers. It seamlessly transforms enterprise storage infrastructure into a powerful vehicle to accelerate innovation. SUSE Enterprise Storage is a flexible, reliable, cost-efficient and intelligent storage solution. Powered by Ceph, a cloud-native solution is engineered for a wide range of demanding workloads–from archival to high performance computing (HPC). Available for x86 and Arm architecture, it is deployed on generally available off-the-shelve hardware, allowing businesses to store and efficiently process data in order to get competitive edge–optimize business operations, develop deeper customer insights and business intelligence delivering better products and services. SUSE Enterprise Storage supports Kubernetes and seamlessly integrates with ML/AI, EDGE, IoT and embedded architecture.
  • 5
    Claws Mail

    Claws Mail

    The Claws Mail Team

    Claws Mail is an email client (and news reader), based on GTK+, featuring quick response, graceful, and sophisticated interface, easy configuration, intuitive operation, abundant features, extensibility and robustness and stability. The appearance and interface are designed to be familiar to new users coming from other popular email clients, as well as experienced users. Almost all commands are accessible with the keyboard. The messages are managed in the standard MH format, which features fast access and data security. You'll be able to import your emails from almost any other email client, and export them just as easily. Lots of extra functionality, like an RSS aggregator, calendar, or laptop LED handling, are provided by extra plugins. Claws Mail is distributed under the GPL.
  • 6
    Stacklet

    Stacklet

    Stacklet

    Stacklet builds on the Cloud Custodian project to offer an out-of-the-box solution with powerful management capabilities and advanced features to help businesses realize value. Stacklet is built by the original developer and maintainer of Cloud Custodian. Cloud Custodian is used by thousands of well-known global brands today. The project’s community has hundreds of active contributors including Amazon, Microsoft and Capital One and is growing rapidly. Stacklet provides a best-of-breed solution for cloud governance addressing needs around Security, Cost Optimization and Regulatory Compliance. Tooling to manage Cloud Custodian at scale across thousands of cloud accounts, policies and regions. Access to best practice policy sets which solve business problems out-of-the-box. Data and visualizations to understand policy health, resource auditing, trends and anomalies. Real-time inventory, historical revisions and change management of cloud assets.
  • 7
    IT Convergence Private Cloud
    IT Convergence is a global award winning and Gartner-recognized provider across all three pillars of the Cloud (IaaS, PaaS, SaaS), including Consulting (Advisory), Private Cloud (Hosting), Managed Services, Cloud Migration, Integration, Business Intelligence/Analytics, Cybersecurity, Development, RPA, Testing, Training, and Change Management services. Our Private Cloud Services Include: Cloud Hosting Migration Business Continuity and Disaster Recovery Infrastructure Architecture & Managed Services DevOps Engineering Application & Workload Managed Services Project & Support-based Development Data & Analytics Oracle, SQL Server & Open Source Database Administration Security 24x7 Monitoring
  • 8
    ArcServe Live Migration
    Migrate data, applications and workloads to the cloud without downtime. Arcserve Live Migration was designed to eliminate disruption during your cloud transformation. Easily move data, applications and workloads to the cloud or target destination of your choice while keeping your business fully up and running. Remove complexity by orchestrating the cutover to the target destination. Manage the entire cloud migration process from a centralconsole. Arcserve Live Migration simplifies the process of migrating data, applications and workloads. Its highly flexible architecture enables you to move virtually any type of data or workload to cloud, on-premises or remote locations, such as the edge, with support for virtual, cloud and physical systems. Arcserve Live Migration automatically synchronizes files, databases, and applications on Windows and Linux systems with a second physical or virtual environment located on-premises, at a remote location, or in the cloud.
  • 9
    Swarm

    Swarm

    Docker

    Current versions of Docker include swarm mode for natively managing a cluster of Docker Engines called a swarm. Use the Docker CLI to create a swarm, deploy application services to a swarm, and manage swarm behavior. Cluster management integrated with Docker Engine: Use the Docker Engine CLI to create a swarm of Docker Engines where you can deploy application services. You don’t need additional orchestration software to create or manage a swarm. Decentralized design: Instead of handling differentiation between node roles at deployment time, the Docker Engine handles any specialization at runtime. You can deploy both kinds of nodes, managers and workers, using the Docker Engine. This means you can build an entire swarm from a single disk image. Declarative service model: Docker Engine uses a declarative approach to let you define the desired state of the various services in your application stack.
  • 10
    Apache Brooklyn

    Apache Brooklyn

    Apache Software Foundation

    Your applications, any clouds, any containers, anywhere. Apache Brooklyn is software for managing cloud applications. Use it for: Blueprints describe your application, stored as text files in version control, components configured & integrated across multiple machines automatically, 20+ public clouds, or your private cloud or bare servers - and Docker containers, monitor key application metrics; scale to meet demand; restart and replace failed components. View and modify using the web console or automate using the REST API.
  • 11
    Apache Helix

    Apache Helix

    Apache Software Foundation

    Apache Helix is a generic cluster management framework used for the automatic management of partitioned, replicated and distributed resources hosted on a cluster of nodes. Helix automates reassignment of resources in the face of node failure and recovery, cluster expansion, and reconfiguration. To understand Helix, you first need to understand cluster management. A distributed system typically runs on multiple nodes for the following reasons: scalability, fault tolerance, load balancing. Each node performs one or more of the primary functions of the cluster, such as storing and serving data, producing and consuming data streams, and so on. Once configured for your system, Helix acts as the global brain for the system. It is designed to make decisions that cannot be made in isolation. While it is possible to integrate these functions into the distributed system, it complicates the code.
  • 12
    IT Convergence Public Cloud
    IT Convergence is a global award winning and Gartner-recognized provider across all three pillars of the Cloud (IaaS, PaaS, SaaS), including Consulting (Advisory), Private Cloud (Hosting), Managed Services, Cloud Migration, Integration, Business Intelligence/Analytics, Cybersecurity, Development, RPA, Testing, Training, and Change Management services. Harness the power of hyperscale public clouds, guided by expert consultants through each step – from migration to optimization Our Public Cloud Includes: Cloud Transformation Advisory Cloud Workload and Traditional Hosting Migration In-Flight Migration OS, DB and Application Upgrade On-Premise, Hybrid and Cloud Integrations Backup and Disaster Recovery DevOps Engineering Cloud Administration Post-Cloud Automation
  • 13
    Glassware

    Glassware

    Glassware

    Optimized for simplicity, flexibility and scalability, Sphere 3D’s Glassware 2.0 platform eliminates the complex tasks of designing, implementing, and maintaining application hosting environments, extending the benefits of secure scalable server-based computing to all. Glassware 2.0 extends the useful life of applications by decoupling the application from the underlying operating system. Glassware 2.0 can virtualize 16, 32, and 64-bit Microsoft Windows applications* and deliver them with native functionality to most end user devices: Chromebooks, Windows 10 clients, iPads, thin clients, tablets, etc. Glassware 2.0 uses a container-based approach to application virtualization deployed on servers, coupled with a remote presentation capability, to seamlessly deliver applications to end user computing devices. Unlike hypervisor-based approaches, with Glassware 2.0 the application’s host OS is never installed on the appliance (server).
  • 14
    Symas LMDB

    Symas LMDB

    Symas Corporation

    Symas LMDB is an extraordinarily fast, memory-efficient database we developed for the OpenLDAP Project. With memory-mapped files, it has the read performance of a pure in-memory database while retaining the persistence of standard disk-based databases. Bottom line, with only 32KB of object code, LMDB may seem tiny. But it’s the right 32KB. Compact and efficient are two sides of a coin; that’s part of what makes LMDB so powerful. Symas offers fixed-price commercial support to those using LMDB in your applications. Development occurs in the OpenLDAP Project‘s git repo in the mdb.master branch. Symas LMDB has been written about, talked about, and utilized in a variety of impressive products and publications.
  • 15
    Alibaba Cloud TSDB
    Time Series Database (TSDB) supports high-speed data reading and writing. It offers high compression ratios for cost-efficient data storage. This service also supports visualization of precision reduction, interpolation, multi-metric aggregate computing, and query results. The TSDB service reduces storage costs and improves the efficiency of data writing, query, and analysis. This enables you to handle large amounts of data points and collect data more frequently. This service has been widely applied to systems in different industries, such as IoT monitoring systems, enterprise energy management systems (EMSs), production security monitoring systems, and power supply monitoring systems. Optimizes database architectures and algorithms. TSDB can read or write millions of data points within seconds. Applies an efficient compression algorithm to reduce the size of each data point to 2 bytes, saving more than 90% in storage costs.
  • 16
    Centreon

    Centreon

    Centreon

    Centreon is a global provider of business-aware IT monitoring for always-on operations and performance excellence. The company’s holistic, AIOps-ready platform is designed for today’s complex, distributed hybrid cloud infrastructures. Centreon monitors the complete IT Infrastructure from Cloud-to-Edge for a clear and comprehensive view. Centreon removes blind spots, monitoring all equipment, middleware and applications that are part of modern IT workflows, from on-premise legacy assets to private and public cloud environments, all the way to the edge of the network, where smart devices and customers combine to create business value. Centreon is constantly current, able to support the most dynamic environments. With auto-discovery capabilities it can keep track of Software-Defined Network (SDN) elements, AWS or Azure cloud assets, Wi-Fi access points or any other component of today’s agile IT infrastructure.
  • 17
    Bosun

    Bosun

    Bosun

    is an open-source, MIT licensed, monitoring and alerting system by Stack Exchange. It has an expressive domain specific language for evaluating alerts and creating detailed notifications. It also lets you test your alerts against history for a faster development experience. Use Bosun's flexible expression language to evaluate time series in an exacting way. Save time by testing alerting against historical data and reduce alert noise before an alert goes into production. Runs on Linux, Windows, Mac, or any operating system supported by Go. Supports arbitrary dimensions (not just host based), aggregations, and automatically incorporating new tags as they appear. Scollector auto detects new services and starts sending metrics immediately; properly designed alerts will apply to these new services which reduces maintenance. Use our agent scollector to get monitoring of Windows, Linux, and many common applications.
  • 18
    Compass

    Compass

    Cobalt Iron

    Forget the days of managing data protection events through multiple, disconnected backup products. With Compass, you can set policies, view operations, and track granular performance for all your workloads. Compass is secure by design and the only data backup solution endorsed by Sheltered Harbor for both on-prem and cloud. It's architected to eliminate vulnerabilities in the backup process that expose data to cyberattack. If disaster strikes, your backup is ready to help you recover immediately. Born in the cloud, the Compass Architecture is designed to take full advantage of progressive technologies such as analytics, SaaS, multi-cloud, and virtualization. The Commander is an easy-to-use web dashboard providing a simple and intuitive user experience, while the Analytics Engine delivers the flexibility and insight required for today’s enterprise data protection.
  • 19
    ZENworks Asset Management
    ZENworks Asset Management combines sophisticated workstation inventory, network and device discovery, software management, license tracking, software usage, and contract management into a comprehensive asset management solution with a single, unified administration and management console. Micro Focus® ZENworks® Asset Management combines sophisticated workstation inventory, network and device discovery, software management, license tracking, software usage and contract management into a comprehensive asset management solution with a single, unified administration and management console. Improve license compliance and eliminate audit concerns by providing a complete, accurate view of software installations, accurate software usage data and sophisticated license reconciliation capabilities. Lower IT costs by gaining a comprehensive view of every IT asset in your organization and eliminating the risks of over- and under-purchasing.
  • 20
    Intel Server Management
    Intelligently monitor and manage your servers with a variety of Intel® server management tools and firmware to alert users of potential failures, assist in keeping firmware up to date, and monitor power and thermal conditions in the data center. Take full control of the server using a virtual keyboard, video, mouse (KVM), and virtual media redirection. A BMC is a specialized microcontroller on a server’s motherboard. It is loaded with features and north bound interfaces that allow end-users to monitor and manage servers either through management software they build on their own, existing solutions such as Intel® Data Center Manager and Intel® Server Utilities, or by third-party tools. Extensive Redfish schemas available to manage, update firmware and view asset inventory. Legacy protocols like IPMI, SNMP, SMTP are fully supported on the platform. IPMI is 2.0 compliant with several additional OEM commands included, as well.
  • 21
    NiTO

    NiTO

    NITOROM

    NiTO is an all-in-one infrastructure monitoring solution that empowers you to address issues before they become recurring problems. With NiTO you can monitor your entire IT infrastructure with increased security, minimal configuration, and unmatched real-time detail. Our dashboards provide you with near-time actionable insights and data retention from 24 hours to 90 days make it easier to investigate issues in your network. To make sure you never miss an occurrence, you can set alarms to notify you based on severity of the issue by email, phone or SMS.
  • 22
    MicroStack

    MicroStack

    Canonical

    Install and run OpenStack on Linux in minutes. Made for developers and great for edge, IoT, and appliances. A full OpenStack in a single snap package. MicroStack is an upstream multi-node OpenStack deployment which can run directly on your workstation. Although made for developers, it is also suitable for edge, IoT and appliances. Grab MicroStack from the Snap Store and get your OpenStack running right away. Get a full OpenStack system running in minutes. Runs safely on your laptop with state of the art isolation. Pure upstream OpenStack delivered to your laptop. Includes all key OpenStack components: Keystone, Nova, Neutron, Glance, and Cinder. All the cool things you probably want to try on a small, standard OpenStack are all built-in. Use MicroStack in your CI/CD pipelines and get on with your day without headaches. MicroStack requires at least 8 GB RAM and a multi-core processor.
  • 23
    Mir Display Server
    Whether you want an information kiosk, digital signage display, in-car entertainment stack, or home automation interface, Mir on Ubuntu is your fastest path to deployment. Mir is a system-level component that can be used to unlock next-generation user experiences. It runs on a range of Linux powered devices including traditional desktops, IoT and embedded products. Mir is a replacement for the X window server system, commonly used on Linux desktop devices. It allows device makers and desktop users to have a well-defined, efficient, flexible, and secure platform for their graphical environment. Historically, graphical user interfaces Linux have been powered by the X windowing system. X has a long and successful history and it has served the purposes of both system level and application level UI well for more than 3 decades. However, users nowadays expect a more consistent, integrated and secure user experience than is possible to offer on top of the X windowing system.
  • 24
    KeyTalk

    KeyTalk

    KeyTalk

    KeyTalk is independent of Certificate Authorities and linked to a large number of public CAs both GMO GlobalSign and Digicert QuoVadis. Switching between CAs is simple and easy, even when thousands of certificates and end-points are involved. A vendor lock-in is therefore no longer the case. KeyTalk contains an internal CA for the generation of private certificates and keys. Did you use previously expensive public certificates for internal purposes? Or did you run into the limited functionality of Microsoft CS and other private CAs? Then, you will like our internal CA, private PKI certificate issuance. KeyTalk keeps track of the lifecycle of your certificates in a fully automated way. This way, you always have a complete and up to date overview of all your certificates, including the certificate name, SAN and validity. Also, things like used crypto keys and algorithms of internal and external certificates can be included.
  • 25
    Cmd

    Cmd

    Cmd

    A powerful yet lightweight security platform that provides insightful observability, proactive controls, threat detection and response for your Linux infrastructure in the cloud or datacenter. Your cloud infrastructure is a massive multi-user environment. Don’t protect it with security solutions originally built for endpoints. Think beyond logging and analytics solutions that lack the necessary context and workflows for true infrastructure security. Cmd’s infrastructure detection and response platform is optimized for the needs of today’s agile security teams. View system activity in real time or search through retained data, aided by rich filters and triggers. Leverage our eBPF sensors, contextual data model and intuitive workflows to gain insight into user activity, running processes and access to sensitive resources. No advanced degree in Linux administration required. Create guardrails and controls around sensitive actions to complement traditional access management.
  • 26
    Pensando

    Pensando

    Pensando

    The massive expansion in the number and diversity of applications, as well as an explosion in the amount of data being generated and transported through enterprise data centers, has pushed the architectural limits of modern IT infrastructure to its breaking point. Traditional “scale-up” approaches, where infrastructure services are embedded into top-of-rack switches, networking and security appliances, are no longer able to keep up, making performance, agility and scale limitations a fact of life for many businesses. Pensando Systems was founded on the belief that there has to be a better way to address these complex issues. We have taken a ground up approach to build a platform that gives enterprises the unique ability to drive cloud-like agility, security and operational simplicity across their entire infrastructure with unmatched scale and performance.
  • 27
    Blokada

    Blokada

    Blokada

    Blokada is the popular ad blocker and privacy app for Android and iOS. It's being supported and actively developed by the amazing open source community. If you want to efficiently block ads, trackers, malware, save on your data plan, speed up your device and protect your privacy with just one application, then Blokada is for you. It is free, secure and open source. For ultimate privacy protection, upgrade to Blokada Plus and connect through our VPN. We use WireGuard®, the most advanced VPN protocol, to encrypt your network activity and hide your IP address. Blokada Slim is a lightweight version of the app, and it only contains features allowed by the Google Play policy. Blokada is not only the privacy app. It is also the community of people who care about their digital privacy and wellbeing. You will find us on our forum, where you can ask any questions you may have. We are also present on other social media and chats.
  • 28
    openSUSE Leap
    A brand new way of building openSUSE and a new type of a hybrid Linux distribution. Leap uses source from SUSE Linux Enterprise (SLE), which gives Leap a level of stability unmatched by other Linux distributions, and combines that with community developments to give users, developers and sysadmins the best stable Linux experience available. If you’re already running openSUSE you can upgrade by booting from the DVD/USB and choosing upgrade, or carry out an ‘Online Upgrade’ in a few commands. Leap is a classic stable distribution approach, one release each year and in between security and bugfixes. This makes Leap very attractive as server operating system, but as well for Desktops since it requires little maintenance effort. openSUSE Leap is compatible with SUSE Linux Enterprise; this gives Leap a level of stability unmatched by other Linux distributions and provides users the ability to migrate to an enterprise offering.
  • 29
    Xfce

    Xfce

    Xfce

    Xfce is a lightweight desktop environment for UNIX-like operating systems. It aims to be fast and low on system resources, while still being visually appealing and user friendly. In order to make Xfce shine a little more out of the box and to strengthen its visual identity we created new icons for all of our core applications and based them on a shared palette to ensure consistency. We also set some further (implicit) design constraints, loosely following Adwaita's principles. The Settings Manager itself received a visual refresh of its filter box, which can now be hidden permanently. At the same time the search capabilities of the filter box were improved by searching the descriptive 'Comments' part of each dialog's launcher (aka .desktop) file. This new dialog represents a merger between the previously available 'Mime Settings' and the 'Preferred Applications' dialogs. Consolidating both in one place means users have an easier time setting default applications to handle files.
  • 30
    Lubuntu

    Lubuntu

    Lubuntu

    Lubuntu is a fast and lightweight operating system with a clean and easy-to-use user interface. It is a Linux system, that uses the minimal desktop LXDE/LXQT, and a selection of light applications. Because of this, Lubuntu has very low hardware requirements. Lubuntu was founded by Mario Behling and has been grown for many years by Julien Lavergne. Please join us and install Lubuntu on your computer. The objective of the lubuntu project is to create a faster, more lightweight and energy saving variant of Ubuntu by using LXDE, The Lightweight X11 Desktop Environment, as its default GUI. Members of the lubuntu team take care of LXDE and other packages that are part of the lubuntu installation. Contribute creating a lighter, less resource hungry and more energy-efficient Linux Desktop. It is our goal to make Linux run on more cost-effective machines and MIDs besides Intel CPUs based on ARM and Mips.
MongoDB Logo MongoDB