Best IT Management Software for Linux - Page 46

Compare the Top IT Management Software for Linux as of May 2026 - Page 46

  • 1
    Performance Navigator
    Performance Navigator is a graphical PC tool designed for performance analysis and capacity modeling across various platforms, including IBM i, AIX/VIOS, Linux, Solaris, and HP-UX workloads on IBM Power Systems, Oracle, and HP servers. It collects historical performance data with minimal overhead by securely feeding data from collection services, NMON, and/or SAR to the Windows client nightly, updating system history files. The software offers thousands of graphs, custom reports, and features to assist with performance analysis, server consolidation, and upgrades. Its "What If" functionality allows users to model hypothetical scenarios to determine how capacity changes will impact server performance, facilitating precise capacity planning decisions. Additionally, Performance Navigator provides swift problem determination, enabling users to obtain comprehensive summaries of system issues in under two minutes. It supports various platforms.
  • 2
    Cloudfleet Kubernetes Engine (CFKE)
    From datacenter to cloud to edge, Cloudfleet delivers the Kubernetes experience as it was meant to be. Just-in-time infrastructure, automated upgrades, and advanced permissions management, all seamlessly controlled through a single pane of glass for your clusters. Cloudfleet is a fully managed multi-cloud and hybrid Kubernetes service that simplifies your infrastructure setup with automated server provisioning across on-premises environments and 12 cloud service providers.
    Starting Price: $0
  • 3
    Kubiya

    Kubiya

    Kubiya

    Kubiya is an AI-powered internal developer platform that leverages conversational AI to streamline DevOps processes. By integrating with existing tools and platforms, Kubiya enables developers to interact with their systems using natural language, reducing the time-to-automation and enhancing productivity. The platform offers AI teammates capable of handling routine tasks such as managing Jira queues, provisioning infrastructure, and enforcing just-in-time cloud permissions, allowing engineering teams to focus on higher-value activities. Kubiya's agentic-native design ensures predictable and secure operations, with enterprise-grade security measures and compliance with organizational policies. The platform integrates seamlessly into communication workflows, supporting tools like Slack and Microsoft Teams, to provide a conversational interface for task delegation and automation.
  • 4
    SonicWall NetExtender
    SonicWall's NetExtender is an SSL VPN client that enables remote users to securely connect to a company's network, providing seamless access to resources as if they were on the local network. Compatible with Windows and Linux operating systems, NetExtender allows users to run applications, transfer files, and mount network drives securely over an encrypted connection. This transparent software integrates smoothly with SonicWall's range of firewalls, including the TZ, NSa, NSsp, and NSv series, as well as the Secure Mobile Access (SMA) 100 Series appliances. By utilizing Point-to-Point Protocol (PPP), NetExtender ensures that remote clients have reliable and secure access to internal network resources, enhancing productivity without compromising security.
    Starting Price: Free
  • 5
    1Password Extended Access Management (XAM)
    1Password Extended Access Management (XAM) is a security solution designed to safeguard every login across applications and devices, making it ideal for hybrid work environments. It combines user identity verification, device trust assessments, enterprise password management, and application insights to ensure that only authorized users on secure devices can access both approved and unapproved applications. By providing IT and security teams with visibility into app usage, including shadow IT, XAM enables organizations to enforce contextual access policies based on real-time risk signals like device compliance and credential integrity. With its zero-trust approach, XAM helps businesses move beyond traditional identity management, strengthening security in today’s SaaS-driven workplace.
  • 6
    SUSE Linux Enterprise Server (SLES)
    SUSE Linux Enterprise Server (SLES) is a robust, scalable, and secure enterprise-grade operating system designed for businesses and organizations. It offers a reliable platform for running mission-critical workloads and applications across physical, virtual, and cloud environments. SUSE Linux Enterprise Server provides advanced features such as high availability, virtualization, and cloud integration, making it ideal for deploying complex IT infrastructures. It is known for its stability and long-term support, ensuring organizations can maintain a secure and consistent environment over time. SUSE's management tools allow for streamlined configuration and automation, simplifying the deployment and maintenance of servers. It supports a wide range of hardware architectures, including x86_64, ARM, and IBM Power, ensuring flexibility for various business needs. SUSE Linux Enterprise Server is also optimized for performance, with strong security features.
  • 7
    SonicWall Connect Tunnel
    SonicWall Connect Tunnel provides an “in-office” experience for a remote working world with full access away from the office. For IT-managed Mac, Windows, and Linux users, this thin client delivers fast and secure remote access to sensitive corporate data and assets. For Windows 10 users, Connect Tunnel supports Device Guard, a Windows server component that enables secure authorized access. With Connect Tunnel, you always maintain centralized control because it integrates directly with SMA 1000 Unified Policy and End Point Control (EPC) to ensure a safe environment and a compliant device before allowing network access. Unleash the benefits of a remote workforce without sacrificing the security of your corporate network. We provide a variety of VPN clients to fit the needs of every SonicWall appliance or virtual appliance.
  • 8
    DataBahn

    DataBahn

    DataBahn

    DataBahn.ai is redefining how enterprises manage the explosion of security and operational data in the AI era. Our AI-powered data pipeline and fabric platform helps organizations securely collect, enrich, orchestrate, and optimize enterprise data—including security, application, observability, and IoT/OT telemetry—for analytics, automation, and AI. With native support for over 400 integrations and built-in enrichment capabilities, DataBahn streamlines fragmented data workflows and reduces SIEM and infrastructure costs from day one. The platform requires no specialist training, enabling security and IT teams to extract insights in real time and adapt quickly to new demands. We've helped Fortune 500 and Global 2000 companies reduce data processing costs by over 50% and automate more than 80% of their data engineering workloads.
  • 9
    Pinaka ZTi

    Pinaka ZTi

    Pinakastra Computing

    Pinaka ZTi is a comprehensive, next-generation solution designed to automate the entire lifecycle of your cloud infrastructure. With a modular approach, it simplifies deployment, scaling, management, and maintenance, offering seamless integration of multiple technologies for OpenStack based cloud. Pinaka™ ZTi (Zero Touch Integration) is a next-generation cloud infrastructure management solution that automates the lifecycle of OpenStack-based clouds. With its modular approach, Pinaka ZTi simplifies deployment, scaling, management, and maintenance, providing centralized monitoring, zero-touch deployment, and self-service management portals. It offers features such as distributed storage, cloud migration tools, real-time monitoring, and enhanced security compliance, making it a comprehensive solution for managing complex cloud environments.
  • 10
    AWS VPN

    AWS VPN

    Amazon

    AWS VPN enables secure connections between on-premises networks and AWS Virtual Private Clouds (VPCs) using IPsec VPN tunnels. Each connection includes two tunnels for high availability, terminating in different availability zones to ensure resilience. It supports both static and dynamic routing with BGP, and offers customizable tunnel options, including inside tunnel IP addresses, pre-shared keys, and BGP Autonomous System Numbers (ASNs). Accelerated Site-to-Site VPN leverages AWS Global Accelerator to route traffic through the nearest AWS edge location, improving performance by reducing latency and jitter. AWS Client VPN is a fully managed, elastic VPN service that allows users to securely access AWS and on-premises resources from any location using an OpenVPN-based client. It supports authentication through Active Directory, mutual certificate authentication, and SAML-based federated authentication.
  • 11
    InfraLens

    InfraLens

    Seasia Infotech

    InfraLens is a cutting-edge infrastructure monitoring and management solution developed by Seasia Infotech. Designed to enhance operational efficiency, it offers real-time insights, predictive analytics, and automated alerts to ensure seamless infrastructure performance, minimize downtime, and support proactive decision-making for enterprises.
  • 12
    IBM Z System Automation
    IBM Z System Automation is a NetView-based application that provides a single control point for a full range of system management functions. It plays a crucial role in supplying high-end automation solutions. IBM Z System Automation monitors, controls, and automates an extensive range of system elements spanning your enterprise's hardware and software resources. IBM Z System Automation is a policy-based, self-healing, high-availability solution designed to optimize the efficiency and availability of critical systems and applications. It reduces administrative and operational tasks, customization and programming effort, and automation implementation time and costs associated with Parallel Sysplex and policy-based automation. Using tight integration with Geographically Dispersed Parallel Sysplex (GDPS), IBM Z System Automation provides sophisticated disaster recovery capabilities for IBM Z systems.
  • 13
    SUSE Linux Enterprise High Availability
    Eliminate unplanned downtime and minimize data loss due to corruption or failure. The SLE HA extension includes geo clustering to manage clustered servers on-premises or in the cloud anywhere in the world. Our policy-driven, highly available extension for Linux clusters helps you maintain business continuity and minimize unplanned downtime across locations and geographies. Flexible, policy-driven clustering and continuous data replication boost flexibility while improving service availability and resource utilization by supporting the mixed clustering of both physical and virtual Linux servers. Install, configure, manage, and monitor your clustered Linux environments with a powerful unified interface. Multi-tenancy can be used to manage geo clusters according to your business needs.
  • 14
    Libelle BusinessShadow
    With our Libelle BusinessShadow solution for disaster recovery and high availability, you can mirror databases and other application systems with a time delay. Your company is thus protected not only from the consequences of hardware and application errors, but also from the consequences of elemental damage, sabotage, or data loss due to human error. Our patented and dynamically adjustable time funnel temporarily stores the change logs before they are mirrored to the standby system. Switching over to this system in the event of an error or even maintenance can thus be carried out with impressive speed and without any fuss. The time funnel temporarily stores logs before they reach the standby system. You can quickly and easily switch to an error-free state. Your data is up to date and consistent, as it does not have to be laboriously reverted from a backup, but is temporarily stored in the time funnel.
  • 15
    IBM PowerVC
    IBM PowerVC is an OpenStack-based virtualization management solution designed to simplify the deployment and management of virtual machines across IBM Power Systems running AIX, IBM i, and Linux. It offers rapid deployment capabilities, reducing time-to-value through straightforward installation and configuration processes. The intuitive user interface minimizes the need for specialized training, enhancing administrator productivity. PowerVC facilitates efficient resource utilization by enabling resource pooling and implementing placement policies, thereby optimizing IT costs. The Dynamic Resource Optimizer (DRO) provides policy-based automation for active workload balancing within host groups, ensuring optimal performance. VM templates support consistency and standardization, streamlining deployments and reducing labor costs. Key features include automated I/O configuration for mobility and high availability, and seamless import and deployment of workload images.
  • 16
    OpenText Server Backup
    OpenText Server Backup gives your business a secure, all-in-one solution for protecting physical, virtual, and legacy systems with flexible local, cloud, or hybrid deployment and rapid, near-zero-downtime recovery via bare-metal restores, granular file and application-aware options, and push-button cloud failover with automated failback. Managed through a single pane of glass, it supports optional integrated hardware appliances or virtual-machine-based configurations, customizable scheduling with forever-incremental backups and immutable, hourly snapshots, plus comprehensive ransomware scanning, alerting, and remediation. The platform delivers VMware and Hyper-V protection with RTOs as low as two minutes, Microsoft application data recovery to fully functional states, and granular restores to files, folders, or VMs.
  • 17
    OpenText Availability
    OpenText Availability continuously replicates physical, virtual, and cloud systems at the byte level, capturing real-time changes with a Recovery Point Objective of seconds, and maintains duplicated Windows and Linux servers at secondary locations for near-zero downtime. In the event of an outage, it offers automated or on-demand failover with integrated heartbeat monitoring and DNS management, followed by seamless failback when systems are restored. Data is secured with AES 256-bit encryption in flight, while three tiers of compression and bandwidth-throttling options minimize network impact. An extensive API allows integration with other applications, and built-in alerting, reporting, and non-disruptive failover testing ensure administrators can monitor health, troubleshoot, and validate disaster-recovery plans without affecting production workloads. OpenText Availability supports any hypervisor, including VMware ESXi/vSphere and Microsoft Hyper-V, and any major cloud platform.
  • 18
    Ivanti Neurons for UEM
    Ivanti Neurons for UEM is a cloud-based unified endpoint management platform that delivers complete visibility, control, and security for all devices through a single pane of glass. It discovers and inventories endpoints in real time to establish a single source of truth, streamlines onboarding and provisioning over the air with apps, settings, and security profiles, and manages devices and applications across their full lifecycle from enrollment to retirement. Built on the AI-powered Neurons platform, it automates routine troubleshooting, diagnostics, and remediation to create a self-healing environment that resolves issues without user interruption, while sensor-based architecture and natural-language querying provide instant operational awareness.
  • 19
    Ivanti Security Controls
    Ivanti Security Controls is an automated patch management solution that simplifies security through unified prevention, detection, and response across physical and virtual environments. It automatically discovers vulnerabilities and missing OS or third-party application patches, then deploys updates to servers, workstations, VMs, and templates, online or offline, via agentless patching and remote task scheduling to minimize disruption. Granular privilege management implements just enough and just-in-time administration to remove full admin rights while elevating access temporarily for approved tasks. Dynamic allowlisting enforces preventive policies so only known, trusted applications can execute, supported by a data-gathering mode that monitors application usage to refine controls and eliminate false positives. CVE-to-patch list creation automates grouping of relevant updates from any vulnerability assessment, and REST APIs enable integration and orchestration.
  • 20
    VE3 Ascend

    VE3 Ascend

    VE3 Global

    An AI-powered SAP S/4HANA transformation accelerator that helps enterprises migrate, modernize, and optimize their ERP with speed, precision, and measurable business outcomes. Combining automation, process intelligence, and the SAP–Databricks partnership, Ascend ensures a smooth, value-driven migration journey from ECC to S/4HANA.
  • 21
    Kallipr Kloud
    Kallipr Kloud is an industrial IoT software platform that manages large-scale monitoring networks for water, wastewater, stormwater, environmental and industrial operations. It handles the full device lifecycle, from fast deployment with configuration templates to secure registration, remote updates and real-time diagnostics. The platform gives operators a complete view of their network with live insights, trend analysis and clear alarm management for issues like blockages, leaks and pressure changes. Kallipr Kloud integrates directly with Azure and can send data into existing SCADA, GIS or analytics tools without middleware. It is designed for scale, secure communications, long device life and high uptime. Used with Kallipr’s data loggers, radar sensors and multi-sensor gateways, it provides a fully integrated hardware and software stack for more than 300 organisations across Australia, New Zealand and the United States.
    Starting Price: $15
  • 22
    ChartGen

    ChartGen

    Ada.im

    ChartGen AI is an AI-powered chart creation platform designed to transform raw data into professional, insightful visualizations within seconds. The platform allows users to upload CSV or Excel files or connect live data sources and generate charts using simple natural language descriptions. ChartGen AI supports a wide range of chart types, including bar charts, line charts, pie charts, scatter plots, heatmaps, funnels, and waterfalls. With real-time data synchronization, charts automatically update as underlying data changes. ChartGen AI enables easy exporting of visuals in PNG, SVG, and PDF formats for use in reports, presentations, and dashboards. Enterprise-grade security with SOC 2 and GDPR compliance ensures that business data remains protected. Used by thousands of professionals worldwide, ChartGen AI streamlines data visualization for faster and clearer decision-making.
  • 23
    Corma

    Corma

    Corma

    Corma is a unified license and access governance platform built for modern IT teams. It helps organizations manage software spend, identity access, and security from a single, centralized system. Corma provides full visibility into all SaaS applications, users, and permissions across the IT stack. The platform uses AI-powered agents to automate onboarding, offboarding, and access reviews with zero manual effort. Corma enables least-privilege access enforcement and simplifies compliance with standards like ISO 27001 and SOC 2. It also helps reduce software costs by identifying unused licenses and preventing surprise renewals. With fast setup and automation-first workflows, Corma allows teams to go live in minutes.
  • 24
    Rocket ACUCOBOL-GT

    Rocket ACUCOBOL-GT

    Rocket Software

    Rocket® ACUCOBOL-GT® is a comprehensive COBOL development and deployment system designed to extend, modernize, and maintain business-critical COBOL applications while preserving existing logic and workflows. It provides developers with modern tools, including integration with Visual Studio Code, enabling them to analyze, edit, compile, and debug complex ACUCOBOL codebases within a familiar environment. The platform supports seamless integration with contemporary technologies such as Java, .NET, C, and COM, allowing organizations to modernize applications without rewriting them from scratch. It includes built-in graphical capabilities, where the “GT” (Graphical Technology) enables developers to embed interface elements such as menus, buttons, and windows directly into applications, creating richer user experiences. It also offers a Screen Designer and layout tools to build adaptive, responsive user interfaces that can be rendered remotely without requiring code changes.
  • 25
    xiRAID

    xiRAID

    Xinnor

    xiRAID is a high-performance RAID solution designed specifically for modern storage environments, particularly those built on NVMe and NVMe-over-Fabrics (NVMe-oF) technologies. It replaces traditional hardware RAID controllers with a software-based approach that delivers significantly higher performance, lower total cost of ownership, and greater flexibility. It supports both locally attached drives and networked NVMe devices, presenting them as a unified block device that applications can use without modification. It is engineered to achieve near-hardware speeds through advanced techniques such as I/O parallelization and a lockless datapath, enabling throughput of up to 150 GB/s, up to 30 million IOPS, and latency below 0.5 ms while maintaining minimal CPU and memory usage. It supports a wide range of RAID levels, including 0, 1, 5, 6, 10, 50, 60, and 70, and is compatible with POSIX APIs, allowing seamless integration with existing file systems.
  • 26
    GitHub Actions
    GitHub Actions is a powerful automation tool that enables developers to streamline their software workflows directly within GitHub. It allows teams to build, test, and deploy code automatically using CI/CD pipelines triggered by events such as code pushes or pull requests. With support for multiple programming languages and environments, developers can run workflows across Linux, macOS, and Windows. GitHub Actions also provides hosted and self-hosted runners for flexible execution. It simplifies repetitive tasks like code reviews, issue management, and deployment processes. With real-time logs and built-in secret management, it ensures transparency and security. Overall, GitHub Actions helps teams automate development processes and deliver software faster.
  • 27
    Scalefusion OneIdP

    Scalefusion OneIdP

    Scalefusion OneIdP

    Scalefusion OneIdP is a Zero Trust access solution that brings together Identity & Access Management (IAM), Single Sign-On (SSO), Multi-Factor Authentication (MFA), Conditional Access, Just-In-Time (JIT) admin access, and more into a single platform. It secures every access request by combining identity verification with real-time device posture checks, ensuring only verified users on compliant devices can access critical resources. With centralized user lifecycle management, automated provisioning, and unified policy controls. OneIdP simplifies onboarding, strengthens access governance, and reduces IT overhead, while delivering a consistent, secure login experience across enterprises.
  • 28
    Open Resilience

    Open Resilience

    Open Resilience

    Achieve true organizational resilience with our comprehensive platform for Business Continuity, IT Service Continuity, and Risk Management—all powered by AI to protect your business from disruption.
  • 29
    Aster Mail

    Aster Mail

    Aster Mail

    Aster Mail is a free, open-source, end-to-end encrypted email service for people who want real privacy without the technical overhead. All encryption happens on your device before anything reaches our servers, so we have zero access to your messages or metadata. Aster uses standard OpenPGP with portable RSA-4096 keys, so you're never locked in. Your keys work with GPG, Thunderbird, or any PGP client, and they're discoverable through WKD and public keyservers. Aster-to-Aster messages use a Signal-inspired X3DH and Double Ratchet protocol for forward secrecy. Every plan includes encrypted email, custom domain support, free aliases, tracker protection, and full access across web and desktop. The entire codebase is published under AGPL v3 on GitHub, fully auditable, with a public warrant canary and documented vulnerability disclosure. Free plan includes 10 GB encrypted storage, 5 aliases, and 1 custom domain. Paid plans start at $2.99/month. Servers located in Germany.
  • 30
    Snow Software

    Snow Software

    Snow Software

    We have brought together software asset management, cloud management and SaaS management so you can fully optimize all of your technology in one platform that seamlessly integrates with your enterprise ecosystem. Clearly see, understand and manage your entire technology landscape, both on-prem and in the cloud. Maximize the value of your technology investments with deep insights into usage, spend and vulnerabilities. Get the perspective and automation you need to anticipate and align with the rapidly evolving needs of your business. Fast implementation and intuitive design means you are saving money in weeks, not months. Break down your data silos to see on-prem, hybrid and cloud technologies together. Get clean and augmented data, updated daily and powered by the world's largest discovery catalog. Recommendations and self-service drive value, save time and increase productivity.
MongoDB Logo MongoDB