Best IT Security Software for Netdata - Page 2

Compare the Top IT Security Software that integrates with Netdata as of November 2025 - Page 2

This a list of IT Security software that integrates with Netdata. Use the filters on the left to add additional filters for products that have integrations with Netdata. View the products that work with Netdata in the table below.

  • 1
    CrowdSec

    CrowdSec

    CrowdSec

    CrowdSec is a free, open-source and collaborative IPS to analyze behaviors, respond to attacks & share signals across the community, outnumbering cybercriminals all together. Set up your own intrusion detection system. Apply behavior scenarios to identify cyber threats. Share and benefit from a crowdsourced and curated cyber threat intelligence system. Define the type of remediation you want to apply and where. Leverage the community’s IP blocklist and automate your security. CrowdSec is designed to run seamlessly on virtual machines, bare-metal servers, containers or to be called directly from your code with our API. Our strength comes from our cybersecurity community that is burning cybercriminals’ anonymity. By sharing IP addresses that aggressed you, you help us curate and redistribute a qualified IP blocklist to protect everyone. CrowdSec is 60x faster than tools like Fail2ban and can parse massive amounts of logs in no time.
  • 2
    HAProxy ALOHA

    HAProxy ALOHA

    HAProxy Technologies

    A plug-and-play hardware or virtual load balancer based on HAProxy Enterprise that supports proxying at Layer 4 and Layer 7. Its simple graphical interface, easy installation, and no limit on backend servers make it ideal for companies looking for a dedicated system to ensure high-performance load distribution for critical services. ALOHA Hardware Load Balancer adds patented PacketShield technology, providing protocol-level DDoS protection that filters illegitimate traffic at line rate, outperforming other types of firewalls. The modern enterprise demands reliable performance, ease of integration, advanced security and extensible features. HAProxy ALOHA Hardware Load Balancer gives enterprises an incredibly powerful, plug and play, appliance that can be deployed in any environment. HAProxy ALOHA’s simple graphical interface coupled with an advanced templating system makes it painless to deploy and configure.
  • 3
    PowerDNS

    PowerDNS

    PowerDNS

    PowerDNS solutions are focused on large-scale DNS service providers, including mobile and fixed-line broadband operators, and hosting and cloud service providers. PowerDNS also underpins scalable security solutions from market-leading vendors. Providers trust PowerDNS to deliver an excellent user experience and protection against DDoS and malware attacks, as well as ensure internet performance for hosters and ISPs. DNS, as the ‘phonebook of the internet’, is a vital part of the infrastructure, needed to provide users with an optimized internet experience. Almost without exception, every action on the internet, from visiting a website, using a service via a mobile app or checking and sending emails, starts with the client looking up the IP addresses of the service using the domain name system. As such, DNS forms a critical control point on the internet, which processes lots of information and personal data.
  • 4
    OpenVAS

    OpenVAS

    Greenbone Networks

    OpenVAS is a full-featured vulnerability scanner. Its capabilities include unauthenticated and authenticated testing, various high-level and low-level internet and industrial protocols, performance tuning for large-scale scans and a powerful internal programming language to implement any type of vulnerability test. The scanner obtains the tests for detecting vulnerabilities from a feed that has a long history and daily updates. OpenVAS has been developed and driven forward by the company Greenbone Networks since 2006. As part of the commercial vulnerability management product family Greenbone Enterprise Appliance, the scanner forms the Greenbone Vulnerability Management together with other Open Source modules.
  • 5
    Azure Resource Manager
    Azure Resource Manager is the deployment and management service for Azure. It provides a management layer that enables you to create, update, and delete resources in your Azure account. You use management features, like access control, locks, and tags, to secure and organize your resources after deployment. When a user sends a request from any of the Azure tools, APIs, or SDKs, Resource Manager receives the request. It authenticates and authorizes the request. Resource Manager sends the request to the Azure service, which takes the requested action. Because all requests are handled through the same API, you see consistent results and capabilities in all the different tools. All capabilities that are available in the portal are also available through PowerShell, Azure CLI, REST APIs, and client SDKs. Functionality initially released through APIs will be represented in the portal within 180 days of initial release.
  • 6
    ClamAV

    ClamAV

    ClamAV

    ClamAV® is the open-source standard for mail gateway-scanning software. ClamAV includes a multi-threaded scanner daemon, command-line utilities for on-demand file scanning, and automatic signature updates. ClamAV supports multiple file formats and signature languages, as well as file and archive unpacking. Access to ClamAV versions that work with your operating system. ClamAV® is an open-source antivirus engine for detecting trojans, viruses, malware & other malicious threats. ClamAV® is an open-source (GPL) anti-virus engine used in a variety of situations, including email and web scanning, and endpoint security. It provides many utilities for users, including a flexible and scalable multi-threaded daemon, a command-line scanner, and an advanced tool for automatic database updates. Built-in support for various archive formats, including ZIP, RAR, Dmg, Tar, GZIP, BZIP2, OLE2, Cabinet, CHM, BinHex, SIS, and others.