Best IT Security Software for Redmine

Compare the Top IT Security Software that integrates with Redmine as of July 2025

This a list of IT Security software that integrates with Redmine. Use the filters on the left to add additional filters for products that have integrations with Redmine. View the products that work with Redmine in the table below.

What is IT Security Software for Redmine?

IT security software is designed to protect information technology (IT) systems, networks, and data from cyber threats, such as malware, hacking, and unauthorized access. These tools provide various features such as antivirus protection, firewalls, encryption, intrusion detection and prevention systems, and vulnerability management to ensure the integrity, confidentiality, and availability of sensitive information. IT security software helps organizations detect, prevent, and respond to security incidents, mitigate risks, and ensure compliance with industry regulations. It is critical for businesses and individuals to safeguard against cyberattacks, data breaches, and other security vulnerabilities. Compare and read user reviews of the best IT Security software for Redmine currently available using the table below. This list is updated regularly.

  • 1
    Kamatera

    Kamatera

    Kamatera

    With our comprehensive suite of scalable cloud services, you can build your cloud server, your way. Kamatera’s infrastructure specializes in VPS hosting, with a choice of 24 data centers worldwide, including 8 data centers across the US as well as locations in Europe, Asia, and the Middle East. Our enterprise-grade cloud servers can meet your needs at every stage. We use cutting-edge hardware, such as Ice Lake Processors and NVMe SSD, to deliver consistent speed and 99.95% uptime. With a robust service like ours, you can expect plenty of great features, such as fantastic hardware, flexible and scalable cloud setup, fully managed hosting, windows server hosting, data security and safety, consultation, server migration, and disaster recovery. Our technical staff is always on duty, with 24/7 live support to assist you across all time zones. And our flexible, predictable pricing plans means you’ll only pay for what you use with our hourly or monthly billing options.
    Starting Price: $4 per month
    View Software
    Visit Website
  • 2
    Pandora FMS

    Pandora FMS

    Pandora FMS

    With more than 50,000 customer installations across the five continents, Pandora FMS is a truly all-in-one monitoring solution, covering all traditional silos for specific monitoring: servers, networks, applications, logs, synthetic/transactional, remote control, inventory, etc. Pandora FMS gives you the agility to find and solve problems quickly, scaling them so they can be derived from any source, on-premise, multi cloud or both of them mixed. Now you have that capability across your entire IT stack and analytics to find any problem, even the ones that are hard to find. Thanks to more than 500 plugins available, you can control and manage any application and technology, from SAP, Oracle, Lotus, Citrix or Jboss to VMware, AWS, SQL Server, Redhat, Websphere, etc.
    Leader badge
    Starting Price: €90/month
  • 3
    Teramind

    Teramind

    Teramind

    Teramind provides a user-centric security approach to monitoring your employees’ digital behavior. Our software streamlines employee data collection in order to identify suspicious activity, improve employee productivity, detect possible threats, monitor employee efficiency, and ensure industry compliance. We help reduce security incidents using highly customizable Smart Rules that can alert, block or lockout users when rule violations are detected, to keep your business running securely and efficiently. Our live & recorded screen monitoring lets you see user actions as they’re happening or after they’ve occurred with video-quality session recordings that can be used to review a security or compliance event, or to analyze productivity behaviors. Teramind can be installed in minutes and can be deployed either without employees knowing or with full transparency and employee control to maintain trust.
    Starting Price: $12/month/user
  • 4
    OXARI

    OXARI

    Infonet Projekt SA

    OXARI is a professional ITSM class ServiceDesk system that is ITIL-compliant and enriched with a toolset needed by IT teams. IMPLEMENTATION BENEFITS: - OXARI is a universal platform that enables implementation of a professional ITSM class system in accordance with the ITIL standard. The system includes tools to facilitate IT teams’ work, and a dedicated set of features designed to manage advanced business processes. - The modular design of the system, combined with a modern user interface, allows you to model any Asset Management, CMDB, ServiceDesk, Workflow, and MDM work logic. - The system can be accessed using any web browser. It also allows you to design all the user interface components by yourself. MULTIPLE CONFIGURATIONS Rule-based management is the main component of the system that ensures configuration flexibility. OXARI allows you to create any number of patterns consisting of specific rules and actions.
    Starting Price: $7/month/user
  • 5
    IriusRisk

    IriusRisk

    IriusRisk

    IriusRisk is the industry's leading threat modeling and secure design solution in Application Security. With enterprise clients including Fortune 500 banks, payments, and technology providers, it empowers security and development teams to ensure applications have security built-in from the start - using its powerful threat modeling platform. Whether teams are implementing threat modeling from scratch, or scaling-up their existing operations, the IriusRisk approach results in improved speed-to-market, collaboration across security and development teams, and the avoidance of costly security flaws.
  • 6
    AuthN by IDEE
    Award winning, Enterprise-wide, Zero Trust Authentication as a Service. AuthN™ by IDEE eliminates all password based risks and reduces the cost of administrative overhead. Your fastest time to market for your transition to passwordless across the enterprise. AuthN™ is interoperable and can be deployed in addition to your existing SSO, hardware-token and password-management investments. Whether stand-alone or integrated, realize a tangible reduction of your risk exposure by completely removing the password. Insider threats and human errors are also reduced with no central credential databases of any kind. Our completely passwordless multi-factor authentication can keep your attackers at bay and keep you out of the headlines of tomorrow. Your favorite applications, SSO and password managers receive a plug & play security upgrade. AuthN™ supports open standards (e.g. RADIUS, SAML, OIDC) and offers custom plugins to help you leverage the additional benefits of AuthN™.
    Starting Price: €3 per user per month
  • 7
    Conviso Platform

    Conviso Platform

    Conviso Platform

    Gain a complete view of your application security. Increase security maturity in your secure development process, and reduce the risks associated with your products. Application Security Posture Management (ASPM) solutions play a crucial role in the ongoing management of application risks, addressing security issues from the development phase to deployment. Efficiently managing an AppSec program, dealing with a growing number of products, and lacking a comprehensive view of vulnerabilities are typically significant challenges for the development team. We enhance the evolution of maturity by supporting the implementation of AppSec programs, monitoring established and executed actions, KPIs, and much more. We enable security to be incorporated into the early stages of development by defining requirements, processes, and policies and optimizing resources and time invested in additional testing or validations.
    Starting Price: $20.99 per asset
  • 8
    LDAP

    LDAP

    LDAP

    ​LDAP is a comprehensive resource dedicated to the Lightweight Directory Access Protocol (LDAP), a mature, flexible, and well-supported standards-based mechanism for interacting with directory servers. Often utilized for authentication and storing information about users, groups, and applications, an LDAP directory server serves as a general-purpose data store applicable in various scenarios. Provides basic information about directory services and the LDAP protocol.​ Assists in finding the appropriate directory server, client API, or LDAP-based tools suitable for different environments.​ Offers links to various standards documents and reference guides for in-depth exploration of the protocol.​ Features posts related to directory services, including software release news, new standards documents, specifications, and how-to articles.​
  • Previous
  • You're on page 1
  • Next