Best IT Security Software for Terraform

Compare the Top IT Security Software that integrates with Terraform as of June 2025

This a list of IT Security software that integrates with Terraform. Use the filters on the left to add additional filters for products that have integrations with Terraform. View the products that work with Terraform in the table below.

What is IT Security Software for Terraform?

IT security software is designed to protect information technology (IT) systems, networks, and data from cyber threats, such as malware, hacking, and unauthorized access. These tools provide various features such as antivirus protection, firewalls, encryption, intrusion detection and prevention systems, and vulnerability management to ensure the integrity, confidentiality, and availability of sensitive information. IT security software helps organizations detect, prevent, and respond to security incidents, mitigate risks, and ensure compliance with industry regulations. It is critical for businesses and individuals to safeguard against cyberattacks, data breaches, and other security vulnerabilities. Compare and read user reviews of the best IT Security software for Terraform currently available using the table below. This list is updated regularly.

  • 1
    Files.com

    Files.com

    Files.com

    6,000+ companies trust Files.com to automate and secure business critical transfers. We obsess about security, compliance, reliability, and performance so your critical business processes just work every time. Easily manage any transfer flow without writing scripts or code, and onboard workloads and partners effortlessly. We support standard file transfer protocols (FTP, SFTP, AS2) for working with external partners and also provide native apps for high performance internal transfers. As a fully Cloud-Native SaaS, there are no servers for you to buy or maintain, there is no installation required, and high availability and redundancy are built in and free. Out-of-the-box integrations include Microsoft (Azure, SharePoint, OneDrive, Active Directory & Office), AWS (S3 & SNS), Google (Cloud & Drive), Box, Dropbox, Zapier, and dozens of others. Developers can leverage our SDKs, API, and CLI to build custom integrations too.
    Leader badge
    View Software
    Visit Website
  • 2
    ClouDNS

    ClouDNS

    ClouDNS

    ClouDNS is a leading global provider of managed DNS services, trusted by businesses of all sizes for its speed, security, and reliability. Powered by a high-performance Anycast DNS network with 60+ Points of Presence across 6 continents, it ensures lightning-fast domain resolution, instant global synchronization, and up to 1000% SLA uptime guarantees. ClouDNS offers a full suite of DNS and domain solutions, including Free DNS, Premium DNS, DDoS Protected DNS, GeoDNS, Domain Registration, SSL Certificates, Real-Time Monitoring, and Google Workspace integration. As an ISO 27001-certified and ICANN-accredited provider, ClouDNS meets the highest standards for security and compliance. Its infrastructure is built to resist DDoS attacks, support DNSSEC, and provide enterprise-grade reliability. All services are backed by 24/7 live chat support, with real DNS experts ready to assist in under 60 seconds.
    Starting Price: $2.95 per month
    Partner badge
    View Software
    Visit Website
  • 3
    phoenixNAP

    phoenixNAP

    phoenixNAP

    phoenixNAP is a global IaaS provider delivering world-class infrastructure solutions from strategic edge locations in the U.S., Europe, Asia-Pacific, Australia, and Latin America. Specializing in performance, security, and availability, the company provides vastly redundant systems, unsurpassed security, high-density deployments, and flexibility to service from ¼ cabinets to private cage environments. Its Bare Metal Cloud solution provides access to 3rd Gen Intel® Xeon® Scalable Processors for advanced infrastructure performance and reliability. phoenixNAP offers a 100% uptime guarantee, an extensive server lineup, global connectivity options, flexible SLAs, and 24x7x365 live support to help businesses achieve their business objectives. Deploy high-performance, scalable cloud solutions for your growing IT needs, along with the security and reliability that you require at opex-friendly pricing plans.
    Starting Price: $0.10/hour
    View Software
    Visit Website
  • 4
    StrongDM

    StrongDM

    StrongDM

    StrongDM is a People-First Access platform that gives technical staff a direct route to the critical infrastructure they need to be their most productive. End users enjoy fast, intuitive, and auditable access to the resources they need, and administrators leverage simplified workflows to enhance security and compliance postures. - We open up a clear, direct path that gives individualized access to the right people and keeps everyone else out. - Total visibility into everything that’s ever happened in your stack. Security and Compliance teams can easily answer who did what, where, and when. - Admins have precise control over what each user has access to—without these controls ever getting in the way of productivity - IT, InfoSec, and Administrators have precise controls. Unauthorized access is eliminated because users never see resources they don’t have permission to use. -All past, present, and future infrastructure is supported - Responsive 24/7/365 customer support.
    Starting Price: $70/user/month
  • 5
    Massdriver

    Massdriver

    Massdriver

    At Massdriver, we believe in prevention, not permission, letting ops teams enforce guardrails while developers deploy confidently. Our platform encodes your non-negotiables into self-service modules built with your preferred IaC (Terraform, Helm, OpenTofu, etc.) standardizing infrastructure across AWS, Azure, GCP, and Kubernetes out-of-the-box. By bundling policy, security, and cost controls into functional IaC assets, Massdriver cuts overhead for ops teams and speeds developer workflows. Through a central service catalog, developers can provision what they need with integrated monitoring, secrets management, and RBAC baked in. No more brittle IaC pipelines; ephemeral CI/CD spins up automatically from each module’s tooling. Scale faster with unlimited cloud accounts and projects, all while reducing risk and ensuring compliance. Massdriver—fast by default, safe by design.
    Starting Price: Free trial
  • 6
    New Relic

    New Relic

    New Relic

    There are an estimated 25 million engineers in the world across dozens of distinct functions. As every company becomes a software company, engineers are using New Relic to gather real-time insights and trending data about the performance of their software so they can be more resilient and deliver exceptional customer experiences. Only New Relic provides an all-in-one platform that is built and sold as a unified experience. With New Relic, customers get access to a secure telemetry cloud for all metrics, events, logs, and traces; powerful full-stack analysis tools; and simple, transparent usage-based pricing with only 2 key metrics. New Relic has also curated one of the industry’s largest ecosystems of open source integrations, making it easy for every engineer to get started with observability and use New Relic alongside their other favorite applications.
    Leader badge
    Starting Price: Free
  • 7
    SonarQube Server

    SonarQube Server

    SonarSource

    SonarQube Server is a self-managed solution for continuous code quality inspection that helps development teams identify and fix bugs, vulnerabilities, and code smells in real-time. It provides automated static code analysis for a variety of programming languages, ensuring the highest quality and security standards are maintained throughout the development lifecycle. SonarQube Server integrates seamlessly with existing CI/CD pipelines, offering flexibility for on-premise or cloud-based deployment. With advanced reporting features, it helps teams manage technical debt, track improvements, and enforce coding standards. SonarQube Server is ideal for organizations seeking full control over their code quality and security without compromising on performance.
  • 8
    Snyk

    Snyk

    Snyk

    Snyk is the leader in developer security. We empower the world’s developers to build secure applications and equip security teams to meet the demands of the digital world. Our developer-first approach ensures organizations can secure all of the critical components of their applications from code to cloud, leading to increased developer productivity, revenue growth, customer satisfaction, cost savings and an overall improved security posture. Snyk’s Developer Security Platform automatically integrates with a developer’s workflow and is purpose-built for security teams to collaborate with their development teams. Snyk is used by 1,200 customers worldwide today, including industry leaders such as Asurion, Google, Intuit, MongoDB, New Relic, Revolut and Salesforce. Snyk is recognized on the Forbes Cloud 100 2021, the 2021 CNBC Disruptor 50 and was named a Visionary in the 2021 Gartner Magic Quadrant for AST.
    Starting Price: $0
  • 9
    Linode

    Linode

    Linode

    Simplify your cloud infrastructure with our Linux virtual machines and robust set of tools to develop, deploy, and scale your modern applications faster and easier. Linode believes that in order to accelerate innovation in the cloud, virtual computing must be more accessible, affordable, and simple. Our infrastructure-as-a-service platform is deployed across 11 global markets from our data centers around the world and is supported by our Next Generation Network, advanced APIs, comprehensive services, and vast library of educational resources. Linode products, services, and people enable developers and businesses to build, deploy, and scale applications more easily and cost-effectively in the cloud.
    Starting Price: $5 per month
  • 10
    Cequence Security

    Cequence Security

    Cequence Security

    Start analyzing and protecting your APIs with passive, inline or API-based integration with any existing network component – API gateway, proxy, CDN or ingress controller. Predefined policies, fine-tuned using threat patterns observed in protecting billions of API transactions per day delivers unmatched, out-of-the-box protection. A rich user interface and an open, API-based architecture enables integration with threat intelligence feeds, CI/CD framework tools, other security components, and SIEM/SOAR/XDR solutions. Patented ML-based analysis eliminates JavaScript and SDK integration pen-alties such as extended development cycles, slow page loads and forced mobile-app upgrades. ML-based analysis generates a unique Behavioral Fingerprint to determine malicious intent and continually tracks attackers as they retool.
  • 11
    Jit

    Jit

    Jit

    DevOps ain’t easy! We are hearing more and more about the breakdown and friction where Dev meets Ops, so let’s not even talk about all the other shift-left domains that add another layer of complexity in the middle like DevSecOps. Where this comes with the need to implement and integrate dozens of security tools in their SDLC. But what if it doesn’t have to be difficult? Jit's DevSecOps Orchestration Platform allows high-velocity Engineering teams to own product security while increasing dev velocity. With a unified and friendly developer experience, we envision a world where every cloud application is born with Minimal Viable Security (MVS) embedded and iteratively improves by adding Continuous Security into CI/CD/CS.
  • 12
    F5 Distributed Cloud WAF
    Mitigate web app attacks and vulnerabilities with comprehensive security controls and uniform policy and observability via our SaaS-delivered WAF that’s quick to set up and deploy, and easy to manage and scale across any environment. Simplify app security by seamlessly integrating protections into the development process with core security functionality, centralized orchestration, and oversight. F5 Distributed Cloud WAF eases the burden and complexity of consistently securing apps across clouds, on-premises, and edge locations. Delivering the programmability that DevOps needs combined with the efficacy and oversight that SecOps mandates, enabling faster, more secure application delivery and release cycles. Quickly improve visibility and insight across all security events including WAF signatures hit, DoS events, automated and persistent threats, and all other client interactions along with app performance, including intuitive drill-down capabilities.
  • 13
    Traceable

    Traceable

    Traceable

    Meet the Industry’s Context-Aware API Security Platform Traceable identifies all of your APIs, and evaluates your API risk posture, stops API attacks that lead to incidents such as data exfiltration, and provides analytics for threat hunting and forensic research. With our solution, you can confidently discover, manage and secure all of your APIs, quickly deploy, and easily scale to meet the ongoing needs of your organization. If you’re planning on improving the data security posture in your APIs, Traceable would love the opportunity to discuss how we could help and share some of our lessons learned from working with enterprise customers like Canon, Informatica, Outreach, and many others.
    Starting Price: $0
  • 14
    Accelario

    Accelario

    Accelario

    Take the load off of DevOps and eliminate privacy concerns by giving your teams full data autonomy and independence via an easy-to-use self-service portal. Simplify access, eliminate data roadblocks and speed up provisioning for dev, testing, data analysts and more. Accelario Continuous DataOps Platform is a one-stop-shop for handling all of your data needs. Eliminate DevOps bottlenecks and give your teams the high-quality, privacy-compliant data they need. The platform’s four distinct modules are available as stand-alone solutions or as a holistic, comprehensive DataOps management platform. Existing data provisioning solutions can’t keep up with agile demands for continuous, independent access to fresh, privacy-compliant data in autonomous environments. Teams can meet agile demands for fast, frequent deliveries with a comprehensive, one-stop-shop for self-provisioning privacy-compliant high-quality data in their very own environments.
    Starting Price: $0 Free Forever Up to 10GB
  • 15
    Onboardbase

    Onboardbase

    Onboardbase

    Onboardbase is the a secret management infrastructure platform that provides single source of shared truth for app secrets and usage. It helps dev teams securely share and work with environment-specific configs at every development stage, synced across infrastructure without compromising security - this means development teams can focus on building great apps rather than managing secrets and data. Secrets are dynamically kept up to date across your environments and infrastructure, with 50+ integrations and growing. Dev teams can monitor and audit how long, where and when your secrets are used and revoke usage anywhere with a click. Powerful always-on codebase scanning features prevent developers from accidentally leaking secrets to production, maintaining a robust security model.
    Starting Price: Free
  • 16
    Panoptica
    Panoptica makes it easy to secure your containers, APIs, and serverless functions, and manage software bills of materials. It analyzes internal and external APIs and assigns risk scores. Your policies govern which API calls the gateway permits or disables. New cloud-native architectures allow teams to develop and deploy software more quickly, keeping up with the pace of today’s market. But this speed can come with a cost—security. Panoptica closes the gaps by integrating automated, policy-based security and visibility into every stage of the software-development lifecycle. Decentralized cloud-native architectures have significantly increased the number of attack surfaces. At the same time, changes in the computing landscape have raised the risk of catastrophic security breaches. Here are some of the reasons why comprehensive security is more important than ever before. You need a platform that protects the entire application lifecycle—from development to runtime.
    Starting Price: $0
  • 17
    IBM NS1 Connect
    IBM NS1 Connect offers premium, authoritative DNS and advanced traffic steering to deliver the high-performance, reliable, secure network connectivity that businesses need to meet increasingly sophisticated customer expectations. NS1 Connect’s global anycast network provides the massive capacity and scale needed to keep users reliably connected across the world. An API-first architecture empowers teams to embrace automation and streamline DNS management. Enterprises with complex network infrastructures can take performance to the next level with sophisticated traffic steering capabilities and real-time reporting on DNS observability data.
    Starting Price: $250/month
  • 18
    JupiterOne

    JupiterOne

    JupiterOne

    JupiterOne is a cyber asset analysis platform every modern security team needs to collect and transform asset data into actionable insights to secure their attack surface. JupiterOne was created to make security as simple as asking a question and getting the right answer back, with context, to make the right decision. With JupiterOne, organizations are able to see all asset data in a single place, improve confidence in choosing their priorities and optimize the deployment of their existing security infrastructure.
    Starting Price: $2000 per month
  • 19
    Honeycomb

    Honeycomb

    Honeycomb.io

    Log management. Upgraded. With Honeycomb. Honeycomb is built for modern dev teams to better understand application performance, debug & improve log management. With rapid query, find unknown unknowns across system logs, metrics & traces with interactive charts for the deepest view against raw, high cardinality data. Configure Service Level Objective (SLOs) on what users care about so you cut-down noisy alerts and prioritize the work. Reduce on-call toil, ship code faster and keep customers happy. Pinpoint the cause. Optimize your code. See your prod in hi-res. Our SLOs tell you when your customers are having a bad experience so that you can immediately debug why those issues are happening, all within the same interface. Use our Query Builder to easily slice and dice your data to visualize behavioral patterns for individual users and services (grouped by any dimensions).
    Starting Price: $70 per month
  • 20
    IriusRisk

    IriusRisk

    IriusRisk

    IriusRisk is the industry's leading threat modeling and secure design solution in Application Security. With enterprise clients including Fortune 500 banks, payments, and technology providers, it empowers security and development teams to ensure applications have security built-in from the start - using its powerful threat modeling platform. Whether teams are implementing threat modeling from scratch, or scaling-up their existing operations, the IriusRisk approach results in improved speed-to-market, collaboration across security and development teams, and the avoidance of costly security flaws.
  • 21
    Authress

    Authress

    Rhosys

    Authress, Complete Auth API for B2B. Authentication & Authorization gets complicated quickly, even if it appears easy, there is a lot of hidden complexity in authorization, you don’t want to do it on your own. It takes time to get authorization right In simple cases, it takes an average software team 840 hours to implement authorization logic. As you add features to your application, this number grows rapidly. Without expertise, you leave your door wide open to malicious attacks. You risk compromising your user data, non-compliance with local regulations, and massive business losses. * Secure authorization API--Instead of building your own authorization logic, call our API * Granular permissions--Define multiple levels of access and group them by user roles. As granular as you want * Identity Provider integrations--Plug in any of your preferred ID providers with a simple API call. * SSO and full user management
    Starting Price: $1.10 per month
  • 22
    VMware NSX

    VMware NSX

    Broadcom

    Full-Stack Network and Security Virtualization with VMware NSX. Enable your virtual cloud network to connect and protect applications across your data center, multi cloud, bare metal, and container infrastructure. VMware NSX Data Center delivers a complete L2-L7 networking and security virtualization platform — providing the ability to manage the entire network as a single entry from a single pane of glass. Bring one-click provisioning to your networking and security services — access powerful flexibility, agility, and scale — by running a complete L2-L7 stack in software, decoupled from underlying physical hardware. Manage consistent networking and security policies across private and public clouds, from a single pane of glass, regardless of where your application runs – VM, container, or bare metal. Deliver granular protection for your apps via micro-segmentation to the individual workload.
    Starting Price: $4,250
  • 23
    SecretHub

    SecretHub

    SecretHub

    Upgrade security throughout the stack with a unified secrets management platform that every engineer can use – from admin to intern. Putting passwords and API keys in source code creates a security risk. But handling them properly creates complexity that makes it extremely cumbersome to deploy. Git, Slack, and email are designed to share information, not to keep secrets. Copy-pasting values and waiting on that one admin who holds all the keys simply don't scale when you're deploying software multiple times a week. It's impossible to track who accessed what secrets at what time, making compliance audits a nightmare. Eliminate secrets in source code by replacing plaintext values with a reference to the secret. SecretHub then automatically loads secrets into your app the moment it starts. Use the CLI to encrypt and store secrets and then simply tell the code where to look for the secret. Your code is now free of secrets and can be shared with everyone on your team.
    Starting Price: $99 per month
  • 24
    Betterscan.io

    Betterscan.io

    Betterscan.io

    Reduce MTTD & MTTR with full coverage within minutes of using. Full DevSecOps toolchain across your all environments, implementing and collecting evidence as part of your continuous security. Unified and de-duplicated across all the layers we orchestrate. One line to add several thousand checks + AI. It was built with security in mind, and we have avoided common security mistakes and pitfalls. Understands modern technologies. All are callable via REST API. Integrateable with CI/CD systems, lightweight and fast. You can self-host it for 100% code control and transparency, or run source available binary only in your own CI/CD. Use a source-available solution for complete control and transparency. Trivial setup, no software installation, compatible with many programming languages. Detects more than several thousand code and infrastructure issues and counting. You can review the issues, mark them as false positives, and collaborate on issues.
    Starting Price: €499 one-time payment
  • 25
    Seal Security

    Seal Security

    Seal Security

    Redefine open source vulnerability and patch management with Seal Security. Easy integration directly into your existing SDLC, and workflows. Standalone security patches for immediate resolution of critical security issues. Predictable remediation and optimal resource allocation, with centralized control and reduced R&D dependency. Streamline your open source vulnerability remediation without introducing the risk of breaking changes. Say goodbye to alert fatigue and start patching with Seal Security. Pass every product security scan with confidence. Seal Security provides immediate remediation for open source vulnerabilities. By meeting your customers' SLAs and offering a vulnerability-free product, you can ensure customer trust and fortify your market standing. Seal Security seamlessly integrates with various coding languages, patch management systems, and open source platforms through powerful APIs and CLI.
    Starting Price: Free
  • 26
    Stream Security

    Stream Security

    Stream Security

    Stay ahead of exposure risks & threat actors with real-time detection of config change impacts and automated threat investigations fused to posture and all activities. Track all changes, and detect critical exposure and toxic combinations before attackers do. Leverage AI to effectively address and fix issues using your preferred methods. Utilize any of your preferred SOAR tools to respond in real time or use our suggested code snippets. Harden and prevent external exposure & lateral movement risks, focus on risks that are truly exploitable. Detect toxic combinations of posture and vulnerabilities. Detect gaps from segmentation intent and implement zero-trust. Answer any cloud-related question fast with context. Maintain compliance, and prevent deviation from taking hold. We integrate with your existing investment. We can share more about our security policies and work with your security teams to deliver any specific requirements for your organization.
    Starting Price: $8,000 per year
  • 27
    Resmo

    Resmo

    Resmo

    All-in-one platform for SaaS app and access management for modern IT teams. Streamline app discovery, identity security, user offboarding, access reviews, and cost tracking. Actively scan and notify for vulnerabilities with 100+ native integrations with your favorite tools. Review identity access permissions, OAuth risks, and SSO logins. Uncover shared accounts, weak passwords, excessive permissions, externally shared files, and more. Let them use the SaaS they need to get their job done quickly. Lift the burden of security checks on your IT and security teams with automation. Offboard employees securely with no dormant accounts left behind. We empower your team to take ownership of security without any roadblocks, ensuring a seamless and secure workflow. Get accurate visibility over the apps your employees login with their business accounts. Empower your workforce with SaaS adoption while maintaining control over your SaaS security posture.
    Starting Price: $2 per month
  • 28
    F5 NGINXaaS for Azure
    NGINX as a Service (NGINXaaS) for Azure is a fully managed offering that integrates the Microsoft Azure ecosystem with advanced NGINX traffic services. Lift and shift, migrate, or extend existing NGINX workloads to the cloud with minimal effort, helping your organization save money, increase flexibility, and achieve consistency in performance and security across its estate of on-prem and Azure cloud apps. Enables application developers to deliver consistent apps in the cloud, deployed straight from the Azure Marketplace with just a few clicks on the console. Deploy and manage NGINXaaS via the Azure Portal with built-in integrations, including Azure Monitor and Azure Key Vault for SSL/TLS certificate management. Seamless lift-and-shift experience of your existing NGINX configuration, so you can migrate or extend your workloads to the cloud faster and with minimal effort.
    Starting Price: $0.015 per ncu per hour
  • 29
    authentik

    authentik

    authentik

    authentik is an open source identity provider that unifies your identity needs into a single platform, replacing Okta, Active Directory, and Auth0. Authentik Security is a public benefit company that is building on top of the open-source project. Using a self-hosted, open-source identity provider means prioritizing security and taking control of your most sensitive data. With authentik, you no longer need to continually place your trust in a third-party service. Adopt authentik to your environment, regardless of your requirements. Use our APIs and fully customizable policies to automate any workflow. Simplify deployment and scaling with prebuilt templates and support for Kubernetes, Terraform, and Docker Compose. No need to rely on a third-party service for critical infrastructure or expose your sensitive data to the public internet. Use our pre-built workflows, or customize every step of authentication through configurable templates, infrastructure as code, and comprehensive APIs.
    Starting Price: $0.02 per month
  • 30
    Tenable Cloud Security
    The actionable cloud security platform. Reduce risk by rapidly exposing and closing priority security gaps caused by misconfigurations, risky entitlements and vulnerabilities–in one powerful cloud native application protection platform (CNAPP). CNAPP solutions replace a patchwork of siloed products that often cause more problems than they solve, such as multiple false positives and excessive alerts. Those products usually provide only partial coverage and often create overhead and friction with the products they’re supposed to work with. Most importantly, CNAPPs allow businesses to monitor the health of cloud native applications as a whole rather than individually monitoring cloud infrastructure and application security.
  • Previous
  • You're on page 1
  • 2
  • Next