Best IT Security Software for Vagrant

Compare the Top IT Security Software that integrates with Vagrant as of August 2025

This a list of IT Security software that integrates with Vagrant. Use the filters on the left to add additional filters for products that have integrations with Vagrant. View the products that work with Vagrant in the table below.

What is IT Security Software for Vagrant?

IT security software is designed to protect information technology (IT) systems, networks, and data from cyber threats, such as malware, hacking, and unauthorized access. These tools provide various features such as antivirus protection, firewalls, encryption, intrusion detection and prevention systems, and vulnerability management to ensure the integrity, confidentiality, and availability of sensitive information. IT security software helps organizations detect, prevent, and respond to security incidents, mitigate risks, and ensure compliance with industry regulations. It is critical for businesses and individuals to safeguard against cyberattacks, data breaches, and other security vulnerabilities. Compare and read user reviews of the best IT Security software for Vagrant currently available using the table below. This list is updated regularly.

  • 1
    JFrog

    JFrog

    JFrog

    Fully automated DevOps platform for distributing trusted software releases from code to production. Onboard DevOps projects with users, resources and permissions for faster deployment frequency. Fearlessly update with proactive identification of open source vulnerabilities and license compliance violations. Achieve zero downtime across your DevOps pipeline with High Availability and active/active clustering for your enterprise. Control your DevOps environment with out-of-the-box native and ecosystem integrations. Enterprise ready with choice of on-prem, cloud, multi-cloud or hybrid deployments that scale as you grow. Ensure speed, reliability and security of IoT software updates and device management at scale. Create new DevOps projects in minutes and easily onboard team members, resources and storage quotas to get coding faster.
    Starting Price: $98 per month
  • 2
    Kali Linux
    Kali Linux is an open-source, Debian-based Linux distribution geared towards various information security tasks, such as Penetration Testing, Security Research, Computer Forensics and Reverse Engineering. You can take any Linux and install pentesting tools on it, but you have to set the tools up manually and configure them. Kali is optimized to reduce the amount of work, so a professional can just sit down and go. A version of Kali is always close to you, no matter where you need it. Mobile devices, Docker, ARM, Amazon Web Services, Windows Subsystem for Linux, Virtual Machine, bare metal, and others are all available. With the use of metapackages, optimized for the specific tasks of a security professional, and a highly accessible and well documented ISO customization process, it's always easy to generate an optimized version of Kali for your specific needs. Whether you are a seasoned veteran or a novice, our documentation will have all the information you will need to know.
  • 3
    VMware Fusion Pro
    VMware Fusion gives Mac users the power to run Windows on Mac along with hundreds of other operating systems side by side with Mac applications, without rebooting. Fusion is simple enough for home users and powerful enough for IT professionals, developers and businesses. Running Windows on Mac is only the beginning. VMware Fusion lets you choose from hundreds of supported operating systems, from lesser-known Linux distributions to the latest Windows 10 release, to run side by side with the latest macOS release. Fusion makes it simple to test nearly any OS and app on a Mac. Build and test apps in a sandbox while securely sharing local source files and folders. Fusion Pro now includes a RESTful API to integrate with modern development tools like Docker, Vagrant, Ansible, Chef, and others to fit the power of VMware into today’s Agile and DevOps-oriented production pipelines.
  • Previous
  • You're on page 1
  • Next