Best IT Security Software for Linux - Page 12

Compare the Top IT Security Software for Linux as of May 2026 - Page 12

  • 1
    Enpass

    Enpass

    Enpass Technologies Inc.

    Enpass believes your data belongs to you. Compliance-friendly Enpass Business secures passwords and passkeys in vaults on your organization’s own infrastructure or trusted business cloud, providing greater security than proprietary, SaaS-hosted solutions. Enpass is highly customizable for users, and a powerful Admin Console provides fine-grained control over vault sharing, password generation, and employee security. ISO 27001 certified, zero-knowledge AES-256 encryption on 100% of data.
    Starting Price: $2.99/month
  • 2
    Fingerbank

    Fingerbank

    Fingerbank

    Fingerbank is a set of tools to identify networking devices based on their network fingerprints. A device fingerprint is very useful for numerous kinds of applications. For example, it can be used by Network Access Control solutions such as PacketFence to grant different network access based on the device type (gaming console vs. laptop). Fingerbank knows how a device should present itself on the network its communications patterns and when a device deviates from those. Our technology is performing continuous data mining to extract common patterns from networking devices and can therefore raise an alert when a device acts abnormally. When a device connects to a network, it exposes various precious information on different layers of the networking stack. The Fingerbank collector can build a precise fingerprint of the device and use the knowledge and algorithms of the Fingerbank cloud API to accurately identify the device.
    Starting Price: $250 per month
  • 3
    dnstwist

    dnstwist

    dnstwist

    Find lookalike phishing domains that adversaries can use to attack you. See what sort of trouble users can get in trying to type your domain name. Find lookalike domains that adversaries can use to attack you. Can detect typosquatters, phishing attacks, fraud, and brand impersonation. Useful as an additional source of targeted threat intelligence. DNS fuzzing is an automated workflow that aims to uncover potentially malicious domains that target your organization. This tool generates a comprehensive list of permutations based on a provided domain name and subsequently verifies whether any of these permutations are in use. Additionally, it can generate fuzzy hashes of web pages to detect ongoing phishing attacks, brand impersonation, and much more.
    Starting Price: Free
  • 4
    XplicitTrust Network Access
    XplicitTrust Network Access is a Zero Trust Network Access (ZTNA) solution that provides secure, seamless access to applications regardless of location for users working from anywhere. It provides identity-based access control that integrates with existing identity providers for single sign-on (SSO) and multi-factor authentication (MFA) using factors such as user identity, device security, location and time. The platform includes real-time network diagnostics and centralized asset management for better oversight. Clients require no configuration and the solution is compatible with platforms including Windows, MacOS and Linux. XplicitTrust uses strong encryption, end-to-end protection, automatic key rotation and context-aware authentication to provide robust security. It also supports scalable application access and secure connections for IoT, legacy applications and remote desktops, making it versatile for today's security needs.
    Starting Price: $5/month/user
  • 5
    ZITADEL

    ZITADEL

    ZITADEL

    ZITADEL is an open-source identity and access management platform designed to simplify authentication and authorization for applications. It offers a comprehensive suite of features, including customizable hosted login pages, support for modern authentication methods such as Single Sign-On (SSO) and social logins, and enforcement of multifactor authentication to enhance security. Developers can integrate authentication directly into their applications using ZITADEL's APIs or build dedicated login interfaces. The platform supports role-based access control, allowing for precise permission assignments based on user roles, and is inherently multi-tenant, facilitating easy extension of applications to new organizations. ZITADEL's extensibility enables seamless adaptation to various workflows, user management processes, and brand guidelines, with features like ZITADEL Actions that execute workflows after predefined events without the need for additional code deployment.
    Starting Price: $100 per month
  • 6
    Caido

    Caido

    Caido Labs Inc.

    Caido is a modern web security toolkit designed for pentesters, bug bounty hunters, and security teams who need an efficient and customizable solution for web application testing. Caido features a powerful intercept proxy for capturing and manipulating HTTP requests, replay functionality for testing endpoints, and automation tools for handling large-scale workflows. Its sitemap visualization provides a clear view of web application structures, helping users map and navigate complex targets. With HTTPQL, users can efficiently filter and analyze traffic, while no-code workflows and a plugin system enable easy customization to fit specific testing needs. Built on a flexible client/server architecture, Caido supports local or remote hosting, allowing seamless access from anywhere. Its project management system simplifies switching between targets and eliminates the need for manual file handling, keeping workflows organized.
    Starting Price: Free
  • 7
    ArtistScope Site Protection System (ASPS)
    ArtistScope Site Protection Software (ASPS) provides the most robust and most secure website security and copy protection for all web page media, safe from all copy including screen capture, download, scraping, etc. In fact ASPS provides the most secure solution for data security and the prevention of data loss and plagiarism ever imagined. The ASPS server module is installed on the web server (Apache or Windows) to deliver encrypted web pages from your web site that only the ArtisBrowser can interpret and display, creating a secure tunnel between website and the user's web browser in which no data or media can be copied or extracted by any means, not even from browser cache or memory. ASPS is most unique and it is most secure because it does not depend on popular web browsers which are useless for copy protection. Any media displayed on your web page will be copy protected and you can use any video file format or embedded player that you like.
    Starting Price: $495.00
  • 8
    GoAccess

    GoAccess

    GoAccess

    GoAccess is an open source, real-time web log analyzer and interactive viewer that operates within a terminal on Unix-like systems or through a browser interface. Designed for rapid analysis, it provides immediate HTTP statistics, making it ideal for system administrators who need quick insights into server performance. The tool supports various web log formats, including those from Apache, Nginx, Amazon S3, Elastic Load Balancing, CloudFront, and Caddy, allowing users to set the log format and analyze logs effortlessly. Written in C, GoAccess requires only ncurses as a dependency, ensuring swift, millisecond-level updates. It offers customizable terminal and web-based dashboards, enabling users to tailor color schemes to their preferences. Beyond terminal output, GoAccess can generate comprehensive, self-contained real-time HTML reports, as well as JSON, facilitating analytics, monitoring, and data visualization.
    Starting Price: Free
  • 9
    PryvateNow

    PryvateNow

    PryvateNow

    PryvateNow is a comprehensive communication platform that encrypts and secures voice and video calls, instant messages, emails, and conference calls, both on and off the network. It offers solutions tailored for small and medium-sized enterprises, corporate entities, and large enterprises, ensuring full control over communications and data. Key features include Post-Quantum ZRTP encryption for world-leading data security, built-in auditing and compliance aligning with MiFID II, HIPAA, and GDPR, and white-labeled OEM versions of Pryvate Closed User Groups (CUG) available. The platform also provides a Secure Integration Kit for VoIP, allowing providers to integrate Pryvate’s secure communication suite into their existing platforms seamlessly. PryvateNow's technology encompasses encrypted voice and video calls, secure email, file transfer and storage, and secure voice and video conference calls.
    Starting Price: $1.25 per month
  • 10
    Grafana Loki
    Grafana Loki is an open source log aggregation system designed to efficiently collect, store, and query logs from various sources. Unlike traditional logging systems, Loki is optimized for cloud-native applications, making it a great fit for modern, containerized environments like Kubernetes. It works seamlessly with Grafana for visualizing log data alongside metrics and traces, providing a unified observability platform. Loki indexes only metadata, such as labels and timestamps, which reduces the amount of data stored and improves query performance compared to more traditional log management systems. This lightweight approach allows for easier scalability and cost-effective storage. Loki also supports log aggregation from various sources, including Syslog, application logs, and container logs, and integrates with other observability tools to provide a complete view of system performance.
    Starting Price: Free
  • 11
    Security Onion

    Security Onion

    Security Onion

    Security Onion is a comprehensive open source platform for intrusion detection, network security monitoring, and log management. It provides a set of powerful tools to help security professionals detect and respond to potential threats across an organization's network. Security Onion integrates various technologies, including Suricata, Zeek, and Elastic Stack, to collect, analyze, and visualize security data in real-time. Security Onion’s intuitive user interface allows for easy management and analysis of network traffic, security alerts, and system logs. It also includes built-in tools for threat hunting, alert triage, and forensic analysis, helping users identify potential security incidents quickly. Security Onion is designed for scalability, making it suitable for environments of all sizes, from small businesses to large enterprises.
    Starting Price: Free
  • 12
    Malcolm

    Malcolm

    Malcolm

    Malcolm is an open source security monitoring platform designed to help security professionals collect, process, and analyze network data for threat detection and incident response. It integrates multiple powerful tools to gather and visualize network traffic, log data, and security alerts. Malcolm’s user-friendly interface allows security analysts to easily investigate potential threats by providing detailed insights into network activity. It is designed for scalability, offering flexible deployment options across various environments, from small businesses to large enterprises. Malcolm’s modular design ensures users can customize the platform to suit their specific security requirements, while its integration with other observability tools ensures comprehensive monitoring. While Malcolm is great for general-purpose network traffic analysis, its creators see a particular need in the community for tools providing insight into protocols used in industrial control systems (ICS).
    Starting Price: Free
  • 13
    ZTX Platform

    ZTX Platform

    SecureTrust Cyber

    The ZTX Platform is a fully managed, engineer-led cybersecurity solution that delivers Zero Trust security in a streamlined, scalable package. It unifies SASE, XDR, SIEM, RMM, and micro-segmentation into a single platform installed and operational within one business day. ZTX is licensed per seat, making it cost-effective and flexible for growing organizations. The platform offers centralized monitoring, real-time threat detection, automated response, and strict policy enforcement. Each user session is isolated via encrypted tunnels, preventing lateral movement and ensuring compliance. Ideal for companies seeking simplified, high-performance cybersecurity without managing multiple tools.
    Starting Price: $30/month per device
  • 14
    OpticalBackup

    OpticalBackup

    OpticalBackup

    OpticalBackup is a secure, long-term way to protect important data. Files are encrypted and written to tamper-proof optical discs designed to last for decades—offline, immutable, and safe from ransomware or deletion. The process is simple and fully automated. Upload your files, and OpticalBackup handles the rest: burning, labeling, and either storing your discs in a secure facility or shipping them to you. No hardware, scripts, or manual steps needed. Discs can’t be altered once written, ensuring data integrity over time. Ideal for critical files like legal records, personal archives, creative work, or sensitive business data. Flexible subscription plans include cloud access, encryption, and storage or delivery options. OpticalBackup also supports the 3-2-1 backup rule, adding a physical, offline layer to your strategy. Preserve what matters most—with confidence it’ll still be there in decades.
    Starting Price: $33/month
  • 15
    ESET PROTECT Complete
    ESET PROTECT Complete is a comprehensive cybersecurity solution designed to safeguard business endpoints, cloud applications, and email systems. It offers advanced protection against ransomware and zero-day threats through cloud-based sandboxing technology and machine learning-driven detection. It includes full disk encryption capabilities, aiding compliance with data protection regulations. ESET PROTECT Complete also provides robust security for mobile devices, file servers, and email servers, incorporating anti-malware, anti-phishing, and anti-spam measures. Its centralized, cloud-based management console allows for streamlined deployment, monitoring, and response to security incidents across the organization. Additional features include vulnerability and patch management, ensuring that software vulnerabilities are promptly identified and addressed.
    Starting Price: $287.72 one-time payment
  • 16
    ESET PROTECT Elite
    ESET PROTECT Elite is an enterprise-grade cybersecurity solution that integrates extended detection and response with comprehensive multilayered protection. It offers advanced threat defense using adaptive scanning, machine learning, cloud sandboxing, and behavioral analysis to prevent zero-day threats and ransomware. The platform includes modern endpoint protection for computers and smartphones, server security for real-time data protection, and mobile threat defense. It also features full disk encryption, helping organizations comply with data protection regulations. ESET PROTECT Elite provides robust email security, including anti-phishing, anti-malware, and anti-spam technologies, along with cloud app protection for Microsoft 365 and Google Workspace. Vulnerability and patch management capabilities allow for automatic tracking and patching of vulnerabilities across all endpoints.
    Starting Price: $275 one-time payment
  • 17
    Gblock

    Gblock

    Jacopo Beschi

    Gblock is a Chrome extension that protects your privacy in Gmail by blocking email senders from tracking you. Gblock provides you with full protection against email tracking, shielding you from tracking links, spy pixels, and anonymizing you via our proxy. Plus, with automated tracker detection, Gblock stays up to date to block new trackers as they are released! ✔️ SPY PIXEL PROTECTION ✔️ TRACKING LINK PROTECTION ✔️ AUTOMATED TRACKER DETECTION _________________________________________________________ 30 DAYS FREE TRIAL, NO CREDIT CARD REQUIRED Gblock comes with a 30-day trial, after which a paid subscription is required.
    Starting Price: $12/year
  • 18
    WEDOS Protection

    WEDOS Protection

    WEDOS Group SA

    WEDOS Protection is a modern security solution combining powerful DDoS mitigation, CDN acceleration, and intelligent traffic filtering — designed for high availability, stability, and optimal web performance. It protects serious online businesses against volumetric and sophisticated application-layer attacks, including botnets and L7 exploits. Our global infrastructure WEDOS Global uses edge servers distributed worldwide to analyze and control traffic in real time. The service provides DNS protection, an advanced Web Application Firewall (WAF), HTTPS proxy, smart caching, anti-bot filters, and multiple protection layers that together form a robust security and performance ecosystem. ✅ Effective L3–L7 DDoS mitigation ✅ Global content acceleration via proprietary network ✅ Easy to implement – no code changes needed ✅ High availability and low latency even during attacks An ideal choice for high-traffic websites, ecommerce projects, agencies, and hosting providers.
    Starting Price: $1
  • 19
    KubeArmor

    KubeArmor

    AccuKnox

    KubeArmor is a cloud-native runtime security enforcement engine designed for Kubernetes workloads, containers, and virtual machines. It leverages eBPF and Linux Security Modules (LSMs) like AppArmor and SELinux to preemptively harden workloads and prevent attacks without modifying pods or containers. KubeArmor enforces real-time policy-based controls on process behavior, file access, networking, and resource usage. It simplifies complex security settings by providing Kubernetes-native policy management and detailed policy violation logging. Installation is straightforward via Helm charts, and it integrates seamlessly with multiple cloud marketplaces. KubeArmor’s proactive inline mitigation approach improves security beyond traditional post-attack responses.
    Starting Price: Free
  • 20
    Devolutions PAM

    Devolutions PAM

    Devolutions

    Devolutions Privileged Access Manager (PAM) discovers privileged accounts, automates password rotation, approves check-outs, enforces just-in-time (JIT) privilege elevation, and records every session—giving small and midsize businesses (SMBs) enterprise-grade control without enterprise-grade hassle. Bundle PAM with the Privileged Access Management package and it slots straight into Devolutions Hub delivered as SaaS (Software-as-a-Service) or a self-hosted on-premises (on-prem) Devolutions Server, while Remote Desktop Manager provides one-click launches and Gateway supplies secure tunnels. One integrated stack takes you from standing privileges to true zero-standing-privilege—all under a single pane of glass, complete with granular RBAC (Role-Based Access Control) and tamper-proof audit logs.
    Starting Price: $50/month/user
  • 21
    SurePassID

    SurePassID

    SurePassID

    SurePassID is an advanced, deploy-anywhere multi-factor authentication platform built to secure both IT and OT (operational technology) environments, including critical infrastructure, legacy systems, on-premise, air-gapped, hybrid cloud, or fully cloud-based operations. It supports a wide variety of authentication methods; passwordless, phishing-resistant approaches like FIDO2/WebAuthn (with FIDO2 PIN, biometric, or push), as well as one-time passwords (OTP via OATH HOTP/TOTP), mobile push, SMS, voice, and traditional methods. SurePassID integrates with common operating systems, including domain and local logins, RDP/SSH remote access, and even legacy or embedded Windows systems often found in OT/ICS/SCADA environments, enabling offline 2FA when needed. It also supports securing VPNs, network devices, appliances, legacy applications, web apps (via SAML 2.0 or OIDC identity provider functionality), and network-device access protocols.
    Starting Price: $48 per year
  • 22
    Primo

    Primo

    Primo

    Primo is an all-in-one AI-powered IT operations platform that helps organizations buy, track, secure, and remotely manage company devices and software from a single, centralized system by combining identity, mobile device management (MDM), endpoint detection and response, SaaS management, and global hardware procurement so teams no longer juggle multiple disconnected tools; IT can enforce security policies, push apps and updates, monitor and remediate issues across macOS, Windows, and Linux devices, and coordinate zero-touch deployments at scale, all while keeping identity and access workflows in sync with HR data to automate onboarding, offboarding, and permission changes. It integrates with 60+ HR and email tools to ensure a single source of truth for users and devices, offers real-time compliance and activity logs, supports role-based access and single sign-on, and provides AI-assisted automation to reduce manual work and improve security posture.
    Starting Price: €8 per month
  • 23
    Proton Authenticator
    Proton Authenticator is a privacy-first two-factor authentication app that generates time-based one-time passwords to add an extra layer of login security for online accounts beyond just a password, so users can secure accounts across all their devices. It is open source and uses end-to-end encryption, meaning all cryptographic operations and secret keys are generated and stored locally, and even Proton cannot see your unencrypted 2FA data, offering transparency and strong privacy by design. Users can sync 2FA codes across devices with encrypted backups (including via iCloud or a Proton Account), import existing codes from other authenticator apps, and export them if needed, giving flexibility and control over 2FA secrets without vendor lock-in. Proton Authenticator is free to use, has no ads or tracking, and supports secure practices like biometric locks and offline access, so users can generate login codes.
    Starting Price: Free
  • 24
    Ente Auth
    Ente Auth is a free, open-source two-factor authentication app that helps users generate and manage time-based one-time passwords to secure logins for online accounts with an extra layer of verification beyond just a password, offering end-to-end encrypted backups so you never lose your codes and they remain private even to the service itself. It syncs codes across mobile, desktop, and web clients using fully encrypted channels, lets users import existing 2FA tokens by scanning QR codes or manual entry, and provides features like offline code generation, tagging and searching of codes, pinning favorites, icon identification, and quick “next code” display for faster logins. Backups are encrypted with audited cryptography, giving users peace of mind that only they can decrypt and access their 2FA secrets, and codes can be shared securely with teammates via encrypted links with optional expirations.
    Starting Price: Free
  • 25
    HCL BigFix SaaS Remediate
    HCL BigFix SaaS Remediate is a cloud-native automated vulnerability remediation platform that closes the gap between detecting a vulnerability and fixing it — without any infrastructure to deploy or maintain. While traditional tools scan and report, BigFix automates the entire remediation lifecycle. Deploy in minutes. Access 500,000+ pre-tested Fixlets covering 120+ OS versions and 700+ third-party applications. Achieve 98%+ first-pass patch success across your endpoints. Key capabilities: Automated patch deployment, CyberFOCUS Analytics for threat-prioritized remediation using CISA KEV and MITRE ATT&CK data, IVR with Tenable, Prescriptive Guidance to focus effort on highest-risk exposures, and Protection Level Agreements (PLAs) to track and prove remediation performance. Purpose-built for IT and security teams that need faster remediation, zero infrastructure overhead, and measurable risk reduction.
  • 26
    ComputeSDK

    ComputeSDK

    ComputeSDK

    ComputeSDK is a free and open-source toolkit designed to enable developers to safely run external or user-generated code within their applications through a unified and consistent interface. It provides a TypeScript-native API that abstracts multiple compute providers, allowing developers to switch between environments such as E2B, Vercel, Daytona, Modal, and others without modifying their core codebase. It is built around isolated sandbox environments, which ensure that executed code runs securely without impacting the host infrastructure, making it suitable for applications that require controlled execution of untrusted code. ComputeSDK supports key capabilities such as executing code and shell commands, managing filesystems, creating and destroying sandboxes, and integrating with modern web frameworks like Next.js, Nuxt, and SvelteKit.
    Starting Price: $500 per month
  • 27
    Pryv.io
    Personal Data & Privacy Management Software - A ready-to-use solution for personal data and consent management. - Pryv.io is a solid foundation on which you build your own digital health solution, so you can collect, store, share and rightfully use personal data. - Maintained and developed by Pryv. Features - Provides latest Pryv.io core system ready for production - User registration and authentication - Granular consent-based access control rights - Data model made for privacy, aggregation and sharing - Full data life-cycle: collect - store - change - delete - REST & Socket.io API - Ease of software integration and configuration - Seamless connectivity and interoperability
  • 28
    Motadata

    Motadata

    Motadata

    Effectively addressing the intricate challenges posed by modern networks requires the implementation of advanced solutions in the realm of Network Observability. In this pursuit, consider embracing the cutting-edge offerings of Motadata AIOps, a leading provider in the industry. By integrating Motadata AIOps into your network infrastructure, you not only eliminate data silos but also gain unparalleled visibility into various facets such as network performance, SNMP data, Network Flow, and log data. This comprehensive approach empowers you to monitor and analyze your network with utmost precision, ensuring seamless operations across diverse environments, from on-premise setups to the expansive landscape of cloud infrastructure. The synergy of innovative Network Observability and Motadata AIOps not only meets but exceeds the expectations set for network management, ushering in a new era of efficiency and reliability.
  • 29
    Nagios XI

    Nagios XI

    Nagios Enterprises, LLC

    Provides monitoring of all mission-critical infrastructure components including applications, services, operating systems, network protocols, systems metrics, and network infrastructure. Hundreds of third-party addons provide for monitoring of virtually all in-house applications, services, and systems. Provides a central view of your entire IT operations network and business processes. Powerful dashboards provide at-a-glance access to powerful monitoring information and third-party data. Views provide users with quick access to the information they find most useful. Automated, integrated trending and capacity planning graphs allow organizations to plan for infrastructure upgrades before outdated systems catch them by surprise. Alerts are sent to IT staff, business stakeholders, and end-users via email or mobile text messages, providing them with outage details so they can start resolving issues immediately.
    Starting Price: $1995.00/one-time
  • 30
    Nagios Log Server

    Nagios Log Server

    Nagios Enterprises

    Nagios Log Server greatly simplifies the process of searching your log data. Set up alerts to notify you when potential threats arise, or simply query your log data to quickly audit any system. With Nagios Log Server, you get all of your log data in one location, with high availability and fail-over built right in. Quickly configure your servers to send all log data with easy source setup wizards and start monitoring your logs in minutes. Easily correlate log events across all servers in a few clicks. Nagios Log Server allows you to view log data in real-time, providing the ability to quickly analyze and solve problems as they occur. This keeps your organization safe, secure, and running smoothly. Nagios Log Server provides users with advanced awareness of their infrastructure. Dive deep into network events, logs, and security events. Use Log Server to provide the evidence necessary to track down security threats, and quickly resolve vulnerabilities with built-in alerts.
    Starting Price: $1995.00/one-time
MongoDB Logo MongoDB