Best IT Security Software for Linux - Page 6

Compare the Top IT Security Software for Linux as of May 2026 - Page 6

  • 1
    Splunk AppDynamics
    Splunk AppDynamics delivers full-stack observability for hybrid and on-prem environments, linking technical performance directly to business outcomes. It enables teams to detect anomalies, diagnose root causes, and prioritize issues based on their real business impact. With capabilities ranging from network performance correlation to SAP system optimization, the platform offers deep insights across applications, APIs, and infrastructure. Its runtime security features safeguard applications by detecting vulnerabilities, blocking attacks, and highlighting potential risks. AppDynamics also enhances digital experiences with web, mobile, and synthetic monitoring to understand user journeys. By unifying performance, security, and business analytics, Splunk AppDynamics helps enterprises reduce costs, prevent outages, and deliver seamless customer experiences.
    Starting Price: $6 per month
  • 2
    Countly

    Countly

    Countly

    Countly is a product analytics solution and innovation enabler that helps organizations track product performance and user journey and behavior across mobile, web, and desktop applications. Ensuring privacy by design, it allows organizations to innovate and enhance their products to provide personalized and customized customer experiences, and meet key business and revenue goals. Track, measure, and take action - all without leaving Countly.
  • 3
    Haltdos

    Haltdos

    Haltdos

    Haltdos promises an intelligent WAF & DDoS mitigation service with multi-layered security to online businesses requiring zero management. It is a self-learning solution that continuously learns and adapts network/website traffic and provides real-time and historical insights with stunning visualization. It also provides attack alerts and notifications, attack signatures, customer misbehavior, and audit trail.
  • 4
    REVE Antivirus

    REVE Antivirus

    REVE Antivirus

    REVE Endpoint security provides robust network security solution for precise malware detection through device and application control. Facilitates remote installation, updating and scanning of all individual endpoint PCs. REVE EPS provides a flexible licensing solution due to which no. of protected endpoints can be scaled up as per the requirements anytime with zero license management efforts. Provides advanced security for all your endpoints, which are the Launchpad of malware attacks. Machine learning technology that strengthens defence against targeted attacks & zero day virus. Facilitates remote installation, updating, and scanning of all individual end point PCs.
    Starting Price: $19 per year
  • 5
    ZeroTier

    ZeroTier

    ZeroTier

    ZeroTier simplifies global networking with a secure network overlay that connects and manages all your resources as if they were on the same LAN. Deployable in minutes from anywhere, our software-defined solution scales effortlessly, whether you’re connecting a handful of devices or an entire global network. With ZeroTier, you can: Establish private global networks for IoT deployments. Simplify networking across physical locations with software-defined solutions. Replace traditional VPNs to provide employees secure access to critical resources. Experience seamless connectivity and robust security with ZeroTier – the smarter way to network globally.
    Starting Price: $2/device per month
  • 6
    Cameyo

    Cameyo

    Cameyo

    Cameyo is the secure Virtual Application Delivery (VAD) platform for any Digital Workspace. Cameyo makes it simple, seamless, and secure to deliver Windows and internal web applications to any device from the browser without the need for virtual desktops or VPNs. By enabling organizations to provide their people with secure access to the business-critical apps they need to stay productive from anywhere, Cameyo helps make remote & hybrid work, work. Hundreds of enterprises and organizations utilize Cameyo’s Digital Workspace solution to deliver Windows and internal web applications to hundreds of thousands of users worldwide.
    Starting Price: $12.00/month/user
  • 7
    Zivver

    Zivver

    Zivver

    Zivver is the effortless, smart, secure digital communications platform powering the next generation of secure digital communications. Trusted by over 5,000 organizations globally, Zivver prevents data leaks caused by human error and ensures compliance. Zivver seamlessly integrates with all major email clients including Gmail, Outlook, and Microsoft 365 and features unparalleled zero-keys encryption, with smart features such as contextual machine learning powered business rules. Zivver allows anyone to share large files up to 5TB securely via their existing email client. Zivver is fully compliant with all leading data security standards, including ISO 27001, NTA 7516, GDPR, HIPAA.
    Starting Price: 0.99€/month/user
  • 8
    AppScan

    AppScan

    HCLSoftware

    HCL AppScan is a suite of application security testing platforms, technologies, and services that help organizations detect and remediate vulnerabilities throughout the software development lifecycle (SDLC). Powerful static, dynamic, interactive, and open-source scanning engines (DAST, SAST, IAST, SCA, API) quickly and accurately test code, web applications, APIs, mobile applications, containers, and open-source components with the help of AI and machine learning capabilities. Centralized dashboards provide visibility, oversight, compliance policies, and reporting. HCL AppScan’s scanning engines are maintained by expert security researchers and are continuously updated to remain current with recent technologies, vulnerabilities, and attack vectors. With HCL AppScan, organizations can manage their application security posture and reduce risk across their entire software supply chain.
    Starting Price: $296
  • 9
    TraitWare

    TraitWare

    TraitWare

    TraitWare is Real Passwordless Multi-factor authentication (MFA) for True Zero Trust Access. TraitWare's enterprise-class, patented, plug-and-play solution combines Passwordless MFA and SSO – eliminating the need for usernames and passwords, while reducing friction for the user, and increasing security for your company. AND, you’ll save 60% or more on support budgets. With our QR solution, we can also eliminate the need for a username. Not only is our software convenient and easy to use, but it virtually eliminates vulnerabilities associated with traditional username and password logins. By replacing usernames and passwords we eliminate the ability to phish them. Leveraging our Direct login or our QR scan ties a user to the login, eliminating credential theft or sharing.
    Starting Price: $3 per month
  • 10
    AuthX

    AuthX

    AuthX

    The most advanced authentication platform in the world. Log in online anytime, anywhere with your face, finger, palm, push or any other modality we support. It’s secure authentication that is simple, smart and occasionally magical. Use Authx to on any system and into any application from anywhere. Use any capability to log in and change preferred methodology anytime you like. Authx is secure, scalable and extremely easy to use. Register once and use everywhere. Enjoy Authx with all the time-saving solutions you need to securely authenticate. Authx is always secure and reliable and our experts are here to support you 24/7. Use Authx Mobile for iOS and Android and push an authentication right to your phone. Log in with your Face, Finger or Palm. Authx Mobile enables you to authenticate with Push as well as biometrics on your phone. You can log into your applications with a simple touch of your access card or in range with BLE.
    Starting Price: $2.99 per month
  • 11
    isorobot

    isorobot

    isorobot

    isorobot is an intelligent business management software, connecting people, processes, technology, assets, and capital to your business goals. Using our experience to help you build efficient, scalable systems within your business. isorobot is a business performance management software which carries the solutions that aims at sustainable excellence in which innovation, quality, efficiency, and sustainability are the key elements. The solutions are categorized based on core business domains, organizational maturity for a steady start and scale approach. isorobot also has an enterprise version to go big from day one for matured businesses. The basis of the isorobot model consists of people, process, technology, assets, and capital domains of any organization. It consists of a universal framework of concepts, thus enabling organizations to share information in an effective way, irrespective of the different sectors, cultures, and life stages in which they are located.
    Starting Price: $225 per user per month
  • 12
    Ambassador

    Ambassador

    Ambassador Labs

    Ambassador Edge Stack is a Kubernetes-native API Gateway that delivers the scalability, security, and simplicity for some of the world's largest Kubernetes installations. Edge Stack makes securing microservices easy with a comprehensive set of security functionality, including automatic TLS, authentication, rate limiting, WAF integration, and fine-grained access control. The API Gateway contains a modern Kubernetes ingress controller that supports a broad range of protocols including gRPC and gRPC-Web, supports TLS termination, and provides traffic management controls for resource availability. Why use Ambassador Edge Stack API Gateway? - Accelerate Scalability: Manage high traffic volumes and distribute incoming requests across multiple backend services, ensuring reliable application performance. - Enhanced Security: Protect your APIs from unauthorized access and malicious attacks with robust security features. - Improve Productivity & Developer Experience
  • 13
    Pi-hole

    Pi-hole

    Pi-hole

    You can run Pi-hole in a container, or deploy it directly to a supported operating system via our automated installer. Our intelligent, automated installer asks you a few questions and then sets everything up for you. Once complete, move on to step 3. Configure your router’s DHCP options to force clients to use Pi-hole as their DNS server, or manually configure each device​ to use the Pi-hole as their DNS server. By pairing your Pi-hole with a VPN, you can have ad-blocking on your cellular devices, helping with limited bandwidth data plans. Instead of browser plugins or other software on each computer, install Pi-hole in one place and your entire network is protected. Network-level blocking allows you to block ads in non-traditional places such as mobile apps and smart TVs, regardless of hardware or OS. Since advertisements are blocked before they are downloaded, network performance is improved and will feel faster.
    Starting Price: Free
  • 14
    Dr.Web

    Dr.Web

    Doctor Web

    Dr.Web uses a variety of technologies to protect computers from malware, including: A signature-based scanner that identifies known malware by its code A heuristics engine that detects unknown malware by its behavior A firewall that protects against network attacks A spam filter that blocks unwanted email Parental controls that restrict children's access to the internet A file shredder that permanently deletes files Dr.Web has a good reputation for detecting and removing malware. It has been awarded a number of independent test certifications, including VB100% from Virus Bulletin. However, Dr.Web has also been criticized for its high system resource usage and its clunky user interface. Overall, Dr.Web is a reliable and effective antivirus program. It is a good choice for users who are looking for a comprehensive malware protection solution. However, it is important to note that Dr.Web can be resource-intensive and its user interface can be a bit clunky.
    Starting Price: €7.90
  • 15
    KeePassXC

    KeePassXC

    KeePassXC

    KeePassXC is a modern, secure, open source password manager that runs on Windows, macOS, and Linux and stores all credentials in an offline, encrypted database under your full control. It uses strong encryption (AES-256 by default, with optional Twofish or ChaCha20) and supports key files or hardware security keys (such as YubiKey) for enhanced protection, so your master password and database remain entirely under your control. You can save usernames, passwords, URLs, notes, attachments, and custom attributes, organize and search them in groups, generate strong randomized passwords or passphrases, and autofill login forms via the built-in Auto-Type or browser extension. It works with the KeePass 2 (.kdbx) database format, can import from CSV or backups of other password managers, and allows storage of TOTP two-factor authentication codes within the database.
    Starting Price: Free
  • 16
    Acunetix

    Acunetix

    Invicti Security

    As the market leader in automated web application security testing, Acunetix by Invicti is the go-to security tool for Fortune 500 companies. DevSecOps teams can cut through the noise to uncover unseen risks and mitigate dangerous exploits, detecting and reporting on a wide array of vulnerabilities. With an industry-leading crawler that fully supports HTML5, JavaScript, and Single-page applications, Acunetix enables the auditing of complex, authenticated applications for deeper insight into an organization's risk posture. It's a leader for a reason: the technology behind Acunetix delivers the only product on the market that can automatically detect out-of-band vulnerabilities to enable comprehensive management, prioritization, and control for vulnerability threats by criticality. Plus, it's available both online and as an on-prem solution, integrating with popular issue trackers and WAFs so that DevSecOps teams don't have to slow down when building innovative apps.
  • 17
    Red Points

    Red Points

    Red Points

    Red Points is a fully managed, AI-led brand protection platform that helps companies detect and remove counterfeits, impersonation, piracy, and other online infringements. The platform protects brands across digital channels, including marketplaces, websites, social media, paid ads, mobile apps, and domains, and supports complex enforcement needs such as domestic China protection and large-scale revenue recovery programs. Combining automated detection, expert oversight, and proven enforcement workflows, Red Points identifies and removes infringing content at scale. Its AI models process more than 2.7 billion data points each month, enabling image recognition, keyword detection, seller network analysis, and infringement prioritization. Born in Barcelona and based in New York, Red Points helps enterprise brands scale digital protection through technology, mature operations, and specialized expertise.
  • 18
    Cequence Security

    Cequence Security

    Cequence Security

    Start analyzing and protecting your APIs with passive, inline or API-based integration with any existing network component – API gateway, proxy, CDN or ingress controller. Predefined policies, fine-tuned using threat patterns observed in protecting billions of API transactions per day delivers unmatched, out-of-the-box protection. A rich user interface and an open, API-based architecture enables integration with threat intelligence feeds, CI/CD framework tools, other security components, and SIEM/SOAR/XDR solutions. Patented ML-based analysis eliminates JavaScript and SDK integration pen-alties such as extended development cycles, slow page loads and forced mobile-app upgrades. ML-based analysis generates a unique Behavioral Fingerprint to determine malicious intent and continually tracks attackers as they retool.
  • 19
    Portnox Security

    Portnox Security

    Portnox Security

    Portnox CLEAR is the only cloud-native network access control (NAC) solution that unifies essential network and endpoint security capabilities: device discovery, network authentication, access control, network hardware administration, risk mitigation and compliance enforcement. As a cloud service, Portnox CLEAR eliminates the need for on-going maintenance such as upgrades and patches and requires no on-site appliances. As such, the platform can be easily deployed, scaled and managed by lean, resource-constrained IT teams across any corporate network - no matter how complex.
  • 20
    Akamai Cloud
    Akamai Cloud (formerly Linode) is the world’s most distributed cloud computing platform, designed to help businesses deploy low-latency, high-performance applications anywhere. It delivers GPU acceleration, managed Kubernetes, object storage, and compute instances optimized for AI, media, and SaaS workloads. With flat, predictable pricing and low egress fees, Akamai Cloud offers a transparent and cost-effective alternative to traditional hyperscalers. Its global infrastructure ensures faster response times, improved reliability, and data sovereignty across key regions. Developers can scale securely using Akamai’s firewall, database, and networking solutions, all managed through an intuitive interface or API. Backed by enterprise-grade support and compliance, Akamai Cloud empowers organizations to innovate confidently at the edge.
  • 21
    ThreatDefence

    ThreatDefence

    ThreatDefence

    Our XDR (Extended Detection and Response) cyber security platform provides deep visibility and threat detection across your endpoints, servers, cloud and your digital supply chain. We deliver the platform to you as fully managed service supported by our 24×7 Security Operations, with low cost and fastest enrollment time in the industry. Our platform is the foundation of effective cyber threat detection and response services. Providing deep visibility, great threat detection, sophisticated behavior analytics and automated threat hunting, the platform adds efficiency and value to your security operations capability. Leveraging our proprietary detection methodologies, including AI-empowered machine learning, our platform uncovers suspicious and anomalous behavior revealing even the most hidden threats. The platform creates high fidelity detections, flagging real threats and assisting SOC analysts and investigators to focus on what really matters.
    Starting Price: $5 per user per month
  • 22
    Jit

    Jit

    Jit

    DevOps ain’t easy! We are hearing more and more about the breakdown and friction where Dev meets Ops, so let’s not even talk about all the other shift-left domains that add another layer of complexity in the middle like DevSecOps. Where this comes with the need to implement and integrate dozens of security tools in their SDLC. But what if it doesn’t have to be difficult? Jit's DevSecOps Orchestration Platform allows high-velocity Engineering teams to own product security while increasing dev velocity. With a unified and friendly developer experience, we envision a world where every cloud application is born with Minimal Viable Security (MVS) embedded and iteratively improves by adding Continuous Security into CI/CD/CS.
  • 23
    Seraphic

    Seraphic

    Seraphic Algorithms

    Seraphic can secure any version of any browser on any device to prevent phishing, spear-phishing, clickjacking, CSS injection, man-in-the-middle, and Zero-day and unpatched N-Day attacks that other vendors cannot. This means that your end-users can leverage any combination of browsers they prefer and you can centrally manage corporate policy and governance for browsing as well as enterprise/private apps and SaaS environments. Seraphic also includes robust policy and governance controls including state of the art DLP engines that scans all outbound and inbound data in any format for any file with a complete privacy first approach.
  • 24
    Backslash Security
    The software development lifecycle has fundamentally changed. Developers across engineering organizations are using AI coding tools — GitHub Copilot, Cursor, Windsurf, Claude Code, Gemini CLI — at scale. The security controls built for traditional development were not designed for this environment. Backslash Security addresses this gap directly. The platform gives security teams visibility into AI coding tool usage, the code being generated, MCP server connections made by AI agents, and the risk introduced before it reaches production. Core capabilities: AI coding tool inventory and policy enforcement MCP server visibility and access control Vibe coding security — risk detection in AI-generated code Continuous monitoring without disrupting engineering workflows Purpose-built for AI-native development — not a legacy scanner repositioned for a new market. For security leaders governing an environment they didn't design, Backslash provides the visibility and control you need.
  • 25
    Reporter

    Reporter

    Security Reporter

    Security Reporter is an enterprise-grade pentest reporting software designed to streamline and standardize the penetration testing and security assessment reporting workflow. The platform supports security teams and pentesting providers in managing findings, producing professional reports, and delivering consistent results across complex environments. Key capabilities include a centralized content and vulnerability library, customizable report templates, multi-language reporting, and native imports from more than 140 security testing tools. These features support efficient vulnerability management, accurate reporting, and repeatable assessment processes. Security Reporter is offered exclusively as a self-hosted, on-premise solution, ensuring full control over sensitive security data and supporting common compliance and data governance requirements. By reducing manual reporting effort and minimizing errors, the platform improves productivity and shortens reporting cycles.
  • 26
    Retrospective

    Retrospective

    centeractive AG

    Retrospective is a desktop application for convenient and effective searching in local and distributed log files as well as log data from container platforms such as Docker and Kubernetes. Such data sources are accessed on local and/or remote computers and the log data of different format is extracted, combined and displayed in one place (the result table). Advanced features such as profile definition, data source monitoring, sorting/filtering result entries, highlighting, bookmarking, exporting etc. enable fast and robust log data exploration. Retrospective assists you in early error detection by monitoring application servers’ logs, searching for exceptions, etc. The highly optimized search engine together with the aforementioned features ensures that much precious time is saved. Being able to access all log data in one place makes log data processing incredibly efficient, thus ensuring quick and effective reactions to problems, and therefore gain customers’ trust and loyalty.
    Starting Price: $92 per year
  • 27
    Zirozen

    Zirozen

    Zirozen

    Zirozen is a unified autonomous endpoint management platform that delivers real‑time visibility and control across your entire IT environment to network equipment and cloud infrastructure, via an intuitive drag‑and‑drop dashboard. Its AI‑powered engine continuously scans for vulnerabilities, misconfigurations, missing patches, and unauthorized software, automatically prioritizing and remediating risks based on severity scores. Zirozen automates cross‑platform patch and configuration management with policy‑driven scheduling, continuous compliance auditing for standards like GDPR, HIPAA, and PCI‑DSS, software metering and license optimization, file integrity monitoring, application control, and malicious activity detection. Deep integrations eliminate tool sprawl by correlating security, asset, and inventory data in one console, while customizable alerts and centralized reporting enable proactive SecOps with reduced mean time to resolution.
  • 28
    TurnKey Lender

    TurnKey Lender

    TurnKey Lender

    TurnKey Lender is a one-stop lending infrastructure used by creditors in 50+ countries to automate all elements of their operations. The platform enables lenders to profitably grow their business while cutting operational costs and risks. It's a powerful AI-driven SaaS that automates over 90% of all lending processes and gives both B2C and B2B lenders a competitive edge. TurnKey Lender Platform has several pre-configured solutions packages including Commercial, Consumer, Pay Later, Auto, Mortgage, Leasing, Factoring. Built in constant collaboration with lenders worldwide, TurnKey Lender is the ultimate solution that answers real-life digital lending challenges in a sophisticated manner.
  • 29
    Endpoint Protector
    Endpoint Protector is an advanced, all-in-one Data Loss Prevention solution for Windows, macOS and Linux, that puts an end to data leaks and data theft and offers seamless control of portable storage devices. Endpoint Protector’s filtering capabilities for data at rest and in motion range from file type to predefined content based on dictionaries, regular expressions or data protection regulations such as GDPR, PCI DSS, CCPA, HIPAA, etc. Endpoint Protector features several specialized modules that can be mixed and matched based on client needs. The modules comprise: Content Aware Protection, Device Control, Enforced Encryption, and eDiscovery . It makes work more convenient, secure and enjoyable, offering an excellent ROI.
  • 30
    Zerto

    Zerto

    Zerto

    Zerto helps customers accelerate IT transformation by eliminating the risk and complexity of modernization and cloud adoption. By replacing multiple legacy solutions with a single IT Resilience Platform, Zerto is changing the way disaster recovery, backup and cloud are managed. At enterprise scale, Zerto’s software platform delivers continuous availability for an always-on customer experience while simplifying workload mobility to protect, recover and move applications freely across hybrid and multi-clouds. Zerto is trusted by over 6,000 customers globally and is powering resiliency offerings for Microsoft Azure, IBM Cloud, AWS, SunGard AS and more than 350 cloud services providers. Learn more at www.zerto.com
MongoDB Logo MongoDB