Best IT Security Software for Linux - Page 15

Compare the Top IT Security Software for Linux as of October 2025 - Page 15

  • 1
    Z1 SecureMail Gateway
    25% of the 100 German companies with the highest turnover choose Zertificon. Z1 SecureMail Gateway is our highly automated Enterprise Email Encryption solution for effortless, secure communications with anyone, anywhere. Your entire organization encrypts and decrypts, just as well manages & verifies email signatures smoothly in the background. Z1 SecureMail Gateway requires minimal maintenance. And the browser-based admin interface needs no special skills. Keys are managed automatically & central policies enforce security. Integration is fast into your Cloud or On-premises email infrastructure. Your workflows and business are uninterrupted — no employee training needed plus frictionless experience for recipients. With Z1 SecureMail Gateway, encryption is centrally configurable and proofed against human error. You easily achieve and maintain compliance and the highest security standards. You also own all encryption keys and attain German-engineered data sovereignty with no backdoors.
    Starting Price: from $ 1.50 per user/per month
  • 2
    Zeek

    Zeek

    The Zeek Project

    Zeek (formerly Bro) is the world’s leading platform for network security monitoring. Flexible, open source, and powered by defenders. Zeek has a long history in the open source and digital security worlds. Vern Paxson began developing the project in the 1990s under the name “Bro” as a means to understand what was happening on his university and national laboratory networks. Vern and the project’s leadership team renamed Bro to Zeek in late 2018 to celebrate its expansion and continued development. Zeek is not an active security device, like a firewall or intrusion prevention system. Rather, Zeek sits on a “sensor,” a hardware, software, virtual, or cloud platform that quietly and unobtrusively observes network traffic. Zeek interprets what it sees and creates compact, high-fidelity transaction logs, file content, and fully customized output, suitable for manual review on disk or in a more analyst-friendly tool like a security and information event management (SIEM) system.
    Starting Price: Free
  • 3
    LOGIQ

    LOGIQ

    LOGIQ.AI

    LOGIQ.AI’s LogFlow provides centralized control of your observability data pipelines. As data streams arrive, they are automatically organized and optimized for your business teams and knowledge workers. XOps teams can centralize data flow management, gain data EPS control, and increase data quality and relevance. Built on any object store, LogFlow’s InstaStore enables infinite data retention and on-demand data replay to any target observability platform of your choice. Analyze operational metrics across applications and infrastructure and gain actionable insights that help you scale with confidence while maintaining high availability. Fuel business decisions and better user experiences by collecting, transforming, and analyzing behavioral data and usage patterns from business systems. Don’t let new attack techniques catch you off guard. Detect and analyze threat patterns from multiple sources and automate threat prevention and remediation.
  • 4
    SharkStriker

    SharkStriker

    SharkStriker

    SharkStriker is an ISO27001-certified cybersecurity company offering human-led holistic security services. We were founded with the sole purpose of solving industry challenges like skill shortage, non-compliance and managing multiple vendors for cybersecurity. The name SharkStriker was inspired by the orca whales that even sharks are afraid of. They intend to be the orca whales of the digital ocean, protecting businesses from the sharks of cyberspace. We offer a gamut of industry-specific tailored cybersecurity solutions and services such as: 360-degree cybersecurity posture assessment Managed Detection and Response SIEM as service SOC-as-service IoT and Cloud Security assessment and augmentation VAPT services Compliance management for regulatory and global regulations like:- GDPR PCI-DSS ARAMCO SAMA ISO 270001 NEST and more. By having a team of threat experts working at the ground level with enterprises across industries.
    Starting Price: $9.99/month
  • 5
    Titaniam

    Titaniam

    Titaniam

    Titaniam provides enterprises and SaaS vendors with a full suite of data security/privacy controls in a single, enterprise grade solution. This includes highly advanced options such as encryption-in-use that enables encrypted search and analytics without decryption, and also traditional controls such as tokenization, masking, various types of encryption, and anonymization. Titaniam also offers BYOK/HYOK (bring/hold your own key) for data owners to control the security of their data. If attacked, Titaniam minimizes regulatory overhead by providing evidence that sensitive data retained encryption. Titaniam’s interoperable modules can be combined to support hundreds of architectures across multiple clouds, on-prem, and hybrid environments. Titaniam provides the equivalent of 3+ categories of solutions making it the most effective, and economical solution in the market. Titaniam is featured by Gartner, IDC, and TAG Cyber and has won coveted industry awards e.g. SINET16 and at RSAC2022.
  • 6
    Shoreline

    Shoreline

    Shoreline.io

    Shoreline is the Cloud Reliability platform — the only platform that lets DevOps engineers build automations in an afternoon, and fix issues forever. Shoreline reduces on-call complexity by running across clouds, Kubernetes clusters, and VMs allowing operators to manage their entire fleet as if it were a single box. Debugging and repairing issues is easy with advanced tooling for your best SREs, automated runbooks for the broader team, and a platform that makes building automations 30X faster. Shoreline does the heavy lifting, setting up monitors and building repair scripts, so that customers only need to configure them for their environment. Shoreline’s modern “Operations at the Edge” architecture runs efficient agents in the background of all monitored hosts. Agents run as a DaemonSet on Kubernetes or an installed package on VMs (apt, yum). The Shoreline backend is hosted by Shoreline in AWS, or deployed in your AWS virtual private cloud.
  • 7
    Zentry

    Zentry

    Zentry Security

    Least privileged application access with consistent security for any user, anywhere. Transient authentication provides granular, least-privileged access to mission-critical infrastructure. Zentry Trusted Access provides clientless, browser-based, streamlined zero-trust application access for small to medium-sized enterprises. Organizations see gains in security posture and compliance, a reduced attack surface, and greater visibility into users and applications. Zentry Trusted Access is a cloud-native solution that is simple to configure, and even simpler to use. Employees, contractors, and third parties just need an HTML5 browser to securely connect to applications in the cloud and data center, no clients are needed. Leveraging zero trust technologies like multi-factor authentication and single sign-on, only validated users obtain access to applications and resources. All sessions are encrypted end-to-end with TLS, and each is governed by granular policies.
  • 8
    Cryptshare

    Cryptshare

    Cryptshare

    Cryptshare is innovation to protect your information when most at risk. We all need to send messages and data in our daily business. However, we face many limitations, as soon as data is in transit: 1. Protection of data 2. File size limitations Our solution solves these in a very effective and user-friendly way. It brings many other benefits including: *Detailed audit trail *Compliance with central data protection regulations *Great potential for automating business communication *It is also inexpensive, easy to implement, and accessible from any kind of device with a browser. Cryptshare complies with ISO 27001 and GDPR. Cryptshare keeps your information secure all the way.
    Starting Price: €5 per user per month
  • 9
    Prelude

    Prelude

    Prelude

    Organizations of all sizes can use our tools to run continuous security tests against their systems to discover areas of weakness to fix. We do this in a way that's safe, transparent, and integrated with existing defensive tools to allow organizations to get ahead of real incidents, before they happen. Organizations of all sizes use Prelude to continuously test their defensive systems. For enterprises with security teams, Operator Enterprise offers continuous testing infrastructure, team collaboration and the ability to personalize attacks and agents to your organization. Are you an IT professional? Join our upskilling program to become an IT Security Engineer - bringing advanced security to your organization.
    Starting Price: $50 per month
  • 10
    EncryptTitan
    EncryptTitan is a 100% cloud based encryption system for MSPs & Enterprises that allows users to exchange information securely via email.  EncryptTitan provides organizations with the tools needed to adhere to state and federal privacy regulations while protecting their organization. EncryptTitan has pre-built DLP policies and settings that will look for regular content in the message body or attachment to automatically encrypt messages. Meet compliance requirements for protecting sensitive, private information. Providing data breach protection and avoiding costly fines and penalties. The outlook plug in can be used with our keyword encryption deployment, where the user can select which emails to be encrypted for the add in. EncryptTitan helps the safeguarding of private information & avoidance of litigation & bad press which can impact customer trust. Book your demo today and learn more about EncryptTitan.
  • 11
    Phylum

    Phylum

    Phylum

    Phylum defends applications at the perimeter of the open-source ecosystem and the tools used to build software. Its automated analysis engine scans third-party code as soon as it’s published into the open-source ecosystem to vet software packages, identify risks, inform users and block attacks. Think of Phylum like a firewall for open-source code. Phylum’s database of open-source software supply chain risks is the most comprehensive and scalable offering available, and can be deployed throughout the development lifecycle depending on an organization’s infrastructure and appsec program maturity: in front of artifact repository managers, directly with package managers or in CI/CD pipelines. The Phylum policy library allows users to toggle on the blocking of critical vulnerabilities, attacks like typosquats, obfuscated code and dependency confusion, copyleft licenses, and more. Users can also leverage OPA to create custom policies.
  • 12
    Ziroh Store

    Ziroh Store

    Ziroh Store

    It’s unsafe to store/sync your critical files to cloud storage platforms. Because there is no cloud that is able to keep your details completely private to you. All your files on the cloud are telling tales about you to your cloud storage provider, your personal images, academic transcripts, bank details, and work documents. You really don’t have a say in who reads your information, and what they do with it. When you sync your gallery to your cloud, it exposes the personal photos and videos on your device to all third parties who have a backdoor to your cloud storage. They are privy to every private moment you capture and even delete. Do a simple search to check when your cloud storage provider was last hacked. Your files on the cloud are private to you, your cloud storage provider and their allies only until a savvy hacker looks your way. Ziroh Store is a privacy-preserving intuitive software that helps you to upload your files end-to-end encrypted to any of your cloud platforms.
  • 13
    Microsoft Defender for Endpoint
    Gain the upper hand against sophisticated threats like ransomware and nation-state attacks. Put time back in the hands of defenders to prioritize risks and elevate your security posture. Advance beyond endpoint silos and mature your security based on a foundation for XDR and Zero Trust. Microsoft Defender for Endpoint delivers industry-leading endpoint security for Windows, macOS, Linux, Android, iOS, and network devices and helps to rapidly stop attacks, scale your security resources, and evolve your defenses. It’s delivered at cloud scale, with built-in AI that reasons over the industry’s broadest threat intelligence. Our comprehensive solution enables discovery of all endpoints and even network devices, such as routers, in your environment. It offers vulnerability management, endpoint protection, endpoint detection and response (EDR), mobile threat defense, and managed hunting all in a single, unified platform.
  • 14
    EmailAuth.io

    EmailAuth.io

    EmailAuth

    EmailAuth® is a TIER 1 OEM and a market leader in Email Authentication. Available 100% on-premise, or in-country cloud (local cloud) or on AWS/AZURE/GCP globally - We make it easy to unleash the power of email authentication. It is an anti-spoofing, anti-impersonation, and anti-phishing platform that ensures that no one can abuse your domains online. If anyone in the world spoofs your domains, EmailAuth collates data from all across the world to ensure that even a single unauthorized email is caught and rejected by global recipients of the world. It even extracts the IP of the sender, so this threat intelligence can be used to block the attacker across your cyber security fabric (SOAR capable). #StopGettingPhished #BeSpoofProof
  • 15
    GTB Technologies DLP

    GTB Technologies DLP

    GTB Technologies

    Data Loss Prevention is defined as a system that performs real-time data classification on data at rest and in motion while automatically enforcing data security policies. Data in motion is data going to the cloud, internet, devices, or the printer. Our solution is the technology leader. Protecting on-premises, off-premises, and the cloud whether it be Mac, Linux, or Windows; our Data Loss Prevention security engine accurately detects structured & unstructured data at the binary level. GTB is the only Data Loss Prevention solution that accurately protects data when off the network. Discover, identify, classify, inventory, index, redact, re-mediate, index, control and protect your data including PII, PCI, PHI, IP, unstructured data, structured data, FERC, NERC, SOX, GLBA & more. Our patented and patent-pending, proprietary technology is able to prevent the syncing of sensitive data to unsanctioned or private clouds, while allowing its users to automatically identify “sync folders”.
  • 16
    MITIGATOR
    MITIGATOR is an instrument against modern DDoS attacks at L3-L7 layers. It is designed to secure infrastructure and individual services of financial and gaming companies, telecom operators, hostings and enterprise.   MITIGATOR is an optimal choice for the companies acknowledging the issues in their security system and unsatisfied with the service provided by MSSP or their current DDoS protection tool. MITIGATOR features: -TCP protection of symmetric and asymmetric traffic  -TLS protection without traffic decryption -Web Server log analysis via syslog -Programmable filter usage; WAF integration options; application protection using Mitigator Challenge Response; ISN Synchronization -BGP support for traffic redirection. Can send and receive  BGP FlowSpec for traffic filtering -Flexible deployment schemes: Inline, On-a-stick, L2 transparency, L3 router -Geographically distributed clustering support  -Optional Flow Collector support -Automatic traffic dump collection
  • 17
    Trunc

    Trunc

    Trunc

    All your logs. One place. Troubleshoot errors, detect attacks, audit your users and solve compliance requirements with Trunc. Keep all your logs, easily accessible, with full-text logging search. Logs are automatically categorized, correlated and stored. Alerts and active response included.
    Starting Price: $10 per month
  • 18
    Bitdefender TrafficLight
    It is a free cross-browser add-on that intercepts, processes, and filters all Web traffic, blocking any malicious content and taking browser security to new levels. Never worry about suspicious websites again! TrafficLight examines and blocks the pages you visit for malware and phishing attempts each and every time you access them. Safe search results keep you out of harm's way. With Bitdefender TrafficLight, you will be always informed about malware and fraudulent websites within your search results.
    Starting Price: Free
  • 19
    open-appsec

    open-appsec

    open-appsec

    automatic web application & API security using machine learning open-appsec is an open-source initiative that builds on machine learning to provide pre-emptive web app & API threat protection against OWASP-Top-10 and zero-day attacks. It can be deployed as add-on to Kubernetes Ingress, NGINX, Envoy and API Gateways. open-oppsec simplifies maintenance as there is no threat signature upkeep and exception handling, like common in many WAF solutions.
  • 20
    F5 NGINX Plus
    The software load balancer, reverse proxy, web server, & content cache with the enterprise features and support you expect. Modern app infrastructure and dev teams love NGINX Plus. More than just the fastest web server around, NGINX Plus brings you everything you love about NGINX Open Source, adding enterprise‑grade features like high availability, active health checks, DNS system discovery, session persistence, and a RESTful API. NGINX Plus is a cloud‑native, easy-to-use reverse proxy, load balancer, and API gateway. Whether you need to integrate advanced monitoring, strengthen security controls, or orchestrate Kubernetes containers, NGINX Plus delivers the five‑star support you expect from NGINX. NGINX Plus provides scalable and reliable high availability along with monitoring to support debugging and diagnosing complex application architectures. Active health checks proactively poll upstream server status to get ahead of issues.
  • 21
    F5 NGINX App Protect
    A modern app‑security solution that works seamlessly in DevOps environments, helping you deliver secure apps from code to customer. Today’s application landscape has changed dramatically. Modern apps are microservices that run in containers, communicate via APIs, and deploy via automated CI/CD pipelines. DevOps teams need to integrate security controls authorized by the security team across distributed environments without slowing release velocity or performance. NGINX App Protect is a modern app‑security solution that works seamlessly in DevOps environments as a robust WAF or app‑level DoS defense, helping you deliver secure apps from code to customer. Seamlessly integrates strong security controls with NGINX Plus and NGINX Ingress Controller. Defends against many advanced threats and evasive attacks. Reduces complexity and tool sprawl while delivering modern apps. Create, secure, and operate adaptive applications that reduce costs, improve operations, and better protect users.
  • 22
    Delinea Server Suite
    Easily consolidate complex and disparate identities for Linux and Unix within Microsoft Active Directory. Minimize the risk of a breach and reduce lateral movement with a flexible, just-in-time privilege elevation model. Advanced session recording, auditing, and compliance reporting aid forensic analysis into abuse of privilege. Centralize discovery, management, and user administration for Linux and UNIX systems to enable rapid identity consolidation into Active Directory. Privileged Access Management best practices are easy to follow with the Server Suite. The results are higher levels of identity assurance and a significantly reduced attack surface with fewer identity silos, redundant identities, and local accounts. Manage privileged user and service accounts from Windows and Linux in Active Directory. Just-in-time, fine-grained access control with RBAC and our patented Zones technology. Complete audit trail for security review, corrective action, and compliance reporting.
  • 23
    LumenVox Voice Biometrics
    Using voice biometrics authentication, companies can provide a delightful customer experience without sacrificing security. LumenVox Voice Biometrics technology screens customers by comparing input voice audio to a collection of stored voice samples (“voiceprints”) that are known to be authentic or fraudulent. Just like a fingerprint, each voice is unique. This makes Voice Biometric Authentication an incredibly effective way to validate identity. LumenVox’s flexible voice biometrics technology can be deployed in the method of choice and gives organizations the ability to create a seamless and secure process to verify its customers. LumenVox Voice Biometrics not only creates a better user experience, but also reduces operational costs and strengthens security. Anti-fraud measures such as liveness detection provide an additional security layer.
  • 24
    KeeWeb

    KeeWeb

    KeeWeb

    Desktop apps look beautiful on each platform: macOS, Windows and Linux. You can open local files in desktop apps. Switch between dark and light themes, whichever you like more. Mark items with color and easily find them using the colors tab. Open several files, search for any entry, or view all items from all files as one list. Search works for all files, everything is done from one search box. Drop entry attachments and database files right into the app. Fields can be hidden when you need them, and they will be stored in memory in a more secure way than usual fields. Generate passwords of any desired length, with only the symbols you want. Refine search by specifying fields, searching passwords, and history and using powerful regular expressions syntax.
    Starting Price: Free
  • 25
    Smartlockr

    Smartlockr

    Smartlockr

    Smartlockr is a people-centric data security platform to easily enable secure email and file sharing for an entire organization. Smartlockr prevents data leaks by keeping user-friendliness in mind with everything we do. By eliminating the human error, we ensure your workforce is your strongest asset in preventing data leaks. Smartlockr can be customized for each organization, so that every employee can continue to work with the (email) systems they are used to. Smartlockr can be used with almost every operating system and device. It is available as a plug-in for Microsoft 365 (Outlook), it can be integrated into existing systems and an SMTP relay service can be used too. Even a combination is possible if required. Smartlockr can also be used to securely send and receive large files of up to 5 TB. Smartlockr is compliant with all privacy regulations and security standards like GDPR, ISO, NTA 7516.
    Starting Price: €0.42 / month / user
  • 26
    FOCAL

    FOCAL

    Mozn

    FOCAL by Mozn is a suite of products that leverage our powerful AI and machine learning technology to answer the challenges of AML compliance and Fraud Prevention in Emerging Markets. FOCAL Anti-Fraud is a suite of products that leverage powerful AI to address the increasing volume and complexity of Fraud in Emerging Markets. All-in-one AML compliance suite for financial institutions to confidently screen customers, monitor transactions and assess risk with powerful AI and seamless automation.
  • 27
    AP Lens

    AP Lens

    AP Lens

    AP Lens is a Sandbox Browser that isolates networks using DNS Whitelisting. We stop the attack before it reaches the network. What does AP Lens provide? - Web Filtering: Flexible and user-friendly content blocking. - Anti-Phishing: Stop look-alike domains with 100% accuracy. - Ransomware Protection: Isolate the network without affecting business applications. - Secure Remote Work: Enforce internet usage policies without VPN slowness. - No More 0-Day Attacks: Escape the limits of blacklisting with AP Lens Augmented Whitelist. - Compliant: AP Lens meets regulatory requirements requested by cybersecurity insurance policies. - One-Click Installation: No need for a lengthy setup process or updating from the user's side. - No Maintenance: Stop malware and phishing without continuous monitoring. Our team builds on over 20 years of experience in cyber security, cloud security, and information protection in industries such as private banking and the public sector.
    Starting Price: $5
  • 28
    FerrumGate

    FerrumGate

    FerrumGate

    FerrumGate is an Open source Zero Trust Network Access (ZTNA) project, that uses advanced identity and access management technologies to ensure secure access to your network and applications. With multi-factor authentication, continuous monitoring, and granular access controls. You can use it for Secure remote access, Cloud security, Privileged access management, Identity and access management, Endpoint security, IOT connectivity.
  • 29
    COSGrid MicroZAccess

    COSGrid MicroZAccess

    COSGrid Networks

    MicroZAccess is a Smart Zero Trust Network Access (ZTNA) client in Desktop which securely authenticates the user and seamlessly connects the device to the Cloud through reliable, high performance and encrypted tunnels. Highlights: Peer to Peer Overlay model for improved privacy and performance Flexible Deployment - Host/Workload Agent & Gateway approach Integrated Device Trust and Superior Identity MFA based Access Super Simple to Deploy and Manage Platform approach for Comprehensive Security - Support in SD-WAN and SASE Stateful device compliance checks before, and during, a connection Granular policy enforcement
    Starting Price: ₹300 per user
  • 30
    Pillr

    Pillr

    OpenText

    Pillr is powerful security operations software backed by 24/7/365 SOC service and support. The platform unifies security data sources and tools in a single console. Incoming data is automatically analyzed, and the resulting telemetry is correlated with over 35 industry leading threat intelligence feeds to produce actionable, reliable alerts. On Pillr, you can examine data in a customizable dashboard, investigate events with powerful threat intelligence tools, and work collaboratively with Pillr SOC teams to remediate issues. The platform supports over 450 integrations, including tools from Autotask, Check Point, ConnectWise, Crowdstrike, Microsoft, SentinelOne, and Sophos—while expanding integration support for new tools daily. Pillr SOCs operate on a true 24/7/365 model and are staffed by 85+ security analysts and threat hunters, so service providers on the platform receive consistent, real-time guidance and support no matter the day or time.