68 Integrations with Debian

View a list of Debian integrations and software that integrates with Debian below. Compare the best Debian integrations as well as features, ratings, user reviews, and pricing of software that integrates with Debian. Here are the current Debian integrations in 2024:

  • 1
    LunaNode

    LunaNode

    LunaNode

    Deploy a reliable, performant, and feature-packed cloud server, available in Canada (Toronto and Montreal) and France (Roubaix). KVM cloud servers on redundant SSD disk arrays. Check out our pricing! Take live snapshots of your VM at any time to extract its current disk state for backups or cloning, without any downtime. Volumes are detachable disks stored on our high-availability cluster. Attach volumes to VMs for extra space, or provision VMs with a volume as the boot device. Automatically configure your VM during the boot process with bash and cloud-init startup scripts. Security groups allow you to define traffic restrictions on groups of virtual machines at the infrastructure level. Your VMs get their own private, isolated internal network, on which they can securely communicate. VMs can burst above their baseline performance for short periods to utilize additional CPU and I/O resources, making load spikes easier on your application.
    Starting Price: $3.50 per month
  • 2
    F5 NGINX Plus
    The software load balancer, reverse proxy, web server, & content cache with the enterprise features and support you expect. Modern app infrastructure and dev teams love NGINX Plus. More than just the fastest web server around, NGINX Plus brings you everything you love about NGINX Open Source, adding enterprise‑grade features like high availability, active health checks, DNS system discovery, session persistence, and a RESTful API. NGINX Plus is a cloud‑native, easy-to-use reverse proxy, load balancer, and API gateway. Whether you need to integrate advanced monitoring, strengthen security controls, or orchestrate Kubernetes containers, NGINX Plus delivers the five‑star support you expect from NGINX. NGINX Plus provides scalable and reliable high availability along with monitoring to support debugging and diagnosing complex application architectures. Active health checks proactively poll upstream server status to get ahead of issues.
  • 3
    F5 NGINX App Protect
    A modern app‑security solution that works seamlessly in DevOps environments, helping you deliver secure apps from code to customer. Today’s application landscape has changed dramatically. Modern apps are microservices that run in containers, communicate via APIs, and deploy via automated CI/CD pipelines. DevOps teams need to integrate security controls authorized by the security team across distributed environments without slowing release velocity or performance. NGINX App Protect is a modern app‑security solution that works seamlessly in DevOps environments as a robust WAF or app‑level DoS defense, helping you deliver secure apps from code to customer. Seamlessly integrates strong security controls with NGINX Plus and NGINX Ingress Controller. Defends against many advanced threats and evasive attacks. Reduces complexity and tool sprawl while delivering modern apps. Create, secure, and operate adaptive applications that reduce costs, improve operations, and better protect users.
  • 4
    JFrog Connect
    JFrog Connect's unique design takes less than a minute to connect any type of Linux or IoT device. Need to add a thousand devices? Embed the Connect Agent to the image, and you’re ready to go. Comprehensive device management enables you to categorize fleet devices into logical groups and subgroups, making it easy to monitor, manage and update efficiently. Gain complete visibility of your fleet devices at scale. Monitor device resources (CPU, RAM, Disk), state and applications, with automated alerts to keep devices safe, stable and address issues before they become escalations. Securely troubleshoot and resolve device issues from anywhere in the world using SSH, VNC, port forwarding and remote Bash commands. JFrog Connect is a vital component of the JFrog Platform, providing prebuilt integrations with JFrog Artifactory and JFrog Xray, helping organizations deliver updates faster, continuously and securely at every stage of the software lifecycle, from development to deployment.
  • 5
    Utho

    Utho

    Utho

    High-performance cloud infrastructure at affordable prices. Manage easily with an intuitive interface. No tech expertise is needed. 24/7 dedicated team, personalized assistance, and answers. Advanced encryption, authentication, and 24/7 monitoring. Competitive prices without compromising quality. Turn your idea into a solution with Utho Cloud products and services, build any solution. Save time by deploying any app at just a click from our 1 click deploy apps and go live in minutes. Finding the right cloud can be hard, especially with the best available options where developers can access cloud resources from anywhere and anytime. Deploy cloud resources from seven data center locations across the globe to provide the lowest latency for the best user experience. We know how important support is for you, We're just a call, WhatsApp, or email away to help you at any time you need. Our pricing is transparent and pay only what you use.
    Starting Price: $162.69 per month
  • 6
    Poste.io

    Poste.io

    analogic

    You can have a fully functional mail server installed in a few minutes, mostly waiting for scripts to do the work. The whole package is designed with reasonable defaults to get you up and running quickly, without having to know the internals and without making decisions that could break the email system. User data and configuration is strictly separated from binaries. User database is stored in SQLite database - in file. This makes Poste.io fully compatible with external storage. Migration, backups or updates are therefore very easy and mostly consist of files manipulation. Poste.io has been built from the ground up with security in mind. Internet history is littered with painful security incidents, so we traded old email client compatibility and insecure authentication methods for features that meet today's for features that meet modern security requirements.
    Starting Price: Free
  • 7
    Courier

    Courier

    Double Precision, Inc.

    The Courier mail transfer agent (MTA) is an integrated mail/groupware server based on open commodity protocols, such as ESMTP, IMAP, POP3, LDAP, SSL, and HTTP. Courier provides ESMTP, IMAP, POP3, webmail, and mailing list services within a single, consistent, framework. Individual components can be enabled or disabled at will. The Courier mail server now implements basic web-based calendaring and scheduling services integrated in the webmail module. Advanced groupware calendaring services will follow soon. The Courier mail server's source code should compile on most POSIX-based operating systems based on Linux, and BSD-derived kernels. The Courier mail server should also compile on Solaris and AIX, with some help from Sun's or IBM's freeware add-on tools for their respective operating systems. The Courier mail server evolved out of several related projects, that merged together (more on that later). The Courier mail server implements SMTP extensions for mailing list management.
    Starting Price: Free
  • 8
    Cyrus IMAP

    Cyrus IMAP

    The Cyrus Team

    Cyrus IMAP is an email, contacts and calendar server. Cyrus is free and open source. Features: Speed Security Efficiency Search CardDAV and CalDAV support Robust data storage Replication Scalable for large installations Flexible filtering support through Sieve Supports antivirus and antispam toolkits Handles deliverability: SPF, DKIM, DMARC Extensive authentication options, through Cyrus SASL JMAP support Long list of supported standards
    Starting Price: Free
  • 9
    Sandfly Security

    Sandfly Security

    Sandfly Security

    Trusted on critical infrastructure globally, Sandfly delivers agentless Linux security with no endpoint agents and no drama. Instant deployment without compromising stability or needing endpoint agents. Sandfly is an agentless, instantly deployable, and safe Linux security monitoring platform. Sandfly protects virtually any Linux system, from modern cloud deployments to decade-old devices, regardless of distribution or CPU architecture. Besides traditional Endpoint Detection and Response (EDR) capabilities, Sandfly also tracks SSH credentials, audits for weak passwords, detects unauthorized changes with drift detection, and allows custom modules to find new and emerging threats. We do all of this with the utmost safety, performance, and compatibility on Linux. And, we do it without loading agents on your endpoints. The widest coverage for Linux on the market. Sandfly protects most distributions and architectures such as AMD, Intel, Arm, MIPS, and POWER CPUs.
  • 10
    Pinguzo

    Pinguzo

    Pinguzo

    Downtime can happen on your servers and websites. Get notified instantly to take corrective steps. More than 800 users are already using Pinguzo to monitor servers and their websites. Join for free and check your server's health and websites uptime, availability, and performance. Monitor your websites uptime, load time, average response times, etc. Install the Pinguzo agent and get detailed server information and graphs. We can send alerts over e-mail, SMS, PagerDuty, Pushbullet, Slack, HipChat, web-hooks, etc. You can set various parameters like if the Load Time is high for X minutes alert me after every Y minutes. View detailed uptime, downtime reports and graphs of your response times. For servers, you can view detailed information of your CPU, RAM, disk, network usage, etc. We verify the downtime from multiple locations. Pinguzo has been tested on CentOS, Debian, Ubuntu, Fedora, Scientific Linux, RHEL, openSUSE, Slackware, Gentoo, Archlinux.
  • 11
    Flockport

    Flockport

    Flockport

    One-click migration from your existing VM workloads. Get instant mobility of your applications across on-prem and clouds. Why settle for one-way cloud migration when you can have continuous mobility. Migrate from on-prem to the cloud, across clouds, or back. Embrace the cloud your way. Business continuity needs application mobility and a multi-cloud approach. Leave behind long drawn out and expensive VM migration projects. Instashift gives you single-click automation. No need to adopt complex approaches. Migrate your VMs complete with applications, databases, and states. Benefit from continuous mobility for your instashifted applications. Move to the cloud or back to on-prem in a click. Need to move thousands of VMs. Instashift gives you an automated solution that works seamlessly. A new innovation platform for sovereign and emerging cloud providers to deliver the same capabilities and flexibility users have come to expect from the public cloud.
  • 12
    Catalogic DPX

    Catalogic DPX

    Catalogic Software

    Reliable, rapid, and low-cost backup and recovery. Protect and recover your data from human errors, disasters, and ransomware attacks. Fast recovery-in-place from disk, tape and cloud. Agentless backup for virtual environments enhancements including single file recovery to restore specific files or directories from VMware and Microsoft Hyper-V agentless backups. Enhancements to vStor, our software-defined backup appliance, including appliance configuration via the HTML5 interface, replication management, and S3 Object Lock for protecting cloud backups against early deletion and ransomware. More cloud storage backup and archive targets including Backblaze B2 Cloud Storage with S3 Object Lock, and Amazon S3 Glacier and Glacier Deep Archive support.
  • 13
    AD Bridge

    AD Bridge

    BeyondTrust

    Extend Microsoft® Active Directory authentication, single sign-on capabilities, and group policy configuration management to Unix & Linux systems with AD Bridge. Consistent tools across the enterprise. Provide a single familiar toolset to manage both Windows and Unix/Linux systems. Streamline compliance processes. Provide thorough audit details to audit and compliance teams and manage group policies centrally. Extend security policies. Expand single sign-on (SSO) and file sharing, and control access to non-Windows systems. BeyondTrust AD Bridge centralizes authentication for Unix and Linux environments by extending Active Directory’s Kerberos authentication and single sign-on capabilities to these platforms. By extending group policy to non-Windows platforms, BeyondTrust provides centralized configuration management, reducing the risk and complexity of managing a heterogeneous environment. Extend native group policy management tools to include settings for Unix and Linux.
  • 14
    Kuma

    Kuma

    Kuma

    The open-source control plane for service mesh, delivering security, observability, routing and more. Built on top of Envoy, Kuma is a modern control plane for Microservices & Service Mesh for both K8s and VMs, with support for multiple meshes in one cluster. Out of the box L4 + L7 policy architecture to enable zero trust security, observability, discovery, routing and traffic reliability in one click. Getting up and running with Kuma only requires three easy steps. Natively embedded with Envoy proxy, Kuma Delivers easy to use policies that can secure, observe, connect, route and enhance service connectivity for every application and services, databases included. Build modern service and application connectivity across every platform, cloud and architecture. Kuma supports modern Kubernetes environments and Virtual Machine workloads in the same cluster, with native multi-cloud and multi-cluster connectivity to support the entire organization.
  • 15
    Certa Hosting

    Certa Hosting

    Certa Hosting

    Your website is monitored day and night by our tech team to protect and optimise its performance. That security is taken care of so you can concentrate on running your online business services. We're so sure you'll love working with us, we offer a full refund if you're not completely satisfied with our cheap web hosting plans. You've got nothing to lose by giving us a try. No more slow page loading. Our hosting plans are built on the latest server technology in a state-of-the-art UK data centre for speed, quality and peace of mind utilising the latest version cPanel services. Our customers have rated us five star on Trustpilot, Serchen, and Reviews. Try us out today to find out why so many businesses trust us to look after their website.
    Starting Price: $3.50 per month
  • 16
    GaraSign

    GaraSign

    Garantir

    There are many excellent enterprise security tools to choose from. Some are managed on-premise, others are consumed as a service, and others still use a hybrid model. The challenge enterprises face is not a lack of tools or solutions, but rather a lack of seamless interconnectivity between these privileged access management tools and a single place to manage and audit them. GaraSign is a platform that allows enterprises to securely and efficiently integrate their security systems in a way that does not disrupt existing business processes. By factoring out what’s common, GaraSign is able to centralize and simplify the management of your enterprise’s most sensitive areas, including privileged access management (PAM), privileged identity management, secure software development, code signing, data security, PKI & HSM solutions, DevSecOps, and more. Enterprise security leaders must attend to data security, privileged access management (PAM), privileged identity management, etc.
  • 17
    Fluent Bit

    Fluent Bit

    Fluent Bit

    Fluent Bit can read from local files and network devices, and can scrape metrics in the Prometheus format from your server. All events are automatically tagged to determine filtering, routing, parsing, modification and output rules. Built-in reliability means if you hit a network or server outage you will be able to resume from where you left off without data loss. Rather than serving as a drop-in replacement, Fluent Bit enhances the observability strategy for your infrastructure by adapting and optimizing your existing logging layer, as well as metrics and traces processing. Furthermore, Fluent Bit supports a vendor-neutral approach, seamlessly integrating with other ecosystems such as Prometheus and OpenTelemetry. Trusted by major cloud providers, banks, and companies in need of a ready-to-use telemetry agent solution, Fluent Bit effectively manages diverse data sources and formats while maintaining optimal performance.
  • 18
    SecHard

    SecHard

    SecHard

    SecHard is a multi-module software for implementing zero-trust architecture. SecHard provides automated security hardening auditing, scoring, and remediation for servers, clients, network devices, applications, databases, and more. A powerful identity and access management software to get compliant with zero trust and to prevent attacks like privilege abuse, ransomware, and more. SecHard solves the risk awareness problem in asset management. Automated discovery, access, identification, and remediation features provide ultra-wide visibility for all regulations. With the passive scanning method, SecHard operates the vulnerability detection and management processes for all IT assets without creating any risks. SecHard auto-discovers the certificates in the company’s environment report the expiration dates of these certificates, and it can automatically renew some of these certificates through well-known certificate authorities.