Best IT Security Software for Linux - Page 16

Compare the Top IT Security Software for Linux as of November 2025 - Page 16

  • 1
    Smartlockr

    Smartlockr

    Smartlockr

    Smartlockr is a people-centric data security platform to easily enable secure email and file sharing for an entire organization. Smartlockr prevents data leaks by keeping user-friendliness in mind with everything we do. By eliminating the human error, we ensure your workforce is your strongest asset in preventing data leaks. Smartlockr can be customized for each organization, so that every employee can continue to work with the (email) systems they are used to. Smartlockr can be used with almost every operating system and device. It is available as a plug-in for Microsoft 365 (Outlook), it can be integrated into existing systems and an SMTP relay service can be used too. Even a combination is possible if required. Smartlockr can also be used to securely send and receive large files of up to 5 TB. Smartlockr is compliant with all privacy regulations and security standards like GDPR, ISO, NTA 7516.
    Starting Price: €0.42 / month / user
  • 2
    FOCAL

    FOCAL

    Mozn

    FOCAL by Mozn is a suite of products that leverage our powerful AI and machine learning technology to answer the challenges of AML compliance and Fraud Prevention in Emerging Markets. FOCAL Anti-Fraud is a suite of products that leverage powerful AI to address the increasing volume and complexity of Fraud in Emerging Markets. All-in-one AML compliance suite for financial institutions to confidently screen customers, monitor transactions and assess risk with powerful AI and seamless automation.
  • 3
    AP Lens

    AP Lens

    AP Lens

    AP Lens is a Sandbox Browser that isolates networks using DNS Whitelisting. We stop the attack before it reaches the network. What does AP Lens provide? - Web Filtering: Flexible and user-friendly content blocking. - Anti-Phishing: Stop look-alike domains with 100% accuracy. - Ransomware Protection: Isolate the network without affecting business applications. - Secure Remote Work: Enforce internet usage policies without VPN slowness. - No More 0-Day Attacks: Escape the limits of blacklisting with AP Lens Augmented Whitelist. - Compliant: AP Lens meets regulatory requirements requested by cybersecurity insurance policies. - One-Click Installation: No need for a lengthy setup process or updating from the user's side. - No Maintenance: Stop malware and phishing without continuous monitoring. Our team builds on over 20 years of experience in cyber security, cloud security, and information protection in industries such as private banking and the public sector.
    Starting Price: $5
  • 4
    FerrumGate

    FerrumGate

    FerrumGate

    FerrumGate is an Open source Zero Trust Network Access (ZTNA) project, that uses advanced identity and access management technologies to ensure secure access to your network and applications. With multi-factor authentication, continuous monitoring, and granular access controls. You can use it for Secure remote access, Cloud security, Privileged access management, Identity and access management, Endpoint security, IOT connectivity.
  • 5
    COSGrid MicroZAccess

    COSGrid MicroZAccess

    COSGrid Networks

    MicroZAccess is a Smart Zero Trust Network Access (ZTNA) client in Desktop which securely authenticates the user and seamlessly connects the device to the Cloud through reliable, high performance and encrypted tunnels. Highlights: Peer to Peer Overlay model for improved privacy and performance Flexible Deployment - Host/Workload Agent & Gateway approach Integrated Device Trust and Superior Identity MFA based Access Super Simple to Deploy and Manage Platform approach for Comprehensive Security - Support in SD-WAN and SASE Stateful device compliance checks before, and during, a connection Granular policy enforcement
    Starting Price: ₹300 per user
  • 6
    Pillr

    Pillr

    OpenText

    Pillr is powerful security operations software backed by 24/7/365 SOC service and support. The platform unifies security data sources and tools in a single console. Incoming data is automatically analyzed, and the resulting telemetry is correlated with over 35 industry leading threat intelligence feeds to produce actionable, reliable alerts. On Pillr, you can examine data in a customizable dashboard, investigate events with powerful threat intelligence tools, and work collaboratively with Pillr SOC teams to remediate issues. The platform supports over 450 integrations, including tools from Autotask, Check Point, ConnectWise, Crowdstrike, Microsoft, SentinelOne, and Sophos—while expanding integration support for new tools daily. Pillr SOCs operate on a true 24/7/365 model and are staffed by 85+ security analysts and threat hunters, so service providers on the platform receive consistent, real-time guidance and support no matter the day or time.
  • 7
    Fasoo Smart Screen
    Fasoo Smart Screen (FSS) is an advanced security solution designed to protect sensitive information displayed on computer screens. The solution displays visible dynamic watermarks, containing detailed user-specific information, discouraging users to take a photo with their smart devices. FSS also blocks unauthorized screen capture attempts from specific website URLs and applications, to secure confidential data from malicious users. In addition, FSS tracks all screen capture attempts, including an image of what was captured, providing detailed insights and audit trails for organizations. Key Features: - Dynamic Watermark - Screen Capture Blocking - Audit Trail
  • 8
    DerScanner

    DerScanner

    DerSecur

    DerScanner is a convenient and easy-to-use officially CWE-Compatible solution that combines the capabilities of static (SAST), dynamic (DAST) and software composition analysis (SCA) in a single interface. It helps provide more thorough control over the security of applications and information systems and check both your own and open source code using one solution. Correlate the results of SAST and DAST, verify the detected vulnerabilities and eliminate them as a first priority. Strengthen your code by fixing vulnerabilities in both your own and third-party code. Perform an independent code review with developers-agnostic application analysis. Detect vulnerabilities and undocumented features in the code at all stages of the application development lifecycle. Control your in-house or third-party developers and secure legacy apps. Enhance user experience and feedback with a smoothly working and secure application.
    Starting Price: $500 USD
  • 9
    Oz Biometry

    Oz Biometry

    Oz Forensics

    Developed by Oz Forensics specialists, the biometric module incorporates the latest practices in artificial intelligence and is consistently improved by continuous data enrichment. The face recognition algorithm from Oz Forensics achieved one of the best test results in accuracy on the LFW dataset in University of Massachusetts tests in 2020 MIT LFW. The Oz Biometry module allows identifying people with less than 1-second speed and 99.87% accuracy. Since the beginning of the 2010s, every smartphone has a front camera, making facial biometrics a natural way for authentication. Face biometry can be used both in the registration process and in the process of searching and authentication on large biometric databases. Facial biometrics are used in the KYC process to compare selfie photos with photographs from documents and confirm the presence of a user in biometric “black” and “white” lists.
  • 10
    First Strike

    First Strike

    1Strike.io

    First Strike (1Strike.io) platform in a SaaS model is the only European Breach and Attack Simulation tool working with GenAI. Ready to use templates help to: -> focus on real, crucial risk pain points, -> allocate time and IT forces smartly & effectively, -> improve processes of protection their digital assets by CONTINUOUSLY, STRATEGICALLY, CYCLICALLY AND AUTOMATICALLY executing in ethically practices the sequences of techniques and scenarios that hackers perform to test, vulnerabilities possible to use before they will be used for real. FirstStrike is the only cost-effective BAS platform available to use in minutes not months. Perfect for “One Man Show CISO” leading cyber-resilience in medium-sized businesses, fast growing companies that want to scale their core business safely.
    Starting Price: $1000/month
  • 11
    Plurilock AI Cloud DLP

    Plurilock AI Cloud DLP

    Plurilock Security

    Plurilock AI Cloud DLP is a cloud-native yet endpoint-capable data loss prevention (DLP) solution that also provides passwordless SSO and CASB. It is designed specifically for cloud-centric companies relying on an army of SaaS applications to succeed. With Plurilock AI Cloud DLP, companies without the resources to configure and manage (much less pay for) the "default" incumbent DLP solutions can still gain the benefits of full-featured DLP, but at a level of simplicity and cost-effectiveness that makes DLP accessible to companies that don't specialize in IT. Plurilock AI Cloud DLP is part of the Plurilock AI platform, which grows as companies do, with an expansion path to true continuous, real-time authentication and user/entity behavior analytics (UEBA) for real-time biometric identity threat detection and response (ITDR). Plurilock AI is rated top in the industry in customer satisfaction by Info-Tech, based on the feedback of actual customers.
    Starting Price: $36/user/year
  • 12
    DOT Anonymizer

    DOT Anonymizer

    DOT Anonymizer

    Mask your personal data while ensuring it looks and acts like real data. Software development needs realistic test data. DOT Anonymizer masks your test data while ensuring its consistency, across all your data sources and DBMS. The use of personal or identifying data outside of production (development, testing, training, BI, external service providers, etc.) carries a major risk of data leak. Increasing regulations across the world require companies to anonymize/pseudonymize personal or identifying data. Anonymization enables you to retain the original data format. Your teams work with fictional but realistic data. Manage all your data sources and maintain their usability. Invoke DOT Anonymizer functions from your own applications. Consistency of anonymizations across all DBMS and platforms. Preserve relations between tables to guarantee realistic data. Anonymize all database types and files like CSV, XML, JSON, etc.
    Starting Price: €488 per month
  • 13
    Infisign

    Infisign

    Infisign

    Infisign is a cutting-edge Identity and Access Management (IAM) platform that revolutionizes digital security by leveraging decentralized identity, passwordless authentication, federation, and privileged access management capabilities. The solution empowers organizations to streamline user authentication, manage access efficiently, and ensure compliance across diverse environments. With its unique approach, Infisign addresses the challenges of traditional IAM systems and offers a comprehensive solution for modern identity management.
    Starting Price: $4/user/month
  • 14
    OSSEC

    OSSEC

    OSSEC

    OSSEC is fully open source and free, you can tailor OSSEC for your security needs through its extensive configuration options, adding custom alert rules and writing scripts to take action when alerts occur. Atomic OSSEC helps organizations meet specific compliance requirements such as NIST and PCI DSS. It detects and alerts on unauthorized file system modification and malicious behavior that could make you non-compliant. The Atomic OSSEC open source-based detection and response system adds thousands of enhanced OSSEC rules, real-time FIM, frequent updates and software integrations, built-in active response, a graphical user interface (GUI), compliance tools, and expert professional support. It’s a versatile XDR and compliance all-in-one security solution.
  • 15
    BurpGPT

    BurpGPT

    Aegis Cyber Ltd

    Experience enhanced web security testing with BurpGPT our Burp Suite extension which integrates OpenAI's LLMs for advanced vulnerability scanning and traffic-based analysis. It also supports local LLMs, including custom-trained models, ensuring greater data privacy and more accurate results according to your needs. Effortlessly integrate Burp GPT into your security testing workflows with user-friendly documentation. Developed by application security experts, Burp GPT represents the cutting-edge of web security testing. Burp GPT continuously improves based on user feedback, ensuring it meets evolving security testing needs. Burp GPT is a robust tool developed to enhance the precision and efficiency of application security testing. Extended with advanced language processing capabilities and an intuitive interface, it enhances security testing for both beginners and seasoned testers alike. With BurpGPT, you can perform sophisticated technical tasks.
    Starting Price: $100.07 per year
  • 16
    Cyguru

    Cyguru

    Cyguru

    Cyguru offers an all-in-one proactive security solution, also featuring an open SOCaaS powered by an AI analyst for comprehensive threat detection and mitigation. Experience seamless security with our platform, offering both preventative and reactive measures in just a few clicks. We support Windows, Linux, Centos, and Syslogs, allowing you to monitor exactly what you need. Simply register, choose your monitoring preferences, and leverage our advanced ML and AI capabilities for an enhanced security experience. Our security operation center is the cornerstone of our service domain, yet we go beyond by offering a breadth of features unmatched in the market for both SMEs and large enterprises. Not only do we enhance product scalability, automation, and AI integration, but we also ensure it stands at the forefront of completeness and innovation. Our vigilant agents keep a constant watch on your infrastructure, operating systems, and services round the clock.
    Starting Price: €7.33 per month
  • 17
    NdSecure

    NdSecure

    Ndende Technologies

    NdSecure is a Single Sign-On (SSO) and Identity and Access Management (IAM) solution. Ndsecure offers a user-friendly, flexible, and customizable identity and access management solution capable of operating within a diverse industry-centric architecture. The role played by NdSecure is to provide a robust and secure logical access control environment, incorporating strong authentication methods. The objective is to prevent unauthorized access to the corporate management system, thereby reducing frauds arising from insider threats. NdSecure’s API management platform provides more advanced ways for the workforce to control access to various applications. By leveraging existing request content and identity stores, NdSecure can provide: • Policy-based authentication • Coarse and fine-grained authorization • Single sign-on (using SAML, OpenId Connect, social log-in or OAuth-based federation) • Support for Common Criteria • Uses FIDO 2.0 and W3C WebAuthn
    Starting Price: $8/month/user
  • 18
    Kroll Cyber Risk
    We are the world incident response leader. Merging complete response capabilities with frontline threat intelligence from over 3000 incidents handled per year and end-to-end expertise we protect, detect and respond against cyberattacks. For immediate assistance, contact us today. Tackle every facet of today and tomorrow’s threat landscape with guidance from Kroll’s Cyber Risk experts. Enriched by frontline threat intel from 3000+ incidents cases every year, our end-to-end cyber risk solutions help organizations uncover exposures, validate the effectiveness of their defenses, implement new or updated controls, fine-tune detections and confidently respond to any threat. Get access to a wide portfolio of preparedness, resilience, detection and response services with a Kroll Cyber Risk retainer. Get in touch for more info.
  • 19
    Abstract Security

    Abstract Security

    Abstract Security

    Put your team’s focus back on catching attackers and let Abstract handle the heavy lifting of security data management. Our real-time streaming approach gives the breathing room to prioritize their security effectiveness instead. No Noise – Remove unnecessary noise from your data in flight before routing it to your destination No lock-in – With our real-time normalization of data to OCSF format, route to any destination without worrying No Hassle – No need to learn complex query languages with our easy to use ‘no-code-required' model for policy creation. Additionally, let our AI SME help build your policies via natural language requests. No Alert Fatigue – Our AI SME can help summarize insights and prioritize alerts based on MITRE ATT&CK Framework.
  • 20
    Sandfly Security

    Sandfly Security

    Sandfly Security

    Trusted on critical infrastructure globally, Sandfly delivers agentless Linux security with no endpoint agents and no drama. Instant deployment without compromising stability or needing endpoint agents. Sandfly is an agentless, instantly deployable, and safe Linux security monitoring platform. Sandfly protects virtually any Linux system, from modern cloud deployments to decade-old devices, regardless of distribution or CPU architecture. Besides traditional Endpoint Detection and Response (EDR) capabilities, Sandfly also tracks SSH credentials, audits for weak passwords, detects unauthorized changes with drift detection, and allows custom modules to find new and emerging threats. We do all of this with the utmost safety, performance, and compatibility on Linux. And, we do it without loading agents on your endpoints. The widest coverage for Linux on the market. Sandfly protects most distributions and architectures such as AMD, Intel, Arm, MIPS, and POWER CPUs.
  • 21
    Ivanti Secure Unified Client
    Ivanti Secure Unified Client is a dynamic, integrated, and easy-to-use network client that delivers anytime/anywhere secure connectivity. It provides secure connectivity, an intuitive end-user interface, and simplified deployment options. It runs on platforms that support application distribution through an online application store. Secure access to corporate networks for employees, anywhere, anytime, and from any device. Increased productivity, reduced management overhead, and better security profiles. Data channels use FIPS-certified cryptographic modules. Automated tunnel tear-down or re-establishment. VPN connected automatically via a predefined host. Change the appearance of UI and input elements. With Ivanti Secure Unified Client, you can improve your security for employee access to corporate networks.
  • 22
    VictoriaLogs

    VictoriaLogs

    VictoriaMetrics

    VictoriaLogs, an open-source log database from VictoriaMetrics, is designed to be user-friendly. It seamlessly integrates with widely used log collectors and offers a more straightforward setup process than Elasticsearch and Grafana Loki. The robust LogsQL query language provides full-text search capabilities across all log fields, simplifying log management. It scales impressively with CPU, RAM, disk IO, and space, running efficiently on Raspberry Pi and high-end servers. It handles data volumes up to 30 times larger than Elasticsearch and Grafana Loki on the same hardware, making it a powerful choice for various environments. VictoriaLogs supports fast full-text search over high-cardinality log fields like trace_id, user_id, and IP. It works seamlessly with traditional Unix log analysis tools like grep, less, sort, and jq. It also offers multi-tenancy support, accommodating diverse needs.
    Starting Price: $0
  • 23
    Fasoo Smart Print
    Fasoo Smart Print (FSP) is a print security solution that prevents unauthorized data breaches through printouts. The solution applies dynamic watermarks containing user name, IP address, printed time, user ID, and company information to make documents traceable to their source. With context-aware print control, it prevents unauthorized printing and applies data masking to detected sensitive information. A comprehensive audit trail monitors all printing activities, capturing both text and images of what users printed, ensuring a secure chain of custody for privacy and a robust defense against data breaches. Key Features of Fasoo Smart Print include: Dynamic print watermark, Context-aware print control, Smart pull-printing, and Comprehensive logging.
  • 24
    Locker Password Manager
    Locker is a password manager that goes beyond the mere concept of password management. Locker helps users secure sensitive data such as passwords, secret notes, payment cards, crypto backups and identities. Locker stores your sensitive data, logs you into your favorite sites, scans for data breaches, and more. Locker offers other additional security-related features, such as private emails, built-in authenticator,... Every feature in Locker is built on the foundation of privacy and transparency to ensure the highest security for users. We believe everyone deserves a secure and seamless internet experience, and Locker strives to provide just that. Whether tech-savvy or not, you can keep yourself safe online with Locker.
    Starting Price: $1.29 per user/month
  • 25
    Haiku

    Haiku

    Haiku

    Experience the groundbreaking Haiku game, your gateway to mastering real-world cybersecurity skills. Learning paths within the game are precisely tailored to real cybersecurity jobs and certifications, accelerating the way to your dream cybersecurity career. At Haiku, we harness the power of game-based training to facilitate your team's skill acquisition. Whether you're nurturing cybersecurity newcomers or propelling seasoned professionals to new heights, Haiku empowers your team with invaluable expertise. Gain the knowledge to step in and take action from day one with the ability to spot, contain, and remediate threats. Advance your expertise with training on simulated networks mirrored to your actual technology stack. At Haiku, we seamlessly integrate practical skills-building with the NICE Workforce Framework and certification-preparation pathways, enabling skillset and competency validation at individual and team levels.
  • 26
    NXLog

    NXLog

    NXLog

    Achieve complete security observability with powerful insights from your log data. Improve your infrastructure visibility and enhance threat prevention with a versatile multi-platform tool. With support for over 100 operating system versions and more than 120 configurable modules, gain comprehensive insights and increased security. Cut the cost of your SIEM solution by reducing noisy and unnecessary log data. Filter events, truncate unused fields, and remove duplicates to increase the quality of your logs. Collect and aggregate logs from systems across the entire breadth of your organization with a single tool. Reduce complexity in managing security-related events and decrease detection and response times. Empower your organization to meet compliance requirements by centralizing some logs in an SIEM and archiving others in your long-term storage. NXLog Platform is an on-premises solution for centralized log management, with versatile processing.
  • 27
    MAKVES DCAP
    MAKVES DCAP is a comprehensive data-centric audit and protection solution designed to safeguard corporate information by controlling access to critical data, and ensuring compliance with regulations like GDPR, FZ-152, and PCI DSS. This system helps businesses by monitoring user access to files, tracking sensitive information, and identifying risks such as excessive access rights and unauthorized activity. MAKVES DCAP offers a centralized platform for auditing IT assets across various environments, including Active Directory, cloud storage, email servers, and more. It also automates data classification, behavioral analysis, and policy enforcement to prevent data breaches. With a focus on protecting unstructured data, the solution provides real-time recommendations and remediation tools directly in the system interface. Forms a transparent matrix of access to company information resources.
  • 28
    SDS IronSphere

    SDS IronSphere

    Software Diversified Services

    This continuous monitoring solution can further strengthen even the most secure mainframe. SDS IronSphere for z/OS also provides assistance, while complying with, standards that U.S. agencies are required to follow. Automatic z/OS STIG compliance monitoring is a major highlight, but IronSphere offers many more security compliance features for the mainframe. This tool was created by mainframe penetration testers and compliance-minded, security experts. Due to their experience in the field, IronSphere for z/OS follows the guidelines that play integral roles in the framework of security compliance mandates and are required to be followed within certain sectors. This solution automatically and continuously identifies system risks and then delivers easy-to-follow remediation steps as part of the assessment results. In addition, results are kept within the tool, proving to compliance auditors that you’ve been continuously monitoring your z/OS system and adhering to ISCM and RMF protocols.
  • 29
    Netwrix Endpoint Protector
    Netwrix Endpoint Protector is an advanced enterprise-grade Data Loss Prevention (DLP) solution designed to protect sensitive data from unauthorized sharing and malicious extraction from employee endpoints. It offers cross-platform capabilities, supporting Windows, macOS, and Linux operating systems, ensuring comprehensive security across diverse IT environments. The solution provides customizable device control to manage USB and peripheral ports, preventing unauthorized data transfers and mitigating risks associated with data leaks. Additionally, it includes content inspection features that enforce sophisticated policies based on sensitive data categories, keywords, and file types, effectively preventing unauthorized data transfers. Netwrix Endpoint Protector also assists organizations in achieving regulatory compliance with standards such as GDPR, HIPAA, and PCI DSS by securing personally identifiable information, protected health information, and payment card information.
  • 30
    Hexamail Guard
    Hexamail Guard is your ultimate defense against email-based threats. With an array of advanced security features, it ensures that your inbox remains secure and your business stays protected. Protect your email infrastructure with our innovative multi-layer filtering technology. Secure your business communications, enhance productivity, and achieve peace of mind with Hexamail Guard. Intelligent Threat Detection:Hexamail Guard employs cutting-edge algorithms to proactively identify and block spam, viruses, phishing attempts, and other malicious content. Rest easy, knowing that only legitimate emails reach your employees' inboxes. Real-time Threat Analysis:Stay one step ahead with Hexamail Guard's real-time threat analysis. Our system continuously scans incoming emails for emerging threats, ensuring prompt detection and response to evolving security risks. Customizable Rule Sets:Tailor Hexamail Guard to your specific security needs.
    Starting Price: $224/10 users