Best Computer Security Software for Linux of 2024

Find and compare the best Computer Security software for Linux in 2024

Use the comparison tool below to compare the top Computer Security software for Linux on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    1Password Reviews
    Top Pick

    1Password

    1Password

    $3.99/month/user
    16,079 Ratings
    See Software
    Learn More
    1Password is a password manager that's secure, scalable, easy-to-use, and trusted by some of the most prestigious companies in the world. 1Password makes it easy to keep your employees safe online with its simple interface. Good security habits will become second nature once 1Password is a part of your employees' workflow. 1Password Advanced Protection now available with 1Password Business You can set Master Password policies, enforce two factor authentication across the entire team, limit access with firewall rules, review sign in attempts, and require that your team use the latest version 1Password. Our award-winning apps can be downloaded for Mac, iOS and Linux as well as Windows, Android, and Windows. 1Password syncs seamlessly between devices so that your employees have access to their passwords at all times. Your risk is reduced and your productivity increases when everyone uses 1Password.
  • 2
    SpamTitan Reviews
    Top Pick

    SpamTitan

    TitanHQ

    $2.14/user/month
    800 Ratings
    See Software
    Learn More
    SpamTitan email security protects businesses, schools, smbs and MSPs from spam. SpamTitan email security protects against spam, phishing, day-zero attacks and viruses, malware, ransomware and other threats to email. It helps to control mail flow, clean it, protect against spam, and protect against unwanted email. We offer easy-to-use, yet powerful email security for businesses, smbs, and MSPs that is Office365-friendly. SpamTitan Email Security is available for a free, fully supported trial. SpamTitan – Premium functionality included * CEO Impersonation protection * Spearphishing Protection/ Phishing * Link analysis * Full Sanding * Zero Day Attacks protection * Mail Spooling * Spoofing protection * Ransomware and Malware Protection * SPF/DKIM/DMARC checking * Encryption * Fully multi-tenant environment * Ability to rebrand entire UI * Full REST API * Set up documents and support SpamTitan Email Security is the best solution in the G2 Crowd Email Security. Start your free trial today!
  • 3
    DriveStrike Reviews

    DriveStrike

    DriveStrike

    $0.99 per month
    2 Ratings
    See Software
    Learn More
    DriveStrike is simple to use, implement, and manage. DriveStrike allows you to perform remote wipe, remote lock, or remote locate commands on any platform. Mobile device management MDM for mobile platforms. Integrated drive encryption support. Our support team is available to answer any questions, help you install our services, or manage your account. It's never been easier to protect your data and devices. We are happy to answer any questions you may have or help you understand how to best protect your data. Protect your business with a device- and data protection platform that keeps all devices protected with a single solution. Your Workstations, iPads and iPads, Smartphones as well as Tablets, Tablets, Tablets, and Laptops will be protected, organized, secure, & protected.
  • 4
    StrongDM Reviews

    StrongDM

    StrongDM

    $70/user/month
    82 Ratings
    Access and access management today have become more complex and frustrating. strongDM redesigns access around the people who need it, making it incredibly simple and usable while ensuring total security and compliance. We call it People-First Access. End users enjoy fast, intuitive, and auditable access to the resources they need. Administrators gain precise controls, eliminating unauthorized and excessive access permissions. IT, Security, DevOps, and Compliance teams can easily answer who did what, where, and when with comprehensive audit logs. It seamlessly and securely integrates with every environment and protocol your team needs, with responsive 24/7 support.
  • 5
    Keeper Security Reviews
    Top Pick

    Keeper Security

    Keeper Security

    $2.00 per user, per month
    1,542 Ratings
    Password security is the foundation of cybersecurity. Keeper's powerful password security platform will protect your business from cyberthreats and data breaches related to passwords. Research shows that 81% of data breaches can be attributed to weak passwords. Password security platforms are an affordable and easy way for companies to address the root cause of most data breaches. Your business can significantly reduce the risk of data breaches by implementing Keeper. Keeper creates strong passwords for all websites and apps, then secures them on all devices. Each employee receives a private vault to store and manage their passwords, credentials and files, as well as private client data. Employees will save time and frustration by not having to remember, reset, reuse, or remember passwords. Industry compliance is achieved through strict and customizable role-based access controls. This includes 2FA, usage auditing, and event reporting.
  • 6
    Seraphic Reviews
    Seraphic can protect any browser version on any device from phishing and spear-phishing, clickjacking and man-in-the-middle attacks, as well as Zero-day and unpatched N-Day attacks. This allows your end-users to use any combination of browsers they like, and allows you to centrally manage corporate policy for browsing and enterprise/private apps environments. Seraphic also features robust policy and governance controls, including state-of-the-art DLP engines that scan all outbound and input data in any format for any file. This ensures complete privacy first.
  • 7
    Invicti Reviews
    Invicti (formerly Netsparker) dramatically reduces your risk of being attacked. Automated application security testing that scales like none other. Your team's security problems grow faster than your staff. Security testing automation should be integrated into every step in your SDLC. Automate security tasks to save your team hundreds of hours every month. Identify the critical vulnerabilities and then assign them to remediation. Whether you are running an AppSec, DevOps or DevSecOps program, help security and development teams to get ahead of their workloads. It's difficult to prove that you are doing everything possible to reduce your company's risk without full visibility into your apps, vulnerabilities and remediation efforts. You can find all web assets, even those that have been forgotten or stolen. Our unique dynamic + interactive (DAST+ IAST) scanning method allows you to scan the corners of your apps in a way that other tools cannot.
  • 8
    Avast Business Hub Reviews
    Top Pick
    The Business Hub is an integrated platform for complete security – delivered entirely through the cloud. The Business Hub encompasses every essential layer of security needed to defend a business from cyberthreats – covering users and devices anywhere, anytime. Formerly known as CloudCare, the Business Hub is an easy-to-use cloud security platform with a refreshing new UI.
  • 9
    Surfshark Reviews
    Top Pick
    Surfshark, a privacy protection company, offers a seamless VPN with a strong emphasis on security. It offers intuitive apps for all devices, thousands IP addresses in 63 different countries, and 3200+ bare metal servers for the fastest speeds. Surfshark VPN is a great solution for small businesses and people who use a lot of devices. It offers unlimited simultaneous connections to each account. Surfshark includes a free CleanWeb feature which blocks malware and phishing attempts, as well as doubles up as an ad blocker. It also includes Kill Switch to protect sensitive data in the event of connection drops, and Whitelister (a.k.a. Split-tunneling allows apps and sites bypass the VPN, and MultiHop allows them to connect via multiple servers. It is also one of few VPN providers to have passed an independent audit and been awarded a seal-of-approval from the AV–TEST, an independent IT security institute. You can try it risk-free with a 30-day money back guarantee.
  • 10
    Acunetix Reviews
    Acunetix is the market leader for automated web application security testing and is the preferred tool for many Fortune 500 customers. Acunetix can detect and report on a wide range of web application vulnerabilities. Acunetix's industry-leading crawler fully supports HTML5/JavaScript and Single-page applications. This allows auditing of complex, authenticated apps. Acunetix is the only technology that can automatically detect out of-band vulnerabilities. It is available online as well as on-premise. Acunetix includes integrated vulnerability management capabilities to help enterprises manage, prioritize and control all types of vulnerability threats. These features are based on business criticality. Acunetix is compatible with popular Issue Trackers, WAFs, and is available online on Windows, Linux, and Online
  • 11
    GOOSE VPN Reviews

    GOOSE VPN

    GOOSE

    €1,80 per month
    2 Ratings
    We are GOOSE VPN. The European VPN. We are on a mission! We work with you to give you control over your online life so you can enjoy it safely and without limitations. Compare prices and find the best deals worldwide. Grab that local deal! VPN stands for Virtual Private Network. It is a secure tunnel that connects your device to the internet. Once you connect to a secure GOOSE VPN server your internet traffic flows through an encrypted tunnel that no one can see, including hackers, governments, and your internet provider. You can move anonymously over the internet, and you can choose your location. This bypasses blockades and censorship, as well as stalker pop-up ads.
  • 12
    Automox Reviews
    Automox is cloud-native and available globally. It enforces OS and third-party patch management, security configurations and custom scripting across Windows and Mac from a single console. IT and SecOps are able to quickly gain control of and share visibility over virtual, on-prem and remote endpoints without having to deploy expensive infrastructure.
  • 13
    Data Rover Reviews
    Data Rover is an Advanced User Data and Security Management for any Data-Driven Organisation. A single solution for Infrastructure and Security managers that allows data users to explore, manage, process, and protect their data effectively and efficiently, by simultaneously addressing the two primary needs related to the use of data: Cyber Security and Data Management. Data Rover plays a key role in business asset protection and corporate data management policy definition. The software is designed for companies that need to ensure compliance with personal data protection regulations and provides detailed analysis of data access permissions. User Access Rights & Auditing Provides invaluable information about access privileges to files and folders. It allows you to analyse the effective permissions of the users, i.e. the real ones. It identifies not only who can access data, but also who did exactly what, when, and from where. Data Housekeeping Helps you identify and distinguish valuable assets from junk information that becomes unnecessary ballast and an unjustified cost to the company. Data Exchange Provides the company with an advanced data exchange and tracking system exclusively designed for the business.
  • 14
    Saint Security Suite Reviews

    Saint Security Suite

    Carson & SAINT

    $1500.00/year/user
    This integrated solution can perform active, passive, and agent-based assessments. It also allows for flexibility in evaluating risk according to each business. SAINT's remarkable, flexible, and scalable scanning capabilities make it stand out from other solutions in this market. SAINT has partnered up with AWS to allow its customers to benefit from AWS's efficient scanning. SAINT also offers Windows scanning agents for subscribers. Security teams can easily schedule scans, configure them with a lot of flexibility, and fine-tune their settings with advanced options.
  • 15
    WipeDrive Reviews

    WipeDrive

    WipeDrive

    $19.95/one-time/drive
    WipeDrive is a tool that allows individuals, businesses, and government agencies to securely and permanently erase data off hard drives, removable media, mobile devices, and other storage devices. It's a cost-effective and secure way to recycle and retire computer storage. WipeDrive is the global leader in secure data destruction.
  • 16
    Bacula Enterprise Reviews
    Bacula Enterprise offers a single platform that provides cloud backup and recovery software for the Modern Data Center. Bacula Enterprise backup & recovery software is ideal for medium and large businesses. It offers unique innovation, modern architecture and business value benefits, as well as low cost of ownership. Bacula Enterprise corporate backup software solution uses unique technologies that increase the interoperability of Bacula Enterprise into many IT environments, such as managed service providers, software vendors, cloud providers, enterprise data centers, and cloud providers. Bacula Enterprise is used by thousands of organizations around the world in mission-critical environments such as NASA, Texas A&M University and Unicredit. Bacula offers more security features than other vendors and advanced hybrid Cloud connectivity to Amazon S3, Google, Oracle, and many others.
  • 17
    SecureCircle Reviews
    SecureCircle's Zero Trust data security protects all data, even those that are not hosted on SaaS. This eliminates data breaches and insider threat. SecureCircle's Data Access Security Broker protects and monitors data. This includes data egressing via enterprise cloud services and managed repositories. SecureCircle enforces access controls on all data locations, including cloud and endpoint devices. SecureCircle provides the only Zero Trust data protection in the world, ensuring data is protected transparently and consistently at scale.
  • 18
    eScan Reviews

    eScan

    MicroWorld Technologies

    $58.95/one-time/user
    eScan's next generation antivirus solution protects your home network from malware, viruses, ransomware, and other threats using a layered approach. eScan is able to block a wide range of attacks thanks to its unique combination of modern and basic techniques. It includes web filtering, signature-based Malware detection and behavior analysis, as well as innovative techniques such deep learning malware detection, exploit prevention and heuristic scanning. eScan provides business endpoint protection, endpoint detection and response solutions (EDR), as well as anti-spam solutions email and multi-factor authentication.
  • 19
    Bitdefender TrafficLight Reviews
    It is a cross-browser addon that intercepts, processes and filters all Web traffic. This prevents any malicious content from being blocked and increases browser security. You won't have to worry about any suspicious websites ever again. TrafficLight inspects and blocks all pages you visit to prevent malware and phishing attempts every time you visit them. Safe search results protect you from harm. Bitdefender TrafficLight will keep you informed about any malware or fraudulent websites in your search results.
  • 20
    Siwenoid Reviews
    SIWENOID runs under Windows, Linux, and Mac OS X. It is reliable, flexible, user-friendly, and engineer-friendly. SIWENOID is capable of integrating many subsystems and unifying their operation. Supports SIEMENS and Bosch, Dahua Texecom, Paradox, and many other subsystems. You can control everything from one screen (or more) with a single interface that works for all subsystems. Siwenoid is built using open-source technology to keep the product's cost low. We rely on flexibility to keep up with the firmware updates for compatible systems. The software's main goal is to reduce latency when interconnecting and handling different protocols. Siwenoid can run while subsystems are in operation. SIWENOID can be used as an OS-independent JAVA program. It is flexible, reliable, user-friendly, engineer-friendly, scalable and cost-effective.
  • 21
    RollBack Rx Server Reviews
    RollBack Rx Server Edition, a robust Windows Server backup utility, provides IT professionals with an instant backup capability that can quickly restore mission critical systems to any number of multiple restore points at unrivaled speeds. RollBack Rx Server Edition makes it easy to quickly and safely install service patches and sandbox updates. It also offers a failsafe approach for system recovery. RollBack Rx Server Edition provides unparalleled background protection and real time recovery speeds. This allows you to keep a locally backed up sector-map repository that contains complete multiple instances (or "snapshots"), of the server state. These snapshots can be scheduled at any time you choose -- even every minute -- and can count in the thousands. This continuous snapshot-taking can be scheduled to happen in the background without any perceptible impact on server response times.
  • 22
    OSE Reviews
    Compromised organizations can face significant barriers to restoring customer trust and brand reputation after being hacked. OSE alerts you to any attacks on your critical systems and warns you if they happen so that you can stop them before they cause damage to your brand, reputation, IP, and customer trust. OSE provides an audit of an attack, listing the changes made and what they were before resolving it quickly. OSE reporting is helpful in ISO 27000 compliance. OSE (Operating System Security Enforcer), implements your Security Policy. This can be either an out-of-the-box OSE standard or your customized version. Applying the security policy to all Unix, Linux, and Windows corporate servers.
  • 23
    360 Security Guard Reviews
    360 Security Guard is a leading security antivirus product that can detect and kill all types of Trojan viruses. It is committed to protecting users' computers security. We have many features that will improve your computer's efficiency. You can scan the computer in multiple dimensions, including garbage collection, computer running speed, system abnormalities and computer security risks. This will quickly assess the system's status. To detect the threat situation immediately, 38 layers of protection barriers are added layer after layer, creating an all-weather, all-weather cyberspace defense. You can get the most recent information about popular games and events in real-time, gather multiple media, unify the entrance. Get the latest and most popular games, download and install them, and get access to them through 360 exclusive distribution channels.
  • Previous
  • You're on page 1
  • Next