Best Cybersecurity Software for Linux of 2024

Find and compare the best Cybersecurity software for Linux in 2024

Use the comparison tool below to compare the top Cybersecurity software for Linux on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Uptycs Reviews
    Uptycs presents the first unified CNAPP and XDR platform that enables businesses to take control of their cybersecurity. Uptycs empowers security teams with real-time decision-making driven by structured telemetry and powerful analytics. The platform is designed to provide a unified view of cloud and endpoint telemetry from a common solution, and ultimately arm modern defenders with the insights they need across their cloud-native attack surfaces. Uptycs prioritizes responses to threats, vulnerabilities, misconfigurations, sensitive data exposure, and compliance mandates across modern attack surfaces—all from a single UI and data model. This includes the ability to tie together threat activity as it traverses on-prem and cloud boundaries, delivering a more cohesive enterprise-wide security posture. With Uptycs you get a wide range of functionality, including CNAPP, CWPP, CSPM, KSPM, CIEM, CDR, and XDR. Shift up with Uptycs.
  • 2
    WebDefender Reviews

    WebDefender

    Cobweb Security

    $6.90 per month
    WebDefender is a multi-feature WordPress security plugin. It protects, detects, and cleans your website. There are three pricing options available for our clients: premium, professional, or free. Choose the one that best suits your business. Any website that uses PHP can be easily installed with the WebDefender PHP antivirus scanner. This antivirus is used to detect malware and vulnerabilities and monitor security. Our cleanup tool will remove all detected drawbacks as well as malicious software. All-in-one antivirus platform for Linux web servers. It provides monitoring, malware detection, and removal. It also features a user-friendly cleaner that removes all malicious codes detected from the server. The Antivirus also offers a SaaS control panel that can be used to manage multiple servers. This professional version offers a variety of additional options and includes all the features of WebDefender Security & Protection.
  • 3
    WithSecure Business Suite Reviews
    WithSecure Business Suite is an endpoint security service that can be used on-site. A complete business security system that can be used in virtual, physical, and cloud environments. All managed through one central management tool. This allows for maximum performance, transparency, and IT resources. For the most stringent security requirements, you can have full control on-site. Endpoint security management for the public and private clouds as well as on-premises infrastructure. All security applications can be managed from one central location. Automation and easy control mean less work. It is simple and easy to scale. WithSecure Business Suite can solve all your security problems. You can either manage your service yourself or have it managed by a certified service provider. It saves time and resources by integrating across all your devices. It also protects your business against cybersecurity threats.
  • 4
    Armis Reviews

    Armis

    Armis Security

    Armis, the leading asset visibility and security company, provides a unified asset intelligence platform designed to address the new extended attack surface that connected assets create. Fortune 100 companies trust our real-time and continuous protection to see with full context all managed, unmanaged assets across IT, cloud, IoT devices, IoMT, OT, ICS, and 5G. Armis provides passive cyber asset management, risk management, and automated enforcement. Armis is a privately held company and headquartered in California.
  • 5
    Cequence Security Reviews

    Cequence Security

    Cequence Security

    Protect your APIs by analyzing and protecting them with passive, inline, or API-based integration with any network component, such as an API gateway, proxy or CDN. Predefined policies that are fine-tuned based on threat patterns, which have been used to protect billions of API transactions every day, provide unmatched protection. An API-based architecture and rich user interface allow integration with threat intelligence feeds and other security components. Patented ML based analysis eliminates JavaScript integration pen-alties like slow page loads, extended development cycles, and forced mobile-app upgrade. ML-based analysis generates a unique Behavioral Footprint to identify malicious intent and continuously tracks attackers as they retool.
  • 6
    Infocyte Reviews
    Security teams can use the Infocyte Managed Response Platform to detect and respond to cyber threats and vulnerabilities within their network. This platform is available for physical, virtual and serverless assets. Our MDR platform offers asset and application discovery, automated threats hunting, and incident response capabilities on-demand. These proactive cyber security measures help organizations reduce attacker dwell time, reduce overall risk, maintain compliance, and streamline security operations.
  • 7
    LUCY Security Awareness Training Reviews
    Train. Phish. Assess. engage. alarm. Lucy Security, a Swiss company, allows organizations to assess and improve their employees' security awareness and test their IT defenses. With our E-Learning platform, hundreds of preconfigured videos, training and quiz, you can turn employees into a human firewall. The most powerful IT Security Awareness Solution on the market. On-Premise or SaaS
  • 8
    ESET Cyber Security Reviews

    ESET Cyber Security

    ESET

    $39.99 per year
    Secure your computer with fast and powerful protection against all types of malware. Protects Mac, Windows, and Linux devices. Protects against all types malware, including ransomware, spyware, and worms. You can enjoy the full power of your computer. You can surf, play, and work on the internet without any slowdowns. Our security is easy to set up, renew, and upgrade. We value your loyalty! It only takes a few clicks to renew your ESET. To activate your software, download and use your license key. Update your subscription preferences. ESET's multilayered protection is time-proven and trusted by more than 110 million users around the world. You can surf, play, and work online without any slowdowns. Enjoy gaming without interruptions with battery-saving mode.
  • 9
    ESET Smart Security Premium Reviews

    ESET Smart Security Premium

    ESET

    $59.99 per device per year
    For users who want it all, the product is built without compromise. It includes extra theft protection and easy password administration. Protects Windows, Macs, Androids, and Linux devices. You are protected even in the event of data theft, laptop or USB key loss. You can remember only one password and keep them all under control. For the ultimate in security, convenience and speed, protect your Windows, Mac, and Android devices with one license. Our powerful antivirus technology protects your digital identity. Protect your confidential data from ransomware, phishing, and other threats. Encrypt all files and removable media. Your passwords can be stored and organized. Anti-Theft will protect your laptop. ESET Smart Security Premium or ESET Internet Security will activate our top-of the line Mac, Android, and Linux products. The operating system being protected will determine the full list of features available.
  • 10
    IBM Security Guardium Insights Reviews
    Many cloud data sources have security controls that monitor only one source. This creates a fragmented view, which can put data privacy, security, compliance, and security at risk. Guardium Insights allows you to adapt and scale to multicloud environments. It centralizes data security, reduces compliance time, and understands risky user behavior across data sources in support of a zero trust approach. Built on containerized architecture, Guardium Insights is a lightweight-but-powerful platform that can flexibly deploy wherever an organization needs - aligning to data security goals without hindering business objectives in the cloud. Automated compliance audits and reporting can reduce the time spent on preparation and execution by 75%. 34% of organizations use at least two cloud sources. 11% use more cloud sources than two. Guardium Insights can be deployed in Kubernetes containers and scale to meet that growth.
  • 11
    NordLayer Reviews

    NordLayer

    NordLayer

    $8 per user per month
    Network access security that scales with your business — NordLayer secures your organization’s traffic and data to provide your colleagues with safe, reliable, remote access.
  • 12
    Prelude Reviews

    Prelude

    Prelude

    $50 per month
    Organizations of all sizes can use our tools to run continuous security tests against their systems to discover areas of weakness to fix. This is done in a safe, transparent and integrated way with existing defensive tools to help organizations prevent real incidents from happening. Prelude is used by organizations of all sizes to continuously test their defense systems. Operator Enterprise is a continuous testing infrastructure that allows security teams to collaborate and gives them the ability to personalize attacks or agents for their organization. Are you an IT professional Register for our upskilling program and become an IT Security Engineer to bring advanced security to your company.
  • 13
    Zercurity Reviews

    Zercurity

    Zercurity

    $15.01 per month
    Zercurity can help you set up and manage your cybersecurity strategy. You can reduce the time and effort required to monitor, manage, integrate, and navigate your organization through the various cybersecurity disciplines. Get clear data points that you can actually use. Get a quick overview of your current IT infrastructure. Automatically, assets, packages, devices, and applications are analyzed. Our sophisticated algorithms will run queries on your assets and find them. Alerts you in real time to anomalies and vulnerabilities. Expose potential threats to your company. Eliminate the risk. Automated reporting and auditing reduces remediation time and supports handling. Unified security monitoring across your entire organization. You can query your infrastructure like a database. Instant answers to your most difficult questions. Real-time risk assessment. Stop guessing about cybersecurity risks. Get deep insight into every aspect of your company.
  • 14
    Monarx Reviews

    Monarx

    Monarx

    $15 per month
    Monarx's innovative technology has been proven to detect and prevent more malicious activity than any other tools. It does this automatically, proactively, and safely. Hosting providers around the globe save more time and money with Monarx, and can also generate additional revenue by selling active protection to customers. Malware is a waste of engineering time that can generate support costs for customers whose sites are compromised or blacklisted. Monarx automatically provides the best protection which results in greater cost savings. To generate leads for upselling to your customers, use the Protect mode. Monarx's superior technology turns malicious activity into targeted, timely leads that convert well. Monarx offers many options to increase your hosting business's real, tangible value. Hosting providers continually test Monarx and consistently prove it to be superior.
  • 15
    Cyguru Reviews

    Cyguru

    Cyguru

    €7.33 per month
    Cyguru is a proactive security solution that offers a comprehensive threat detection and mitigation. It also features an open SOCaaS powered with an AI analyst. Our platform offers both proactive and reactive security measures with just a few simple clicks. We support Windows, Linux Centos and Syslogs so you can monitor what you need. Register, select your monitoring preferences and take advantage of our advanced ML/AI capabilities for enhanced security. We offer a wide range of features that are unmatched on the market, for both SMEs as well as large enterprises. We not only enhance product scalability and automation, but also integrate AI. We also ensure that it is at the forefront of innovation and completeness. Our agents are always on guard to ensure that your infrastructure, operating system, and services are protected.
  • 16
    Logsign Reviews
    Logsign was founded in 2010 and has been working towards strengthening institutions' cyber defense. Logsign believes cyber security is a team effort and that security solutions must be more intelligent. Logsign is committed to this goal by providing continuous innovation, ease-of-use and smart solutions. It takes into consideration the technology and needs of all its stakeholders and works as a partner with all its stakeholders. It offers services to more than 500 medium and large-sized companies and state institutions, including Security Information and Event Management, Security Orchestration, Automation and Event Intervention (SOAR), and Security Information and Event Management, SIEM. You have been awarded by foreign and domestic authorities in the fields of technology and cybersecurity such as Deloitte Technology Turkey Fast 50 and Deloitte Technology EMEA Fast 500, Cybersecurity Excellence and Info Security Products Guide.
  • 17
    Cybereason Reviews
    Together, we can stop cyber attacks at every stage of the battle, from the enterprise to the endpoint. Cybereason provides high-fidelity convictions and visibility of known and unknown threats, so that defenders can harness the power of true prevention. Cybereason provides deep context and correlations across the entire network to enable threat hunters to detect and deter stealthy operations. Cybereason dramatically reduces the time it takes for defenders investigate and resolve attacks using both automated and guided remediation. Cybereason analyzes over 80 million events per second, which is 100x more than other solutions available. To eliminate emerging threats in minutes, rather than days, reduce investigation time by up to 93%.
  • 18
    Countervail Reviews

    Countervail

    Raytheon Technologies

    Countervail is a software and data authentication solution that increases cyber resilience of mission-critical and support system by ensuring the integrity of operating systems and applications. It can be customized to address many deployment scenarios. Countervail's threat model assumes that the attacker has already gained privilege access to the system. Cyber adversaries are more likely to target integrated public/private critical infrastructures and Department of Defense weapon systems that rely on software-powered support and control systems. Hackers may be able to exploit weaker cyber protections to find ways to compromise targets through indirect routes.
  • 19
    Ericom Shield Reviews

    Ericom Shield

    Ericom Software

    Ericom Software offers businesses Zero Trust Secure Access to corporate apps, on-premises and in the cloud, from any device or location. Ericom Shield, a clientless enterprise-grade security solution, is designed to meet the needs of IT professionals and security personnel. It also provides transparent Internet access for end users via Remote Browser Isolation. Ericom Shield is available for deployment across any organization, on any device, with any operating system or browser. It does not require the installation of any software or plug ins on endpoints. Before files can be downloaded, they are scanned and cleaned using a Content Disarm and Reconstruction process (CDR).
  • 20
    Gravwell Reviews
    Gravwell is an all you can ingest data fusion platform that allows for complete context and root cause analysis for security and business data. Gravwell was created to provide machine data benefits to all customers, large or small, binary or text, security or operational. An analytics platform that can do things you've never seen before is possible when experienced hackers team up with big data experts. Gravwell provides security analytics that go beyond log data to industrial processes, vehicle fleets, IT infrastructure or all of it. Do you need to track down an access breach? Gravwell can run facial recognition machine-learning against camera data to identify multiple subjects who enter a facility with one badge-in. Gravwell can also correlate building access logs. We are here to help people who require more than text log searching and want it sooner than they can afford.
  • 21
    SearchInform FileAuditor Reviews
    DCAP solution (datacentric audit and protection), for automated file system audit, search and detection of access violations, as well as monitoring for changes in critical data.
  • 22
     Acronis Cyber Protect Cloud Reviews
    Your clients will be less affected by downtime and data loss at a lower price. Acronis Cyber Protect Cloud is unique in that it seamlessly integrates cybersecurity, management, and data protection to protect endpoints, systems, and data. This synergy reduces complexity so service providers can better protect customers while keeping costs low. Next-generation cybersecurity. Advanced AI-based behavioral detection engine to prevent zero-day attacks. Reliable backup and recovery. Backup of full-image and file-levels, disaster recovery, metadata collection, and backup of files and other data for security forensics. MSP-ready protection management. URL filtering, vulnerability assessments, patch management are all available for increased control. Traditional endpoint protection products are not integrated and require more time to manage - updating and patching, maintaining licenses, checking compatibility after updates, managing multiple policies through a variety of user interfaces, and managing multiple policies.
  • 23
    Cisco Cyber Vision Reviews
    Your industrial operations are at risk from cyber threats due to the deeper integration of IT, cloud, and industrial control networks (ICS). Cisco Cyber Vision was specifically designed for OT and IT teams to collaborate to ensure production continuity and safety. Now you can deploy Industrial Internet of Things technologies and reap the benefits of industry digitization efforts. Start your OT security project with an accurate list of your industrial assets, communication patterns, and network topologies. Your SOC (security operation center) should have OT context. This will allow you to leverage the money and time you have spent on IT cybersecurity to protect your OT network. You can take OT security to the next step: Provide detailed information to comply regulations and facilitate collaboration between IT and OT experts.
  • 24
    Belkasoft Evidence Center X Reviews
    The digital forensic and incident management solution with enhanced analytical functionality was specifically designed to meet the needs of law enforcement customers as well as corporate customers.
  • 25
    Panaseer Reviews
    Panaseer's continuous control monitoring platform is a powerful tool that can monitor and monitor all aspects of your organization. It provides trusted, automated insight into the organisation's security and risk posture. We create an inventory of all entities in your organization (devices and apps, people, accounts, and databases). The inventory identifies assets that are missing from different sources and identifies security risks. The platform provides metrics and measures that will help you understand your compliance and security status at all levels. The platform can ingest data from any source, cloud or on-premises. Data can be accessed across security, IT, and business domains using out-of-the box data connectors. It uses entity resolution to clean and normalise, aggregate and de-duplicate this data. This creates a continuous feed with unified assets and controls insights across devices and applications, people, database and accounts.