Best IT Security Software for LibreNMS

Find and compare the best IT Security software for LibreNMS in 2024

Use the comparison tool below to compare the top IT Security software for LibreNMS on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Axonius Reviews
    Axonius gives IT and security teams the confidence to control complexity by providing a system of record for all digital infrastructure. With a comprehensive understanding of all assets including devices, identities, software, SaaS applications, vulnerabilities, security controls, and the context between them, customers are able to mitigate threats, navigate risk, decrease incident response time, automate action, and inform business-level strategy — all while eliminating manual, repetitive tasks.
  • 2
    NGINX Reviews
    NGINX Open Source: The open source web server that powers more than 400 million websites. NGINX Plus is an open-source software load balancer, webserver, and content cache. It was built on top NGINX. NGINX Plus offers enterprise-grade features that are not available in the open-source offering. These include session persistence, configuration via API and active health checks. NGINX Plus can be used instead of your hardware loadbalancer to allow you to innovate without being restricted by infrastructure. You can save more than 80% over hardware ADCs without sacrificing functionality or performance. You can deploy anywhere: public cloud or private cloud, baremetal, virtual machines, containers, or virtual machines. You can save time with the NGINX Plus API, which automates common tasks. Modern app teams require an API-driven platform that integrates seamlessly into CI/CD workflows. It can be used to automate app deployment, whether you have a hybrid or microservices architecture. It also makes app lifecycle management simpler.
  • 3
    Active Directory Reviews

    Active Directory

    Microsoft

    $1 per user per month
    Active Directory stores information about objects in the network and makes it easy for administrators and users find and use this information. Active Directory uses a structured database store to organize directory information in a hierarchical, logical way. This data store, also known by the directory, contains information about Active Directory object. These objects usually include shared resources like servers, volumes and printers as well as the network user account and computer accounts. See Directory data store for more information on Active Directory. Active Directory security is integrated through logon authentication. This allows for access control to objects within the directory. Administrators can manage their directory and organization through one network logon. Authorized network users have access to all resources on the network. The management of complex networks can be made easier by policy-based administration.
  • 4
    OverSOC Reviews
    rive your attacker surface with a solitary source of truth. Gather and unify all your IT & Cyber Data to discover inventory gaps, prioritize remediation actions and accelerate audits. Data from all tools used by IT and SecOps, as well as data collected from your business teams via flat files can be gathered and brought together in one database. Automate data ingestion, standardization and consolidation in a common framework. No more duplication of assets, no copy-pasting in spreadsheets or manual dashboards. Integrate external data sources, such as security alerts from certified sources, to enrich your data. Use the filter system to query your cyber data and get accurate information about the status of your system. OverSOC offers pre-recorded filtering based on customer needs. You can also create your own filters to share with collaborators.
  • Previous
  • You're on page 1
  • Next