Best IT Security Software for Rackspace OpenStack

Find and compare the best IT Security software for Rackspace OpenStack in 2024

Use the comparison tool below to compare the top IT Security software for Rackspace OpenStack on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    QuantaStor Reviews

    QuantaStor

    OSNEXUS

    $/TB based on scale
    6 Ratings
    See Software
    Learn More
    QuantaStor, a unified Software Defined Storage platform, is designed to scale up and down to simplify storage management and reduce overall storage costs. QuantaStor storage grids can be configured to support complex workflows that span datacenters and sites. QuantaStor's storage technology includes a built-in Federated Management System that allows QuantaStor servers and clients to be combined to make management and automation easier via CLI and RESTAPIs. QuantaStor's layered architecture gives solution engineers unprecedented flexibility and allows them to design applications that maximize workload performance and fault tolerance for a wide variety of storage workloads. QuantaStor provides end-to-end security coverage that allows multi-layer data protection for cloud and enterprise storage deployments.
  • 2
    SaltStack Reviews
    SaltStack is an intelligent IT automation platform that can manage, secure, and optimize any infrastructure--on-prem, in the cloud, or at the edge. It is built on an event-driven automation engine that detects and responds intelligently to any system. This makes it a powerful solution for managing complex environments. SaltStack's new SecOps offering can detect security flaws and mis-configured systems. This powerful automation can detect and fix any issue quickly, allowing you and your team to keep your infrastructure secure, compliant, and up to date. Comply and Protect are both part of the SecOps suite. Comply scans for compliance with CIS, DISA, STIG, NIST and PCI standards. Also, scan your operating system for vulnerabilities and update it with patches and patches.
  • 3
    VMware NSX Reviews
    VMware NSX enables full-stack network and security virtualization. Your virtual cloud network can connect and protect applications from your data center, multi-cloud, container infrastructure, and bare metal. VMware NSX Data Center is a complete L2-L7 security and networking platform that allows you to manage your entire network from one pane of glass. You can easily provision your security and networking services with one click. You can manage consistent security and networking policies across private and publicly cloud environments from one pane of glass. This is regardless of whether your application runs on a VM, container or bare metal. Micro-segmentation allows you to provide granular protection for your apps, depending on the workload.
  • 4
    F5 BIG-IP DDoS Hybrid Defender Reviews
    Comprehensive DDoS protection at the application layer and network level. Flexible and scaleable for hybrid, out-of-band and inline deployments. Traditional DDoS solutions are limited to a narrow range. They are only partially effective because they black-hole or limit the rate at which legitimate users can connect to them in network layer (or flood attack) attacks. They are blind to SSL traffic and dependent upon their placement in the network during application layer attacks. When the Internet bandwidth is cut off, all on-premise defenses are rendered ineffective. F5 BIG-IP DDoS Hybrid Defender offers a deeper level of protection. It is the only multi-layered defense that protects against sophisticated application attacks and blended network attacks. It also enables full SSL encryption, anti-bot capabilities and advanced detection methods all in one appliance.
  • 5
    Trend Micro Apex Central Reviews

    Trend Micro Apex Central

    Trend Micro

    $37.75 per user
    Centralized security management can bridge the IT and SOC silos, which often have different layers of protection and deployment models. This centralized, connected approach improves visibility, protection, reduces complexity and eliminates redundant or repetitive tasks in security administration. All of these benefits make your organization safer and make your life easier. Visual timelines can be used to identify patterns in threat activity across users' devices and within groups. This eliminates security gaps. Reduce security management costs and time by reducing IT workload. No more console hopping. Create policies, manage threat and information protection, and conduct detailed investigations from one central console. This allows you to secure multiple layers of security. Continuous monitoring and central visibility give you a complete view of your security situation. Integration with your SOC is easy.
  • 6
    VyOS Reviews

    VyOS

    VyOS Networks

    $1000
    Open source software and a universal router are key to democratizing the way we access networks. VyOS' vision is to revolutionize how we access networks, so that everyone can build the solutions they have always wanted, without limitations, restrictions, or prohibitive prices. We believe that internet access is just as important to human development as food, water, air, and healthcare. VyOS was founded by engineers for engineers. It is an open-source software company that makes it possible to access networks without restrictions or prohibitive fees. Through our open-source software and virtual platforms, we do this as VyOS. Stateful firewalls, zone based firewall, all types source and destination NAT (one-to-one, one-to many, many to many). For auditing, creating customized images and contributing, everyone has access to the entire codebase and build toolchain.
  • 7
    Catalyst Cloud Reviews

    Catalyst Cloud

    Catalyst Cloud

    $0.017 per hour
    We are New Zealand's leading innovator in cloud computing and we are helping to make the cloud more accessible to help accelerate the growth of the digital economy in Aotearoa. It's easy and affordable to get started with pay-as-you go, curated services or standardized APIs. It's easy to scale up or down as needed. Sign up for a free trial to give our service a shot. We were the first to offer a CNCF-certified Kubernetes service in New Zealand. We were also the first to offer five key characteristics of cloud computing as per NIST. We have only scratched the surface on what is possible in the cloud. We want to explore more. We are proud members of the open-source movement and believe that open standards provide superior value and freedom for our customers. OpenStack is the foundation of our cloud and many cloud providers around the world use it.
  • 8
    WatchTower Security Management App Reviews
    You can monitor your network using Check Point's WatchTower Security Management App and respond quickly to security threats from anywhere with your mobile phone. The intuitive WatchTower Security Management App allows you to monitor your network in real time, alerts you when it is at risk, and configure security policies for multiple gateways. You can view all devices connected to your network as well as any security threats. Real-time notification for malicious attacks and unauthorized device connections. Block malware-infected devices quickly and view details to assist with further investigation. You can customize notifications to your top security events. You can view all security events by category. Click the link to drill down for more information. You can configure security settings for multiple gateways. Securely manage advanced security policy settings via the web user interface.
  • 9
    Multi-Domain Security Management Reviews
    Multi-Domain Security Management provides more security and control by dividing security management into multiple virtual realms. Virtual domains can be created by businesses of any size based on business unit, geography, or security function. This will simplify management and strengthen security. Allows for the isolation of roles and granular administration of multi-tenant security management architectures. One security management configuration for VPN and Firewall, IPS, or other protections. All network security management domains can be viewed, accessed and controlled from one console. Multiple administrators can be created and centrally managed in multi-domain security management environments. Administrators can be granted permission to manage specific domains and other aspects of the multidomain system. Multiple administrators can work simultaneously on different security management domains.
  • 10
    F5 Distributed Cloud DDoS Mitigation Service Reviews
    Cloud-delivered DDoS Protection that detects and mitigates threats before they reach your infrastructure. Cloud-delivered DDoS Protection detects and mitigates threats before they reach your organization. F5 Distributed DDoS Mitigation Service, a cloud-delivered managed protection service, detects and mitigates large scale, SSL or application-targeted, attacks in real-time, protecting your business against attacks exceeding hundreds of gigabits/second. The F5 Security Operations Center is at the forefront of protecting your business.
  • 11
    CentreStack Reviews
    CentreStack increases workforce mobility by allowing file sharing via cloud and mobile access. However, security permissions are maintained and users have the same experience as file servers. Active Directory and permissions inherit allow for the best integration of existing IT infrastructure's cloud security with cloud mobility. CentreStack improves file servers to allow mobile workers to collaborate and be productive. This includes those who use smartphones and media tablets in addition to their PCs. CentreStack can either improve an existing file server to allow mobile access, or it can migrate existing data and security permissions into a user-defined cloud. The product's goal is to provide a familiar file server experience that allows for greater usability, security, compliance, and data control. Enterprises have the option to preserve their security and compliance by keeping their data on-premise without cloud replication.
  • 12
    Security Auditor Reviews

    Security Auditor

    Core Security (Fortra)

    Simplified security policy management, file integrity monitoring software. Security Auditor centralizes security administration in your cloud, hybrid, or on-premise environment. Our agentless technology makes it easy to enforce security policies quickly and reduce the risk of security misconfigurations, which are a major cause of data breaches. Security Auditor automatically protects all new systems as they are created and monitors them continuously to identify any configuration settings that do not meet your requirements. An easy-to-use web-based console allows you to make changes and receive notifications about any policy exceptions. This simplifies compliance reporting requirements and simplifies tasks. You can also run the FixIt function to automate the process and let Security Auditor handle the rest. Security Auditor makes it easy to identify and configure security settings for your elastic cloud infrastructure.
  • 13
    OfficeScan Reviews
    The threat landscape used be simple. You kept the good stuff out and the bad stuff in. It's difficult to distinguish the good from the evil. Traditional signature-based antivirus methods are weak against ransomware and other unknown threats. While some threats can be addressed by next-generation technology, others cannot. Adding multiple anti-malware products to a single device results in too many products that don’t work together. Users are increasingly able to access corporate resources from many locations, devices, and even the cloud. This can make matters more complicated. Endpoint security must be smart, optimized, connected, and from a trusted vendor. Trend Micro™, OfficeScan™, combines high-fidelity machine learning with a combination of threat protection techniques to eliminate security holes across all user activities.
  • 14
    Trend Micro ServerProtect Reviews
    Enterprise servers can be vulnerable and a central point of information exchange. Users and applications can upload infected files to a server even from within the network. This can spread to other systems. Large organizations may have thousands or hundreds of servers that need to be monitored, configured, and maintained. Today's sophisticated attacks can target multiple points in a network, leaving behind undetected trails of damage and the possibility of re-infection. Trend Micro™, ServerProtect™, delivers the most reliable virus, rootkit and spyware protection in the industry while simplifying and automating server security operations. ServerProtect scans for malware in real-time and includes cleanup capabilities to remove malicious code and repair any system damage.
  • 15
    ScanMail Reviews
    Over 90% of targeted attacks start with spear phishing emails. This means that your mail server security is even more important. Most mail server security solutions, even the limited protections in Microsoft®, Exchange™ 2013, and 2016, rely only on pattern file updates to detect traditional malware. They don't provide protections for malicious URLs or exploits that are commonly used in targeted attacks and advanced persistent threats (APTs). ScanMail™, Suite for Microsoft®, Exchange™, stops targeted email attacks and spear-phishing by using document exploit detection and enhanced web reputation as part of a custom anti-virus defense. This gives you protection that other solutions don't offer. ScanMail is the only solution that blocks traditional malware using email, file, web reputation, and correlated global threat information from Trend Micro™.
  • 16
    Trend Micro PortalProtect Reviews
    Microsoft SharePoint is used by many organizations to connect with customers, partners, employees, and other parties for real-time collaboration. SharePoint capabilities allow businesses to go beyond content repositories. They can help employees create team sites, intranet and extranet portals as well as wikis and blogs. They also enable them to create social communities. These collaborative environments can improve productivity but also increase security risks when they are opened to the outside world. Trend Micro PortalProtect protects your collaborations by providing a dedicated layer that guards against malware, malicious hyperlinks, and other threats that SharePoint administrators often are unaware of. Its web reputation technology prevents malicious links from reaching your web portals while its powerful content filtering scans files and web components of SharePoint.
  • 17
    Check Point Infinity Reviews
    In an effort to provide better protection, organizations often implement multiple cyber security solutions. They often end up with a patchwork security system that is costly and leads to high TCO. Businesses can take preemptive measures against advanced fifth-generation attacks by adopting a consolidated security strategy with Check Point Infinity architecture. This allows them to achieve a 50% increase in operational efficiency, and a 20% reduction in security cost. This is the first consolidated security architecture that spans networks, cloud, mobile, and IoT. It provides the highest level of threat prevention against known and unknown cyber-threats. 64 threat prevention engines that block known and unknown threats powered by threat intelligence. Infinity-Vision, the unified management platform of Check Point Infinity is the first modern, consolidated cybersecurity architecture designed to protect today's most sophisticated attacks on networks, endpoints, and cloud.
  • 18
    Check Point IPS Reviews
    Intrusion Prevention Systems detect and prevent attempts to exploit vulnerabilities in vulnerable systems or applications. They protect you from the latest breaking threat. Our Next Generation Firewall automatically updates the Check Point IPS protections. Your organization is protected regardless of whether the vulnerability was discovered years ago or just a few seconds ago. Check Point IPS provides thousands of behavioral and signature preemptive protections. Our acceleration technologies allow you to safely enable IPS. Your staff will save valuable time with a low false positive rate. IPS can be enabled on any Check Point security gateway to reduce total cost of ownership. Enterprises can get cloud-level expansion and resilience on their premises with this on-demand hyperscale threat prevention service. Users can access corporate networks and resources remotely from anywhere they are.
  • 19
    LOGIQ Reviews
    LogIQ.AI's LogFlow allows you to centrally manage your observability data pipes. Data streams are automatically organized and optimized as they arrive for your business teams or knowledge workers. XOps teams can centralize the management of data flows, increase data quality, and relevance. LogFlow's InstaStore, which can be built on any object store allows for infinite data retention and data replay to any target observation platform of your choosing. Analyze operational metrics across applications, infrastructure and gain actionable insight that will help you scale with confidence and maintain high availability. By analyzing and collecting behavioral data from business systems, you can help your business make better business decisions and provide better user experiences. Don't let new attack techniques catch you off guard. Automate threat prevention and remediation by automating the detection and analysis of threat patterns from multiple sources.
  • 20
    Trellix Cloudvisory Reviews
    A single console provides uniform visibility to multi-cloud infrastructures. Reduce the risk of cloud security misconfigurations resulting in compliance violation and exposure. Machine learning is used to detect anomalies and improve cloud security posture. New threats are emerging as companies move to the cloud. This poses additional challenges for cyber defense. Cyber security teams must also shift from being viewed as a bottleneck to becoming an enabler for business. With real-world examples, you can learn from experts how to move at the speed and security of cloud computing while protecting your organization. Cloud-native governance for microsegmentation policy via cloud-native firewalls. Orchestrated remediation of compliance errors and governance of desired-state security policy policies.
  • 21
    Trellix Intrusion Prevention System Reviews
    Signature-based and signatureless intrusion prevention systems can stop new and unknown attacks. Signature-less intrusion detection detects malicious network traffic and stops attacks that do not have signatures. To scale security and adapt to changing IT dynamics, network virtualization can be supported across private and public clouds. You can increase hardware performance up to 100 Gbps, and use data from multiple products. Discover and eliminate stealthy botnets, Trojans, and reconnaissance attacks hidden across the network landscape. To correlate unusual network behavior, collect flow data from routers and switches. Advanced threats can be detected and blocked on-premises, in virtual environments and software-defined data centres, as well as private and public clouds. You can gain east-west network visibility, and threat protection through virtualized infrastructure and data centres.
  • 22
    Securonix SOAR Reviews
    As the attack surface grows, there is a shortage in skilled security personnel to protect businesses and keep attackers away. Security teams need to be able to respond quickly to minimize the risk of cybersecurity threats. However, security teams often have to manage multiple security tools, which can lead to inefficient and time-consuming management. Securonix Security Orchestration, Automation, and Response helps security operations teams improve incident response times. It provides automation that adds context and suggests playbooks and next steps for analysts. SOAR streamlines orchestration by streamlining the incident response with integrated case management, integrations covering more than 275 applications and seamless access to your SIEM and UEBA and network detection and reaction (NDR) solutions all in one pane.
  • 23
    Pica8 PICOS Reviews
    PICOS is a unique open NOS that allows network operators to have surgical, non-disruptive control over their enterprise applications. It also provides deep and dynamic traffic monitoring and attack mitigation in real-time. PICOS is the best way to implement zero trust networking and software-defined perimeters. Our flagship open network operating software installs on 1G-to 100G-interface open switches made by a wide range of Tier 1 manufacturers. This fully featured license provides the best support for enterprise features. It includes the Debian Linux distribution with an unmodified kernel to maximize DevOps programming capabilities. AmpCon, an Ansible based automation framework, is included in Enterprise Edition. It combines Zero-Touch Provisioning with the Open Network Install Environment to make it easier to install and operate open network switches throughout the enterprise.
  • 24
    Ingate SIParator Reviews
    The Ingate SIParator®, a flexible, cost-effective and powerful Enterprise Session Border Controller, (E-SBC), is designed for SIP connectivity, security, interoperability, and interoperability. It connects PBXs and Unified Communications solutions to SIP trunking service provider providers. The SIParator simplifies SIP tunneling. It makes it simple to connect remote UC ends points, aggregate SIP trunks, and distribute sessions between sites or service delivery points. It is used for SIP interoperability, extensive connectivity, and real-time communications security. The SIParator®, which is compatible with all networks, comes with a standard SIP proxy as well as a SIP registry. It supports NAT and PAT as well as TLS and SRTP to encrypt SIP signaling as well as media. This eliminates the security problem that is often associated with enterprise VoIP.
  • 25
    Commvault Backup & Recovery Reviews
    You can ensure data availability across all workloads, both in cloud and on-prem environments. Commvault®, Backup & Recovery ensures data availability from one interface, regardless of where it is located. You can say goodbye to data loss, data silos, inefficient scaling, and missing recovery SLAs. Empower your team to do more. Comprehensive workload coverage (files and apps, databases, virtual, containers, and cloud) all from one extensible platform. You can quickly and easily recover data and applications. Virtual machines can also be recovered instantly. Easily back up, recover, and move data and workloads to/from/within/between clouds. Storage integrations allow for high-performance backups. Ransomware protection with anomaly detection and reporting. Reduce costs by requiring minimal infrastructure in the cloud or on premises. Policy-driven automation allows you to optimize the cloud vs. on-premises data location and workloads.
  • Previous
  • You're on page 1
  • Next