Best IT Security Software for VMware ESXi

Find and compare the best IT Security software for VMware ESXi in 2025

Use the comparison tool below to compare the top IT Security software for VMware ESXi on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    New Relic Reviews
    Top Pick
    See Software
    Learn More
    Enhance IT Security with New Relic: Protect your organization with cutting-edge threat detection and robust safeguards. Boost your IT security framework using New Relic's powerful observability platform, which offers software engineers extensive visibility and control over your security environment. Our solution features real-time monitoring and sophisticated threat detection, enabling you to proactively spot and mitigate vulnerabilities before they affect your operations. Effortlessly integrate security insights into your overall IT management to maintain compliance, reduce risks, and secure essential assets. Improve your incident response strategies, streamline security processes, and align your security initiatives with your organizational goals. With New Relic, strengthen your enterprise's defenses against emerging threats and cultivate a proactive security and resilience mindset.
  • 2
    Netwrix Auditor Reviews
    See Software
    Learn More
    Netwrix Auditor, a visibility platform, allows you to control changes, configurations, and access in hybrid IT environments. It also eliminates the stress associated with your next compliance audit. All changes in your cloud and on-prem systems can be monitored, including AD, Windows Servers, file storage, Exchange, VMware, and other databases. Reduce the complexity of your inventory and reporting. You can easily verify that your access and identity configurations match the known good state by reviewing them regularly.
  • 3
    Domotz Reviews
    Top Pick
    See Software
    Learn More
    Discover why MSPs, IT Professionals, and System Integrators trust our Network Monitoring and Management Solution to monitor thousands of networks worldwide. Try for free now!
  • 4
    Relianoid Reviews

    Relianoid

    Relianoid

    $1,356 one-time payment
    3 Ratings
    Our ADC solution is designed to take your online services to new levels of performance, security, and reliability. It ensures seamless traffic distribution and resource utilization as well as enhanced protection against cyber threats. Our ADC solution provides you with massive scalability and high availability for your services, apps, and networks. Multi-core compatibility, unlimited throughput, connections and farms, and optimized to support multi-core. Installation is not required, allowing for a rapid consolidation of production and a seamless deployment. Integrate easily into your infrastructure for a cost-saving and productive setup. Shared hardware resources can reduce costs associated with physical equipment, making this a budget-friendly solution. Ready for 64-bit platforms to provide better performance, and a robust environment. It allows for more performance resources than other architectures.
  • 5
    Pandora FMS Reviews
    Top Pick
    With more than 50,000 customer installations across the five continents, Pandora FMS is a truly all-in-one monitoring solution, covering all traditional silos for specific monitoring: servers, networks, applications, logs, synthetic/transactional, remote control, inventory, etc. Pandora FMS allows you to quickly find and solve problems. It scales them so that they can be derived either from on-premise, multi-cloud, or both. You now have the ability to use your entire IT stack and analytics to solve any problem, even those that are difficult to find. You can control and manage any technology and application with more than 500 plugins, including SAP, Oracle, Lotus or Citrix, Jboss, VMware, AWS and SQL Server.
  • 6
    Carbonite Reviews

    Carbonite

    Carbonite

    $6 per month
    5 Ratings
    Safeguard your essential business information with reliable and straightforward data protection and recovery through automatic cloud backup. Carbonite Safe™ is a tailored data backup solution specifically designed for organizations like yours, ensuring that installation and usage are user-friendly, so you won't need any specialized IT training to keep your data secure and accessible. It enables you to protect files across servers, external storage devices, and up to 25 computers, while also offering straightforward recovery options for computers that have fallen victim to ransomware—without the need to pay a ransom. You can oversee your online backups and retrieve files from any device through a secure, web-based dashboard, helping you fulfill data retention requirements efficiently. This business cloud backup is adaptable to your specific needs; whether you're restoring an individual file or an entire directory system, it can be accomplished in just a few clicks. Advanced encryption safeguards your data during transmission and storage, ensuring it never remains in an unsecured state. Unlike many other companies that impose additional fees for support, Carbonite Safe provides assistance from our award-winning team of experts at no extra cost, ensuring you have the help you need whenever you require it. This comprehensive approach to data protection not only enhances peace of mind but also allows your business to operate smoothly, knowing that your critical information is well-protected.
  • 7
    BackBox Reviews
    Network engineers save time with the BackBox Automation Platform for Network Teams by quickly automating and auditing time consuming manual tasks. With a library of over 3,000 pre-built automations and a script-free way to build new ones BackBox makes it easy to get started on your automation journey. BackBox is a point-and-click automation solution for firewall and network device backups, OS updates and patching, configuration compliance audits and remediation, network vulnerability management, network configuration change management, and more.
  • 8
    KACE by Quest Reviews

    KACE by Quest

    Quest Software

    As low as $3/mo/device
    2 Ratings
    KACE is an endpoint management solution that offers a single point of control for managing IT systems across the entire organization. From initial deployment to ongoing maintenance, KACE is designed to fulfill all endpoint security and deployment needs—helping businesses quickly deploy, monitor, and manage their devices using a unified inventory database. KACE improves device security with on-demand hardware and software discovery, patch management, compliance reporting, and real-time monitoring of mobile endpoints. KACE is a Unified Endpoint Management solution that offers a single point of control for managing IT systems across the entire organization, inside or outside your network. This comprehensive solution takes the stress out of keeping devices secure and compliant so you can do more. Unified Endpoint Management by KACE. Where Next Meets Now.
  • 9
    Checkmk Reviews
    Checkmk is an IT monitoring system that allows system administrators, IT managers and DevOps teams, to quickly identify and resolve issues across their entire IT infrastructure (servers and applications, networks, storage and databases, containers, etc. Checkmk is used daily by more than 2,000 commercial customers worldwide and many other open-source users. Key product features * Service state monitoring with nearly 2,000 checks 'outside the box' * Event-based and log-based monitoring * Metrics, dynamic Graphing, and Long-Term Storage * Comprehensive reporting incl. Accessibility and SLAs * Flexible notifications and automated alert handling * Monitoring business processes and complex systems * Software and hardware inventory * Graphical, rule-based configuration and automated service discovery These are the top use cases * Server Monitoring * Network Monitoring * Application Monitoring * Database Monitoring * Storage Monitoring * Cloud Monitoring * Container Monitoring
  • 10
    NovaBACKUP for Servers Reviews

    NovaBACKUP for Servers

    NovaBACKUP Corporation

    $399.95 /year
    Protect your business from data loss with fast, affordable Windows Server backup software with full disaster recovery protection plus local and offsite cloud backup storage with support for SQL, Exchange, and virtual machines. Instantly recover your entire system in just minutes and reduce your exposure to critical downtime. Backups utilize up to AES 256-bit encryption. NovaBACKUP Server Agent comes with 250 GB of Cloud Storage, Free Upgrades, Support, and Setup Assistance, so you can be sure that the software is configured in the best possible way for your environment.
  • 11
    Edgenexus Load Balancer (ADC/WAF/GSLB) Reviews
    We offer the most user-friendly technology without sacrificing performance or features. We back it up with exceptional support and care delivered under a fair, cost-effective pricing model Our technology is used by small startups with big ideas, small budgets, and global enterprises. We love them all! Easy to use Load balancing, WAF, GSLB and SSO/Pre-Authentication. It is also the only true ADP Application Delivery Platform that allows for the enhancement of functionality and longevity using the app store or apps you create in-house.
  • 12
    Axonius Reviews
    Axonius gives IT and security teams the confidence to control complexity by providing a system of record for all digital infrastructure. With a comprehensive understanding of all assets including devices, identities, software, SaaS applications, vulnerabilities, security controls, and the context between them, customers are able to mitigate threats, navigate risk, decrease incident response time, automate action, and inform business-level strategy — all while eliminating manual, repetitive tasks.
  • 13
    Bacula Enterprise Reviews
    Bacula Enterprise offers a single platform that provides cloud backup and recovery software for the Modern Data Center. Bacula Enterprise backup & recovery software is ideal for medium and large businesses. It offers unique innovation, modern architecture and business value benefits, as well as low cost of ownership. Bacula Enterprise corporate backup software solution uses unique technologies that increase the interoperability of Bacula Enterprise into many IT environments, such as managed service providers, software vendors, cloud providers, enterprise data centers, and cloud providers. Bacula Enterprise is used by thousands of organizations around the world in mission-critical environments such as NASA, Texas A&M University and Unicredit. Bacula offers more security features than other vendors and advanced hybrid Cloud connectivity to Amazon S3, Google, Oracle, and many others.
  • 14
    MinerEye DataTracker Reviews

    MinerEye DataTracker

    MinerEye

    $2000/1TB/month
    MinerEye's DataTracker helps organizations overcome the information governance/protection challenge. It automatically scans, indexes and analyzes all unstructured and dark data in an organization's data repository. The solution uses proprietary Interpretive AI™, computer vision, and machine learning to locate relevant files from the billions of stored data. It automatically sends out alerts with the next best action recommendations in case of conflicts, duplicates, or potential violations. This allows data protection to be greatly enhanced and operational costs reduced.
  • 15
    Keyfactor EJBCA Reviews
    EJBCA, an Enterprise-grade PKI platform, can issue and manage digital certificates in the millions. It is one of the most widely used PKI platforms worldwide and is used by large enterprises in all sectors.
  • 16
     Acronis Cyber Protect Cloud Reviews
    Minimize downtime and safeguard your clients' data while reducing expenses. Acronis Cyber Protect Cloud stands out as the sole solution that seamlessly combines cybersecurity, data protection, and management, ensuring the safety of endpoints, systems, and data. This integrated approach simplifies processes, enabling service providers to offer superior protection to their customers at a more affordable price. With cutting-edge cybersecurity measures in place, it features an advanced AI-driven behavioral detection engine designed to thwart zero-day attacks. Additionally, it guarantees dependable backup and recovery options, offering both full-image and file-level backups, as well as disaster recovery solutions and metadata collection for security forensics. The platform is tailored for managed service providers (MSPs), incorporating protection management features such as URL filtering, vulnerability assessments, and patch management to enhance control. In contrast, the conventional array of endpoint protection products suffers from a lack of integration, resulting in greater time demands for management, including tasks like maintaining licenses, installing updates and patches, verifying compatibility following updates, and juggling multiple policies across various user interfaces. By choosing Acronis, service providers can streamline their operations and improve their overall service quality.
  • 17
    Alliance Key Manager Reviews

    Alliance Key Manager

    Townsend Security

    $4,800 one-time payment
    Once your data has been encrypted, the security of your personal information relies heavily on advanced key management practices employed at the enterprise level. This solution offers robust, high-availability, and standards-based key management for encryption across a diverse array of applications and databases. Alliance Key Manager serves as a FIPS 140-2 compliant enterprise key management system, assisting organizations in fulfilling compliance mandates while safeguarding sensitive data. The symmetric key management solution is capable of generating, overseeing, and distributing AES encryption keys in 128-bit, 192-bit, and 256-bit formats, suitable for any application or database operating on various enterprise platforms. Moreover, the access to encryption keys can be controlled through multiple criteria. The highest level of access requires a secure and authenticated TLS connection to the key server. Additionally, encryption keys can be tailored to specific users, groups, or designated individuals within those groups, allowing for precise control over who can access the data. Furthermore, organizations have the flexibility to establish enterprise-wide groups, enabling the restriction of keys to designated enterprise users, groups, or particular individuals within those groups, thereby enhancing the overall security and management of sensitive information.
  • 18
    StellarProtect Reviews
    StellarProtect™ represents a revolutionary advancement in endpoint security specifically designed for modern operational technology assets. As the first of its kind, this all-terrain protection solution excels in advanced threat detection, effectively neutralizing known attacks while its state-of-the-art machine learning capabilities defend against previously unidentified threats—functioning without the need for internet connectivity. By leveraging an inventory of applications and certificates, StellarProtect’s ICS filtering minimizes unnecessary overhead, ensuring optimal lightweight operation. Furthermore, it operates efficiently across diverse environmental conditions, maintaining high accuracy with minimal impact on endpoint performance, thus enabling comprehensive protection in a single deployment. The intelligent framework of StellarProtect not only offers guard against both known and unknown malware through machine learning but also utilizes an ICS root of trust, which pre-emptively verifies over a thousand ICS software certificates and licenses, significantly lowering the burden of protection overhead while enhancing overall security integrity.
  • 19
    OSSEC Reviews
    OSSEC is completely open source and available at no cost, allowing users to customize its functionalities through a wide range of configuration settings, including the addition of personalized alert rules and the creation of scripts to respond to incidents as they arise. Atomic OSSEC enhances this capability by assisting organizations in fulfilling specific compliance standards like NIST and PCI DSS. It effectively identifies and notifies users of unauthorized alterations to the file system and any malicious activities that could jeopardize compliance. The Atomic OSSEC detection and response system, built on open-source principles, enriches OSSEC with thousands of advanced rules, real-time file integrity monitoring (FIM), regular updates, software integrations, built-in active response features, a user-friendly graphical interface (GUI), compliance resources, and dedicated professional support. This makes it a highly adaptable security solution that combines extended detection and response (XDR) with compliance capabilities in one comprehensive package. Its flexibility and thoroughness make it an invaluable tool for organizations aiming to bolster their security posture while maintaining compliance.
  • 20
    OverSOC Reviews
    Enhance your attack surface management by establishing a centralized source of truth. Unify and gather all your IT and Cybersecurity data to swiftly identify gaps in your inventory, prioritize remediation efforts, and expedite the auditing process. Integrate data from the various tools employed by your IT and SecOps teams through APIs, as well as information from business teams utilizing flat files, consolidating everything into a single, agent-free database. Streamline the processes of data ingestion, standardization, and consolidation within a unified framework. Say goodbye to duplicate assets and the tedious tasks of manually entering data into spreadsheets and dashboards. Boost your data enrichment capabilities by incorporating external resources, such as security bulletins from recognized authorities. Leverage the filtering system to query your cybersecurity data, allowing you to obtain precise insights regarding the health of your information systems. You can utilize OverSOC's pre-configured filters tailored to specific customer requirements or create personalized filters, which can be saved and shared with your team members. This comprehensive approach not only simplifies data management but also improves collaboration across departments.
  • 21
    EmpowerID Reviews

    EmpowerID

    EmpowerID

    $2 per user per month
    EmpowerID is a distinguished, comprehensive suite for identity management and cloud security, created by The Dot Net Factory, LLC, also known as "EmpowerID". This innovative solution is adept at overseeing millions of identities, both internal and external, across various cloud and on-premise environments for organizations worldwide, offering the most extensive array of IAM functionalities available. Its robust, out-of-the-box offerings encompass features such as single sign-on, user provisioning, identity governance, group management, role mining, delegated identity administration, password management, privileged access management, access management for SharePoint, and a specialized identity platform designed for application developers. Each of these solutions utilizes a sophisticated authorization engine based on roles and attributes, capable of managing complex organizational structures and supporting multi-tenant SaaS providers. EmpowerID's architecture is highly scalable and fully customizable, ensuring that enterprises can achieve efficient and effective IAM results tailored to their specific needs. Ultimately, EmpowerID stands out as an essential tool for organizations looking to streamline identity management while enhancing security protocols.
  • 22
    Commvault Cloud Reviews
    Commvault Cloud serves as an all-encompassing cyber resilience solution aimed at safeguarding, managing, and restoring data across various IT settings, which include on-premises systems, cloud infrastructures, and SaaS platforms. Utilizing the power of Metallic AI, it boasts cutting-edge functionalities such as AI-enhanced threat detection, automated compliance mechanisms, and accelerated recovery options like Cleanroom Recovery and Cloudburst Recovery. The platform guarantees ongoing data protection through proactive risk assessments, threat identification, and cyber deception tactics, all while enabling smooth recovery and business continuity through infrastructure-as-code automation. By providing a streamlined management interface, Commvault Cloud allows organizations to protect their vital data assets, ensure regulatory compliance, and quickly address cyber threats, which ultimately helps in reducing downtime and minimizing operational interruptions. Additionally, the platform's robust features make it an essential tool for businesses aiming to enhance their overall data security posture in an ever-evolving digital landscape.
  • 23
    Centreon Reviews
    Centreon is a global provider for business-aware IT monitoring to ensure high performance and continuous operations. The company's AIOps-ready platform, which is holistic and ready for use in today's complex hybrid cloud infrastructures, is designed to meet the needs of these distributed clouds. Centreon monitors all aspects of the IT Infrastructure, from Cloud-to Edge for a clear and comprehensive view. Centreon eliminates blind spots by monitoring all equipment, middleware, and applications that are part modern IT workflows. This includes legacy assets on-premise, private and public clouds, and all the way to edge of the network where smart devices and customers come together to create business value. Centreon is always up-to-date and can support even the most dynamic environments. It has auto-discovery capabilities that allow it to keep track of Software Defined Network (SDN), AWS or Azure cloud assets and Wi-Fi access points, as well as any other component of today’s agile IT infrastructure.
  • 24
    FortiManager Reviews
    The swift rise of digital transformation (DX) technologies has increased the complexity and susceptibility of networks and their security measures. Although malicious cyberattacks continue to pose a significant threat, a recent study by Ponemon indicates that over half of the security breaches reported last year originated from harmless sources that could have been avoided. Implementing a security strategy that emphasizes automation-driven network operations can serve as an effective solution. Integrated within the Fortinet Security Fabric, FortiManager facilitates centralized management for network operations, ensuring compliance with best practices and enhancing workflow automation to bolster defense against breaches. You can manage all your Fortinet devices through a unified console management system. With FortiManager, you gain comprehensive visibility into your network, which allows for efficient provisioning and access to cutting-edge automation tools. This platform not only offers insights into network traffic and potential threats through a centralized dashboard but also delivers enterprise-grade features and advanced security management capabilities. Consequently, leveraging FortiManager can significantly enhance your organization’s overall security posture while streamlining operational processes.
  • 25
    Sangfor IAG Reviews
    For a decade, Secure Web Gateway has consistently been recognized in the SWG Gartner Magic Quadrant. Sangfor IAG, formerly known as Sangfor IAM (Internet Access Management), offers an advanced solution for managing internet behavior, featuring professional bandwidth management, application control, URL filtering, traffic regulation, information control, management of unauthorized hotspots and proxies, behavior analysis, and wireless network oversight among its many capabilities. This comprehensive solution is designed to facilitate effective web filtering and cohesive internet behavior management across all clients within the entire network. It significantly reduces access to non-essential websites and distractions, thereby enhancing the efficiency of bandwidth utilization and availability. Furthermore, it effectively mitigates risks related to data leakage and regulatory compliance, safeguarding the security of intranet data. With visual management tools, it ensures thorough oversight of wireless access points, while simultaneously enabling a unified approach to managing internet behavior across both wired and wireless networks. Ultimately, Sangfor IAG empowers organizations to streamline their internet usage policies while enhancing overall network security.
  • Previous
  • You're on page 1
  • 2
  • Next