What Integrates with Arch Linux?

Find out what Arch Linux integrations exist in 2025. Learn what software and services currently integrate with Arch Linux, and sort them by reviews, cost, features, and more. Below is a list of products that Arch Linux currently integrates with:

  • 1
    Netdata Reviews
    Top Pick
    Monitor your servers, containers, and applications, in high-resolution and in real-time. Netdata collects metrics per second and presents them in beautiful low-latency dashboards. It is designed to run on all of your physical and virtual servers, cloud deployments, Kubernetes clusters, and edge/IoT devices, to monitor your systems, containers, and applications. It scales nicely from just a single server to thousands of servers, even in complex multi/mixed/hybrid cloud environments, and given enough disk space it can keep your metrics for years. KEY FEATURES: Collects metrics from 800+ integrations Real-Time, Low-Latency, High-Resolution Unsupervised Anomaly Detection Powerful Visualization Out of box Alerts systemd Journal Logs Explorer Low Maintenance Open and Extensible Troubleshoot slowdowns and anomalies in your infrastructure with thousands of per-second metrics, meaningful visualisations, and insightful health alarms with zero configuration. Netdata is different. Real-Time data collection and visualization. Infinite scalability baked into its design. Flexible and extremely modular. Immediately available for troubleshooting, requiring zero prior knowledge and preparation.
  • 2
    SparkView Reviews

    SparkView

    beyond SSL

    $60 per year
    Remote access to desktops and applications is fast, secure, and reliable. SparkView is a secure and simple way to connect devices that are not trusted to your desktops or applications. ZTNA, which does not require any client installation, provides secure remote access to any device that has a browser. All via HTML5 technology. The solution for mobile and remote work. Best web RDP client - advantages of SparkView: - ZTNA compliant remote access to applications, desktops and servers - Access from any device with browser (e.g. Chrome, Firefox, Edge, Opera, Safari, etc.) - No installation on clients or the target systems - One central point for administration, security and authorization - HTML5 technology - Flexible, stable and scalable - Low support and management overhead - Supports common protocols such as RDP, SSH, Telnet, VNC and HTTP(S) - No Java, no Flash, no ActiveX, no plugin, no rollout
  • 3
    Entropy Keycrypt Reviews
    Entropy offers a seamless, secure transition from your trusted circle to your digital assets in the event of an emergency. Security that is User-Friendly Entropy allows you to securely partition your important information into discrete share, which each do not reveal anything about your secret without the other. Distribute them to a small group of trusted people who can store them offline. Long-Term Resilience Entropy's robust security features include 256-bit encryption. This allows for decentralized, durable offline storage that protects your data against both online and offline threats.
  • 4
    IRI DMaaS Reviews

    IRI DMaaS

    IRI, The CoSort Company

    $1000 per day
    IRI Data Masking as a Service is a professional services engagement to secure PII. Step 1: IRI agrees under NDA terms to classify, analyze, and report on the sensitive, at-risk data in your sources. We will discuss an initial cost estimate then hone it with you during data discovery. Step 2: Transfer the unprotected data to a secure on-premise or cloud-based staging area or provide remote, supervised access to IRI to the data sources(s) at issue. We'll use the tools in the award-winning IRI Data Protector suite to mask that data according to your business rules, on an ad hoc or recurring basis. Step 3: Our experts can also move newly-masked data to incremental replicas in production or to lower non-production environments. From either, the data is now safe for analytic initiatives, development, testing, or training. Tell us if you need additional services, like re-ID risk scoring (expert determination) of the de-identified data. This approach provides the benefits of proven data masking solution technology and services without the need to learn and customize new software from scratch. If you do want to use the software in-house, you will have everything pre-configured for easier long-term self-use and modification.
  • 5
    Pacman Reviews
    Pacman is a package management tool utilized in Linux environments to handle software installations. It employs straightforward compressed files as its package format and keeps a text-based database, which serves as a structured hierarchy for instances where manual adjustments may be required. Rather than attempting to encompass every function, Pacman focuses on key operations such as adding, removing, and upgrading software packages, while also enabling users to search through the package database for installed items, their associated files, and ownership details. Furthermore, it strives to manage dependencies automatically and can retrieve packages from online servers. The introduction of version 2.0 brought the capability to synchronize packages with a central server via package databases using the -sync option, marking a significant improvement over earlier versions where installations had to be performed manually with --add and -upgrade commands. This evolution not only enhanced user experience but also streamlined the process of keeping software up to date.
  • 6
    Snapcraft Reviews
    This repository contains the code for snapd, which is the background service responsible for managing and maintaining the installed snap packages. Snaps are versatile application packages designed for desktop, cloud, and IoT environments, featuring automatic updates. They are user-friendly, secure, compatible across different platforms, and do not require additional dependencies, making them popular on millions of Linux systems daily. In addition to various service and management capabilities, snapd offers the snap command for installing and removing snaps while facilitating interaction with the broader snap ecosystem. It also enforces confinement policies that keep snaps isolated from the base system and from each other, and it manages the interfaces that allow snaps to utilize specific system resources beyond their confinement. For those interested in installing applications like Spotify or Visual Studio Code, the Snap Store is a great place to explore. Furthermore, if you're keen on creating your own snaps, we recommend starting with our comprehensive documentation on how to build a snap. This documentation will guide you through the essential steps for developing and packaging your apps effectively.
  • 7
    Zero Install Reviews

    Zero Install

    Zero Install

    Free
    Introducing a decentralized software installation framework that operates seamlessly across Linux, Windows, and macOS platforms. This fully open-source solution allows users to launch applications with just a single click, enabling them to run programs without the need for prior installation. Users can manage all operations through either a command line or a graphical interface, ensuring complete control over their computing experience. The installation process is transparent, eliminating the uncertainty typically associated with software deployment. It supports the combination of both stable and experimental applications on a single system, fostering a versatile software environment. Anyone has the capability to distribute software, empowering developers to create a single package that functions across various platforms. This system allows publishing on any static web host, establishing a decentralized ecosystem devoid of any central authority. Moreover, it features robust dependency management and automatic updates, prioritizing security at every step. Installing an application does not bestow it with administrator privileges, and digital signatures are meticulously verified before any new software is executed. Applications can share libraries while maintaining a level of trust, which enhances security. This framework also introduces automatic self-updating mechanisms, staged rollouts, and numerous enhancements for desktop integration, thereby enriching the overall user experience. With such features, it redefines the way users interact with software on their devices.
  • 8
    Fortran Package Manager Reviews
    The Fortran Package Manager (fpm) serves as both a package manager and a build system specifically designed for Fortran. It boasts a wide array of available packages, contributing to a vibrant ecosystem of both general-purpose and high-performance code, enhancing accessibility for users. Aimed at improving the overall experience for Fortran developers, fpm simplifies the process of building Fortran programs or libraries, executing tests, running examples, and managing dependencies for other Fortran projects. Its design draws inspiration from Rust’s Cargo, creating an intuitive user interface. Additionally, fpm has a long-term vision focused on fostering the growth of modern Fortran applications and libraries. One notable feature of fpm is its plugin system, which facilitates the extension of its capabilities. Among these plugins is the fpm-search project, which enables users to query the package registry effortlessly, and because it is built with fpm, installation on any system is straightforward. This synergy not only streamlines the development process but also encourages collaboration among developers within the Fortran community.
  • 9
    fpm Reviews
    FPM is a versatile tool designed to simplify the process of creating packages for various operating systems, including Debian, Ubuntu, Fedora, CentOS, RHEL, Arch Linux, FreeBSD, and macOS, among others. Rather than introducing a new packaging methodology, FPM serves as a facilitator, streamlining the creation of packages for existing systems with minimal effort. This is achieved through its user-friendly command-line interface, which enables users to generate packages with ease. Developed in Ruby, FPM can be installed via the gem package manager. However, for certain package formats, such as RPM and Snap, specific dependencies must be present on your machine to successfully build them. Additionally, when packaging for different operating systems or distributions, you may need to install other tools to ensure compatibility. FPM effectively transforms your software into easily installable packages across multiple platforms, capable of converting any Node.js package, Ruby gem, or Python package into formats like deb, rpm, or pacman. With FPM, the packaging process becomes significantly more efficient, saving developers both time and effort.
  • 10
    Elixir Reviews
    Elixir is a versatile and dynamic functional programming language designed for creating scalable and maintainable applications. It utilizes the Erlang VM, which is renowned for its capability to support low-latency, distributed, and fault-tolerant systems. This language finds application in various fields, including web development, embedded systems, data ingestion, and multimedia processing, making it valuable across numerous industries. To kickstart your experience with Elixir, be sure to explore our comprehensive getting started guide and learning resources. Elixir operates through lightweight execution threads known as processes, which are designed to be isolated and communicate by sending messages. Given their lightweight characteristics, it is common for a single machine to manage hundreds of thousands of these processes simultaneously. The isolation feature allows for independent garbage collection, which minimizes system-wide pauses and optimizes the use of machine resources for vertical scaling. Additionally, processes can interact with others across different machines within the same network, enhancing the language's flexibility and robustness. Overall, Elixir's architecture supports the development of highly concurrent applications, making it an appealing choice for many developers.
  • 11
    Visual LVM Reviews

    Visual LVM

    WeLees

    $14.99 per year
    Visual LVM provides an improved and user-friendly approach to managing logical volume management on Linux. As a graphical interface for LVM, it presents a straightforward and clear visualization of your storage configuration, allowing for the management of multiple hard drives with greater ease and speed. By eliminating the need for intricate command-line inputs, it enables users to perform tasks simply through intuitive clicks and drags, making the experience more accessible. This innovative method of LVM management not only streamlines the process but also conserves your time and effort, allowing you to concentrate on your objectives while enhancing overall productivity. Ultimately, Visual LVM transforms the way users interact with their storage systems, making it a valuable tool for both novices and experienced users alike.
  • 12
    NoPorts Reviews

    NoPorts

    Atsign

    $4/month/user
    NoPorts, a VPN alternative, allows users to create an encrypted IP tunnel between devices without the need for exposed port numbers. This creates a zero-trust network. It provides true end to end encryption while empowering organisations to leverage existing protocols such as RDP, Citrix and VPN while mitigating their inherent security risks. How it Works: NoPorts uses a unique approach that eliminates open network ports.   It establishes secure, encrypted connections between devices using a combination of techniques, often involving a combination of: - Edge Computing: Processing data closer to the source to reduce latency and improve security.   - Cloud Services: Utilizing cloud infrastructure for secure communication and data storage. - Cryptography: Employing strong encryption algorithms to protect data in transit and at rest.   Benefits: - Enhanced Security: Significantly reduces the risk of cyberattacks by eliminating the need for open ports.   - Improved Privacy: Protects your devices and data from unauthorized access. - Simplified Network Management: Reduces the complexity of network administration.   - Increased Flexibility: Enables remote access from anywhere with an internet connection.  
  • 13
    Budgie Clipboard Manager Reviews
    This clipboard manager applet is designed to assist you in storing and organizing your clipboard items efficiently. It allows for the management of clipboard history, enabling you to save as many as 100 different clips, with features like a private mode and the ability to delete any clip you desire. You can also enjoy a searchable history, options to clear all saved clips, automatic history saving, and notification support for easy access. The applet is highly customizable and includes an option to restore default settings. It facilitates the automatic pasting of a selected clip into the currently active window, making it convenient to use. This tool is compatible with Debian and Ubuntu-based distributions, and users of Ubuntu Budgie can conveniently install the applet directly from the welcome screen. Additionally, the optional tool xdotool can enhance functionality by allowing for text pasting in the active window. To get started, simply download the zip file and execute it from the folder where you have extracted the repository. Keep your clipboard organized effortlessly with this versatile tool.
  • 14
    Sandfly Security Reviews
    Renowned for securing critical infrastructure worldwide, Sandfly offers agentless Linux security that eliminates the need for endpoint agents, ensuring a hassle-free experience. Its deployment is immediate, prioritizing system stability without sacrificing security. As an agentless platform, Sandfly is designed to monitor Linux systems quickly and securely. It safeguards a wide range of Linux environments, from contemporary cloud infrastructures to legacy devices, irrespective of their distribution or CPU type. In addition to standard Endpoint Detection and Response (EDR) features, Sandfly effectively manages SSH credentials, identifies weak passwords through audits, detects unauthorized modifications with drift detection, and incorporates customizable modules to identify novel and evolving threats. This comprehensive approach guarantees maximum safety, efficiency, and compatibility across Linux systems. Furthermore, Sandfly stands out in the market by providing extensive coverage for various Linux distributions and architectures, including AMD, Intel, Arm, MIPS, and POWER CPUs. With Sandfly, organizations can ensure their Linux security is both robust and versatile, catering to their diverse technological landscapes.
  • 15
    EnduraData EDpCloud Reviews
    Cross-platform real time file replication for Windows and Linux, Solaris, Solaris, AIX and OpenBSD. EnduraData EDpCloud replicates data and synchronizes it between different operating systems, geographical locations, and cloud providers.
  • 16
    Palo Alto Networks Panorama Reviews
    Panorama™ provides a user-friendly platform for centralized management, allowing for quick implementation of features that enhance visibility into network traffic and streamline configurations. Users can easily create and modify security rules that align with their organization's security policies, all from a single, centralized interface that oversees their entire firewall deployment. By utilizing the Application Command Center (ACC), administrators can gain valuable insights and visibility into network threats and traffic, which is essential for effective security management. The automated correlation engine helps to minimize data overload, enabling quicker identification of compromised systems and detection of malicious activities. With the capability to manage up to 5,000 Next-Generation Firewalls, or by utilizing the Panorama Interconnect plugin, organizations can centralize configuration management for potentially tens of thousands of devices. The intuitive user interface of Panorama not only simplifies the security management process but also provides tools for monitoring, configuring, and automating various security tasks, making it an essential solution for modern network security challenges. This comprehensive approach ensures that organizations can maintain robust security while effectively managing their network infrastructure.
  • Previous
  • You're on page 1
  • Next