Best Ransomware Protection Software for Linux of 2024

Find and compare the best Ransomware Protection software for Linux in 2024

Use the comparison tool below to compare the top Ransomware Protection software for Linux on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Heimdal Endpoint Detection and Response (EDR) Reviews
    Top Pick
    See Software
    Learn More
    Our proprietary anti-ransomware encryption solution is a revolutionary 100% signature-free product that protects your devices against malicious encryption attempts initiated during ransomware attacks. Secure your endpoints and network against even the most advanced ransomware encryption attempts, in real-time, all the time.
  • 2
    SpamTitan Reviews
    Top Pick

    SpamTitan

    TitanHQ

    $2.14/user/month
    800 Ratings
    See Software
    Learn More
    SpamTitan email security protects businesses, schools, smbs and MSPs from spam. SpamTitan email security protects against spam, phishing, day-zero attacks and viruses, malware, ransomware and other threats to email. It helps to control mail flow, clean it, protect against spam, and protect against unwanted email. We offer easy-to-use, yet powerful email security for businesses, smbs, and MSPs that is Office365-friendly. SpamTitan Email Security is available for a free, fully supported trial. SpamTitan – Premium functionality included * CEO Impersonation protection * Spearphishing Protection/ Phishing * Link analysis * Full Sanding * Zero Day Attacks protection * Mail Spooling * Spoofing protection * Ransomware and Malware Protection * SPF/DKIM/DMARC checking * Encryption * Fully multi-tenant environment * Ability to rebrand entire UI * Full REST API * Set up documents and support SpamTitan Email Security is the best solution in the G2 Crowd Email Security. Start your free trial today!
  • 3
    ThreatLocker Reviews
    Top Pick
    For IT professionals to stop ransomware, you need to do more than look for threats. ThreatLocker helps you reduce your surface areas of attack with policy-driven endpoint security and change the paradigm from only blocking known threats, to blocking everything that is not explicitly allowed. Combined with Ringfencing and additional controls, you enhance your Zero Trust protection and block attacks that live off the land. Discover today the ThreatLocker suite of Zero Trust endpoint security solutions: Allowlisting, Ringfencing, Elevation Control, Storage Control, Network Access Control, Unified Audit, ThreatLocker Ops, Community, Configuration Manager and Health Center. 
  • 4
    Unitrends Backup Reviews
    Top Pick
    Unitrends Unified Backup offers a complete, agile and secure platform to protect all of your data. Managed through a single portal, Unitrends offers backup and disaster recovery for on-premises workloads, SaaS applications, cloud workloads and remote endpoints. Automation and artificial intelligence are injected into the platform providing end-to-end protection from cybercrime, human error and natural disasters. Integrations with market-leading security, remote management and documentation tools simplify workflows, increase efficiency and deliver 100% confidence in any recoveries to come.
  • 5
    NAKIVO Backup & Replication Reviews

    NAKIVO Backup & Replication

    NAKIVO

    $229/ socket; $25 workload/y
    NAKIVO Backup & Replication provides a top-rated, fast, and affordable backup, ransomware recovery, and disaster recovery solution that works in virtual, physical and cloud environments. The solution provides outstanding performance, reliability and management for SMBs, enterprises and MSPs.
  • 6
    Guardian Digital Reviews

    Guardian Digital

    Guardian Digital

    Monthly & Annual Subscriptions
    Guardian Digital protects against email threats such as phishing, zero day exploits, and crippling ransomware attacks. These are just some of the many threats email users face every single day. Email security is a business security issue, as more than 90% of cyber attacks originate in an email. A purpose-driven solution is the best way to protect email. It closes critical security gaps in Microsoft 365 and Google Workspace. It also provides remote support, expert setup and ongoing remote management. We provide real-time cybersecurity business insight to help you assess your current risk profile and protect you against the threats that all businesses face when using email.
  • 7
    Scale Computing Platform Reviews
    SC//Platform delivers faster time to value in the data centre, distributed enterprise, or at the edge. Scale Computing Platform combines simplicity, high availability, and scalability. It replaces the existing infrastructure and provides high availability for running VMs on a single, easy to manage platform. Fully integrated platform for running your applications. No matter what your hardware requirements are, the same innovative software and user interface gives you the ability to manage infrastructure efficiently at the edge. Reduce administrative tasks and save valuable time for IT administrators. SC//Platform's simplicity directly impacts IT productivity and costs. You can't predict the future, but you can plan for it. Mix and match old and newly developed hardware and applications to create a future-proof environment that can scale as needed.
  • 8
     Acronis Cyber Protect Cloud Reviews
    Your clients will be less affected by downtime and data loss at a lower price. Acronis Cyber Protect Cloud is unique in that it seamlessly integrates cybersecurity, management, and data protection to protect endpoints, systems, and data. This synergy reduces complexity so service providers can better protect customers while keeping costs low. Next-generation cybersecurity. Advanced AI-based behavioral detection engine to prevent zero-day attacks. Reliable backup and recovery. Backup of full-image and file-levels, disaster recovery, metadata collection, and backup of files and other data for security forensics. MSP-ready protection management. URL filtering, vulnerability assessments, patch management are all available for increased control. Traditional endpoint protection products are not integrated and require more time to manage - updating and patching, maintaining licenses, checking compatibility after updates, managing multiple policies through a variety of user interfaces, and managing multiple policies.
  • 9
    Vali Cyber Reviews
    We understand you are under pressure to protect against a constantly growing threat landscape, while also being constrained in terms of staff and budget. Vali Cyber can help. ZeroLock™, a security software built for Linux, reduces the amount of time it takes to deploy, configure, and manage Linux and cloud security. We deliver the lowest TCO and best ROI (Total cost of ownership) for your security investment by combining competitive pricing with significant overhead reductions to free up valuable resource. We know how important it is to have a frictionless deployment. ZeroLock™ is compatible with any Linux distribution that uses kernel version 3.5 and higher. Choose your orchestration tool to deploy across your entire environment quickly and easily.
  • 10
    CryptoSentry Reviews
    CryptoSentry blocks ransomware. It will monitor suspicious encryption activity on the devices of your employees once it is installed. Ransomware is the most rapidly growing cyber threat in recent times. It will impact your business if you don't take immediate action to stop files being encrypted before it becomes a problem. The ransomware attacks on WannaCry and CryptoWall have been the news of the day. News headlines often focus on the negative effects. Our CryptoSentry solution was created to stop ransomware from gaining access to files so that it can encrypt them. It will monitor suspicious encryption activity on the devices of your employees once it is installed. It will prevent file encryption if it finds a threat.
  • Previous
  • You're on page 1
  • Next