getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Cloud Security Software for Linux - Page 2

Last updated: April 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


114 software options

Workspace ONE logo

Digital workspace platform

learn more
Workspace ONE is an intelligence-driven digital workspace platform that enables organizations to simply and securely deliver and manage devices, apps, and data from a single, unified console, providing modern, cloud-native endpoint management and secure access to corporate resources.

Read more about Workspace ONE

Users also considered
SafeDNS logo
Category Leaders

Cloud-based web filtering and internet security software

learn more
SafeDNS is a DNS-based internet security and web filtering service designed to help businesses, educational institutions, and nonprofits protect their network against malware, phishing, inappropriate content, and more whilst maintaining compliance with statutory regulations.

Read more about SafeDNS

Users also considered
Zoho Vault logo

Online Password Manager for Teams

learn more
Secure cloud-based password management, organization, and sharing in the cloud with 256-bit encryption, user access control, and activity tracking

Read more about Zoho Vault

Users also considered
Atlantic.Net Cloud Platform logo

Cloud platform with virtual servers

learn more
Atlantic.Net Cloud Platform is designed to help organizations launch and scale their businesses using cloud infrastructure and services. The ACP secure control panel enables teams to create and manage cloud virtual servers, SSH keys, DNS records, block storage, private and public IPs, and more.

Read more about Atlantic.Net Cloud Platform

Users also considered
Guardio logo

Chrome extension for blocking malware and phishing attacks

learn more
Guardio is a Google Chrome extension designed to help businesses provide protection against malware, phishing attacks, and identity theft and remove pop-up messages from the browser. It lets employees prevent unauthorized users from accessing web browsers and remove existing malware from devices via a unified platform.

Read more about Guardio

Users also considered
NordPass Business logo

Business password manager for advanced cybersecurity.

learn more
NordPass’ end-to-end encryption and zero-knowledge architecture ensure the highest standard of security. Zero-knowledge means that only you know what is stored in your NordPass Vault. In other words, no one — not even the NordPass team— can access your stored data, including passwords, credit card.

Read more about NordPass Business

Users also considered
NordLayer logo
Category Leaders

Cloud-based network security platform for businesses

learn more
NordLayer secures access to company networks with private gateways, encrypted data flows, and adaptive access controls. With MFA, SCIM integrations, and third-party authentication, it ensures compliance with cloud security standards while keeping data and users safe.

Read more about NordLayer

Users also considered
AppDynamics logo

Application Performance Management (APM)

learn more
AppDynamics Application Intelligence platform empowers today’s software-defined businesses with the ability to proactively manage and optimize complex software environments in real time. It’s more than monitoring—it’s true Application Intelligence with cloud or on-premise deployment flexibility.

Read more about AppDynamics

Users also considered
GAT Labs logo

Auditing and security tool for Google Workspace and Chrome

learn more
1st zero-trust environment for Google Workspace which continuously monitors every user’s typing style, actively verifying that the right user is the one logged in. If an impostor is detected, it alerts the Admin or Security Officer with a camera shot & can shut down the session & log out the user.

Read more about GAT Labs

Users also considered
Logz.io logo

Machine data analytics based on ELK and Grafana

learn more
Logz.io is SOC 2 Type 2, HIPPA, ISO27001, PCI Level 1 and GDPR compliant, adhering to the strictest security policies, guaranteeing data is secure and safe.

Read more about Logz.io

Users also considered
vRx logo

Simplified Vulnerability Remediation

learn more
Efficiently Reduce Organizational Security Risk with vRx's leading vulnerability management platform that provides an efficient way to patch-less and get more.
vRx enables companies to analyze, prioritize, and act against software vulnerabilities with or without a security patch.

Read more about vRx

Users also considered
Invicti logo

Proof-based application security testing platform

learn more
Invicti is a web application and API security platform that provides proof-based vulnerability scanning with DAST, SAST, and ASPM capabilities. The platform discovers and tests websites, applications, and APIs while correlating security findings from multiple tools to prioritize real vulnerabilities. It integrates with CI/CD pipelines and offers AI-powered remediation guidance to help development teams address security issues efficiently.

Read more about Invicti

Users also considered
Rublon logo

Workforce Multi-Factor Authentication for SMB and Enterprise

learn more
Secure local and remote access to networks, servers and applications using multi-factor authentication (MFA) with hardware and software authentication methods like U2F/WebAuthn Security Keys, Mobile Push, Mobile Passcode (TOTP), SMS Passcode and Email Link. Use Active Directory as Identity Provider.

Read more about Rublon

Users also considered
Secomea logo

Secure Remote Access solution purpose-built for OT equipment

learn more
Secomea is a Secure Remote Access (SRA) solution purpose-built for industrial networks and OT equipment.
Over 9.500 customers around the world use it every day across thousands of sites to manage remote access to their machines and prevent downtime.
Let us help you defend your factory floor.

Read more about Secomea

Users also considered
Blumira logo

Automated SIEM + XDR for IT Teams

learn more
Blumira’s cloud SIEM can be deployed in hours with broad integration coverage across cloud, endpoint protection, firewall and identity providers including Azure, Office 365, G Suite, Crowdstrike, Okta, Palo Alto, Cisco FTD and many others.

Read more about Blumira

Users also considered
ESET Cloud Office Security logo

Security platform for Microsoft 365 applications

learn more
ESET Cloud Office Security provides advanced protection for Microsoft 365 applications against malware, spam or phishing attacks with ultimate zero-day threat defense and an easy-to-use console.

Read more about ESET Cloud Office Security

Users also considered
Elastic Security logo

Security at the speed of Elastic

learn more
Unify SIEM, endpoint security, and cloud security
Elastic Security modernizes security operations

Read more about Elastic Security

Users also considered
Hexiosec ASM logo

Identify your vulnerabilities before the hackers.

learn more
Hexiosec ASM is a passive attack surface management solution designed to help businesses protect their online infrastructure.

Scan your business to discover your internet-connected infrastructure, assets, and shadow IT.

Check for vulnerabilities, misconfigurations and exposed data quickly.

Read more about Hexiosec ASM

Users also considered
SpinOne logo

All-in-One SaaS Security for Mission-Critical SaaS Apps

learn more
SpinOne is an all-in-one SaaS security platform that protects SaaS data for mission critical apps so that enterprises can mitigate risk, save time, reduce downtime, and improve compliance.

Read more about SpinOne

Users also considered
Cisco Umbrella logo

Cloud-based enterprise network security solution

learn more
Cisco Umbrella is an enterprise network security solution that provides DNS-layer security to block threats before connections are established. The platform includes features such as secure web gateway, cloud access security broker, data loss prevention, cloud-delivered firewall, and malware protection. It leverages threat intelligence from Cisco Talos and operates on a global cloud infrastructure to protect users and devices across multiple locations.

Read more about Cisco Umbrella

Users also considered
Carbon Black Endpoint logo

Protect endpoints and workloads from advanced threats

learn more
VMware Carbon Black Endpoint platform empowers security teams to detect and respond to advanced threats with less operational friction.

Read more about Carbon Black Endpoint

Users also considered
Strong Network logo

Strong Network Secure Cloud Development Environment Platform

learn more
Strong Network delivers a self-hosted platform that allows organizations to manage the first secure Cloud Development Environments (CDEs). They use secure CDEs to provide access to their developers to ready-to-code linux development environments with native data security.

Read more about Strong Network

Users also considered
Loggly logo

Cloud log management and monitoring

learn more
SolarWinds Loggly, part of the SolarWinds DevOps suite is a log management solution. Charts and dashboards and alerts to email or popular endpoints like Slack, PagerDuty, Jira, or custom webhooks help monitor app performance, system behavior, key resources, and detect anomalies in your environment.

Read more about Loggly

Users also considered
Ansys Cloud Direct logo

Ansys Cloud HPC as easy as it should be

learn more
Access Ansys Cloud Direct anywhere, anytime to obtain endless simulation capabilities compatible with most Ansys solvers..

Read more about Ansys Cloud Direct

Users also considered
Enginsight logo

ALL-IN-ONE SECURITY PLATFORM for SMEs

learn more
The host-based approach allows you to protect your entire environment (local or cloud). Vulnerability and network monitoring as well as attack detection on your cloud servers can be achieved in just a few minutes. Host-based micro-segmentation enables targeted protection of sensitive data/systems.

Read more about Enginsight

Users also considered