getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Cloud Security Software for Linux - Page 2

Last updated: February 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


112 software options

ConnectWise SIEM logo

Threat detection and response management software

learn more
ConnectWise SIEM is a threat detection and response management software designed to help enterprises create, launch, and manage cybersecurity programs. The platform enables organizations to identify potential threats and malicious activities across networks & connected devices via a unified portal.

Read more about ConnectWise SIEM

Users also considered
Cohesity logo

Server backup and data management software

learn more
Cohesity is a leader in AI-powered data security and management, protecting the world’s most critical data workloads.

Read more about Cohesity

Users also considered
ManageEngine ADSelfService Plus logo

Self Service Password Management and Single Sign On Solution

learn more
ManageEngine ADSelfService Plus is a secure, web-based, end-user password reset management program. It helps domain users to perform self service password reset,self service account unlock and employee self update of personal details(e.g telephone numbers,etc) in Microsoft Windows Active Directory.

Read more about ManageEngine ADSelfService Plus

Users also considered
Runecast logo

AI-powered platform for Security and Compliance

learn more
Runecast is a provider of a patented solution for IT Security and Operations teams. Forward-focused enterprises rely on Runecast for proactive risk mitigation, security compliance, operational efficiency & mission-critical stability. To add proactiveness to your IT strategy, visit www.runecast.com

Read more about Runecast

Users also considered
Workspace ONE logo

Digital workspace platform

learn more
Workspace ONE is an intelligence-driven digital workspace platform that enables organizations to simply and securely deliver and manage devices, apps, and data from a single, unified console, providing modern, cloud-native endpoint management and secure access to corporate resources.

Read more about Workspace ONE

Users also considered
SafeDNS logo
Category Leaders

Cloud-based web filtering and internet security software

learn more
SafeDNS is a DNS-based internet security and web filtering service designed to help businesses, educational institutions, and nonprofits protect their network against malware, phishing, inappropriate content, and more whilst maintaining compliance with statutory regulations.

Read more about SafeDNS

Users also considered
Atlantic.Net Cloud Platform logo

Cloud platform with virtual servers

learn more
Atlantic.Net Cloud Platform is designed to help organizations launch and scale their businesses using cloud infrastructure and services. The ACP secure control panel enables teams to create and manage cloud virtual servers, SSH keys, DNS records, block storage, private and public IPs, and more.

Read more about Atlantic.Net Cloud Platform

Users also considered
Guardio logo

Chrome extension for blocking malware and phishing attacks

learn more
Guardio is a Google Chrome extension designed to help businesses provide protection against malware, phishing attacks, and identity theft and remove pop-up messages from the browser. It lets employees prevent unauthorized users from accessing web browsers and remove existing malware from devices via a unified platform.

Read more about Guardio

Users also considered
NordPass Business logo

Business password manager for advanced cybersecurity.

learn more
NordPass’ end-to-end encryption and zero-knowledge architecture ensure the highest standard of security. Zero-knowledge means that only you know what is stored in your NordPass Vault. In other words, no one — not even the NordPass team— can access your stored data, including passwords, credit card.

Read more about NordPass Business

Users also considered
AppDynamics logo

Application Performance Management (APM)

learn more
AppDynamics Application Intelligence platform empowers today’s software-defined businesses with the ability to proactively manage and optimize complex software environments in real time. It’s more than monitoring—it’s true Application Intelligence with cloud or on-premise deployment flexibility.

Read more about AppDynamics

Users also considered
GAT Labs logo

Auditing and security tool for Google Workspace and Chrome

learn more
1st zero-trust environment for Google Workspace which continuously monitors every user’s typing style, actively verifying that the right user is the one logged in. If an impostor is detected, it alerts the Admin or Security Officer with a camera shot & can shut down the session & log out the user.

Read more about GAT Labs

Users also considered
Logz.io logo

Machine data analytics based on ELK and Grafana

learn more
Logz.io is SOC 2 Type 2, HIPPA, ISO27001, PCI Level 1 and GDPR compliant, adhering to the strictest security policies, guaranteeing data is secure and safe.

Read more about Logz.io

Users also considered
vRx logo

Simplified Vulnerability Remediation

learn more
Efficiently Reduce Organizational Security Risk with vRx's leading vulnerability management platform that provides an efficient way to patch-less and get more.
vRx enables companies to analyze, prioritize, and act against software vulnerabilities with or without a security patch.

Read more about vRx

Users also considered
Invicti logo

Zero-Noise AppSec & Vulnerability Management Platform

learn more
DAST-first platform for scalable, accurate application security. Combines DAST, IAST, API security, SAST, static and dynamic SCA, and container security to find and prove real risks—eliminating noise, automating remediation, and empowering teams to secure everything from a single platform.

Read more about Invicti

Users also considered
Rublon logo

Workforce Multi-Factor Authentication for SMB and Enterprise

learn more
Secure local and remote access to networks, servers and applications using multi-factor authentication (MFA) with hardware and software authentication methods like U2F/WebAuthn Security Keys, Mobile Push, Mobile Passcode (TOTP), SMS Passcode and Email Link. Use Active Directory as Identity Provider.

Read more about Rublon

Users also considered
Secomea logo

Secure Remote Access solution purpose-built for OT equipment

learn more
Secomea is a Secure Remote Access (SRA) solution purpose-built for industrial networks and OT equipment.
Over 9.500 customers around the world use it every day across thousands of sites to manage remote access to their machines and prevent downtime.
Let us help you defend your factory floor.

Read more about Secomea

Users also considered
Blumira logo

Automated SIEM + XDR for IT Teams

learn more
Blumira’s cloud SIEM can be deployed in hours with broad integration coverage across cloud, endpoint protection, firewall and identity providers including Azure, Office 365, G Suite, Crowdstrike, Okta, Palo Alto, Cisco FTD and many others.

Read more about Blumira

Users also considered
ESET Cloud Office Security logo

Security platform for Microsoft 365 applications

learn more
ESET Cloud Office Security provides advanced protection for Microsoft 365 applications against malware, spam or phishing attacks with ultimate zero-day threat defense and an easy-to-use console.

Read more about ESET Cloud Office Security

Users also considered
Elastic Security logo

Security at the speed of Elastic

learn more
Unify SIEM, endpoint security, and cloud security
Elastic Security modernizes security operations

Read more about Elastic Security

Users also considered
Hexiosec ASM logo

Identify your vulnerabilities before the hackers.

learn more
Hexiosec ASM is a passive attack surface management solution designed to help businesses protect their online infrastructure.

Scan your business to discover your internet-connected infrastructure, assets, and shadow IT.

Check for vulnerabilities, misconfigurations and exposed data quickly.

Read more about Hexiosec ASM

Users also considered
SpinOne logo

All-in-One SaaS Security for Mission-Critical SaaS Apps

learn more
SpinOne is an all-in-one SaaS security platform that protects SaaS data for mission critical apps so that enterprises can mitigate risk, save time, reduce downtime, and improve compliance.

Read more about SpinOne

Users also considered
Carbon Black Endpoint logo

Protect endpoints and workloads from advanced threats

learn more
VMware Carbon Black Endpoint platform empowers security teams to detect and respond to advanced threats with less operational friction.

Read more about Carbon Black Endpoint

Users also considered
Strong Network logo

Strong Network Secure Cloud Development Environment Platform

learn more
Strong Network delivers a self-hosted platform that allows organizations to manage the first secure Cloud Development Environments (CDEs). They use secure CDEs to provide access to their developers to ready-to-code linux development environments with native data security.

Read more about Strong Network

Users also considered
Loggly logo

Cloud log management and monitoring

learn more
SolarWinds Loggly, part of the SolarWinds DevOps suite is a log management solution. Charts and dashboards and alerts to email or popular endpoints like Slack, PagerDuty, Jira, or custom webhooks help monitor app performance, system behavior, key resources, and detect anomalies in your environment.

Read more about Loggly

Users also considered
Ansys Cloud Direct logo

Ansys Cloud HPC as easy as it should be

learn more
Access Ansys Cloud Direct anywhere, anytime to obtain endless simulation capabilities compatible with most Ansys solvers..

Read more about Ansys Cloud Direct

Users also considered