Alternatives to Lynis Enterprise

Compare Lynis Enterprise alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Lynis Enterprise in 2026. Compare features, ratings, user reviews, pricing, and more from Lynis Enterprise competitors and alternatives in order to make an informed decision for your business.

  • 1
    JDisc Discovery
    JDisc Discovery is a comprehensive network inventory and IT asset management solution designed to help organizations gain clear, up-to-date visibility into their IT environment. It automatically scans and maps devices across the network, including servers, workstations, virtual machines, and network hardware, to create a detailed inventory of all connected assets. This includes critical information such as hardware configurations, software installations, patch levels, and relationshipots between devices. One of the standout features of JDisc Discovery is its agentless discovery process, meaning it does not require the installation of any software on individual devices, reducing deployment time and minimizing network impact. It supports a wide range of protocols (e.g., SNMP, SSH, WMI) to gather data, making it compatible with diverse IT environments, whether they are Windows, Linux, or Unix-based.
    Compare vs. Lynis Enterprise View Software
    Visit Website
  • 2
    Cloudflare

    Cloudflare

    Cloudflare

    Cloudflare is the foundation for your infrastructure, applications, and teams. Cloudflare secures and ensures the reliability of your external-facing resources such as websites, APIs, and applications. It protects your internal resources such as behind-the-firewall applications, teams, and devices. And it is your platform for developing globally scalable applications. Your website, APIs, and applications are your key channels for doing business with your customers and suppliers. As more and more shift online, ensuring these resources are secure, performant and reliable is a business imperative. Cloudflare for Infrastructure is a complete solution to enable this for anything connected to the Internet. Behind-the-firewall applications and devices are foundational to the work of your internal teams. The recent surge in remote work is testing the limits of many organizations’ VPN and other hardware solutions.
    Leader badge
    Compare vs. Lynis Enterprise View Software
    Visit Website
  • 3
    Paessler PRTG

    Paessler PRTG

    Paessler GmbH

    Paessler PRTG is an all-inclusive monitoring software solution developed by Paessler. Equipped with an easy-to-use, intuitive interface with a cutting-edge monitoring engine, PRTG optimizes connections and workloads as well as reduces operational costs by avoiding outages while saving time and controlling service level agreements (SLAs). The solution is packed with specialized monitoring features that include flexible alerting, cluster failover solution, distributed monitoring, in-depth reporting, maps and dashboards, and more. PRTG monitors your entire IT infrastructure. All important technologies are supported: • SNMP: ready-to-use and custom options • WMI and Windows Performance Counters • SSH: for Linux/Unix and macOS systems • Traffic analysis using flow protocols or packet sniffing • HTTP requests • REST APIs returning XML or JSON • Ping, SQL, and many more
    Leader badge
    Starting Price: $2149 for PRTG 500
  • 4
    Runecast

    Runecast

    Runecast Solutions

    Runecast is an enterprise CNAPP platform that saves your Security and Operations teams time and resources by enabling a proactive approach to ITOM, CSPM, and compliance. It automates vulnerability assessment, configuration drift management and continuous compliance – for VMware, Cloud and Containers. By proactively using our agentless scanning in real-time admins discover potential risks and remediation solutions before any issues can develop into a major outage. It provides continuous audits against vendor best practices, common security standards, and frameworks such as BSI IT-Grundschutz, CIS, Cyber Essentials, DISA STIG, DORA, Essential 8, GDPR, HIPAA, ISO 27001, KVKK, NIST, PCI DSS, TISAX, VMware Security Hardening Guidelines, and the CISA KEVs catalog. Detect and assess risks and be fully compliant across your hybrid cloud in minutes. Runecast has been recognized with Frost & Sullivan's 2023 European New Product Innovation Award in the CNAPP industry.
  • 5
    SanerNow

    SanerNow

    SecPod Technologies

    SecPod SanerNow is the world's best unified endpoint security & management platform that powers IT/Security Teams automate cyber hygiene practices. It works on an intelligent agent-server model to execute effective endpoint management and security. It gives you accurate vulnerability management with scanning, detection, assessment, prioritization, and remediation capabilities. SanerNow is available on both cloud and on-premise, whose integrated patch management automates patching across all major OSs like Windows, MAC, Linux, and a vast collection of 3rd party software patches. What makes it unique? You can now access other salient features like security compliance management, IT asset management, endpoint management, software deployment, application & device control, and endpoint threat detection and response, all on a single platform. With SanerNow, you can remotely perform and automate these tasks to secure your systems from the emerging wave of cyberattacks.
    Starting Price: $50/year/device
  • 6
    Netwrix Auditor
    Netwrix Auditor is a visibility platform that enables control over changes, configurations and access in hybrid IT environments and eliminates the stress of your next compliance audit. Monitor all changes across your on-prem and cloud systems, including AD, Windows Server, file storage, databases, Exchange, VMware and more. Simplify your reporting and inventory routines. Regularly review your identity and access configurations, and easily verify that they match a known good state.
  • 7
    Scrut Automation
    With Scrut, automate your risk assessment and monitoring, build your own unique risk-first infosec program, effortlessly manage multiple compliance audits, and demonstrate trust with your customers, all from a single window. Discover cyber assets, set up your infosec program and controls, continuously monitor your controls for 24/7 compliance, and manage multiple compliance audits simultaneously, all through a single window on Scrut. Monitor risks across your infrastructure and application landscape in real-time and continuously stay compliant with 20+ compliance frameworks. Collaborate with team members, auditors, and pen-testers with automated workflows and seamless artifact sharing. Create, assign, and monitor tasks to manage daily compliance with automated alerts and reminders. With the help of 70+ integrations with commonly used applications, make continuous security compliance effortless. Scrut’s intuitive dashboards provide quick overviews and insights.
  • 8
    JumpCloud

    JumpCloud

    JumpCloud

    JumpCloud® delivers a unified open directory platform that makes it easy to securely manage identities, devices, and access across your organization. With JumpCloud, IT teams and MSPs enable users to work securely from anywhere and manage their Windows, Apple, Linux, and Android devices from a single platform. Everything in One Platform Grant users Secure, Frictionless Access™ to everything they need to do their work however they choose. Manage it all in one unified view. Cross-OS Device Management Manage Windows, macOS, Linux, iOS, iPad, and Android devices. One Identity for Everything Connect users to thousands of resources with one set of secure credentials. Comprehensive Security Enforce device policies, patches, MFA, and other security and compliance measures. Automated Workflows Connect to whatever resources you need, including Microsoft Active Directory, Google Workspace, HRIS platforms, and more.
  • 9
    Pareto Security
    Pareto Security is an app that regularly checks Mac's security configuration. With Pareto Security for business, managers can non-intrusively check that team has correctly configured security on Mac. Mac comes with a number of built-in security settings that can help businesses prevent data from being stolen or accessed by unauthorized people. Pareto Security checks devices to see if specific settings have been turned on and lets teams know what can be improved. Pareto Security checks Mac against a list of security settings, including whether FileVault and Firewall are on, AirPlay receiver is off, boot is secure, and password is on after inactivity. Additional security checks are being consistently added.
  • 10
    OSE

    OSE

    Open Seas

    Once hacked, compromised organizations face huge barriers to rebuilding customer trust and brand reputation. OSE detects & alerts to attacks on your critical systems as they occur so you can stop them before damage is done to your organization's IP, brand and reputation with the ensuing loss of customer trust. OSE provides an audit of an attack listing what was changed, what it was before making it quick to resolve. OSE reporting helps with ISO 27000 compliance. OSE (Operating system Security Enforcer) implements your defined Security Policy which can either be an out of the box OSE standard or your personalized version. Rolling-out & apply the security policy on all Unix, Linux & Windows corporate servers. The Autonomous OSE Agent is permanently located on a Unix/Linux server. It is persistent, even in case of network failure. It can also group a set of servers monitored by OSE Agents.
  • 11
    JDeveloper
    Oracle JDeveloper is a free integrated development environment that simplifies the development of Java-based applications addressing every step of the application lifecycle. JDeveloper offers complete end-to-end development for Oracle's platform and Oracle's applications. JDeveloper is a cross-platform IDE that is available in two editions, Oracle JDeveloper Studio with all features and Oracle JDeveloper Java with core Java and XML features. JDeveloper runs on Windows, Linux, Mac OS X, and other UNIX-based systems and is the development platform for the Oracle Fusion Middleware suite of products. Jdeveloper is the main development platform for the Oracle Fusion Middleware suite of products. It is a cross-platform IDE that runs on Windows, Linux, Mac OS X, and other UNIX-based systems. The roles that JDeveloper provides tailor the environment to development needs. The selected role decides which features and options are available for development.
  • 12
    OpenText Exceed
    OpenText™ Exceed™ is a Windows remote access solution for graphically demanding Linux and UNIX software solutions, such as CAD and CAM. Exceed integrates Windows desktop with UNIX, Linux, VMS, X Window System and IBM iSeries and z/OS system environments. A secure, high-performance X Window server, Exceed offers secure and reliable access to X Window applications from Microsoft Windows and Citrix virtual desktops over the LAN. Many engineering, architectural and product design software solutions are implemented on Linux and UNIX, using Linux X Window (X11) graphics technology. A Windows X Server runs these graphical UNIX and X11 applications on Microsoft Windows, rather than costly high-end graphical Linux and UNIX workstations. In order to access the graphically demanding software from Windows, organizations require high performance remote access LAN to LAN software.
  • 13
    AD Bridge

    AD Bridge

    BeyondTrust

    Extend Microsoft® Active Directory authentication, single sign-on capabilities, and group policy configuration management to Unix & Linux systems with AD Bridge. Consistent tools across the enterprise. Provide a single familiar toolset to manage both Windows and Unix/Linux systems. Streamline compliance processes. Provide thorough audit details to audit and compliance teams and manage group policies centrally. Extend security policies. Expand single sign-on (SSO) and file sharing, and control access to non-Windows systems. BeyondTrust AD Bridge centralizes authentication for Unix and Linux environments by extending Active Directory’s Kerberos authentication and single sign-on capabilities to these platforms. By extending group policy to non-Windows platforms, BeyondTrust provides centralized configuration management, reducing the risk and complexity of managing a heterogeneous environment. Extend native group policy management tools to include settings for Unix and Linux.
  • 14
    Bash

    Bash

    Bash

    Bash is a free software Unix shell and command language. It has become the default login shell for most Linux distributions. In addition to being available on Linux systems, a version of Bash is also available for Windows through the Windows Subsystem for Linux. Bash is the default user shell in Solaris 11 and was the default shell in Apple macOS from version 10.3 until the release of macOS Catalina, which changed the default shell to zsh. Despite this change, Bash remains available as an alternative shell on macOS systems. As a command processor, Bash allows users to enter commands in a text window that are then executed by the system. Bash can also read and execute commands from a file, known as a shell script. It supports a number of features commonly found in Unix shells, including wildcard matching, piping, here documents, command substitution, variables, and control structures for condition testing and iteration. Bash is compliant with the POSIX shell standards.
  • 15
    BeyondTrust Endpoint Privilege Management
    Eliminate unnecessary privileges and elevate rights to Windows, Mac, Unix, Linux and network devices without hindering productivity. Our experience implementing across over 50 million endpoints has helped create a deployment approach with rapid time to value. Available on-premise or in the cloud, BeyondTrust enables you to eliminate admin rights quickly and efficiently, without disrupting user productivity or driving up service desk tickets. Unix and Linux systems present high-value targets for external attackers and malicious insiders. The same holds true for networked devices, such as IoT, ICS and SCADA. Gaining root or other privileged credentials makes it easy for attackers to fly under the radar and access sensitive systems and data. BeyondTrust Privilege Management for Unix & Linux is an enterprise-class, gold-standard privilege management solution that helps security and IT organizations achieve compliance.
  • 16
    CleverView for TCP/IP on Linux
    The majority of IT departments are in the midst of redesigning their data centers. This interest is driven primarily by the desire to reduce cost while simultaneously implementing the ability to support an increasingly virtualized, cloud-enabled, and dynamic data center. One of the most important characteristics of the contemporary data center is that an ever-increasing amount of the traffic is between servers, and a majority of these servers are Linux or UNIX-based. As such, a critical goal of the next-generation data center is to facilitate high availability and performance-tuned server-to-server communications. IT staff need access to server performance and availability details from not only their browser desktops, but also their cell phones, and they need a more concise way to view server status. Focusing on consolidation, virtualization and Cloud computing.
  • 17
    VirtualMetric

    VirtualMetric

    VirtualMetric

    VirtualMetric is a powerful telemetry pipeline solution designed to enhance data collection, processing, and security monitoring across enterprise environments. Its core offering, DataStream, automatically collects and transforms security logs from a wide range of systems such as Windows, Linux, MacOS, and Unix, enriching data for further analysis. By reducing data volume and filtering out non-meaningful logs, VirtualMetric helps businesses lower SIEM ingestion costs, increase operational efficiency, and improve threat detection accuracy. The platform’s scalable architecture, with features like zero data loss and long-term compliance storage, ensures that businesses can maintain high security standards while optimizing performance.
  • 18
    beSECURE

    beSECURE

    Beyond Security (Fortra)

    A flexible, accurate, low maintenance Vulnerability Assessment and Management solution that delivers solid security improvements. Designed to get you the most accurate and fastest possible improvement in network security customized for your organization’s needs. Continually scan for network and application vulnerabilities. Daily updates and specialized testing methodologies to catch 99.99% of detectable vulnerabilities. Data driven, flexible reporting options to empower remediation teams. *Bug bounty program* for any discovered proven false positives! Complete organizational control.
  • 19
    Delinea Server Suite
    Easily consolidate complex and disparate identities for Linux and Unix within Microsoft Active Directory. Minimize the risk of a breach and reduce lateral movement with a flexible, just-in-time privilege elevation model. Advanced session recording, auditing, and compliance reporting aid forensic analysis into abuse of privilege. Centralize discovery, management, and user administration for Linux and UNIX systems to enable rapid identity consolidation into Active Directory. Privileged Access Management best practices are easy to follow with the Server Suite. The results are higher levels of identity assurance and a significantly reduced attack surface with fewer identity silos, redundant identities, and local accounts. Manage privileged user and service accounts from Windows and Linux in Active Directory. Just-in-time, fine-grained access control with RBAC and our patented Zones technology. Complete audit trail for security review, corrective action, and compliance reporting.
  • 20
    Slurm
    Slurm Workload Manager, formerly known as Simple Linux Utility for Resource Management (SLURM), is a free, open-source job scheduler and cluster management system for Linux and Unix-like kernels. It's designed to manage compute jobs on high performance computing (HPC) clusters and high throughput computing (HTC) environments, and is used by many of the world's supercomputers and computer clusters.
  • 21
    Nessus

    Nessus

    Tenable

    Nessus is trusted by more than 30,000 organizations worldwide as one of the most widely deployed security technologies on the planet - and the gold standard for vulnerability assessment. From the beginning, we've worked hand-in-hand with the security community. We continuously optimize Nessus based on community feedback to make it the most accurate and comprehensive vulnerability assessment solution in the market. 20 years later and we're still laser focused on community collaboration and product innovation to provide the most accurate and complete vulnerability data - so you don't miss critical issues which could put your organization at risk. Today, Nessus is trusted by more than 30,000 organizations worldwide as one of the most widely deployed security technologies on the planet - and the gold standard for vulnerability assessment.
  • 22
    Postfix

    Postfix

    Postfix

    What is Postfix? It is Wietse Venema's mail server that started life at IBM research as an alternative to the widely-used Sendmail program. Now at Google, Wietse continues to support Postfix. Postfix runs (or has run) on AIX, BSD, HP-UX, IRIX, LINUX, MacOS X, Solaris, Tru64 UNIX, and other UNIX systems. It requires ANSI C, a POSIX.1 library, and BSD sockets. Postfix attempts to be fast, easy to administer, and secure. The outside has a definite Sendmail-ish flavor, but the inside is completely different. Multiple SMTP deliveries over the same TLS-encrypted connection. This reuses the existing tlsproxy(8) and scache(8) services. MySQL stored procedure support. Gradual degradation: in many cases a Postfix daemon will log a warning and continue providing the services that are still available, instead of immediately terminating with a fatal error. Postfix can set the execute bit on a queue file. If this does not work, then no mail will ever be delivered.
  • 23
    OpenSVC

    OpenSVC

    OpenSVC

    OpenSVC is an open source software solution designed to enhance IT productivity by providing tools for service mobility, clustering, container orchestration, configuration management, and comprehensive infrastructure auditing. The platform comprises two main components. The agent functions as a supervisor, clusterware, container orchestrator, and configuration manager, facilitating the deployment, management, and scaling of services across diverse environments, including on-premises, virtual machines, and cloud instances. It supports various operating systems such as Unix, Linux, BSD, macOS, and Windows, and offers features like cluster DNS, backend networks, ingress gateways, and scalers. The collector aggregates data reported by agents and fetches information from the site's infrastructure, including networks, SANs, storage arrays, backup servers, and asset managers. It serves as a reliable, flexible, and secure data store.
  • 24
    Xeams

    Xeams

    Synametrics Technologies

    Xeams is, a secure and powerful complete mail server for Windows, Linux, Solaris, MacOSX and other flavors of UNIX. Xeams supports SMTP, POP3, and IMAP. It features a powerful spam filtering engine that eliminates up to 99% of junk email upon installation. The software offers a flexible approach to email, making it a very user-friendly server. Xeams can block 99% percent of all junk messages right out of the box. The filtering rules are fully customizable and get better as Xeams adapts to your email environment. IMAP and POP3 servers built right into the system to easily fetch emails from an email repository to a client's machine. Xeams can be used as an email firewall in front of another server, such as MS Exchange, or as a full email server requiring no other software to process emails. Use Xeams in front of your Office 365 infrastructure to gain additional filtering, reporting and archiving capabilities that you don't get with Office 365 alone.
    Starting Price: $20.00/year/user
  • 25
    DragonSoft DVM

    DragonSoft DVM

    DragonSoft Security Associates

    The DVM detection project includes security vulnerability detection, vulnerability audit detection, account and setting audit detection, and supports risk assessment and statistics functions. It also has a database scanner to support database vulnerability detection and security risk assessment. D-GCB can detect the information and communication software of government agencies and units to test whether the endpoint device conforms to the TW GCB configuration settings, thereby reducing the risk of internal computer attacks and avoiding information security concerns. Hyper EDR can detect more than 5000 kinds of popular APT malware and hacking tools. This threat-aware mode does not require any Kernel Driver operation and consumes almost no extra CPU resources.
  • 26
    Fink

    Fink

    Fink

    The Fink project wants to bring the full world of Unix open source software to Darwin and Mac OS X. We modify Unix software so that it compiles and runs on Mac OS X ("port" it) and make it available for download as a coherent distribution. Fink uses Debian tools like dpkg and apt-get to provide powerful binary package management. You can choose whether you want to download precompiled binary packages or build everything from source. The project offers precompiled binary packages as well as a fully automated build-from-source system. Mac OS X includes only a basic set of command-line tools. Fink brings you enhancements for these tools as well as a selection of graphical applications developed for Linux and other Unix variants. With Fink the compile process is fully automated; you'll never have to worry about Makefiles or configure scripts and their parameters again. The dependency system automatically takes care that all required libraries are present.
  • 27
    Plus2 Collection Software
    Plus2 is a feature-rich, debtor-based collection product designed for businesses that can accommodate small offices (as few as two users) to enterprise corporations of virtually an unlimited number of workstations. Multiple accounts and checks are combined into one location to allow the operator to gather all the information for a particular debtor. Cyclone's standards are maintained throughout the software making a variety of platforms available when using Plus2. Microsoft Windows, OSX, LINUX/UNIX workstations, thin clients can access and work accounts with Plus2. Secure connections are supported and Internet access is available for those employees who reside offsite. The high-speed network connections provides quick displays as well as allowing multiple sessions per workstation. On the server side - using a powerful Linux/Unix platform produces great reliability and speed for all users.
  • 28
    Masterworks ERP

    Masterworks ERP

    Beckard Associates

    The Masterworks Software by Beckard Associates is a full-service ERP system that includes accounting, warehouse management, and wholesale distribution tools. A platform-agnostic system, Masterworks works with leading operating systems such as Unix, Linux, and Windows. It is suitable for larger enterprises managing more than 5,000 warehouses who are looking to improve their warehouse operations, accounting, customer relationships, and communications with vendors and customers.
  • 29
    Digital Defense
    Providing best-in-class cyber security doesn’t mean blindly chasing the latest trends. It does mean a commitment to core technology and meaningful innovation. See how our vulnerability and threat management solutions provide organizations like yours with the security foundation needed to protect vital assets. Eliminating network vulnerabilities doesn’t have to be complicated, even though that’s what some companies would have you believe. You can build a powerful, effective cybersecurity program that is affordable and easy to use. All you need is a strong security foundation. At Digital Defense, we know that effectively dealing with cyber threats is a fact of life for every business. After more than 20 years of developing patented technologies, we’ve built a reputation for pioneering threat and vulnerability management software that’s accessible, manageable, and solid at its core.
  • 30
    Entire Connection
    Terminal emulation software that connects Windows® users to applications on the mainframe, UNIX®, Linux®, OpenVMS, and BS2000 platforms. Available for Natural on the mainframe. Connect thousands of concurrent Microsoft® Windows® users to applications running on the mainframe, UNIX, Linux, OpenVMS, and BS2000 platforms with highly scalable terminal emulation software, Entire Connection. Protect your application from desktop access by requiring a user ID and password to open a terminal session with Entire Connection. Implement SSO by storing the host user credentials encrypted in the share file and using the Entire Connection script language to log onto the host.
  • 31
    tcpdump

    tcpdump

    tcpdump

    Tcpdump is a powerful command-line packet analyzer that allows users to display the contents of network packets transmitted or received over a network to which the computer is attached. It operates on most Unix-like systems, including Linux, Solaris, FreeBSD, NetBSD, OpenBSD, and macOS, utilizing the libpcap library for network traffic capture. Tcpdump can read packets from a network interface card or from a previously created saved packet file, and it provides options to write packets to standard output or a file. Users can apply BPF-based filters to limit the number of packets processed, enhancing usability on networks with high traffic volumes. The tool is distributed under the BSD license, making it free software. In many operating systems tcpdump is available as a native package or port, which simplifies installation of updates and long-term maintenance.
  • 32
    Axonius

    Axonius

    Axonius

    Axonius gives customers the confidence to control complexity by providing a system of record for all digital infrastructure. With a comprehensive understanding of all assets including devices, identities, software, SaaS applications, vulnerabilities, security controls, and the context between all assets, customers are able to mitigate threats, navigate risk, decrease incident response time, automate action, and inform business-level strategy — all while eliminating manual, repetitive tasks. Recognized as creators of the Cyber Asset Attack Surface Management (CAASM) category and innovators in SaaS Management Platform (SMP) and SaaS Security Posture Management (SSPM), Axonius is deployed in minutes and integrates with hundreds of data sources to provide a comprehensive asset inventory, uncover gaps, and automatically enforce policies and automate action.
  • 33
    OpenLM

    OpenLM

    OpenLM.com

    OpenLM is a leading provider of software license management solutions for engineering software applications. OpenLM software provides monitoring, auditing, reporting and management capabilities for engineering software running under all the leading license managers, such as FLEXlm, Sentinel RMS/HASP, Reprise RLM, IBM LUM, DSLS, MathLM, ArcGis etc. Also supports cloud licenses Office 365, Adobe Cloud, Autodesk Cloud and ESRI Online. OpenLM software is compatible with license managers running on Unix, Linux, MacOS, and Windows Operating systems. Infrastructure minimal hardware requirements • Dual core CPU • 4 GB memory (Recommended – 8 GB) • .NET Framework 4.7.2 or higher • Static MAC address (Cloud based servers must use ENI) The OpenLM Server can be installed on a Windows’ machine only.
    Starting Price: $1980.00/one-time
  • 34
    Armis Centrix
    Armis Centrix™ is a comprehensive cyber exposure management platform that provides continuous, real-time visibility and protection across IT, OT, IoT, and IoMT environments. Powered by the Armis AI-driven Asset Intelligence Engine, it identifies every connected device, assesses cyber risk, and monitors vulnerabilities across an organization’s entire digital attack surface. The platform automates risk scoring, streamlines compliance reporting, and supports rapid incident response through deep asset intelligence. With capabilities that span asset management, OT/IoT security, medical device protection, and early warning threat detection, Armis Centrix™ enhances operational resilience for modern enterprises. VIPR Pro adds advanced prioritization and remediation to connect findings directly to actionable fixes. Designed as a cloud-native, frictionless platform, Armis Centrix™ empowers organizations to reduce exposure, strengthen security posture, and maintain continuity at scale.
  • 35
    zdaemon

    zdaemon

    Python Software Foundation

    zdaemon is a Unix (Unix, Linux, Mac OS X) Python program that wraps commands to make them behave as proper daemons. zdaemon provides a script, zdaemon, that can be used to run other programs as POSIX (Unix) daemons. (Of course, it is only usable on POSIX-complient systems.) Using zdaemon requires specifying a number of options, which can be given in a configuration file, or as command-line options. It also accepts commands teling it what to do. Start a process as a daemon. Stop a running daemon process. Stop and then restart a program. Find out if the program is running. Send a signal to the daemon process. Reopen the transcript log. Commands can be given on a command line, or can be given using an interactive interpreter. We can specify a program name and command-line options in the program command. Note, however, that the command-line parsing is pretty primitive.
  • 36
    Unison File Synchronizer
    Unison is a file-synchronization tool for OSX, Unix, and Windows. It allows two replicas of a collection of files and directories to be stored on different hosts (or different disks on the same host), modified separately, and then brought up to date by propagating the changes in each replica to the other. Unison runs on both Windows and many flavors of Unix (Solaris, Linux, OS X, etc.) systems. Moreover, Unison works across platforms, allowing you to synchronize a Windows laptop with a Unix server, for example. Unlike a distributed filesystem, Unison is a user-level program: there is no need to modify the kernel or to have superuser privileges on either host. Unison works between any pair of machines connected to the internet, communicating over either a direct socket link or tunneling over an encrypted ssh connection. It is careful with network bandwidth and runs well over slow links such as PPP connections.
  • 37
    IBM Guardium Vulnerability Assessment
    IBM Guardium Vulnerability Assessment scans data infrastructures (databases, data warehouses and big data environments) to detect vulnerabilities and suggest remedial actions. The solution identifies exposures such as missing patches, weak passwords, unauthorized changes and misconfigured privileges. Full reports are provided as well as suggestions to address all vulnerabilities. Guardium Vulnerability Assessment detects behavioral vulnerabilities such as account sharing, excessive administrative logins and unusual after-hours activity. It identifies threats and security gaps in databases that could be exploited by hackers. Discover and classify sensitive data in heterogeneous environments. View detailed reporting on entitlements and risky configurations. Automate compliance audits and exception management.
  • 38
    MyChat

    MyChat

    Network Software Solutions

    Secure instant messaging system with own server that can work in local area network and over the Internet. Providing collaboration tools for employee engagement. Built-in knowledge base, important notifications with return receipts, Bulletin board, broadcast messages, flexible server management, the system for user rights to access MyChat features, voice/video calls, screen sharing calls, Kanban project management, conferences, private dialogues, extended contact list, available for all platforms: Windows, macOS, Linux, Android, iOS, WEB.
    Starting Price: $6/per user/one-time
  • 39
    Shell Assistant

    Shell Assistant

    Shell Assistant

    •SSH and SFTP client •Shell Terminal •SFTP File manager •SFTP code editor •Custom tab & split window layouts •Switch between workspaces •Connection, key & password management •Stream audio and video, view images and pdf's, edit code over SFTP •Tunnel network ports •Text editor-like command editing •Paste history •Free & ad-free •Respects your privacy Connect to remote hosts over SSH, including Amazon Web Service EC2, Linodes, Digital Ocean or Raspberry Pis. Connect to local unix-like installations running Mac OS, Linux, MinGW, Cygwin, Git-bash and Windows Subsystem for Linux. A great tool for your toolbox if you work with Unix, Linux, Mac Command Line, Raspberry Pi's or anything that uses a Command Line Interface. To download the latest version, please visit shellassistant.com.
  • 40
    Enginsight

    Enginsight

    Enginsight

    Enginsight is an all-in-one cybersecurity platform made in Germany, combining threat detection and defense capabilities. The features are: Automated security checks, pentesting, IDS/IPS, micro segmentation, vulnerability scans, and risk assessments. It empowers businesses of all sizes to effortlessly implement and monitor robust security strategies through an intuitive interface. Scan your systems automatically and immediately recognize the security status of your IT infrastructure. 100% self-developed (security by design) and has no dependencies on third-party tools. Permanently scan your IT environment for existing devices and create a live image of your IT infrastructure. Automatic detection and unlimited IP inventory of all network devices, as well as their classification. Enginsight provides a comprehensive solution for monitoring and securing your Windows servers, Linux servers and end devices such as Windows PCs or Linux . Start your 15 day free trial now.
    Starting Price: $12.99 per month
  • 41
    Hetman Partition Recovery
    Partition Recovery™ will reliably restore information from damaged FAT/exFAT, NTFS/ReFS, APFS/HFS+, Ext4/3/2/ReiserFS, ZFS and XFS/UFS disks, recovering the original file and folder structure. In addition to existing partitions, the tool discovers all previously created volumes. This allows the user to search and recover files from those deleted volumes. The tool can save the entire logical drive, recovering the original file and folder structure. Supporting all versions of file systems used in all versions of Windows, MacOS, Linux and Unix, this hard drive recovery software can fix problems in storage media of any kind and capacity. Convenient step-by-step wizard and friendly graphical user interface make the recovery process as easy as one-two-three. Partition Recovery™ is Hetman Software top of the line data recovery solution. Fully supporting FAT / exFAT (memory card or USB drive), NTFS / ReFS (Windows), APFS / HFS+ (Apple MacOS), Ext2 / 3 / 4 / ReiserFS / XFS / UFS / ZFS.
    Starting Price: $97.95 one-time payment
  • 42
    Sysgem Enterprise Manager
    Flexible and modular tools for monitoring and managing systems, administering user accounts and auditing security in one single screen - across Windows, UNIX/Linux, OpenVMS and IBM. SEM offers the three core application modules Sysgem System Manager (SSyM), Sysgem Account Manager (SAcM) and Sysgem File Synchronizer (SFiS) which all run via the SEM framework. Unite, simplify and integrate core system administration solutions across a multi-platform environment. Unify user account management across a multi-platform, multi-application environment. Manage the controlled distribution and deployment of configuration files across infrastructure.
    Starting Price: $200 per user per month
  • 43
    Intruder

    Intruder

    Intruder

    Intruder is an international cyber security company that helps organisations reduce their cyber exposure by providing an effortless vulnerability scanning solution. Intruder’s cloud-based vulnerability scanner discovers security weaknesses across your digital estate. Offering industry-leading security checks, continuous monitoring and an easy-to-use platform, Intruder keeps businesses of all sizes safe from hackers. Receive actionable results prioritised by context. Intruder interprets raw data received from leading scanning engines, so you can focus on the issues which truly matter, such as exposed databases.‍ Intruder's high-quality reports help you sail through customer security questionnaires, and make compliance audits like SOC2, ISO27001, and Cyber Essentials a breeze.
  • 44
    IBM Sterling Connect:Direct
    IBM® Sterling Connect:Direct provides security-hardened, point-to-point file transfers to lessen dependency on unreliable File Transfer Protocol (FTP) transfers. It is optimized for high-volume delivery of files within and among enterprises. The solution ensures more reliable movement of files, from batch integration and movement of large images or catalogs to synchronization with remote locations. Sterling Connect:Direct also supports hybrid cloud deployment through certified containers which ensures easy and consistent deployment life-cycle management. IBM Certified Containers for Sterling Connect:Direct are enterprise-grade, security-rich product editions with integrated common software services for consistent deployment life-cycle management including easy install and configure options, management of upgrades and roll-back, scalability, and security. Supports a wide range of platforms including IBM z/OS, OpenVMS, i5/OS, HP NonStop, Microsoft Windows, UNIX and Linux.
  • 45
    Wireshark

    Wireshark

    Wireshark

    Wireshark is the world’s foremost and widely-used network protocol analyzer. It lets you see what’s happening on your network at a microscopic level and is the de facto (and often de jure) standard across many commercial and non-profit enterprises, government agencies, and educational institutions. Wireshark development thrives thanks to the volunteer contributions of networking experts around the globe and is the continuation of a project started by Gerald Combs in 1998. Wireshark® is a network protocol analyzer. It lets you capture and interactively browse the traffic running on a computer network. It has a rich and powerful feature set and is world’s most popular tool of its kind. It runs on most computing platforms including Windows, macOS, Linux, and UNIX. Network professionals, security experts, developers, and educators around the world use it regularly. It is freely available as open source, and is released under the GNU General Public License version 2.
  • 46
    HP-UX

    HP-UX

    Hewlett Packard Enterprise

    Highly integrated UNIX operating system and tools that deliver the highest availability, reliability, and security on mission-critical HPE Integrity servers. Streamline your operations using a highly integrated UNIX operating system with tools that delivers the highest reliability, availability, and security on mission-critical HPE Integrity servers. HP-UX gives you a dynamic, secure, and unified environment and comes pre-integrated on mission-critical HPE Integrity servers. Meet your specific UNIX mission-critical requirements. HP-UX offers four operating environments tailored to specific needs. Holistic server security and system management that includes HPE Systems Insight Manager functionality with power management, health check, and deployment tools. It also provides full performance analysis tools for kernel processes and applications. Protect your business’s most critical applications and services to keep your business on target.
  • 47
    LevelBlue USM Anywhere
    Elevate your security with LevelBlue USM Anywhere, an advanced open XDR platform designed to scale with your evolving IT landscape and growing business needs. Combining sophisticated analytics, robust security orchestration, and automation, USM Anywhere offers built-in threat intelligence for quicker and more precise threat detection, as well as streamlined response coordination. Its flexibility is unmatched, with extensive integrations—referred to as BlueApps—that enhance its detection and orchestration across hundreds of third-party security and productivity tools. These integrations also enable you to trigger automated and orchestrated responses effortlessly. Begin your 14-day free trial now and discover how our platform simplifies cybersecurity.
  • 48
    Tripwire

    Tripwire

    Fortra

    Cybersecurity for Enterprise and Industrial Organizations. Protect against cyberattacks with the industry’s best foundational security controls. Detect threats, identify vulnerabilities and harden configurations in real time with Tripwire. Thousands of organizations trust Tripwire Enterprise to serve as the core of their cybersecurity programs. Join them and regain complete control over your IT environment with sophisticated FIM and SCM. Shortens the time it takes to catch and limit damage from threats, anomalies, and suspicious changes. Gives you deep, unparalleled visibility into your security system state and know your security posture at all times. Closes the gap between IT and security by integrating with both teams' existing toolsets. Out-of-the-box platforms and policies enforce regulatory compliance standards.
  • 49
    EuroLinux Desktop
    EuroLinux Desktop is a breakthrough in the operating system market. It combines the aesthetic and functionality of Windows® and macOS® with the reliability and security of the Enterprise Linux distribution. EuroLinux Desktop introduces several changes to the Linux user interface, making it easy to use for those accustomed to Microsoft® or Apple® software. At the same time, it provides the highest security and stability, because it is built on the source code of Red Hat® Enterprise Linux® 9, commonly used in the most demanding environments such as banks, telecommunications or public sectors. EuroLinux Desktop is designed for individuals and organizations that use Windows® or macOS® daily and are looking for a stable operating system that maintains the aesthetic of the Microsoft® and Apple® solutions and is covered by long-term technical support. EuroLinux Desktop is the answer to the needs of public administration, the financial sector, educational institutions, and normal users.
  • 50
    monarch

    monarch

    Open Systems International

    monarch™ is a state-of-the-art open system architecture designed for unequaled portability and is available on various high-performance hardware and operating system platforms. It is an extensible architecture that scales well from smaller applications to very large distributed network systems. The monarch architecture meets the key criteria for a truly open system: It supports multiple choices in terms of hardware, operating system, virtualization and database platforms, and is expandable, upgradeable and maintainable to the highest degree possible. Key features supported by the monarch platform are: Multiple operating systems including Microsoft Windows®, Linux® and UNIX®. All popular relational database management systems as well as NoSQL technologies. Physical or virtualized hardware configurations, on premise or cloud-deployable. Secure segmented architecture with multiple points of defense and a robust security shield.