Best Compliance Software for Linux - Page 3

Compare the Top Compliance Software for Linux as of December 2025 - Page 3

  • 1
    twelve Directors Portal
    Loomion is the preferred Board management software provider when utmost security and reliable performance is required. Loomion's twelve Directors Portal complies with highest banking security standards is based on SharePoint technology. Loomion offers the only reliable solution in the market if the customer wants to have an on-premise installation. Furthermore, it is also offered off-premise as SaaS in our privately-owned data centers in Switzerland, Luxembourg and Germany.
    Starting Price: $50/month/user
  • 2
    Xybion LIMS
    Xybion LIMS (formerly Labwise XD) is an all-inclusive LIMS, ELN, QMS, and DMS. Xybion LIMS drives lab workflows, instills consistency, improves data quality, and supports regulatory compliance with a complete laboratory management solution that connects with your operating systems with powerful laboratory information management and analytics. Xybion LIMS creates optimized workflows for the unique business needs of all regulated laboratories including research, diagnostics, quality control, stability studies, and more.
  • 3
    Data Rover

    Data Rover

    Data Rover

    Data Rover is an Advanced User Data and Security Management for any Data-Driven Organisation. A single solution for Infrastructure and Security managers that allows data users to explore, manage, process, and protect their data effectively and efficiently, by simultaneously addressing the two primary needs related to the use of data: Cyber Security and Data Management. Data Rover plays a key role in business asset protection and corporate data management policy definition. Data Analytics Check for security flaws and eliminate issues. Simplify the management of permissions. File Auditor It gives you the proof that something was done. Right or Wrong it's not important - JUST the FACTS. Dark Data Makes work faster and safer by optimising the storage resources usage and reducing costs. Involve the users in data management so they can contribute in keeping the storage systems clean and efficient. Advanced Data Exchange Share business data in/out of the company SAFELY.
  • 4
    Cryoserver

    Cryoserver

    Forensic and Compliance Systems

    Cryoserver is an email archiving solution delivered either on-premises or in the cloud. It stores copies of every email sent and received by an organization in a secure archive. It then turns this data into a valuable resource for everyday use. You can be safe in the knowledge that any business-critical information contained in email or IM is safe in Cryoserver, where it is instantly retrievable. Cryoserver solutions are distributed to an international audience covering more than 27+ countries. We are proud to work across all industry sectors with leading and highly respected clients. These include NHS Trusts and healthcare organizations, blue chips, household names, local & national governments, critical infrastructure providers, charities, education, financial services and law firms. We are a pioneer of email archiving.
    Starting Price: $1.00 per user per month
  • 5
    Axonius

    Axonius

    Axonius

    Axonius gives customers the confidence to control complexity by providing a system of record for all digital infrastructure. With a comprehensive understanding of all assets including devices, identities, software, SaaS applications, vulnerabilities, security controls, and the context between all assets, customers are able to mitigate threats, navigate risk, decrease incident response time, automate action, and inform business-level strategy — all while eliminating manual, repetitive tasks. Recognized as creators of the Cyber Asset Attack Surface Management (CAASM) category and innovators in SaaS Management Platform (SMP) and SaaS Security Posture Management (SSPM), Axonius is deployed in minutes and integrates with hundreds of data sources to provide a comprehensive asset inventory, uncover gaps, and automatically enforce policies and automate action.
  • 6
    EncryptRIGHT

    EncryptRIGHT

    Prime Factors

    EncryptRIGHT simplifies application-level data protection, delivering robust encryption, tokenization, dynamic data masking, and key management functionality, along with role-based data access controls and a data-centric security architecture, to secure sensitive data and enforce data privacy. EncryptRIGHT is architected to deploy quickly with very little integration effort and scale from a single application to thousands of applications and servers on premises or in the cloud. Our unique Data-Centric Security Architecture allows information security teams to comprehensively define an EncryptRIGHT Data Protection Policy (DPP) and to bind the policy to data itself, protecting it regardless of where the data is used, moved or stored. Programmers do not need to have cryptography expertise to protect data at the application layer – they simply configure authorized applications to call EncryptRIGHT and ask for data to be appropriately secured or unsecured in accordance with its policy.
    Starting Price: $0
  • 7
    SHEQsys

    SHEQsys

    SHEQsys

    SHEQsys is an online web application, which allows users and managers to log, investigate, report, and determine trends of Safety, Health, Environment, Risk, and Quality related activities within their organisation. It does this through the use of smaller modules that all work individually, or together, in an easy-to-navigate web interface with in-built wizards to assist users in operating the system. SHEQsys is a framework that allows your organisation to work the way you want. The flexible utilities available enable you to switch features and modules on or off, and flavor nomenclature to your industry, which means this system can be scaled to always meet your needs. Capture only the information that is required, Relevant users and managers are automatically emailed notifications of new entries and actions for their attention, as well as scheduled overdue reports.
  • 8
    Sherpany

    Sherpany

    Sherpany

    Sherpany is the leading Swiss meeting management solution, designed to meet the unique needs of Board, Board Committee, and Executive meetings. Trusted by Europe’s top companies, Sherpany boosts meeting productivity by 45%, streamlining the entire process — from meeting preparation to the distribution of digitally signed meeting minutes and action items. We prioritise security and compliance, with a robust FINMA-approved and ISO270001-certified solution that centralises and ensures appropriate access controls for your sensitive information. In addition to the web-based Sherpany platform, which is accessible through a web browser, we offer native apps for iOS, Windows, and Android, providing convenient access to our meeting management solution across different devices. Our SaaS-based software, coupled with our meeting education and other complementary services, transforms your company's meeting culture and ensures excellent meetings.
    Starting Price: EUR €36.00 per month
  • 9
    Knovos Discovery
    A Holistic eDiscovery Solution Knovos Discovery is eDiscovery made easy. Knovos’ end-to-end solution covers the entire litigation life cycle — from processing, early case assessment, review to production. Our powerful built-in analytics engine enables deep, multidimensional analysis for a 360-degree view of your data.
  • 10
    Tulip

    Tulip

    Tulip

    Tulip's flexible, no-code frontline operations platform helps manufacturers create front-end applications that guide operators, collect data from workers, machines, and devices, and track metrics against your KPIs. With Tulip, companies can digitally transform their operations in days, gaining real-time visibility of their operations to increase productivity, reduce errors, and drive continuous improvement.
    Starting Price: $1,200 per year
  • 11
    Jocata GRID

    Jocata GRID

    Jocata Financial Advisory & Technology

    At Jocata Financial Advisory and Technology, we are a product company building digital lending, digital onboarding, AML, and fraud management solution for the BFSI industry. We are headquartered in Hyderabad and currently serve many leading top banks and NBFCs in India and abroad. Our technology platform, Jocata GRID, is a fast, adaptive digital ecosystem that handles millions of transactions per day, delivering solutions that drive business growth, streamline operations, provide risk-adjusted insights, and ensure regulatory compliance. Our configurable workflow engine brings all key operational stakeholders onto one unique virtual platform for efficient management and monitoring of business processes. From pulling in customer-related information from multiple sources like financial institutions, watchlists, statutory authorities, credit bureaus and social networks, to processing and analyzing it using the latest technologies, and finally, presenting it in the most convenient manner.
    Starting Price: $100,000 per feature per year
  • 12
    Multiplier

    Multiplier

    Multiplier

    Multiplier makes it possible to employ talented people worldwide and build internationally distributed teams. We empower companies of all sizes by working toward creating a borderless, high-performance team that wins. With Multiplier, companies can invite their employees to sign up with us, and we take care of the rest. There's no need to set up any entities or look into labour law compliance as our on-ground legal teams ensure full local compliance. Companies can employ any number of employees in 160+ countries. Employ global talent in just minutes, not days. Pay employees with 100% accuracy and run multi-country payroll easily. Generate compliant contracts quickly. Offer best-in-class benefits and insurance to employees. Manage employee taxes, allowances, bonuses, social contributions, and statutory deductions for employees anywhere in the world. Add freelancers, allow them to raise invoices and expenses, and clear them in their preferred currencies.
    Starting Price: $300 per user per month
  • 13
    Calico Cloud
    Pay-as-you-go security and observability SaaS platform for containers, Kubernetes, and cloud. Get a live view of dependencies and how all the services are communicating with each other in a multi-cluster, hybrid and multi-cloud environment. Eliminate setup and onboarding steps and troubleshoot your Kubernetes security and observability issues within minutes. Calico Cloud is a next-generation security and observability SaaS platform for containers, Kubernetes, and cloud. It enables organizations of all sizes to protect their cloud workloads and containers, detect threats, achieve continuous compliance, and troubleshoot service issues in real-time across multi-cluster, multi-cloud, and hybrid deployments. Calico Cloud is built on Calico Open Source, the most widely adopted container networking and security solution. Instead of managing a platform for container and Kubernetes security and observability, teams consume it as a managed service for faster analysis, relevant actions, etc.
    Starting Price: $0.05 per node hour
  • 14
    SHIELD

    SHIELD

    SHIELD

    Device-First Fraud Prevention with Real-Time Identification & Intelligence. SHIELD's Device Intelligence persistently identifies devices, users, and accounts you can trust — and those you can't. Don't let fraudsters fool you. Make precise decisions about device trustworthiness with the global standard for device identification — SHIELD Device ID. Get the most comprehensive view of every user with real-time actionable device signals and continuous risk profiling. Eliminate risk blind spots, provide superior user experiences, and accelerate growth. Instant insights. No additional codes needed. Gain intelligence without giving PII data. Self-configurable risk thresholds. We return all data, and more. Get the full picture with transparent intelligence. Stay ahead of new and emerging fraud attacks. Real-time attack pattern syncing worldwide.
  • 15
    Pryv.io
    Personal Data & Privacy Management Software - A ready-to-use solution for personal data and consent management. - Pryv.io is a solid foundation on which you build your own digital health solution, so you can collect, store, share and rightfully use personal data. - Maintained and developed by Pryv. Features - Provides latest Pryv.io core system ready for production - User registration and authentication - Granular consent-based access control rights - Data model made for privacy, aggregation and sharing - Full data life-cycle: collect - store - change - delete - REST & Socket.io API - Ease of software integration and configuration - Seamless connectivity and interoperability
  • 16
    ARMATURE Fabric
    With ARMATURE Fabric™ you can manage your accreditation, certification, credentialing, audit, quality, and compliance activities within a single platform. Our software enables you to save time, operate more effectively and securely, and better serve your stakeholder communities. Whether you are managing institutional, programmatic, or specialized accreditation programs; certifying individuals, products, or organizations; conducting audits or assessments; or resolving non-conformances or other issues, ARMATURE Fabric can make it easier and more efficient for you and your stakeholders. Our secure, cloud-based software allows you to collect data in multiple ways (through online applications, audits, assessments, self-evaluations, inspections, forms, and surveys); manage your accreditation, certification, audit, and compliance workflows; capture and manage documents and artifacts, identify and remediate issues; generate reports; and spot new trends.
  • 17
    IntegrityNext

    IntegrityNext

    Integrity Next GmbH

    IntegriytNext is a leading solution for supply chain sustainability management that empowers companies to improve supply chain sustainability and meet regulatory ESG requirements. The cloud-based platform enables companies to quickly and cost-effectively check their supplier base against sustainability-related regulations (e.g. the German Supply Chain Act), standards (e.g. international human and labour rights), and voluntary commitments (e.g. supply chain decarbonization / Net Zero). IntegrityNext helps its clients identify and manage ESG risks along the value chain, reducing reputational and financial risks and improving sustainability performance.
  • 18
    WSO2 Identity Server
    WSO2 Identity Server is API-driven, is based on open standards with the deployment options of on-premise, cloud or hybrid. It supports complex IAM requirements given its high extensibility. WSO2 Identity Server helps you do single sign-on and identity federation backed by strong and adaptive authentication, securely expose APIs, and manage identities by connecting to heterogeneous user stores. Leverage the power of open-source IAM in your enterprise to innovate fast and build secure Customer IAM (CIAM) solutions to provide an experience your users will love
  • 19
    Protegrity

    Protegrity

    Protegrity

    Our platform allows businesses to use data—including its application in advanced analytics, machine learning, and AI—to do great things without worrying about putting customers, employees, or intellectual property at risk. The Protegrity Data Protection Platform doesn't just secure data—it simultaneously classifies and discovers data while protecting it. You can't protect what you don't know you have. Our platform first classifies data, allowing users to categorize the type of data that can mostly be in the public domain. With those classifications established, the platform then leverages machine learning algorithms to discover that type of data. Classification and discovery finds the data that needs to be protected. Whether encrypting, tokenizing, or applying privacy methods, the platform secures the data behind the many operational systems that drive the day-to-day functions of business, as well as the analytical systems behind decision-making.
  • 20
    Thales Sentinel
    Sentinel Software Monetization solutions combine licensing, protection, and entitlement​​​​​​​ management to drive business growth. Let Sentinel help you extract the most value from your software. Our software solutions help customers generate new revenue streams, improve operational efficiency, increase customer satisfaction, and gain valuable business insights. Based on award-winning technology, Sentinel has a strong global customer base with over 10,000 customers, in 30 industries located in over 100 countries. Sentinel solutions enable you to offer flexible business models, capture new revenue opportunities, and minimize revenue leaks. Sentinel solutions enable you to simplify supply chain processes, ensure business continuity, reduce risk, and eliminate operational overhead. Sentinel solutions enable you to create a highly personalized and fully connected user experience to increase customer satisfaction, reduce churn, and strengthen brand loyalty.
  • 21
    Canopus EpaySuite

    Canopus EpaySuite

    Canopus Innovative Technologies

    Canopus connects you to a full spectrum of digital banking and payment functionalities. Our one-stop-shop solution includes everything you need for your Fintech business – software, open API and connections to the most important partners, e.g., banks, forex, card issuers and acquirers. We offer the most popular functionalities any Payment Service Provider, no matter the size, needs - customer onboarding and AML, digital banking, SWIFT/SEPA payments, forex, payments to card, card issuing, payment acquiring and crypto payments.
    Starting Price: $45000.00/one-time
  • 22
    Uptycs

    Uptycs

    Uptycs

    Uptycs is the first unified CNAPP and XDR platform. Reduce risk by prioritizing responses to threats, vulnerabilities, misconfigurations, sensitive data exposure, and compliance mandates. With Uptycs, you can protect your entire enterprise, from laptops and servers to public and private cloud infrastructure. The platform streamlines your response to threats and offers a single UI and data model for easy management. Uptycs ties together threat activity as it traverses on-prem and cloud boundaries, delivering a more cohesive security posture. If you're looking for a powerful security solution that eliminates silos and tool sprawl, Uptycs is the answer. Looking for acronym coverage? We have you covered, including CNAPP, CWPP, CSPM, KSPM, CIEM, CDR, and XDR. Start with your Detection Cloud, Google-like search, and the attack surface coverage you need today. Be ready for what’s next. Shift up with Uptycs.
  • 23
    BigID

    BigID

    BigID

    BigID is data visibility and control for all types of data, everywhere. Reimagine data management for privacy, security, and governance across your entire data landscape. With BigID, you can automatically discover and manage personal and sensitive data – and take action for privacy, protection, and perspective. BigID uses advanced machine learning and data intelligence to help enterprises better manage and protect their customer & sensitive data, meet data privacy and protection regulations, and leverage unmatched coverage for all data across all data stores. 2
  • 24
    Armis Centrix
    Armis Centrix™ is a comprehensive cyber exposure management platform that provides continuous, real-time visibility and protection across IT, OT, IoT, and IoMT environments. Powered by the Armis AI-driven Asset Intelligence Engine, it identifies every connected device, assesses cyber risk, and monitors vulnerabilities across an organization’s entire digital attack surface. The platform automates risk scoring, streamlines compliance reporting, and supports rapid incident response through deep asset intelligence. With capabilities that span asset management, OT/IoT security, medical device protection, and early warning threat detection, Armis Centrix™ enhances operational resilience for modern enterprises. VIPR Pro adds advanced prioritization and remediation to connect findings directly to actionable fixes. Designed as a cloud-native, frictionless platform, Armis Centrix™ empowers organizations to reduce exposure, strengthen security posture, and maintain continuity at scale.
  • 25
    sam

    sam

    secova USA

    Since 2008, secova has gone to market globally with our fully integrated EHS solution called "sam". sam consists of an EHS Base module with Training, Certification, and Qualifications for your employees and visitors (3rd party and casual site visitors). You can leverage our pre-loaded editable courses, load your existing company-specific content or create your own content. Our solution is modular with optional fully integrated modules such as Incident Management, Risk Management & Hazardous Materials (incl. SDS Management), and Visitor Management, to name but a few. For the end-user, the system is as easy to use as an ATM machine and we offer multi-language support. For the managers and supervisors, the system is intuitive with drag and drop functionality. Over 3,000,000 satisfied users at 2,000+ customers!
  • 26
    Easy2Meet

    Easy2Meet

    Easy2Meet BV

    Easy2Meet is developed with the idea of helping organizations take their meeting process to a higher, efficient and effective level. Our board meeting software is integrated with Microsoft 365 and Microsoft Azure, this differentiates Easy2Meet from other meeting software. The combination of Microsoft features and Easy2Meet creates the perfect solution for efficient, safe and easy board meetings for everyone. Organize your meeting; Drag and drop the agenda items in the right order, make use of sub-levels and share the agenda with the participants. And easily move your agenda to future meetings. Meeting documents are automatically converted to pdf and saved in your SharePoint environment. Make optimal use of the functionality and security principles already present in Microsoft 365. Easy2Meet is ISAE 3402 accredited Add tasks and decisions per agenda item and assign them to specific participants. Create minutes easily
  • 27
    Auditrunner

    Auditrunner

    Auditrunner

    The Secure Audit, Risk, Compliance & Quality Software. With On-Premise and Cloud-based deployment options. Auditrunner offers granular encryption and role-based access control for audit files and documents at-rest. All data transfers are protected. We have automated 3000+ business processes for enterprises around the world. Our GRC platform modules are just a few of them. Cloud-based or On-Premise, deploy and start using. Hassle-free integration process enables you to enjoy the benefits of the platform within weeks of kickoff . The low-code platform we are built upon is fully customizable and allows for compliance with any standard or regulation. Operate in a responsive manner in today’s fast-moving, ever-changing regulatory environment and comply with multitude of different legislation instantly without the need for assistance. The ease of use we offer is unmatched.
    Starting Price: $850/month
  • 28
    BACKUP EAGLE

    BACKUP EAGLE

    Schmitz RZ Consult GmbH

    BACKUP EAGLE Backup Monitoring, Reporting, Audit & Compliance for IBM Spectrum Protect, IBM Spectrum Protect Plus, DellEMC NetWorker, Veeam, Rubrik, SEP sesam, IBM BRMS, RMAN, CommVault and more. Everything that can be automatically created for your backup environment is provided directly by BACKUP EAGLE®. Reliable detection of missing backups and application servers without any backup. Various analyses about backups and restores, backup clients, backup servers and backup devices. Different authorizations can be mapped in BACKUP EAGLE® for users defined in AD / LDAP. BACKUP EAGLE® enables the comparison between the application servers in the CMDB and the actually backed up servers.
  • 29
    MobieTrain

    MobieTrain

    MobieTrain

    MobieTrain is the #1 Mobile Microlearning App for your Frontline Teams designed for companies to easily create their own learning tracks with own training content and in their own branding. MobieTrain empowers the employees of organisations such as Decathlon, Emirates Post, Timberland, Proximus, Diesel, Vans, Deloitte, Atlas Copco, and the Cities of Rotterdam and Antwerp with the right training content, at the right time, on the device they prefer to help them acquire new skills in their professional and personal lives. The MobieTrain Platform transfers knowledge 6 times more effectively while reducing the time of content creation and administration by more than half.
    Starting Price: €12 / employee / year*
  • 30
    ARMO

    ARMO

    ARMO

    ARMO pioneers a new approach to Cloud Security with an open source powered, behavioral driven, Cloud Runtime Security Platform. ARMOs CADR (Cloud App Detection & Response) solution addresses a major unsolved pain point for organizations running on cloud-native architectures: how to continuously protect dynamic workloads during runtime without overwhelming teams with alerts or interrupting operations. ARMO CADR continuously reduces the cloud attack surface using real-time runtime insights, while actively detecting and responding to threats with true risk context. It includes 2 major products that are tightly integrated together and are part of one platform solution - * Kubernetes-First, runtime driven, Cloud Security Posture mgmt (CSPM) - identifying risks, prioritizing them and offering remediation without breaking applications in production * Real-Time Threat Detection & Response - detecting and responding to active threats across the entire cloud and applications stack