Best Compliance Software for Linux - Page 6

Compare the Top Compliance Software for Linux as of November 2025 - Page 6

  • 1
    Commvault Cloud
    Commvault Cloud is a comprehensive cyber resilience platform designed to protect, manage, and recover data across diverse IT environments, including on-premises, cloud, and SaaS applications. Powered by Metallic AI, it offers advanced features such as AI-driven threat detection, automated compliance tools, and rapid recovery capabilities like Cleanroom Recovery and Cloudburst Recovery. The platform ensures continuous data security through proactive risk scanning, threat hunting, and cyber deception, while facilitating seamless recovery and business continuity with infrastructure-as-code automation. With a unified management interface, Commvault Cloud enables organizations to safeguard their critical data assets, maintain compliance, and swiftly respond to cyber threats, thereby minimizing downtime and operational disruptions.
  • 2
    GovEVA

    GovEVA

    GovEVA

    GovEVA, is a leading SaaS company dedicated to empowering organizations seeking sustainable growth through effective strategy and automation. With our innovative product, we provide a comprehensive solution to help companies implement Environmental, Social, and Governance (ESG) practices throughout their organization. Our unique approach, known as the "OUR 7 Step Approach," ensures a seamless and successful integration of ESG principles. Let's explore the steps: 1. Materiality Assessment 2. Current State Baseline 3. Measurement And Real-Timeline Tracking Of Quantitative ESG Parameters. 4. Gap Analysis 5. Strategic Roadmap For ESG Enhancement 6. Actions & KPIs 7. Reporting
  • 3
    IBSFINtech

    IBSFINtech

    IBSFINtech India Private Ltd.

    IBSFINtech is a global enterprise TreasuryTech company providing end-to-end digitization & automation solutions for corporates' Cash & Liquidity, Treasury, Risk, Trade Finance (TRTFM®) & Supply Chain Finance functions. Our product portfolio includes On-prem solutions, SaaS TMS - InTReaX™ & Supply Chain solution VNDZY®. Our prestigious list of clientele is spread across verticals and geographies, including, Vedanta Group, Mahindra, Sai Life Sciences Ltd, Bluestar Ltd, Polycab Ltd, and Future Group,. We have also been awarded a very prestigious award of the treasury ecosystem, “The Corporate Treasurer – House Awards”, recognizing IBSFINtech as the Software Provider for the APAC region in this niche space. The “Made-In-India” Comprehensive Risk Management solution offering enables a holistic approach toward Compliance, Financial, and Operational Risk management.
  • 4
    AML Manager
    This best-in-class anti-money laundering solution covers a complete range of compliance processes and practices, providing a fully integrated, time-saving solution to meet all the compliance and risk management needs of your financial institution. AML Manager combines technologically advanced features and a user-friendly, data-rich interface with powerful prevention and detailed tracking tools. It makes the investigation of suspicious activity simpler and more effective. Based on behavioral profiling and peer group analysis and rules, the intelligent transaction monitoring in AML Manager uncovers only those alerts with the highest degree of risk, which significantly minimizes the number of false positives. The easy-to-use investigation interface in AML Manager, with advanced drill-down and link analysis, makes it easy to uncover suspicious networks and associations. The interface supports profile investigation capabilities, such as peer-group comparison.
  • 5
    Datafisher LMS

    Datafisher LMS

    Datafisher

    Datafisher LMS is the most comprehensive and adaptable LMS that helps your business and team automate digital trainings, saving you time and money. Datafisher LMS comes with innovative features, integrations, and user experience, no matter where your team is located. With guaranteed value, our Datafisher LMS is perfect for any size company, from a small team to a large corporation. With an LMS in place, everyone can manage their own schedule, as the content is always available and accessible on any device, including as a mobile app LMS. It’s also easy to adapt your training to individual needs and to assign any content or training to a target group or individual. You never have to worry about managing progress with the ability to track, monitor and receive reports on all the users’ training progress.
    Starting Price: $460 per month
  • 6
    Cyberwatch

    Cyberwatch

    Cyberwatch

    Manage all your vulnerabilities, from their detection to their correction. Cyberwatch helps you to get a complete and contextualized list of assets and technologies in your Information System. Cyberwatch continuously searches for vulnerabilities published by the authorities (CERT-FR, NVD...) and present on your IT assets. Cyberwatch evaluates your vulnerabilities based on their CVSS score, the existence of an exploit, and the business context of the affected machine. Cyberwatch lets you make the right decisions using dashboards and simple actions (comment, exclude...). Cyberwatch natively embeds a Patch Management module, compatible with your infrastructure (WSUS / RedHat Satellite...). Define your compliance rules and control your information system. Cyberwatch helps you to get a complete and contextualized list of assets and technologies in your Information System. Cyberwatch allows you to define your objectives thanks to an encyclopedia of rules with pre-sets.
  • 7
    Interfacing Digital Business Platform
    Interfacing’s Digital Business Platform uses flow management technology that illustrates tasks and works in a flow diagram, focusing on the people performing the tasks and their individual roles. Digital Business Platform can help companies build, improve, and share processes from a central repository. Business rules can then be applied at any stage of the workflow to automate tasks or minimize manual intervention. The ability to track and provide status reports throughout each phase of a process allows for accurate performance and coordination across manual and systemized tasks. Having our Digital Business Platform along with our EPC system will definitely strengthen collaboration between IT development and operations, streamline test, automate workflows, and offer big bottom-line benefits. Interfacing’s digital business platform – Rapid Application Development (RAD) Tools, with its Low-Code Development methodology will optimize usage of your technical resources.
  • 8
    Stacklet

    Stacklet

    Stacklet

    Stacklet builds on the Cloud Custodian project to offer an out-of-the-box solution with powerful management capabilities and advanced features to help businesses realize value. Stacklet is built by the original developer and maintainer of Cloud Custodian. Cloud Custodian is used by thousands of well-known global brands today. The project’s community has hundreds of active contributors including Amazon, Microsoft and Capital One and is growing rapidly. Stacklet provides a best-of-breed solution for cloud governance addressing needs around Security, Cost Optimization and Regulatory Compliance. Tooling to manage Cloud Custodian at scale across thousands of cloud accounts, policies and regions. Access to best practice policy sets which solve business problems out-of-the-box. Data and visualizations to understand policy health, resource auditing, trends and anomalies. Real-time inventory, historical revisions and change management of cloud assets.
  • 9
    Drata

    Drata

    Drata

    Drata is the world’s most advanced security and compliance automation platform with the mission to help companies earn and keep the trust of their users, customers, partners, and prospects. Drata helps hundreds of companies streamline their SOC 2 compliance through continuous, automated control monitoring and evidence collection, resulting in lower costs and less time spent preparing for annual audits. The company is backed by Cowboy Ventures, Leaders Fund, SV Angel, and many key industry leaders. Drata is based in San Diego, CA.
    Starting Price: $10,000/year
  • 10
    Vault Platform

    Vault Platform

    Vault Platform

    Designed to support a culture of trust and safety, Vault is revolutionising the way that misconduct is reported and resolved. Using advanced technology, Vault overcomes the main challenges companies face when trying have a meaningful impact on unacceptable behaviour in the workplace empowering individuals to speak up and report the misconduct and providing organisations with the tools internally to resolve the issues, before they have a chance to spread. The most advanced incident reporting tool you can give your workforce. The Vault App is a trusted and highly accessible way of capturing all relevant details of an incident, creating a frictionless experience encouraging people to come forward internally. A web-based interface that extends the reach of the Vault speak up platform to your entire business ecosystem including customers, supply chain partners, and members of the public.
  • 11
    IBM Guardium Data Compliance
    Simplifies data regulation needs, enhances visibility and streamlines monitoring IBM® Guardium® Data Compliance helps organizations to move through regulatory compliance and audit requirements more quickly and easily, safeguarding regulated data wherever it resides. Available in IBM® Guardium® Data Security Center, IBM Guardium Data Compliance can reduce audit prep time for data compliance regulations, provide continuous visibility of data security controls, and solve data compliance and data activity monitoring challenges.
  • 12
    FastDox

    FastDox

    FastDox

    Receive crucial documentation from customers in minutes. They simply upload or take a photo of their sensitive information and send it across securely instantly. Unlimited amount of document uploads of any size. Upload and send documents from anywhere zero hassle. Auto-edge cropping and dynamic document alignment. Stand out from the competition and offer your customers a seamless onboarding experience. With the platform doing the hard work for you, you can focus on delivering outstanding service. Unchain your staff from the shackles of admin and allow them to spend time building up your customer base. Our clients have seen an increase in sales of up to 35%. Work smarter not harder - dramatically reduce labour and keep business costs down. FastDox cuts postage costs by 95% and helps to ensure repeat business.
    Starting Price: £40 per user
  • 13
    IBM InfoSphere Optim Data Privacy
    IBM InfoSphere® Optim™ Data Privacy provides extensive capabilities to effectively mask sensitive data across non-production environments, such as development, testing, QA or training. To protect confidential data this single offering provides a variety of transformation techniques that substitute sensitive information with realistic, fully functional masked data. Examples of masking techniques include substrings, arithmetic expressions, random or sequential number generation, date aging, and concatenation. The contextually accurate masking capabilities help masked data retain a similar format to the original information. Apply a range of masking techniques on-demand to transform personally-identifying information and confidential corporate data in applications, databases and reports. Data masking features help you to prevent misuse of information by masking, obfuscating, and privatizing personal information that is disseminated across non-production environments.
  • 14
    Wibmo

    Wibmo

    Wibmo

    We enable banks and fintechs to leverage the full power of technology. Experience the future of secure, frictionless payments with Wibmo’s nextgen authentication platform. ACCOSA IVS is a payment authentication platform that uses 3-D secure 1.0 and EMV 3-D secure 2.X protocols for securing online payments. Coupled with its powerful Risk-Based Authentication (RBA) engine, it provides the frictionless experiences consumers expect. Powered by cutting-edge fraud prevention technology, ACCOSA IVS combines the prowess of EMV 3D secure protocol and a dynamic risk authentication engine to accurately calculate risk scores in real-time. Instantaneously identifies and counters emerging threats in real-time. Implemented with a scalable microservices architecture. Designed to scale for high-volume transactions. Displays your growth story with intuitive analytics. The ACCOSA IVS identity authentication platform combines the best of our consumer identity verification mechanics.
  • 15
    Effiya

    Effiya

    Effiya Technologies

    Effiya Technologies offers a suite of comprehensive solutions to manage anti-money laundering, transaction monitoring, fraud detection and sanctions screening in the banking and financial services sectors. These niche products are developed from deep business insights and understanding of application areas, leveraging latest technologies and software in the financial compliance space. At Effiya Technologies, we strive to apply our insights on machine learning and the expertise built over many years of consulting, to create business applications that can help our client organizations in optimizing their business operations, bring them closer to their customers, and deliver automation benefits by robotizing business processes. From counting trees for conservation projects to developing smart chat bots.
  • 16
    SeaCat

    SeaCat

    TeskaLabs

    Cyber-security and data privacy platform for mobile and IoT applications. Build and operate the app free from any cyber-security incident. SeaCat is a cyber-security platform created by experts, and it features all cyber-security and data privacy must-haves. SeaCat deployment is smooth and hassle-free. SeaCat improves your security level instantly, with no need for custom development. Cyber-security should not come at the cost of the user experience. SeaCat requires no pesky configurations or procedures on the part of the user; SeaCat employs all modern cyber-security features, such as biometrical authorization,  and hardware security modules. SeaCat cyber-security platform consists of a SeaCat SDK that is to be added to a mobile or IoT application, the SeaCat Gateway that is to be installed into the demilitarized zone (DMZ) in front of the application backend servers, and SeaCat PKI that is a service that provides enrolment, access, and identity management.
  • 17
    Vespia

    Vespia

    Vespia

    Vespia is an all-in-one AML solution for verifying and onboarding business customers and partners in under 30 seconds. We help AML-obligated businesses understand whom they are dealing with using the power of AI.
  • 18
    POA

    POA

    Sysmedac Technologies

    Organizations can recognize their strengths and weaknesses by using an efficient internal audit reporting software system. Having the appropriate tools to support people and processes, shorten audit cycles, and provide value to stakeholders is essential for future success with internal audit management solutions.
  • 19
    Bviser

    Bviser

    Bviser

    Bviser is board and committees meeting solution , we have tools for meetings, and we have more than 50 clients and more than 1500 users using our solution.
    Starting Price: $850/year
  • 20
    Tumult Analytics

    Tumult Analytics

    Tumult Analytics

    Built and maintained by a team of differential privacy experts, and running in production at institutions like the U.S. Census Bureau. Runs on Spark and effortlessly supports input tables containing billions of rows. Supports a large and ever-growing list of aggregation functions, data transformation operators, and privacy definitions. Perform public and private joins, filters, or user-defined functions on your data. Compute counts, sums, quantiles, and more under multiple privacy models. Differential privacy is made easy, thanks to our simple tutorials and extensive documentation. Tumult Analytics is built on our sophisticated privacy foundation, Tumult Core, which mediates access to sensitive data and means that every program and application comes with an embedded proof of privacy. Built by composing small, easy-to-review components. Provably safe stability tracking and floating-point primitives. Uses a generic framework based on peer-reviewed research.
  • 21
    NMTY Enterprise
    NMTY Enterprise helps you protect all your privacy-sensitive data within your organization, regardless if it is stored in databases or files. Make NMTY Enterprise part of your IT environment and immediately anonymize all data sources that need to be protected. NMTY Enterprise makes it possible to anonymize data regardless of how it is stored, from databases to individual files. Anonymize data stored in a database or in separate files such as CSV and XML. Data is always anonymized directly within the source. This prevents non-anonymized data from being duplicated unnecessarily. Connections to your data sources support integrated authentication and are always encrypted when stored. In addition to anonymizing datasets, it is also possible to directly anonymize data processed within documents and images. Our solutions are developed based on the latest innovations and integrate directly into your existing processes. This way we ensure we always achieve the maximum result.
  • 22
    PK Protect
    PK Protect is a data protection platform designed to help organizations safeguard sensitive information across diverse environments. It provides robust tools for data discovery, classification, encryption, and monitoring, ensuring that critical data is protected both at rest and in transit. With automated policies and compliance controls, PK Protect enables businesses to meet regulatory requirements like GDPR and HIPAA while minimizing the risk of data breaches. The platform integrates with various systems to provide a unified approach to managing data security across cloud, on-premises, and hybrid environments. By offering real-time visibility and proactive threat detection, PK Protect helps organizations maintain control over their sensitive data and reduce security vulnerabilities.
  • 23
    Oneleet

    Oneleet

    Oneleet

    We help companies build trust by creating real-world security controls, and then attesting to those controls with a SOC 2 report. Oneleet is a full-stack cybersecurity platform that makes effective cybersecurity easy and painless. We help businesses stay secure so that they can focus on providing value to their customers. We'll start by doing a scoping call to learn about your infrastructure, security concerns, & compliance needs. Then we'll build you out a custom security program that is stage-appropriate. We'll perform your penetration test with highly qualified OSCE-certified or OSWE-certified testers, only around 1,000 of whom exist worldwide. Finally, we'll take you through the SOC 2 auditing process with a 3rd party CPA. Oneleet has everything you need to become compliant and secure in one place. Having all tools under one roof makes the compliance journey smooth and seamless.
  • 24
    Cygnus Scan
    Cygnus Scan is an advanced Anti-Money Laundering (AML) screening and monitoring solution developed by Crowe UAE as part of their Cygnus GRC ecosystem. Tailored to meet the stringent requirements of international and UAE-specific AML regulations, it serves as a robust compliance tool for regulated industries such as fintech, insurance, real estate, legal services, and Designated Non-Financial Businesses and Professions (DNFBPs). Key Features of Cygnus Scan Sanction Screening: Real-time matching against global sanctions, watchlists, Politically Exposed Persons (PEP), and adverse media to ensure comprehensive compliance. Transaction Monitoring: Real-time detection and blocking of high-risk transactions, ensuring immediate response to suspicious activities. Risk Scoring: Continuous assessment of financial crime risks associated with customers and suppliers using advanced algorithms and risk parameters. For more information, Crowe UAE Website / Cygnus Scan website.
  • 25
    IBM PowerSC
    IBM PowerSC is a security and compliance solution optimized for virtualized environments on IBM Power servers running AIX, IBM i, or Linux. It integrates security features across different layers of the IBM Power server stack, enabling centralized management of security and compliance for all IBM AIX and Linux on Power endpoints. PowerSC supports industry standards such as PCI DSS, HIPAA, GDPR, and more, through prebuilt security profiles. Key features include real-time compliance monitoring, which provides immediate visibility to administrators when system changes violate configuration policy rules; trusted boot, which measures and attests the integrity of the boot image, operating system, and applications using virtual trusted platform module technology; trusted firewall, which ensures appropriate network isolation for virtual machines; trusted logging, which provides tamper-proof logging and convenient log backup and management; and multifactor authentication.
  • 26
    SafetyChain

    SafetyChain

    SafetyChain Software

    SafetyChain is the #1 Plant Management Platform that improves yield, maximizes productivity, and ensures compliance for process manufacturers. Trusted by over 1,500 facilities, SafetyChain is the only enterprise solution uniting production, quality, safety, and supplier management.
  • 27
    SmartSearch

    SmartSearch

    SmartSearch

    SmartSearch is here to make AML, KYC and Identity Verification compliance easy. The most comprehensive features from an AML Provider. By simply entering the individual’s name, address and date of birth, SmartSearch will complete a full AML/KYC check - including automatic worldwide Sanction and PEP screening - giving you a clear pass or refer result in a matter of seconds. International verification is challenging due to regulatory, cultural and technological differences between countries. But thanks to our unique ability to integrate multiple data sources, we can verify international individuals and businesses. After initial AML/KYC checks have been completed, we continue to monitor all clients daily, alerting you if their Sanctions or PEP status changes. We can also complete retrospective checks on clients to ensure your firm remains compliant at all times.
  • 28
    CMX1 Platform
    Leverage the same Audit Software some of the world's best known brands trust. CMX1's ActivityStudio® makes it easy to develop and execute audit, self-assessment, inspection, evaluation, certification, checklist, and survey programs to ensure quality, safety, compliance and mitigate operational risk. With drag-and-drop policy and visual form building, automated scheduling, comprehensive scoring, ratings & reporting, and CAPA workflows, our clients describe ActivityStudio® as a game changer. The CMX1 Platform enables companies of all sizes to gain control and transparency over their supply chains, deliver quality products and services, and ensure compliance and drive performance across their locations. CMX1 is a user-friendly, cloud-based platform that 800,000+ users across 120 countries use to achieve and maintain Quality and Operational Excellence. Via a single platform, you can manage all your supply chain partners, products, and locations effectively and with confidence.
  • 29
    Credentially

    Credentially

    Credentially.io

    Credentially helps healthcare providers reduce organizational inefficiencies of credentialing and onboarding through automation. Thus, employers and physicians can spend more time taking care of patients and improve patient safety. Credentially's customers take 5 days to sign-up, validate and onboard clinicians compared to an industry average of 60 days.
  • 30
    Recite Me

    Recite Me

    Recite Me

    Recite Me Accessibility Toolbar is one of the leading WCAG & ADA Compliant Toolbars. Enabling users to customize and alter your websites design to fit their specific needs. Perfect for users who experience visual, cognitive and mobility impairments, in addition to a range of other disabilities. Furthermore, Recite Me offers an Accessibility Checker, which is free of charge and can be used to efficiently measure your websites accessibility. Allowing you to detect specific on-site accessibility issues, to fix them and improve your websites accessibility.