Best Compliance Software for Linux - Page 6

Compare the Top Compliance Software for Linux as of November 2025 - Page 6

  • 1
    CCH Tagetik

    CCH Tagetik

    Wolters Kluwer

    Companies trust CCH Tagetik Corporate Performance Management software to save time, lower costs and reduce risk. Get a faster close, more forward looking-planning and in-depth analytics by connecting data, processes and people with a single trusted source. CCH Tagetik Finance Transformation Platform, powered by the Analytic Information Hub, is the unified platform that connects finance and operations and streamlines your consolidation & close, planning, reporting & analytics, disclosures and compliance.
  • 2
    Corporater Business Management Platform
    Corporater enables medium and large organizations to manage their business with integrated software solutions for Governance, Performance, Risk, and Compliance (GPRC) built on the Business Management Platform. Seamlessly manage the areas of GPRC with a single tool. Gain clear view of business performance and strategy health. Keep track of inherent and residual risk values based on the accomplishment of control actions. Manage multiple regulatory compliance frameworks and regulations.
  • 3
    Riskonnect Active Risk Manager (ARM)
    Riskonnect Active Risk Manager is a comprehensive risk management software designed to provide a holistic view of risks at project, program, and enterprise levels. It helps organizations visualize and analyze risk relationships, prioritize mitigation efforts, and prevent small issues from escalating into major disruptions. The platform aggregates risk data from frontline projects to identify trends and emerging threats, enabling more informed decision-making. Users benefit from features like bowtie cause-and-effect analysis, dashboards, heat maps, and schedule & cost impact assessments. Active Risk Manager streamlines risk collaboration, optimizes contingency resource allocation, and automates risk lifecycle management with easy-to-use interfaces and API integrations. It supports industry standards and frameworks such as ISO 31000, COSO, and PMBOK, with flexible deployment options including secure cloud and on-premises configurations.
  • 4
    Teleport

    Teleport

    Teleport

    The Teleport Infrastructure Identity Platform modernizes identity, access, and policy for infrastructure, for both human and non-human identities, improving engineering velocity and resiliency of critical infrastructure against human factors and/or compromise. Teleport is purpose-built for infrastructure use cases and implements trusted computing at scale, with unified cryptographic identities for humans, machines and workloads, endpoints, infrastructure assets, and AI agents. Our identity-everywhere approach vertically integrates access management, zero trust networking, identity governance, and identity security into a single platform, eliminating overhead and operational silos.
  • 5
    Delphix

    Delphix

    Perforce

    Delphix is the industry leader in DataOps and provides an intelligent data platform that accelerates digital transformation for leading companies around the world. The Delphix DataOps Platform supports a broad spectrum of systems, from mainframes to Oracle databases, ERP applications, and Kubernetes containers. Delphix supports a comprehensive range of data operations to enable modern CI/CD workflows and automates data compliance for privacy regulations, including GDPR, CCPA, and the New York Privacy Act. In addition, Delphix helps companies sync data from private to public clouds, accelerating cloud migrations, customer experience transformation, and the adoption of disruptive AI technologies. Automate data for fast, quality software releases, cloud adoption, and legacy modernization. Source data from mainframe to cloud-native apps across SaaS, private, and public clouds.
  • 6
    ComplianceQuest

    ComplianceQuest

    ComplianceQuest

    Fastest growing Enterprise Quality, Health and Safety Management System (QHSE) natively built and run on the Salesforce platform. Unified QHSE solutions, which combine EQMS and EHS, help our customers of all sizes deliver quality products and services in the safest, most sustainable way by mitigating risk, problems, and inefficiencies while protecting customers, employees, suppliers and brand. Every organization – irrespective of its industry, geography or size – involves an interaction of activities and processes with the environment. These activities may have an adverse or favorable impact on the environment depending on the type of activity being carried out. Our Environment Management solution has been designed to minimize and mitigate these adverse impacts on environment, to such an extent that our already depleting biodiversity is protected, and nurture an ecosystem where all living organisms coexist sustainably.
    Starting Price: $30 per user per month
  • 7
    AssurX

    AssurX

    AssurX

    The AssurX platform is a versatile enterprise quality management system (EQMS) and regulatory compliance management platform. AssurX allows enterprises of any size or complexity to create a system that reliably communicates and coordinates quality and compliance information, documentation, and activities across the enterprise. AssurX allows regulated businesses to quickly identify and control risk exposure and avoid quality or noncompliance problems while improving workflow. AssurX QMS software is highly configurable to fit any established or dynamic business requirements. The system creates an electronic workflow of tasks, alerts, escalations, and approvals that can be automated to the desired level, mapping precisely to real-world operations. Begin with just the solutions and functionality you need now, then implement what you like whenever you’re ready. No other system is easier to deploy, configure, and modify.
  • 8
    axe Monitor

    axe Monitor

    Deque Systems

    Perform enterprise-level accessibility audits and meet your compliance needs with advanced reporting, monitoring, and management of accessibility issues against industry standards or customized guidelines. Axe Monitor helps ensure your large website becomes accessible and remains accessible. Dynamically scan, monitor and report on the accessibility status of your site across business and development teams. Modern web applications driven by large content management systems require automated tools capable of handling unexpected page hierarchies and linking structures. Axe Monitor is designed to follow links dynamically, and allows for scripting of basic user flows to trigger event-driven content and bypass user authentication. Large websites are constantly changing and adding new content. Axe Monitor links content creators, designers, developers and project managers to ensure accessibility throughout the workflow.
  • 9
    Commvault Cloud
    Commvault Cloud is a comprehensive cyber resilience platform designed to protect, manage, and recover data across diverse IT environments, including on-premises, cloud, and SaaS applications. Powered by Metallic AI, it offers advanced features such as AI-driven threat detection, automated compliance tools, and rapid recovery capabilities like Cleanroom Recovery and Cloudburst Recovery. The platform ensures continuous data security through proactive risk scanning, threat hunting, and cyber deception, while facilitating seamless recovery and business continuity with infrastructure-as-code automation. With a unified management interface, Commvault Cloud enables organizations to safeguard their critical data assets, maintain compliance, and swiftly respond to cyber threats, thereby minimizing downtime and operational disruptions.
  • 10
    GovEVA

    GovEVA

    GovEVA

    GovEVA, is a leading SaaS company dedicated to empowering organizations seeking sustainable growth through effective strategy and automation. With our innovative product, we provide a comprehensive solution to help companies implement Environmental, Social, and Governance (ESG) practices throughout their organization. Our unique approach, known as the "OUR 7 Step Approach," ensures a seamless and successful integration of ESG principles. Let's explore the steps: 1. Materiality Assessment 2. Current State Baseline 3. Measurement And Real-Timeline Tracking Of Quantitative ESG Parameters. 4. Gap Analysis 5. Strategic Roadmap For ESG Enhancement 6. Actions & KPIs 7. Reporting
  • 11
    IBSFINtech

    IBSFINtech

    IBSFINtech India Private Ltd.

    IBSFINtech is a global enterprise TreasuryTech company providing end-to-end digitization & automation solutions for corporates' Cash & Liquidity, Treasury, Risk, Trade Finance (TRTFM®) & Supply Chain Finance functions. Our product portfolio includes On-prem solutions, SaaS TMS - InTReaX™ & Supply Chain solution VNDZY®. Our prestigious list of clientele is spread across verticals and geographies, including, Vedanta Group, Mahindra, Sai Life Sciences Ltd, Bluestar Ltd, Polycab Ltd, and Future Group,. We have also been awarded a very prestigious award of the treasury ecosystem, “The Corporate Treasurer – House Awards”, recognizing IBSFINtech as the Software Provider for the APAC region in this niche space. The “Made-In-India” Comprehensive Risk Management solution offering enables a holistic approach toward Compliance, Financial, and Operational Risk management.
  • 12
    AML Manager
    This best-in-class anti-money laundering solution covers a complete range of compliance processes and practices, providing a fully integrated, time-saving solution to meet all the compliance and risk management needs of your financial institution. AML Manager combines technologically advanced features and a user-friendly, data-rich interface with powerful prevention and detailed tracking tools. It makes the investigation of suspicious activity simpler and more effective. Based on behavioral profiling and peer group analysis and rules, the intelligent transaction monitoring in AML Manager uncovers only those alerts with the highest degree of risk, which significantly minimizes the number of false positives. The easy-to-use investigation interface in AML Manager, with advanced drill-down and link analysis, makes it easy to uncover suspicious networks and associations. The interface supports profile investigation capabilities, such as peer-group comparison.
  • 13
    Datafisher LMS

    Datafisher LMS

    Datafisher

    Datafisher LMS is the most comprehensive and adaptable LMS that helps your business and team automate digital trainings, saving you time and money. Datafisher LMS comes with innovative features, integrations, and user experience, no matter where your team is located. With guaranteed value, our Datafisher LMS is perfect for any size company, from a small team to a large corporation. With an LMS in place, everyone can manage their own schedule, as the content is always available and accessible on any device, including as a mobile app LMS. It’s also easy to adapt your training to individual needs and to assign any content or training to a target group or individual. You never have to worry about managing progress with the ability to track, monitor and receive reports on all the users’ training progress.
    Starting Price: $460 per month
  • 14
    Cyberwatch

    Cyberwatch

    Cyberwatch

    Manage all your vulnerabilities, from their detection to their correction. Cyberwatch helps you to get a complete and contextualized list of assets and technologies in your Information System. Cyberwatch continuously searches for vulnerabilities published by the authorities (CERT-FR, NVD...) and present on your IT assets. Cyberwatch evaluates your vulnerabilities based on their CVSS score, the existence of an exploit, and the business context of the affected machine. Cyberwatch lets you make the right decisions using dashboards and simple actions (comment, exclude...). Cyberwatch natively embeds a Patch Management module, compatible with your infrastructure (WSUS / RedHat Satellite...). Define your compliance rules and control your information system. Cyberwatch helps you to get a complete and contextualized list of assets and technologies in your Information System. Cyberwatch allows you to define your objectives thanks to an encyclopedia of rules with pre-sets.
  • 15
    Interfacing Digital Business Platform
    Interfacing’s Digital Business Platform uses flow management technology that illustrates tasks and works in a flow diagram, focusing on the people performing the tasks and their individual roles. Digital Business Platform can help companies build, improve, and share processes from a central repository. Business rules can then be applied at any stage of the workflow to automate tasks or minimize manual intervention. The ability to track and provide status reports throughout each phase of a process allows for accurate performance and coordination across manual and systemized tasks. Having our Digital Business Platform along with our EPC system will definitely strengthen collaboration between IT development and operations, streamline test, automate workflows, and offer big bottom-line benefits. Interfacing’s digital business platform – Rapid Application Development (RAD) Tools, with its Low-Code Development methodology will optimize usage of your technical resources.
  • 16
    Stacklet

    Stacklet

    Stacklet

    Stacklet builds on the Cloud Custodian project to offer an out-of-the-box solution with powerful management capabilities and advanced features to help businesses realize value. Stacklet is built by the original developer and maintainer of Cloud Custodian. Cloud Custodian is used by thousands of well-known global brands today. The project’s community has hundreds of active contributors including Amazon, Microsoft and Capital One and is growing rapidly. Stacklet provides a best-of-breed solution for cloud governance addressing needs around Security, Cost Optimization and Regulatory Compliance. Tooling to manage Cloud Custodian at scale across thousands of cloud accounts, policies and regions. Access to best practice policy sets which solve business problems out-of-the-box. Data and visualizations to understand policy health, resource auditing, trends and anomalies. Real-time inventory, historical revisions and change management of cloud assets.
  • 17
    Drata

    Drata

    Drata

    Drata is the world’s most advanced security and compliance automation platform with the mission to help companies earn and keep the trust of their users, customers, partners, and prospects. Drata helps hundreds of companies streamline their SOC 2 compliance through continuous, automated control monitoring and evidence collection, resulting in lower costs and less time spent preparing for annual audits. The company is backed by Cowboy Ventures, Leaders Fund, SV Angel, and many key industry leaders. Drata is based in San Diego, CA.
    Starting Price: $10,000/year
  • 18
    Vault Platform

    Vault Platform

    Vault Platform

    Designed to support a culture of trust and safety, Vault is revolutionising the way that misconduct is reported and resolved. Using advanced technology, Vault overcomes the main challenges companies face when trying have a meaningful impact on unacceptable behaviour in the workplace empowering individuals to speak up and report the misconduct and providing organisations with the tools internally to resolve the issues, before they have a chance to spread. The most advanced incident reporting tool you can give your workforce. The Vault App is a trusted and highly accessible way of capturing all relevant details of an incident, creating a frictionless experience encouraging people to come forward internally. A web-based interface that extends the reach of the Vault speak up platform to your entire business ecosystem including customers, supply chain partners, and members of the public.
  • 19
    IBM Guardium Data Compliance
    Simplifies data regulation needs, enhances visibility and streamlines monitoring IBM® Guardium® Data Compliance helps organizations to move through regulatory compliance and audit requirements more quickly and easily, safeguarding regulated data wherever it resides. Available in IBM® Guardium® Data Security Center, IBM Guardium Data Compliance can reduce audit prep time for data compliance regulations, provide continuous visibility of data security controls, and solve data compliance and data activity monitoring challenges.
  • 20
    FastDox

    FastDox

    FastDox

    Receive crucial documentation from customers in minutes. They simply upload or take a photo of their sensitive information and send it across securely instantly. Unlimited amount of document uploads of any size. Upload and send documents from anywhere zero hassle. Auto-edge cropping and dynamic document alignment. Stand out from the competition and offer your customers a seamless onboarding experience. With the platform doing the hard work for you, you can focus on delivering outstanding service. Unchain your staff from the shackles of admin and allow them to spend time building up your customer base. Our clients have seen an increase in sales of up to 35%. Work smarter not harder - dramatically reduce labour and keep business costs down. FastDox cuts postage costs by 95% and helps to ensure repeat business.
    Starting Price: £40 per user
  • 21
    IBM InfoSphere Optim Data Privacy
    IBM InfoSphere® Optim™ Data Privacy provides extensive capabilities to effectively mask sensitive data across non-production environments, such as development, testing, QA or training. To protect confidential data this single offering provides a variety of transformation techniques that substitute sensitive information with realistic, fully functional masked data. Examples of masking techniques include substrings, arithmetic expressions, random or sequential number generation, date aging, and concatenation. The contextually accurate masking capabilities help masked data retain a similar format to the original information. Apply a range of masking techniques on-demand to transform personally-identifying information and confidential corporate data in applications, databases and reports. Data masking features help you to prevent misuse of information by masking, obfuscating, and privatizing personal information that is disseminated across non-production environments.
  • 22
    Wibmo

    Wibmo

    Wibmo

    We enable banks and fintechs to leverage the full power of technology. Experience the future of secure, frictionless payments with Wibmo’s nextgen authentication platform. ACCOSA IVS is a payment authentication platform that uses 3-D secure 1.0 and EMV 3-D secure 2.X protocols for securing online payments. Coupled with its powerful Risk-Based Authentication (RBA) engine, it provides the frictionless experiences consumers expect. Powered by cutting-edge fraud prevention technology, ACCOSA IVS combines the prowess of EMV 3D secure protocol and a dynamic risk authentication engine to accurately calculate risk scores in real-time. Instantaneously identifies and counters emerging threats in real-time. Implemented with a scalable microservices architecture. Designed to scale for high-volume transactions. Displays your growth story with intuitive analytics. The ACCOSA IVS identity authentication platform combines the best of our consumer identity verification mechanics.
  • 23
    Effiya

    Effiya

    Effiya Technologies

    Effiya Technologies offers a suite of comprehensive solutions to manage anti-money laundering, transaction monitoring, fraud detection and sanctions screening in the banking and financial services sectors. These niche products are developed from deep business insights and understanding of application areas, leveraging latest technologies and software in the financial compliance space. At Effiya Technologies, we strive to apply our insights on machine learning and the expertise built over many years of consulting, to create business applications that can help our client organizations in optimizing their business operations, bring them closer to their customers, and deliver automation benefits by robotizing business processes. From counting trees for conservation projects to developing smart chat bots.
  • 24
    SeaCat

    SeaCat

    TeskaLabs

    Cyber-security and data privacy platform for mobile and IoT applications. Build and operate the app free from any cyber-security incident. SeaCat is a cyber-security platform created by experts, and it features all cyber-security and data privacy must-haves. SeaCat deployment is smooth and hassle-free. SeaCat improves your security level instantly, with no need for custom development. Cyber-security should not come at the cost of the user experience. SeaCat requires no pesky configurations or procedures on the part of the user; SeaCat employs all modern cyber-security features, such as biometrical authorization,  and hardware security modules. SeaCat cyber-security platform consists of a SeaCat SDK that is to be added to a mobile or IoT application, the SeaCat Gateway that is to be installed into the demilitarized zone (DMZ) in front of the application backend servers, and SeaCat PKI that is a service that provides enrolment, access, and identity management.
  • 25
    Vespia

    Vespia

    Vespia

    Vespia is an all-in-one AML solution for verifying and onboarding business customers and partners in under 30 seconds. We help AML-obligated businesses understand whom they are dealing with using the power of AI.
  • 26
    POA

    POA

    Sysmedac Technologies

    Organizations can recognize their strengths and weaknesses by using an efficient internal audit reporting software system. Having the appropriate tools to support people and processes, shorten audit cycles, and provide value to stakeholders is essential for future success with internal audit management solutions.
  • 27
    Bviser

    Bviser

    Bviser

    Bviser is board and committees meeting solution , we have tools for meetings, and we have more than 50 clients and more than 1500 users using our solution.
    Starting Price: $850/year
  • 28
    Tumult Analytics

    Tumult Analytics

    Tumult Analytics

    Built and maintained by a team of differential privacy experts, and running in production at institutions like the U.S. Census Bureau. Runs on Spark and effortlessly supports input tables containing billions of rows. Supports a large and ever-growing list of aggregation functions, data transformation operators, and privacy definitions. Perform public and private joins, filters, or user-defined functions on your data. Compute counts, sums, quantiles, and more under multiple privacy models. Differential privacy is made easy, thanks to our simple tutorials and extensive documentation. Tumult Analytics is built on our sophisticated privacy foundation, Tumult Core, which mediates access to sensitive data and means that every program and application comes with an embedded proof of privacy. Built by composing small, easy-to-review components. Provably safe stability tracking and floating-point primitives. Uses a generic framework based on peer-reviewed research.
  • 29
    NMTY Enterprise
    NMTY Enterprise helps you protect all your privacy-sensitive data within your organization, regardless if it is stored in databases or files. Make NMTY Enterprise part of your IT environment and immediately anonymize all data sources that need to be protected. NMTY Enterprise makes it possible to anonymize data regardless of how it is stored, from databases to individual files. Anonymize data stored in a database or in separate files such as CSV and XML. Data is always anonymized directly within the source. This prevents non-anonymized data from being duplicated unnecessarily. Connections to your data sources support integrated authentication and are always encrypted when stored. In addition to anonymizing datasets, it is also possible to directly anonymize data processed within documents and images. Our solutions are developed based on the latest innovations and integrate directly into your existing processes. This way we ensure we always achieve the maximum result.
  • 30
    PK Protect
    PK Protect is a data protection platform designed to help organizations safeguard sensitive information across diverse environments. It provides robust tools for data discovery, classification, encryption, and monitoring, ensuring that critical data is protected both at rest and in transit. With automated policies and compliance controls, PK Protect enables businesses to meet regulatory requirements like GDPR and HIPAA while minimizing the risk of data breaches. The platform integrates with various systems to provide a unified approach to managing data security across cloud, on-premises, and hybrid environments. By offering real-time visibility and proactive threat detection, PK Protect helps organizations maintain control over their sensitive data and reduce security vulnerabilities.