Best IT Management Software for Linux - Page 30

Compare the Top IT Management Software for Linux as of November 2025 - Page 30

  • 1
    Robot Monitor
    Robot Monitor is the most comprehensive, in-depth monitoring solution available for Power Systems environments running IBM i alone or alongside VIOS, AIX, or Linux on Power. Industry-leading technology gives you the highest degree of monitoring for your critical IT infrastructure. By monitoring the performance of your Power servers in real time—including system status, disk, network, availability, application data, and JDBC/ODBC activity—you and your team can proactively respond to issues before they impact user productivity or resources. Highly customizable, modern dashboards provide visibility into all your metrics, elements, and status conditions so you don’t miss a thing. See all your data from a single, central interface to avoid downtime and optimize performance. Not watching the dashboard? Robot Monitor can send out notification when things go wrong.
  • 2
    AMI Data Center Manager
    AMI® Data Center Manager (DCM) is an advanced solution designed to enhance the operational efficiency, reliability, and sustainability of enterprise data centers. By leveraging real-time data collection, predictive analytics, and advanced reporting, DCM allows organizations to make data-driven decisions that optimize energy usage, reduce waste, and improve resource planning. The platform helps manage power, thermal conditions, and system health, providing actionable insights to streamline data center operations, forecast future needs, and monitor the carbon footprint of infrastructure.
  • 3
    Deepnet DualShield

    Deepnet DualShield

    Deepnet Security

    If you are looking for an enterprise grade 2-factor authentication (2FA) or multi-factor authentication (MFA) product that can secure all commonly used business applications and also provides a wide range of authentication methods, then you are in the right place. Deepnet DualShield is a multi-factor authentication system that unifies a variety of authentication methods, protocols, solutions and user experience in a single platform. In addition to the MFA functions, DualShield also provides self-service Password Reset, Single Sign-On (SSO), Identity & Access Management (IAM) and Adaptive Authentication. It is one of the most powerful and flexible multi-factor authentication system in the world. Deepnet DualShield can be installed on premises or hosted in a private cloud, which means that you will have the total control of your own user authentication system, and that you will be able to keep your users’ identities and credentials in a safe place.
  • 4
    SqlBak

    SqlBak

    SqlBak Backup

    Schedule and restore sql backup from any web browser on any device. Send backups to a folder, FTP, Dropbox, Google Drive, OneDrive, Amazon S3 and more. Monitor database performance and receive email alerts. Install our app on Windows or Linux, connect to sqlbak.com, then manage backups via the web. Create and restore full, differential, transaction log and incremental backups according to the schedule. Your backups are kept in the cloud storage of your choice, SqlBak doesn't keep your data. The health and performance of your SQL Server is checked every few minutes. We will send you an email if there is a problem with the backup or the performance of your SQL Server. SQLBackupAndFTP requires you to login to your server to manage and restore database backups, but SqlBak does it all from the web. SqlBak is vastly superior in managing a large number of database servers as it allows you to see them all on a single Dashboard page and update in bulk.
    Starting Price: $6 per month
  • 5
    Zluri

    Zluri

    Zluri

    Zluri is a cloud-native SaaSOps platform enabling modern enterprises with SaaS Management, Access Management, and Access Review capabilities. Zluri empowers IT and Security teams to gain visibility into their SaaS landscape, unlock recurring savings, & securely manage access with provisioning and de-provisioning of users. Zluri’s technology is powered by an Authknox engine, and assisted by an Automation engine, enabling companies to navigate & control complex SaaS ecosystems easily. Trusted by over 250 global customers, Zluri is committed to delivering innovative, reliable, and scalable solutions that empower organizations to optimize their SaaS usage, ensure compliance, and enhance Access Management practices.
  • 6
    Ricoh

    Ricoh

    Ricoh

    Accelerate growth with scalable public, private, and hybrid cloud solutions. Cloud computing frees you to focus on your core business goals. You get the technology, tools, and apps you need – without traditional infrastructure limitations and necessary ongoing maintenance costs. When you choose the public cloud, you choose high-performance, secure, and cost-effective business tools that don’t require in-house infrastructure or staff to setup. For many companies, the minimal start-up costs and pay-as-you-go fees make the public cloud an attractive way to get started. Initial assessment. Strategic planning for the optimal cloud solution. Build and deployment. Security management of all users to ensure functionality, compliance, and disaster recovery process implementation. Post-setup support. Proactive scanning, monitoring, and reporting to ensure optimal use and maximum data security.
  • 7
    Level

    Level

    Level

    Level is a remote monitoring and management (RMM) solution that gives you fast, intuitive, and secure access to your devices located anywhere in the world, right through your browser. With a simple one-line command, you can access up-to-date information on your endpoints, or control them with Level's low-latency remote access. Designed with security in mind, Level uses fully encrypted peer-to-peer (P2P) connections with your devices, meaning no third-party exists between you and your hardware. Your team can create powerful scripts, execute them across any or all devices, all while being able to control who can access them. Level is bringing an innovative, efficient, modern approach to remote monitoring and management.
    Starting Price: $20/month
  • 8
    CleanBrowsing

    CleanBrowsing

    CleanBrowsing

    A modernized approach to DNS-based content filtering and security. Easily decide what should, and should not, be allowed on your internet. Effective for our kids, powerful for our business. CleanBrowsing is a DNS-based content filtering service that offers a safe way to browse the web without surprises. It intercepts domain requests and filter sites that should be blocked, based on your filtering needs. Our, free, family filter, for example, blocks porn, obscene, and adult content, while still allowing Google, Youtube, Bing, DuckDuckGo and the rest of the web to load safely. Our free filters are comprised of three predefined filters for global consumption (Security, Adult, and Family). The Family filter blocks adult / obscene content and applies Safe Search filters to Google, Bing, Yandex, etc. The security filter, however, only focuses on restricting access to malicious activity.
    Starting Price: $59.99
  • 9
    VPN99

    VPN99

    VPN99

    Online security at the best price. VPN99 removes everything that makes you unique and recognizable online, by hiding your IP address and encrypting your data to keep your browsing history private. One VPN99 subscription for every device you own. MacOS, Windows, Android, iOS, Chrome and Firefox extensions and more
    Starting Price: $5.99 per month
  • 10
    ZCentral Remote Boost
    Download ZCentral Remote Boost sender software onto your racked or non-racked high-performance workstation. The software is included with every Z PC and available for purchase on non-Z devices. ZCentral Remote Boost connects your end point device to the powerful workstation in your office, allowing it to be accessed for graphics-intensive work by the end-point device. Download ZCentral Remote Boost receiver software onto any end point device of choice--laptop, tablet, or even thin clients, with support for Windows, Linux®, and macOS. The software is included with every Z PC. ZCentral Remote Boost has helped the media and entertainment industry transition to a new way of working. By providing remote access to advanced computing, editors, artists and other creative professionals can now create and collaborate from anywhere. Now, with our revolutionary software, your power users can get a transformative remote experience.
  • 11
    SUSE Linux Enterprise Real Time
    Whether it’s an IoT sensor monitoring industrial devices or an edge system that must act instantly on external inputs, SUSE Linux Enterprise Real Time is a real time operating system designed to reduce latency and increase the predictability and reliability of time-sensitive, business-critical applications. Banks, manufacturers, government agencies and others rely on time-dependent applications which must execute accurately and predictably all the time, every time. To act as a single unit, distributed systems need time accuracy not only within a server but across all servers. The Precision Time Protocol (PTP) synchronizes servers via the high-speed network, up to sub-microsecond accuracy. Includes support for device interrupt threads, enabling tuning at the device level, and hardware latency detectors to ensure predictability of application behavior. SUSE Linux Enterprise Real Time gives you the time advantage you need to beat the competition.
    Starting Price: $2,199 per year
  • 12
    VyOS

    VyOS

    VyOS Networks

    Democratizing how we access networks through a universal router and open source software. Our vision at VyOS is to dramatically change how we access networks so that we can all build the solutions we always dreamed of, without restrictions, limitations, or prohibitive costs. We fundamentally believe that internet access is as vital to our human development as air, food, water, and healthcare. Built by engineers for engineers, VyOS is an open source software company that democratizes how we access networks so that the many, not the few, benefit from building solutions without limitations and prohibitive fees. We do this as VyOS through our open source software and virtual platforms. Stateful firewalls, zone-based firewall, all types of source and destination NAT (one to one, one to many, many to many). The entire codebase and build toolchain are available to everyone for auditing, building customized images and contributing.
    Starting Price: $1000
  • 13
    Syniti Data Connectivity
    Optimize access to your IBM Db2 data with high-performance connectivity products for application access to data on IBM Db2 databases. Our standards-based ADO.NET, ODBC, ADO and JDBC connectors enable your applications to easily share data to and from IBM Db2 databases, providing fast and reliable access to Db2 servers running on IBM i/iSeries/AS400, zOS/OS390, VSE/VM, AIX, Solaris, HP/UX, Windows and Linux platforms. AAdd security to your application by encrypting data using one of our security solutions. Efficient use of native IBM operating systems. Built with 20+ years of IBM Db2 expertise. A solution to meet the needs of every environment, ODBC, .NET, JDBC, OLE DB. Setup and toolbox for easy installation and use. Performance .NET data providers for IBM® Db2® with reliable access to Db2 data for third-party commercial applications and custom applications.
  • 14
    Beats

    Beats

    Elastic

    Beats is a free and open platform for single-purpose data shippers. They send data from hundreds or thousands of machines and systems to Logstash or Elasticsearch. Beats are open source data shippers that you install as agents on your servers to send operational data to Elasticsearch. Elastic provides Beats for capturing data and event logs. Beats can send data directly to Elasticsearch or via Logstash, where you can further process and enhance the data, before visualizing it in Kibana. Want to get up and running quickly with infrastructure metrics monitoring and centralized log analytics? Try out the Metrics app and the Logs app in Kibana. For more details, see Analyze metrics and Monitor logs. Whether you’re collecting from security devices, cloud, containers, hosts, or OT, Filebeat helps you keep the simple things simple by offering a lightweight way to forward and centralize logs and files.
    Starting Price: $16 per month
  • 15
    HULFT 8

    HULFT 8

    HULFT

    HULFT 8 is next-generation managed file transfer (MFT) middleware used by leading enterprises for sending mission-critical data reliably, securely, and efficiently. Robust and powerful enough to be used as the foundation of your business infrastructure, HULFT can handle character code conversions, connecting with different operating environments, and dealing with a range of file and code system types. By using industry-standard TCP / IP protocol security, HULFT delivers your data faster and won't over-burden your network. As would be expected, HULFT is compatible with UNIX, Linux, and Windows. It also supports mainframe operating systems such as z/OS, MSP, and VOS. HULFT even works with mid-sized systems running i5/OS. With HULFT, seamless data integration between a wide variety of business applications is possible. Transfer files between your enterprises' different locations, or with external organizations. HULFT is becoming the standard for managed file transfer (MFT).
  • 16
    Azure IoT Edge
    Azure IoT Edge is a fully managed service built on Azure IoT Hub. Deploy your cloud workloads, artificial intelligence, Azure and third-party services, or your own business logic, to run on Internet of Things (IoT) edge devices via standard containers. By moving certain workloads to the edge of the network, your devices spend less time communicating with the cloud, react more quickly to local changes, and operate reliably even in extended offline periods. Deploy models built and trained in the cloud and run them on-premises. For example, if you deploy a predictive model to a factory camera to test for quality control and an issue is detected, IoT Edge triggers an alert and processes the data locally or sends it to the cloud for further analysis. Operate your edge devices reliably and securely, even when they’re offline or they have intermittent connectivity to the cloud. Azure IoT Edge device management automatically syncs the latest state of your devices.
  • 17
    PowerTerm InterConnect
    The PowerTerm InterConnect Series is comprised of several robust terminal emulation applications supporting the host access needs of large and small organizations. It allows enterprises to standardize on a single host access solution. PowerTerm InterConnect products provides fast and reliable access to data residing on the broadest range of hosts, such as IBM Mainframe zSeries, IBM AS/400 iSeries, UNIX, OpenVMS, Tandem, HP. Each of the PowerTerm InterConnect products enables terminal emulation via various communication modes. PowerTerm InterConnect offers a flexible and extensive feature set to maximize users' time while providing a wide range of options. Using Power Script Language, users can automate tasks and increase efficiency. PowerTerm InterConnect's small footprint makes it a simple, fast and effective means of running legacy applications and it is easily installable on any PC.
  • 18
    kitty

    kitty

    kitty

    kitty is designed for power keyboard users. To that end all its controls work with the keyboard (although it fully supports mouse interactions as well). Its configuration is a simple, human editable, single file for easy reproducibility (I like to store configuration in source control). The code in kitty is designed to be simple, modular and hackable. It is written in a mix of C (for performance sensitive parts) and Python (for easy hackability of the UI). It does not depend on any large and complex UI toolkit, using only OpenGL for rendering everything. Finally, kitty is designed from the ground up to support all modern terminal features, such as unicode, true color, bold/italic fonts, text formatting, etc. It even extends existing text formatting escape codes, to add support for features not available elsewhere, such as colored and styled (curly) underlines. One of the design goals of kitty is to be easily extensible so that new features can be added in the future.
  • 19
    SecureCRT

    SecureCRT

    VanDyke Software

    SecureCRT client for Windows, Mac, and Linux provides rock-solid terminal emulation for computing professionals, raising productivity with advanced session management and a host of ways to save time and streamline repetitive tasks. SecureCRT provides secure remote access, file transfer, and data tunneling for everyone in your organization. Whether you are replacing Telnet or Terminal, or need a more capable secure remote access tool, SecureCRT is an application you can live in all day long. With the solid security of SSH, extensive session management, and advanced scripting, SecureCRT will help raise your productivity to the nth degree. Highlight individual words, phrases, or substrings in the session window to identify errors in log files or streaming output and to highlight prompts. Regular expressions are also supported, making it easier to highlight strings like IP addresses. Keyword display attributes (bold, reverse video, and color) can be combined.
  • 20
    SecureFX

    SecureFX

    VanDyke Software

    Our flexible secure file transfer client gives you the tools you need to increase the security and efficiency of file transfer operations and site synchronization. Our flexible file transfer client for Windows, Mac, and Linux gives you the tools you need to increase the security and efficiency of file transfer operations and site synchronization. SecureFX's user-friendly interface makes it easy to learn, and support for multiple platforms allows you to apply the strong encryption and authentication mechanism of Secure Shell protocol to your data-in-transit. SecureFX assures recovery when transfers are interrupted, automatically resuming multi-file transfers. Relentless file transfer automatically reconnects and resumes transfer after a broken connection. Transfer files across networks and the internet with a choice of SSH2 SFTP, FTPS (FTP/TLS), HTTPS (WebDAV and Amazon S3), SCP, or FTP and HTTP for access to legacy systems for access to legacy systems.
  • 21
    VShell Server

    VShell Server

    VanDyke Software

    Multi-protocol secure file transfer. Remote access and administration. Available for Windows, Linux, and Mac. Secure file transfer server to protect data in transit. Multi-protocol support: SSH2, SFTP, FTPS, and HTTPS. Fine-grained access control for users and groups. Secure remote access and administration with SSH2. Set up and configure easily; runs right out of the box. Integrates with Windows AD and LDAP. Enterprise-level reliability and robustness, "set it and forget it". Compatible with clients using open standards for SSH2, SFTP, FTPS, or HTTPS. Multi-platform support for Windows, Linux, and Mac. Runs on physical servers, virtual machines, and cloud-based servers. Cost effective, connection based licensing. Dedicated and customer-oriented, high level of expertise, and quick response time. Technical support begins during evaluation. Grant access to VShell services by authorized users or groups. On an individual or group basis, allow or deny access to VShell services.
  • 22
    KMail
    KMail is the email component of Kontact, the integrated personal information manager from KDE. Default settings rather compromise on features than security or privacy. End-to-end Encryption. Support for OpenPGP and S/MIME is built-in, and a setup and key generation wizard aids users in getting started with this. Transport encryption, SSL/TLS encrypted communication is of course supported, as are a number of authentication methods such as GSSAPI (Kerberos) or OAuth2. Strong isolation of HTML content. If HTML emails can’t be avoided, KMail ensures no external references can be hidden in there to leak information or compromise your privacy. Additionally KMail’s phising protections warns about suspicious links in such emails. Spam protection, so if your email server doesn’t take care of this already, KMail can integrate popular spam checkers such as SpamAssassin or Bogofilter locally.
  • 23
    Terminator

    Terminator

    Terminator

    Terminator Terminal Emulator is a powerful tool that allows users to manage multiple GNOME terminals within a single window. Originally developed in 2007 by Chris Jones as a compact Python script, it has evolved into a flexible terminal management application inspired by tools like Iterm2 and Tilix. Terminator lets users combine and rearrange terminal windows to suit their workflow, making it ideal for those who frequently work with multiple remote machines or command-line sessions. The emulator supports various themes, including light and dark modes, to enhance usability. It is well-suited for developers, system administrators, and command-line enthusiasts who need to manage several terminals simultaneously. Terminator streamlines terminal management, increasing productivity and reducing desktop clutter.
    Starting Price: Free
  • 24
    NordVPN Teams

    NordVPN Teams

    Nord Security

    NordVPN Teams is a cloud-based virtual private network service for businesses. By combining powerful encryption with seamless access to secure servers around the world, your team can safely access company resources from anywhere. Mitigate risk, test new markets, and make your business safer today with seamless, reliable, and scalable digital protection from NordVPN Teams, the business VPN. NordVPN Teams enables you to manage every user account and feature from one centralized Control Panel. Connect to thousands of shared servers in 33 countries around the world. Choose from 20+ dedicated server locations. Our global infrastructure means your team can easily reach international content, conduct QA testing, and evaluate international marketing campaigns. NordVPN Teams offers easy-to-use centralized billing. This means you won’t have to sort out payment every time you add a new user. Connect to NordVPN Teams with your existing business credentials.
    Starting Price: $7 per user per month
  • 25
    SOLIDserver DDI

    SOLIDserver DDI

    EfficientIP

    The SOLIDserver™ DDI suite is designed to deliver highly scalable, secure and robust virtual and hardware appliances for critical DNS-DHCP-IPAM services. It provides vital benefits for the agility, reliability, and security of your network infrastructure. SOLIDserver is the cornerstone of DNS, DHCP and IP Address Management (DDI) projects for datacenter automation, internet DNS, LAN infrastructures, cloud computing, digital transformation and any IT organization dealing with the challenges of a dynamic and secure infrastructure. DDI helps software defined networking (SDN) become fully integrated to the whole IT ecosystem, from orchestration of application deployment to IT Service Management (ITSM) process control. EfficientIP DDI appliances strengthen your core network foundations to support your business imperatives to improve business continuity and decrease operating costs with smart automation.
  • 26
    Mammoth Cloud

    Mammoth Cloud

    Mammoth Cloud

    Virtual Private Cloud to provide a secure, isolated network. Full-disk backup to keep your data safe & secure. Integrated resource graphs make management a breeze. Performance alerts inform you if your server needs resources. Our Cloud servers come pre-installed and ready for use. Choose from Windows, Linux, or cPanel and deploy your VPS hosting in seconds. Operating out of Next DC's facility in Sydney Australia, our physical infrastructure is housed in a datacentre that is UTI Tier III -certified for both design and construction. Operating out of Next DC's facility in Sydney Australia, our physical infrastructure is housed in a datacentre that is UTI Tier III -certified for both design and construction.
    Starting Price: $25 per month
  • 27
    Triton SmartOS
    Triton SmartOS combines the capabilities you get from a lightweight container OS, optimized to deliver containers, with the robust security, networking and storage capabilities you’ve come to expect and depend on from a hardware hypervisor. Triton SmartOS leverages Zones, a hardened container runtime environment that does not depend upon VM hosts for security. Patented resource protections insulate containers and ensure that each container gets its fair share of I/O. Triton SmartOS eliminates the complexities associated with VM host dependent solutions. Built-in networking offers each container one or more network interfaces, so each container has a full IP stack and is a full peer on the network, eliminating port conflicts and making network management easy. Secure, isolated, resizable filesystems for each container. The speed of bare metal performance + the flexibility of virtualization.
    Starting Price: $0.009 per GB per month
  • 28
    Kolide

    Kolide

    Kolide

    Endpoint solutions for teams that value productivity, transparency, and employee happiness. Engage with employees on Slack providing customized security and compliance recommendations for their Mac, Windows, and Linux devices. Traditional security solutions don't interact with end-users and must rely on strict enforcement and surveillance. We believe that device security starts with the user. With Kolide you can clearly communicate your organization's security guidelines and help users achieve compliance without resorting to rigid management. Get a bird's eye view of your environment, then drill down into the nitty gritty to gain critical insights into your fleet's health and hygiene. A single device in your fleet can produce thousands of unique data points. This data is often intended to be read by programs and systems, not people. Kolide interpets and visualizes the data we collect so you can quickly understand the state of your devices.
    Starting Price: $6 per month
  • 29
    SkySilk

    SkySilk

    SkySilk Cloud Services

    Click below for more information about SkySilk's Enterprise class Private Cloud, Managed Cloud and Hybrid Cloud Solutions. Choose from dozens of Linux apps & clean OS installs to deploy in seconds with just 1-click. Whether you're running a small cloud operation or part of an enterprise-level organization, SkySilk offers over 40 resource plans to ensure you have the right cloud VPS environment suitable for your projects.
    Starting Price: $4 per month
  • 30
    Contiki-NG

    Contiki-NG

    Contiki-NG

    Contiki-NG is an open-source, cross-platform operating system for Next-Generation IoT devices. It focuses on dependable (secure and reliable) low-power communication and standard protocols, such as IPv6/6LoWPAN, 6TiSCH, RPL, and CoAP. Contiki-NG comes with extensive documentation, tutorials, a roadmap, release cycle, and well-defined development flow for smooth integration of community contributions. Unless explicitly stated otherwise, Contiki-NG sources are distributed under the terms of the 3-clause BSD license. This license gives everyone the right to use and distribute the code, either in binary or source code format, as long as the copyright license is retained in the source code.
    Starting Price: $4 per user per month