Results for: privacy focused linux

Suggested Categories:

Data Privacy Management Software
Data privacy management software is a solution designed to help organizations safeguard sensitive data and ensure compliance with privacy regulations. It offers tools to inventory, classify, and monitor data across systems, enabling secure handling of personal information. The software automates key tasks like managing consent, responding to data subject access requests, and assessing privacy risks. With real-time insights and policy enforcement, it helps prevent data breaches and ensures accountability in data processing. By enhancing transparency and compliance, it builds trust with stakeholders and supports regulatory adherence.
Privacy Policy Generators
Privacy policy generators enable organizations to automatically generate a privacy policy for their websites and apps that meet regulations set by governing bodies around the world including GDPR, CCPA, LGPD, and more.
Privacy Impact Assessment (PIA) Software
Privacy impact assessment (PIA) software gives organizations that ability to track, manage, evaluate, report on, and assess the privacy impact their data has on their operations and compliance efforts.
CCPA Compliance Software
CCPA compliance software helps organizations comply with the California Consumer Privacy Act (CCPA) data privacy regulations with regards to how users' personal data is handled. CCPA compliance software streamlines the management and compliance of CCPA data subject requests, consent management, and more.
Terminal Emulators
Terminal emulators are software programs that replicate the functionality of a traditional terminal or command-line interface (CLI) within a graphical environment. These tools allow users to interact with their computer's operating system using text-based commands, offering access to system functions, file management, and programming tasks. Terminal emulators are commonly used by developers, system administrators, and power users for running scripts, managing servers, or debugging applications. They often support features such as tabbed windows, color schemes, customizable key bindings, and integration with remote systems through protocols like SSH. By providing a flexible and efficient way to work with the command line, terminal emulators enhance productivity in both local and remote computing environments.
GDPR Compliance Software
GDPR compliance software helps organizations manage and adhere to the data protection requirements outlined by the General Data Protection Regulation (GDPR). These tools assist with tasks like data mapping, consent management, privacy policy generation, and user rights management, such as handling data access or deletion requests. By automating compliance processes, the software reduces the risk of violations and associated penalties while improving operational efficiency. Many GDPR solutions also include features like data breach monitoring, reporting, and integration with existing systems to streamline workflows. With its focus on transparency and accountability, GDPR compliance software is essential for businesses handling personal data in the EU or globally.
Kiosk Software
Kiosk software is software designed to run on self-service kiosks, allowing users to interact with a digital interface for tasks like information retrieval, ordering, or payment. It often features a touch-based user interface that is intuitive and easy to navigate. Kiosk software can be customized to suit various industries, including retail, hospitality, transportation, and healthcare. It typically includes security features to prevent unauthorized access and protect sensitive data. Additionally, kiosk software is often designed for remote management, enabling businesses to monitor and update their kiosk systems efficiently.
Package Managers
Package managers are software tools that automate the process of installing, upgrading, configuring, and removing software packages. They simplify dependency management by ensuring that required libraries and modules are downloaded and updated correctly. Many package managers connect to online repositories, allowing developers and system administrators to access large ecosystems of software quickly. By standardizing installations and updates, they reduce errors, improve consistency, and save time in both development and production environments. Package managers are widely used across programming languages, operating systems, and frameworks to streamline software distribution and maintenance.
IoT Operating Systems
IoT operating systems (OS) are specialized software platforms designed to run on Internet of Things (IoT) devices, providing the necessary functionality for resource management, communication, and real-time processing. These operating systems are optimized for low power consumption, small memory footprints, and efficient processing, allowing IoT devices to operate in environments with limited resources. IoT operating systems typically offer features like device control, sensor management, connectivity protocols, and security to ensure that IoT devices perform reliably and securely. They are used in a variety of IoT applications, such as smart home devices, wearables, industrial machinery, and automotive systems.
Hosting Control Panels
Hosting control panels, also known as site management and web hosting control panels, are software tools that enable IT professionals to manage their website, servers, and hosting packages. Hosting control panels simplify the process of managing domains, email accounts, installing website and server applications, and more.
Firewall Software
Firewall software is a security tool that monitors and controls incoming and outgoing network traffic based on predetermined security rules. Acting as a barrier between a trusted internal network and untrusted external networks, firewalls help prevent unauthorized access and protect against cyber threats. They work by analyzing data packets and determining whether they should be allowed through based on set policies, blocking potentially harmful traffic. Modern firewalls often incorporate advanced features like intrusion prevention, application filtering, and deep packet inspection to strengthen security further. By providing this critical layer of protection, firewall software safeguards sensitive data and ensures the integrity of networked systems.
Configuration Management Software
Configuration management software is used to track and manage the configuration of systems, networks, and software throughout their lifecycle. It allows teams to automate the process of setting up and maintaining consistent configurations across multiple environments, reducing human error and ensuring standardization. This software helps monitor changes, providing version control and audit trails to maintain system integrity and compliance. It is especially useful in complex IT infrastructures, enabling teams to deploy, update, and scale systems efficiently. Configuration management software ultimately improves system reliability, reduces downtime, and facilitates collaboration among development and operations teams.
Telephony Software
Telephony software is a type of communication technology that enables voice and video communication over telephone systems, computers, and the internet. These platforms are designed to manage, route, and track phone calls, messages, and multimedia communications within businesses or personal environments. Features of telephony software often include VoIP (Voice over Internet Protocol) support, call routing, interactive voice response (IVR), voicemail, call recording, and integration with customer relationship management (CRM) systems. Many telephony systems also include analytics tools for tracking call volumes, durations, and customer interactions. By improving communication efficiency and providing scalable solutions, telephony software is crucial for businesses looking to streamline their communication infrastructure.
Virtualization Software
Virtualization software enables the creation and management of virtual machines (VMs) that emulate physical computers. By abstracting the underlying hardware, it allows multiple operating systems to run on a single physical machine, improving resource utilization and flexibility. Virtualization provides an isolated environment for applications, increasing security and stability by preventing conflicts between different software systems. It also simplifies the management of IT infrastructure, as virtual machines can be easily created, cloned, and moved between different hosts. This technology is crucial for businesses looking to scale their operations, optimize resource usage, and improve disaster recovery processes.
View more categories (14) for "privacy focused linux"

538 Products for "privacy focused linux" with 1 filter applied:

  • 1
    DNSGuard

    DNSGuard

    DNSGuard

    DNSGuard is a high-performance, privacy-focused DNS resolver which blocks ads, trackers, phishing sites and malware before they can load. Alongside plain DNS for compatibility, it supports modern encrypted DNS standards such as DNS-over-HTTPS (DoH), DNS-over-TLS (DoT) and DNS-over-QUIC (DoQ). Designed for speed and reliability, DNSGuard routes queries through multiple redundant servers to ensure uptime, even under heavy traffic.
    Starting Price: 0$
  • 2
    Proton Mail

    Proton Mail

    Proton AG

    Proton Mail is the simplest way to protect your communications with built-in end-to-end encryption. Prevent data breaches, stay compliant with regulations like GDPR and HIPAA, and earn client trust. Protected by Swiss privacy laws and trusted by over 50,000 businesses, Proton Mail keeps your business data confidential and under your control. With Proton Mail and Calendar, your team can securely manage their inbox and schedule, while your organization maintains a professional presence with...
    Leader badge
    Starting Price: $6.99/user/month
    View Software
    Visit Website
  • 3
    Captain Compliance

    Captain Compliance

    Captain Compliance

    Captain Compliance is an all-in-one privacy management platform designed to simplify compliance with global data protection laws and new AI regulatory requirements. Our leading Consent Management Platform (CMP) allows businesses to effortlessly manage user consent and create customizable cookie banners. Our advanced Cookie Scanner automatically identifies and categorizes cookies on your website, ensuring ongoing compliance with a dynamic cookie policy. Our DSAR Portal streamlines...
    Leader badge
    Starting Price: $40 per month
    View Software
    Visit Website
  • 4
    Proton Pass

    Proton Pass

    Proton AG

    Proton Pass is an open-source password manager based in Switzerland that encrypts your usernames, passwords, bank cards, and encrypted notes and lets users quickly autofill details across all devices and browsers. Proton Pass goes beyond keeping your password safe, it secures your online identity with its additional features and enables secure sharing of log-in information. Proton Pass is built by the same team of scientists who met at CERN and created Proton Mail, the world’s largest...
    Starting Price: $1.99/user/month
    View Software
    Visit Website
  • 5
    Zen Browser

    Zen Browser

    Zen Browser

    Zen Browser is an open-source, privacy-focused web browser based on Mozilla Firefox. It offers users a secure and customizable browsing experience while avoiding the Google Chromium framework. The browser is designed to enhance performance and privacy, incorporating features like built-in enhanced tracking protection, customizable themes, and unique tab management options.
    Starting Price: Free
  • 6
    NMI Payments
    NMI Payments is an embedded payments solution that lets SaaS platforms, Software companies and ISVs integrate, brand, and manage payment acceptance directly within their software—without becoming a PayFac or building complex infrastructure. As a full-stack processor, acquirer, and technology partner, NMI handles onboarding, compliance, and risk so you can stay focused on growth. The modular, white-label platform supports omnichannel payments, from online, mobile and in-app to in-store and...
    View Software
    Visit Website
  • 7
    CloudBased Backup

    CloudBased Backup

    CloudBased Backup

    ...Hosted in European data centers, the platform combines cloud storage, file sync and sharing, document management, and team collaboration in a private environment with full data sovereignty. Designed for IT teams and privacy-focused organizations, CloudBased Backup handles deployment, security, updates, backups, and monitoring, allowing companies to use Nextcloud without maintaining their own infrastructure. The service provides enterprise-grade security, reliable performance, and scalable collaboration while giving organizations full control over their data and workflows.
    Starting Price: $5.70
  • 8
    DERO

    DERO

    DERO

    DERO is a general-purpose, private, and scalable decentralized application platform that allows developers to deploy powerful and unstoppable applications, while users retain total control over their assets with complete privacy. Account balances and data are never decrypted by the blockchain. Only account owners can decrypt and access their data. Welcome to a new data privacy paradigm. DERO has been developed from scratch in Golang and is being actively developed by the original developers....
  • 9
    Trackaway

    Trackaway

    Trackaway

    Trackaway is a privacy-first, high-performance VPN built on 100 Gbps infrastructure and modern WireGuard® tunnels. It delivers fast, low-latency, and predictable connectivity for everyday internet use, from browsing and streaming to working in secure network environments. The service is designed so that no user data is collected or stored. Trackaway operates without activity logs, third-party analytics, or tracking mechanisms, keeping the system simple, transparent, and privacy-focused by design. ...
    Starting Price: $1.99/month
  • 10
    Nanobrowser

    Nanobrowser

    Nanobrowser

    ...Nanobrowser offers flexible LLM (Large Language Model) options, enabling users to connect to various providers like OpenAI, Anthropic, and Gemini. The platform is privacy-focused, with everything running locally in the browser to ensure user credentials remain secure. As a free tool, it provides powerful web automation capabilities without the high subscription fees.
    Starting Price: Free
  • 11
    Waterfox

    Waterfox

    Waterfox

    Waterfox is a privacy-focused web browser designed for power users who want control, customization, and speed. Built on a Firefox-based foundation, it removes telemetry, analytics, and remote experiments by default. Waterfox prioritizes user privacy with features like Oblivious DNS, which protects both what you browse and who is browsing. The browser includes built-in tools that eliminate the need for multiple extensions.
    Starting Price: Free
  • 12
    Floorp Browser

    Floorp Browser

    Floorp Projects & Ablaze

    Floorp is an open source web browser based on Mozilla Firefox, developed with a focus on privacy, flexibility, and customization. Created in Japan, Floorp enhances the user experience by providing features like built-in tracking protection, vertical tabs, and dual sidebars that allow for efficient tab management and multitasking. It also supports extensive customization, enabling users to personalize everything from tab arrangements to interface designs, even allowing CSS tweaks for advanced...
    Starting Price: Free
  • 13
    Gblock

    Gblock

    Jacopo Beschi

    Gblock is a Chrome extension that protects your privacy in Gmail by blocking email senders from tracking you. Gblock provides you with full protection against email tracking, shielding you from tracking links, spy pixels, and anonymizing you via our proxy. Plus, with automated tracker detection, Gblock stays up to date to block new trackers as they are released! ✔️ SPY PIXEL PROTECTION ✔️ TRACKING LINK PROTECTION ✔️ AUTOMATED TRACKER...
    Starting Price: $12/year
  • 14
    OneVPN

    OneVPN

    OneVPN

    OneVPN is a product of Unravel Technologies, a Hong Kong based IT Security Consulting Firm. Not long ago, we gathered as a team, focused on internet security problems that we come across during our daily online activities. The idea was to step in to the market in order to develop an outstanding Virtual Private Network (VPN), which can protect individuals from getting their activities monitored from evil intruders.
    Starting Price: $3.99/month
  • 15
    Lepilo

    Lepilo

    Lepilo

    Lepilo is an automation platform meticulously crafted with the user in mind. We aspire to provide a simple yet versatile solution for all your automation needs. Lepilo seamlessly operates within your browser as well as a CLI application or an HTTP server. We prioritize privacy and operate offline-first; your data remains exclusively within your possession, ensuring a secure and confidential experience.
  • 16
    Dialpad Connect
    Dialpad Connect is an AI-powered unified communications platform that combines voice, video, and messaging to enhance team collaboration and customer interactions. It features real-time call transcription, automated call summaries, and AI-generated action items to help users stay focused during conversations. The platform integrates seamlessly with popular business apps like Salesforce, Zendesk, Microsoft Teams, and Google Workspace to streamline workflows. Designed for businesses of all sizes, Dialpad Connect delivers enterprise-grade reliability with 100% uptime SLA and robust disaster recovery. Security and privacy are core priorities, meeting standards like GDPR, HIPAA, and SOC 2 compliance. ...
    Leader badge
    Starting Price: $15 user/month
    View Software
    Visit Website
  • 17
    Zextras Carbonio
    Zextras Carbonio is a full-stack digital workplace with an emphasis on data privacy, surpassing traditional email servers. This advanced platform offers unmatched deployment flexibility, scalability, and customization, creating a robust and private digital workspace. Key features include an advanced email server with anti-spam and antivirus capabilities, empowering administrators with server-side tools. Clients enjoy a rich webmail interface, native iOS and Android apps, and collaborative...
    Starting Price: Custom
  • 18
    vp.net

    vp.net

    vp.net

    vp.net is a privacy-focused VPN service built on a zero-knowledge architecture and hardware-enforced security that delivers verifiable, end-to-end encrypted connections in which even the service provider cannot identify user activity. It leverages Intel SGX enclaves and attestation services to ensure code execution is genuine and auditable, offering users immutable proof that no logs are maintained and no user data is splintered from their secured session.
    Starting Price: Free
  • 19
    Brave Leo

    Brave Leo

    Brave Software

    ...Brave Leo can also create content, translate between different languages, and transcribe audio and video. It can even have back-and-forth conversations. Brave Leo is currently available in the Brave browser for desktop (macOS, Windows and Linux). Leo will be available on the Brave browser for mobile (Android and iOS) very soon.
    Starting Price: Free
  • 20
    Wasabi Wallet

    Wasabi Wallet

    Wasabi Wallet

    Wasabi is an open-source, non-custodial, privacy-focused Bitcoin wallet for desktop, that implements trustless CoinJoin. Wasabi creates trustless CoinJoin transactions over the Tor anonymity network. The CoinJoin coordinator cannot steal from, nor breach the privacy of the participants. Wasabi's coinjoin implementation is trustless by design. The participants do not need to trust each other or any third party.
  • 21
    Ackee

    Ackee

    Ackee

    ...Ackee combines privacy-focused analytics and first-class insights in a minimal interface. See your stats from a new perspective. The minimal UI of Ackee allows you to analyze your data without losing focus. Cookie-free and secure. Our multi-step anonymization process ensures that your users stay anonymous. Ackee runs on your own server and is 100% open-source.
  • 22
    Threema

    Threema

    Threema

    Threema is an instant messenger designed to generate as little user data as possible. All communication is always end-to-end encrypted. When setting up the chat app, each user generates a random Threema ID. Linking a phone number or email address is optional. Free online services are often financed by using user data for advertising. For example, WhatsApp collects metadata, which isn't compatible with privacy protection. Threema is financed by the price of the app and does not collect user...
    Starting Price: $5.99 per month
  • 23
    Decompute Blackbird
    ...This approach allows businesses to optimize their AI capabilities by giving different teams the ability to develop and train models more efficiently and securely. Decompute aims to scale enterprise AI by focusing on decentralized AI infrastructure, helping organizations better leverage their data without compromising privacy or performance.
  • 24
    Anchor Wallet
    Use the Anchor Wallet to seamlessly and securely interact with any EOSIO-based blockchain. Anchor is a security and privacy focused open-source digital wallet for all EOSIO-based networks. Anchor uses modern approaches to ensure the security of your accounts. The use of strong encryption. A core principle considered in the design of Anchor is the need for privacy when using it. The default servers the app connects with collect no identifiable information and can be customized to use the services of your choosing. ...
  • 25
    Afina Browser

    Afina Browser

    Smartorama Inc.

    ...Unlike traditional spoofing tools, Afina uses a real Chromium network stack with native support for UDP, WebRTC, and QUIC (HTTP/3), ensuring that browser fingerprints, ICE topology, and traffic patterns match real user behavior. Afina focuses on realistic browser fingerprints (WebGL, Canvas, Audio, Client Hints), secure profile isolation, and automation-ready workflows. It is built for professionals who need reliable multi-account management without shortcuts that break under antifraud systems. The platform is suitable for use cases such as e-commerce operations, advertising, traffic testing, QA, and security research, where accuracy, privacy, and control are critical.
    Leader badge
    Starting Price: $35
  • 26
    Nexo

    Nexo

    Nexo

    Nexo is a premier digital assets wealth platform designed to empower clients to grow, manage, and preserve their crypto holdings. Our mission is to lead the next generation of wealth creation by focusing on customer success and delivering tailored solutions that build enduring value, supported by 24/7 client care. Since 2018, Nexo has provided unmatched opportunities to forward-thinking clients in over 200 jurisdictions. With over $7 billion in AUM and $320 billion processed, we bring...
    Starting Price: Free
    View Software
    Visit Website
  • 27
    SNote

    SNote

    SNote

    SNote is the privacy focused workspace designed for exceptional productivity and collaboration. Privacy without Compromises State-of-the-art end-to-end encryption keeps your notes and files secure. We can't read your notes or access to your files, and no one else can either. Privacy isn’t an optional mode - it’s just the way that SNote works. Every note, every file, every time.
    Starting Price: $8
  • 28
    TradeNote

    TradeNote

    TradeNote

    TradeNote is an open source trading journal designed to help traders store, discover, and recollect all their trades, aiming to enhance consistency and profitability. Emphasizing data security and privacy, it allows users full control over their data by enabling them to download and install both the application and its database on their preferred devices. The platform offers a range of features, including the ability to import trades from various broker platforms, visualize trades on charts...
    Starting Price: $4.99 per month
  • 29
    Control D

    Control D

    Control D

    Control D is a customizable DNS filtering and traffic redirection platform that leverages Secure DNS protocols like DNS-over-HTTPS, DNS-over-TLS and DNS-over-QUIC, with support for Legacy DNS. - Block malicious threats - Block unwanted types of content network wide (ads & trackers, IoT telemetry, adult content, socials, and more) - Deploy in minutes on fleets of devices using RMM - Manage clients using sub-organizations - Gain visibility on network events and usage patterns, with...
    Leader badge
    Starting Price: $2/month
    View Software
    Visit Website
  • 30
    PYPROXY

    PYPROXY

    PYPROXY

    Market-leading proxy solution provides tens of millions of IP resources. Commercial residential and ISP proxy network includes 90M+ IPs around the world. Exclusive high-performance server requests access to real residential addresses. Abundant bandwidth support business demands. Real-time speed can reach 1M-5M/s.99% success rate guarantee data collection activities. There is no limit to the number of uses or invocation frequencies of the proxies. You can generate huge amounts of proxies at...
    Starting Price: $0.77/GB
    View Software
    Visit Website
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next