Top 15 Tripwire Alternative and Similar Softwares | May 2024

Open Source Tripwire software is a security and data integrity tool useful for monitoring and alerting on specific file change(s) on a range of systems.

1. Barricade

Barricade We thought security products were too complex, difficult to use and inaccessible - so we set out to build the most simple, human and intuitive security product ever made. In other words the kind of security product we want for ourselves. At its core Barricade works like an early warning......

2. Suricata

Suricata Suricata is a high performance Network IDS, IPS and Network Security Monitoring engine. Open Source and owned by a community run non-profit foundation, the Open Information Security Foundation (OISF). Suricata is developed by the OISF and its supporting vendors. Suricata is a fork of snort.......

3. Cyberarms Intrusion Detection and Defense System (IDDS)

Cyberarms Intrusion Detection and Defense System (IDDS) Out-of-the-box security for Remote Deskop, Exchange, OWA, SharePoint, CRM, generic IIS applications and many other server systems.......

4. LogDog

LogDog LogDog (Log Dog) is a mobile Intrusion Detection System (IDS, also known as IDPS or IPS)* for your online accounts. It is an internet security service that gives you an immediate alert of any suspicious activity in your accounts – so you can take action and protect your privacy immediately.......

5. snort

snort Snort® is an open source network intrusion prevention and detection system (IDS/IPS) developed by Sourcefire. Combining the benefits of signature, protocol, and anomaly-based inspection, Snort is the most widely deployed IDS/IPS technology worldwide. With millions of downloads and nearly 400,000 registered users, Snort has become the de facto standard for......

6. Naxsi

Naxsi # What is Naxsi?NAXSI means Nginx Anti XSS & SQL Injection.Technically, it is a third party nginx module, available as a package for many UNIX-like platforms. This module, by default, reads a small subset of simple (and readable) rules containing 99% of known patterns involved in website vulnerabilities. For example,......

7. OnionMail

OnionMail OnionMail is an anonymous and encrypted mail server designed to run on the TOR network without losing the ability to communicate with the Internet. This ensures greater privacy to the users but also protect against eavesdropping of the NSA and others.......

8. Pentoo

Pentoo Pentoo is a security-focused livecd based on Gentoo. It's basically a Gentoo install with lots of customized tools, a customized kernel, and much more.Put simply, Pentoo is Gentoo with the pentoo overlay. This overlay is available in layman so all you have to do is layman -L and layman -a......

9. Déjà Dup

Déjà Dup Déjà Dup is a simple backup tool. It hides the complexity of doing backups the 'right way' (encrypted, off-site, and regularly) and uses Duplicity as the backend. It features support for local or remote backup locations, including Amazon S3. It securely encrypts and compresses your data. It incrementally......

10. WinPurify

WinPurify WinPurify is a useful application designed to help you tweak various OS settings, remove unnecessary files and improve your computer’s general performance.Tweak your OS, remove unwanted items and speed up your PCWinPurify enables you to remove Windows universal apps, the Windows Store, temporary data and help files, as well as......

11. Semaphor

Semaphor In Semaphor, every conversation, file-shared, and message is cryptographically secure. We aren't slack about privacy, and neither are our customers. Until now, there's never been a mainstream product that patches the leaky holes within your organization, and bridges the gap between usability, convenience, and security.......

12. CryptoPrevent

CryptoPrevent YES, this is the original CryptoLocker prevention tool you’ve read about!CryptoPrevent has been featured on The Today Show, CNBC, Brian Krebs security blog (among many others) and by educators everywhere such as Kim Komando, Ken Dwight ‘The Virus Doctor’, and the infamous Britec09 on Youtube, to name just a few!CryptoPrevent......

13. AppLock Face/Voice Recognition

AppLock Face/Voice Recognition AppLock Face/Voice Recognition: The ONLY app that combines face & voice recognition for privacy/security purposes.Want premium security for specific applications on your smartphone? AppLock Face/Voice Recognition makes it easy to lock apps on your phone or tablet that you want to keep private. It puts the security technology of the......

14. Bitdefender Anti-Ransomware

Bitdefender Anti-Ransomware Bitdefender Anti-Ransomware is a new product by security company Bitdefender to protect Windows PCs against several ransomware families.Ransomware describes a specific type of malicious software that has been designed to force users to pay ransom -- usually in the form of Bitcoin -- by encrypting data or locking the screen,......

15. Compaas

Compaas Using the public cloud without Compaas is like driving without a seatbelt. 60% of companies fail after a data breach and employee negligence is the leading cause of data exposure. Compaas protects your cloud data against employee negligence and 3rd party apps. Small and medium-sized businesses are plagued with employee......