Alternatives to ClamAV logo

Alternatives to ClamAV

Sophos, OpenSSL, Let's Encrypt, Ensighten, and Spring Security are the most popular alternatives and competitors to ClamAV.
23
31
+ 1
0

What is ClamAV and what are its top alternatives?

It is an open source antivirus engine for detecting trojans, viruses, malware & other malicious threats.
ClamAV is a tool in the Security category of a tech stack.
ClamAV is an open source tool with 1.3K GitHub stars and 393 GitHub forks. Here’s a link to ClamAV's open source repository on GitHub

Top Alternatives to ClamAV

  • Sophos

    Sophos

    It is Cybersecurity Evolved. Advanced Endpoint Protection and Network Security Fully Synchronized in Real Time. ...

  • OpenSSL

    OpenSSL

    It is a robust, commercial-grade, and full-featured toolkit for the Transport Layer Security (TLS) and Secure Sockets Layer (SSL) protocols. It is also a general-purpose cryptography library. ...

  • Let's Encrypt

    Let's Encrypt

    It is a free, automated, and open certificate authority brought to you by the non-profit Internet Security Research Group (ISRG). ...

  • Ensighten

    Ensighten

    Ensighten is a comprehensive website security company, offering next generation compliance, enforcement and client-side protection against data loss, ad injection and intrusion. ...

  • Spring Security

    Spring Security

    It is a framework that focuses on providing both authentication and authorization to Java applications. The real power of Spring Security is found in how easily it can be extended to meet custom requirements. ...

  • Authy

    Authy

    We make the best rated Two-Factor Authentication smartphone app for consumers, a Rest API for developers and a strong authentication platform for the enterprise. ...

  • Sqreen

    Sqreen

    Sqreen is a security platform that helps engineering team protect their web applications, API and micro-services in real-time. The solution installs with a simple application library and doesn't require engineering resources to operate. Security anomalies triggered are reported with technical context to help engineers fix the code. Ops team can assess the impact of attacks and monitor suspicious user accounts involved. ...

  • AWS WAF

    AWS WAF

    AWS WAF is a web application firewall that helps protect your web applications from common web exploits that could affect application availability, compromise security, or consume excessive resources. ...

ClamAV alternatives & related posts

Sophos logo

Sophos

5
13
0
Human-engineered, AI-powered cybersecurity protection for your business and home
5
13
+ 1
0
PROS OF SOPHOS
    Be the first to leave a pro
    CONS OF SOPHOS
      Be the first to leave a con

      related Sophos posts

      OpenSSL logo

      OpenSSL

      8.2K
      2.9K
      0
      Full-featured toolkit for the Transport Layer Security and Secure Sockets Layer protocols
      8.2K
      2.9K
      + 1
      0
      PROS OF OPENSSL
        Be the first to leave a pro
        CONS OF OPENSSL
          Be the first to leave a con

          related OpenSSL posts

          Simon Reymann
          Senior Fullstack Developer at QUANTUSflow Software GmbH · | 28 upvotes · 2.2M views

          Our whole DevOps stack consists of the following tools:

          • GitHub (incl. GitHub Pages/Markdown for Documentation, GettingStarted and HowTo's) for collaborative review and code management tool
          • Respectively Git as revision control system
          • SourceTree as Git GUI
          • Visual Studio Code as IDE
          • CircleCI for continuous integration (automatize development process)
          • Prettier / TSLint / ESLint as code linter
          • SonarQube as quality gate
          • Docker as container management (incl. Docker Compose for multi-container application management)
          • VirtualBox for operating system simulation tests
          • Kubernetes as cluster management for docker containers
          • Heroku for deploying in test environments
          • nginx as web server (preferably used as facade server in production environment)
          • SSLMate (using OpenSSL) for certificate management
          • Amazon EC2 (incl. Amazon S3) for deploying in stage (production-like) and production environments
          • PostgreSQL as preferred database system
          • Redis as preferred in-memory database/store (great for caching)

          The main reason we have chosen Kubernetes over Docker Swarm is related to the following artifacts:

          • Key features: Easy and flexible installation, Clear dashboard, Great scaling operations, Monitoring is an integral part, Great load balancing concepts, Monitors the condition and ensures compensation in the event of failure.
          • Applications: An application can be deployed using a combination of pods, deployments, and services (or micro-services).
          • Functionality: Kubernetes as a complex installation and setup process, but it not as limited as Docker Swarm.
          • Monitoring: It supports multiple versions of logging and monitoring when the services are deployed within the cluster (Elasticsearch/Kibana (ELK), Heapster/Grafana, Sysdig cloud integration).
          • Scalability: All-in-one framework for distributed systems.
          • Other Benefits: Kubernetes is backed by the Cloud Native Computing Foundation (CNCF), huge community among container orchestration tools, it is an open source and modular tool that works with any OS.
          See more
          Let's Encrypt logo

          Let's Encrypt

          1.5K
          907
          93
          A free, automated, and open Certificate Authority (CA)
          1.5K
          907
          + 1
          93
          PROS OF LET'S ENCRYPT
          • 46
            Open Source SSL
          • 29
            Simple setup
          • 9
            Free
          • 9
            Microservices
          • 0
            Easy ssl certificates
          CONS OF LET'S ENCRYPT
            Be the first to leave a con

            related Let's Encrypt posts

            Ensighten logo

            Ensighten

            395
            7
            0
            Website Security & Privacy Compliance
            395
            7
            + 1
            0
            PROS OF ENSIGHTEN
              Be the first to leave a pro
              CONS OF ENSIGHTEN
                Be the first to leave a con

                related Ensighten posts

                Spring Security logo

                Spring Security

                338
                324
                2
                A powerful and highly customizable authentication and access-control framework
                338
                324
                + 1
                2
                PROS OF SPRING SECURITY
                • 1
                  Java integration
                • 1
                  Easy to use
                CONS OF SPRING SECURITY
                  Be the first to leave a con

                  related Spring Security posts

                  Authy logo

                  Authy

                  135
                  127
                  1
                  The easiest way to add Two-Factor Authentication to any website or app.
                  135
                  127
                  + 1
                  1
                  PROS OF AUTHY
                  • 1
                    Google Authenticator-compatible
                  • 0
                    1
                  CONS OF AUTHY
                  • 2
                    Terrible UI on mobile

                  related Authy posts

                  Sqreen logo

                  Sqreen

                  120
                  57
                  49
                  Automated security for developers
                  120
                  57
                  + 1
                  49
                  PROS OF SQREEN
                  • 10
                    Block attacks in real-time
                  • 9
                    Security monitoring
                  • 8
                    Integrates in minutes
                  • 6
                    Easily enforce security headers
                  • 5
                    Prevent data breaches
                  • 5
                    Get full visibility into app security
                  • 5
                    Monitor suspicious users
                  • 1
                    Unified security solution for web apps
                  CONS OF SQREEN
                    Be the first to leave a con

                    related Sqreen posts

                    AWS WAF logo

                    AWS WAF

                    101
                    115
                    0
                    Control which traffic to allow or block to your web application by defining customizable web security rules
                    101
                    115
                    + 1
                    0
                    PROS OF AWS WAF
                      Be the first to leave a pro
                      CONS OF AWS WAF
                        Be the first to leave a con

                        related AWS WAF posts