Best IT Management Software for AT&T Alien Labs Open Threat Exchange

Find and compare the best IT Management software for AT&T Alien Labs Open Threat Exchange in 2025

Use the comparison tool below to compare the top IT Management software for AT&T Alien Labs Open Threat Exchange on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Google Cloud Platform Reviews
    Top Pick

    Google Cloud Platform

    Google

    Free ($300 in free credits)
    55,297 Ratings
    See Software
    Learn More
    Google Cloud is an online service that lets you create everything from simple websites to complex apps for businesses of any size. Customers who are new to the system will receive $300 in credits for testing, deploying, and running workloads. Customers can use up to 25+ products free of charge. Use Google's core data analytics and machine learning. All enterprises can use it. It is secure and fully featured. Use big data to build better products and find answers faster. You can grow from prototypes to production and even to planet-scale without worrying about reliability, capacity or performance. Virtual machines with proven performance/price advantages, to a fully-managed app development platform. High performance, scalable, resilient object storage and databases. Google's private fibre network offers the latest software-defined networking solutions. Fully managed data warehousing and data exploration, Hadoop/Spark and messaging.
  • 2
    Zscaler Reviews
    Zscaler, the creator of Zero Trust Exchange, uses the most powerful security cloud on the planet in order to make doing business and navigating changes easier, faster, and more productive. Zscaler Zero Trust Exchange allows for fast, secure connections. It also allows employees to work anywhere via the internet as their corporate network. It is based on the zero trust principle that least-privileged access and provides comprehensive security through context-based identity and policy enforcement. The Zero Trust Exchange is available in 150 data centers around the world, ensuring that your users are close to the service, as well as the cloud providers and applications they use, such Microsoft 365 and AWS. It provides unparalleled security and a great user experience, ensuring the fastest route between your users' destinations.
  • 3
    Cisco ACI Reviews
    Automated resource management can help you achieve greater resource flexibility. For security, governance, compliance, and compliance, ensure consistent policy management across multiple cloud and on-premise instances. A zero-trust security model ensures business continuity, disaster recovery, high-security networking, and secure networking. Transform Day 2 operations into a proactive model that automates troubleshooting, root cause analysis, and remediation. It optimizes performance and allows for single-click access to facilitate automation and central management. On-premises ACI networks can be extended to remote locations, bare metal clouds, and colocation providers that don't require hardware. Cisco's Multi-Site Orchestrator provides provisioning and health monitoring and manages Cisco ACI network policies. This solution automates network connectivity, provides consistent policy management and simplifies operations for multicloud environments.
  • 4
    Ivanti Neurons for MDM Reviews
    Manage and secure all endpoints to protect data wherever you work. How do you manage the increasing demand for devices and platforms? Ivanti Neurons MDM is a single solution for managing iOS, iPadOS Android, macOS ChromeOS and Windows. Onboard devices quickly and easily and provision them with all the apps and settings they need. Deliver a native, delightful user experience on any device or OS while improving productivity. Manage and protect any iOS device, iPadOS device, Android device, macOS or ChromeOS devices, Windows, VR/XR devices, and ChromeOS devices, all from a cloud-based solution. Know that the devices your supply-chain workers rely on for their daily work are up to date and in good working condition.
  • 5
    Amazon Web Services (AWS) Reviews
    Top Pick
    AWS offers a wide range of services, including database storage, compute power, content delivery, and other functionality. This allows you to build complex applications with greater flexibility, scalability, and reliability. Amazon Web Services (AWS), the world's largest and most widely used cloud platform, offers over 175 fully featured services from more than 150 data centers worldwide. AWS is used by millions of customers, including the fastest-growing startups, large enterprises, and top government agencies, to reduce costs, be more agile, and innovate faster. AWS offers more services and features than any other cloud provider, including infrastructure technologies such as storage and databases, and emerging technologies such as machine learning, artificial intelligence, data lakes, analytics, and the Internet of Things. It is now easier, cheaper, and faster to move your existing apps to the cloud.
  • 6
    Cloudflare Reviews
    Top Pick

    Cloudflare

    Cloudflare

    $20 per website
    12 Ratings
    Cloudflare is the foundation of your infrastructure, applications, teams, and software. Cloudflare protects and ensures the reliability and security of your external-facing resources like websites, APIs, applications, and other web services. It protects your internal resources, such as behind-the firewall applications, teams, devices, and devices. It is also your platform to develop globally scalable applications. Your website, APIs, applications, and other channels are key to doing business with customers and suppliers. It is essential that these resources are reliable, secure, and performant as the world shifts online. Cloudflare for Infrastructure provides a complete solution that enables this for everything connected to the Internet. Your internal teams can rely on behind-the-firewall apps and devices to support their work. Remote work is increasing rapidly and is putting a strain on many organizations' VPNs and other hardware solutions.
  • 7
    Okta Reviews
    Top Pick
    One platform, infinite ways for you to connect with your customers and employees. Any app can be made authable. Okta can help you create secure and delightful experiences quickly. Okta's Customer ID products can be combined to create the stack you need. This will provide security, scalability and reliability. Protect and empower your employees, contractors, partners. Okta's workforce identification solutions will protect your employees no matter where they are. You will have the tools you need to automate cloud journeys and support hybrid environments. Okta is trusted by companies around the globe to protect their workforce identities.
  • 8
    IBM Cloud Reviews
    IBM Cloud®, capabilities allow for business agility and resilience. Discover the platform that offers 2.5x value. It is designed for industry, security, and the freedom to create and run anywhere. Automation and AI can transform business workflows. A strong technology partner network that provides value for industry needs. Solutions and expertise in the business and industry domains. Automated and auditable processes. Unique capabilities that ensure the highest level of cloud security monitoring. All applications are subject to the same security and controls. Containerized capabilities for DevOps automation, data security and data management. Integration is easy and the application development lifecycle is consistent. Advanced technologies such as IBM Watson®, analytics and IoT.
  • 9
    Box Reviews
    Top Pick
    Secure collaboration with anyone, anyplace, on any device. It is our top priority to protect your cloud files. We have developed advanced security controls, intelligent threats detection, and complete information governance. We also know that your needs are not limited to these security controls. Strict data privacy? Check. Check. Check. Check. You should check. Collaboration is key to your business. This includes customers, partners, vendors, and teammates. Everyone can work together on your most important content easily if they are in the same place. You should not be sharing files but frustration. You should be able to rest assured that your data is safe. It is a waste of time to work on cumbersome, manual processes every day. We let anyone automate repeatable workflows that are important to your business, such as HR onboarding and contract management. Your workflows will move faster. You have more time for what is most important.
  • 10
    Microsoft Azure Reviews
    Top Pick
    Microsoft Azure is a cloud computing platform that allows you to quickly develop, test and manage applications. Azure. Invent with purpose. With more than 100 services, you can turn ideas into solutions. Microsoft continues to innovate to support your development today and your product visions tomorrow. Open source and support for all languages, frameworks and languages allow you to build what you want and deploy wherever you want. We can meet you at the edge, on-premises, or in the cloud. Services for hybrid cloud enable you to integrate and manage your environments. Secure your environment from the ground up with proactive compliance and support from experts. This is a trusted service for startups, governments, and enterprises. With the numbers to prove it, the cloud you can trust.
  • 11
    ServiceNow Reviews

    ServiceNow

    ServiceNow

    $100 per month
    1 Rating
    Digitize your workflows and they will love you for it. Your company will be more productive and your employees more engaged. ServiceNow makes work more enjoyable for employees. ServiceNow transforms old, manual ways to work into modern digital workflows so customers and employees get what they need when they need it. It's fast, simple, and easy. ServiceNow provides digital workflows that deliver great experiences and increase productivity for employees and enterprises. ServiceNow simplifies the complexity of work with a single enterprise cloud platform. The Now Platform: An intelligent, intuitive cloud platform that allows you to work smarter. You can choose from our workflows, or create your own apps. Our product portfolio is built on the Now Platform and delivers the IT, Employee, Customer, and Customer Workflows that matter. We also offer enterprise solutions to help you drive every aspect of your digital transformation. Get the amazing experiences you desire and unlock the productivity that you need. Now, native mobile capabilities are available for every day work across the enterprise.
  • 12
    SonicWall Capture Client Reviews
    SonicWall Capture Client, a unified client platform, delivers multiple endpoint protection capabilities including next-generation malware defense and application vulnerability intelligence. It uses cloud sandbox file testing, comprehensive reports, and enforcement to provide endpoint protection. It provides client security assurance, as well as easy-to-use, actionable intelligence and reporting. Examine files that may be waiting to be activated in a cloud Sandbox. Use cloud intelligence and dynamic white/blacklisting. Advanced static analysis is used to identify threats during downloading. SonicWall's verdict database provides shared threat intelligence. To see where threats originated and went, view threat visualization maps. You can quickly assess your security posture. Take a look at all your applications to see which ones are most vulnerable.
  • 13
    NorthStar Navigator Reviews

    NorthStar Navigator

    NorthStar.io, Inc.

    $8 per device
    NorthStar allows organizations to easily incorporate threat intelligence and business context to enable a risk-based approach to their vulnerability management program. The Platform automates the collection, normalization, consolidation and correlation of threat intelligence, asset, software, and vulnerability data. Combined with a transparent scoring model, NorthStar automates the tedious and manual process of prioritizing vulnerability remediation.
  • 14
    Cisco Vulnerability Management Reviews
    You can't fix all the vulnerabilities. Use extensive threat intelligence and patented prioritization techniques to reduce costs, save time and keep your team focused on reducing your biggest risks. This is Modern Risk-Based Vulnerability management. We developed Risk-Based Vulnerability Management and are now defining the modern model. Show your IT and security teams which infrastructure vulnerabilities need to be remedied, and when. Our latest version shows that exploitability is measurable, and accurately calculating exploitability will help you minimize it. Cisco Vulnerability Management, formerly Kenna.VM, combines real-world exploit and threat intelligence with advanced data science in order to determine which vulnerabilities are the most risky and which can be deprioritized. Spoiler alert! Your mega-list will shrink faster than the woolen sweater-vest on a hot wash cycle.
  • 15
    Panda Fusion Reviews

    Panda Fusion

    WatchGuard Technologies

    Fusion combines our Endpoint Protection Plus and Systems Management solutions to protect, manage, and support all your corporate devices. Cloud-delivered solutions allow for rapid deployment without the need for costly server infrastructure investments or maintenance. Maximum Security: Continuous protection of all office endpoints, inside and out. - Proactive Support & Maintenance: Rapid incident management, troubleshooting. - Centralized Control & Management: Permanent visibility to all hardware, software, and other IT infrastructure components.
  • 16
    Cegeka Reviews
    Innovation is the new norm. However, IT continuity must be maintained. It's a delicate balance. It allows you to concentrate on your strategy by outsourcing your IT. Outsourcing your IT is not just about saving money. There are many other reasons. Partnering with a strategic partner allows you, the responsible party to focus on your strategy and create added value. Cegeka adopts a proactive approach to focusing on your business drivers. Outsourcing is more than just delivering services to customers. Our goal is to help your business grow and improve. We believe in collaboration based on empathy, commitment, and cooperation. We take care of your infrastructure and make it easy for you. We offer a flexible approach that works for both public cloud and private cloud environments as well as on-premises environments. We help you make your infrastructure sustainable with an 'as-a service' model that is flexible.
  • 17
    FortiManager Reviews
    Network security and digital transformation (DX), have become more complex and less secure due to the rapid growth of DX technologies. Although malicious cyberattacks are still a problem, Ponemon's recent study found that more than half the breaches that occurred last year were caused by benign sources that could have prevented them. Automated network operations can be a key component of a security strategy. FortiManager is part of the Fortinet Security Fabric and supports network operations use cases. It allows for centralized management, best practice compliance, workflow automation, and workflow optimization to improve protection against breaches. All your Fortinet devices can be managed from one central management console. FortiManager gives you full visibility into your network and offers streamlined provisioning as well as innovative automation tools. FortiManager gives you visibility into your network traffic and threats via a single pane-of-glass. It also offers enterprise-class features as well as sophisticated security management.
  • 18
    Apache Airflow Reviews

    Apache Airflow

    The Apache Software Foundation

    Airflow is a community-created platform that allows programmatically to schedule, author, and monitor workflows. Airflow is modular in architecture and uses a message queue for managing a large number of workers. Airflow can scale to infinity. Airflow pipelines can be defined in Python to allow for dynamic pipeline generation. This allows you to write code that dynamically creates pipelines. You can easily define your own operators, and extend libraries to suit your environment. Airflow pipelines can be both explicit and lean. The Jinja templating engine is used to create parametrization in the core of Airflow pipelines. No more XML or command-line black-magic! You can use standard Python features to create your workflows. This includes date time formats for scheduling, loops to dynamically generate task tasks, and loops for scheduling. This allows you to be flexible when creating your workflows.
  • Previous
  • You're on page 1
  • Next