What Integrates with Axonius?
Find out what Axonius integrations exist in 2025. Learn what software and services currently integrate with Axonius, and sort them by reviews, cost, features, and more. Below is a list of products that Axonius currently integrates with:
-
1
Alibaba Cloud
Alibaba
1 RatingAlibaba Cloud, a subsidiary of Alibaba Group (NYSE: BABA), offers a wide range of global cloud computing solutions designed to enhance the online operations of our international clientele while also supporting Alibaba Group's e-commerce infrastructure. In a significant move, Alibaba Cloud was named the official Cloud Services Partner for the International Olympic Committee in January 2017. Committed to advancing the latest cloud technologies and robust security measures, we strive to fulfill our mission of simplifying global business interactions for everyone. Serving both large enterprises and small startups, as well as individual developers and public organizations, Alibaba Cloud extends its services across more than 200 countries and regions worldwide. Our dedication to innovation and customer satisfaction sets us apart in the cloud computing landscape. -
2
Carbon Black EDR
Broadcom
1 RatingCarbon Black EDR by Broadcom provides a robust endpoint security solution that combines real-time threat detection, behavioral analysis, and machine learning to protect organizations from sophisticated cyber threats. The platform monitors endpoint activity across networks, offering continuous visibility and automated responses to potential security incidents. By leveraging a cloud-based architecture, Carbon Black EDR ensures seamless scalability and fast deployment, helping organizations mitigate risks, detect threats faster, and respond effectively. It’s ideal for businesses seeking a proactive solution to safeguard their systems from evolving cybersecurity threats. -
3
BitLocker Drive Encryption serves as a crucial data security feature, seamlessly integrated into the operating system, designed to combat risks associated with data theft or exposure due to lost, stolen, or improperly retired computers. The most robust protection is achieved when BitLocker is paired with a Trusted Platform Module (TPM) version 1.2 or higher, a hardware element that many modern computers come equipped with. This TPM collaborates with BitLocker to safeguard user data and verify that the computer remains untampered while offline. For machines lacking a TPM version 1.2 or more advanced, BitLocker can still encrypt the Windows operating system drive, but this setup necessitates the user to utilize a USB startup key to power on the computer or wake it from hibernation. Since the introduction of Windows 8, users can also opt for an operating system volume password to secure the operating system volume on computers without a TPM. This additional flexibility enhances usability while maintaining security standards.
-
4
Our goal is to enhance and protect productivity in a world that prioritizes privacy, allowing work and leisure to take place in any location. As everything transitions to the cloud, it is vital that cybersecurity moves with you, safeguarding your information from the endpoint to the cloud environment. The importance of mobility and cloud technology cannot be overstated, as many of us now navigate our professional and personal lives through digital means. Lookout’s solutions offer a platform that merges endpoint and cloud security technologies, customizable for any industry and suitable for a range of organizations, from solo users to expansive global firms and government entities. Cloud access can be managed flexibly, ensuring that security measures do not hinder productivity or diminish user experience. By providing comprehensive visibility and insights, we empower you to protect your data through precise access controls while delivering a smooth and effective user experience. Ultimately, our commitment is to ensure that security and productivity coexist harmoniously in your daily activities.
-
5
Streamline your data protection strategies by removing outdated backup silos, enabling efficient safeguarding of virtual, physical, and cloud workloads alongside ensuring rapid recovery. By processing data where it resides and utilizing applications to extract insights, you can enhance your operational efficiency. Protect your organization from advanced ransomware threats through a comprehensive data security framework, as relying on numerous single-purpose tools for disparate silos increases vulnerability. Cohesity boosts cyber resilience and addresses extensive data fragmentation by centralizing information within a singular hyper-scale platform. Transform your data centers by unifying backups, archives, file shares, object stores, and data utilized in analytics and development/testing processes. Our innovative solution for these issues is Cohesity Helios, a unified next-generation data management platform that delivers a variety of services. With our next-gen approach, managing your data becomes simpler and more efficient, all while adapting to the continuous growth of your data landscape. This unification not only enhances operational efficiency but also fortifies your defenses against evolving cyber threats.
-
6
The IBM Maximo® Application Suite comprises a collection of applications designed for effectively monitoring and managing assets, as well as for predictive maintenance and reliability planning. Maximo Application Suite enables organizations to maximize the value derived from their enterprise assets through a unified, cloud-based platform that harnesses the power of AI, IoT, and analytics to enhance performance, prolong asset lifespans, and minimize both operational downtime and expenses. Equipped with IBM Maximo's leading-edge technology, users benefit from adaptable applications for CMMS, EAM, APM, and RCM, all while enjoying simplified installation and management processes, alongside an improved user experience through the integration of shared data and workflows. Utilizing AI and analytics allows for effective management and maintenance of high-value assets, which not only optimizes their performance but also extends their operational lifecycles and decreases costs and downtime. By incorporating automated asset inspections that are powered by real-time data and artificial intelligence, organizations can significantly enhance their inspection procedures. This comprehensive suite ensures that users are well-prepared to meet the challenges of asset management in today’s fast-paced business environment.
-
7
EV Service Manager
EasyVista
1 RatingThe realm of IT presents a significant chance to facilitate digital transformation throughout the organization, with an integrated cloud-based IT Service Management (ITSM) software tool being crucial for achieving this goal. Unlike traditional, cumbersome, or overly simplistic service desk solutions, EV Service Manager offers a dynamic, powerful, and user-friendly approach to service delivery management for businesses. This platform is designed to accommodate even the most intricate requirements, while simultaneously enhancing simplicity, agility, and mobility to ensure that cloud-based ITSM software is both accessible and efficient. With Service Manager, you can elevate your IT maturity through its comprehensive automation engine, which supports the full spectrum of the ITIL lifecycle, including processes that are PinkVerified. Furthermore, its flexible and intuitive interface allows for the integration of portals, dashboards, and third-party applications, enabling you to create a user experience that grants access to all essential resources effortlessly. Ultimately, embracing this innovative tool can transform how your organization approaches IT service management. -
8
In a world increasingly dominated by applications, advanced technology is essential for success. Your business thrives on apps, and BIG-IP application services ensure you have the availability, performance, and security necessary to satisfy your operational needs. With BIG-IP application delivery controllers, you can guarantee that your applications remain operational and efficient. The BIG-IP Local Traffic Manager (LTM) and BIG-IP DNS are designed to effectively manage your application traffic while safeguarding your infrastructure. You benefit from integrated security and traffic management services, as well as performance enhancements, regardless of whether your applications are hosted in a private data center or in the cloud. Moreover, solutions like BIG-IP Diameter Traffic Management, BIG-IP Policy Enforcement Manager (PEM), and BIG-IP Carrier-Grade NAT (CGNAT) oversee network resources to maintain peak performance for your applications, ensuring they meet carrier-grade standards. These tools also assist in discovering opportunities to optimize and monetize your network, ultimately leading to an improved financial outcome for your business. By leveraging these advanced services, you can fully unlock the potential of your applications, driving innovation and growth across your organization.
-
9
Ensure the security of your organization by actively thwarting the harmful exploitation of privileged accounts and credentials, which often serve as gateways to your most critical assets. The CyberArk PAM as a Service offers advanced automation technologies designed to safeguard your business during its expansion. Since cyber adversaries are constantly searching for vulnerabilities, effectively managing privileged access is essential to reduce potential risks. By preventing the exposure of credentials, you can protect vital resources from being compromised. Additionally, uphold compliance through thorough documentation of significant events and secure audits that resist tampering. The Privileged Access Manager seamlessly connects with a variety of applications, platforms, and automation tools, enhancing your overall security framework. This integration not only streamlines operations but also fortifies your defenses against ever-evolving threats.
-
10
EZOfficeInventory
EZO
$35/month Our leading asset lifecycle management software enables you to create POs, schedule services and manage vendors effortlessly. Easy depreciation management and custom reports help you make well-informed business decisions. -
11
Automox
Automox
$3.00Automox is a cloud-native solution that is accessible worldwide, providing effective management for OS and third-party patches, security settings, and custom scripts across Windows, Mac, and Linux systems through a user-friendly console. This platform allows IT and SecOps teams to swiftly gain oversight and control over on-premises, remote, and virtual endpoints, eliminating the need for expensive infrastructure deployment. By streamlining these processes, Automox enhances operational efficiency and strengthens security measures across diverse environments. -
12
HYPR
HYPR | The Passwordless Company
$4.00 per user/month HYPR is The True Passwordless Company with cutting edge technology and backed up by major investment partners. The HYPR Cloud Platform allows Passwordless Authentication across an enterprise workforce. It combines the security and convenience of a smartcard with the convenience of a smartphone. With HYPR, businesses can eliminate customer passwords and provide a superior login experiences for your customers as well. Consumer-grade usability increases the productivity of your employees and reduces friction for your customers. -
13
Contrast Security
Contrast Security
$0Modern software development must be as fast as the business. The modern AppSec toolbox lacks integration, which creates complexity that slows down software development life cycles. Contrast reduces the complexity that hinders today's development teams. Legacy AppSec uses a single-size-fits all approach to vulnerability detection and remediation that is inefficient, costly, and expensive. Contrast automatically applies the most efficient analysis and remediation technique, greatly improving efficiency and effectiveness. Separate AppSec tools can create silos that hinder the collection of actionable intelligence across an application attack surface. Contrast provides centralized observability, which is crucial for managing risks and capitalizing upon operational efficiencies. This is both for security and development teams. Contrast Scan is a pipeline native product that delivers the speed, accuracy and integration required for modern software development. -
14
Asset Panda
Asset Panda
Asset Panda offers a cloud-based, no-code platform that exceeds traditional asset tracking by enabling the creation of tailored applications designed to enhance efficiency and reduce costs. Companies of various sizes across different sectors have experienced the advantages of our secure and user-friendly system, which adapts to their operational needs. By allowing the implementation of customized workflows, actions, and groups, Asset Panda helps clients streamline cumbersome procedures that hinder productivity, often achieving a remarkable return on investment of up to 800%. The robust integration of web and mobile applications ensures that clients can access crucial information anytime and anywhere, while our mobile apps come equipped with built-in barcode scanning capabilities, effectively eliminating the need for costly and cumbersome barcode scanning devices. Additionally, the system features role-based user management, granting tailored access across organizations and ensuring that each user only views the information pertinent to their responsibilities. This level of customization not only enhances security but also improves the overall user experience, making operations smoother and more efficient. -
15
ManageEngine Mobile Device Manager Plus
ManageEngine
$2.00/month ManageEngine Mobile Device Manager Plus (MDM) is designed to empower enterprises with mobility. ManageEngine MDM, a leading enterprise mobile device management software, is capable of managing multiple mobile platforms using a single interface. It supports iOS, Android, and Windows devices. The solution is available both on-premise or in the cloud and includes features such as mobile device management, app management, and device containerization. -
16
Vector by Datadog
Datadog
FreeGather, transform, and direct all your logs and metrics with a single, user-friendly tool. Developed in Rust, Vector boasts impressive speed, efficient memory utilization, and is crafted to manage even the most intensive workloads. The aim of Vector is to serve as your all-in-one solution for transferring observability data from one point to another, available for deployment as a daemon, sidecar, or aggregator. With support for both logs and metrics, Vector simplifies the process of collecting and processing all your observability information. It maintains neutrality towards specific vendor platforms, promoting a balanced and open ecosystem that prioritizes your needs. Free from vendor lock-in and designed to be resilient for the future, Vector’s highly customizable transformations empower you with the full capabilities of programmable runtimes. This allows you to tackle intricate scenarios without restrictions. Understanding the importance of guarantees, Vector explicitly outlines the assurances it offers, enabling you to make informed decisions tailored to your specific requirements. In this way, Vector not only facilitates data management but also ensures peace of mind in your operational choices. -
17
AKIPS Network Monitor
AKIPS
AKIPS delivers the largest-scaling, fully featured, secure on-prem, multi-vendor network-monitoring system for the enterprise market. AKIPS Network Monitor provides unmatched features, scale and visibility of critical, real-time, and historical performance metrics and logs – from the heart of the data centre all the way to the end user. AKIPS allows network engineers to be proactive instead of firefighting, and to detect, analyse and rectify issues before any disruption to the business occurs. -
18
7SIGNAL
7SIGNAL
For businesses that depend on reliable Wi-Fi for their operations, 7SIGNAL offers a cloud-based Wireless Network Monitoring (WNM) platform that persistently evaluates the wireless network for performance challenges, thereby enhancing network uptime, device connectivity, and overall network return on investment. In contrast to other service providers who inspect the network from the infrastructure viewpoint, 7SIGNAL focuses on the network's edge, assessing the "air" and recording the user experience directly from client devices. The Sapphire Eye is an advanced Wi-Fi sensor that has been developed and patented by 7SIGNAL. These hardware sensors are installed on the premises and are specifically engineered to remotely assess the quality of wireless network services through cloud-based software. Additionally, Mobile Eye is a Software as a Service (SaaS) solution also created and patented by 7SIGNAL. This application is deployed on the end user’s wireless device, allowing organizations to maintain continuous oversight of the wireless network right from the endpoint, ensuring a comprehensive view of network performance and user experiences. Together, these tools provide organizations with critical insights to improve their Wi-Fi services. -
19
baramundi Management Suite
baramundi Software USA
$5000.00/one-time Unified Endpoint Management system that is modular, scalable, and highly affordable for IT management, security, and workflow automation. Modules can be accessed from one interface, a single database. You can choose from any of the 18 modules available now and add more as you need for OS Install & Cloning and Patch Management, Vulnerability Management and MDM. -
20
Cato SASE
Cato Networks
$1.00/year Cato empowers its clients to progressively modernize their wide-area networks (WAN) for a more digital-centric business environment. The Cato SASE Cloud serves as a global, integrated, cloud-native solution that ensures secure and efficient connections across all branches, data centers, personnel, and cloud services. This innovative system can be implemented gradually to either replace or enhance existing legacy network infrastructures and disparate security solutions. The concept of Secure Access Service Edge (SASE), which was introduced by Gartner, represents a novel category in enterprise networking. It merges SD-WAN with various network security solutions such as Firewall as a Service (FWaaS), Cloud Access Security Broker (CASB), Secure Web Gateway (SWG), and Zero Trust Network Access (ZTNA) into a cohesive, cloud-based service offering. Historically, network access was handled through isolated point solutions, leading to a fragmented approach that increased complexity and expenses, ultimately hindering IT responsiveness. By adopting SASE, businesses can significantly accelerate the development of new offerings, expedite their market entry, and swiftly adapt to evolving market dynamics and competitive pressures. This transformative approach not only enhances operational efficiency but also positions enterprises to thrive in an ever-changing digital landscape. -
21
LaunchDarkly
LaunchDarkly
$12 per monthThe LaunchDarkly feature management platform allows users to dynamically control which application features are accessible to their audience. By leveraging feature management, contemporary development and operations teams can enhance their speed and handle more development cycles effectively. This approach is regarded as a best practice, enabling engineering teams of various sizes to deploy code continuously while giving business teams the authority to manage the user experience. With the LaunchDarkly platform, top teams can mitigate risks and actualize their concepts from the very start. Accelerate your software delivery process by decoupling code deployments from feature launches, allowing for deployment at your discretion and feature releases when you’re fully prepared. By utilizing feature flags, you can minimize the cost of errors when introducing new features or updating systems. Additionally, you can oversee and adjust your features in real-time, ensuring that you test comprehensive functionalities rather than just superficial adjustments. This level of control ultimately leads to a more efficient and responsive development cycle. -
22
CyCognito
CyCognito
$11/asset/ month Using nation-state-grade technology, uncover all security holes in your organization. CyCognito's Global Bot Network uses an attacker-like reconnaissance technique to scan, discover, and fingerprint billions digital assets around the globe. No configuration or input required. Discover the unknown. The Discovery Engine uses graph data modelling to map your entire attack surface. The Discovery Engine gives you a clear view on every asset an attacker could reach, their relationship to your business, and what they are. The CyCognito risk-detection algorithms allow the attack simulator to identify risks per asset and find potential attack vectors. It does not affect business operations and doesn't require configuration or whitelisting. CyCognito scores each threat based on its attractiveness to attackers, and the impact on the business. This dramatically reduces the number of attack vectors organizations may be exposed to to just a few. -
23
Microsoft Defender for IoT
Microsoft
$0.001 per device per monthContinuous asset discovery, vulnerability management, threat detection, and continuous asset discovery for your Internet of Things and operational technology devices (OT). Ensure IoT/OT innovation by accelerating IoT/OT innovation through comprehensive security across all IoT/OT devices. Microsoft Defender for IoT is an agentless, network-layer security solution that can be quickly deployed by end-user organizations. It works with diverse industrial equipment and integrates with Microsoft Sentinel and other SOC tools. You can deploy on-premises and in Azure-connected environments. Microsoft Defender for IoT is a lightweight agent that embeds device-layer security in new IoT/OT initiatives. Passive, agentless network monitoring allows you to get a complete inventory and analysis of all your IoT/OT assets. This is done without any impact on the IoT/OT networks. Analyze a variety of industrial protocols to identify the device details, including manufacturer, type, firmware level, IP or Media Access Control address. -
24
ESET Cyber Security
ESET
$39.99 per yearExperience robust and efficient security that operates seamlessly without causing any slowdowns, defending against various forms of malware. It provides protection for Mac, Windows, and Linux systems, shielding you from a variety of threats such as viruses, ransomware, worms, and spyware. You can take full advantage of your computer's capabilities, whether playing, working, or browsing the web, all without interruptions. Our security solution is user-friendly, making installation, renewal, and upgrades a breeze while ensuring routine tasks are easily managed. We appreciate your loyalty, and renewing your ESET subscription takes just a few clicks, allowing you to use your current license key for activation effortlessly. Additionally, you can modify your subscription preferences and eStore account details with ease. ESET offers proven multilayered protection against ransomware and other malware, trusted by over 110 million users globally. Enjoy gaming sessions free from annoying pop-ups, and benefit from battery-saving mode to stay connected longer. Your online safety and smooth computing experience are our top priorities. -
25
Cloudflare 1.1.1.1
Cloudflare
FreeAlmost all online activities initiate with a DNS inquiry, which acts as the Internet's directory. When you click a link, launch an application, or send an email, your device first queries this directory to locate the desired resource. Unfortunately, standard DNS services tend to be both slow and vulnerable, allowing your Internet Service Provider and others monitoring your online activities to track every website you visit and application you use, even if their data is encrypted. Disturbingly, some DNS service providers monetize your web browsing habits or utilize them for targeted advertising. Unlike them, we do not log your IP address, which is a common method used by other companies to track users. We stand by our commitment to privacy and transparency, having engaged a major accounting firm to conduct annual audits of our practices, ensuring we adhere to our claims. Our service, 1.1.1.1, is designed to be the fastest DNS directory available, and setting it up is a quick process that takes just two minutes, requiring no advanced technical knowledge or additional software. By enhancing your Internet experience, we ensure users can enjoy a safer and more efficient online environment. -
26
IP Fabric
IP Fabric
Automatic discovery, modeling and verification of your network's state provide actionable insights into the state of the network. They also provide evidence that the network is providing the service your business needs. Automatic discovery, modelling, verification, validation of your current network state gives you actionable insights into the state of your system. Plan changes before they happen and verify that the network behaves as you expected after the change. Verify that the actual network state aligns with your intentions, as contained in your source-of-truth. A single, accurate, and consistent view of your network across on-prem instances and cloud instances allows continuity between the network and cloud teams. IP Fabric data can be accessed anywhere using our open API. The snapshots at a specific time are the best way to compare your network day-to-day. Eliminate tedious, time-consuming and error-prone workflows. -
27
SolarWinds Network Performance Monitor (NPM)
SolarWinds
$2895.00/one-time Network Performance Monitor (NPM), by SolarWinds, provides advanced network troubleshooting using critical path hops-by-hop analysis for hybrid, on-premises, and cloud services. This modern network monitoring software is powerful and affordable. It allows IT organizations to quickly identify, diagnose, and fix network outages and problems, improving their network performance. SolarWinds Network Performance Monitor features include a performance analysis dashboard, NetPath critical paths visualization, intelligent alerts, multi-vendor network monitoring and Network Insights for Cisco ASA. -
28
ManageEngine Desktop Central MSP
Zoho
$22.50 per yearDesktop Central MSP provides remote Windows desktop administration and management for managed service providers. Desktop Central MSP is suitable for MSPs of any size. It allows MSPs to remotely manage and control their customers' devices (including desktops and servers) to perform maintenance or make changes. MSPs have the option to choose between two editions Desktop Central MSP software: the enterprise and free edition. -
29
Icinga
Icinga GmbH
$0Icinga is an internet monitoring system that checks the availability of your network resources and notifies users when there are outages. It also generates performance data for reporting. Icinga is flexible and extensible. It can monitor complex environments in multiple locations. Icinga 2 is the monitoring server and requires Icinga Web 2 on top in your Icinga Stack. You can manage the configuration with the Icinga Director or config management tools. Plain text is also available within the Icinga DSL. Find solutions, take action and become a problem-solver. Flexibility is key. Keep curious, stay passionate, and stay in the loop. Tackle your monitoring challenge. The Icinga stack consists of six core strengths that cover all aspects related to monitoring. You can get valuable insights, on-time notifications and eye-opening visuals as well as analytics. Icinga integrates easily into your systems and gives you the power of automating your tasks. -
30
CloudCheckr
Spot by NetApp
CloudCheckr unites IT, security, and finance teams around cloud. It provides total visibility, deep insights, cloud automation, and governance. CloudCheckr is a cloud management tool that helps businesses manage their cloud environments and protect their cost. AWS Advanced Technology Partner with Security and Government competencies and a certified Silver Partner for Azure, we can support multi- and hybrid-cloud strategies. -
31
Cofense PhishMe
Cofense
It is essential for your staff to be trained to quickly identify and report phishing emails. Cofense PhishMe™ offers simulations that reflect the latest threats capable of evading Secure Email Gateways (SEGs), equipping your team to act as vigilant human threat detectors. By fostering resilient employees who are aware of current phishing tactics, your organization can establish an effective defense mechanism. With Cofense PhishMe Playbooks, you can easily set up a comprehensive year-long training program, which includes various phishing simulation scenarios, tailored landing pages, attachments, and valuable educational resources, all achievable in just a few clicks. Our Smart Suggest feature employs sophisticated algorithms and proven best practices to propose scenarios that align with ongoing threats, industry standards, and the history of your program. Ultimately, enhancing your phishing defense hinges on improving reporting and resilience rates. Elevate user engagement and transform them into proactive defenders with Cofense Reporter™, our convenient one-click reporting tool, making it easier than ever for staff to participate in safeguarding your organization's digital environment. This collective effort not only strengthens your defenses but also fosters a culture of vigilance within your workplace. -
32
A10 Thunder ADC
A10 Networks
High-performance advanced load balancing solution that enables your applications to be highly available, accelerated, and secure. Ensure efficient and reliable application delivery across multiple datacenters and cloud. Minimize latency and downtime, and enhance end-user experience. Complete full-proxy Layer 4 load balancer and Layer 7 load balancer with flexible aFleX® scripting and customizable server health checks. Increase application security with advanced SSL/TLS offload, single sign-on (SSO), DDoS protection and Web Application Firewall (WAF) capabilities. -
33
HAProxy Enterprise
HAProxy Technologies
HAProxy Enterprise, the industry's most trusted software load balancer, is HAProxy Enterprise. It powers modern application delivery at all scales and in any environment. It provides the highest performance, observability, and security. Load balance can be determined by round robin or least connections, URI, IP addresses, and other hashing methods. Advanced decisions can be made based on any TCP/IP information, or HTTP attribute. Full logical operator support is available. Send requests to specific application groups based on URL, file extension, client IP, client address, health status of backends and number of active connections. Lua scripts can be used to extend and customize HAProxy. TCP/IP information and any property of the HTTP request (cookies headers, URIs, etc.) can be used to maintain users' sessions. -
34
LogRhythm SIEM
Exabeam
Understanding the challenges you face, we integrate log management, machine learning, SOAR, UEBA, and NDR to provide comprehensive visibility across your systems, empowering you to swiftly identify threats and mitigate risks effectively. However, an advanced Security Operations Center (SOC) goes beyond merely thwarting threats. With LogRhythm, you can effortlessly establish a baseline for your security operations and monitor your progress, enabling you to showcase your achievements to your board seamlessly. Safeguarding your organization carries significant responsibility, which is why we designed our NextGen SIEM Platform specifically with your needs in mind. Featuring user-friendly, high-performance analytics alongside an efficient incident response process, securing your enterprise has become more manageable than ever before. Moreover, the LogRhythm XDR Stack equips your team with a cohesive suite of tools that fulfill the core objectives of your SOC—threat monitoring, hunting, investigation, and incident response—all while maintaining a low total cost of ownership, ensuring you can protect your organization without breaking the bank. -
35
BigID
BigID
Data visibility and control for security, compliance, privacy, and governance. BigID's platform includes a foundational data discovery platform combining data classification and cataloging for finding personal, sensitive and high value data - plus a modular array of add on apps for solving discrete problems in privacy, security and governance. Automate scans, discovery, classification, workflows, and more on the data you need - and find all PI, PII, sensitive, and critical data across unstructured and structured data, on-prem and in the cloud. BigID uses advanced machine learning and data intelligence to help enterprises better manage and protect their customer & sensitive data, meet data privacy and protection regulations, and leverage unmatched coverage for all data across all data stores. -
36
Alert Logic
Fortra
Alert Logic is the only managed detection and response (MDR) provider that delivers comprehensive coverage for public clouds, SaaS, on-premises, and hybrid environments. Our cloud-native technology and white-glove team of security experts protect your organization 24/7 and ensure you have the most effective response to resolve whatever threats may come. -
37
Armis
Armis Security
Armis, the leading asset visibility and security company, provides a unified asset intelligence platform designed to address the new extended attack surface that connected assets create. Fortune 100 companies trust our real-time and continuous protection to see with full context all managed, unmanaged assets across IT, cloud, IoT devices, IoMT, OT, ICS, and 5G. Armis provides passive cyber asset management, risk management, and automated enforcement. Armis is a privately held company and headquartered in California. -
38
Lacework
Fortinet
Leverage data and automation to safeguard your multi-cloud setup, accurately assess risks, and foster innovation with assurance. Accelerate your development process by integrating security from the very beginning of your coding journey. Acquire actionable security insights to efficiently build applications while proactively addressing potential issues before they enter production, all seamlessly integrated into your current workflows. Our advanced platform harnesses patented machine learning and behavioral analytics to intuitively understand the typical behavior of your environment, flagging any anomalies that arise. With comprehensive visibility, you can monitor every aspect of your multi-cloud ecosystem, identifying threats, vulnerabilities, misconfigurations, and any irregular activities. Data and analytics enhance precision to an unmatched degree, ensuring that only the most critical alerts are highlighted while eliminating unnecessary noise. As the platform continuously evolves, rigid rules become less necessary, allowing for more flexibility in your security approach. This adaptability empowers teams to focus on innovation without compromising safety. -
39
Burp Suite
PortSwigger
$399 per user per yearPortSwigger brings you Burp Suite, a leading range cybersecurity tools. Superior research is what we believe gives our users a competitive edge. Every Burp Suite edition shares a common ancestor. Our family tree's DNA is a testament to decades of research excellence. Burp Suite is the trusted tool for your online security, as the industry has proven time and again. Enterprise Edition was designed with simplicity in mind. All the power of Enterprise Edition - easy scheduling, elegant reports, and straightforward remediation advice. The toolkit that started it all. Discover why Burp Pro is the preferred tool for penetration testing for over a decade. Fostering the next generation of WebSec professionals, and promoting strong online security. Burp Community Edition allows everyone to access the basics of Burp. -
40
ManageEngine ServiceDesk Plus
ManageEngine
$120.00/year/ user Online service desk software that is best in class. ServiceDesk Plus Cloud is the simple-to-use SaaS service management software from ManageEngine, the IT division of Zoho. It will help you offer your customers world-class solutions. The cloud-based IT ticketing platform, used by more than 100,000 IT service desks around the world, makes it easy to track and manage IT tickets, resolve issues quicker, and ensure end-user satisfaction. With out-of-the-box ITIL workflows, you can manage the entire life cycle of IT issues, problems, and projects. You can create support SLAs, set escalation levels and ensure compliance. Automate ticket dispatch, categorization and classification based on predefined business rules. Set up notifications and alerts to ensure timely ticket resolution. Your users will have more control and reduce walk-ins. Allow end users to access IT services via your service catalog and self-service portal. Allow users to create and track tickets, and search for solutions. -
41
IGEL
IGEL Technology
IGEL delivers a cutting-edge edge operating system designed for cloud workspaces, enabling significant savings on capital expenditures and drastically lowering ongoing operational costs while providing a secure and easy-to-manage platform for endpoint management across virtually any x86 device. In today's world, the nature of work is defined more by our actions than our locations, and the trend of a widely distributed workforce is here to remain, allowing IGEL OS to empower individuals to work effectively from any location while ensuring organizations maintain comprehensive management, control, and security over user endpoints, regardless of the device in use. Furthermore, IGEL OS enhances and streamlines digital work environments across various sectors, including healthcare, finance, retail, higher education, government, and manufacturing on a global scale. With over 100 technology integrations, IGEL OS fully supports the latest unified communications tools alongside VDI platforms, DaaS, and SaaS-based applications on any x86-64 device, whether it's a thin client, laptop, or tablet, thereby promoting flexibility and efficiency in diverse working conditions. This adaptability not only meets the demands of modern workplaces but also ensures that organizations can seamlessly integrate their existing infrastructures with innovative solutions. -
42
Active Directory
Microsoft
$1 per user per monthActive Directory serves as a centralized repository for information regarding various objects within a network, facilitating easy access and management for both administrators and users. It employs a structured data storage approach, which underpins a logical and hierarchical arrangement of directory information. This repository, referred to as the directory, holds details about various Active Directory entities, which commonly include shared resources like servers, volumes, printers, as well as user and computer accounts on the network. For a deeper understanding of the Active Directory data repository, one can refer to the section on Directory data store. Security measures are seamlessly integrated with Active Directory, encompassing logon authentication and the control of access to directory objects. Through a single network logon, administrators are empowered to oversee directory information and organizational structures across the entire network, while authorized users can readily access resources from any location within the network. Additionally, policy-based administration simplifies the management process, making it more efficient even for the most intricate network configurations. This framework not only enhances security but also streamlines resource management, making network operations more effective. -
43
Microsoft System Center
Microsoft
Maintain oversight of your IT landscape—regardless of the environment or platforms you utilize—through System Center. Streamline the processes of deployment, configuration, management, and monitoring for your infrastructure and virtualized software-defined datacenter, thereby enhancing both agility and performance. Identify and resolve issues related to infrastructure, workloads, or applications to ensure consistent reliability and optimal performance. Implement and oversee your software-defined datacenter with an all-encompassing solution that addresses networking, storage, computing, and security needs. This comprehensive approach not only boosts efficiency but also empowers your organization to adapt swiftly to changing demands. -
44
HashiCorp Consul
HashiCorp
A comprehensive multi-cloud service networking solution designed to link and secure services across various runtime environments and both public and private cloud infrastructures. It offers real-time updates on the health and location of all services, ensuring progressive delivery and zero trust security with minimal overhead. Users can rest assured that all HCP connections are automatically secured, providing a strong foundation for safe operations. Moreover, it allows for detailed insights into service health and performance metrics, which can be visualized directly within the Consul UI or exported to external analytics tools. As many contemporary applications shift towards decentralized architectures rather than sticking with traditional monolithic designs, particularly in the realm of microservices, there arises a crucial need for a comprehensive topological perspective on services and their interdependencies. Additionally, organizations increasingly seek visibility into the health and performance metrics pertaining to these various services to enhance operational efficiency. This evolution in application architecture underscores the importance of robust tools that facilitate seamless service integration and monitoring. -
45
HCL BigFix
HCL Software
HCL BigFix is the AI Digital+ endpoint management platform that leverages AI to improve employee experience and intelligently automate infrastructure management. HCL BigFix offers complete solutions to secure and manage endpoints across nearly 100 different operating systems, ensure continuous compliance with industry benchmarks, and revolutionize vulnerability management with award-winning cybersecurity analytics. HCL BigFix is the single solution to secure any endpoint, in any cloud, across any industry. HCL BigFix is the only endpoint management platform enabling IT Operations and Security teams to fully automate discovery, management & remediation – whether on-premise, virtual, or cloud – regardless of operating system, location, or connectivity. Unlike complex tools that cover a limited portion of your endpoints and take days or weeks to remediate, BigFix can find and fix endpoints faster than any other solution – all while enabling greater than 98% first-pass patch success rates. -
46
Dragos Platform
Dragos
$10,000The Dragos Platform is the most trusted industrial controls systems (ICS) cybersecurity technology. It provides comprehensive visibility of your ICS/OT assets, threats and best-practice guidance on how to respond before a major compromise. Dragos Platform was designed by practitioners and is a security tool that ensures your team has the most current tools to fight industrial adversaries. It was developed by experts who are on the frontlines of fighting, combating, and responding to the most advanced ICS threats. The Dragos Platform analyses multiple data sources, including protocols, network traffic and data historians, host logs and asset characterizations. This gives you unparalleled visibility into your ICS/OT environment. The Dragos Platform quickly detects malicious behavior in your ICS/OT network and provides context to alerts. False positives are reduced for unrivalled threat detection. -
47
ExtremeCloud IQ
Extreme Networks
ExtremeCloud™ IQ represents a revolutionary approach to cloud management, enhancing both wired and wireless network operations while providing new insights for IT and business through the power of machine learning. Developed from the ground up by Extreme Networks, this innovative network management system offers a next-generation solution for wireless cloud networking, significantly lowering operational complexity and costs for users. By enabling unified management of both wired and Wi-Fi networks, ExtremeCloud IQ simplifies configuration processes, facilitates real-time monitoring of clients and events, and streamlines troubleshooting efforts. Additionally, it features versatile RF planning tools and supports API integration, making it an incredibly flexible platform. With a wealth of valuable data regarding devices, clients, and applications within the network, ExtremeCloud IQ is designed to leverage this information effectively to assist in network management. Ultimately, this system revolutionizes how organizations manage their network environments, driving efficiency and productivity. -
48
Riverbed Aternity
Riverbed Technology
The Riverbed Aternity platform harnesses the power of AI-driven analytics and self-healing mechanisms to enhance both employee efficiency and customer satisfaction while enabling swift market entry with high-quality applications, reducing IT operational expenses, and managing the complexities of IT transformation. By providing AI-powered insights derived from authentic end-user experience data and precise telemetry across various endpoints, applications, infrastructure, and networks, Riverbed Aternity equips Digital Workplace teams with essential tools such as DXI for benchmarking, an Intelligent Service Desk, and AI-enhanced troubleshooting. These features facilitate ongoing service enhancement and proactive incident prevention throughout the organization. Explore how Aternity can empower enterprises to achieve comprehensive visibility across their environments, lower IT asset expenditures, promote sustainable IT practices, and elevate the satisfaction of both employees and customers, ultimately driving organizational success. -
49
Tenable Cloud Security
Tenable
The cloud security platform that is actionable. Reduce risk by quickly exposing and closing security gaps caused by misconfigurations. CNAPP solutions replace a patchwork product that can cause more problems than it solves, such as false positives or excessive alerts. These products are often only partially covered and create friction and overhead with the products that they're meant to work with. CNAPPs are the best way to monitor cloud native applications. They allow businesses to monitor cloud infrastructure and application security as a group, rather than monitoring each one individually. -
50
Buildkite
Buildkite
$15 per user per monthDeploy the open-source buildkite-agent within your own environment for optimal speed, enhanced control, and robust security. This agent is responsible for checking out your source code, executing tailored hooks and overrides, and subsequently carrying out your build tasks, ensuring that your source code remains securely on your own infrastructure. You can easily install the agent via a variety of packages and binaries compatible with numerous platforms and architectures, such as Ubuntu, Debian, Mac, Windows, Docker, and many others. With its artifact and metadata storage capabilities, the agent facilitates share-nothing, state-free build jobs that can be effortlessly distributed and scaled across multiple agents. You have the flexibility to run as many build agents as you require (up to 10,000 connected per account), all while maintaining smooth operations. The open-source Elastic CI Stack for AWS provides a straightforward method to maintain a scalable CI stack that adapts to your needs within your own AWS account. Alternatively, if you prefer a more personalized approach, you have the option to leverage the tools with which you are already familiar in your production environments, such as Packer and Terraform, allowing for a seamless integration of your existing workflows. This adaptability ensures that your CI/CD processes can evolve alongside your project requirements.