What Integrates with Cisco Catalyst Center?
Find out what Cisco Catalyst Center integrations exist in 2024. Learn what software and services currently integrate with Cisco Catalyst Center, and sort them by reviews, cost, features, and more. Below is a list of products that Cisco Catalyst Center currently integrates with:
- 1
-
2
NorthStar Navigator
NorthStar.io, Inc.
$8 per deviceNorthStar allows organizations to easily incorporate threat intelligence and business context to enable a risk-based approach to their vulnerability management program. The Platform automates the collection, normalization, consolidation and correlation of threat intelligence, asset, software, and vulnerability data. Combined with a transparent scoring model, NorthStar automates the tedious and manual process of prioritizing vulnerability remediation. -
3
Axonius
Axonius
Axonius gives IT and security teams the confidence to control complexity by providing a system of record for all digital infrastructure. With a comprehensive understanding of all assets including devices, identities, software, SaaS applications, vulnerabilities, security controls, and the context between them, customers are able to mitigate threats, navigate risk, decrease incident response time, automate action, and inform business-level strategy — all while eliminating manual, repetitive tasks. -
4
Quickwork
Quickwork
$20 per monthQuickwork is used by enterprises to create simple and complex workflows. It also allows them to create and publish APIs that are secure, and to manage conversational interactions between employees, customers, and partners. This helps to provide an excellent user experience. Quickwork is an all-in one platform that provides the tools and services needed to build powerful and scalable integrations. It also offers serverless APIs and conversational experiences. Drag and drop applications to create powerful integrations. No need to write a line of code. You can choose from 1000s of apps for business, consumer, analytics, messaging and IoT. Quickwork's API Management allows you to convert any workflow into an REST API in a single click. Our serverless infrastructure allows you to scale your APIs elastically and securely. Create and manage real-time messaging and conversational workflows across multiple channels with human agents, IoT devices, and chatbots. -
5
Centreon
Centreon
Centreon is a global provider for business-aware IT monitoring to ensure high performance and continuous operations. The company's AIOps-ready platform, which is holistic and ready for use in today's complex hybrid cloud infrastructures, is designed to meet the needs of these distributed clouds. Centreon monitors all aspects of the IT Infrastructure, from Cloud-to Edge for a clear and comprehensive view. Centreon eliminates blind spots by monitoring all equipment, middleware, and applications that are part modern IT workflows. This includes legacy assets on-premise, private and public clouds, and all the way to edge of the network where smart devices and customers come together to create business value. Centreon is always up-to-date and can support even the most dynamic environments. It has auto-discovery capabilities that allow it to keep track of Software Defined Network (SDN), AWS or Azure cloud assets and Wi-Fi access points, as well as any other component of today’s agile IT infrastructure. -
6
Altair Knowledge Hub
Altair
The self-service analytics tools promised to make end users more data-driven and agile. The increased agility resulted in siloed, disconnected work as a part of an ungoverned data-free-for-all. Knowledge Hub addresses these issues by providing a solution that benefits business users and simplifies and improves IT governance. Knowledge Hub is the only market-leading collaborative data preparation platform. It offers a browser-based interface that automates data transform tasks. Business teams can collaborate with data engineers and scientists to create, validate, and share governed, trusted datasets. No coding is required to share work and make better decisions. A cloud-ready solution that is designed to foster innovation can manage governance, data lineage, and collaboration. A platform that is extensible and requires little to no code allows multiple people in the enterprise to transform data. -
7
Cisco Cyber Vision
Cisco
Your industrial operations are at risk from cyber threats due to the deeper integration of IT, cloud, and industrial control networks (ICS). Cisco Cyber Vision was specifically designed for OT and IT teams to collaborate to ensure production continuity and safety. Now you can deploy Industrial Internet of Things technologies and reap the benefits of industry digitization efforts. Start your OT security project with an accurate list of your industrial assets, communication patterns, and network topologies. Your SOC (security operation center) should have OT context. This will allow you to leverage the money and time you have spent on IT cybersecurity to protect your OT network. You can take OT security to the next step: Provide detailed information to comply regulations and facilitate collaboration between IT and OT experts. -
8
Unknown threats can be prevented by using analytics on entity and user behavior. Unknown threats and anomalies that traditional security tools fail to detect. Automate the stitching together of hundreds of anomalies to create a single threat to simplify the life of security analysts. Deep investigative capabilities and powerful behavior baselines can be used to identify any entity, threat, or anomaly. Automate threat detection with machine learning so that you can spend more time hunting and receive higher-fidelity alerts based on behavior for quick review. Automate the identification of anomalous entities quickly without human analysis. Rich set of threat classifications (25+), and anomaly types (65+), across users, accounts and devices. Rapidly identify anomalous entities, without the need for human analysis. A rich set of threat types (25+) across users and accounts, devices, applications, and devices. Organizations can use machine-driven and human-driven solutions to find and resolve anomalies and threats.
-
9
Cisco SD-Access
Cisco
Modern enterprises need a more secure and agile network. Our advanced solution automates user policy and network access so IT operations are more efficient and secure. Cisco SD-Access is a solution within CiscoDNA that creates a uniform policy-based network fabric that meets your business's security, automation and assurance needs. SD-Access enhances the assurance and automation capabilities of Cisco DNA Center. It also offers a software-defined approach to network segmentation that is critical for creating a zero-trust network. Advanced analytics using AI- and ML-based AI for endpoint identification. Analyze traffic flows among groups and create effective access policies. Group-based access policies can be used to create multilevel segmentation that leads to zero-trust security. -
10
Cynerio
Cynerio
We cover all threats with automated security and risk reduction on every Healthcare IoT device, from medical/IoMT devices to Enterprise IoT systems and OT systems. This ensures patient safety, data confidentiality and operational continuity. Cynerio promotes proactive and preventive cybersecurity through automated risk reduction, threat mitigation and attack prevention tools. We also offer step-by-step remediation programs based on a zero trust framework that incorporates clinical context to make hospitals secure fast. Hospital networks are extremely vulnerable to IoT devices from Healthcare. Insecure devices increase cyber attack surface and pose a major threat to patient safety as well as the operational continuity of hospitals. -
11
Pica8 AmpCon
Pica8
PicOS Software Switches are replacing thousands upon thousands of Cisco Catalyst switches on the enterprise campus, distributed sites, or data center networks. They are made from hardware supplied by Edgecore and Dell. Pica8's AmpCon™ Network Controller centrally manages, automates, and replaces Cisco DNA Center. Customers enjoy a greater freedom and lower cost that every executive at the top will appreciate. Pica8's AmpCon manages the lifecycle for any number of open network switch in branch/retail offices access networks. AmpCon is a collection of server-based tools that allow enterprises to remotely configure, provision, and install PicOS Software, switches on white box switch hardware. It is the first network controller to use both proprietary and open technology, allowing network operators full visibility into their network software.
- Previous
- You're on page 1
- Next