What Integrates with Cisco Cloudlock?

Find out what Cisco Cloudlock integrations exist in 2024. Learn what software and services currently integrate with Cisco Cloudlock, and sort them by reviews, cost, features, and more. Below is a list of products that Cisco Cloudlock currently integrates with:

  • 1
    Box Reviews
    Top Pick

    Box

    Box

    $5.00 per user per month
    61 Ratings
    See Software
    Learn More
    Secure collaboration with anyone, anyplace, on any device. It is our top priority to protect your cloud files. We have developed advanced security controls, intelligent threats detection, and complete information governance. We also know that your needs are not limited to these security controls. Strict data privacy? Check. Check. Check. Check. You should check. Collaboration is key to your business. This includes customers, partners, vendors, and teammates. Everyone can work together on your most important content easily if they are in the same place. You should not be sharing files but frustration. You should be able to rest assured that your data is safe. It is a waste of time to work on cumbersome, manual processes every day. We let anyone automate repeatable workflows that are important to your business, such as HR onboarding and contract management. Your workflows will move faster. You have more time for what is most important.
  • 2
    OneLogin Reviews
    OneLogin, a trusted identity management (IAM), solution for modern enterprises, helps you secure company information and empower your employees. OneLogin is a great solution for companies that want to simplify business logins and strengthen enterprise security. OneLogin features include single sign-on (SS), user provisioning, unified directory, user provisioning and adaptive authentication. Compliance reporting is also available.
  • 3
    Google Workspace Reviews
    Top Pick

    Google Workspace

    Google

    $6 per user per month
    13 Ratings
    G Suite has just gotten better -- Google Workspace (previously G Suite) is now available. All the tools you need to accomplish anything, all in one place. Google Workspace is an integrated workspace that's easy to use. It allows you to spend less time managing your work, and more time actually doing it. Google Workspace helps you focus on what's most important and lets you let Google do the rest. It uses best-in-class search technology and AI to help you work smarter. You can work from anywhere and on any device, even offline, with tools that help you integrate, customize, extend, and adapt Google Workspace to your team's needs. All Google Workspace plans offer a customized email for your business, similar to G Suite. It also includes collaboration tools such as Gmail, Calendar and Meet, Chat. There are many plans available that can be tailored to your business's needs. Find the right plan for your business on our pricing and plans page.
  • 4
    Cisco Webex Reviews
    Top Pick
    Together, we can do more. Webex is the place to call, message and meet. No hassle video. You can build stronger relationships through face-to-face meetings, real-time collaboration via whiteboarding, screen sharing, and other tools. Video conferencing is simple and powerful. You can increase your business reach while reducing travel and office expenses. This powerful tool keeps you connected before, while, and after your meeting. Video conferencing allows people to connect on any device, just like they are sitting down face-toface. Collaboration happens in one place, anywhere, driven by file andscreen sharing, video meetings and whiteboarding, as well as messaging. Cloud calling is secure, simple-to-use, and portable. High-quality conference equipment that brings whiteboarding, AI, and video to your collaboration rooms.
  • 5
    Okta Reviews
    Top Pick
    One platform, infinite ways for you to connect with your customers and employees. Any app can be made authable. Okta can help you create secure and delightful experiences quickly. Okta's Customer ID products can be combined to create the stack you need. This will provide security, scalability and reliability. Protect and empower your employees, contractors, partners. Okta's workforce identification solutions will protect your employees no matter where they are. You will have the tools you need to automate cloud journeys and support hybrid environments. Okta is trusted by companies around the globe to protect their workforce identities.
  • 6
    Salesforce Reviews
    Top Pick

    Salesforce

    Salesforce

    $25.00/month/user
    60 Ratings
    Salesforce helps sales teams improve their performance and reach their goals. Salesforce is the most widely used CRM in the world. Salesforce gives teams access to tools that enable them to grow their accounts and find new customers. They also allow them to close deals faster and from any location. Salesforce offers many features, including contact management, opportunity management and lead management, email integrations, reports and dashboards as well as sales forecasting, files sync-and-share, and reports and dashboards. You will spend less time looking at spreadsheets and more time managing your business. No software, no hardware, no hassle. In minutes, our simple setup assistant will streamline sales and answer customer questions. Connect data from sales, service, marketing to create seamless, personalized experiences for buyers. You can see a complete customer view, including their account, activity history, connections, and more. You can also pull in social data to get a deeper understanding of your customers.
  • 7
    Microsoft 365 Reviews
    Top Pick

    Microsoft 365

    Microsoft

    $5 per user per month
    105 Ratings
    Microsoft 365 (formerly Microsoft Office 365) is now available. Outlook, OneDrive and Excel, Word, PowerPoint, Excel, PowerPoint and OneNote allow you to be more creative and achieve the things that matter with Microsoft 365 (formerly Microsoft Office 365). You get the latest Office apps, both online and desktop, when you subscribe to Microsoft 365. You can access Office apps on your desktop, tablet, and phone. * Microsoft 365 + your device + Internet = productivity wherever and whenever you are. OneDrive makes it easy to access the work you have done from anywhere, and to others when you share or collaborate. There is help at every turn. Chat, email, or call to speak with a live person. Get Office today - choose the right option for you
  • 8
    Slack Reviews
    Top Pick

    Slack

    Slack

    $6.67 per user per month
    219 Ratings
    Slack, a cloud-based project collaboration software solution that facilitates communication between teams, is designed to seamlessly integrate with other organizations. Slack offers powerful tools and services all integrated into one platform. It provides private channels for interaction within smaller teams, direct channels for sending messages to colleagues, as well as public channels that allow members to start conversations across organizations. Slack is available on Mac, Windows and Android as well as iOS apps. It offers a variety of features including chat, file sharing and collaboration, real-time notifications and two-way audio/video, screen sharing, document imaging and activity tracking and logging.
  • 9
    Dropbox Reviews
    Top Pick

    Dropbox

    Dropbox

    $12.50 per month per user
    217 Ratings
    Dropbox Business is more than secure file storage. It's a smart workspace that brings together teams, tools, content, and other resources. You can create, store, and share cloud content using Google Docs, Sheets and Slides, Microsoft Office files and Dropbox Paper. Dropbox Spaces allows you to combine cloud content and files, so your PowerPoints can live alongside your Trello boards, Google Docs, and other tools. Access your team's work easily from any computer, mobile device or web browser. Connect tools such as Zoom and Slack to keep your team's files and conversations in one place. Intelligently suggested folders and files keep your team one step ahead. They will have the content they need when they need it. Dropbox offers a secure, distributed infrastructure with admin tools to control and visibility. Keep your company's data safe with Dropbox.
  • 10
    ServiceNow Reviews

    ServiceNow

    ServiceNow

    $100 per month
    1 Rating
    Digitize your workflows and they will love you for it. Your company will be more productive and your employees more engaged. ServiceNow makes work more enjoyable for employees. ServiceNow transforms old, manual ways to work into modern digital workflows so customers and employees get what they need when they need it. It's fast, simple, and easy. ServiceNow provides digital workflows that deliver great experiences and increase productivity for employees and enterprises. ServiceNow simplifies the complexity of work with a single enterprise cloud platform. The Now Platform: An intelligent, intuitive cloud platform that allows you to work smarter. You can choose from our workflows, or create your own apps. Our product portfolio is built on the Now Platform and delivers the IT, Employee, Customer, and Customer Workflows that matter. We also offer enterprise solutions to help you drive every aspect of your digital transformation. Get the amazing experiences you desire and unlock the productivity that you need. Now, native mobile capabilities are available for every day work across the enterprise.
  • 11
    Expel Reviews
    We make it possible for you to do the things you love about security, even if you don't think about it. Managed security: 24x7 detection and response. We detect and respond immediately to attacks. Recommendations can be specific and data-driven. Transparent cybersecurity. No more MSSPs. No "internal analysts console." No curtain to hide behind. No more wondering. Full visibility. You can see and use the exact same interface that our analysts use. You can see how we make critical decisions in real time. You can watch the investigations unfold. We'll provide you with clear English answers when we spot an attack. You can see exactly what our analysts do, even while an investigation is underway. You can choose your security tech. We make it more efficient. Resilience recommendations can significantly improve your security. Our analysts make specific recommendations based upon data from your environment and past trends.
  • 12
    Splunk App for Infrastructure Reviews
    Combine and correlate logs and metrics into one solution. Your Splunk Enterprise or Splunk IT Service Intelligence licenses provide comprehensive infrastructure monitoring, alerting, and investigation. Cross-tier correlations, simplified workflows and advanced alerting make it easier to find root causes faster. Pre-built and custom visualizations can monitor performance in real-time. In just a few clicks, you can enrich infrastructure data with service context in Splunk IT Service Intelligence. Splunk App For Infrastructure (SAI), a curated, unified logs and metrics experience that focuses on infrastructure performance monitoring, provides a curated, well-designed experience. You can easily distribute metrics by grouping, filtering, and defining entities. SAI's custom-triggered alerting makes it easier to perform root cause analysis at the entity or group level. You can triage alerts faster by understanding the conditions that triggered them, assessing their severity, and viewing all triggered alarms at the time you need to take action.
  • 13
    IBM Datacap Reviews
    Streamline the classification, recognition, and capture of business documents. IBM® Datacap software forms a key capability in the IBM Cloud Pak®. This is for Business Automation. It simplifies the classification, recognition, and capture of business documents. It uses text analytics, natural language processing, and machine learning to extract content from unstructured and variable paper documents. Multichannel input from scanners and faxes, emails and digital files, such as PDF and images from mobile devices and applications. Machine learning is used to automate complex or unidentified formats and highly variable documents that are difficult to capture using traditional systems. Allows you to export information and documents to a variety of applications and content repositories, including IBM and other vendors. To speed up deployment, this interface allows you to configure capture workflows and apps with a simple point-and click interface.
  • 14
    Nexpose Reviews
    Software to manage vulnerability and help you act in the moment of impact Every day, vulnerabilities are discovered. It takes constant intelligence to identify them, locate them and prioritize them for your company. Once you have confirmed that your exposure has been reduced, you can confirm it. Rapid7's on-premises vulnerability management software Nexpose monitors your exposures and adapts to new threats using fresh data. This allows you to always take action at the point of impact. InsightVM, our platform-based vulnerability management system, offers more advanced capabilities, such as Remediation Workflow or Rapid7's universal Insight Agent. How old is your data? Is it only a few days? A few days? Nexpose will never let you wait for intel to be available. Our vulnerability management software gives you a live view on your constantly changing network.
  • 15
    F5 DDoS Hybrid Defender Reviews
    Comprehensive DDoS protection at the application layer and network level. Flexible and scaleable for hybrid, out-of-band and inline deployments. Traditional DDoS solutions are limited to a narrow range. They are only partially effective because they black-hole or limit the rate at which legitimate users can connect to them in network layer (or flood attack) attacks. They are blind to SSL traffic and dependent upon their placement in the network during application layer attacks. When the Internet bandwidth is cut off, all on-premise defenses are rendered ineffective. DDoS Hybrid Defender offers a deeper level of protection. It is the only multi-layered defense that protects against sophisticated application attacks and blended network attacks. It also enables full SSL encryption, anti-bot capabilities and advanced detection methods all in one appliance.
  • 16
    Silverline DDoS Protection Reviews
    Cloud-delivered DDoS protection detects and mitigates attacks prior to they reach your network infrastructure. Cloud-delivered DDoS protection will help you keep your organization safe during times of uncertainty. It detects and mitigates attacks before they reach your network infrastructure. Silverline DDoS Protection, a managed cloud-delivered protection service, detects and mitigates large, SSL-targeted attacks in real-time. It can defend your business against attacks that exceed hundreds or thousands of gigabits per seconds. Silverline Security Operations Center (SOC), is at the forefront of protecting your business. These videos will show you how Silverline SOC professionals have successfully mitigated many unique attacks. F5's Hybrid DDoS Solution allows customers to quickly switch between cloud and on-premise attacks by signaling between BIG IP and Silverline.
  • 17
    Altair Knowledge Hub Reviews
    The self-service analytics tools promised to make end users more data-driven and agile. The increased agility resulted in siloed, disconnected work as a part of an ungoverned data-free-for-all. Knowledge Hub addresses these issues by providing a solution that benefits business users and simplifies and improves IT governance. Knowledge Hub is the only market-leading collaborative data preparation platform. It offers a browser-based interface that automates data transform tasks. Business teams can collaborate with data engineers and scientists to create, validate, and share governed, trusted datasets. No coding is required to share work and make better decisions. A cloud-ready solution that is designed to foster innovation can manage governance, data lineage, and collaboration. A platform that is extensible and requires little to no code allows multiple people in the enterprise to transform data.
  • 18
    DoubleClue Reviews
    DoubleClue, an Identity and Access Management Platform from HWS Group in Bavaria, allows you to manage access rights and identities. It protects company networks from cyberattacks that target digital identities/the "human factor" by using modern multi-factor authentication. The platform also offers integrated password management and secure cloud storage to protect confidential data. Identity security, password management and secure cloud storage protected by adaptive multi-factor-authentication (MFA). On-premises or in the cloud. DoubleClue protects any part of your business that isn't covered by firewalls or virus scanners. This includes the human factor, which is the most vulnerable component in any IT security. A strong, all-in-one platform protects all digital accesses, applications, passwords, and confidential data. Employees expect maximum flexibility in the digital workplace. Allow them to work anywhere, on any device, without compromising their IT security.
  • 19
    Splunk User Behavior Analytics Reviews
    Unknown threats can be prevented by using analytics on entity and user behavior. Unknown threats and anomalies that traditional security tools fail to detect. Automate the stitching together of hundreds of anomalies to create a single threat to simplify the life of security analysts. Deep investigative capabilities and powerful behavior baselines can be used to identify any entity, threat, or anomaly. Automate threat detection with machine learning so that you can spend more time hunting and receive higher-fidelity alerts based on behavior for quick review. Automate the identification of anomalous entities quickly without human analysis. Rich set of threat classifications (25+), and anomaly types (65+), across users, accounts and devices. Rapidly identify anomalous entities, without the need for human analysis. A rich set of threat types (25+) across users and accounts, devices, applications, and devices. Organizations can use machine-driven and human-driven solutions to find and resolve anomalies and threats.
  • 20
    IBM Security Verify Reviews
    Cloud IAM can be combined with deep context for risk-based authorization to provide secure, frictionless access for your workforce and consumers. Identity and access management cannot be separated as organizations modernize hybrid multicloud environments with a zero trust strategy. Cloud IAM strategies must use deep context to automate risk protection, and authenticate every user to any resource. Your business needs should be considered when designing your journey. As you design and tailor the cloud IAM architecture that will either replace or enhance your existing infrastructure, you can protect your investments and preserve on-premises applications. Your users expect one-click access from any device, to any application. New federated applications can be integrated to one sign-on (SSO), embed modern multifactor authentication (MFA), simplify logistics, and provide developers with consumable APIs.
  • 21
    1Kosmos Reviews
    1Kosmos allows citizens, customers, and workers to transact securely with digital services through passwordless access. The BlockID platform unites identity proofing with strong authentication to create a distributed digital identity that prevents identity fraud, account takeover, identity impersonation, and fraud while providing frictionless user experiences. BlockID is the only NIST-, FIDO2 and iBeta certified platform that performs millions upon daily authentications for some of the most important banks, telecommunications, and healthcare organizations around the globe.
  • 22
    Check Point Infinity Reviews
    In an effort to provide better protection, organizations often implement multiple cyber security solutions. They often end up with a patchwork security system that is costly and leads to high TCO. Businesses can take preemptive measures against advanced fifth-generation attacks by adopting a consolidated security strategy with Check Point Infinity architecture. This allows them to achieve a 50% increase in operational efficiency, and a 20% reduction in security cost. This is the first consolidated security architecture that spans networks, cloud, mobile, and IoT. It provides the highest level of threat prevention against known and unknown cyber-threats. 64 threat prevention engines that block known and unknown threats powered by threat intelligence. Infinity-Vision, the unified management platform of Check Point Infinity is the first modern, consolidated cybersecurity architecture designed to protect today's most sophisticated attacks on networks, endpoints, and cloud.
  • 23
    Check Point IPS Reviews
    Intrusion Prevention Systems detect and prevent attempts to exploit vulnerabilities in vulnerable systems or applications. They protect you from the latest breaking threat. Our Next Generation Firewall automatically updates the Check Point IPS protections. Your organization is protected regardless of whether the vulnerability was discovered years ago or just a few seconds ago. Check Point IPS provides thousands of behavioral and signature preemptive protections. Our acceleration technologies allow you to safely enable IPS. Your staff will save valuable time with a low false positive rate. IPS can be enabled on any Check Point security gateway to reduce total cost of ownership. Enterprises can get cloud-level expansion and resilience on their premises with this on-demand hyperscale threat prevention service. Users can access corporate networks and resources remotely from anywhere they are.
  • 24
    Digital Guardian Reviews
    No-compromise data protection gives you the freedom to adapt to your requirements. Digital Guardian is the only DLP solution that can support both a case-based approach (known user groups or data types) and a data risk discovery approach. This allows for the identification of unknown use cases. Our risk discovery approach allows you to gain visibility by showing where sensitive data is located, how it flows within the organization, and where it may be at risk. This is without policies. Digital Guardian is powered by AWS and offers simplified deployment, low overhead, elastic scalability, and increased return on security investment. All your browser-based and native applications are covered, including Windows, macOS, and Linux operating systems. The "unknown risk" approach allows you to see sensitive data, its flow, and where it is at risk. This is all without the need for policies. Only Digital Guardian can provide content, user, context-based data classification and discovery.
  • 25
    Neustar UltraDDoS Protect Reviews
    Every organization with a digital presence is at risk from DDoS attacks. Our 2017 research shows that an organization has a 80 percent chance of being attacked by DDoS attacks. This same percentage can expect to be attacked repeatedly. The damage doesn't stop there. Nearly half the attacks reported are done in conjunction with a breach. This can often leave behind malware activation, data theft, ransomware attacks, and virus infections. It takes more than technology to mitigate the DDoS attacks of tomorrow and today. UltraDDoS Protection provides powerful analytics, top-tier DDoS mitigation and layer 7 protection that allow you to suppress threats before they become an attack. Companies of all sizes rely on UltraDDoS Protect to protect their infrastructure and confidential information.
  • 26
    Neustar NetProtect Reviews
    Network and core infrastructure teams are responsible for providing uninterrupted, secure access to online accounts and resources. This means that seamless delivery of OTT content and live streaming media must occur, even during a Distributed Delusion of Service (DDoS), attack. Neustar NetProtect™, a cloud solution that provides secure and easy-to-configure data bandwidth, supports more than 100 Gbps. It connects directly to the Neustar SiteProtect™ NG platform via more than 500 global data centres. NetProtect can connect to any one of our dedicated multi-terabit data centers, no matter where you are located. This allows us to seamlessly return clean data to your organization, and allows you to provide an exceptional online customer experience.
  • 27
    Dedrone DroneTracker Reviews
    Drone technology is rapidly evolving and only a software-centric solution will keep up. Dedrone's DroneTracker software is hosted on-premise or in the cloud. It uses our DroneDNA database for recognition and classification of RF, WiFi and non-WiFi drones. DroneTracker can also be integrated with third-party sensors and triggers alarms and countermeasures. Drone intrusions are logged by dedrone sensors and external video cameras. The DroneTracker software automatically captures forensic data, including drone manufacturer, model and time and length of drone activity. It also records video verification. Summary reports are automatically generated and made available for immediate analysis of the most important airspace security data. DroneTracker software incorporates Dedrone's machine-learning algorithms, which allow it to detect drones from other moving objects in the airspace.
  • 28
    Cylera Platform Reviews
    Cylera's cybersecurity solution and analytics solution is easy to deploy and integrate seamlessly into your network, saving you time, money and headaches. Passive integration reduces disruption risk. Full deployment is possible with complete visibility of the cloud and on-prem networks. Integrations with pre-built APIs are available out-of-the box for rapid deployment. Flexible architecture allows multiple sites and teams the ability to collaborate. Cylera is not just another cybersecurity platform. Our platform is purpose-built to handle complex, high-impact environments. It combines contextual awareness with an in-depth understanding of operational workflows. Our AI-driven cybersecurity platform & intelligence platform provides real-time visibility to help solve cybersecurity and information technology problems. Cylera can passively monitor your existing networks. Cylera can integrate with many of the platforms that you use every day.
  • 29
    Securonix Security Operations and Analytics Reviews
    The Securonix Security Operations and Analytics Platform combines log monitoring, user and entity behavior analytics, next-generation security information and management (SIEM), network detection and response, (NDR), and security orchestration automation and response. It is a complete, end to end security operations platform. Securonix's platform is able to scale up to unlimited levels, thanks to advanced analytics, behavior detection and threat modeling, as well as machine learning. It improves security by increasing visibility, actionability, security posture, and management burden. The Securonix platform supports thousands of third-party vendors, technology solutions, making security operations, events and escalations much easier. It scales easily from startups to large enterprises, while offering the same security ROI and transparent and predictable cost.
  • 30
    Securonix NDR Reviews
    Advanced threat monitoring that combines security logs, network traffic, and entity context. Advanced threats can be detected using security information and event management (SIEM), or standalone network traffic analysis (NTA). Securonix threat chains, which span across security events and network traffic, can reduce false positives by more than 90%. You can improve efficiency and reduce operational overhead associated with training and enablement by only using one console and database for all events. Advanced cyberattacks are often slow, low-level and require multiple steps. Monitoring and correlating indicators for compromise (IOC), across event sources is necessary to detect such threats. Securonix Spotter allows for lightning-fast threat hunting via natural language search.
  • 31
    Acxiom Real Identity Reviews
    Real Identity™, delivers subsecond decisions to power relevant messages in a real-time environment. Real Identity allows the world's largest brands to ethically identify and connect with people anywhere, anytime to create relevant experiences. Engage people with precision, scale, and reach across all interactions You can manage and maintain your identity across your enterprise with 50 years of identity and data expertise, combined with the most recent artificial intelligence and machine-learning techniques. Adtech requires fast access to identity and data in order to enable personalization and decision making. These functions will be driven by first-party data signals in a cookieless environment. The conversation between publishers, brands, and people will continue to be between them. Delivering experiences that matter across all channels will allow you to wow your customers and prospects while also staying ahead of the regulations and your competitors.
  • 32
    OneSpan Identity Verification Reviews
    With digital identity verification services, you can increase your customer base, reduce abandonment, and minimize fraud. Access a variety of digital identity verification services through one platform. Online channel growth is possible with digital ID verification at account opening. Remote account opening is possible with digital identity verification. To optimize security and UX, choose the best verification workflow. Verify the authenticity and comparability of facial biometric data in real-time. Follow KYC (Know Your Customer), and assess customer risk. Detect fraudulent ID documents immediately and prevent fraud. To balance risk and CX, choose the best digital identity verification method. To maximize adoption rates, choose the best check types to suit your demographic. Do not settle for a provider that only offers limited coverage. You should keep a single, complete audit trail that traces the entire transaction.
  • 33
    RapidScale Identity as a Service Reviews
    RapidScale's Identity as a Service is ideal for organizations that need to make network access simple for staff without compromising security. Our IDaaS solution is built on the backbone Azure Active Directory and provides powerful security right out of the box. No matter where your applications and critical data are located, you can protect them. There are options for single sign-on (SSO), multifactor authentication (MFA), password syncization, and many other features. Our identity services options make it easy to increase your login security. Advanced password sync functions such as user password reset, changing, writeback, and more can be used to control access. Our full-service portal makes it easy to manage IDaaS services, as well as other RapidScale solutions. Alternately let us manage your IDaaS deployment.
  • Previous
  • You're on page 1
  • Next