What Integrates with CyCognito?

Find out what CyCognito integrations exist in 2024. Learn what software and services currently integrate with CyCognito, and sort them by reviews, cost, features, and more. Below is a list of products that CyCognito currently integrates with:

  • 1
    Auth0 Reviews

    Auth0

    Okta

    $35 per month
    783 Ratings
    See Software
    Learn More
    Identity is complex. It is important to deal with it. Rapidly integrate authorization and authentication for web, mobile, legacy, and legacy applications to allow you to focus on your core business. Many people believe that identity is too expensive and can't be saved. Auth0 users see a positive impact on their bottom line. You can authenticate users across all your applications using your own secure, standards-based, and custom unified login. Users are redirected to a central authorization site with Universal login. The authentication takes place on the same domain that the login. This increases security and protects against attacks like phishing or man-in-the middle. OAuth 2.0 recommends that native applications should only use external user agents (such the browser) for authentication flows. Universal login allows you to do this securely while also enabling SSO.
  • 2
    Amazon Web Services (AWS) Reviews
    Top Pick
    See Software
    Learn More
    AWS offers a wide range of services, including database storage, compute power, content delivery, and other functionality. This allows you to build complex applications with greater flexibility, scalability, and reliability. Amazon Web Services (AWS), the world's largest and most widely used cloud platform, offers over 175 fully featured services from more than 150 data centers worldwide. AWS is used by millions of customers, including the fastest-growing startups, large enterprises, and top government agencies, to reduce costs, be more agile, and innovate faster. AWS offers more services and features than any other cloud provider, including infrastructure technologies such as storage and databases, and emerging technologies such as machine learning, artificial intelligence, data lakes, analytics, and the Internet of Things. It is now easier, cheaper, and faster to move your existing apps to the cloud.
  • 3
    Zendesk Reviews
    Top Pick

    Zendesk

    Zendesk

    $5 per month per user
    20 Ratings
    See Software
    Learn More
    Zendesk helps you create exceptional customer experiences. Zendesk, a leading provider of software and solutions to improve customer relationships, empowers businesses to become more reliable, flexible, scalable, and adaptable. Zendesk's products include Support, an integrated customer service solution; Chat, chat, and messaging tool; Talk and call center software; Explore to analyze and report; Inbox, shared team mailbox; Guide, a knowledgebase and self-service solution; and Connect + Outbound to support proactive campaigns.
  • 4
    Lansweeper Reviews

    Lansweeper

    Lansweeper

    $495.00/year
    1 Rating
    Lansweeper can help you discover your IT and build your central IT Asset System of Record. You can easily audit all assets within your company's network using the Lansweeper Deepscan IP scanner engine. You can create a network inventory that includes all hardware, software, and users. Scan Windows, Linux, or Mac devices. Keep track of all your licenses, serial numbers, and warranties from major brands such as Dell, IBM and HP. Detect Unauthorized Local Admins and unify Office 365/AD User Data. Get the netbios domain, check for Windows Updates and more. You can discover all assets in your IT environment you didn't know about and take full control over your network. Get your free trial to get started with IT asset management.
  • 5
    Splunk Cloud Reviews
    Splunk is a secure, reliable, and scalable service that turns data into answers. Our Splunk experts will manage your IT backend so you can concentrate on your data. Splunk's cloud-based data analytics platform is fully managed and provisioned by Splunk. In as little as two days, you can go live. Software upgrades can be managed to ensure that you have the most recent functionality. With fewer requirements, you can tap into the data's value in days. Splunk Cloud is compliant with FedRAMP security standards and assists U.S. federal agencies, their partners, and them in making confident decisions and taking decisive actions at rapid speed. Splunk's mobile apps and augmented reality, as well as natural language capabilities, can help you increase productivity and contextual insight. Splunk solutions can be extended to any location by simply typing a phrase or tapping a finger. Splunk Cloud is designed to scale, from infrastructure management to data compliance.
  • 6
    Qualys VMDR Reviews
    The industry's most flexible, extensible and scalable solution for vulnerability management. Qualys' VMDR is fully cloud-based and provides global visibility into your IT assets and how to protect them. Enterprises are empowered with visibility into cyber risk exposure and can use it to prioritize assets, vulnerabilities, or groups of assets according to business risk. Security teams can take steps to reduce risk. This helps businesses measure their true risk and track the progress of risk reduction. You can identify, assess, prioritize, patch and fix critical vulnerabilities in real-time across your global hybrid IT, OT and IoT landscape. Qualys TruRisk™, which measures risk across assets, vulnerabilities, and groups, can help you organization prevent risk exposure and track the risk reduction over time.
  • 7
    Microsoft Excel Reviews
    Top Pick

    Microsoft Excel

    Microsoft

    $8.25 per user per month
    11 Ratings
    Excel recognizes your patterns and organizes your data to save time. Excel allows you to create spreadsheets quickly using templates or your own. You can also use modern formulas for calculations. You can present your data in new charts and graphs with sparklines, formatting, tables and tables. With just one click, you can easily create forecasts that predict trends. You can share your workbook with others, and you always have the most current version. This will help you get more work done. Office 365 allows you to work in Excel files from your mobile device, desktop, or web browser. Excel now allows you to add data directly from a photograph. The Excel app allows you to take a photo of a printed table on your Android/iPhone device and convert it into an editable Excel table. This new image recognition function eliminates the need for you to manually enter hardcopy data.
  • 8
    Gmail Reviews
    Top Pick
    Gmail allows you to do more with your email. Gmail is now more secure, smarter, and easier to use. This will allow you to save time and do more with the inbox. You can see what's new and decide what you want. You will receive nudges reminding you to respond to messages and follow up on them. You can view attachments, RSVP for events, snooze messages, and much more without opening emails. Gmail blocks 99.9% dangerous emails before they reach your inbox. You'll be notified if we suspect that something is phishy.
  • 9
    Google Sheets Reviews
    Top Pick
    Online spreadsheets can be shared and edited from any device. With easy sharing and real time editing, you can establish a ground truth for the data in your online spreadsheet. To keep your analysis flowing, use comments and assign actions. Smart Fill and formula suggestions are helpful tools that help you analyze faster and with fewer errors. Ask questions in plain English about your data to get quick insights. Sheets is seamlessly connected to other Google apps that you love, which saves you time. You can easily analyze Google Forms data in sheets, or embed Sheets charts into Google Slides and Docs. You can reply directly to comments from Gmail, and you can easily present your spreadsheets for Google Meet.
  • 10
    Jira Service Management Reviews

    Jira Service Management

    Atlassian

    $20 per user per month
    6 Ratings
    Jira Service Management (formerly Jira Service Desk), empowers Dev/Ops teams to work at high-velocity to respond to business changes quickly and provide great customer and employee service experiences. Tune Jira Service Management for your specific needs. Every team member, from IT to legal to HR, can set up a service desk quickly, and then adapt to scale. Provide great service experiences quickly - without the complexity and cost of traditional ITSM solutions. An open, collaborative platform allows you to track work across your enterprise. You can link issues across Jira, as well as ingest data from other software-development tools, to give your IT support and operations teams richer contextual information that allows them to quickly respond to incidents, requests, and changes. Manage risk and deliver more customer impact. You can accelerate critical development work, eliminate the need for manual labor, and deploy changes quickly with an audit trail for each change.
  • 11
    Google Reviews
    Top Pick
    Our mission is to organize all of the world's information so everyone can access it and use it. There are thousands, sometimes even millions, of websites that provide useful information every time you search. Google's search engine determines which results to show you before you type. It is guided by your commitment to provide the best information. Google organizes information about websites in its Search index even before you start searching. The index works in a similar way to a library but contains more information than all the libraries around the world. Google's Search algorithms scan through hundreds of millions of pages in our Search index in a fraction of seconds to find the most relevant and useful results for your search terms. Google offers many formats to help you quickly find what you are looking for. We are constantly improving the way we present information, whether it's in a map with directions or images and videos.
  • 12
    Microsoft Entra ID Reviews
    Microsoft Entra ID, formerly known as Azure Active Directory, is a comprehensive cloud-based identity and access management solution that combines core directory service, application access management and advanced identity protection. Cloud identity and access management solutions connect employees, customers and partners with their apps, devices and data. Protect data and resources with adaptive access policies and strong authentication without compromising the user experience. Provide a quick, easy sign-in across your multicloud environment in order to keep your users productive and reduce time spent managing passwords. Manage all your identities, and access to your applications, in one central location, whether in the cloud, or on-premises. This will improve visibility and control.
  • 13
    Microsoft Outlook Reviews
    Top Pick
    Connect. Organize. Get things done. All your email, calendar, contacts, and tasks in one place. You can manage your email, calendar, contacts and tasks efficiently from one place. Office integration allows you to share attachments directly from OneDrive, access contacts, view LinkedIn profiles, and view LinkedIn profiles. You can book conference rooms and track RSVPs right from your calendar. You can share your calendars to coordinate and plan and see when your coworkers will be available. You can rest assured with enterprise-grade security that is trusted by the world's most important companies. Outlook protects your confidential information around the clock, and doesn't get in your way. Outlook anticipates your needs. Outlook automatically adds travel and bill payments to your calendar. Intelligent reminders help you stay on track. Search makes it easy to find the information you need quickly.
  • 14
    Okta Reviews
    Top Pick
    One platform, infinite ways for you to connect with your customers and employees. Any app can be made authable. Okta can help you create secure and delightful experiences quickly. Okta's Customer ID products can be combined to create the stack you need. This will provide security, scalability and reliability. Protect and empower your employees, contractors, partners. Okta's workforce identification solutions will protect your employees no matter where they are. You will have the tools you need to automate cloud journeys and support hybrid environments. Okta is trusted by companies around the globe to protect their workforce identities.
  • 15
    PagerDuty Reviews
    Top Pick
    PagerDuty, Inc. (NYSE PD) is a leader for digital operations management. Organizations of all sizes rely on PagerDuty to deliver the best digital experience to their customers in an ever-on world. PagerDuty is used by teams to quickly identify and solve problems and to bring together the right people to prevent future ones. PagerDuty's 350+ integrations include Slack, Zoom and ServiceNow as well as Microsoft Teams, Salesforce and AWS. This allows teams to centralize their technology stack and get a holistic view on their operations. It also optimizes processes within their toolkits.
  • 16
    Microsoft 365 Reviews
    Top Pick

    Microsoft 365

    Microsoft

    $5 per user per month
    105 Ratings
    Microsoft 365 (formerly Microsoft Office 365) is now available. Outlook, OneDrive and Excel, Word, PowerPoint, Excel, PowerPoint and OneNote allow you to be more creative and achieve the things that matter with Microsoft 365 (formerly Microsoft Office 365). You get the latest Office apps, both online and desktop, when you subscribe to Microsoft 365. You can access Office apps on your desktop, tablet, and phone. * Microsoft 365 + your device + Internet = productivity wherever and whenever you are. OneDrive makes it easy to access the work you have done from anywhere, and to others when you share or collaborate. There is help at every turn. Chat, email, or call to speak with a live person. Get Office today - choose the right option for you
  • 17
    Slack Reviews
    Top Pick

    Slack

    Slack

    $6.67 per user per month
    219 Ratings
    Slack, a cloud-based project collaboration software solution that facilitates communication between teams, is designed to seamlessly integrate with other organizations. Slack offers powerful tools and services all integrated into one platform. It provides private channels for interaction within smaller teams, direct channels for sending messages to colleagues, as well as public channels that allow members to start conversations across organizations. Slack is available on Mac, Windows and Android as well as iOS apps. It offers a variety of features including chat, file sharing and collaboration, real-time notifications and two-way audio/video, screen sharing, document imaging and activity tracking and logging.
  • 18
    Snowflake Reviews

    Snowflake

    Snowflake Inc.

    $40.00 per month
    5 Ratings
    Your cloud data platform. Access to any data you need with unlimited scalability. All your data is available to you, with the near-infinite performance and concurrency required by your organization. You can seamlessly share and consume shared data across your organization to collaborate and solve your most difficult business problems. You can increase productivity and reduce time to value by collaborating with data professionals to quickly deliver integrated data solutions from any location in your organization. Our technology partners and system integrators can help you deploy Snowflake to your success, no matter if you are moving data into Snowflake.
  • 19
    Splunk Enterprise Reviews
    Splunk makes it easy to go from data to business results faster than ever before. Splunk Enterprise makes it easy to collect, analyze, and take action on the untapped value of big data generated by technology infrastructures, security systems, and business applications. This will give you the insight to drive operational performance, and business results. You can collect and index logs and machine data from any source. Combine your machine data with data stored in relational databases, data warehouses, Hadoop and NoSQL data storages. Multi-site clustering and automatic loads balancing scale can support hundreds of terabytes per day, optimize response time and ensure continuous availability. Splunk Enterprise can be customized easily using the Splunk platform. Developers can create custom Splunk apps or integrate Splunk data in other applications. Splunk, our community and partners can create apps that enhance and extend the power and capabilities of the Splunk platform.
  • 20
    Nessus Reviews
    More than 30,000 organizations around the world trust Nessus as the most widely used security technology on the planet. It is also the gold standard in vulnerability assessment. Since the beginning, we have worked closely with the security community. Nessus is continuously optimized based on community feedback in order to provide the best vulnerability assessment solution available. Twenty years later, we are still focused on community collaboration and product innovations to provide the most complete and accurate vulnerability data. This will ensure that you don't miss critical issues that could expose your organization's vulnerabilities. Today, Nessus has been trusted by over 30,000 organizations around the world as the best vulnerability assessment tool and security technology.
  • 21
    Microsoft Azure Reviews
    Top Pick
    Microsoft Azure is a cloud computing platform that allows you to quickly develop, test and manage applications. Azure. Invent with purpose. With more than 100 services, you can turn ideas into solutions. Microsoft continues to innovate to support your development today and your product visions tomorrow. Open source and support for all languages, frameworks and languages allow you to build what you want and deploy wherever you want. We can meet you at the edge, on-premises, or in the cloud. Services for hybrid cloud enable you to integrate and manage your environments. Secure your environment from the ground up with proactive compliance and support from experts. This is a trusted service for startups, governments, and enterprises. With the numbers to prove it, the cloud you can trust.
  • 22
    ServiceNow Reviews

    ServiceNow

    ServiceNow

    $100 per month
    1 Rating
    Digitize your workflows and they will love you for it. Your company will be more productive and your employees more engaged. ServiceNow makes work more enjoyable for employees. ServiceNow transforms old, manual ways to work into modern digital workflows so customers and employees get what they need when they need it. It's fast, simple, and easy. ServiceNow provides digital workflows that deliver great experiences and increase productivity for employees and enterprises. ServiceNow simplifies the complexity of work with a single enterprise cloud platform. The Now Platform: An intelligent, intuitive cloud platform that allows you to work smarter. You can choose from our workflows, or create your own apps. Our product portfolio is built on the Now Platform and delivers the IT, Employee, Customer, and Customer Workflows that matter. We also offer enterprise solutions to help you drive every aspect of your digital transformation. Get the amazing experiences you desire and unlock the productivity that you need. Now, native mobile capabilities are available for every day work across the enterprise.
  • 23
    CSV Editor Pro Reviews

    CSV Editor Pro

    Gammadyne Corporation

    $27
    CSV Editor Pro is the professional option for working with CSV files. It comes with a wide range of tools and features that can help you save time and effort. You can gain analytic insight by creating a graph or pie charts. You can sort, filter, multiline edit, search and substitute, undo, undo printing, drag and drop global search and replacement, error correction, undo, undo, undo, undo, undo, undo, and many other capabilities. The interface is intuitive and simple, but a detailed help file is available.
  • 24
    Axonius Reviews
    Axonius gives IT and security teams the confidence to control complexity by providing a system of record for all digital infrastructure. With a comprehensive understanding of all assets including devices, identities, software, SaaS applications, vulnerabilities, security controls, and the context between them, customers are able to mitigate threats, navigate risk, decrease incident response time, automate action, and inform business-level strategy — all while eliminating manual, repetitive tasks.
  • 25
    JupiterOne Reviews

    JupiterOne

    JupiterOne

    $2000 per month
    Go beyond asset management. Turn complexity into capability. Our cyber asset analysis platform empowers security teams by providing total visibility into the assets, context and risks that make up their attack surface. With JupiterOne, organizations transform asset visibility from frustration into strength.
  • 26
    Workato Reviews

    Workato

    Workato

    $10,000 per feature per year
    Workato is the operating platform for today's fast-moving businesses. It is the only AI-based middleware platform that allows both IT and business to integrate their apps and automate complex business workflows. Our mission is to help companies automate and integrate their apps and business processes at least 10x faster than traditional tools, and at a tenth the cost of traditional tools. Integration is a mission critical, neutral technology that can be used in heterogeneous IT environments. We are the only technology vendor that is supported by all three of the leading SaaS vendors: Salesforce. Workday. And ServiceNow. We are trusted by the world's most recognizable brands and the fastest-growing innovators. Customers consider us to be one of the best companies to do business.
  • 27
    NopSec Reviews
    Cyber defenders can now manage the complex processes that make cyber exposure impossible to manage. NopSec's platform provides cyber defenders with an end-to-end way to bring these processes together. It allows them to identify, prioritize, remediate and simulate cyber exposures and then report them. You can't protect what's in your environment if you don't know. To manage cyber risk, adaptive cyber management requires complete visibility of your IT assets. Nopsec helps you avoid potential blind spots caused by unmanaged cyber risk and cyber exposures.
  • 28
    Active Directory Reviews

    Active Directory

    Microsoft

    $1 per user per month
    Active Directory stores information about objects in the network and makes it easy for administrators and users find and use this information. Active Directory uses a structured database store to organize directory information in a hierarchical, logical way. This data store, also known by the directory, contains information about Active Directory object. These objects usually include shared resources like servers, volumes and printers as well as the network user account and computer accounts. See Directory data store for more information on Active Directory. Active Directory security is integrated through logon authentication. This allows for access control to objects within the directory. Administrators can manage their directory and organization through one network logon. Authorized network users have access to all resources on the network. The management of complex networks can be made easier by policy-based administration.
  • 29
    Cisco Vulnerability Management Reviews
    You can't fix all the vulnerabilities. Use extensive threat intelligence and patented prioritization techniques to reduce costs, save time and keep your team focused on reducing your biggest risks. This is Modern Risk-Based Vulnerability management. We developed Risk-Based Vulnerability Management and are now defining the modern model. Show your IT and security teams which infrastructure vulnerabilities need to be remedied, and when. Our latest version shows that exploitability is measurable, and accurately calculating exploitability will help you minimize it. Cisco Vulnerability Management, formerly Kenna.VM, combines real-world exploit and threat intelligence with advanced data science in order to determine which vulnerabilities are the most risky and which can be deprioritized. Spoiler alert! Your mega-list will shrink faster than the woolen sweater-vest on a hot wash cycle.
  • 30
    ServiceNow Security Operations Reviews
    Use SOAR (security orchestration automation and response) and risk-based vulnerability control to overcome threats and vulnerabilities. Say hello to a secure digital transformation. Smart workflows and context help you speed up incident response. MITRE ATT&CK can be used to investigate threats and close any gaps. Risk-based vulnerability management can be applied to your infrastructure and applications. Collaborative workspaces are a great way to manage IT risks and remediate them. With role-based dashboards, reporting and analytics, you can get an executive view of key metrics. Increase visibility into your security posture, team performance, and other key metrics. Security Operations groups key applications in scalable packages that can adapt to your changing needs. You can quickly identify and prioritize high-impact threats and assess your security status in real time. Collaboration workflows and repeatable processes in security, risk and IT allow you to respond faster.
  • 31
    ServiceNow Asset Management Reviews
    Asset Management automates your IT asset lives with intuitive workflows. Make informed decisions about asset capacity, refresh and vendors. Control and know your assets Optimize asset lifecycle investments for better IT services and smarter decisions Reduce asset costs Reduce asset costs and automate asset lifecycle process to reduce wasted resources Mitigate risk To limit risks, enforce asset policies and regulatory requirements.
  • 32
    Rapid7 InsightIDR Reviews
    The cloud architecture and intuitive interface of InsightIDR make it easy to centralize your data and analyze it across logs, network and endpoints. You can find results in hours, not months. Our threat intelligence network provides insights and user behavior analytics that are automatically applied to all your data. This helps you to detect and respond quickly to attacks. Hacking-related breaches involving hacking were responsible for 80% of all hacking-related breaches in 2017. These breaches involved stolen passwords and/or weak passwords. Your greatest asset and greatest threat are your users. InsightIDR uses machine-learning to analyze the behavior of your users and alerts you if there is any suspicious lateral movement or stolen credentials.
  • 33
    Brinqa Reviews
    Brinqa Cyber risk graph presents a complete and accurate picture about your IT and security ecosystem. All your stakeholders will receive timely notifications, intelligent tickets, and actionable insights. Solutions that adapt to your business will protect every attack surface. A strong, stable, and dynamic cybersecurity foundation will support and enable true digital transformation. Brinqa Risk Platform is available for free. Get instant access to unparalleled risk visibility and a better security posture. The Cyber Risk Graph shows the organization's infrastructure and apps in real-time. It also delineates interconnects between business services and assets. It is also the knowledge source for organizational cybersecurity risk.
  • 34
    Rapid7 InsightVM Reviews
    You can better understand the risks in your current environment and work with technical teams. InsightVM's shared view and common language can bring together traditionally siloed groups and help drive impact. You can take a proactive approach to security by tracking and establishing metrics that will help you track progress and create accountability. InsightVM not only provides visibility into the vulnerabilities in your modern IT environment--including local, remote, cloud, containerized, and virtual infrastructure--but also clarity into how those vulnerabilities translate into business risk and which are most likely to be targeted by attackers. InsightVM isn't a magic bullet. It provides the shared view and common language that are needed to bring together traditionally siloed groups and drive impact. It supports proactive vulnerability management through tracking and metrics that provide accountability for remediators, demonstrate the impact across teams, celebrate progress, and encourage celebrations.
  • 35
    BMC Helix Remedyforce Reviews
    BMC Helix Remedyforce, a comprehensive IT service management system, is scalable and adaptable to the needs of mid-sized companies. It is built on Salesforce cloud and allows you to seamlessly integrate IT operations management (ITOM), cognitive capabilities, and business security to ensure that your business is efficient, compliant and secure. Intelligent, multi-channel self-service using Chatbots that can be used to communicate with users via Skype, Slack and mobile. BMC Helix Remedyforce, an IT service management solution built upon the Salesforce Platform™, combines best-practice aligned automation with an easy-to-use experience to maximize IT productivity and innovation. Remedyforce is designed for simplicity and quick value realization. BMC Helix Remedyforce was designed with speed and flexibility as its main goal. It is the ideal service and support option for today's IT ecosystem. Organizations looking to streamline their IT infrastructures and focus on value-oriented IT.
  • 36
    ServiceNow Integrated Risk Management Reviews
    Manage risk and compliance enterprise-wide through change and disruption created by evolving global regulations including privacy and ESG, human error, cyberattacks, digital transformation, and more. By seamlessly embedding risk management and compliance into your daily workflows and familiar user experiences you can enable a common language to improve risk-informed decisions, reduce costs, gain real-time visibility into risk, and effectively communicate with stakeholders at all levels.
  • 37
    ServiceNow Configuration Management Database Reviews
    You need to be able to identify the assets in your IT environment and have accurate configuration data. This will allow you to manage and improve your systems effectively. It's easy to understand the IT environment of your organization with a CMDB (configuration management database). This database is especially useful in areas such as service impact analysis, asset management and compliance. The ServiceNow®, CMDB is a single record system for IT. The CMDB can be paired with ServiceNow Service Mapping to make it service-aware. This allows your ServiceNow applications and services to be service aware. Your CMDB gives you full visibility into your infrastructure and services, allowing you to make better decisions and take greater control of your environment.
  • 38
    BMC Helix CMDB Reviews
    The BMC Helix Configuration Manager Database (CMDB), enriches ecosystem workflow by providing a single source of reference for assets and services. Keep accurate data and service models in place for hundreds of millions configuration items, both on-premises as well as cloud services. Track and manage software, hardware, and cloud service configurations. Pre-define KPIs to measure the success of your policy or configuration management process. BMC Helix Discovery, BMC Helix Client Management and other connectors automatically populate and update CMDB in minutes. With powerful integration tools and a rich set APIs, import and federate data with other sources. Define role-based access to all items and attributes.
  • 39
    OpenVAS Reviews

    OpenVAS

    Greenbone Networks

    OpenVAS is a fully-featured vulnerability scanner. It can perform unauthenticated and authenticated testing as well as various high-level and lower-level industrial protocols. Performance tuning is available for large-scale scans. There is also an internal programming language that can be used to implement any vulnerability test. The scanner retrieves the tests to detect vulnerabilities from a feed with a long history and daily update. OpenVAS was developed by Greenbone Networks and has been moving forward since 2006. The scanner is part of the commercial vulnerability management product Greenbone Enterprise Appliance. It forms the Greenbone Vulnerability Management along with other Open Source modules.
  • 40
    IBM Security QRadar SIEM Reviews
    The market-leading SIEM is built to outpace your adversary in terms of speed, scale, and accuracy SOC analysts' roles are more important than ever as digital threats grow and cyber adversaries become more sophisticated. QRadar SIEM goes beyond threat detection and reaction to help security teams face today’s threats proactively. It does this with advanced AI, powerful intelligence and access to cutting edge content. IBM has a SIEM that will meet your needs, whether you are looking for a cloud-native solution with hybrid scale and speed, or a solution that complements your on-premises architecture. IBM's enterprise-grade AI is designed to increase the efficiency and expertise for every security team. With QRadar SIEM analysts can reduce repetitive tasks such as case creation and risk priority to focus on critical investigations and remediation efforts.
  • 41
    Metasploit Reviews
    Sharing knowledge is a great way to increase your power. Metasploit is a collaboration between Rapid7 and the open-source community. It helps security teams to do more than verify vulnerabilities, manage security assessments and improve security awareness. It empowers and arms security defenders to stay one step ahead of the game.
  • 42
    Splunk Phantom Reviews
    Security automation, security orchestration and response can help you harness the power of your security investments. Splunk Phantom makes it easy to execute actions in seconds, not hours. Automate repetitive tasks to increase your team's effort and allow you to focus on mission-critical decisions. Automated investigations can reduce dwell time. Automated investigations reduce response times. Playbooks that run at machine speed can reduce response time. Integrate your security infrastructure so that each component is actively participating in your defense strategy. Phantom's flexible app structure supports hundreds of tools as well as thousands of APIs. This allows you to connect and coordinate complex workflows between your team and tools. The platform's powerful abstraction allows you to concentrate on what you want to do, while the platform converts that into specific actions for each tool. Phantom allows you to work smarter through a series actions, from detonating files and quarantining devices.
  • 43
    Tenable Reviews
    Tenable's Cyber Exposure Platform provides all the information, research and data that you need to find weaknesses in your entire attack surface. Tenable's market-leading vulnerability monitoring sensors allow you to see every asset on your attack surface, from cloud environments to operational technologies, containers to containers, remote workers to modern web apps. Tenable's machine learning-powered predictions reduce remediation efforts and allow you to concentrate on the most important risks. Communicating objective measures of risk and aligning business goals to security initiatives will help you drive improvements that reduce the likelihood of a cyber-related event affecting your business. These products include: Tenable.ep Tenable.io Tenable.sc Tenable.ad Tenable.ot - Tenable Lumin
  • 44
    OWASP ZAP Reviews
    Zed Attack Proxy is a free and open-source penetration test tool that is being maintained under the wing of the Open Web Application Security Project. ZAP is flexible and extensible and was specifically designed for testing web applications. ZAP is a "man in the middle proxy" that acts as a firewall between the browser and the web app. It can intercept and inspect the messages between the browser and web applications, modify them if necessary, and then forward those packets to the destination. It can be used both as a standalone application and as a daemon process. ZAP offers functionality for all skill levels, from developers to security testers, to security specialists, to security testers who are new to security testing. ZAP supports all major OSes and Dockers, so you don't have to stick with one OS. You can access additional functionality from the ZAP Marketplace by downloading add-ons.
  • 45
    ServiceNow IT Operations Management Reviews
    AIOps allows you to predict issues, reduce user impact and automate resolutions. Automate and automate IT operations that are reactive. Cross-team automation workflows can help you identify anomalies and fix them before they happen. AIOps enables proactive digital operations. Stop chasing false positives, and identify anomalies faster. Telemetry data can be collected and analyzed for improved visibility and lower noise. Share actionable insights with other teams and identify the root cause of incidents. You can reduce outages by following guided recommendations. Rapidly implementing insights-based solutions can reduce recovery times. Pre-built playbooks and knowledge bases make repetitive tasks easier. Establish a culture that is performance-driven across all teams. DevOps and Site Reliability Engineers, (SREs), should have access to microservices in order to increase observability and speed up incident resolution. Manage the digital lifecycle beyond IT operations.
  • 46
    Splunk AR Reviews
    If ineffective troubleshooting has caused degraded customer experiences or if you lack visibility into diagnostics, Splunk® AR can help decrease your mean-time-to-resolution (MTTR). Splunk can be used by your workforce, whether they are on the factory floor or high up in a cell tower. It allows you to view mobile dashboards, data visualizations, and other assets. This empowers even non-technical users, allowing them to take action with guided workflows and more easily accessible information. See how Splunk Augmented reality is being used by our customers. Click here to find out more about how Puget Sound Energy implemented Splunk Augmented Reality to monitor its facilities and improve response times to outages.
  • 47
    Kali Linux Reviews
    Kali Linux, an open-source Linux distribution that is Debian-based, is designed for information security tasks such as Penetration Testing and Security Research. Any Linux can be used to install pentesting tools. However, you must manually set up and configure the tools. Kali was designed to make it easier for professionals to just sit down and do the work. Kali is always at your fingertips, no matter where it is needed. All versions of Kali are available for mobile devices, such as ARM, Docker, ARM and Amazon Web Services. It's easy to create an optimized Kali version for your needs using metapackages. These metapackages are optimized for security professionals and have a well-documented ISO customization process. No matter if you're a veteran or a novice, we have all the information that you need.
  • 48
    Avalor Reviews
    Avalor’s data fabric allows security teams to make more accurate and faster decisions. Our data fabric architecture integrates disparate sources of data from legacy systems, data lake, data warehouses and sql databases to provide a holistic view on business performance. The data fabric powers the platform and provides automation, 2-way synchronization, alerts, analytics, and alerts. All security functions can benefit from the accurate, fast, and reliable analysis of enterprise data, including asset coverage, ROSI analysis and vulnerability management. The average security team uses many different tools and products. Each has its own purpose, taxonomy and output. It's difficult to prioritize your efforts with so much disparate information. Use data from your entire organization to quickly and accurately answer questions from the business.
  • 49
    OpenText Universal Discovery Reviews
    Configuration management in hybrid IT. OpenText™, Universal Discovery and Universal CMDB, can be deployed either on-premises, or via SaaS. Discover, map service dependencies, and perform proactive impact analysis to increase your IT visibility and reduce IT service disruptions. Get a complete IT inventory and configuration across on-premises hardware, software and endpoints. For effective change and configuration, you need to know how your infrastructure delivers critical business applications and services. IT is constantly changing, but you or your service agent should consider the impact of any changes before making them.
  • Previous
  • You're on page 1
  • Next