What Integrates with Intellicta?

Find out what Intellicta integrations exist in 2024. Learn what software and services currently integrate with Intellicta, and sort them by reviews, cost, features, and more. Below is a list of products that Intellicta currently integrates with:

  • 1
    Amazon Web Services (AWS) Reviews
    Top Pick
    See Software
    Learn More
    AWS offers a wide range of services, including database storage, compute power, content delivery, and other functionality. This allows you to build complex applications with greater flexibility, scalability, and reliability. Amazon Web Services (AWS), the world's largest and most widely used cloud platform, offers over 175 fully featured services from more than 150 data centers worldwide. AWS is used by millions of customers, including the fastest-growing startups, large enterprises, and top government agencies, to reduce costs, be more agile, and innovate faster. AWS offers more services and features than any other cloud provider, including infrastructure technologies such as storage and databases, and emerging technologies such as machine learning, artificial intelligence, data lakes, analytics, and the Internet of Things. It is now easier, cheaper, and faster to move your existing apps to the cloud.
  • 2
    RSA SecurID Reviews
    RSA SecurID allows organizations of all sizes to reduce identity risk and ensure compliance without compromising user productivity. It provides users with easy access to their information and confirms that they are who they claim to be. RSA SecurID also provides unified visibility across all organizations' islands of identity and control. RSA SecurID combines multi-factor authentication with identity governance to address security concerns associated with providing easy access to dynamic user populations in complex environments. It assesses risk and business context to provide access and identity assurance. Digital transformation presents new challenges in authentication, access management, and identity governance for organizations. As a result, more users require access to more systems via more devices than ever before. RSA SecurID is a tool that helps organizations address these issues and protect their identity.
  • 3
    OpenText Extended ECM Reviews
    Bridge information silos, strengthen governance, and improve processes. OpenText™, Extended ECM, is an enterprise content solution that governs the lifecycle of information by securely integrating with leading enterprise apps, such as SAP, Microsoft®, Salesforce, and SAP SuccessFactors. Extended ECM brings content and processes together to provide access to information whenever and wherever it is needed, improve decision-making and drive operational effectiveness. Create bridges between the digital workspace and applications that drive ERP, HCM and BPM business processes. This will help you achieve operational excellence. A fully integrated portfolio of solutions for information management can address the most complex business or industry use cases. Use automated, defensible Governance--from document creation and capture to archiving, disposal, and more--that extends across applications such as SAP®, Salesforce®, and Microsoft®.
  • 4
    Okta Reviews
    Top Pick
    One platform, infinite ways for you to connect with your customers and employees. Any app can be made authable. Okta can help you create secure and delightful experiences quickly. Okta's Customer ID products can be combined to create the stack you need. This will provide security, scalability and reliability. Protect and empower your employees, contractors, partners. Okta's workforce identification solutions will protect your employees no matter where they are. You will have the tools you need to automate cloud journeys and support hybrid environments. Okta is trusted by companies around the globe to protect their workforce identities.
  • 5
    Microsoft 365 Reviews
    Top Pick

    Microsoft 365

    Microsoft

    $5 per user per month
    105 Ratings
    Microsoft 365 (formerly Microsoft Office 365) is now available. Outlook, OneDrive and Excel, Word, PowerPoint, Excel, PowerPoint and OneNote allow you to be more creative and achieve the things that matter with Microsoft 365 (formerly Microsoft Office 365). You get the latest Office apps, both online and desktop, when you subscribe to Microsoft 365. You can access Office apps on your desktop, tablet, and phone. * Microsoft 365 + your device + Internet = productivity wherever and whenever you are. OneDrive makes it easy to access the work you have done from anywhere, and to others when you share or collaborate. There is help at every turn. Chat, email, or call to speak with a live person. Get Office today - choose the right option for you
  • 6
    OpenIAM Reviews
    Identity Governance and Web Access Management You must ensure that new employees are granted access to all systems and resources necessary to their work. Access that is not necessary for the new position must also be revoked. It is essential that permissions are granted for users who leave the firm or are terminated. To avoid disgruntled users, access to sensitive data and applications must be disabled or removed promptly with traceability.
  • 7
    SailPoint Reviews

    SailPoint

    SailPoint Technologies

    1 Rating
    Technology is essential for business. Without it, technology can't be trusted. Today's "work from anywhere" era means that managing and controlling access to every digital identity is crucial for the protection of your business as well as the data it runs on. Only SailPoint Identity security can help you empower your business and manage cyber risk from the explosion in technology access in the cloud enterprise. This will ensure that every worker has the right access to their job, no more, no lesser. Unmatched visibility and intelligence is achieved while automating and speeding the management of all user identities and entitlements. With AI-enhanced visibility, you can automate, manage, and govern access in real time. Allow business to operate in a cloud-critical and threat-intensive environment with speed, security, and scale.
  • 8
    Beyond Reviews

    Beyond

    Beyond

    30-Day Free Trial
    3 Ratings
    Beyond (formerly Beyond Pricing), is the #1 Revenue Management Platform for short term rental owners and managers to get, grow and maintain revenue. Our suite of vacation rental tools has allowed our partners to see a 40% increase on their booking revenue. We have supported more than 340,000 properties in over 7,500 cities around the world. We have a wide variety of tools that we have developed since pioneering dynamic pricing in the short-term rental industry. These tools include Signal, Relay, Informations, Guidance, Projections, and Insights. They were created to give short-term renters and owners the tools they need. Visit beyondpricing.com to learn more and see what we can offer your business.
  • 9
    Ping Identity Reviews

    Ping Identity

    Ping Identity

    $5 per user per month
    Ping Identity provides global enterprise identity security with an intelligent identity platform. It offers comprehensive capabilities such as single sign-on (SSO), multifactor authentication (MFA), directory and many more. Ping helps enterprises balance security and user experience for workforce, customer, and partner identity types with a variety of cloud deployment options including identity-as-a-service (IDaaS), containerized software, and more. Ping offers solutions for both developers and IT teams. Allow digital collaboration through simple integrations to these popular tools. These integrations allow you to support your employees wherever they may be using these popular tools. You can deploy quickly and have interoperability throughout the entire identity ecosystem. You can choose to have a single sign-on (SSO), or an adaptive, risk-based authentication authority. A PingOne package allows you to only pay for what is necessary and allows you to grow.
  • 10
    eDirectory Reviews

    eDirectory

    eDirectory

    $99 per month
    A stunning and beautifully designed directory website can be created online in just a few minutes. It is ready to generate recurring revenue streams for any industry or purpose. In minutes, you can set up and launch your website. You can easily manage your content. You can make money from your website by selling recurring subscriptions, leads and ads. eDirectory: The most comprehensive set of features to dominate any industry. eDirectory was designed to be simple to use, but powerful enough to support all your business needs as you grow your online community. eDirectory has been designed with SEO in mind. It supports all aspects of SEO, including sitemap generation, Google tagging and built-in onsite SEO. Your site will rank high in the SERPs if you focus on content. eDirectory powers thousands upon thousands of websites around the world. Whether you are a large online company or a new business owner, eDirectory can help you. eDirectory uses technology platforms that power many of today's most popular websites. This is in addition to the core technology.
  • 11
    Microsoft Identity Manager Reviews
    Microsoft Identity Manager (MIM), builds on the identity management capabilities of Forefront Identity Manager, and its predecessor technologies. MIM allows integration with heterogeneous platforms throughout the datacenter, including directories, HR systems, and databases. MIM enhances Azure AD cloud-hosted service by allowing the organization to have the correct users in Active Directory for on premises apps. Azure AD Connect will then make Azure AD available for Microsoft 365 or cloud-hosted applications. Common MIM scenarios include: - Automatic identity provisioning and group provisioning based upon business policy and workflow-driven provisioning. - Integration of directories' contents with HR systems and other sources. - Synchronizing identities among directories, databases and on-premises apps through common APIs, protocols, Microsoft-delivered and partner-delivered connectors.
  • 12
    Oracle Identity Management Reviews
    Oracle Identity Management allows organizations to manage the entire lifecycle of user identities across all enterprise resources. This includes both inside and outside the firewall, as well as into the cloud. The Oracle Identity Management platform offers scalable solutions for identity governance and access management. This platform enables organizations to improve security, simplify compliance, and take advantage of business opportunities related to mobile and social access. Oracle Identity Management is part of the Oracle Fusion Middleware product family. This allows for greater agility, better decision making, and lower cost and risk in diverse IT environments. We now offer an innovative, fully integrated service, Oracle Identity Cloud Service, that provides all core identity and access management capabilities via a multi-tenant Cloud platform.
  • 13
    OpenText NetIQ Identity Manager Reviews
    Manage the identity lifecycle of all entities within your hybrid infrastructure. Secure, consistent and efficient access to corporate assets both within and outside the firewall. Collect and curate identity information across complex, mixed environments. A centralized framework is available to provide identities and allow access to data and applications. Automating access decisions can save time and reduce risk. Continuously adjust security controls based upon real-time insights and information. Create a consistent, global view of all identities within and outside your organization. Identity Manager collects and curates data about identity governance. This allows you to know who has access, why they were granted, and if it is still required. You have one source of truth for access and identity with features like continuous reconciliation and attribute-level authority.
  • 14
    LogRhythm NextGen SIEM Reviews
    We understand that your job is not easy. Log management, machine learning and NDR are all part of our solution. This gives you broad visibility to your environment, so you can quickly spot threats and minimize risk. A mature SOC does more than stop threats. LogRhythm makes it easy to track your progress and baseline your security operations program. This will allow you to easily report on your successes to your board. Protecting your enterprise is a huge responsibility. That's why we designed our NextGen SIEM Platform for you. Protecting your business has never been easier thanks to intuitive, high-performance analytics, and a seamless workflow for responding to incidents. LogRhythm XDR Stack gives your team an integrated set of capabilities that can be used to deliver the core mission of your SOC, which is threat monitoring, threat hunting and incident response. It also comes at a low total cost.
  • 15
    IBM Security Verify Access Reviews
    IBM Security Verify Access (formerly IBM Security Access Manager, or ISAM) helps you to simplify user access and make it easier for your users to use web, mobile, IoT, and cloud technologies more securely. It can be deployed on-premises or in a virtual or physical appliance. Or it can be containerized with Docker. Verify Access also directly connects with Verify SaaS for a modernized, hybrid IAM approach to enable your organization's migration to identity-as-a-service (IDaaS) at a comfortable pace.
  • 16
    Rapid7 InsightIDR Reviews
    The cloud architecture and intuitive interface of InsightIDR make it easy to centralize your data and analyze it across logs, network and endpoints. You can find results in hours, not months. Our threat intelligence network provides insights and user behavior analytics that are automatically applied to all your data. This helps you to detect and respond quickly to attacks. Hacking-related breaches involving hacking were responsible for 80% of all hacking-related breaches in 2017. These breaches involved stolen passwords and/or weak passwords. Your greatest asset and greatest threat are your users. InsightIDR uses machine-learning to analyze the behavior of your users and alerts you if there is any suspicious lateral movement or stolen credentials.
  • 17
    CA Flowdock Reviews

    CA Flowdock

    CA Technologies

    $3.00/month
    CA Flowdock unites all your conversations, work items, and tools. You can prioritize work, solve problems, search for and organize across time zones, locations, and teams. Your entire team can chat in real-time. Flows are the heart and soul of Flowdock. They provide open spaces for teams to communicate and collaborate. Invite project stakeholders to join your Flow, to participate in discussions, receive updates from your tools, as well as receive customized notifications. Threads are used to organize conversations within a team flow. These Threads allow team members to reply, keeping topics organized. Each conversation is color-coded to make it easy to identify a topic and jump back into a conversation. You can talk privately with a member or your team through our 1:1 Flows if you need to discuss confidential matters. To activate instant video chat or screen sharing using one of our favorite integrations, Appear.in, use the /appear command. This link is available to everyone on your team.
  • 18
    Saviynt Reviews
    Saviynt offers intelligent identity access management and governance to cloud, hybrid, and on-premise IT infrastructures in order to accelerate enterprise digital transformation. Our platform integrates seamlessly with the most popular IaaS, PaaS and SaaS applications, including AWS Azure, Oracle EBS and SAP HANA. Gartner awarded the Trust Award to our IGA 2.0 advanced risk analysis platform and named it an industry leader.
  • 19
    Fidelis Network Reviews

    Fidelis Network

    Fidelis Cybersecurity

    Advanced threats require deep inspection, extraction and analysis of all content moving across the wire in real time. Fidelis network detection & response bi-directionally scans all protocols and ports to collect rich metadata that can be used for machine-learning and other powerful machine-learning analyses. You can have full visibility and network coverage with direct, internal, web, and email sensors. To help security teams stay ahead of the curve, identified attacker TTPs are mapped against MITRE ATT&CK™. Threats can hide, but they can't run. To map your cyber terrain, automatically profile and classify IT assets. This includes legacy systems, enterprise IoT, and shadow IT. Integrating with Fidelis' endpoint response and detection solution, you can create a software asset inventory that is correlated with known vulnerabilities, including CVE and KB Links, as well security hygiene for patches, and endpoint status.
  • 20
    Delinea Cloud Access Controller Reviews
    You can have complete control over web applications and cloud-based cloud management platforms. Cloud Access Controller by Delinea is a comprehensive PAM solution. It operates at cloud speed, can be deployed quickly, and provides secure access to any web app. Cloud Access Controller allows you to integrate existing authentication solutions with any other web application. You can create granular RBAC policies to enforce zero trust and least privilege, even for legacy and custom web applications. Specify what web applications each employee can read or modify. Cloud applications can be granted, managed and revoked. At a very fine level, specify who has access to which cloud applications. You can track usage of every cloud application. Without agents, clientless session recording. Secure access to all web apps, including legacy and custom web applications.
  • 21
    ForgeRock Reviews
    The only AI-driven platform that combines all aspects of identity, governance and access management to dramatically improve and scale, it is the only one in the industry. Digital access is essential for our personal, professional, and educational lives. It is essential to accelerate digital transformation, provide superior experiences, and ensure the highest level of security in order to meet customer demand and keep up with our competitors. ForgeRock helps people connect to the world safely and easily by helping organizations improve and scale their identity, governance and access management. ForgeRock is the only AI-driven platform that offers a full suite of AI-driven solutions. It is designed for all types of identities (consumers and workers, as well as things). ForgeRock's simple-to-use, comprehensive solutions will help you increase revenue, manage risk, increase workforce productivity, and lower costs.
  • 22
    OpenText NetIQ Access Manager Reviews
    Secure access management across mobile and cloud platforms is essential today. Single sign-on and access control for the entire enterprise that eliminates the need to use siloed solutions in complex or cloud-based intranet environments. Access Manager allows you to securely interact with your partners via mobile devices. You can enable native apps or extend your web-based applications to them. Access Manager offers the convenience and security that digital customers expect from a self-help tool. Microsoft Azure is an essential part of many organizations' services. Access Manager provides security and other features for Azure. Access Manager supports the most current protocols for interoperability and easy integration. Access Manager provides a rich array of adaptive authentication options to ensure the best continuous authentication experience.
  • 23
    Oracle Cloud Infrastructure Reviews
    Oracle Cloud Infrastructure supports traditional workloads while delivering modern cloud development tools. It's designed to protect against modern threats so that you can invent more. To lower your TCO, combine low cost and high performance. Oracle Cloud is a Generation 2 enterprise-class cloud that delivers powerful compute, networking, and includes a wide range of infrastructure and platform cloud services. Oracle Cloud was built from the ground up to support legacy workloads and deliver modern cloud development tools. This allows enterprises to bring their past forward while building their future. Our Generation 2 Cloud is the only one that can run Oracle Autonomous Database, which is the first and only industry-leading self-driving database. Oracle Cloud offers a complete cloud computing portfolio that includes application development, business analytics, data management, integration, security, and blockchain.
  • 24
    RiskIQ Reviews
    RiskIQ is the market leader in attack surface management. It provides the most comprehensive intelligence, discovery, and mitigation of threats related to an organization's digital presence. RiskIQ gives enterprises unified insight and control of mobile, social, and web exposures. More than 75% of attacks originate outside the firewall. RiskIQ's platform is trusted by thousands of security analysts. It combines advanced internet data reconnaissance with analytics to accelerate investigations, understand digital attack surface, assess risk, and take action to protect customers, brands, and businesses. RiskIQ is the world's only platform with patented Internet Intelligence Graph technology, security intelligence--unified. RiskIQ's 10-year-old history of mapping the internet is used to fuel applied intelligence that detects cyberattacks and responds. The most comprehensive security intelligence to protect your attack surfaces.
  • 25
    IBM Security Guardium Vulnerability Assessment Reviews
    IBM Security Guardium Vulnerability Assessment scans the data infrastructures (databases/data warehouses and big-data environments) to identify vulnerabilities and suggest possible remedial steps. The solution identifies vulnerabilities such as weak passwords, missing patches, unauthorized changes, and misconfigured privileges. You will receive full reports and suggestions on how to fix all vulnerabilities. Guardium Vulnerability Assessment identifies behavioral vulnerabilities like account sharing, excessive administrative logins, and unusual after-hours activities. It detects security gaps and threats in databases that could allow hackers to exploit them. You can classify sensitive data in heterogeneous environments. Access detailed reporting on entitlements, risky configurations. Automate compliance audits, exception management.
  • 26
    IBM Security Verify Governance Reviews
    IBM Security Verify Governance allows organizations provision, audit, and report on user activity through lifecycle, compliance, and analytics capabilities. You need to know who has access to what in your organization and how it is being used. Are you able to manage your identity governance effectively? IBM is committed to collecting and analysing identity data to support enterprise IT compliance and regulatory compliance. IBM Security Verify Governance will give you visibility into access usage, prioritize compliance actions based on risk-based insights, make better decisions, and provide clear, actionable intelligence. This is all possible because of a business-activity-based approach to risk modeling. This is a key differentiator for IBM and makes life easier for auditors as well as risk compliance managers. Allow and streamline full provisioning and self service requests to quickly onboard or offboard employees.
  • 27
    NetIQ Identity Governance Reviews
    You can control access to data and applications across your enterprise. No matter whether you deploy on-premises or via SaaS you will get the same fully-featured capabilities as you would expect from a modern identity management solution. Find out who has access to your most important applications and data, both on-premises and in the cloud. Identity Governance allows you to collect and visualize all identities and entitlements in your ecosystem. You will know who has what access, who approved it, and why. You can keep your teams productive by giving them accurate and timely access to data and applications across your diverse IT landscape. Identity Governance makes it easy for IT staff and application owners to manage entitlements across all platforms and applications. A user-friendly, self service access request and approval system will be available. Automated fulfillment will be provided for the most frequently used applications.
  • 28
    Oracle Access Management Reviews
    Access Management provides risk-aware, end to end multifactor authentication (MFA), and single sign on (SSO) that seamlessly integrate identities across cloud and on-premises. Organizations can deploy Access Management as an image in Oracle Cloud Infrastructure, or in on-premises Data Centers. This gives them the flexibility to manage access to their existing enterprise platforms and supports their migration to cloud. These policies can be applied regardless of device or location so that users have access to all data from any device, at any time, from any device. You can provide seamless user access control across the enterprise and cloud from any device. Single sign-on (SSO), simplifies access and reduces the requirements for the user while providing consistent access security. Adaptive authentication reduces risk by increasing the login requirements for users based upon device, location, or behavior when access to sensitive information is required.
  • 29
    CyberArk Conjur Reviews
    Securely authenticate, control, and audit non-human access across tools and applications. Secrets allow access to tools, critical infrastructure, and other sensitive data. Conjur protects these secrets by tightly controlling them with granular Role-Based Access Control. Conjur authenticates an application that requests access to a resource. It then checks the security policy against the authorization and distributes the secret securely. Conjur's security policy is code. Security rules are written in.yml format, checked into source control and loaded onto Conjur. Security policy is treated as any other source control asset. This adds transparency and collaboration to the organization’s security requirements.
  • 30
    BeyondTrust Endpoint Privilege Management Reviews
    Reduce unnecessary privileges and give Windows, Mac, Unix and Linux access without affecting productivity. Our experience with more than 50 million endpoints has allowed us to develop a rapid deployment process. BeyondTrust is available on-premise and in the cloud. It allows you to quickly and efficiently remove admin rights without affecting user productivity or increasing service desk tickets. External attackers and malicious insiders are high-value targets for Unix and Linux systems. The same applies to networked devices such as IoT and ICS, as well. An attacker can gain root or other privileged credentials to easily fly under the radar and gain access to sensitive systems and data. BeyondTrust Privilege Manager for Unix & Linux provides an enterprise-class, high-standard privilege management solution that assists IT organizations in achieving compliance.
  • Previous
  • You're on page 1
  • Next