What Integrates with Kaspersky Anti-Virus?

Find out what Kaspersky Anti-Virus integrations exist in 2024. Learn what software and services currently integrate with Kaspersky Anti-Virus, and sort them by reviews, cost, features, and more. Below is a list of products that Kaspersky Anti-Virus currently integrates with:

  • 1
    Checkmk Reviews
    Checkmk is an IT monitoring system that allows system administrators, IT managers and DevOps teams, to quickly identify and resolve issues across their entire IT infrastructure (servers and applications, networks, storage and databases, containers, etc. Checkmk is used daily by more than 2,000 commercial customers worldwide and many other open-source users. Key product features * Service state monitoring with nearly 2,000 checks 'outside the box' * Event-based and log-based monitoring * Metrics, dynamic Graphing, and Long-Term Storage * Comprehensive reporting incl. Accessibility and SLAs * Flexible notifications and automated alert handling * Monitoring business processes and complex systems * Software and hardware inventory * Graphical, rule-based configuration and automated service discovery These are the top use cases * Server Monitoring * Network Monitoring * Application Monitoring * Database Monitoring * Storage Monitoring * Cloud Monitoring * Container Monitoring
  • 2
    Cloudmore Reviews

    Cloudmore

    Cloudmore

    499
    Cloudmore offers a variety of solutions for businesses looking to solve recurring services procurement challenges, vendors transitioning to recurring revenues, and service providers moving to the cloud. Cloudmore is a single place to manage, bill and sell your subscription channel partners and customers. Eliminate the challenges of procuring recurring and metered services. Reduce billing processing time and eliminate costly billing errors Users can search for and purchase the services they require by themselves. Your services can be showcased and sold in an external or internal marketplace. Cloudmore's service catalogue is available for you to choose from and then sell them to your customers in their curated online store. You can manage pricing globally or per customer. You can create offers and quotes using your service catalog. Your admin users can view and manage your monthly billing details and discover services.
  • 3
    Teamstack Reviews

    Teamstack

    Teamstack

    $3 per user per month
    Do not compromise security for convenience. Automate identity management for legacy, mobile, and web apps to grow your team seamlessly. Integrate your day-to-day apps with our identity management platform to increase efficiency and allow employees, contractors, and customers to work seamlessly together. You can use pre-built integrations, Single-Sign-On and one click user provisioning to allow your team to sign in to any application passwordless using multi-factor authentication. Your workforce deserves easy access, regardless of whether your applications are cloud-based or custom-built. The Fortune 500s should not have high standards in identity management. They can access best-in-class accessibility and security features that will protect their business, increase efficiency, and save valuable time. Our access policies are now in place for employees who attempt to access cloud apps.
  • 4
    Centreon Reviews
    Centreon is a global provider for business-aware IT monitoring to ensure high performance and continuous operations. The company's AIOps-ready platform, which is holistic and ready for use in today's complex hybrid cloud infrastructures, is designed to meet the needs of these distributed clouds. Centreon monitors all aspects of the IT Infrastructure, from Cloud-to Edge for a clear and comprehensive view. Centreon eliminates blind spots by monitoring all equipment, middleware, and applications that are part modern IT workflows. This includes legacy assets on-premise, private and public clouds, and all the way to edge of the network where smart devices and customers come together to create business value. Centreon is always up-to-date and can support even the most dynamic environments. It has auto-discovery capabilities that allow it to keep track of Software Defined Network (SDN), AWS or Azure cloud assets and Wi-Fi access points, as well as any other component of today’s agile IT infrastructure.
  • 5
    Datto RMM Reviews
    Datto RMM, a cloud-based remote monitoring platform and management platform that provides MSPs with the ability to secure and reliably manage customers' IT infrastructures, is reliable, modern and reliable. It was designed to reduce complexity, costs, risks, and risk. It includes powerful automation tools and monitoring tools like ransomware detection, patch management and remote control takeover. This allows MSPs to prevent IT problems, respond quickly to incidents, and provide better service to customers. All-in-one, reliable cloud backup and disaster recovery that is image-based. Cloud-to-cloud backup, fast recovery of critical data in Microsoft 365 or G Suite applications. Support for Windows and Mac allows for fast file and folder backups and restores. Secure file sync and sharing with a centrally managed, secure collaboration system. Servers can be quickly and reliably restored using an image-based, all in one business continuity and disaster recovery solution.
  • 6
    Lift AI Reviews
    98% of website traffic is anonymous. Lift AI predicts the visitor's 'buyer intention' in real-time so that you can convert them in chat, before they leave the site. Lift AI's sophisticated AI model predicts the likelihood of every visitor to buy or convert (known by 'buyer intention'). This is even though anonymous visitors may be included. Lift AI automatically surfaces web users with high buyer intent to allow your sales team to prioritize them via live chat (before they leave the site), while visitors with low buyer intent are engaged using chatbots. Combine Lift AI's buyer intention score with other intelligence tools to maximize their effectiveness. A high buyer intent visitor who is also a target account might be prioritized in chat and follow-up. Lift AI users convert 9x more visitors to their website via chat to pipeline.
  • 7
    Cyware Reviews
    Cyware is the only company that builds Virtual Cyber Fusion Centers, enabling organizations to respond to threats in unprecedented ways. Cyware provides a complete range of cyber fusion solutions that can be used to automate threat response and sharing tactical, tactical, operational, and strategic threat intelligence. Cyware Enterprise Solutions are designed for secure collaboration, inculcate cybersecurity, enhance threat visibility, and deliver necessary control. They provide organizations with context-rich analysis of threats to enable proactive response without losing the element human judgment. Cyware solutions push the boundaries of security paradigms. They use advances in Machine Learning and Artificial Intelligence, Security Automation & Orchestration technologies, to empower enterprises to adapt to the changing threat landscape.
  • 8
    Datto Workplace Reviews
    Datto Workplace offers enterprise-grade file sync and shared to managed service providers without compromising security or efficiency. Datto Workplace is a business-oriented collaboration platform that allows clients to share files from any device. One, simple, and scalable solution that can be used for all roles, from sales technicians to executives. You can customize settings to meet your business's needs and simplify implementation. MSPs can schedule reports on system activity, monitor usage, and perform auditing on-demand. By leveraging integrations with core business tools like Microsoft, G Suite and Active Directory, workplace users can securely collaborate from any device. Clients can work securely with Datto Workplace, which boasts a 99.99% uptime and HIPAA, GDPR and SOC 2 compliance. Datto Workplace offers the security, mobility and control that businesses require.
  • 9
    ThreatQ Reviews

    ThreatQ

    ThreatQuotient

    Threat intelligence platform - threatQ, to understand and prevent threats more effectively and efficiently, your security infrastructure and people must work smarter, and not harder. ThreatQ is an extensible and open threat intelligence platform that can accelerate security operations through simplified threat operations and management. The integrated, self-tuning, adaptive threat library, open exchange, and workbench allow you to quickly understand threats and make better decisions, thereby accelerating detection and response. Based on your parameters, automatically score and prioritize internal or external threat intelligence. Automate the aggregation and operationalization of threat intelligence across all systems. Integrating your tools, teams, and workflows will increase the effectiveness of your existing infrastructure. All teams have access to a single platform that enables threat intelligence sharing, analysis, and investigation.
  • 10
    Recorded Future Reviews
    Recorded Future is the largest provider of enterprise security intelligence in the world. Recorded Future provides timely, accurate, and practical intelligence by combining pervasive and persistent automated data collection and analysis with human analysis. Recorded Future gives organizations the visibility they need in a world of increasing chaos and uncertainty. It helps them identify and detect threats faster, take proactive action to disrupt adversaries, and protect their people and systems so that business can continue with confidence. Recorded Future has been trusted by over 1,000 businesses and government agencies around the globe. Recorded Future Security Intelligence Platform provides superior security intelligence that disrupts adversaries on a large scale. It combines analytics and human expertise to combine a wide range of open source, dark net, technical, and original research.
  • 11
    MaxPatrol Reviews

    MaxPatrol

    Positive Technologies

    MaxPatrol is designed to manage vulnerabilities and compliance in corporate information systems. MaxPatrol's core features include penetration testing, system checks, compliance monitoring, and system checks. These mechanisms provide an objective view of IT security infrastructure and granular insight at department, host and application levels. This information is essential to quickly identify vulnerabilities and prevent attacks. MaxPatrol makes it easy to keep a current inventory of IT assets. You can view information about your network resources (network addresses and OS), identify hardware and software that are in use, and track the status of updates. It can also monitor changes to your IT infrastructure. MaxPatrol does not blink when new hosts and accounts are created, or when hardware and software are upgraded. Information about the security of infrastructure is quietly collected and processed.
  • 12
    Airlock Reviews
    Airlock's Secure Access Hub protects apps, APIs, and data from identity theft. Airlock combines security and convenience. It offers customers a seamless customer journey with single sign-on, social login, comprehensive user self service, consent management, and comprehensive user self-services. Reacting quickly is key to being in tune with the market. The Airlock Secure Access hub provides all necessary security functions, including registration, authentication, and self-services. You can focus all your IT resources on your business processes so you can use your IT resources more effectively. The Airlock Secure Access hub helps you meet all international compliance standards, including GDPR, PSD2, PCI–DSS and OWASP. The compliance of regulations is made easier by the inclusion of access policies onto applications and services.
  • 13
    AriLinc Reviews

    AriLinc

    Infintrix Global

    AriLinc is an industrial IoT gateway. It converts various PLC Modbus RTUs and Modbus TCP into Modbus TCP. OPC UAs, MQTT, AWS, as well as other protocols. AriLinc uses embedded Linux, supports TSL and SSL encryption, has 1 RS232/RS485 serial input, 1 power output, 2 Ethernet ports, 2 USB ports, and supports SIM cards and SD cards. The built-in 4G network, or Ethernet access to Internet, has the characteristics of high speed and low latency. The Lora Gateway S281 series is designed for data acquisition via Lora technology. It supports wireless sensors and a wireless RS485 data converter. It is widely used in agricultural greenhouses, chemical plant, electroplating plant, hospital sites and storage warehouses for real-time temperature and humidity collection/monitoring. We offer complete IT solutions, custom software development, mobile app & web development, as well as offshore IT consultancy services.
  • 14
    LogMan.io Reviews
    TeskaLabs Logman.io provides log management, collection and archiving as well as log analysis. Scalable Log Management can easily be upgraded to the full-scale TeskaLabs SIEM (security event management) tool. You can stay one step ahead of any potential threats and have a complete overview of the security of your IT infrastructure. TeskaLabs LogMan.io protects sensitive data and important data by providing timely and clear threat detection. TeskaLabs is a cybersecurity expert, so all our products meet your company's security standards. LogMan.io ensures compliance with GDPR and cyber security legislation. Logman.io is flexible enough to adapt to your needs. You can easily upgrade to TeskaLabs SIEM. It provides a quick overview of the entire IT infrastructure and is a complete tool for risk modeling, risk management, vulnerability scanning, and threat modeling.
  • 15
    TeskaLabs SIEM Reviews
    This state-of the-art tool is designed to manage security information and events. This security surveillance tool allows you to automatically monitor and correlate security events, evaluate them, and create reports in real time. TeskaLabs SIEM provides a central overview of your company's infrastructure. Early detection helps to eliminate potential risks and affects on the company's operation. TeskaLabs SIEM will keep you safe from potential threats. TeskaLabs is a cybersecurity expert, so all our products will meet your company's security standards. TeskaLabs SIEM ensures compliance with Cyber Security, GDPR and ISO 27001:2013 legislation. Automated real time detection and reporting of known anomalies and incidents will allow you to quickly respond to each incident and prioritize the solution. You can save time by searching for potential threats early.
  • Previous
  • You're on page 1
  • Next