What Integrates with KnowBe4?

Find out what KnowBe4 integrations exist in 2025. Learn what software and services currently integrate with KnowBe4, and sort them by reviews, cost, features, and more. Below is a list of products that KnowBe4 currently integrates with:

  • 1
    LastPass Reviews
    Top Pick

    LastPass

    LastPass

    $4 per user per month
    32 Ratings
    LastPass is the leader in password and identity management solutions, trusted by individuals and organizations of all sizes worldwide. Millions rely on LastPass daily to create, store, manage, and protect their most important credentials, keeping them secure, private and always within reach. With LastPass, anyone can effortlessly log in to life or work anytime, anywhere.
  • 2
    COZYROC SSIS+ Suite Reviews
    COZYROC's SSIS+ suite includes 270+ Data integration adapters, ETL components and tasks for developing ETL solutions with MS SQL Server Integration Services.
  • 3
    Axonius Reviews
    Axonius gives IT and security teams the confidence to control complexity by providing a system of record for all digital infrastructure. With a comprehensive understanding of all assets including devices, identities, software, SaaS applications, vulnerabilities, security controls, and the context between them, customers are able to mitigate threats, navigate risk, decrease incident response time, automate action, and inform business-level strategy — all while eliminating manual, repetitive tasks.
  • 4
    JupiterOne Reviews

    JupiterOne

    JupiterOne

    $2000 per month
    Go beyond asset management. Turn complexity into capability. Our cyber asset analysis platform empowers security teams by providing total visibility into the assets, context and risks that make up their attack surface. With JupiterOne, organizations transform asset visibility from frustration into strength.
  • 5
    Vanta Reviews
    Vanta is the leading trust management platform that helps simplify and centralize security for organizations of all sizes. Thousands of companies rely on Vanta to build, maintain and demonstrate trust in a way that's real-time and transparent. Founded in 2018, Vanta has customers in 58 countries with offices in Dublin, New York, San Francisco and Sydney.
  • 6
    Ostendio Reviews
    Ostendio is the only integrated security and risk management platform that leverages the strength of your greatest asset. Your people. Ostendio is the only security platform perfected for more than a decade by security industry leaders and visionaries. We know the daily challenges businesses face, from increasing external threats to complex organizational issues. Ostendio is designed to give you the power of smart security and compliance that grows with you and around you, allowing you to demonstrate trust with customers and excellence with auditors. Ostendio is a HITRUST Readiness Licensee.
  • 7
    Indent Reviews

    Indent

    Indent

    $8 per month
    Faster access unlocks more revenue. Give your team on-demand access to apps that is faster and easier without frustrating them. Slack allows users to request access to apps. Managers can approve or deny the request from Slack. All of this is auditable. Stop manually catherding approvals. Every time an access is granted, there's a security risk. Indent helps teams to scale security and least-privilege by shifting users from permanent access without slowing things down. Automate spreadsheet-based processes for SOC 2, SOX ISO and HITRUST. Controls and policies are baked directly into the access request workflows. Reduce your license footprint by only providing access when needed, instead of granting permanent access. Indent reduces costs without adding friction to the end user experience. If you want to lead a rapidly growing company to success, you need to take on big risks.
  • 8
    ScalePad ControlMap Reviews

    ScalePad ControlMap

    ScalePad

    $200 per month
    You have thousands of steps to take before you reach your cybersecurity compliance goals. With the right cybersecurity management software, you can get started quickly. Start with customizable templates that have been verified by experts. Cross mapping helps you find the overlaps between standards so that you can get on with your compliance tasks. Manage evidence and policies to keep everything in one place. You can also keep track of risks and vendors. No more spreadsheets or scattered documents. Compliance is a team effort. This personalized portal allows them to access policies and perform any tasks that they need.
  • 9
    Zoho Directory Reviews
    Zoho Directory, a cloud-based platform for identity and access management, is designed to streamline authentication and authorization. It also simplifies user management. Single Sign-On (SSO), which allows employees to access multiple apps with a single set credentials, enhances security and user convenience. Multi-Factor Authentication is supported by the platform, adding an additional layer of protection from unauthorized access. Device authentication provides secure access to applications and devices. Employees can use the same credentials on all platforms. Zoho Directory offers robust provisioning capabilities, which allow IT administrators to create user profiles for various applications from the platform. This reduces the time spent on repetitive work. Directory stores facilitate integration with existing directories such as Microsoft Active Directory or Azure AD.
  • 10
    Egress Intelligent Email Security Reviews
    Intelligent Email Security. Our human layer security platform uses powerful encryption and analytics technologies, contextual machine learning, and powerful encryption to prevent human-activated data breach, protect sensitive data (Egress Guard), and allow you to identify areas at risk in your email network. To help employees make smart security decisions, we use advanced DLP technology and contextual machine learning. This includes detecting and stopping accidental and intentional data leaks and ensuring that sensitive data is protected when it's shared with the right recipients. Our plug-in makes email encryption simple. We also automate protection based upon your security policies. Our intelligent technology can determine the actual threat of a breach by sharing data to ensure that the right security and control are always in place. Our eDiscovery software provides time-saving analytics and reporting across your email network.
  • 11
    Panaseer Reviews
    Panaseer's continuous control monitoring platform is a powerful tool that can monitor and monitor all aspects of your organization. It provides trusted, automated insight into the organisation's security and risk posture. We create an inventory of all entities in your organization (devices and apps, people, accounts, and databases). The inventory identifies assets that are missing from different sources and identifies security risks. The platform provides metrics and measures that will help you understand your compliance and security status at all levels. The platform can ingest data from any source, cloud or on-premises. Data can be accessed across security, IT, and business domains using out-of-the box data connectors. It uses entity resolution to clean and normalise, aggregate and de-duplicate this data. This creates a continuous feed with unified assets and controls insights across devices and applications, people, database and accounts.
  • 12
    Cypago Reviews
    Automated workflows with no-code reduce manual effort, lower costs and increase trust with customers. Using automated and simplified cross-functional processes, you can improve your security governance, risks, and compliance (GRC). You will learn everything you need to achieve and maintain compliance across all IT environments and security frameworks. Get a detailed, ongoing view of your compliance and risk. Automated processes can save thousands of hours in manual work. Put security policies and procedure into action to maintain accountability. Finally, a complete audit experience that includes audit scope generation, customization, 3600 evidence gathering across data silos and in-context gap analyses, as well as auditor-trusted reporting. Audits can be much easier and more efficient than what they are now. Enjoy instant insights into your employee and user base's access privileges and rights.
  • 13
    ThreatAware Reviews
    Using API feeds from existing tools, verify that your controls are correctly deployed across all cyber assets. Our clients come in all industries - from finance to legal, charities to retail. Leading organizations trust us to protect and discover their valuable cyber assets. Connect your existing systems to APIs and create a highly accurate inventory of devices. The workflow automation engine can take action via a webhook when issues arise. ThreatAware is a simple and clear way to understand the security control health for your cyber assets. You can get a macro-view of the health of your security controls, regardless of how many you are monitoring. You can group your cyber assets quickly for monitoring and configuration. Every alert is real when your monitoring system accurately depicts your actual environment.
  • 14
    The Thrive Platform Reviews
    Any IT department must manage the needs of hundreds of thousands of workers in the office and beyond. It's a difficult job, but it's becoming more difficult with budget and staff cuts, increasing numbers of applications, and new trends like remote work and bringing your device to work. ServiceNow's Thrive Platform empowers IT teams to deliver better service in less time and with less effort. The Thrive Platform makes IT easier by automating repetitive manual tasks such as password resets and new hire provisioning. The Thrive platform offers tailored experiences based on the role. This streamlines the day-today IT operations and makes technology self-service second-nature for everyone. The Thrive Platform was built and managed by a dedicated team of experts at Thrive. It makes life easier for everyone by providing customized workflows and clear instructions.
  • 15
    SeeMetrics Reviews
    A cybersecurity performance management platform is now available for security leaders, allowing them to track, monitor, and improve their operations. You can now see the performance of your security program in one place. To understand how your stack is performing, and how you can improve it, look at one central location. Stop chasing and consolidating data. Data, not intuition, should be used to plan, decide and invest. You can make better decisions about corporate security with the help of actionable information about people, products and budget. Identify cyber resilience and performance gaps based on real-time threats and cross-product insights. You can easily share and communicate dynamic metrics with non-technical audiences. SeeMetrics' platform is agentless and integrates with your existing tools, so you can generate insights in minutes.
  • 16
    Scrut Automation Reviews
    Scrut allows you to automate risk assessment and monitoring. You can also create your own unique infosec program that puts your customers' needs first. Scrut lets you manage multiple compliance audits and demonstrate trust in your customers from a single interface. Scrut allows you to discover cyber assets, create your infosec program, monitor your controls 24/7 for compliance, and manage multiple audits at the same time. Monitor risks in your infrastructure and applications landscape in real-time, and stay compliant using 20+ compliance frameworks. Automated workflows and seamless sharing of artifacts allow you to collaborate with team members, auditors and pen-testers. Create, assign and monitor tasks for daily compliance management with automated alerts. Make continuous security compliance easy with the help of more than 70 integrations. Scrut's dashboards are intuitive and provide quick overviews.
  • 17
    Blink Reviews
    Blink is a powerful ROI multiplier for business leaders and security teams who want to quickly and easily secure many different use cases. Get complete visibility and coverage across your organization's security stack. Automated flows can reduce false positives and noise in alerts. Scan for threats and vulnerabilities and identify them proactively. Automated workflows can be created to add context, streamline communication, and reduce the MTTR. Automate your workflows with no-code and generative AI to take action on alerts, and improve the security posture of your cloud. Keep your applications secure by allowing developers to access their applications, streamlining approvals processes, and shifting left the requests for access. Monitor your application continuously for SOC2, ISO or GDPR compliance checks, and enforce controls.
  • 18
    Amplifier Security Reviews
    Self-healing Security for your workforce powered AI with human in the loop automation. Modern security for workforces can bridge the divide between security and workforce. Use AI and your workforce together to secure your business. Stop chasing employees and tracking spreadsheets, and resolve security problems at record speeds. Employees can maintain productivity by collaborating with security controls. Use your existing security tools to discover security issues or take remediation measures. Our vision is to shift cybersecurity focus to include both the technology and people who use it. This will create a more balanced and secure environment for business.
  • 19
    Seconize DeRisk Center Reviews
    Businesses are more vulnerable to attacks because their security teams are overwhelmed by assessment reports, and lack the tools to manage the vulnerabilities which are critical to their business. Seconize is a tool that helps companies of all sizes, from SMBs and start-ups, to enterprises, discover, identify, prioritize, and mitigate cyber risks and vulnerabilities. Cyber threats can cause significant losses. It helps to constantly evaluate the defenses and mitigate the evolving threat. It takes into account multiple business aspects to make it relevant for the organization. Reports on compliance with standards such as ISO 27001, NIST CSF, PCI DSS, RBI/SEBI/IRDAI Guidelines. Businesses and individuals around the world love it. Creating products with simplicity, flexibility, security. Seconize is trusted by organizations of all sizes and types, from small businesses to large enterprises, to manage risks and improve security posture.
  • 20
    Ednetics Reviews
    Community services are built on the foundations of education and government. We believe that technology can help the most people through them. Public institutions may not always have the resources they need to fully utilize technology. We are here to help our communities succeed. We can help you at any stage of your technology lifecycle. Our service portfolio has evolved to better meet the needs of our clients. We provide end-to-end service, from consulting to configuration and fully managed services. Ednetics has the team to meet your needs. We know how difficult it can be to procure technology. That's why our state purchasing contracts have been thoroughly reviewed by state purchasing agencies. We have partnered up with leading manufacturers to bring the latest industry innovations to your organisation.
  • 21
    Compyl Reviews
    Your GRC program should reflect the business. Compyl's platform puts you in control by helping your organization to scale and mature its GRC in a way that works best for your organization. A flexible, unified GRC platform that helps you reduce risk, remain compliant, and grow. Compliance teams are overworked and struggling to keep up. Automate manual processes that are time-consuming and prone to error, so your team can focus on more important tasks. Compliance is not enough to reduce risk in an organization. You need to have a clear understanding of your risk profile in order to take proactive actions and demonstrate risk reduction. Silos between functional and application areas can create blind spots and risk gaps. You need to have a single, consolidated risk view in order to communicate the impact of risk and make better decisions. Consolidate all risk and compliance activities into a single platform.
  • 22
    Stitchflow Reviews
    SaaS management that is tailored to your business processes, including license optimizations and access reviews. Stitchflow understands the IT environment of your company and automates access audits to optimize licenses for all your apps, even those without APIs. It improves security and reduces costs while freeing up your IT staff. It only takes an hour per month of their time.
  • Previous
  • You're on page 1
  • Next