What Integrates with Microsoft Cloud App Security?

Find out what Microsoft Cloud App Security integrations exist in 2025. Learn what software and services currently integrate with Microsoft Cloud App Security, and sort them by reviews, cost, features, and more. Below is a list of products that Microsoft Cloud App Security currently integrates with:

  • 1
    Microsoft 365 Reviews
    Top Pick

    Microsoft 365

    Microsoft

    $5 per user per month
    102 Ratings
    Introducing Microsoft 365, previously known as Microsoft Office 365. Unlock your creativity and accomplish your goals with a suite of tools including Outlook, OneDrive, Word, Excel, PowerPoint, OneNote, SharePoint, Microsoft Teams, Yammer, and more. A subscription to Microsoft 365 grants you access to the latest versions of Office applications, both on your desktop and online, along with timely updates as they are released. Whether you're using a desktop, tablet, or smartphone, Microsoft 365 combined with your device and an internet connection ensures you can maintain productivity from any location. OneDrive ensures that your work is accessible from anywhere, allowing for seamless collaboration and sharing with others. Plus, support is readily available through email, chat, or phone, connecting you with a real person whenever you need assistance. Embrace the power of Office today and find the subscription plan that best suits your needs for ultimate efficiency. Now is the perfect time to elevate your productivity game.
  • 2
    Microsoft Entra ID Reviews
    Microsoft Entra ID, previously known as Azure Active Directory, serves as a robust cloud-based identity and access management solution that integrates essential directory services, application access control, and sophisticated identity protection measures. Enhance your organization's security with this cloud identity solution, which effectively links employees, clients, and partners to their applications, devices, and valuable data. Utilize robust authentication methods and risk-adjusted access policies to secure resource access without sacrificing user experience. Ensure a quick and straightforward sign-in process throughout your multicloud infrastructure to boost user productivity, minimize password management time, and enhance overall efficiency. Centralize the management of all identities and access to applications, whether they reside in the cloud or on-premises, to gain better visibility and control over your organization’s resources. This comprehensive approach not only protects sensitive information but also fosters a seamless and efficient working environment for all users.
  • 3
    H2eFile Reviews

    H2eFile

    H2eFile

    $4 per user per month
    Managing real estate transactions online is now streamlined, affordable, and efficient, thanks to cutting-edge technology that caters to businesses of all sizes. With features like unlimited storage and transactions, effective communication between offices and agents, customizable checklists, and the ability to add forms, users can easily keep track of their workload. The system offers reminders for due dates and enables quick searches for any document or transaction in mere seconds. Automated commission calculations and instant access to reports enhance operational efficiency, while tutorial videos on each screen provide helpful guidance. Utilizing Microsoft Azure® cloud storage ensures top-notch quality and security. Additionally, local backups can be made with just a click. H2eFile presents a modern, eco-friendly alternative to traditional paper filing systems, perfect for both small and large real estate brokerages. Picture your agents effortlessly organizing folders for each transaction and securely submitting documents directly into those folders, all while significantly reducing costs compared to current expenditures. The safety and security of all your brokerage's transaction files are guaranteed, allowing for peace of mind in your operations. This innovative solution not only simplifies the process but also supports a greener approach to real estate management.
  • 4
    Sectigo Reviews
    Sectigo stands as a premier global authority in cybersecurity, dedicated to safeguarding websites, connected devices, applications, and digital identities. This distinguished provider specializes in digital identity solutions, offering a range of products such as SSL/TLS certificates, DevOps support, IoT solutions, and comprehensive enterprise-grade PKI (Public Key Infrastructure) management, alongside robust multi-layered web security. With an impressive track record as the largest commercial Certificate Authority, boasting over 700,000 clients and more than two decades of expertise in fostering online trust, Sectigo collaborates with organizations of varying scales to implement automated public and private PKI solutions that enhance the security of web servers, user access, connected devices, and applications. Renowned for its innovative achievements and top-tier global customer support, Sectigo consistently demonstrates the capability to secure the evolving digital landscape effectively. In addition to its market leadership in SSL/TLS certificates, DevOps, and IoT solutions, Sectigo's commitment to excellence makes it a trusted partner in navigating the complexities of cybersecurity.
  • 5
    FlashBlade//S Reviews
    The Pure FlashBlade//S represents the pinnacle of all-flash storage solutions, expertly designed for the unification of speedy file and object storage. Upgrade your infrastructure with a cohesive unstructured storage platform that offers a Modern Data Experience™, enabling you to effectively meet the demands of contemporary data challenges. With FlashBlade, enjoy the benefits of cloud-like ease and flexibility, all while maintaining high performance and decisive control. This solution is tailored to fulfill the requirements of current applications and harness the power of modern data. Furthermore, FlashBlade//S excels in delivering exceptional throughput and parallel processing capabilities, ensuring consistent multidimensional performance across all datasets. Scaling capacity and performance is a breeze; simply incorporate additional blades as needed. As a next-generation alternative to traditional scale-out NAS, FlashBlade’s innovative scale-out metadata architecture can effortlessly manage tens of billions of files and objects, ensuring peak performance alongside extensive data services. Additionally, Purity//FB enhances cloud mobility through object replication and provides robust disaster recovery options with file replication, making it an indispensable tool for today's data-driven enterprises. With these features, FlashBlade stands out as an essential asset for organizations looking to optimize their data management strategies.
  • 6
    InStyle Apparel Software Reviews
    InStyle is a web-based apparel software which covers the full product lifecycle, combining solutions for enterprise resource planning (ERP), product data management (PDM), material requirements planning (MRP), customer relationship management (CRM), eCommerce, and electronic data interchange (EDI). The system is designed specifically to support apparel businesses, and offers secure access to sales representatives, vendors, and clients through integrated web portals. With InStyle, you can manage all of their company’s processes, orders, promotions, inventory, shipping, accounting, invoicing, and more. Multiple seasonal plans can be defined by product teams for merchandising, and digital assets can be managed across multiple seasons or used only for an individual season. The warehouse management system is designed for managing all stages of product lifecycles, and provides users with insight into inventory locations, shipments, and more. Integrated eCommerce functionality enables multi-lingual, multi-currency product sales.
  • 7
    Nexpose Reviews
    Vulnerability management tools are essential for responding effectively at the moment a threat arises. With new vulnerabilities emerging daily, it's crucial to have ongoing intelligence that enables you to identify, locate, and prioritize these risks for your organization while ensuring that your exposure is minimized. Nexpose, the on-premises solution from Rapid7, provides real-time monitoring of vulnerabilities and continuously updates its data to adapt to the latest threats, allowing for immediate action when necessary. For those seeking enhanced features like Remediation Workflow or the universal Insight Agent, InsightVM offers a robust platform for vulnerability management. How current is your information? Is it outdated by days or even weeks? With Nexpose, you can rest assured that you're working with data that is never more than a few seconds old, delivering a dynamic view of your ever-evolving network landscape. This immediacy not only enhances your response capabilities but also strengthens your overall security posture.
  • 8
    Microsoft Dynamics 365 Finance Reviews

    Microsoft Dynamics 365 Finance

    Microsoft

    $180 per user per month
    Enhance your financial transparency and profitability by evaluating your business's overall health, strengthening financial controls, and making informed decisions that promote agility and growth through detailed, real-time financial reporting, integrated analytics, and AI-powered insights. Seamlessly incorporate financial data into essential business operations and streamline monotonous tasks to enhance productivity, accommodate changing business models, and elevate financial performance. Additionally, reduce expenses and fine-tune spending across various regions by leveraging process automation, budget management, and comprehensive financial planning and analysis. Stay nimble in the face of shifting financial and regulatory landscapes with an intuitive, rules-based chart of accounts and a no-code configuration tool that simplifies tasks like regulatory reporting, electronic invoicing, and international payments. Businesses are successfully optimizing their financial processes with Dynamics 365 Finance, making it a vital tool for modern financial management. Embracing these strategies can lead to significant improvements in overall operational efficiency and financial success.
  • 9
    Microsoft Dynamics Supply Chain Management Reviews
    Enhance resilience by implementing an agile supply chain that can swiftly adapt to innovation demands and address quality concerns, while also accommodating shifting customer requirements and outdated components to maintain compliance and minimize delays. Utilize artificial intelligence to anticipate demand and ensure timely product delivery through real-time supply and production planning, effectively placing resources where they are needed most. Leverage predictive analytics to refine and automate key aspects of inventory management, warehousing, fulfillment, material sourcing, and logistics to boost delivery performance. Establish flexible manufacturing systems and processes by integrating predictive technologies, the Internet of Things (IoT), and mixed reality, which can lead to increased throughput, improved quality, and timely deliveries while also cutting costs. By implementing proactive maintenance strategies, companies can reduce equipment downtime and enhance overall equipment effectiveness (OEE), thereby extending the lifespan of machinery. In this way, businesses are optimizing their operations through advanced Supply Chain Management techniques. Ultimately, the focus on developing agile manufacturing and distribution systems is key to thriving in today’s dynamic market landscape.
  • 10
    Windows Hello Reviews
    Windows Hello offers a more personalized and secure method for quickly accessing your Windows 10 devices through options like fingerprint scanning, facial recognition, or a secure PIN. Many computers equipped with fingerprint readers are compatible with Windows Hello, making the login process both easier and safer. This feature allows users to sign in to their devices, applications, online platforms, and networks using various biometric methods or a PIN. It's important to note that even if your Windows 10 device supports Windows Hello biometrics, utilizing it is optional. Should you choose this method, you can be confident that your biometric data, including your face, iris, or fingerprint, remains on your device and does not leave it. Windows does not save images of your biometric identifiers on your device or remotely. During the setup of Windows Hello biometrics, data collected from the face camera, iris sensor, or fingerprint reader is transformed into a unique data representation—essentially a graph—before being encrypted and securely stored on your device. This process ensures that your sensitive information is well protected while providing a seamless sign-in experience.
  • 11
    ThreatSync Reviews
    Managing security consistently across various organizations, ranging from distributed enterprises with multiple branch offices to small and midsize businesses (SMBs) with remote employees, can be quite challenging. For both SMBs and distributed enterprises, it is essential to maintain visibility into network and endpoint event data while also being able to efficiently utilize actionable insights to mitigate threats. The integration of ThreatSync, a vital element of Threat Detection and Response (TDR), plays a key role by gathering event data from the WatchGuard Firebox, Host Sensor, and advanced threat intelligence sources. This data is analyzed through a proprietary algorithm that assigns an in-depth threat score and rank, allowing organizations to prioritize their responses effectively. With its robust correlation engine, ThreatSync facilitates cloud-based threat prioritization, thereby equipping IT teams to address threats swiftly and with confidence. Ultimately, this system collects and correlates threat event data from both the Firebox and Host Sensor, enhancing the overall security posture of the organization.
  • 12
    Microsoft Intune Reviews
    Revolutionize the delivery of IT services in your contemporary workplace environment. Achieve seamless management of modern workplace operations and drive digital transformation through Microsoft Intune. Facilitate a highly efficient Microsoft 365 ecosystem that empowers users to utilize their preferred devices and applications while ensuring data security. Manage iOS, Android, Windows, and macOS devices securely through a unified endpoint management solution. Enhance the efficiency of deployment, provisioning, policy management, app distribution, and updates through streamlined automation. Maintain a cutting-edge, scalable cloud service architecture that is distributed globally to keep your systems current. Utilize the power of the intelligent cloud to gain valuable insights and establish baselines for your security configurations and policies. Protect sensitive data effectively, especially when devices are not directly managed by your organization but are used by employees or partners to access work-related information. Intune's app protection policies allow for meticulous control over Office 365 data on mobile devices, ensuring compliance and security. By implementing these solutions, organizations can create a resilient digital environment that adapts to the evolving needs of the workforce.
  • 13
    Exegy SMDS Reviews
    Exegy’s Software Market Data System (SMDS) provides a streamlined API that delivers timely and actionable market data events essential for trading applications while also minimizing the overall ownership costs. This innovative feed handling solution ensures ultra-low latency and offers normalized access to more than 300 trading venues, catering to all major asset classes across the globe. As market data rates continue to rise and industry dynamics evolve, Exegy’s SMDS is designed to meet these challenges effectively. The SMDS is presented through a single, high-performance API that is both flexible and integrated. By normalizing all content according to Exegy’s Market Data Model, it significantly reduces the time needed for clients to incorporate additional markets and navigate the complexities of specific venues. Additionally, the system supports comprehensive book building for both price and order books, enabling users to create composite order books that provide an extensive overview of liquidity across multiple venues. This holistic approach empowers traders with the insights necessary to make informed decisions in a fast-paced market environment.
  • 14
    NGC Andromeda Reviews
    The Andromeda cloud platform facilitates the Digital Supply Chain, ensuring that the entire global enterprise can swiftly adapt to evolving consumer purchasing behaviors. As the newest technological solution for global enterprises, Andromeda is available in various SaaS and private cloud configurations. It effectively consolidates data from every department within a corporation, as well as from external suppliers of goods and services, creating a unified information source that spans from inventory planning to sales to end consumers. Additionally, Andromeda provides support for Just-In-Time manufacturing, postponement strategies, reserved capacity, direct-to-store deliveries, and material commitments with drawdowns. By incorporating critical path management, exception alerts, and fostering user collaboration, it streamlines processes, thereby enhancing Lead Time Optimization and accelerating Speed to Market. Within a Digital Supply Chain framework, the shared goal among all participants is clear: if a product is performing well in sales, the priority is to replenish it quickly; conversely, if a product is underperforming, the focus shifts to phasing it out promptly. This collective approach ensures agility and responsiveness in the supply chain.
  • 15
    Booz Allen MDR Reviews

    Booz Allen MDR

    Booz Allen Hamilton

    Safeguard your network with comprehensive visibility and multi-layered detection strategies. Our tailored managed detection and response (MDR) service offers sophisticated threat identification, thorough investigation, and prompt responses through out-of-band network sensors that ensure complete oversight of network interactions. We concentrate on identifying malicious activities occurring both within and outside your systems to shield you from both known and emerging threats. Enjoy immediate detection capabilities utilizing full packet capture, integrated detection tools, SSL decryption, and the benefits of Booz Allen’s Cyber Threat Intelligence service. Our top-tier threat analysts will examine and mitigate your network’s security incidents, providing you with more precise and relevant insights. Additionally, the Booz Allen team specializes in threat investigation, contextual intelligence, reverse engineering, and the development of rules and custom signatures, enabling proactive measures to thwart attacks in real-time. This comprehensive approach not only enhances your security posture but also equips you with the knowledge necessary to navigate the evolving threat landscape effectively.
  • 16
    Mandiant Managed Defense Reviews
    Enhance your team and strengthen your security posture through expert-managed detection and response (MDR) services, drawing on years of frontline expertise and reinforced by top-tier threat intelligence. By identifying, investigating, and prioritizing alerts within their context, you can concentrate on the threats that truly matter to your organization. With the extensive knowledge and experience offered by Mandiant, respond to attacks swiftly to safeguard your business from disruption. Additionally, gain access to dedicated professionals who are equipped to train, advise, and elevate your security initiatives. Managed Defense leverages deep insights into attacker behavior to defend against sophisticated threats effectively, focusing on attacker tactics, techniques, and procedures to significantly decrease the average dwell time of strategic ransomware actors from 72 days to 24 hours or less. By integrating a managed detection and response service, you enhance your defenses with the support of both Mandiant Threat Intelligence and Incident Response, ensuring a comprehensive security strategy. Furthermore, Managed Defense incorporates both standard and specialized features designed to thwart stealthy and damaging cyberattacks, providing an all-encompassing safety net for your organization.
  • 17
    Microsoft Power Platform Reviews
    Collaborate effectively to tackle challenges with the Microsoft Power Platform, which allows you to analyze data, develop solutions, automate workflows, and create virtual agents. Stay updated on the latest announcements from Microsoft Ignite regarding the Power Platform and understand how these innovations facilitate the quicker and more cost-efficient development of applications. Learn how IT professionals are providing low-code tools that meet customer expectations while ensuring straightforward administration and strong security measures. The Microsoft Power Platform comprises various components that work synergistically; when integrated with Office 365, Dynamics 365, Azure, and numerous other applications, they enable the creation of comprehensive business solutions. Empower your team to make well-informed and confident decisions by ensuring that data-driven insights are accessible to everyone. By enabling individuals to construct custom applications that address specific business problems, organizations can transform concepts into actionable solutions. Additionally, enhance overall productivity by equipping everyone with the tools necessary to streamline and automate processes within the organization, ultimately leading to greater efficiency and effectiveness in achieving business objectives.
  • 18
    DNSWatch Reviews
    WatchGuard DNSWatch is a cloud-based solution that enhances security through DNS-level filtering, which helps identify and prevent potentially harmful connections while safeguarding both networks and employees from destructive attacks. Critical alerts are analyzed by WatchGuard experts, who provide clear summaries that include in-depth information regarding any potential threats. In instances where phishing is involved and an employee inadvertently clicks a malicious link, DNSWatch swiftly redirects them away from the harmful site and supplies educational resources to bolster their understanding of phishing risks. Since hackers often exploit DNS to launch attacks on unaware targets, monitoring DNS requests proves to be an effective strategy for detecting and thwarting such threats. By incorporating DNS-level filtering into the Total Security Suite, DNSWatch adds an essential layer of protection against malware infections. Additionally, attempts made by users to connect to recognized malicious DNS addresses are automatically blocked, ensuring they are redirected to a secure landing page without any disruption to their experience. This proactive approach not only defends against immediate threats but also educates users, contributing to a more security-conscious workplace.
  • 19
    ConnectProtect Managed Detection and Response Reviews
    Outsourcing your SIEM and SOC services to ConnectProtect® MDR allows your organization to leverage advanced SIEM capabilities and a skilled SOC, equipping you with the necessary expertise to minimize risks and effectively counter cyber threats. By integrating cutting-edge technology with authentic human insight, you gain access to proficient security knowledge with just a simple setup. Our efficient and swift onboarding process ensures that you can begin to see benefits with minimal disruption to your internal IT and security teams. We provide 24/7/365 monitoring of your secure access layers, bridging the gap between automated systems and user awareness, and alerting you whenever an issue arises. Additionally, we deliver management information (MI) that instills confidence in your security measures and highlights ongoing improvements. Embracing ConnectProtect® Managed Detection and Response will empower you to enhance your security posture while focusing on your core business objectives. Together, let’s secure your organization against evolving cyber threats and foster a proactive security environment.
  • 20
    A10 Defend DDoS Mitigator Reviews
    High precision, automated, scalable, and intelligent DDoS mitigation solution is delivered as hardware or virtual appliances ranging from 1Gbps to over 1Tbps. The solution minimizes downtime with multi-vector DDoS mitigation, leveraging FPGA-based acceleration and various clustering techniques to provide protection at scale. Auto policy escalation, intelligent zero-day mitigation, and streamlined SecOps elevates efficacy while lowering TCO.
  • 21
    Clearswift ARgon for Email Reviews
    Clearswift's ARgon for Email offers a seamless integration of sophisticated data loss prevention (DLP) capabilities into your existing security systems, ensuring a quick and effective implementation. At its essence, ARgon delivers robust defense against various information threats that can arise from both incoming and outgoing emails. Its automatic sanitization and redaction features intelligently eliminate only those elements that pose a risk of data breaches, facilitating uninterrupted and secure communications. This approach significantly minimizes the occurrence of false positives that are often linked with conventional stop-and-block DLP solutions, thereby alleviating the workload on IT departments. Additionally, ARgon for Email equips organizations with enhanced visibility and reassurance that sensitive information shared via email remains secure and compliant with industry standards. Consequently, businesses can focus on their core operations without the constant worry of data vulnerabilities.
  • Previous
  • You're on page 1
  • Next