What Integrates with Microsoft Defender Antivirus?

Find out what Microsoft Defender Antivirus integrations exist in 2025. Learn what software and services currently integrate with Microsoft Defender Antivirus, and sort them by reviews, cost, features, and more. Below is a list of products that Microsoft Defender Antivirus currently integrates with:

  • 1
    Vivantio Reviews
    Top Pick

    Vivantio

    $59.00/month/user
    504 Ratings
    See Software
    Learn More
    Vivantio has been recognized as one of the best customer service management software platforms on the market. We provide a SaaS service management product that serves multiple customer service areas including customer support ticketing, help desk, service desk, IT service management, asset management, and enterprise service management, all backed by proven industry frameworks, such as ITIL. Vivantio provides flexible licensing options to meet the business requirements of the world's fastest growing organizations.
  • 2
    DriveLock Reviews
    See Software
    Learn More
    The HYPERSECURE Platform by DriveLock is designed to fortify IT systems against cyber threats. Just as securing your home is a given, protecting business-critical data and endpoints should be seamless. DriveLock’s advanced security solutions ensure full lifecycle data protection, combining state-of-the-art technology with deep industry expertise. Unlike traditional security models that rely on patching vulnerabilities, the DriveLock Zero Trust Platform proactively prevents unauthorized access. With centralized policy enforcement, only authorized users and endpoints gain access to essential data and applications—strictly adhering to the never trust, always verify principle.
  • 3
    NorthStar Navigator Reviews

    NorthStar Navigator

    NorthStar.io, Inc.

    $8 per device
    NorthStar allows organizations to easily incorporate threat intelligence and business context to enable a risk-based approach to their vulnerability management program. The Platform automates the collection, normalization, consolidation and correlation of threat intelligence, asset, software, and vulnerability data. Combined with a transparent scoring model, NorthStar automates the tedious and manual process of prioritizing vulnerability remediation.
  • 4
    Elastic Observability Reviews
    Leverage the most extensively utilized observability platform, founded on the reliable Elastic Stack (commonly referred to as the ELK Stack), to integrate disparate data sources, providing cohesive visibility and actionable insights. To truly monitor and extract insights from your distributed systems, it is essential to consolidate all your observability data within a single framework. Eliminate data silos by merging application, infrastructure, and user information into a holistic solution that facilitates comprehensive observability and alerting. By integrating limitless telemetry data collection with search-driven problem-solving capabilities, you can achieve superior operational and business outcomes. Unify your data silos by assimilating all telemetry data, including metrics, logs, and traces, from any source into a platform that is open, extensible, and scalable. Enhance the speed of problem resolution through automatic anomaly detection that leverages machine learning and sophisticated data analytics, ensuring you stay ahead in today's fast-paced environment. This integrated approach not only streamlines processes but also empowers teams to make informed decisions swiftly.
  • 5
    ML.NET Reviews

    ML.NET

    Microsoft

    Free
    ML.NET is a versatile, open-source machine learning framework that is free to use and compatible across platforms, enabling .NET developers to create tailored machine learning models using C# or F# while remaining within the .NET environment. This framework encompasses a wide range of machine learning tasks such as classification, regression, clustering, anomaly detection, and recommendation systems. Additionally, ML.NET seamlessly integrates with other renowned machine learning frameworks like TensorFlow and ONNX, which broadens the possibilities for tasks like image classification and object detection. It comes equipped with user-friendly tools such as Model Builder and the ML.NET CLI, leveraging Automated Machine Learning (AutoML) to streamline the process of developing, training, and deploying effective models. These innovative tools automatically analyze various algorithms and parameters to identify the most efficient model for specific use cases. Moreover, ML.NET empowers developers to harness the power of machine learning without requiring extensive expertise in the field.
  • 6
    Kroll Cyber Risk Reviews
    We are the #1 incident response provider in the world. We protect, detect, and respond to cyberattacks by combining complete response capabilities and frontline threat information from over 3000 incidents per year with end-to-end expertise. Contact us immediately via our 24-hour cyber incident hotlines. Kroll's Cyber Risk specialists can help you tackle the threats of today and tomorrow. Kroll's protection solutions, detection and response are enriched with frontline threat intelligence from 3000+ incident cases each year. It is important to take proactive measures to protect your organization, as the attack surface is constantly increasing in scope and complexity. Enter Kroll's Threat Lifecycle Management. Our end-to-end solutions for cyber risk help uncover vulnerabilities, validate the effectiveness your defenses, update controls, fine-tune detectors and confidently respond any threat.
  • 7
    Microsoft Power Platform Reviews
    Collaborate effectively to tackle challenges with the Microsoft Power Platform, which allows you to analyze data, develop solutions, automate workflows, and create virtual agents. Stay updated on the latest announcements from Microsoft Ignite regarding the Power Platform and understand how these innovations facilitate the quicker and more cost-efficient development of applications. Learn how IT professionals are providing low-code tools that meet customer expectations while ensuring straightforward administration and strong security measures. The Microsoft Power Platform comprises various components that work synergistically; when integrated with Office 365, Dynamics 365, Azure, and numerous other applications, they enable the creation of comprehensive business solutions. Empower your team to make well-informed and confident decisions by ensuring that data-driven insights are accessible to everyone. By enabling individuals to construct custom applications that address specific business problems, organizations can transform concepts into actionable solutions. Additionally, enhance overall productivity by equipping everyone with the tools necessary to streamline and automate processes within the organization, ultimately leading to greater efficiency and effectiveness in achieving business objectives.
  • 8
    ThreatConnect Risk Quantifier (RQ) Reviews
    ThreatConnect RQ is a financial cyber risk quantification solution that allows users to identify and communicate the cybersecurity risks that matter most to an organization in terms of financial impact. It aims to enable users to make better strategic and tactical-level decisions by quantifying them based on the business, the technical environment, and industry data. RQ automates the generation of financial cyber risk reporting as it relates to the business, cybersecurity initiatives, and controls. Automated outputs are generated in hours for reporting that is more current and relevant. By automating risk modelling, the vendor states customers get a fast start and can critique, or tune models over time instead of having to create their own. They use historical breach data and threat intelligence upfront in order to save months of data collection and remove the burden of continuous updating.
  • 9
    AD Enterprise Reviews
    In today's landscape of digital forensics, teams encounter numerous obstacles due to the vast quantities of data available. With the complexities of numerous office branches, large workforces, and the prevalence of remote employees, AD Enterprise offers comprehensive visibility into live data right at the endpoint, enabling quicker and more focused investigations across the organization, particularly in post-breach scenarios, HR matters, and compliance checks—all through a singular, powerful solution. This tool allows for swift, discreet, and remote responses while ensuring the integrity of the chain of custody, thus facilitating thorough forensic investigations and analyses after security breaches without disrupting ongoing business activities. You can preview real-time data at the endpoint, apply filters based on specific attributes, and select only the information pertinent to your investigation, which ultimately conserves both time and resources. Additionally, the solution supports data collection from endpoints across various locations by utilizing our remote Enterprise Agent, compatible with a wide array of operating systems such as Windows, Mac, and Linux, among others. This capability enhances flexibility and efficiency in managing forensic tasks across diverse environments.
  • 10
    HYAS Reviews
    HYAS Protect offers proactive security measures that enable businesses to conduct real-time, automated assessments of data-related risks. This solution not only addresses threats as they arise but also generates a threat signal to enhance existing security mechanisms. Meanwhile, HYAS Insight grants threat and fraud response teams exceptional visibility into the sources of attacks, the infrastructure utilized for these attacks, and potential future threats, thereby accelerating investigations and fostering proactive defense for enterprises. First West Credit Union, a prominent financial institution in Canada, uses HYAS Insight to tackle cyber fraud and manage security incidents effectively. This case study details how HYAS has tripled the speed of analyst investigations. Additionally, we would like to keep you informed about our offerings, news, and other relevant content that might interest you as we communicate regarding this submission.
  • 11
    LogMan.io Reviews
    TeskaLabs Logman.io serves as a cutting-edge and efficient solution for managing logs, which includes their collection, archiving, and analysis. This scalable log management system can seamlessly transition to the comprehensive TeskaLabs SIEM (security information and event management) tool. By utilizing this tool, you can maintain an advantage over potential security threats while gaining a complete understanding of your IT infrastructure's safety. The timely and precise detection of threats offered by TeskaLabs Logman.io safeguards critical data and sensitive information effectively. As a company specializing in cybersecurity, TeskaLabs ensures that all its products align with your organization’s security standards. Furthermore, Logman.io facilitates compliance with regulations pertaining to cybersecurity and GDPR, adapting effortlessly to your evolving requirements. This adaptability means that it can be easily upgraded to TeskaLabs SIEM. Ultimately, you will obtain a centralized and essential overview of your entire IT infrastructure, along with a robust toolset for threat modeling, risk management, and vulnerability assessment, enhancing your security posture significantly.
  • 12
    TeskaLabs SIEM Reviews
    Introducing a cutting-edge solution designed for managing security information and event processes, this advanced surveillance system empowers users to effortlessly oversee, analyze, and document security incidents in real time. TeskaLabs SIEM provides a comprehensive view of your entire organizational infrastructure, enabling early detection of threats, which aids in mitigating risks and minimizing their impact on your business operations. By staying ahead of potential security challenges, TeskaLabs SIEM guarantees you maintain complete oversight of your security landscape. As a leader in cybersecurity, TeskaLabs ensures that all its offerings adhere to the highest security standards tailored to your organization’s specific needs. Moreover, TeskaLabs SIEM facilitates compliance with critical regulations concerning Cyber Security, GDPR, and ISO 27001:2013, ensuring your organization meets essential legal requirements. The automated detection and reporting features for recognized incidents and irregularities enable swift responses, allowing for prioritized action on various issues. Ultimately, this efficiency not only saves valuable time but also empowers you to proactively seek out and address emerging threats, fostering a more secure business environment.
  • 13
    Microsoft Intelligent Data Platform Reviews
    The Microsoft Intelligent Data Platform serves as a cohesive data and AI solution that empowers organizations to quickly adapt, infuse intelligence into their applications, and derive predictive insights. By harmonizing databases, analytics, and governance, this platform allows businesses to focus more on creating value instead of managing their data infrastructure. It ensures smooth data integration and offers real-time business intelligence, which supports effective decision-making and drives innovation. By dismantling data silos, organizations can gain immediate insights while maintaining the essential data governance needed for secure operations. Additionally, the platform enhances innovation, boosts productivity through automation and AI, and increases agility by forecasting changes and refining decision-making processes. Security is also a top priority, as the platform provides robust protection throughout the data lifecycle, safeguarding both hybrid and multi-cloud environments. Ultimately, this comprehensive approach not only streamlines data management but also cultivates a more informed and responsive organizational culture.
  • Previous
  • You're on page 1
  • Next