What Integrates with Microsoft Intune?
Find out what Microsoft Intune integrations exist in 2024. Learn what software and services currently integrate with Microsoft Intune, and sort them by reviews, cost, features, and more. Below is a list of products that Microsoft Intune currently integrates with:
-
1
Hypergate Files
Hypergate
Access to all on-premise network shares with seamless access Your users can collaborate with their teams and access all files from their mobile devices. Flexibility is key to enterprise productivity. Your data access must also be flexible. There are many reasons to transfer data to the cloud, but there are also many reasons to keep some data on-premise. The key element to both approaches is the user experience. This must be consistent, simple, and secure on all devices, especially mobile. Hypergate Files allows users to access on-premise data using the same user experience on a mobile device as a computer. This allows them to do their work as efficiently as possible and accurately. All file types can be supported by native apps. There is no special editor, viewer or custom implementation. It is just usability. Hypergate Files is a simple file-explorer solution that opens documents in their native format. -
2
Hypergate Authenticator
Hypergate
Hypergate Authenticator integrates directly with Active Directory to provide a seamless, secure Single Sign On solution. Hypergate Authenticator, a managed mobile application, provides a seamless Single Sign-On solution that integrates directly with your Active Directory. The industry standard Kerberos is used to provide the best user experience and protect your data. Allow SSO with Android Enterprise that is not otherwise possible. Hypergate is extremely fast both when communicating with the User and when implementing it. You can enable Kerberos authentication for your users by simply pressing Hypergate on their devices. You can change the password of a user directly from your device. There is no need to rely on a computer to reset your password. Hypergate allows staff to be truly mobile with it. -
3
Zimperium Mobile Threat Defense (MTD)
Zimperium
Zimperium Mobile Threat Defense (MTD) - formerly known as zIPS - is a privacy-first application that provides comprehensive mobile security for enterprises. Zimperium MTD is designed to protect an employee’s corporate-owned or BYO device from advanced persistent threats without sacrificing privacy or personal data. Once deployed on a mobile device, Zimperium MTD begins protecting the device against all primary attack vectors, even when the device is not connected to a network. Zimperium reduces risk by analyzing risky apps and jailbreaks on the device before giving access to corporate email and apps. Zimperium MTD provides comprehensive protection for mobile devices. It provides the risk intelligence and forensic data necessary for security administrators to raise their mobile security confidence. As the mobile attack surface expands and evolves, so does Zimperium’s on-device, machine learning-powered detection. Zimperium MTD detects across all four threat categories — device compromises, network attacks, phishing and content, and malicious apps. -
4
Prosimo
Prosimo
Applications are scattered and distributed. Multi-cloud infrastructure stacks are a common way for users to access apps and talk to one another. This results in a subpar application experience, higher operational costs, and fragmented cybersecurity. The multi-cloud world of today requires a new Application eXperience infrastructure stack. It improves user experience, provides secure access, and optimizes cloud spend to allow you to focus on business results. Prosimo Application eXperience Infrastructure is a vertically integrated cloud native infrastructure stack that delivers consistent faster, more secure and cost-optimized application experiences. AXI provides cloud architects and operations teams with a decision-oriented platform that's easy to use. The Prosimo AXI platform delivers faster results thanks to machine learning and data insights. -
5
Drata
Drata
$10,000/year Drata is the most advanced security and compliance platform in the world. Its mission is to help companies win and maintain the trust of their customers, partners and prospects. Drata assists hundreds of companies in ensuring their SOC 2 compliance. It does this by continuously monitoring and collecting evidence. This results in lower costs and less time spent on annual audit preparations. Cowboy Ventures, Leaders Fund and SV Angel are among the backers of Drata, as well as many industry leaders. Drata is located in San Diego, CA. -
6
AdminStudio
Flexera
Your teams will have faster and more flexible application deployment capabilities. Automate downloading, testing, wrapping/repackaging, and publishing thousands of third-party installs without any manual interaction. Quickly determine deployment options to take advantage of vendor-supported installers. You can improve quality by identifying and addressing application issues before deployment. You can ensure consistency by using a single process to build, customize, and test the delivery applications. Reduce operational risks often caused by compatibility issues or application conflicts. Integrate easily into existing package request flows using a documented REST API, or by leveraging our PowerShell cmdlets. Understanding Java dependencies and the files shared by applications can help you focus your testing efforts. To make Windows Virtual Desktop (WVD), management easier, create App Attach image files from MSIX Packages. -
7
Panaseer
Panaseer
Panaseer's continuous control monitoring platform is a powerful tool that can monitor and monitor all aspects of your organization. It provides trusted, automated insight into the organisation's security and risk posture. We create an inventory of all entities in your organization (devices and apps, people, accounts, and databases). The inventory identifies assets that are missing from different sources and identifies security risks. The platform provides metrics and measures that will help you understand your compliance and security status at all levels. The platform can ingest data from any source, cloud or on-premises. Data can be accessed across security, IT, and business domains using out-of-the box data connectors. It uses entity resolution to clean and normalise, aggregate and de-duplicate this data. This creates a continuous feed with unified assets and controls insights across devices and applications, people, database and accounts. -
8
Query Federated Search
Query
Quickly access data from all sources with a single search, including non-security data sources and unstructured data in cloud storage. Control where and how to store data, reducing storage costs and eliminating expensive data churn projects. Supercharge your security investigations with a single view of normalized and enriched search results from across your data sources. -
9
CnSight
CnSight
CnSight®, a lightweight, first-of-its-kind solution, is designed to help companies better understand their cybersecurity business and take meaningful steps to improve it. It uses automated metrics and allows them to be tied to organizational risk. You can easily see your organization's progress against set goals if you are a leader. As you make changes to people, processes and tools, you can baseline your organization and track effectiveness over time. As your program matures, you can use security performance data as a baseline to inform your strategy. Communicate cybersecurity posture effectively to the CIO/board. -
10
CertSecure Manager
Encryption Consulting LLC
A single solution for certificate management, which helps automate and manage all certificates across Cloud Environments, On Premises, Hybrid IT Environments, and Kubernetes Clusters. It manages certificates throughout their entire lifecycle, including certificate issuance and monitoring, renewal, and revocation. -
11
Zip Security
Zip Security
Zip does not require any special knowledge to run a complete security program. Reduce hassles with workflows that are as simple as a single click. This includes everything from account recovery through to CrowdStrike deployment. We provide all the tools you need to get started instantly. Never miss a compliance standard again. Monitor your system devices, identities and 3rd-party tools from a bird's-eye view to get each metric where it needs to go. We integrate best-in class security tools like CrowdStrike Jamf and Intune into the enterprise security stack to scale with you. All of this is done behind a single window. Set up consistent security policies for Windows and macOS without having to worry about platform-specific configuration. Zip is the only partner you need to manage, configure, deploy and procure your enterprise security program. We will manage all the software that you need to purchase to meet the standards set by your customers, insurers and compliance regimes. -
12
ThreatAware
ThreatAware
Using API feeds from existing tools, verify that your controls are correctly deployed across all cyber assets. Our clients come in all industries - from finance to legal, charities to retail. Leading organizations trust us to protect and discover their valuable cyber assets. Connect your existing systems to APIs and create a highly accurate inventory of devices. The workflow automation engine can take action via a webhook when issues arise. ThreatAware is a simple and clear way to understand the security control health for your cyber assets. You can get a macro-view of the health of your security controls, regardless of how many you are monitoring. You can group your cyber assets quickly for monitoring and configuration. Every alert is real when your monitoring system accurately depicts your actual environment. -
13
Network Glue
IT Glue
$29 per monthAll-in-one automated solution for discovery, documentation, password rotating, and diagramming. Let us do the site walks. The Network Glue Collector detects all devices in your clients' networks, regardless of the vendor. It can even detect Active Directory environments, including the AD roles of each workstation or server. It will automatically import AD users from hybrid environments and on-premises environments. Say goodbye to incomplete and hidden user information. IT Glue automatically documents and updates all network devices as well as cloud and hybrid user information from Azure Active Directory and Active Directory. This includes virtual components for Hyper-V or VMware. We are not all artists. Let Network Glue generate comprehensive network diagrams for you. Unique icons make it easier to understand network diagrams. They are fully integrated into IT Glue, so that contextual information is displayed when a device icon on the network diagram is clicked. -
14
MyGlue
IT Glue
$29 per monthMyGlue is a collaboration and intranet platform that creates a direct communication channel with users. Leave behind insecure email exchanges and unreliable conversations. IT professionals are managing more devices, data, and users than ever before. You can easily and securely collaborate with users and share IT documentation using a collaboration platform. MyGlue has many features that you will recognize from IT Glue. MyGlue offers everything your users need to manage passwords and process documents, including checklists, audit trails, version histories, and SOC 2 Compliance. The MyGlue Help Center makes it easy to share documents, such as "how-to"s. Enjoy a holistic management approach to communications, documentation and password management throughout the organization and across all teams. -
15
Access all apps, both legacy and modern, using highly scalable identity and context-based controls. Validate zero-trust models based on context granularity, securing each app access request. Secure access to apps using a finely-grained approach for user authentication and authorisation that only allows access based on context and identity per request. By integrating with existing SSO solutions and identity federation, users can access their business apps through a single login regardless of whether they are SAML enabled. Allow social logins to simplify access authorizations from trusted third-party providers such as Google, LinkedIn Okta, Azure Active Directory, and others. Use REST APIs from third-party UEBA engines and risk engines to inform policy-based controls. BIG-IP APM supports all business models, including perpetual licenses and subscriptions, public cloud marketplaces, and ELAs.
-
16
Sunrise HR Case Management
Sunrise Software
Every day, HR teams receive hundreds of requests and queries from employees across the business. These queries can range from simple requests for information to long-running, complex inquiries and sensitive cases. Many Shared Services and HR teams are realizing that these processes are no longer possible to track using traditional methods. They are instead looking for solutions that can manage all of their work tasks from one platform. Sunrise HRCM will give HR teams a single platform for all employee support interactions. They will also be able automate and manage key HR processes and spot trends over time. This will ensure consistency and accuracy in issue resolution and advice. Sunrise HRCM is the ideal solution for HR Service Delivery and shared services capability. -
17
Adaptiva OneSite Anywhere
Adaptiva
Adaptiva OneSite anywhere allows IT admins to have total visibility and control of all endpoints regardless of their location - whether they are at home, work, or a coffee shop. Content delivery is more difficult with most employees working remotely. This includes getting patches, operating systems, and updates to endpoints without causing issues for production traffic, bandwidth degradation or software delivery success rates. OneSite Anywhere allows you to manage endpoints securely at an unprecedented scale and speed, whether they are connected remotely via VPN or on the Internet, without a VPN connection. OneSite Anywhere combines a world-class software distribution engine and a new, revolutionary architecture in the cloud to seamlessly extend the boundaries within the enterprise network across the internet. -
18
Secureframe
Secureframe
Secureframe assists organizations in becoming ISO 27001 and SOC 2 compliant. We can help you keep your business secure at every stage. SOC 2 can be completed in weeks and not months. It can be confusing and full-of surprises to prepare for a SOC 2. We believe transparency is key to achieving best-in class security. You will know exactly what you are getting with our transparent pricing and process. You don't have the time or resources to manually onboard your employees or fetch vendor data. We have automated hundreds of manual tasks and simplified every step. Our seamless workflows make it easy for employees to join the company. This saves you both time and money. You can easily maintain your SOC 2. You will be notified via alerts and reports when there is a critical vulnerability so you can quickly fix it. You will receive detailed guidance on how to correct each issue so that you are confident you have done it correctly. Our team of compliance and security experts will provide support. We aim to respond to your questions within one business day. -
19
Microsoft Power Query
Microsoft
Power Query makes it easy to connect, extract and transform data from a variety of sources. Power Query is a data preparation and transformation engine. Power Query includes a graphical interface to retrieve data from sources, and a Power Query Editor to apply transformations. The destination where the data will be stored is determined by where Power Query was installed. Power Query allows you to perform the extraction, transform, load (ETL), processing of data. Microsoft's Data Connectivity and Data Preparation technology allows you to seamlessly access data from hundreds of sources and modify it to your requirements. It is easy to use and engage with, and requires no code. Power Query supports hundreds data sources with built in connectors and generic interfaces (such REST APIs and ODBC, OLE and DB) as well as the Power Query SDK for creating your own connectors. -
20
Medigate
Medigate
Healthcare Security and Clinical Analytics Company. #1 IoT security solution for Healthcare. Medigate has invested heavily in the creation of the largest medical protocol and device database to ensure you have the most accurate threat detection and device inventories. Medigate is the only company that provides a truly dedicated security platform for medical devices. It identifies and protects all IoMT devices connected to a healthcare provider’s network. Our cyber security platform is not like other IoT solutions. It was specifically designed for medical devices and clinical networks. Our solution protects clinical networks from all angles. It provides complete visibility into all connected medical devices. This allows you to detect risk based on clinical context and detect anomalies according manufacturers' protocols. You can also integrate it into your existing firewalls or NAC to block malicious activity. -
21
Keyfactor Control
Keyfactor
You're familiar with the basics. It is nearly impossible to take into account all the factors that will make your devices secure due to tight budgets, hardware limitations, and complex supply chains. It is essential that safety, security, trust, and integrity are all considered when a device is at risk. Keyfactor Control, an IoT Identity Platform for manufacturers, allows them to create high-assurance identities at every stage of the device's lifecycle, from product design to end-of-life. Integrate PKI-based digital identity into every device, from design and manufacturing through the product's lifecycle. Secure identity can be easily integrated into device design and development. It is cost-effective, easy, and scaleable. Secure over-the-air updates, remote management and remote maintenance can reduce the cost of device maintenance. Protect your devices from fraud and tampering and avoid warranty recalls and security breaches. -
22
Microsoft Power Platform
Microsoft
Microsoft Power Platform allows you to work together to solve problems effectively. Learn about the latest Microsoft Power Platform updates announced at Microsoft Ignite and how they can help you build and deliver apps faster and more efficiently. Find out how IT professionals deliver the low-code tools customers demand, with easy administration and strong security. The Microsoft Power Platform is much more than its parts. Connect them all together, as well as to Office 365 and Dynamics 365. Azure, and hundreds more apps, to create end-to-end business solutions. Data-driven insights allow everyone to make informed and confident business decisions. By allowing everyone to create custom apps that solve business problems, ideas can be turned into organizational solutions. Automating organizational processes can increase business productivity and help you get more done. -
23
SecureW2
SecureW2
A 2020 IBM report showed that credential compromise costs averaged $2.35M even for companies with fewer than 500 employees. Use x.509 certificates to eliminate the threat. Utilize your existing Wi Fi, Web, Firewall, and VPN infrastructure with zero technology upgrade. SecureW2 allows you to verify that only trusted users or devices have access to your network and applications. It's now easier than ever to enable 802.1x in cloud. SecureW2 allows you to use your Okta, Google, or Azure account to enroll and manage certificates for Wi-Fi authentication. It also includes the only Dynamic Cloud RADIUS server in the world, which gives you everything you need to secure WPA2-Enterprise network authentication. You can easily connect to any major operating system and provide secure connections without any IT hassle. You can secure your network with certificates that use the generation, delivery and authentication technology. -
24
Cynerio
Cynerio
We cover all threats with automated security and risk reduction on every Healthcare IoT device, from medical/IoMT devices to Enterprise IoT systems and OT systems. This ensures patient safety, data confidentiality and operational continuity. Cynerio promotes proactive and preventive cybersecurity through automated risk reduction, threat mitigation and attack prevention tools. We also offer step-by-step remediation programs based on a zero trust framework that incorporates clinical context to make hospitals secure fast. Hospital networks are extremely vulnerable to IoT devices from Healthcare. Insecure devices increase cyber attack surface and pose a major threat to patient safety as well as the operational continuity of hospitals. -
25
Eclypsium
Eclypsium
Eclypsium®, which protects enterprise devices at the hardware and fundamental firmware layers, ensures their health and integrity. This is something that traditional security cannot protect. Eclypsium adds a layer of security to protect the vital servers, networking gear, laptops, and computers at the heart of every company. Eclypsium provides security for the hardware and firmware, as opposed to traditional security that protects only the software layers of a device. Eclypsium detects and corrects low-level vulnerabilities and threats to traditional security, from the device's initial boot process to its most fundamental code. High-fidelity views of all enterprise devices, including servers, networking gear and laptops, are available. Automatically identify vulnerabilities and threats in every hardware and firmware component of each device. You can access devices on-premises and remotely, including remote work and BYOD. -
26
SeeMetrics
SeeMetrics
A cybersecurity performance management platform is now available for security leaders, allowing them to track, monitor, and improve their operations. You can now see the performance of your security program in one place. To understand how your stack is performing, and how you can improve it, look at one central location. Stop chasing and consolidating data. Data, not intuition, should be used to plan, decide and invest. You can make better decisions about corporate security with the help of actionable information about people, products and budget. Identify cyber resilience and performance gaps based on real-time threats and cross-product insights. You can easily share and communicate dynamic metrics with non-technical audiences. SeeMetrics' platform is agentless and integrates with your existing tools, so you can generate insights in minutes. -
27
Microsoft Copilot for Security
Microsoft
Now in preview, generative AI will help your defenders detect hidden patterns, strengthen defenses and respond faster to incidents. Complexity can be costly during an attack. Synthesize data across multiple sources to create clear, actionable insights. Respond to incidents within minutes rather than hours or days. You can quickly identify threats, surface them early and receive predictive guidance that will help you to anticipate an attacker's next moves. The demand for skilled defenders is far greater than the supply. Step-by-step instructions on how to mitigate risks will help your team have the greatest impact and develop their skills. Ask Microsoft Copilot Security questions in natural-language and receive actionable answers. You can identify an ongoing attack, determine its scope, and receive instructions on how to start remediation based upon real-world security incidents. Security Copilot integrates insights from security tools to deliver guidance tailored to your organization. -
28
Scrut Automation
Scrut
Scrut allows you to automate risk assessment and monitoring. You can also create your own unique infosec program that puts your customers' needs first. Scrut lets you manage multiple compliance audits and demonstrate trust in your customers from a single interface. Scrut allows you to discover cyber assets, create your infosec program, monitor your controls 24/7 for compliance, and manage multiple audits at the same time. Monitor risks in your infrastructure and applications landscape in real-time, and stay compliant using 20+ compliance frameworks. Automated workflows and seamless sharing of artifacts allow you to collaborate with team members, auditors and pen-testers. Create, assign and monitor tasks for daily compliance management with automated alerts. Make continuous security compliance easy with the help of more than 70 integrations. Scrut's dashboards are intuitive and provide quick overviews. -
29
SymphonyAI Summit
SymphonyAI
AI-powered IT and enterprise work flows. Redefining ITSM/ESM using predictive and generative AI will help you launch services quickly, boost your productivity, and delight your users. Streamline processes, reduce complex, and drive collaboration within your enterprise to increase business velocity. Boost enterprise productivity with AI automation, low-code, no-code, and predictive and generative AI. Delivering a compelling omnichannel experience to your employees and partners will improve satisfaction. Resolve service request up to 50% faster with agile ITSM/ESM in a lightweight, centralized platform powered by generative AI. Low-code/no code capabilities allow you to launch and manage services faster and accelerate deployments. Scalable solutions for teams of any size can automate manual processes and eliminate manual service requirements. -
30
BlackBerry Enterprise BRIDGE
BlackBerry
BlackBerry® Enterprise BRIDGE is a highly-secure option for using native Microsoft mobile applications on iOS and Android. Microsoft Office mobile apps are now easier to use and more secure. BlackBerry Dynamics apps, such as BlackBerry Work, can now provide users with the full native experience of Microsoft PowerPoint, Word and Excel. Some employees may use their personal Office 365 accounts in order to access corporate files due to the rapid adoption of Office 365 among business and consumer users. The collaboration between BlackBerry and Microsoft means that users will no longer have to use this workaround. The secure bridge ensures data encryption and document integrity are preserved during the document sharing process, and that common data leakage policy is applied. BlackBerry Enterprise BRIDGE enables users to view, edit and annotate Office documents on their mobile devices of choice within a secure managed app. -
31
OctoXLabs
OctoXLabs
In minutes, you can detect, prioritize and respond to security threats. Improve your visibility with Cyber asset attack surfaces management. Manage your cybersecurity inventory. Discover the vulnerabilities of all your assets. Fill in the gaps created by agent-based asset managers. Find out about server, client and cloud gaps, as well as IoT devices. Octoxlabs uses agentless technology to enhance your visibility. You can always keep track of the installed applications licenses. You can view how many licenses are left, how many you've used, and when the renewal is due from one place. You can always keep track of the installed application licenses. Users that you need to open separately for each application. Integrate intelligence services with your user data to enrich it. You can follow the local account for all products. Devices with a vulnerability, but no security agent installed, can be detected. -
32
UltraDDR
Vercara
UltraDDR, a cutting edge protective DNS (PDNS), is a solution that offers automatic threat eradication. It sets a new standard for layer 8 cybersecurity. UltraDDR is the industry's most advanced protective DNS solution. It preempts attacks. UltraDDR blocks malicious queries by integrating recursive DNS resolver technology and private DNS resolver technology. By moving from a reactive security posture to a proactive one, your business will remain a step ahead in terms of malicious traffic and cybercriminal activities. Protect employees on the move, at work and at home. Automatically detect and stop new threats or nefarious connections the first time they appear as part of a phishing, supply chain, or social engineering attack. Use category-based web filters and custom block/allow lists to enforce acceptable usage policies. -
33
Devicie
Devicie
Modern device management has never been more important. Experience hyperautomated management and deployment. Intune instances that are tailored to your customer's needs. The product is tested, deployed and ready for an organization-wide rollout. Updates, policies and automated remediation can be executed with zero-touch. Comprehensive insights into endpoint health, making management and reporting compliance a breeze. Devicie will help you to bring all your customers up to date with modern management. It allows IT teams to deploy and control their entire fleet of devices securely, remotely and at scale. Devicie automates disparate, manual and monotonous IT and security workflows. This reduces the need to use multiple-point solutions and ultimately saves time and money. -
34
Clutch
Clutch
Clutch addresses the growing challenge of non-human security in modern enterprises. As digital infrastructures grow and become more complex the management and security non-human identity, from API keys and secret to tokens and services accounts, has emerged as an important yet often overlooked aspect of cybersecurity. Clutch has developed an enterprise platform to manage and protect these identities. Our solution is designed for enterprises to strengthen their digital backbone, ensuring a safe, resilient and trustworthy environment. The number of digital identities is growing at an astonishing rate of 45 to 1 compared to human ones. Has extensive access and critical privileges, which are essential for mission-critical automated process. Lacks inherent security measures such as MFA or conditional access policies. -
35
Notus
Notus
Notus integrates a wide range data sources to provide continuous, unified visibility of assets, enabling actionable insight for critical remediation. Identify all devices and software configurations using existing tools. Prioritize the most critical vulnerabilities. Stay up-to-date on changes and new threats. Discover vulnerabilities and misconfigurations. Assure that security is considered throughout the lifecycles of assets and software. Track software usage to prevent violations and optimize costs. continuous. Assigning tasks to the relevant teams will streamline issue resolution. Manual cybersecurity asset inventories are labor-intensive and often performed 12 times a year. You will not achieve a consolidated, up-to date view of your entire environment despite this effort. Notus makes it easy to manage cybersecurity asset inventories. -
36
Veriti
Veriti
Veriti AI platform monitors and remediates all security exposures, including OS-level, without disrupting business. You can quickly neutralize threats with complete visibility. Veriti consolidates your configurations in order to establish a baseline for security. It then correlates the telemetries with CAASM, vulnerability management tools like BAS, security logs and intelligence feeds. Automated, non-intrusive evaluation of all security configurations. You will have direct access to your risk profile and all remediation options, including compensating controls and IoCs. Now your team is able to make security decisions with confidence. It is best to remediate before the exposures are exploited. Veriti uses proprietary machine learning to predict the ripple effects of remediation actions, assessing potential impact. -
37
Azure Marketplace
Microsoft
Azure Marketplace is an online store with thousands of ready-to-use, certified software applications, services and solutions from Microsoft as well as third-party vendors. It allows businesses to discover, buy, and deploy software within the Azure cloud. The marketplace includes a wide variety of products including virtual machine images and AI and machine-learning models, developer tools and security solutions. Azure Marketplace simplifies procurement and centralizes billing with its flexible pricing options, such as pay-as you-go, free trial, and subscription models. It supports seamless integration with Azure Services, enabling organizations enhance their cloud infrastructure and streamline workflows. -
38
Oomnitza
Oomnitza
Oomnitza is the most flexible Enterprise Technology Management platform in the industry. It automates key business processes for IT. Our SaaS solution features agentless integrations, best practice workflows and low-code workflows. It enables enterprises to achieve operational, security, and financial efficiency quickly leveraging their existing endpoints, applications, network infrastructure, and cloud infrastructure systems. We work with some of the most innovative and well-known companies to optimize their resources, reduce cyber risk, expedite audits, and enhance digital experience. Learn more at Oomnitza.com. -
39
Microsoft Dev Box
Microsoft
Microsoft Dev Box provides cloud-based developer workstations that are ready-to-code and secure for any size hybrid team. Microsoft Dev Box allows developers to concentrate on the code they can write. It makes it easy for them access the tools and resources that they need without having to worry about configuration or maintenance. Dev teams can preconfigure Dev Boxes to suit specific projects or tasks. This allows devs to quickly get started with an environment that is ready to build and run their apps in minutes. Microsoft Dev Box integrates Dev Boxes and Microsoft Endpoint Manager with Intune to ensure IT has unified management, security and compliance.