What Integrates with Microsoft System Center?
Find out what Microsoft System Center integrations exist in 2025. Learn what software and services currently integrate with Microsoft System Center, and sort them by reviews, cost, features, and more. Below is a list of products that Microsoft System Center currently integrates with:
-
1
Vivantio has been recognized as one of the best customer service management software platforms on the market. We provide a SaaS service management product that serves multiple customer service areas including customer support ticketing, help desk, service desk, IT service management, asset management, and enterprise service management, all backed by proven industry frameworks, such as ITIL. Vivantio provides flexible licensing options to meet the business requirements of the world's fastest growing organizations.
-
2
ActiveBatch Workload Automation
ActiveBatch by Redwood
347 RatingsActiveBatch by Redwood is a centralized workload automation platform, that seamlessly connects and automates processes across critical systems like Informatica, SAP, Oracle, Microsoft and more. Use ActiveBatch's low-code Super REST API adapter, intuitive drag-and-drop workflow designer, over 100 pre-built job steps and connectors, available for on-premises, cloud or hybrid environments. Effortlessly manage your processes and maintain visibility with real-time monitoring and customizable alerts via emails or SMS to ensure SLAs are achieved. Experience unparalleled scalability with Managed Smart Queues, optimizing resources for high-volume workloads and reducing end-to-end process times. ActiveBatch holds ISO 27001 and SOC 2, Type II certifications, encrypted connections, and undergoes regular third-party tests. Benefit from continuous updates and unwavering support from our dedicated Customer Success team, providing 24x7 assistance and on-demand training to ensure your success. - 3
-
4
It is easy to use, fast, scalable and configurable for full lifecycle asset management. Cloud-based and on-premise, with Asset Register, Asset Accounting. Depreciation. MACRS. Barcoding. Procurement. Disposal. Planned maintenance. Contracts. Service Management. Spares. Powerful reporting. It can be used on any device or mobile without the need for installation and is approved by USAF for SIPRNET/NIPRNET security.
-
5
MPA Tools simplifies and improves IT administration tasks, reducing time required to resolve problems for Helpdesk, IT Professionals and System Administrators. It is a modern application that assists IT professionals in managing their infrastructure with greater efficiency. MPA Tools features allow system administrators to perform various operations and manage systems in an SCCM or SCOM, Intune environment, Active Directory, Azure AD environment, Active Directory, Intune environment, Active Directory, Active Directory, and/or SCOM environment. MPA Tools' intelligent background aids administrators in maintaining devices securely and healthily. MPA Tools can be downloaded and installed at any time without the need to sign up or install. These are some of the key benefits: Remote Workstation Management Remote Server Management SCCM Client Management and Support Intune Devices Management Manage devices in Active Directory Multi-Computer
-
6
HCL BigFix AEX
HCL Software
1 RatingHCL BigFix AEX is a GenAI-driven agent assist solution designed to revolutionize enterprise service operations. It provides intelligent self-service support, understands employee requests, and continually refines its responses to enhance the employee experience. With its intelligent approach, organizations can deliver exceptional support experiences, streamline operations, and boost overall efficiency and productivity. -
7
ServiceTeam ITSM
Provance Technologies
$45/month/ user Modernize IT Services with Microsoft-centric. Infused with the same digital DNA as the Microsoft ecosystem you depend on, ServiceTeam ITSM is native to the Microsoft Power Platform and Dynamics 365. Designed for Microsoft Customers, Partners and MSPs by a Microsoft Partner, ServiceTeam ITSM takes a fresh approach to the service desk agent experience with a simplified and high-performance interface focused on the activities most important to you. ServiceTeam ITSM lets you leverage out-of-the-box Power BI for management reporting, configure complex automated workflows, capitalize on existing skillsets and investments in Microsoft technologies and more. With ServiceTeam ITSM, you can achieve excellent customer service—supporting business growth by keeping your customers more than satisfied. -
8
AlertOps
AlertOps
$0.00/month/ user AlertOps is an industry-leading Incident Response Automation and Alert Management Platform. A SaaS-based software solution, collaboration and automation hub that enables an organization to dramatically improve the issue notification, escalation, and time to resolution process. As incidents occur that impact business-critical processes and revenue streams, the platform alerts the right people at the right time and with the right data to enable rapid incident resolution. As organizations evaluate solutions to improve and transform critical incident response -- to support ever-increasing customer and business requirements -- the AlertOps platform is uniquely suited with category-leading features to enable better and seamless customer experiences while helping drive improved operational efficiency and boosting business results. Discover why, many of the world’s largest companies leverage AlertOps to respond more rapidly, outmaneuver their competitors and win when moments matter. -
9
Activeeon ProActive
Activeeon
$10,000ProActive Parallel Suite, a member of the OW2 Open Source Community for acceleration and orchestration, seamlessly integrated with the management and operation of high-performance Clouds (Private, Public with bursting capabilities). ProActive Parallel Suite platforms offer high-performance workflows and application parallelization, enterprise Scheduling & Orchestration, and dynamic management of private Heterogeneous Grids & Clouds. Our users can now simultaneously manage their Enterprise Cloud and accelerate and orchestrate all of their enterprise applications with the ProActive platform. -
10
PowerPlug Pro
PowerPlug Ltd
$1/month/ PC PowerPlug Pro is a PC Power Management System and a (patented), PC Wake Up Solution for medium-sized to large organizations. The product allows IT departments to create multiple power policies for different groups of PCs. These policies specify the conditions under which PCs will enter power-saving mode, without interfering with End-Users' work. Our patent-pending Wake Up solution allows IT technicians to perform all maintenance tasks outside of normal business hours. This increases the success rate for software distributions and patch distributions. End Users can also connect securely to their work PC via a special Wake Up Portal. This allows organizations to allow employees to work from home and save money and energy. -
11
NorthStar Navigator
NorthStar.io, Inc.
$8 per deviceNorthStar allows organizations to easily incorporate threat intelligence and business context to enable a risk-based approach to their vulnerability management program. The Platform automates the collection, normalization, consolidation and correlation of threat intelligence, asset, software, and vulnerability data. Combined with a transparent scoring model, NorthStar automates the tedious and manual process of prioritizing vulnerability remediation. -
12
Axonius
Axonius
Axonius gives IT and security teams the confidence to control complexity by providing a system of record for all digital infrastructure. With a comprehensive understanding of all assets including devices, identities, software, SaaS applications, vulnerabilities, security controls, and the context between them, customers are able to mitigate threats, navigate risk, decrease incident response time, automate action, and inform business-level strategy — all while eliminating manual, repetitive tasks. -
13
PCmover® Enterprise
Laplink Software
Microsoft and Intel have only recommended PCmover®, Enterprise. It will save you hours of IT time and resources during your PC hardware and OS updates - more than $300 per computer according to industry research Large organizations and enterprises can save up to 60% on both hard- and soft costs by using PCmover®. It is Microsoft's only recommended solution for migration. It can be used for any type of transfer scenario - break/fix, ongoing computer and OS refreshes for any network size. Remote Home Office Migrations – PCmover®, Enterprise wins direct competition with USMT and other tools, meeting the demands of central IT departments. Key Features - Automated PC migrations - Multiple PC Migration Scenarios - Simple Implementation - Enterprise Class Support - Zero-Touch Computer Migrations Remote PC Migrations -
14
AdminStudio
Flexera
Empower your teams with enhanced capabilities for faster and more extensive application deployment. Effortlessly automate the downloading, testing, re-packaging, and publishing of thousands of third-party installers without any manual effort involved. Quickly evaluate deployment options to leverage supported vendor installers effectively. Enhance quality by proactively identifying and addressing application issues before they reach deployment. Achieve consistency through a unified and repeatable process for building, customizing, and testing application delivery. Minimize operational risks that often arise from compatibility problems and application conflicts. Seamlessly integrate with your current package request workflows using a well-documented REST API or by utilizing our PowerShell cmdlets. Gain insights on where to concentrate your testing efforts by analyzing Java dependencies and identifying shared files among applications. Additionally, generate App Attach image files from MSIX packages to streamline the management of Windows Virtual Desktop (WVD), further simplifying the overall deployment process. With these advancements, your application deployment can become not only quicker but also more reliable and efficient. -
15
ScanMail
Trend Micro
Over 90% of targeted cyber attacks initiate through spear phishing emails, highlighting the critical need for robust mail server security. Sadly, many existing mail server security measures, like the basic built-in defenses available in Microsoft® Exchange™ 2013 and 2016, depend on outdated pattern file updates that primarily identify conventional malware. Such measures typically lack the necessary capabilities to recognize harmful URLs or document exploits that are frequently employed in targeted attacks and advanced persistent threats (APTs). In contrast, ScanMail™ Suite for Microsoft® Exchange™ effectively mitigates highly targeted email threats and spear phishing attempts by incorporating document exploit detection, improved web reputation, and sandboxing as part of a tailored APT defense strategy, advantages not provided by competing solutions. Moreover, ScanMail uniquely offers the ability to block traditional malware through advanced email, file, and web reputation technologies, along with correlated global threat intelligence sourced from Trend Micro™ Smart Protection Network™ cloud-based security, ensuring comprehensive protection for your mail server. Ultimately, choosing the right security solution is vital in safeguarding your organization against evolving cyber threats. -
16
ManageIQ
ManageIQ
Oversee containers, virtual machines, networks, and storage all from one unified platform. By integrating ManageIQ with your management systems for virtualization, containers, networks, and storage, it can automatically detect inventory, establish mappings of relationships, and monitor any changes. This integration results in a comprehensive, current, and interrelated dataset that underpins our sophisticated management functionalities. You can create resource bundles and make them available in a service catalog for end users to request easily. After provisioning, the entire lifecycle of the service can be managed, encompassing aspects such as policy enforcement, compliance checks, delegated operations, chargeback/showback, and eventual decommissioning. Additionally, you can perform content scans of your virtual machines, hosts, and containers, merging this with auto-discovered information to formulate advanced security and compliance protocols. Notably, this content scanning capability operates without requiring an agent, allowing it to function effectively even for external or non-cooperative virtual machines. This flexibility ensures robust security measures are in place, regardless of the environment. -
17
Incident IQ
Incident IQ
IncidentIQ is committed to supporting teaching, learning and asset management by transforming technology support, asset administration and services delivery to meet today's needs of K-12 schools. IncidentIQ is digitizing service delivery in K-12 schools to empower teachers, students, and support staff. IncidentIQ is revolutionizing how school districts offer and manage services, from help desk ticketing to IT asset management and maintenance work orders. Get learning devices into students' hands quickly. You can quickly check out devices. You can track previous ownership and storage location. Asset management tools for enterprises, designed to handle the complexity of today's K-12 technology. Asset management software allows you to keep track of important asset information in real time. This software reduces administrative costs, streamlines the service management process, and gives you greater visibility into asset usage. -
18
Snow Commander
Snow
Snow Commander serves as a robust hybrid cloud management solution that harnesses automation to enhance business responsiveness, control, and operational effectiveness. This innovative tool allows IT departments to remove tedious manual approval workflows, granting end users a rapid self-service option for accessing both public and private cloud resources, which is essential for maintaining the pace of agile development teams. By streamlining hybrid cloud management, organizations can significantly boost their agility and efficiency. Snow Commander facilitates a seamless experience for end users seeking quick access to cloud resources while providing IT with crucial visibility for monitoring resource utilization. The self-service portal, complemented by automation for provisioning, ensures that development teams remain uninterrupted in their workflow. Additionally, its advanced workload engine supports change orchestration, integrating cost analysis, governance frameworks, and automation features. With its adaptable capabilities, Snow Commander not only enhances operational processes but also encourages innovation across the organization. -
19
Red Hat CloudForms
Red Hat
Establish a robust and scalable cloud infrastructure that enables you to exert control and maintain clear organizational structures within your cloud ecosystem. Achieve this by creating distinct organizations, outlining the relationships between users, tenants, and projects, while effectively managing quotas and services. Utilize cloud and virtualization platforms such as Red Hat Enterprise Virtualization, Amazon, and Microsoft Azure for system provisioning, set retirement dates for resources, and scale your environment according to your specific needs. By taking your current operational environment and running various what-if scenarios, you can proactively plan resources and gain ongoing insights into consumption patterns, facilitating detailed chargeback, quotas, and policy development. Enhance your understanding of performance, capacity, and workloads by utilizing SmartState's historical and trend analytics, which provide valuable insights into different facets of your cloud infrastructure. Establish the policy framework for your environment and implement automatic alerts and responses to adapt to changes in your cloud landscape, ensuring continuous optimization and agility. This comprehensive approach not only improves resource management but also fosters a proactive culture of monitoring and adaptability within your organization. -
20
TrueSight Vulnerability Management
BMC Software
Robust dashboards effectively showcase vulnerability metrics, performance trends, and adherence to SLA requirements, facilitating rapid issue prioritization. Optimized workflows integrate vulnerability scanning results with remediation assignments, utilizing third-party tools like Microsoft SCCM for enhanced efficiency. By maintaining awareness of blind spots, you can pinpoint unmonitored sectors of your infrastructure, which may leave you vulnerable. The ability to export data allows for comprehensive analysis and tailored reporting, aiding in compliance with audit standards and driving process enhancements. Streamlining the time-consuming task of correlating identified vulnerabilities with necessary remediations can significantly improve operational efficiency. Furthermore, by tracking the status of ongoing work, teams can concentrate on unresolved vulnerabilities without risking duplicated efforts, ensuring a more effective response to threats. This comprehensive approach not only mitigates risks but also fosters a culture of continuous improvement within your security framework. -
21
Panaseer
Panaseer
Panaseer's continuous control monitoring platform is a powerful tool that can monitor and monitor all aspects of your organization. It provides trusted, automated insight into the organisation's security and risk posture. We create an inventory of all entities in your organization (devices and apps, people, accounts, and databases). The inventory identifies assets that are missing from different sources and identifies security risks. The platform provides metrics and measures that will help you understand your compliance and security status at all levels. The platform can ingest data from any source, cloud or on-premises. Data can be accessed across security, IT, and business domains using out-of-the box data connectors. It uses entity resolution to clean and normalise, aggregate and de-duplicate this data. This creates a continuous feed with unified assets and controls insights across devices and applications, people, database and accounts. -
22
Axibase Enterprise Reporter (AER) serves as a comprehensive IT reporting tool designed for performance evaluation and capacity management through a framework of interconnected data and user-driven features. Its innovative linked data architecture enables AER to generate reports from various monitoring systems concurrently, all while eliminating the need to duplicate data. AER comes with built-in compatibility for numerous platforms, including IBM Tivoli, Microsoft System Center Operations Manager, HP Openview and Performance Manager, BMC ProactiveNet, VMWare vCenter, Oracle Enterprise Manager, SAP HANA, NetApp OnCommand, WhatsUp, Dynatrace, Entuity, among others. Moreover, AER includes a universal adapter that facilitates integration with any monitoring tool or bespoke data source that utilizes JDBC connectivity. By utilizing AER as a central hub for IT infrastructure insights, systems administrators and application support personnel can perform and streamline performance monitoring and capacity planning activities with significant efficiency. This not only enhances productivity but also empowers teams to respond swiftly to changing system demands.
-
23
The Operations Manager delivers adaptable and budget-friendly infrastructure monitoring, which guarantees consistent performance and accessibility of essential applications, while also providing thorough oversight of both private and public cloud environments, as well as datacenters. This robust solution is designed to meet the diverse needs of modern businesses.
-
24
Understanding what a digital risk protection solution entails can significantly enhance your readiness by revealing who is targeting you, their objectives, and their methods for potential compromise. Google Digital Risk Protection offers a comprehensive digital risk protection solution through both self-managed SaaS products and an all-encompassing service model. Each alternative equips security experts with the ability to see beyond their organization, recognize high-risk attack vectors, and detect malicious activities stemming from both the deep and dark web, as well as attack campaigns occurring on the surface web. Furthermore, the Google Digital Risk Protection solution supplies detailed insights into threat actors, including their tactics, techniques, and procedures, thereby enriching your cyber threat profile. By effectively mapping your attack surface and keeping tabs on activities in the deep and dark web, you can also gain valuable visibility into risk factors that could jeopardize the extended enterprise and supply chain. This proactive approach not only safeguards your organization but also enhances overall resilience against future threats.
-
25
Veriti
Veriti
The Veriti platform, powered by AI, actively oversees and effectively addresses security vulnerabilities throughout the entire security framework without interfering with business operations, starting from the operating system level and extending upwards. With full transparency, you have the ability to quickly eliminate threats before they materialize. Veriti integrates all configurations to create a foundational security baseline, and it then correlates various data sources such as telemetries, CAASM, BAS, vulnerability management solutions, security logs, and intelligence feeds to identify misconfigurations that could lead to exposures. This automated process allows for a non-intrusive evaluation of all security settings. You'll gain direct insight into your risk posture and all available remediation strategies, which include compensating controls, Indicators of Compromise (IoCs), and necessary patches. Consequently, your team can make well-informed security decisions. The most effective remediation occurs before vulnerabilities can be exploited. By utilizing advanced machine learning techniques, Veriti not only predicts the potential ripple effects of any remediation action but also evaluates the possible impacts, ensuring that your security measures are both proactive and strategic. As a result, your organization can maintain a robust security posture in an ever-evolving threat landscape. -
26
HCL MyCloud
HCLSoftware
It is a hybrid cloud lifecycle management product empowering organizations to optimally govern, provision, monitor, and manage cloud infrastructure. MyCloud integrates data visualization and data exploration in an easy-to-use application, enables effective analysis and actionable insights for IaaS and PaaS resources. The data-driven recommendations and advisories from this product ensure that enterprise cloud ecosystems are constantly optimized in areas like utilization, efficiency, automation, and security -
27
Eclypsium
Eclypsium
Eclypsium®, which protects enterprise devices at the hardware and fundamental firmware layers, ensures their health and integrity. This is something that traditional security cannot protect. Eclypsium adds a layer of security to protect the vital servers, networking gear, laptops, and computers at the heart of every company. Eclypsium provides security for the hardware and firmware, as opposed to traditional security that protects only the software layers of a device. Eclypsium detects and corrects low-level vulnerabilities and threats to traditional security, from the device's initial boot process to its most fundamental code. High-fidelity views of all enterprise devices, including servers, networking gear and laptops, are available. Automatically identify vulnerabilities and threats in every hardware and firmware component of each device. You can access devices on-premises and remotely, including remote work and BYOD. -
28
Oomnitza
Oomnitza
Oomnitza is the most flexible Enterprise Technology Management platform in the industry. It automates key business processes for IT. Our SaaS solution features agentless integrations, best practice workflows and low-code workflows. It enables enterprises to achieve operational, security, and financial efficiency quickly leveraging their existing endpoints, applications, network infrastructure, and cloud infrastructure systems. We work with some of the most innovative and well-known companies to optimize their resources, reduce cyber risk, expedite audits, and enhance digital experience. Learn more at Oomnitza.com. -
29
HCL iAutomate
HCLSoftware
HCL iAutomate belongs to the Infrastructure Automation and Orchestration ecosystem of HCLSoftware AI & Intelligent Operations. It is an Intelligent Runbook Automation that combines Artificial Intelligence and Automation to simplify and automate the enterprise IT operation lifecycle. It uses Machine Learning (ML), Natural Language Processing (NLP), and other technologies to understand issues, recommend corrective action, and initiate automated resolution. This allows for zero-touch automation. It provides robust end to end incident remediation and task automaton across the infrastructure landscape and applications by leveraging over 3400 configurable and reusable Runbooks.
- Previous
- You're on page 1
- Next