What Integrates with Nymi?
Find out what Nymi integrations exist in 2024. Learn what software and services currently integrate with Nymi, and sort them by reviews, cost, features, and more. Below is a list of products that Nymi currently integrates with:
-
1
OneLogin, a trusted identity management (IAM), solution for modern enterprises, helps you secure company information and empower your employees. OneLogin is a great solution for companies that want to simplify business logins and strengthen enterprise security. OneLogin features include single sign-on (SS), user provisioning, unified directory, user provisioning and adaptive authentication. Compliance reporting is also available.
-
2
Microsoft 365
Microsoft
$5 per user per month 103 RatingsMicrosoft 365 (formerly Microsoft Office 365) is now available. Outlook, OneDrive and Excel, Word, PowerPoint, Excel, PowerPoint and OneNote allow you to be more creative and achieve the things that matter with Microsoft 365 (formerly Microsoft Office 365). You get the latest Office apps, both online and desktop, when you subscribe to Microsoft 365. You can access Office apps on your desktop, tablet, and phone. * Microsoft 365 + your device + Internet = productivity wherever and whenever you are. OneDrive makes it easy to access the work you have done from anywhere, and to others when you share or collaborate. There is help at every turn. Chat, email, or call to speak with a live person. Get Office today - choose the right option for you -
3
Ping Identity
Ping Identity
$5 per user per monthPing Identity provides global enterprise identity security with an intelligent identity platform. It offers comprehensive capabilities such as single sign-on (SSO), multifactor authentication (MFA), directory and many more. Ping helps enterprises balance security and user experience for workforce, customer, and partner identity types with a variety of cloud deployment options including identity-as-a-service (IDaaS), containerized software, and more. Ping offers solutions for both developers and IT teams. Allow digital collaboration through simple integrations to these popular tools. These integrations allow you to support your employees wherever they may be using these popular tools. You can deploy quickly and have interoperability throughout the entire identity ecosystem. You can choose to have a single sign-on (SSO), or an adaptive, risk-based authentication authority. A PingOne package allows you to only pay for what is necessary and allows you to grow. -
4
Eviden MDR Service
Eviden
How can you ensure that your organization is protected from cyber-threats forever? Cyber-attacks are becoming more sophisticated and aggressive every day. Eviden, as a cybersecurity provider, provides continuous protection against a world of threats that is constantly changing. Eviden provides a full range of advanced detection and reaction services around the clock, anywhere in the world. We have developed a next-generation SOC, Prescriptive Security Operation Center, dedicated to preventing breaches by leveraging supercomputing and big data capabilities and automating security response. We offer CERT services with threat intelligence, CSIRT Services, and vulnerability management. Our Advanced Detection and Response Services establish highly resilient security practice to counter Advanced Persistent Threats, SOC Services and contextual-aware IAM. Get 24/7 threat hunting, full-service response, and 24/7 threat monitoring. -
5
Graphical Documentation (GDOC)
Optel Software
Optel's Graphical documentation (GDOC), which is a paperless graphical document, provides instructions for box-build, circuit construction, rework, and QA inspection. GDOC allows assembly instructions as well as multimedia content to be assigned at either the component or assembly level. Multimedia content, including text, images, videos, documents, and links, GDOC includes a graphical editor and viewer for engineers. The Optel database stores work instructions. Hierarchical supports hierarchical BOM, and creates work instructions for product assemblies which may include multiple circuit assemblies or subassemblies. Comprehensive - GDOC covers all aspects of manual assembly, from scheduling and line balance to creating specific documents for each operator. Modular - Customers have the option to implement GDOC at a single station or to manage and control multiple manual production lines. -
6
HID IdenTrust
HID
Complete lifecycle management for every certificate in your network, whether it is cloud-based or on-premise. You can easily migrate from an existing certificate authority using policy-based automated renewal, issuance and revocation. This eliminates manual processes and other errors. Enterprises increasingly rely upon public key infrastructure (PKI), which is used to protect machines, devices, and people using keys and digital certificate. HID IdenTrust, in partnership with Keyfactor offers a way for enterprises to simplify PKI and automate the management of certificate lifecycles at scale. HID IdenTrust offers cloud-based managed PKI that can issue digital certificates to U.S. Government interoperables (FBCA) to secure websites, networks, IoT devices and workforce identities. You can find every certificate across cloud and network environments with real-time inventory and distributed SSL/TLS discovery tools.
- Previous
- You're on page 1
- Next