What Integrates with OverSOC?

Find out what OverSOC integrations exist in 2024. Learn what software and services currently integrate with OverSOC, and sort them by reviews, cost, features, and more. Below is a list of products that OverSOC currently integrates with:

  • 1
    NinjaOne Reviews
    Top Pick
    See Software
    Learn More
    NinjaOne automates the hardest parts of IT, empowering more than 20,000 IT teams. By providing deep insights into endpoints, robust security measures, and centralized control, NinjaOne boosts efficiency while safeguarding sensitive data and cutting IT expenses. This comprehensive platform offers a versatile toolkit for managing and securing endpoints, including patch management, mobile device oversight, software distribution, remote support, backup solutions, and more, thanks to its extensive IT and security integrations.
  • 2
    Google Cloud Platform Reviews
    Top Pick

    Google Cloud Platform

    Google

    Free ($300 in free credits)
    55,132 Ratings
    See Software
    Learn More
    Google Cloud is an online service that lets you create everything from simple websites to complex apps for businesses of any size. Customers who are new to the system will receive $300 in credits for testing, deploying, and running workloads. Customers can use up to 25+ products free of charge. Use Google's core data analytics and machine learning. All enterprises can use it. It is secure and fully featured. Use big data to build better products and find answers faster. You can grow from prototypes to production and even to planet-scale without worrying about reliability, capacity or performance. Virtual machines with proven performance/price advantages, to a fully-managed app development platform. High performance, scalable, resilient object storage and databases. Google's private fibre network offers the latest software-defined networking solutions. Fully managed data warehousing and data exploration, Hadoop/Spark and messaging.
  • 3
    Device42 Reviews
    Top Pick

    Device42

    Device42, A Freshworks Company

    $1499.00/year
    163 Ratings
    See Software
    Learn More
    Device42 is a robust and comprehensive data center and network management software designed by IT engineers to help them discover, document and manage Data Centers and overall IT. Device42 provides actionable insight into enterprise infrastructures. It clearly identifies hardware, software, services, and network interdependencies. It also features powerful visualizations and an easy-to-use user interface, webhooks and APIs. Device42 can help you plan for network changes and reduce MTTR in case of an unexpected outage. It provides everything you need for maintenance, audits and warranty, license certificate, warranty and lifecycle management, passwords/secrets and inventory, asset tracking and budgeting, building rooms and rack layouts... Device42 can integrate with your favorite IT management tools. This includes integration with SIEM, CM and ITSM; data mapping; and many more! As part of the Freshworks family, we are committed to, and you should expect us to provide even better solutions and continued support for our global customers and partners, just as we always have.
  • 4
    ManageEngine Endpoint Central Reviews

    ManageEngine Endpoint Central

    ManageEngine

    $795.00/one-time
    1,955 Ratings
    See Software
    Learn More
    ManageEngine's Endpoint Central, formerly Desktop Central, is a Unified Endpoint Management Solution that manages enterprise mobility management, including all features of mobile app management and mobile device management, as well as client management for a wide range of endpoints such as mobile devices, laptops computers, tablets, servers, and other machines. ManageEngine Endpoint Central allows users to automate their desktop management tasks such as installing software, patching, managing IT assets, imaging, and deploying OS.
  • 5
    Cortex XDR Reviews

    Cortex XDR

    Palo Alto Networks

    292 Ratings
    See Software
    Learn More
    Smarter security operations, fewer alerts, and end-to-end automation. The industry's most comprehensive security product suite, providing enterprises with the best-in class detection, investigation, automation, and response capabilities. Cortex XDR™, the industry's only detection platform, runs on integrated network, endpoint, and cloud data. Cortex XSOAR is the industry's best security orchestration, automation, and response platform. It can manage alerts, standardize processes, and automate actions for over 300 third-party products. Palo Alto Networks solutions can be enabled by integrating security data from your enterprise. Get the best threat intelligence available with unrivalled context to power investigation, prevention, and response.
  • 6
    GLPI  Reviews

    GLPI

    TECLIB

    €19/month/user
    1 Rating
    GLPI is a powerful Service Management software that uses open-source technologies. It makes it easy to plan and manage IT changes, solve problems efficiently, automate business processes, and maintain control over your IT infrastructure. Key features of the GLPI: 1. 1. 2. 2. Asset management and automatic inventories 3. Data quality control using rationality 4. Asset management: Administrative and financial 5. Software inventory and management of licences 6. Knowledge and frequently asked questions 7. Statistics and reports 8. 8. 9. Inventory of Android-based devices
  • 7
    SentinelOne Singularity Reviews

    SentinelOne Singularity

    SentinelOne

    $45 per user per year
    6 Ratings
    One intelligent platform. Unprecedented speeds Infinite scale. Singularity™, enables unrestricted visibility, industry-leading detection and autonomous response. Discover the power of AI powered enterprise-wide security. Singularity is used by the world's largest enterprises to detect, prevent, and respond to cyberattacks at machine speed, greater scale, with higher accuracy, across endpoints, cloud, and identities. SentinelOne's platform offers cutting-edge security by providing protection against malware, scripts, and exploits. SentinelOne's cloud-based platform is innovative, compliant with industry standards and high-performance, whether you are using Windows, Mac, or Linux. The platform is prepared for any threat thanks to constant updates, threat hunting and behavior AI.
  • 8
    Zscaler Reviews
    Zscaler, the creator of Zero Trust Exchange, uses the most powerful security cloud on the planet in order to make doing business and navigating changes easier, faster, and more productive. Zscaler Zero Trust Exchange allows for fast, secure connections. It also allows employees to work anywhere via the internet as their corporate network. It is based on the zero trust principle that least-privileged access and provides comprehensive security through context-based identity and policy enforcement. The Zero Trust Exchange is available in 150 data centers around the world, ensuring that your users are close to the service, as well as the cloud providers and applications they use, such Microsoft 365 and AWS. It provides unparalleled security and a great user experience, ensuring the fastest route between your users' destinations.
  • 9
    Microsoft 365 Defender Reviews
    Security teams become overwhelmed as threats become more complex, persistent, and difficult to detect. Microsoft 365 Defender is part of Microsoft's XDR Solution. It automatically analyzes threat data across domains and presents a complete picture of every attack in a single dashboard. This clarity allows defenders to focus on the most critical threats and hunt for sophisticated attacks. The powerful automation in Microsoft 365 Defender detects, stops and recovers from all types of attacks and returns the organization back to a secure state. Reduce your attack surface to eliminate persistent threats. Integrate threat data to provide a rapid and complete response. Use the time you save to use your unique expertise. Secure hybrid identities and simplify access for employees, partners, and customers.
  • 10
    Trend Vision One Reviews
    One platform is all you need to stop adversaries faster and take control of your cyber risk. Manage security holistically using comprehensive prevention, detection and response capabilities powered AI, leading threat intelligence and research. Trend Vision One provides expert cybersecurity services and supports hybrid IT environments. The increasing attack surface is a challenge. Trend Vision One provides comprehensive security for your environment, including monitoring, securing, and supporting. Siloed software creates security gaps. Trend Vision One provides teams with robust capabilities for prevention detection and response. Understanding risk exposure should be a priority. Utilizing internal and external data across the Trend Vision One eco-system allows you to better control your attack surface risks. With deeper insight into key risk factors, you can minimize breaches or attacks.
  • 11
    Cisco Meraki Reviews
    Network security is difficult. Current solutions are difficult to implement and complex. Cisco Meraki simplifies security! Influential brands trust Cisco Meraki around the globe. Meraki is trusted by organizations around the world to deliver reliable, premium experiences. Cisco Meraki devices can be centrally and safely managed in the cloud via a single web dashboard. Our feature-rich and intuitive architecture allows customers to save money, reduce operating expenses, and solve new problems. Easy-to-manage Wi-Fi that is fast and reliable. Protect and securely connect the things that matter most, no matter where you are. Performance and reliability uncompromising at the core of your network. Remote monitoring and identity based configuration of all your devices.
  • 12
    Cybereason Reviews
    Together, we can stop cyber attacks at every stage of the battle, from the enterprise to the endpoint. Cybereason provides high-fidelity convictions and visibility of known and unknown threats, so that defenders can harness the power of true prevention. Cybereason provides deep context and correlations across the entire network to enable threat hunters to detect and deter stealthy operations. Cybereason dramatically reduces the time it takes for defenders investigate and resolve attacks using both automated and guided remediation. Cybereason analyzes over 80 million events per second, which is 100x more than other solutions available. To eliminate emerging threats in minutes, rather than days, reduce investigation time by up to 93%.
  • 13
    FortiGate IPS Reviews
    Comprehensive threat protection with an intrusion prevention system. An intrusion prevention (IPS) system is an essential component of any network's core security capabilities. It protects against known threats as well as zero-day attacks, including malware and other vulnerabilities. Many solutions can be deployed inline as a bump in a wire and perform deep packet inspections of traffic at wire speed. This requires high throughput, low latency, and high throughput. FortiGate, an industry-recognized platform for delivering this technology to Fortinet, is the channel through which it is delivered. FortiGate security processors offer unparalleled high performance. FortiGuard Labs provides industry-leading threat intelligence. This creates a proven record in protecting against known and zero-day threats. FortiGate IPS is a key component in the Fortinet Security Fabric. It protects the entire infrastructure without compromising performance.
  • 14
    iTop Reviews
    Whether you’re an infrastructure manager handling complex systems, a service support leader striving for customer satisfaction, or a decision-maker focused on ROI and compliance, iTop adapts to your processes to simplify your tasks, streamline operations, and enhance service quality. Gain a real-time, 360° view of all your IT assets and incidents in one place, reducing downtime and improving the efficiency of your support team. Effortlessly manage multi-client environments and streamline collaboration across departments. With iTop, you get a solution that scales with your growth, providing tools to tackle your most pressing IT challenges while maintaining service continuity and improving team productivity
  • 15
    Lansweeper Reviews

    Lansweeper

    Lansweeper

    $495.00/year
    1 Rating
    Lansweeper can help you discover your IT and build your central IT Asset System of Record. You can easily audit all assets within your company's network using the Lansweeper Deepscan IP scanner engine. You can create a network inventory that includes all hardware, software, and users. Scan Windows, Linux, or Mac devices. Keep track of all your licenses, serial numbers, and warranties from major brands such as Dell, IBM and HP. Detect Unauthorized Local Admins and unify Office 365/AD User Data. Get the netbios domain, check for Windows Updates and more. You can discover all assets in your IT environment you didn't know about and take full control over your network. Get your free trial to get started with IT asset management.
  • 16
    Splunk Cloud Platform Reviews
    Splunk is a secure, reliable, and scalable service that turns data into answers. Our Splunk experts will manage your IT backend so you can concentrate on your data. Splunk's cloud-based data analytics platform is fully managed and provisioned by Splunk. In as little as two days, you can go live. Software upgrades can be managed to ensure that you have the most recent functionality. With fewer requirements, you can tap into the data's value in days. Splunk Cloud is compliant with FedRAMP security standards and assists U.S. federal agencies, their partners, and them in making confident decisions and taking decisive actions at rapid speed. Splunk's mobile apps and augmented reality, as well as natural language capabilities, can help you increase productivity and contextual insight. Splunk solutions can be extended to any location by simply typing a phrase or tapping a finger. Splunk Cloud is designed to scale, from infrastructure management to data compliance.
  • 17
    Zabbix Reviews
    Zabbix is the ultimate enterprise software that allows you to monitor millions of metrics from thousands of virtual machines, servers, and network devices. Zabbix is free and open-source. Automatically detect problem states in the incoming metrics flow. You don't have to constantly look at the incoming metrics. The native web interface offers multiple ways to present a visual overview about your IT environment. Zabbix Event correlation mechanism will help you focus on the root cause of a problem and save you thousands of repetitive notifications. Automate monitoring large, dynamic environments. Integrate Zabbix into any part of your IT environment. Access all Zabbix functionality via the Zabbix API.
  • 18
    Qualys VMDR Reviews
    The industry's most flexible, extensible and scalable solution for vulnerability management. Qualys' VMDR is fully cloud-based and provides global visibility into your IT assets and how to protect them. Enterprises are empowered with visibility into cyber risk exposure and can use it to prioritize assets, vulnerabilities, or groups of assets according to business risk. Security teams can take steps to reduce risk. This helps businesses measure their true risk and track the progress of risk reduction. You can identify, assess, prioritize, patch and fix critical vulnerabilities in real-time across your global hybrid IT, OT and IoT landscape. Qualys TruRisk™, which measures risk across assets, vulnerabilities, and groups, can help you organization prevent risk exposure and track the risk reduction over time.
  • 19
    Nmap Reviews
    Nmap is an open-source software project that aims to dispel the stereotype of poorly documented open-source software. It provides a comprehensive set documentation for installing and using Nmap. This page links to Insecure.Org documentation as well as generous contributions by other parties. Nmap Network Scanning, the official guide to Nmap Security Scanner is a free and open source utility that millions of people use for network discovery, administration and security auditing. This book is suitable for all levels of security and networking professionals, from beginners to advanced hackers to explaining basic port scanning techniques. The 42-page reference guide explains each Nmap option and feature, while the rest of this book shows how to use those features to solve real-world problems. Diagrams and examples show real communication over the wire.
  • 20
    Tanium Reviews
    The world's most important organizations are empowered to manage and protect mission-critical networks. Our data model is able to collect new, ad-hoc information on the fly in seconds. This allows customers, partners, and Tanium to quickly build capabilities on this extensible platform. Our unique architecture collects and distributes data to millions in seconds with no infrastructure. Allow decision-making right where data is generated: at the endpoint. Our agent uses minimal endpoint resources and bandwidth, while fitting on the firmware for the smallest chips. Tanium can expand your capabilities without expanding its footprint. Our platform is best demonstrated in action. This is how we have found customers can understand what we do. Tanium's CEO and co-founder Orion Hindawi will lead you through a keyboard tour to demonstrate the power of Tanium. Instantly track down every IT asset that you own.
  • 21
    Ivanti Neurons for MDM Reviews
    Manage and secure all endpoints to protect data wherever you work. How do you manage the increasing demand for devices and platforms? Ivanti Neurons MDM is a single solution for managing iOS, iPadOS Android, macOS ChromeOS and Windows. Onboard devices quickly and easily and provision them with all the apps and settings they need. Deliver a native, delightful user experience on any device or OS while improving productivity. Manage and protect any iOS device, iPadOS device, Android device, macOS or ChromeOS devices, Windows, VR/XR devices, and ChromeOS devices, all from a cloud-based solution. Know that the devices your supply-chain workers rely on for their daily work are up to date and in good working condition.
  • 22
    Microsoft Excel Reviews
    Top Pick

    Microsoft Excel

    Microsoft

    $8.25 per user per month
    11 Ratings
    Excel recognizes your patterns and organizes your data to save time. Excel allows you to create spreadsheets quickly using templates or your own. You can also use modern formulas for calculations. You can present your data in new charts and graphs with sparklines, formatting, tables and tables. With just one click, you can easily create forecasts that predict trends. You can share your workbook with others, and you always have the most current version. This will help you get more work done. Office 365 allows you to work in Excel files from your mobile device, desktop, or web browser. Excel now allows you to add data directly from a photograph. The Excel app allows you to take a photo of a printed table on your Android/iPhone device and convert it into an editable Excel table. This new image recognition function eliminates the need for you to manually enter hardcopy data.
  • 23
    Nessus Reviews
    Top Pick
    More than 30,000 organizations around the world trust Nessus as the most widely used security technology on the planet. It is also the gold standard in vulnerability assessment. Since the beginning, we have worked closely with the security community. Nessus is continuously optimized based on community feedback in order to provide the best vulnerability assessment solution available. Twenty years later, we are still focused on community collaboration and product innovations to provide the most complete and accurate vulnerability data. This will ensure that you don't miss critical issues that could expose your organization's vulnerabilities. Today, Nessus has been trusted by over 30,000 organizations around the world as the best vulnerability assessment tool and security technology.
  • 24
    Google Sheets Reviews
    Top Pick
    Online spreadsheets can be shared and edited from any device. With easy sharing and real time editing, you can establish a ground truth for the data in your online spreadsheet. To keep your analysis flowing, use comments and assign actions. Smart Fill and formula suggestions are helpful tools that help you analyze faster and with fewer errors. Ask questions in plain English about your data to get quick insights. Sheets is seamlessly connected to other Google apps that you love, which saves you time. You can easily analyze Google Forms data in sheets, or embed Sheets charts into Google Slides and Docs. You can reply directly to comments from Gmail, and you can easily present your spreadsheets for Google Meet.
  • 25
    Amazon Web Services (AWS) Reviews
    Top Pick
    AWS offers a wide range of services, including database storage, compute power, content delivery, and other functionality. This allows you to build complex applications with greater flexibility, scalability, and reliability. Amazon Web Services (AWS), the world's largest and most widely used cloud platform, offers over 175 fully featured services from more than 150 data centers worldwide. AWS is used by millions of customers, including the fastest-growing startups, large enterprises, and top government agencies, to reduce costs, be more agile, and innovate faster. AWS offers more services and features than any other cloud provider, including infrastructure technologies such as storage and databases, and emerging technologies such as machine learning, artificial intelligence, data lakes, analytics, and the Internet of Things. It is now easier, cheaper, and faster to move your existing apps to the cloud.
  • 26
    Microsoft Entra ID Reviews
    Microsoft Entra ID, formerly known as Azure Active Directory, is a comprehensive cloud-based identity and access management solution that combines core directory service, application access management and advanced identity protection. Cloud identity and access management solutions connect employees, customers and partners with their apps, devices and data. Protect data and resources with adaptive access policies and strong authentication without compromising the user experience. Provide a quick, easy sign-in across your multicloud environment in order to keep your users productive and reduce time spent managing passwords. Manage all your identities, and access to your applications, in one central location, whether in the cloud, or on-premises. This will improve visibility and control.
  • 27
    ESET Endpoint Security Reviews
    This EDR solution will help you uncover the hidden potential in your network. This tool uses ESET's multilayered Endpoint Protection Platform to detect and respond to endpoints. All layers send relevant information to ESET Enterprise Inspector which analyzes large amounts of real-time data from endpoints. It can quickly identify and fix any security problem in the network. ESET Enterprise Inspector offers a unique reputation-based detection system that is transparent to security teams. To allow fine-tuning, all rules can be easily edited via XML. You can create new rules to meet the specific needs of your enterprise environment, including SIEM integrations. ESET's endpoint response and detection tool makes it easy to suppress false alarms. You can adjust the sensitivity of detection rules according to different computer groups or users. Combine criteria such as file name/path/hash/command line/signer to fine-tune the trigger conditions.
  • 28
    CrowdStrike Falcon Reviews
    Top Pick
    CrowdStrike Falcon, a cloud-native security platform, provides advanced protection from a wide range cyber threats including malware, ransomware and sophisticated attacks. It uses artificial intelligence (AI), machine learning, and incident response to detect and respond in real-time to threats. The platform uses a lightweight, agent-based solution that continuously monitors the endpoints to detect malicious activity. This provides visibility and protection with minimal impact on system performance. Falcon's cloud architecture ensures rapid updates, scalability and rapid threat response in large, distributed environments. Its comprehensive security capabilities help organizations detect, prevent, and mitigate cyber risks. This makes it a powerful tool in modern enterprise cybersecurity.
  • 29
    Bitdefender GravityZone Reviews
    Bitdefender GravityZone gives organizations complete visibility into their overall security status, global security threats, as well as control over the security services that protect mobile devices, servers, and virtual desktops. All Bitdefender Enterprise Security solutions can be managed in the GravityZone via a single console, Control Center. This provides control, reporting and alerting services for different roles within the organization.
  • 30
    Sophos Firewall Reviews
    The best visibility, protection, response, and response in the world. Superior visibility into suspicious traffic, risky activity, advanced threats and advanced threats allows you to regain control over your network. Next-generation protection technologies such as deep learning and intrusion prevention ensure your organization's security. Automated threat response immediately detects and isolates compromised systems in your network to prevent them from spreading. XG Firewall makes it easy for employees to connect to your secure network from anywhere. Sophos Connect is an intuitive VPN client that is easy to install and configure. Remote workers can access corporate resources from Windows and MacOS devices. Our small and affordable XG 86(w), and SD-RED devices offer the ultimate in SOHO security with an always-on, dedicated or split-tunnel virtual private network (VPN) that is easy to set up and manage.
  • 31
    ServiceNow Reviews

    ServiceNow

    ServiceNow

    $100 per month
    1 Rating
    Digitize your workflows and they will love you for it. Your company will be more productive and your employees more engaged. ServiceNow makes work more enjoyable for employees. ServiceNow transforms old, manual ways to work into modern digital workflows so customers and employees get what they need when they need it. It's fast, simple, and easy. ServiceNow provides digital workflows that deliver great experiences and increase productivity for employees and enterprises. ServiceNow simplifies the complexity of work with a single enterprise cloud platform. The Now Platform: An intelligent, intuitive cloud platform that allows you to work smarter. You can choose from our workflows, or create your own apps. Our product portfolio is built on the Now Platform and delivers the IT, Employee, Customer, and Customer Workflows that matter. We also offer enterprise solutions to help you drive every aspect of your digital transformation. Get the amazing experiences you desire and unlock the productivity that you need. Now, native mobile capabilities are available for every day work across the enterprise.
  • 32
    ServiceDesk Plus MSP Reviews

    ServiceDesk Plus MSP

    ManageEngine

    $1445 per year
    ServiceDesk Plus is a web-based, fully-featured ITSM suite that is specifically designed for managed service providers. This all-in one ITSM solution provides comprehensive help desk, service desk and asset management in a multi-tenant architecture that has strong data segregation. This allows service providers to provide services and support to multiple clients through centralized controls.
  • 33
    Orca Reviews

    Orca

    Orca by Cortez Labs

    $10,000 Annually
    Founded in Austin, Texas, Orca was built under the premise to create a simple solution to effectively manage a customer advocacy program within Salesforce. We work to balance the capabilities of Salesforce with the end-user experience to deliver a powerful yet mindful sales application. Orca opens the door for companies and users to leverage existing relationships and data to accelerate business growth. Our user-friendly and 100% Salesforce native interface promotes quick adoption and implementation for new customers as well as a streamlined workflow that aligns with a traditional sales cycle.
  • 34
    Jamf Now Reviews

    Jamf Now

    Jamf

    $2.00/month/user
    Jamf Now, previously Bushel, offers an on-demand mobile device management solution that is specifically designed for iPhones, iPads and Macs in the office. This device management platform is fast, easy to use, and affordable. It allows Apple users to easily set up, manage, protect, and secure their workplace. Jamf Now allows you to easily set up company email accounts, protect sensitive information, and automatically install apps for work.
  • 35
    Snipe-IT Reviews

    Snipe-IT

    Grokability

    $39.99 per month
    Snipe IT is open-source software. All that we do is transparent, secure, and overseen. No vendor lock-in again, ever. Our cloud platform provides a 99.99% SLA uptime warranty, with servers located in data centers around the world for reliability and speed. Snipe IT as a software product was designed with security in mind. Snipe IT is constantly improved, with new releases every few days. Everyday, new features and bug-fixes are released. All technical issues customers may have with any of our products can be addressed by our full-time support team. The JSON REST API for developers is simple and intuitive, allowing you to create custom automations that meet your needs. Snipe IT offers a global network with low latency for fast connections, no matter where you may be. When you sign up, your data will not leave the region where you have chosen.
  • 36
    Active Directory Reviews

    Active Directory

    Microsoft

    $1 per user per month
    Active Directory stores information about objects in the network and makes it easy for administrators and users find and use this information. Active Directory uses a structured database store to organize directory information in a hierarchical, logical way. This data store, also known by the directory, contains information about Active Directory object. These objects usually include shared resources like servers, volumes and printers as well as the network user account and computer accounts. See Directory data store for more information on Active Directory. Active Directory security is integrated through logon authentication. This allows for access control to objects within the directory. Administrators can manage their directory and organization through one network logon. Authorized network users have access to all resources on the network. The management of complex networks can be made easier by policy-based administration.
  • 37
    Pradeo Reviews
    The digital transformation has created a mobile-first and cloud-first world. This has greatly increased the amount of mobile data that can be transferred between mobile devices, apps, servers, and other mobile devices. Companies digitalizing their services and frameworks has led to corporate and personal data being easily accessed by mobile devices. This exposes them to a whole new set of threats, including data theft, malware, network exploit, and device manipulation. A mobile fleet is a direct link to an organization's information system, regardless of whether it's made up of corporate devices or BYOD. The proliferation of mobile devices in all industries (government, banking and health) increases the risk of sensitive corporate data being stolen or leaked. IT security departments often refuse to manage personal devices in the corporate environment, but grant them access to corporate mobile services. This is to preserve privacy, financial security, and flexibility.
  • 38
    Ivanti Endpoint Manager Reviews
    Windows to macOS, iOS to Android and beyond to IoT - one place to manage all devices and user profiles. Keep your business running. A single, unified endpoint management solution will consolidate your workspace and endpoint management, meet growing user expectations, simplify your management processes, and simplify your business operations. Ivanti Endpoint Manager is a reliable, proven endpoint and user profile management software that can be used to: 1) discover everything that touches your network; 2) automate software delivery; 3) reduce login performance headaches; and 4) integrate actions with multiple IT solutions. Get UEM now. All devices can be found, inventoried, and configured - PCs, laptops and servers, tablets and smartphones. Remote control of Windows and Mac devices.
  • 39
    Darktrace Reviews
    Darktrace Immune System, the world's most trusted autonomous cyber defense platform, is it. Cyber AI, the award-winning Cyber AI, protects your workforce from sophisticated attackers by detecting, investigating, and responding to cyber-threats wherever they occur. Darktrace Immune System, a market-leading cybersecurity technology platform, uses AI to detect sophisticated cyber threats, including insider threat, criminal espionage and ransomware. Darktrace is analogous to the human immune systems. It learns the organization's 'digital DNA' and adapts to changing environments. Self-learning, self healing security is now possible. Ransomware and other machine-speed attacks are too fast for humans to handle. Autonomous Response relieves security personnel of the burden by responding 24/7 to fast-moving threats. AI that responds.
  • 40
    Rapid7 InsightVM Reviews
    You can better understand the risks in your current environment and work with technical teams. InsightVM's shared view and common language can bring together traditionally siloed groups and help drive impact. You can take a proactive approach to security by tracking and establishing metrics that will help you track progress and create accountability. InsightVM not only provides visibility into the vulnerabilities in your modern IT environment--including local, remote, cloud, containerized, and virtual infrastructure--but also clarity into how those vulnerabilities translate into business risk and which are most likely to be targeted by attackers. InsightVM isn't a magic bullet. It provides the shared view and common language that are needed to bring together traditionally siloed groups and drive impact. It supports proactive vulnerability management through tracking and metrics that provide accountability for remediators, demonstrate the impact across teams, celebrate progress, and encourage celebrations.
  • 41
    Cyberwatch Reviews
    All your vulnerabilities can be managed, from detection to correction. Cyberwatch allows you to have a complete and contextualized listing of technologies and assets in your Information System. Cyberwatch continuously monitors for vulnerabilities that have been published by authorities (CERT-FR, NVG ...)) and are present on your IT assets. Cyberwatch assesses vulnerabilities based upon their CVSS score, existence of exploits, and the context of the affected machine. Cyberwatch allows you to make the right decisions with simple actions and dashboards (comment, exclude ...).). Cyberwatch natively embeds the Patch Management module compatible with your infrastructure (WSUS/RedHat Satellite ). Your information system can be controlled and your compliance rules defined. Cyberwatch allows you to create a complete and contextualized list containing assets and technologies within your Information System. Cyberwatch lets you define your goals thanks to an encyclopedia that includes pre-sets.
  • 42
    VMware ESXi Reviews
    A robust, bare-metal virtual hypervisor that can be installed directly on your server. VMware ESXi partitions hardware to consolidate apps and reduce costs. It is the industry standard for efficient architecture and has set the benchmark for reliability, performance, support, and support. IT teams are constantly under pressure to keep up with changing market trends and customer demands. They also have to stretch IT resources to support increasingly complex projects. ESXi balances the need for better business outcomes with IT savings. VMware ESXi enables you to: - Consolidate hardware to increase capacity utilization - Gain a competitive edge by increasing performance - Centralized management streamlines IT administration Reduce CapEx and OpEx - Reduce hardware resources required to run the hypervisor. This will result in greater efficiency.
  • 43
    Prisma Cloud Reviews

    Prisma Cloud

    Palo Alto Networks

    Comprehensive cloud native security. Prisma™, Cloud provides comprehensive cloud native security. It enables you to create cloud-native applications with confidence. All aspects of the application development process have changed with the move to the cloud, including security. As organizations adopt cloud native approaches, security and DevOps teams will face increasing numbers of entities to protect. Developers are challenged to create and deploy quickly in ever-changing environments. Security teams remain responsible for ensuring compliance throughout the entire lifecycle. Some of our customers have firsthand accounts of PrismaCloud's best-in class cloud security capabilities.
  • 44
    Tenable One Reviews
    Tenable One unifies security visibility and insight across the attack surface. This allows modern organizations to isolate and eliminate priority cyber exposures, from IT infrastructure, cloud environments, critical infrastructure, and everywhere else. The only AI-powered exposure platform in the world. Tenable's leading vulnerability management sensors allow you to see every asset on your entire attack surface, from cloud environments to operational technology, infrastructure to containers and remote workers to web-apps. Tenable's machine learning-powered predictions, which include more than 20 trillion aspects related to threat, vulnerability and misconfiguration information, reduce remediation effort by allowing you to focus on the most important risks. By communicating objective measures of risks, you can drive improvements to reduce the likelihood of a business impacting cyber event occurring.
  • 45
    EfficientIP DNS Blast Reviews
    Volumetric DNS attacks are becoming more frequent, sophisticated, and widespread. This is due to the rapid growth of unsecured IoT devices and mobility, as well as BYOD and BYOD. Hackers have made DNS service one of the most targeted applications-layers, especially for layer 7 DDoS attacks. Although most organizations are aware that DDoS attacks can be dangerous, many still use traditional enterprise network security solutions, such as firewalls, that are not specifically designed for DNS protocols. These threats must be addressed with new DDoS mitigation techniques. Only a purpose-built DNS protection solution that combines high performance and advanced analytics will be able to proactively and efficiently increase your company's business continuity, data confidentiality, and user experience to the extent you need.
  • 46
    Rescana Reviews

    Rescana

    Rescana

    $25 per month
    Risk programs that are successful rely on accuracy in discovering and managing assets, and then assessing the risks. Rescana's artificial Intelligence performs asset attribution and keeps false positives to an absolute minimum. Rescana's form engine allows you to conduct risk surveys with the flexibility that you need. You can customize the built-in forms or upload your own form to create the perfect survey. Our army of collector bots is infinitely scalable and searches the deepest parts of the internet to find your assets and data every day. Rescana keeps you up-to-date. Integrate Rescana into your procurement system and ensure that vendors are correctly classified from the beginning. Rescana's flexible survey can ingest any questionnaire. It is feature-rich, so you and your vendor have the best experience. You can quickly re-certify vendors and communicate the vulnerabilities to them with ease using pre-filled forms.
  • 47
    Falcon Discover Reviews
    Falcon Discover provides unmatched visibility into all devices, users, and applications within your network to help you quickly identify and remove malicious or non-compliant activity. You can monitor everything from one powerful dashboard. Then, you can quickly dive into the data to see accounts, assets, and applications using historical and real-time data. You can instantly access contextual information for all your systems using dashboards, graphs and charts. Search functionality allows you to drill down into supporting information. CrowdStrike Falcon®, a lightweight CrowdStrike agent, can be used to protect your systems and users. You can search for versions, hosts, and users of all the applications in your environment to get a complete overview. Tracking application usage helps you manage non-compliance as well as license costs. To help meet compliance requirements, monitor asset inventory.
  • 48
    Falcon Insight Reviews
    Continuous monitoring captures endpoint activity to let you know exactly what's going on, from a threat on one endpoint to the threat level for the entire organization. Falcon Insight provides visibility and in-depth analysis that automatically detect suspicious activity to ensure that stealthy attacks and breaches are stopped. Falcon Insight speeds security operations by reducing the time and effort required to handle alerts. The easy-to-use Incident Workbench, enriched with context information and threat intelligence data, allows you to unravel the entire attack. CrowdScore provides situational awareness about the current threat level and how it is changing over time. You can use powerful response actions to stop and investigate compromised systems. Remote access is available to allow you to take immediate action.
  • 49
    EV Observe Reviews
    Predicting and avoiding downtime is the first step to increasing service and support efficiency, and business satisfaction. EV Observe provides an end-toend service experience with its monitoring platform that includes network, IoT and IT infrastructure monitoring, cloud monitoring, and application monitoring. We make it simple for organizations to adopt a proactive and predicative approach to service delivery, support, and observability. This includes collaborative self-help and self-healing as well as comprehensive performance and availability insight. This allows teams to focus on innovation and value delivery that drives business outcomes. The result is higher employee engagement, improved customer experience, increased productivity and improved resilience. Cloud-based SaaS monitoring for multi-clients and multi-sites. Software production tool that integrates the entire spectrum of software development processes and incorporates DevOps.
  • 50
    Nucleon BizApp Studio Reviews
    Nucleon BizApp Studio allows you to create high-level applications and develop them without any programming. It supports data editor forms and user controls, reports, charts tables, tables, cross-tables, scripting, and other components. Data Forms allow you to CRUD (create edit, update, delete), search, and view data using HTML-based editor forms. It offers form viewer and designer that allows you to design data editor forms with its data editor controls (textboxes, datatime, numeric, images, etc.). This form allows you to edit and design data. It only allows RDBMS (MS Access and Oracle, MySQL, PostgreSQL SQL-Server, PostgreSQL, MySQL, PostgreSQL etc. It allows you to create, modify, delete, and read data. NoSQL database systems are currently not supported.
  • Previous
  • You're on page 1
  • 2
  • Next