What Integrates with Pillr?
Find out what Pillr integrations exist in 2024. Learn what software and services currently integrate with Pillr, and sort them by reviews, cost, features, and more. Below is a list of products that Pillr currently integrates with:
-
1
ConnectWise ScreenConnect
ConnectWise
$27 per month 3,583 RatingsConnectWise Control (formerly ConnectWise Control) is a remote-support solution for Managed Service Providers, Value Added Resells, internal IT teams and managed security providers. ConnectWise ScreenConnect is a fast, reliable, secure and easy-to-use remote support solution that helps businesses resolve customer issues faster, from anywhere. The platform offers remote support, remote meeting, remote access and customization. It also integrates with leading business software. Raising the bar on remote support will reduce downtime for customers. Give technicians the ability for superior service by providing reliable, direct connections that allow them to access desktops and mobile devices when needed. Remote desktop and mobile support solutions that are flexible, fast, and secure for every industry. Not sure which version to choose? We'll help you choose the right version for your needs. No credit card needed for the 14-day free trial. -
2
SentinelOne Singularity
SentinelOne
$45 per user per year 6 RatingsOne intelligent platform. Unprecedented speeds Infinite scale. Singularity™, enables unrestricted visibility, industry-leading detection and autonomous response. Discover the power of AI powered enterprise-wide security. Singularity is used by the world's largest enterprises to detect, prevent, and respond to cyberattacks at machine speed, greater scale, with higher accuracy, across endpoints, cloud, and identities. SentinelOne's platform offers cutting-edge security by providing protection against malware, scripts, and exploits. SentinelOne's cloud-based platform is innovative, compliant with industry standards and high-performance, whether you are using Windows, Mac, or Linux. The platform is prepared for any threat thanks to constant updates, threat hunting and behavior AI. -
3
Microsoft 365 Defender
Microsoft
3 RatingsSecurity teams become overwhelmed as threats become more complex, persistent, and difficult to detect. Microsoft 365 Defender is part of Microsoft's XDR Solution. It automatically analyzes threat data across domains and presents a complete picture of every attack in a single dashboard. This clarity allows defenders to focus on the most critical threats and hunt for sophisticated attacks. The powerful automation in Microsoft 365 Defender detects, stops and recovers from all types of attacks and returns the organization back to a secure state. Reduce your attack surface to eliminate persistent threats. Integrate threat data to provide a rapid and complete response. Use the time you save to use your unique expertise. Secure hybrid identities and simplify access for employees, partners, and customers. -
4
Cisco Meraki
Cisco
$40.00 2 RatingsNetwork security is difficult. Current solutions are difficult to implement and complex. Cisco Meraki simplifies security! Influential brands trust Cisco Meraki around the globe. Meraki is trusted by organizations around the world to deliver reliable, premium experiences. Cisco Meraki devices can be centrally and safely managed in the cloud via a single web dashboard. Our feature-rich and intuitive architecture allows customers to save money, reduce operating expenses, and solve new problems. Easy-to-manage Wi-Fi that is fast and reliable. Protect and securely connect the things that matter most, no matter where you are. Performance and reliability uncompromising at the core of your network. Remote monitoring and identity based configuration of all your devices. -
5
The world's most important organizations are empowered to manage and protect mission-critical networks. Our data model is able to collect new, ad-hoc information on the fly in seconds. This allows customers, partners, and Tanium to quickly build capabilities on this extensible platform. Our unique architecture collects and distributes data to millions in seconds with no infrastructure. Allow decision-making right where data is generated: at the endpoint. Our agent uses minimal endpoint resources and bandwidth, while fitting on the firmware for the smallest chips. Tanium can expand your capabilities without expanding its footprint. Our platform is best demonstrated in action. This is how we have found customers can understand what we do. Tanium's CEO and co-founder Orion Hindawi will lead you through a keyboard tour to demonstrate the power of Tanium. Instantly track down every IT asset that you own.
-
6
Malwarebytes
Malwarebytes
$47.22 per user per year 12 RatingsCyberthreats are eradicated Restores confidence. Traditional antivirus is no longer sufficient. Malwarebytes eliminates all new threats before other antivirus systems even know they exist. Malwarebytes blocks viruses, malware, malicious sites, ransomware, hackers, and other threats that traditional antivirus can't stop. Organizations of all sizes use our cutting-edge protection and response strategies. Traditional antivirus is slow to respond to new threats. It's also "dumb". We use layers like anomaly detection (an artificial intelligence type), behavior matching, application hardening, and behavior matching to destroy malware that has never been seen before. It's not like traditional antivirus. -
7
CrowdStrike Falcon
CrowdStrike
8 RatingsCrowdStrike Falcon, a cloud-native security platform, provides advanced protection from a wide range cyber threats including malware, ransomware and sophisticated attacks. It uses artificial intelligence (AI), machine learning, and incident response to detect and respond in real-time to threats. The platform uses a lightweight, agent-based solution that continuously monitors the endpoints to detect malicious activity. This provides visibility and protection with minimal impact on system performance. Falcon's cloud architecture ensures rapid updates, scalability and rapid threat response in large, distributed environments. Its comprehensive security capabilities help organizations detect, prevent, and mitigate cyber risks. This makes it a powerful tool in modern enterprise cybersecurity. -
8
Sophos UTM
Sophos
Sophos UTM increases threat prevention to unmatched levels. The deep learning neural network that is part of Sophos Sandstorm's artificial intelligence detects known and unknown malware, without the need for signatures. Sophos UTM 9.4 was the first product to feature our next-generation cloud sandboxing technology. Sandstorm offers a new level of ransomware protection and targeted attack protection. It can identify evasive threats quickly and accurately before they reach your network. It's an enterprise-grade protection solution without the complexity or price tag. -
9
Autotask PSA
Datto, a Kaseya company
$50 per user per monthDatto's Autotask Professional Services Automation is a cloud-based PSA platform that provides a single view of the entire business. It allows MSPs to centralize their business operations and make data-driven business decisions to improve service, productivity, and profitability. Autotask PSA allows MSPs manage all aspects of their business with maximum efficiency. It integrates all the essential tools needed to run a managed service business. Autotask PSA centralizes operations, provides instant understanding via customizable dashboards and widgets that allow you to make data-driven business decisions. Autotask PSA doesn't require any maintenance or testing. It has a proven track record of consistently delivering unmatched security and 99.99% uptime. PSA is the central hub of any MSP, providing a single view of the business and increasing efficiency by automating workflows. -
10
Alert Logic
Fortra
Alert Logic is the only managed detection and response (MDR) provider that delivers comprehensive coverage for public clouds, SaaS, on-premises, and hybrid environments. Our cloud-native technology and white-glove team of security experts protect your organization 24/7 and ensure you have the most effective response to resolve whatever threats may come. -
11
VMware NSX
Broadcom
$4,250VMware NSX enables full-stack network and security virtualization. Your virtual cloud network can connect and protect applications from your data center, multi-cloud, container infrastructure, and bare metal. VMware NSX Data Center is a complete L2-L7 security and networking platform that allows you to manage your entire network from one pane of glass. You can easily provision your security and networking services with one click. You can manage consistent security and networking policies across private and publicly cloud environments from one pane of glass. This is regardless of whether your application runs on a VM, container or bare metal. Micro-segmentation allows you to provide granular protection for your apps, depending on the workload. -
12
Microsoft Defender for Office 365
Microsoft
$2 per monthProtect Office 365 from advanced threats like phishing attacks and email compromises. Integrated protection against advanced threats will increase productivity, simplify administration, reduce total cost of ownership, and increase productivity. Automated workflows can improve SecOps efficiency and effectiveness to an unmatched scale. A complete solution for collaboration to protect your organization against attacks across the kill chains. With a robust filtering system, you can prevent a variety of targeted and volume-based attacks such as ransomware, credential phishing and business email compromise. Use industry-leading AI to detect malicious and suspicious content, such as files and links, across Office 365. Advanced hunting capabilities allow you to track attacks across Office 365. These capabilities help to identify, prioritize, investigate, and even investigate them. Automated incident response and automation capabilities will increase the effectiveness and efficiency of your security team. -
13
Sophos Intercept X Endpoint
Sophos
$28 per user per yearWith remote response capabilities and powerful querying, you can take threat hunting and IT security operations up to the next level. Ransomware file protection, automatic recovery, and behavioral analysis are all available to stop ransomware attacks and boot record. Deep Learning Technology Artificial intelligence integrated into InterceptX that detects known and unknown malware, without relying upon signatures. Blocking exploits and techniques that are used to distribute malware, steal credentials and escape detection will deny attackers. An elite team of threat hunters and experts in response to take targeted actions for you to eliminate even the most sophisticated threats. Active adversary mitigation stops persistence on machines, credential theft protection and malicious traffic detection. -
14
Avanan
Check Point
Enterprise AI cloud security: Prevent phishing, malware and account takeover. Advanced email security is required to protect your enterprise from malicious emails that default security misses. Avanan revolutionized email security in 2015. Traditional gateways couldn't and haven't adjust to the cloud. Avanan's security is patented. Security for all your collaboration applications. Ransomware, account theft, BEC, and supply chain attacks. 99.2% decrease in phishing attacks that reach the inbox True AI powers Avanan, which is trained on extensive data sets to stop sophisticated phishing attacks before reaching the inbox. To implement API, machine-learning and AI for cloud email security. More than 5,000 customers, 60% of which are large enterprises. Ranked Email Security Solution in Gartner Peer Insights & G2. -
15
Sophos Email
Sophos
Today's email threats are moving fast. Growing businesses need predictive email security to defeat today's threats and keep their eyes open for tomorrow. Sophos Email Sandboxing uses the same technology as Intercept X, our award-winning security product. It is a deep-learning neural network that can block zero-day malware, unwanted applications, and other threats. The most advanced anti-ransomware technology. Sophos email security uses behavioral analytics to stop ransomware and boot-record attacks. Time-of-click URL Protection checks the website reputation of email links prior to delivery and again after you click. This prevents stealthy, delayed attacks that other email security systems may miss. Your Sophos Email gateway will not be affected by the thousands of new threats that are discovered every hour, despite processing millions of emails daily. -
16
VMware vCenter
Broadcom
From a single console, you can gain centralized visibility, efficient and simplified management at scale, as well as extensibility in the hybrid cloud. VMware vCenter Server provides a centralized management platform for your VMware vSphere environment, allowing you automate and deliver a hybrid cloud infrastructure with confidence. vCenter can be deployed quickly as a virtual appliance that is optimized and easy to maintain. vSphere Update manager is integrated into vCenter Server Appliance to make patching and upgrades fast and simple. RESTful APIs make it easy to deploy vCenter Server Appliance using a template. This reduces human error and speeds up deployment. No matter what version of vCenter is running, you can extend your on-premises infrastructure to vSphere public clouds such as VMware Cloud On AWS. -
17
VMware ESXi
Broadcom
A robust, bare-metal virtual hypervisor that can be installed directly on your server. VMware ESXi partitions hardware to consolidate apps and reduce costs. It is the industry standard for efficient architecture and has set the benchmark for reliability, performance, support, and support. IT teams are constantly under pressure to keep up with changing market trends and customer demands. They also have to stretch IT resources to support increasingly complex projects. ESXi balances the need for better business outcomes with IT savings. VMware ESXi enables you to: - Consolidate hardware to increase capacity utilization - Gain a competitive edge by increasing performance - Centralized management streamlines IT administration Reduce CapEx and OpEx - Reduce hardware resources required to run the hypervisor. This will result in greater efficiency. -
18
Harmony Mobile
Check Point
Your business is more vulnerable than ever to data breaches in the new normal. Employees are now able to access corporate data via their smartphones. Harmony Mobile provides complete protection for your mobile workforce. It is easy to deploy, manage, and scale. Protecting corporate data from mobile attacks: apps, networks, and OS. Secure and scalable for all types of mobile workforce. Rapid user adoption with no impact on privacy or user experience. By detecting and blocking malicious apps in real time, employees are protected from malware infiltration. Harmony Mobile extends Check Point's industry-leading network protection technologies to mobile devices. This gives you a wide range of network security capabilities. Devices are protected from compromise by real-time risk assessments that detect vulnerabilities, configuration changes and attacks. Advanced rooting and jailbreaking can also be performed. -
19
Microsoft Defender for Endpoint
Microsoft
You can gain an edge over sophisticated threats such as ransomware and nation state attacks. To prioritize risks and improve your security posture, give time back to defenders. You can move beyond endpoint silos and improve your security by establishing a foundation for XDR (zero trust) and other principles. Microsoft Defender for Endpoint provides industry-leading endpoint protection for Windows, macOS Linux, Android, iOS and network devices. It helps you quickly stop attacks, scale security resources, and improve your defenses. It is delivered at cloud scale with built-in AI which analyzes the largest threat intelligence in the industry. Our comprehensive solution allows you to discover all endpoints and network devices in your environment. It provides endpoint protection, endpoint protection, mobile threat defense, endpoint detection, and response (EDR) all in one, unified platform. -
20
Check Point Mobile Access
Check Point Software
Check Point Mobile Access allows you to connect securely to corporate applications via the Internet using your smartphone, tablet, or computer. Mobile Access is integrated into the Check Point Next Generation Firewalls. It allows you to securely and easily connect to your email and calendar via Layer-3 VPN or SSL/TLS VPN. Mobile workers have easy access - connect from your mobile device to secure connectivity for smartphones and tablets, computers, and laptops. Securely communicate with trusted encryption technology, two factor authentication, and user-device pairing to eliminate network security threats Next Generation Firewalls integrates security controls to consolidate and reduce costs. -
21
Horizon 8
Omnissa
Enhance the digital workspace with the efficient and secured delivery of virtual desktops, apps and services from on-premises into the cloud. Horizon 8 is the latest platform from the leader in software defined data centers and digital workspaces for delivering virtual desktops and applications across hybrid clouds. Horizon 8's unique integration with trusted technologies helps IT efficiently scale and deploy virtual desktops and applications from a single control panel with rapid provisioning and automation. It also simplifies management and extends the best digital workspace to end users. Manage desktops and applications across private, hybrid, and multi-cloud infrastructures using a cloud console and SaaS services. Use the intrinsic security built into Horizon's infrastructure to gain secure remote access to corporate assets - protecting from the device to data centers to the cloud. -
22
vCloud Usage Meter
Broadcom
Licensing usage metering, and automatic reporting using vCloud Usage Meter SaaS and vCloud Usage Meter On-Premises agent. Learn about Usage Meter and Usage Insight before you download the latest version. Join the Cloud Provider Metering Architecture's Automatic Reporting Service. Download the latest On Premises agent to collect license usage and report. You can easily do monthly reporting without lifting a finger. Usage Insight + Usage Meter automates the entire reporting process, from data collection to aggregation to reporting to the Commerce Portal. You can scale up to larger environments with Usage Meter 4.3. In-place upgrades eliminate the need to replace the agent on-premises with each new version. Usage Insight is a central place for downloading and viewing Usage reports. VMware stores historical records so partners don't have to maintain older appliances. -
23
Secureworks
Secureworks
Secureworks is 100% focused upon cybersecurity. It's all that we do. We have been fighting adversaries in every form for nearly two decades and protecting organizations like yours. Secureworks enriches your defenses by intelligence from the 310-billion cyber incidents we observe every day across our 4,100 customers in over 50+ countries. We have successfully automated and accelerated event detection and correlation by utilizing supervised machine learning and analytical, as well as some of the most brilliant minds in the industry. This allows you to identify threats faster and take the right actions at the right moment to reduce your risk. Secureworks Taegis XDR and Secureworks Taegis VDR are Secureworks Taegis ManagedXDR.
- Previous
- You're on page 1
- Next