What Integrates with Rapid7 InsightConnect?

Find out what Rapid7 InsightConnect integrations exist in 2024. Learn what software and services currently integrate with Rapid7 InsightConnect, and sort them by reviews, cost, features, and more. Below is a list of products that Rapid7 InsightConnect currently integrates with:

  • 1
    Google Cloud Platform Reviews
    Top Pick

    Google Cloud Platform

    Google

    Free ($300 in free credits)
    54,605 Ratings
    See Software
    Learn More
    Google Cloud is an online service that lets you create everything from simple websites to complex apps for businesses of any size. Customers who are new to the system will receive $300 in credits for testing, deploying, and running workloads. Customers can use up to 25+ products free of charge. Use Google's core data analytics and machine learning. All enterprises can use it. It is secure and fully featured. Use big data to build better products and find answers faster. You can grow from prototypes to production and even to planet-scale without worrying about reliability, capacity or performance. Virtual machines with proven performance/price advantages, to a fully-managed app development platform. High performance, scalable, resilient object storage and databases. Google's private fibre network offers the latest software-defined networking solutions. Fully managed data warehousing and data exploration, Hadoop/Spark and messaging.
  • 2
    Amazon Web Services (AWS) Reviews
    Top Pick
    See Software
    Learn More
    AWS offers a wide range of services, including database storage, compute power, content delivery, and other functionality. This allows you to build complex applications with greater flexibility, scalability, and reliability. Amazon Web Services (AWS), the world's largest and most widely used cloud platform, offers over 175 fully featured services from more than 150 data centers worldwide. AWS is used by millions of customers, including the fastest-growing startups, large enterprises, and top government agencies, to reduce costs, be more agile, and innovate faster. AWS offers more services and features than any other cloud provider, including infrastructure technologies such as storage and databases, and emerging technologies such as machine learning, artificial intelligence, data lakes, analytics, and the Internet of Things. It is now easier, cheaper, and faster to move your existing apps to the cloud.
  • 3
    Box Reviews
    Top Pick

    Box

    Box

    $5.00 per user per month
    61 Ratings
    See Software
    Learn More
    Secure collaboration with anyone, anyplace, on any device. It is our top priority to protect your cloud files. We have developed advanced security controls, intelligent threats detection, and complete information governance. We also know that your needs are not limited to these security controls. Strict data privacy? Check. Check. Check. Check. You should check. Collaboration is key to your business. This includes customers, partners, vendors, and teammates. Everyone can work together on your most important content easily if they are in the same place. You should not be sharing files but frustration. You should be able to rest assured that your data is safe. It is a waste of time to work on cumbersome, manual processes every day. We let anyone automate repeatable workflows that are important to your business, such as HR onboarding and contract management. Your workflows will move faster. You have more time for what is most important.
  • 4
    Jenkins Reviews
    Jenkins, the most popular open-source automation server, provides hundreds of plugins that can be used to build, deploy, and automate any project. Jenkins is an extensible automation server that can be used to create CI servers or become the continuous delivery hub for any project. Jenkins is a Java-based program that can be run straight out of the box. It includes packages for Windows, Linux and macOS, as well as other Unix-like operating system packages. Jenkins is easy to set up and configure via its web interface. It also includes built-in help and on-the-fly error checking. Jenkins can be integrated with almost every tool in the Continuous Integration and Continuous Delivery toolchain thanks to the hundreds of plugins available in the Update Center. Jenkins' plugin architecture allows for almost unlimited possibilities. Jenkins makes it easy to distribute work across multiple machines. This helps drive builds, tests, and deployments across multiple platforms more quickly.
  • 5
    OpenText Extended ECM Reviews
    Bridge information silos, strengthen governance, and improve processes. OpenText™, Extended ECM, is an enterprise content solution that governs the lifecycle of information by securely integrating with leading enterprise apps, such as SAP, Microsoft®, Salesforce, and SAP SuccessFactors. Extended ECM brings content and processes together to provide access to information whenever and wherever it is needed, improve decision-making and drive operational effectiveness. Create bridges between the digital workspace and applications that drive ERP, HCM and BPM business processes. This will help you achieve operational excellence. A fully integrated portfolio of solutions for information management can address the most complex business or industry use cases. Use automated, defensible Governance--from document creation and capture to archiving, disposal, and more--that extends across applications such as SAP®, Salesforce®, and Microsoft®.
  • 6
    Cylance Reviews

    Cylance

    BlackBerry

    $29 per year
    1 Rating
    Cylance employs cutting-edge algorithms to prevent malware, hackers, viruses and ransomware. It is lightweight and easy-to-use. Cloud-based supercomputers are used and millions of malicious programs to train the neural net, which is a type of digital brain, to recognize threats. Cylance is the software you download to your computer when you purchase it. It's a superlightweight brain that can catch and quarantine viruses. Cylance runs in the background and instantly recognizes threats as soon as they occur. It reacts in milliseconds, unlike other antivirus software that must scan for threats constantly. Our AI quarantines files it identifies are threats. This allows you to review individual threats against you and your family's computers. Cylance is silently running in the background and instantly recognizes threats as soon as they occur. It reacts in milliseconds.
  • 7
    Splunk Cloud Reviews
    Splunk is a secure, reliable, and scalable service that turns data into answers. Our Splunk experts will manage your IT backend so you can concentrate on your data. Splunk's cloud-based data analytics platform is fully managed and provisioned by Splunk. In as little as two days, you can go live. Software upgrades can be managed to ensure that you have the most recent functionality. With fewer requirements, you can tap into the data's value in days. Splunk Cloud is compliant with FedRAMP security standards and assists U.S. federal agencies, their partners, and them in making confident decisions and taking decisive actions at rapid speed. Splunk's mobile apps and augmented reality, as well as natural language capabilities, can help you increase productivity and contextual insight. Splunk solutions can be extended to any location by simply typing a phrase or tapping a finger. Splunk Cloud is designed to scale, from infrastructure management to data compliance.
  • 8
    Forescout Reviews

    Forescout

    Forescout Technologies

    1 Rating
    It all seemed to happen in a matter of hours. Your organization became an Enterprise of Things (EoT). PCs, mobile devices and cloud workloads. Agentless IoT devices and OT devices. Device diversity is good for security, but it comes at the expense of security. Your users can connect from anywhere in the world. The truth is that every thing that touches your enterprise exposes it to risk. It is essential to see it and protect it. Forescout is a great place to start. We are the only company that actively defends Enterprise of Things at Scale.
  • 9
    Okta Reviews
    Top Pick
    One platform, infinite ways for you to connect with your customers and employees. Any app can be made authable. Okta can help you create secure and delightful experiences quickly. Okta's Customer ID products can be combined to create the stack you need. This will provide security, scalability and reliability. Protect and empower your employees, contractors, partners. Okta's workforce identification solutions will protect your employees no matter where they are. You will have the tools you need to automate cloud journeys and support hybrid environments. Okta is trusted by companies around the globe to protect their workforce identities.
  • 10
    Salesforce Reviews
    Top Pick

    Salesforce

    Salesforce

    $25.00/month/user
    60 Ratings
    Salesforce helps sales teams improve their performance and reach their goals. Salesforce is the most widely used CRM in the world. Salesforce gives teams access to tools that enable them to grow their accounts and find new customers. They also allow them to close deals faster and from any location. Salesforce offers many features, including contact management, opportunity management and lead management, email integrations, reports and dashboards as well as sales forecasting, files sync-and-share, and reports and dashboards. You will spend less time looking at spreadsheets and more time managing your business. No software, no hardware, no hassle. In minutes, our simple setup assistant will streamline sales and answer customer questions. Connect data from sales, service, marketing to create seamless, personalized experiences for buyers. You can see a complete customer view, including their account, activity history, connections, and more. You can also pull in social data to get a deeper understanding of your customers.
  • 11
    IBM Cloud Reviews
    IBM Cloud®, capabilities allow for business agility and resilience. Discover the platform that offers 2.5x value. It is designed for industry, security, and the freedom to create and run anywhere. Automation and AI can transform business workflows. A strong technology partner network that provides value for industry needs. Solutions and expertise in the business and industry domains. Automated and auditable processes. Unique capabilities that ensure the highest level of cloud security monitoring. All applications are subject to the same security and controls. Containerized capabilities for DevOps automation, data security and data management. Integration is easy and the application development lifecycle is consistent. Advanced technologies such as IBM Watson®, analytics and IoT.
  • 12
    Microsoft 365 Reviews
    Top Pick

    Microsoft 365

    Microsoft

    $5 per user per month
    105 Ratings
    Microsoft 365 (formerly Microsoft Office 365) is now available. Outlook, OneDrive and Excel, Word, PowerPoint, Excel, PowerPoint and OneNote allow you to be more creative and achieve the things that matter with Microsoft 365 (formerly Microsoft Office 365). You get the latest Office apps, both online and desktop, when you subscribe to Microsoft 365. You can access Office apps on your desktop, tablet, and phone. * Microsoft 365 + your device + Internet = productivity wherever and whenever you are. OneDrive makes it easy to access the work you have done from anywhere, and to others when you share or collaborate. There is help at every turn. Chat, email, or call to speak with a live person. Get Office today - choose the right option for you
  • 13
    SolarWinds Access Rights Manager Reviews
    SolarWinds®, Access Rights Manager is designed for IT and security administrators to quickly and easily provision, deprovision, manage, audit, audit, and audit user access rights to files, systems, and data. This allows them to help protect their organizations against the potential risks of data theft or breaches. Analyzing user authorizations and access permissions will give you a visual representation of who has access to what and when. To demonstrate compliance with many regulatory requirements, customized reports can be created. Provision and deprovision users can be done using role-specific templates. This will ensure compliance with security policies and access privilege delegation.
  • 14
    ServiceNow Reviews

    ServiceNow

    ServiceNow

    $100 per month
    1 Rating
    Digitize your workflows and they will love you for it. Your company will be more productive and your employees more engaged. ServiceNow makes work more enjoyable for employees. ServiceNow transforms old, manual ways to work into modern digital workflows so customers and employees get what they need when they need it. It's fast, simple, and easy. ServiceNow provides digital workflows that deliver great experiences and increase productivity for employees and enterprises. ServiceNow simplifies the complexity of work with a single enterprise cloud platform. The Now Platform: An intelligent, intuitive cloud platform that allows you to work smarter. You can choose from our workflows, or create your own apps. Our product portfolio is built on the Now Platform and delivers the IT, Employee, Customer, and Customer Workflows that matter. We also offer enterprise solutions to help you drive every aspect of your digital transformation. Get the amazing experiences you desire and unlock the productivity that you need. Now, native mobile capabilities are available for every day work across the enterprise.
  • 15
    Snyk Reviews
    Snyk is the leader in developer security. We empower the world’s developers to build secure applications and equip security teams to meet the demands of the digital world. Our developer-first approach ensures organizations can secure all of the critical components of their applications from code to cloud, leading to increased developer productivity, revenue growth, customer satisfaction, cost savings and an overall improved security posture. Snyk is a developer security platform that automatically integrates with a developer’s workflow and is purpose-built for security teams to collaborate with their development teams.
  • 16
    NorthStar Navigator Reviews

    NorthStar Navigator

    NorthStar.io, Inc.

    $8 per device
    NorthStar allows organizations to easily incorporate threat intelligence and business context to enable a risk-based approach to their vulnerability management program. The Platform automates the collection, normalization, consolidation and correlation of threat intelligence, asset, software, and vulnerability data. Combined with a transparent scoring model, NorthStar automates the tedious and manual process of prioritizing vulnerability remediation.
  • 17
    Clockspring Reviews

    Clockspring

    Clockspring

    $799/mo
    Clockspring is the perfect balance between low-code automation tools and custom development. Traditional integration options can be slow, fragile, and expensive, but Clockspring delivers the same flexibility you get with custom programming without the need to write any code. Our user-friendly platform enables users to connect, analyze, and automate their data, helping organizations streamline their data management, gain valuable insights, and automate routine tasks. With the ability to connect any API, database, COTS product, or even your existing custom applications, you can merge your on-prem, hybrid, and cloud tech stack into a single combined system instead of a series of data silos. Clockspring can do about 95% of what a programmer can do 10% of the time, making it a cost-effective and efficient solution for organizations of all sizes. Clockspring is also resilient in spite of outages and immediately resumes when the outage is resolved, without losing any data.
  • 18
    NopSec Reviews
    Cyber defenders can now manage the complex processes that make cyber exposure impossible to manage. NopSec's platform provides cyber defenders with an end-to-end way to bring these processes together. It allows them to identify, prioritize, remediate and simulate cyber exposures and then report them. You can't protect what's in your environment if you don't know. To manage cyber risk, adaptive cyber management requires complete visibility of your IT assets. Nopsec helps you avoid potential blind spots caused by unmanaged cyber risk and cyber exposures.
  • 19
    ManageEngine Access Manager Plus Reviews
    Remote access for privileged sessions secured Remote connections that grant privileged access to business systems can be centralized, secured, and managed by us. An exclusive privileged session management solution for enterprises. Businesses need to allow privileged access to their critical systems to the right employees regardless of where they are located and what time they require access. Remote privileged users have to be granted such access poses a security and privacy risk. Legacy solutions such as VPNs are often inflexible, making it difficult for businesses to keep their data private. Modern enterprises require a solution that allows direct access to all components of the infrastructure across public and private clouds. It also monitors and records all actions and provides real-time control over privileged sessions. ManageEngine Access Manager Plus, a web-based software for managing privileged sessions, is available.
  • 20
    Stream Security Reviews

    Stream Security

    Stream Security

    $8,000 per year
    Stay ahead of threat actors and exposure risks with real-time detection and automated threat investigation of all postures and activities. Track all changes and detect toxic exposures and combinations before attackers. AI can be used to address and fix problems using your preferred methods. Use any of your favorite SOAR tools or our code snippets to respond in real-time. Focus on the risks that can be exploited. Harden and prevent external movement & exposure risks. Detect toxic postures and vulnerabilities. Detect gaps in segmentation intentions and implement zero-trust. Answer any cloud question quickly with context. Maintain compliance and prevent deviations from taking root. We integrate with existing investments. We can provide more information about our security policies, and we can work with your security team to meet any specific requirements that your organization may have.
  • 21
    FireMon Reviews
    Comprehensive visibility across your entire network is essential for maintaining strong security and compliance. Learn how to gain real-time visibility into and control over complex hybrid network infrastructure, policies, and risk. Security Manager gives you real-time visibility, control and management of network security devices in hybrid cloud environments. It is a single pane. Security Manager offers automated compliance assessment capabilities that validate configuration requirements and alert when violations occur. Security Manager allows you to create customized reports or get audit reports right out of the box. This reduces the time spent configuring policies and gives security to ensure you are ready to meet regulatory or internal compliance audit requirements.
  • 22
    Cisco Secure Cloud Analytics Reviews
    Unified threat detection across both on-premises environments and cloud environments. Early indicators of compromise in the cloud and on-premises are detected, including insider threat activity, malware, policy violations, misconfigured clouds assets, and user misuse. Receives a variety of network logs and telemetry. You can quickly investigate suspicious behavior or signs of malign activity by receiving an alert. SaaS-based cloud security and network solution that is simple to use and easy to purchase. There is no need to buy specialized hardware, deploy software agents, or have any special knowledge. You can easily access your cloud and on-premises environments to detect threats from one interface.
  • 23
    Brinqa Reviews
    Brinqa Cyber risk graph presents a complete and accurate picture about your IT and security ecosystem. All your stakeholders will receive timely notifications, intelligent tickets, and actionable insights. Solutions that adapt to your business will protect every attack surface. A strong, stable, and dynamic cybersecurity foundation will support and enable true digital transformation. Brinqa Risk Platform is available for free. Get instant access to unparalleled risk visibility and a better security posture. The Cyber Risk Graph shows the organization's infrastructure and apps in real-time. It also delineates interconnects between business services and assets. It is also the knowledge source for organizational cybersecurity risk.
  • 24
    F5 Advanced WAF Reviews
    Advanced Web Application Firewall protects your apps with behavioral analysis, proactive bot defense and application-layer encryption. F5 and Forrester have a ROI Estimator that will help you determine how Advanced WAF can increase your security and save money. F5 Advanced Web Application Firewall is a powerful security tool that protects your Web Applications from being attacked. While many WAFs provide basic protection against attacks at the OSI stack's higher layers, the F5 Advanced WAF offers more security features, such as Anti Bot Mobile SDK and Credential Stuffing threat feeders, Proactive Bot Defense and Datasafe. John outlines many of these exciting features in the F5 Advanced WaF.
  • 25
    CyberArk Endpoint Privilege Manager Reviews
    Your security needs to be as agile as you are. Endpoint Privilege Manager allows users to have instant access to their local admin accounts. Your vulnerabilities are easy to be discovered by hackers. We do more by blocking credential theft before it can cause damage. There are many ransomware variants available today. Our solution has been proven to stop 100% of ransomware attacks. Temporarily raise end-user privileges to perform specific tasks on-demand and in real-time with minimal help desk involvement Stop ransomware from affecting your computer. You can take control of local admin accounts without affecting your workflow. You can work from anywhere, on any device, while protecting your assets and your reputation. You can secure every device without affecting your daily operations.
  • 26
    Delinea Cloud Access Controller Reviews
    You can have complete control over web applications and cloud-based cloud management platforms. Cloud Access Controller by Delinea is a comprehensive PAM solution. It operates at cloud speed, can be deployed quickly, and provides secure access to any web app. Cloud Access Controller allows you to integrate existing authentication solutions with any other web application. You can create granular RBAC policies to enforce zero trust and least privilege, even for legacy and custom web applications. Specify what web applications each employee can read or modify. Cloud applications can be granted, managed and revoked. At a very fine level, specify who has access to which cloud applications. You can track usage of every cloud application. Without agents, clientless session recording. Secure access to all web apps, including legacy and custom web applications.
  • 27
    Atlassian Clover Reviews
    Atlassian Clover has been a reliable source of code coverage analysis for Java and Groovy developers for many years. This reliability has allowed us to concentrate our development efforts on improving our core offerings like Bitbucket and Jira Software. Clover has been open-sourced, which we believe is the best way for Clover to receive the attention and focus it deserves. Clover is open to developers who are eager to contribute, just like they were with other open-source projects such as the IDE connectors or dozens of libraries. Clover is already a powerful tool for code coverage and we are excited to see how the community will make Clover thrive.
  • 28
    Incydr Reviews
    Incydr provides you with the visibility, context, and control required to stop data leakage and IP theft. File exfiltration can be detected via web browsers and USB devices, cloud apps, emails, file sharing, Airdrop and more. You can see how files are shared and moved across your organization without using plugins, proxies or policies. Incydr detects when files leave your trusted environment. You can easily detect when files have been sent to unmanaged devices and personal accounts. Incydr prioritizes the file activity based upon 120+ contextual Incydr Risk Indicators. This prioritization is effective from day one without any configuration. Incydr’s risk-scoring is transparent to administrators and based on a case-driven logic. Watchlists are used by Incydr to protect data from employees most likely to leak files or steal them, such as departing staff. Incydr provides a full range of technical and admin response controls for the full spectrum of insider incidents.
  • 29
    VMware Carbon Black Cloud Reviews
    Cloud native endpoint protection adapts to your requirements and transforms your security. Organizations are exposed by legacy approaches to prevention. Cybercriminals are constantly updating their tactics and hiding their actions within the same tools and processes. An endpoint platform should help you detect subtle fluctuations that can hide malicious attacks and adjust prevention accordingly. Today's cyberattacks include lateral movement, island-hopping, and destructive attacks. The problem is exacerbated by advanced hacking capabilities and services available on the dark internet. Targets with decentralized systems protecting high value assets, such as money and intellectual property, are exposed to these realities. Other endpoint security products only collect data about what is known to be bad. We collect continuous endpoint activity data because attackers deliberately try to appear normal in order to hide their attacks.
  • 30
    RedSeal Reviews

    RedSeal

    RedSeal Networks

    All your network environments, public clouds, private clouds, on premises, are secured in one dynamic visualization. All four branches of military trust this visualization. It includes the most trusted financial institutions and power grid companies in the world, as well as mission-critical government agencies. The digital transformation is driving cloud migration, especially with so many people working remotely. Security teams are trying to manage security for resources in both public clouds and on-premises resources. Security tools are limited to one of these environments. This leaves security teams with common concerns. Ensure security compliance with network segmentation policies and regulations by continuously validating and ensuring that they are being followed.
  • 31
    NAVEX IRM Reviews

    NAVEX IRM

    NAVEX Global

    Four products are offered as standalone products: Business Continuity Management & Planning; Privacy, Risk & Compliance Management; Third Party Risk Management; Health & Safety Management; and Third Party Risk Management. Different sources can provide risk data. It can be difficult to gather information from spreadsheets, emails, or print-outs from different departments. Customers, regulators, and other stakeholders can request audits without affecting other tasks. As businesses become more flexible and complex, third parties will be more frequent and should be regularly assessed. A risk-based business continuity plan will help you minimize disruptions and restore and sustain operations. You can create your compliance and risk management solution for multiple local laws and mandates, wherever you do business.
  • 32
    Checkmarx Reviews
    The Checkmarx Software Security Platform is a centralized platform for managing your software security solutions. This includes Static Application Security Testing, Interactive Application Security Testing and Software Composition Analysis. It also provides application security training and skill development. The Checkmarx Software Security Platform is designed to meet the needs of every organization. It offers a wide range of options, including on-premises and private cloud solutions. Customers can immediately start securing code without having to adapt their infrastructure to one method. The Checkmarx Software Security Platform is a powerful tool that transforms secure application development. It offers industry-leading capabilities and one powerful resource.
  • 33
    VMware Cloud Reviews
    All of your apps can be built, managed, protected, and managed on any cloud. VMware's Multi-Cloud solutions provide a cloud operating system for all applications. The world's most widely used cloud infrastructure is available to support your digital business initiatives. You can leverage the same skills that you use in the data centre, but also tap into the depth and breadth six global hyperscale public clouds providers and 4,000+ VMware Cloud Provider Partners. You get consistent infrastructure and operations for cloud native applications from the data center to the edge with hybrid cloud built on VMware Cloud Foundation. This consistency increases agility, reduces cost, and lowers risk. Modern apps can be built, managed, and maintained on any cloud. They can meet diverse needs using both public and on-premises cloud resources. You can manage both container-based and traditional VM-based workloads from one platform.
  • 34
    Swagger Reviews
    Swagger is an open-source and professional tool that simplifies API development for teams, users, and enterprises. Learn how Swagger can help your APIs be designed and documented at scale. Swagger tools are powered by the OpenAPI Specification, the industry standard for RESTful API design. Individual tools for creating, updating and sharing OpenAPI definitions with consumers. SwaggerHub is a platform solution that supports OpenAPI workflows on a large scale. Swagger's open source and professional tools have helped millions API developers, teams, organizations, and companies deliver great APIs. Swagger is the easiest and most powerful tool to fully take advantage of the OpenAPI Specification.
  • 35
    Aruba Cloud Reviews
    Cloud made easy and made-to measure PaaS and IaaS solutions for cloud computing applications. This service allows you to set up and configure auto-backups. It is a great solution to protect and manage your backups. Our Object Storage solution is based on the IaaS model and allows you to create and manage storage space to store all your data. Domain Center is a web-based service provided by Aruba Cloud. It allows users to purchase, transfer and manage domain names. Monitor all your websites, Cloud Servers, dedicated server, and other web services, regardless of whether they are hosted in Aruba Cloud data centres or elsewhere. Cloud Monitoring will immediately notify you via SMS or email if there are any errors or failures in the service or resource being monitored. This allows you to always be up-to-date on the status of your infrastructure and take appropriate action if necessary.
  • 36
    Coalfire Reviews
    Only Coalfire has the cloud technology and innovation that will enable your company to realize the promise of digital transformation. Coalfire is a cybersecurity advisor that assists private and public sector organisations to prevent threats, close gaps, manage risk, and improve their security posture. We provide clients with independent and tailored advice, assessments and technical testing. This helps them to develop scalable programs that improve security, meet their business goals, and sustain their success. Coalfire is a cybersecurity thought-leader with offices in the United States and Europe for over 16 years. Lock in your success by unlocking the full potential of cloud computing. Beat them at their own game. Partner with your adversary. Modern cybersecurity program that is business-aligned. You can benefit.
  • 37
    Modulo Risk Manager Reviews

    Modulo Risk Manager

    Modulo Security Solutions

    Automation of Governance, Risks, and Compliance. GRC - Governance, risks and compliance is already a reality for organizations. However, adoption of GRC requires the creation and maintenance a framework that allows integration and collaboration between areas. This avoids silos and ensures greater transparency and consistency in corporate operations. The Risk Manager Module Software automates and integrates Governance, Risk, and Compliance processes. This reduces costs and eliminates silos. The Risk Manager Module is based on the GRC Metaframework. This proprietary methodology, which is fully aligned to ISO 31000, allows for the measurement and control, compliance with regulations, and management of risks.
  • 38
    BMC AMI Capacity and Cost Reviews
    The complexity of managing mainframe costs and capacity is increasing with digitization. BMC AMI Capacity and Cost Portfolio increases availability, predicts potential capacity bottlenecks in advance, and optimizes mainframe mainframe software costs, which can consume 30-50% of the mainframe budget. You can balance risk and efficiency to achieve operational resilience. You will have visibility into workload changes that could impact your mainframe availability or business demand. The management of mainframe software licensing costs and pricing models is simplified. This gives you quantifiable business insight into the drivers and technical costs. Intelligent workflows that are based on nearly 50 years of BMC experience can help you identify capacity issues before they affect your business. Intelligently manage capacity settings for less critical workloads to optimize cost and protect service levels.
  • 39
    RSA ID Plus Reviews
    Cloud solutions that support your digital transformation at your pace, tailored to meet every identity and access management need. ID Plus also includes the multi-functional DS100 hardware authentication device. All plans can be deployed in the cloud, on prem or hybrid. All plans can be easily modified to meet your changing needs. ID Plus cloud multifactor authentication (MFA), one of the most secure products available and the most widely used MFA in the world, is a great choice. Register for our 2-week free trial to find out why.
  • 40
    Mimecast Web Security Reviews
    91% of malware attacks are carried out via the web. It is also the second most common vector for cyberattacks. It is also the most distracting thing for employees at work. It's easy to see why web visibility is so important. Mimecast Web Security protects against malicious web activity, blocks business-inappropriate websites and helps mitigate shadow IT risks caused by uncontrolled cloud app use. It is easy to set up and manage. It provides the technology you need to keep the web safe in the most cost-effective way and the least complicated. This is a major advantage over traditional defenses such as firewalls and endpoint protection. Mimecast allows you to keep your employees productive while protecting against inappropriate sites and content.
  • 41
    PangaeAPI Reviews
    PangaeAPI™, a purpose-built platform as a cloud (IPaaS), manages and monitors mission-critical integrations. PangaeAPI helps to improve operational outcomes, limit attack surfaces, and reduce costs associated with API maintenance and security. PangaeAPI allows your team to easily connect and integrate their various security tools. This will allow them to seamlessly share data. It also replaces cumbersome and time-consuming manual processes. Our PangaeAPI platform not only saves time and money, but also increases security response time and allows your staff to complete more security tasks. Companies need to find the best way to monitor, secure, and maintain mission-critical operations. This will ensure that sensitive data and applications remain safe from outside attacks. PangaeAPI takes the hassle out of this process.
  • 42
    SecureSky Reviews
    SecureSky's Active Protection Platform is more than the standard Cloud Security Posture Management offerings. The unified platform offers advanced capabilities for cloud security, including continuous configuration validation, enforcement functionality, capture and threat data capture, as well as automated threat response capabilities. The patent-pending technology provides centralized security management and compliance management to simplify cloud management for security personnel. Based on Center for Internet Security (CIS), Benchmarks, and best practices, configuration and detection policy assessment prioritizes risk mitigation across all accounts. Based on industry-leading benchmarks, continuous security and compliance configuration and detection policies assessment. Configuration data query capabilities to support operations, compliance and incident response as well as security teams.
  • 43
    New Era Reviews

    New Era

    New Era Technology

    Modern workplaces can be made more productive by unified communication services and world-class collaboration. New Era offers communication solutions that integrate a wide range of collaboration and UC technologies. This includes audio visual technology, telephony and web conferencing. Video conferencing, audio conferencing and video conferencing are all part of New Era's offering. We provide a managed service that covers all aspects of your unified collaboration environment. We empower organizations to support their users regardless of where they are located or how they use them. This helps drive productivity and improves business outcomes. We can integrate and manage multiple vendors and collaboration technology because we are vendor-agnostic. Let's create a customized service that meets your company's communication requirements.
  • 44
    ArmorCode Reviews
    To get a 360o view on your application security posture, centralize all AppSec results (SAST, DAST and SCA) and correlate them with infrastructure and cloud security vulnerabilities. To improve risk mitigation efficiency, normalize, de-dupe and correlate findings and prioritize those that have an impact on the business, One source of truth for all findings and remediations across tools, teams, and applications. AppSecOps is a process for identifying, prioritizing and remediating Security breaches, vulnerabilities, and risks - fully integrated into existing DevSecOps tools, teams, and workflows. The AppSecOps platform allows security teams to increase their ability to identify, remediate, and prevent high-priority compliance, security, and vulnerability issues. It also helps to identify and eliminate coverage gaps.
  • 45
    Silk Security Reviews
    All in one platform, you can cut through the findings, automate risk prioritization and collaborate on fixing remediation. Cloud, hybrid, and cloud native applications create more complexity and scale issues than legacy approaches can begin to address. Security teams are unable to prioritize and measure risk when they lack enough context. Security teams are faced with a challenge when they receive duplicate alerts from different tools. They must prioritize and assign remediation ownership. 60% of breaches are caused by a security alert the organization was aware of, but had difficulty identifying the stakeholder responsible for the fix. Map stakeholder responsibilities, enable self-service remediation and actionable recommendations and facilitate bidirectional collaborative through integration with existing tools and workflows.
  • 46
    VirtualArmour Reviews
    We are here to guide you through your cybersecurity journey. Since 2001, our goal has been to ensure a strong cybersecurity posture in every client's organization through threat resolutions and security recommendations. We can better protect the digital life we live when people, processes and technology work together. Full-cycle management is the best way to resolve and remediate cybersecurity threats. Actionable intelligence is a valuable tool for improving your cybersecurity posture. A single platform that unifies your entire security stack. Security alerts are detected, investigated, and resolved. Team of cybersecurity experts to supplement your existing security team, or light IT staff. Support and monitoring for your firewall, and overall security. You can protect yourself from a breach by preventing it and being aware of it. Evaluate your infrastructure to identify vulnerabilities and security gaps.
  • 47
    Revelstoke Reviews
    The first universal, low code, high-speed, security automation platform that includes case management is here to rock your SOC. Revelstoke's universal data model normalizes input data and output data, allowing for rapid integration of any security products. It is also future-proof. Our UI is based upon the Kanban workflow. Drag a card into place, drop the card where you want it, and boom! The automation works. From the dashboard, you can monitor and track case actions, timeline data, and workflow actions. IR is right at your fingertips. You can measure and report the business impact of automation in security, show the value of your investment and what you are worth. Revelstoke simplifies security orchestration and automation (SOAR) so that security teams can work more efficiently, faster, and smarter. With a drag-and-drop interface that requires no coding, dozens built-in integrations and incredible visibility of performance metrics, Revelstoke offers a solution that is easy to use.
  • 48
    Epiphany Intelligence Platform Reviews
    Reveald is the leader in cyber defense. Our AI-powered Epiphany Intelligence Platform helps organizations move from reactive to proactive strategies. Reveald combines decades-long cybersecurity expertise with the latest technology and techniques to allow customers to move from reactive to proactive security. Reveald's customers reduce their list of exploitable vulnerabilities on average by 98%. Understand how attackers can traverse through your environment, locate chokepoints and shut them down. Get remediation instructions that are targeted to eliminate the greatest risk to your business. Epiphany analyzes identity, configuration, and vulnerability issues to determine the possible ways that an attacker can compromise your security and traverse your network. It then provides you with the most important changes for thwarting these attacks. The first one-stop shop to understand the material risks in your digital environment.
  • 49
    Amplifier Security Reviews

    Amplifier Security

    Amplifier Security

    Self-healing Security for your workforce powered AI with human in the loop automation. Modern security for workforces can bridge the divide between security and workforce. Use AI and your workforce together to secure your business. Stop chasing employees and tracking spreadsheets, and resolve security problems at record speeds. Employees can maintain productivity by collaborating with security controls. Use your existing security tools to discover security issues or take remediation measures. Our vision is to shift cybersecurity focus to include both the technology and people who use it. This will create a more balanced and secure environment for business.
  • 50
    appNovi Reviews
    Connect your existing tools to consolidate your inventory. Gain an authoritative source of data to empower your analyst, and reduce escalations. Prioritize assets that are vulnerable based on their network exposure and impact to the business. Understand the threat exposure to assets and be alerted on compliance drifts. Get authoritative data to better understand your environment. Complete asset inventories are available, allowing you to identify missing security agents and understand exposure. Prioritize vulnerabilities by identifying them. Maintain complete asset inventories with your existing tools. Prioritize risks based on business impact and network exposure. Get a complete picture of your environment, including the threats it faces. Eliminating IT data uncertainty will streamline operations and help you achieve faster results. Understanding cardholder data protection is important. Enhance vulnerability management processes and identify where compensating controls may be needed.
  • Previous
  • You're on page 1
  • Next