What Integrates with RapidScale Identity as a Service?
Find out what RapidScale Identity as a Service integrations exist in 2024. Learn what software and services currently integrate with RapidScale Identity as a Service, and sort them by reviews, cost, features, and more. Below is a list of products that RapidScale Identity as a Service currently integrates with:
-
1
Cisco Duo
Cisco
$3 per user per month 1,285 RatingsSecure your workforce with powerful, simple access security. We are Cisco Duo. Our modern access security system is designed to protect all users, devices, applications, so you can focus on what you do best. Secure access for all users and devices, in any environment, from any location. You will enjoy the peace of mind that only total device visibility and trust can provide. A SaaS solution that natively protects all applications and is easy to deploy, scaleable and quick to respond to threats. Duo's access security protects all applications from compromised credentials and devices. It also provides comprehensive coverage that helps you meet compliance requirements. Duo integrates natively with applications to provide flexible, user friendly security that is easy to implement and manage. It's a win-win-win for administrators, users, and IT staff. Multi-factor authentication, dynamic device trust and adaptive authentication are key components of your zero-trust journey. Secure SSO is also a part of the mix. -
2
Zerto helps customers accelerate IT Transformation by eliminating the complexity and risk of modernization and cloud adoption. Zerto is replacing legacy solutions with a single IT resilience platform that simplifies disaster recovery, backup, and cloud management. Zerto's software platform provides continuous availability at enterprise scale for a seamless customer experience. It also simplifies workload mobility to allow applications to be moved between hybrid and multi-clouds. Zerto is trusted worldwide by more than 6,000 customers and powers resiliency offerings for Microsoft Azure and IBM Cloud, AWS and SunGard AS, as well as over 350 cloud service providers. Visit www.zerto.com for more information
-
3
Automated resource management can help you achieve greater resource flexibility. For security, governance, compliance, and compliance, ensure consistent policy management across multiple cloud and on-premise instances. A zero-trust security model ensures business continuity, disaster recovery, high-security networking, and secure networking. Transform Day 2 operations into a proactive model that automates troubleshooting, root cause analysis, and remediation. It optimizes performance and allows for single-click access to facilitate automation and central management. On-premises ACI networks can be extended to remote locations, bare metal clouds, and colocation providers that don't require hardware. Cisco's Multi-Site Orchestrator provides provisioning and health monitoring and manages Cisco ACI network policies. This solution automates network connectivity, provides consistent policy management and simplifies operations for multicloud environments.
-
4
Microsoft Entra ID
Microsoft
4 RatingsMicrosoft Entra ID, formerly known as Azure Active Directory, is a comprehensive cloud-based identity and access management solution that combines core directory service, application access management and advanced identity protection. Cloud identity and access management solutions connect employees, customers and partners with their apps, devices and data. Protect data and resources with adaptive access policies and strong authentication without compromising the user experience. Provide a quick, easy sign-in across your multicloud environment in order to keep your users productive and reduce time spent managing passwords. Manage all your identities, and access to your applications, in one central location, whether in the cloud, or on-premises. This will improve visibility and control. -
5
Mimecast Advanced E-mail Security is a robust email security solution that protects organizations from a variety of email-based threats including phishing attacks, malware, impersonation, and spam. Mimecast uses cutting-edge AI and Machine Learning to provide real-time threat prevention and detection in order to safeguard sensitive data and ensure business continuity. It provides advanced filtering and scans of incoming and emailed outgoing emails to reduce the risk of data breaches and help organizations comply with regulatory requirements. Mimecast's comprehensive reporting and management features enable IT teams to monitor and respond to threats efficiently, making it the preferred choice for businesses looking to enhance email security.
-
6
Microsoft 365
Microsoft
$5 per user per month 103 RatingsMicrosoft 365 (formerly Microsoft Office 365) is now available. Outlook, OneDrive and Excel, Word, PowerPoint, Excel, PowerPoint and OneNote allow you to be more creative and achieve the things that matter with Microsoft 365 (formerly Microsoft Office 365). You get the latest Office apps, both online and desktop, when you subscribe to Microsoft 365. You can access Office apps on your desktop, tablet, and phone. * Microsoft 365 + your device + Internet = productivity wherever and whenever you are. OneDrive makes it easy to access the work you have done from anywhere, and to others when you share or collaborate. There is help at every turn. Chat, email, or call to speak with a live person. Get Office today - choose the right option for you -
7
Cisco AnyConnect
Cisco
5 RatingsRemote workers have secure VPN access. Remote workers can access the enterprise network via a frictionless, highly secured way. This will allow them to work from any device at any time and from any location. It will also protect the company. Cisco Secure Remote Worker is a solution that provides remote workers with greater protection. It allows them to work from any device at any time and from any location. Cisco can help you accelerate your business' success by providing flexible, policy-driven access that supports remote workers over wired, wireless, or VPN. With multiple services that go beyond traditional VPN capabilities, you can get more for less and enable remote workers to have more secure access. You can gain visibility and control over your distributed enterprise to see who and what devices are accessing your network. -
8
SolarWinds Access Rights Manager
SolarWinds
1 RatingSolarWinds®, Access Rights Manager is designed for IT and security administrators to quickly and easily provision, deprovision, manage, audit, audit, and audit user access rights to files, systems, and data. This allows them to help protect their organizations against the potential risks of data theft or breaches. Analyzing user authorizations and access permissions will give you a visual representation of who has access to what and when. To demonstrate compliance with many regulatory requirements, customized reports can be created. Provision and deprovision users can be done using role-specific templates. This will ensure compliance with security policies and access privilege delegation. -
9
Veeam Agent for Windows
Veeam
FreeVeeam Agent FREE for Microsoft Windows is based on the same technology as Veeam Backup and Replication #1 software. This FREE standalone agent provides Windows backup and recovery services for desktops and laptops that are on-premises or in home offices, as well as Windows computers running in public clouds. Veeam's proven technologies allow you to create image-based backups of your entire PC. You can also backup individual files or folders, or backup volumes. Users have many options to recover their data, including bare-metal restorations, Instant VM recovery®, direct restores to Microsoft Azure or AWS, and file-level restorations. Enjoy the peace-of-mind that comes from reduced downtime, reduced data loss risk and the confidence of meeting or exceeding recovery objectives (RPOs). -
10
Azure NetApp Files
NetApp
$0.14746Microsoft Azure native, high-performance file storage service for core business applications. Azure NetApp Files (ANF) makes it super-easy for enterprise LOB and storage professionals to migrate and run complex, performance-intensive and latency-sensitive applications with no code-change. ANF is used widely as the underlying shared storage service in these scenarios. Azure supports multiple protocols, allowing for seamless "lift and shift" of both Linux and Windows applications. Multiple performance tiers can be aligned with workload performance requirements. Deep integration into Azure allows for seamless and secure Azure experiences with minimal learning or management overhead. Leading certifications such as SAP HANA, GDPR and HIPAA allow migration of the most challenging workloads to Azure. -
11
NetApp Cloud Tiering
NetApp
$0.05 per GB per monthNetApp Cloud Tiering allows you to extend your cloud ONTAP-based clusters into public or private cloud object storage. This will allow you to efficiently manage high-performance storage by moving less frequently accessed data to a more durable and affordable storage tier. Cloud Tiering makes it easy to identify and move infrequently used data. It does this without compromising on manageability or performance. Cloud Tiering can be managed by NetApp Cloud Manager, which makes it easier for you to manage tiering across hybrid cloud storage platforms. Cloud Tiering is enabled by NetApp Cloud Manager. With a simple, automated setup, any ONTAP-based cluster can be connected to an object storage bucket of your choice. -
12
NetApp Cloud Insights
NetApp
$6 per monthYou can control the performance and utilization for your cloud workloads. NetApp Cloud provides complete visibility into your infrastructure, applications, and more. Cloud Insights allows you to monitor, troubleshoot, and optimize all of your resources and applications across the entire technology stack, on-prem and in the cloud. With automated responses to threats and early detection, ransomware can be prevented from your most valuable business asset, data. Alert your organization to potential misuse and theft of intellectual property by malicious individuals, both internal or external. Auditing access to and patterns of usage to critical corporate data, whether on-premises or in cloud, can help ensure compliance. Full-stack visibility across infrastructure and applications, from the public cloud to your datacenter, all in one location. You don't have to search for new monitoring tools each time a platform is added to your organization. -
13
AlienVault USM
AT&T Cybersecurity
AlienVault®, Unified Security Management®, (USM), is used by hundreds of MSSPs around the world to create successful managed security and compliance services. AlienVault USM provides multiple security capabilities and continuously updated threat intelligence in one platform. It allows MSSPs to centralize threat detection, incident response and compliance management across both cloud and on-premises environments. AlienVault USM was designed to meet the needs of today's dynamic MSSP market. It is highly scalable and cost-effective and easy to deploy and maintain. It allows MSSPs to quickly grow their managed security service offerings to meet customer security goals and minimize their risk and expense. -
14
Cisco Cloudlock
Cisco
Cloud access security broker (CASB), to protect cloud users, data, apps, and other applications. Cisco Cloudlock, an API-based cloud access security broker (CASB), helps accelerate cloud use. Cloudlock protects your identities, data and apps to prevent account compromises, breaches and other risks in the cloud app ecosystem. Cloudlock's API-driven approach makes it easy to promote cloud adoption. Protect against compromised accounts and malicious insiders using our User and Entity Behavior Analytics. This runs against an aggregated set cross-platform activities for better visibility and detection. Protect against data security breaches and exposures with highly-configurable data loss prevention engine that automates policy-driven response actions. Cloudlock Apps Firewall detects and controls malicious apps connected to your corporate environment and provides a crowd-sourced Community Trust rating to identify individual app risks. -
15
NetApp Cloud Volumes ONTAP
NetApp
Cloud Volumes ONTAP provides enterprise-grade storage wherever your apps may be. Cloud Volumes ONTAP allows you to optimize cloud storage costs and performance, while also improving data protection, security, and compliance. This easy-to-use calculator will help you calculate your storage costs on AWS Azure, Google Cloud, and Google Cloud. -
16
Cloud Analyzer
Spot by NetApp
Cloud optimization is possible with integrated visibility and automation. Cloud efficiency and cloud costs can be reduced by understanding, understanding and taking action. Cloud Analyzer, a cloud infrastructure management tool, uses advanced analytics to provide visibility into cloud costs and show you where you can optimize them. It also allows you to implement that optimization using Spot’s portfolio of continuous optimization products. You can map your cloud infrastructure to get detailed insights into cloud usage and costs across all your accounts. Track your cloud efficiency and identify your best opportunities for reducing cloud costs. Get actionable recommendations that are easy to implement and automate. This will help you reduce costs and increase your ROI. Cloud Analyzer is a combination of predictive analytics and machine-learning to provide guidance and visibility. It calculates your resource utilization and costs. -
17
NetApp Cloud Manager
NetApp
Your hybrid cloud storage and data management services can be centrally managed. Cloud Manager provides IT professionals and cloud architects with a central control plane to manage, monitor, and automate data in hybrid clouds environments. It integrates NetApp's Cloud Volumes Platform. A central platform for your cloud storage. It supports hybrid, multiple cloud providers, accounts, and more. It empowers IT professionals to provide cloud storage services that are optimized for their internal and external users. All your storage systems can be unified on a single console. Multiple NetApp ONTAP storage systems can be controlled on-premises or in the AWS Azure, Google cloud, and Google cloud. Simple provisioning tools empower IT professionals to achieve business goals. Automatic capacity scaling allows you to allocate optimized storage capacity to internal and external customers. Automated orchestration of cloud storage operations via RESTful API support. -
18
Imperva DDoS Protection
Imperva
Imperva DDoS Protection protects your assets at the edge to ensure uninterrupted operation. You can ensure business continuity with 100% uptime. DDoS mitigation is based on the following rule: "moments to go down and hours to recover". Every second counts when you defend against an attack. Imperva provides you with the assurance that attack traffic will automatically be blocked at the edge. This is without you having to increase your bandwidth. Imperva DDoS protection for websites is an all-in-one service that instantly mitigates any size or type of DDoS attack on web applications. Our DDoS protection for websites is complemented by the Imperva cloud-based web application firewall (WAF), which stops hacking attempts and attacks from malicious bots. Your DNS records can be modified to ensure that all HTTP/S traffic to your domain(s), is routed through the Imperva network. Imperva DDoS protection protects websites by acting as a secure proxy. It masks your origin server IP. -
19
Citrix Analytics
Cloud Software Group
$3 per user per monthYou need to ensure that assets and employees are protected in real-time to protect sensitive data. Citrix Analytics for Security provides proactive security protection without compromising your employees' experience. Analytics intelligence provides security for your employees, IT environment, content, and assets. With proactive visibility throughout your organization, you can pinpoint threats to your data. Citrix is a leader in virtual client computing, according to the IDC MarketScape. You can quantify user experience and determine the health of your environment. Employees can enjoy a high-quality, virtual experience on any device. Intelligent workspace platforms can transform the employee experience. Our Customer Success Services (CSS Select) program is included with your subscription. It offers 24/7 support, expert guidance and flexible training. It also includes proactive monitoring. We are focused on one goal: your success. -
20
Eco
Spot by NetApp
Automated optimization for AWS Savings Plans or Reserved Instances Automate the planning, purchasing, and optimization of your cloud commitments portfolio. Eco automates the management of reserved instances, creating a low-risk, high-ROI cloud commitment portfolio that meets your current and future needs. Eco offers all the benefits of long term pricing without financial lock-in by identifying and selling off excess capacity and purchasing appropriate short-term third-party reservations via the AWS Marketplace. With the modification, modification, and mapping of unused reserved instance and Savings Plans, you can maximize your cloud commitment purchase ROI. Automate the purchase of reserved instances in AWS Marketplace throughout their lifetime to ensure that workloads are always running at optimal prices. Facilitate collaboration between Finance, DevOps and Finance teams by providing full visibility into compute consumption as well as the automation of optimal reserved instances. -
21
NetApp VDMS
NetApp
NetApp's Virtual Desktop Managed Service is a managed service that provides turnkey virtual desktops for your growing enterprise. VDMS combines a complete Desktop as-a-Service (DaaS), solution with our world-class infrastructure for a low monthly fee. It can be difficult and time-consuming for businesses to provide virtual desktop infrastructure to an increasing number of employees. DaaS solutions offer enterprises a way to support virtual desktops through a simplified managed service model. Most DaaS offerings are limited in scope or built on infrastructure that isn’t enterprise-class. Imagine a better DaaS solution that integrates the virtual desktop with industry-leading cloud data services and management tools. This is DaaS at scale. This is NetApp Virtual Desktop Managed Service. -
22
NetApp SnapMirror
NetApp
Rapid, efficient array-based data replication is available for backup, disaster recovery and data mobility. -
23
VMware Cloud
Broadcom
All of your apps can be built, managed, protected, and managed on any cloud. VMware's Multi-Cloud solutions provide a cloud operating system for all applications. The world's most widely used cloud infrastructure is available to support your digital business initiatives. You can leverage the same skills that you use in the data centre, but also tap into the depth and breadth six global hyperscale public clouds providers and 4,000+ VMware Cloud Provider Partners. You get consistent infrastructure and operations for cloud native applications from the data center to the edge with hybrid cloud built on VMware Cloud Foundation. This consistency increases agility, reduces cost, and lowers risk. Modern apps can be built, managed, and maintained on any cloud. They can meet diverse needs using both public and on-premises cloud resources. You can manage both container-based and traditional VM-based workloads from one platform. -
24
Fortinet SD-WAN
Fortinet
Fortinet is the SD-WAN provider with the highest market share and highest revenue. Fortinet SDWAN offers advanced routing and self-healing capabilities. It also provides flexible security using network firewalls or SASE-based cloud services. All this in one integrated solution. -
25
Trend Micro Endpoint Encryption
Trend Micro
Trend Micro™, Endpoint Encryption protects data on a variety of devices such as computers and laptops, desktops, USB drives and other removable media. This solution is available as a separate agent and combines enterprise-wide full disc, file/folder and removable media encryption to prevent unauthorized access or use of private information. You can manage all your users from one, integrated console. This console also allows you to use the same console for Trend Micro security products and endpoint protection. Endpoint encryption agents can be deployed to ensure your data is protected no matter what your mobile computing devices or organizational needs may change. -
26
VMware Carbon Black App Control
Broadcom
To prevent unwanted changes and ensure compliance with regulatory mandates, lock down servers and critical systems to protect them. Protect corporate systems and protect legacy and new systems from unwanted change. VMware Carbon Black®, App Control™, is one of the most reliable and scalable applications control solutions available. Unify multiple endpoint security capabilities and work faster and more efficiently with one cloud-native platform. Stop ransomware, malware, zero-day, and other malicious attacks. File-integrity monitoring, device control, and memory protection can prevent unauthorized changes. To assess risk and protect the system, monitor critical activity. Secure EOL systems using powerful change-control policies and application control policies. Management overhead is kept low with out-of-the box templates. -
27
The core operating system of the Cisco ASA family is Cisco Adaptive Security Appliance Software (ASA). It provides enterprise-class firewall capabilities to ASA devices in a variety of form factors - blades, standalone appliances, virtual appliances - for any network environment. ASA Software integrates with other security technologies to provide comprehensive solutions that meet constantly changing security needs.
-
28
NetApp OnCommand Insight
NetApp
Actionable knowledge is your new superpower. Knowledge is power. NetApp®, OnCommand Insight gives you valuable insights across your entire infrastructure. It helps you see more, react quicker, and reduce costs within a single bound. OnCommand Insight, or you can call it OCI, was built to be extremely robust because we believe multi-vendor monitoring should be possible from one pane of glass. Meeting SLAs should be easy. Tracking down and resolving issues should be done quickly. Optimizing in the name IT spend reduction is a wonderful thing. Show-back reporting should be a badge of honor. OnCommand Insight allows you to make better decisions about your workload and IT spending by monitoring and troubleshooting all aspects of your infrastructure.
- Previous
- You're on page 1
- Next