What Integrates with ServiceNav?

Find out what ServiceNav integrations exist in 2025. Learn what software and services currently integrate with ServiceNav, and sort them by reviews, cost, features, and more. Below is a list of products that ServiceNav currently integrates with:

  • 1
    GLPI  Reviews

    GLPI

    TECLIB

    €19/month/user
    1 Rating
    GLPI is a powerful Service Management software that uses open-source technologies. It makes it easy to plan and manage IT changes, solve problems efficiently, automate business processes, and maintain control over your IT infrastructure. Key features of the GLPI: 1. 1. 2. 2. Asset management and automatic inventories 3. Data quality control using rationality 4. Asset management: Administrative and financial 5. Software inventory and management of licences 6. Knowledge and frequently asked questions 7. Statistics and reports 8. 8. 9. Inventory of Android-based devices
  • 2
    iTop Reviews
    Whether you’re an infrastructure manager handling complex systems, a service support leader striving for customer satisfaction, or a decision-maker focused on ROI and compliance, iTop adapts to your processes to simplify your tasks, streamline operations, and enhance service quality. Gain a real-time, 360° view of all your IT assets and incidents in one place, reducing downtime and improving the efficiency of your support team. Effortlessly manage multi-client environments and streamline collaboration across departments. With iTop, you get a solution that scales with your growth, providing tools to tackle your most pressing IT challenges while maintaining service continuity and improving team productivity
  • 3
    Ekara Reviews
    Ekara is a unique all-in-one application monitoring solution. Ekara is fully hybrid and can monitor all applications (web, mobile business, thick-clients, Citrix voice, etc.). Ekara can monitor any and all applications (web, mobile, business, thick-clients and Citrix), to improve their availability and performance in your environment (intranet or internet). Its unifying interface and compatibility to all types of technology make it a valuable tool for your business and digital team. Ekara is disruptive technology. It's a single product that combines all the features of real-user monitoring with synthetic monitoring. It covers all intranet and internet environments. All this in one product! Ekara is a powerful tool which can monitor all your applications from desktops or laptops, as well as from real smartphones (Android or iOS). It can monitor all existing applications, including web, business apps and Citrix.
  • 4
    DNSWatch Reviews
    WatchGuard DNSWatch, a Cloud-based service that adds DNS-level filtering, detects and blocks potentially dangerous connections and protects networks and employees against damaging attacks. WatchGuard analysts triage critical alerts and provide an easy-to-understand accounting with detailed insights about possible infection. DNSWatch redirects employees away from malicious sites when they click the link. It also offers resources to reinforce phishing education. Hackers use DNS to attack unsuspecting victims. Therefore, careful examination of DNS requests can help to identify and intercept attacks. DNSWatch adds DNS-level filtering to our Total Security Suite. This provides an additional layer of security to prevent malware infections. Your users can be prevented from connecting to known malicious DNS addresses. Users are then automatically blocked and redirected to a safe landing site.
  • 5
    ThreatSync Reviews
    It can be difficult to manage security across an organization, whether you have 10 branch offices or distributed businesses with 10 employees. SMBs and distributed enterprises must have visibility into their network and endpoint data. They also need to be able quickly and efficiently to use actionable insights to eliminate threats. ThreatSync, an essential component of TDR, collects threat data from WatchGuard Firebox, Host Sensor, and enterprise-grade threat intelligence feeds. It then analyzes this data using a proprietary algorithm and assigns a threat score and rank. This powerful correlation engine allows cloud-based threat prioritization, empowering IT teams to respond quickly and confidently to threats. Collects and correlates threat events data from the Firebox or Host Sensor.
  • 6
    3rdRisk Reviews
    Supplier (third-party relationships) are becoming a major concern, whether it's about cyber, sustainability, compliance or continuity risks. Third-party incidents are becoming more frequent and have a greater impact. Our platform acts as a secure and all-in-one hub that facilitates multidisciplinary collaboration between all internal risk disciplines, the business teams, and external partners. It allows for the secure and seamless sharing of documents and questions, as well as a collaborative workspace to work on shared requirements. Internal teams can decide what information to share with external parties and other teams while working on the same platform. Our third-party catalogue connects seamlessly with internal procurement systems and external feeds to create a centralized view of your entire third party landscape. This comprehensive view contains all the information you need about contracts and their specific characteristics.
  • Previous
  • You're on page 1
  • Next