What Integrates with Symantec Client Management Suite?

Find out what Symantec Client Management Suite integrations exist in 2026. Learn what software and services currently integrate with Symantec Client Management Suite, and sort them by reviews, cost, features, and more. Below is a list of products that Symantec Client Management Suite currently integrates with:

  • 1
    NorthStar Navigator Reviews

    NorthStar Navigator

    NorthStar.io, Inc.

    $8 per device
    NorthStar allows organizations to easily incorporate threat intelligence and business context to enable a risk-based approach to their vulnerability management program. The Platform automates the collection, normalization, consolidation and correlation of threat intelligence, asset, software, and vulnerability data. Combined with a transparent scoring model, NorthStar automates the tedious and manual process of prioritizing vulnerability remediation.
  • 2
    Active Directory Reviews

    Active Directory

    Microsoft

    $1 per user per month
    Active Directory serves as a centralized repository for information regarding various objects within a network, facilitating easy access and management for both administrators and users. It employs a structured data storage approach, which underpins a logical and hierarchical arrangement of directory information. This repository, referred to as the directory, holds details about various Active Directory entities, which commonly include shared resources like servers, volumes, printers, as well as user and computer accounts on the network. For a deeper understanding of the Active Directory data repository, one can refer to the section on Directory data store. Security measures are seamlessly integrated with Active Directory, encompassing logon authentication and the control of access to directory objects. Through a single network logon, administrators are empowered to oversee directory information and organizational structures across the entire network, while authorized users can readily access resources from any location within the network. Additionally, policy-based administration simplifies the management process, making it more efficient even for the most intricate network configurations. This framework not only enhances security but also streamlines resource management, making network operations more effective.
  • 3
    Arxes Data Management Reviews
    Commercial and manufacturing operations encompass intricate tasks that engage numerous individuals, timelines, and interdependencies. To effectively navigate these processes, it's essential to maintain a clear overview of the various departments involved, their current statuses, and the next steps to be taken. With our project management solution, arxes data management (adm), we provide a software system tailored specifically to your requirements. Our service includes thorough documentation of complex process chains and assistance in the timely and technically proficient execution of tasks. The software is designed with several fundamental modules and can be customized through modular extensions to fit your specific needs. One of these modules facilitates the commissioning and automatic calculation of purchasing and manufacturing chains, ensuring seamless integration. Additionally, it grants global access to the real-time purchasing and manufacturing status of all items while proactively notifying you of upcoming tasks and any potential delays that may arise. This proactive approach helps to mitigate risks and enhance overall efficiency in your operations.
  • 4
    EFSS Reviews

    EFSS

    Defense IT Solutions Inc

    Thru is a comprehensive solution designed for file sharing and collaboration, specifically tailored for business users. It combines top-tier security and dependability with a user-friendly interface, seamlessly integrating with various business applications. Accessible through web browsers, mobile apps for both iOS and Android, as well as Thru Desktop Sync and Add-Ins for platforms like Microsoft Outlook, IBM Notes, Microsoft SharePoint, and Salesforce, Thru ensures that organizations can access, sync, and share files anytime and from any device. This platform promotes real-time collaboration by connecting all departments, providing employees with a secure virtual office environment that is trusted by government and financial institutions. Additionally, it enables users to efficiently manage their data and content, organize files by department or project, and share folders with colleagues while implementing policy-based access controls. With Thru, businesses can streamline their collaboration efforts and enhance productivity across the board.
  • 5
    CA Auditor for z/OS Reviews
    As each generation of computers evolves, the complexity of operating systems increases significantly. This rising complexity has resulted in a more arduous and time-consuming process for auditing these systems. All operating systems, including mainframes, can experience security vulnerabilities stemming from improper installations, customizations, and bugs associated with product maintenance. CA Auditor serves as a robust software solution that automates the technical review of both the hardware and software environments, effectively pinpointing areas of integrity risk. It detects potential security vulnerabilities arising from misconfigured implementations, allowing for a thorough evaluation of the operating system and its various components. Additionally, it offers functionality to oversee system usage and maintain the integrity of essential system files. By utilizing CA Auditor, users can effectively address significant vulnerabilities within the z/OS operating system, enabling detailed auditing, integrity checks, and necessary verifications for enhanced security measures. This comprehensive approach not only mitigates risks but also fosters a more secure computing environment.
  • Previous
  • You're on page 1
  • Next