What Integrates with Symantec Data Center Security?
Find out what Symantec Data Center Security integrations exist in 2025. Learn what software and services currently integrate with Symantec Data Center Security, and sort them by reviews, cost, features, and more. Below is a list of products that Symantec Data Center Security currently integrates with:
-
1
NorthStar Navigator
NorthStar.io, Inc.
$8 per deviceNorthStar allows organizations to easily incorporate threat intelligence and business context to enable a risk-based approach to their vulnerability management program. The Platform automates the collection, normalization, consolidation and correlation of threat intelligence, asset, software, and vulnerability data. Combined with a transparent scoring model, NorthStar automates the tedious and manual process of prioritizing vulnerability remediation. -
2
EnCase Forensic
OpenText
The premier choice for forensic investigations, including mobile data acquisition, is enhanced by the introduction of optical character recognition (OCR) support, which effectively retrieves embedded text from scanned images, documents, and PDFs within the evidence collection process. Version 21.2 also broadens support for social media artifacts and features an improved workflow that introduces a new summary view, enabling users to efficiently cross-reference various artifact types and greatly enhancing evidence processing procedures. OpenText Security, previously known as Guidance Software, pioneered the digital investigation software category with the launch of EnCase Forensic in 1998. Over the years, EnCase has upheld its status as the leading standard in criminal investigations, earning the title of Best Computer Forensic Solution from SC Magazine for eight consecutive years. No competing solution provides the same degree of functionality, adaptability, or proven acceptance in court as EnCase Forensic, making it a trusted choice for investigators worldwide. Its continuous evolution and commitment to excellence ensure that it remains at the forefront of forensic technology. -
3
FortiSandbox
Fortinet
In contrast to earlier viruses that were relatively simple and few in number, traditional antivirus solutions could adequately safeguard systems using a database of signatures. However, the landscape of modern malware has evolved, incorporating advanced techniques like exploiting vulnerabilities. When a weakness in a trusted application is exploited, it can lead to unexpected behavior, which attackers leverage to breach computer security. This method of attacking through an undisclosed software vulnerability is referred to as a zero-day attack, or 0-day attack, and prior to the adoption of sandboxing, effective prevention methods were lacking. A malware sandbox serves as a protective mechanism that restricts an application's operations, such as handling a Word document, within a controlled environment. This isolated space allows the sandbox to scrutinize the dynamic behaviors of applications and their interactions in a simulated user setting, thereby revealing any potential malicious activities. Such technology has become essential in the fight against sophisticated threats, ensuring a more comprehensive approach to cybersecurity. -
4
HP-UX
Hewlett Packard Enterprise
Experience a robust UNIX operating system and its associated tools that ensure unparalleled availability, reliability, and security for mission-critical HPE Integrity servers. By leveraging this highly integrated UNIX platform, you can enhance operational efficiency while maintaining the highest standards of reliability and security for your essential HPE Integrity servers. HP-UX creates a dynamic and secure environment, seamlessly integrated into mission-critical HPE Integrity servers, allowing you to address your specific UNIX demands. With four distinct operating environments, HP-UX is designed to cater to diverse needs effectively. The system also emphasizes comprehensive server security and management, incorporating HPE Systems Insight Manager, which provides essential functionalities such as power management, health monitoring, and deployment tools. Furthermore, it includes extensive performance analysis resources for both kernel processes and applications, ensuring optimal functionality. Safeguarding your organization’s most vital applications and services is crucial in maintaining your business's trajectory toward success. With these capabilities, you can confidently navigate the complexities of modern computing environments. -
5
HPE OpenVMS
Hewlett Packard Enterprise
HPE OpenVMS offers a reliable platform that has been tested and proven effective. This multi-user, general-purpose operating system ensures protection against both expected and unexpected downtimes through its continuous computing capabilities, which include disaster-tolerant, multisite clusters available at competitive prices. While typical IT environments might track uptime in days or weeks, users of OpenVMS often report uptime in years, highlighting its exceptional durability. Users can trust OpenVMS for its unwavering reliability, availability, scalability, and robust security features. HPE enhances the development and production experience on OpenVMS with high-performance tools and environments. The HPE OpenVMS Cluster software, a crucial component of the operating system, underpins many essential features utilized in OpenVMS enterprise solutions. Furthermore, HPE OpenVMS also presents a comprehensive suite of security products and services from HPE and its partners, aimed at safeguarding critical business assets. This commitment to security ensures that organizations can operate with confidence in their technological infrastructure. -
6
OctoXLabs
OctoXLabs
Quickly identify, prioritize, and address threats to your security assets within minutes. Leverage Cyber asset attack surface management to enhance your visibility and oversee your entire cybersecurity inventory effectively. Uncover vulnerabilities across all your assets while bridging the gaps often left by traditional agent-based management solutions. Identify weaknesses in servers, clients, cloud environments, and IoT devices seamlessly. Octoxlabs utilizes agentless technology to amplify your visibility, offering over 50 API integrations. You can monitor the status of your installed application licenses at any time, including the number remaining, those already used, and renewal dates, all from a centralized location. Additionally, manage user data better by integrating with intelligence services, allowing for easy tracking of local accounts across all products. Discover devices that possess vulnerabilities yet lack security agents, ensuring that no threat goes unnoticed. Furthermore, this comprehensive approach empowers organizations to bolster their security posture and maintain a proactive stance against emerging risks. -
7
CA Auditor for z/OS
Broadcom
As each generation of computers evolves, the complexity of operating systems increases significantly. This rising complexity has resulted in a more arduous and time-consuming process for auditing these systems. All operating systems, including mainframes, can experience security vulnerabilities stemming from improper installations, customizations, and bugs associated with product maintenance. CA Auditor serves as a robust software solution that automates the technical review of both the hardware and software environments, effectively pinpointing areas of integrity risk. It detects potential security vulnerabilities arising from misconfigured implementations, allowing for a thorough evaluation of the operating system and its various components. Additionally, it offers functionality to oversee system usage and maintain the integrity of essential system files. By utilizing CA Auditor, users can effectively address significant vulnerabilities within the z/OS operating system, enabling detailed auditing, integrity checks, and necessary verifications for enhanced security measures. This comprehensive approach not only mitigates risks but also fosters a more secure computing environment.
- Previous
- You're on page 1
- Next