What Integrates with Symantec Data Center Security?

Find out what Symantec Data Center Security integrations exist in 2026. Learn what software and services currently integrate with Symantec Data Center Security, and sort them by reviews, cost, features, and more. Below is a list of products that Symantec Data Center Security currently integrates with:

  • 1
    NorthStar Navigator Reviews

    NorthStar Navigator

    NorthStar.io, Inc.

    $8 per device
    NorthStar allows organizations to easily incorporate threat intelligence and business context to enable a risk-based approach to their vulnerability management program. The Platform automates the collection, normalization, consolidation and correlation of threat intelligence, asset, software, and vulnerability data. Combined with a transparent scoring model, NorthStar automates the tedious and manual process of prioritizing vulnerability remediation.
  • 2
    Auditor for z/OS Reviews
    Broadcom Auditor for z/OS is an advanced mainframe security and compliance platform created to help enterprises manage cybersecurity risks across z/OS environments. The software automates the auditing process, allowing IT teams to quickly analyze operating system configurations, hardware components, and software settings. It identifies vulnerabilities and integrity exposures that may result from incorrect implementations, routine maintenance, or system customization changes. The platform delivers clear visibility into potential areas of risk, helping organizations improve compliance efforts and strengthen operational security. Auditor for z/OS also includes file usage monitoring capabilities that support the protection and integrity of sensitive system resources. Businesses can use the solution to simplify complex audit tasks while gaining deeper insights into their mainframe security posture. Broadcom supports users with extensive training resources, documentation, and professional services to maximize the value of the platform. The software integrates into broader mainframe cybersecurity strategies, helping enterprises maintain secure and reliable infrastructure operations. With automated reviews and comprehensive reporting features, Auditor for z/OS enables organizations to proactively address security concerns before they become larger operational issues.
  • 3
    EnCase Forensic Reviews
    The premier choice for forensic investigations, including mobile data acquisition, is enhanced by the introduction of optical character recognition (OCR) support, which effectively retrieves embedded text from scanned images, documents, and PDFs within the evidence collection process. Version 21.2 also broadens support for social media artifacts and features an improved workflow that introduces a new summary view, enabling users to efficiently cross-reference various artifact types and greatly enhancing evidence processing procedures. OpenText Security, previously known as Guidance Software, pioneered the digital investigation software category with the launch of EnCase Forensic in 1998. Over the years, EnCase has upheld its status as the leading standard in criminal investigations, earning the title of Best Computer Forensic Solution from SC Magazine for eight consecutive years. No competing solution provides the same degree of functionality, adaptability, or proven acceptance in court as EnCase Forensic, making it a trusted choice for investigators worldwide. Its continuous evolution and commitment to excellence ensure that it remains at the forefront of forensic technology.
  • 4
    FortiSandbox Reviews
    In contrast to earlier viruses that were relatively simple and few in number, traditional antivirus solutions could adequately safeguard systems using a database of signatures. However, the landscape of modern malware has evolved, incorporating advanced techniques like exploiting vulnerabilities. When a weakness in a trusted application is exploited, it can lead to unexpected behavior, which attackers leverage to breach computer security. This method of attacking through an undisclosed software vulnerability is referred to as a zero-day attack, or 0-day attack, and prior to the adoption of sandboxing, effective prevention methods were lacking. A malware sandbox serves as a protective mechanism that restricts an application's operations, such as handling a Word document, within a controlled environment. This isolated space allows the sandbox to scrutinize the dynamic behaviors of applications and their interactions in a simulated user setting, thereby revealing any potential malicious activities. Such technology has become essential in the fight against sophisticated threats, ensuring a more comprehensive approach to cybersecurity.
  • 5
    HP-UX Reviews

    HP-UX

    Hewlett Packard Enterprise

    Experience a robust UNIX operating system and its associated tools that ensure unparalleled availability, reliability, and security for mission-critical HPE Integrity servers. By leveraging this highly integrated UNIX platform, you can enhance operational efficiency while maintaining the highest standards of reliability and security for your essential HPE Integrity servers. HP-UX creates a dynamic and secure environment, seamlessly integrated into mission-critical HPE Integrity servers, allowing you to address your specific UNIX demands. With four distinct operating environments, HP-UX is designed to cater to diverse needs effectively. The system also emphasizes comprehensive server security and management, incorporating HPE Systems Insight Manager, which provides essential functionalities such as power management, health monitoring, and deployment tools. Furthermore, it includes extensive performance analysis resources for both kernel processes and applications, ensuring optimal functionality. Safeguarding your organization’s most vital applications and services is crucial in maintaining your business's trajectory toward success. With these capabilities, you can confidently navigate the complexities of modern computing environments.
  • 6
    HPE OpenVMS Reviews

    HPE OpenVMS

    Hewlett Packard Enterprise

    HPE OpenVMS offers a reliable platform that has been tested and proven effective. This multi-user, general-purpose operating system ensures protection against both expected and unexpected downtimes through its continuous computing capabilities, which include disaster-tolerant, multisite clusters available at competitive prices. While typical IT environments might track uptime in days or weeks, users of OpenVMS often report uptime in years, highlighting its exceptional durability. Users can trust OpenVMS for its unwavering reliability, availability, scalability, and robust security features. HPE enhances the development and production experience on OpenVMS with high-performance tools and environments. The HPE OpenVMS Cluster software, a crucial component of the operating system, underpins many essential features utilized in OpenVMS enterprise solutions. Furthermore, HPE OpenVMS also presents a comprehensive suite of security products and services from HPE and its partners, aimed at safeguarding critical business assets. This commitment to security ensures that organizations can operate with confidence in their technological infrastructure.
  • 7
    OctoXLabs Reviews
    Quickly identify, prioritize, and address threats to your security assets within minutes. Leverage Cyber asset attack surface management to enhance your visibility and oversee your entire cybersecurity inventory effectively. Uncover vulnerabilities across all your assets while bridging the gaps often left by traditional agent-based management solutions. Identify weaknesses in servers, clients, cloud environments, and IoT devices seamlessly. Octoxlabs utilizes agentless technology to amplify your visibility, offering over 50 API integrations. You can monitor the status of your installed application licenses at any time, including the number remaining, those already used, and renewal dates, all from a centralized location. Additionally, manage user data better by integrating with intelligence services, allowing for easy tracking of local accounts across all products. Discover devices that possess vulnerabilities yet lack security agents, ensuring that no threat goes unnoticed. Furthermore, this comprehensive approach empowers organizations to bolster their security posture and maintain a proactive stance against emerging risks.
  • Previous
  • You're on page 1
  • Next