What Integrates with VMware AppDefense?

Find out what VMware AppDefense integrations exist in 2024. Learn what software and services currently integrate with VMware AppDefense, and sort them by reviews, cost, features, and more. Below is a list of products that VMware AppDefense currently integrates with:

  • 1
    LoginTC Reviews

    LoginTC

    Cyphercor

    $3/month/user
    Cyphercor is a two factor authentication provider that offers a best-in-class solution that's effortless, intuitive, and cost-effective called "LoginTC". LoginTC adds an additional layer of security to your systems and applications including VPNs, Firewalls, remote desktop, active directory, and more. LoginTC offers a wide range of two factor options for end-users to authenticate, including SMS, email, push notifications, hardware tokens, U2F, OTP, bypass codes, and more. LoginTC can help you reduce your insurance costs and meet compliance regulations with ease.
  • 2
    Armis Reviews

    Armis

    Armis Security

    Armis, the leading asset visibility and security company, provides a unified asset intelligence platform designed to address the new extended attack surface that connected assets create. Fortune 100 companies trust our real-time and continuous protection to see with full context all managed, unmanaged assets across IT, cloud, IoT devices, IoMT, OT, ICS, and 5G. Armis provides passive cyber asset management, risk management, and automated enforcement. Armis is a privately held company and headquartered in California.
  • 3
    Switch Automation Reviews

    Switch Automation

    Switch Automation

    Switch Automation is a global real estate software company that helps property owners and facility managers reduce operating costs, improve energy efficiency and deliver exceptional occupant satisfaction. Our comprehensive smart building platform integrates with traditional building systems as well as Internet of Things (IoT) technologies to analyze, automate and control assets in real-time. We serve enterprise customers and partners in a variety of industries including financial services, retail, grocery, commercial real estate and more.
  • 4
    Thunder TPS Reviews
    Thunder TPS is used by top service providers and online gaming businesses. It provides automated DDoS protection that is scalable and automated. It uses advanced machine learning to detect attacks and mitigate them. Multi-modal source-based defense identifies attackers without causing damage to users. 5-level adaptive mitigation policy, zero day Automated Protection (ZAP), actionable distributed-denial-of-service weapons intelligence at a scale 96M-entry white/black lists Flexible and robust Distributed Denial of Service protection (DDoS), with a wide variety of hardware and software deployment options to meet your specific needs. High-precision, automated DDoS mitigation solution can be delivered as hardware or virtual appliances in speeds ranging from 1 Gbps up to 500 Gbps. High-performance, Sflow-based, IPFIX-based DDoS detection for a complete reactive cyber attack defense system. This appliance can be used as a standalone appliance, or integrated with aGalaxy 5000.
  • 5
    Delinea Cloud Access Controller Reviews
    You can have complete control over web applications and cloud-based cloud management platforms. Cloud Access Controller by Delinea is a comprehensive PAM solution. It operates at cloud speed, can be deployed quickly, and provides secure access to any web app. Cloud Access Controller allows you to integrate existing authentication solutions with any other web application. You can create granular RBAC policies to enforce zero trust and least privilege, even for legacy and custom web applications. Specify what web applications each employee can read or modify. Cloud applications can be granted, managed and revoked. At a very fine level, specify who has access to which cloud applications. You can track usage of every cloud application. Without agents, clientless session recording. Secure access to all web apps, including legacy and custom web applications.
  • 6
    Commvault HyperScale X Reviews
    You can accelerate hybrid cloud adoption, scale out as required, and manage data workloads all from one intuitive platform. A simple scale-out solution that integrates seamlessly with Commvault’s Intelligent Data Management platform. You can accelerate your digital transformation journey with unmatched security, scalability, and resilience. All workloads, including virtual and containers, are protected with simple, flexible data protection. Concurrent hardware failures are prevented from affecting data availability with built-in resilience. Data reuse is possible through copy data management, which provides instant recovery of VMs as well as live production copies for DevOps or testing. High-performance backup with recovery, enhanced RPO and reduced RTO. Cloud data mobility that is cost-optimized to move data between, within, and between clouds. Disaster recovery testing of replicas directly on the hardware.
  • 7
    Commvault Intelligent Data Services Reviews
    A family of integrated solutions that provide actionable insights. It includes Commvault Data Governance and Commvault File Optimization. We are creating more data than ever before. It is important to know everything about it. Automated and proactive actions can be taken to speed up response times, prevent data theft or breaches, eliminate data sprawl, as well as make data-driven decisions in your organization. You can increase storage efficiency and enable faster responses to compliance inquiries. Your data risks are reduced with analytics, reporting and search across backup and production data sources. Advanced "4D" technology delivers a centralized, dynamic, multi-dimensional index of metadata and content, classifications, as well as AI applied insights. A single index that is consistent across all data sources, including remote, cloud, on-premises, and backup, gives you visibility into production and backup data. You can search, filter, drill down and create custom dashboards.
  • 8
    MicroStack Reviews
    OpenStack can be installed and used on Linux in just minutes. This package is ideal for developers and can be used for edge, IoT and appliances. All the OpenStack functionality in one snap package MicroStack is an upstream multinode OpenStack deployment that can be run directly on your computer. MicroStack is not only for developers but it can also be used for edge, IoT, and appliances. Get MicroStack from Snap Store to get your OpenStack up and running immediately. In minutes, you can have a complete OpenStack system up and running. It runs safely on your laptop and has state-of-the-art isolation. Pure upstream OpenStack delivered directly to your laptop. All key OpenStack components are included: Nova, Glance and Cinder. All the cool stuff you want to do on a standard, small OpenStack are included. MicroStack can be integrated into your CI/CD pipelines so you can get on with your day. MicroStack requires at minimum 8GB RAM and a multicore processor.
  • 9
    Canonical Juju Reviews
    Enterprise apps will have better operators thanks to a full application graph, declarative integration for legacy estate and Kubernetes, and a full app graph. Juju operator integration allows us keep each operator as simple and consistent as possible, then we compose them to create rich topologies for complex scenarios that support complex scenarios with less YAML. Large-scale operations code can also be governed by the UNIX philosophy of "doing one thing right". The benefits of clarity as well as reuse are the same. It is important to be small. Juju allows you the option to use the same operator pattern across your entire estate, even legacy apps. Model-driven operations significantly reduce maintenance and operation costs for traditional workloads, without the need to re-platform to K8s. Once mastered, legacy apps can be made multi-cloud-ready. The Juju Operator Lifecycle Manager, (OLM), uniquely supports both machine-based and container-based apps with seamless integration.
  • 10
    vCloud Usage Meter Reviews
    Licensing usage metering, and automatic reporting using vCloud Usage Meter SaaS and vCloud Usage Meter On-Premises agent. Learn about Usage Meter and Usage Insight before you download the latest version. Join the Cloud Provider Metering Architecture's Automatic Reporting Service. Download the latest On Premises agent to collect license usage and report. You can easily do monthly reporting without lifting a finger. Usage Insight + Usage Meter automates the entire reporting process, from data collection to aggregation to reporting to the Commerce Portal. You can scale up to larger environments with Usage Meter 4.3. In-place upgrades eliminate the need to replace the agent on-premises with each new version. Usage Insight is a central place for downloading and viewing Usage reports. VMware stores historical records so partners don't have to maintain older appliances.
  • 11
    RapidScale Identity as a Service Reviews
    RapidScale's Identity as a Service is ideal for organizations that need to make network access simple for staff without compromising security. Our IDaaS solution is built on the backbone Azure Active Directory and provides powerful security right out of the box. No matter where your applications and critical data are located, you can protect them. There are options for single sign-on (SSO), multifactor authentication (MFA), password syncization, and many other features. Our identity services options make it easy to increase your login security. Advanced password sync functions such as user password reset, changing, writeback, and more can be used to control access. Our full-service portal makes it easy to manage IDaaS services, as well as other RapidScale solutions. Alternately let us manage your IDaaS deployment.
  • 12
    Kryptowire Reviews
    Kryptowire offers a range of SaaS solutions that are focused on mobile applications. The Company provides assurance and anti-piracy tools as well as market security analytics and protection for mobile brands. Kryptowire serves commercial customers all over the world. Our automated tools can identify back-doors, regulatory and compliance failures, as well as vulnerabilities, whether they are there intentionally or not. Automated analysis of the security of every mobile application on every device for every employee in your company. Cloud-based and/or in-house appliance deployment. No user or enterprise data collection. Third-party libraries are fully tested. Kryptowire automatically validates and tests the security of mobile and IoT software and applications according to the highest industry and government software assurance standards.
  • 13
    Cisco Prime Network Reviews
    Cisco Prime Network is a cost-effective solution for device administration, network fault-management, and device operation. This single solution allows service providers to reduce complexity and provide high-quality services. It supports both physical network components and the compute infrastructure. Automated network discovery, configuration, and change management can increase operational efficiency. Customer satisfaction is enhanced by proactive service assurance through postevent fault management, trend information, and proactive service assurance. Integration costs are reduced through preintegration using Cisco Prime Carrier Management suite, and northbound interfaces with third-party applications. Detailled end-to-end view of the physical and virtual network topology, inventory and infrastructure. Configuration of devices via GUI using prebuilt or downloadable scripts. Displays the most recent network events, state, configuration changes, and other information.
  • 14
    Mandiant Digital Risk Protection Reviews
    Learn what a digital protection solution is, how it can help prepare you by identifying who is targeting you and what they are after. Mandiant offers a comprehensive digital risk protection solution, either as a standalone self-managed SaaS product or as a comprehensive service. Both options provide security professionals with visibility outside their organization and the ability to identify high risk attack vectors, malicious orchestration on the dark and deep web, and attack campaign on the open web. Mandiant’s digital risk solution provides contextual information about threat actors, their tactics, techniques and procedures, to create a more secure cyber-threat profile. Map your attack surface, and monitor deep and dark web activities to gain visibility into the risk factors that impact the extended enterprise and supply chains. Identify unknown or unmanaged internet-facing assets that are vulnerable before threat actors do.
  • Previous
  • You're on page 1
  • Next