What Integrates with Vulcan Cyber?
Find out what Vulcan Cyber integrations exist in 2024. Learn what software and services currently integrate with Vulcan Cyber, and sort them by reviews, cost, features, and more. Below is a list of products that Vulcan Cyber currently integrates with:
-
1
Google Cloud Platform
Google
Free ($300 in free credits) 55,132 RatingsGoogle Cloud is an online service that lets you create everything from simple websites to complex apps for businesses of any size. Customers who are new to the system will receive $300 in credits for testing, deploying, and running workloads. Customers can use up to 25+ products free of charge. Use Google's core data analytics and machine learning. All enterprises can use it. It is secure and fully featured. Use big data to build better products and find answers faster. You can grow from prototypes to production and even to planet-scale without worrying about reliability, capacity or performance. Virtual machines with proven performance/price advantages, to a fully-managed app development platform. High performance, scalable, resilient object storage and databases. Google's private fibre network offers the latest software-defined networking solutions. Fully managed data warehousing and data exploration, Hadoop/Spark and messaging. -
2
Amazon EC2
Amazon
2 RatingsAmazon Elastic Compute Cloud (Amazon EC2) provides secure, resizable cloud computing capacity. It was designed to make cloud computing at web scale easier for developers. Amazon EC2's web service interface makes it easy to configure and obtain capacity with minimal effort. It gives you complete control over your computing resources and allows you to run on Amazon's proven computing environment. - 3
-
4
Mend.io’s enterprise suite of app security tools, trusted by leading companies such as IBM, Google and Capital One, is designed to help build and manage an mature, proactive AppSec programme. Mend.io is aware of the AppSec needs of both developers and security teams. Mend.io, unlike other AppSec tools that force everyone to use a unified tool, helps them work together by giving them different, but complementary tools - enabling each team to stop chasing vulnerability and start proactively management application risk.
-
5
Qualys VMDR
Qualys
1 RatingThe industry's most flexible, extensible and scalable solution for vulnerability management. Qualys' VMDR is fully cloud-based and provides global visibility into your IT assets and how to protect them. Enterprises are empowered with visibility into cyber risk exposure and can use it to prioritize assets, vulnerabilities, or groups of assets according to business risk. Security teams can take steps to reduce risk. This helps businesses measure their true risk and track the progress of risk reduction. You can identify, assess, prioritize, patch and fix critical vulnerabilities in real-time across your global hybrid IT, OT and IoT landscape. Qualys TruRisk™, which measures risk across assets, vulnerabilities, and groups, can help you organization prevent risk exposure and track the risk reduction over time. -
6
More than 30,000 organizations around the world trust Nessus as the most widely used security technology on the planet. It is also the gold standard in vulnerability assessment. Since the beginning, we have worked closely with the security community. Nessus is continuously optimized based on community feedback in order to provide the best vulnerability assessment solution available. Twenty years later, we are still focused on community collaboration and product innovations to provide the most complete and accurate vulnerability data. This will ensure that you don't miss critical issues that could expose your organization's vulnerabilities. Today, Nessus has been trusted by over 30,000 organizations around the world as the best vulnerability assessment tool and security technology.
-
7
Jira Service Management
Atlassian
$20 per user per month 6 RatingsJira Service Management (formerly Jira Service Desk), empowers Dev/Ops teams to work at high-velocity to respond to business changes quickly and provide great customer and employee service experiences. Tune Jira Service Management for your specific needs. Every team member, from IT to legal to HR, can set up a service desk quickly, and then adapt to scale. Provide great service experiences quickly - without the complexity and cost of traditional ITSM solutions. An open, collaborative platform allows you to track work across your enterprise. You can link issues across Jira, as well as ingest data from other software-development tools, to give your IT support and operations teams richer contextual information that allows them to quickly respond to incidents, requests, and changes. Manage risk and deliver more customer impact. You can accelerate critical development work, eliminate the need for manual labor, and deploy changes quickly with an audit trail for each change. -
8
Amazon Elastic Container Service (Amazon ECS), is a fully managed container orchestration and management service. ECS is used by customers such as Duolingo and Samsung, GE and Cook Pad to run their most sensitive and critical mission-critical applications. It offers security, reliability and scalability. ECS is a great way to run containers for a variety of reasons. AWS Fargate is serverless compute for containers. You can also run ECS clusters with Fargate. Fargate eliminates the need for provisioning and managing servers. It allows you to specify and pay per application for resources and improves security by application isolation by design. ECS is also used extensively in Amazon to power services like Amazon SageMaker and AWS Batch. It is also used by Amazon.com's recommendation engines. ECS is extensively tested for reliability, security, and availability.
-
9
Your cloud data platform. Access to any data you need with unlimited scalability. All your data is available to you, with the near-infinite performance and concurrency required by your organization. You can seamlessly share and consume shared data across your organization to collaborate and solve your most difficult business problems. You can increase productivity and reduce time to value by collaborating with data professionals to quickly deliver integrated data solutions from any location in your organization. Our technology partners and system integrators can help you deploy Snowflake to your success, no matter if you are moving data into Snowflake.
-
10
Slack
Slack
$6.67 per user per month 241 RatingsSlack, a cloud-based project collaboration software solution that facilitates communication between teams, is designed to seamlessly integrate with other organizations. Slack offers powerful tools and services all integrated into one platform. It provides private channels for interaction within smaller teams, direct channels for sending messages to colleagues, as well as public channels that allow members to start conversations across organizations. Slack is available on Mac, Windows and Android as well as iOS apps. It offers a variety of features including chat, file sharing and collaboration, real-time notifications and two-way audio/video, screen sharing, document imaging and activity tracking and logging. -
11
Microsoft Teams
Microsoft
$12.50 per user per month 188 RatingsTeams of engaged people work together to solve today's complex business challenges. We have created an online guide to help you and your team learn the secrets of teamwork. There are no limits to what you can accomplish when you have a place where you can create and make decisions together as a team. Teams allows you to bring everything together in one shared workspace. You can chat, meet, share documents, and use business apps. Your team can get on the same page using group chat, online meetings and calling. Microsoft 365 (formerly Office 365), apps such as Word, Excel, PowerPoint and SharePoint allow you to collaborate on files. To keep your business moving forward, add in your favorite Microsoft apps as well as third-party services. Microsoft 365 provides end-to-end security and administrative control. Teams is for all types of groups. Start with the no-obligation, free version. As part of the best-in class suite of productivity tools, you can also get Team. -
12
CrowdStrike Falcon
CrowdStrike
8 RatingsCrowdStrike Falcon, a cloud-native security platform, provides advanced protection from a wide range cyber threats including malware, ransomware and sophisticated attacks. It uses artificial intelligence (AI), machine learning, and incident response to detect and respond in real-time to threats. The platform uses a lightweight, agent-based solution that continuously monitors the endpoints to detect malicious activity. This provides visibility and protection with minimal impact on system performance. Falcon's cloud architecture ensures rapid updates, scalability and rapid threat response in large, distributed environments. Its comprehensive security capabilities help organizations detect, prevent, and mitigate cyber risks. This makes it a powerful tool in modern enterprise cybersecurity. -
13
Microsoft Azure
Microsoft
21 RatingsMicrosoft Azure is a cloud computing platform that allows you to quickly develop, test and manage applications. Azure. Invent with purpose. With more than 100 services, you can turn ideas into solutions. Microsoft continues to innovate to support your development today and your product visions tomorrow. Open source and support for all languages, frameworks and languages allow you to build what you want and deploy wherever you want. We can meet you at the edge, on-premises, or in the cloud. Services for hybrid cloud enable you to integrate and manage your environments. Secure your environment from the ground up with proactive compliance and support from experts. This is a trusted service for startups, governments, and enterprises. With the numbers to prove it, the cloud you can trust. -
14
Chef transforms infrastructure into code. Chef automates how you build, deploy and manage your infrastructure. Your infrastructure can be as easily modified, tested, and repeated as application code. Chef Infrastructure Management automates infrastructure management automation to ensure configurations are consistently applied in all environments. Chef Compliance makes it easy for the enterprise to enforce and maintain compliance. Chef App Delivery enables you to deliver consistent, high-quality application results at scale. Chef Desktop allows IT teams automate the deployment, management and ongoing compliance for IT resources.
-
15
ServiceNow
ServiceNow
$100 per month 1 RatingDigitize your workflows and they will love you for it. Your company will be more productive and your employees more engaged. ServiceNow makes work more enjoyable for employees. ServiceNow transforms old, manual ways to work into modern digital workflows so customers and employees get what they need when they need it. It's fast, simple, and easy. ServiceNow provides digital workflows that deliver great experiences and increase productivity for employees and enterprises. ServiceNow simplifies the complexity of work with a single enterprise cloud platform. The Now Platform: An intelligent, intuitive cloud platform that allows you to work smarter. You can choose from our workflows, or create your own apps. Our product portfolio is built on the Now Platform and delivers the IT, Employee, Customer, and Customer Workflows that matter. We also offer enterprise solutions to help you drive every aspect of your digital transformation. Get the amazing experiences you desire and unlock the productivity that you need. Now, native mobile capabilities are available for every day work across the enterprise. -
16
Snyk
Snyk
$0Snyk is the leader in developer security. We empower the world’s developers to build secure applications and equip security teams to meet the demands of the digital world. Our developer-first approach ensures organizations can secure all of the critical components of their applications from code to cloud, leading to increased developer productivity, revenue growth, customer satisfaction, cost savings and an overall improved security posture. Snyk is a developer security platform that automatically integrates with a developer’s workflow and is purpose-built for security teams to collaborate with their development teams. -
17
Chef Infra
Progress Software
$127 per yearChef®, Infra®, configuration management software eliminates manual effort and ensures infrastructure stays consistent and compliant throughout its lifetime, even in complex, heterogeneous, and large-scale environments. As code, define configurations and policies that can be tested and enforceable. They can also be delivered at scale in automated pipelines. Configurations should not be modified if the system is not in the desired state. If necessary, correct configuration drift. You can manage Windows and Linux systems on prem, ARM systems running on the cloud, or Macs laptops at the edge. You can use simple declarative definitions to perform common tasks, or you can easily modify them to meet the most specific environmental requirements. -
18
NorthStar Navigator
NorthStar.io, Inc.
$8 per deviceNorthStar allows organizations to easily incorporate threat intelligence and business context to enable a risk-based approach to their vulnerability management program. The Platform automates the collection, normalization, consolidation and correlation of threat intelligence, asset, software, and vulnerability data. Combined with a transparent scoring model, NorthStar automates the tedious and manual process of prioritizing vulnerability remediation. -
19
Jira Work Management
Atlassian
$5 per user per monthSoftware for managing business projects. Jira Work Management (formerly Jira Core) allows you to see all information about a project at a glance. Keep your team organized and manage your projects. A workflow is the key to managing projects and tasks in Jira Work Management. Workflows help you organize your process and allow your team to track your tasks. Jira Work Management Cloud instances also include boards that allow users to visualize their workflows and drag-and-drop tasks from to be done to done. Only available in the cloud. Task management is made easier by having statuses, comments and attachments all in one place. Everyone can see the details of a project at a glance without needing to email or set up meetings. Notifications let you know when your attention is required. What are the tasks that are still being worked on? Which team member has too many tasks? Jira Work Management allows you to track the status of your team’s projects in a variety of ways. You can do this with a quick overview or customized dashboards. -
20
Puppet Enterprise
Puppet
$120 per monthPuppet is changing the way continuous operations can be done. Automate your environment with products that are responsive, predictive and predictive. 90% of the US's largest companies use Puppet's infrastructure to simplify complex IT infrastructure. Puppet is redefining continuous operations. Our platform empowers IT operations teams to automate their infrastructure. This allows them to deliver at cloud speed, cloud scale. Our flexible approach to infrastructure automation allows teams to innovate quickly, while ensuring security and compliance. We are leading the charge in predicting at scale and moving beyond find-and-fix. No more surprises. We work at the speed of business and deliver infrastructure automation software that promises your business and gives your employees back their time. Peace of mind. -
21
Burp Suite
PortSwigger
$399 per user per yearPortSwigger brings you Burp Suite, a leading range cybersecurity tools. Superior research is what we believe gives our users a competitive edge. Every Burp Suite edition shares a common ancestor. Our family tree's DNA is a testament to decades of research excellence. Burp Suite is the trusted tool for your online security, as the industry has proven time and again. Enterprise Edition was designed with simplicity in mind. All the power of Enterprise Edition - easy scheduling, elegant reports, and straightforward remediation advice. The toolkit that started it all. Discover why Burp Pro is the preferred tool for penetration testing for over a decade. Fostering the next generation of WebSec professionals, and promoting strong online security. Burp Community Edition allows everyone to access the basics of Burp. -
22
Jira Align
Atlassian
$75 per user per monthJira Align (formerly AgileCraft), connects your business strategy and technical execution. To make all work visible across your enterprise, aggregate team-level data. To determine scope, roadmaps, and dependencies across portfolios and teams, get everyone on the same page. To drive faster and more reliable outcomes, connect strategic investments with customer value to accelerate the delivery of results. Investors, analysts, employees should be made aware of the benefits of funding strategic initiatives. To drive enterprise value, connect strategy and execution to support your high-level vision and mission. Sprint work should be done in line with your company's high level strategy. Ensure that programs run smoothly and that resources are properly allocated to ensure on-time delivery. You can manage idea intake, prioritize feature backlogs, and track progress using real-time roadmaps. A framework that scales agile in your company will enable digital transformation. -
23
The NTT Application Security Platform offers all the services necessary to protect the entire software development cycle. We help organizations reap the benefits of digital transformation without worrying about security. Be smart about application security. Our application security technology is the best in its class. We constantly scan your code and detect attack vectors. NTT Sentinel Dynamic identifies and verifies all vulnerabilities in websites and web applications. NTT Sentinel Source, NTT Scout scans your entire source code and identifies vulnerabilities. They also provide remediation advice and detailed vulnerability descriptions.
-
24
JFrog Xray
JFrog
DevSecOps Next Generation - Securing Your Binaries. Identify security flaws and license violations early in development and block builds that have security issues before deployment. Automated and continuous auditing and governance of software artifacts throughout the software development cycle, from code to production. Additional functionalities include: - Deep recursive scanning components, drilling down to analyze all artifacts/dependencies and creating a graph showing the relationships between software components. - On-Prem or Cloud, Hybrid, Multi-Cloud Solution - An impact analysis of how one issue in a component affects all dependent parts with a display chain displaying the impacts in a component dependency diagram. - JFrog's vulnerability database is continuously updated with new component vulnerabilities data. VulnDB is the industry's most comprehensive security database. -
25
Amazon Inspector
Amazon
Amazon Inspector is an automated security service that helps to improve security and compliance for applications deployed on AWS. Amazon Inspector automatically evaluates applications for vulnerabilities, exposure, and deviations to best practices. After performing an assessment, Amazon Inspector generates a detailed list with security findings sorted by severity. These findings can be viewed directly or as part a detailed assessment report that is available via the Amazon Inspector console, API. Amazon Inspector security assessments can help you identify vulnerabilities and unintended network access to your Amazon EC2 instances. Amazon Inspector assessments can be accessed as pre-defined rules packages that are mapped to common security best practice and vulnerability definitions. -
26
ServiceNow Asset Management
ServiceNow
Asset Management automates your IT asset lives with intuitive workflows. Make informed decisions about asset capacity, refresh and vendors. Control and know your assets Optimize asset lifecycle investments for better IT services and smarter decisions Reduce asset costs Reduce asset costs and automate asset lifecycle process to reduce wasted resources Mitigate risk To limit risks, enforce asset policies and regulatory requirements. -
27
Black Duck
Synopsys
Black Duck has been helping security, legal, and development teams around the world for over 15 years to manage the open source risks. Built on the Black Duck KnowledgeBase™--the most comprehensive database of open source component, vulnerability, and license information--Black Duck software composition analysis solutions and open source audits give you the insight you need to track the open source in your code, mitigate security and license compliance risks, and automatically enforce open source policies using your existing DevOps tools and processes. Black Duck offers a comprehensive software composition analysis (SCA), which helps you manage security, quality, and compliance risks that can be caused by third-party and open source code in containers and applications. Black Duck provides unparalleled visibility into third-party codes, allowing you to manage it throughout your software supply chain as well as the entire application life cycle. -
28
Rapid7 InsightVM
Rapid7
You can better understand the risks in your current environment and work with technical teams. InsightVM's shared view and common language can bring together traditionally siloed groups and help drive impact. You can take a proactive approach to security by tracking and establishing metrics that will help you track progress and create accountability. InsightVM not only provides visibility into the vulnerabilities in your modern IT environment--including local, remote, cloud, containerized, and virtual infrastructure--but also clarity into how those vulnerabilities translate into business risk and which are most likely to be targeted by attackers. InsightVM isn't a magic bullet. It provides the shared view and common language that are needed to bring together traditionally siloed groups and drive impact. It supports proactive vulnerability management through tracking and metrics that provide accountability for remediators, demonstrate the impact across teams, celebrate progress, and encourage celebrations. -
29
Prisma Cloud
Palo Alto Networks
Comprehensive cloud native security. Prisma™, Cloud provides comprehensive cloud native security. It enables you to create cloud-native applications with confidence. All aspects of the application development process have changed with the move to the cloud, including security. As organizations adopt cloud native approaches, security and DevOps teams will face increasing numbers of entities to protect. Developers are challenged to create and deploy quickly in ever-changing environments. Security teams remain responsible for ensuring compliance throughout the entire lifecycle. Some of our customers have firsthand accounts of PrismaCloud's best-in class cloud security capabilities. -
30
Tenable One
Tenable
Tenable One unifies security visibility and insight across the attack surface. This allows modern organizations to isolate and eliminate priority cyber exposures, from IT infrastructure, cloud environments, critical infrastructure, and everywhere else. The only AI-powered exposure platform in the world. Tenable's leading vulnerability management sensors allow you to see every asset on your entire attack surface, from cloud environments to operational technology, infrastructure to containers and remote workers to web-apps. Tenable's machine learning-powered predictions, which include more than 20 trillion aspects related to threat, vulnerability and misconfiguration information, reduce remediation effort by allowing you to focus on the most important risks. By communicating objective measures of risks, you can drive improvements to reduce the likelihood of a business impacting cyber event occurring. -
31
ServiceNow Configuration Management Database
ServiceNow
You need to be able to identify the assets in your IT environment and have accurate configuration data. This will allow you to manage and improve your systems effectively. It's easy to understand the IT environment of your organization with a CMDB (configuration management database). This database is especially useful in areas such as service impact analysis, asset management and compliance. The ServiceNow®, CMDB is a single record system for IT. The CMDB can be paired with ServiceNow Service Mapping to make it service-aware. This allows your ServiceNow applications and services to be service aware. Your CMDB gives you full visibility into your infrastructure and services, allowing you to make better decisions and take greater control of your environment. -
32
Qualys TruRisk Platform
Qualys
$500.00/month Qualys TruRisk Platform, formerly Qualys Cloud Platform. The revolutionary architecture behind Qualys IT, security and compliance cloud apps. Qualys TruRisk Platform provides a continuous, always on assessment of your global security, compliance, and IT posture. You can see all your IT assets in 2 seconds, no matter where they are located. With automated, built in threat prioritization and patching, as well as other response capabilities, this is a complete end-to-end solution. Qualys TruRisk Platform sensor are always active, whether on premises, endpoints, mobile, containers, or in the cloud. This gives you continuous visibility of your IT assets in just 2 seconds. The sensors are self-updating and centrally managed, they can be remotely deployed, and they can also be virtual appliances or lightweight agents. Qualys TruRisk Platform is an end-toend solution that allows you to avoid the costs and complexity of managing multiple security vendors. -
33
Microsoft Intune
Microsoft
Modernize IT service delivery to your workplace. Microsoft Intune enables you to simplify modern workplace management and achieve digital transform with Microsoft Intune. Microsoft Intune creates the most productive Microsoft 365 environment that allows users to work on any device or app they choose while protecting their data. Securely manage iOS and macOS devices using a single management solution. Automate deployment, provisioning and policy management. App delivery and updates can be automated. A highly scalable, distributed cloud service architecture ensures you stay up-to-date. The intelligent cloud provides insights and baselines that will help you to set security policies and configure settings. Protect data by ensuring that you don't have to manage the devices of employees or partners who access work files. Intune app protection policies provide granular control over Office 365 data on mobile devices. -
34
Checkmarx
Checkmarx
The Checkmarx Software Security Platform is a centralized platform for managing your software security solutions. This includes Static Application Security Testing, Interactive Application Security Testing and Software Composition Analysis. It also provides application security training and skill development. The Checkmarx Software Security Platform is designed to meet the needs of every organization. It offers a wide range of options, including on-premises and private cloud solutions. Customers can immediately start securing code without having to adapt their infrastructure to one method. The Checkmarx Software Security Platform is a powerful tool that transforms secure application development. It offers industry-leading capabilities and one powerful resource. -
35
GroundHog FMS
GroundHog
Our fleet management system is state-of the-art and uses AI-based scheduling algorithms. It also incorporates best-of-breed technology and off-the shelf hardware to increase the amount of tons that can be mined per shift. This makes it safer and faster. Optimize haul cycles continuously to maximize shovel- and excavator performance in order to meet the crushers' TPH requirements. To streamline all load-haul processes, automatically capture cycle time data from both onboard telemetry systems and high-precision GPS system. Dynamically optimize routing to various stockpiles and feed points to meet blend and tons per hour requirements. Monitor machine health, tire performance, fuel consumption, and other factors to optimize equipment utilization and minimize downtime. GroundHog has developed relationships with many OEMs and after-market sensors makers, including payload, tire pressure and weighbridges, load scanners and drills. The system is based on the same algorithms and technology infrastructures as companies like Uber and Facebook. -
36
GroundHog Safety Training LMS
GroundHog
GroundHog Safety Training LMS is used by Safety Directors to ensure that all employees are properly trained in safety before they start their job. GroundHog QR Tags are used by trainers to quickly identify every task that an employee has been trained on. The next training they will need to complete in order to meet their individual development goals. Safety directors can monitor their Hog score and receive weekly reports. They also get 30, 60, 90, and 90-day reminders to employees who need to be retrained. GroundHog Safety Training LMS integrates seamlessly with many HR management systems and fleet management system to give management a 360-degree view on every employee. Supervisors can quickly find alternative resources to do a job if an employee is not available. You can conduct training and issue training certificates that are compliant from anywhere. Safety teams can organize training data by location, crew, job type and seniority. -
37
rapidInspect
GroundHog
RapidInspect is a safety and digital inspection app that helps miners meet MSHA's digital recordkeeping regulations. RapidInspect is easy to use and can be implemented in just 15 minutes. It records hazards and sends alerts to miners and their supervisors via a tablet or mobile device. Corrective action is taken immediately. Mine managers have access to workplace exam records in compliance with MSHA rules. To quickly increase mine safety, mine managers have access to powerful safety analytics and geographic hazards viewing. RapidInspect was founded on the belief that safety should go beyond compliance. Health & safety personnel regularly inspect workplace areas using a tablet or mobile phone to find hazards or risks to severe injury or harm to anyone. They communicate immediately the potential hazards to the mine manager via real-time messaging and notifications through the rapidInspect platform. -
38
Microsoft Endpoint Manager
Microsoft
Transformative management and security that is at your service wherever you are. Secure, integrated management solutions. A seamless, end to end management solution that combines functionality, data and new intelligent actions from Microsoft Intune and Microsoft System Center Configuration Manager. Native integration with cloud-powered security control from Microsoft, including risk-based conditional data and app access. Analytics can be used to identify and resolve issues that impact users. With the familiar experience that users expect, productivity and collaboration can be improved. IT flexibility is key to enabling you to support different scenarios, including BYOD (bring your own device) and corporate-owned devices. Rapid rollout of services and devices, with seamless integration across our stack, will accelerate time to value. You can minimize disruption to IT, users, or processes, while maximising your investment and security. -
39
Veracode
Veracode
Veracode provides a holistic and scalable solution to manage security risk across all your applications. Only one solution can provide visibility into the status of all types of testing, including manual penetration testing, SAST, DAST and SCA. -
40
Most exploits target known vulnerabilities--those for which a patch has been available for at least a year. To ensure that systems are properly patched, you can't rely only on manual processes or users. Ivanti DSM incorporates Patch Management to identify and fix vulnerabilities across heterogeneous OSes and configurations. This includes all major third-party applications. Your entire organization is protected from all threats, including those that affect your servers, desktops, or laptops.
- Previous
- You're on page 1
- Next