What Integrates with Wazuh?

Find out what Wazuh integrations exist in 2024. Learn what software and services currently integrate with Wazuh, and sort them by reviews, cost, features, and more. Below is a list of products that Wazuh currently integrates with:

  • 1
    Revel Systems Reviews
    Leading cloud-based POS system. This platform is designed to help you grow your business and achieve your goals. This platform is designed to scale with your company and provide strong ROI. Revel's point of sale is easy to use and will allow for faster transactions, security, stability, as well as comprehensive operational management. Our platform was the first to use the iPad as a point-of-sale device. We have continued to improve our platform to better serve your business. Our solution is the most robust point-of-sale system and business management platform that can streamline your business operations. From inventory management to online ordering to customer relationship management (CRM), our solution can deliver unparalleled results. Revel's iPad POS is a simple, intuitive way to simplify and speed up transaction processing. You can use the familiar interface of the iPad for easy employee training.
  • 2
    Salesforce Reviews
    Top Pick

    Salesforce

    Salesforce

    $25.00/month/user
    60 Ratings
    Salesforce helps sales teams improve their performance and reach their goals. Salesforce is the most widely used CRM in the world. Salesforce gives teams access to tools that enable them to grow their accounts and find new customers. They also allow them to close deals faster and from any location. Salesforce offers many features, including contact management, opportunity management and lead management, email integrations, reports and dashboards as well as sales forecasting, files sync-and-share, and reports and dashboards. You will spend less time looking at spreadsheets and more time managing your business. No software, no hardware, no hassle. In minutes, our simple setup assistant will streamline sales and answer customer questions. Connect data from sales, service, marketing to create seamless, personalized experiences for buyers. You can see a complete customer view, including their account, activity history, connections, and more. You can also pull in social data to get a deeper understanding of your customers.
  • 3
    JupiterOne Reviews

    JupiterOne

    JupiterOne

    $2000 per month
    Go beyond asset management. Turn complexity into capability. Our cyber asset analysis platform empowers security teams by providing total visibility into the assets, context and risks that make up their attack surface. With JupiterOne, organizations transform asset visibility from frustration into strength.
  • 4
    Parny Reviews

    Parny

    Parny

    $7 per month
    Get AI recommendations for alerts. It can generate alert recommendations based on your selected persona. Ask Parny AI offers three personas: DevOps Engineer, Senior Developer, and Database Administrator. Our personas have been trained to give the best recommendations based on your alerts. You can add your team members easily to the list of on-call team members. Alert the right person when it's needed. Share the on-call responsibilities across your team using on-call schedules, and automatic escalation. We help engineering teams be more proactive, resolve issues faster and deliver a seamless operation experience. Get custom analytics for you organization, teams, users and services. Improve your organization's performance by staying up-to-date with your performance.
  • 5
    OverSOC Reviews
    rive your attacker surface with a solitary source of truth. Gather and unify all your IT & Cyber Data to discover inventory gaps, prioritize remediation actions and accelerate audits. Data from all tools used by IT and SecOps, as well as data collected from your business teams via flat files can be gathered and brought together in one database. Automate data ingestion, standardization and consolidation in a common framework. No more duplication of assets, no copy-pasting in spreadsheets or manual dashboards. Integrate external data sources, such as security alerts from certified sources, to enrich your data. Use the filter system to query your cyber data and get accurate information about the status of your system. OverSOC offers pre-recorded filtering based on customer needs. You can also create your own filters to share with collaborators.
  • 6
    IVR Technology Group Reviews

    IVR Technology Group

    IVR Technology Group

    Secure automated payments for your customers by text and phone We integrate easily with your gateway and customer information. Proactive automated outbound campaigns that include voice, text, or email messaging will keep your customers informed. Inbound and outbound automated surveys via phone can provide real-time customer feedback. Your customers will love the self-service automation you offer. We do all the heavy lifting so you can have happy customers. Our Managed Communications Platform as a service (CPaaS) is the Compass Automation Platform. It provides a secure environment for voice or text applications. We refine it to meet your needs. We manage all aspects of application management, security, and carrier management for you, so your IT team can focus on your business.
  • 7
    OctoXLabs Reviews
    In minutes, you can detect, prioritize and respond to security threats. Improve your visibility with Cyber asset attack surfaces management. Manage your cybersecurity inventory. Discover the vulnerabilities of all your assets. Fill in the gaps created by agent-based asset managers. Find out about server, client and cloud gaps, as well as IoT devices. Octoxlabs uses agentless technology to enhance your visibility. You can always keep track of the installed applications licenses. You can view how many licenses are left, how many you've used, and when the renewal is due from one place. You can always keep track of the installed application licenses. Users that you need to open separately for each application. Integrate intelligence services with your user data to enrich it. You can follow the local account for all products. Devices with a vulnerability, but no security agent installed, can be detected.
  • Previous
  • You're on page 1
  • Next