What Integrates with macOS Sierra?
Find out what macOS Sierra integrations exist in 2024. Learn what software and services currently integrate with macOS Sierra, and sort them by reviews, cost, features, and more. Below is a list of products that macOS Sierra currently integrates with:
-
1
Criminal IP is a cyber threat intelligence search engine that detects vulnerabilities in personal and corporate cyber assets in real time and allows users to take preemptive actions. Coming from the idea that individuals and businesses would be able to boost their cyber security by obtaining information about accessing IP addresses in advance, Criminal IP's extensive data of over 4.2 billion IP addresses and counting to provide threat-relevant information about malicious IP addresses, malicious links, phishing websites, certificates, industrial control systems, IoTs, servers, CCTVs, etc. Using Criminal IP’s four key features (Asset Search, Domain Search, Exploit Search, and Image Search), you can search for IP risk scores and vulnerabilities related to searched IP addresses and domains, vulnerabilities for each service, and assets that are open to cyber attacks in image forms, in respective order.
-
2
Netdata, Inc.
Free 20 RatingsMonitor your servers, containers, and applications, in high-resolution and in real-time. Netdata collects metrics per second and presents them in beautiful low-latency dashboards. It is designed to run on all of your physical and virtual servers, cloud deployments, Kubernetes clusters, and edge/IoT devices, to monitor your systems, containers, and applications. It scales nicely from just a single server to thousands of servers, even in complex multi/mixed/hybrid cloud environments, and given enough disk space it can keep your metrics for years. KEY FEATURES: Collects metrics from 800+ integrations Real-Time, Low-Latency, High-Resolution Unsupervised Anomaly Detection Powerful Visualization Out of box Alerts systemd Journal Logs Explorer Low Maintenance Open and Extensible Troubleshoot slowdowns and anomalies in your infrastructure with thousands of per-second metrics, meaningful visualisations, and insightful health alarms with zero configuration. Netdata is different. Real-Time data collection and visualization. Infinite scalability baked into its design. Flexible and extremely modular. Immediately available for troubleshooting, requiring zero prior knowledge and preparation. -
3
Apps you love. You can trust the App Store. The App Store has been trusted and safe for over a decade to find and download apps. The App Store is not just a storefront. It's a destination that offers amazing experiences. We ensure that all apps we offer meet the highest standards of privacy, security, content, and confidentiality. We offer almost two million apps and want you to feel confident about each one. Stories and collections that inform and help. Daily updates.
-
4
IRI FieldShield
IRI, The CoSort Company
Varies by component/scope IRI FieldShield® is a powerful and affordable data discovery and de-identification package for masking PII, PHI, PAN and other sensitive data in structured and semi-structured sources. Front-ended in a free Eclipse-based design environment, FieldShield jobs classify, profile, scan, and de-identify data at rest (static masking). Use the FieldShield SDK or proxy-based application to secure data in motion (dynamic data masking). The usual method for masking RDB and other flat files (CSV, Excel, LDIF, COBOL, etc.) is to classify it centrally, search for it globally, and automatically mask it in a consistent way using encryption, pseudonymization, redaction or other functions to preserve realism and referential integrity in production or test environments. Use FieldShield to make test data, nullify breaches, or comply with GDPR. HIPAA. PCI, PDPA, PCI-DSS and other laws. Audit through machine- and human-readable search reports, job logs and re-ID risks scores. Optionally mask data when you map it; FieldShield functions can also run in IRI Voracity ETL and federation, migration, replication, subsetting, and analytic jobs. To mask DB clones run FieldShield in Windocks, Actifio or Commvault. Call it from CI/CD pipelines and apps. -
5
IRI Voracity
IRI, The CoSort Company
IRI Voracity is an end-to-end software platform for fast, affordable, and ergonomic data lifecycle management. Voracity speeds, consolidates, and often combines the key activities of data discovery, integration, migration, governance, and analytics in a single pane of glass, built on Eclipse™. Through its revolutionary convergence of capability and its wide range of job design and runtime options, Voracity bends the multi-tool cost, difficulty, and risk curves away from megavendor ETL packages, disjointed Apache projects, and specialized software. Voracity uniquely delivers the ability to perform data: * profiling and classification * searching and risk-scoring * integration and federation * migration and replication * cleansing and enrichment * validation and unification * masking and encryption * reporting and wrangling * subsetting and testing Voracity runs on-premise, or in the cloud, on physical or virtual machines, and its runtimes can also be containerized or called from real-time applications or batch jobs. -
6
Javelin PDF Reader
Drumlin Security
FreeJavelin PDF readers offer all the core functionality required to view standard PDF files as well as encrypted PDF files using Drumlin Publisher (.drmz or.drmx) files. These readers can display internal and external hyperlinks, contents/navigation tree, a range page display formats, as well as document text searching, annotation, markup, and more. Encrypted files are safe against copying and onwards distribution. You may have restrictions on how they can be printed and if they expire. These settings can be found in the Javelin readers' properties or info facilities. The Mac OSX/Catalina Javelin3 software is recommended for visually impaired users. This software supports text-to speech conversion. Javelin can be used on a Mac or PC connected to a large corporate network that has a restricted firewall. -
7
iBoostUp
iBoostUp
$0iBoostUp is a powerful Mac optimization program that places a strong emphasis upon security. Spyware Doctor uses cloud-based signature scanning and advanced algorithms to detect malicious apps. HID Implant Guard alerts and protects against modified peripherals such as USB drives and Lightning cables that could compromise your Mac. BoostUp offers a behavioral Keylogger Guard, an ARP Cache Poisoning Detector, and an Application Uninstaller to delete all traces of uninstalled applications. It also offers a Duplicate File Finder that allows you to free up disk space by removing duplicate content files. iBoostUp is a great tool for Mac users who want their system to run at its best and protect their privacy from various threats. We are not affiliated to Symantec Corporation or Norton, iAntiVirus or PC Tools. Instead, we were founded by ex-employees who have a wealth knowledge in this field. -
8
Siri
Apple
Siri is the most popular intelligent assistant in the world. Your apps can be used to help users with their voice, intelligent suggestions or the Shortcuts app. Your apps can reach users across Apple platforms via Shortcuts on watchOS and SiriKit Music for HomePod. Shortcuts API allows users to quickly complete tasks related to your app by speaking or tapping. Siri intelligently matches users' daily routines to your apps to suggest shortcuts when they are needed on the Lock screen or in widgets, in Search, and from the Siri watch face. Siri can also ask follow-up questions which allows shortcuts to get more done. Siri can ask follow-up questions when a user orders takeout. Siri will then show a list of favorites from an app that allows users to choose from. -
9
MacMister Email Backup
MacMister
Email Backup software is a great tool for Mac users to export data from multiple webmails to hard drive/IMAP servers/cloud servers. Instant conversion of email from one webmail to another. This increases user efficiency. Protect meta headers & email properties like hyperlinks, images, formatting, subject, date, time, etc. Ensure that the folder hierarchy and data integrity are maintained throughout the entire email backup process. Select the Start Backup button to start the backup process. A notification will appear once the conversion is complete. The destination folder will open with the resulting file and Savelog.txt, which contains the email backup information.
- Previous
- You're on page 1
- Next