Best IT Security Software for Pipedrive

Compare the Top IT Security Software that integrates with Pipedrive as of September 2025

This a list of IT Security software that integrates with Pipedrive. Use the filters on the left to add additional filters for products that have integrations with Pipedrive. View the products that work with Pipedrive in the table below.

What is IT Security Software for Pipedrive?

IT security software is designed to protect information technology (IT) systems, networks, and data from cyber threats, such as malware, hacking, and unauthorized access. These tools provide various features such as antivirus protection, firewalls, encryption, intrusion detection and prevention systems, and vulnerability management to ensure the integrity, confidentiality, and availability of sensitive information. IT security software helps organizations detect, prevent, and respond to security incidents, mitigate risks, and ensure compliance with industry regulations. It is critical for businesses and individuals to safeguard against cyberattacks, data breaches, and other security vulnerabilities. Compare and read user reviews of the best IT Security software for Pipedrive currently available using the table below. This list is updated regularly.

  • 1
    10Duke Enterprise
    10Duke Enterprise is a cloud-based, scalable and flexible software licensing solution enabling software vendors to easily configure, manage and monetize the licenses they provide to their customers in real-time. 10Duke enables you to gain a single point of license control for desktop, SaaS, and mobile apps, APIs, VMs and devices. It’s cloud-native, supports all license models, integrates with CRM & Ecommerce, has a built-in Customer Identity Management solution, and supports offline scenarios. 10Duke Enterprise is used by SMBs and Fortune 500 customers alike, and is SOC2 compliant. 10Duke Enterprise is used across a wide range of industries by the fastest-growing software vendors that offer desktop, SaaS and mobile apps, devices, APIs and VMs. It's specifically designed for fast-growing software businesses looking to scale up licensing & minimize friction. 10Duke Enterprise is used around the world by leading brands including Trimble, Causeway, Seequent, Maxon and Steinberg
    Starting Price: $199/month
    Partner badge
    View Software
    Visit Website
  • 2
    Egnyte

    Egnyte

    Egnyte

    Egnyte provides a unified content security and governance solution for collaboration, data security, compliance, and threat detection for multicloud businesses. More than 16,000 organizations trust Egnyte to reduce risks and IT complexity, prevent ransomware and IP theft, and boost employee productivity on any app, any cloud, anywhere.
    Starting Price: $10 per user per month
  • 3
    Rippling

    Rippling

    Rippling

    Streamline your business with Rippling’s all-in-one platform for HR, IT, payroll, and spend management. Effortlessly manage the entire employee lifecycle, from hiring to benefits administration. Automate HR tasks, ensure compliance, and streamline approvals. Simplify IT with device management, software access, and compliance monitoring, all from one dashboard. Enjoy timely payroll, real-time financial visibility, and dynamic spend policies. Rippling empowers your business to save time, reduce costs, and enhance efficiency, allowing you to focus on growth. Experience the power of unified management with Rippling today.
  • 4
    FileCloud

    FileCloud

    FileCloud

    FileCloud is a hyper-secure EFSS (enterprise file sync and share) platform that provides industry leading compliance, data governance, data leak protection, data retention and digital rights management capabilities. Workflow automation and granular control of content sharing across most enterprise platforms are fully integrated into the complete EFSS stack. FileCloud is a leader in content governance and collaboration for unstructured data, trusted and used worldwide across Global 1000 enterprises, educational institutions, government organizations, and service providers. Granular control of content sharing is fully integrated into the stack through comprehensive audit logs and access permissions, and the Compliance Center helps with regulations like GDPR, HIPAA, and NIST 800-171 (among others). FileCloud also provides Zero Trust File Sharing® an industry first innovation that allows users to share sensitive data via an encrypted zip file that cannot be accessed by unauthorized user
    Starting Price: $6.00/month/user
  • 5
    Teamstack

    Teamstack

    Teamstack

    Never compromise security for convenience, choose both. Grow your team seamlessly by automating identity management for your web, mobile and legacy apps. Take efficiency to another level by integrating day-to-day applications with our identity management platform and enable employees, contractors and customers to work together seamlessly. Take advantage of pre-built integrations, Single Sign-On and one-click user provisioning and allow your team to conveniently sign in to any application passwordless with multi-factor authentication. Your workforce deserves easy access to your applications — whether they are cloud-based, custom-built or even integrated on-premise. High standards in identity management should not be limited to Fortune 500s — gain access to best-in-class security and accessibility features that protect your business, boost your efficiency and save valuable time. Whenever an employee tries to access a cloud app his login is now compliant with our access policies.
    Starting Price: $3 per user per month
  • 6
    KloudMate

    KloudMate

    KloudMate

    Squash latencies, detect bottlenecks, and debug errors. Join a rapidly expanding community of businesses from around the world, that are achieving 20X value and ROI by adopting KloudMate, compared to any other observability platform. Quickly monitor crucial metrics, and dependencies, and detect anomalies through alarms and issue tracking. Instantly locate ‘break-points’ in your application development lifecycle, to proactively fix issues. View service maps for every component in your application, and uncover intricate interconnections and dependencies. Trace every request and operation, providing detailed visibility into execution paths and performance metrics. Whether it's multi-cloud, hybrid, or private architecture, access unified Infrastructure monitoring capabilities to monitor metrics and gather insights. Supercharge debugging speed and precision with a complete system view. Identify and resolve issues faster.
    Starting Price: $60 per month
  • 7
    ScoreDetect

    ScoreDetect

    ScoreDetect

    Boost your audience’s trust, so your work stands out from others. We offer ways to help you display trust markers so that you can show your audience that you are the original creator. ScoreDetect has you covered with a fast, easy, and secure way to protect your digital content with the most integrations in the industry we know of. We can also assist you with your technical integrations in our Enterprise plan. ScoreDetect is an official partner of the SKALE blockchain, an eco-friendly blockchain with zero gas fees and a sustainable, predictable cost model. SKALE reduces the high energy usage associated with blockchain mining and transaction fees, making it an environmentally-friendly blockchain solution. Reduce your carbon footprint with our eco-friendly blockchain technology.
    Starting Price: $11.31 per month
  • 8
    Zoho Directory
    Zoho Directory is a cloud-based identity and access management platform designed to streamline authentication, authorization, and user management for organizations. It offers Single Sign-On (SSO) capabilities, allowing employees to access multiple applications with a single set of credentials, thereby enhancing security and user convenience. The platform supports Multi-Factor Authentication (MFA), adding an extra layer of protection against unauthorized access. Device authentication ensures secure access to both applications and devices, enabling employees to use the same credentials across platforms. Zoho Directory also provides robust provisioning features, allowing IT administrators to create and manage user profiles across various applications directly from the platform, reducing the time spent on repetitive tasks. Integration with existing directories, such as Microsoft Active Directory and Azure AD, is facilitated through directory stores.
    Starting Price: $1.70/user/month
  • 9
    Keepnet Labs

    Keepnet Labs

    Keepnet Labs

    Keepnet’s extended human risk management platform empowers organizations to build a security culture with AI-driven phishing simulations, adaptive training, and automated phishing response, helping you eliminate employee-driven threats, insider risks, and social engineering across your organization and beyond. Keepnet continuously assesses human behaviors through AI-driven phishing simulations across email, SMS, voice, QR codes, MFA, and callback phishing to reduce human-driven cyber risks. Keepnet's adaptive training paths are tailored to individual risk levels, roles, and cognitive behaviors, ensuring that secure behaviors are embedded to continuously reduce human cyber risk. Keepnet empowers employees to report threats instantly. Using AI-driven analysis and automated phishing responses, security admins respond 168x faster. Detects employees who frequently click phishing links, mishandle data, or ignore security policies.
    Starting Price: $1
  • 10
    AuthPoint

    AuthPoint

    WatchGuard

    Our unique multi-factor authentication (MFA) solution not only helps to reduce the likelihood of network disruptions and data breaches arising from lost or stolen credentials, but we deliver this important capability entirely from the Cloud for easy set-up and management. AuthPoint goes beyond traditional 2-Factor Authentication (2FA) by considering innovative ways to positively identify users, and our large ecosystem of 3rd party integrations means that you can use MFA to protect access. Ultimately, WatchGuard AuthPoint is the right solution at the right time to make MFA a reality for the businesses who desperately need it to block attacks. AuthPoint uses a push message, QR code, or one-time password (OTP) as an additional factor proving your identity, and our mobile device DNA matches the authorized user’s phone when granting access to systems and applications. Therefore, any attacker who clones a user’s device in an attempt to access a protected system would be blocked.
  • 11
    elba

    elba

    elba

    elba is the ultimate experience to secure your team in their daily work. Scan, monitor, and resolve your vulnerabilities at scale. Your company’s security is super-powered by our collaborative approach. Detect all the sensitive data shared externally, and reduce your risks of data loss. Automatically remediate your potential alerts with the power of employees' context. Get a full visibility of all SaaS apps ever used in your company. Clean unused, non-compliant, and risky apps. Reduce phishing risks by 99% and nudge your employees to activate MFA across all SaaS apps. Educate your collaborators from day one with a delightful experience. At every step of your collaborators' journey, elba ensures that your team is aware and trained in your latest internal policy requirements. Security guidelines, GDPR, SOC2, and more, we got you covered. We dramatically reduce phishing risk, with our automated, hyper-customized phishing. Track their improvement as weeks go by and measure their progress.
  • 12
    Zelt

    Zelt

    Zelt

    Zelt is a comprehensive, all‑in‑one human capital management (HCM) platform designed to manage the full employee lifecycle within a single, unified system. It centralizes employee data and automates workflows across HR, payroll, benefits, time‑off, performance, engagement, device provisioning, app access, and contractor management. With Zelt, teams can centralize onboarding, document storage, custom approval processes, reminders, and regulatory compliance; automate payroll processing, benefits enrolment and reconciliation, and global contractor payments; manage time‑off requests (including holiday, sick, WFH, parental leave) tightly integrated with payroll; oversee IT ops by provisioning and securing apps and devices, spotting inactive access, and remotely managing hardware; and facilitate people development through engagement surveys, performance reviews with anonymity features and automated timelines, and goal‑setting tools aligned to key results.
    Starting Price: $5 per month
  • 13
    Youzer

    Youzer

    YOUZER

    The unique user repository informs you of the arrivals and departures of employees, temporary workers, service providers, etc. in real time. You can launch account creation/suspension actions with packages that you have set up. Youzer connects to all your applications to analyse and supervise all access accounts. Regularly check the alignment of each employee's authorisations. Everyone has access to what they need: no more, no less. Regular analysis of orphaned accounts, inconsistent authorisations, specific access rights, sensitive security groups, etc. A sales person, a technician, a consultant... The accounts to be created are different depending on the profile of the user who arrives. The resource packages allow you to create the right accounts for the right users.
  • 14
    StrikeReady

    StrikeReady

    StrikeReady

    StrikeReady delivers the industry's first unified, vendor-agnostic, AI-powered security command center, purpose-built to optimize, centralize, and accelerate a company’s threat response. StrikeReady’s platform levels the entire security team by centralizing, analyzing, and operationalizing security data across a company’s entire security tech stack. StrikeReady empowers smarter, faster decision-making with actionable insights by providing security teams with real-time, holistic, end-to-end visibility across an ever-changing security ecosystem. This transforms SOC teams into proactive defense teams by allowing them to stay ahead of constantly evolving threats. StrikeReady delivers a revolutionary, AI-powered security command center that is changing the way SOC teams work and defend. The platform is the first to be truly vendor-neutral and seamless, providing a unified, end-to-end view of your entire security operation.
  • 15
    Unifonic

    Unifonic

    Unifonic

    Unifonic is an AI-driven platform that enables personalized omnichannel customer engagement. It offers a range of communication channels, including SMS, WhatsApp, Messenger, push notifications, and voice, allowing businesses to connect with customers through their preferred mediums. The platform supports over 100 native integrations with tools like Salesforce, HubSpot, and Shopify, facilitating seamless workflow automation. Unifonic's Flow Studio provides pre-built templates for common use cases such as abandoned cart reminders, OTPs, and chatbot automation, simplifying the implementation of automated workflows. The platform is designed to enhance marketing efforts, streamline IT and operations with low-code development tools, and improve customer support by offering 24/7 AI-powered assistance. Unifonic has a global reach, with 95% coverage, over 25 billion messages sent, and more than 5,000 customers.
  • 16
    Clarity Security

    Clarity Security

    Clarity Security

    Eliminate audit angst with 10-minute user access reviews, flexible provisioning/de-provisioning workflows, and audit-friendly reporting, all in one simple, scalable IGA platform. White-glove onboarding takes the burden of implementing a solution off of team members reducing the impact on other IT initiatives. Automated evidence collection into a downloadable ledger mitigates the need for wasted time gathering spreadsheets, screenshots, etc. Nested entitlements and Clarity Explorer provide insight into what’s giving users access and why they’re being granted that access. True role-based access control (RBAC) and automated workflows for full alignment with your organizational structure and needs. Unlike "traditional" manual methods, Clarity has everything you need to quickly upgrade your identity governance program and seamlessly adapt it as your organization grows. Fast reviews for certifying user access, entitlements, roles, application access, and more.
  • Previous
  • You're on page 1
  • Next