Best IT Security Software for Quickwork - Page 2

Compare the Top IT Security Software that integrates with Quickwork as of December 2025 - Page 2

This a list of IT Security software that integrates with Quickwork. Use the filters on the left to add additional filters for products that have integrations with Quickwork. View the products that work with Quickwork in the table below.

  • 1
    Doppler

    Doppler

    Doppler

    Stop struggling with scattered API keys, hacking together home-brewed configuration tools, and avoiding access controls. Give your team a single source of truth with Doppler. The best developers automate the pain away. Create references to frequently used secrets in Doppler. Then when they need to change, you only need to update them once. Your team's single source of truth. Organize your variables across projects and environments. The scary days of sharing secrets over Slack, email, git, zip files, are over. After adding a secret, your team and their apps have it instantly. Like git, the Doppler CLI smartly knows which secrets to fetch based on the project directory you are in. Gone are the futile days of trying to keep ENV files in sync! Practice least privilege with granular access controls. Reduce exposure when deploying with read-only service tokens. Contractor needs access to just development? Easy!
    Starting Price: $6 per seat per month
  • 2
    SecurityTrails

    SecurityTrails

    SecurityTrails

    Data for Security companies, researchers and teams. Fast, always up API that allows you to access current and historical data. The API is paid via a simple pricing structure that allows you to embed our data into your applications. It’s all here, fully-indexed historic and current data, ready to be accessed asap. Search nearly 3 billion historical and current WHOIS data and WHOIS changes. Search our daily-updating database, it’s over 203 million deep and growing. Know what tech sites are running, and search by over a thousand technologies. Get monthly access to over 1 billion passive DNS datasets. Get the most current intel when it comes to IPs, domains, and hostnames in real-time. Searching is fast and simple with tagged and indexed intel. Tap into a treasure-trove of cyber security gold and get the info you can’t find anywhere else. We’re proud to offer security analysts and developers the most current DNS and domain intel with our powerful API.
  • 3
    Rootly

    Rootly

    Rootly

    Rootly is an AI-native incident management platform built to help modern teams prevent and resolve incidents faster. It streamlines on-call scheduling, incident response, retrospectives, and status updates through intelligent automation and deep integrations with Slack, Teams, Jira, and Zoom. Powered by Rootly AI, the system automates root cause analysis, provides suggested fixes, and compiles incident data into clear summaries for faster recovery. Teams can manage incidents directly within their communication tools, reducing context switching and human error. With automated retrospectives and actionable insights, Rootly enables continuous improvement and reliability across engineering organizations. Trusted by global brands like Figma, Canva, Nvidia, and Webflow, it helps companies maintain uptime, minimize disruption, and create a culture of proactive resilience.
  • 4
    OAuth

    OAuth

    OAuth.io

    Focus on your core app and get to market faster. OAuth.io handles identity infrastructure, maintenance, and security overhead, so your team doesn’t have to. Identity can be difficult, OAuth.io makes it easy. Choose identity providers, add custom attributes, customize your login page or use our widget, integrate with your app - identity solved in minutes. Manage your users from our easy to use dashboard - find and manage users, reset passwords, enforce two-factor authentication, and add memberships and permissions through OAuth.io's simple and easy to use User Management. Fully-featured, hyper-secure user authentication using passwords or tokens. From multi-tenant to complex permissions, OAuth.io has your user authorization modeling covered. Force a second factor of user authentication with our popular integrations.
    Starting Price: $19 per month
  • 5
    Oracle Audit Vault and Database Firewall
    Oracle Audit Vault and Database Firewall monitors Oracle and non-Oracle database traffic to detect and block threats, as well as improves compliance reporting by consolidating audit data from databases, operating systems, directories, and other sources. It can be deployed on-premises or in the Oracle Cloud. Oracle Audit Vault and Database Firewall (AVDF) is a complete Database Activity Monitoring (DAM) solution that combines native audit data with network-based SQL traffic capture. AVDF includes an enterprise quality audit data warehouse, host-based audit data collection agents, powerful reporting and analysis tools, alert framework, audit dashboard, and a multi-stage Database Firewall. Dozens of out-of-the-box compliance reports provide easy, schedulable, customized reporting for regulations such as GDPR, PCI, GLBA, HIPAA, IRS 1075, SOX, and UK DPA.
  • 6
    Ivanti Application Control
    Application Control combines dynamic allowed and denied lists with privilege management to prevent unauthorized code execution without making IT manage extensive lists manually and without constraining users. Automated requests and approvals via helpdesk systems lighten the load for IT staff while providing users a streamlined experience. With Application Control you can manage user privileges and policy automatically, at a granular level, and allow for optional self-elevation when exceptions occur. Give your users access to what they need quickly, with seamless app access that relies on granular, context-aware policies. Create flexible, preventive policies to help ensure only known and trusted applications can execute on a system. Enable automated requests for emergency privilege elevation or application access via integrated IT helpdesk system​.
  • 7
    Intruder

    Intruder

    Intruder

    Intruder is an international cyber security company that helps organisations reduce their cyber exposure by providing an effortless vulnerability scanning solution. Intruder’s cloud-based vulnerability scanner discovers security weaknesses across your digital estate. Offering industry-leading security checks, continuous monitoring and an easy-to-use platform, Intruder keeps businesses of all sizes safe from hackers. Receive actionable results prioritised by context. Intruder interprets raw data received from leading scanning engines, so you can focus on the issues which truly matter, such as exposed databases.‍ Intruder's high-quality reports help you sail through customer security questionnaires, and make compliance audits like SOC2, ISO27001, and Cyber Essentials a breeze.
  • 8
    Cisco Catalyst Center
    Optimize resources, reduce spending, and enhance your organization's digital agility with a powerful management system that uses AI to connect, secure, and automate network operations. Deploy networks faster with provisioning and configuration automation. Proactively scale your network using deep insights into capacity and performance. Improve time to resolution with AI diagnostics and remediation. Optimize Wi-Fi coverage and deliver services where they're needed with 3D visualization. Gain visibility into the user experience and improve hybrid work experience with application insights.