Compare the Top IT Security Software that integrates with UiPath as of April 2026

This a list of IT Security software that integrates with UiPath. Use the filters on the left to add additional filters for products that have integrations with UiPath. View the products that work with UiPath in the table below.

What is IT Security Software for UiPath?

IT security software is designed to protect information technology (IT) systems, networks, and data from cyber threats, such as malware, hacking, and unauthorized access. These tools provide various features such as antivirus protection, firewalls, encryption, intrusion detection and prevention systems, and vulnerability management to ensure the integrity, confidentiality, and availability of sensitive information. IT security software helps organizations detect, prevent, and respond to security incidents, mitigate risks, and ensure compliance with industry regulations. It is critical for businesses and individuals to safeguard against cyberattacks, data breaches, and other security vulnerabilities. Compare and read user reviews of the best IT Security software for UiPath currently available using the table below. This list is updated regularly.

  • 1
    HCL BigFix AEX

    HCL BigFix AEX

    HCL Software

    HCL BigFix AEX is a part of the Autonomous Endpoint Management pillar under the HCLSoftware Intelligent Operations ecosystem. It is a Generative AI-driven agent assist solution that offers intelligent self-service support, comprehends employee requests, and perpetually refines its responses for enhanced employee experience.​ It is designed to revolutionize enterprise service operations. AEX's intelligence approach empowers organizations to deliver exceptional support experiences, streamline operations, and increase overall productivity.
  • 2
    CyberArk Privileged Access Manager
    Keep your business safe by preventing the malicious use of privileged accounts and credentials – a common path to an organization’s most valuable assets. The CyberArk PAM as a Service solution leverages leading automation technologies to protect your business as it grows. Attackers never stop seeking ways in. Manage privileged access to minimize risk. Prevent credential exposure and keep critical assets from falling into the wrong hands. Maintain compliance with recorded key events and tamper-resistant audits. Privileged Access Manager easily integrates with a host of applications, platforms and automation tools.
  • 3
    CyberArk Secure Cloud Access
    CyberArk Secure Cloud Access protects cloud identities by managing access securely across multi-cloud environments without compromising user experience. It centralizes control with granular access policies and just-in-time privilege granting, helping reduce risk while maintaining productivity. Designed to integrate seamlessly with existing workflows, it ensures secure and efficient cloud access for developers, engineers, and administrators.
  • 4
    BeyondTrust Cloud Privilege Broker
    Cloud Privilege Broker gives your team the tools to visualize and manage entitlements across the multi-cloud infrastructure. Cloud-agnostic, centralized dashboard with key metrics. Continuous discovery of users, roles, policies, and endpoints across all supported cloud platforms. Granular policy recommendations across IaaS and PaaS platforms from a single interface. BeyondTrust Cloud Privilege Broker (CPB) is an entitlements and permissions management solution that enables customers to visualize and manage cloud access risk in hybrid and multi-cloud environments, all from a single interface. Each cloud service provider has its own access management tools, but they only manage their own environments and do not scale to cover others. This leaves teams to swivel from console to console, attempting to manage permissions separately for each cloud provider, with different ways to apply policy from one platform to the next.
  • 5
    Ocrolus

    Ocrolus

    Ocrolus

    Modernize your back office with automation, powered by artificial intelligence and crowdsourcing. Extract and analyze data from any image regardless of quality, with 99+% accuracy. Data capture has never been easier. Automatically parse images in whatever form is most convenient. Part machine, part human. Ocrolus intertwines its AI with human quality control specialists for outstanding accuracy. Protect your data with bank-level security and a robust audit trail. Eliminate manual review and "stare and compare" work. Evaluate financial health using bank data and cash flow analytics. Calculate income for consumers with diverse employment profiles. Extract and validate address information from any document. Quickly retrieve employment data from disparate sources. Establish and confirm identity using multiple document types. Build on Ocrolus to create innovative and streamlined customer experiences.
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB