5 Integrations with Absolute

View a list of Absolute integrations and software that integrates with Absolute below. Compare the best Absolute integrations as well as features, ratings, user reviews, and pricing of software that integrates with Absolute. Here are the current Absolute integrations in 2024:

  • 1
    Axonius

    Axonius

    Axonius

    Axonius gives customers the confidence to control complexity by providing a system of record for all digital infrastructure. With a comprehensive understanding of all assets including devices, identities, software, SaaS applications, vulnerabilities, security controls, and the context between all assets, customers are able to mitigate threats, navigate risk, decrease incident response time, automate action, and inform business-level strategy — all while eliminating manual, repetitive tasks. Recognized as creators of the Cyber Asset Attack Surface Management (CAASM) category and innovators in SaaS Management Platform (SMP) and SaaS Security Posture Management (SSPM), Axonius is deployed in minutes and integrates with hundreds of data sources to provide a comprehensive asset inventory, uncover gaps, and automatically enforce policies and automate action.
  • 2
    Eway

    Eway

    Eway

    We provide everything you need to start taking payments for your business. With out-of-the-box payment solutions to suit almost every industry or business, we work hard to ensure your payments just work! We also understand that payments can be complicated, that’s why our dedicated local team of experts is here to help you every step of the way. Our flat rates and simple pricing structure are clear and come with no hidden surprises. Complemented with fast settlement, we are there to support your growth. We provide your customers with peace of mind while transacting with you, with PCI DSS level 1 card data protection and fraud protection tools to screen incoming transactions. We give you practical support that helps you grow. From setup to support, our local team is here to assist you throughout the entire payment process, including 24-hour emergency technical support. Whether you’re a start-up or enterprise company, we offer a payment solution to meet your business needs.
    Starting Price: $20 per month
  • 3
    BuilderX

    BuilderX

    BuilderX

    BuilderX is a cloud-based design tool that lets you design screens for your app and codes them in React & React Native for you. Be it a developer or someone who you want to share your progress with, the projects can be shared by a simple link. BuilderX tries to automatically convert Absolute to Flex, you can specifically define Flex Layouts in BuilderX. Not every developer is a fan of the folder structure we generate. So don't compromise, just export the parts that you like as components. BuilderX has a range of components to make the design process easier. Create custom UI and use them across the project. Use a list of open source icons for your need, right from the tool. BuilderX aims to bring designers and developers together and caters to them both in relevant contexts. BuilderX is a design tool that aims to facilitate developers & designers to design apps in it. This means that BuilderX allows users to design screens for their apps but does not deliver a fully-functional app.
    Starting Price: $15 per month
  • 4
    ThreatAware

    ThreatAware

    ThreatAware

    Leveraging API feeds from your existing tools, validate your controls are correctly deployed and functioning across every cyber asset. Our clients come from all industries, from legal to finance, charities to retail. We are trusted by leading organizations to discover and protect their valuable cyber assets. Create a highly accurate device inventory by connecting to your existing systems via API. When issues arise the workflow automation engine can trigger actions via a webhook. ThreatAware provides clarity of the security control health of your cyber assets in a clear and simple design. Gain a macro view of your security control health regardless of how many controls you are monitoring. Generated from any field from a device, allows you to quickly group your cyber assets for monitoring and configuration purposes. When your monitoring systems accurately depicts your live environment, every alert is real.
  • 5
    Lucidum

    Lucidum

    Lucidum

    Your attack surface is not just what’s connected to the internet, it’s not just your IOT or endpoints, it’s everything. Other CAASM providers want to replace your SIEM or upgrade your spreadsheet. We don’t disrupt your workflow, we serve it, we don’t fight your SIEM, we fit it. Lucidum opens your eyes to the main sources of data loss, security incidents, and mismanagement. You’ll get amazing value out of 4-6 connections. But we don’t charge for connectors or ingestion, hook them all up. Directly inject our CAASM into your SIEM. Cut costs through significantly reduced ingestion and streamlined computing. We empower cybersecurity professionals with CAASM-driven insights to map, manage, and monitor every cyber asset, enhancing their ability to uncover hidden threats and mitigate risks. By leveraging the combined strength of CAASM for comprehensive asset visibility and AI for predictive analytics and automation, we offer unprecedented control over the technology landscape.
  • Previous
  • You're on page 1
  • Next