40 Integrations with AuthControl Sentry

View a list of AuthControl Sentry integrations and software that integrates with AuthControl Sentry below. Compare the best AuthControl Sentry integrations as well as features, ratings, user reviews, and pricing of software that integrates with AuthControl Sentry. Here are the current AuthControl Sentry integrations in 2024:

  • 1
    Google Cloud Platform
    Google Cloud is a cloud-based service that allows you to create anything from simple websites to complex applications for businesses of all sizes. New customers get $300 in free credits to run, test, and deploy workloads. All customers can use 25+ products for free, up to monthly usage limits. Use Google's core infrastructure, data analytics & machine learning. Secure and fully featured for all enterprises. Tap into big data to find answers faster and build better products. Grow from prototype to production to planet-scale, without having to think about capacity, reliability or performance. From virtual machines with proven price/performance advantages to a fully managed app development platform. Scalable, resilient, high performance object storage and databases for your applications. State-of-the-art software-defined networking products on Google’s private fiber network. Fully managed data warehousing, batch and stream processing, data exploration, Hadoop/Spark, and messaging.
    Leader badge
    Starting Price: Free ($300 in free credits)
    View Software
    Visit Website
  • 2
    OpenVPN

    OpenVPN

    OpenVPN

    Access Server gives you the ability to rapidly deploy a secure remote access solution with a web-based administration interface — all on general purpose computing hardware or virtual machines. Your team will have access to the built-in OpenVPN Connect App and bundled connection profiles. All without adding a ton of extra work to your IT to-do list. OpenVPN Access Server is a full-featured SSL self-hosted VPN software solution that integrates OpenVPN server capabilities, enterprise management capabilities, simplified OpenVPN Connect UI, and OpenVPN Client software packages that accommodate Windows, MAC, and Linux, mobile OS (Android and iOS) environments. OpenVPN Access Server supports a wide range of configurations, including secure and granular remote access to internal network and/ or private cloud network resources and applications with fine-grained access control. OpenVPN also has a cloud-delivered solution called CloudConnexa.
    Starting Price: Free Up to 3 Users - $11/month
    View Software
    Visit Website
  • 3
    Salesforce

    Salesforce

    Salesforce

    Salesforce helps sales teams accelerate their performance and achieve their goals. Salesforce is the world's most-used CRM, and so much more. With Salesforce, teams get access to tools that allow them to grow their accounts, find new customers, and close deals—faster and from anywhere. It offers a wealth of features that include contact management, opportunity management, lead management, email integration, reports and dashboards, sales forecasting, files sync and share, and so much more. Spend less time digging around in spreadsheets and more time running your business. No hardware, no software, no hassle. Our simple setup assistant will have you streamlining sales and answering customer questions in just minutes. Give buyers seamless, personalized experiences by connecting data across sales, service, and marketing. See a complete view of the customer — their account, activity history, and connections. Pull in social data for a deeper view of your customers.
    Leader badge
    Starting Price: $25.00/month/user
  • 4
    Microsoft 365

    Microsoft 365

    Microsoft

    Introducing Microsoft 365 (formerly Microsoft Office 365). Be more creative and achieve what matters with Outlook, OneDrive, Word, Excel, PowerPoint, OneNote, SharePoint, Microsoft Teams, Yammer, and more. With a Microsoft 365 subscription, you get the latest Office apps—both the desktop and the online versions—and updates when they happen. On your desktop, on your tablet, and on your phone.* Microsoft 365 + your device + the Internet = productivity wherever you are. OneDrive makes the work you do available to you from anywhere—and to others when you collaborate or share. Help at every turn. Email, chat, or call and talk to a real live person. Get Office today—choose the option that's right for you
    Leader badge
    Starting Price: $5 per user per month
  • 5
    Dropbox

    Dropbox

    Dropbox

    Dropbox Business is more than just secure file storage—it’s a smart workspace where teams, tools, and content come together. Create, store, and share cloud content from Google Docs, Sheets, and Slides, Microsoft Office files, and Dropbox Paper alongside traditional files in Dropbox. Dropbox Spaces brings your files and cloud content together, so that your PowerPoints can live next to your Google Docs, Trello boards, and whatever tools your team wants to use. Easily access your team’s work from your computer, mobile device, or any web browser. Keep your team’s files and the conversations about them in the same place by connecting tools like Slack and Zoom. Intelligently suggested files and folders keep your team one step ahead by giving everyone the content they need, when they need it. A secure, distributed infrastructure—plus admin tools for control and visibility—keep your company’s data safe on Dropbox.
    Leader badge
    Starting Price: $12.50 per month per user
  • 6
    Microsoft OneDrive
    Access, share, and collaborate on all your files from anywhere. OneDrive connects you to all your files in Office 365 so you can share and work together from anywhere while protecting your work. Easily store, access and discover your personal and shared work files in Office 365, including Microsoft Teams, from all your devices. Edits you make offline are automatically uploaded next time you connect. Work faster and smarter with anyone inside or outside your organization. Securely share files and work together in real-time using Word, Excel and PowerPoint across web, mobile and desktop. Create, view, edit, and share files on the go with the OneDrive mobile app. Easily capture whiteboards and scan work receipts, business cards, and other paper documents for safe keeping. OneDrive helps protect your files. You can easily recover files from accidental deletes or malicious attacks and administrators can manage security policies to help keep your information safe.
    Leader badge
    Starting Price: $2 per user per month
  • 7
    Box

    Box

    Box

    Secure collaboration with anyone, anywhere, on any device. Protecting your sensitive files in the cloud is a top priority. That's why we developed advanced security controls, intelligent threat detection, and complete information governance. But we know your needs don't stop there. Strict data privacy? Check. Data residency? Check. Industry compliance? Check. Your business depends on collaboration between lots of people, from teammates to customers to partners and vendors. Get everyone on the same page with one place to work together easily on your most important content. After all, you should be sharing files, not frustration. And you should have the peace of mind that it's all secure. Working on manual, cumbersome processes wastes hours each day. So we let anyone automate the repeatable workflows that are key to your business, like HR onboarding and contract and digital-asset management. Workflows start to move faster. You have more time to do what matters most.
    Leader badge
    Starting Price: $5.00 per user per month
  • 8
    Microsoft Outlook
    Connect. Organize. Get things done. Email, calendar, contacts all in one place. Work efficiently with email, calendar, contacts, tasks, and more—together in one place. Office integration lets you share attachments right from OneDrive, access contacts, and view LinkedIn profiles. Book conference rooms and track RSVPs for meetings right from your calendar. Make plans and coordinate schedules by sharing calendars and seeing when your coworkers are available. Get peace of mind with enterprise-grade security trusted by many of the world’s largest organizations. Outlook works around the clock to protect your confidential information, without getting in your way. Outlook anticipates your needs. Travel and bill payments are automatically added to your calendar, and intelligent reminders help keep you on track. Search helps you find information quickly.
  • 9
    Microsoft SharePoint
    Your mobile, intelligent intranet. Share and manage content, knowledge, and applications to empower teamwork, quickly find information, and seamlessly collaborate across the organization. SharePoint empowers teamwork with dynamic and productive team sites for every project team, department, and division. Share files, data, news, and resources. Customize your site to streamline your team’s work. Collaborate effortlessly and securely with team members inside and outside your organization, across PCs, Macs, and mobile devices. Build cohesion and inform your employees throughout your intranet. Drive organizational efficiency by sharing common resources and applications on home sites and portals. Tell your story with beautiful communication sites. And stay in the know with personalized, targeted news on the web and the SharePoint mobile apps. You’re just a click away from what you are looking for, with powerful search and intelligent ways to discover information.
    Leader badge
    Starting Price: $1.00/one-time/user
  • 10
    Adobe Workfront
    Adobe Workfront is an award-winning online project management software that helps modern teams focus on the right work, produce their best work, and deliver it faster. Suitable for marketing teams of all sizes, Workfront enables users to plan timelines, plan and manage workflows, prioritize project requests, create and proof content, and use reporting functions all from one solution. From large projects, to ad-hoc requests, Workfront helps teams succeed.
  • 11
    Joomla!

    Joomla!

    Joomla!

    Joomla! is a free and open-source content management system (CMS) for publishing web content. Over the years Joomla! has won several awards. It is built on a model, view, and controller web application framework that can be used independently of the CMS allows you to build powerful online applications. Joomla! is one of the most popular website software, thanks to its global community of developers and volunteers, who make sure the platform is user friendly, extendable, multilingual, accessible, responsive, search engine optimized and so much more. The definition of a CMS is an application (web-based), that provides capabilities for multiple users with different permission levels to manage (all or a section of) content, data or information of a website project, or intranet application. Managing content refers to creating, editing, archiving, publishing, collaborating on, reporting, and distributing website content, data, and information.
  • 12
    Microsoft Entra ID
    Microsoft Entra ID (formerly known as Azure Active Directory) is a comprehensive identity and access management cloud solution that combines core directory services, application access management, and advanced identity protection. Safeguard your organization with a cloud identity and access management solution that connects employees, customers, and partners to their apps, devices, and data. Protect access to resources and data using strong authentication and risk-based adaptive access policies without compromising user experience. Provide a fast, easy sign-in experience across your multicloud environment to keep your users productive, reduce time managing passwords, and increase productivity. Manage all your identities and access to all your applications in a central location, whether they’re in the cloud or on-premises, to improve visibility and control.
  • 13
    Microsoft 365 Defender
    As threats become more complex and persistent, alerts increase, and security teams are overwhelmed. Microsoft 365 Defender, part of Microsoft’s XDR solution, leverages the Microsoft 365 security portfolio to automatically analyze threat data across domains, building a complete picture of each attack in a single dashboard. With this breadth and depth of clarity defenders can now focus on critical threats and hunt for sophisticated breaches, trusting that the powerful automation in Microsoft 365 Defender detects and stops attacks anywhere in the kill chain and returns the organization to a secure state. Reduce your attack surface and eliminate persistent threats. Integrate threat data for rapid and complete response. Leverage time saved to apply your unique expertise. Manage and secure hybrid identities and simplify employee, partner, and customer access.
  • 14
    Moodle

    Moodle

    Moodle

    Moodle is the world’s most trusted online learning solution. The engine of the Moodle ecosystem is Moodle LMS, the secure and customizable open-source platform used by over 250 million learners worldwide. Developed in conjunction with its loyal community, Moodle LMS is complemented by an ecosystem of products including Moodle Workplace and a network of partners and services providing hosting, customizations, and support. Moodle LMS - Create interactive courses for your learners in a safe, accessible, and highly engaging online space - Open source and flexible, so it can be tailored to suit every learning outcome - Collaboratively designed by the global Moodle community - Secure and private to ensure your systems and data are safe.
    Starting Price: $0
  • 15
    Cisco Meraki
    Network security is hard. Current solutions are complex and tedious to implement. Learn how to simplify security with Cisco Meraki! Trusted by influential brands around the world. With over a million active networks and counting, organizations far and wide count on Meraki to help deliver premium, reliable experiences. All Cisco Meraki devices are centrally and securely managed from the cloud using a single web-based dashboard. Our feature-rich, intuitive architecture enables customers to save time, reduce operating costs, and solve new business problems. The industry standard for easy-to-manage, fast and dependable Wi-Fi. Protect and securely connect what matters most, regardless of location. Uncompromising performance and reliability at the heart of your network. Remote monitoring and identity-based configuration for all your devices.
    Starting Price: $40.00
  • 16
    WatchGuard Network Security

    WatchGuard Network Security

    WatchGuard Technologies

    Our products provide your security systems with complete, uncompromising visibility into your network. You will find that this helps to keep pace with increasing network speed and complexity, while gaining the insight needed to better detect and contain breaches, and achieve a rapid recovery. By implementing Network Critical solutions you can improve your existing security system's network performance, therefore increasing your ROI. Firstly, SPAN ports. These have been a long-term, insufficient, solution to network security. It is remarkably easy for hackers to infiltrate routers, switches and entire networks without detection. SPAN does not provide access to real-time information either, which is another key issue that may greatly affect your network's security. This is because SPAN ports groom your data, unlike Network TAPs, that act as a window, where you can look through at any time, in real-time.
  • 17
    Radius

    Radius

    Radius Bob

    CRM for insurance agencies. Never Lose a Lead or Client again because of misplaced information, hard drive crash, corrupted spreadsheet or a tipped over file cabinet. Organize and Manage all of your Leads & Clients with Radius. An all-in-one Solution for your Agency. No need for a separate email marketing software, use Radius to send Auto Responders, Drip Marketing, Mass Emails & SMS/Text Messages. Every Radius Lead & Client has its own history, reminders & tasks, notes, information, and file storage. Also using the Radius Dropbox helps keep your organized by automatically importing emails. Integrate Radius with how you do Business. Define Custom Form Fields, Lead Temperatures, Client Status and more. Ingrate Radius with your website, quote engine, lead vendor or third party app.
    Starting Price: $34 per month
  • 18
    Splunk Cloud Platform
    Turn data into answers with Splunk deployed and managed securely, reliably and scalably as a service. With your IT backend managed by our Splunk experts, you can focus on acting on your data. Splunk-provisioned and managed infrastructure delivers a turnkey, cloud-based data analytics solution. Go live in as little as two days. Managed software upgrades ensure you always have the latest functionality. Tap into the value of your data in days with fewer requirements to turn data into action. Splunk Cloud meets the FedRAMP security standards, and helps U.S. federal agencies and their partners drive confident decisions and decisive actions at mission speeds. Drive productivity and contextual insights with Splunk’s mobile apps, augmented reality and natural language capabilities. Extend the utility of your Splunk solutions to any location with a simple phrase or the tap of a finger. From infrastructure management to data compliance, Splunk Cloud is built to scale.
  • 19
    Check Point CloudGuard

    Check Point CloudGuard

    Check Point Software Technologies

    The Check Point CloudGuard platform provides you cloud native security, with advanced threat prevention for all your assets and workloads – in your public, private, hybrid or multi-cloud environment – providing you unified security to automate security everywhere. Prevention First Email Security: Stop zero-day attacks. Remain ahead of attackers with unparalleled global threat intel. Leverage the power of layered email security. Native Solution, at the Speed of Your Business: Fast, straightforward deployment of invisible inline API based prevention. Unified Solution for Cloud Email & Office Suites: Granular insights and clear reporting with a single dashboard and license fee across mailboxes and enterprise apps. Check Point CloudGuard provides cloud native security for all your assets and workloads, across multi-clouds, allowing you to automate security everywhere, with unified threat prevention and posture management.
  • 20
    SonicWall Capture Client
    SonicWall Capture Client is a unified client platform that delivers multiple endpoint protection capabilities, including next-generation malware protection and application vulnerability intelligence. It leverages cloud sandbox file testing, comprehensive reporting, and enforcement for endpoint protection. Additionally, provide consistent assurance of client security, with easy-to-use and actionable intelligence and reporting. Examine files that are possibly waiting to activate in a cloud sandbox. Rely on dynamic white/blacklisting and cloud intelligence. Utilize advanced static analysis to identify threats during download. Exercise shared threat intelligence from SonicWall’s verdict database. View threat visualization maps to see where threats came from and went. Effortlessly understand your security posture. Catalog your applications and see which ones are vulnerable.
  • 21
    Techstep Essentials MDM
    Essentials MDM (previously FAMOC) helps companies give people what they want – new shiny devices, emerging technologies and tools necessary to make their job done. We handle the security part, taking into account the greatest risk that comes from within – your staff. Essentials MDM simplifies deploying, configuring and managing all smartphones and tablets in your organization. It’s one place where you control everything: you can create profiles, enforce restrictions, set PIN and password policies and more. From ten devices to ten thousand, corporate-owned or BYOD, enrolling devices is quick, easy and error-free. With Essentials MDM, you can work with a single handset or perform bulk operations on OS-differentiated groups of devices. We also help implement, maintain and support the everyday use of Essentials MDM by offering managed services.
    Starting Price: $2/month/device
  • 22
    Kemp LoadMaster

    Kemp LoadMaster

    Progress Software

    The Kemp LoadMaster load balancing solutions and extensive library of application deployment templates provide high-performance and secure delivery of application workloads from a wide range of vendors in multiple sectors. Award-winning hardware, virtual and cloud-native deployment options, including the industry’s first per-app software load balancer/ADC. Make informed decisions and deal with network anomalies in real-time. Optimized load-balancing hardware that delivers a high-performance application experience for any environment. World's most popular virtual load balancer with over 100,000 deployments worldwide. Fully featured cloud load balancers optimally sized and priced for public cloud environments. Extend the features and capabilities of a data center-class application delivery controller (ADC) to the cloud.
    Starting Price: $1990.00/year
  • 23
    Array

    Array

    Array

    Data collection and automation made simple with Array, a cloud-based data automation and collection solution. Array allows users to build and use online forms to take information via mobile device or the web, offline, or online. With Array's form builder, users can make interactive forms with dynamic layouts by using the drag-and-drop feature. Array's theme designer also allows users to build custom form themes and color schemes with the addition of customizing the company logo.
    Starting Price: $50 per month
  • 24
    Active Directory
    Active Directory stores information about objects on the network and makes this information easy for administrators and users to find and use. Active Directory uses a structured data store as the basis for a logical, hierarchical organization of directory information. This data store, also known as the directory, contains information about Active Directory objects. These objects typically include shared resources such as servers, volumes, printers, and the network user and computer accounts. For more information about the Active Directory data store, see Directory data store. Security is integrated with Active Directory through logon authentication and access control to objects in the directory. With a single network logon, administrators can manage directory data and organization throughout their network, and authorized network users can access resources anywhere on the network. Policy-based administration eases the management of even the most complex network.
    Starting Price: $1 per user per month
  • 25
    Ivanti Connect Secure
    Zero trust secure access to the cloud and data center. Reliable, secure access means higher productivity and lower costs. Ensures compliance before granting access to the cloud. Data protection with always-on VPN and lockdown mode. The most widely deployed SSL VPN for organizations of any size, across every major industry. Reduce management complexity with only one client for remote and on-site access. Directory Services, Identity Services, EMM/MDM, SIEM, NGFWs. Ensure that all devices comply with security requirements before connecting. Simple, secure and streamlined access to on-premises and cloud-based resources. Protect data-in-motion with on-demand, per-application and always-on VPN options. Centrally manage policy and track users, devices, security state and access activity. Access web-based apps and virtual desktop products with nothing to install. Data access and protection requisites for industry and regulatory compliance.
  • 26
    Cisco Secure Cloud Analytics
    Unified threat detection across on-premises and cloud environments. Detects early indicators of compromise in the cloud or on-premises, including insider threat activity and malware, as well as policy violations, misconfigured cloud assets, and user misuse. Receives a wide variety of network telemetry and logs. Abnormal behavior or signs of malicious activity generate an alert so you can quickly investigate it. SaaS-based network and cloud security solution that is easy to buy and simple to use. No specialized hardware to purchase, no software agents to deploy, and no special expertise required.​ Extends your visibility to detect threats across your cloud as well as on-premises environments, all from a single interface.​
  • 27
    Citrix Content Collaboration
    Work better with simplified content collaboration. Employees need easy access to use and share the content they need to be productive. It's time for content collaboration that unites all your data and documents in one secure platform—empowering employees to work better. Drive productivity by unifying all content in a shared, secure experience. Empower mobile workers to connect to data from anywhere. Manage all documents and data inside secure content collaboration. Simplify feedback and approvals to break down bottlenecks.
    Starting Price: $2 per user per month
  • 28
    Juniper Identity Management Service
    Protecting access to corporate data is one of your top security priorities. Insiders with direct access to corporate data can circumvent weak user controls. To keep your corporate resources safe, user access must be governed and enforced across the enterprise, mobile, and the cloud. Juniper Identity Management Service strengthens enterprise security that authenticates and restricts user access. It’s the first line of defense in preventing corporate breaches and safeguarding corporate assets. Employees are identified and assigned corporate roles that determine what applications and data they are permitted to access. Juniper Identity Management Service seamlessly integrates with SRX Series next-generation firewalls, enabling security teams to match application activity and security policies to user roles. It can then generate detailed user-metrics and audit reports for detailed reporting.
  • 29
    SAP Cloud Platform
    Extend your business processes in the cloud. Extend SAP solutions in a fast and agile way without disrupting key business processes - leveraging existing investments and expertise. Rapidly develop robust and scalable cloud-native applications. Leverage your existing ABAP expertise to create new extensions or renovate existing custom apps. Innovate for business agility with cloud-native, low-code, and responsive event-driven applications. Accelerate outcomes with intelligent business process optimization. Discover, configure, extend and optimize business processes, connecting experience data to operational workflows. Gain impactful and actionable insights to anticipate business outcomes and uncover new revenue and growth opportunities. Harness the power of predictive analytics and machine learning capabilities. Embed real-time intelligence into your business applications. Advance and personalize the user experience for your customers, partners and employees.
  • 30
    Symantec Advanced Authentication
    Mitigate threats and stimulate growth with Advanced Authentication solutions from Symantec. Get real-time protection for your online and mobile applications. Our leading-edge solution can authenticate an employee, partner or contractor while providing a frictionless login experience. This ensures that legitimate users have anytime, anywhere access from any device, which builds trust and brand loyalty. Get a flexible, scalable solution with both strong multi-factor authentication and risk-based methods like device identification, geolocation and user activity. Catastrophic cyber attacks are happening every day. We make sure you’re prepared to defend your business. Earn customer trust and loyalty by providing the simple, seamless experience they’re looking for. With the right data, you can more easily distinguish between legitimate and fraudulent behavior.
  • 31
    Oracle Cloud Infrastructure
    Oracle Cloud Infrastructure supports traditional workloads and delivers modern cloud development tools. It is architected to detect and defend against modern threats, so you can innovate more. Combine low cost with high performance to lower your TCO. Oracle Cloud is a Generation 2 enterprise cloud that delivers powerful compute and networking performance and includes a comprehensive portfolio of infrastructure and platform cloud services. Built from the ground up to meet the needs of mission-critical applications, Oracle Cloud supports all legacy workloads while delivering modern cloud development tools, enabling enterprises to bring their past forward as they build their future. Our Generation 2 Cloud is the only one built to run Oracle Autonomous Database, the industry's first and only self-driving database. Oracle Cloud offers a comprehensive cloud computing portfolio, from application development and business analytics to data management, integration, security, AI & blockchain.
  • 32
    VMware Cloud
    Build, run, manage, connect and protect all of your apps on any cloud. The Multi-Cloud solutions from VMware deliver a cloud operating model for all applications. Support your digital business initiatives with the world’s most proven and widely deployed cloud infrastructure. Leverage the same skills you use in the data center, while tapping into the depth and breadth of six global hyperscale public cloud providers and 4,000+ VMware Cloud Provider Partners. With hybrid cloud built on VMware Cloud Foundation, you get consistent infrastructure and operations for new and existing cloud native applications, from data center to cloud to edge. This consistency improves agility and reduces complexity, cost and risk. Build, run and manage modern apps on any cloud, meeting diverse needs with on-premises and public cloud resources. Manage both container-based workloads and traditional VM-based workloads on a single platform.
  • 33
    Citrix SD-WAN
    Your digital transformation depends on how well your virtual, cloud, and SaaS apps perform–across the enterprise and in branch locations. It’s time for a secure, high performance, always-available WAN Edge solution that provides exceptional experience and seamless business continuity. Optimize delivery of your virtual, cloud, and SaaS applications on a secure, flexible WAN. And manage it all with ease from a single pane of glass.
  • 34
    Fortinet SD-WAN
    Fortinet is the fastest-growing SD-WAN provider in market share by revenue. Fortinet SD-WAN delivers advanced routing, self-healing capabilities, and flexible security using network firewall or SASE-based cloud-delivered services—all in a single, integrated solution. Fortinet Secure SDWAN (software-defined wide-area network) solution enables enterprises to transform and secure all WAN edges. Leveraging the Security-driven Networking approach that uses one operating system and one centralized management console, enterprises realize superior user experience, enhanced security posture effectiveness with converged networking and security, and achieve operational continuity and efficiency. Fortinet Secure SD-WAN is designed to address modern complexity and threat exposure to support customers critical business needs. It is designed to evolve to future-proof and protect investments as customers embrace a digital-first journey and support work-from-anywhere.
  • 35
    Aruba Cloud

    Aruba Cloud

    Aruba Cloud

    Cloud made simple and made-to-measure. IaaS and PaaS solutions for your cloud computing applications. A service that allows you to create and set up auto-backups, ideal solution to manage and protect your backups. With our Object Storage solution, based on the IaaS model, you can create and manage storage space to store all the data that you want. Domain Center is a web service offered by Aruba Cloud that allows users to purchase and transfer domain names and manage DNS. Monitor all your websites, Cloud Servers, dedicated servers, whether they reside in Aruba Cloud data centers, or are hosted by other providers. In cases of failures or errors detected in the monitored resource or service, Cloud Monitoring will automatically and immediately send you a notification via email or SMS, so you can always know the progress of your infrastructure in real time and if need be, take action as soon as possible.
  • 36
    Palo Alto Networks AutoFocus
    Tomorrow's operations depend on unrivaled threat intelligence, today. Power up investigation, prevention and response with AutoFocus. Palo Alto Networks, provider of the industry-leading next-generation firewall, has made the world’s highest-fidelity repository of threat intelligence, sourced from the largest network of sensors, available for any team or tool to consume. AutoFocus™ contextual threat intelligence service is your one-stop shop for threat intelligence. Your teams will receive instant understanding of every event with unrivaled context from Unit 42 threat researchers, and you can embed rich threat intelligence in analyst’s existing tools to significantly speed investigation, prevention, and response. Get unique visibility into attacks crowdsourced from the industry’s largest footprint of network, endpoint, and cloud intel sources. Enrich every threat with the deepest context from worldrenowned Unit 42 threat researchers.
  • 37
    Forcepoint Behavioral Analytics
    Visibility, analytics, and automated control - converged into a single solution. Eliminate complexity for security analysts with UEBA's automated policy enforcement and comprehensive user risk scoring. Combine DLP with behavioral analytics to gain a 360 degree view of intent and user actions across the enterprise. Leverage out-of-the-box analytics or customize risk models to fit your unique organizational needs. Quickly uncover risk trends in your organization with an at-a-glance view of users ranked by risk. Leverage entire IT ecosystem, including unstructured data sources like chat, for a complete view of users interacting across the enterprise. Understand user intent through deep context driven by big data analytics and machine learning. Unlike traditional UEBA, you can take action on insights to stop breaches ahead of loss. Safeguard your people and your data from insider threats with fast detection and mitigation.
  • 38
    QueryPie

    QueryPie

    QueryPie

    QueryPie is a centralized platform to manage scattered data sources and security policies all in one place. Put your company on the fast track to success without changing the existing data environment. Data governance is vital to today's data-driven world. Ensure you're on the right side of data governance standards while giving many users access to growing amounts of critical information. Establish data access policies by including key attributes such as IP address and access time. Privilege types can be created based on SQL commands classified as DML, DCL, and DDL to secure data analysis and editing. Manage details of SQL events at a glance and discover user behavior and potential security concerns by browsing logs based on permissions. All histories can be exported as a file and used for reporting purposes.
  • 39
    Cyberoam

    Cyberoam

    Sophos

    Cyberoam offers a complete virtual security solution to organizations with its virtual network security appliances (Next-Generation Firewalls/UTMs), virtual Cyberoam Central Console for centralized management, and Cyberoam iView software for centralized logging and reporting. The Xstream architecture makes traffic handling more efficient with a high-performance single streaming DPI engine and greatly improved TLS Inspection throughput. The dedicated Xstream Flow Processor in every XGS Series appliance offloads SaaS, SD-WAN, and cloud traffic at the hardware level, reducing the burden on the main CPU. This accelerates performance by adding headroom for TLS 1.3 decryption, deep packet inspection, and more.
  • 40
    Barracuda Cloud

    Barracuda Cloud

    Barracuda Networks

    The Barracuda Cloud is the first ecosystem that leverages on-demand cloud computing to simplify data security, storage and IT management. Our cloud is a complementary component of all Barracuda products, providing an added layer of protection and scalability. You have the option to choose how much of the Barracuda Cloud capabilities you need while keeping on-premises control over your digital information. Whether you use our onsite physical appliances, virtual appliances, or run our solutions on Amazon Web Services and Microsoft Azure, you can utilize Barracuda Cloud. We also offer Software as a Service (SaaS) options for our email and web security, file sharing, and electronic signature solutions. Barracuda security solutions include subscriptions to Barracuda Central, our global operations center that continuously monitors the Internet for network threats and delivers solutions to you real-time.
  • Previous
  • You're on page 1
  • Next