281 Integrations with Axonius
View a list of Axonius integrations and software that integrates with Axonius below. Compare the best Axonius integrations as well as features, ratings, user reviews, and pricing of software that integrates with Axonius. Here are the current Axonius integrations in 2024:
-
1
Citrix ADC
Citrix Systems
Citrix ADC is the most comprehensive application delivery and load balancing solution for monolithic and microservices-based applications. Which means you can deliver a better user experience, on any device—anywhere. A single code base across the Citrix ADC portfolio gives you greater agility and speed by providing operational consistency and holistic visibility across multi-cloud with a single pane of glass. From on premises to the cloud—and everything in between. -
2
AppNeta
AppNeta
AppNeta is the only network performance monitoring solution that delivers visibility into the end user experience of any application, from any location, at any time. With AppNeta’s SaaS-based solution, IT and Network Ops teams at large, distributed enterprises can quickly pinpoint issues that affect network and business-critical cloud application performance, regardless of where they occur. AppNeta is trusted by some of the biggest Fortune 1000 companies, including 3 out of the 5 largest corporations in the world, as well as 4 out of the 5 largest cloud providers. For more information, visit www.appneta.com. -
3
Forcepoint ONE
Forcepoint
Data-first SASE starts with Forcepoint ONE. Protect data everywhere and secure access anywhere with the all-in-one, cloud-native security platform. Bring data security everywhere to empower productivity anywhere. Secure access to the web, cloud and private apps and get continuous control over data with Forcepoint ONE. Let users work where they want and how they want – securely. CASB, ZTNA and SWG provide security in the cloud, on the web and safeguard access to private apps through both agent-based and agentless deployment to ensure productivity while data stays safe on any device. Move to a unified cloud service to lower operating expenses and capitalize on the AWS hyperscaler platform. Forcepoint Insights provides real-time economic value readings driven by your security posture. Better protect sensitive data on the web, in the cloud and in private apps. Employ the principle of least privilege with identity-based access control. -
4
ForgeRock
ForgeRock
Radically improve and scale all things identity, governance, and access management with the industry's only full-suite, AI-driven platform. Today we rely on digital access for our work, learning, and personal lives more than at any other time in history. To meet demand and keep up with competitors, it’s imperative to speed digital transformation and provide superior experiences while ensuring the utmost security. At ForgeRock, we help people safely and simply access the connected world by helping organizations significantly improve and scale all things identity, governance, and access management. ForgeRock offers the industry's only full-suite, AI-driven platform purpose-built for all identities and use cases (consumers, workforce, and things). ForgeRock’s comprehensive, yet simple-to-use solutions allow you to grow revenue, manage risks, increase workforce productivity, and reduce costs. -
5
AirWave Management
Aruba Networks
Aruba AirWave is a versatile multi-vendor wired and wireless network management system. If you're looking for unlimited scale, AIOps, and more, consider moving to Aruba Central: a cloud-managed networking solution. AirWave is a leading network management solution that simplifies day-to-day operations for large-scale campus environments. Manage multiple generations of switches and wireless access points from just about any vendor, while getting granular visibility across your access infrastructure. It's easy to add, modify, or deploy new network devices using zero-touch provisioning, group templates, and intuitive workflows. Offering quick drill-downs into health and availability metrics, AirWave's detailed dashboards help you monitor critical network and application services. Quickly resolve network issues as they arise with real-time discovery, topology views, and powerful troubleshooting tools. -
6
F5 BIG-IP
F5
Advanced technology for an app-centric world. Apps are your business. BIG-IP application services provide the availability, performance, and security you need to meet business demands. Keep your apps up and running with BIG-IP application delivery controllers. BIG-IP Local Traffic Manager (LTM) and BIG-IP DNS handle your application traffic and secure your infrastructure. You’ll get built-in security, traffic management, and performance application services, whether your applications live in a private data center or in the cloud. BIG-IP Diameter Traffic Management, BIG-IP Policy Enforcement Manager (PEM), and BIG-IP Carrier-Grade NAT (CGNAT) manage network resources to keep your applications performing at carrier-grade levels. They also help you identify ways to optimize and monetize your network, improving your bottom line. -
7
VMware vSphere
Broadcom
Get the power of the enterprise workload engine. Boost workload performance, improve security and speed up innovation for your business. vSphere delivers essential services for the modern hybrid cloud. The new vSphere has been rearchitected with native Kubernetes to run existing enterprise applications alongside modern containerized applications in a unified manner. Transform on-premises infrastructure with cloud integration. Boost productivity with central management, global insights and automation. Power up with add-on cloud services. Meet the throughput and latency needs of distributed workloads by accelerating networking functions on the DPU. Free up GPU resources for faster AI/ML model training and higher complexity models. -
8
HyperSQL DataBase
The hsql Development Group
HSQLDB (HyperSQL DataBase) is the leading SQL relational database system written in Java. It offers a small, fast multithreaded and transactional database engine with in-memory and disk-based tables and supports embedded and server modes. It includes a powerful command line SQL tool and simple GUI query tools. HSQLDB supports the widest range of SQL Standard features seen in any open source database engine: SQL:2016 core language features and an extensive list of SQL:2016 optional features. It supports full Advanced ANSI-92 SQL with only two exceptions. Many extensions to the Standard, including syntax compatibility modes and features of other popular database engines, are also supported. -
9
Eracent
Eracent
Eracent helps its customers meet the challenges of managing software licenses and computing assets in today’s complex and evolving IT environments. Our enterprise clients save significantly on their annual software spend, reduce their audit and security risks, and establish more efficient asset management processes. Eracent’s client base includes some of the world’s largest corporate and government networks and IT environments. Quality data is the foundation of any effective SAM or ITAM program. Eracent’s cross-platform discovery, application recognition, and software utilization analytics provide detailed insight. Flexible integration enables data from other sources to be shared and normalized for complete ownership and operational view. Discovery and Usage details for data center, desktop, cloud, and mobile platforms. Lifecycle management and flexible process automation for hardware and software assets. -
10
A complete, natively built, fully integrated and automated suite of cybersecurity capabilities in one, unified solution. Easy to deploy, operate and manage. All the cybersecurity protections you need, included in the Cynet All-in-One platform! Endpoints, Networks, Users, Email, Mobile, SaaS, Cloud – we cover it all with MITRE-proven threat detection to protect your environment. Automatically investigate every threat and automatically remediate all attack components across your environment in seconds. Automatically collect high priority log data to uncover threats across your environment quickly and accurately. We monitor your environment around the clock to ensure dangerous threats are not overlooked and properly addressed.
-
11
Commvault Complete Data Protection
Commvault
A unified solution combining Commvault Backup & Recovery with Commvault Disaster Recovery to deliver enterprise-grade data protection that is powerful and easy to use. Ensure data availability and business continuity across your on-prem and cloud environments using a single extensible platform. Comprehensive workload coverage (files, apps, databases, virtual, containers, cloud) from a single extensible platform and user interface. Rapid, granular recovery of data and applications. Easily back up, recover, and move data and workloads to/from/within/between clouds. Fast VM, application, and storage snapshot replication with flexible RPO/RTO. Reduce costs with minimal infrastructure requirements in the cloud or on-premises -
12
Deep Instinct
Deep Instinct
Deep Instinct is the first and only company to apply end-to-end deep learning to cybersecurity. Unlike detection and response-based solutions, which wait for the attack before reacting, Deep Instinct’s solution works preemptively. By taking a preventative approach, files and vectors are automatically analyzed prior to execution, keeping customers protected in zero time. This is critical in a threat landscape, where real time is too late. With the aim of eradicating cyber threats from the enterprise, Deep Instinct protects against the most evasive known and unknown cyberattacks with unmatched accuracy, achieving highest detection rates and minimal false positives in tests regularly performed by third parties. Providing protection across endpoints, networks, servers, and mobile devices, the lightweight solution can be applied to most OSs and protects against both file-based and fileless attacks. -
13
Market-leading SIEM built to outpace the adversary with speed, scale and accuracy As digital threats loom large and cyber adversaries grow increasingly sophisticated, the roles of SOC analysts are more critical than ever. Going beyond threat detection and response, QRadar SIEM enables security teams face today’s threats proactively with advanced AI, powerful threat intelligence, and access to cutting-edge content to maximize analyst potential. Whether you need cloud-native architecture built for hybrid scale and speed or a solution to complement your on-premises infrastructure, IBM can provide you with a SIEM to meet your needs. Experience the power of IBM enterprise-grade AI designed to amplify the efficiency and expertise of every security team. With QRadar SIEM, analysts can reduce repetitive manual tasks like case creation and risk prioritization to focus on critical investigation and remediation efforts.
-
14
Druva Phoenix
Druva
Druva Phoenix delivers data protection and management for enterprise workloads with a unique cloud-first approach. It combines high-performance, scalable backup, disaster recovery (DR), archival and analytics to simplify data protection, improving visibility and dramatically reducing the risk, cost and effort of managing today’s complex information environment – all delivered as-a-service. Total cost of ownership goes beyond just the cost of acquiring a new data center backup protection product; it’s important to look at the long term cost and complexity of the solution. Our TCO calculator can show you the savings potential of the cloud. -
15
BeyondTrust Privileged Remote Access
BeyondTrust
Secure, manage, and audit vendor and internal remote privileged access without a VPN. Watch demo. Give legitimate users the access they need to be productive, while keeping attackers out. Give contractors and vendors privileged access to critical assets without giving them a VPN. Satisfy internal and external compliance requirements with comprehensive audit trails and session forensics. Guarantee adoption with a system that actually lets users do their jobs faster and easier than they do today. Prevent “privilege creep” and quickly enforce least privilege to protect your IT assets. Make least privilege productive and combat data breaches, without sacrificing security. Standardized, secure, and complete privileged session management solution that controls the access to and from any platform in any environment. Eliminate manual credential check-in and check-out. -
16
Cofense Intelligence
Cofense
Let’s face it, phishing is the #1 attack vector against your enterprise. When you are under fire, you need to understand the nature of the attack as well as how to quickly and proactively defend yourself. The faster your team can be armed with critical knowledge about an attack, the faster they can minimize the threat. That’s why Cofense Intelligence delivers phishing-specific threats to help you defend your network. Cofense Intelligence uses proprietary techniques to analyze millions of messages daily from a wide variety of sources. We automatically dissect messages to identify new and emerging phishing and malware threats. Our team of analysts dive into these messages to eliminate false positives while delivering the right intelligence when you need it. Cofense Intelligence is distributed in multiple formats including Machine-Readable Threat Intelligence (MRTI) for quick and easy integration into other security solutions. -
17
1E
1E
The 1E platform helps IT teams improve end user experience, tighten security, reduce costs, and evolve IT Operations from cost center to strategic enabler. Our platform contains 1E for Visibility, Control, and Compliance, 1E for Digital Experience Observability, and 1E for Service Desk Automation solutions. Modern, automated, real-time configuration and compliance for the entire IT estate. Decrease resolution times without leaving ServiceNow. Understand how end users feel about their digital environments by systematically collecting, measuring, and surfacing actionable end user feedback. Troubleshoot faster, respond quickly to security incidents and threats, and provide a better employee experience by resolving issues in minutes instead of hours. Automate common requests, eliminate the need for tickets, and free service desk agents to focus on high-value tasks. Improve device stability and performance with insights on software usage so you can remove whatever isn’t being used. -
18
Checkmarx
Checkmarx
The Checkmarx Software Security Platform provides a centralized foundation for operating your suite of software security solutions for Static Application Security Testing (SAST), Interactive Application Security Testing (IAST), Software Composition Analysis (SCA), and application security training and skills development. Built to address every organization’s needs, the Checkmarx Software Security Platform provides the full scope of options: including private cloud and on-premises solutions. Allowing a range of implementation options ensures customers can start securing their code immediately, rather than going through long processes of adapting their infrastructure to a single implementation method. The Checkmarx Software Security Platform transforms the standard for secure application development, providing one powerful resource with industry-leading capabilities. -
19
Alibaba Cloud Security Scanner
Alibaba
Cloud Security Scanner utilizes data, white hat penetration testing, and machine learning to provide an all-in-one security solution for domains and other online assets. CSS detects web vulnerabilities, illicit content, website defacement, and backdoors to prevent possible financial loss caused by damage to your brand reputation. Cloud Security Scanner comprehensively detects any risks to your website and online assets, such as web vulnerabilities, weak passwords, website defacement, and Trojan attacks. The system scans all source code, text, and images for vulnerabilities. Developed through penetration testing, WTI has built-in multi-layer verification rules to ensure high accuracy of vulnerability detection. The system uses comprehensive decision making and model-based analysis, to provide accurate detection of content risks. Submit any questions about the scanning results to our team of experts. -
20
Cherwell HR Service Management
Cherwell
In today’s digital world, employees expect HR to deliver real-time, on-demand services—but that’s easier said than done. Cherwell HR Service Management enables organizations to streamline and automate HR service delivery for quick and efficient case management and on-boarding, along with a self-service portal for better and more productive employee service experiences. Automate internal on-boarding processes and integrate with other department workflows to make new hire transitions easy and efficient. Increase HR staff productivity by resolving the majority direct employee inquires through the HR self-service portal. Provide employees with easy access to information on their employment, benefits and company culture. -
21
Cisco Intersight
Cisco
Cisco Intersight is Cisco’s systems management platform that delivers intuitive computing through cloud-powered intelligence. This platform offers a more intelligent level of management that enables IT organizations to analyze, simplify, and automate their environments in ways that were not possible with prior generations of tools. This capability empowers organizations to achieve significant savings in Total Cost of Ownership (TCO) and to deliver applications faster in support of new business initiatives. Experience a customized one-on-one demo and see what simple, automated management can do. Simplify management with automated issue detection and support for analyzing and resolving issues. -
22
FortiNAC
Fortinet
The proliferation of Internet of Things (IoT) devices, has made it necessary for organizations to improve their visibility into what is attached to their networks. They need to know every device and every user accessing their networks. IoT devices enable digital transformation initiatives and improve efficiency, flexibility, and optimization. However, they are inherently untrustworthy, with designs that prioritize low-cost over security. FortiNAC provides the network visibility to see everything connected to the network, as well as the ability to control those devices and users, including dynamic, automated responses. Network access control solutions are an important part of a Zero Trust Access model for security, in which trust is no longer implicit for users, applications, or devices attempting to access the network, and for which IT teams can easily know who and what are accessing the network, as well as how to protect corporate assets both on and off the network. -
23
Splunk SOAR
Splunk
Splunk SOAR (Security Orchestration, Automation, and Response) is a powerful platform that enables organizations to streamline and automate their security operations. It integrates with various security tools and systems, allowing teams to automate repetitive tasks, orchestrate workflows, and respond to incidents faster. With Splunk SOAR, security teams can create playbooks that automate incident response processes, reducing the time to detect, investigate, and resolve security threats. The platform also offers advanced analytics, real-time threat intelligence, and collaboration tools to enhance decision-making and improve overall security posture. By automating routine tasks and enabling more efficient use of resources, Splunk SOAR helps organizations respond to threats with greater speed and accuracy, minimizing risks and enhancing cybersecurity resilience. -
24
Dragos Platform
Dragos
The Dragos Platform is the most trusted industrial control systems (ICS) cybersecurity technology–providing comprehensive visibility of your ICS/OT assets and the threats you face, with best-practice guidance to respond before a significant compromise. Built by practitioners for practitioners, the Dragos Platform ensures your cybersecurity team is armed with the most up-to-date defensive tools to combat industrial adversaries, codified by our experts on the front lines every day hunting, combatting, and responding to the world’s most advanced ICS threats. The Dragos Platform analyzes multiple data sources including protocols, network traffic, data historians, host logs, asset characterizations, and anomalies to provide unmatched visibility of your ICS/OT environment. The Dragos Platform rapidly pinpoints malicious behavior on your ICS/OT network, provides in-depth context of alerts, and reduces false positives for unparalleled threat detection. -
25
Tenable One
Tenable
Tenable One radically unifies security visibility, insight and action across the attack surface, equipping modern organizations to isolate and eradicate priority cyber exposures from IT infrastructure to cloud environments to critical infrastructure and everywhere in between. The world’s only AI-powered exposure management platform. See every asset across your entire attack surface—from cloud environments to operational technologies, infrastructure to containers, and remote workers to modern web-apps with Tenable's market-leading vulnerability management sensors. With more than 20 trillion aspects of threat, vulnerability, misconfiguration and asset information, Tenable’s machine-learning powered predictions reduce remediation efforts by enabling you to focus first on the risks that matter most. Drive improvements required to reduce the probability of a business-impacting cyber event from occurring by communicating objective measures of risk. -
26
Devo
Devo Technology
WHY DEVO Devo Data Analytics Platform. Achieve full visibility with centralized cloud-scale log management. Say goodbye to constraints and compromises. Say hello to the new generation of log management and analytics that powers operations teams. For machine data to improve visibility, transform the SOC, and achieve enterprise-wide business initiatives, you need to keep pace with the relentless real-time demands of exploding data volumes, while not breaking the bank. Massive scale, no ninjas required. Forget about re-architecting. Devo grows with your business, exceeding even the highest demands without requiring you to manage clusters and indexes or be confined by unreasonable limits. Onboard giant new datasets in a snap. Roll out access to hundreds of new users painlessly. Always meet your teams’ demands year after year, petabyte upon petabyte. Agile cloud-native SaaS. Lift-and-shift cloud architectures just don’t cut it. They’re afflicted with the same performance -
27
Contrast Assess
Contrast Security
A new kind of security designed for the way software is created. Resolve security issues minutes after installation by integrating security into your toolchain. Because Contrast agents monitor code and report from inside the application, developers can finally find and fix vulnerabilities without requiring security experts. That frees up security teams to focus on providing governance. Contrast Assess deploys an intelligent agent that instruments the application with smart sensors. The code is analyzed in real time from within the application. Instrumentation minimizes the false positives that slow down developers and security teams. Resolve security issues minutes after installation by integrating security into your toolchain. Contrast Assess integrates seamlessly into the software life cycle and into the tool sets that development and operations teams are already using, including native integration with ChatOps, ticketing systems and CI/CD tools, and a RESTful API. -
28
GlobalSign
GlobalSign
GlobalSign is the leading provider of trusted identity and security solutions. Enabling businesses, large enterprises, cloud service providers and IoT innovators around the world to secure online communications, manage millions of verified digital identities and automate authentication and encryption. Its high-scale Public Key Infrastructure (#PKI) and identity solutions support the billions of services, devices, people and things comprising the Internet of Everything (#IoE). GlobalSign is an identity services company providing cloud-based, highly scalable PKI solutions for enterprises needing to conduct safe commerce, communications, content delivery and community interactions. Our identity and security solutions enable businesses, large enterprises, cloud-based service providers and IoT innovators around the world to conduct secure online communications, manage millions of verified digital identities and automate authentication and encryption. -
29
Coalfire
Coalfire
Only Coalfire brings the cloud expertise, technology, and innovative approaches that empower your organization to capitalize on the promise of digital transformation. Coalfire is the cybersecurity advisor that helps private and public sector organizations avert threats, close gaps, and effectively manage risk. By providing independent and tailored advice, assessments, technical testing, and cyber engineering services, we help clients develop scalable programs that improve their security posture, achieve their business objectives, and fuel their continued success. Coalfire has been a cybersecurity thought leader for more than 16 years and has offices throughout the United States and Europe. Unlock the full potential of your cloud – and lock in your success. Beat them at their game. Partner with the adversary of your adversaries. A business-aligned, modern cybersecurity program. Advantage you. -
30
Akamai Guardicore Segmentation simplifies segmentation, reduce your attack surface and prevent lateral movement with fast and simple segmentation that works everywhere. Granular visibility and segmentation controls for Data Center, Cloud and Hybrid Cloud Environments. The Akamai Guardicore Segmentation Platform is the simplest and most intuitive way to visualize activity in data center and cloud environments, implement precise segmentation policies, protect against external threats, and detect possible breaches quickly. Akamai Guardicore Segmentation collects detailed information about an organization’s IT infrastructure through a mix of agent-based sensors, network-based data collectors, and virtual private cloud (VPC) flow logs from cloud providers. Relevant context is added to this information through a flexible and highly automated labeling process that includes integration with existing data sources like orchestration systems and configuration management databases.
-
31
Kona Site Defender
Akamai Technologies
Protect your apps and APIs against the largest and most sophisticated attacks with a web application firewall and DDoS protection at the edge. Kona Site Defender provides application security at the edge — closer to attackers and further from your applications. With 178 billion WAF rule triggers a day, Akamai harnesses unmatched visibility into attacks to deliver curated and highly accurate WAF protections that keep up with the latest threats. Flexible protections help secure your entire application footprint and respond to changing business requirements, including APIs and cloud migration, with dramatically lower management overhead. Kona Site Defender employs a proprietary anomaly detection engine designed to deliver the highest accuracy out of the box. You need application security that can be customized for your unique requirements and the organizations you support. -
32
Converged Cloud Fabric
Arista
Converged Cloud Fabric (CCF)™ is an automated fabric built with cloud networking design principles. CCF leverages VPC/VNet constructs on-prem to deliver a cloud Network-as-a-Service operational model. CCF automates networking for multiple private cloud platforms, enabling the network to operate at the speed of VMs and Containers. With built-in analytics and telemetry, CCF provides real-time contextual visibility across the fabric and one-click troubleshooting workflows. With CCF, NetOps, DevOps and CloudOps teams can effectively collaborate, and rapidly on-board applications and tenants. CCF enables mainstream and midsize organizations to leverage network as a strategic pillar of the digital transformation strategy. With CCF's self-service networking and contextual intelligence, NetOps team can focus on innovations such as new services and analytics, instead of time-consuming manual tasks. -
33
Junos Space Network Management
Juniper Networks
Junos Space Network Management Platform works with our management applications to simplify and automate management of Juniper’s switching, routing, and security devices. As part of a complete solution, the platform provides broad fault, configuration, accounting, performance, and security management (FCAPS) capability, same day support for new devices and Junos OS releases, a task-specific user interface, and northbound APIs for integration with existing network management systems (NMS) or operations/business support systems (OSS/BSS). The platform helps network operators at enterprises and service providers scale operations, reduce complexity, and enable new applications and services to be brought to market quickly, through multilayered network abstractions, operator-centric automation schemes, and a simple point-and-click UI. -
34
Cisco DNA Center
Cisco
Cisco DNA Center is the network management and command center for Cisco DNA, your intent-based network for the enterprise. Provision and configure all your network devices in minutes. Use advanced artificial intelligence (AI) and machine learning (ML) to proactively monitor, troubleshoot, and optimize your network. Integrate with third-party systems for improved operational processes. Cisco DNA Center is a powerful network controller and management dashboard that can help you take charge of your network, optimize your Cisco investment, and lower your IT spending. Translate business intent into zero-trust network policies. Identify all endpoints and optimize user experience based on business requirements. Automate deployment and management of network devices and integration of security solutions, to promote consistency across configurations, reduce errors, and save time. -
35
Brivo
Brivo
Brivo supports your whole company to achieve your physical security, scalability, cybersecurity, data analytics and customization needs. Brivo is the global leader in cloud-based access control and security platforms for commercial and multifamily properties. Our mission is to provide Simply Better Security solutions that improve user experiences for property managers, tenants, employees, and visitors. With over 20 million users and 1,500 authorized dealers, our SaaS platform has been unifying the security experience across access control, mobile credentials, video surveillance, identity federation, visitor management, intercoms, and elevator control since 2001. Hundreds of software partners and end users use our APIs and SDKs to extend our solutions to unique vertical market offerings. Brivo’s Vacation Rental Property Management is a cloud-based system that combines guest bookings, messaging, home automation, and security to increase property value and appeal. -
36
Medigate
Medigate
Healthcare’s Security and Clinical Analytics Company. #1 IoT device security solution designed for Healthcare. Medigate has invested in building out the largest medical device and protocol database so you can have the most detailed device inventories and accurate threat detection available. Medigate offers the industry’s only truly dedicated medical device security platform that identifies and protects all Internet of Medical Things (IoMT) devices connected to a healthcare provider’s network. Unlike general IoT solutions, we’ve built our cyber security platform specifically and only for the unique needs of medical devices and clinical networks. Our solution safeguards clinical networks from all angles by providing complete visibility into all connected medical devices to identify risk based on clinical context, detect anomalies according to manufacturers’ protocols and actively block malicious activities by integrating into your existing firewalls or NAC. -
37
Claroty
Claroty
Powered by our Continuous Threat Detection (CTD) and Secure Remote Access (SRA) solutions, our platform provides a full range of industrial cybersecurity controls that integrate seamlessly with your existing infrastructure, scale effortlessly, and have the industry's lowest total cost of ownership (TCO). The comprehensive industrial cybersecurity controls our platform provides revolve around the REVEAL, PROTECT, DETECT, CONNECT framework. Our platform's features empower you to achieve effective industrial cybersecurity, regardless of where you are on your industrial cybersecurity journey. The Claroty Platform is deployed across multiple industries, each with unique operational and security needs. Effective industrial cybersecurity starts with knowing what needs to be secured. Our platform removes the barriers that limit industrial networks from securely connecting to what enables the rest of the business to operate and innovate with an acceptable level of risk. -
38
Keyfactor Control
Keyfactor
You know the drill. Tight budgets, hardware constraints, and complex supply chains make it nearly impossible to consider all factors necessary to embed strong security into your devices. But when safety, security, and trust are at stake – it has to happen. Keyfactor Control is an end-to-end IoT Identity Platform that enables manufacturers to build high-assurance identity at every step of the device lifecycle – from product design through end-of-life. Embed PKI-based digital identity and integrity into every device at scale – from design and manufacturing throughout the product lifecycle. Build secure identity into device design and development easily, cost-effectively, and at scale. Reduce the cost of device maintenance with secure over-the-air updates and remote management. Protect devices against fraud and tampering, and avoid preventable security and warranty recalls. -
39
Endpoint Detection and Response tool from ESET that enables continuous comprehensive monitoring of real-time endpoint activity, in-depth analysis of suspicious processes and immediate response to incidents and breaches. Paired with ESET Endpoint Protection Platform, ESET Enterprise Inspector is a complete prevention, detection and remediation solution. ESET Enterprise Inspector features an API that enables accessing and exporting of detections and their remediation to allow effective integration with tools such as SIEM, SOAR, ticketing tools and many others. ESET Enterprise Inspector features remote PowerShell capabilities that allow security engineers to remotely inspect and configure their organization’s computers, so a sophisticated response can be achieved without breaking the user’s workflow. Apply data filters to sort it based on file popularity, reputation, digital signature, behavior or contextual information.
-
40
Proofpoint Identity Threat Defense
Proofpoint
In an ever-changing hybrid world, your organization depends on its employees, their virtual identities, and the endpoints they operate on to build and protect its assets. Threat actors have found unique ways to move laterally across your cloud environments by exploiting such identities. You need an innovative and agentless identity threat detection and response solution to discover and remediate modern identity vulnerabilities—a key part of today’s attack chain. Proofpoint Identity Threat Defense, previously Illusive, gives you comprehensive prevention and visibility across all your identities so you can remediate identity vulnerabilities before they become real risks. You can also detect any lateral movements in your environments and activate deception to ensure threat actors are stopped in action before they gain access to your corporate assets. It doesn’t get better than knowing you can prevent modern identity risks and stop real-time identity threats in action, all in one place. -
41
Cisco Secure Workload
Cisco
Achieve the security required for today's heterogeneous multicloud environment with Cisco Secure Workload (formerly Tetration). Protect workloads across any cloud, application, and workload--anywhere. Automate and implement a secure zero-trust model for micro-segmentation based on application behavior and telemetry. Proactively detect and remediate indicators of compromise to minimize the impact to your business. Automate micro-segmentation through customized recommendations based on your environment and applications. Granular visibility and control over application components with automatic detection and enforcement of compliance. Track the security posture of applications across your entire environment. Make informed decisions using automatic NIST vulnerabilities data feed. -
42
Antigena Network
Darktrace
The Darktrace Immune System is the world’s leading autonomous cyber defense platform. Its award-winning Cyber AI protects your workforce and data from sophisticated attackers, by detecting, investigating and responding to cyber-threats in real time — wherever they strike. The Darktrace Immune System is a market-leading cyber security technology platform that uses AI to detect sophisticated cyber-threats, from insider threat and criminal espionage, to ransomware and nation-state attacks. Analogous to the human immune system, Darktrace learns the ‘digital DNA’ of the organization, and constantly adapts to changing environments. Self-learning, self-healing security has arrived. Machine-speed attacks like ransomware are simply too fast for humans to deal with. Autonomous response takes the burden off the security team, responding 24/7 to fast-moving attacks. AI that fights back. -
43
Mandiant Advantage
Mandiant
Prioritize effort and increase capacity to detect and respond to attacks with Mandiant Advantage, a software-as-a-service (SaaS) platform that automates our expertise and intelligence into your environment. Effective security is not only based on the security controls deployed, but the expertise and intelligence behind them. Without a significant increase in human expertise, it is impossible for organizations to win the global war on cyber crime. Mandiant Advantage is tipping the balance on attackers, productizing our extensive attacker expertise and threat intelligence capabilities into accessible, automated solutions that instantly provide the scale and capability teams so desperately need. The Mandiant Advantage software-as-a-service platform is a controls-agnostic suite of products that automate our expertise and intelligence into your environment. Deliver detection, response and security validation capabilities at machine speed. -
44
Eclypsium
Eclypsium
Eclypsium® ensures the health and integrity of enterprise devices at the fundamental firmware and hardware layers that traditional security fails to protect. Eclypsium provides a new layer of security to defend the critical servers, networking gear, and laptops at the heart of every organization. Unlike traditional security that only protects the software layers of a device, Eclypsium brings security to the hardware and firmware. From the earliest boot process to the most fundamental code on a device, Eclypsium finds and fixes the low-level weaknesses and threats that attackers use to defeat traditional security. Get high-fidelity views into all enterprise devices including servers, networking gear, and laptops. Automatically find vulnerabilities and threats in all hardware and firmware components inside each device. See into devices both on-premises or deployed remotely including remote work and BYOD devices. -
45
FortiGate IPS
Fortinet
Comprehensive threat protection with a powerful intrusion prevention system. An intrusion prevention system (IPS) is a critical component of every network’s core security capabilities. It protects against known threats and zero-day attacks including malware and underlying vulnerabilities. Deployed inline as a bump in the wire, many solutions perform deep packet inspection of traffic at wire speed, requiring high throughput and low latency. Fortinet delivers this technology via the industry-validated and recognized FortiGate platform. FortiGate security processors provide unparalleled high performance, while FortiGuard Labs informs industry-leading threat intelligence, which creates a proven success in protecting from known and zero-day threats. As a key component of the Fortinet Security Fabric, FortiGate IPS secures the entire end-to-end infrastructure without compromising performance. -
46
Endgame
Endgame
Endgame lets you connect the dots between user behavior and sales opportunities, without expensive data scientists or engineers. GTM teams can’t connect the dots between product usage and sales opportunities. GTM teams with a free plan or trial lack visibility into the behavior of their signups, trial users, and sales opportunities. Revenue leaders waste countless hours figuring out which accounts and users their reps should engage with. Reps don’t know what action will lead to the best outcomes, which results in the wrong action (or no action at all). Take immediate action on prospective and current customers based on real-time data signals. See what top accounts and users are doing in your product, how far along their journey they’ve come, and whether or not your reps should engage with them. Improve the performance of your reps by showing them the prospects and opportunities with the strongest signals. -
47
ADP Workforce Now On the Go provides the most comprehensive set of easy-to-use tools in Canada to help small businesses manage Payroll and Time & Attendance productively. ADP is uniquely positioned to serve small businesses with expertise from certified payroll experts and vast experience through serving 35,000 small business customers in Canada. Workforce Now On the Go offers different payroll and time & attendance product options to provide customers with the optimal solution based on their needs. Simplify your payday with ADP Workforce Now On the Go, the all in one mobile and desktop payroll and time & attendance software for Canadian business owners. Set-up and run payroll in minutes, with guided prompts walking you through each step of the way to help you ensure it is done accurately and notifications to help you make sure you never miss getting your employees paid.
-
48
Cisco Prime Network
Cisco
Cisco Prime Network is a cost-effective device operation, administration, and network fault-management solution. This single solution helps service providers reduce management complexity and deliver carrier-class services. It supports the physical network components as well as the compute infrastructure, and virtual elements found in data centers. Increased operational efficiency through automated network discovery, configuration and change management. Enhanced customer satisfaction through proactive service assurance using postevent fault management and trend information. Lower integration costs through preintegration with Cisco Prime Carrier Management suite and northbound interfaces to third party applications. Detailed end-to-end views of the physical and virtual network topology and inventory. GUI-based device configuration with prebuilt and downloadable scripts. Up-to-date displays of network event, state, and configuration changes. -
49
BlueCat Unified DDI
BlueCat
Your business needs a network that can support strategic initiatives like multicloud management, SASE, SD-WAN, remote work, and beyond. That means you need core services optimized for collaboration between every team that touches the network—across NetOps, security, cloud, application development, and others. We provide DDI solutions that help your teams manage, secure, and build on your network faster and more effectively together. -
50
BlueCat Integrity
BlueCat
Simplify IP address management into a centralized IPAM solution to manage and reconcile multiple IP spaces on premises or in the cloud, while delivering scalable DHCP management with DNS. A user experience that enhances visual elements for a more aesthetically pleasing, intuitive, and consistent interface. Ensure that only select users can create, manage, or delete host and c-names records, DHCP ranges, and reservations in BlueCat Address Manager. Create an anycast pool with both on premises and cloud-based DNS services to lower latency for both on premises and cloud-based DNS clients. Highly reliable backup, failover, and recovery options regardless of deployment in the cloud or on premisis.