23 Integrations with BeyondTrust Endpoint Privilege Management

View a list of BeyondTrust Endpoint Privilege Management integrations and software that integrates with BeyondTrust Endpoint Privilege Management below. Compare the best BeyondTrust Endpoint Privilege Management integrations as well as features, ratings, user reviews, and pricing of software that integrates with BeyondTrust Endpoint Privilege Management. Here are the current BeyondTrust Endpoint Privilege Management integrations in 2024:

  • 1
    Nucleus

    Nucleus

    Nucleus

    Nucleus is redefining the vulnerability management software category as the single source of record for all assets, vulnerabilities, and associated data. We unlock the value you’re not getting from existing tools and place you squarely on the path to program maturity by unifying the people, processes, and technology involved in vulnerability management. With Nucleus, you receive unmatched visibility into your program and a suite of tools with functionality that simply can’t be replicated in any other way. Nucleus is the single shift-left tool that unifies development and security operations. It unlocks the value you’re not getting out of your existing tools and puts you on the path to unifying the people, processes, and technology involved in addressing vulnerabilities and code weaknesses. With Nucleus, you’ll get unmatched pipeline integration, tracking, triage, automation and reporting capabilities and a suite of tools with functionality.
    Starting Price: $10 per user per year
  • 2
    Axonius

    Axonius

    Axonius

    Axonius gives customers the confidence to control complexity by providing a system of record for all digital infrastructure. With a comprehensive understanding of all assets including devices, identities, software, SaaS applications, vulnerabilities, security controls, and the context between all assets, customers are able to mitigate threats, navigate risk, decrease incident response time, automate action, and inform business-level strategy — all while eliminating manual, repetitive tasks. Recognized as creators of the Cyber Asset Attack Surface Management (CAASM) category and innovators in SaaS Management Platform (SMP) and SaaS Security Posture Management (SSPM), Axonius is deployed in minutes and integrates with hundreds of data sources to provide a comprehensive asset inventory, uncover gaps, and automatically enforce policies and automate action.
  • 3
    insightAppSec
    Highest rated DAST solution by an independent research firm three years in a row. Automatically assess modern web apps and APIs with fewer false positives and missed vulnerabilities. Fast-track fixes with rich reporting and integrations, and inform compliance and development stakeholders. Effectively manage the security assessment of your application portfolio, regardless of its size. Automatically crawl and assess web applications to identify vulnerabilities like SQL Injection, XSS, and CSRF. The modern UI and intuitive workflows built on the Insight platform make InsightAppSec easy to deploy, manage, and run. Scan applications hosted on closed networks with the optional on-premise engine. InsightAppSec assesses and reports on your web app's compliance to PCI-DSS, HIPAA, OWASP Top Ten, and other regulatory requirements.
    Starting Price: $2000 per app per year
  • 4
    Incident IQ

    Incident IQ

    Incident IQ

    Incident IQ is committed to supporting teaching and learning by transforming technology support, asset management and services delivery to meet the needs of today’s K-12 schools. Incident IQ is transforming K-12 workflows by digitizing service delivery to empower students, teachers, and support teams. From help desk ticketing and IT asset management to maintenance work orders and beyond, Incident IQ is revolutionizing the way school districts provide and manage services. Get learning devices into students' hands quickly. Easily check devices in and out. Track previous ownership, storage location, and more. Enterprise-level asset management tools, built for the scale of today’s K-12 technology. Asset management software is a centralized system that allows your organization to track important asset information in real-time. This decreases administrative costs, streamlines service management processes, and gives your organization greater visibility into asset usage and maintenance.
  • 5
    Qualys WAS

    Qualys WAS

    Qualys

    Robust cloud solution for continuous web app discovery and detection of vulnerabilities and misconfigurations. Fully cloud-based, it’s easy to deploy and manage, and scales to millions of assets. WAS finds and catalogs all web apps in your network, including new and unknown ones, and scales from a handful of apps to thousands. With Qualys WAS, you can tag your applications with your own labels and then use those labels to control reporting and limit access to scan data. WAS’ dynamic deep scanning covers all apps on your perimeter, in your internal environment and under active development, and even APIs that support your mobile devices. It also covers public cloud instances, and gives you instant visibility of vulnerabilities like SQLi and XSS. Authenticated, complex and progressive scans are supported. With programmatic scanning of SOAP and REST API services, WAS tests IoT services and APIs used by mobile apps and modern mobile architectures.
  • 6
    TCS MasterCraft DevPlus

    TCS MasterCraft DevPlus

    Tata Consultancy Services

    To drive competitive advantage using digital technologies, enterprises need high performance IT teams that deliver high quality products and services faster. TCS MasterCraft™ DevPlus is a scalable, Agile and DevOps product, that helps your teams tailor their workflow to track and manage Scrum, Kanban or any other Agile framework, perform continuous testing, and automate release management. Build the right product by ensuring transparency and alignment across all levels of the enterprise. Accelerate your demand to deploy journey through automation, enabling businesses to realize value rapidly. Ship a minimum viable product and enhance it iteratively by receiving continuous feedback from end users. Maintaining end-to-end traceability of application delivery by ensuring transparency and alignment of all enterprise teams that work on various platforms, applications, teams etc. Enterprise level governance and reporting during your demand to deploy journey.
  • 7
    TCS MasterCraft DataPlus

    TCS MasterCraft DataPlus

    Tata Consultancy Services

    The users of data management software are primarily from enterprise business teams. This requires the data management software to be highly user-friendly, automated and intelligent. Additionally, data management activities must adhere to various industry-specific and data protection related regulatory requirements. Further, data must be adequate, accurate, consistent, of high quality and securely accessible so that business teams can make informed and data-driven strategic business decisons. Enables an integrated approach for data privacy, data quality management, test data management, data analytics and data modeling. Efficiently addresses growing volumes of data efficiently, through service engine-based architecture. Handles niche data processing requirements, beyond out of box functionality, through a user-defined function framework and python adapter. Provides a lean layer of governance surrounding data privacy and data quality management.
  • 8
    TCS MasterCraft TransformPlus

    TCS MasterCraft TransformPlus

    Tata Consultancy Services

    TCS MasterCraft™ TransformPlus is a cognitive transformation platform that provides clear visibility into core business applications, with an intelligent blueprint, and centralized knowledge repository, which is technology agnostic and implicit knowledge driven. Its automated conversion platform for modernization and faster roll outs, helps enterprises in their digital journey without business disruption. Cognitive code analysis based application knowledge repository with business rule externalization. A platform for designing and executing data transformation and migration for enterprises, especially during legacy application modernization. A solution for development of new digital applications using automatic code generation platform, based on model-based development. An automated migration platform for DB and language conversion, which accelerates application transformation.
  • 9
    TCS OmniStore

    TCS OmniStore

    Tata Consultancy Services

    Customers walking into stores are trading transactions for ‘aha’ moments and experiences, the convenience of picking up or returning an online order at the store or a micro moment such as an irresistible discount offered by the store associate on a ‘wishlisted’ item. However, retailers are struggling with a point of sale (POS) solution that is unable to step up to offer the new customer centric capabilities of today. TCS OmniStoreTM is a unified commerce platform that completely revolutionizes the way customers shop and will be at the heart of everything you do. It serves as an antidote to retailers who had to contend with a patchwork of haphazard systems that fall short of meeting evolving customer expectations. Orchestrate integrated multichannel customer journeys. Build new services and apps quickly without worrying about channel constraints Enable customers to checkout anywhere in the store. Ensure their stores are ‘always on’ to drive unique, interconnected micro-experiences.
  • 10
    TCS Optumera

    TCS Optumera

    Tata Consultancy Services

    As retailers strategize for the post-COVID world marked with rising costs, changing shopping behavior, stifling competition and implementing safety norms, an imperative need is to be able to respond swiftly. This requires a tectonic shift in the way retailers operate. The way forward is providing the required resilience to unlock exponential value and make decisions with confidence backed with big data, predictive analytics, intelligent real-time, personalized and localized insights. TCS Optumera™ AI-powered retail optimization suite, helps to optimize merchandising and supply chain decisions in an integrated manner. Retailers have seen 3-5% increase in sales, ~50% reduction in time spent, 5x more strategies and 20-30% reduction in costs. Complete customers basket across channels considering demand transferability, customer choice sets, predictive analytics and competitive assortment.
  • 11
    TCS TAP

    TCS TAP

    Tata Consultancy Services

    Technology breakthroughs are enabling organizations to reimagine their sourcing and procurement functions into a virtual organization in order to drive agile and integrated processes, while aligning buying decisions with sourcing strategies. The new age of agile sourcing and smart procurement brings a different set of opportunities for the leaders, along with stakeholder expectations. Sourcing and procurement leaders are aiming to overcome functional silos, unifying end-to-end source to pay processes while exploring ways to leverage supplier relationships that can drive innovation as they try to improve performance and mitigate risks. Procurement 4.0 is characterized by boundary less source to pay functions, capability to act on “here and now” spend insights, zero-touch smart buying, and ability to leverage ecosystems. TAP can be deployed as an integrated source to pay suite as well as an independent module including TAP Sourcing, TAP Quick Bid, TAP Procure to Pay.
  • 12
    TCS HOBS

    TCS HOBS

    Tata Consultancy Services

    In an era of digital business, we are helping organizations in their strategic pivot towards subscription business models, data monetization and device management. We drive mass personalization, leverage ecosystems, and deliver as-a-service models at scale. We help monetize ‘smart, connected devices’, unlock new revenue streams and improve profits, revenues and cash flows. The next-generation digital business platform for subscription, device and data, delivering 'growth and transformation' for your business. Improve margins and net promoter scores with world class revenue assurance. Big Data based, robust, and non-intrusive diagnostic methodology to improve customer experience. Acquires, converts, and collates data obtained from different applications of service providers. Leverages a workflow based case manager that enables creation of user defined workflows. Employs a business process engine for rule-based data processing.
  • 13
    ThreatAware

    ThreatAware

    ThreatAware

    Leveraging API feeds from your existing tools, validate your controls are correctly deployed and functioning across every cyber asset. Our clients come from all industries, from legal to finance, charities to retail. We are trusted by leading organizations to discover and protect their valuable cyber assets. Create a highly accurate device inventory by connecting to your existing systems via API. When issues arise the workflow automation engine can trigger actions via a webhook. ThreatAware provides clarity of the security control health of your cyber assets in a clear and simple design. Gain a macro view of your security control health regardless of how many controls you are monitoring. Generated from any field from a device, allows you to quickly group your cyber assets for monitoring and configuration purposes. When your monitoring systems accurately depicts your live environment, every alert is real.
  • 14
    Tenable

    Tenable

    Tenable

    Tenable’s Cyber Exposure Platform gives you all the insight, research and data you need to uncover weaknesses across your entire attack surface. See every asset across your entire attack surface—from cloud environments to operational technologies, infrastructure to containers, and remote workers to modern web-apps with Tenable's market-leading vulnerability management sensors. With more than 20 trillion aspects of threat, vulnerability, misconfiguration and asset information, Tenable’s machine-learning powered predictions reduce remediation efforts by enabling you to focus first on the risks that matter most. Drive improvements required to reduce the probability of a business-impacting cyber event from occurring by communicating objective measures of risk and aligning business goals with security initiatives. Products include: - Tenable.ep - Tenable.io - Tenable.sc - Tenable.ad - Tenable.ot - Tenable Lumin
  • 15
    Illusive

    Illusive

    Illusive

    Get actionable, real-time or on-demand forensic attack insight to accelerate blocking and remediation. When an attack is in progress and an alert has sounded, time is critical. Often, understaffed incident response teams must execute many separate collection processes and mine volumes of log files across a variety of different and incompatible tools. Attack Intelligence System provides rich and precise incident data in a user-friendly format whenever it is needed. Don’t sift through multiple tools and systems looking for the data needed to validate escalation. Illusive’s precision, real-time forensics display all collected forensic artifacts in chronological order, allowing analysts to quickly drill down and reduce response time by up to 90%. Use Illusive’s pre-built images to speed up and simplify creation of medium-interaction decoys for IoT, OT and network devices so that malicious activity can be detected in environments hostile to agents.
  • 16
    Intellicta

    Intellicta

    TechDemocracy

    Intellicta, TechDemocracy’s brain child, is the first of its kind to deliver a holistic assessment of an entity’s cybersecurity, compliance, risk and governance. It is a singular product capable of predicting potential financial liabilities caused by threats posed by vulnerabilities in cyberspace. Intellicta empowers senior, non-technical business decision-makers to understand, evaluate and measure the effectiveness of their existing cybersecurity, governance, risk, and compliance programs. The platform can be customized to meet every company's unique business requirement. It leverages quantifiable metrics based on established models from ISM3, NIST, and ISO, among others to provide solutions. Intellicta boasts of open-source architecture that aggregates and analyzes every facet of an enterprise’s unique ecosystem, so that it can be integrated and monitored continuously. It can extract critical data from cloud-based, on-premises and third-party systems.
  • 17
    TCS CHROMA

    TCS CHROMA

    Tata Consultancy Services

    With shift in mindset from talent hunting to harnessing, connecting employees has become the need of the hour for talent development in an organization. Also, the need for engaging workplaces and agile teams is on the rise. HR practitioners are actively looking for an agile HR function, which brings a different set of opportunities for the leaders along with the stakeholder expectations. Organizations can capitalize on this new paradigm by orchestrating a highly cohesive HR function to drive greater level of employee engagement while leveraging potential across the enterprise. CHROMA™ is TCS’ Talent 4.0 solution helping enterprises to rapidly adopt HR best practices, foster collaboration, and effectively nurture talent with intelligent hiring, seamless on-boarding, comprehensive benefits covering diverse needs, simplified and mobile native features such as leave, attendance, and claims management, agile and cohesive social collaboration, flexible compensation, etc.
  • 18
    TCS Intelligent Urban Exchange

    TCS Intelligent Urban Exchange

    Tata Consultancy Services

    As urbanization continues at an unprecedented rate, planners and administrators are find it increasingly difficult to provide intelligent, safe, and sustainable cities and work environments to the occupants. The challenge before them is to achieve more viable and modernized urban living conditions and workplaces with limited resources. For this, city leaders need to leverage data from multiple Smart City 1.0 sources to provide services that promote sustainable living and economic development. Designed to accelerate the implementation of smart IoT initiatives in a cost-effective manner, the TCS Intelligent Urban Exchange™ (IUX) IoT Analytics for Smart Cities and Businesses is a modular, insight-centric platform that provides smart software solutions to address the challenges of a modern-day city. This cloud platform leverages data from multiple domains, systems, and IoT devices and runs advanced analytics that support real-time decision-making.
  • 19
    TCS ADD

    TCS ADD

    Tata Consultancy Services

    TCS ADD platform accelerates speed-to-market for pharmaceutical industry across the entire clinical R&D value chain and helps make clinical trials more agile and safe. TCS ADD enables digital ecosystems, simplifies data complexity and provides faster access to new and effective drugs for the patients. The platform is powered by cognitive artificial intelligence engine called TCS Decision FabricTM, smart analytics and IoT that provides superior business value to pharmaceutical industry. A next-generation and end-to-end metadata-driven solution to manage industry & sponsor clinical standards. A data science-driven platform that leverages AI & ML technologies to enable quicker decisions, faster study start-up and targeted interventions. A solution that digitizes the entire clinical trial supply management process while putting the patient in the center, increasing patient’s safety and overall efficacy.
  • 20
    Optiv Managed XDR
    Attackers are stealthy, relentless and motivated, and might use the same tools you do. They hide in your environment and quickly expand access. We understand the cyber ecosystem because it’s where we live, it’s where we operate. Our MXDR solution’s secret sauce derives from that pedigree, tested processes, proven IP, best-of-breed technology, leveraged automation and providing top-shelf talent to manage it all. Let’s collaborate and develop a custom solution with comprehensive threat visibility, accelerated incident identification, investigation, triage and mitigation actions to protect your enterprise from attacks and threats. We’ll start with your existing investments in endpoint, network, cloud, email and OT/IoT tools. Our experts will get those on the same team, actual technology orchestration! Reduces the attack surface, detects threats faster and automates deep investigation through a continuous approach.
  • 21
    PangaeAPI

    PangaeAPI

    SOFTwarfare

    PangaeAPI™ is a purpose-built integration platform as a service (IPaaS) that secures, manages, and monitors mission-critical integrations. By establishing a standardized integration methodology, PangaeAPI improves operational outcomes, limits attack surfaces, and reduces costs associated with API maintenance, security, and compatibility. With PangaeAPI, your team can easily connect and integrate your various security tools in order to seamlessly share data, replacing cumbersome, time-consuming manual processes for these integrations. In addition to the tangible savings of cost and time, implementing our PangaeAPI platform improves security response time and allows your team to complete more security tasks. More than ever, companies need to find the best possible way to maintain, secure and monitor mission-critical operations to ensure that sensitive data and applications are safeguarded from outside attacks. With PangaeAPI, we take the tedious legwork out of this process.
  • 22
    AriLinc

    AriLinc

    Infintrix Global

    AriLinc is an industrial IoT gateway that converts various PLC Modbus RTU and Modbus TCP into Modbus TCP, OPC UA, MQTT, AWS, and other protocols. AriLinc adopts an embedded Linux system, supports TSL, SSL encryption, provides 1 RS232/RS485 optional serial input, 1 power output, 2 Ethernet ports and 2 USB ports, and supports SIM card and SD card. The built-in 4G network or Ethernet access to the Internet has the characteristics of fast speed and low latency. The Lora Gateway S281 series are special for data acquisition via Lora technology, supports wireless sensors and a wireless RS485 serial data converter. It is widely used in agricultural greenhouses, chemical plant, electroplating plant, hospital sites and storage warehouses for real-time temperature and humidity collection/monitoring. We offer comprehensive IT solutions, customized software development, mobile application & web development along with offshore IT consultancy services.
  • 23
    Lucidum

    Lucidum

    Lucidum

    Your attack surface is not just what’s connected to the internet, it’s not just your IOT or endpoints, it’s everything. Other CAASM providers want to replace your SIEM or upgrade your spreadsheet. We don’t disrupt your workflow, we serve it, we don’t fight your SIEM, we fit it. Lucidum opens your eyes to the main sources of data loss, security incidents, and mismanagement. You’ll get amazing value out of 4-6 connections. But we don’t charge for connectors or ingestion, hook them all up. Directly inject our CAASM into your SIEM. Cut costs through significantly reduced ingestion and streamlined computing. We empower cybersecurity professionals with CAASM-driven insights to map, manage, and monitor every cyber asset, enhancing their ability to uncover hidden threats and mitigate risks. By leveraging the combined strength of CAASM for comprehensive asset visibility and AI for predictive analytics and automation, we offer unprecedented control over the technology landscape.
  • Previous
  • You're on page 1
  • Next