9 Integrations with HCL BigFix

View a list of HCL BigFix integrations and software that integrates with HCL BigFix below. Compare the best HCL BigFix integrations as well as features, ratings, user reviews, and pricing of software that integrates with HCL BigFix. Here are the current HCL BigFix integrations in 2024:

  • 1
    HCL BigFix AEX

    HCL BigFix AEX

    HCL Software

    HCL BigFix AEX is a part of the Autonomous Endpoint Management pillar under the HCLSoftware Intelligent Operations ecosystem. It is a Generative AI-driven agent assist solution that offers intelligent self-service support, comprehends employee requests, and perpetually refines its responses for enhanced employee experience.​ It is designed to revolutionize enterprise service operations. AEX's intelligence approach empowers organizations to deliver exceptional support experiences, streamline operations, and increase overall productivity.
  • 2
    AssetLabs Streamline License Tracker
    Track all your software licenses by normalizing, categorizing, and automatically identifying license types using your SCCM or other inventory data. Easily identify Auditable vs free and open source. Streamline differentiates Office Suites from standalone office apps. Automatically finds license deficits, de-duplicates multiple installs and applies product use rights and downgrade rights. Free trial for unlimited users!
    Starting Price: $1.00/month
  • 3
    NorthStar Navigator

    NorthStar Navigator

    NorthStar.io, Inc.

    NorthStar is redefining Risk-Based Vulnerability Management with simple, contextual vulnerability prioritization for easier remediation. Common challenges NorthStar addresses are listed below: • Prioritize issues that should be addressed first in order to make the best use of limited resources. • Address lingering exposures that could impact critical business services, applications, and data stores. • Bridge the visibility gap and discrepancies that exist between vulnerability assessment and patch management. • Track reduction in risk over time and validate the most important issues are being addressed first. • Deliver a complete view of their environment – all assets, vulnerabilities and exposures. • Eliminate manual processes and unnecessary spreadsheet work.
    Starting Price: $8 per device
  • 4
    Axonius

    Axonius

    Axonius

    Axonius gives customers the confidence to control complexity by providing a system of record for all digital infrastructure. With a comprehensive understanding of all assets including devices, identities, software, SaaS applications, vulnerabilities, security controls, and the context between all assets, customers are able to mitigate threats, navigate risk, decrease incident response time, automate action, and inform business-level strategy — all while eliminating manual, repetitive tasks. Recognized as creators of the Cyber Asset Attack Surface Management (CAASM) category and innovators in SaaS Management Platform (SMP) and SaaS Security Posture Management (SSPM), Axonius is deployed in minutes and integrates with hundreds of data sources to provide a comprehensive asset inventory, uncover gaps, and automatically enforce policies and automate action.
  • 5
    Licenseware

    Licenseware

    Licenseware

    Automated license management for any data source. Prevent audit exposure and optimize software costs with swift and reliable analysis that works with your data. Start to optimize your IT cost and reduce risks to a minimum. Automate license requirement analysis of Microsoft deployment data. Data-driven cost optimization for your hybrid organization. Transform MLS and entitlement data into clear license inventories and compliance reports. Reduce your risks by increasing visibility. Automate the analysis and determination of Oracle DB usage and license requirements. Identify cost reduction scenarios at a glance. Automate the license analysis for Java and get visibility into versions, editions, and components installed and license requirements. Automate the analysis for middleware usage, bundling, and license requirements. More insight, more control, and less compliance risk. Assess and optimize RHEL subscriptions. Provides insight into subscription usage, and helps identify cost savings.
    Starting Price: €0.5 per device per month
  • 6
    Panaseer

    Panaseer

    Panaseer

    Panaseer’s continuous controls monitoring platform sits above the tools and controls within your organisation. It provides automated, trusted insight into the security and risk posture of the organisation. We create an inventory of all entities across your organisation (devices, apps, people, accounts, databases). The inventory highlights assets missing from different sources and where security controls are missing from assets. The platform equips you with metrics and measures to understand your security and compliance status at any level. The platform ingests data from any source in the cloud or on-premises, across security, IT and business domains through out-of-the-box data connectors. It uses entity resolution to clean, normalise, aggregate, de-duplicate and correlate this data, creating a continuous feed of unified asset and controls insights across devices, applications, people, databases and accounts.
  • 7
    IBM Security QRadar SIEM
    Market-leading SIEM built to outpace the adversary with speed, scale and accuracy As digital threats loom large and cyber adversaries grow increasingly sophisticated, the roles of SOC analysts are more critical than ever. Going beyond threat detection and response, QRadar SIEM enables security teams face today’s threats proactively with advanced AI, powerful threat intelligence, and access to cutting-edge content to maximize analyst potential. Whether you need cloud-native architecture built for hybrid scale and speed or a solution to complement your on-premises infrastructure, IBM can provide you with a SIEM to meet your needs. Experience the power of IBM enterprise-grade AI designed to amplify the efficiency and expertise of every security team. With QRadar SIEM, analysts can reduce repetitive manual tasks like case creation and risk prioritization to focus on critical investigation and remediation efforts.
  • 8
    Medigate

    Medigate

    Medigate

    Healthcare’s Security and Clinical Analytics Company. #1 IoT device security solution designed for Healthcare. Medigate has invested in building out the largest medical device and protocol database so you can have the most detailed device inventories and accurate threat detection available. Medigate offers the industry’s only truly dedicated medical device security platform that identifies and protects all Internet of Medical Things (IoMT) devices connected to a healthcare provider’s network. Unlike general IoT solutions, we’ve built our cyber security platform specifically and only for the unique needs of medical devices and clinical networks. Our solution safeguards clinical networks from all angles by providing complete visibility into all connected medical devices to identify risk based on clinical context, detect anomalies according to manufacturers’ protocols and actively block malicious activities by integrating into your existing firewalls or NAC.
  • 9
    Cynerio

    Cynerio

    Cynerio

    We cover every threat vector with automated security and risk reduction for every Healthcare IoT device--from medical/IoMT devices to Enterprise IoT and OT systems to ensure patient safety, data confidentiality, and operational continuity. The Cynerio platform promotes proactive and preemptive cybersecurity with automated risk reduction, threat mitigation, attack prevention tools, and step-by-step remediation programs built on a zero trust framework infused with clinical context to get hospitals secure--fast. Healthcare IoT devices make hospital networks extremely vulnerable. Insecure devices increase the cyber attack surface and pose a major risk to patient safety and the operational continuity of hospitals. MarinHealth wanted to effectively segment medical and other IoT devices on their network without disrupting care. Enter Cynerio, who helped them realize they could protect devices from active malware too.
  • Previous
  • You're on page 1
  • Next