32 Integrations with Cisco ASA

View a list of Cisco ASA integrations and software that integrates with Cisco ASA below. Compare the best Cisco ASA integrations as well as features, ratings, user reviews, and pricing of software that integrates with Cisco ASA. Here are the current Cisco ASA integrations in 2024:

  • 1
    Rublon

    Rublon

    Rublon

    Rublon enables your workforce to securely access your organization's networks, servers and applications. Protect your data via easy-to-use multi-factor authentication and comply with data protection regulations like GDPR. Deploy Rublon organization-wide, enabling MFA for all your cloud apps, VPNs, servers, workstations, internal as well as on-premise apps.
    Starting Price: $1/month/user
  • 2
    Netreo

    Netreo

    Netreo

    Netreo is the most comprehensive full stack IT infrastructure management and observability platform. We provide a single source of truth for proactive performance and availability monitoring for large enterprise networks, infrastructure, applications and business services. Our solution is used by: - IT Executives to have full visibility from the business service right down into the infrastructure and network that supports it. - IT Engineering departments as a decision support system for capacity planning, and architecting modern solutions. - IT Operations teams for real time visibility into what is failing in their environment, what bottlenecks exist and who it is affecting. We provide all of these insights for systems and vendor mixes in large heterogeneous and constantly evolving environments. We have an extensive and growing list of supported vendors (over 350 integrations) including network vendors, servers, storage, virtualization, cloud platforms and others.
    Starting Price: $5/resource/mo
  • 3
    Cisco ACI
    Achieve resource elasticity with automation through common policies for data center operations. Extend consistent policy management across multiple on-premises and cloud instances for security, governance, and compliance. Get business continuity, disaster recovery, and highly secure networking with a zero-trust security model. Transform Day 2 operations to a more proactive model and automate troubleshooting, root-cause analysis, and remediation. Optimizes performance, and single-click access facilitates automation and centralized management. Extend on-premises ACI networks into remote locations, bare-metal clouds, and colocation providers without hardware. Cisco's Multi-Site Orchestrator offers provisioning and health monitoring, and manages Cisco ACI networking policies, and more. This solution provides automated network connectivity, consistent policy management, and simplified operations for multicloud environments.
  • 4
    LoginTC

    LoginTC

    Cyphercor

    Cyphercor is a two factor authentication provider that offers a best-in-class solution that's effortless, intuitive, and cost-effective called "LoginTC". LoginTC adds an additional layer of security to your systems and applications including VPNs, Firewalls, remote desktop, active directory, and more with it's innovative 2fa software. LoginTC offers a wide range of two factor options for end-users to authenticate, including SMS, email, push notifications, hardware tokens, U2F, OTP, bypass codes, and more. LoginTC was built with the principle that administrators are users too, and offers a solution that's not just easy for end users day-to-day, but is also simple for administrators to manage and setup. In fact, if you aren't set-up in one hour, the first month of your subscription is on us. LoginTC can help you reduce your insurance costs and meet compliance regulations with ease.
    Starting Price: $3/month/user
  • 5
    Genian NAC

    Genian NAC

    GENIANS

    Genians delivers a cybersecurity platform that ensures full network surveillance for all connected devices and provides dynamic access control to maintain compliance with IT security policies. It then leverages automation to orchestrate an organization’s entire security portfolio in concert with Device Platform Intelligence, Network Access Control (NAC), and Endpoint Detection and Response (EDR) to achieve an optimally-secure network edge. Genians Network Access Control (NAC) can secure every single connecting point in various networking environments such as VPN, xDSL, and 5G, while ensuring least-privilege access, multifactor authentication (MFA), and micro-segmentation. It can also enhance any enterprise’s Secure Access Service Edge (SASE) architecture. Genians secures millions of various endpoints in organizations of all sizes and industries, including global Fortune 500 companies, the government, the military, energy, finance, healthcare, education, and more.
    Starting Price: $0.2 to 1 per Active Device
  • 6
    Liongard

    Liongard

    Liongard

    Standardize, secure, and scale your IT managed services. Unleash your team to operate at 10x with Liongard, the only automation platform that gives you complete visibility across the stack, so you can manage modern IT with confidence. Still manually logging in to manage Internet Domains, SQL Servers and every system in between? Unify systems in Liongard to audit historical data, see critical changes, set proactive alerts and report across the IT stack. Onboard customers faster and monitor system changes daily with Liongard's unified automation platform. Onboard customers faster and monitor system changes daily with Liongard's unified automation platform. Unlock data with Liongard for periodic business reviews, scoping new projects and converting customers to Managed Services. Make every aspect of running your MSP more efficient, profitable and secure – from how you assess potential customers to how you protect their systems. Liongard automates the process and minimizes human errors.
    Starting Price: $29
  • 7
    Entrust TLS/SSL Certificates
    Entrust TLS/SSL Certificates provide validated identity and encryption to secure your websites, users, and data. When your website is secured by an Entrust TLS/SSL Certificate, your visitors can be confident knowing that your organization's identity as been verified and that encryption will keep their data and transactions secure. With an Entrust TLS/SSL Certificate, your visitors never see browser alerts notifying them that your website is “not secure” or that their “connection is not private.” Invest in your reputation and great user experience with an Entrust TLS/SSL Certificate. Entrust is a founding member of the CA Security Council and the CA/Browser Forum, and actively contributes to develop industry standards for TLS/SSL, S/MIME, document signing, mobile device, and code signing certificates, as well as certificate management. Trust your security to a Certification Authority that defines digital security.
    Starting Price: $199
  • 8
    Alibaba Cloud SSL Certificates Service
    Alibaba Cloud SSL Certificates Service allows customers to directly apply, purchase and manage SSL certificates on Alibaba Cloud. This service is offered in cooperation with qualified certificate authorities. From this platform, customers can select the expected certificate authority and its certificate products to enjoy full-site HTTPS security solutions. Manage digital certificates on a unified platform for optimal cost efficiency. Supports all mainstream Linux and Windows operating systems, Alibaba Cloud network, VPC, hybrid cloud, and conventional IDC environments. Implement full-site HTTPS at minimum cost with one single platform to manage a number of digital certificates that can be applied to multiple Alibaba Cloud services. View certificates used by various cloud businesses and manage your own certificate orders on a unified platform.
    Starting Price: $199 per year
  • 9
    Alibaba Cloud Anti-Bot Service
    Anti-Bot Service provides comprehensive bot defense for Web applications, HTML5 websites, mobile apps, and APIs. It can effectively reduce the risks caused by specific vulnerabilities. You can use Anti-Bot Service in the following scenarios: flight seating occupancy, online scalping, user enumeration, and core API exploitation. Anti-Bot Service is a reverse proxy technology based SaaS solution that allows you to specify custom protection policies to identify and control malicious traffic. You can also view the protection status in the console. Provides comprehensive anti-bot protection that covers the Web, mobile apps, and APIs. Get protection with simple access configurations, no code change required on the server side. Provides large amounts of security threat information on the cloud and timely updates protection policies against attacks. Identifies and filters malicious traffic without affecting the user experience.
    Starting Price: $707.55 per month
  • 10
    Elastic Observability
    Rely on the most widely deployed observability platform available, built on the proven Elastic Stack (also known as the ELK Stack) to converge silos, delivering unified visibility and actionable insights. To effectively monitor and gain insights across your distributed systems, you need to have all your observability data in one stack. Break down silos by bringing together the application, infrastructure, and user data into a unified solution for end-to-end observability and alerting. Combine limitless telemetry data collection and search-powered problem resolution in a unified solution for optimal operational and business results. Converge data silos by ingesting all your telemetry data (metrics, logs, and traces) from any source in an open, extensible, and scalable platform. Accelerate problem resolution with automatic anomaly detection powered by machine learning and rich data analytics.
    Starting Price: $16 per month
  • 11
    Elastiflow

    Elastiflow

    Elastiflow

    The most complete network observability solution for use with modern data platforms, providing unprecedented insights at any scale. ElastiFlow allows organizations to achieve unprecedented levels of network performance, availability, and security. ElastiFlow provides granular information about network traffic flows, including source and destination IP addresses, ports, protocols, and the amount of data transmitted. This information allows network administrators to gain deep insights into the network's performance and identify potential issues. ElastiFlow is highly valuable for diagnosing and troubleshooting network issues such as congestion, high latency, or packet loss. By analyzing the network traffic, administrators can pinpoint the cause of the problem and take appropriate action to resolve it. By leveraging ElastiFlow, organizations can improve their security posture, detect and respond to threats more effectively, and maintain compliance with regulatory requirements.
    Starting Price: Free
  • 12
    FlashBlade//S

    FlashBlade//S

    Pure Storage

    Pure FlashBlade//S is the industry's most advanced all-flash storage solution for consolidating fast file and object storage. Modernize your storage with a unified unstructured storage platform that delivers a Modern Data Experience™. Tackle your most challenging modern data requirements. FlashBlade delivers cloud-like simplicity and agility with consistent high performance and control. FlashBlade can help you address the needs of modern applications and leverage modern data. FlashBlade//S delivers massive throughput and parallelism with consistent multidimensional performance for all data. Simply add blades to scale capacity and performance. It’s fast file and object storage that goes beyond traditional scale-out NAS. FlashBlade’s scale-out metadata architecture can handle tens of billions of files and objects with maximum performance and rich data services. Purity//FB supports cloud mobility with object replication and disaster recovery with file replication.
  • 13
    Thunder TPS

    Thunder TPS

    A10 Networks

    Used by the top service providers and online gaming companies, Thunder TPS provides scalable and automated DDoS protection powered by advanced machine learning to detect and mitigate attacks. Multi-modal source-based defense pinpoints attackers without damaging users. 5-level adaptive mitigation policy, zero-day Automated Protection (ZAP), actionable distributed denial-of-service weapons Intelligence at a scale of 96M-entry black/white lists. Flexible and robust Distributed Denial of Service (DDoS) protection, with a wide range of hardware and software deployment models to meet your exact needs. High precision, automated DDoS mitigation solution is delivered as hardware or virtual appliances ranging from 1 Gbps to 500 Gbps. High-performance Netflow, Sflow, IPFIX-based DDoS detector for a complete reactive cyber attack defense solution. Available as a standalone appliance or integrated with aGalaxy 5000.
  • 14
    Altair Knowledge Hub
    Self-service analytics tools promised to make end-users more agile and data-driven. However, the increased agility led to siloed and disconnected work as part of an ungoverned data free-for-all. Knowledge Hub addresses these issues with a solution that benefits business users, while simplifying and improving governance for IT. With an intuitive browser-based interface that automates data transformation tasks, Knowledge Hub is the market’s only collaborative data preparation solution. Business teams can work with data engineers and data scientists using a personalized experience for creating, validating and sharing governed, trusted datasets and analytic models. With no coding required, more people can share their work to make more informed decisions. Governance, data lineage and collaboration are managed using a cloud-ready solution designed to create innovation. An extensible, low- to no-code platform allows many people across the enterprise to easily transform data.
  • 15
    Splunk User Behavior Analytics
    Securing against unknown threats through user and entity behavior analytics. Discover abnormalities and unknown threats that traditional security tools miss. Automate stitching of hundreds of anomalies into a single threat to simplify a security analyst’s life. Use deep investigative capabilities and powerful behavior baselines on any entity, anomaly or threat. Automate threat detection using machine learning so you can spend more time hunting with higher fidelity behavior-based alerts for quick review and resolution. Rapidly identify anomalous entities without human analysis. Rich set of anomaly types (65+) and threat classifications (25+) across users, accounts, devices and applications. Rapidly identify anomalous entities without human analysis. Rich set of anomaly types and threat classifications (25+) across users, accounts, devices and applications. Organizations gain maximum value to detect and resolve threats and anomalies via the power of human and machine-driven solutions.
  • 16
    Deepnet DualShield

    Deepnet DualShield

    Deepnet Security

    If you are looking for an enterprise grade 2-factor authentication (2FA) or multi-factor authentication (MFA) product that can secure all commonly used business applications and also provides a wide range of authentication methods, then you are in the right place. Deepnet DualShield is a multi-factor authentication system that unifies a variety of authentication methods, protocols, solutions and user experience in a single platform. In addition to the MFA functions, DualShield also provides self-service Password Reset, Single Sign-On (SSO), Identity & Access Management (IAM) and Adaptive Authentication. It is one of the most powerful and flexible multi-factor authentication system in the world. Deepnet DualShield can be installed on premises or hosted in a private cloud, which means that you will have the total control of your own user authentication system, and that you will be able to keep your users’ identities and credentials in a safe place.
  • 17
    AuthPoint

    AuthPoint

    WatchGuard

    Our unique multi-factor authentication (MFA) solution not only helps to reduce the likelihood of network disruptions and data breaches arising from lost or stolen credentials, but we deliver this important capability entirely from the Cloud for easy set-up and management. AuthPoint goes beyond traditional 2-Factor Authentication (2FA) by considering innovative ways to positively identify users, and our large ecosystem of 3rd party integrations means that you can use MFA to protect access. Ultimately, WatchGuard AuthPoint is the right solution at the right time to make MFA a reality for the businesses who desperately need it to block attacks. AuthPoint uses a push message, QR code, or one-time password (OTP) as an additional factor proving your identity, and our mobile device DNA matches the authorized user’s phone when granting access to systems and applications. Therefore, any attacker who clones a user’s device in an attempt to access a protected system would be blocked.
  • 18
    Cisco Defense Orchestrator
    Experience effective firewall management made simple. Cisco Defense Orchestrator helps you consistently manage policies across Cisco firewalls and public cloud infrastructure. It is a cloud-based application that cuts through complexity to save you time and keep your organization protected against the latest threats. Centralize network security policy and device management. Reduce time spent on repetitive security management tasks by up to 90 percent. Clean up policies to close security gaps and achieve better, more consistent security. Manage security policy consistently across Cisco Adaptive Security Appliance (ASA), Cisco Firepower, Meraki MX, and Amazon Web Services (AWS) from a centralized console. Analyze policies and objects across security devices to identify errors and inconsistencies. Correct them in seconds to improve your security posture and device performance.
  • 19
    Splunk SOAR
    Splunk SOAR (Security Orchestration, Automation, and Response) is a powerful platform that enables organizations to streamline and automate their security operations. It integrates with various security tools and systems, allowing teams to automate repetitive tasks, orchestrate workflows, and respond to incidents faster. With Splunk SOAR, security teams can create playbooks that automate incident response processes, reducing the time to detect, investigate, and resolve security threats. The platform also offers advanced analytics, real-time threat intelligence, and collaboration tools to enhance decision-making and improve overall security posture. By automating routine tasks and enabling more efficient use of resources, Splunk SOAR helps organizations respond to threats with greater speed and accuracy, minimizing risks and enhancing cybersecurity resilience.
  • 20
    RAML

    RAML

    RAML

    A simple but powerful syntax for modelling APIs. RAML enables rapid development of APIs using an approachable syntax, which can scale from hobby project to enterprise application. RAML lets you see what your API looks like as you design it, using easy to read plain text. Without having to write a single line of code you can not only perfect your API design, but also create a fully functional mock for customers, partners, or even your own internal engineers to review and build off of. RAML enables developers and engineers to do what they do best – write code. No more guesswork or getting halfway through your API only to realize the design doesn’t work or is inconsistent. You can also reduce your time to market (and bug based headaches) by using the many tools available to help you generate the general structure of your API from your RAML files. Say goodbye to spending hours writing and maintaining API documentation.
  • 21
    Cisco SD-Access
    A more secure and agile network for your modern enterprise. Your IT operations can be more efficient, your network more secure, and your user experience more consistent across wired, wireless, and VPN infrastructure with our advanced solution for automating user policy and network access. Cisco SD-Access, a solution within Cisco DNA, defines a uniform policy-based network fabric that meets business needs with security, automation, and assurance. SD-Access augments the Cisco DNA Center capabilities of automation and assurance. It also provides a software-defined approach for network segmentation, critical for establishing a zero-trust network. Use AI- and ML-based advanced analytics for endpoint identification and grouping. Analyze traffic flows between groups, and define effective access policies. Apply group-based access policies for effective multilevel segmentation, leading to zero-trust security.
  • 22
    Flame Analytics

    Flame Analytics

    Flame Analytics

    Flame Analytics is the leading BigData and AI platform that helps transform and make physical spaces smarter with its omnichannel digital marketing and analytics tools. Flame helps you to transform physical spaces thanks to the power of BigData and AI. We use standard and plug and play hardware to build bridges between the online and physical world offering powerful analytics and marketing tools. The real change begins here. It brings energy to your physical spaces, creating unique and memorable experiences. Discover how your customers behave and measure the performance of your physical spaces thanks to the most powerful and comprehensive analytics platform. Establish communication channels with your clients and visitors in physical spaces thanks to onboarding tools such as Guest WiFi and Mobile Apps. Create audiences based on your customers´ behavior and send them personalized digital campaigns based on location. Boost customer experience like never before.
  • 23
    Claroty

    Claroty

    Claroty

    Powered by our Continuous Threat Detection (CTD) and Secure Remote Access (SRA) solutions, our platform provides a full range of industrial cybersecurity controls that integrate seamlessly with your existing infrastructure, scale effortlessly, and have the industry's lowest total cost of ownership (TCO). The comprehensive industrial cybersecurity controls our platform provides revolve around the REVEAL, PROTECT, DETECT, CONNECT framework. Our platform's features empower you to achieve effective industrial cybersecurity, regardless of where you are on your industrial cybersecurity journey. The Claroty Platform is deployed across multiple industries, each with unique operational and security needs. Effective industrial cybersecurity starts with knowing what needs to be secured. Our platform removes the barriers that limit industrial networks from securely connecting to what enables the rest of the business to operate and innovate with an acceptable level of risk.
  • 24
    SecureIdentity MFA
    The simple ‘username and password’ approach alone is not strong enough to protect your business’ critical data. Log-ins can be compromised within minutes, making your private data vulnerable to threat. Our SecureIdentity platform provides the identity of the user, the device and the data they are working on, so you can prove exactly who is doing what at any time. MFA is best practice for layered data and privacy security. Our MFA solution integrates seamlessly with Microsoft’s Active Directory and other LDAP solutions, allowing you to reutilize your existing authentication database infrastructure, avoiding the need to re-architect, deploy, backup and manage a secondary user database. We believe users should be able to choose any personal device to be their authentication token, whether it is their mobile phone, tablet, laptop or even their desk phone.
  • 25
    SecureIdentity PAM
    Our SecureIdentity Platform is a suite of solutions that focuses on user experience and provides verifiable trust in every activity you perform. The suite of solutions together combine to offer an overall solution to protect the identity of the user, the data and the device. Secureldentity PAM provides an interactive broker between users and administrative sessions on protected endpoints. This allows users to gain privileged access to areas they are given permission to access in the Universal Directory, while never actually exposing the credentials to the user at all. SecurEnvoy partners with leading technology platforms and companies to deliver the highest level of security and peace of mind. We have numerous pre-built integrations with many popular business applications and solutions. Read more about specific integrations or contact our technical team to discuss your specific needs.
  • 26
    SecureIdentity IAM
    SecureIdentity IAM provides enforcement of access decisions around applications and data repositories. By reading information from the Universal Directory it can make dynamic choices as to what programs a user is allowed to run and what file servers or cloud storage areas they are allowed to access. This is enforced by a client on the endpoints that intercepts requests for access to applications or data areas and vetting them against the configured policy. If the action is allowed, the user experience continues as normal with no overhead. If the action is forbidden then access to the appropriate executable or DLL files is dynamically blocked regardless of how it is invoked. Logs of all events are sent back to the platform’s event database to provide a forensic trail of activity.
  • 27
    SecureIdentity DLP
    SecureIdentity DLP is a data protection portfolio of solutions (on-premises, off-premises and the cloud), which prevents the loss of data from malware, insider threat and human error. This can be achieved across multi-channels, regardless of file types, by blocking sensitive data across structured and unstructured data repositories. Our SecureIdentity DLP platform provides the identity of the user, the device and the data they are working on so you can prove exactly who is doing what at any time. With increasing integrations with other parts of the security market, DLP has become essential for protecting organizations when newer technologies are to be adopted. Our DLP solutions are unique from competitors as we address threats from trusted and un-trusted users, through unique intellectual algorithms and fingerprinting features. SecureIdentity DLP conducts real-time inspection of all protocols, even ones that are unknown, and has the ability to stop data loss immediately.
  • 28
    SecureIdentity IRAD
    The SecureIdentity Platform allows organizations to provide verifiable trust in every activity they perform. By providing the identity of the user, the device and the data they are working on you can prove exactly who is doing what at any time. SecurEnvoy partners with leading technology platforms and companies to deliver the highest level of security and peace of mind. We have numerous pre-built integrations with many popular business applications and solutions. Read more about specific integrations or contact our technical team to discuss your specific needs. Built upon artificial intelligence, SecureIdentity IRAD evaluates the user as an ongoing process and will detect any unusual activity or interaction in the user’s actions. This provides real time detailed analysis of the user interaction and allows risks.
  • 29
    LogRhythm UEBA
    LogRhythm UEBA applies self-evolving analytics against long periods of user data to detect anomalies that indicate a potential threat. Join Senior Technical Product Manager and Data Scientist, Melissa Ruzzi, for a breakdown of our user behavior analytics capability. With the shortage of qualified analysts, inefficient manual processes, and complexity of attacks, it’s crucial to have a user and entity behavior analytics solution that provides extra layers of detection to protect the organization against potential threats. LogRhythm enhances your threat detection coverage in addition to existing out-of-the-box AI Engine UEBA rules. LogRhythm UEBA helps detect outliers and automatically sets scores without the need of explicit defined logic. As a cloud-native add-on, LogRhythm UEBA functions as an advanced UEBA log source in the LogRhythm SIEM Platform. You can build customizable dashboards, run and save searches, and leverage AI Engine rules setting alarms and SmartResponse™ automated ac
  • 30
    RapidScale Identity as a Service
    RapidScale’s Identity as a Service (IDaaS) is ideal for organizations wrestling with making network access easy for staff, without compromising security. Built on the backbone of Azure Active Directory, our IDaaS solution provides potent security out of the box. Protect your critical data and applications no matter where they’re located – in cloud, hosted or on-premises environments. We have options supporting single sign-on (SSO), multi-factor authentication (MFA), password synchronization, and much more. It’s easy to make your login security even stronger with our options for identity services. Employ advanced password sync functions like user password reset and changing, writeback and more, along with a wealth of other services so you can control access more finitely. It’s easy to manage your IDaaS services through our full-service portal, along with your other RapidScale solutions. Alternately, let us manage your IDaaS deployment for you.
  • 31
    LogMan.io

    LogMan.io

    TeskaLabs

    TeskaLabs Logman.io is a modern and effective tool for log management, collection, archiving, and log analysis. Scalable Log Management can be easily upgraded to the full-scale tool TeskaLabs SIEM (security information and event management). Be always one step ahead of all potential threats and achieve a total overview of the security of your IT infrastructure. Thanks to timely and clear threat detection, TeskaLabs LogMan.io protects important data and sensitive information. TeskaLabs is a cybersecurity expert and therefore all our products meet the security standards of your company. LogMan.io ensures regulatory compliance with legislation covering cyber security and GDPR. Logman.io can grow with your needs. It can be easily upgraded to TeskaLabs SIEM. You can promptly get a central essential overview of the entire IT infrastructure, a full-scale tool for threat modeling, risk management, and vulnerability scanning.
  • 32
    TeskaLabs SIEM
    A state-of-the-art tool for security information and event management. A security surveillance tool that allows you to automatically monitor, correlate, and evaluate security events and create reports in real-time. TeskaLabs SIEM will bring a central overview of the entire company infrastructure and early detection helps eliminate risks and their possible effects on the operation of your company. TeskaLabs SIEM will always be one step ahead of potential threats and you will gain absolute supervision. TeskaLabs is a cybersecurity expert and therefore all our products meet the security standards of your company. TeskaLabs SIEM ensures regulatory compliance with legislation covering Cyber Security, GDPR, and ISO 27001:2013. Automated real-time detection and reporting of known incidents and anomalies will allow you to quickly react and prioritize the solution to individual incidents. Time savings allow you to proactively search for potential threats.
  • Previous
  • You're on page 1
  • Next