11 Integrations with Cisco DNA Center
View a list of Cisco DNA Center integrations and software that integrates with Cisco DNA Center below. Compare the best Cisco DNA Center integrations as well as features, ratings, user reviews, and pricing of software that integrates with Cisco DNA Center. Here are the current Cisco DNA Center integrations in 2024:
-
1
Squadcast
Squadcast
Squadcast is an incident management tool that’s purpose-built for SRE. Create a blameless culture by reducing the need for physical war rooms, centralize SLO dashboards, unify internal and external SLIs and automate incident resolution and knowledge base creation with Squadcast Actions. Adopt world-class site reliability practices with a centralized SLO dashboard to view your system health. Anticipate incidents before they occur and respond proactively. The first step towards doing better incident management is adding enough context to incidents while they get detected. With Squadcast, discover everything you need, to take action and achieve best-in-class MTTD with highly configurable features like alert deduplication and tagging.Starting Price: Free -
2
NorthStar Navigator
NorthStar.io, Inc.
NorthStar is redefining Risk-Based Vulnerability Management with simple, contextual vulnerability prioritization for easier remediation. Common challenges NorthStar addresses are listed below: • Prioritize issues that should be addressed first in order to make the best use of limited resources. • Address lingering exposures that could impact critical business services, applications, and data stores. • Bridge the visibility gap and discrepancies that exist between vulnerability assessment and patch management. • Track reduction in risk over time and validate the most important issues are being addressed first. • Deliver a complete view of their environment – all assets, vulnerabilities and exposures. • Eliminate manual processes and unnecessary spreadsheet work.Starting Price: $8 per device -
3
Axonius
Axonius
Axonius gives customers the confidence to control complexity by providing a system of record for all digital infrastructure. With a comprehensive understanding of all assets including devices, identities, software, SaaS applications, vulnerabilities, security controls, and the context between all assets, customers are able to mitigate threats, navigate risk, decrease incident response time, automate action, and inform business-level strategy — all while eliminating manual, repetitive tasks. Recognized as creators of the Cyber Asset Attack Surface Management (CAASM) category and innovators in SaaS Management Platform (SMP) and SaaS Security Posture Management (SSPM), Axonius is deployed in minutes and integrates with hundreds of data sources to provide a comprehensive asset inventory, uncover gaps, and automatically enforce policies and automate action. -
4
Quickwork
Quickwork
Enterprises use Quickwork to build simple and complex workflows, create and publish secure APIs, and manage conversational interactions with customers, employees, and partners to provide a great user experience. Quickwork provides an all-in-one platform with the tools and services you need to build powerful & scalable integrations, serverless APIs, conversational experiences, and a lot more. Simply drag and drop the applications you wish to use to build powerful integrations without writing a single line of code. Choose from 1,000s of business, consumer, AI, analytics, messaging, and IoT apps to create an automated workflow you can imagine. Convert any workflow into an API with Quickwork’s single-click API management. Share your APIs securely with built-in authentication mechanisms and scale elastically with our serverless infrastructure. Build and manage real-time conversational and messaging workflows with human agents, chatbots, and IoT devices across multiple channels.Starting Price: $20 per month -
5
Centreon
Centreon
Centreon is a global provider of business-aware IT monitoring for always-on operations and performance excellence. The company’s holistic, AIOps-ready platform is designed for today’s complex, distributed hybrid cloud infrastructures. Centreon monitors the complete IT Infrastructure from Cloud-to-Edge for a clear and comprehensive view. Centreon removes blind spots, monitoring all equipment, middleware and applications that are part of modern IT workflows, from on-premise legacy assets to private and public cloud environments, all the way to the edge of the network, where smart devices and customers combine to create business value. Centreon is constantly current, able to support the most dynamic environments. With auto-discovery capabilities it can keep track of Software-Defined Network (SDN) elements, AWS or Azure cloud assets, Wi-Fi access points or any other component of today’s agile IT infrastructure. -
6
Altair Knowledge Hub
Altair
Self-service analytics tools promised to make end-users more agile and data-driven. However, the increased agility led to siloed and disconnected work as part of an ungoverned data free-for-all. Knowledge Hub addresses these issues with a solution that benefits business users, while simplifying and improving governance for IT. With an intuitive browser-based interface that automates data transformation tasks, Knowledge Hub is the market’s only collaborative data preparation solution. Business teams can work with data engineers and data scientists using a personalized experience for creating, validating and sharing governed, trusted datasets and analytic models. With no coding required, more people can share their work to make more informed decisions. Governance, data lineage and collaboration are managed using a cloud-ready solution designed to create innovation. An extensible, low- to no-code platform allows many people across the enterprise to easily transform data. -
7
Cisco Cyber Vision
Cisco
The deeper integration between IT, cloud and industrial control networks (ICS) is exposing your industrial operations to cyber threats. Cisco Cyber Vision has been specifically developed for OT and IT teams to work together to ensure production continuity, resilience and safety. You can now deploy Industrial Internet of Things (IIoT) technologies and capture the benefits of your industry digitization efforts. Kick-start your OT security project by building an accurate list of all your industrial assets, communication patterns and network topologies. Feed your SOC (security operations center) with OT context and leverage the time and money you have invested in IT cybersecurity to secure your OT network. Take OT security to the next level: Have detailed information to comply with regulations and enable effective collaboration between OT and IT experts. -
8
Securing against unknown threats through user and entity behavior analytics. Discover abnormalities and unknown threats that traditional security tools miss. Automate stitching of hundreds of anomalies into a single threat to simplify a security analyst’s life. Use deep investigative capabilities and powerful behavior baselines on any entity, anomaly or threat. Automate threat detection using machine learning so you can spend more time hunting with higher fidelity behavior-based alerts for quick review and resolution. Rapidly identify anomalous entities without human analysis. Rich set of anomaly types (65+) and threat classifications (25+) across users, accounts, devices and applications. Rapidly identify anomalous entities without human analysis. Rich set of anomaly types and threat classifications (25+) across users, accounts, devices and applications. Organizations gain maximum value to detect and resolve threats and anomalies via the power of human and machine-driven solutions.
-
9
Cisco SD-Access
Cisco
A more secure and agile network for your modern enterprise. Your IT operations can be more efficient, your network more secure, and your user experience more consistent across wired, wireless, and VPN infrastructure with our advanced solution for automating user policy and network access. Cisco SD-Access, a solution within Cisco DNA, defines a uniform policy-based network fabric that meets business needs with security, automation, and assurance. SD-Access augments the Cisco DNA Center capabilities of automation and assurance. It also provides a software-defined approach for network segmentation, critical for establishing a zero-trust network. Use AI- and ML-based advanced analytics for endpoint identification and grouping. Analyze traffic flows between groups, and define effective access policies. Apply group-based access policies for effective multilevel segmentation, leading to zero-trust security. -
10
Cynerio
Cynerio
We cover every threat vector with automated security and risk reduction for every Healthcare IoT device--from medical/IoMT devices to Enterprise IoT and OT systems to ensure patient safety, data confidentiality, and operational continuity. The Cynerio platform promotes proactive and preemptive cybersecurity with automated risk reduction, threat mitigation, attack prevention tools, and step-by-step remediation programs built on a zero trust framework infused with clinical context to get hospitals secure--fast. Healthcare IoT devices make hospital networks extremely vulnerable. Insecure devices increase the cyber attack surface and pose a major risk to patient safety and the operational continuity of hospitals. MarinHealth wanted to effectively segment medical and other IoT devices on their network without disrupting care. Enter Cynerio, who helped them realize they could protect devices from active malware too. -
11
Pica8 AmpCon
Pica8
Enterprise campus, distributed sites, and data center networks are replacing thousands of Cisco Catalyst switches with PicOS Software Switches on hardware provided by Dell and Edgecore. Through a single GUI, Pica8’s AmpCon™ Network Controller centrally manages and automates switch deployments as an alternative to Cisco DNA Center. Customers secure an increase in freedom and reduction in expense that every C-level executive will appreciate. Pica8’s AmpCon is a network controller that manages the lifecycle of any number of open network switches in enterprise campus and branch/retail office access networks. AmpCon comprises a set of server-based tools that enable enterprises to remotely install, configure and provision hundreds, or thousands, of PicOS Software, Switches deployed on white box switch hardware. It is the first network controller that leverages both advanced proprietary and open technology allowing network operators to run their networking software with full visibility.
- Previous
- You're on page 1
- Next