16 Integrations with Code42
View a list of Code42 integrations and software that integrates with Code42 below. Compare the best Code42 integrations as well as features, ratings, user reviews, and pricing of software that integrates with Code42. Here are the current Code42 integrations in 2024:
-
1
Slack
Slack
Slack is a cloud-based project collaboration and team interaction software solution specially designed to seamlessly facilitate communication across organizations. Featuring powerful tools and services integrated into a single platform, Slack provides private channels to promote interaction within smaller teams, direct channels to help send messages directly to colleagues, and public channels that enables members across organizations to start conversations. Available on Mac, Windows, Android, and iOS apps, Slack offers a plethora of features that include chat, file sharing, collaborative workspace, real-time notifications, two-way audio and video, screen sharing, document imaging, activity tracking and logging, and more.Starting Price: $6.67 per user per month -
2
Dropbox
Dropbox
Dropbox Business is more than just secure file storage—it’s a smart workspace where teams, tools, and content come together. Create, store, and share cloud content from Google Docs, Sheets, and Slides, Microsoft Office files, and Dropbox Paper alongside traditional files in Dropbox. Dropbox Spaces brings your files and cloud content together, so that your PowerPoints can live next to your Google Docs, Trello boards, and whatever tools your team wants to use. Easily access your team’s work from your computer, mobile device, or any web browser. Keep your team’s files and the conversations about them in the same place by connecting tools like Slack and Zoom. Intelligently suggested files and folders keep your team one step ahead by giving everyone the content they need, when they need it. A secure, distributed infrastructure—plus admin tools for control and visibility—keep your company’s data safe on Dropbox.Starting Price: $12.50 per month per user -
3
Microsoft OneDrive
Microsoft
Access, share, and collaborate on all your files from anywhere. OneDrive connects you to all your files in Office 365 so you can share and work together from anywhere while protecting your work. Easily store, access and discover your personal and shared work files in Office 365, including Microsoft Teams, from all your devices. Edits you make offline are automatically uploaded next time you connect. Work faster and smarter with anyone inside or outside your organization. Securely share files and work together in real-time using Word, Excel and PowerPoint across web, mobile and desktop. Create, view, edit, and share files on the go with the OneDrive mobile app. Easily capture whiteboards and scan work receipts, business cards, and other paper documents for safe keeping. OneDrive helps protect your files. You can easily recover files from accidental deletes or malicious attacks and administrators can manage security policies to help keep your information safe.Starting Price: $2 per user per month -
4
Box
Box
Secure collaboration with anyone, anywhere, on any device. Protecting your sensitive files in the cloud is a top priority. That's why we developed advanced security controls, intelligent threat detection, and complete information governance. But we know your needs don't stop there. Strict data privacy? Check. Data residency? Check. Industry compliance? Check. Your business depends on collaboration between lots of people, from teammates to customers to partners and vendors. Get everyone on the same page with one place to work together easily on your most important content. After all, you should be sharing files, not frustration. And you should have the peace of mind that it's all secure. Working on manual, cumbersome processes wastes hours each day. So we let anyone automate the repeatable workflows that are key to your business, like HR onboarding and contract and digital-asset management. Workflows start to move faster. You have more time to do what matters most.Starting Price: $5 per month -
5
Okta
Okta
One platform, infinite ways to connect to your employees and customers. Build auth into any app. Create secure, delightful experiences quickly by offloading customer identity management to Okta. Get security, scalability, reliability, and flexibility by combining Okta’s Customer Identity products to build the stack you need. Protect and enable your employees, contractors, and partners. Secure your employees—wherever they are—with Okta’s workforce identity solutions. Get the tools to secure and automate cloud journeys, with full support for hybrid environments along the way. Companies around the world trust Okta with their workforce identity. -
6
iCloud
Apple
See your photos, files, notes, and more across all your devices. They’re safe, up to date, and available wherever you are. If you lose a device, use Find My iPhone on iCloud.com to locate it, turn on Lost Mode, or erase it remotely. Securely store your files in iCloud Drive so you can share them with friends and colleagues. Add or edit photos and videos on one device, see them on all your devices. -
7
Splunk Enterprise
Splunk
Go from data to business outcomes faster than ever before with Splunk. Splunk Enterprise makes it simple to collect, analyze and act upon the untapped value of the big data generated by your technology infrastructure, security systems and business applications—giving you the insights to drive operational performance and business results. Collect and index log and machine data from any source. Combine your machine data with data in your relational databases, data warehouses and Hadoop and NoSQL data stores. Multi-site clustering and automatic load balancing scale to support hundreds of terabytes of data per day, optimize response times and provide continuous availability. The Splunk platform makes it easy to customize Splunk Enterprise to meet the needs of any project. Developers can build custom Splunk applications or integrate Splunk data into other applications. Apps from Splunk, our partners and our community enhance and extend the power of the Splunk platform. -
8
Axonius
Axonius
Axonius gives customers the confidence to control complexity by providing a system of record for all digital infrastructure. With a comprehensive understanding of all assets including devices, identities, software, SaaS applications, vulnerabilities, security controls, and the context between all assets, customers are able to mitigate threats, navigate risk, decrease incident response time, automate action, and inform business-level strategy — all while eliminating manual, repetitive tasks. Recognized as creators of the Cyber Asset Attack Surface Management (CAASM) category and innovators in SaaS Management Platform (SMP) and SaaS Security Posture Management (SSPM), Axonius is deployed in minutes and integrates with hundreds of data sources to provide a comprehensive asset inventory, uncover gaps, and automatically enforce policies and automate action. -
9
Tines
Tines
Tines provides the world's most security-conscious companies with no-code automation technology to power their business-critical processes. We believe automation works best when subject-matter experts, not distant developers, build it. Our drag-and-drop technology is intuitive but immensely powerful and flexible to give frontline staff everything they need to address repetitive manual processes. Tines allows users to gather internal or external events to trigger multi-step workflows. In line with our belief in approachable and powerful technology, Tines integrates with any technology that offers an API. This means customers aren’t limited to a fixed set of integrations, rather they are free to connect to any tool in their stack. This extends how they protect their business. With Tines, our customers are free from the burdensome, repetitive processes to focus on protecting their business from the next threat.Starting Price: $0/user/year -
10
Code42 Incydr
Mimecast
Incydr gives you the visibility, context and control needed to stop data leak and IP theft. Detect file exfiltration via web browsers, USB, cloud apps, email, file link sharing, Airdrop, and more. See how files are moved and shared across your entire organization, without the need for policies, proxies, or plugins. Incydr automatically identifies when files move outside your trusted environment, allowing you to easily detect when files are sent to personal accounts and unmanaged devices. Incydr prioritizes file activity based on 120+ contextual Incydr Risk Indicators (IRIs). This prioritization works on day 1 without any configuration. Incydr’s risk-scoring logic is use case-driven and transparent to administrators. Incydr uses Watchlists to programmatically protect data from employees who are most likely to leak or steal files, such as departing employees. Incydr delivers a complete range of technical and administrative response controls to support the full spectrum of insider events. -
11
Indent
Indent
Good security is necessary, but it doesn't need to be slow or painful, faster access unlocks more revenue. Give on-demand access that’s faster and easier, without frustrating your team. Users request access to apps, managers approve or deny them from Slack, and it's all auditable. End the process of manually cat herding approvals. Every time access is granted, it's a potential security risk. Indent helps teams scale security and least privilege by shifting users to temporary access without slowing down. Automate spreadsheet-based workflows needed for SOC 2, SOX, ISO, and HITRUST with controls and policies baked directly into access request workflows. Only provide access when it's needed instead of issuing permanent access, reducing your license footprint. Indent delivers cost savings without adding friction for end users. When you’re leading a fast-growing company toward success, your team needs to take big risks to deliver big returns.Starting Price: $8 per month -
12
Cortex XDR
Palo Alto Networks
Fewer alerts, end-to-end automation, smarter security operations. The industry’s most comprehensive product suite for security operations empowering enterprises with the best-in-class detection, investigation, automation and response capabilities. Cortex XDR™ is the industry’s only detection and response platform that runs on fully integrated endpoint, network, and cloud data. Manage alerts, standardize processes and automate actions of over 300 third-party products with Cortex XSOAR – the industry's leading security orchestration, automation and response platform. Collect, transform, and integrate your enterprise’s security data to enable Palo Alto Networks solutions. Make the world’s highest-fidelity threat intelligence with unrivaled context available to power up investigation, prevention and response. -
13
Splunk SOAR
Splunk
Splunk SOAR (Security Orchestration, Automation, and Response) is a powerful platform that enables organizations to streamline and automate their security operations. It integrates with various security tools and systems, allowing teams to automate repetitive tasks, orchestrate workflows, and respond to incidents faster. With Splunk SOAR, security teams can create playbooks that automate incident response processes, reducing the time to detect, investigate, and resolve security threats. The platform also offers advanced analytics, real-time threat intelligence, and collaboration tools to enhance decision-making and improve overall security posture. By automating routine tasks and enabling more efficient use of resources, Splunk SOAR helps organizations respond to threats with greater speed and accuracy, minimizing risks and enhancing cybersecurity resilience. -
14
The Securonix Security Operations and Analytics Platform combines log management; user and entity behavior analytics (UEBA); next-generation security information and event management (SIEM); network detection and response (NDR); and security orchestration, automation and response (SOAR) into a complete, end-to-end security operations platform. The Securonix platform delivers unlimited scale, powered by advanced analytics, behavior detection, threat modeling, and machine learning. It increases your security through improved visibility, actionability, and security posture, while reducing management and analyst burden. With native support for thousands of third-party vendors and technology solutions, the Securonix platform simplifies security operations, events, escalations, and remediations. It easily scales from startups to global enterprises while providing the same fast security ROI and ongoing transparent and predictable cost.
-
15
LogRhythm UEBA
LogRhythm
LogRhythm UEBA applies self-evolving analytics against long periods of user data to detect anomalies that indicate a potential threat. Join Senior Technical Product Manager and Data Scientist, Melissa Ruzzi, for a breakdown of our user behavior analytics capability. With the shortage of qualified analysts, inefficient manual processes, and complexity of attacks, it’s crucial to have a user and entity behavior analytics solution that provides extra layers of detection to protect the organization against potential threats. LogRhythm enhances your threat detection coverage in addition to existing out-of-the-box AI Engine UEBA rules. LogRhythm UEBA helps detect outliers and automatically sets scores without the need of explicit defined logic. As a cloud-native add-on, LogRhythm UEBA functions as an advanced UEBA log source in the LogRhythm SIEM Platform. You can build customizable dashboards, run and save searches, and leverage AI Engine rules setting alarms and SmartResponse™ automated ac -
16
Securonix NDR
Securonix
Advanced threat monitoring combining network traffic, security logs, and entity context. Identify advanced threats that standalone network traffic analysis (NTA) or security information and event management (SIEM) solutions are not able to detect. Reduce false positives by over 90% by prioritizing threats using Securonix threat chains that span across network and security events. Improve efficiency and lower the operational overhead related to training and enablement when you only need to use a single console and database for all events. Advanced cyberattacks are usually slow and low and involve multiple steps. Detecting such threats requires monitoring and correlating indicators of compromise (IOC) across event sources. Securonix Spotter enables blazing-fast threat hunting using natural language search.
- Previous
- You're on page 1
- Next