26 Integrations with DatAnswers

View a list of DatAnswers integrations and software that integrates with DatAnswers below. Compare the best DatAnswers integrations as well as features, ratings, user reviews, and pricing of software that integrates with DatAnswers. Here are the current DatAnswers integrations in 2024:

  • 1
    Microsoft 365

    Microsoft 365

    Microsoft

    Introducing Microsoft 365 (formerly Microsoft Office 365). Be more creative and achieve what matters with Outlook, OneDrive, Word, Excel, PowerPoint, OneNote, SharePoint, Microsoft Teams, Yammer, and more. With a Microsoft 365 subscription, you get the latest Office apps—both the desktop and the online versions—and updates when they happen. On your desktop, on your tablet, and on your phone.* Microsoft 365 + your device + the Internet = productivity wherever you are. OneDrive makes the work you do available to you from anywhere—and to others when you collaborate or share. Help at every turn. Email, chat, or call and talk to a real live person. Get Office today—choose the option that's right for you
    Leader badge
    Starting Price: $5 per user per month
  • 2
    Microsoft OneDrive
    Access, share, and collaborate on all your files from anywhere. OneDrive connects you to all your files in Office 365 so you can share and work together from anywhere while protecting your work. Easily store, access and discover your personal and shared work files in Office 365, including Microsoft Teams, from all your devices. Edits you make offline are automatically uploaded next time you connect. Work faster and smarter with anyone inside or outside your organization. Securely share files and work together in real-time using Word, Excel and PowerPoint across web, mobile and desktop. Create, view, edit, and share files on the go with the OneDrive mobile app. Easily capture whiteboards and scan work receipts, business cards, and other paper documents for safe keeping. OneDrive helps protect your files. You can easily recover files from accidental deletes or malicious attacks and administrators can manage security policies to help keep your information safe.
    Leader badge
    Starting Price: $2 per user per month
  • 3
    Microsoft SharePoint
    Your mobile, intelligent intranet. Share and manage content, knowledge, and applications to empower teamwork, quickly find information, and seamlessly collaborate across the organization. SharePoint empowers teamwork with dynamic and productive team sites for every project team, department, and division. Share files, data, news, and resources. Customize your site to streamline your team’s work. Collaborate effortlessly and securely with team members inside and outside your organization, across PCs, Macs, and mobile devices. Build cohesion and inform your employees throughout your intranet. Drive organizational efficiency by sharing common resources and applications on home sites and portals. Tell your story with beautiful communication sites. And stay in the know with personalized, targeted news on the web and the SharePoint mobile apps. You’re just a click away from what you are looking for, with powerful search and intelligent ways to discover information.
    Leader badge
    Starting Price: $1.00/one-time/user
  • 4
    IBM Cloud
    IBM Cloud® capabilities enable business agility and resiliency. Explore the platform that gives you 2.5x value. Designed for industry, security and the freedom to build and run anywhere. Business workflow transformation with automation and AI. Strong technology partner ecosystem that delivers value for industry needs. Industry and business domain expertise and solutions. Automated and auditable processes. Unique capabilities for the highest levels of cloud security and monitoring. Consistent security and controls posture across all applications. Containerized capabilities for DevOps, automation, data and security. Ease of integration and a consistent application development lifecycle. Advanced technologies including IBM Watson®, analytics, IoT, and edge.
  • 5
    Microsoft Exchange
    Work smarter with business-class email and calendaring. Exchange helps you collaborate on your critical documents and gives you a focused inbox that prioritizes important messages and adapts to your work style, so you can get more done–faster. Get access to a more personalized inbox with helpful features and a smarter, more organized way to view and interact with email. Search enhancements give you faster and more complete results. With Add-ins, get powerful customization and extensibility, which connect you to modern services and internal line-of-business applications. Organize your time with a calendaring system that goes beyond basic scheduling of appointments and commitments. Automatically capture events from email such as flights and hotel reservations, and get suggestions about where to meet based on your location. Microsoft Exchange Online offers a hosted email service for business. Exchange Online helps protect your information with advanced capabilities.
  • 6
    Webroot Mobile Security
    Threats from mobile malware on Android™ devices continue to grow exponentially. Each year, Webroot categorizes millions of new apps as suspicious or malicious. And iOS attacks are on the rise, too. With more and more shopping, banking, and browsing happening on mobile devices, hackers are devoting greater effort to compromising these devices. Protecting them is more important than ever. Secure mobile web browsing identifies malicious websites and protects against phishing and other social engineering tactics aimed at seizing your personal data in real time. Android antivirus automatically protects, scans, and checks all applications and updates for threats without interruptions. Simple-to-use, powerful internet security for your iPhone® that won’t impact browsing speed. Blocks malicious websites that steal personal information while using Webroot or Safari® browsers. Worry-free browsing backed by machine learning and Artificial Intelligence with 20 years of historical data.
    Starting Price: $15.00/year
  • 7
    Webroot Business Endpoint Protection
    To secure your businesses, you need endpoint protection software that’s stronger and smarter than traditional business antivirus. Endpoint protection, or endpoint security, is a general term that describes cybersecurity services for network endpoints, like laptops, desktops, smartphones, tablets, servers, and virtual environments. These services may include antivirus and antimalware, web filtering, and more. Endpoint protection helps businesses keep critical systems, intellectual property, customer data, employees, and guests safe from ransomware, phishing, malware, and other cyberattacks. If you are thinking, “Do I need endpoint protection?” Consider this, criminals are constantly developing new ways to attack networks, take advantage of employee trust and steal data. Smaller businesses may think they’re not a target, but that couldn’t be further from the truth. In fact, small businesses with 100 employees or fewer now face the same risk of attack as a 20,000-employee enterprise.
    Starting Price: $30 per year
  • 8
    Webroot DNS Protection
    Protective filtering for security, visibility, privacy and control. Minimize risks, maximize safety and productivity on the web. Today’s businesses need secure, private, manageable and visible control over internet traffic. The current domain name system (DNS) simply resolves internet requests through a global system of servers, then translates those requests into their unique Internet Protocol (IP) addresses. But this vital service was not designed with security in mind and many DNS exploits and vulnerabilities now exist. By using a protective DNS service like Webroot® DNS Protection organizations control their networks and maintain the security, privacy and visibility they need to protect IT infrastructure and users, even those working remotely. Its primary aim is to create a highly secure, private, resilient and manageable connection to the internet. Automated filtering uses Webroot BrightCloud® Internet Threat Intelligence to automatically block requests.
  • 9
    Splunk Cloud
    Turn data into answers with Splunk deployed and managed securely, reliably and scalably as a service. With your IT backend managed by our Splunk experts, you can focus on acting on your data. Splunk-provisioned and managed infrastructure delivers a turnkey, cloud-based data analytics solution. Go live in as little as two days. Managed software upgrades ensure you always have the latest functionality. Tap into the value of your data in days with fewer requirements to turn data into action. Splunk Cloud meets the FedRAMP security standards, and helps U.S. federal agencies and their partners drive confident decisions and decisive actions at mission speeds. Drive productivity and contextual insights with Splunk’s mobile apps, augmented reality and natural language capabilities. Extend the utility of your Splunk solutions to any location with a simple phrase or the tap of a finger. From infrastructure management to data compliance, Splunk Cloud is built to scale.
  • 10
    Zscaler

    Zscaler

    Zscaler

    Zscaler, creator of the Zero Trust Exchange platform, uses the largest security cloud on the planet to make doing business and navigating change a simpler, faster, and more productive experience. The Zscaler Zero Trust Exchange enables fast, secure connections and allows your employees to work from anywhere using the internet as the corporate network. Based on the zero trust principle of least-privileged access, it provides comprehensive security using context-based identity and policy enforcement. The Zero Trust Exchange operates across 150 data centers worldwide, ensuring that the service is close to your users, co-located with the cloud providers and applications they are accessing, such as Microsoft 365 and AWS. It guarantees the shortest path between your users and their destinations, providing comprehensive security and an amazing user experience. Use our free service, Internet Threat Exposure Analysis. It’s fast, safe, and confidential.
  • 11
    Webroot AntiVirus
    Nearly half of all consumers worldwide have been victims of cybercrime. Every link clicked, email opened, app downloaded, and network joined is an opportunity for hackers to compromise your personal data. Even established threats like ransomware are continuously evolving, and new threats like cryptojacking are being added to an already diverse threat landscape. Webroot offers complete protection from viruses and identity theft for all your devices, without slowing you down. Don't stare at the screen while your computer runs a scan. Webroot takes 20 seconds to check your computer for malicious malware – 60x faster than the average scan time of tested competitor antivirus products. Being fully cloud-based allows Webroot to complete scans faster than our competitors. Because we've moved the heavy-lifting off your device, computing power remains free to be used how you want to use it.
    Starting Price: $29.99 per device per year
  • 12
    Active Directory
    Active Directory stores information about objects on the network and makes this information easy for administrators and users to find and use. Active Directory uses a structured data store as the basis for a logical, hierarchical organization of directory information. This data store, also known as the directory, contains information about Active Directory objects. These objects typically include shared resources such as servers, volumes, printers, and the network user and computer accounts. For more information about the Active Directory data store, see Directory data store. Security is integrated with Active Directory through logon authentication and access control to objects in the directory. With a single network logon, administrators can manage directory data and organization throughout their network, and authorized network users can access resources anywhere on the network. Policy-based administration eases the management of even the most complex network.
    Starting Price: $1 per user per month
  • 13
    Webroot Security Awareness Training
    Security awareness training is an education process that teaches employees about cybersecurity, IT best practices, and even regulatory compliance. A comprehensive security awareness program for employees should train them on a variety of IT, security, and other business-related topics. These may include how to avoid phishing and other types of social engineering cyberattacks, spot potential malware behaviors, report possible security threats, follow company IT policies and best practices, and adhere to any applicable data privacy and compliance regulations (GDPR, PCI DSS, HIPAA, etc.) Webroot® Security Awareness Training is a proven educational approach for reducing risky employee behaviors that can lead to security compromises. By efficiently delivering relevant information, security awareness training transforms employees into a business's best line of defense.
  • 14
    LogRhythm NextGen SIEM
    We know your job isn’t easy. That’s why we combine log management, machine learning, SOAR, UEBA, and NDR to give you broad visibility across your environment so you can quickly uncover threats and minimize risk. But a mature SOC doesn’t just stop threats. With LogRhythm, you’ll easily baseline your security operations program and track your gains — so you can easily report your successes to your board. Defending your enterprise comes with great responsibility — that’s why we built our NextGen SIEM Platform with you in mind. With intuitive, high-performance analytics and a seamless incident response workflow, protecting your business just got easier. With the LogRhythm XDR Stack, your team has an integrated set of capabilities that deliver on the fundamental mission of your SOC — threat monitoring, threat hunting, threat investigation, and incident response — at a low total cost of ownership.
  • 15
    Trellix Helix
    To protect against advanced threats, organizations need to integrate their security and apply the right expertise and processes. Trellix Helix is a cloud-hosted security operations platform that allows organizations to take control of any incident from alert to fix. Gain comprehensive visibility and control across your entire enterprise by collecting, correlating and analyzing critical data for meaningful threat awareness. Easily integrate security functions without extensive and costly cycles. Make informed and efficient decisions with contextual threat intelligence. Detect advanced threats with machine learning, AI and integrated real-time cyber intelligence. Gain critical context into who is targeting your organization and why. With a smart and adaptive platform, you can predict and prevent emerging threats, identify root causes and respond in real time.
  • 16
    NetApp Cloud Manager
    Centrally orchestrate your hybrid cloud storage, and data management services. Cloud Manager provides IT experts and cloud architects with a centralized control plane to manage, monitor and automate data in hybrid cloud environments, providing an integrated experience of NetApp’s Cloud Volumes Platform. Centralized platform for your on-premise and cloud storage, supporting hybrid, multiple cloud providers and accounts. Empowers IT professionals to provide their internal and external users with optimized cloud storage services. Unify your siloed storage systems on a single-pane console. Control multiple NetApp ONTAP storage systems, on-premises and in the AWS, Azure and Google cloud. Empower IT professionals to meet business objectives with simple provisioning tools. Allocate optimized storage capacity for internal and external customers with automatic capacity scaling. Allows automation and orchestration of cloud storage operations with RESTful API support.
  • 17
    Hitachi Content Intelligence
    Intelligent data discovery and transformation improves productivity by revealing insights more quickly to make your business smarter. A robust solution framework for comprehensive discovery and fast exploration of your critical business data and storage operations. Whether on premises, off premises, in the cloud, structured or unstructured, Hitachi Content Intelligence maximizes data value to deliver the information you need to make the smartest business decisions. Mitigate your industry’s data growth and sprawl and easily find the data you need. Enrich your data to deliver the most relevant information that your business needs to stay informed. Aggregate data from any sources, surface new insights, and boost productivity with robust searches.
  • 18
    Titus Classification Suite
    Achieving compliance across a wealth of new international data privacy laws and regulations is the benchmark for effective cybersecurity, and data classification is the first step to building a strong data protection posture. The family of Titus Classification products provides the essential tools to clearly inform both your people and your policies on what data should be secured and how to handle it. Manage and protect your data with the industry’s most flexible and customizable classification metadata schema. Give your data context so people and systems understand how to handle the information. A classification and policy enforcement tool that ensures all Microsoft Office documents are classified before they can be saved, printed, or sent via email. Ensure that every email is classified and protectively marked before it is sent. Allow end users to classify and protect any file type with just a few mouse clicks in Microsoft Windows Explorer helping protect your organization.
  • 19
    Archer

    Archer

    RSA Security

    Built upon decades of experience and hundreds of deployments across all domains of risk management. Whether your organization has an advanced Risk Management function looking to consolidate visibility or get started with one area of risk. Drive efficiency and coordination across stakeholders on a platform tailor-made for risk analysis and management. Archer enables a common understanding of risk, making it easier to work together to manage it. Applying the same taxonomies, policies and metrics to the management of all risk data enhances visibility for everyone, improves collaboration and increases efficiencies. Explore our comprehensive approach to integrated risk management with a demo of Archer. See the UI and discover how the features, dashboards, and capabilities can best address your organization’s unique risk and compliance challenges, whether you deploy our on-premises or SaaS offering.
  • 20
    Nasuni

    Nasuni

    Nasuni

    The industry’s first ‘in-line’ edge detection combined with rapid ransomware recovery patent capabilities gives IT confidence to effectively mitigate cyber attacks. Nasuni is disrupting the file storage market with a cloud-based approach that replaces traditional on-premises primary and secondary file storage. Nasuni delivers a file storage platform that leverages object storage delivering a simpler, lower cost, and more efficient SaaS solution that scales easily to handle rapid unstructured data growth. Nasuni provides cloud file storage for an unlimited number of sites from a single console, with capacity-on-demand where and when it’s needed and includes built-in backup and disaster recovery. With a design that accommodates cloud, hybrid cloud, and on-premises deployments, Nasuni replaces multiple data silos and toolsets with a single global file system that offers a 360-degree view of your file data, and a single platform that is easy to deploy and manage.
  • 21
    Webroot BrightCloud Threat Intelligence
    Integrated by leading security vendors worldwide, Webroot BrightCloud® Threat Intelligence Services help you give customers proactive protection against modern threats. Webroot BrightCloud® Threat Intelligence Services protect your customers from malicious URLs, IPs, files, and mobile apps by integrating accurate and near real-time threat intelligence into your network and endpoint protection. The platform scans billions of IP addresses and billions of URLs across millions of domains, in addition to millions of mobile apps, and leverages machine learning to classify and categorize each according to the threat it represents to your business. Because today’s cyber threat landscape shifts so rapidly, and much of the malware we see today will be gone tomorrow, cloud-based solutions making instantaneous updates must replace static and list-based antivirus solutions.
  • 22
    Fortinet SD-WAN
    Fortinet is the fastest-growing SD-WAN provider in market share by revenue. Fortinet SD-WAN delivers advanced routing, self-healing capabilities, and flexible security using network firewall or SASE-based cloud-delivered services—all in a single, integrated solution. Fortinet Secure SDWAN (software-defined wide-area network) solution enables enterprises to transform and secure all WAN edges. Leveraging the Security-driven Networking approach that uses one operating system and one centralized management console, enterprises realize superior user experience, enhanced security posture effectiveness with converged networking and security, and achieve operational continuity and efficiency. Fortinet Secure SD-WAN is designed to address modern complexity and threat exposure to support customers critical business needs. It is designed to evolve to future-proof and protect investments as customers embrace a digital-first journey and support work-from-anywhere.
  • 23
    Hitachi Content Platform

    Hitachi Content Platform

    Hitachi Vantara

    With massive scale and robust security, HCP eases data control and access. Discover why IDC views Hitachi Vantara as a leader in object storage. Navigating modern challenges requires support for multiple use cases with visibility and control across all data. A modern digital platform enables easy management of volumes of data, seamless response to application demands and wide data accessibility, while satisfying compliance requirements. Grow cloud storage from terabytes to exabytes to easily manage IoT, machine and application data. Mitigate data exposure or theft risks with multitenancy, “write once, read many” and encryption. Use advanced metadata features and deliver low latency and high throughput for modern applications. Try Hitachi Content Platform and learn why thousands of the world’s leading organizations rely on it to manage their most valuable asset – their data.
  • 24
    CyberArk Conjur
    A seamless open source interface to securely authenticate, control and audit non-human access across tools, applications, containers and cloud environments via robust secrets management. Secrets grant access to applications, tools, critical infrastructure and other sensitive data. Conjur secures this access by tightly controlling secrets with granular Role-Based Access Control (RBAC). When an application requests access to a resource, Conjur authenticates the application, performs an authorization check against the security policy and then securely distributes the secret. Security policy as code is the foundation of Conjur. Security rules are written in .yml files, checked into source control, and loaded onto the Conjur server. Security policy is treated like any other source control asset, adding transparency and collaboration to the organization’s security requirements.
  • 25
    OpenText ArcSight Enterprise Security Manager
    Experience powerful, efficient threat detection and response through security analytics from a next-gen SIEM. Real-time threat detection and response backed by a powerful, open, and intelligent SIEM (Security Information and Event Management). Gain enterprise-wide threat visibility from an industry-leading data collection framework that connects to all your security event devices. When it comes to threat detection, every second counts. ESM’s powerful real-time correlation offers the fastest way to detect known threats. Coordinating a rapid response to threats is critical for Next-Gen SecOps. Automated responses and workflow processing keep your SOC efficient. A Next-Gen SIEM will efficiently integrate with your existing security solutions to boost their ROI and support a layered analytics approach. ArcSight ESM leverages the Security Open Data Platform, whose SmartConnectors can connect to 450+ data source types to collect, aggregate, clean, and enrich your data.
  • 26
    Quantum Axis

    Quantum Axis

    Quantum

    Leverage the power of a financial analysis platform to achieve the best results. We specialize in developing solutions for accessing, analyzing, comparing, monitoring, managing, and disclosing information in an easy, consistent and efficient way. Quantum is a financial technology company that has been operating in the market since 1999. We have a large financial database regularly updated with quantitative and qualitative data. We have a dedicated team that continuously works on the upkeep of information and seek to find the solutions that best suit our customers’ needs. Learn how a platform with an extensive financial database can help you get the right information when you need it. All this through an online system accessible through web browsers, mobile devices, APIs, and data links. ‍ Leverage a solution that will bring you competitive advantage by helping you make the right decisions for your company.
  • Previous
  • You're on page 1
  • Next