Alternatives to Ivanti Neurons

Compare Ivanti Neurons alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Ivanti Neurons in 2024. Compare features, ratings, user reviews, pricing, and more from Ivanti Neurons competitors and alternatives in order to make an informed decision for your business.

  • 1
    NinjaOne

    NinjaOne

    NinjaOne

    NinjaOne automates the hardest parts of IT, empowering more than 17,000 IT teams with visibility, security, and control over all endpoints. The NinjaOne platform increases productivity while reducing risk and IT costs. Organizations use NinjaOne, including its wide range of IT and security integrations, for use cases including endpoint management, patch management, mobile device management, software deployment, remote access, endpoint backup, and more.
    Leader badge
    Compare vs. Ivanti Neurons View Software
    Visit Website
  • 2
    Atera

    Atera

    Atera

    Atera is reinventing the world of IT by harnessing AI to power our all-in-one Remote Monitoring and Management (RMM), Helpdesk, Ticketing, and automations platform—streamlining organizational IT management at scale with our proprietary Action AI™ solution. Designed for unprecedented efficiency, Atera serves over 12,000 customers across 120 countries. Our first-of-kind IT Copilot augments existing tech capabilities with AI auto script generation, ticket summaries, recommended solutions, and more. The result of this groundbreaking technology is a freeing of critical resources and an exponential lift in productivity. Try Atera Free Now!
    Leader badge
    Compare vs. Ivanti Neurons View Software
    Visit Website
  • 3
    SysAid

    SysAid

    SysAid Technologies

    SysAid revolutionizes the IT realm with a state-of-the-art, next-gen ITSM platform, effortlessly elevating service delivery for organizations. Leveraging cutting-edge generative AI, intricately woven into every service management aspect, SysAid offers a holistic solution. Its intuitive interface and immersive conversational user experience redefine operational norms, marking a monumental shift. Empowering IT admins and Service Management leaders, SysAid unlocks productivity, allowing employees to center on core roles. This empowerment fosters a sense of purpose, enabling unhindered operations, and propelling entities toward achieving their paramount objectives.
    Leader badge
    Partner badge
    Compare vs. Ivanti Neurons View Software
    Visit Website
  • 4
    ManageEngine Endpoint Central
    ManageEngine's Endpoint Central (formerly Desktop Central) is a Unified Endpoint Management Solution, that takes care of enterprise mobility management (including all features of mobile application management and mobile device management), as well as client management for a diversified range of endpoints - mobile devices, laptops, computers, tablets, server machines etc. With ManageEngine Endpoint Central, users can automate their regular desktop management routines like distributing software, installing patches, managing IT assets, imaging and deploying OS, and more.
    Compare vs. Ivanti Neurons View Software
    Visit Website
  • 5
    ConnectWise Automate
    Solve IT problems at the speed of business with ConnectWise Automate. A robust remote monitoring and management (RMM) platform, ConnectWise Automate helps boost the effectiveness of IT teams. It offers teams the ability to discover all devices and users that need to be proactively monitored, remove delivery roadblocks, and support more endpoints without adding headaches or head count.
    Leader badge
    Compare vs. Ivanti Neurons View Software
    Visit Website
  • 6
    ChangeGear

    ChangeGear

    Serviceaide

    ChangeGear is a complete service management solution that can be implemented in weeks, not months, and intuitive to use. With low administration costs and quick implementation, you will see a real return on your investment. A flexible platform that works either on premise or in the cloud. ChangeGear is based on ITIL best practices and has been designed to be a comprehensive solution with all the components your team needs. You can choose the environment that best suits your technology, compliance, and infrastructure needs. Affordable and comprehensive, ChangeGear provides IT staff with the functions required to manage everything from ticketing to incident, change and asset management and more. ChangeGear includes a virtual agent, self-service portals and AI-based features to support analyst and end user productivity. Automate processes across technical workflows, services and business processes for business agility.
    Compare vs. Ivanti Neurons View Software
    Visit Website
  • 7
    Vulcan Cyber

    Vulcan Cyber

    Vulcan Cyber

    At Vulcan Cyber we’re changing the way businesses reduce cyber risk through vulnerability remediation orchestration. We help IT security teams go beyond remedial vulnerability management to help them drive vulnerability remediation outcomes. The Vulcan platform consolidates vulnerability and asset data, with threat intelligence and customizable risk parameters to deliver risk-based vulnerability prioritization insights. But we don't stop there. Vulcan remediation intelligence takes the vulnerabilities that matter to your business and attaches the remedies and fixes needed to mitigate the threat. Then Vulcan orchestrates and measures the rest of the remediation process with integrations and inputs into application security, DevSecOps, patch management, configuration management, and cloud security tools, teams and functions. From scan to fix, Vulcan Cyber delivers the unique ability to orchestrate the entire vulnerability remediation process to GET FIX DONE at scale.
    Starting Price: $999 / month
  • 8
    N-able N‑central
    Join the thousands of MSPs and IT professionals who use N-able™ N-central® to remotely monitor and manage devices and complex networks. Key features include: • Monitor almost any device, including support for Windows, Linux, and macOS • Gain complete insight across your network and cloud services without the need for extra network monitoring software • Create automated patch management policies to ensure devices are up to date • Streamline your workflow with drag-and-drop scripting in automation manager—no need to write a line of code • Provide remote support across devices and platforms with the integrated Take Control feature • Integrate your existing PSA software or use N-able MSP Manager to manage tickets and billing • Manage security with integrated backup, EDR, AV, and disk encryption • Available as an on-premises or hosted cloud solution to fit your business
  • 9
    SanerNow

    SanerNow

    SecPod Technologies

    SecPod SanerNow is the world's best unified endpoint security & management platform that powers IT/Security Teams automate cyber hygiene practices. It works on an intelligent agent-server model to execute effective endpoint management and security. It gives you accurate vulnerability management with scanning, detection, assessment, prioritization, and remediation capabilities. SanerNow is available on both cloud and on-premise, whose integrated patch management automates patching across all major OSs like Windows, MAC, Linux, and a vast collection of 3rd party software patches. What makes it unique? You can now access other salient features like security compliance management, IT asset management, endpoint management, software deployment, application & device control, and endpoint threat detection and response, all on a single platform. With SanerNow, you can remotely perform and automate these tasks to secure your systems from the emerging wave of cyberattacks.
    Starting Price: $50/year/device
  • 10
    Virima

    Virima

    Virima Inc.

    VIRIMA is a SaaS platform delivering highly automated IT Asset Management (ITAM), IT Service Management (ITSM) and IT Operations Management (ITOM) solutions that are easy and inexpensive to deploy. Through advanced infrastructure discovery and visualization capabilities, VIRIMA links the business processes to the technology and services business rely upon. The innovative automation capabilities of the VIRIMA CMDB deliver insight, control and value to IT organizations large and small, enabling them to efficiently tackle the challenges of managing and securing today’s dynamic, dispersed and complex IT estate.
    Starting Price: $15,000.00/year
  • 11
    Infraon IMS

    Infraon IMS

    Infraon

    A complete Unified Infrastructure Monitoring Suite for IT, Networking and IoT devices powered by AI. Powered by AI, Infraon IMS offers you a platform that provides precision monitoring, detailed insight and rapid troubleshooting for heterogeneous IT Infrastructure across enterprises of all sizes. Gaining real time reports and alerts on application and network performance on a single platform enables teams to collaboratively troubleshoot performance issues and proactively ensure top-notch service quality. Change from manual to automatic and simplify your IT tasks to skillfully manage all devices across multiple data centers from a single location. Equip IT workforce to seamlessly troubleshoot issues and ensure service excellence anytime and anyplace. Download, baseline and actively track any configuration changes in your network devices with color-code highlights, instant notifications and approval settings.
    Starting Price: $10 per month
  • 12
    Hexway ASOC

    Hexway ASOC

    Hexway

    Hexway ASOC is a universal DevSecOps platform designed to simplify vulnerability management. A comprehensive solution to assess, analyze, and assign vulnerabilities, ensuring a secure and controlled environment. With Hexway ASOC, you can: Aggregate and Orchestrate Security Outputs: All the outputs from various security tools like SAST, DAST, and IAST are transformed into actionable data. No Duplicated Findings: Identify and merge duplicate security findings. Automate and Control Remediation: Integrate with Jira to unify remediation control processes. 360° DevSecOps Control: Gain control over the entire development lifecycle with real-time updates and analytics SDLC-Ready: Long-term analytics, CI/CD automation, progress tracking, and real-time notifications. Better Than Open Source: Reliable solution with quick support, user-friendly design, and stability.
  • 13
    Open Content Platform

    Open Content Platform

    Open Content Platform

    Open Content Platform (OCP) is an open-source IT discovery and integration platform. OCP handles discovery, integration, and modeling for solutions in the datacenter. The core framework is micro-service, enabling process-level horizontal scalability. It’s fully extensible, designed for developers, and leverages components in the open-source space, to greatly reduce product complexity. The dynamic discovery is fundamentally different from other ITSM vendors, and the data-driven modeling keeps Applications and Services up-to-date for downstream consumption (e.g. Service-aware monitoring).
  • 14
    ALVAO IT Service Management
    ALVAO's comprehensive ITSM platform integrates Service Desk and IT Asset Management, simplifying daily IT operations with digital workflows and no-code automation for incident, problem, change, and release management, as well as IT asset tracking. Data-driven insights enable process improvement and updated asset data will help you to reveal the potential for cost savings. Additionally, ALVAO's unique license model allows you to extend these capabilities to other departments at no extra cost, maximizing your software investment and reducing cost.
  • 15
    ALVAO Service Desk
    No one has to hunt around for information, whom to contact to report a device fault, a system crash or to request an equipment. Employees can contact the Service Desk either through the self-service portal or directly via Teams or Outlook. Get the full Service Desk experience without ever having to leave Microsoft Outlook. You can access your ticket log, browse our knowledge base or create e new request from a catalogue. The requester is clear about who is handling their request, its status and how much time remains to resolution. They do not have to call the helpdesk to ask about the resolution status. Don’t waste time sorting requests. The system will ensure that each request is assigned to the right team. Requests are automatically sorted according to assigned priorities. The team has a clearly organized work schedule and will never forget anything important.
    Starting Price: $2.00/user
  • 16
    Alemba Service Manager
    Alemba Service Manager is a highly functional, ITIL-aligned IT Service Management tool with a specific focus on request fulfilment. Backed by 25 years of heritage, Alemba Service Manager enables users to respond quickly to business demands by dramatically reducing time to request fulfilment through automated workflowed integration. Alemba’s unique pricing model takes into account different levels of participation in your organization, offering an interface for every kind of user. With a strong consultancy background, unrivalled expertise in the Service Management market, and a strong focus on customer experience, Alemba is ideally positioned to deliver a successful, end-to-end Service Management project within your organization.
  • 17
    Faraday

    Faraday

    Faraday

    In today’s dynamic world, security is no longer about fortifying rigid structures. It’s about keeping watch and securing change. Carry out a continuous evaluation of your attack surface with techniques and methodologies used by real attackers. Always keep track of your dynamic attack surface to guarantee constant coverage. Full coverage requires using several scanners. Let us pinpoint crucial data from an overwhelming amount of results. Our Technology allows you to define and execute your own actions from different sources with your own schedule and automatically import outputs into your repository. With +85 plugins, an easy-to-use Faraday-Cli, a RESTful API, and a flexible scheme to develop your own agents, our platform brings a unique alternative to creating your own automated and collaborative ecosystem.
    Starting Price: $640 per month
  • 18
    Nucleus

    Nucleus

    Nucleus

    Nucleus is redefining the vulnerability management software category as the single source of record for all assets, vulnerabilities, and associated data. We unlock the value you’re not getting from existing tools and place you squarely on the path to program maturity by unifying the people, processes, and technology involved in vulnerability management. With Nucleus, you receive unmatched visibility into your program and a suite of tools with functionality that simply can’t be replicated in any other way. Nucleus is the single shift-left tool that unifies development and security operations. It unlocks the value you’re not getting out of your existing tools and puts you on the path to unifying the people, processes, and technology involved in addressing vulnerabilities and code weaknesses. With Nucleus, you’ll get unmatched pipeline integration, tracking, triage, automation and reporting capabilities and a suite of tools with functionality.
    Starting Price: $10 per user per year
  • 19
    Tromzo

    Tromzo

    Tromzo

    Tromzo builds deep environmental and organizational context from code to cloud so you can accelerate the remediation of critical risks across the software supply chain. Tromzo accelerates the remediation of risks at every layer from code to cloud. We do this by building a prioritized risk view of the entire software supply chain with context from code to cloud. This context helps our users understand which few assets are critical to the business, prevent risks from being introduced to those critical assets, and automate the remediation lifecycle of the few issues that truly matter. Contextual software asset inventory (code repos, software dependencies, SBOMs, containers, microservices, etc.), so you know what you have, who owns them, and which ones are important to the business. Understand the security posture for every team with SLA compliance, MTTR, and other custom KPIs, so you can drive risk remediation and accountability across the organization.
  • 20
    Arnica

    Arnica

    Arnica

    Put your software supply chain security on autopilot. Actively mitigate anomalies & risks in your development ecosystem, protect developers, and trust their code commits. Automate developer access management. Behavior-based developer access management with self-service provisioning in Slack or Teams. Continuously monitor and mitigate anomalous developer behavior. Identify hardcoded secrets. Validate and mitigate before they land in production. Go beyond SBOM and get visibility into all open-source licenses, infrastructure, vulnerabilities, and OpenSSF scorecards across your organization in minutes. Arnica is a behavior-based software supply chain security platform for DevOps. Arnica proactively protects your software supply chain by automating the day-to-day security operations and empowering developers to own security without incurring risks or compromising velocity. Arnica enables you to automate constant progress toward the least-privilege for developer permissions.
  • 21
    Maverix

    Maverix

    Maverix

    Maverix blends itself into the existing DevOps process, brings all required integrations with software engineering and application security tools, and manages the application security testing process end to end. AI-based automation for security issues management including detection, grouping, prioritization, filtration, synchronization, control of fixes, and support of mitigation rules. Best-in-class DevSecOps data warehouse for full visibility into application security improvements over time and team efficiency. Security issues can be easily tracked, triaged, and prioritized – all from a single user interface for the security team, with integrations to third-party products. Gain full visibility into application production readiness and application security improvements over time.
  • 22
    ArmorCode

    ArmorCode

    ArmorCode

    Centralize all AppSec findings (SAST, DAST, SCA, etc) and correlate with infrastructure and cloud security vulnerabilities to get a 360o view of you application security posture. Normalize, de-dup and correlate findings to improve risk mitigation efficiency and prioritize the findings that impact the business. A single source of truth for findings and remediations from across tools, teams and applications. AppSecOps is the process of identifying, prioritizing, remediating and preventing Security breaches, vulnerabilities and risks - fully integrated with existing DevSecOps workflows, teams and tools ‍‍ An AppSecOps platform enables security teams to scale their ability to successfully identify, remediate and prevent high-priority application level security, vulnerability, and compliance issues, as well as identify and eliminate coverage gaps.
  • 23
    Phoenix Security

    Phoenix Security

    Phoenix Security

    Phoenix Security enables security, developers, and businesses to all talk the same language. We help security professionals focus on the vulnerabilities that matter most across cloud, infrastructure, and application security. Laser focuses on the 10% of vulnerabilities that matter today, and reduces risk faster with prioritized contextualized vulnerabilities. Threat intelligence automatically in the risk improves efficiency enabling fast reaction. Threat intelligence automatically in the risk improves efficiency enabling fast reaction. Aggregate, correlate and contextualize multiple security tools and data sources, providing your business with unprecedented visibility. Break down the silos between application security, operational security, and the business.
    Starting Price: $3,782.98 per month
  • 24
    Kondukto

    Kondukto

    Kondukto

    The Kondukto platform’s flexible design allows you to create custom workflows for responding to risks quickly and efficiently. Take advantage of more than 25 built-in open-source tools ready to run SAST, DAST, SCA, and Container Image scans within minutes without a need for installation, maintenance, or updates. Protect your corporate memory from changes in employees, scanners, or DevOps tools. All security data, statistics, and activities in one place for you to own. Avoid vendor lock or loss of historical data when you need to change an AppSec tool. Verify fixes automatically to ensure better collaboration and less distraction. Boost efficiency by eliminating redundant conversations between AppSec and development teams.
    Starting Price: $12,000 per annually
  • 25
    Apiiro

    Apiiro

    Apiiro

    Complete risk visibility with every change, from design to code to cloud. Industry-first Code Risk Platform™ A 360° view of security & compliance risks across applications, infrastructure, developers’ knowledge & business impact. Data-driven decisions are better decisions. Understand your security & compliance risks with a real-time inventory of apps & infra code behavior, devs knowledge, 3rd-party security alerts & business impact. From design to code to cloud. Security architects don’t have time to review every change & investigate every alert. Make the most of their expertise by analyzing context across developers, code & cloud to identify risky material changes & automatically build an actionable workplan. No one likes manual risk questionnaires, security & compliance reviews - they’re tedious, inaccurate & not synced with the code. When the code is the design, we must do better - trigger contextual & automatic workflows.
  • 26
    XRATOR

    XRATOR

    XRATOR

    Our unified proactive cybersecurity platform combines tech and non-tech methods to drive personalized, automated cyber risk management solutions. Cyber risk management is complex and demanding. With our role-tailored, unified platform, overcome resource constraints and knowledge gaps. XRATOR simplifies the process, empowering you to focus on business objectives. With our platform, you're not juggling multiple tools. Everything you need is all in one place, for all roles involved in your organization. With evolving regulatory landscapes, maintaining compliance can be a complex process. Our solution automates compliance tasks, freeing you to focus on strategic initiatives. Witness how XRATOR AutoComply seamlessly integrates with your systems to monitor, identify and address potential compliance issues before they escalate.
  • 27
    Rezilion

    Rezilion

    Rezilion

    Automatically detect, prioritize and remediate software vulnerabilities with Rezilion’s Dynamic SBOM. Focus on what matters, eliminate risk quickly, and free up time to build. In a world where time is of the essence, why sacrifice security for speed when you can have both? Rezilion is a software attack surface management platform that automatically secures the software you deliver to customers, giving teams time back to build. Rezilion is different from other security tools that create more remediation work. Rezilion reduces your vulnerability backlogs. It works across your stack, helping you to know what software is in your environment, what is vulnerable, and what is actually exploitable, so you can focus on what matters and remediate automatically. Create an instant inventory of all of the software components in your environment. Know which of your software vulnerabilities are exploitable, and which are not, through runtime analysis.
  • 28
    Boman.ai

    Boman.ai

    Boman.ai

    Boman.ai can be integrated in your CI/CD pipeline with few commands and minimum configuration. No planning or expertise is needed. Boman.ai brings SAST, DAST, SCA, and secret scans all packaged in one integration. It can support multiple development languages. Boman.ai minimizes your application security expenses by utilizing open-source scanners. You don’t need to buy expensive application security tools. Boman.ai is powered by AI/ML that removes false positives and correlates results to help you in prioritization and fixes. The SaaS platform presents a dashboard for all your scan results in one place. Correlate the results and get insights for better application security. Manage vulnerabilities reported by the scanner. The platform helps to prioritize, triage, and remediate vulnerabilities.
  • 29
    4me

    4me

    4me, Inc

    4me® is an enterprise service management (ESM) solution for seamless collaboration between internal and external service providers. 4me is the only ESM solution that makes it possible for all internal departments, like IT, HR and Facilities, to work together seamlessly with each other, as well as with the managed service providers to which some services have been outsourced. In addition to supporting the ITIL processes, 4me also provides fully integrated knowledge management, time tracking and project management capabilities. For enterprise employees, 4me is the Self Service app that is always there for them whenever they need some help. Apart from 4me’s ITSM and ESM capabilities that support the ITIL and KCS practices, 4me uniquely supports the SIAM approach. This management approach is becoming increasingly important as enterprises rely on ever-more external providers. The powerful SIAM capabilities that 4me provides prepares organizations for the new reality of dynamic sourcing.
    Starting Price: $0 per month Freemium
  • 30
    Enso

    Enso

    Enso Security

    Enso is transforming application security by empowering organizations to build, manage and scale their AppSec programs. Its Application Security Posture Management (ASPM) platform easily deploys into an organization’s environment to create an actionable, unified inventory of all application assets, their owners, security posture and associated risk. With Enso Security, AppSec teams gain the capacity to manage the tools, people and processes involved in application security, enabling them to build a simplified, agile and scalable application security program without interfering with development. Enso has been recognized with numerous awards including the 2022 Excellence Awards, Globee Awards, and Forbes Top 20 Cybersecurity Startups to Watch.
  • 31
    Legit Security

    Legit Security

    Legit Security

    Legit Security protects software supply chains from attack by automatically discovering and securing the pipelines, infrastructure, code and people so that businesses can stay safe while releasing software fast. Automatically discover security issues, remediate threats and ensure the integrity and compliance of software releases. Comprehensive, visual SDLC inventory that's continually updated. Reveal unknown, misconfigured and vulnerable SDLC systems and infrastructure. Centralized visibility over location, coverage and configuration of your existing security tools and scanners. Catch insecure build actions before they can embed vulnerabilities downstream. Centralized, early prevention of sensitive data leaks, secrets and PII, before being pushed into the SDLC. Track security trends across teams and product lines to improve security posture and incentivize behavior. Get security posture at-a-glance with Legit Security Scores, Integrate your own alert and ticketing tools or use ours.
  • 32
    Naverisk RMM & PSA
    Beautifully simple RMM, Service Desk & PSA software. Slash your costs and simplify service delivery with a powerful, easy to use, all-in-one IT services automation platform. Naverisk has been empowering MSPs & IT Pros to deliver outstanding IT services for over 10 years. Deliver world class IT services with Naverisk’s powerful remote monitoring and management capabilities. Identify and resolve issues before your users are impacted. Transform the efficiency of your IT services with powerful, yet easy to use, automation. Full support for Windows, Linux, Mac & SNMP devices. It takes a team to deliver great customer service. Naverisk’s service desk is designed specifically for MSPs and IT Pros with powerful automation and collaboration capabilities. Power up your service delivery with modern collaboration features supporting teams working together with integrated device management to quickly resolve IT issues.
    Starting Price: $110 per month
  • 33
    Ivanti Neurons for MDM
    Effectively manage and secure all endpoints, so you can protect data everywhere work happens. Dealing with increasing demand for devices, applications and platforms? Ivanti Neurons for MDM is your single solution to manage iOS, iPadOS, Android, macOS, ChromeOS and Windows. Quickly and easily onboard devices and provision them over the air with all the apps, settings and security configurations they need. Deliver a delightful, native user experience across any device and OS while improving productivity. Manage and protect any iOS, iPadOS, Android, macOS, ChromeOS, Windows and VR/XR device, from a single cloud-based solution. Know the devices your supply chain workers rely on are updated and in good operating condition, ready for the day’s business.
  • 34
    Quest KACE

    Quest KACE

    Quest Software

    KACE® by Quest supports your unified endpoint management (UEM) strategy by helping you discover and track every device in your environment, automate administrative tasks, keep compliance requirements up-to-date and secure your network from a range of cyberthreats. Discover, manage and secure all your endpoints from one console as you co-manage your traditional and modern endpoints, including Windows, Mac, Linux, ChromeOS, and iOS and Android devices. KACE is a Unified Endpoint Management solution that offers a single point of control for managing IT systems across the entire organization, inside or outside your network. This comprehensive solution takes the stress out of keeping devices secure and compliant so you can do more.
    Starting Price: As low as $3/mo/device
  • 35
    BoostSecurity

    BoostSecurity

    BoostSecurity

    BoostSecurity® enables early detection and remediation of security vulnerabilities at DevOps velocity while ensuring the continuous integrity of the software supply chain at every step from keyboard to production. Get visibility into the security vulnerabilities in code, cloud and CI/CD pipeline misconfigurations in your software supply chain in minutes. Fix security vulnerabilities in code, cloud and CI/CD pipeline misconfigurations as you code, in pull requests, before they sneak into production. Create & govern policies consistently and continuously across code, cloud and CI/CD organizationally to prevent classes of vulnerabilities from re-occurring. Consolidate tool and dashboard sprawl through a single control plane for trusted visibility into the risks of your software supply chain. Build and amplify trust between developers & security for scalable DevSecOps through high fidelity, zero friction SaaS automation.
  • 36
    ServiceNow IT Service Management
    Deliver resilient IT services and create experiences that help your teams be more productive. Resolve issues quickly and speed the pace of innovation using AI and machine learning, all from the simplicity of a single cloud platform. Remove complexity and consolidate IT services and tools, bringing together the applications your business needs to deliver modern IT experiences. Automate essential processes and run them from the Now Platform, a single system of action for the enterprise. Unburden your IT services staff and boost productivity. Identify, track, and resolve incidents efficiently with AI-assisted intelligence. Get instant resolutions to repetitive IT service tasks with natural language virtual agents.   ITSM includes powerful platform capabilities so you can optimize processes, create seamless experiences, and build new value through innovation. Transform your business with a single, unifying platform for the enterprise.
  • 37
    Oxeye

    Oxeye

    Oxeye

    Oxeye is designed to expose vulnerable flows in distributed cloud native application code. We incorporate next-generation SAST, DAST, IAST, and SCA capabilities to ensure verification of risks in both Dev and Runtime environments. Built for developers and AppSec teams, Oxeye helps to shift-left security while accelerating development cycles, reducing friction, and eliminating vulnerabilities. We deliver reliable results with high accuracy. Oxeye analyzes code vulnerabilities across microservices delivering contextualized risk assessment enriched with infrastructure configuration data. With Oxeye developers can easily track and resolve vulnerabilities. We deliver the vulnerability visibility flow, steps to reproduce, and the exact line of code. Oxeye offers a seamless integration as Daemonset with a single deployment that doesn’t require performing changes in the code. We deliver frictionless security to your cloud-native apps.
  • 38
    Bionic

    Bionic

    Bionic

    Bionic uses an agentless approach to collect all of your application artifacts and provides a deeper level of application visibility that your CSPM tool cannot. Bionic continuously collects your application artifacts and creates an inventory of all of your applications, services, message brokers, and databases. Bionic integrates as a step in CI/CD pipelines and detects critical risks in the application layer and code, so teams can validate security posture in production. Bionic analyzes your code, performing checks for critical CVEs, and provides deeper insights into the blast radius of potential attacks surfaces. Bionic prioritizes code vulnerabilities based on the context of the overall application architecture. Create customized policies to prioritize architecture risk based on your company's security standards.
  • 39
    Conviso Platform

    Conviso Platform

    Conviso Platform

    Gain a complete view of your application security. Increase security maturity in your secure development process, and reduce the risks associated with your products. Application Security Posture Management (ASPM) solutions play a crucial role in the ongoing management of application risks, addressing security issues from the development phase to deployment. Efficiently managing an AppSec program, dealing with a growing number of products, and lacking a comprehensive view of vulnerabilities are typically significant challenges for the development team. We enhance the evolution of maturity by supporting the implementation of AppSec programs, monitoring established and executed actions, KPIs, and much more. We enable security to be incorporated into the early stages of development by defining requirements, processes, and policies and optimizing resources and time invested in additional testing or validations.
    Starting Price: $20.99 per asset
  • 40
    Xygeni

    Xygeni

    Xygeni Security

    Secure your Software Development and Delivery! Xygeni specializes in Application Security Posture Management (ASPM), using deep contextual insights to effectively prioritize and manage security risks while minimizing noise and overwhelming alerts. Our innovative technologies automatically detect malicious code in real-time upon new and updated components publication, immediately notifying customers and quarantining affected components to prevent potential breaches. With extensive coverage spanning the entire Software Supply Chain—including Open Source components, CI/CD processes and infrastructure, Anomaly detection, Secret leakage, Infrastructure as Code (IaC), and Container security—Xygeni ensures robust protection for your software applications. Trust Xygeni Security to protect your operations and empower your team to build and deliver with integrity and security.
  • 41
    OpenText Operations Orchestration
    Power your IT process automation. Orchestrate end-to-end IT processes with outstanding agility. Orchestrate on-prem and in-cloud processes – including self-healing incident remediation, virtualization, cloud service automation, and disaster recovery. Use 1,000s of ready-made operations and workflows or design your content with friendly integration wizards. Orchestration has never been this much fun. Create, customize, and debug workflows graphically in a web-based, drag-and-wire interface. Seamless GIT integration makes collaborative authoring between multiple designers possible. Run your workflows with a powerful orchestration engine. From a central dashboard, you can monitor workflows and manage user privileges, and even see the ROI benefits of your workflows. Achieve integrations across your heterogeneous systems using out-of-the-box content, custom operations, and friendly wizards. You can invoke OO from almost anywhere with REST APIs.
  • 42
    Tenable

    Tenable

    Tenable

    Tenable’s Cyber Exposure Platform gives you all the insight, research and data you need to uncover weaknesses across your entire attack surface. See every asset across your entire attack surface—from cloud environments to operational technologies, infrastructure to containers, and remote workers to modern web-apps with Tenable's market-leading vulnerability management sensors. With more than 20 trillion aspects of threat, vulnerability, misconfiguration and asset information, Tenable’s machine-learning powered predictions reduce remediation efforts by enabling you to focus first on the risks that matter most. Drive improvements required to reduce the probability of a business-impacting cyber event from occurring by communicating objective measures of risk and aligning business goals with security initiatives. Products include: - Tenable.ep - Tenable.io - Tenable.sc - Tenable.ad - Tenable.ot - Tenable Lumin
  • 43
    Snow Software

    Snow Software

    Snow Software

    We have brought together software asset management, cloud management and SaaS management so you can fully optimize all of your technology in one platform that seamlessly integrates with your enterprise ecosystem. Clearly see, understand and manage your entire technology landscape, both on-prem and in the cloud. Maximize the value of your technology investments with deep insights into usage, spend and vulnerabilities. Get the perspective and automation you need to anticipate and align with the rapidly evolving needs of your business. Fast implementation and intuitive design means you are saving money in weeks, not months. Break down your data silos to see on-prem, hybrid and cloud technologies together. Get clean and augmented data, updated daily and powered by the world's largest discovery catalog. Recommendations and self-service drive value, save time and increase productivity.
  • 44
    Brinqa

    Brinqa

    Brinqa

    Present a complete and accurate picture of your IT and security ecosystem with Brinqa Cyber Risk Graph. Deliver actionable insights, intelligent tickets, and timely notifications to all your stakeholders. Protect every attack surface with solutions that evolve with your business. Build a stable, robust, and dynamic cybersecurity foundation that supports and enables true digital transformation. Experience the power of Brinqa Risk Platform with a free trial - discover unparalleled risk visibility and improved security posture within minutes. The Cyber Risk Graph is a real-time representation of an organization’s infrastructure and apps, delineation of interconnects between assets and to business services, and the knowledge source for organizational cyber risk.
  • 45
    IBM Turbonomic
    Cut infrastructure spend by 33%, reduce data center refresh costs by 75%, and get back 30% of your engineering time with smarter resource management. Increasingly, complex applications run your business. And they can run your teams ragged trying to stay ahead of dynamic demand. When application performance drops, teams are often reacting at human speed, after the fact. To avoid disruption, you may overprovision resource allocations, making estimates that are often costly and don’t always pay off. The IBM® Turbonomic® Application Resource Management (ARM) platform allows you to eliminate this guesswork, saving both time and money. You can continuously automate critical actions in real time—and without human intervention—that proactively deliver the most efficient use of compute, storage and network resources to your apps at every layer of the stack.
  • 46
    IncidentMonitor

    IncidentMonitor

    Monitor 24-7

    IncidentMonitor™ is an advanced and flexible ITSM solution. Developed, delivered and supported from our Canadian office. Since 1999 Monitor 24-7 Inc. has developed a healthy user base across the US, Canada and Europe. Functionality, features and best practice templates like 10 ITIL processes, HR processes, customer surveys, etc...are delivered out-of-the-box. IncidentMonitor™ is more than just an application for IT and ITIL support, it is a Service Management framework with an integrated Workflow Engine, Self Service Portal and Service Catalog Designer. This, coupled with a no module approach, allows you to extend your service delivery beyond Service Desk into other areas of the organization.
    Starting Price: $21 per user per month
  • 47
    ManageEngine ServiceDesk Plus
    Best in class online service desk software. Offer your customers world-class services with ServiceDesk Plus Cloud, the easy-to-use SaaS service desk software from ManageEngine, the IT management division of Zoho. Track and manage IT tickets efficiently, resolve issues faster, and ensure end-user satisfaction with the cloud-based IT ticketing system used by over 100,000 IT service desks worldwide. Manage the complete life cycle of IT incidents, problems, changes, and projects with out of the box ITIL workflows. Create support SLAs, define escalation levels, and ensure compliance. Automate ticket dispatch, categorization, classification, and assignment based on predefined business rules, and set up notifications and alerts for timely ticket resolution. Reduce walk ins and unnecessary tickets by giving your users more control. Enable end users to access IT services through your service catalog in the self-service portal. Help users create and track tickets and search for solutions.
    Starting Price: $120.00/year/user
  • 48
    Jira Service Management
    Jira Service Management (formerly Jira Service Desk) empowers Dev and Ops teams to collaborate at high-velocity, so they can respond to business changes and deliver great customer and employee service experiences fast. Tune Jira Service Management to meet your unique needs. Empower every team, from IT to HR to legal, to set up a service desk quickly and continuously adapt at scale. Deliver great service experiences fast - without the complexity of traditional ITSM solutions. Track work across the enterprise through an open, collaborative platform. Link issues across Jira and ingest data from other software development tools, so your IT support and operations teams have richer contextual information to rapidly respond to requests, incidents, and changes. Deliver more customer impact while managing risk. Accelerate critical development work, eliminate toil, and deploy changes with ease, with a complete audit trail for every change.
    Starting Price: $20 per user per month
  • 49
    OpenText Service Management Automation X
    Machine learning based ITSM software to meet all your service desk and IT service management needs. Increase employee and IT productivity by creating and fulfilling services, and resolving issues faster with embedded machine learning and automation. Avoid customizations and reduce the resources required to update and run your service desk – whether on-prem or in the cloud – and drive down TCO. Satisfy employees and let them get back to work easily and faster with a consumer-like service experience they expect, at their desk or on the go. Deliver automated services with rapid and measurable outcomes that result in a superior user experience and accelerate continual business process improvement. Get a grip on assets throughout their lifecycle at no additional cost. Benefit from SMAX’s modern user experience and ensure IT investment optimization and compliance.
  • 50
    EV Service Manager
    IT has an opportunity to support digital transformation across the enterprise, and an integrated cloud based IT Service Management (ITSM) software tool is paramount to success. In contrast to the old, complex, or simple-but-not-sophisticated service desk solutions, EV Service Manager is a versatile, powerful, and easy way to manage service delivery for your organization. Our Service Manager platform supports even the most complex requirements, while bringing a new level of simplicity, agility, and mobility required to make cloud based IT Service Management (ITSM) software easy to use and easy to deliver. Improve your IT maturity with Service Manager's robust automation engine that includes out-of-box support for the entire ITIL lifecycle, including PinkVerified processes. Our adaptable and smart interface includes the ability to integrate portals, dashboards, and 3rd party apps allowing you to deliver a user experience that provides access to everything important.