15 Integrations with Kaspersky Anti-Virus

View a list of Kaspersky Anti-Virus integrations and software that integrates with Kaspersky Anti-Virus below. Compare the best Kaspersky Anti-Virus integrations as well as features, ratings, user reviews, and pricing of software that integrates with Kaspersky Anti-Virus. Here are the current Kaspersky Anti-Virus integrations in 2024:

  • 1
    Checkmk

    Checkmk

    Checkmk

    Checkmk is a comprehensive IT monitoring system that enables system administrators, IT managers, and DevOps teams to identify issues across their entire IT infrastructure (servers, applications, networks, storage, databases, containers) and act quickly to resolve them More than 2,000 commercial customers and many more open source users worldwide use Checkmk daily. Key product features: • Service state monitoring with almost 2,000 checks 'out of the box' • Log and event-based monitoring • Metrics, dynamic graphing, and long-term storage • Comprehensive reporting incl. availability and SLAs • Flexible notifications and automated alert handling • Monitoring of business processes and complex systems • Hardware and software inventory • Graphical, rule-based configuration, and automated service discovery Top use cases: • Server Monitoring • Network Monitoring • Application Monitoring • Database Monitoring • Storage Monitoring • Cloud Monitoring • Container Monitoring
    Starting Price: $0/year
  • 2
    Cloudmore

    Cloudmore

    Cloudmore

    Whether you're a business looking to solve a recurring services procurement challenge, a vendor transitioning to recurring revenue, or a service provider moving to the cloud, Cloudmore has a solution for you. One place to sell, manage and bill your subscription channel partners and customers. Solve the procurement challenge for recurring and metered services. Reduce your billing processing time and remove costly billing errors. Users can self serve to discover and acquire the services they need. Showcase and sell your services in an internal or external marketplace. Select services from Cloudmore's service catalog and sell these to your users in their curated e-store. Manage pricing on a global or per customer basis. Create offers and quotes from your service catalog. Your admin users can discover, provision and manage services and view monthly billing details.
    Starting Price: 499
  • 3
    Teamstack

    Teamstack

    Teamstack

    Never compromise security for convenience, choose both. Grow your team seamlessly by automating identity management for your web, mobile and legacy apps. Take efficiency to another level by integrating day-to-day applications with our identity management platform and enable employees, contractors and customers to work together seamlessly. Take advantage of pre-built integrations, Single Sign-On and one-click user provisioning and allow your team to conveniently sign in to any application passwordless with multi-factor authentication. Your workforce deserves easy access to your applications — whether they are cloud-based, custom-built or even integrated on-premise. High standards in identity management should not be limited to Fortune 500s — gain access to best-in-class security and accessibility features that protect your business, boost your efficiency and save valuable time. Whenever an employee tries to access a cloud app his login is now compliant with our access policies.
    Starting Price: $3 per user per month
  • 4
    Centreon

    Centreon

    Centreon

    Centreon is a global provider of business-aware IT monitoring for always-on operations and performance excellence. The company’s holistic, AIOps-ready platform is designed for today’s complex, distributed hybrid cloud infrastructures. Centreon monitors the complete IT Infrastructure from Cloud-to-Edge for a clear and comprehensive view. Centreon removes blind spots, monitoring all equipment, middleware and applications that are part of modern IT workflows, from on-premise legacy assets to private and public cloud environments, all the way to the edge of the network, where smart devices and customers combine to create business value. Centreon is constantly current, able to support the most dynamic environments. With auto-discovery capabilities it can keep track of Software-Defined Network (SDN) elements, AWS or Azure cloud assets, Wi-Fi access points or any other component of today’s agile IT infrastructure.
  • 5
    Datto RMM

    Datto RMM

    Datto

    Datto RMM is a secure, reliable and modern cloud-based remote monitoring and management platform that gives MSPs the ability to securely and reliably manage their customers IT infrastructures. Built to remove complexity, costs, and risks, it includes powerful automation and monitoring tools such as ransomware detection, patch management, and remote control takeover to help MSPs proactively prevent IT issues, respond faster to incidents, and deliver a better service to their customers. Protect and quickly restore PCs with reliable, image-based, all-in-one cloud backup and disaster recovery. Cloud-to-cloud backup and fast recovery for critical data in Microsoft 365 and G Suite applications. Fast and easy file and folder backup and restore with support for Windows and Mac. Safe file sync and share with a centrally managed, secure collaboration platform. Protect and quickly restore servers with reliable, image-based, all-in-one business continuity and disaster recovery.
  • 6
    Lift AI

    Lift AI

    Lift AI

    98% of website traffic is anonymous. Lift AI predicts the 'buyer intent' of those visitors in real-time, so you can engage and convert them in chat before they leave the site. Lift AI's sophisticated AI model predicts every visitors' likelihood to buy or convert (known as 'buyer intent') with incredible accuracy, even if those visitors are completely anonymous. Lift AI automatically surfaces web visitors with a high buyer intent so your sales team can prioritize them through live chat (before visitors leave the site), while low buyer intent visitors are engaged with chatbots. Combine Lift AI's buyer intent score with your other intelligence tools to maximize their efficacy. For example, a high buyer intent visitor that is also a target account may be further prioritized in chat or follow-up. On average, Lift AI users get 9x more conversions on their website from chat to pipeline.
  • 7
    Cyware

    Cyware

    Cyware

    Cyware is the only company building Virtual Cyber Fusion Centers enabling end-to-end threat intelligence automation, sharing, and unprecedented threat response for organizations globally. Cyware offers a full-stack of innovative cyber fusion solutions for all-source strategic, tactical, technical and operational threat intelligence sharing & threat response automation. Cyware’s Enterprise Solutions are designed to promote secure collaboration, inculcate cyber resilience, enhance threat visibility and deliver needed control by providing organizations with automated context-rich analysis of threats for proactive response without losing the element of human judgment. Cyware solutions are pushing the boundaries of current security paradigms by utilizing advances in Machine Learning, Artificial Intelligence, Security Automation & Orchestration technologies to empower enterprises in adapting to the evolving threat landscape.
  • 8
    Datto Workplace
    Datto Workplace provides enterprise-grade file sync and share to managed service providers without putting security and efficiency at risk. Built for business, Datto Workplace provides a seamless collaboration platform to clients for every file from every device. A single, simple, scalable solution tailored for every role -- from technicians to sales, to executive management. Configure settings based on individual needs and streamline implementation to suit your business. MSPs can also schedule reports on system activity, enable monitoring, and on-demand auditing of usage. Workplace users can securely collaborate on any device, leveraging integrations with core business tools such as Microsoft, G Suite, Active Directory, and Single Sign-On (SSO). With more than 99.99% uptime, and HIPAA, GDPR, and SOC 2 compliance and data encryption, clients can work securely with Datto Workplace. Datto Workplace provides the security, mobility, and control that businesses need.
  • 9
    ThreatQ

    ThreatQ

    ThreatQuotient

    Threat intelligence platform - ThreatQ, to understand and stop threats more effectively and efficiently your existing security infrastructure and people need to work smarter, not harder. ThreatQ can serve as an open and extensible threat intelligence platform that accelerates security operations through streamlined threat operations and management. The integrated, self-tuning threat library, adaptive workbench and open exchange allow you to quickly understand threats, make better decisions and accelerate detection and response. Automatically score and prioritize internal and external threat intelligence based on your parameters. Automate aggregation, operationalization and use of threat intelligence across all systems and teams. Improve effectiveness of existing infrastructure by integrating your tools, teams and workflows. Centralize threat intelligence sharing, analysis and investigation in a threat intelligence platform all teams can access.
  • 10
    Recorded Future

    Recorded Future

    Recorded Future

    Recorded Future is the world’s largest provider of intelligence for enterprise security. By combining persistent and pervasive automated data collection and analytics with human analysis, Recorded Future delivers intelligence that is timely, accurate, and actionable. In a world of ever-increasing chaos and uncertainty, Recorded Future empowers organizations with the visibility they need to identify and detect threats faster; take proactive action to disrupt adversaries; and protect their people, systems, and assets, so business can be conducted with confidence. Recorded Future is trusted by more than 1,000 businesses and government organizations around the world. The Recorded Future Security Intelligence Platform produces superior security intelligence that disrupts adversaries at scale. It combines analytics with human expertise to unite an unrivaled variety of open source, dark web, technical sources, and original research.
  • 11
    MaxPatrol

    MaxPatrol

    Positive Technologies

    MaxPatrol is made for managing vulnerabilities and compliance on corporate information systems. Penetration testing, system checks, and compliance monitoring are at the core of MaxPatrol. Together, these mechanisms give an objective picture of the security stance across IT infrastructure as well as granular insight at the department, host, and application level, precisely the information needed to quickly detect vulnerabilities and prevent attacks. MaxPatrol makes it a cinch to keep an up-to-date inventory of IT assets. View information about network resources (network addresses, OS, available network applications and services), identify hardware and software in use, and monitor the state of updates. Best of all, it sees changes to your IT infrastructure. MaxPatrol doesn't blink as new accounts and hosts appear, or as hardware and software are updated. Information about the state of infrastructure security is quietly collected and processed.
  • 12
    Airlock

    Airlock

    Airlock

    Airlock's Secure Access Hub protects applications, APIs and data from identity theft and the most common attacks on Web applications. Security meets convenience, Airlock offers your customers a customer journey without media breaks with single sign-on, social registration, comprehensive user self-services and consent management. Acting in line with the market means reacting quickly. The Airlock Secure Access Hub therefore provides all important security functions such as registration, authentication and self services. So you can concentrate all your IT resources on your business processes. The Airlock Secure Access Hub helps to meet all international compliance standards - from GDPR over PSD2, PCI-DSS, OWASP to MAS. The upstream enforcement point for access policies onto applications and services allows compliance with regulations without having to make adjustments in each individual application.
  • 13
    AriLinc

    AriLinc

    Infintrix Global

    AriLinc is an industrial IoT gateway that converts various PLC Modbus RTU and Modbus TCP into Modbus TCP, OPC UA, MQTT, AWS, and other protocols. AriLinc adopts an embedded Linux system, supports TSL, SSL encryption, provides 1 RS232/RS485 optional serial input, 1 power output, 2 Ethernet ports and 2 USB ports, and supports SIM card and SD card. The built-in 4G network or Ethernet access to the Internet has the characteristics of fast speed and low latency. The Lora Gateway S281 series are special for data acquisition via Lora technology, supports wireless sensors and a wireless RS485 serial data converter. It is widely used in agricultural greenhouses, chemical plant, electroplating plant, hospital sites and storage warehouses for real-time temperature and humidity collection/monitoring. We offer comprehensive IT solutions, customized software development, mobile application & web development along with offshore IT consultancy services.
  • 14
    LogMan.io

    LogMan.io

    TeskaLabs

    TeskaLabs Logman.io is a modern and effective tool for log management, collection, archiving, and log analysis. Scalable Log Management can be easily upgraded to the full-scale tool TeskaLabs SIEM (security information and event management). Be always one step ahead of all potential threats and achieve a total overview of the security of your IT infrastructure. Thanks to timely and clear threat detection, TeskaLabs LogMan.io protects important data and sensitive information. TeskaLabs is a cybersecurity expert and therefore all our products meet the security standards of your company. LogMan.io ensures regulatory compliance with legislation covering cyber security and GDPR. Logman.io can grow with your needs. It can be easily upgraded to TeskaLabs SIEM. You can promptly get a central essential overview of the entire IT infrastructure, a full-scale tool for threat modeling, risk management, and vulnerability scanning.
  • 15
    TeskaLabs SIEM

    TeskaLabs SIEM

    TeskaLabs

    A state-of-the-art tool for security information and event management. A security surveillance tool that allows you to automatically monitor, correlate, and evaluate security events and create reports in real-time. TeskaLabs SIEM will bring a central overview of the entire company infrastructure and early detection helps eliminate risks and their possible effects on the operation of your company. TeskaLabs SIEM will always be one step ahead of potential threats and you will gain absolute supervision. TeskaLabs is a cybersecurity expert and therefore all our products meet the security standards of your company. TeskaLabs SIEM ensures regulatory compliance with legislation covering Cyber Security, GDPR, and ISO 27001:2013. Automated real-time detection and reporting of known incidents and anomalies will allow you to quickly react and prioritize the solution to individual incidents. Time savings allow you to proactively search for potential threats.
  • Previous
  • You're on page 1
  • Next