3 Integrations with Perception Point
View a list of Perception Point integrations and software that integrates with Perception Point below. Compare the best Perception Point integrations as well as features, ratings, user reviews, and pricing of software that integrates with Perception Point. Here are the current Perception Point integrations in 2026:
-
1
Barracuda PST Enterprise
Barracuda
PST files are often used by end-users as personal email archives. As a result, they are typically scattered widely across end-user devices and network storage, which makes them notoriously difficult to discover and manage consistently or effectively. Thanks to improvements to Microsoft Exchange and Office 365, your users no longer need to store data locally within PST files. However, legacy PST files still contain important data that you need to bring back under control. Barracuda PST Enterprise is designed specifically to help you address this challenge. You may have many terabytes of data stored in PST files located on end-user devices and on network servers. And these files are notoriously unreliable, since they are often corrupted and easily misplaced. The costs associated with storing, securing, and managing these large files, in terms of both system resources and IT administrative overhead, are significant. -
2
Blink
Blink Ops
Blink is an ROI force multiplier for security teams and business leaders looking to quickly and easily secure a wide variety of use cases. Get full visibility and coverage of alerts across your organization and security stack. Utilize automated flows to reduce noise and false positives in alerts. Scan for attacks and proactively identify insider threats and vulnerabilities. Create automated workflows that add relevant context, streamline communications, and reduce MTTR. Take action on alerts and improve your cloud security posture with no-code automation and generative AI. Shift-left access requests, streamline approvals flows, and unblock developers while keeping your applications secure. Continuously monitor your application for SOC2, ISO, GDPR, or other compliance checks and enforce controls. -
3
Cider
Cider
Gain granular visibility with engineering technologies, systems, and processes, all the way from code to deployment. Easily connect Cider to your ecosystem and seamlessly integrate security without interrupting engineering. Optimize your CI/CD security, based on a set of prioritized risks and recommendations tailored to your environment. Cider seamlessly integrates with all systems across your CI/CD and provides you with a comprehensive and accurate analysis of all technologies, frameworks, and integrations which exist in the environment. Cider maps all intelligent connections within your environment to create end-to-end visibility over the full CI/CD journey, all the way from SCM user to an artifact deployed to production. Assess the posture of your engineering systems and processes. Analyze your environment against realistic attack scenarios and identify the controls required to reduce your CI/CD attack surface.
- Previous
- You're on page 1
- Next