3 Integrations with SNOW

View a list of SNOW integrations and software that integrates with SNOW below. Compare the best SNOW integrations as well as features, ratings, user reviews, and pricing of software that integrates with SNOW. Here are the current SNOW integrations in 2024:

  • 1
    Zenduty

    Zenduty

    Zenduty

    Zenduty’s end-to-end incident alerting, on-call management and response orchestration platform helps you institutionalize reliability into your production operations. Get a single pane of glass view of the health of all your production operations. Respond to incidents 90% faster and resolve them 60% faster. Deploy customized and data-driven on-call rotations to ensure 24/7 operational coverage for major incidents. Deploy industry-leading incident response procedures and resolve incidents faster through effective task delegation and collaborative triaging. Bring your playbooks automatically into your incidents. Log incident tasks and action items for productive postmortems and future incidents. Suppress noisy alerts so that your engineers and support staff are focused on the alerts that matter. Over 100+ integrations with all your APMs, log monitoring, error monitoring, server monitoring, ITSM, Support, and security services.
    Starting Price: $5 per month
  • 2
    Alemba Service Manager
    Alemba Service Manager is a highly functional, ITIL-aligned IT Service Management tool with a specific focus on request fulfilment. Backed by 25 years of heritage, Alemba Service Manager enables users to respond quickly to business demands by dramatically reducing time to request fulfilment through automated workflowed integration. Alemba’s unique pricing model takes into account different levels of participation in your organization, offering an interface for every kind of user. With a strong consultancy background, unrivalled expertise in the Service Management market, and a strong focus on customer experience, Alemba is ideally positioned to deliver a successful, end-to-end Service Management project within your organization.
  • 3
    ThreatAware

    ThreatAware

    ThreatAware

    Leveraging API feeds from your existing tools, validate your controls are correctly deployed and functioning across every cyber asset. Our clients come from all industries, from legal to finance, charities to retail. We are trusted by leading organizations to discover and protect their valuable cyber assets. Create a highly accurate device inventory by connecting to your existing systems via API. When issues arise the workflow automation engine can trigger actions via a webhook. ThreatAware provides clarity of the security control health of your cyber assets in a clear and simple design. Gain a macro view of your security control health regardless of how many controls you are monitoring. Generated from any field from a device, allows you to quickly group your cyber assets for monitoring and configuration purposes. When your monitoring systems accurately depicts your live environment, every alert is real.
  • Previous
  • You're on page 1
  • Next