5 Integrations with SOCRadar Extended Threat Intelligence

View a list of SOCRadar Extended Threat Intelligence integrations and software that integrates with SOCRadar Extended Threat Intelligence below. Compare the best SOCRadar Extended Threat Intelligence integrations as well as features, ratings, user reviews, and pricing of software that integrates with SOCRadar Extended Threat Intelligence. Here are the current SOCRadar Extended Threat Intelligence integrations in 2024:

  • 1
    Jira Service Management
    Jira Service Management (formerly Jira Service Desk) empowers Dev and Ops teams to collaborate at high-velocity, so they can respond to business changes and deliver great customer and employee service experiences fast. Tune Jira Service Management to meet your unique needs. Empower every team, from IT to HR to legal, to set up a service desk quickly and continuously adapt at scale. Deliver great service experiences fast - without the complexity of traditional ITSM solutions. Track work across the enterprise through an open, collaborative platform. Link issues across Jira and ingest data from other software development tools, so your IT support and operations teams have richer contextual information to rapidly respond to requests, incidents, and changes. Deliver more customer impact while managing risk. Accelerate critical development work, eliminate toil, and deploy changes with ease, with a complete audit trail for every change.
    Starting Price: $20 per user per month
  • 2
    IBM Cloud
    IBM Cloud® capabilities enable business agility and resiliency. Explore the platform that gives you 2.5x value. Designed for industry, security and the freedom to build and run anywhere. Business workflow transformation with automation and AI. Strong technology partner ecosystem that delivers value for industry needs. Industry and business domain expertise and solutions. Automated and auditable processes. Unique capabilities for the highest levels of cloud security and monitoring. Consistent security and controls posture across all applications. Containerized capabilities for DevOps, automation, data and security. Ease of integration and a consistent application development lifecycle. Advanced technologies including IBM Watson®, analytics, IoT, and edge.
  • 3
    OpenText Extended ECM
    Bridge information silos, improve processes, and strengthen governance. OpenText™ Extended ECM is an enterprise content management solution that securely governs the information lifecycle by integrating with leading enterprise applications, such as SAP®, Microsoft® 365, Salesforce, and SAP SuccessFactors®. Bringing content and processes together, Extended ECM provides access to information when and where it’s needed, improves decision-making, and drives operational effectiveness. Build bridges between the digital workplace and applications that power ERP, HCM, BPM, and CRM business processes to drive operational excellence. Address the most complex industry or line-of-business use cases with a fully integrated portfolio of information management solutions. Leverage automated, defensible governance—from document generation and capture to archiving and disposal—that extends to applications, such as SAP®, Salesforce, and Microsoft®.
  • 4
    Splunk Cloud
    Turn data into answers with Splunk deployed and managed securely, reliably and scalably as a service. With your IT backend managed by our Splunk experts, you can focus on acting on your data. Splunk-provisioned and managed infrastructure delivers a turnkey, cloud-based data analytics solution. Go live in as little as two days. Managed software upgrades ensure you always have the latest functionality. Tap into the value of your data in days with fewer requirements to turn data into action. Splunk Cloud meets the FedRAMP security standards, and helps U.S. federal agencies and their partners drive confident decisions and decisive actions at mission speeds. Drive productivity and contextual insights with Splunk’s mobile apps, augmented reality and natural language capabilities. Extend the utility of your Splunk solutions to any location with a simple phrase or the tap of a finger. From infrastructure management to data compliance, Splunk Cloud is built to scale.
  • 5
    Trellix Complete Data Protection
    Comprehensive endpoint encryption. Available in two suites, Trellix Complete Data Protection keeps data safe with enterprise-grade drive encryption, access control, and user behavior monitoring. Manage Apple FileVault on macOS and Microsoft BitLocker on Windows PCs via Trellix ePolicy Orchestrator. Secure network file shares and protect removable media such as USB flash drives and data in cloud storage services. Trellix Complete Data Protection—Advanced features data loss prevention, full-disk encryption, device control, and protection for cloud storage. Render data unreadable in the event of device loss or theft. Our enterprise-grade endpoint encryption solution is FIPS 140-2 and Common Criteria EAL2+ certified. Control the specific file types and folders to encrypt or block. Encrypt files to cloud storage services such as Box, Dropbox, Google Drive, and Microsoft OneDrive.
  • Previous
  • You're on page 1
  • Next