30 Integrations with SecHard

View a list of SecHard integrations and software that integrates with SecHard below. Compare the best SecHard integrations as well as features, ratings, user reviews, and pricing of software that integrates with SecHard. Here are the current SecHard integrations in 2024:

  • 1
    Google Cloud Platform
    Google Cloud is a cloud-based service that allows you to create anything from simple websites to complex applications for businesses of all sizes. New customers get $300 in free credits to run, test, and deploy workloads. All customers can use 25+ products for free, up to monthly usage limits. Use Google's core infrastructure, data analytics & machine learning. Secure and fully featured for all enterprises. Tap into big data to find answers faster and build better products. Grow from prototype to production to planet-scale, without having to think about capacity, reliability or performance. From virtual machines with proven price/performance advantages to a fully managed app development platform. Scalable, resilient, high performance object storage and databases for your applications. State-of-the-art software-defined networking products on Google’s private fiber network. Fully managed data warehousing, batch and stream processing, data exploration, Hadoop/Spark, and messaging.
    Leader badge
    Starting Price: Free ($300 in free credits)
    View Software
    Visit Website
  • 2
    Windows 10

    Windows 10

    Microsoft

    To get started, you will first need to have a license to install Windows 10. You can then download and run the media creation tool. For more information on how to use the tool, see the instructions below. If you are installing Windows 10 on a PC running Windows XP or Windows Vista, or if you need to create installation media to install Windows 10 on a different PC, see Using the tool to create installation media (USB flash drive, DVD, or ISO file) to install Windows 10 on a different PC section below. You have a license to install Windows 10 and are upgrading this PC from Windows 7 or Windows 8.1.
  • 3
    Ubuntu

    Ubuntu

    Ubuntu

    Better security. More packages. Newer tools. All your open source, from cloud to edge. Secure your open source apps. Patch the full stack, from kernel to library and applications, for CVE compliance. Governments and auditors certify Ubuntu for FedRAMP, FISMA and HITECH. Rethink what’s possible with Linux and open source. Companies engage Canonical to drive down open source operating costs. Automate everything: multi-cloud operations, bare metal provisioning, edge clusters and IoT. Whether you’re a mobile app developer, an engineering manager, a music or video editor or a financial analyst with large-scale models to run — in fact, anyone in need of a powerful machine for your work — Ubuntu is the ideal platform. Ubuntu is used by thousands of development teams around the world because of its versatility, reliability, constantly updated features, and extensive developer libraries.
  • 4
    Debian

    Debian

    Debian

    Debian is distributed freely over Internet. This page has options for installing Debian Stable. If you are interested in Testing or Unstable, visit our releases page. Many of the vendors sell the distribution for less than US$5 plus shipping (check their web page to see if they ship internationally). You can try Debian by booting a live system from a CD, DVD or USB key without installing any files to the computer. When you are ready, you can run the included installer (starting from Debian 10 Buster, this is the end-user-friendly Calamares Installer). Provided the images meet your size, language, and package selection requirements, this method may be suitable for you. Read more information about this method to help you decide.
  • 5
    Microsoft 365

    Microsoft 365

    Microsoft

    Introducing Microsoft 365 (formerly Microsoft Office 365). Be more creative and achieve what matters with Outlook, OneDrive, Word, Excel, PowerPoint, OneNote, SharePoint, Microsoft Teams, Yammer, and more. With a Microsoft 365 subscription, you get the latest Office apps—both the desktop and the online versions—and updates when they happen. On your desktop, on your tablet, and on your phone.* Microsoft 365 + your device + the Internet = productivity wherever you are. OneDrive makes the work you do available to you from anywhere—and to others when you collaborate or share. Help at every turn. Email, chat, or call and talk to a real live person. Get Office today—choose the option that's right for you
    Leader badge
    Starting Price: $5 per user per month
  • 6
    Kubernetes

    Kubernetes

    Kubernetes

    Kubernetes (K8s) is an open-source system for automating deployment, scaling, and management of containerized applications. It groups containers that make up an application into logical units for easy management and discovery. Kubernetes builds upon 15 years of experience of running production workloads at Google, combined with best-of-breed ideas and practices from the community. Designed on the same principles that allows Google to run billions of containers a week, Kubernetes can scale without increasing your ops team. Whether testing locally or running a global enterprise, Kubernetes flexibility grows with you to deliver your applications consistently and easily no matter how complex your need is. Kubernetes is open source giving you the freedom to take advantage of on-premises, hybrid, or public cloud infrastructure, letting you effortlessly move workloads to where it matters to you.
    Starting Price: Free
  • 7
    MongoDB

    MongoDB

    MongoDB

    MongoDB is a general purpose, document-based, distributed database built for modern application developers and for the cloud era. No database is more productive to use. Ship and iterate 3–5x faster with our flexible document data model and a unified query interface for any use case. Whether it’s your first customer or 20 million users around the world, meet your performance SLAs in any environment. Easily ensure high availability, protect data integrity, and meet the security and compliance standards for your mission-critical workloads. An integrated suite of cloud database services that allow you to address a wide variety of use cases, from transactional to analytical, from search to data visualizations. Launch secure mobile apps with native, edge-to-cloud sync and automatic conflict resolution. Run MongoDB anywhere, from your laptop to your data center.
    Leader badge
    Starting Price: Free
  • 8
    Mozilla Firefox
    Firefox is a browser created by Mozilla, a product designed to protect your privacy.
  • 9
    Amazon Web Services (AWS)
    Whether you're looking for compute power, database storage, content delivery, or other functionality, AWS has the services to help you build sophisticated applications with increased flexibility, scalability and reliability. Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud platform, offering over 175 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups, largest enterprises, and leading government agencies—are using AWS to lower costs, become more agile, and innovate faster. AWS has significantly more services, and more features within those services, than any other cloud provider–from infrastructure technologies like compute, storage, and databases–to emerging technologies, such as machine learning and artificial intelligence, data lakes and analytics, and Internet of Things. This makes it faster, easier, and more cost effective to move your existing applications to the cloud.
  • 10
    Apache HTTP Server

    Apache HTTP Server

    Apache Software Foundation

    The Apache HTTP Server Project is an effort to develop and maintain an open-source HTTP server for modern operating systems including UNIX and Windows. The goal of this project is to provide a secure, efficient and extensible server that provides HTTP services in sync with the current HTTP standards.
  • 11
    Dell Technologies Cloud

    Dell Technologies Cloud

    Dell Technologies

    Calculate the cost of moving workloads between on-premises and public cloud, including AWS, Azure and Google Cloud. Live Optics is free, online software that collects, visualizes and shares data to help you effectively plan workload placement. Because not every workload works best in every cloud, simplifying control is critical. Our cloud portfolio delivers everything you need to ensure the security, performance, ease of management and agility your multi-cloud environment demands. Dell Technologies Cloud, powered by VMware, delivers consistent management across private, public and edge cloud infrastructure — so you can choose the best environment for each application and use case. Establish a multi-cloud strategy fast with modernized applications that reinforce customer value.
  • 12
    NGINX
    NGINX Open Source: The open source web server that powers more than 400 million websites. NGINX Plus is a software load balancer, web server, and content cache built on top of open source NGINX. Use NGINX Plus instead of your hardware load balancer and get the freedom to innovate without being constrained by infrastructure. Save more than 80% compared to hardware ADCs, without sacrificing performance or functionality. Deploy anywhere: public cloud, private cloud, bare metal, virtual machines, and containers. Save time by performing common tasks through the built‑in NGINX Plus API. From NetOps to DevOps, modern app teams need a self‑service, API‑driven platform that integrates easily into CI/CD workflows to accelerate app deployment – whether your app has a hybrid or microservices architecture – and makes app lifecycle management easier.
  • 13
    Active Directory
    Active Directory stores information about objects on the network and makes this information easy for administrators and users to find and use. Active Directory uses a structured data store as the basis for a logical, hierarchical organization of directory information. This data store, also known as the directory, contains information about Active Directory objects. These objects typically include shared resources such as servers, volumes, printers, and the network user and computer accounts. For more information about the Active Directory data store, see Directory data store. Security is integrated with Active Directory through logon authentication and access control to objects in the directory. With a single network logon, administrators can manage directory data and organization throughout their network, and authorized network users can access resources anywhere on the network. Policy-based administration eases the management of even the most complex network.
    Starting Price: $1 per user per month
  • 14
    Syslog-ng

    Syslog-ng

    Balabit

    Syslog-ng is a reliable, scalable, secure central log management solution. With syslog-ng, IT teams can collect and centralize log data in regards to user activity, performance metrics, network traffic, and more. This helps remove data silos and lets teams gain full-stack visibility in to their log data. Syslog-ng features secure transfer and storage of data, scalable architecture, flexible log routing, real time transformation, and more. The platform is available in open source and enterprise editions.
  • 15
    Avaya Cloud Office
    Avaya Cloud Office by RingCentral is a cloud phone system that works where and how you work. You will have everything you need always handy on any device, in any location. It simplified the way your business communicates. Call, chat, meet, and collaborate no matter where your employees might be. Stay on task and on schedule with file sharing, task management, and virtual team rooms. Bring together 100+ business integrations, like Google Drive and Salesforce, to customize a true cloud unified communications experience. Avaya Cloud Office gives your employees and customers the features and options you want, all in one app.
    Starting Price: $19.99 per user/per month
  • 16
    F5 BIG-IP Advanced WAF
    Advanced Web Application Firewall (WAF) protect your apps with behavioral analytics, proactive bot defense, and application-layer encryption of sensitive data. Use the ROI Estimator from F5 and Forrester to find out how Advanced WAF can improve your security posture and save you money. The F5 F5 BIG-IP Advanced WAF provides a powerful set of security features that will keep your Web Applications safe from attack. Many WAFs offer a basic level of protection from attack at the higher layers of the OSI stack, but the F5 Advanced WAF takes things even further and offers some serious security features like Anti Bot Mobile SDK, Credential Stuffing threat feeds, Proactive Bot Defense, and Datasafe to name a few. Protect your apps, APIs, and data against the most prevalent attacks such as zero-day vulnerabilities, app-layer DoS attacks, threat campaigns, application takeover, and bots.
  • 17
    Juniper Identity Management Service
    Protecting access to corporate data is one of your top security priorities. Insiders with direct access to corporate data can circumvent weak user controls. To keep your corporate resources safe, user access must be governed and enforced across the enterprise, mobile, and the cloud. Juniper Identity Management Service strengthens enterprise security that authenticates and restricts user access. It’s the first line of defense in preventing corporate breaches and safeguarding corporate assets. Employees are identified and assigned corporate roles that determine what applications and data they are permitted to access. Juniper Identity Management Service seamlessly integrates with SRX Series next-generation firewalls, enabling security teams to match application activity and security policies to user roles. It can then generate detailed user-metrics and audit reports for detailed reporting.
  • 18
    Check Point Application Control
    Application Control provides the industry’s strongest application security and identity control to organizations of all sizes. Integrated into the Check Point Next Generation Firewalls (NGFW), Application Control enables businesses to easily create granular policies based on users or groups, to identify, block or limit the usage of applications and widgets. Applications are classified into categories, based on diverse criteria such as application type, security risk level, resource usage, productivity implications, and more. Granular control of social networks, applications, and application features, identify, allow, block, or limit the usage. Leverages the world’s largest application library, grouping apps into categories to simplify policy creation and protect against threats and malware. Integrated into Next Generation Firewalls enables consolidation of security controls decreasing costs. Only the right users and devices can access your protected assets.
  • 19
    Oracle Cloud Infrastructure
    Oracle Cloud Infrastructure supports traditional workloads and delivers modern cloud development tools. It is architected to detect and defend against modern threats, so you can innovate more. Combine low cost with high performance to lower your TCO. Oracle Cloud is a Generation 2 enterprise cloud that delivers powerful compute and networking performance and includes a comprehensive portfolio of infrastructure and platform cloud services. Built from the ground up to meet the needs of mission-critical applications, Oracle Cloud supports all legacy workloads while delivering modern cloud development tools, enabling enterprises to bring their past forward as they build their future. Our Generation 2 Cloud is the only one built to run Oracle Autonomous Database, the industry's first and only self-driving database. Oracle Cloud offers a comprehensive cloud computing portfolio, from application development and business analytics to data management, integration, security, AI & blockchain.
  • 20
    Sophos Cloud Native Security
    Complete multi-cloud security coverage across environments, workloads, and identities. Boost efficiency with a single integrated cloud security platform. Sophos Cloud Native Security unifies security tools across workloads, cloud environments, and entitlements management. Integrated with SIEM, collaboration, workflow, and DevOps tools to increase agility across an organization. Your cloud environments need to be tough, hard to compromise and quick to recover. Our comprehensive and intuitive security and remediation tools can be managed by your security teams, or via Managed Services to fast-track your cyber resilience to best meet the security incidents of today. Leverage our extended detection and response (XDR) tools to identify and stop malware, exploits, misconfigurations, and anomalous behaviors. Hunt for threats, prioritize detections, and automatically connect security events to optimize investigation and response.
  • 21
    VMware Cloud
    Build, run, manage, connect and protect all of your apps on any cloud. The Multi-Cloud solutions from VMware deliver a cloud operating model for all applications. Support your digital business initiatives with the world’s most proven and widely deployed cloud infrastructure. Leverage the same skills you use in the data center, while tapping into the depth and breadth of six global hyperscale public cloud providers and 4,000+ VMware Cloud Provider Partners. With hybrid cloud built on VMware Cloud Foundation, you get consistent infrastructure and operations for new and existing cloud native applications, from data center to cloud to edge. This consistency improves agility and reduces complexity, cost and risk. Build, run and manage modern apps on any cloud, meeting diverse needs with on-premises and public cloud resources. Manage both container-based workloads and traditional VM-based workloads on a single platform.
  • 22
    Fortinet SD-WAN
    Fortinet is the fastest-growing SD-WAN provider in market share by revenue. Fortinet SD-WAN delivers advanced routing, self-healing capabilities, and flexible security using network firewall or SASE-based cloud-delivered services—all in a single, integrated solution. Fortinet Secure SDWAN (software-defined wide-area network) solution enables enterprises to transform and secure all WAN edges. Leveraging the Security-driven Networking approach that uses one operating system and one centralized management console, enterprises realize superior user experience, enhanced security posture effectiveness with converged networking and security, and achieve operational continuity and efficiency. Fortinet Secure SD-WAN is designed to address modern complexity and threat exposure to support customers critical business needs. It is designed to evolve to future-proof and protect investments as customers embrace a digital-first journey and support work-from-anywhere.
  • 23
    Aruba Cloud

    Aruba Cloud

    Aruba Cloud

    Cloud made simple and made-to-measure. IaaS and PaaS solutions for your cloud computing applications. A service that allows you to create and set up auto-backups, ideal solution to manage and protect your backups. With our Object Storage solution, based on the IaaS model, you can create and manage storage space to store all the data that you want. Domain Center is a web service offered by Aruba Cloud that allows users to purchase and transfer domain names and manage DNS. Monitor all your websites, Cloud Servers, dedicated servers, whether they reside in Aruba Cloud data centers, or are hosted by other providers. In cases of failures or errors detected in the monitored resource or service, Cloud Monitoring will automatically and immediately send you a notification via email or SMS, so you can always know the progress of your infrastructure in real time and if need be, take action as soon as possible.
  • 24
    Huawei Cloud
    HUAWEI CLOUD is a leading cloud service provider, which brings Huawei's 30-plus years of expertise together in ICT infrastructure products and solutions. We are committed to providing reliable, secure, and cost-effective cloud services to empower applications, harness the power of data, and help organizations of all sizes grow in today's intelligent world. HUAWEI CLOUD is also committed to bringing affordable, effective, and reliable cloud and AI services through technological innovation. By the end of 2019, HUAWEI CLOUD had launched 210+ cloud services and 210+ solutions. News agencies, social media platforms, law enforcement, automobile manufacturers, gene sequencing organizations, financial institutions, and a long list of other industry customers are all benefiting in significant ways from HUAWEI CLOUD. 3500 applications were added to the HUAWEI CLOUD marketplace with offerings from more than 13000 business partners.
  • 25
    Palo Alto Networks Threat Prevention
    Organizations face a barrage of attacks by threat actors driven by a variety of motives, including profit, ideology/hacktivism, or even organizational discontent. Attackers’ tactics continue to evolve, and traditional IPS solutions have not been able to keep pace and effectively protect organizations. To prevent intrusions, malware and command-and-control at each stage of its lifecycle and shut down advanced threats, Threat Prevention accelerates the security capabilities of our next-generation firewalls, protecting the network from advanced threats by identifying and scanning all traffic, applications, users, and content, across all ports and protocols. Daily threat intelligence is automatically curated, delivered to the NGFW and implemented by Threat Prevention to stop all threats. Reduce resources, complexity and latency by automatically blocking known malware, vulnerability exploits, and C2 using existing hardware and security teams.
  • 26
    openSUSE Leap
    A brand new way of building openSUSE and a new type of a hybrid Linux distribution. Leap uses source from SUSE Linux Enterprise (SLE), which gives Leap a level of stability unmatched by other Linux distributions, and combines that with community developments to give users, developers and sysadmins the best stable Linux experience available. If you’re already running openSUSE you can upgrade by booting from the DVD/USB and choosing upgrade, or carry out an ‘Online Upgrade’ in a few commands. Leap is a classic stable distribution approach, one release each year and in between security and bugfixes. This makes Leap very attractive as server operating system, but as well for Desktops since it requires little maintenance effort. openSUSE Leap is compatible with SUSE Linux Enterprise; this gives Leap a level of stability unmatched by other Linux distributions and provides users the ability to migrate to an enterprise offering.
  • 27
    CentOS

    CentOS

    CentOS

    CentOS Linux is a community-supported distribution derived from sources freely provided to the public on Red Hat or CentOS git for Red Hat Enterprise Linux (RHEL). As such, CentOS Linux aims to be functionally compatible with RHEL. The CentOS Project mainly changes packages to remove upstream vendor branding and artwork. CentOS Linux is no-cost and free to redistribute. Each CentOS version is maintained until the equivalent RHEL version goes out of general support. A new CentOS version is made available once a new RHEL version is rebuilt - approximately every 6-12 months for minor point releases and several years for major version bumps. The length of time the rebuild takes varies from weeks for point releases to months for major version bumps. This results in a secure, low-maintenance, reliable, predictable and reproducible Linux environment.
  • 28
    Oracle Linux
    An open and complete operating environment, Oracle Linux delivers virtualization, management, and cloud native computing tools, along with the operating system, in a single support offering. Oracle Linux is 100% application binary compatible with Red Hat Enterprise Linux. Search the catalog to find information about independent software vendors (ISVs) who have certified their applications to run on Oracle Linux and Virtualization. Applications certified on Oracle Linux run wherever Linux runs—on-premises, in Oracle Cloud Infrastructure, and in other clouds. Join us in this Oracle Tux Tech Talk webinar on July 28 and learn how to benchmark for performance, discover the benefits of the UEK, and understand which workloads see improvement from UEK.
  • 29
    Cisco CX Cloud
    Cisco CX Cloud is a one-stop destination where you can access Cisco and our partners' expertise, best practices, and insights. It is a simple, unified digital experience that can help you scale at the pace you need with a guided path to success. Lifecycle journey is guided by use cases, with a checklist and simple steps to speed your path to business value. Contextual learning to gain more knowledge and empower your workforce. Actionable telemetry to connect customers, partners, and Cisco with AI and ML to unlock unique insights. CX Cloud is the digital platform for Success Tracks. Its use case driven guidance can help you achieve your business outcomes with speed and scale. Gaining new visibility into vast network infrastructure to boost security and performance. Transforming an enterprise network to enable global gummi bear innovation and growth. Helping a partner lead the way to deliver transformation client outcomes.
  • 30
    Red Hat Cloud Suite
    Red Hat® Cloud Suite provides a container-based application development platform, built on massively scalable cloud infrastructure, all managed through a common management framework. Customers can move existing workloads to scale-out cloud infrastructure and accelerate new cloud-based services for private cloud and application development. With Red Hat Cloud Suite, the operations team can deliver public cloud-like services to developers and the business while maintaining control and visibility. Key product advantages include: Integrated components — Tightly integrated, fully supported components that act in concert to provide an open hybrid cloud. Unified management — A single management framework across infrastructure and application development layers, plus complete operation and life cycle management with proactive risk mitigation. Full-featured application development and containers — Flexible container-based application development abilities via OpenShift Enterprise
  • Previous
  • You're on page 1
  • Next