7 Integrations with ServiceNav

View a list of ServiceNav integrations and software that integrates with ServiceNav below. Compare the best ServiceNav integrations as well as features, ratings, user reviews, and pricing of software that integrates with ServiceNav. Here are the current ServiceNav integrations in 2026:

  • 1
    GLPI

    GLPI

    TECLIB

    GLPI is an incredible Service Management software based on open source technologies. It helps you plan and manage IT changes in an easy way, solve problems efficiently, automate your business processes and gain control over your IT infrastructure. Key features of GLPI: 1. Service Desk 2. Asset management and automatic inventory 3. Rationality for data quality control 4. Administrative and financial management of assets 5. Software inventory and licences management 6. Knowledge and frequently asked questions 7. Statistics and reports 8. Profound integration 9. Android-based devices inventory
    Starting Price: €19/month/user
  • 2
    iTop

    iTop

    Combodo

    If you're looking for a reliable, flexible, and cost-effective way to manage your IT services easily, iTop is the comprehensive solution designed with your needs in mind. Whether you’re an infrastructure manager handling complex systems, a service support leader striving for customer satisfaction, or a decision-maker focused on ROI and compliance, iTop adapts to your processes to simplify your tasks, streamline operations, and enhance service quality. iTop is an open-source, web-based ITSM and CMDB platform that aligns with ITIL best practices, offering flexibility for adapting to diverse organizational needs. Originally developed as an open-source project, iTop has continually evolved to address the challenges of modern IT management. With iTop, you get a solution that scales with your growth, providing tools to tackle your most pressing IT challenges while maintaining service continuity and improving team productivity.
    Starting Price: $0
  • 3
    ThreatSync

    ThreatSync

    WatchGuard

    From distributed enterprises with 10 branch offices to small and midsize businesses (SMBs) with employees working outside of the network, it can be a struggle to manage security consistently and cohesively across your organization. It is critical for SMBs and distributed enterprise organizations to not only have visibility into both their network and endpoint event data, but to be able to quickly and efficiently leverage actionable insight to remove threats. ThreatSync, a critical component of TDR, collects event data from the WatchGuard Firebox, Host Sensor and enterprise-grade threat intelligence feeds, analyzes this data using a proprietary algorithm, and assigns a comprehensive threat score and rank. This powerful correlation engine enables cloud-based threat prioritization to empower IT team to quickly and confidently respond to threats. Collects and correlates threat event data from the Firebox and Host Sensor.
  • 4
    Ekara

    Ekara

    ip-label

    Ekara is an all-in-one solution unique to the application monitoring market. Fully hybrid, Ekara can monitor any and all existing applications (web, mobile, business, thick-client, Citrix, voice, etc.) to help improve their availability and performance in your environment (intranet and internet). Its unified interface and compatibility with every type of technology make it an indispensable tool for your business and digital teams. Ekara is disruptive technology, a single product that brings together all the features of real-user monitoring and synthetic monitoring, covering all internet and intranet environments. All that in a one product! Ekara is a powerful tool that can monitor all of your applications from desktops and laptops, but also from real smartphones (Android and iOS). It can monitor any and all existing applications like web, business apps, thick client, Citrix, etc.
  • 5
    DNSWatch

    DNSWatch

    WatchGuard

    WatchGuard DNSWatch is a Cloud-based service adding DNS-level filtering to detect and block potentially dangerous connections and protect networks and employees from damaging attacks. WatchGuard analysts triage any critical alerts, following up with an easy-to-understand accounting that includes detailed insights about the potential infection. When the attack uses phishing, and an employee clicks the link, DNSWatch automatically redirects them away from the malicious site and offers resources that reinforce phishing education. Hackers rely on DNS to execute attacks on unsuspecting victims, so careful examination of DNS requests is a great way to find and ultimately intercept attacks! DNSWatch brings DNS-level filtering into our Total Security Suite, providing an added layer of security to stop malware infections. Unwitting attempts to connect to known malicious DNS addresses by your users are automatically blocked, and the user is seamlessly redirected to a safe landing page.
  • 6
    3rdRisk

    3rdRisk

    3rdRisk

    Whether it concerns cyber, sustainability, compliance, or continuity risks, your supplier (third-party) relationships are a growing area of concern. The occurrence and impact of third-party incidents and compliance obligations are increasing. Our platform serves as a secure, all-in-one hub, facilitating multidisciplinary collaboration among all internal risk disciplines, business teams, and third-party partners. It enables the seamless and secure sharing of documents and questionnaires, while also providing a collaborative space for working on shared requirements. While working on one platform, internal teams can choose what information they would like to share with other teams and external parties. Our third-party catalog connects seamlessly with your internal procurement systems and external data feeds, creating a centralized overview of your entire third-party landscape. This comprehensive view includes everything you need to know about contracts and specific characteristics.
  • 7
    Aurascape

    Aurascape

    Aurascape

    ​Aurascape is an AI-native security platform designed to help businesses innovate securely in the age of AI. It provides comprehensive visibility into AI application interactions, safeguarding against data loss and AI-driven threats. Key features include monitoring AI activities across numerous applications, protecting sensitive data to ensure compliance, defending against zero-day threats, facilitating secure deployment of AI copilots, enforcing coding assistant guardrails, and automating AI security workflows. Aurascape's mission is to enable organizations to adopt AI technologies confidently while maintaining robust security measures. AI applications interact in fundamentally new ways. Communications are dynamic, real-time, and autonomous. Prevent new threats, protect data with unprecedented precision, and keep teams productive. Monitor unsanctioned app usage, risky authentication, and unsafe data sharing.
  • Previous
  • You're on page 1
  • Next