2 Integrations with Sprocket Security

View a list of Sprocket Security integrations and software that integrates with Sprocket Security below. Compare the best Sprocket Security integrations as well as features, ratings, user reviews, and pricing of software that integrates with Sprocket Security. Here are the current Sprocket Security integrations in 2024:

  • 1
    Jira Work Management
    Business project management software. See all project information at a glance with Jira Work Management (formerly Jira Core). Manage your projects and keep your team organized. Managing projects and tasks in Jira Work Management starts with a workflow. Workflows define your process and enable your team to track tasks. Jira Work Management Cloud instances also have boards that allow you to visualize your workflows and drag and drop tasks from to-do to done. Currently available in cloud offering only. Task management is easier with statuses, comments, and attachments in one place. Everyone knows a project's details at a glance without having to email or set up a meeting. Plus, with notifications you'll know when your attention is needed. How many tasks are still in progress? Which team member has too much on their plate? Using Jira Work Management, you can follow the status of your team's projects in different ways: with a quick overview, customized dashboards, and more.
    Starting Price: $5 per user per month
  • 2
    MITRE ATT&CK

    MITRE ATT&CK

    MITRE ATT&CK

    MITRE ATT&CK® is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. The ATT&CK knowledge base is used as a foundation for the development of specific threat models and methodologies in the private sector, in government, and in the cybersecurity product and service community. With the creation of ATT&CK, MITRE is fulfilling its mission to solve problems for a safer world — by bringing communities together to develop more effective cybersecurity. ATT&CK is open and available to any person or organization for use at no charge. Adversaries may execute active reconnaissance scans to gather information that can be used during targeting. Active scans are those where the adversary probes victim infrastructure via network traffic, as opposed to other forms of reconnaissance that do not involve direct interaction.
  • Previous
  • You're on page 1
  • Next