5 Integrations with VideoWatch

View a list of VideoWatch integrations and software that integrates with VideoWatch below. Compare the best VideoWatch integrations as well as features, ratings, user reviews, and pricing of software that integrates with VideoWatch. Here are the current VideoWatch integrations in 2024:

  • 1
    Tableau

    Tableau

    Tableau

    Gain, generate, and analyze business data and meaningful insights with Tableau, an integrated business intelligence (BI) and analytics solution. With Tableau, users are able to collect data from different sources such as spreadsheets, SQL databases, Salesforce, and cloud apps. Tableau provides users with real-time visual analytics and interactive dashboard that enables them to slice and dice datasets for making relevant insights and look for new opportunities. Tableau also allows users to customize the platform to serve different kinds of industry verticals like banking, communication, and more.
  • 2
    Okta

    Okta

    Okta

    One platform, infinite ways to connect to your employees and customers. Build auth into any app. Create secure, delightful experiences quickly by offloading customer identity management to Okta. Get security, scalability, reliability, and flexibility by combining Okta’s Customer Identity products to build the stack you need. Protect and enable your employees, contractors, and partners. Secure your employees—wherever they are—with Okta’s workforce identity solutions. Get the tools to secure and automate cloud journeys, with full support for hybrid environments along the way. Companies around the world trust Okta with their workforce identity.
  • 3
    Active Directory
    Active Directory stores information about objects on the network and makes this information easy for administrators and users to find and use. Active Directory uses a structured data store as the basis for a logical, hierarchical organization of directory information. This data store, also known as the directory, contains information about Active Directory objects. These objects typically include shared resources such as servers, volumes, printers, and the network user and computer accounts. For more information about the Active Directory data store, see Directory data store. Security is integrated with Active Directory through logon authentication and access control to objects in the directory. With a single network logon, administrators can manage directory data and organization throughout their network, and authorized network users can access resources anywhere on the network. Policy-based administration eases the management of even the most complex network.
    Starting Price: $1 per user per month
  • 4
    Milestone Analytics
    You cannot change what you do not measure. Milestone Analytics helps you maximize your marketing strategy and investment. Measure your digital marketing across all your marketing channels, including your website, mobile, social, and paid search. Compare locations and connect to third-party data like your brand reports. Milestone Analytics is your total digital marketing performance hub and one of the only business intelligence tools you will ever need for your business. Take the chore out of digital marketing analytics. Move beyond website analysis with Milestone Analytics, which puts all critical KPIs at your fingertips, channel distribution, social performance, digital marketing campaigns, reviews and more. All your marketing metrics rolled up and presented in beautiful intuitive charts. Single-source performance view across all marketing channels. Integrate data from your website and marketing distribution channels.
  • 5
    HID IdenTrust
    Comprehensive lifecycle management of every certificate in your network for on-premise or cloud-based PKI deployments. Easily migrate from existing certificate authority with policy-based automated issuance, renewal and revocation, eliminating manual processes and related errors. Enterprises increasingly rely on public key infrastructure (PKI) to secure machines, devices, and human access using keys and digital certificates. In partnership with Keyfactor, HID IdenTrust offers a way to simplify PKI and automate certificate lifecycle management at scale. HID IdenTrust delivers cloud-based managed PKI to issue public, private or U.S. Government interoperable (FBCA) digital certificates to secure websites, network and IoT devices, and workforce identities. Discover every certificate across network and cloud environments with real-time inventory of public and private CAs, distributed SSL/TLS discovery tools, and direct integration with key and certificate stores.
  • Previous
  • You're on page 1
  • Next