Adapters List
- 41 Minutes To Read
-
Print
-
DarkLight
To aggregate and correlate asset data, Axonius securely fetches data from your IT, Security, and business solutions using pre-built integrations with hundreds of security and management solutions, known as adapters.
The table below describes each of the supported adapters. For details on connecting adapters, see the Adapters Page.
Adapter Logo | Adapter Name | Description | Solution Categories | Types of Assets Fetched |
---|---|---|---|---|
![]() |
1E Tachyon | 1E Tachyon is a remote endpoint management solution built on a single agent for speed, visibility, and control of all endpoints. | UEM | Devices |
![]() |
Absolute | Absolute specializes in software to manage and secure Windows computers and Android smartphones. | EDR/EPP, MDM/EMM | Devices |
![]() |
ADP | ADP is a provider of human resources management software and services. | HCM | Users |
![]() |
Alcide | Alcide provides cloud and Kubernetes discovery, K8s audit and compliance scanner, microservices anomaly detection and security policies management and enforcement. | Cloud Security | Devices |
![]() |
Alert Logic | Alert Logic provides vulnerability and asset visibility, endpoint protection, threat detection, incident management, and a web application firewall. | EDR/EPP | Devices |
![]() |
Alibaba Cloud | Alibaba Cloud provides cloud computing services and cloud Infrastructure as a service. | Cloud Infra | Devices |
![]() |
Amazon Web Services (AWS) | Amazon Web Services (ECS/EKS/EC2) includes the high-performance container orchestration service that supports Docker containers and containerized applications on AWS, Kubernetes Management Infrastructure across Multiple AWS Zones, as well as the EC2 instances themselves. | Cloud Infra | Devices, Users |
![]() |
Aqua Security | Aqua Security provides container and cloud native cybersecurity for teams using Docker, Kubernetes, serverless, and other cloud native technologies. | Containers | Devices |
![]() |
Arista Extensible Operating System (EOS) | Arista Extensible Operating System (EOS) is the core of Arista cloud networking solutions for next-generation data centers and cloud networks. | Networking | Devices |
![]() |
Armis | Armis is an agentless IoT security solution that lets enterprises see and control any device or network. | IoT | Devices |
![]() |
Aruba | Aruba connects to Aruba switches and routers. | Networking | Devices |
![]() |
Aruba AirWave | Aruba AirWave is a network management system for wired and wireless infrastructure and provides granular visibility into devices, users, and applications on the network. | Networking | Devices |
![]() |
Aruba Central | Aruba Central is a unified cloud-based network operations, assurance and security platform that simplifies the deployment, management, and optimization of wireless, wired and WAN environments. | Networking | Devices |
![]() |
Aruba ClearPass | Aruba ClearPass is a network access control (NAC) solution that allows enterprises to identify devices, enforce policies, and remediate threats. | NAC | Devices |
![]() |
Aternity | Aternity is a device performance monitoring solution that provides insights into performance and health of laptops, desktops, VDI, and mobile devices, along with self-healing capabilities to automatically resolve issues. | ITAM/ITSM, Config/Patch Mgmt | Devices |
![]() |
Atlassian Jira Assets Platform | Atlassian Jira Assets Platform links software with Jira to populate an asset inventory, letting users query for assets and link them to issues. | ITAM/ITSM | Devices |
![]() |
Automox | Automox is a cloud-based patch and configuration management solution for Windows, Linux, Mac, and third-party software. | Config/Patch Mgmt | Devices |
![]() |
Auvik | Auvik is an IT asset and network monitoring solution for managing entire network infrastructures, including physical servers, data centers, workstations and more. | Networking | Devices |
![]() |
Axoniux Users | The Axonius Users adapter fetches users with Axonius credentials and their permissions using our API client. | ITAM/ITSM | Users |
![]() |
Awake Security | Awake Security is a network traffic analysis solution that's capable of detecting and visualizing behavioral, mal-intent and compliance incidents. | Networking | Devices |
![]() |
BambooHR | BambooHR is HR software used to collect, maintain, and analyze data for hiring, onboarding employees, and managing company culture. | HCM | Users |
![]() |
Barracuda CloudGen Access (Fyde) | Barracuda CloudGen Access (formerly Fyde) provides granular access for enterprise apps and workloads, and continuously monitors access requests to enforce policy controls. | IAM | Devices, Users |
![]() |
BeyondTrust Privilege Management for Windows | BeyondTrust Privilege Management for Windows delivers privilege management and application control, allowing organizations to eliminate admin rights across the entire business and enforce least privilege. | PAM | Devices, Users |
![]() |
BeyondTrust Privileged Identity (Lieberman RED Identity Management) | BeyondTrust Privileged Identity (formerly Lieberman RED Identity Management) is a password management solution that helps companies secure, manage, and administer credentials for privileged users and IT vendors. | PAM | Users |
![]() |
BeyondTrust Remote Support (Bomgar) | BeyondTrust Remote Support (formerly Bomgar) allows support technicians to remotely connect to end-user systems through firewalls from their computer or mobile devices. | IT Agent | Devices |
![]() |
BigID | BigID is data security solution that provides enterprise protection and privacy of personal data. | Data Security | Devices |
![]() |
Bitbucket | Bitbucket is a web-based version control repository hosting service for source code and development projects that use either Mercurial or Git revision control systems. | DevOps | Devices |
![]() |
Bitdefender GravityZone Business Security | Bitdefender GravityZone Business Security uses machine learning and heuristics to protect against malware, phishing, ransomware, exploits and zero-days. | EDR/EPP | Devices |
![]() |
bitFit | bitFit is a business development and information technology company that collects all of your IT operations data and combines it into a unified cloud system. | ITAM/ITSM | Devices, Users |
![]() |
BitSight Security Ratings | BitSight Security Ratings are a data-driven and dynamic measurement of an organization’s cybersecurity performance. | Cyber Intelligence | Devices |
![]() |
BlackBerry Unified Endpoint Management (UEM) | BlackBerry Unified Endpoint Management (UEM) delivers endpoint management and policy control for devices and apps on-premise or in the cloud. | EDR/EPP, MDM/EMM, UEM | Devices |
![]() |
BlueCat Enterprise DNS | BlueCat Enterprise DNS connects all disparate DNS and DHCP with centralized management of all clients and critical assets. | Networking | Devices |
![]() |
BMC Atrium ADDM | BMC Atrium ADDM is a digital enterprise management solution that automates application discovery and dependency mapping. | CMDB | Devices |
![]() |
BMC Atrium CMDB | BMC Atrium CMDB stores information about the configuration items (CIs) in your IT environment and the relationships between them. | CMDB | Devices |
![]() |
BMC TrueSight | BMC TrueSight is an AIOps suite of solutions that help run IT and cloud operations. | DevOps | Devices |
![]() |
Box Platform | Box Platform provides data security, file sharing, collaborating, and content management tools. Box Platform provides access to Box APIs. | Data Security | Users |
![]() |
CA Service Management | CA Service Management is an IT service management (ITSM) solution that offers incident management and IT asset management | ITAM/ITSM, CMDB | Devices |
![]() |
CA Spectrum | CA Spectrum is a services and network infrastructure management system that enables the modeling of LAN, WAN, wired, wireless, physical, and virtual networks | Networking | Devices |
![]() |
Censys | Censys monitors infrastructure and discovers unknown assets across the Internet. | IoT | Devices |
![]() |
Centrify Identity Services | Centrify Identity Services manages application access, endpoints, and network infrastructure. | IAM | Users |
![]() |
Check Point Infinity | Check Point Infinity protects against cyber threats across networks, endpoint, cloud and mobile devices. This adapter supports the entire Infinity platform, including Check Point firewalls. | EDR/EPP, Firewall | Devices |
![]() |
Checkmarx SAST (CxSAST) | Checkmarx SAST (CxSAST) is a static application security testing solution used to identify security vulnerabilities in custom code. It is used by development, DevOps, and security teams to scan source code early in the SDLC, identify vulnerabilities, and provide actionable insights to remediate them. | Application Security | Devices |
![]() |
Chef | Chef provides continuous automation for building, deploying, and managing infrastructure, compliance, and applications in legacy and hybrid environments. | Config/Patch Mgmt | Devices, Users |
![]() |
Cherwell IT Service Management | Cherwell IT Service Management is a service desk platform enabling automation for process workflows, supporting tasks, and related approvals. | ITAM/ITSM | Devices |
![]() |
Cisco | Cisco connects to Cisco switches and routers. | Networking | Devices |
![]() |
Cisco Advanced Malware Protection (AMP) | Cisco Advanced Malware Protection (AMP) includes threat intelligence, sandboxing, and malware blocking to detect, contain, and remove malware. | EDR/EPP | Devices |
![]() |
Cisco DNA Center | Cisco DNA Center is a software-based network automation and assurance solution. | Networking | Devices |
![]() |
Cisco Firepower Management Center | Cisco Firepower Management Center provides management over firewalls, application control, intrusion prevention, URL filtering, and advanced malware protection. | Networking | Devices |
![]() |
Cisco Identity Services Engine (ISE) | Cisco Identity Services Engine (ISE) is a network administration product that enables the creation and enforcement of security and access policies for endpoint devices connected to the company’s routers and switches. | IAM | Devices |
![]() |
Cisco Meraki | Cisco Meraki solutions include wireless, switching, security, EMM, communications, and security cameras, all centrally managed from the web. | Networking | Devices |
![]() |
Cisco Prime | Cisco Prime offers a suite of tools to automate the management of wired and wireless Cisco networks. | Networking | Devices |
![]() |
Cisco Security Manager | Cisco Security Manager provides policy enforcement and rapid troubleshooting of security events, offering summarized reports across the security deployment. | Networking | Devices |
![]() |
Cisco Stealthwatch | Cisco Stealthwatch is an agentless malware detection solution that provides visibility and network traffic security analytics across the extended network, including endpoints, branch, data center, and cloud. | Networking | Devices |
![]() |
Cisco UCS Manager | Cisco UCS Manager supports the entire Cisco UCS server and Cisco HyperFlex Series hyperconverged infrastructure portfolios. It enables server, fabric, and storage provisioning as well as, device discovery, inventory, configuration, diagnostics, monitoring, fault detection, auditing, and statistics collection. | Networking | Devices |
![]() |
Cisco Umbrella | Cisco Umbrella is a secure internet gateway in the cloud, including DNS and IP layer enforcement and command and control callback blocking. | Networking | Devices |
![]() |
Cisco Unified Communications Manager | Cisco Unified Communications Manager provides secure and manageable call control and session management. | IoT | Devices |
![]() |
Citrix Endpoint Management (XenMobile) | Citrix Endpoint Management (formerly XenMobile) is a solution for managing endpoints, offering mobile device management (MDM) and mobile application management (MAM) capabilities. | UEM, MDM/EMM | Devices |
![]() |
Claroty | Claroty discovers assets and monitors communication patterns for ICS networks. | OT | Devices |
![]() |
Cloud Health | Cloud Health is a cloud management platform to analyze and manage cloud cost, usage, security, and governance. | Cloud Mgmt | Devices |
![]() |
Cloudflare DNS | Cloudflare DNS runs one of the largest DNS networks in the world. | Networking | Devices |
![]() |
CloudPassage Halo | CloudPassage Halo is a security automation platform providing visibility, protection, and continuous compliance monitoring for AWS and Azure deployments. | Cloud Mgmt | Devices |
![]() |
Code42 | Code42 is a next-gen DLP solution used to detect insider threats, satisfy regulatory compliance, and accelerate incident response investigations. | DLP | Devices, Users |
![]() |
Cofense PhishMe | Cofense PhishMe provides phishing awareness training and threat simulations for employees. | Security Awareness; Email Security | Users |
![]() |
Commvault | Commvault enables data protection, backup and recovery, and information management solutions. | Data Security | Devices, Users |
![]() |
Contrast Security | Contrast Security protects software applications against cyberattacks. | SaaS Mgmt | Devices |
![]() |
CrowdStrike Falcon | CrowdStrike Falcon delivers next-generation antivirus, endpoint detection and response (EDR), managed threat hunting, and threat intelligence. | EDR/EPP | Devices |
![]() |
CSCDomainManager | CSCDomainManager is a web-based portfolio management platform consolidating domains alongside social media usernames, SSL digital certificates, and DNS. | Networking | Devices |
![]() |
CSV | The CSV adapter imports .csv files with inventory information including: devices and serial numbers, users, and installed software data. | CMDB | Devices, Users |
![]() |
CyberArk Endpoint Privilege Manager | CyberArk Endpoint Privilege Manager enforces least privilege, providing credential theft protection and application control at scale. | PAM | Devices |
![]() |
CyberArk Privileged Account Security | CyberArk Privileged Account Security provides privileged password management, session recording, least privilege enforcement, and privileged data analytics. | PAM | Users |
![]() |
Cybereason Deep Detect & Respond | Cybereason Deep Detect & Respond (EDR) defends against advanced attacks by collecting and analyzing behavioral data to identify suspicious activities. | EDR/EPP | Devices |
![]() |
CyCognito Platform | The CyCognito platform delivers proactive attack surface protection and digital risk protection across your entire extended IT ecosystem to help you identify, categorize, prioritize and eliminate your attacker-exposed risk. | Cyber Intelligence | Devices |
![]() |
CylancePROTECT | CylancePROTECT uses artificial intelligence to detect and protect against ransomware, advanced threats, fileless malware, and malicious documents. | EDR/EPP | Devices |
![]() |
Cynet 360 | Cynet 360 is a detection and response security platform for finding, ranking, and remediating unknown, camouflaged threats. | EDR/EPP | Devices |
![]() |
Datadog | Datadog is a monitoring service for cloud-scale applications, providing monitoring of servers, databases, tools, and services. | Cloud Mgmt | Devices |
![]() |
Datto RMM (Autotask Endpoint Management) | Datto RMM (formerly Autotask Endpoint Management) is a cloud-based Remote Monitoring and Management (RMM) platform that provides device auditing, real-time monitoring, and automatic patching. | EDR/EPP, Config/Patch Mgmt | Devices |
![]() |
Dell EMC Avamar | Dell EMC Avamar is a backup and recovery solution that enables daily backups of physical and virtual environments, NAS servers, enterprise applications, remote offices and desktops/laptops. | DLP | Devices |
![]() |
Dell OpenManage Enterprise | Dell OpenManage Enterprise is a one-to-many systems management console. It facilitates lifecycle management for Dell EMC PowerEdge servers in one console. | Infra Monitoring | Devices |
![]() |
Device42 | Device42 is a cloud-based CMDB for physical, virtual, and cloud servers and containers, network components, software, services, applications, and their relationships and dependencies. | CMDB | Devices |
![]() |
DigiCert CertCentral | DigiCert CertCentral consolidates tasks for issuing, installing, inspecting, remediating, and renewing certificates. | Certificate Managment | Devices |
![]() |
DigiCert PKI Platform (Symantec Managed PKI) | DigiCert PKI Platform (formerly Symantec Managed PKI) provides a cloud-based enterprise solution for issuing and managing digital certificates used to enable strong authentication and encryption. | Certificate Managment | Devices |
![]() |
Digital Shadows SearchLight | Digital Shadows SearchLight is a digital risk protection solution that protects organizations against external risk exposure. | Cyber Intelligence | Devices |
![]() |
DivvyCloud | DivvyCloud offers security, compliance, and governance guardrails for public and private cloud infrastructures. | Cloud Mgmt | Devices |
![]() |
DNS Made Easy | DNS Made Easy offers DNS management services. | Networking | Devices |
![]() |
Dropbox | Dropbox is a file hosting service that offers cloud storage, file synchronization, personal cloud, and client software. | Cloud Mgmt | Devices |
![]() |
Druva Cloud Platform | Druva Cloud Platform is a data protection as-a-service that provides management across all customer data sources that are scalable, predictable and on-demand. | DLP | Devices |
![]() |
Duo Beyond | Duo Beyond identifies corporate vs. personal devices, blocks untrusted devices, and give users secure access to internal applications. | IAM | Users |
![]() |
Dynatrace | Dynatrace is a software intelligence platform providing application performance management and cloud infrastructure monitoring. | Cloud Mgmt | Devices |
![]() |
Eclypsium | Eclypsium protects the foundation of the computing infrastructure, controlling risks and stopping threats to enterprise firmware and hardware devices. | Firmware Security | Devices |
![]() |
Elasticsearch | The Elasticsearch adapter imports device information from an Elasticsearch database. | CMDB | Devices |
![]() |
edgescan | edgescan Fullstack Vulnerability Management is a cloud-based continuous vulnerability management and penetration testing solution that discovers, validates and rates vulnerabilities by running continuous asset profiling to detect rogue/exposed ports, hosts or even hidden API’s. | VA Tool | Devices |
![]() |
Endgame | Endgame is an endpoint protection platform that combines on-line and off-line protection against exploits, phishing, malware, ransomware, and fileless attacks. | EDR/EPP | Devices |
![]() |
enSilo | enSilo automates and orchestrates detection, prevention, and response against advanced malware and ransomware. | EDR/EPP | Devices |
![]() |
ESET Endpoint Security | ESET Endpoint Security is an anti-malware suite for Windows including web filtering, firewall, USB drive and botnet protection. | EDR/EPP | Devices |
![]() |
ExtraHop Reveal(x) | ExtraHop Reveal(x) is a network detection and response (NDR) solution that provides visibility, real-time threat detection, and response. | NDR | Devices |
![]() |
Extreme Networks ExtremeControl | Extreme Networks ExtremeControl is a Network Access Control (NAC) solution that provides role-based access controls and reporting on user activity across all devices. | NAC | Devices |
![]() |
Extreme Networks ExtremeWireless WiNG | Extreme Networks ExtremeWireless WiNG in a WLAN operating system designed to scale efficiently from the smallest networks to large, geographically dispersed deployments. | Networking | Devices |
![]() |
F-Secure Protection Service for Business (PSB) | F-Secure Protection Service for Business (PSB) is a central management portal for managing VPN, mobile device management, software update management, workstation, and server security. | UEM | Devices |
![]() |
F5 BIG-IP iControl | F5 iControl is a Web services-enabled open API providing granular control over the configuration and management of F5's application delivery platform, BIG-IP. | Networking | Devices |
![]() |
F5 BIG-IQ Centralized Management | F5 BIG-IQ Centralized Management provides centralized management, licensing, monitoring, and analytics for BIG-IP infrastructure. | Infra Monitoring | Devices |
![]() |
FireEye Endpoint Security (formerly HX) | FireEye Endpoint Security (formerly HX) detects and protects against unknown endpoint threats and exploits with integrated threat intelligence. | EDR/EPP | Devices |
![]() |
FireMon Security Manager | FireMon Security Manager is a network security solution that provides real-time visibility, control, and management for network security devices across hybrid cloud environments. | Networking; Cloud Security | Devices |
![]() |
Flexera IT Asset Management | Flexera lets enterprises gain visibility and control of IT assets, reduce ongoing software costs, and maintain continuous license compliance. | ITAM/ITSM | Devices |
![]() |
FlexNet Manager Suite Cloud | FlexNet Manager Suite Cloud from Flexera is a SaaS offering for software license compliance and license optimization. | License Management | Devices |
![]() |
Forcepoint Web Security Endpoint | Forcepoint Web Security Endpoint enables end-users to authenticate and receive policy enforcement via the Forcepoint Web Security Cloud infrastructure. | IAM, Config/Patch Mgmt | Devices |
![]() |
Forcepoint Web Security Endpoint CSV File | Forcepoint Web Security Endpoint CSV File imports CSV files with device information. | IAM, Config/Patch Mgmt | Devices |
![]() |
Foreman | Foreman is a free open source project that automates repetitive tasks, quickly deploys applications, and proactively manages server lifecyle, on-premises or in the cloud. | Config/Patch Mgmt | Devices |
![]() |
ForeScout CounterACT | ForeScout CounterACT platform provides insight into network-connected devices. | NAC | Devices |
![]() |
Fortify Software Security Center | Fortify Software Security Center offers security assurance solutions that address the threats posed by security flaws in business-critical software apps. | Application Security | Devices |
![]() |
Fortinet FortiGate | Fortinet FortiGate is a next-generation firewall providing security and visibility for end-to-end protection across the entire enterprise network. | Firewall | Devices |
![]() |
FreeIPA | FreeIPA is a free and open source identity management system for Linux environments. | IAM | Devices, Users |
![]() |
Freshservice | Freshservice is a cloud-based IT help desk and service management solution that enables organizations to simplify their IT operations. | ITAM/ITSM | Devices |
![]() |
Frontline VM | Frontline VM, a Frontline.Cloud system, is a vulnerability management application that performs comprehensive security assessments and helps prioritize and track the results, making remediation more efficient and effective. | VA Tool | Devices |
![]() |
Gigamon GigaVUE-FM (Fabric Manager) | Gigamon GigaVUE-FM (Fabric Manager) delivers management and monitoring of all physical and virtual nodes across your on-premises, virtual and public-cloud deployments. | Networking | Devices |
![]() |
Gigamon ThreatINSIGHT | Gigamon ThreatINSIGHT is a cloud-native network detection and response (NDR) platform that provides threat activity detection and the data and context needed for cybersecurity response and investigation. | MDR | Devices |
![]() |
GitHub | GitHub provides hosting for software development version control using Git, including distributed version control and source code management (SCM) functionality. | Software Development Version Control | Users |
![]() |
GitLab | GitLab is an open-source DevOps lifecycle tool that provides a wiki, issue-tracking, and continuous integration and deployment pipeline features. | DevOps | Devices, Users |
![]() |
Google Cloud Platform (GCP) | Google Cloud Platform (GCP) is a suite of cloud computing services. Alongside a set of management tools, it provides a series of modular cloud services including computing, data storage, data analytics and machine learning. | Cloud Infra, Virtualization, Containers | Devices, Users |
![]() |
Google Workspace (G Suite) | Google Workspace (formerly G Suite) is a collection of cloud computing, productivity, collaboration, device, user, and data management tools developed by Google. | MDM/EMM, IAM | Devices, Users |
![]() |
Guardicore | Guardicore is a data center and cloud security company that protects the organization’s core assets. | Cloud Security | Devices, Users |
![]() |
HashiCorp Consul | HashiCorp Consul is a multi-cloud service networking platform to connect and secure services across any runtime platform and public or private cloud. | Networking | Devices |
![]() |
Have I Been Pwned | Have I Been Pwned is a website to check if email accounts have been compromised in a data breach. | VA Tool | Users |
![]() |
HP Integrated Lights-Out (iLO) | HP Integrated Lights-Out (iLO) is server management software that enables the configuration, monitoring, and updating of HPE servers. | Config/Patch Mgmt | Devices |
![]() |
HP Network Node Manager i (NNMi) | HP Network Node Manager i (NNMi) is a network health and performance monitoring software with scalability and device support. | Networking | Devices |
![]() |
HPE Intelligent Management Center (IMC) | HPE Intelligent Management Center (IMC) is a networking solution that delivers management across campus core and data center networks. | Networking | Devices, Users |
![]() |
HPE OneView | HPE OneView is an integrated IT management solution that transforms compute, storage, and networking into software-defined infrastructure for task automation. | ITAM/ITSM | Devices |
![]() |
HyperSQL | The HyperSQL adapter imports device information from an HyperSQL database.. | CMDB | Devices |
![]() |
HYPR Passwordless | HYPR Passwordless provides passwordless security solutions. | IAM | Users |
![]() |
IBM BigFix | IBM BigFix provides remote control, patch management, software distribution, operating system deployment, network access protection and hardware and software inventory functionality. | IT Agent, Config/Patch Mgmt | Devices |
![]() |
IBM BigFix Inventory | IBM BigFix Inventory gathers information about installed software and hardware in your IT infrastructure. | IT Agent | Devices |
![]() |
IBM Cloud | IBM's cloud computing platform combines platform as a service (PaaS) with infrastructure as a service (IaaS) and cloud services. | Cloud Infra | Devices |
![]() |
IBM Guardium | IBM Guardium prevents leaks from databases, data warehouses, and Big Data environments. It ensures the integrity of information and automates compliance controls across heterogeneous environments. | Data Security | Devices |
![]() |
IBM MaaS360 with Watson | IBM MaaS360 with Watson is a Unified Endpoint Management (UEM) platform covering endpoints, end-users, apps, content, and data. It also gives visibility and control to manage mobile devices running iOS, macOS, Android, and Windows. | CMDB, MDM/EMM, UEM | Devices |
![]() |
IBM QRadar | IBM QRadar is a Security Information and Event Management (SIEM) solution that enables security teams to detect, prioritize and response to threats across the enterprise. | SIEM | Devices, Users |
![]() |
IBM Tivoli Application Dependency Discovery Manager (TADDM) | IBM Tivoli Application Dependency Discovery Manager (TADDM) is a configuration management tool that helps IT operations personnel ensure and improve application availability in application environments. | Config/Patch Mgmt | Devices |
![]() |
iboss cloud | iboss cloud is cloud-based platform that secures user Internet access in the cloud. | Networking, Cloud Security | Devices, Users |
![]() |
Icinga | Icinga is an open-source computer system and network monitoring application. It monitors data centers and clouds availability and performance, gives access to data and raises alerts. | Networking | Devices |
![]() |
Illumio Adaptive Security Platform (ASP) | Illumio Adaptive Security Platform (ASP) secures computing platforms in cloud, on-prem, or hybrid environments without any dependency on the underlying network. | Networking | Devices |
![]() |
Illusive Networks | Illusive Networks deceives cyber attackers by planting false information about a given network's resources. | Deception | Devices |
![]() |
Imperva Data Activity Monitoring (DAM) | Imperva Data Activity Monitoring (DAM) defines and enforces data security and compliance policies across the cloud and on-premises including relational databases, mainframes, big data platforms, data warehouses, and enterprise file stores. | IT Agent | Devices |
![]() |
Indegy Industrial Cybersecurity Suite | Indegy Industrial Cybersecurity Suite protects industrial networks from cyber threats, malicious insiders, and human error, including threat detection and mitigation, asset tracking, vulnerability management, configuration control, and device integrity checks. | OT Security | Devices |
![]() |
Infinipoint | Infinipoint is a cloud-based automated cyber hygiene platform that enables continuous detection and remediation of risks across the organization’s IT assets. | ITAM/ITSM, Config/Patch Mgmt | Devices, Users |
![]() |
Infoblox DDI | Infoblox DDI consolidates DNS, DHCP, IP address management, and other core network services into a single platform, managed from a common console. | Networking | Devices |
![]() |
Infoblox NetMRI | Infoblox NetMRI provides network change and configuration management (NCCM), enabling users to automate network change, understand network health, manage network configurations, and meet a variety of compliance requirements. | Networking | Devices, Users |
![]() |
Intrigue | Intrigue enables IT and Security teams with a complete and always up to date view of Cloud and Internet-exposed assets and exposures. | Cyber Intelligence | Devices |
![]() |
IP Fabric | IP Fabric is a network management system used to discover, verify, visualize and document large scale networks. | Networking | Devices |
![]() |
iTop | IiTop is an open source ITSM solution allows management of configuration items and their relationships in a flexible CMDB. | CMDB | Devices, Users |
![]() |
Ivanti Endpoint Security | Ivanti Endpoint Security, powered by Heat, provides application control, antivirus, patch management, and device control to protect endpoints. | EDR/EPP | Devices |
![]() |
Ivanti Security Controls | Ivanti Security Controls is a unified IT management platform used for managing and protecting Windows-based machines, Red Hat Enterprise and CentOS Linux machines, and VMware ESXi Hypervisors. | ITAM/ITSM, Config/Patch Mgmt | Devices |
![]() |
Ivanti Service Manager | Ivanti Service Manager, is a cloud based ITSM solution that provides workflows automation, IT help desk and support ticket features, and ITIL service management processes. | ITAM/ITSM | Devices, Users |
![]() |
Ivanti Unified Endpoint Manager (Landesk) | Ivanti Unified Endpoint Manager (formerly Landesk) helps IT administrators gather detailed device data, automate software and OS deployments, personalize workspace environments, and fix user issues. | UEM | Devices |
![]() |
Jamf Pro | Jamf Pro is an enterprise mobility management (EMM) tool that provides unified endpoint management for Apple devices. | MDM/EMM | Devices |
![]() |
Jamf Protect | Jamf Protect is an endpoint protection solution that prevents macOS malware, detects and remediates Mac-specific threats, and monitors endpoints for compliance. | EDR/EPP | Devices |
![]() |
JSON | The JSON adapter is able to import .json files with information about devices, users, or installed software. | CMDB | Devices, Users |
![]() |
JumpCloud | JumpCloud is a Directory-as-a-Service (DaaS) solution to authenticate, authorize, and manage users, devices, and applications via a common directory in the cloud. | IAM | Devices, Users |
![]() |
Juniper Junos | The Juniper Junos Adapter connects to Juniper switches and routers. | Networking | Devices |
![]() |
Juniper Junos Space Network Management Platform | Juniper Junos Space Network Management Platform automates management of Juniper's switching, routing, and security devices. | Networking | Devices |
![]() |
Kaseya VSA | Kaseya VSA is a remote monitoring and management solution for remote control, discovery, patch management, and monitoring. | IT Agent, Config/Patch Mgmt | Devices |
![]() |
Kaspersky Security Center | Kaspersky Security Center is an administration console for Kaspersky Labs security solutions and systems management tools. | EDR/EPP | IAM |
![]() |
Kenna Security Platform | Kenna Security Platform is a vulnerability assessment solution that provides risk scoring, prioritization, and benchmarking. | VA Tool | Devices |
![]() |
Keycloak | Keycloak is an open source identity and access management solution. | IAM | Users |
![]() |
KnowBe4 | KnowBe4 provides Security Awareness Training for anti-phising behavior, social engineering and ransomware attacks, and general security awareness. | Security Awareness | Users |
![]() |
Kolide Fleet | Kolide Fleet is an open source osquery manager. | EDR/EPP | Devices |
![]() |
Kubernetes | Kubernetes (K8s) is an open-source system for automating deployment, scaling, and management of containerized applications. | Containers | Devices |
![]() |
L0phtCrack 7 | L0phtCrack 7 is a password auditing and recovery application. | Password Management | Users |
![]() |
Lansweeper | Lansweeper is an agentless IT asset management and Network Inventory software tool for Microsoft Windows OS. | IT Agent, CMDB | Devices |
![]() |
LibreNMS | LibreNMS is a network monitoring solution that provides auto-discovery for network hardware and operating systems including Cisco, Linux, Juniper, Foundry, and more. | Networking | Devices |
![]() |
LimaCharlie | LimaCharlie provides endpoint-driven information security tools to run an MSSP or SOC, as well as APIs that allow users to build and monetize their own products. | DevOps | Devices |
![]() |
Linux SSH | Linux Secure Shell uses remote command execution over the SSH protocol to gather information about the endpoint Linux machine. | ITAM/ITSM | Devices |
![]() |
LogMeIn Central | LogMeIn Central is a cloud-based endpoint management solution that enables monitoring and management of endpoint infrastructure. | Config/Patch Mgmt, EDR/ERP | Devices, Users |
![]() |
LogicMonitor | LogicMonitor is an automated infrastructure monitoring platform for enterprise IT and managed service providers. | Infra Monitoring | Devices |
![]() |
LogRhythm | LogRhythm combines SIEM, user and entity behavior analytics, network traffic and behavior analytics, and security automation and orchestration. | SIEM | Devices |
![]() |
Malwarebytes Endpoint Protection (Cloud Platform) | Malwarebytes Endpoint Protection is a cloud-based security platform that combines detection and remediation technologies into a single cloud-managed agent. | EDR/EPP | Devices |
![]() |
Malwarebytes Endpoint Security (On-Prem Platform) | Malwarebytes Endpoint Security protects endpoints from ransomware, automates endpoint remediation, and provides continuous visibility and monitoring. | EDR/EPP | Devices |
![]() |
ManageEngine Desktop Central | ManageEngine Desktop Central is a desktop management and mobile device management software for managing desktops in LAN and across WAN and mobile devices from a central location. | EDR/EPP, MDM/EMM | Devices |
![]() |
Masscan | Masscan is a free internet port scanner utility. | VA Tool | Devices |
![]() |
McAfee ePolicy Orchestrator (ePO) | McAfee ePolicy Orchestrator (ePO) is a security management platform that provides real-time monitoring of security solutions. | EDR/EPP | Devices |
![]() |
Medigate | Medigate is a medical device security platform that protects connected medical devices on health care provider networks, allowing inventory management and facilitating detection and prevention capabilities. | Networking | Devices |
![]() |
Men&Mice DNS Management | Men&Mice DNS Management is a Network Management software providing secure, centralized, and highly resilient control of DNS across diverse platforms. | Networking | Devices, Users |
![]() |
Micro Focus Server Automation (HP Server Automation, Opsware) | Micro Focus Server Automation (formerly known as HP Server Automation or Opsware) provides operating system provisioning, automated patch management, and compliance control. | Config/Patch Mgmt | Devices |
![]() |
Microsoft Active Directory (AD) | Microsoft Active Directory (AD) is a directory service for Windows domain networks that authenticates and authorizes all users and computers. | IAM | Devices, Users |
![]() |
Microsoft Azure | Microsoft Azure is a cloud computing service created by Microsoft for building, testing, deploying, and managing applications and services through a global network of Microsoft-managed data centers. | Cloud Infra | Devices |
![]() |
Microsoft Azure Active Directory (Azure AD) and Microsoft Intune | Microsoft Azure Active Directory (Azure AD) is Microsoft's multi-tenant, cloud-based directory, and identity management service. Microsoft Intune is a cloud-based service in the enterprise mobility management (EMM) space that integrates closely with Azure Active Directory (Azure AD) for identity and access control and Azure Information Protection for data protection. | IAM | Devices, Users |
![]() |
Microsoft BitLocker Administration and Monitoring (MBAM) | Microsoft BitLocker Administration and Monitoring (MBAM) provides a simplified administrative interface for BitLocker Drive Encryption. BitLocker offers protection against data theft or data exposure for computers that are lost or stolen, encrypting all data that is stored on the Windows operating system volumes and drives and configured data drives. | DLP | Devices |
![]() |
Microsoft Defender ATP | Microsoft Defender Advanced Threat Protection (ATP) helps enterprise networks prevent, detect, investigate, and respond to advanced threats. | EDR/EPP | Devices |
![]() |
Microsoft Hyper-V | Microsoft Hyper-V is a native hypervisor; it can create virtual machines on x86-64 systems running Windows. | Virtualization | Devices |
![]() |
Microsoft Key Management Service (KMS) | Microsoft Key Management Service (KMS) enables organizations to activate systems within their own network, eliminating the need for individual computers to connect to Microsoft for product activation. | ITAM/ITSM | Devices |
![]() |
Microsoft Lync | Microsoft Lync provides instant messaging (IM), audio and video calls, Lync Meetings, availability (presence) information, and sharing capabilities. | Collaboration | Users |
![]() |
Microsoft System Center Configuration Manager (SCCM) | Microsoft System Center Configuration Manager (SCCM) is a systems management software product for managing large groups of computers running Windows NT, Windows Embedded, macOS (OS X), Linux or UNIX, as well as Windows Phone, Symbian, iOS and Android mobile operating systems | Config/Patch Mgmt | Devices |
![]() |
Minerva Labs Endpoint Malware Vaccination | Minerva Labs Endpoint Malware Vaccination simulates infection markers, rather than creating them, to contain outbreaks that bypass AV tools. | EDR/EPP | Devices |
![]() |
MobileIron EMM | MobileIron EMM enables enterprises to secure and manage modern operating systems on mobile devices and desktops. | MDM/EMM | Devices |
![]() |
Nasuni | Nasuni offers a file services platform built for the cloud that delivers infinite scale, built-in backup, global file sharing, and local file server performance. | Storage Management | Devices |
![]() |
NetApp | NetApp offers hybrid cloud data services for management of applications and data across cloud and on-premises environments. | Storage Management | Devices, Users |
![]() |
NetBox | NetBox is an open source web application to help manage and document computer networks. | Networking | Devices |
![]() |
NetBrain Integrated Edition | NetBrain Integrated Edition is an adaptive automation integrated with existing NMS tools and IT workflows to automate documentation, troubleshooting, network change, and defense. | Networking | Devices |
![]() |
NetIQ Advanced Authentication | NetIQ Advanced Authentication provides a centralized authentication framework that adds a strong level of authentication (MFA or 2 Factor). | IAM | Devices |
![]() |
Netskope | Netskope Security Cloud provides threat protection for cloud services, websites, and private applications. | Networking | Devices |
![]() |
Nexthink | Nexthink is an IT solution that provides insights into activity across devices, operating systems, and workplace locations to improve IT experiences for employees. | ITAM/ITSM | Devices, Users |
![]() |
Nmap Security Scanner | Nmap Security Scanner is a free and open source utility for network discovery and security auditing. | VA Tool | Devices |
![]() |
Nozomi Networks Guardian | Nozomi Networks Guardian monitors network communications and device behavior for physical and virtual appliances. | Networking | Devices |
![]() |
Nutanix AHV | Nutanix AHV is a hypervisor included with the Enterprise Cloud OS. AHV delivers flexible migrations, security hardening, automated data protection and disaster recovery, and analytics. | Virtualization | Devices |
![]() |
ObserveIT | ObserveIT provides insider threat security solutions, including employee monitoring, user activity monitoring, behavioral analytics, policy enforcement, and digital forensics. | UEBA | Devices |
![]() |
Observium | Observium is an auto-discovering network monitoring platform supporting a wide range of device types, platforms and operating systems. | Networking | Devices |
![]() |
Okta | Okta provides cloud software that helps companies manage their employees' passwords, by providing a “single sign-on” experience. | IAM | Users |
![]() |
OmniVista 2500 NMS | The Alcatel-Lucent OmniVista 2500 Network Management System (NMS) provides management tools and network-wide visibility, enabling operators to provision, manage and maintain a mobile infrastructure. | Networking | Devices |
![]() |
OneLogin | OneLogin's unified access management platform centralizes access across on-prem and cloud environments to give full control, management, and security for data, devices, and users. | IAM | Users |
![]() |
OpenStack | OpenStack is an open source software solution for creating private and public clouds. | Cloud Infra | Devices |
![]() |
openDCIM | openDCIM is a free open-source Data Center Infrastructure Management solution. | Networking | Devices, Users |
![]() |
OpenVAS | OpenVAS is a software framework including several services and tools for vulnerability scanning and vulnerability management. | VA Tool | Devices |
![]() |
OPSWAT MetaAccess | OPSWAT MetaAccess prevents risky devices from accessing local networks and cloud applications. | NAC | Devices |
![]() |
Oracle Cloud | Oracle Cloud is a computing service providing servers, storage, network, applications and services. | Cloud Infra | Devices, Users |
![]() |
Oracle VM | Oracle VM's server virtualization products support x86 and SPARC architectures and a variety of workloads such as Linux, Windows and Oracle Solaris. | Virtualization | Devices |
![]() |
Orca Cloud Visibility Platform | Orca Cloud Visibility Platform delivers visibility to cloud security posture, including prioritized alerts on vulnerabilities, compromises, misconfigurations, and more. | Cloud Security | Devices |
![]() |
PacketFence | PacketFence is a free open source network access control (NAC) solution which provides the following features: registration, detection of abnormal network activities, proactive vulnerability scans, isolation of problematic devices, remediation through a captive portal, 802.1X, wireless integration and User-Agent / DHCP fingerprinting. | NAC | Devices |
![]() |
Palo Alto Networks Cortex | Palo Alto Networks Cortex is an open and integrated, AI-based continuous security platform, allowing security operations teams to speed the analysis of massive data sets. | Networking | Devices |
![]() |
Palo Alto Networks Cortex XDR | Palo Alto Networks Cortex XDR is a detection and response app that natively integrates network, endpoint, and cloud data to detect threats and stop sophisticated attacks. | EDR/EPP | Devices |
![]() |
Palo Alto Networks Panorama | The Palo Alto Panorama management server provides centralized monitoring and management of multiple next-generation firewalls and appliance clusters. | Networking, Firewall | Devices |
![]() |
Palo Alto Prisma Cloud | Prisma Cloud is a native cloud security platform that provides visibility, threat prevention, compliance assurance, and data protection across multi-cloud environments. | Cloud Mgmt | Devices |
![]() |
Palo Alto Traps Endpoint Security Manager | Palo Alto Traps Endpoint Security Manager (ESM) delivers endpoint protection to prevent advanced persistent threats (APTs) and zero-day attacks. | EDR/EPP | Devices |
![]() |
Panorays | Panorays is a SaaS-based platform that enables companies to view, manage and engage on the security posture of their third-parties, vendors, suppliers, and business partners. | Cyber Intelligence | Devices |
![]() |
PDQ Inventory | PDQ Inventory is a systems management tool that scans Windows computers to collect hardware, software, and Windows configuration data. | ITAM/ITSM | Devices, Users |
![]() |
phpIPAM | phpIPAM is an open-source web IP address management application (IPAM). | Networking | Devices, Users |
![]() |
PingOne Directory | PingOne Directory provides a hosted directory service that developers can use to store user authentication and profile data. | IAM | Users |
![]() |
Pivotal Cloud Foundry | Pivotal Cloud Foundry is an app development and deployment platform for public and private clouds. | Cloud Mgmt | Devices |
![]() |
PKWARE | PKWARE’s data protection platform finds, classifies, and protects sensitive data, allowing security managers to define data protection policies and monitor activity across the organization. | DLP, Encryption | Devices |
![]() |
Preempt | Preempt lets organizations reduce user risk on their attack surface and preempt threats in real-time with Conditional Access. It continuously analyzes, adapts and responds to threats based on identity, behavior, and risk to resolve insider threats and targeted attacks. | IAM | Devices, Users |
![]() |
PrivX | PrivX provides privileged access to on-prem and cloud environments, including control access to servers, network devices and other critical infrastructure according to user roles and privileges. | PAM | Devices, Users |
![]() |
Promisec Endpoint Manager | Promisec Endpoint Manager is an agentless endpoint detection and remediation solution that detects, analyzes, and remediates abnormalities. | EDR/EPP | Devices |
![]() |
Proofpoint | Proofpoint is a cybersecurity solution that protects workers and data from cybersecurity criminals that target email, social media and mobile devices. | Email Security | Users |
![]() |
Proxmox Virtual Environment (VE) | Proxmox Virtual Environment (VE) is an open source server virtualization management solution based on QEMU/KVM and LXC. | Virtualization | Devices |
![]() |
Pulse Connect Secure | Pulse Connect Secure provides zero trust secured access from any device to applications and services in the cloud and data center. | Networking | Users |
![]() |
Puppet | Puppet is an open-source software configuration management tool. | Config/Patch Mgmt | Devices |
![]() |
Pure Storage Pure1 | Pure Storage Pure1 is a cloud-based storage management solution that provides self-driving storage, data-storage management, and monitoring. | Storage Management | Devices |
![]() |
Qualys Cloud Platform | Qualys Cloud Platform monitors customers' global security and compliance posture using sensors. | VA Tool | Devices |
![]() |
Quest KACE Endpoint Systems Management Appliances | Quest KACE Endpoint Systems Management Appliances provision, manage, secure, and service network-connected devices. | Networking | Devices |
![]() |
Rancher | Rancher is an open-source multi-cluster orchestration platform that enables operations teams to deploy, manage, and secure enterprise Kubernetes. | Containers | Devices |
![]() |
Randori | Randori is an attack platform which combines continuous reconnaissance, real-time target analysis, and the ability to safely execute attacks on-demand to provide an attacker’s perspective. | Cyber Intelligence | Devices |
![]() |
Rapid7 Nexpose and InsightVM | Rapid7 Nexpose is an on-premise vulnerability management solution, providing discovery, detection, verification, risk classification, impact analysis, reporting and mitigation. Rapid7 InsightVM is a cloud-based vulnerability management solution that combines Rapid7’s Insight platform along with Nexpose core capabilities. | VA Tool | Devices |
![]() |
Rapid7 Nexpose Warehouse | Rapid7 Nexpose Warehouse fetches device information directly from an external data warehouse. | VA Tool | Devices |
![]() |
Red Canary | The Red Canary suite includes products that record telemetry, detect and investigate threats, and automate remediation. | EDR/EPP | Devices |
![]() |
Red Hat Ansible Tower | Red Hat Ansible Tower is a web console and REST API for operationalizing Ansible across teams, organizations, and the enterprise. | ITAM/ITSM | Devices |
![]() |
Red Hat Satellite | Red Hat Satellite is a system management solution used to deploy, configure, and maintain systems across physical, virtual, and cloud environments. | Config/Patch Mgmt | Devices |
![]() |
RedSeal | RedSeal’s network modeling and risk scoring platform models customers' entire hybrid data center of public cloud, private cloud and physical network. | Networking | Devices |
![]() |
Remediant SecureONE (JITA) | Remediant SecureONE is a Just-In-Time Privileged Access Management (JITA) solution that enables control and insight over the distribution, usage, and protection of privileged access across enterprise environments. | IAM | Devices |
![]() |
RescueAssist (GoToAssist) | RescueAssist (formerly GoToAssist) is a cloud-based toolset for IT and customer support teams including remote support, IT monitoring, and service desk management. | IT Agent, Ticketing | Devices |
![]() |
RiskSense | RiskSense provides vulnerability prioritization and management to dynamically control and measure cybersecurity risk. | VA Tool | Devices |
![]() |
RiskIQ Digital Footprint | RiskIQ Digital Footprint software provides an active, comprehensive inventory of all of the organization’s IPs, domains, and hosts. | Attack Surface Mgmt | Devices |
![]() |
Riverbed SteelCentral Controller (SCC) | Riverbed SteelCentral Controller SCC facilitates administration tasks for groups of SteelHeads, Interceptors, Mobile Controller, Cores, and Edges. | Networking, AppSec | Devices |
![]() |
RSA Archer | RSA Archer is an integrated risk management platform for managing multiple dimensions of risk, including IT, operational, third-party, resiliency, and compliance risk. | Risk Management | Devices, Users |
![]() |
Rumble Network Discovery | Rumble is a cloud-based network discovery platform that identifies and monitors network-connected IT assets. | Networking | Devices |
![]() |
Sal | Sal is an open-source reporting solution for managed endpoints. | MDM/EMM | Devices |
![]() |
SaltStack Open Source | SaltStack Open Source is open-source software for event-driven security, cloud and configuration management. | SOAR, Config/Patch Mgmt | Devices |
![]() |
SaltStack Enterprise | SaltStack Enterprise intelligent automation delivers event-driven security, cloud and configuration management. | SOAR, Config/Patch Mgmt | Devices |
![]() |
SolarWinds Service Desk (Samange) | SolarWinds Service Desk (formerly Samange) is a unified, cloud-based IT service desk and asset management platform. | Ticketing, CMDB | Users |
![]() |
ScopNET | ScopNET provides an agent-free solution for the prevention of unauthorized access to corporate networks, integrating switches, routers and firewalls to detect alien devices. | NAC | Devices |
![]() |
Secdo Endpoint Protection | Secdo Endpoint Protection automates endpoint forensic analysis and cyber investigations for security teams. | EDR/EPP | Devices |
![]() |
Secureworks Red Cloak | Secureworks Red Cloak is an endpoint detection and response technology that continuously monitors endpoints for signs of adversary activity. | EDR/EPP | Devices |
![]() |
Secureworks Red Cloak Threat Detection and Response (TDR) | Secureworks Red Cloak Threat Detection and Response (TDR) is a Software as a Service (SaaS) solution that provides security intelligence analytics to data consumed by third-party applications. | Cyber Intelligence | Devices |
![]() |
Sensu | Sensu is a cloud monitoring solution that provides monitoring workflows automation and visibility into multi-cloud environments. | Could Mgmt | Devices |
![]() |
SentinelOne | SentinelOne is an endpoint protection solution including prevention, detection, and response. | EDR/EPP | Devices |
![]() |
ServiceNow | ServiceNow provides service management software as a service, including IT services management (ITSM), IT operations management (ITOM) and IT business management (ITBM). | CMDB, Ticketing | Devices, Users |
![]() |
Sevone Data Platform | SevOne Data Platform is a network and infrastructure management platform that provides monitoring and analytics. | Networking | Devices |
![]() |
Shodan | Shodan is a search engine for Internet-connected devices. | IoT | Devices |
![]() |
Signal Sciences | Signal Sciences is a web protection platform that protects on-premise, multi-cloud and hybrid-cloud apps, within containers and serverless functions. | AppSec | Devices |
![]() |
Skybox Firewall Assurance | Skybox Firewall Assurance provides automation of firewall management tasks across different firewall vendors and complex rulesets. | Firewall | Devices |
![]() |
Slack | Slack is a chat and collaboration hub used to connect people, information, tools, and services. | Collaboration | Users |
![]() |
Snipe-IT | Snipe-IT is a free, open source IT asset management system written in PHP. | ITAM/ITSM | Devices |
![]() |
Snow Software Asset Management | Snow Software provides Software Asset Management (SAM) products and services to reduce the risk, cost, and complexity associated with software assets and licensing. | ITAM/ITSM | Devices |
![]() |
SolarWinds Network Performance Monitor | SolarWinds Network Performance Monitor is a unified IT systems management system that tracks the performance of networks, applications, systems, and databases on-premises, in a hybrid environment, or in the cloud. | ITAM/ITSM | Devices |
![]() |
SonicWall | SonicWall next-generation firewalls (NGFW) provide security, control, and visibility to maintain an effective cybersecurity posture. | Firewall | Devices |
![]() |
Sophos Central | Sophos Central is a unified console that provides one place to manage Sophos products, including: endpoint, mobile, encryption, web, email, server, and wireless security. | EDR/EPP | Devices |
![]() |
Sophos Cloud Optix | Sophos Cloud Optix is a public cloud visibility and threat response solution that detects, responds, and prevents cloud security and compliance gaps. | Cloud Security | Devices, Users |
![]() |
Sophos Endpoint Protection | Sophos Endpoint Protection helps secure workstations by adding prevention, detection, and response technology on top of the operating system. | EDR/EPP | Devices |
![]() |
SOTI MobiControl | SOTI MobiControl is a software system for managing mobile devices in the enterprise. | MDM/EMM | Devices |
![]() |
Spacewalk | Spacewalk is an open-source systems management solution for system provisioning, patching and configuration. | Config/Patch Mgmt | Devices |
![]() |
Specops Inventory | Specops Inventory collects and reports information on hardware, software, registry, user settings, operating system, security data, and Active Directory data. | IT Agent | Devices |
![]() |
Spiceworks | Spiceworks provides network monitoring to capture, analyze, and monitor network traffic. | Networking | Devices |
![]() |
Splunk | Splunk captures, indexes, and correlates real-time data in a searchable repository. | SIEM | Devices |
![]() |
SQLite | The SQLite adapter imports device information from an SQLite database. | CMDB | Devices, Users |
![]() |
SQL Server | The SQL Server adapter imports device information from arbitrary SQL servers: Microsoft SQL Server, MySQL and PostgreSQL. | CMDB | Devices, Users |
![]() |
Sumo Logic | Sumo Logic is a cloud-based service for logs & metrics management for modern apps. | Cloud Mgmt | Devices, Users |
![]() |
Symantec Cloud Workload Protection (CWP) | Symantec Cloud Workload Protection (CWP) automates security policy enforcement to protect public cloud workloads. | Config/Patch Mgmt, EDR/EPP | Devices |
![]() |
Symantec Control Compliance Suite (CCS) | Symantec Control Compliance Suite (CCS) is a solution to help identify security gaps and vulnerabilities and automate compliance assessments for over 100 regulations, mandates, and best practice frameworks including GDPR, HIPAA, NIST, PCI and SWIFT. Symantec CCS discovers and inventories all networks and assets including managed and unmanaged devices allowing for assets to be profiled and ranked for risk potential. | VA Tool | Devices |
![]() |
Symantec Data Center Security (DCS) Server Advanced | Symantec Data Center Security Server Advanced delivers security detection, monitoring, and prevention capabilities for both physical and virtual server infrastructures. | Data Security | Devices |
![]() |
Symantec DLP | Symantec DLP is a data loss protection and prevention solution. Its management console, the DLP Enforce Platform, and its reporting tool, IT Analytics for DLP, allows writing and enforce policies to reduce information risks. | DLP | Devices |
![]() |
Symantec Endpoint Detection and Response (EDR) | Symantec Endpoint Detection and Response (EDR) detects, protects, and responds to threats to the organization's network. | EDR/EPP | Devices |
![]() |
Symantec Endpoint Encryption | Symantec Endpoint Encryption combines full-disk and removable media encryption with centralized management to protect sensitive information and ensure regulatory compliance. | Encryption | Devices |
![]() |
Symantec Endpoint Management Suite (Altiris) | Symantec Endpoint Management Suite (formerly Altiris) manages, patches, and remediates application and OS configurations on desktops, laptops and servers to strengthen endpoint security and maximize user productivity. | ITAM/ITSM, Config/Patch Mgmt | Devices |
![]() |
Symantec Endpoint Protection 12.x | Symantec Endpoint Protection manages events, policies, and registration for the client computers that connect to customer networks. | EDR/EPP | Devices |
![]() |
Symantec Endpoint Protection 14.x | Symantec Endpoint Protection manages events, policies, and registration for the client computers that connect to customer networks. | EDR/EPP | Devices |
![]() |
Symantec Endpoint Protection Cloud | Symantec Endpoint Protection Cloud unifies threat protection and device management for PC, Mac, mobile devices, and servers to protect endpoints from ransomware, zero-day threats, and other sophisticated attacks. | EDR/EPP | Devices |
![]() |
SysAid | SysAid is an integrated ITSM, Service Desk and Help Desk software solution. | ITAM/ITSM, Ticketing | Devices |
![]() |
Tanium Asset | Tanium Asset provides an inventory of hardware and software assets including servers, laptops, and desktops for thorough insight. | ITAM/ITSM, Config/Patch Mgmt | Devices |
![]() |
Tanium Discover | Tanium Discover scans for unmanaged assets with almost no impact on the network. | ITAM/ITSM, Config/Patch Mgmt | Devices |
![]() |
Tanium Interact | Tanium Interact lets you ask questions to gather live endpoint data in order to create an up-to-date inventory of hardware and software assets. | ITAM/ITSM, Config/Patch Mgmt | Devices |
![]() |
Tanium System Status | Tanium System Status provides an inventory of all clients that have registered with the Tanium platform. | ITAM/ITSM, Config/Patch Mgmt | Devices |
![]() |
Tenable Nessus | Tenable Nessus is a vulnerability scanning platform for auditors and security analysts. | VA Tool | Devices |
![]() |
Tenable Nessus CSV File | Tenable Nessus CSV File Adapter imports device information from vulnerability scan data. | VA Tool | Devices |
![]() |
Tenable.io | Tenable.io automatically discovers and assesses a customer's environment for vulnerabilities, misconfigurations, and other cybersecurity issues. | VA Tool | Devices |
![]() |
Tenable.sc (SecurityCenter) | Tenable.sc (formerly SecurityCenter) consolidates and evaluates vulnerability data, prioritizing security risks. | VA Tool | Devices |
![]() |
Threat Stack | Threat Stack is a provider of cloud security management and compliance solutions. | Cloud Security | Devices |
![]() |
Thycotic Secret Server | Thycotic Secret Server is a Privileged Access Management (PAM) solution for protecting your privileged accounts, available both on premise or in the cloud. | PAM | Users |
![]() |
Torii | Torii is a SaaS Management Platform letting IT professionals discover, optimize, and control SaaS usage and costs. | SaaS Mgmt | Users |
![]() |
Trend Micro Apex One (OfficeScan) | Trend Micro Apex One (formerly OfficeScan) is an endpoint security solution protecting against malware, scripts, injection, ransomware, memory and browser attacks, and exploits. | EDR/EPP | Devices |
![]() |
Trend Micro Cloud App Security | Trend Micro Cloud App Security provides threat and data protection for cloud applications and services such as Google G Suite, Dropbox, Microsoft 365, and more. | Cloud Security | Users |
![]() |
Trend Micro Deep Security | Trend Micro Deep Security can automatically virtually patch server, cloud, VDI and application vulnerabilities. | Config/Patch Mgmt, EDR/EPP | Devices |
![]() |
Tripwire Enterprise | Tripwire Enterprise is a security configuration management (SCM) suite that provides fully integrated solutions for policy, file integrity and remediation management. | Config/Patch Mgmt, EDR/EPP | Devices |
![]() |
TrueFort | TrueFort offers application behavior analytics, control, and protection. | AppSec | Devices |
![]() |
Twistlock | Twistlock provides container and cloud native cybersecurity for teams using Docker, Kubernetes, serverless, and other cloud native technologies. | Containers | Devices |
![]() |
Ubiquiti Networks UniFi Controller | The UniFi Controller is a wireless network management software solution for managing multiple wireless networks using a web browser. | Networking | Devices |
![]() |
UKG Pro (Ultimate Software UltiPro) | UKG Pro (formerly Ultimate Software UltiPro) is cloud-based human capital management (HCM) software. | HCM | Users |
![]() |
UpGuard CyberRisk | UpGuard CyberRisk provides third-party vendor risk and external cyber risk monitoring. The platform has two main modules: UpGuard BreachSight which monitors company external risk posture and Vendor Risk monitors and helps manages the risk posture of third party vendors. | Cyber Intelligence | Devices |
![]() |
Uptycs | Uptycs is an osquery-powered security analytics platform pairs a universal agent with analytics for fleet visibility, intrusion detection, incident investigation, vulnerability management & compliance for Linux, macOS, Windows, containers, and cloud workloads. | UEM | Devices |
![]() |
Vectra AI | Vectra AI is a cybersecurity platform that uses AI to detect and respond to cyberattacks. | Networking | Devices |
![]() |
Venafi | Venafi secures and protects cryptographic keys and digital certificates. | Certificate Managment, Data Security | Devices |
![]() |
VMware Carbon Black App Control (Carbon Black CB Protection) | VMware Carbon Black App Control (formerly Carbon Black CB Protection) protects critical systems and servers to prevent unwanted changes and ensure continuous compliance with regulatory mandates. | EDR/EPP | Devices |
![]() |
VMware Carbon Black Cloud (Carbon Black CB Defense) | VMware Carbon Black Cloud (formerly Carbon Black CB Defense) is a cloud native platform delivering next-generation antivirus and endpoint detection and response. This adapter is also compatible with Carbon Black Cloud Enterprise EDR (formerly CB ThreatHunter) and Carbon Black Cloud Audit and Remediation (formerly CB LiveOps). | EDR/EPP | Devices |
![]() |
VMware Carbon Black EDR (Carbon Black CB Response) | VMware Carbon Black EDR (formerly Carbon Black CB Response) is a threat hunting and incident response solution that delivers continuous visibility in offline, air-gapped, and disconnected environments using threat intel and customizable detections. | EDR/EPP | Devices |
![]() |
VMWare ESXi and vSphere | VMware ESXi is an enterprise-class, type-1 hypervisor for deploying and serving virtual computers. VMware vSphere is VMware's cloud computing virtualization platform. | Virtualization | Devices |
![]() |
VMware Horizon | VMware Horizon is a platform for secure delivery of virtual desktops and apps across the hybrid cloud. | Virtualization | Devices |
![]() |
VMware vCloud Director | VMware vCloud Director is a cloud service-delivery platform. | Cloud Mgmt | Devices |
![]() |
VMware vRealize Operations (vROps) | VMware vRealize Operations (vROps) delivers an IT operations management platform for private, hybrid, and multi-cloud environments that covers the physical, virtual and cloud infrastructure, including VMs and containers. | Cloud Infra | Devices |
![]() |
VMware Workspace ONE (Airwatch) | VMWare Workspace ONE (formerly AirWatch) provides enterprise mobility management (EMM) software and standalone management systems for content, applications, and email. | MDM/EMM, UEM | Devices |
![]() |
Wazuh | Wazuh is a free, open source and enterprise-ready security monitoring solution for threat detection, integrity monitoring, incident response and compliance. | EDR | Devices |
![]() |
Webroot Endpoint Protection | Webroot Endpoint Protection protects against threats across email, browsers, files, URLs, ads, apps, and more. | EDR/EPP | Devices |
![]() |
Web Server Information | Web Server Information provides information about the web server for a given website domain, including the server type, its version and operating system, the content management system (CMS) name and its version, the installed CMS plugins, versions and more. | ITAM/ITSM | Devices |
![]() |
Windows DHCP Server | Windows DHCP Server is a networking server used to lease IP addresses and manage other configuration information. | Networking | Devices |
![]() |
Windows Management Instrumentation (WMI) | Windows Management Instrumentation (WMI) is a set of specifications from Microsoft for consolidating the management of devices and applications in a Windows network. WMI provides users with information about the status of local or remote computer systems. | ITAM/ITSM | Devices |
![]() |
Windows Server Failover Clustering (WSFC) | Windows Server Failover Clustering (WSFC) is a feature of the Windows Server platform for improving the high availability (HA) of applications and services. WSFC is the successor to Microsoft Cluster Service (MSCS). | Cluster Management | Devices |
![]() |
Windows Server Update Services (WSUS) | Windows Server Update Services (WSUS), previously Software Update Services (SUS), enables administrators to manage the distribution of updates and hotfixes released for Microsoft products. | Config/Patch Mgmt | Devices |
![]() |
Workday | Workday offers software solutions for financial management, human resources, and planning. | ERP | Users |
![]() |
Zabbix | Zabbix is an open source monitoring software tool for networks, servers, virtual machines and cloud services. | Cloud Mgmt | Devices |
![]() |
Zerto | Zerto is a data loss protection solution that provides disaster recovery, backup and workload mobility software for virtualized infrastructures and cloud environments. | DLP | Devices |
![]() |
Zoom | Zoom is a remote conferencing service that provides video conferencing, online meetings, chat, and mobile collaboration. | Remote Conferencing | Devices, Users |
![]() |
Zscaler Web Security | Zscaler Web Security is a secure Internet and web gateway service that stops malware, advanced threats, phishing, browser exploits, malicious URLs, botnets, and more. | Secure Web Gateways | Devices, Users |
Was This Article Helpful?