Adapters List
  • 05 Dec 2022
  • 57 Minutes to read
  • Dark
    Light
  • PDF

Adapters List

  • Dark
    Light
  • PDF

To aggregate and correlate asset data, Axonius securely fetches data from your IT, Security, and business solutions using pre-built integrations with hundreds of security and management solutions, known as adapters.

The table below describes each of the adapters supported. Use the Search box to search for adapters, and to filter the display by 'Solution Categories' and 'Types of Assets Fetched'.

For details about connecting adapters, see the Adapters Page.

For a complete list of Axonius SaaS Management supported adapters, see Axonius Adapters - Axonius SaaS Management and filter by Axonius SaaS Management.


Adapter LogoAdapter NameDescriptionSolution CategoriesTypes of Assets Fetched
one_e_adapter1E Tachyon1E Tachyon is a remote endpoint management solution built on a single agent for speed, visibility, and control of all endpoints.UEM, MDM/EMMDevices
absolute_adapterAbsoluteAbsolute specializes in software to manage and secure Windows computers and Android smartphones.EDR/EPP, MDM/EMMDevices
Acunetix_logoAcunetix
Acunetix is an automated web application security testing tool that checks for vulnerabilities like SQL Injection, Cross-site scripting, and other exploitable vulnerabilities.
AppSecDevices, Users
adaptive_shield_adapter.pngAdaptive ShieldAdaptive Shield is a security posture management platform used to help businesses manage their cloud services.Cloud Security, CloudUsers
Admin by Request

Admin By Request provides centralized and auditable management of local admin rights.

PAMDevices, Users
Adobe_Experience_Cloud_logo_RGBAdobe Workfront
Adobe Workfront is work and project management software for enterprise resource management, cross-team collaboration, and strategic planning.
CollaborationUsers
adp_adapterADPADP is a provider of human resources management software and services.HR, IAMUsers
adp_adapter
ADP Vantage HCM
ADP Vantage HCM is an all-in-one HR platform that includes payroll, benefits, and talent management administration.
HRUsers
Aha!_(company)-Logo.wineAha!
Aha! is a platform enabling customers to build roadmaps, manage projects and development.
Collaboration, TicketingUsers
Airlock Digital
Airlock Digital is an application whitelisting software provider.EDR/EPP, Data SecurityDevices
AirtableAirtable is a spreadsheet-database hybrid serving as a low-code platform for building collaborative apps.CollaborationUsers
Akamai_logoAkamai App and API Security
Akamai App and API Security provides protection against web application attacks including SQL injections, cross-site scripting, and remote file inclusion.
AppSec, FirewallDevices
alcide_adapterAlcideAlcide provides cloud and Kubernetes discovery, K8s audit and compliance scanner, microservices anomaly detection and security policies management and enforcement.Cloud Security, CloudDevices
alertlogic_adapterAlert LogicAlert Logic provides vulnerability and asset visibility, endpoint protection, threat detection, incident management, and a web application firewall.EDR/EPPDevices
alertlogic_adapterAlert Logic MDRAlert Logic delivers managed detection and response (MDR) with comprehensive coverage for public clouds, SaaS, on-premises, and hybrid environments.EDR/EPP, NDRDevices
alibaba_adapterAlibaba CloudAlibaba Cloud provides cloud computing services and cloud Infrastructure as a service.Cloud Infra, CloudDevices
 Amazon Web Services (AWS)Amazon Web Services (ECS/EKS/EC2) includes the high-performance container orchestration service that supports Docker containers and containerized applications on AWS, Kubernetes Management Infrastructure across Multiple AWS Zones, as well as the EC2 instances themselves.Cloud Infra, CloudDevices, Users
apachecloudstack-logoApache CloudStackApache CloudStack is open-source software used to deploy and manage large networks of virtual machines.Infra Monitoring, VirtualizationDevices
Apple-logoApple Business Manager
Apple Business Manager supports deployment and remote MDM enrollment of corporate-owned Apple devices.
MDM/EMM, RMMDevices
Appneta_logoAppNeta
AppNeta provides monitoring of network paths, flows, packets, and web applications.
Networking, RMMDevices
aqua_adapterAqua SecurityAqua Security provides container and cloud native cybersecurity for teams using Docker, Kubernetes, serverless, and other cloud native technologies.Containers, CloudDevices
arista-cloudvisionArista CloudVisionCloudVision Portal (CVP) is the web-based GUI for the CloudVision platform, which enables network-wide workload orchestration and workflow automation.NetworkingDevices
arista_eos_adapterArista Extensible Operating System (EOS)Arista Extensible Operating System (EOS) is the core of Arista cloud networking solutions for next-generation data centers and cloud networks.NetworkingDevices
image.pngArmisArmis is an agentless IoT security solution that lets enterprises see and control any device or network.IoT Devices
aruba_adapterArubaAruba connects to Aruba switches and routers.NetworkingDevices
airwave_adapterAruba AirWaveAruba AirWave is a network management system for wired and wireless infrastructure and provides granular visibility into devices, users, and applications on the network.NetworkingDevices
aruba_central_adapterAruba CentralAruba Central is a unified cloud-based network operations, assurance and security platform that simplifies the deployment, management, and optimization of wireless, wired and WAN environments.NetworkingDevices
clearpass_adapterAruba ClearPassAruba ClearPass is a network access control (NAC) solution that allows enterprises to identify devices, enforce policies, and remediate threats.NAC Devices
aruba_central_adapter
Aruba Mobility Master
Aruba Mobility Master enables deployment and management of up to 1,000 Mobility Controllers to scale large deployments. Integrate Aruba Mobility Master with the Axonius Cybersecurity Asset Management Platform.
NetworkingDevices
asanaAsana
Asana is a web and mobile work management platform designed to help teams organize, track, and manage their work.
CollaborationUsers
AssetPandaAssetPanda is a cloud-based asset tracking and management platform.ITAM/ITSMDevices
Assure1 by FederosFederos Assure1 is an automated service assurance platform for operational intelligence. It collects and normalizes performance-related information, allowing users to monitor and manage critical networks and services.Infra MonitoringDevices
atera_adapterAteraAtera is a cloud-based remote monitoring and management (RMM) platform for MSPs and IT professionals.ITAM/ITSM, RMMDevices
aternity_adapterAternityAternity is a device performance monitoring solution that provides insights into performance and health of laptops, desktops, VDI, and mobile devices, along with self-healing capabilities to automatically resolve issues.ITAM/ITSM, Config Mgmt.Devices
jira_adapterAtlassian Jira Assets PlatformAtlassian Jira Assets Platform links software with Jira to populate an asset inventory, letting users query for assets and link them to issues.ITAM/ITSMDevices
Atlassian Jira Service Desk
Jira Service Desk enables to receive, track, manage, and resolve requests from customers.ITAM/ITSMDevices
Atlassian_jira_software_adapterAtlassian Jira SoftwareAtlassian Jira Software is a work management tool for various use cases, from requirements and test case management to agile software development.DevOpsUsers
Attivo_logoAttivo BOTSinkAttivo BOTSink offers network-based threat deception for post-compromise threat detection.DeceptionDevices
automox_adapterAutomoxAutomox is a cloud-based patch and configuration management solution for Windows, Linux, Mac, and third-party software.Config Mgmt.Devices
auvik_adapterAuvikAuvik is an IT asset and network monitoring solution for managing entire network infrastructures, including physical servers, data centers, workstations and more.NetworkingDevices
Aviatrix_logoAviatrix
The Aviatrix cloud network platform delivers a single platform for multi-cloud networking, security, and operational visibility.
Cloud Mgmt.Devices
Avi Networks_logoAvi Networks
Avi Networks (now part of VMware) delivers multi-cloud application services used for load balancing, web application firewall and container ingress.
Cloud Infra, Cloud Mgmt.Devices
awake_adapterAwake SecurityAwake Security is a network traffic analysis solution that's capable of detecting and visualizing behavioral, mal-intent and compliance incidents.NetworkingDevices
image.pngAxonius UsersThe Axonius Users adapter fetches users with Axonius credentials and their permissions using our API client.ITAM/ITSMUsers
Azure Classic VMsMicrosoft Azure is a cloud computing service created by Microsoft for building, testing, deploying, and managing applications and services through a global network of Microsoft-managed data centers. This adapter fetches information for classic VMs (deprecated by Microsoft).Cloud Infra, VirtualizationDevices
download (2)Azure Defender for IoTAzure Defender for IoT is a solution for asset discovery, vulnerability management, and threat detection for Internet of Things (IoT) and operational technology (OT) devices.OT/IoT Devices
azure_devops_adapter)Azure DevOpsAzure DevOps is a Microsoft product that provides version control, reporting, requirements management, project management, automated builds, testing and release management capabilities.DevOpsUsers
bamboohr_adapterBambooHRBambooHR is HR software used to collect, maintain, and analyze data for hiring, onboarding employees, and managing company culture.HR, IAMUsers
baramundi_adapterbaramundibaramundi provides organizations with cross-platform management of networked endpoints in IT and manufacturing environments.UEM, MDM/EMMDevices
fyde_vpn_adapterBarracuda CloudGen Access (Fyde)Barracuda CloudGen Access (formerly Fyde) provides granular access for enterprise apps and workloads, and continuously monitors access requests to enforce policy controls.IAMDevices, Users
BeyondTrust Cloud Privilege Manager
BeyondTrust Cloud Privilege Manager delivers privilege management and application control, allowing organizations to eliminate admin rights across the entire business and enforce least privilege.
PAM, Cloud SecurityDevices, Users
BeyondTrust Insight SQLBeyondTrust Insight SQL provides discovery, management, auditing, and monitoring for any privileged credential.PAMDevices
beyond_trust_adapterBeyondTrust Password SafeBeyondTrust Password Safe provides discovery, management, auditing, and monitoring for any privileged credential.PAM, IAMDevices, Users
beyond_trust_adapterBeyondTrust Privilege Management for WindowsBeyondTrust Privilege Management for Windows delivers privilege management and application control, allowing organizations to eliminate admin rights across the entire business and enforce least privilege.PAM, IAMDevices, Users
beyond_trust_privileged_identity_adapterBeyondTrust Privileged Identity (Lieberman RED Identity Management)BeyondTrust Privileged Identity (formerly Lieberman RED Identity Management) is a password management solution that helps companies secure, manage, and administer credentials for privileged users and IT vendors.PAM, IAMUsers
bomgar_adapterBeyondTrust Remote Support (Bomgar)BeyondTrust Remote Support (formerly Bomgar) allows support technicians to remotely connect to end-user systems through firewalls from their computer or mobile devices.IT Agent, Config Mgmt.Devices
bigid_adapterBigIDBigID is data security solution that provides enterprise protection and privacy of personal data.Data SecurityDevices
Bionic_adapter.pngBionic Bionic is an agentless platform that helps teams to manage, operate and protect applications.AppSec, DevOpsDevices
BinaryEdgeBinaryEdge scans the public internet to create real-time threat intelligence streams and reporting.Cyber IntelligenceDevices
bitbucket logoBitbucketBitbucket is a web-based version control repository hosting service for source code and development projects that use either Mercurial or Git revision control systems.DevOpsDevices
bitdefender_adapterBitdefender GravityZone Business SecurityBitdefender GravityZone Business Security uses machine learning and heuristics to protect against malware, phishing, ransomware, exploits and zero-days.EDR/EPPDevices
bitfit_adapterbitFitbitFit is a business development and information technology company that collects all of your IT operations data and combines it into a unified cloud system.ITAM/ITSMDevices, Users
bitsight_security_ratings_adapterBitSight Security RatingsBitSight Security Ratings are a data-driven and dynamic measurement of an organization’s cybersecurity performance.Cyber IntelligenceDevices
blackberry_uem_adapterBlackBerry Unified Endpoint Management (UEM)BlackBerry Unified Endpoint Management (UEM) delivers endpoint management and policy control for devices and apps on-premise or in the cloud.EDR/EPP, MDM/EMM, UEMDevices
kitelogo1Black KiteBlack Kite provides cyber risk assessments that analyze the organization’s supply chain cybersecurity posture from three dimensions: technical, financial and compliance.Risk ManagementDevices
Block64 BlockBox

Block64 is an agentless, appliance-based asset management solution collecting data about assets across the network and using that to provide actionable insights.

ITAM/ITSMDevices
BloodHound_logoBloodHound
BloodHound is used to find relationships within an Active Directory (AD) domain to discover attack paths.
Attack Surface Mgmt.Devices
BloxOneBloxOne DDI delivers central control and automation of DNS, DHCP, and IP address management for hybrid and multi-cloud networks.Networking, IPAMDevices
bluecat_adapterBlueCat Enterprise DNSBlueCat Enterprise DNS connects all disparate DNS and DHCP with centralized management of all clients and critical assets.NetworkingDevices
Broadcom_logoBlueCoat ProxySG
Edge Secure Web Gateway (BlueCoat ProxySG) from Broadcom provides URL filtering, central policy management, and security against malware attacks.
Secure Web GatewaysDevices
bmc_atrium_adapterBMC Atrium ADDMBMC Atrium ADDM is a digital enterprise management solution that automates application discovery and dependency mapping.CMDB, ITAM/ITSMDevices
bmc_atrium_adapterBMC Atrium CMDBBMC Atrium CMDB stores information about the configuration items (CIs) in your IT environment and the relationships between them.CMDB, ITAM/ITSMDevices
bmc_atrium_adapter
BMC Atrium CMDB onPrem
BMC Atrium CMDB stores information about the configuration items (CIs) in your IT environment and the relationships between them.
CMDBDevices
bmc_truesight_adapterBMC TrueSight Automation for ServersTrueSight Automation for Servers automates vulnerability management, patching, compliance, configuration changes, software deployments, and service provisioning in the data center and cloud.Config Mgmt.Devices
bmc_truesight_adapterBMC TrueSight Presentation ServerBMC TrueSight Presentation Server consumes data from various BMC TrueSight products to provide a consolidated set of views for monitoring the infrastructure, real and synthetic applications, and capacity planning.DevOpsDevices
box_adapterBox PlatformBox Platform provides data security, file sharing, collaborating, and content management tools. Box Platform provides access to Box APIs.Data SecurityUsers
Buildkite_iconBuildkite
Buildkite is a continuous integration tool designed to improve software developer productivity.
Software Development Version Control
Devices, Users
Burp SuiteBurp Suite is a penetration testing and vulnerability finder tool often used for checking web application security.Vulnerability Assessment ToolDevices
ca_cmdb_adapterCA Service ManagementCA Service Management is an IT service management (ITSM) solution that offers incident management and IT asset managementITAM/ITSM, CMDBDevices
ca_spectrum_adapterCA SpectrumCA Spectrum is a services and network infrastructure management system that enables the modeling of LAN, WAN, wired, wireless, physical, and virtual networksNetworkingDevices
Cato NetworksCato SASE is a cloud-native secure access service edge built on a full mesh topology, with over 65 global PoPs, and replaces the need for enterprises to route using MPLS.Firewall, Networking, Secure Web GatewaysDevices, Users
censys_adapterCensysCensys monitors infrastructure and discovers unknown assets across the Internet.IoT Devices
centrify_adapterCentrify Identity ServicesCentrify Identity Services manages application access, endpoints, and network infrastructure.IAMUsers
Ceridian DayforceCeridian Dayforce is an HR cloud platform that delivers payroll, benefits, workforce, and talent management.HRUsers
CFEngine_iconCFEngineCFEngine is a software development automated workflow solution.CollaborationDevices
ChangeGearChangeGear is an AI-powered IT service management platform.HRDevices
Check Point CloudGuardCheck Point CloudGuard automates governance across multi-cloud assets and services including security posture assessment, misconfiguration detection, and enforcement of security best practices and compliance frameworks.Cloud Infra, IAMDevices, Users
Check Point Harmony EndpointCheck Point Harmony Endpoint
Check Point Harmony Endpoint is a suite of endpoint protection products that include mobile, email, collaboration, and SASE security.
Attack Surface Mgmt., Email Security, NetworkingDevices
checkpoint_r80_adapterCheck Point InfinityCheck Point Infinity protects against cyber threats across networks, endpoint, cloud and mobile devices. This adapter supports the entire Infinity platform, including Check Point firewalls.EDR/EPP, Firewall Devices
checkmarx_adapterCheckmarx SAST (CxSAST)Checkmarx SAST (CxSAST) is a static application security testing solution used to identify security vulnerabilities in custom code. It is used by development, DevOps, and security teams to scan source code early in the SDLC, identify vulnerabilities, and provide actionable insights to remediate them.AppSec, DevOpsDevices
chef_adapterChefChef provides continuous automation for building, deploying, and managing infrastructure, compliance, and applications in legacy and hybrid environments.Config Mgmt.Devices, Users
Cherwell IT Service Management adapterCherwell IT Service ManagementCherwell IT Service Management is a service desk platform enabling automation for process workflows, supporting tasks, and related approvals.ITAM/ITSMDevices
Cherwell IT Service Management DatabaseCherwell IT Service Management DatabaseCherwell IT Service Management Database is a service desk platform enabling automation for process workflows, supporting tasks, and related approvals.ITAM/ITSMDevices
CIS_CAT_iconCIS CAT Pro
CIS CAT Pro is a tool for automating CIS Benchmark testing and reporting.
Risk ManagementDevices
cisco_adapterCiscoCisco connects to Cisco switches and routers.NetworkingDevices
cisco_amp_adapterCisco Advanced Malware Protection (AMP)Cisco Advanced Malware Protection (AMP) includes threat intelligence, sandboxing, and malware blocking to detect, contain, and remove malware.EDR/EPPDevices
Cisco Application Policy Infrastructure Controller (APIC)Cisco Application Policy Infrastructure Controller (APIC) is the main architectural component of Cisco ACI. It is the unified point of automation and management for the Cisco ACI fabric, policy enforcement, and health monitoring and optimizes performance and agility.NetworkingDevices
cisco_dna_adapterCisco DNA CenterCisco DNA Center is a software-based network automation and assurance solution.NetworkingDevices
cisco_firepower_management_center_adapterCisco Firepower Management CenterCisco Firepower Management Center provides management over firewalls, application control, intrusion prevention, URL filtering, and advanced malware protection.NetworkingDevices
cisco_ise_adapterCisco Identity Services Engine (ISE)Cisco Identity Services Engine (ISE) is a network administration product that enables the creation and enforcement of security and access policies for endpoint devices connected to the company’s routers and switches.IAMDevices
Cisco Intersight
Cisco Intersight is a cloud operations platform that consists of optional, modular capabilities of infrastructure, workload optimization, and Kubernetes services.
Cloud Infra, Cluster ManagementDevices
cisco_meraki_adapterCisco MerakiCisco Meraki solutions include wireless, switching, security, EMM, communications, and security cameras, all centrally managed from the web.NetworkingDevices
cisco_prime_adapterCisco PrimeCisco Prime offers a suite of tools to automate the management of wired and wireless Cisco networks.NetworkingDevices
cisco_security_manager_adapter(1)Cisco Security ManagerCisco Security Manager provides policy enforcement and rapid troubleshooting of security events, offering summarized reports across the security deployment.NetworkingDevices
cisco_stealthwatchCisco StealthwatchCisco Stealthwatch is an agentless malware detection solution that provides visibility and network traffic security analytics across the extended network, including endpoints, branch, data center, and cloud.NetworkingDevices
Cisco Smart Net Total Care (SNTC)Cisco Smart Net Total Care is a smart services assistant providing hardware, web, and mobile support to enable efficient operations.NetworkingDevices
cisco_ucsm_adapterCisco UCS ManagerCisco UCS Manager supports the entire Cisco UCS server and Cisco HyperFlex Series hyperconverged infrastructure portfolios. It enables server, fabric, and storage provisioning, as well as device discovery, inventory, configuration, diagnostics, monitoring, fault detection, auditing, and statistics collection.NetworkingDevices
cisco_umbrella_adapterCisco UmbrellaCisco Umbrella is a secure internet gateway in the cloud, including DNS and IP layer enforcement and command and control callback blocking.NetworkingDevices
cisco_ucm_adapterCisco Unified Communications ManagerCisco Unified Communications Manager provides secure and manageable call control and session management.IoT Devices
cisco_webex_adapterCisco WebexCisco Webex is an enterprise solution for video conferencing, online meetings, screen share, and webinars. Web conferencing, cloud calling and equipment.Remote ConferencingDevices, Users
Citrix ADCCitrix ADC is an application delivery and load balancing solution for monolithic and microservices-based applications.Networking, DevOpsDevices
Citrix DaaS
Citrix DaaS (device as a service) is a cloud-based solution that allows companies to securely deliver DaaS and VDI apps and desktops to any device, over any network.
VirtualizationDevices
Citrix DirectorCitrix Director is a web-based monitoring console for Citrix XenApp and XenDesktop virtualization platforms that allows administrators to control and monitor virtual applications and desktops.Virtualization, ITAM/ITSM, Cloud, DevOps, Devices, Users
Citrix Endpoint Management (XenMobile)Citrix Endpoint Management (formerly XenMobile) is a solution for managing endpoints, offering mobile device management (MDM) and mobile application management (MAM) capabilities.UEM, MDM/EMMDevices
Citrix ShareFile

ShareFile is a secure content collaboration, file sharing, and sync software.

CollaborationUsers
claroty_adapterClarotyClaroty discovers assets and monitors communication patterns for ICS networks.OT Devices
image.pngCloudHealthCloudHealth is a cloud management platform to analyze and manage cloud cost, usage, security, and governance.Cloud Infra, CloudDevices
cloudfit.pngCloudfit CFSCloudFit CFS delivers managed, custom applications for cloud, hybrid, and on-premise environments.Cloud Infra, CloudDevices
cloudflare_adapterCloudflare DNSCloudflare DNS runs one of the largest DNS networks in the world.NetworkingDevices
cloudflare_adapter
CloudFlare Zero Trust
Deliver Zero Trust Network Access on CloudFlare's Edge.
Secure Web GatewaysDevices, Users
cloudpassage_adapterCloudPassage HaloCloudPassage Halo is a security automation platform providing visibility, protection, and continuous compliance monitoring for AWS and Azure deployments.Cloud Infra, CloudDevices
CoalfireOneCoalfireOne provides year-round visibility and proactive management of your compliance program.Risk Mgmt.Devices
CrashPlan_iconCode42 Incyder
Code42 Incyder (formerly Code42) is a next-gen DLP solution used to detect insider threats, satisfy regulatory compliance, and accelerate incident response investigations.
DLP, Data SecurityDevices, Users
cofense_phishme_adapterCofense PhishMeCofense PhishMe provides phishing awareness training and threat simulations for employees.Security Awareness, GRC, Email SecurityUsers
CohesityCohesity is a cloud data platform that provides a comprehensive range of data management services.Cloud Mgmt.Devices
commvault_adapterCommvaultCommvault enables data protection, backup and recovery, and information management solutions.Data SecurityDevices, Users
 ConfluentConfluent is a data streaming platform that enables you to easily access, store, and manage data as continuous, real-time streams.Data Security, Storage ManagementDevices, Users
ConnectWise Automate

ConnectWise Automate monitors, manages, and supports client networks. using out-of-the-box scripts, continuous monitoring, and automation capabilities.

RMM, Config/Patch MgmtDevices
image.pngContrast SecurityContrast Security protects software applications against cyberattacks.AppSec, DevOpsDevices
crowd_strike_adapterCrowdStrike FalconCrowdStrike Falcon delivers next-generation antivirus, endpoint detection and response (EDR), managed threat hunting, and threat intelligence.EDR/EPPDevices, Users
CrowdStrike Falcon Identity Protection (formerly Preempt)CrowdStrike Falcon Identity Protection (formerly Preempt)  lets organizations reduce user risk on their attack surface and preempt threats in real-time with Conditional Access. It continuously analyzes, adapts and responds to threats based on identity, behavior, and risk to resolve insider threats and targeted attacks.IAMDevices, Users
csc_adapterCSCDomainManagerCSCDomainManager is a web-based portfolio management platform consolidating domains alongside social media usernames, SSL digital certificates, and DNS.NetworkingDevices
csv_adapterCSVThe CSV adapter imports .csv files with inventory information including: devices and serial numbers, users, and installed software data.CMDB, ITAM/ITSMDevices, Users
cyberark_epm_adapterCyberArk Endpoint Privilege ManagerCyberArk Endpoint Privilege Manager enforces least privilege, providing credential theft protection and application control at scale.PAM, IAMDevices
cyberark_adapterCyberArk Privileged Account SecurityCyberArk Privileged Account Security provides privileged password management, session recording, least privilege enforcement, and privileged data analytics.PAM, IAMUsers
cybereason_adapterCybereason Deep Detect & RespondCybereason Deep Detect & Respond (EDR) defends against advanced attacks by collecting and analyzing behavioral data to identify suspicious activities.EDR/EPPDevices
cyberint-logoCyberint Argos EdgeCyberint Argos Edge is an attack surface management solution providing findings into the external attack surface, phishing threats, brand impersonation, and more.Attack Surface Mgmt, Cyber IntelligenceDevices
cycognitoCyCognito PlatformThe CyCognito platform delivers proactive attack surface protection and digital risk protection across your entire extended IT ecosystem to help you identify, categorize, prioritize and eliminate your attacker-exposed risk.Cyber IntelligenceDevices
cylance_adapterCylancePROTECTCylancePROTECT uses artificial intelligence to detect and protect against ransomware, advanced threats, fileless malware, and malicious documents.EDR/EPPDevices
Cymulate

Cymulate is a breach and attack simulation (BAS) platform that helps companies optimize security posture by testing internal and external defenses.

Cyber Intelligence, Attack Surface ManagementDevices
cynet_adapterCynet 360Cynet 360 is a detection and response security platform for finding, ranking, and remediating unknown, camouflaged threats.EDR/EPPDevices
darktrace_adapterDarktraceDarktrace Immune System protects workforce and data from sophisticated attackers, by detecting, investigating and responding to cyber-threats.Cyber Intelligence, EDR/EPPDevices
datadog_adapterDatadogDatadog is a monitoring service for cloud-scale applications, providing monitoring of servers, databases, tools, and services.Cloud Mgmt., CloudDevices
datto_rmm_adapterDatto RMM (Autotask Endpoint Management)Datto RMM (formerly Autotask Endpoint Management) is a cloud-based Remote Monitoring and Management (RMM) platform that provides device auditing, real-time monitoring, and automatic patching.EDR/EPP, Config Mgmt.Devices
DefenseStorm_imageDefenseStorm
DefenseStorm provides CyberSecurity, CyberCompliance and CyberFraud solutions specifically built for banking.
NDR, Risk ManagementDevices
Dell EMC AvamarDell EMC Avamar is a backup and recovery solution that enables daily backups of physical and virtual environments, NAS servers, enterprise applications, remote offices and desktops/laptops.DLP, Data SecurityDevices
Dell iDRAC

The Integrated Dell Remote Access Controller (iDRAC) is designed for secure local and remote server management and helps IT administrators deploy, update and monitor Dell EMC PowerEdge servers.

RMM, ITAM/ITSMDevices
Dell OpenManage EnterpriseDell OpenManage Enterprise is a one-to-many systems management console. It facilitates lifecycle management for Dell EMC PowerEdge servers in one console.Infra Monitoring, ITAM/ITSMDevices
Dell WYSE ManagementDell Wyse Management Suite is a cloud solution that enables an IT admin to securely manage Dell client devices.UEM, RMMDevices
DevoDevo is a cloud-native logging and security analytics solution that delivers real-time visibility for security and operations teams.SIEMDevices, Users
device42_adapterDevice42Device42 is a cloud-based CMDB for physical, virtual, and cloud servers and containers, network components, software, services, applications, and their relationships and dependencies.CMDB, ITAM/ITSMDevices
DigiCert CertCentralDigiCert CertCentralDigiCert CertCentral consolidates tasks for issuing, installing, inspecting, remediating, and renewing certificates.Certificate Mgmt. Devices
digicert_pki_platform_adapterDigiCert PKI Platform (Symantec Managed PKI)DigiCert PKI Platform (formerly Symantec Managed PKI) provides a cloud-based enterprise solution for issuing and managing digital certificates used to enable strong authentication and encryption.Certificate Mgmt. Devices
digitalguardiandlpDigital Guardian DLP
Digital Guardian DLP is a SaaS-based platform that provides data-loss prevention across Windows, Mac, and Linux systems and applications.
DLPDevices
digital_shadows_adapterDigital Shadows SearchLightDigital Shadows SearchLight is a digital risk protection solution that protects organizations against external risk exposure.Cyber IntelligenceDevices
divvycloud_adapterDivvyCloudDivvyCloud offers security, compliance, and governance guardrails for public and private cloud infrastructures.Cloud Mgmt., CloudDevices
dns_made_easy_adapterDNS Made EasyDNS Made Easy offers DNS management services.NetworkingDevices
DocuSignDocuSign helps organizations connect and automate how they prepare, sign, act on and manage agreements.AppSec, CollaborationUsers
domotzDomotzDomotz is network monitoring software.NetworkingDevices
dragos_platformDragos PlatformThe Dragos Platform identifies ICS network assets, malicious activity, and provides guidance to investigate incidents.OT, Network SecurityDevices
dropbox_adapterDropboxDropbox is a file hosting service that offers cloud storage, file synchronization, personal cloud, and client software.Cloud Mgmt., CloudDevices
druva_adapterDruva Cloud PlatformDruva Cloud Platform is a data protection as-a-service that provides management across all customer data sources that are scalable, predictable and on-demand.DLP, Data SecurityDevices
duo_adapterDuo BeyondDuo Beyond identifies corporate vs. personal devices, blocks untrusted devices, and give users secure access to internal applications.IAMUsers
dynatrace_adapterDynatraceDynatrace is a software intelligence platform providing application performance management and cloud infrastructure monitoring.Cloud Mgmt., CloudDevices, Users
ECI_logoECI FMAudit
ECI FMAudit is print management software that allows users to remotely monitor print environments and maintain visibility into their operations.
RMMDevices
EclypsiumEclypsiumEclypsium protects the foundation of the computing infrastructure, controlling risks and stopping threats to enterprise firmware and hardware devices.Firmware Security Devices
edgescan_adapteredgescanedgescan Fullstack Vulnerability Management is a cloud-based continuous vulnerability management and penetration testing solution that discovers, validates and rates vulnerabilities by running continuous asset profiling to detect rogue/exposed ports, hosts or even hidden API’s.VA ToolDevices
EfficientIP SOLIDserver DDI
EfficientIP SOLIDserver DDI suite is designed to deliver virtual and hardware appliances for critical DNS-DHCP-IPAM services.NetworkingDevices
elastic_search_adapterElasticsearchThe Elasticsearch adapter imports device information from an Elasticsearch database.CMDB, ITAM/ITSMDevices
endgame_adapterEndgameEndgame is an endpoint protection platform that combines on-line and off-line protection against exploits, phishing, malware, ransomware, and fileless attacks.EDR/EPPDevices
Eracent_logoEracent
Eracent provides IT asset management and software asset management solutions to help customers inventory assets and optimize licensing costs.
ITAM/ITSMDevices
ermetic-logoErmeticErmetic is a cloud infrastructure security platform, focusing on identity protection.Cloud SecurityDevices
eset_adapterESET Endpoint SecurityESET Endpoint Security is an anti-malware suite for Windows including web filtering, firewall, USB drive and botnet protection.EDR/EPPDevices
exabeam-logoExabeamExabeam is a cloud-based platform combining SIEM, threat detection, investigation, and response (TDIR) and XDR capabilities. Integrate Exabeam with the Axonius Cybersecurity Asset Management Platform.SIEMDevices
extra_hop_adapterExtraHop Reveal(x)ExtraHop Reveal(x) is a network detection and response (NDR) solution that provides visibility, real-time threat detection, and response.NDR Devices
extreme_networks_extreme_control_adapter
ExtremeCloud IQ
ExtremeCloud IQ enables management of wireless access points, switches, and routers.
NDRDevices
extreme_networks_extreme_control_adapterExtreme Networks ExtremeControlExtreme Networks ExtremeControl is a Network Access Control (NAC) solution that provides role-based access controls and reporting on user activity across all devices.NAC Devices
wing_adapterExtreme Networks ExtremeWireless WiNGExtreme Networks ExtremeWireless WiNG in a WLAN operating system designed to scale efficiently from the smallest networks to large, geographically dispersed deployments.NetworkingDevices
EzOfficeInventory

 EZOfficeinventory is a cloud-based asset tracking platform used for tracking physical and digital assets.

ITAM/ITSMDevices, Users
F-Secure Policy Manager
F-Secure Policy Manager provides a centralized management console for the security of the managed hosts in the network.UEM, MDM/EMMDevices
fsecure_adapterF-Secure Protection Service for Business (PSB)F-Secure Protection Service for Business (PSB) is a central management portal for managing VPN, mobile device management, software update management, workstation, and server security.UEM, MDM/EMM Devices
f5_icontrol_adapterF5 BIG-IP iControlF5 iControl is a Web services-enabled open API providing granular control over the configuration and management of F5's application delivery platform, BIG-IP.NetworkingDevices
f5_big_iq_adapterF5 BIG-IQ Centralized ManagementF5 BIG-IQ Centralized Management provides centralized management, licensing, monitoring, and analytics for BIG-IP infrastructure.Infra Monitoring, ITAM/ITSMDevices
fireeye_hx_adapterFireEye Endpoint Security (formerly HX)FireEye Endpoint Security (formerly HX) detects and protects against unknown endpoint threats and exploits with integrated threat intelligence.EDR/EPPDevices
firemon_adapterFireMon Security ManagerFireMon Security Manager is a network security solution that provides real-time visibility, control, and management for network security devices across hybrid cloud environments.Networking, Cloud SecurityDevices
kolide k2_adapter
FleetDM
FleetDM Fleet (formerly Kolide Fleet) is an is an open-source query manager for device management.
EDR/EPPDevices
flexera_adapterFlexera IT Asset ManagementFlexera lets enterprises gain visibility and control of IT assets, reduce ongoing software costs, and maintain continuous license compliance.ITAM/ITSMDevices
flexnet_adapterFlexNet Manager Suite CloudFlexNet Manager Suite Cloud from Flexera is a SaaS offering for software license compliance and license optimization.License Mgmt. Devices
forcepoint_adapterForcepoint Web Security Endpoint CSV FileForcepoint Web Security Endpoint CSV File imports CSV files with device information.IAM, Config Mgmt.Devices
forcepoint_adapter
Forcepoint ZTNA Private Access
Forcepoint ZTNA Private Access (formerly Forcepoint Web Security Endpoint) enables end-users to authenticate and receive policy enforcement via the Forcepoint Web Security Cloud infrastructure.
IAM, Config Mgmt.
Devices
foreman_adapterForemanForeman is a free open source project that automates repetitive tasks, quickly deploys applications, and proactively manages server lifecyle, on-premises or in the cloud.Config Mgmt.Devices
image.pngForeScout CounterACTForeScout CounterACT platform provides insight into network-connected devices.NAC Devices
forgerock-logoForgeRockForgeRock Directory Services is a high-performance identity store that provides the necessary encryption to protect enterprise data at rest and encryption.DirectoryDevices, Users
forticlient_ems_adapter
FortiClient EMS
FortiClient Enterprise Management Server (FortiClient EMS) is a security management solution that enables scalable and centralized management of multiple endpoints.
EDR/EPP
Devices
ensilo_adapterFortiEDR (enSilo)FortiEDR (formerly enSilo) automates and orchestrates detection, prevention, and response against malware and ransomware.EDR/EPPDevices
fortify_ssc_adapterFortify Software Security CenterFortify Software Security Center offers security assurance solutions that address the threats posed by security flaws in business-critical software apps.AppSec, DevOpsDevices
fortigate_adapter
FortiNAC
FortiNAC is a network access control solution that provides protection against IoT threats, control of third-party devices, and automated responses to networking events.
NACDevices
fortigate_adapter
Fortinet FortiGate
Fortinet FortiGate is a next-generation firewall providing security and visibility for end-to-end protection across the entire enterprise network.
FirewallDevices
fortigate_adapterFortiPortalFortiPortal is a cloud-based security policy, wireless management, and analytics for MSSPs, enterprises, education and government customers.Networking, Remote Monitoring and ManagementDevices
Forward NetworksForward Networks provides a vendor-neutral abstraction that models the organization's network across all devices, both on-prem and in the cloud.Networking, Infra MonitoringDevices
freeipa_adapterFreeIPAFreeIPA is a free and open source identity management system for Linux environments.IAMDevices, Users
fresh_service_adapterFreshserviceFreshservice is a cloud-based IT help desk and service management solution that enables organizations to simplify their IT operations.ITAM/ITSMDevices
digital_defense_frontline_adapterFrontline VMFrontline VM, a frontline cloud system, is a vulnerability management application that performs comprehensive security assessments and helps prioritize and track the results, making remediation more efficient and effective.VA ToolDevices
gigamon_fm_adapterGigamon GigaVUE-FM (Fabric Manager)Gigamon GigaVUE-FM (Fabric Manager) delivers management and monitoring of all physical and virtual nodes across your on-premises, virtual and public-cloud deployments.NetworkingDevices
gigamon_threatinsight_adapterGigamon ThreatINSIGHTGigamon ThreatINSIGHT is a cloud-native network detection and response (NDR) platform that provides threat activity detection and the data and context needed for cybersecurity response and investigation.MDR, Cyber IntelligenceDevices
GitHubGitHubGitHub provides hosting for software development version control using Git, including distributed version control and source code management (SCM) functionality.Software Development Version Control, DevOpsUsers
git_lab_adapterGitLabGitLab is an open-source DevOps lifecycle tool that provides a wiki, issue-tracking, and continuous integration and deployment pipeline features.DevOpsDevices, Users
GLPI_logo
GLPI
GLPI is an open-source service management software tool to manage Helpdesk and IT assets.

Devices, Users
GodaddyGoDaddy
GoDaddy is a domain registrar that also offers additional services such as website building and management, website and email hosting, SSL security, and more.
NetworkingDevices
GCPGoogle Cloud Platform (GCP)Google Cloud Platform (GCP) is a suite of cloud computing services. Alongside a set of management tools, it provides a series of modular cloud services including computing, data storage, data analytics and machine learning.Cloud Infra, Cloud, Virtualization, ITAM/ITSM, ContainersDevices, Users
google_mdm_adapter(2)Google Workspace (G Suite)Google Workspace (formerly G Suite) is a collection of cloud computing, productivity, collaboration, device, user, and data management tools developed by Google.MDM/EMM, IAMDevices, Users
greynoise-logo3GreyNoiseGreyNoise collects, analyzes, and filters internet scan activity.Cyber IntelligenceDevices
guardicore_adapterGuardicoreGuardicore is a data center and cloud security company that protects the organization’s core assets.Cloud Security, CloudDevices, Users
hashicorp_adapterHashiCorp ConsulHashiCorp Consul is a multi-cloud service networking platform to connect and secure services across any runtime platform and public or private cloud.NetworkingDevices
haveibeenpwned_adapterHave I Been PwnedHave I Been Pwned is a website to check if email accounts have been compromised in a data breach.VA ToolUsers
Heimdal SecurityHeimdal Security protects organizations and home users against malware attacks.
Data Security, EDR/PP
Devices
HP Device Manager (HPDM)HP Device Manager (HPDM) is an enterprise-class application for managing and administrating thin client devices on large- and small-scale networks.Config Mgmt., ITAM/ITSM, RMMUsers
hp_ilo_adapterHP Integrated Lights-Out (iLO)HP Integrated Lights-Out (iLO) is server management software that enables the configuration, monitoring, and updating of HPE servers.Config Mgmt.Devices
hp_nnmi_adapterHP Network Node Manager i (NNMi)HP Network Node Manager i (NNMi) is a network health and performance monitoring software with scalability and device support.NetworkingDevices
hp_nnmi_adapterHP NNMi XML FileHP NNMi XML File is a network health and performance monitoring platform.NetworkingUsers
hpe_imc_adapterHPE Intelligent Management Center (IMC)HPE Intelligent Management Center (IMC) is a networking solution that delivers management across campus core and data center networks.NetworkingDevices, Users
hpe_oneview_adapterHPE OneViewHPE OneView is an integrated IT management solution that transforms compute, storage, and networking into software-defined infrastructure for task automation.ITAM/ITSMDevices
HP Web JetadminHP Web Jetadmin is a fleet management software solution for the remote configuration, maintenance, and monitoring of HP and standard MIB-compliant 3rd party printers and MFPs.Infra Monitoring, ITAM/ITSM, Config Mgmt.Devices
HubSpot3HubSpotHubSpot provides software products for inbound marketing, sales, and customer service.CRMUsers
image.pngHyperSQLThe HyperSQL adapter imports device information from an HyperSQL database.CMDB, ITAM/ITSMDevices
hypr_passwordless_adapterHYPR PasswordlessHYPR Passwordless provides passwordless security solutions.IAMUsers
bigfix_adapterIBM BigFixIBM BigFix provides remote control, patch management, software distribution, operating system deployment, network access protection and hardware and software inventory functionality.IT Agent, Config Mgmt.Devices
bigfix_inventory_adapterIBM BigFix InventoryIBM BigFix Inventory gathers information about installed software and hardware in your IT infrastructure.IT Agent, Config Mgmt.Devices
softlayer_adapterIBM CloudIBM's cloud computing platform combines platform as a service (PaaS) with infrastructure as a service (IaaS) and cloud services.Cloud Infra, CloudDevices
guardium_adapter.pngIBM GuardiumIBM Guardium prevents leaks from databases, data warehouses, and Big Data environments. It ensures the integrity of information and automates compliance controls across heterogeneous environments.Data SecurityDevices
IBM Hardware Management Console (HMC)

The Hardware Management Console (HMC) is a hardware appliance that you can use to configure and control one or more managed systems. You can use the HMC to create and manage logical partitions and activate Capacity Upgrade on Demand. Using service applications, the HMC communicates with managed systems to detect, consolidate, and send information to service and support for analysis.Infra Monitoring, Cluster Management, Containers

Devices
maas360_adapterIBM MaaS360 with WatsonIBM MaaS360 with Watson is a Unified Endpoint Management (UEM) platform covering endpoints, end-users, apps, content, and data. It also gives visibility and control to manage mobile devices running iOS, macOS, Android, and Windows.CMDB, ITAM/ITSM, MDM/EMM, UEMDevices
IBM Maximo
IBM Maximo Application Suite offers a single platform for asset management, monitoring, maintenance, computer vision, safety and reliability.
CMDBDevices
ibm_qradar_adapterIBM QRadarIBM QRadar is a Security Information and Event Management (SIEM) solution that enables security teams to detect, prioritize and response to threats across the enterprise.SIEMDevices, Users
ibm_tivoli_taddm_adapterIBM Tivoli Application Dependency Discovery Manager (TADDM)IBM Tivoli Application Dependency Discovery Manager (TADDM) is a configuration management tool that helps IT operations personnel ensure and improve application availability in application environments.Config Mgmt.Devices
iboss_cloud_adapteriboss cloudiboss cloud is cloud-based platform that secures user Internet access in the cloud.Networking, Cloud SecurityDevices, Users
iCIMS_logoiCIMS
iCIMS is an enterprise recruiting platform allowing employers to attract, engage, hire, and advance employees.
HRUsers
icinga_adapterIcingaIcinga is an open-source computer system and network monitoring application. It monitors data centers and clouds availability and performance, gives access to data and raises alerts.NetworkingDevices
IGEL Universal Management Suite (UMS)IGEL Universal Management Suite (UMS) is a single management solution for decentralized endpoints.MDM/EMMDevices
illumio_adapterIllumio Adaptive Security Platform (ASP)Illumio Adaptive Security Platform (ASP) secures computing platforms in cloud, on-prem, or hybrid environments without any dependency on the underlying network.NetworkingDevices
illusive_adapterIllusive NetworksIllusive Networks deceives cyber attackers by planting false information about a given network's resources.Deception. Cyber IntelligenceDevices
imperva_dam_adapter(1)Imperva Data Activity Monitoring (DAM)Imperva Data Activity Monitoring (DAM) defines and enforces data security and compliance policies across the cloud and on-premises including relational databases, mainframes, big data platforms, data warehouses, and enterprise file stores.IT Agent, Config Mgmt.Devices





infinipoint_adapterInfinipointInfinipoint is a cloud-based automated cyber hygiene platform that enables continuous detection and remediation of risks across the organization’s IT assets.ITAM/ITSM, Config  Mgmt.Devices, Users
infoblox_adapterInfoblox DDIInfoblox DDI consolidates DNS, DHCP, IP address management, and other core network services into a single platform, managed from a common console.NetworkingDevices
image.pngInfoblox NetMRIInfoblox NetMRI provides network change and configuration management (NCCM), enabling users to automate network change, understand network health, manage network configurations, and meet a variety of compliance requirements.NetworkingDevices, Users
Infor EAMInfor EAM is an asset management system that helps digitizing and optimizing maintenance operations.ITAM/ITSMDevices, Users
intel-logoIntel DCMCIntel® Data Center Manager is a software solution that collects and analyzes the real-time health, power, and thermals of a variety of devices in data centers.Infra Monitoring, RMMDevices
Intezer_iconIntezer ProtectIntezer Protect offers runtime cloud workload protection.Cloud Mgmt., Cloud SecurityDevices
intrigue_adapterIntrigueIntrigue enables IT and Security teams with a complete and always up to date view of Cloud and Internet-exposed assets and exposures.Cyber IntelligenceDevices
invictiInvicti
Invicti (formerly Netsparker) is DAST and IAST vulnerability scanning for web applications.
AppSecDevices
ip_fabric_adapterIP FabricIP Fabric is a network management system used to discover, verify, visualize and document large scale networks.NetworkingDevices
Island_logoIsland
Island is an enterprise browser, built on Chromium, with numerous built-in capabilities for protecting against user-, data-, and network-based threats.
Secure Web GatewaysDevices, Users
itglue-logo1IT GlueIT Glue is a SOC 2-compliant IT documentation management platform designed for managed service providers (MSPs).Storage ManagementUsers
iTopiTopIiTop is an open source ITSM solution allows management of configuration items and their relationships in a flexible CMDB.CMDB, ITAM/ITSMDevices, Users
ivanti_endpoint_security_adapterIvanti Endpoint SecurityIvanti Endpoint Security, powered by Heat, provides application control, antivirus, patch management, and device control to protect endpoints.EDR/EPPDevices
ivanti_security_controls_adapterIvanti Security ControlsIvanti Security Controls is a unified IT management platform used for managing and protecting Windows-based machines, Red Hat Enterprise and CentOS Linux machines, and VMware ESXi Hypervisors.UEM, MDM/EMMDevices
ivanti_sm_adapterIvanti Service ManagerIvanti Service Manager, is a cloud based ITSM solution that provides workflows automation, IT help desk and support ticket features, and ITIL service management processes.ITAM/ITSMDevices, Users
ivanti_sm_adapterIvanti Unified Endpoint Manager (Landesk)Ivanti Unified Endpoint Manager (formerly Landesk) helps IT administrators gather detailed device data, automate software and OS deployments, personalize workspace environments, and fix user issues.UEMDevices
jamf_adapterJamf ProJamf Pro is an enterprise mobility management (EMM) tool that provides unified endpoint management for Apple devices.MDM/EMMDevices
jamf_protect_adapterJamf ProtectJamf Protect is an endpoint protection solution that prevents macOS malware, detects and remediates Mac-specific threats, and monitors endpoints for compliance.EDR/EPPDevices
Jetpatch_iconJetPatch
JetPatch is a centralized patch management platform focusing on end-to-end enterprise patch management and vulnerability remediation.
Config/Patch Mgmt.Devices
JFrog_iconJFrogJFrog Artifactory is a DevOps solution for housing and managing artifacts, binaries, packages, files, containers, and components throughout the software development lifecycle.
DevOpsDevices, Users
json_adapterJSONThe JSON adapter is able to import .json files with information about devices, users, or installed software.CMDB, ITAM/ITSMDevices, Users
jumpcloud_adapterJumpCloudJumpCloud is a Directory-as-a-Service (DaaS) solution to authenticate, authorize, and manage users, devices, and applications via a common directory in the cloud.IAM, DirectoryDevices, Users
junos_adapterJuniper JunosThe Juniper Junos Adapter connects to Juniper switches and routers.NetworkingDevices
juniper_adapterJuniper Junos Space Network Management PlatformJuniper Junos Space Network Management Platform automates management of Juniper's switching, routing, and security devices.NetworkingDevices
Kandji_iconKandjiKandji is an Apple device management (MDM) solution for macOS, iOS, iPadOS, and tvOS.MDM/EMMDevices
kaseya_adapterKaseya VSAKaseya VSA is a remote monitoring and management solution for remote control, discovery, patch management, and monitoring.IT Agent, Config Mgmt.Devices
kaspersky_sc_adapterKaspersky Security CenterKaspersky Security Center is an administration console for Kaspersky Labs security solutions and systems management tools.EDR/EPPIAM
image.pngKenna Security PlatformKenna Security Platform is a vulnerability assessment solution that provides risk scoring, prioritization, and benchmarking.VA ToolDevices
keycloak_adapterKeycloakKeycloak is an open source identity and access management solution.IAMUsers
knowbe4_adapterKnowBe4KnowBe4 provides Security Awareness Training for anti-phishing behavior, social engineering and ransomware attacks, and general security awareness.Security Awareness, GRCUsers
kolide k2_adapterKolide K2Kolide K2 is a paid cloud-hosted SaaS platform for gathering detailed device information and securing endpoints.EDR/EPPDevices
kubernetes_adapterKubernetesKubernetes (K8s) is an open-source system for automating deployment, scaling, and management of containerized applications.Containers, CloudDevices
lopht_crack_adapterL0phtCrack 7L0phtCrack 7 is a password auditing and recovery application.Password Mgmt., IAMUsers
LaceworkLacework provides cloud security automation for AWS, Azure, and GCP with a comprehensive view of risks across cloud workloads and containers.Cloud Security, CloudDevices
lakeside-iconLakeside SysTrack
Lakeside SysTrack is a digital experience monitoring solution used for workplace analytics, IT asset optimization, and end-user troubleshooting.
RMMDevices
landscape-logoLandscapeLandscape by Canonical is a management tool used to deploy, monitor and manage Ubuntu servers.Config/Patch Mgmt, RMMDevices
lansweeper_adapterLansweeperLansweeper is an IT asset management and Network Inventory software tool for Windows, Linux, Mac, and Network devices.IT Agent, Config Mgmt., CMDB, ITAM/ITSMDevices
lastpass_adapterLastPassLastPass is a password manager that stores encrypted passwords online.Password Mgmt., IAMUsers
LaunchDarklyLaunchDarkly is a continuous delivery platform and feature management platform that provides feature flags as a service.Software Development Version ControlUsers
librenms_adapterLibreNMSLibreNMS is a network monitoring solution that provides auto-discovery for network hardware and operating systems including Cisco, Linux, Juniper, Foundry, and more.NetworkingDevices
limacharlie_adapterLimaCharlieLimaCharlie provides endpoint-driven information security tools to run an MSSP or SOC, as well as APIs that allow users to build and monetize their own products.DevOpsDevices
linux_ssh_adapterLinux SSHLinux Secure Shell uses remote command execution over the SSH protocol to gather information about the endpoint Linux machine.ITAM/ITSMDevices
Litmos_iconLitmos
Litmos is a learning management system that provides pre-built courses and eLearning solutions.
Collaboration, HRUsers
logmein_adapterLogMeIn CentralLogMeIn Central is a cloud-based endpoint management solution that enables monitoring and management of endpoint infrastructure.MDM/EMM, UEMDevices, Users
logicmonitor_adapterLogicMonitorLogicMonitor is an automated infrastructure monitoring platform for enterprise IT and managed service providers.Infra Monitoring, ITAM/ITSMDevices
image.pngLogRhythmLogRhythm combines SIEM, user and entity behavior analytics, network traffic and behavior analytics, and security automation and orchestration.SIEMDevices
lookout_adapterLookout Mobile Endpoint SecurityLookout Mobile Endpoint Security is a mobile security solution that provides comprehensive risk management across iOS and Android devices to secure against app, device, and network-based threats while providing visibility and control over data leakage.EDR/EPPDevices

channels4_profile
LucidchartLucidchart allows users to collaborate on drawing, revising and sharing charts and diagrams.CollaborationUsers
malwarebytes_adapterMalwarebytes Endpoint Protection (Cloud Platform)Malwarebytes Endpoint Protection is a cloud-based security platform that combines detection and remediation technologies into a single cloud-managed agent.EDR/EPPDevices
malwarebytes_adapterMalwarebytes Endpoint Security (On-Prem Platform)Malwarebytes Endpoint Security protects endpoints from ransomware, automates endpoint remediation, and provides continuous visibility and monitoring.EDR/EPPDevices
manageengine-logoManageEngine Desktop CentralManageEngine Desktop Central is a desktop management and mobile device management software for managing desktops in LAN and across WAN and mobile devices from a central location.EDR/EPP, MDM/EMMDevices
manageengine-logoManageEngine OpManager
ManageEngine OpManager enables monitoring of routers, switches, firewalls, servers and VMs for fault and performance.
Infra MonitoringDevices
manageengine-logoManageEngine OpUtils
ManageEngine OpUtils is an IP address and switch port management software geared toward helping engineers efficiently monitor, diagnose, and troubleshoot IT resources.
IPAM, NetworkingDevices
MarkMonitor_logoMarkMonitor
MarkMonitor provides domain management, security, and consulting.
IPAMDevices
masscan_adapterMasscanMasscan is a free internet port scanner utility.VA ToolDevices
epo_adapterMcAfee ePolicy Orchestrator (ePO)McAfee ePolicy Orchestrator (ePO) is a security management platform that provides real-time monitoring of security solutions.EDR/EPPDevices
McAfee MVision CloudMcAfee MVision Cloud is a CASB solution that protects data and stops threats in the cloud across SaaS, PaaS, IaaS, and on-premise environments.Cloud SecurityDevices
medigate_adapterMedigateMedigate is a medical device security platform that protects connected medical devices on health care provider networks, allowing inventory management and facilitating detection and prevention capabilities.NetworkingDevices
men_and_mice_adapterMen&Mice DNS ManagementMen&Mice DNS Management is a Network Management software providing secure, centralized, and highly resilient control of DNS across diverse platforms.NetworkingDevices, Users
groupwise.png)Micro Focus GroupWiseMicro Focus GroupWise is a collaboration software solution that provides email, calendaring, and instant messaging.CollaborationUsers
NetIQ_iconMicro Focus Server Automation (HP Server Automation, Opsware)Micro Focus Server Automation (formerly known as HP Server Automation or Opsware) provides operating system provisioning, automated patch management, and compliance control.Config Mgmt.Devices
NetIQ_iconMicro Focus SiteScopeMicro Focus SiteScope (previously HPE SiteScope) provides monitoring capabilities for IT infrastructure, including servers, databases, network, media, and more.Infra Monitoring, Cloud Mgmt., ITAM/ITSM, CloudDevices
active_directory_adapterMicrosoft Active Directory (AD)Microsoft Active Directory (AD) is a directory service for Windows domain networks that authenticates and authorizes all users and computers.IAM, Directory Devices, Users
azure_adapterMicrosoft AzureMicrosoft Azure is a cloud computing service created by Microsoft for building, testing, deploying, and managing applications and services through a global network of Microsoft-managed data centers.Cloud Infra, CloudDevices
azure_ad_adapterMicrosoft Azure Active Directory (Azure AD) and Microsoft IntuneMicrosoft Azure Active Directory (Azure AD) is Microsoft's multi-tenant, cloud-based directory, and identity management service. Microsoft Intune is a cloud-based service in the enterprise mobility management (EMM) space that integrates closely with Azure Active Directory (Azure AD) for identity and access control and Azure Information Protection for data protection.IAM, DirectoryDevices, Users
bitlocker_adapterMicrosoft BitLocker Administration and Monitoring (MBAM)Microsoft BitLocker Administration and Monitoring (MBAM) provides a simplified administrative interface for BitLocker Drive Encryption. BitLocker offers protection against data theft or data exposure for computers that are lost or stolen, encrypting all data that is stored on the Windows operating system volumes and drives and configured data drives.DLP, Data SecurityDevices
Microsoft Cloud App Security
Microsoft Cloud App Security is a Cloud Access Security Broker (CASB) that supports various deployment modes including log collection, API connectors, and reverse proxy.Cloud Security, CloudUsers
defender_atp_adapterMicrosoft Defender ATPMicrosoft Defender Advanced Threat Protection (ATP) helps enterprise networks prevent, detect, investigate, and respond to advanced threats.EDR/EPPDevices
hyper_v_adapterMicrosoft Hyper-VMicrosoft Hyper-V is a native hypervisor; it can create virtual machines on x86-64 systems running Windows.Virtualization, ITAM/ITSM, CloudDevices
microsoft_kms_adapterMicrosoft Key Management Service (KMS)Microsoft Key Management Service (KMS) enables organizations to activate systems within their own network, eliminating the need for individual computers to connect to Microsoft for product activation.ITAM/ITSMDevices
microsoft_lyncMicrosoft LyncMicrosoft Lync provides instant messaging (IM), audio and video calls, Lync Meetings, availability (presence) information, and sharing capabilities.CollaborationUsers
SCOM_iconMicrosoft SCOM (System Center Operations Manager)Microsoft SCOM (System Center Operations Manager) is a cross-platform data center monitoring system for operating systems and hypervisors, reporting state, health and performance information of computer systems.Infra Monitoring, RMMDevices
sccm_adapterMicrosoft System Center Configuration Manager (SCCM)Microsoft System Center Configuration Manager (SCCM) is a systems management software product for managing large groups of computers running Windows NT, Windows Embedded, macOS (OS X), Linux or UNIX, as well as Windows Phone, Symbian, iOS and Android mobile operating systems.Config Mgmt.Devices
sccm_adapterMicrosoft System Center Virtual Machine Manager (VMM)Microsoft System Center Virtual Machine Manager (VMM) is a unified management application for on-premises, service provider, and Azure cloud virtual machines.Cloud Mgmt., Containers, Virtualization, RMMDevices
minerva_adapterMinerva Labs Endpoint Malware VaccinationMinerva Labs Endpoint Malware Vaccination simulates infection markers, rather than creating them, to contain outbreaks that bypass AV tools.EDR/EPPDevices
MistMist AI leverages data ingested from numerous sources, including APs, switches and firewalls to optimize user experiences and simplify operations across the wireless access, wired access, and SD-WAN domains.Cloud Infra, Cloud Mgmt, Cloud SecurityDevices
mobileiron_adapterMobileIron EMMMobileIron EMM enables enterprises to secure and manage modern operating systems on mobile devices and desktops.MDM/EMMDevices
MondayMonday.com is a cloud-based workflow management platform that allows teams to build and manage projects.CollaborationUsers
mongodb_adapterMongoDBMongoDB is a document-oriented NoSQL database.DevOpsDevices, Users
MosyleMosyle is an Apple Endpoint Management & Security platform with solutions for education providers and enterprises.MDM/EMMDevices, Users
N2WS_logoN2WS
N2WS Backup & Recovery offers orchestrated recovery for core AWS and Azure services.
Data SecurityDevices, Users
N-able(1)N-able
N-able provides integrated monitoring, management, security, and ticketing for managed service providers.
RMMData SDevices
Nagios CoreNagios Core provides monitoring of all mission-critical infrastructure components including applications, services, operating systems, network protocols, systems metrics, and network infrastructure.Infra MonitoringDevices
Nagios XINagios XI provides enterprise server and network monitoring.NetworkingDevices
nasuni_adapterNasuniNasuni offers a file services platform built for the cloud that delivers infinite scale, built-in backup, global file sharing, and local file server performance.Storage Mgmt. Devices
Nectus_adapterNectusNectus is a network discovery, monitoring and visualization software.Networking, Infra Monitoring, ITAM/ITSMDevices
netapp_adapterNetAppNetApp offers hybrid cloud data services for management of applications and data across cloud and on-premises environments.Storage Mgmt. Devices, Users
netbox_adapterNetBoxNetBox is an open source web application to help manage and document computer networks.NetworkingDevices
netbrain_adapter.pngNetBrain Integrated EditionNetBrain Integrated Edition is an adaptive automation integrated with existing NMS tools and IT workflows to automate documentation, troubleshooting, network change, and defense.NetworkingDevices
NetdiscoNetdisco is a web-based network management tool designed for network administrators.NetworkingDevices
netiq_adapterNetIQ Advanced AuthenticationNetIQ Advanced Authentication provides a centralized authentication framework that adds a strong level of authentication (MFA or 2 Factor).IAMDevices
NetIQ_iconNetIQ Identity ManagerNetIQ Identity Manager by MicroFocus uses integrated identity information to create and manage identities and control access to enterprise resources.IAMUsers
NetskopeNetskopeNetskope Security Cloud provides threat protection for cloud services, websites, and private applications.NetworkingDevices
NetSpyglass

NetSpyglass provides real-time network mapping, monitoring, visualization, and analytics for multi-vendor data center and WAN network operators.

NetworkingDevices
neustar-logoNeustar UltraDNSNeustar UltraDNS is an enterprise grade cloud-based DNS service.NetworkingDevices
new-relicNew RelicNew Relic provides cloud-based software to monitor and track servers, instances and services.RMMDevices
next_think_adapterNexthinkNexthink is an IT solution that provides insights into activity across devices, operating systems, and workplace locations to improve IT experiences for employees.ITAM/ITSMDevices, Users
Ninja One (RMM)Ninja One is an RMM (Remote Monitoring and Management) solution for MSPs and IT organizations, allowing them to automate, manage, and remediate endpoint management tasks.RMMDevices, Users
nmap_adapterNmap Security ScannerNmap Security Scanner is a free and open source utility for network discovery and security auditing.VA ToolDevices
image.pngNozomi Guardian and CMCNozomi Guardian and CMC (formerly Nozomi Networks Guardian) monitors network communications and device behavior for physical and virtual appliances.OT/IoTDevices
nucleussecNucleus Security
Nucleus Security provides unified vulnerability management via integrations with third-party tools including threat intelligence, penetration testing, appsec, network scanners, and more.
VA Tool
Devices
nutanix_adapterNutanix AHVNutanix AHV is a hypervisor included with the Enterprise Cloud OS. AHV delivers flexible migrations, security hardening, automated data protection and disaster recovery, and analytics.Virtualization, ITAM/ITSM, CloudDevices
observeit_adapterObserveITObserveIT provides insider threat security solutions, including employee monitoring, user activity monitoring, behavioral analytics, policy enforcement, and digital forensics.UEBADevices
observiumObserviumObservium is an auto-discovering network monitoring platform supporting a wide range of device types, platforms and operating systems.NetworkingDevices
Obsidium SecurityObsidian delivers a security solution for SaaS applications built around unified visibility, continuous monitoring, and security analytics.Cloud Security, SaaS SecurityDevices, Users
Okta_logoOktaOkta provides cloud software that helps companies manage their employees' passwords, by providing a “single sign-on” experience.IAMDevices, Users
omnivista_adapterOmniVista 2500 NMSThe Alcatel-Lucent OmniVista 2500 Network Management System (NMS) provides management tools and network-wide visibility, enabling operators to provision, manage and maintain a mobile infrastructure.NetworkingDevices
OnDMARC_logoOnDMARC
OnDMARC provides automated management for DMARC, DKIM and SPF records.
Email SecurityDevices
onelogin_adapterOneLoginOneLogin's unified access management platform centralizes access across on-prem and cloud environments to give full control, management, and security for data, devices, and users.IAMUsers
Oomnitza Enterprise Technology ManagementOomnitza Enterprise Technology Management helps IT teams manage technology assets with an agentless solution for endpoints (laptops, mobile devices, monitors, peripherals, and accessories), software (desktop, cloud, virtual machines), and users.ITAM/ITSMDevices
openstack_adapterOpenStackOpenStack is an open source software solution for creating private and public clouds.Cloud Infra, CloudDevices
opendcim_adapteropenDCIMopenDCIM is a free open-source Data Center Infrastructure Management solution.NetworkingDevices, Users
OpenLdapOpenLDAP Software is an open source implementation of the Lightweight Directory Access Protocol.

Directory, IAMDevices, Users
openvas_adapterOpenVASOpenVAS is a software framework including several services and tools for vulnerability scanning and vulnerability management.VA ToolDevices
OpenVPNOpenVPN Cloud
OpenVPN Cloud is a VPN-as-a-Service solution that eliminates the need for VPN server installation.
Infra Monitoring, NetworkingDevices, Users
opsgenie-logo-4371B345F2-seeklogo.comOpsgenieOpsgenie is an alerting and incident response tool.CollaborationUsers

 
OpsRampOpsRamp is an AIOps-powered IT operations management (ITOM) solution.
ITAM/ITSM
Devices
Opsview

Opsview is a monitoring platform for operating systems, networks, cloud, VMs, containers, databases, applications, and more.

Infra Monitoring, RMMDevices
opswat_adapterOPSWAT MetaAccessOPSWAT MetaAccess prevents risky devices from accessing local networks and cloud applications.NACDevices
oracle_cloud_adapterOracle CloudOracle Cloud is a computing service providing servers, storage, network, applications and services.Cloud Infra, CloudDevices, Users
oracle_vm_adapterOracle VMOracle VM's server virtualization products support x86 and SPARC architectures and a variety of workloads such as Linux, Windows and Oracle Solaris.Virtualization, ITAM/ITSM, CloudDevices
orca_adapterOrca Cloud Visibility PlatformOrca Cloud Visibility Platform delivers visibility to cloud security posture, including prioritized alerts on vulnerabilities, compromises, misconfigurations, and more.Cloud Security, CloudDevices
24Outpost24Outpost24 is a cyber risk management platform that helps organizations assess their attack surface and prioritize vulnerabilities.
Attack Surface Mgmt.Devices
ovirt_adapterOvirtoVirt is a free, open-source virtualization management platform.Virtualization, ITAM/ITSM, CloudDevices
PacketFencePacketFencePacketFence is a free open source network access control (NAC) solution which provides the following features: registration, detection of abnormal network activities, proactive vulnerability scans, isolation of problematic devices, remediation through a captive portal, 802.1X, wireless integration and User-Agent / DHCP fingerprinting.NACDevices
paloalto_cortex_adapter(2)Palo Alto Networks CortexPalo Alto Networks Cortex is an open and integrated, AI-based continuous security platform, allowing security operations teams to speed the analysis of massive data sets.NetworkingDevices
paloalto_xdr_adapter(2)Palo Alto Networks Cortex XDRPalo Alto Networks Cortex XDR is a detection and response app that natively integrates network, endpoint, and cloud data to detect threats and stop sophisticated attacks.EDR/EPPDevices
Palo Alto Networks Cortex Xpanse Palo Alto Networks Cortex Xpanse (Palo Alto Networks Expanse Expander) discovers, monitors, and tracks Internet Assets automatically to reduce risks and exposures.Cyber IntelligenceDevices
paloalto_panorama_adapterPalo Alto Networks PanoramaThe Palo Alto Panorama management server provides centralized monitoring and management of multiple next-generation firewalls and appliance clusters.Networking, FirewallDevices
image.png
Palo Alto Networks Prisma Cloud Workload Protection
Prisma Cloud Workload Protection (CWPP) provides protection across hosts, containers, and serverless deployments in any cloud, throughout the application lifecycle.
Cloud SecurityDevices
image.pngPalo Alto Prisma CloudPrisma Cloud is a native cloud security platform that provides visibility, threat prevention, compliance assurance, and data protection across multi-cloud environments.Cloud Mgmt., CloudDevices
traps_adapterPalo Alto Traps Endpoint Security ManagerPalo Alto Traps Endpoint Security Manager (ESM) delivers endpoint protection to prevent advanced persistent threats (APTs) and zero-day attacks.EDR/EPPDevices
panorays_adapterPanoraysPanorays is a SaaS-based platform that enables companies to view, manage and engage on the security posture of their third-parties, vendors, suppliers, and business partners.Cyber IntelligenceDevices
papercut_adapterPaperCutPaperCut is a print management solution that provides print job tracking and reporting.IoTDevices
pdq_adapterPDQ InventoryPDQ Inventory is a systems management tool that scans Windows computers to collect hardware, software, and Windows configuration data.ITAM/ITSMDevices, Users
peopleHR_iconPeopleHR
PeopleHR is HR automation software (HRIS) for small and growing businesses.
HRUsers
rca_adapterPersistentPersistent Systems Radia Endpoint Manager (formerly RCA) is an end-user device (PC and mobile device) lifecycle management tool for automating routine client-management tasks.
Config/Patch Mgmt.Devices
php_ipam_adapterphpIPAMphpIPAM is an open-source web IP address management application (IPAM).NetworkingDevices, Users
pingone_adapter
PingID
Ping offers an identity management solution that includes multi-factor authentication, single sign-on, identity verification, and more.
IAMUsers
pingone_adapterPingOne DirectoryPingOne Directory provides a hosted directory service that developers can use to store user authentication and profile data.IAM, DirectoryUsers
image.pngPivotal Cloud FoundryPivotal Cloud Foundry is an app development and deployment platform for public and private clouds.Cloud Mgmt., CloudDevices
pkware_adapterPKWAREPKWARE’s data protection platform finds, classifies, and protects sensitive data, allowing security managers to define data protection policies and monitor activity across the organization.DLP, Data Security, EncryptionDevices
Pluralsight_iconPluralSight
PluralSight offers a variety of video training courses for software developers, IT administrators, and creative professionals through its website.
CollaborationUsers
Portnox_iconPortnox Clear
Portnox CLEAR provides automated security, visibility and control for every device accessing the network including Internet of Things (IoT), BYOD, mobile and unmanaged systems.
NACDevices
privx_adapterPrivXPrivX provides privileged access to on-prem and cloud environments, including control access to servers, network devices and other critical infrastructure according to user roles and privileges.PAM, IAMDevices, Users
psaprojector-logoProjector PSAProjector Professional Services Automation (PSA) software is an operational system for professional services organizations.CollaborationUsers
promisec_adapterPromisec Endpoint ManagerPromisec Endpoint Manager is an agentless endpoint detection and remediation solution that detects, analyzes, and remediates abnormalities.EDR/EPPDevices
Proofpoint_iconProofpoint

Proofpoint is a cybersecurity company that offers solutions to protect workers and their data from threats targeting email, mobile, social, cloud, and other digital channels.

Email SecurityUsers
Proofpoint_iconProofpoint Endpoint DLP
Proofpoint Endpoint DLP helps identify risk user behavior and protect sensitive data.
DLPDevices
Proofpoint_iconProofpoint's ObserveIT Insider Threat Management PlatformProofpoint's ObserveIT Insider Threat Management (ITM) platform is a cloud-based solution that provides insider risk detection, incident response, and unified visibility across user activity, data interaction, and threat context.UEBADevices
Proofpoint_iconProofpoint TAPProofpoint Targeted Attack Protection (TAP) is an email-based security solution for ransomware prevention and other email-based threats.Email SecurityUsers
proxmox_adapterProxmox Virtual Environment (VE)Proxmox Virtual Environment (VE) is an open source server virtualization management solution based on QEMU/KVM and LXC.Virtualization, ITAM/ITSM, CloudDevices
PRTG Network MonitorPRTG is a network monitoring application for Windows and Linux systems and servers, as well as miscellaneous hosts such as switches, routers, and other devices. Infra monitoring, RMMDevices
pulse_connect_secure_adapterPulse Connect SecurePulse Connect Secure provides zero trust secured access from any device to applications and services in the cloud and data center.NetworkingUsers
PulsewayPulseway is a remote monitoring and management (RMM) system solution that enables an admin to monitor, manage and troubleshoot workstations, servers and network devices across an environment remotely.Remote Monitoring and ManagementDevices
Pulumi Cloud Engineering PlatformPulumi provides an Infrastructure as Code solution for Developers and Infrastructure Teams, enabling them to build, deploy, and manage cloud applications and infrastructure using various languages, tools, and engineering practices.Software Development Version Control, DevOpsUsers
puppet_adapterPuppetPuppet is an open-source software configuration management tool.Config Mgmt.Devices
pure_storage_flash_array_adapterPure Storage Pure1Pure Storage Pure1 is a cloud-based storage management solution that provides self-driving storage, data-storage management, and monitoring.Storage Mgmt. Devices
qualys_scans_adapterQualys Cloud PlatformQualys Cloud Platform monitors customers' global security and compliance posture using sensors.VA ToolDevices, Users
kace_adapterQuest KACE Endpoint Systems Management AppliancesQuest KACE Endpoint Systems Management Appliances provision, manage, secure, and service network-connected devices.NetworkingDevices
qush-logoQushQush enables customers to discover risks, educate employees, enforce policies and prevent data loss.
DLP, Data Security, UEBADevices
Radiflow_logoRadiflow
Radiflow provides visibility and anomaly detection for OT assets.
OTDevices
rancher_adapterRancherRancher is an open-source multi-cluster orchestration platform that enables operations teams to deploy, manage, and secure enterprise Kubernetes.Containers, CloudDevices
randori_adapterRandoriRandori is an attack platform which combines continuous reconnaissance, real-time target analysis, and the ability to safely execute attacks on-demand to provide an attacker’s perspective.Cyber IntelligenceDevices
Rapid7 InsightIDR_adapterRapid7 InsightIDRRapid7’s InsightIDR is a security center for incident detection and response, authentication monitoring, and endpoint visibility.SIEMDevices
Rapid7 InsightVM_adapterRapid7 InsightVMRapid7 InsightVM provides visibility and risk prioritization for vulnerabilities found in local, remote, cloud, containerized, and virtual infrastructure.VA ToolDevices
nexpose_adapterRapid7 Nexpose and InsightVMRapid7 Nexpose is an on-premise vulnerability management solution, providing discovery, detection, verification, risk classification, impact analysis, reporting and mitigation. Rapid7 InsightVM is a cloud-based vulnerability management solution that combines Rapid7’s Insight platform along with Nexpose core capabilities.VA ToolDevices
rapid7_nexpose_warehouse_adapterRapid7 Nexpose WarehouseRapid7 Nexpose Warehouse fetches device information directly from an external data warehouse.VA ToolDevices
redcanary_adapterRed CanaryThe Red Canary suite includes products that record telemetry, detect and investigate threats, and automate remediation.EDR/EPPDevices
ansible_tower_adapter(1)Red Hat Automation Controller
Red Hat Automation Controller (formerly Ansible Tower) is a web console and REST API for operationalizing Ansible across teams, organizations, and the enterpriseITAM/ITSMDevices
red_hat_satellite_adapterRed Hat IdMRed Hat Identity Management (IdM) provides a centralized and unified way to manage identity stores, authentication, policies, and authorization policies in a Linux-based domain.IAMDevices, Users
Red Hat OpenShift Container
Red Hat OpenShift is a Kubernetes container platform that allows developers and operators to manage cloud-native applications throughout the DevOps cycle, for any cloud.Cloud Infra., ContainersDevices
red_hat_satellite_adapterRed Hat SatelliteRed Hat Satellite is a system management solution used to deploy, configure, and maintain systems across physical, virtual, and cloud environments.Config Mgmt.Devices
redseal_adapterRedSealRedSeal’s network modeling and risk scoring platform models customers' entire hybrid data center of public cloud, private cloud and physical network.NetworkingDevices
jita_adapterRemediant SecureONE (JITA)Remediant SecureONE is a Just-In-Time Privileged Access Management (JITA) solution that enables control and insight over the distribution, usage, and protection of privileged access across enterprise environments.IAMDevices
gotoassist_adapterRescueAssist (GoToAssist)RescueAssist (formerly GoToAssist) is a cloud-based toolset for IT and customer support teams including remote support, IT monitoring, and service desk management.IT Agent, Config Mgmt., Ticketing, ITAM/ITSMDevices
riskiq_adapterRiskIQ Digital FootprintRiskIQ Digital Footprint software provides an active, comprehensive inventory of all of the organization’s IPs, domains, and hosts.Attack Surface Mgmt., Cyber IntelligenceDevices
risksense_adapterRiskSenseRiskSense provides vulnerability prioritization and management to dynamically control and measure cybersecurity risk.VA ToolDevices
riverbed_adapter(1)Riverbed SteelCentral Controller (SCC)Riverbed SteelCentral Controller SCC facilitates administration tasks for groups of SteelHeads, Interceptors, Mobile Controller, Cores, and Edges.Networking, AppSec, DevOps Devices
archer_adapterRSA ArcherRSA Archer is an integrated risk management platform for managing multiple dimensions of risk, including IT, operational, third-party, resiliency, and compliance risk.Risk Mgmt., GRCDevices, Users
RubrikRubrik provides data security and data protection on a single platform, including: Zero Trust Data Protection, ransomware investigation, incident containment, sensitive data discovery, and orchestrated application recovery.Data Security, DLPDevices
runZero_logo (1)runZero
runZero (formerly Rumble Network Discovery) is a cloud-based network discovery platform that identifies and monitors network-connected IT assets.
NetworkingDevices
SafeConsole_iconSafeConsole
SafeConsole by DataLocker allows administrators to provision, secure, manage, and audit encrypted USB drives, USB ports, and virtual folders.
DLPUsers
Sage PeopleSage People is a people management platform that provides employee record management, payroll. processing and management, talent management, and more.HR, IAMUsers

SailPoint IdentityIQ
SailPoint IdentityIQ is an identity and access management (IAM) solution that delivers automated access certifications, policy management, access request and provisioning, password management, and identity intelligence.
IAMUsers
Sailpoint Identity ManagerSailPoint provides access governance and identity management.IAMUsers
SailPoint IdentityNow
SailPoint IdentityNow is a SaaS identity and access management (IAM) solution.
IAMUsers
    sal_adapter SalSal is an open-source reporting solution for managed endpoints.MDM/EMMDevices
 

Your browser does not support SVG.click here to download

 
Salesforce

Salesforce is a customer relationship management solution that gives a single, shared view of every customer.

CRMUsers
saltstack_adapterSaltStack Open SourceSaltStack Open Source is open-source software for event-driven security, cloud and configuration management.SOAR, Config. Mgmt.Devices
knox-logoSamsung KnoxSamsung Knox is a built-in solution used to secure, deploy, and manage Samsung and Galaxy devices.MDM/EMMDevices
SaviyntSaviynt Enterprise Identity Cloud is a cloud identity and access governance platform.Cloud Security, IAMUsers
Schneider Electric EcoStruxure IT_adapterSchneider Electric EcoStruxure ITSchneider Electric EcoStruxure IT provides software and services for IT and Data Center teams to monitor and manage critical IT infrastructure on-premise, in the cloud, and at the edge.Data Center Infrastructure Mgmt., (DCIM), Data SecurityDevices
scopnet_adapterScopNETScopNET provides an agent-free solution for the prevention of unauthorized access to corporate networks, integrating switches, routers and firewalls to detect alien devices.NACDevices
secdo_adapterSecdo Endpoint ProtectionSecdo Endpoint Protection automates endpoint forensic analysis and cyber investigations for security teams.EDR/EPPDevices
sectigo_logoSectigoSectigo provides digital certificate lifecycle and PKI management.Certificate ManagementDevices
SecureAuth_logoSecureAuth
SecureAuth is an identity access management security solution that provides passwordless authentication, multi-factor authentication, SSO, and more.
IAMUsers
SecureW2 JoinNow
A suite of network security software that helps organizations deploy WPA2-Enterprise Wi-Fi security and utilize X. 509 certificates beyond Wi-Fi for VPN, Web/Browser authentication and SSL (DPI) Inspection.NACDevices
redcloack_adapterSecureworks Red Cloak

Secureworks Taegis XDR (formerly Red Cloak TDR) is an endpoint detection and response technology for the cloud, endpoints and the network.

EDR/EPPDevices
Secureworks VDRSecureworks Taegis VDR
Secureworks Taegis VDR is a cloud-based vulnerability management solution.
VA ToolDevices
redcloak_tdr_adapterSecureworks Taegis XDR (Red Cloak TDR)Secureworks Red Cloak Threat Detection and Response (TDR) is a Software as a Service (SaaS) solution that provides security intelligence analytics to data consumed by third-party applications.Cyber IntelligenceDevices
SecurityScorecardSecurityScorecard rates cybersecurity postures of corporate entities through completing scored analysis of cyber threat intelligence signals for the purposes of third party management and IT risk management.Risk ManagementDevices
sensu_adapterSensuSensu is a cloud monitoring solution that provides monitoring workflows automation and visibility into multi-cloud environments.Cloud Mgmt., CloudDevices
sentinelone_adapterSentinelOneSentinelOne is an endpoint protection solution including prevention, detection, and response.EDR/EPPDevices
sentinelone_adapterSentinelOne RangerSentinelOne Ranger creates visibility into your network by using distributed passive and active mapping techniques to discover running services, unmanaged endpoints, IoT devices, and mobiles.EDR/EPPDevices
ServiceNowServiceNow provides service management software as a service, including IT services management (ITSM), IT operations management (ITOM) and IT business management (ITBM).CMDB, ITAM/ITSM, TicketingDevices, Users
image.pngSevOne Data PlatformSevOne Data Platform is a network and infrastructure management platform that provides monitoring and analytics.NetworkingDevices
Shadowserver_logoShadowserver
Shadowserver gathers and analyzes data on malicious internet activity including malware, botnets, DDoS, fraud, and more.
Cyber IntelligenceDevices
shodan_adapterShodanShodan is a search engine for Internet-connected devices.IoTDevices
signalsciences_adapterSignal SciencesSignal Sciences is a web protection platform that protects on-premise, multi-cloud and hybrid-cloud apps, within containers and serverless functions.AppSec, DevOpsDevices
SimpleMDM(1)SimpleMDM
SimpleMDM is a mobile device management solution for Apple devices.
MDM/EMMDevices
site24x7-logoSite24x7
Site24x7 offers a performance monitoring solution for websites, servers, cloud environments, networks, applications, and users.
RMMDevices
skybox_adapterSkybox Firewall AssuranceSkybox Firewall Assurance provides automation of firewall management tasks across different firewall vendors and complex rulesets.FirewallDevices
slack_adapterSlackSlack is a chat and collaboration hub used to connect people, information, tools, and services.CollaborationUsers
Smokescreen  IllusionBlackSmokescreen uses planted decoys to actively lure and capture attacks on endpoints, networks, and web applications.DeceptionDevices
snipeit_adapterSnipe-ITSnipe-IT is a free, open source IT asset management system written in PHP.ITAM/ITSMDevices
snowflake-logoSnowflake Data Warehouse
Snowflake is a data warehouse built on top of the Amazon Web Services or Microsoft Azure cloud infrastructure, and allows storage and compute to scale independently.
CollaborationDevices
snow_adapterSnow Software Asset ManagementSnow Software provides Software Asset Management (SAM) products and services to reduce the risk, cost, and complexity associated with software assets and licensing.ITAM/ITSMDevices
snow_adapter
Snow Software Exceptions
Snow Software Exceptions adapter provides a way to track and manage software exceptions.
ITAM/ITSM
Devices
solarwinds_orion_adapterSolarWinds Network Performance MonitorSolarWinds Network Performance Monitor is a unified IT systems management system that tracks the performance of networks, applications, systems, and databases on-premises, in a hybrid environment, or in the cloud.ITAM/ITSMDevices
samange_adapter(2)SolarWinds Service Desk (Samange)SolarWinds Service Desk (formerly Samange) is a unified, cloud-based IT service desk and asset management platform.Ticketing, CMDB, ITAM/ITSMUsers
sonic_wall_adapterSonicWallSonicWall next-generation firewalls (NGFW) provide security, control, and visibility to maintain an effective cybersecurity posture.FirewallDevices
sonic_wall_adapter
SonicWall Network Security Manager
SonicWall Network Security Manager enables organizations to deploy and manage all firewalls, connected switches and access points in one interface.
Firmware Security, NetworkingDevices
sophos_central_adapterSophos CentralSophos Central is a unified console that provides one place to manage Sophos products, including: endpoint, mobile, encryption, web, email, server, and wireless security.EDR/EPPDevices
sophos_cloud_optix_adapterSophos Cloud OptixSophos Cloud Optix is a public cloud visibility and threat response solution that detects, responds, and prevents cloud security and compliance gaps.Cloud Security, CloudDevices, Users
sophos_adapterSophos Endpoint ProtectionSophos Endpoint Protection helps secure workstations by adding prevention, detection, and response technology on top of the operating system.EDR/EPPDevices
mobi_control_adapterSOTI MobiControlSOTI MobiControl is a software system for managing mobile devices in the enterprise.MDM/EMMDevices
spacewalk_adapterSpacewalkSpacewalk is an open-source systems management solution for system provisioning, patching and configuration.Config Mgmt.Devices
specops_adapterSpecops InventorySpecops Inventory collects and reports information on hardware, software, registry, user settings, operating system, security data, and Active Directory data.IT Agent, Config Mgmt.Devices
image.pngSpiceworksSpiceworks provides network monitoring to capture, analyze, and monitor network traffic.NetworkingDevices
Splunk logoSplunkSplunk captures, indexes, and correlates real-time data in a searchable repository.SIEMDevices, Users
image.pngSQLiteThe SQLite adapter imports device information from an SQLite database.CMDB, ITAM/ITSMDevices, Users
mssql_adapter(2)SQL ServerThe SQL Server adapter imports device information from arbitrary SQL servers: Microsoft SQL Server, MySQL and PostgreSQL.CMDB,ITAM/ITSM Devices, Users
sumo_logic_adapterSumo LogicSumo Logic is a cloud-based service for logs & metrics management for modern apps.Cloud Mgmt., CloudDevices, Users
SunbirdSunbird dcTrack is a data center infrastructure monitoring product that provides dashboards and KPIs for remote data center management.Infra MonitoringDevices
SweepaticSweepatic automates continuous mapping, monitoring, and managing of all internet-connected assets and risks to deliver an attack surface management platform.Attack Surface Mgmt.Devices
symantec_cloud_workload_adapterSymantec Cloud Workload Protection (CWP)Symantec Cloud Workload Protection (CWP) automates security policy enforcement to protect public cloud workloads.Config Mgmt., EDR/EPPDevices
symantec_ccs_adapterSymantec Control Compliance Suite (CCS)Symantec Control Compliance Suite (CCS) is a solution to help identify security gaps and vulnerabilities and automate compliance assessments for over 100 regulations, mandates, and best practice frameworks including GDPR, HIPAA, NIST, PCI and SWIFT. Symantec CCS discovers and inventories all networks and assets including managed and unmanaged devices allowing for assets to be profiled and ranked for risk potential.VA ToolDevices
symantec_dcs_adapterSymantec Data Center Security (DCS) Server AdvancedSymantec Data Center Security Server Advanced delivers security detection, monitoring, and prevention capabilities for both physical and virtual server infrastructures.Data SecurityDevices
symantec_dlp_adapterSymantec DLPSymantec DLP is a data loss protection and prevention solution. Its management console, the DLP Enforce Platform, and its reporting tool, IT Analytics for DLP, allows writing and enforce policies to reduce information risks.DLP, Data SecurityDevices
symantec_edr_adapterSymantec Endpoint Detection and Response (EDR)Symantec Endpoint Detection and Response (EDR) detects, protects, and responds to threats to the organization's network.EDR/EPPDevices
symantec_ee_adapterSymantec Endpoint EncryptionSymantec Endpoint Encryption combines full-disk and removable media encryption with centralized management to protect sensitive information and ensure regulatory compliance.Encryption, Data SecurityDevices
symantec_altiris_adapterSymantec Endpoint Management Suite (Altiris)Symantec Endpoint Management Suite (formerly Altiris) manages, patches, and remediates application and OS configurations on desktops, laptops and servers to strengthen endpoint security and maximize user productivity.ITAM/ITSM, Config Mgmt.Devices
symantec_adapterSymantec Endpoint Protection 12.xSymantec Endpoint Protection manages events, policies, and registration for the client computers that connect to customer networks.EDR/EPPDevices
symantec_adapterSymantec Endpoint Protection 14.xSymantec Endpoint Protection manages events, policies, and registration for the client computers that connect to customer networks.EDR/EPPDevices
symantec_sep_cloud_adapterSymantec Endpoint Protection CloudSymantec Endpoint Protection Cloud unifies threat protection and device management for PC, Mac, mobile devices, and servers to protect endpoints from ransomware, zero-day threats, and other sophisticated attacks.EDR/EPPDevices
Syncro_logoSyncro MSPSyncro MSP is a combined remote monitoring and management (RMM) and professional services automation (PSA) platform that manages invoicing, credit card payments, help desk, customer relationship tracking, remote access and support, and more managed IT services.
RMMDevices
Syxsense(1)SyxsenseSyxsense is an endpoint security management tool that combines IT management, patch management, and vulnerability scanning.EDR/EPPDevices
sysaid_adapterSysAidSysAid is an integrated ITSM, Service Desk and Help Desk software solution.ITAM/ITSM, TicketingDevices
Tableau_iconTableau
Tableau is a data visualization and analysis tool used to create charts, graphs, maps, dashboards, and stories.
Cloud Mgmt., Cyber IntelligenceUsers
tailscale_adapterTailscale
Tailscale is a minimal-configuration WireGuard-based VPN.
Secure Web GatewaysDevices
TalentLMS(1)TalentLMS
TalentLMS is an all-in-one training platform.
Collaboration, HRUsers
Talon_logoTalon
Talon is a secure enterprise browser designed to defend against malware and prevent data loss for managed and unmanaged devices.
Secure Web GatewaysDevices
tanium_asset_adapterTanium AssetTanium Asset provides an inventory of hardware and software assets including servers, laptops, and desktops for thorough insight.ITAM/ITSM, Config Mgmt.Devices
tanium_discover_adapterTanium DiscoverTanium Discover scans for unmanaged assets with almost no impact on the network.ITAM/ITSM, Config Mgmt.Devices
tanium_interact_adapterTanium InteractTanium Interact lets you ask questions to gather live endpoint data in order to create an up-to-date inventory of hardware and software assets.ITAM/ITSM, Config Mgmt.Devices
tanium_status_adapterTanium System StatusTanium System Status provides an inventory of all clients that have registered with the Tanium platform.ITAM/ITSM, Config Mgmt.Devices
TCPWave (IPAM)TCPWave IPAM allows administrators to manage their DNS and DHCP infrastructure for on-premise and cloud environments.NetworkingDevices
TeamViewer_iconTeamViewer
TeamViewer is remote access and remote control computer software, allowing maintenance of computers and other devices.
RMMDevices
nessus_adapter(1)Tenable NessusTenable Nessus is a vulnerability scanning platform for auditors and security analysts.VA ToolDevices
nessus_adapter(1)Tenable Nessus CSV FileTenable Nessus CSV File Adapter imports device information from vulnerability scan data.VA ToolDevices
tenable_io_adapterTenable.ioTenable.io automatically discovers and assesses a customer's environment for vulnerabilities, misconfigurations, and other cybersecurity issues.VA ToolDevices, Users
tenableotTenable.OTTenable.OT (previously Indegy Industrial Cybersecurity Suite) protects industrial networks from cyber threats, malicious insiders, and human error.
OTDevices
tenable_security_center_adapterTenable.sc (SecurityCenter)Tenable.sc (formerly SecurityCenter) consolidates and evaluates vulnerability data, prioritizing security risks.VA ToolDevices
Canary_iconThinkst CanaryThinkst Canary is deception technology deployed as tokens to catch malicious activity.Cloud Security, Data Security, DeceptionDevices
ThreatStackThreat StackThreat Stack is a provider of cloud security management and compliance solutions.Cloud Security, CloudDevices
thycotic_adapter
Thycotic Privilege Manager
Thycotic Privilege Manager mitigates malware and security threats from exploiting applications by removing local administrative rights and enforcing least privilege on endpoints.
PAMDevices, Users
thycotic_adapterThycotic Secret ServerThycotic Secret Server is a Privileged Access Management (PAM) solution for protecting your privileged accounts, available both on premise or in the cloud.PAM, IAMUsers
torii_adapterToriiTorii is a SaaS Management Platform letting IT professionals discover, optimize, and control SaaS usage and costs.SaaS Mgmt, Cloud Infra. & Mgmt.Users
office_scan_adapterTrend Micro Apex One (OfficeScan)Trend Micro Apex One (formerly OfficeScan) is an endpoint security solution protecting against malware, scripts, injection, ransomware, memory and browser attacks, and exploits.EDR/EPPDevices
cloud_app_security_adapterTrend Micro Cloud App SecurityTrend Micro Cloud App Security provides threat and data protection for cloud applications and services such as Google G Suite, Dropbox, Microsoft 365, and more.Cloud Security, CloudUsers
deep_security_adapterTrend Micro Deep SecurityTrend Micro Deep Security can automatically virtually patch server, cloud, VDI and application vulnerabilities.Config Mgmt., EDR/EPPDevices
trend micro worry fee_adapterTrend Micro worry FreeTrend Micro worry-free is an endpoint and SaaS solution protecting against malware, scripts, injection, ransomware, memory and browser attacks, and exploits.EDR/EPPDevices
tripwire_enterprise_adapterTripwire EnterpriseTripwire Enterprise is a security configuration management (SCM) suite that provides fully integrated solutions for policy, file integrity and remediation management.Config Mgmt., EDR/EPPDevices
truefort_adapterTrueFortTrueFort offers application behavior analytics, control, and protection.AppSec, DevOpsDevices
Tufin SecureTrackTufin SecureTrack is a firewall management solution that delivers security, compliance, and connectivity across physical networks and hybrid cloud.FirewallDevices
twistlock_adapterTwistlockTwistlock provides container and cloud native cybersecurity for teams using Docker, Kubernetes, serverless, and other cloud native technologies.Containers, CloudDevices
Tychon_iconTYCHON
TYCHON is an endpoint analytics and remediation platform that allows users to search, visualize, remediate, and monitor security compliance across assets.
Attack Surface Mgmt., EDR/EPP, ITAM/ITSM Devices
unifi_adapterUbiquiti Networks UniFi ControllerThe UniFi Controller is a wireless network management software solution for managing multiple wireless networks using a web browser.NetworkingDevices
ultipro_adapterUKG Pro (Ultimate Software UltiPro)UKG Pro (formerly Ultimate Software UltiPro) is cloud-based human capital management (HCM) software.HCM, IAMUsers
Unisys Stealth_logoUnisys Stealth
Unisys Stealth transforms existing networks—both on-premises and in the cloud—into a Zero Trust Network through identity-based microsegmentation.
NetworkingDevices
Universal SSH Key Manager (UKM)
Universal SSH Key Manager (UKM) is an enterprise grade SSH user key management solution that uses a non-disruptive approach to gain and retain control of the SSH infrastructure.ITAM/ITSMDevices
upguard_adapterUpGuard CyberRiskUpGuard CyberRisk provides third-party vendor risk and external cyber risk monitoring. The platform has two main modules: UpGuard BreachSight which monitors company external risk posture and Vendor Risk monitors and helps manages the risk posture of third party vendors.Cyber IntelligenceDevices, Users
uptycs_adapter(1)UptycsUptycs is an osquery-powered security analytics platform pairs a universal agent with analytics for fleet visibility, intrusion detection, incident investigation, vulnerability management & compliance for Linux, macOS, Windows, containers, and cloud workloads.UEM, MDM/EMMDevices
Varonis_iconVaronis CSV
Varonis is a data security and analytics company providing data security, threat detection and response, and privacy protection.
Data SecurityDevices
vectra_adapterVectra AIVectra AI is a cybersecurity platform that uses AI to detect and respond to cyberattacks.NetworkingDevices
VeeamVeeam provides backup, disaster recovery and modern data protection software for virtual, physical and multi-cloud infrastructures.Deception, Storage ManagementDevices
venafi_adapterVenafiVenafi secures and protects cryptographic keys and digital certificates.Certificate Mgmt., Data SecurityDevices
carbonblack_protection_adapterVMware Carbon Black App Control (Carbon Black CB Protection)VMware Carbon Black App Control (formerly Carbon Black CB Protection) protects critical systems and servers to prevent unwanted changes and ensure continuous compliance with regulatory mandates.EDR/EPPDevices
carbonblack_defense_adapter(2)VMware Carbon Black Cloud (Carbon Black CB Defense)VMware Carbon Black Cloud (formerly Carbon Black CB Defense) is a cloud native platform delivering next-generation antivirus and endpoint detection and response. This adapter is also compatible with Carbon Black Cloud Enterprise EDR (formerly CB ThreatHunter) and Carbon Black Cloud Audit and Remediation (formerly CB LiveOps).EDR/EPPDevices
carbonblack_response_adapterVMware Carbon Black EDR (Carbon Black CB Response)VMware Carbon Black EDR (formerly Carbon Black CB Response) is a threat hunting and incident response solution that delivers continuous visibility in offline, air-gapped, and disconnected environments using threat intel and customizable detections.EDR/EPPDevices
cb-logoVMware Carbon Black LiveOpsVMware Carbon Black LiveOps is part of the CB Predictive Security Cloud (PSC), and allows customers to query endpoints and remediate issues in real time. Integrate VMware Carbon Black LiveOps with the Axonius Cybersecurity Asset Management Platform.EDR/EPP, IT AgentDevices
CarbonBlack_Cloud_Workload_logoVMware Carbon Black Cloud WorkloadVMware Carbon Black Cloud Workload is a security solution for workloads, aiming to reduce the attack surface and to protect critical assets.Attack Surface Mgmt., EDR/EPPDevices
esx_adapter(1)VMWare ESXi and vSphereVMware ESXi is an enterprise-class, type-1 hypervisor for deploying and serving virtual computers. VMware vSphere is VMware's cloud computing virtualization platform.Virtualization, ITAM/ITSM, CloudDevices
vmware_Horizon.pngVMware HorizonVMware Horizon is a platform for secure delivery of virtual desktops and apps across the hybrid cloud.Virtualization, ITAM/ITSM, CloudDevices
vcloud_director_adapterVMware vCloud DirectorVMware vCloud Director is a cloud service-delivery platform.Cloud Mgmt., CloudDevices
vmware_vrops_adapterVMware vRealize Operations (vROps)VMware vRealize Operations (vROps) delivers an IT operations management platform for private, hybrid, and multi-cloud environments that covers the physical, virtual and cloud infrastructure, including VMs and containers.Cloud Infra, CloudDevices
airwatch_adapter(2)VMware Workspace ONE (Airwatch)VMWare Workspace ONE (formerly AirWatch) provides enterprise mobility management (EMM) software and standalone management systems for content, applications, and email.MDM/EMM, UEMDevices
saltstack_enterprise_adapter
vRealize Automation SaltStack Config (formerly SaltStack)
vRealize Automation SaltStack intelligent automation delivers event-driven security, cloud, and configuration management.
SOAR, Config Mgmt.Devices
vulcan-logo2VulcanVulcan Cyber is a vulnerability visualization, assessment and remediation platform.VA ToolDevices
wazuh_adapterWazuhWazuh is a free, open source and enterprise-ready security monitoring solution for threat detection, integrity monitoring, incident response and compliance.EDR/EPPDevices
Wasp AssetCloud
AssetCloud is an asset tracking solution that enables organizations to monitor, audit and report on devices and software.ITAM/ITSMDevices, Users
webroot_adapterWebroot Endpoint ProtectionWebroot Endpoint Protection protects against threats across email, browsers, files, URLs, ads, apps, and more.EDR/EPPDevices
webscan_adapterWeb Server InformationWeb Server Information provides information about the web server for a given website domain, including the server type, its version and operating system, the content management system (CMS) name and its version, the installed CMS plugins, versions and more.ITAM/ITSMDevices
WhatsUp_Gold_iconWhatsUp Gold
WhatsUp Gold is network monitoring software.
NetworkingDevices
dhcp_adapterWindows DHCP ServerWindows DHCP Server is a networking server used to lease IP addresses and manage other configuration information.NetworkingDevices
wmi_adapterWindows Management Instrumentation (WMI)Windows Management Instrumentation (WMI) is a set of specifications from Microsoft for consolidating the management of devices and applications in a Windows network. WMI provides users with information about the status of local or remote computer systems.ITAM/ITSMDevices
failover_cluster_adapter(1)Windows Server Failover Clustering (WSFC)Windows Server Failover Clustering (WSFC) is a feature of the Windows Server platform for improving the high availability (HA) of applications and services. WSFC is the successor to Microsoft Cluster Service (MSCS).Cloud Infra, CloudDevices
wsus_adapterWindows Server Update Services (WSUS)Windows Server Update Services (WSUS), previously Software Update Services (SUS), enables administrators to manage the distribution of updates and hotfixes released for Microsoft products.Config Mgmt.Devices
WizWiz analyzes all layers of the cloud stack to identify high-risk attack vectors to be prioritized and fixed.Cloud SecurityDevices
workday_adapterWorkdayWorkday offers software solutions for financial management, human resources, and planning.ERPUsers
xmc-logoXMC Extreme Management CenterXMC Extreme Management Center is a wired and wireless network management and automation software.NetworkingDevices
ColorTokens_LogoXshield
ColorTokens Xshield is a zero trust-based, cloud-delivered micro-segmentation solution that secures critical corporate assets, including applications and workloads.
Cloud Security, Networking 
Devices
zabbix_adapterZabbixZabbix is an open source monitoring software tool for networks, servers, virtual machines and cloud services.Cloud Mgmt., CloudDevices
Zenoss_iconZenossZenoss enables monitoring of all physical and virtual networks as one part of a real-time model that includes both cloud and on-premises infrastructure.Infra Monitoring, RMMDevices
ZeroFoxZeroFox is an intelligence-based analysis and remediation engine used to detect digital risks such as phishing, malware, impersonation, and piracy targeted at digital assets.Cyber Intelligence, Risk ManagementUsers
zerto_adapterZertoZerto is a data loss protection solution that provides disaster recovery, backup and workload mobility software for virtualized infrastructures and cloud environments.DLP, Data SecurityDevices
zoom_adapterZoomZoom is a remote conferencing service that provides video conferencing, online meetings, chat, and mobile collaboration.Remote ConferencingDevices, Users
zscaler_adapterZscaler Web SecurityZscaler Web Security is a secure Internet and web gateway service that stops malware, advanced threats, phishing, browser exploits, malicious URLs, botnets, and more.Secure Web GatewaysDevices, Users
zscaler_adapter
Zscaler Workload Segmentation
Zscaler Workload Segmentation is a SaaS solution for applying and managing network segmentation in cloud and on-prem environments.
NetworkingDevices



What's Next
Changing your password will log you out immediately. Use the new password to log back in.
First name must have atleast 2 characters. Numbers and special characters are not allowed.
Last name must have atleast 1 characters. Numbers and special characters are not allowed.
Enter a valid email
Enter a valid password
Your profile has been successfully updated.