- 29 Sep 2024
- 101 Minutes to read
- Print
- DarkLight
- PDF
Adapters List
- Updated on 29 Sep 2024
- 101 Minutes to read
- Print
- DarkLight
- PDF
To aggregate and correlate asset data, Axonius securely fetches data from your IT, Security, and business solutions using pre-built integrations with hundreds of security and management solutions, known as adapters.
The table below describes each of the adapters supported. Use the Search box to search for adapters, and to filter the display by 'Solution Categories' and 'Types of Assets Fetched'.
For details about connecting adapters, see the Adapters Page.
Adapter Logo | Adapter Name | Description | Solution Categories | Types of Assets Fetched |
---|---|---|---|---|
1E Tachyon | 1E Tachyon is a remote endpoint management solution built on a single agent for speed, visibility, and control of all endpoints. | UEM, MDM/EMM | Devices | |
1Password | 1Password is a password manager providing a place for users to store various passwords, software licenses, and other sensitive information in a virtual vault. | Password Management | Users | |
1Password Account Management | 1Password Account Management provides information about audit activities, including actions performed by team members in a 1Password account, such as changes made to the account, vaults, groups, users, and more. | Password Management, IAM | Activities | |
1touch.io | 1touch.io is a data discovery platform for identifying sensitive data flows and ensuring compliance. | Data Security, Audit/Compliance | Devices | |
3Play Media | 3Play Media offers video accessibility services through transcription, captioning, and audio description. | Collaboration, CRM | Users | |
7SIGNAL Mobile Eye | 7SIGNAL Mobile Eye is a Wi-Fi performance management and monitoring SaaS application that helps enterprises optimize wireless device connectivity. | Networking, Infra Monitoring | Devices | |
A10 | A10 provides load balancing for application deliverability, availability, and security. | Cluster Management, Networking | Devices | |
Abnormal Security | Abnormal Security is an email security provider that helps companies protect against targeted email attacks. | Email Security | Users | |
Absolute | Absolute specializes in software to manage and secure Windows computers and Android smartphones. | EDR/EPP, MDM/EMM | Devices | |
A Cloud Guru | A Cloud Guru is an online learning platform that specializes in teaching cloud computing and related technologies. | Cloud Mgmt, ITAM/ITSM, Security Awareness | Users | |
Acronis | Acronis is a backup solution providing data protection and recovery for servers and endpoints. | Data Security | Devices | |
Action1 | Action1 is a cloud-based platform that automates patch management and vulnerability remediation. | Cloud Mgmt, Cloud Security, Config/Patch Mgmt, DevOps, ITAM/ITSM, Infra Monitoring | Devices | |
Active Directory Certificate Services (AD CS) | Active Directory Certificate Services (AD CS) is a Windows Server feature that allows you to build and manage PKI certificates used in software security systems. | Certificate Mgmt, IAM, Networking | Certificates | |
Active Directory Federation Service (AD FS) | Active Directory Federation Service (AD FS) is a software component developed by Microsoft that provides users with single sign-on and identity access. | IAM | Groups, User Extensions | |
ActZero | ActZero is a managed detection and response (MDR) tool that provides proactive, rapid, and automated services against cyber threats. | NDR, SIEM | Devices, Users, Vulnerabilities, SaaS Applications | |
Acunetix | Acunetix is an automated web application security testing tool that checks for vulnerabilities like SQL Injection, Cross-site scripting, and other exploitable vulnerabilities. | AppSec | Devices, Users | |
Adaptive Shield | Adaptive Shield is a security posture management platform used to help businesses manage their cloud services. | Cloud Security, Cloud | Users | |
Addigy | Addigy is a real-time Apple mobile device management platform (MDM) that is combined with live agent capabilities. | MDM/EMM | Devices, Users | |
Admin by Request | Admin By Request provides centralized and auditable management of local admin rights. | PAM | Devices, Users | |
Adobe | Adobe offers digital content creation and publication applications across 20+ areas including graphics, photography, illustration, multimedia/video, and more. | Collaboration, SaaS Management | Users, SaaS Data | |
Adobe Acrobat Sign | Adobe Sign allows users to create, edit, collaborate, e-sign, and share PDFs, on any device. | Collaboration | Users | |
Adobe Workfront | Adobe Workfront is work and project management software for enterprise resource management, cross-team collaboration, and strategic planning. | Collaboration | Users | |
ADP | ADP is a provider of human resources management software and services. | HR, IAM | Users | |
ADP Vantage HCM | ADP Vantage HCM is an all-in-one HR platform that includes payroll, benefits, and talent management administration. | HR | Users | |
AGNI | AGNI is an Arista Networks solution that simplifies secure onboarding, posture analysis, and network access control. It is designed to work seamlessly with Zero Trust architectures through integrated segmentation, encryption, and advanced monitoring capabilities. | Cloud Mgmt, DevOps, Cloud Security | Devices, Users | |
Aha! | Aha! is a platform enabling customers to build roadmaps, manage projects and development. | Collaboration, Ticketing | Users | |
Aircall | Aircall is a cloud-based phone system. | Collaboration | Users | |
Airlock Digital | Airlock Digital is an application whitelisting software provider. | EDR/EPP, Data Security | Devices | |
Airship | Airship is a platform offering end-to-end solutions for mobile app engagement and customer lifecycle management. | Collaboration, CRM | Devices | |
Airtable Enterprise | Airtable Enterprise is a spreadsheet-database hybrid serving as a low-code platform for building collaborative apps. | Collaboration | Users | |
Akamai App and API Security | Akamai App and API Security provides protection against web application attacks including SQL injections, cross-site scripting, and remote file inclusion. | AppSec, Firewall | Devices | |
Akamai CDN Cloud | Akamai CDN Cloud is a content delivery network that accelerates web and video content delivery globally. | Cloud Infra, Cloud Mgmt, Cloud Security, AppSec, Secure Web Gateways | Users | |
Akamai EAA | Akamai Enterprise Application Access (EAA) is part of the edge platform that helps companies secure applications that run behind a firewall or in a public cloud. | Cloud Security | Devices, Users | |
AKAssets | Akamai AKAssets provides data on users, components and applications. | ITAM/ITSM | Devices, Users | |
Akeyless | Akeyless is a SaaS-based solution that provides secrets management and zero-trust access. | Password Management | Users | |
AKIPS | AKIPS is a secure on-prem, multi-vendor network-monitoring system for the enterprise market. | Infra Monitoring | Devices | |
Alcide | Alcide provides cloud and Kubernetes discovery, K8s audit and compliance scanner, microservices anomaly detection and security policies management and enforcement. | Cloud Security, Cloud | Devices | |
Alemba Service Manager | Alemba is an ITIL-aligned IT Service Management (ITSM) platform focusing on request fulfillment. | ITAM/ITSM, Configuration and Patch Management | Devices | |
Alert Logic | Alert Logic provides vulnerability and asset visibility, endpoint protection, threat detection, incident management, and a web application firewall. | EDR/EPP | Devices | |
Alert Logic MDR | Alert Logic delivers managed detection and response (MDR) with comprehensive coverage for public clouds, SaaS, on-premises, and hybrid environments. | EDR/EPP, NDR | Devices | |
AlgoSec Firewall Analyzer | AlgoSec Firewall Analyzer (AFA) is a device analysis solution that builds a model of users' network security postures and Layer 3 connectivity. | Networking | Devices | |
Alibaba Cloud | Alibaba Cloud provides cloud computing services and cloud Infrastructure as a service. | Cloud Infra, Cloud | Devices | |
Alloy | Alloy Software provides IT Service Management, IT Asset Management, and Network Inventory software. | ITAM/ITSM | Devices | |
Amazon Web Services (AWS) | Amazon Web Services (ECS/EKS/EC2) includes the high-performance container orchestration service that supports Docker containers and containerized applications on AWS, Kubernetes Management Infrastructure across Multiple AWS Zones, as well as the EC2 instances themselves. | Cloud Infra, Cloud | Devices, Users | |
Amplitude | Amplitude is a digital analytics platform that tracks and analyzes user behavior across various platforms. | UEBA | Users | |
Anecdotes | Anecdotes is a compliance management platform. | Audit/Compliance | Devices | |
Anomali ThreatStream | Anomali ThreatStream is a threat intelligence management platform. | Cyber Intelligence | Devices, Users, Vulnerabilities, SaaS Applications | |
Apache CloudStack | Apache CloudStack is open-source software used to deploy and manage large networks of virtual machines. | Infra Monitoring, Virtualization | Devices | |
Apple App Store Connect | Apple App Store Connect is a platform for developers to manage, release, and report on their iOS apps. | DevOps, Software Development Version Control, SaaS Management | Users | |
Apple Business Manager | Apple Business Manager supports deployment and remote MDM enrollment of corporate-owned Apple devices. | MDM/EMM, RMM | Devices | |
Apple GSX | Apple GSX is an IT management tool that provides access to Apple’s device management and support services for authorized partners. | ITAM/ITSM, MDM/EMM | Devices | |
AppNeta | AppNeta provides monitoring of network paths, flows, packets, and web applications. | Networking, RMM | Devices | |
AppViewX CERT+ | AppViewX's CERT+ provides end–to–end lifecycle management for x.509 digital certificates across complex networks. | Certificate Mgmt | Certificates | |
Aqua Security | Aqua Security provides container and cloud native cybersecurity for teams using Docker, Kubernetes, serverless, and other cloud native technologies. | Containers | Devices, Users | |
Aqua Security (SaaS) | Aqua Security provides container and cloud native cybersecurity for teams using Docker, Kubernetes, serverless, and other cloud native technologies. | Containers | Devices, Users | |
Arista CloudVision | CloudVision Portal (CVP) is the web-based GUI for the CloudVision platform, which enables network-wide workload orchestration and workflow automation. | Networking | Devices | |
Arista Extensible Operating System (EOS) | Arista Extensible Operating System (EOS) is the core of Arista cloud networking solutions for next-generation data centers and cloud networks. | Networking | Devices | |
Armis | Armis is an agentless IoT security solution that lets enterprises see and control any device or network. | IoT | Devices | |
Arnica.io | Arnica.io is a cloud-based security platform that scans APIs to identify vulnerabilities. | VA Tool, Cloud Security | Devices | |
Aruba | Aruba connects to Aruba switches and routers. | Networking | Devices | |
Aruba AirWave | Aruba AirWave is a network management system for wired and wireless infrastructure and provides granular visibility into devices, users, and applications on the network. | Networking | Devices | |
Aruba Central | Aruba Central is a unified cloud-based network operations, assurance and security platform that simplifies the deployment, management, and optimization of wireless, wired and WAN environments. | Networking | Devices | |
Aruba ClearPass | Aruba ClearPass is a network access control (NAC) solution that allows enterprises to identify devices, enforce policies, and remediate threats. | NAC | Devices | |
Aruba Mobility Master | Aruba Mobility Master enables deployment and management of up to 1,000 Mobility Controllers to scale large deployments. Integrate Aruba Mobility Master with the Axonius Cybersecurity Asset Management Platform. | Networking | Devices | |
Asana | Asana is a web and mobile work management platform designed to help teams organize, track, and manage their work. | Collaboration, SaaS Management | Users, SaaS data | |
Asimily Insight | Asimily provides a vulnerability management platform that scans for devices, vulnerabilities and attack paths, and helps organizations prioritize and manage risk for IoMT, IoT, and laboratory devices. | IoT | Devices | |
AssetPanda | AssetPanda is a cloud-based asset tracking and management platform. | ITAM/ITSM | Devices, Users | |
AssetSonar | AssetSonar maintains, tracks, and manages a single source of truth for the IT asset landscape. | ITAM/ITSM | Devices | |
Assure1 by Federos | Federos Assure1 is an automated service assurance platform for operational intelligence. It collects and normalizes performance-related information, allowing users to monitor and manage critical networks and services. | Infra Monitoring | Devices | |
Atera | Atera is a cloud-based remote monitoring and management (RMM) platform for MSPs and IT professionals. | ITAM/ITSM, RMM | Devices | |
Aternity | Aternity is a device performance monitoring solution that provides insights into performance and health of laptops, desktops, VDI, and mobile devices, along with self-healing capabilities to automatically resolve issues. | ITAM/ITSM, Config Mgmt. | Devices | |
Atlassian (Formerly Atlassian Jira Software) | Atlassian Jira Software is a work management tool for various use cases, from requirements and test case management to agile software development. | DevOps, SaaS Management | Users, SaaS Data | |
Atlassian Access | Atlassian Access is an identity and access management solution for controlling user access to applications and resources. | IAM | Users | |
Atlassian Confluence | Atlassian Confluence provides information on Confluence entities, like pages and blog posts, spaces, users, groups, and more. | Collaboration | Users | |
Atlassian Jira Assets Platform | Atlassian Jira Assets Platform links software with Jira to populate an asset inventory, letting users query for assets and link them to issues. | ITAM/ITSM | Devices | |
AttackForge | AttackForge is a collaborative platform for managing penetration testing projects, centralizing vulnerability data and reporting. | Vulnerability Assessment, Risk Management, DevOps | Devices, Vulnerabilities, SaaS Data | |
AttackIQ | AttackIQ is a breach and attack simulation that allows for remote testing and continuous security validation. | Attack Surface Mgmt | Devices | |
Attivo BOTSink | Attivo BOTSink offers network-based threat deception for post-compromise threat detection. | Deception | Devices | |
Auth0 | Auth0 provides authentication and authorization solutions for web, mobile, and legacy applications. | IAM | User | |
Autodesk Cloud Platform | Autodesk Cloud Platform is comprised of the Forma, Fusion and, Flow industry clouds. | Collaboration | Devices, Users | |
Automatos | Automatos is a platform that delivers solutions to surmount challenges in IT asset management. | ITAM/ITSM | Devices | |
Automox | Automox is a cloud-based patch and configuration management solution for Windows, Linux, Mac, and third-party software. | Config Mgmt. | Devices, Users | |
Auvik | Auvik is an IT asset and network monitoring solution for managing entire network infrastructures, including physical servers, data centers, workstations and more. | Networking | Devices | |
Aviatrix | The Aviatrix cloud network platform delivers a single platform for multi-cloud networking, security, and operational visibility. | Cloud Mgmt. | Devices | |
Avigilon Alta (formerly Openpath) | Avigilon Alta (formerly Openpath) is a cloud-based physical access control solution for unified video and access control. | IAM | Users | |
Awake Security | Awake Security is a network traffic analysis solution that's capable of detecting and visualizing behavioral, mal-intent and compliance incidents. | Networking | Devices | |
Axonius Network Discovery | Axonius-provided Axonius Network Discovery adapter, performing standardized network discovery. | Network | Devices | |
Axonius Users | The Axonius Users adapter fetches users with Axonius credentials and their permissions using our API client. | ITAM/ITSM | Users, Roles | |
Azure Classic VMs | Microsoft Azure is a cloud computing service created by Microsoft for building, testing, deploying, and managing applications and services through a global network of Microsoft-managed data centers. This adapter fetches information for classic VMs (deprecated by Microsoft). | Cloud Infra, Virtualization | Devices | |
Azure Defender for IoT | Azure Defender for IoT is a solution for asset discovery, vulnerability management, and threat detection for Internet of Things (IoT) and operational technology (OT) devices. | OT/IoT | Devices | |
Azure DevOps | Azure DevOps is a Microsoft product that provides version control, reporting, requirements management, project management, automated builds, testing and release management capabilities. | DevOps | Users | |
Azure DevOps (On-Prem) | Azure DevOps (On-Prem) is a Microsoft product that provides version control, reporting, requirements management, project management, automated builds, testing and release management capabilities. | DevOps | Users, Groups | |
Backblaze | Backblaze provides cloud backup and storage services. | Cloud Infra | Devices, Users | |
Backstage | Backstage is an open platform for building developer portals. | DevOps | Devices | |
Backup Radar | Backup Radar is a backup monitoring, reporting, and compliance solution. | Infra Monitoring | Devices | |
BambooHR | BambooHR is HR software used to collect, maintain, and analyze data for hiring, onboarding employees, and managing company culture. | HR, IAM, SaaS Management | Users, SaaS data | |
baramundi | baramundi provides organizations with cross-platform management of networked endpoints in IT and manufacturing environments. | UEM, MDM/EMM | Devices | |
Barracuda CloudGen Access (Fyde) | Barracuda CloudGen Access (formerly Fyde) provides granular access for enterprise apps and workloads, and continuously monitorsaccess requests to enforce policy controls. | IAM | Devices, Users | |
Barracuda CloudGen Firewall | Barracuda CloudGen Firewall provides real-time network protection against a broad range of network threats, vulnerabilities, and exploits. | Networking | Devices, Users | |
Beeline | Beeline is a cloud-based system for managing and procuring employees and services. | HR | Users | |
BeyondTrust BeyondInsight | BeyondTrust BeyondInsight provides discovery, management, auditing, and monitoring for any privileged credential. | PAM | Devices | |
BeyondTrust Password Safe | BeyondTrust Password Safe provides discovery, management, auditing, and monitoring for any privileged credential. | PAM, IAM | Devices, Users | |
BeyondTrust Privilege Management Cloud | BeyondTrust Privilege Management Cloud delivers privilege management and application control, allowing organizations to eliminate admin rights across the entire business and enforce least privilege. | PAM, Cloud Security | Devices, Users | |
BeyondTrust Privilege Management OnPrem | BeyondTrust Privilege Management OnPrem delivers privilege management and application control, allowing organizations to eliminate admin rights across the entire business and enforce least privilege. | PAM, IAM | Devices, Users | |
BeyondTrust Privileged Identity (Lieberman RED Identity Management) | BeyondTrust Privileged Identity (formerly Lieberman RED Identity Management) is a password management solution that helps companies secure, manage, and administer credentials for privileged users and IT vendors. | PAM, IAM | Users | |
BeyondTrust Remote Support (Bomgar) | BeyondTrust Remote Support (formerly Bomgar) allows support technicians to remotely connect to end-user systems through firewalls from their computer or mobile devices. | IT Agent, Config Mgmt. | Devices | |
BGProtect DNS Guard | BGProtect DNS Guard provides DNS monitoring to help detect changes to DNS records. | Infra Monitoring, Networking | Devices | |
BGProtect Route Guard | BGProtect Route Guard provides BGP analysis, route geographical analysis, network ownership, and reachability to detect IP hijacks. | Infra Monitoring, Networking | Devices | |
BigFix | BigFix provides remote control, patch management, software distribution, operating system deployment, network access protection, and hardware and software inventory functionality. | IT Agent, Config Mgmt. | Devices | |
BigFix Compliance Analytics (formerly SCA) | BigFix Compliance Analytics (formerly SCA) is a web-based application designed to help you manage security, vulnerability, and risk assessment. | Audit/Compliance, VA Tool | Devices | |
BigFix Inventory | BigFix Inventory gathers information about installed software and hardware in your IT infrastructure. | Config/Patch Mgmt, IT Agent | Devices | |
BigID | BigID is data security solution that provides enterprise protection and privacy of personal data. | Data Security | Devices | |
BILL | BILL is a leading provider of cloud-based software that digitizes and automates back-office financial processes. | License Mgmt, SaaS Management | Users, SaaS data | |
Bionic | Bionic is an agentless platform that helps teams to manage, operate and protect applications. | AppSec, DevOps | Devices | |
BinaryEdge | BinaryEdge scans the public internet to create real-time threat intelligence streams and reporting. | Cyber Intelligence | Devices | |
Bishop Fox | Bishop Fox performs offensive security, penetration testing, red teaming, and attack surface management. | Attack Surface Mgmt | Devices | |
Bitbucket | Bitbucket is a web-based version control repository hosting service for source code and development projects that use either Mercurial or Git revision control systems. | DevOps | Devices | |
Bitdefender GravityZone Business Security | Bitdefender GravityZone Business Security uses machine learning and heuristics to protect against malware, phishing, ransomware, exploits and zero-days. | EDR/EPP | Devices | |
bitFit | bitFit is a business development and information technology company that collects all of your IT operations data and combines it into a unified cloud system. | ITAM/ITSM | Devices, Users | |
BitSight Security Ratings | BitSight Security Ratings are a data-driven and dynamic measurement of an organization’s cybersecurity performance. | Cyber Intelligence | Devices | |
Bitwarden | Bitwarden is an open-source password manager. | Password Management | Users | |
BlackBerry Unified Endpoint Management (UEM) | BlackBerry Unified Endpoint Management (UEM) delivers endpoint management and policy control for devices and apps on-premise or in the cloud. | EDR/EPP, MDM/EMM, UEM | Devices | |
Black Duck | Black Duck is a software composition analysis tool for managing open source risks. | VA Tool, Risk Management, Containers | Application Resources | |
Black Kite | Black Kite provides cyber risk assessments that analyze the organization’s supply chain cybersecurity posture from three dimensions: technical, financial and compliance. | Risk Management | Devices | |
Blameless | Blameless is a reliability engineering platform that provides incident management and post-incident analysis for operational resilience. | DevOps, Risk Mgmt, Collaboration | Alerts/Incidents | |
Block64 BlockBox | Block64 is an agentless, appliance-based asset management solution collecting data about assets across the network and using that to provide actionable insights. | ITAM/ITSM | Devices | |
BloodHound | BloodHound is used to find relationships within an Active Directory (AD) domain to discover attack paths. | Attack Surface Mgmt. | Devices | |
BloxOne Threat Defense | BloxOne Threat Defense uses the cloud to detect threats while tightly integrating with companies' on-premises ecosystem. | Cloud Security | Devices, Users | |
BlueCat Enterprise DNS | BlueCat Enterprise DNS connects all disparate DNS and DHCP with centralized management of all clients and critical assets. | Networking | Devices | |
BlueCoat ProxySG | Edge Secure Web Gateway (BlueCoat ProxySG) from Broadcom provides URL filtering, central policy management, and security against malware attacks. | Secure Web Gateways | Devices | |
BMC Atrium ADDM | BMC Atrium ADDM is a digital enterprise management solution that automates application discovery and dependency mapping. | CMDB, ITAM/ITSM | Devices | |
BMC Atrium CMDB | BMC Atrium CMDB stores information about the configuration items (CIs) in your IT environment and the relationships between them. | CMDB, ITAM/ITSM | Devices | |
BMC Atrium CMDB onPrem | BMC Atrium CMDB stores information about the configuration items (CIs) in your IT environment and the relationships between them. | CMDB | Devices | |
BMC Helix Client Management | BMC Helix Client Management is an automated endpoint management solution to inventory and track hardware and software endpoints; manage software licensing, patching, and event management; and remotely manage users' devices for updates or troubleshooting. | IT Agent, MDM/EMM, RMM | Devices, Users | |
BMC TrueSight Automation for Servers | TrueSight Automation for Servers automates vulnerability management, patching, compliance, configuration changes, software deployments, and service provisioning in the data center and cloud. | Config Mgmt. | Devices | |
BMC TrueSight Presentation Server | BMC TrueSight Presentation Server consumes data from various BMC TrueSight products to provide a consolidated set of views for monitoring the infrastructure, real and synthetic applications, and capacity planning. | DevOps | Devices | |
BOSSDesk | BOSSDesk is an IT Service Management and Help Desk Software for both On-Premise and in the Cloud. | ITAM/ITSM | Devices | |
Box Platform | Box Platform provides data security, file sharing, collaborating, and content management tools. Box Platform provides access to Box APIs. | Data Security, SaaS Management | Users, SaaS Data | |
Breachsense | Breachsense monitors the dark web, private hacker forums, and criminal marketplaces to detect data leaks. | Cyber Intelligence | Devices, Users | |
Bricata | Bricata is a network detection and response platform. | NDR | Devices | |
Brinqa | Brinqa is a cyber risk management platform that helps businesses identify and remediate vulnerabilities. | Risk Management, Vulnerability Assessment | Users | |
Brivo | Brivo is a cloud-based access control solution that helps protect building, employees, visitors, customers, residents and data. | IAM | Devices | |
BT Diamond IP IPControl | BT Diamond IP IPControl is IP address management (IPAM) software designed to manage and allocate IP addresses in enterprise networks. | Config/Patch Mgmt, IPAM | Devices | |
Buildkite | Buildkite is a continuous integration tool designed to improve software developer productivity. | Software Development Version Control | Devices, Users | |
Burp Suite | Burp Suite is a penetration testing and vulnerability finder tool often used for checking web application security. | Vulnerability Assessment Tool | Devices | |
Cadency | Cadency is a financial management platform that automates and controls the record-to-report process. | ERP | Users | |
CaptivateIQ | CaptivateIQ is a commission management platform that automates sales compensation and incentive calculations. | CRM, HR | Users | |
Carta | Carta is a cloud-based equity management solution. | Collaboration | Users | |
CA Service Management | CA Service Management is an IT service management (ITSM) solution that offers incident management and IT asset management | ITAM/ITSM, CMDB | Devices | |
CA Spectrum | CA Spectrum is a services and network infrastructure management system that enables the modeling of LAN, WAN, wired, wireless, physical, and virtual networks | Networking | Devices | |
Cato Networks | Cato SASE is a cloud-native secure access service edge built on a full mesh topology, with over 65 global PoPs, and replaces the need for enterprises to route using MPLS. | Firewall, Networking, Secure Web Gateways | Devices, Users | |
CDW | CDW is a multi-brand technology solutions provider | License Mgmt | SaaS Data | |
Censys | Censys monitors infrastructure and discovers unknown assets across the Internet. | IoT | Devices | |
Censys ASM | Censys ASM is a tool designed to provide attack surface management by identifying and monitoring threats and exposures. | Attack Surface Mgmt. | Devices, Activities, Certificates, Application Resources | |
Centrify Identity Services | Centrify Identity Services manages application access, endpoints, and network infrastructure. | IAM | Devices, Users | |
Ceridian Dayforce | Ceridian Dayforce is an HR cloud platform that delivers payroll, benefits, workforce, and talent management. | HR | Users | |
Certero | Certero is an IT hardware, software, SaaS, and cloud asset management solution. | ITAM/ITSM | Devices | |
Cervello | Cervello is a railway cybersecurity platform that monitors, protects, and manages rail operations. | Cyber Intelligence, Infra Monitoring | Devices | |
CFEngine | CFEngine is a software development automated workflow solution. | Collaboration | Devices | |
ChangeGear | ChangeGear is an AI-powered IT service management platform. | HR | Devices | |
Cheap SSL Shop | Cheap SSL Shop is a provider of SSL/TLS certificates for websites and servers. | Certificate Mgmt, Cloud Security | Certificates | |
Checkmarx One | Checkmarx One is an application security platform that provides static and dynamic application security testing. | AppSec, VA Tool, Security Awareness | Vulnerabilities, SaaS Applications, Application Services | |
Checkmarx SAST | Checkmarx SAST (CxSAST) is a static application security testing solution used to identify security vulnerabilities in custom code. It is used by development, DevOps, and security teams to scan source code early in the SDLC, identify vulnerabilities, and provide actionable insights to remediate them. | AppSec | Devices, Users | |
Checkmk | Checkmk provides powerful monitoring of networks, servers, clouds, containers, and applications. | Containers, Infra Monitoring, RMM | Devices, Users | |
Check Point CloudGuard | Check Point CloudGuard automates governance across multi-cloud assets and services including security posture assessment, misconfiguration detection, and enforcement of security best practices and compliance frameworks. | Cloud Infra, IAM | Devices, Users | |
Check Point Harmony Endpoint | Check Point Harmony Endpoint is a suite of endpoint protection products that include mobile, email, collaboration, and SASE security. | Attack Surface Mgmt., Email Security, Networking | Devices | |
Check Point Harmony Mobile | Check Point Harmony Mobile uses file protection capabilities to block the download of malicious files to mobile devices and prevent file-based cyberattacks on organizations. | EDR/EPP | Devices | |
Check Point Infinity | Check Point Infinity protects against cyber threats across networks, endpoint, cloud and mobile devices. This adapter supports the entire Infinity platform, including Check Point firewalls. | EDR/EPP, Firewall | Devices | |
Chef | Chef provides continuous automation for building, deploying, and managing infrastructure, compliance, and applications in legacy and hybrid environments. | Config Mgmt. | Devices, Users | |
Cherwell IT Service Management | Cherwell IT Service Management is a service desk platform enabling automation for process workflows, supporting tasks, and related approvals. | ITAM/ITSM | Devices | |
Cherwell IT Service Management Database | Cherwell IT Service Management Database is a service desk platform enabling automation for process workflows, supporting tasks, and related approvals. | ITAM/ITSM | Devices | |
CHG Meridan | CHG-Meridian develops, finances, and manages technology usage. | Collaboration | Devices | |
Cilium | Cilium is an open source and eBPF-based networking, security, and observability tool that helps secure network connectivity between application services. | Containers, Networking | Containers | |
CipherTrust Manager | Thales CipherTrust Manager is a key management solution for the CipherTrust Data Security Platform. | Encryption | Devices | |
CIS CAT Pro | CIS CAT Pro is a tool for automating CIS Benchmark testing and reporting. | Risk Management | Devices | |
Cisco | Cisco connects to Cisco switches and routers. | Networking | Devices | |
Cisco Adaptive Security Appliance (ASA) | Cisco Adaptive Security Appliance (ASA) Software is the core operating system for the Cisco ASA Family, delivering firewall capabilities for ASA devices in an array of form factors. | Firewall, Networking | Devices, Users | |
Cisco Advanced Malware Protection (AMP) | Cisco Advanced Malware Protection (AMP) includes threat intelligence, sandboxing, and malware blocking to detect, contain, and remove malware. | EDR/EPP | Devices | |
Cisco AppDynamics | Cisco AppDynamics is an application performance monitoring tool. | AppSec | Devices, Users | |
Cisco Application Policy Infrastructure Controller (APIC) | Cisco Application Policy Infrastructure Controller (APIC) is the main architectural component of Cisco ACI. It is the unified point of automation and management for the Cisco ACI fabric, policy enforcement, and health monitoring and optimizes performance and agility. | Networking | Devices | |
Cisco Common Service Platform Collector (CSPC) | The Cisco Common Service Platform Collector (CSPC) is an SNMP-based tool that discovers and collects information from the Cisco devices installed on companies' networks. | Networking | Devices | |
Cisco CX Cloud | CX Cloud combines Cisco technology with AI/ML-driven insights, use cases, and contextual learning. | Cyber intelligence | Devices | |
Cisco DCNM | Cisco Data Center Network Manager (DCNM) is a network management solution for next generation data centers. | Storage mgmt | Devices | |
Cisco DNA Center | Cisco DNA Center is a software-based network automation and assurance solution. | Networking | Devices, Vulnerabilities, SaaS Applications | |
Cisco Firepower Management Center | Cisco Firepower Management Center provides management over firewalls, application control, intrusion prevention, URL filtering, and advanced malware protection. | Networking | Devices | |
Cisco Identity Services Engine (ISE) | Cisco Identity Services Engine (ISE) is a network administration product that enables the creation and enforcement of security and access policies for endpoint devices connected to the company’s routers and switches. | IAM | Devices | |
Cisco Industrial Network Director (IND) | Cisco Industrial Network Director (IND) enables deployment and monitoring of Cisco Industrial Ethernet switches in industrial networks. | Networking, OT | Devices, Users | |
Cisco Intersight | Cisco Intersight is a cloud operations platform that consists of optional, modular capabilities of infrastructure, workload optimization, and Kubernetes services. | Cloud Infra, Cluster Management | Devices | |
Cisco Meraki | Cisco Meraki solutions include wireless, switching, security, EMM, communications, and security cameras, all centrally managed from the web. | Networking | Devices | |
Cisco Prime | Cisco Prime offers a suite of tools to automate the management of wired and wireless Cisco networks. | Networking | Devices | |
Cisco Secure Workload (formerly Tetration) | Cisco Secure Workload (formerly Tetration) is a micro-segmentation platform that offers zero trust-based workload protection for multi cloud data centers. | IAM | Devices | |
Cisco Security Manager | Cisco Security Manager provides policy enforcement and rapid troubleshooting of security events, offering summarized reports across the security deployment. | Networking | Devices | |
Cisco Stealthwatch | Cisco Stealthwatch is an agentless malware detection solution that provides visibility and network traffic security analytics across the extended network, including endpoints, branch, data center, and cloud. | Networking | Devices | |
Cisco Smart Net Total Care (SNTC) | Cisco Smart Net Total Care is a smart services assistant providing hardware, web, and mobile support to enable efficient operations. | Networking | Devices | |
Cisco UCS Central (UCS) | Cisco Unified Computing System (UCS) is a data center server computer product line that brings together compute, networking, and storage, all in a single system to power applications. | Storage Management | Devices | |
Cisco UCS Manager | Cisco UCS Manager supports the entire Cisco UCS server and Cisco HyperFlex Series hyperconverged infrastructure portfolios. It enables server, fabric, and storage provisioning, as well as device discovery, inventory, configuration, diagnostics, monitoring, fault detection, auditing, and statistics collection. | Networking | Devices | |
Cisco Umbrella | Cisco Umbrella is a secure internet gateway in the cloud, including DNS and IP layer enforcement and command and control callback blocking. | Networking | Devices, Users | |
Cisco Unified Communications Manager | Cisco Unified Communications Manager provides secure and manageable call control and session management. | IoT | Devices | |
Cisco Webex | Cisco Webex is an enterprise solution for video conferencing, online meetings, screen share, and webinars. Web conferencing, cloud calling and equipment. | Remote Conferencing | Devices, Users | |
Citrix ADC | Citrix ADC is an application delivery and load balancing solution for monolithic and microservices-based applications. | Networking, DevOps | Devices | |
Citrix Application Delivery Management (ADM) | Citrix Application Delivery Management (ADM) is a platform enabling automation, orchestration, management, and analytics across hybrid multi-cloud environments. | Cloud Infra, Cloud Mgmt, Config/Patch Mgmt, Infra Monitoring, Virtualization | Devices | |
Citrix DaaS | Citrix DaaS (device as a service) is a cloud-based solution that allows companies to securely deliver DaaS and VDI apps and desktops to any device, over any network. | Virtualization | Devices | |
Citrix Director | Citrix Director is a web-based monitoring console for Citrix XenApp and XenDesktop virtualization platforms that allows administrators to control and monitor virtual applications and desktops. | Virtualization, ITAM/ITSM, Cloud, DevOps, | Devices, Users | |
Citrix Endpoint Management (XenMobile) | Citrix Endpoint Management (formerly XenMobile) is a solution for managing endpoints, offering mobile device management (MDM) and mobile application management (MAM) capabilities. | UEM, MDM/EMM | Devices | |
Citrix ShareFile | ShareFile is a secure content collaboration, file sharing, and sync software. | Collaboration | Users | |
Claroty CTD | Claroty CTD discovers assets and monitors communication patterns for ICS networks. | OT | Devices, Vulnerabilities, SaaS Applications | |
Claroty xDome | Claroty xDome is a cyber-physical security (CPS) platform for IoT security. | Cloud Security, Cyber Intelligence, Infra Monitoring, IoT, OT | Devices | |
CloudCheckr | CloudCheckr is multi-cloud optimization and resource management software that includes cost management, security and compliance management, and resource utilization. | Cloud Mgmt. | Devices | |
CloudHealth | CloudHealth is a cloud management platform to analyze and manage cloud cost, usage, security, and governance. | Cloud Infra, Cloud | Devices | |
Cloudfit CFS | CloudFit CFS delivers managed, custom applications for cloud, hybrid, and on-premise environments. | Cloud Infra, Cloud | Devices | |
Cloudflare DNS | Cloudflare DNS runs one of the largest DNS networks in the world. | Networking | Devices, Users | |
CloudFlare Zero Trust | Deliver Zero Trust Network Access on CloudFlare's Edge. | Secure Web Gateways | Devices, Users | |
CloudPassage Halo | CloudPassage Halo is a security automation platform providing visibility, protection, and continuous compliance monitoring for AWS and Azure deployments. | Cloud Infra, Cloud | Devices | |
CoalfireOne | CoalfireOne provides year-round visibility and proactive management of your compliance program. | Risk Management | Devices | |
Code42 Incyder | Code42 Incyder (formerly Code42) is a next-gen DLP solution used to detect insider threats, satisfy regulatory compliance, and accelerate incident response investigations. | DLP, Data Security | Devices, Users | |
Cofense PhishMe | Cofense PhishMe provides phishing awareness training and threat simulations for employees. | Security Awareness, GRC, Email Security | Users | |
Cohesity | Cohesity is a cloud data platform that provides a comprehensive range of data management services. | Cloud Mgmt. | Devices | |
Collibra | Collibra is a data catalog platform and tool that helps organizations better understand and manage their data assets. | Audit/Compliance | Devices, Users | |
Com Laude | Com Laude is a domain name registrar, providing domain name management services. | License Mgmt | Devices, Users | |
Commvault | Commvault enables data protection, backup and recovery, and information management solutions. | Data Security | Devices, Users | |
Confluent | Confluent is a data streaming platform that enables you to easily access, store, and manage data as continuous, real-time streams. | Data Security, Storage Management | Devices, Users | |
ConnectSecure | ConnectSecure provides managed service providers (MSPs) a vulnerability scanning and compliance management tool for their SMB clients. | VA Tool | Devices | |
ConnectWise Automate | ConnectWise Automate monitors, manages, and supports client networks. using out-of-the-box scripts, continuous monitoring, and automation capabilities. | RMM, Config/Patch Mgmt | Devices | |
Contabo | Contabo is a hosting provider that offers a range of solutions, including virtual private servers, dedicated servers, and colocation services. | Cloud Infra, Virtualization | Devices, Users | |
Contrast Security | Contrast Security protects software applications against cyberattacks. | AppSec, DevOps | Devices | |
Cornerstone | Cornerstone is an AI-powered talent management software that helps businesses to recruit, train, and manage their employees. | HR | Users | |
Cradlepoint | Cradlepoint develops cloud-managed wireless edge networking equipment. | Networking | Devices | |
CrashPlan | CrashPlan provides backup and recovery, ransomware recovery, and device migration services for small businesses and enterprises. | Data Security | Devices, Users | |
Cribl | Cribl is a vendor-agnostic observability pipeline used to collect, reduce, enrich, normalize, and route data. | Infra Monitoring | Devices, Users | |
CrowdStrike Falcon | CrowdStrike Falcon delivers next-generation antivirus, endpoint detection and response (EDR), managed threat hunting, and threat intelligence. | EDR/EPP, SaaS Management | Devices, Users, SaaS data | |
CrowdStrike Falcon Discover | CrowdStrike Falcon Discover is a network security monitoring tool that provides real-time visibility into devices, users, and applications. | Networking | Devices | |
CrowdStrike Falcon Identity Protection (formerly Preempt) | CrowdStrike Falcon Identity Protection (formerly Preempt) lets organizations reduce user risk on their attack surface and preempt threats in real-time with Conditional Access. It continuously analyzes, adapts and responds to threats based on identity, behavior, and risk to resolve insider threats and targeted attacks. | IAM | Devices, Users | |
CrowdStrike Kubernetes Protection | CrowdStrike Kubernetes Protection provides cloud-native application security, including breach prevention, workload protection, and cloud security posture management. | Cloud Infra, Containers | Compute Services, Containers | |
Crestron XiO Cloud | Crestron XiO Cloud is a technology operations management platform that allows users to configure and manage all Crestron device from one central location. | Collaboration | Devices | |
CSCDomainManager | CSCDomainManager is a web-based portfolio management platform consolidating domains alongside social media usernames, SSL digital certificates, and DNS. | Networking | Devices | |
CSI Leasing | The CSI Adapter tracks hardware contract expiration details. | License Mgmt | Devices | |
CSV | The CSV adapter imports .csv files with inventory information including: devices and serial numbers, users, and installed software data. | CMDB, ITAM/ITSM | Devices, Users | |
CSV - Applications | The CSV - Applications adapter imports SaaS Vendor information from a CSV file. | SaaS Management | SaaS Data | |
CSV - DNS Records | The DNS CSV adapter enables the discovery of SaaS applications based on the organizations web browsing records. | SaaS Management | SaaS Data | |
CSV - Expenses | CSV - Expenses File Adapter imports information about transactions related to SaaS from a CSV file. | SaaS Management | SaaS Data | |
CSV-Licenses | CSV - Licenses adapter imports information about SaaS licenses from a CSV file. | SaaS Management | SaaS Data | |
CSV - Networks | CSV - Networks adapter imports information about networks from a CSV file. You can use this adapter to fetch a bulk list of network segments. | SaaS Management | SaaS Data | |
CSV - URLs | CSV - URLs adapter imports information about URLs from a CSV file. | SaaS Management | SaaS Data | |
CTL Cider | CTL Cider is a DevOps focused application that provides information regarding node health, resources, and availability. | DevOps | Devices | |
CyberArk Alero | CyberArk Alero secures remote access to critical systems for employees and third-party vendors. | PAM | Users | |
CyberArk Endpoint Privilege Manager | CyberArk Endpoint Privilege Manager enforces least privilege, providing credential theft protection and application control at scale. | PAM, IAM | Devices | |
CyberArk Idaptive | Idaptive Identity Management Platform is an identity and access management solution that unifies identity and access management services. | IAM | Devices, Users | |
CyberArk Privilege Cloud | CyberArk Privilege Cloud is a privileged access management (PAM) solution for securing, managing, and monitoring privileged accounts. | PAM, IAM | Users | |
CyberArk Privileged Account Security | CyberArk Privileged Account Security provides privileged password management, session recording, least privilege enforcement, and privileged data analytics. | PAM, IAM | Users | |
Cybereason Deep Detect & Respond | Cybereason Deep Detect & Respond (EDR) defends against advanced attacks by collecting and analyzing behavioral data to identify suspicious activities. | EDR/EPP | Devices | |
Cyberhaven | Cyberhaven provides a data detection and response (DDR) solution, based on big data graph analytics of all user interactions with data over time and across the enterprise. | Data Security | Devices | |
Cyberint Argos Edge | Cyberint Argos Edge is an attack surface management solution providing findings into the external attack surface, phishing threats, brand impersonation, and more. | Attack Surface Mgmt, Cyber Intelligence | Devices | |
CyCognito Platform | The CyCognito platform delivers proactive attack surface protection and digital risk protection across your entire extended IT ecosystem to help you identify, categorize, prioritize and eliminate your attacker-exposed risk. | Cyber Intelligence | Devices | |
CylancePROTECT | CylancePROTECT uses artificial intelligence to detect and protect against ransomware, advanced threats, fileless malware, and malicious documents. | EDR/EPP | Devices | |
Cymulate | Cymulate is a breach and attack simulation (BAS) platform that helps companies optimize security posture by testing internal and external defenses. | Cyber Intelligence, Attack Surface Management | Devices | |
Cynerio | Cynerio is a healthcare IoT security platform that identifies, monitors, and secures connected medical devices. | IoT, VA Tool | Devices, Vulnerabilities | |
Cynet 360 | Cynet 360 is a detection and response security platform for finding, ranking, and remediating unknown, camouflaged threats. | EDR/EPP | Devices | |
Darktrace | Darktrace Immune System protects workforce and data from sophisticated attackers, by detecting, investigating and responding to cyber-threats. | Cyber Intelligence, EDR/EPP | Devices | |
Databricks | Databricks combines data warehouses & data lakes into a lakehouse architecture that handles data, analytics, and AI use cases. | Cloud Infra, Networking | Devices, Users | |
Datadog | Datadog is a monitoring service for cloud-scale applications, providing monitoring of servers, databases, tools, and services. | Cloud Mgmt., Cloud | Devices, Users | |
Data Theorem | Data Theorem is an application security platform focusing on API Security, Web Security, Mobile Security, and Cloud Security. | Cloud Security, AppSec, Data Security | Devices | |
Datto RMM (Autotask Endpoint Management) | Datto RMM (formerly Autotask Endpoint Management) is a cloud-based Remote Monitoring and Management (RMM) platform that provides device auditing, real-time monitoring, and automatic patching. | EDR/EPP, Config/Patch Mgmt., RMM | Devices | |
Dazz | Dazz provides automated remediation processes for applications, code, clouds, and infrastructure. | AppSec, Attack Surface Management, VA Tool | Devices, Vulnerabilities, SaaS Applications | |
Deep Instinct | Deep Instinct is an anti-ransomware and anti-malware solution that leverages deep learning to help prevent malware from executing inside organizations' environments. | Cyber intelligence | Devices | |
DefenseStorm | DefenseStorm provides CyberSecurity, CyberCompliance and CyberFraud solutions specifically built for banking. | NDR, Risk Management | Devices | |
Delinea Privilege Manager (Thycotic) | Delinea Privilege Manager (formerly Thycotic) mitigates malware and security threats from exploiting applications by removing local administrative rights and enforcing least privilege on endpoints. | PAM | Devices, Users | |
Delinea Secret Server (Thycotic) | Delinea Secret Server (formerly Thycotic) is a Privileged Access Management (PAM) solution for protecting your privileged accounts, available both on premise or in the cloud. | PAM | Users | |
Dell Boomi | Dell Boomi’s iPaaS platform enables businesses to discover, manage, and orchestrate data while connecting applications, processes, and people. | Cloud Infra | Devices | |
Dell ECS | Dell ECS (Elastic Cloud Storage) is a software-defined object storage platform that provides organizations with an on-premise alternative to public cloud solutions. | Storage Management | Devices, Users | |
Dell EMC Avamar | Dell EMC Avamar is a backup and recovery solution that enables daily backups of physical and virtual environments, NAS servers, enterprise applications, remote offices and desktops/laptops. | DLP, Data Security | Devices | |
Dell iDRAC | The Integrated Dell Remote Access Controller (iDRAC) is designed for secure local and remote server management and helps IT administrators deploy, update and monitor Dell EMC PowerEdge servers. | RMM, ITAM/ITSM | Devices | |
Dell OpenManage Enterprise | Dell OpenManage Enterprise is a one-to-many systems management console. It facilitates lifecycle management for Dell EMC PowerEdge servers in one console. | Infra Monitoring, ITAM/ITSM | Devices, Users | |
Dell PowerMax | Dell PowerMax is an NVMe-based (Non-Volatile Memory Express), mission-critical data storage offering. | ITAM/ITSM, Storage Management | Devices | |
Dell PowerProtect DD Management Center | Dell PowerProtect Data Domain Management Center is a centralized storage management solution that provides aggregate capacity, replication and performance management, and reporting. | Storage Management | Devices | |
Dell PowerScale OneFS | Dell PowerScale OneFS is a scale-out network attached storage (NAS) platform that addresses unstructured data needs at the edge, the core, or the cloud. | Storage Management | Devices | |
Dell PowerStore | Dell PowerStore is a flexible, scalable data storage appliance designed for data-centric infrastructures. | Storage Management | Devices, Users | |
Dell RecoverPoint | Dell RecoverPoint is a data protection and disaster recovery solution. | Storage Management | Devices | |
Dell Unisphere for PowerMax | Dell Unisphere for PowerMax is a management tool for administering and monitoring PowerMax storage arrays. | Storage Management | Devices | |
Dell Unisphere For Unity | Dell Unisphere for Unity enables Dell EMC Unity customers to manage storage systems. | Storage Management | Devices | |
Dell VPLEX | Dell VPLEX delivers continuous data availability, transparent data mobility, and nondisruptive data migration for mission-critical applications. | Storage Management | Devices | |
Dell WYSE Management | Dell Wyse Management Suite is a cloud solution that enables an IT admin to securely manage Dell client devices. | UEM, RMM | Devices | |
Device42 | Device42 is a cloud-based CMDB for physical, virtual, and cloud servers and containers, network components, software, services, applications, and their relationships and dependencies. | CMDB, ITAM/ITSM | Devices | |
DeviceTotal | DeviceTotal is an agentless attack surface management solution. | Attack Surface Mgmt | Devices | |
Devo | Devo is a cloud-native logging and security analytics solution that delivers real-time visibility for security and operations teams. | SIEM | Devices, Users | |
Dialpad | Dialpad is a cloud-based communication and collaboration platform for voice, video, and messaging. | Collaboration | Users | |
Digi | Digi provides IoT solutions including hardware, software, and services for connecting and managing IoT devices and networks. | IoT, Infra Monitoring | Devices | |
DigiCert CertCentral | DigiCert CertCentral consolidates tasks for issuing, installing, inspecting, remediating, and renewing certificates. | Certificate Mgmt. | Devices | |
DigiCert PKI Platform (Symantec Managed PKI) | DigiCert PKI Platform (formerly Symantec Managed PKI) provides a cloud-based enterprise solution for issuing and managing digital certificates used to enable strong authentication and encryption. | Certificate Mgmt. | Devices | |
Digital Guardian DLP | Digital Guardian DLP is a SaaS-based platform that provides data-loss prevention across Windows, Mac, and Linux systems and applications. | DLP | Devices | |
DigitalOcean | DigitalOcean is a cloud hosting provider that offers cloud computing services and Infrastructure-as-a-Service (IaaS). | Cloud Infra | Devices | |
Digital Realty Portal | Digital Realty is a data center management platform that provides colocation, interconnection, and customized data solutions. | Cloud Infra, Infra Monitoring | Users | |
Digital Shadows SearchLight | Digital Shadows SearchLight is a digital risk protection solution that protects organizations against external risk exposure. | Cyber Intelligence | Devices | |
DMARCLY | DMARCLY is an email security tool for implementing and managing DMARC policies to protect against phishing. | Email Security, Security Awareness | Devices | |
DNSFilter | DNSFilter is a cloud-based web content filtering solution that protects users from accessing malicious or inappropriate websites. | Secure Web Gateways, Cloud Security | Devices | |
DNS Made Easy | DNS Made Easy offers DNS management services. | Networking | Devices | |
Docker | Docker is a platform designed to help developers build, share, and run container applications. | Containers | Devices, Users | |
Docker Engine | Docker Engine is an open-source containerization technology that helps development teams build and manage applications. | Containers, Cloud Mgmt, DevOps, Cloud Infra, Infra Monitoring | Devices | |
DocuSign | DocuSign helps organizations connect and automate how they prepare, sign, act on and manage agreements. | AppSec, Collaboration, SaaS Management | Users, SaaS data | |
DOJ CSAM | DOJ’s proprietary Cyber Security Assessment and Management (CSAM) automates assessments and authorizations to provide a comprehensive assessment and continuous monitoring service. | Risk Management | Devices | |
Domotz | Domotz is network monitoring software. | Networking | Devices | |
Dope Security Flightdeck | Dope Security is an endpoint-based secure web gateway solution. | Cloud Security, Secure Web Gateways | Devices | |
Dragos Platform | The Dragos Platform identifies ICS network assets, malicious activity, and provides guidance to investigate incidents. | OT, Network Security | Devices | |
Dropbox | Dropbox is a file hosting service that offers cloud storage, file synchronization, personal cloud, and client software. | Cloud Mgmt., Cloud | Devices, Users | |
Druva Cloud Platform | Druva Cloud Platform is a data protection as-a-service that provides management across all customer data sources that are scalable, predictable and on-demand. | DLP, Data Security | Devices, Users | |
Duo Beyond | Duo Beyond identifies corporate vs. personal devices, blocks untrusted devices, and give users secure access to internal applications. | IAM | Devices, Users | |
Dynamics CMDB (HelpDesk) | HelpDesk integrated with Microsoft Dynamics provides a complete ticketing solution. | Ticketing | Devices | |
Dynatrace | Dynatrace is a software intelligence platform providing application performance management and cloud infrastructure monitoring. | Cloud Mgmt., Cloud | Devices, Users | |
Eagle Eye Networks | Eagle Eye Networks provides cloud-based video surveillance products for physical security and business operations applications. | Security Awareness | Devices | |
EasyRedir | EasyRedir is a URL redirection management platform that creates, analyzes, and manages redirects while automatically provisioning and renewing SSL certificates. | Secure Web Gateway Cloud Security Certificate Management | Devices | |
EasyVista Service Manager | EasyVista is an ITSM (IT Service Management) solution including change, release, incident, problem, and knowledge management. | ITAM/ITSM | Devices | |
ECI FMAudit | ECI FMAudit is print management software that allows users to remotely monitor print environments and maintain visibility into their operations. | RMM | Devices | |
Eclypsium | Eclypsium protects the foundation of the computing infrastructure, controlling risks and stopping threats to enterprise firmware and hardware devices. | Firmware Security | Devices | |
Edgescan Fullstack Vulnerability Management | Edgescan Fullstack Vulnerability Management is a cloud-based continuous vulnerability management and penetration testing solution that discovers, validates and rates vulnerabilities by running continuous asset profiling to detect rogue/exposed ports, hosts or even hidden API’s. | VA Tool | Devices | |
Efecte | Efecte is an IT service management (ITSM) and collaboration platform with a focus on SaaS security and configuration management. | CMDB, Collaboration, IAM, ITAM/ITSM, Risk Management, SaaS Management, Audit/Compliance | Devices | |
EfficientIP SOLIDserver DDI | EfficientIP SOLIDserver DDI suite is designed to deliver virtual and hardware appliances for critical DNS-DHCP-IPAM services. | Networking | Devices | |
Ekran | Ekran System is a cybersecurity software vendor delivering a full-cycle insider risk management platform. | PAM, Audit/Compliance | Users | |
Elastic Defend | Elastic Defend (formerly Endgame) is a tool for malware prevention, detection, and response. | EDR/EPP, IT Agent | Devices | |
Elasticsearch | The Elasticsearch adapter imports device information from an Elasticsearch database. | CMDB, ITAM/ITSM | Devices | |
eMASS | eMASS is a federal system designed to help maintain information assurance situational awareness, manage risk, and comply with federal regulations. | Risk Management | Devices, Users | |
Endgame | Endgame is an endpoint protection platform that combines on-line and off-line protection against exploits, phishing, malware, ransomware, and fileless attacks. | EDR/EPP | Devices | |
Entrust | Entrust provides identity, payment, and data security solutions. | Certificate Management, Audit/Compliance | Certificates | |
Entrust Certificate Hub | Entrust Certificate Hub is a centralized platform for managing digital certificates across various environments, automating certificate lifecycle management, and providing visibility into security compliance. | Certificate Mgmt, Cloud Mgmt, IAM | Certificates | |
Envoy | Envoy is a unified workplace platform that manages various aspects of physical workspaces. | ITAM/ITSM, HR | Users | |
EPEAT | EPEAT (Electronic Product Environmental Assessment Tool) evaluates the effect of a product on the environment. | Audit/Compliance | Devices | |
Equinix | Equinix provides digital infrastructure and data center services. | Networking | Users | |
Eracent | Eracent provides IT asset management and software asset management solutions to help customers inventory assets and optimize licensing costs. | ITAM/ITSM | Devices | |
Ermetic | Ermetic is a cloud infrastructure security platform, focusing on identity protection. | Cloud Security | Devices | |
ESET Endpoint Security | ESET Endpoint Security is an anti-malware suite for Windows including web filtering, firewall, USB drive and botnet protection. | EDR/EPP | Devices | |
ESET PROTECT | ESET is an Endpoint Protection Platform (EPP) for Windows, Mac, Linux, Android, and iOS operating systems. | EDR/EPP | Devices | |
Everbridge | Everbridge is an emergency notification and critical event management platform for communicating during incidents or crises. | Risk Management | Users, Roles | |
Exabeam | Exabeam is a cloud-based platform combining SIEM, threat detection, investigation, and response (TDIR) and XDR capabilities. Integrate Exabeam with the Axonius Cybersecurity Asset Management Platform. | SIEM | Devices | |
Exabeam Cloud | Exabeam Cloud is a cloud-based Security Information and Event Management (SIEM) solution. | SIEM, Cloud Security | Devices | |
Exabeam Data Lake | Exabeam Data Lake (previously known as Exabeam Log Manager) is a cloud-native data lake architecture to securely ingest, parse, and store security data at scale from any location, across multi-year data. | SIEM | Devices | |
ExtraHop Reveal(x) | ExtraHop Reveal(x) is a network detection and response (NDR) solution that provides visibility, real-time threat detection, and response. | NDR | Devices | |
ExtraHop Reveal(x) 360 | ExtraHop Reveal(x) 360 is a SaaS-based network detection and response (NDR) platform that provides unified security across on-premises and cloud environments. | NDR, Networking, Cloud Infra, Cloud Security, IAM | Devices | |
ExtremeCloud IQ | ExtremeCloud IQ enables management of wireless access points, switches, and routers. | NDR | Devices | |
ExtremeCloud IQ Site Engine | ExtremeCloud IQ Site Engine is an IT operations tool for web-based reporting, network analysis, troubleshooting, and helpdesk. | Infra Monitoring, Networking | Devices | |
Extreme Networks ExtremeControl | Extreme Networks ExtremeControl is a Network Access Control (NAC) solution that provides role-based access controls and reporting on user activity across all devices. | NAC | Devices | |
Extreme Networks ExtremeWireless WiNG | Extreme Networks ExtremeWireless WiNG in a WLAN operating system designed to scale efficiently from the smallest networks to large, geographically dispersed deployments. | Networking | Devices | |
eyeInspect | ForeScout eyeInspect is a compliance and threat analysis tool for ICS and OT environments. | OT, Audit/Compliance | Devices | |
EzOfficeInventory | EZOfficeinventory is a cloud-based asset tracking platform used for tracking physical and digital assets. | ITAM/ITSM | Devices, Users | |
F-Secure Policy Manager | F-Secure Policy Manager provides a centralized management console for the security of the managed hosts in the network. | UEM, MDM/EMM | Devices | |
F-Secure Protection Service for Business (PSB) | F-Secure Protection Service for Business (PSB) is a central management portal for managing VPN, mobile device management, software update management, workstation, and server security. | UEM, MDM/EMM | Devices | |
F5 BIG-IP iControl | F5 iControl is a Web services-enabled open API providing granular control over the configuration and management of F5's application delivery platform, BIG-IP. | Networking | Devices | |
F5 BIG-IQ Centralized Management | F5 BIG-IQ Centralized Management provides centralized management, licensing, monitoring, and analytics for BIG-IP infrastructure. | Infra Monitoring, ITAM/ITSM | Devices | |
F5 Distributed Cloud | F5 Distributed Cloud is a cloud-based security and application management platform. | Cloud Security, Cloud Mgmt, AppSec | Devices | |
Feedly | Feedly is a news aggregator application for various web browsers and mobile devices. | Collaboration | Devices | |
FileWave | FileWave offers unified device management for all devices, platforms, and environments. | ITAM/ITSM, IT Agent | Devices | |
FireEye Endpoint Security (formerly HX) | FireEye Endpoint Security (formerly HX) detects and protects against unknown endpoint threats and exploits with integrated threat intelligence. | EDR/EPP | Devices | |
FireEye Endpoint Security Logon Tracker | FireEye Endpoint Security Logon Tracker enables the investigation of lateral movement within Windows enterprise environments. | Infra Monitoring | Devices | |
FireMon Asset Manager | FireMon Asset Manager is a network visibility solution for cyber situational awareness and compliance monitoring. | Attack Surface Mgmt, Cloud Infra, Cloud Mgmt, Cloud Security, Config/Patch Mgmt, ITAM/ITSM, Infra Monitoring, Networking, ana, Audit/Compliance | Devices | |
FireMon Security Manager | FireMon Security Manager is a network security solution that provides real-time visibility, control, and management for network security devices across hybrid cloud environments. | Networking, Cloud Security | Devices | |
FleetDM | FleetDM Fleet (formerly Kolide Fleet) is an is an open-source query manager for device management. | EDR/EPP | Devices | |
Flexera IT Asset Management | Flexera lets enterprises gain visibility and control of IT assets, reduce ongoing software costs, and maintain continuous license compliance. | ITAM/ITSM | Devices | |
Flexera Software Vulnerability Research provides access to verified intelligence from Secunia Research. | Cyber Intelligence | Devices | ||
Flexera SVM | Flexera Security Vulnerability Manager (SVM) is a vulnerability assessment, patch management, and vulnerability intelligence platform. | VA Tool | Devices | |
FlexNet Manager Suite Cloud | FlexNet Manager Suite Cloud from Flexera is a SaaS offering for software license compliance and license optimization. | License Mgmt | Devices, SaaS data | |
FloQast | FloQast is a SaaS accounting application, incorporating AI to automate close management and accounting workflows. | ERP, Collaboration | Users | |
Forcepoint Insider Threat | Forcepoint Insider Threat is a security analytics tool for searching, detecting and mitigating malicious actors or insider threats. | UEBA | Users | |
Forcepoint ONE | Forcepoint ONE provides data protection that monitors real-time traffic and prevents data loss. | Cloud Security, DLP, Secure Web Gateways | Devices | |
Forcepoint Web Security Endpoint CSV File | Forcepoint Web Security Endpoint CSV File imports CSV files with device information. | IAM, Config Mgmt. | Devices | |
Forcepoint ZTNA Private Access | Forcepoint ZTNA Private Access (formerly Forcepoint Web Security Endpoint) enables end-users to authenticate and receive policy enforcement via the Forcepoint Web Security Cloud infrastructure. | IAM, Config Mgmt. | Devices | |
Foreman | Foreman is a free open source project that automates repetitive tasks, quickly deploys applications, and proactively manages server lifecyle, on-premises or in the cloud. | Config Mgmt. | Devices | |
ForeScout CounterACT | ForeScout CounterACT platform provides insight into network-connected devices. | NAC | Devices | |
Forescout Switch Plugin | Forescout Switch Plugin is a component of the ForeScout CounterACT Network Module and provides switch to endpoint information as well as VLAN and ACL management capabilities. | NAC, Networking | Devices | |
ForgeRock | ForgeRock Directory Services is a high-performance identity store that provides the necessary encryption to protect enterprise data at rest and encryption. | Directory | Devices, Users | |
FortiClient EMS | FortiClient Enterprise Management Server (FortiClient EMS) is a security management solution that enables scalable and centralized management of multiple endpoints. | EDR/EPP | Devices | |
FortiCloud | FortiCloud is a cloud-based platform offering compliance, security and management services for Fortinet solutions. | Cloud Mgmt, Cloud Security, IAM, Audit/Compliance | Devices | |
FortiEDR (enSilo) | FortiEDR (formerly enSilo) automates and orchestrates detection, prevention, and response against malware and ransomware. | EDR/EPP | Devices | |
FortifyData | FortifyData is a threat exposure management platform for identifying, monitoring, and managing cyber risk. | Risk Management | Devices | |
Fortify On Demand | Fortify On Demand delivers application security as a service, providing security testing and vulnerability management. | AppSec, VA Tool | Devices, Users | |
Fortify Software Security Center | Fortify Software Security Center offers security assurance solutions that address the threats posed by security flaws in business-critical software apps. | AppSec, DevOps | Devices | |
FortiNAC | FortiNAC is a network access control solution that provides protection against IoT threats, control of third-party devices, and automated responses to networking events. | NAC | Devices | |
Fortinet FortiGate | Fortinet FortiGate is a next-generation firewall providing security and visibility for end-to-end protection across the entire enterprise network. | Firewall | Devices | |
Fortinet FortiSIEM | FortiSIEM is a platform that rapidly detects and responds to security threats using Machine Learning / UEBA. | Infra Monitoring, Asset Management, SIEM | Alerts/Incidents | |
FortiPortal | FortiPortal is a cloud-based security policy, wireless management, and analytics for MSSPs, enterprises, education and government customers. | Networking, Remote Monitoring and Management | Devices | |
Forward Networks | Forward Networks is revolutionizing the way large networks are managed. Forward's advanced software delivers a digital twin of the network, enabling network operators to ensure that the network is secure, reliable, and agile. The platform supports devices from all major networking vendors and cloud operators, including AWS, Azure, and Google Cloud Platform. | Networking, Infra Monitoring | Devices | |
Foxpass | Foxpass is an Identity and Access Management (IAM) solution that centralizes and automates access control for servers and applications. | IAM | Users | |
FreeIPA | FreeIPA is a free and open source identity management system for Linux environments. | IAM | Devices, Users | |
Freshdesk | Freshdesk is a cloud-based customer support platform that was founded with the mission of enabling companies of all sizes to provide great customer service. | CRM | Users | |
Freshservice | Freshservice is a cloud-based IT help desk and service management solution that enables organizations to simplify their IT operations. | ITAM/ITSM, SaaS Management | Devices, Users, SaaS data | |
Frontline VM | Frontline VM, a frontline cloud system, is a vulnerability management application that performs comprehensive security assessments and helps prioritize and track the results, making remediation more efficient and effective. | VA Tool | Devices | |
Gainsight PX | Gainsight PX is a product experience platform that helps businesses understand and improve user engagement with their software products. | CRM | Users | |
Generic SCIM | Generic SCIM, or the System for Cross-domain Identity Management, is a protocol for automating the exchange of user identity information between identity domains and IT systems. | IAM, ITAM/ITSM | Users, Groups | |
Genian | Genian NAC identifies and monitors all hardware and software in the network environment to determine each device’s security state then establish the appropriate level of access to ensure compliance. | NAC | Devices | |
Gigamon GigaVUE-FM (Fabric Manager) | Gigamon GigaVUE-FM (Fabric Manager) delivers management and monitoring of all physical and virtual nodes across your on-premises, virtual and public-cloud deployments. | Networking | Devices | |
Gigamon ThreatINSIGHT | Gigamon ThreatINSIGHT is a cloud-native network detection and response (NDR) platform that provides threat activity detection and the data and context needed for cybersecurity response and investigation. | MDR, Cyber Intelligence | Devices | |
GitHub | GitHub provides hosting for software development version control using Git, including distributed version control and source code management (SCM) functionality. | Software Development Version Control, DevOps, SaaS Management | Users, SaaS data | |
GitLab | GitLab is an open-source DevOps lifecycle tool that provides a wiki, issue-tracking, and continuous integration and deployment pipeline features. | DevOps | Devices, Users | |
Global Risk Exchange | The Global Risk Exchange (formerly CyberGRX) is a collaborative risk exchange platform for managing third-party cyber risk assessments. | Audit/Compliance | Devices | |
Global Sign Atlas | GlobalSign Atlas offers cloud certificate management and automation. | Certificate Management | Devices | |
GLPI | GLPI is an open-source service management software tool to manage Helpdesk and IT assets. | ITAM/ITSM | Devices, Users | |
Gluware | Gluware offers a cloud-based network orchestration platform that helps automate and orchestrate large multi-vendor, mission-critical networks. | Networking | Devices | |
GoDaddy | GoDaddy is a domain registrar that also offers additional services such as website building and management, website and email hosting, SSL security, and more. | Networking | Devices | |
Gong | Gong is a customer data management platform that automatically captures and updates data from integrated tools, allowing for consolidated visibility into all customer interactions, across all stages of the relationship. | CRM, SaaS Management | Users, SaaS data | |
Google BigQuery | BigQuery is a serverless, highly-scalable, and cost-effective cloud data warehouse with an in-memory BI Engine and machine learning built in. | CMDB | Devices | |
Google Chronicle Security | Google Chronicle Security is designed for enterprises to privately retain, analyze, and search security and network telemetry. | Cloud Security | Devices | |
Google Cloud Platform (GCP) | Google Cloud Platform (GCP) is a suite of cloud computing services. Alongside a set of management tools, it provides a series of modular cloud services including computing, data storage, data analytics and machine learning. | Cloud Infra, Cloud, Virtualization, ITAM/ITSM, Containers | Devices, Users | |
Google Sheets | Google Sheets is a spreadsheet application included as part of the free, web-based Google Docs Editors suite offered by Google. | Collaboration | Devices, Users | |
Google Tag Manager | Google Tag Manager is a tag management system for web pages that allows marketers and developers to manage and deploy marketing tags and other code snippets on their websites. | SaaS Management | Users | |
Google Workspace (G Suite) | Google Workspace (formerly G Suite) is a collection of cloud computing, productivity, collaboration, device, user, and data management tools developed by Google. | MDM/EMM, IAM, SaaS Management | Devices, Users, SaaS data | |
GoSecure Titan | GoSecure Titan integrates endpoint, network, and email threat detection into a single endpoint detection and response service. | EDR/EPP | Devices | |
Greenhouse | Greenhouse is a talent acquisition software company that offers its suite of tools and services to help businesses with the hiring process. | HR | Users, SaaS data | |
GreyNoise | GreyNoise collects, analyzes, and filters internet scan activity. | Cyber Intelligence | Devices | |
Grouper | Grouper is an access management tool that provides attribute/role-based access control and group memberships. | IAM | Users | |
GRR Rapid Response | GRR Rapid Response is an incident response framework focused on remote live forensics delivered through a client-server architecture. | EDR/EPP | Devices | |
Guardicore | Guardicore is a data center and cloud security company that protects the organization’s core assets. | Cloud Security, Cloud | Devices, Users | |
Gytpol | GYTPOL is a security configuration management solution providing both visibility of devices and automation of the hardening process. | CMDB, Config/Patch Mgmt | Devices | |
Halcyon | The Halcyon Anti-Ransomware and Cyber Resilience Platform offers layered ransomware protection. | EDR/EPP | Devices, Users | |
HaloITSM | HaloITSM is a cloud-based IT service management solution designed for ITIL-aligned service delivery. | ITAM/ITSM | Devices, Users | |
HAProxy | HAProxy is free and open source software that provides a high availability load balancer and reverse proxy for TCP and HTTP-based applications. | Networking | Devices, Users | |
Harness | Harness is a self-service CI/CD platform that allows engineers and DevOps to build, test, deploy, and verify software. | DevOps, Cloud Mgmt | Users | |
HashiCorp Consul | HashiCorp Consul is a multi-cloud service networking platform to connect and secure services across any runtime platform and public or private cloud. | Networking | Devices | |
HashiCorp Nomad | HashiCorp Nomad deploys new and legacy applications across multiple datacenters, regions, and clouds. | Cloud Mgmt | Devices | |
Have I Been Pwned | Have I Been Pwned is a website to check if email accounts have been compromised in a data breach. | VA Tool | Users | |
Hawk | HAWK.io is a fully automated, multi-tenant, cloud-based, managed detection and response (MDR) service. | NDR, SIEM | Devices | |
hCaptcha | hCaptcha is a privacy-focused service that protects online applications from spam, bots, and other automated threats. | Collaboration, Secure Web Gateways, AppSec | Users | |
Heimdal Security | Heimdal Security protects organizations and home users against malware attacks. | Data Security, EDR/PP | Devices | |
Hitachi Operations Center | Hitachi Ops Center provides data infrastructure management including automation, analytics, and protection. | RMM | Devices | |
Honeywell Cyber Watch | Honeywell Cyber Watch is a cybersecurity software that identifies and manages OT cyber threats, providing insights into vulnerabilities, configuration issues, and compliance gaps. | OT, Risk Management, VA Tool | Devices | |
Hoxhunt | Hoxhunt provides security awareness training for employees based on cognitive automation and risk calculations. | Security Awareness | Users | |
HP Anyware | HP Anyware supports hybrid work environments allowing users to access their digital workspaces without a VPN. | Networking | Devices | |
HP Device Manager (HPDM) | HP Device Manager (HPDM) is an enterprise-class application for managing and administrating thin client devices on large- and small-scale networks. | Config Mgmt., ITAM/ITSM, RMM | Users | |
HP Integrated Lights-Out (iLO) | HP Integrated Lights-Out (iLO) is server management software that enables the configuration, monitoring, and updating of HPE servers. | Config Mgmt. | Devices | |
HP Network Node Manager i (NNMi) | HP Network Node Manager i (NNMi) is a network health and performance monitoring software with scalability and device support. | Networking | Devices | |
HP NNMi XML File | HP NNMi XML File is a network health and performance monitoring platform. | Networking | Users | |
HP Web Jetadmin | HP Web Jetadmin is a fleet management software solution for the remote configuration, maintenance, and monitoring of HP and standard MIB-compliant 3rd party printers and MFPs. | Infra Monitoring, ITAM/ITSM, Config Mgmt. | Devices | |
HPE GreenLake for Compute Ops Management | HPE GreenLake for Compute Ops Management is a cloud-based management platform for automating and optimizing compute operations. | Cloud Mgmt, Config/Patch Mgmt | Devices | |
HPE Intelligent Management Center (IMC) | HPE Intelligent Management Center (IMC) is a networking solution that delivers management across campus core and data center networks. | Networking | Devices, Users | |
HPE OneView | HPE OneView is an integrated IT management solution that transforms compute, storage, and networking into software-defined infrastructure for task automation. | ITAM/ITSM | Devices | |
HPE SAN | HPE storage area networking (SAN) provides storage solutions for performance, scalability, and manageability. | Storage Management | Devices | |
HPE Switches | HPE Switches provide switch inventory and ARP table information. | Infra Monitoring | Devices, ARP tables | |
Huawei eSight | Huawei eSight is an enterprise operation and maintenance (O&M) platform that provides cross-vendor and cross-product converged management, visualized monitoring, and intelligent analysis for enterprise ICT devices.. | Infra Monitoring | Devices | |
Huawei eSight 21.x | Huawei eSight is an enterprise operation and maintenance (O&M) platform that provides cross-vendor and cross-product converged management, visualized monitoring, and intelligent analysis for enterprise ICT devices. | Infra Monitoring | Devices | |
Huawei iMaster MAE | Huawei iMaster MAE is a platform that provides automated operations and maintenance, monitoring, and optimization for 5G and mobile broadband networks. | Cloud Infra, Infra Monitoring, Networking | Devices | |
Huawei OceanStor Dorado V3 | Huawei OceanStor Dorado V3 is an all-flash storage solution. | Storage Management | Devices | |
HubSpot | HubSpot provides software products for inbound marketing, sales, and customer service. | CRM, SaaS Management | Users, SaaS data | |
Huntress | Huntress is a managed endpoint detection and response (EDR) solution. | EDR/EPP | Devices | |
HYCU | HYCU is a SaaS-based data management product including data protection, migration and disaster recovery. | DLP | Devices | |
HyperSQL | The HyperSQL adapter imports device information from an HyperSQL database. | CMDB, ITAM/ITSM | Devices | |
HYPR Passwordless | HYPR Passwordless provides passwordless security solutions. | IAM | Devices, Users | |
IBM Cloud | IBM's cloud computing platform combines platform as a service (PaaS) with infrastructure as a service (IaaS) and cloud services. | Cloud Infra, Cloud | Devices | |
IBM Guardium | IBM Guardium prevents leaks from databases, data warehouses, and Big Data environments. It ensures the integrity of information and automates compliance controls across heterogeneous environments. | Data Security | Devices | |
IBM Hardware Management Console (HMC) | The Hardware Management Console (HMC) is a hardware appliance that you can use to configure and control one or more managed systems. You can use the HMC to create and manage logical partitions and activate Capacity Upgrade on Demand. Using service applications, the HMC communicates with managed systems to detect, consolidate, and send information to service and support for analysis. | Infra Monitoring, Cluster Management, Containers | Devices | |
IBM License Metric Tool | IBM License Metric Tool (ILMT) helps manage license allocation services on supported systems. | License Mgmt | Devices | |
IBM MaaS360 with Watson | IBM MaaS360 with Watson is a Unified Endpoint Management (UEM) platform covering endpoints, end-users, apps, content, and data. It also gives visibility and control to manage mobile devices running iOS, macOS, Android, and Windows. | CMDB, ITAM/ITSM, MDM/EMM, UEM | Devices | |
IBM Maximo | IBM Maximo Application Suite offers a single platform for asset management, monitoring, maintenance, computer vision, safety and reliability. | CMDB | Devices | |
IBM Power Hardware Management Console (HMC) | The Hardware Management Console (HMC) is a hardware appliance that you can use to configure and control one or more managed systems. You can use the HMC to create and manage logical partitions and activate Capacity Upgrade on Demand. Using service applications, the HMC communicates with managed systems to detect, consolidate, and send information to service and support for analysis. | Infra Monitoring, Cluster Management, Containers | Devices | |
IBM QRadar | IBM QRadar is a Security Information and Event Management (SIEM) solution that enables security teams to detect, prioritize and response to threats across the enterprise. | SIEM | Devices, Users | |
IBM Spectrum Protect Plus | IBM Spectrum Protect Plus provides recovery, replication, retention, and reuse for VMs, databases, applications, file systems, SaaS workloads, and containers in hybrid cloud environments. | Infra Monitoring | Devices | |
IBM Tivoli Application Dependency Discovery Manager (TADDM) | IBM Tivoli Application Dependency Discovery Manager (TADDM) is a configuration management tool that helps IT operations personnel ensure and improve application availability in application environments. | Config Mgmt. | Devices | |
IBM Turbonomic | IBM Turbonomic is a performance and cost optimization platform for public, private, and hybrid cloud. | Cloud Mgmt, DevOps, Infra Monitoring, ITAM/ITSM | Users | |
IBM Urban Code | IBM UrbanCode provides software delivery for any mix of on-premises, cloud, and mainframe applications. | Config/Patch Mgmt | Devices, Users | |
IBM VPC | IBM Cloud Virtual Private Cloud (VPC) is a secure software-defined network (SDN) on which customers can build isolated private clouds. | Cloud Infra | Devices | |
iboss cloud | iboss cloud is cloud-based platform that secures user Internet access in the cloud. | Networking, Cloud Security | Devices, Users | |
iCIMS | iCIMS is an enterprise recruiting platform allowing employers to attract, engage, hire, and advance employees. | HR | Users | |
Icinga | Icinga is an open-source computer system and network monitoring application. It monitors data centers and clouds availability and performance, gives access to data and raises alerts. | Networking | Devices | |
IFS Assyst | IFS Assyst is IT service management (ITSM) software that helps automate business processes | ITAM/ITSM | Devices | |
IGEL Universal Management Suite (UMS) | IGEL Universal Management Suite (UMS) is a single management solution for decentralized endpoints. | MDM/EMM | Devices | |
Illumio Adaptive Security Platform (ASP) | Illumio Adaptive Security Platform (ASP) secures computing platforms in cloud, on-prem, or hybrid environments without any dependency on the underlying network. | Networking | Devices | |
Illusive Networks | Illusive Networks deceives cyber attackers by planting false information about a given network's resources. | Deception, Cyber Intelligence | Devices | |
ImmuniWeb | ImmuniWeb develops machine learning and AI technologies providing continuous monitoring for web applications and APIs. | AppSec, DevOps | Devices | |
Imperva Data Activity Monitoring (DAM) | Imperva Data Activity Monitoring (DAM) defines and enforces data security and compliance policies across the cloud and on-premises including relational databases, mainframes, big data platforms, data warehouses, and enterprise file stores. | IT Agent, Config Mgmt. | Devices | |
| Imperva WAF | Imperva Web Application Firewall (WAF) allows customers to monitor, filter, and block incoming and outgoing data packets from a web application or website. | AppSec, Firewall | Devices |
Imperva WAF Cloud | Imperva Web Application Firewall (WAF) allows customers to monitor, filter, and block incoming and outgoing data packets from a web application or website. | AppSec, Firewall | Devices | |
Infinibox | Infinidat InfiniBox provides enterprise storage for mixed application workloads. | Storage Management | Devices | |
Infinipoint | Infinipoint is a cloud-based automated cyber hygiene platform that enables continuous detection and remediation of risks across the organization’s IT assets. | ITAM/ITSM, Config Mgmt. | Devices, Users | |
Infoblox BloxOne | BloxOne DDI delivers central control and automation of DNS, DHCP and IP address management for hybrid and multi-cloud networks. | Networking, IPAM | Devices | |
Infoblox DDI | Infoblox DDI consolidates DNS, DHCP, IP address management, and other core network services into a single platform, managed from a common console. | Networking | Devices | |
Infoblox NetMRI | Infoblox NetMRI provides network change and configuration management (NCCM), enabling users to automate network change, understand network health, manage network configurations, and meet a variety of compliance requirements. | Networking | Devices, Users | |
Infor EAM | Infor EAM is an asset management system that helps digitizing and optimizing maintenance operations. | ITAM/ITSM | Devices, Users | |
Intel 471 | Intel 471 provides cyber intelligence to assess, identify, and manage potential risks. | Cyber Intelligence, Data Security, Risk Management | Devices, Vulnerabilities, Saas data | |
Intel DCMC | Intel® Data Center Manager is a software solution that collects and analyzes the real-time health, power, and thermals of a variety of devices in data centers. | Infra Monitoring, RMM | Devices | |
Intel EMA | Intel® Endpoint Management Assistant (Intel® EMA) software provides the ability to remotely and securely manage Intel® Active Management Technology (Intel® AMT) devices beyond the firewall, via the cloud, on known Wi-Fi networks. | RMM | Devices | |
Intezer Protect | Intezer Protect offers runtime cloud workload protection. | Cloud Mgmt., Cloud Security | Devices | |
Intigriti | Intigriti is a platform for security testing that assesses risk to prioritize remediation. | Cyber Intelligence, VA Tool | Devices, Vulnerabilities | |
Intrigue | Intrigue enables IT and Security teams with a complete and always up to date view of Cloud and Internet-exposed assets and exposures. | Cyber Intelligence | Devices | |
Intruder.io | Intruder is an online vulnerability scanner that enables the identification of misconfigurations, missing patches, encryption weaknesses, application bugs, and more. | VA Tool | Devices | |
Invicti | Invicti (formerly Netsparker) is DAST and IAST vulnerability scanning for web applications. | AppSec | Devices | |
IONIX (formerly Cyberpion) | IONIX (formerly Cyberpion) is a SaaS-based external attack surface management solution. | Attack Surface Mgmt | Devices | |
IP Fabric | IP Fabric is a network management system used to discover, verify, visualize and document large scale networks. | Networking | Devices | |
Island | Island is an enterprise browser, built on Chromium, with numerous built-in capabilities for protecting against user-, data-, and network-based threats. | Secure Web Gateways | Devices, Users | |
IT Glue | IT Glue is a SOC 2-compliant IT documentation management platform designed for managed service providers (MSPs). | Storage Management | Users | |
iTop | IiTop is an open source ITSM solution allows management of configuration items and their relationships in a flexible CMDB. | CMDB, ITAM/ITSM | Devices, Users | |
Ivanti Connect Secure | Ivanti Connect Secure provides zero trust secured access from any device to applications and services in the cloud and data center. | Networking | Users | |
Ivanti Endpoint Security | Ivanti Endpoint Security, powered by Heat, provides application control, antivirus, patch management, and device control to protect endpoints. | EDR/EPP | Devices | |
Ivanti Neurons | Ivanti Neurons is a unified endpoint management tool that discovers and remediates security threats. | UEM | Devices | |
Ivanti Patch Management | Ivanti Neurons for Patch Management continuously senses, discovers, and remediates security threats. | Config/Patch Mgmt | Devices | |
Ivanti Security Controls | Ivanti Security Controls is a unified IT management platform used for managing and protecting Windows-based machines, Red Hat Enterprise and CentOS Linux machines, and VMware ESXi Hypervisors. | UEM, MDM/EMM | Devices | |
Ivanti Service Manager | Ivanti Service Manager, is a cloud based ITSM solution that provides workflows automation, IT help desk and support ticket features, and ITIL service management processes. | ITAM/ITSM | Devices, Users | |
Ivanti Unified Endpoint Manager (Landesk) | Ivanti Unified Endpoint Manager (formerly Landesk) helps IT administrators gather detailed device data, automate software and OS deployments, personalize workspace environments, and fix user issues. | UEM, Config/Patch Management, ITAM/ITSM | Devices | |
Jamf Pro | Jamf Pro is an enterprise mobility management (EMM) tool that provides unified endpoint management for Apple devices. | MDM/EMM, SaaS Management | Devices, SaaS data | |
Jamf Protect | Jamf Protect is an endpoint protection solution that prevents macOS malware, detects and remediates Mac-specific threats, and monitors endpoints for compliance. | EDR/EPP | Devices | |
Jamf Trust | Jamf Trust provides enterprise-level security and remote access for mobile devices. | MDM/EMM | Devices | |
JDisc Discovery | JDisc Discovery is a network inventory and documentation tool that helps identify and manage IT assets and networks. | CMDB, ITAM/ITSM, Infra Monitoring | Devices | |
Jenkins | Jenkins is an open-source automation server for continuous integration and delivery, facilitating software building, testing, and deployment. | DevOps, Software Development Version Control | Users | |
JetBrains | JetBrains is an integrated development environment (IDE) for software development that provides a suite of tools and features to help developers write, test, and deploy code. | Software Development Version Control | Licenses, SaaS Applications | |
JetPatch | JetPatch is a centralized patch management platform focusing on end-to-end enterprise patch management and vulnerability remediation. | Config/Patch Mgmt. | Devices | |
JFrog Artifactory | JFrog Artifactory is a DevOps solution for housing and managing artifacts, binaries, packages, files, containers, and components throughout the software development lifecycle. | DevOps | Devices, Users | |
JFrog Xray | JFrog Xray is a software composition analysis (SCA) tool that scans software artifacts for security vulnerabilities, open source license compliance, and software quality. | AppSec, DevOps, VA Tool | Devices | |
Jira Service Management (Service Desk) Fetch Tickets | Jira Service Management (Service Desk) is a project management tool that helps software development teams plan, track, and release software. | ITAM/ITSM | Tickets | |
Jira Service Management | Jira Service Management (Service Desk) enables to receive, track, manage, and resolve requests from customers. | ITAM/ITSM, CMDB, Ticketing | Devices, Users | |
JSON | The JSON adapter is able to import .json files with information about devices, users, or installed software. | CMDB, ITAM/ITSM | Devices, Users | |
JumpCloud | JumpCloud is a Directory-as-a-Service (DaaS) solution to authenticate, authorize, and manage users, devices, and applications via a common directory in the cloud. | IAM, Directory, SaaS Management | Devices, Users, SaaS data | |
Juniper Junos | The Juniper Junos Adapter connects to Juniper switches and routers. | Networking | Devices | |
Juniper Junos Space Network Management Platform | Juniper Junos Space Network Management Platform automates management of Juniper's switching, routing, and security devices. | Networking | Devices | |
Kandji | Kandji is an Apple device management (MDM) solution for macOS, iOS, iPadOS, and tvOS. | MDM/EMM | Devices | |
Kaseya VSA | Kaseya VSA is a remote monitoring and management solution for remote control, discovery, patch management, and monitoring. | IT Agent, Config Mgmt. | Devices | |
Kaspersky Security Center | Kaspersky Security Center is an administration console for Kaspersky Labs security solutions and systems management tools. | EDR/EPP | IAM | |
Keeper | Keeper is a password and secrets management solution that helps protect and monitor passwords, secrets, and remote connections. | Password Management | Users | |
Kemp Central | Kemp 360 Central is an application delivery and management platform for infrastructure monitoring of all data centers, private clouds, IaaS, PaaS, and public cloud. | Infra Monitoring | Devices | |
Kenna Security Platform | Kenna Security Platform is a vulnerability assessment solution that provides risk scoring, prioritization, and benchmarking. | VA Tool | Devices | |
Keycloak | Keycloak is an open source identity and access management solution. | IAM | Users | |
Keyfactor | Keyfactor provides PKI as-a-Service enabling protection of every device, workload, and digital transaction with a unique and trusted identity. | IAM | Devices | |
KnowBe4 | KnowBe4 provides Security Awareness Training for anti-phishing behavior, social engineering and ransomware attacks, and general security awareness. | Security Awareness, GRC | Users | |
Kolide K2 | Kolide K2 is a paid cloud-hosted SaaS platform for gathering detailed device information and securing endpoints. | EDR/EPP | Devices, Users | |
Kubernetes | Kubernetes (K8s) is an open-source system for automating deployment, scaling, and management of containerized applications. | Containers, Cloud | Devices | |
L0phtCrack 7 | L0phtCrack 7 is a password auditing and recovery application. | Password Management, IAM | Users | |
Lacework | Lacework provides cloud security automation for AWS, Azure, and GCP with a comprehensive view of risks across cloud workloads and containers. | Cloud Security, Cloud | Devices, Users | |
Lakeside SysTrack | Lakeside SysTrack is a digital experience monitoring solution used for workplace analytics, IT asset optimization, and end-user troubleshooting. | RMM | Devices | |
Landscape | Landscape by Canonical is a management tool used to deploy, monitor and manage Ubuntu servers. | Config/Patch Mgmt, RMM | Devices | |
Lansweeper | Lansweeper is an IT asset management and Network Inventory software tool for Windows, Linux, Mac, and Network devices. | IT Agent, Config Mgmt., CMDB, ITAM/ITSM | Devices | |
Lansweeper Cloud | Lansweeper Cloud federates data from all local Lansweeper discovery instances into a single source of truth. | IT Agent, Config Mgmt., CMDB, ITAM/ITSM | Devices | |
LastPass | LastPass is a password manager that stores encrypted passwords online. | Password Management, IAM, SaaS Management | Users, SaaS data | |
Lattice | Lattice is a people management platform that allows human resources teams to engage employees and measure performance. | HR | Users | |
LaunchDarkly | LaunchDarkly is a continuous delivery platform and feature management platform that provides feature flags as a service. | Software Development Version Control | Users | |
LeanIX | LeanIX is a cloud-based software platform that helps companies manage and optimize their IT infrastructure and applications. | ITAM/ITSM, Infra Monitoring, CMDB | Devices | |
Lenel OnGuard | Lenel OnGuard is an integrated access control and alarm monitoring system. | Security Awareness | Users | |
Lexsynergy | Lexsynergy is a domain management platform that helps organizations manage and protect their domain assets. | Networking, Audit/Compliance | Devices | |
LibreNMS | LibreNMS is a network monitoring solution that provides auto-discovery for network hardware and operating systems including Cisco, Linux, Juniper, Foundry, and more. | Networking | Devices | |
LimaCharlie | LimaCharlie provides endpoint-driven information security tools to run an MSSP or SOC, as well as APIs that allow users to build and monetize their own products. | DevOps | Devices | |
Linode | Linode, acquired by Akamai, is a cloud hosting provider that provides Linux-based virtual machines, cloud infrastructure, and managed services. | Cloud Infra, Virtualization | Devices, Users | |
Linux SSH | Linux Secure Shell uses remote command execution over the SSH protocol to gather information about the endpoint Linux machine. | ITAM/ITSM | Devices | |
Liquidware Stratusphere UX | Liquidware Stratusphere UX is a user experience monitoring and diagnostics platform that analyzes the performance of virtual and physical environments. | Config/Patch Mgmt, Infra Monitoring, Virtualization | Devices | |
Litmos | Litmos is a learning management system that provides pre-built courses and eLearning solutions. | Collaboration, HR | Users | |
LMNTRIX | LMNTRIX offers a security-as-a-service platform that provides threat detection and response capabilities. | SIEM, Vulnerability Assessment | Devices | |
LogicGate | LogicGate provides a governance, risk, and compliance (GRC) platform. | Risk Mgmt, Audit/Compliance | Users | |
LogicMonitor | LogicMonitor is an automated infrastructure monitoring platform for enterprise IT and managed service providers. | Infra Monitoring, ITAM/ITSM | Devices | |
LogMeIn Central | LogMeIn Central is a cloud-based endpoint management solution that enables monitoring and management of endpoint infrastructure. | MDM/EMM, UEM | Devices, Users | |
LogRhythm | LogRhythm combines SIEM, user and entity behavior analytics, network traffic and behavior analytics, and security automation and orchestration. | SIEM | Devices | |
Lookout Mobile Endpoint Security | Lookout Mobile Endpoint Security is a mobile security solution that provides comprehensive risk management across iOS and Android devices to secure against app, device, and network-based threats while providing visibility and control over data leakage. | EDR/EPP | Devices | |
Lucidchart | Lucidchart allows users to collaborate on drawing, revising and sharing charts and diagrams. | Collaboration, SaaS Management | Users, SaaS data | |
Lumu | Lumu is a cybersecurity platform that provides real time network monitoring and threat detection. | Cyber Intelligence, NDR, SIEM | Users, Alerts/Incidents | |
Malwarebytes Endpoint Protection (Cloud Platform) | Malwarebytes Endpoint Protection is a cloud-based security platform that combines detection and remediation technologies into a single cloud-managed agent. | EDR/EPP | Devices | |
Malwarebytes Endpoint Security (On-Prem Platform) | Malwarebytes Endpoint Security protects endpoints from ransomware, automates endpoint remediation, and provides continuous visibility and monitoring. | EDR/EPP | Devices | |
ManageEngine Endpoint (Desktop) Central and Patch Manager Plus | ManageEngine Endpoint (Desktop) Central and Patch Manager Plus is a desktop management and mobile device management software for managing desktops in LAN and across WAN and mobile devices from a central location. | MDM/EMM, Config/Patch Mgmt | Devices | |
ManageEngine Firewall Analyzer | ManageEngine Firewall Analyzer is an agentless log analytics and configuration management software that analyzes logs from firewalls and generates real-time alert notifications and security and bandwidth reports. | Networking | Devices | |
ManageEngine Key Manager Plus | ManageEngine Key Manager Plus is a platform for managing the entire lifecycle of SSH keys and SSL certificates, including consolidation, control, monitoring, and auditing. | Certificate Mgmt, IAM | Certificates | |
ManageEngine Mobile Device Management | ManageEngine MDM is a mobile device management solution. | MDM/EMM | Devices, Users | |
ManageEngine Network Configuration Manager | ManageEngine Network Configuration Manager is multi-vendor network change & configuration management software for switches, routers, and firewalls. | Networking | Devices, Users | |
ManageEngine OpManager | ManageEngine OpManager enables monitoring of routers, switches, firewalls, servers and VMs for fault and performance. | Infra Monitoring | Devices | |
ManageEngine OpUtils | ManageEngine OpUtils is an IP address and switch port management software geared toward helping engineers efficiently monitor, diagnose, and troubleshoot IT resources. | IPAM, Networking | Devices | |
ManageEngine PasswordManagerPro | ManageEngine PasswordManagerPro is a complete solution to control, manage, monitor, and audit the entire life cycle of privileged access. | PAM | Devices | |
ManageEngine Service Desk Plus | ManageEngine Service Desk Plus is an IT help desk and customer support system. | Ticketing | Devices | |
Mandiant | Mandiant Advantage is a multi-vendor XDR platform that delivers Mandiant’s transformative expertise and frontline intelligence to security teams of all sizes. | Attack Surface Mgmt, Cyber Intelligence | Devices | |
Mandiant Threat Intelligence | Mandiant is a cybersecurity platform offering threat intelligence, incident response, and security consulting services to detect and mitigate advanced cyber threats. | Cyber Intelligence, SIEM, SOAR | Users | |
Manifestly | Manifestly is a checklist, workflow, and SOP platform for managing recurring team tasks. | Collaboration, Ticketing | Users | |
MarkMonitor | MarkMonitor provides domain management, security, and consulting. | IPAM | Devices, Users | |
Masscan | Masscan is a free internet port scanner utility. | VA Tool | Devices | |
McAfee ePolicy Orchestrator (ePO) | McAfee ePolicy Orchestrator (ePO) is a security management platform that provides real-time monitoring of security solutions. | EDR/EPP | Devices | |
Medigate | Medigate is a medical device security platform that protects connected medical devices on health care provider networks, allowing inventory management and facilitating detection and prevention capabilities. | Networking | Devices | |
Men&Mice DNS Management | Men&Mice DNS Management is a Network Management software providing secure, centralized, and highly resilient control of DNS across diverse platforms. | Networking | Devices, Users | |
Meta Business | Meta Business is a customer relationship management (CRM) and advertising platform for management of customer data, marketing campaigns, and advertising efforts across Meta's social media platforms. | CRM | Users | |
MetaCompliance | MetaCompliance delivers security awareness training to meet compliance requirements and mitigate risks. | Security Awareness, Audit/Compliance | Users | |
Micro Focus GroupWise | Micro Focus GroupWise is a collaboration software solution that provides email, calendaring, and instant messaging. | Collaboration | Users | |
Micro Focus Server Automation (HP Server Automation, Opsware) | Micro Focus Server Automation (formerly known as HP Server Automation or Opsware) provides operating system provisioning, automated patch management, and compliance control. | Config Mgmt. | Devices | |
Micro Focus SiteScope | Micro Focus SiteScope (previously HPE SiteScope) provides monitoring capabilities for IT infrastructure, including servers, databases, network, media, and more. | Infra Monitoring, Cloud Mgmt., ITAM/ITSM, Cloud | Devices | |
Microsoft Active Directory (AD) | Microsoft Active Directory (AD) is a directory service for Windows domain networks that authenticates and authorizes all users and computers. | IAM, Directory | Devices, Users | |
Microsoft Azure | Microsoft Azure is a cloud computing service created by Microsoft for building, testing, deploying, and managing applications and services through a global network of Microsoft-managed data centers. | Cloud Infra, Cloud | Devices | |
Microsoft BitLocker Administration and Monitoring (MBAM) | Microsoft BitLocker Administration and Monitoring (MBAM) provides a simplified administrative interface for BitLocker Drive Encryption. BitLocker offers protection against data theft or data exposure for computers that are lost or stolen, encrypting all data that is stored on the Windows operating system volumes and drives and configured data drives. | DLP, Data Security | Devices | |
Microsoft Cloud App Security | Microsoft Cloud App Security is a Cloud Access Security Broker (CASB) that supports various deployment modes including log collection, API connectors, and reverse proxy. | Cloud Security, Cloud | Users | |
Microsoft Defender for Endpoint (Microsoft Defender ATP) | Microsoft Defender for Endpoint (Microsoft Defender ATP) helps enterprise networks prevent, detect, investigate, and respond to advanced threats. | EDR/EPP, SaaS Management | Devices, SaaS data | |
Microsoft Defender for Endpoint for GCC | Microsoft Defender for Endpoint for GCC helps enterprise government networks prevent, detect, investigate, and respond to advanced threats. | EDR/EPP, SaaS Management | Devices, Users | |
Microsoft Defender External Attack Surface Management (Defender EASM) | Microsoft Defender External Attack Surface Management discovers and maps the digital attack surface and provides an external view of a company’s online infrastructure. | Attack Surface Mgmt | Devices | |
Microsoft Dynamics 365 | Microsoft Dynamics 365 Finance is a Microsoft enterprise resource planning system for medium to large organizations. | HR | Devices, Users | |
Microsoft Endpoint Configuration Manager (MECM) | Microsoft Endpoint Configuration Manager MECM (formerly SCCM) is a systems management software product for managing large groups of computers running Windows NT, Windows Embedded, macOS (OS X), Linux or UNIX, as well as Windows Phone, Symbian, iOS and Android mobile operating systems. | Config Mgmt. | Devices | |
Microsoft Entra ID (Formerly Azure AD) and Microsoft Intune | Microsoft Entra ID (formerly Azure AD) is Microsoft's multi-tenant, cloud-based directory, and identity management service. Microsoft Intune is a cloud-based service in the enterprise mobility management (EMM) space that integrates closely with Entra ID for identity and access control and Azure Information Protection for data protection. | IAM, Directory, SaaS Management | Devices, Users, SaaS Data | |
Microsoft Hyper-V | Microsoft Hyper-V is a native hypervisor; it can create virtual machines on x86-64 systems running Windows. | Virtualization, ITAM/ITSM, Cloud | Devices | |
Microsoft Key Management Service (KMS) | Microsoft Key Management Service (KMS) enables organizations to activate systems within their own network, eliminating the need for individual computers to connect to Microsoft for product activation. | ITAM/ITSM | Devices | |
Microsoft Lync | Microsoft Lync provides instant messaging (IM), audio and video calls, Lync Meetings, availability (presence) information, and sharing capabilities. | Collaboration | Users | |
Microsoft Power BI | Microsoft Power BI is a business analytics tool for visualizing and sharing data insights across an organization. | Collaboration, SaaS Management | Users, Groups, Compute Services | |
Microsoft SCOM (System Center Operations Manager) | Microsoft SCOM (System Center Operations Manager) is a cross-platform data center monitoring system for operating systems and hypervisors, reporting state, health and performance information of computer systems. | Infra Monitoring, RMM | Devices | |
Microsoft System Center Virtual Machine Manager (VMM) | Microsoft System Center Virtual Machine Manager (VMM) is a unified management application for on-premises, service provider, and Azure cloud virtual machines. | Cloud Mgmt., Containers, Virtualization, RMM | Devices | |
Microsoft Teams | Microsoft Teams is a workspace for real-time collaboration and communication, meetings, file and app sharing. | Collaboration, Security Awareness | Devices | |
Milestone XProtect | Milestone XProtect is a video management software (VMS) for video surveillance. | RMM | Devices, Users | |
Mimecast - V1 | Mimecast provides a mail management system designed to protect email, ensure access and simplify the tasks of managing email. | Cloud Security, Data Security, Email Security, Secure Web Gateways, Security Awareness, SaaS Management, Audit/Compliance | Users, SaaS Applications | |
Mimecast - V2 | Mimecast provides a mail management system designed to protect email, ensure access and simplify the tasks of managing email. | Cloud Security, Data Security, Email Security, Secure Web Gateways, Security Awareness, SaaS Management, Audit/Compliance | Users | |
Minerva Labs Endpoint Malware Vaccination | Minerva Labs Endpoint Malware Vaccination simulates infection markers, rather than creating them, to contain outbreaks that bypass AV tools. | EDR/EPP | Devices | |
Miro | Miro is a digital collaboration platform designed to facilitate remote and distributed team communication and project management. | Collaboration, SaaS Management | Users, SaaS data | |
Mist | Mist AI leverages data ingested from numerous sources, including APs, switches and firewalls to optimize user experiences and simplify operations across the wireless access, wired access, and SD-WAN domains. | Cloud Infra, Cloud Mgmt, Cloud Security | Devices, Users | |
MobileIron EMM | MobileIron EMM enables enterprises to secure and manage modern operating systems on mobile devices and desktops. | MDM/EMM | Devices | |
Monday | Monday.com is a cloud-based workflow management platform that allows teams to build and manage projects. | Collaboration, SaaS Management | Users, SaaS data | |
MongoDB | MongoDB is a document-oriented NoSQL database. | DevOps | Devices, Users | |
MongoDB Atlas Administration | MongoDB Atlas Administration provides automated administration for MongoDB so customers can manage clusters, projects, users, and more. | Cloud Mgmt, CMDB | Users | |
Moogsoft | Moogsoft is an AI-driven observability platform for monitoring solutions. | Infra Monitoring, DevOps | Devices, Users | |
MoroCloud | Moro Cloud is a software-defined datacenter (SDDC) that offers integrated cloud components such as compute, network, storage, and security. | Cloud Mgmt., Storage Management | Devices | |
Mosyle | Mosyle is an Apple Endpoint Management & Security platform with solutions for education providers and enterprises. | MDM/EMM | Devices, Users | |
MSP Manager | N-able MSP Manager is cloud-based help desk and billing software for IT service. | Ticketing | Devices | |
MuleSoft | MuleSoft is an integration platform that helps businesses connect data, applications and devices across on-premises and cloud computing environments. | Collaboration, ITAM/ITSM | Devices, Users | |
MuleSoft Anypoint Platform | The MuleSoft Anypoint Platform is a single solution for developing, deploying, securing, and managing APIs and integrations. | Cloud Infra | Users | |
Mulesoft Runtime Fabric | Mulesoft Runtime Fabric is a container service that automates the deployment and orchestration of Mule applications and gateways. | Container | Devices | |
Mutiny | Mutiny is a network monitoring and alerting appliance. | Networking | Devices | |
MVISION ePO | MVISION provides hardware, software, and services to investigate cybersecurity attacks, protect against malicious software, and analyze IT security risks. | EDR/EPP | Devices | |
N2WS | N2WS Backup & Recovery offers orchestrated recovery for core AWS and Azure services. | Data Security | Devices, Users | |
N-able | N-able provides integrated monitoring, management, security, and ticketing for managed service providers. | RMM, Ticketing | Devices | |
N-able N-sight RMM | N-sight RMM provides remote monitoring and access, ticketing, and management for Windows, Linux, and Mac devices. | RMM | Devices | |
Nagios Core | Nagios Core provides monitoring of all mission-critical infrastructure components including applications, services, operating systems, network protocols, systems metrics, and network infrastructure. | Infra Monitoring | Devices | |
Nagios XI | Nagios XI provides enterprise server and network monitoring. | Networking | Devices | |
Namecheap | Namecheap offers free public DNS to help users get connected quickly and securely. | IPAM | Devices | |
Nasuni | Nasuni offers a file services platform built for the cloud that delivers infinite scale, built-in backup, global file sharing, and local file server performance. | Storage Management | Devices | |
Nautobot | Nautobot is a network documentation and automation platform for managing network resources. | ITAM/ITSM | Devices | |
NAVEX | NAVEX is a governance, risk, and compliance management platform for employee, third-party, and business processes management. | Risk Management, Audit/Compliance | Devices | |
Nectus | Nectus is a network discovery, monitoring and visualization software. | Networking, Infra Monitoring, ITAM/ITSM | Devices | |
NetApp | NetApp offers hybrid cloud data services for management of applications and data across cloud and on-premises environments. | Storage Management | Devices, Users | |
NetApp Active IQ Unified Manager | Active IQ Unified Manager provides performance monitoring capabilities and event root-cause analysis for systems running NetApp ONTAP software. | Infra Monitoring | Devices | |
NetApp Centralized Employee Directory | NetApp Centralized Employee Directory (CED) enables retrieval of job and contact information on NetApp employees and contractors. | Directory, HR | Users | |
NetBox | NetBox is an open source web application to help manage and document computer networks. | Networking | Devices | |
NetBrain | NetBrain Integrated Edition is an adaptive automation integrated with existing NMS tools and IT workflows to automate documentation, troubleshooting, network change, and defense. | Networking | Devices | |
Netdisco | Netdisco is a web-based network management tool designed for network administrators. | Networking | Devices | |
NetIQ Advanced Authentication | NetIQ Advanced Authentication provides a centralized authentication framework that adds a strong level of authentication (MFA or 2 Factor). | IAM | Devices | |
NetIQ eDirectory | NetIQ eDirectory is a directory service software from NetIQ, previously owned by Novell. It is a hierarchical, object-oriented database used to represent organizational assets in a logical tree, including organizations, units, people, positions, servers, volumes, workstations, applications, printers, services, and groups. | Networking | Users | |
NetIQ Identity Manager | NetIQ Identity Manager by MicroFocus uses integrated identity information to create and manage identities and control access to enterprise resources. | IAM | Users | |
NetMotion Mobility | NetMotion Mobility is mobile VPN software that maximizes mobile field worker productivity by maintaining and securing their data connections as they move in and out of wireless coverage areas and roam between networks. | Networking | Devices, Users | |
Netreo | Netreo is an IT infrastructure monitoring platform. | IAM, ITAM/ITSM, Infra Monitoring | Devices | |
Netshot | Netshot is a network automation and configuration management tool that provides network device backup, compliance checks, and configuration changes. | Config/Patch Mgmt, Infra Monitoring, Networking | Devices | |
Netskope | Netskope Security Cloud provides threat protection for cloud services, websites, and private applications. | Networking | Devices, Users, SaaS data | |
NetSpyglass | NetSpyglass provides real-time network mapping, monitoring, visualization, and analytics for multi-vendor data center and WAN network operators. | Networking | Devices | |
NetWitness NDR | NetWitness provides real-time network forensics with automated threat detection, response, and analysis solutions. | NDR | Devices | |
Netwrix Auditor | Netwrix Auditor is IT auditing software for detecting security threats and validating compliance. | ITAM/ITSM, License Mgmt | Users | |
Neustar UltraDNS | Neustar UltraDNS is an enterprise grade cloud-based DNS service. | Networking | Devices | |
New Relic | New Relic provides cloud-based software to monitor and track servers, instances and services. | RMM | Devices | |
NextDLP | NextDLP, formerly Qush Security, enables customers to discover risks, educate employees, enforce policies and prevent data loss. | DLP, Data Security, UEBA | Devices | |
Nexthink | Nexthink is an IT solution that provides insights into activity across devices, operating systems, and workplace locations to improve IT experiences for employees. | ITAM/ITSM | Devices, Users | |
Nexthink Infinity | Nexthink Infinity provides digital workplace experience management software that provides real-time visibility and insights into application performance. | UEM | Devices | |
Nexthink Query Language (NQL) | Nexthink Query Language (NQL) is a programming language developed by Nexthink for querying data from its platform. | ITAM/ITSM, Infra Monitoring | Devices, Users | |
Ninja One (RMM) | Ninja One is an RMM (Remote Monitoring and Management) solution for MSPs and IT organizations, allowing them to automate, manage, and remediate endpoint management tasks. | RMM | Devices, Users | |
Nmap Security Scanner | Nmap Security Scanner is a free and open source utility for network discovery and security auditing. | VA Tool | Devices | |
NodeZero | NodeZero by Horizon3 provides continuous autonomous penetration testing via SaaS. | VA Tool | Devices | |
Notion | Notion offers a workplace productivity suite that includes solutions for collaboration and communication, task management, project tracking, and more. | Collaboration | Users | |
Nozomi Guardian and CMC | Nozomi Guardian and CMC (formerly Nozomi Networks Guardian) monitors network communications and device behavior for physical and virtual appliances. | OT/IoT | Devices | |
Nozomi Vantage | Nozomi Vantage is a SaaS platform for global network monitoring and protection. | Cloud Security, OT | Devices | |
NS1 | NS1 is a DNS solution for advanced traffic routing, automation, and application resiliency. | Networking | Devices | |
NTT Application Security | NTT Application Security (formerly WhiteHat Security) offers application security solutions with expertise in dynamic application security testing (DAST). | AppSec, VA Tool | Devices, Users | |
Nucleus Security | Nucleus Security provides unified vulnerability management via integrations with third-party tools including threat intelligence, penetration testing, appsec, network scanners, and more. | VA Tool | Devices | |
Nutanix AHV | Nutanix AHV is a hypervisor included with the Enterprise Cloud OS. AHV delivers flexible migrations, security hardening, automated data protection and disaster recovery, and analytics. | Virtualization, ITAM/ITSM, Cloud | Devices | |
Nutanix Cloud Manager (NCM) Cost Governance | Nutanix Cloud Manager (NCM) Cost Governance (formerly Beam) provides visibility into cloud spend across multiple cloud environments. | Cloud Mgmt | Users | |
Nutanix Prism Central | Nutanix delivers hybrid and multicloud management, unified storage, database services, and desktop services to support applications and workloads. | Cloud Infra, Cluster Mgmt, Virtualization | Devices, Users | |
ObserveIT | ObserveIT provides insider threat security solutions, including employee monitoring, user activity monitoring, behavioral analytics, policy enforcement, and digital forensics. | UEBA | Devices | |
Observium | Observium is an auto-discovering network monitoring platform supporting a wide range of device types, platforms and operating systems. | Networking | Devices | |
Obsidium Security | Obsidian delivers a security solution for SaaS applications built around unified visibility, continuous monitoring, and security analytics. | Cloud Security, SaaS Security | Users | |
Okta | Okta provides cloud software that helps companies manage their employees' passwords, by providing a “single sign-on” experience. | IAM, SaaS Management | Devices, Users, SaaS data | |
OmniVista 2500 NMS | The Alcatel-Lucent OmniVista 2500 Network Management System (NMS) provides management tools and network-wide visibility, enabling operators to provision, manage and maintain a mobile infrastructure. | Networking | Devices | |
Onapsis | Onapsis cybersecurity solutions automate the monitoring and protection of SAP and Oracle applications. | ERP, Infra Monitoring | Devices | |
OnDMARC | OnDMARC provides automated management for DMARC, DKIM and SPF records. | Email Security | Devices | |
OneLogin | OneLogin's unified access management platform centralizes access across on-prem and cloud environments to give full control, management, and security for data, devices, and users. | IAM | Users | |
Onspring-Compass | Onspring is cloud-based automated GRC software for business process management. | Risk Management | Devices | |
Oomnitza Enterprise Technology Management | Oomnitza Enterprise Technology Management helps IT teams manage technology assets with an agentless solution for endpoints (laptops, mobile devices, monitors, peripherals, and accessories), software (desktop, cloud, virtual machines), and users. | ITAM/ITSM | Devices | |
Opal | Opal is an access management platform that helps enterprise companies scale least privilege. | IAM | Users | |
openDCIM | openDCIM is a free open-source Data Center Infrastructure Management solution. | Networking | Devices, Users | |
OpenLDAP | OpenLDAP Software is an open source implementation of the Lightweight Directory Access Protocol. | Directory, IAM | Devices, Users | |
OpenStack | OpenStack is an open source software solution for creating private and public clouds. | Cloud Infra, Cloud | Devices | |
OpenText ZENworks | OpenText ZENworks is a unified endpoint management and protection solution. | UEM | Devices | |
OpenVAS | OpenVAS is a software framework including several services and tools for vulnerability scanning and vulnerability management. | VA Tool | Devices | |
OpenVPN Cloud | OpenVPN Cloud is a VPN-as-a-Service solution that eliminates the need for VPN server installation. | Infra Monitoring, Networking | Devices, Users | |
Opsgenie | Opsgenie is an alerting and incident response tool. | Collaboration | Users | |
OpsRamp | OpsRamp is an AIOps-powered IT operations management (ITOM) solution. | ITAM/ITSM | Devices | |
Opsview | Opsview is a monitoring platform for operating systems, networks, cloud, VMs, containers, databases, applications, and more. | Infra Monitoring, RMM | Devices | |
OPSWAT MetaAccess | OPSWAT MetaAccess prevents risky devices from accessing local networks and cloud applications. | NAC | Devices | |
Oracle Cloud | Oracle Cloud is a computing service providing servers, storage, network, applications and services. | Cloud Infra, Cloud | Devices, Users | |
Oracle Enterprise Manager | Oracle Enterprise Manager is an on-premises management platform that provides a single dashboard to manage all Oracle deployments. | RMM | Devices | |
Oracle Fusion HCM Cloud | Oracle Cloud Human Capital Management is a cloud-based HCM software application suite for global HR, talent, and workforce management. | HR | Users | |
Oracle Identity and Access Management (IAM) | Oracle Identity and Access Management (IAM) is a software suite that enables enterprises to manage and automate user identities. | IAM, ITAM/ITSM, PAM, Password Management, Audit/Compliance | Users | |
| Oracle Ksplice | Oracle Ksplice provides fast secure kernel and userspace patching without the need for reboots. | Config/Patch Mgmt | Devices |
Oracle Netsuite | Oracle Netsuite is a cloud-based ERP solution that provides global business management solutions. | ERP | Users, SaaS data | |
Oracle VM | Oracle VM's server virtualization products support x86 and SPARC architectures and a variety of workloads such as Linux, Windows and Oracle Solaris. | Virtualization, ITAM/ITSM, Cloud | Devices | |
Orca Cloud Visibility Platform | Orca Cloud Visibility Platform delivers visibility to cloud security posture, including prioritized alerts on vulnerabilities, compromises, misconfigurations, and more. | Cloud Security, Cloud, VA Tool | Devices | |
Ordr | Ordr provides visibility and security of all connected devices, including unmanaged IoT, OT, and IoMT. | Infra Monitoring | Devices | |
Ostendio | Ostendio is a security, compliance, and risk management platform. | Risk Management, Audit/Compliance | Devices | |
Outpost24 | Outpost24 is a cyber risk management platform that helps organizations assess their attack surface and prioritize vulnerabilities. | Attack Surface Mgmt. | Devices | |
Ovirt | oVirt is a free, open-source virtualization management platform. | Virtualization, ITAM/ITSM, Cloud | Devices | |
PacketFence | PacketFence is a free open source network access control (NAC) solution which provides the following features: registration, detection of abnormal network activities, proactive vulnerability scans, isolation of problematic devices, remediation through a captive portal, 802.1X, wireless integration and User-Agent / DHCP fingerprinting. | NAC | Devices | |
PagerDuty | PagerDuty is a digital operations platform for system administrators and support teams to manage incident response. | Collaboration | Users | |
Palo Alto Networks Cortex | Palo Alto Networks Cortex is an open and integrated, AI-based continuous security platform, allowing security operations teams to speed the analysis of massive data sets. | Networking | Devices | |
Palo Alto Networks Cortex XDR | Palo Alto Networks Cortex XDR is a detection and response app that natively integrates network, endpoint, and cloud data to detect threats and stop sophisticated attacks. | EDR/EPP | Devices | |
Palo Alto Networks Cortex Xpanse | Palo Alto Networks Cortex Xpanse (Palo Alto Networks Expanse Expander) discovers, monitors, and tracks Internet Assets automatically to reduce risks and exposures. | Cyber Intelligence | Devices | |
Palo Alto Networks Panorama | The Palo Alto Panorama management server provides centralized monitoring and management of multiple next-generation firewalls and appliance clusters. | Networking, Firewall | Devices | |
Palo Alto Networks Prisma Access | Prisma Access SASE from Palo Alto Networks converges network security, SD-WAN, and autonomous digital experience management in the cloud to provide a secure access service edge. | IAM, Networking | Devices, Users | |
Palo Alto Networks Prisma Cloud Workload Protection | Prisma Cloud Workload Protection (CWPP) provides protection across hosts, containers, and serverless deployments in any cloud, throughout the application lifecycle. | Cloud Security | Devices | |
Palo Alto Prisma Cloud | Prisma Cloud is a native cloud security platform that provides visibility, threat prevention, compliance assurance, and data protection across multi-cloud environments. | Cloud Mgmt., Cloud | Devices, Users | |
Palo Alto Traps Endpoint Security Manager | Palo Alto Traps Endpoint Security Manager (ESM) delivers endpoint protection to prevent advanced persistent threats (APTs) and zero-day attacks. | EDR/EPP | Devices | |
Panorays | Panorays is a SaaS-based platform that enables companies to view, manage and engage on the security posture of their third-parties, vendors, suppliers, and business partners. | Cyber Intelligence | Devices | |
PaperCut | PaperCut is a print management solution that provides print job tracking and reporting. | IoT | Devices | |
Parsec | Parsec App is a remote desktop application primarily used for playing games through video streaming. | Remote Conferencing, Collaboration | Devices | |
Paycom | Paycom is a programmatic interface for managing user roles and permissions. | IAM | Users | |
Paycor | Paycor is an automated human capital management (HCM) platform for managing HR and payroll needs in one place. | HR | Users | |
Paylocity | Paylocity is a cloud-based payroll and human capital management software. | HR | Users | |
PDQ Connect | PDQ Connect is a remote desktop and server management tool that allows IT administrators to remotely access and manage Windows computers and servers. | RMM, IT Agent | Devices | |
PDQ Inventory | PDQ Inventory is a systems management tool that scans Windows computers to collect hardware, software, and Windows configuration data. | ITAM/ITSM | Devices, Users | |
Pentera | Pentera recons and maps web-facing attack surface assets. This includes domains, web interfaces, IPs, networks, and gateways. | Attack Surface Mgmt | Devices | |
PeopleHR | PeopleHR is HR automation software (HRIS) for small and growing businesses. | HR | Users | |
Perimeter 81 | Perimeter 81 is a cloud-based secure access service edge (SASE) platform. | Data Security, Encryption | Devices, Users | |
Persistent | Persistent Systems Radia Endpoint Manager (formerly RCA) is an end-user device (PC and mobile device) lifecycle management tool for automating routine client-management tasks. | Config/Patch Mgmt. | Devices | |
Phosphorus | Phosphorus provides IoT discovery, password management, and patch management. | IoT | Devices | |
phpIPAM | phpIPAM is an open-source web IP address management application (IPAM). | Networking | Devices, Users | |
Pingboard | Pingboard creates real-time organizational charts by automatically synchronizing organizational charts with HRMS software. | HR | Users | |
PingFederate | PingFederate from Ping Identity is an enterprise authentication federation server that enables user authentication and single sign-on. | IAM, SaaS Management | Users, SaaS data | |
PingID | Ping offers an identity management solution that includes multi-factor authentication, single sign-on, identity verification, and more. | IAM | Users | |
PingID Enterprise | PingID Enterprise is a cloud-based multi-factor authentication (MFA) platform that supports enterprise solutions for software applications. | IAM | Devices, Users | |
PingIDM (formerly ForgeRock) | PingIDM (formerly ForgeRock) is a high-performance identity store that provides the necessary encryption to protect enterprise data at rest and encryption. | Directory | Devices, Users | |
PingOne Directory | PingOne Directory provides a hosted directory service that developers can use to store user authentication and profile data. | IAM, Directory | Users | |
Pivotal Cloud Foundry | Pivotal Cloud Foundry is an app development and deployment platform for public and private clouds. | Cloud Mgmt., Cloud | Devices | |
PKWARE | PKWARE’s data protection platform finds, classifies, and protects sensitive data, allowing security managers to define data protection policies and monitor activity across the organization. | DLP, Data Security, Encryption | Devices | |
PluralSight | PluralSight offers a variety of video training courses for software developers, IT administrators, and creative professionals through its website. | Collaboration | Users | |
PolarNG | PolarNG is ICE’s comprehensive asset management database. | ITAM/ITSM | Devices, Software | |
Polymer DLP | Polymer is a DLP solution that automates identification, monitoring, and remediation for sensitive data in cloud environments, and helps companies stay compliant with HIPAA, PCI. and GDPR. | DLP | Users | |
Portnox Clear | Portnox CLEAR provides automated security, visibility and control for every device accessing the network including Internet of Things (IoT), BYOD, mobile and unmanaged systems. | NAC | Devices | |
Portnox Core | Portnox CORE is a software-based solution that runs on Windows Servers (physical and virtual) to continually communicate with all existing networking infrastructure, gaining complete visibility into all assets currently connected to the network. | Infra Monitoring | Devices | |
PowerDNS | PowerDNS is an open-source DNS server program, offering both authoritative and recursive DNS services. | Cloud Infra, ITAM/ITSM, Infra Monitoring | Devices | |
Prey | Prey is a cross-platform, open source tool that allows you to track and recover your devices. | MDM | Devices, Users | |
Pritunl | Pritunl is an enterprise distributed OpenVPN, IPsec and WireGuard server. | Data Security | Devices, Users | |
PrivX | PrivX provides privileged access to on-prem and cloud environments, including control access to servers, network devices and other critical infrastructure according to user roles and privileges. | PAM, IAM | Devices, Users | |
Projector PSA | Projector Professional Services Automation (PSA) software is an operational system for professional services organizations. | Collaboration | Users | |
Prometheus JSON | Prometheus JSON is an integration or exporter that allows Prometheus to scrape and collect metrics from JSON-formatted data sources for monitoring and alerting purposes. | Infrastructure Monitoring, DevOps, Cloud Mgmt | Devices | |
Promisec Endpoint Manager | Promisec Endpoint Manager is an agentless endpoint detection and remediation solution that detects, analyzes, and remediates abnormalities. | EDR/EPP | Devices | |
Proofpoint | Proofpoint is a cybersecurity company that offers solutions to protect workers and their data from threats targeting email, mobile, social, cloud, and other digital channels. | Email Security | Users | |
Proofpoint Endpoint DLP | Proofpoint Endpoint DLP helps identify risk user behavior and protect sensitive data. | DLP | Devices | |
Proofpoint's ObserveIT Insider Threat Management Platform | Proofpoint's ObserveIT Insider Threat Management (ITM) platform is a cloud-based solution that provides insider risk detection, incident response, and unified visibility across user activity, data interaction, and threat context. | UEBA | Devices | |
Proofpoint POD | Proofpoint on Demand (PoD) Email Security classifies types of email, while detecting and blocking threats. | Email Security | Users | |
Proofpoint Security Awareness Training | Proofpoint Security Awareness Training provides interactive and customizable security awareness training. | Security Awareness | Users | |
Proofpoint TAP | Proofpoint Targeted Attack Protection (TAP) is an email-based security solution for ransomware prevention and other email-based threats. | Email Security | Users | |
Proxmox Virtual Environment (VE) | Proxmox Virtual Environment (VE) is an open source server virtualization management solution based on QEMU/KVM and LXC. | Virtualization, ITAM/ITSM, Cloud | Devices | |
Proxyclick | Proxyclick App is a visitor management system that helps companies digitize the check-in process for employees, contractors, and visitors. | HR, Audit/Compliance | Users | |
PRTG Network Monitor | PRTG is a network monitoring application for Windows and Linux systems and servers, as well as miscellaneous hosts such as switches, routers, and other devices. | Infra Monitoring, RMM | Devices | |
Pulseway | Pulseway is a remote monitoring and management (RMM) system solution that enables an admin to monitor, manage and troubleshoot workstations, servers and network devices across an environment remotely. | Remote Monitoring and Management | Devices | |
Pulumi Cloud Engineering Platform | Pulumi provides an Infrastructure as Code solution for Developers and Infrastructure Teams, enabling them to build, deploy, and manage cloud applications and infrastructure using various languages, tools, and engineering practices. | Software Development Version Control, DevOps | Users | |
Puppet | Puppet is an open-source software configuration management tool. | Config Mgmt. | Devices | |
Pure Storage Pure1 | Pure Storage Pure1 is a cloud-based storage management solution that provides self-driving storage, data-storage management, and monitoring. | Storage Management | Devices | |
Quadrant | Quadrant is a Managed Detection and Response solution operating at the intersection of People and Product. | Attack Surface Mgmt. | Devices | |
Qualys Cloud Platform | Qualys Cloud Platform monitors customers' global security and compliance posture using sensors. | VA Tool | Devices, Users | |
Qualys Container Security | Qualys Container Security provides the ability to discover, track, and secure containers. | Containers | Devices | |
Qualys PCI Compliance | Qualys PCI Compliance evaluates compliance with the Payment Card Industry Data Security Standard (PCI DSS). | Audit/Compliance | Devices | |
Qualys S3 Integrated | Qualys S3 Integrated fetches data from AWS S3 Buckets that are configured to receive data from Qualys scans. | Cloud Security, Vulnerability Assessment, Audit/Compliance | Devices | |
Qualys VMDR OT | Qualys VMDR OT is a cloud-based platform for asset inventory and vulnerability management of critical industrial infrastructure. | Config/Patch Mgmt, OT, ITAM, ITSM, VA Tool, Audit/Compliance | Devices | |
Qualys WAS | Qualys WAS is a web application scanning tool for identifying vulnerabilities in web applications. | VA Tool, AppSec | Vulnerabilities, SaaS Applications, Application Services | |
Quest KACE Endpoint Systems Management Appliances | Quest KACE Endpoint Systems Management Appliances provision, manage, secure, and service network-connected devices. | Networking | Devices | |
Rackspace Cloud | Rackspace Cloud is a set of cloud computing products and services for building, hosting, and managing cloud-based infrastructures. | Cloud Infra, Cloud Mgmt. | Devices | |
Radiant Logic Virtual Directory Server (VDS) | Radiant Logic Virtual Directory Server (VDS) is a software layer that consolidates disparate identity sources into a central virtual namespace. | IAM, ITAM/ITSM | Users | |
Radiflow | Radiflow provides visibility and anomaly detection for OT assets. | OT | Devices | |
Rancher | Rancher is an open-source multi-cluster orchestration platform that enables operations teams to deploy, manage, and secure enterprise Kubernetes. | Containers, Cloud | Devices | |
Randori | Randori is an attack platform which combines continuous reconnaissance, real-time target analysis, and the ability to safely execute attacks on-demand to provide an attacker’s perspective. | Cyber Intelligence | Devices | |
Rapid7 Insight Account Platform | Rapid7 Insight API: This API provides API access for the entire Rapid7 Insight platform and suite of products. | License Mgmt | Users | |
Rapid7 Insight AppSec | Rapid7 Insight AppSec performs black-box security testing to identify vulnerabilities, triage vulnerabilities, prioritize actions, and remediate application risk. | AppSec, VA Tool, Risk Mgmt | Devices | |
Rapid7 InsightCloudSec | Rapid7 InsightCloudSec (formerly DivvyCloud) manages cloud security posture, secures cloud workloads, and governs identity and access management. | Cloud Mgmt | Devices | |
Rapid7 InsightIDR | Rapid7’s InsightIDR is a security center for incident detection and response, authentication monitoring, and endpoint visibility. | SIEM | Devices | |
Rapid7 InsightVM | Rapid7 InsightVM provides visibility and risk prioritization for vulnerabilities found in local, remote, cloud, containerized, and virtual infrastructure. | VA Tool | Devices, Vulnerabilities, SaaS Applications | |
Rapid7 Nexpose and InsightVM | Rapid7 Nexpose is an on-premise vulnerability management solution, providing discovery, detection, verification, risk classification, impact analysis, reporting and mitigation. Rapid7 InsightVM is a cloud-based vulnerability management solution that combines Rapid7’s Insight platform along with Nexpose core capabilities. | VA Tool | Devices, Users | |
Rapid7 Nexpose Warehouse | Rapid7 Nexpose Warehouse fetches device information directly from an external data warehouse. | VA Tool | Devices | |
Rapid7 Threat Command | Rapid7 Threat Command is an external threat intelligence tool that helps users find and mitigate threats targeting organizations. | Cyber Intelligence | Users | |
RecordedFuture | RecordedFuture threat intelligence helps identify the vulnerabilities that pose an actual risk to an organization, adding context and data to CVE scoring. | Attack Surface Mgmt., Cyber Intelligence | Devices | |
Red Canary | The Red Canary suite includes products that record telemetry, detect and investigate threats, and automate remediation. | EDR/EPP | Devices, Users | |
Red Hat Advanced Cluster Management for Kubernetes | Red Hat Advanced Cluster Management for Kubernetes provides visibility and control over clusters and applications from a single console. | Cluster Management, DevOps | Devices | |
Red Hat Automation Controller | Red Hat Automation Controller (formerly Ansible Tower) is a web console and REST API for operationalizing Ansible across teams, organizations, and the enterprise | ITAM/ITSM | Devices | |
Red Hat Customer Portal | The Red Hat Customer Portal provides access to product evaluations, purchasing capabilities, and knowledge management content. | Config/Patch mgmt, Software Development Version Control | Devices | |
Red Hat IdM | Red Hat Identity Management (IdM) provides a centralized and unified way to manage identity stores, authentication, policies, and authorization policies in a Linux-based domain. | IAM | Devices, Users | |
Red Hat Insights | Red Hat Insights is a managed service for the automated discovery and remediation of issues in Red Hat products. | IT Agent, Config/Patch Mgmt | Devices, Vulnerabilities, SaaS Applications | |
Red Hat OpenShift Container | Red Hat OpenShift is a Kubernetes container platform that allows developers and operators to manage cloud-native applications throughout the DevOps cycle, for any cloud. | Cloud Infra., Containers | Devices | |
Red Hat Satellite | Red Hat Satellite is a system management solution used to deploy, configure, and maintain systems across physical, virtual, and cloud environments. | Config Mgmt. | Devices | |
RedSeal | RedSeal’s network modeling and risk scoring platform models customers' entire hybrid data center of public cloud, private cloud and physical network. | Networking | Devices | |
Remediant SecureONE (JITA) | Remediant SecureONE is a Just-In-Time Privileged Access Management (JITA) solution that enables control and insight over the distribution, usage, and protection of privileged access across enterprise environments. | IAM | Devices | |
RemotePC | RemotePC is a tool for remote access and control of computers and devices. | ITAM/ITSM, Remote Conferencing | Devices, Users | |
RescueAssist (GoToAssist) | RescueAssist (formerly GoToAssist) is a cloud-based toolset for IT and customer support teams including remote support, IT monitoring, and service desk management. | IT Agent, Config Mgmt., Ticketing, ITAM/ITSM | Devices | |
Resolver | Resolver is a risk management and incident response platform that provides risk assessment, incident tracking, and reporting tools for businesses. | SIEM, Risk Mgmt | Users, Roles, Groups | |
Responsive | Responsive is a strategic response management and RFP software platform. | Collaboration, CRM, Audit/Compliance | Users | |
Restorepoint | Restorepoint is a platform that automates network configuration backup, recovery, change auditing, and compliance analysis for multiple vendors. | Networking, Configuration and Patch Management, Audit/Compliance | Devices | |
Revivn | Revivn is a SaaS platform that facilitates the repurposing of unused and outdated IT hardware for underserved communities. | ITAM/ITSM | Devices | |
RHSM Management Portal | Red Hat Subscription Management (RHSM) provides tools that help administrators track information about support contracts and software subscriptions. | License Mgmt | Devices | |
RingCentral | RingCentral provides cloud-based communication and collaboration products and services including phone, messaging, video meetings, and contact center. | Collaboration | Devices, Users | |
Rippling | Rippling provides unified workforce management software to help companies govern employees’ payroll, benefits, expenses, devices, apps, and more. | HR | Users | |
RiskIQ Digital Footprint | RiskIQ Digital Footprint software provides an active, comprehensive inventory of all of the organization’s IPs, domains, and hosts. | Attack Surface Mgmt., Cyber Intelligence | Devices | |
RiskRecon | RiskRecon is a cloud-based third-party risk management solution. | SaaS Management, Risk Management | Users | |
RiskSense | RiskSense provides vulnerability prioritization and management to dynamically control and measure cybersecurity risk. | VA Tool | Devices | |
Riverbed NetIM | Riverbed NetIM is a solution for discovering, modeling, monitoring, and troubleshooting your infrastructure. | Infra Monitoring | Devices | |
Riverbed SteelCentral Controller (SCC) | Riverbed SteelCentral Controller SCC facilitates administration tasks for groups of SteelHeads, Interceptors, Mobile Controller, Cores, and Edges. | Networking, AppSec, DevOps | Devices | |
Robin | Robin (now Symworld Cloud) is a Kubernetes-based platform that automates the deployment, scaling, and lifecycle management of data- and network-intensive applications. | Cloud Mgmt, DevOps | Users, Devices | |
RSA Archer | RSA Archer is an integrated risk management platform for managing multiple dimensions of risk, including IT, operational, third-party, resiliency, and compliance risk. | Risk Mgmt | Devices, Users | |
RSA SecurID | RSA SecurID provides identity and access management capabilities for on-premise deployments – in authentication, access management, and identity governance. | IAM | Users | |
Rubrik | Rubrik provides data security and data protection on a single platform, including: Zero Trust Data Protection, ransomware investigation, incident containment, sensitive data discovery, and orchestrated application recovery. | Data Security, DLP | Devices | |
Rubrik Polaris | Rubrik provides data security and data protection on a single platform, including: Zero Trust Data Protection, ransomware investigation, incident containment, sensitive data discovery, and orchestrated application recovery. | Data Security, DLP | Devices, Users | |
Rudder | Rudder is an open source audit and configuration management utility to help automate system configuration | config/patch mgmt, IT Agent, Audit/compliance | Devices | |
RUCKUS Cloud | CommScope RUCKUS Cloud is a network management-as-a-service platform that enables IT to provision, manage, optimize, and troubleshoot wired and wireless networks. | Networking, RMM | Devices, Users | |
Rundeck | Rundeck is an open-source tool that helps to define build, deploy and manage automation. | DevOps | Devices, Users | |
runZero | runZero (formerly Rumble Network Discovery) is a cloud-based network discovery platform that identifies and monitors network-connected IT assets. | Networking | Devices | |
SafeBreach | SafeBreach offers a breach and attack simulation platform that helps organizations locate and remediate security issues. | Audit/Compliance | Devices, Users | |
SafeConsole | SafeConsole by DataLocker allows administrators to provision, secure, manage, and audit encrypted USB drives, USB ports, and virtual folders. | DLP | Users | |
Safenames | Safenames is a domain management and brand protection service that supports companies in managing their domain portfolios, safeguarding trademarks, and ensuring online compliance. | Risk Management, SaaS Management | Devices | |
SafeNet Trusted Access | SafeNet Trusted Access is a cloud-based access management solution that provides secure access to applications and data. | IAM | Users | |
Safe Security | Safe Security is a platform that provides real-time cyber risk quantification and management. | Risk Management, VA Tool | Devices, Users | |
Sage People | Sage People is a people management platform that provides employee record management, payroll. processing and management, talent management, and more. | HR, IAM | Users | |
SailPoint IdentityIQ | SailPoint IdentityIQ is an identity and access management (IAM) solution that delivers automated access certifications, policy management, access request and provisioning, password management, and identity intelligence. | IAM | Users | |
Sailpoint Identity Manager | SailPoint provides access governance and identity management. | IAM | Users | |
SailPoint IdentityNow | SailPoint IdentityNow is a SaaS identity and access management (IAM) solution. | IAM, SaaS Management | Users, SaaS Data | |
Sal | Sal is an open-source reporting solution for managed endpoints. | MDM/EMM | Devices | |
| Salesforce | Salesforce is a customer relationship management solution that gives a single, shared view of every customer. | CRM, SaaS Management | Users. SaaS Data |
SaltStack Open Source | SaltStack Open Source is open-source software for event-driven security, cloud and configuration management. | SOAR, Config. Mgmt. | Devices | |
Samsung Knox | Samsung Knox is a built-in solution used to secure, deploy, and manage Samsung and Galaxy devices. | MDM/EMM | Devices | |
SAP Ariba | SAP Ariba is a cloud-based procurement, spend management, and supply chain services solution. | License Mgmt | Users | |
SAP Concur 3.x | SAP Concur provides travel, expense and invoice management. | ERP | Users, SaaS Data | |
SAP Concur 4.x | SAP Concur provides travel, expense and invoice management. | ERP | Users | |
SAP S/4HANA Cloud | SAP S/4HANA Cloud is a modular enterprise resource planning (ERP) software that streamlines various business functions. | ERP | Users | |
SAP SuccessFactors | SAP SuccessFactors manages various aspects of HR operations, including recruitment, employee performance, HR analytics, payroll, and learning. | HR | Users | |
Sassafras | Sassafras is IT asset management software that allows organizations to inventory and manage IT assets. | ITAM/ITSM | Devices | |
Saviynt | Saviynt Enterprise Identity Cloud is a cloud identity and access governance platform. | Cloud Security, IAM | Users | |
Schneider Electric EcoStruxure IT | Schneider Electric EcoStruxure IT provides software and services for IT and Data Center teams to monitor and manage critical IT infrastructure on-premise, in the cloud, and at the edge. | Infra Monitoring | Devices | |
Schneider Electric EcoStruxure IT Advisor | Schneider Electric EcoStruxure IT Advisor is asset and planning software that facilitates OpEx management. | Cloud Infra | Devices | |
ScienceLogic | ScienceLogic is an IT operations management (ITOM) and AIOps platform for monitoring and managing hybrid cloud infrastructure. | Infra Monitoring | Devices, Users | |
ScopNET | ScopNET provides an agent-free solution for the prevention of unauthorized access to corporate networks, integrating switches, routers and firewalls to detect alien devices. | NAC | Devices | |
ScreenCloud Studio | ScreenCloud Studio is a digital signage platform that allows businesses to create, manage, and display content across variety of screen types and locations. | Collaboration, Cloud Mgmt, SaaS Management | Users | |
Secdo Endpoint Protection | Secdo Endpoint Protection automates endpoint forensic analysis and cyber investigations for security teams. | EDR/EPP | Devices | |
Seceon aiXDR | Seceon aiXDR is an extended detection and response platform that provides comprehensive threat detection, automated response, and continuous monitoring across endpoints, networks, and cloud environments. | EDR/EPP, NDR, SIEM | Devices | |
SecPod SanerNow | SecPod SanerNow is an integrated platform that helps businesses secure system devices and monitor potential threats across digital assets. | UEM | Devices | |
Sectigo | Sectigo provides digital certificate lifecycle and PKI management. | Certificate Management | Devices | |
SecureAuth | SecureAuth is an identity access management security solution that provides passwordless authentication, multi-factor authentication, SSO, and more. | IAM | Users | |
Secure Code Warrior | Secure Code Warrior is a training platform that helps developers learn to write secure code. | Security Awareness, Data Security | Users | |
SecureW2 JoinNow | A suite of network security software that helps organizations deploy WPA2-Enterprise Wi-Fi security and utilize X. 509 certificates beyond Wi-Fi for VPN, Web/Browser authentication and SSL (DPI) Inspection. | NAC | Devices | |
Secureworks Red Cloak | Secureworks Red Cloak is an Endpoint Detection and Response technology that continuously monitors endpoints for signs of adversary activity. | EDR/EPP | Devices | |
Secureworks Taegis VDR | Secureworks Taegis VDR is a cloud-based vulnerability management solution. | VA Tool | Devices | |
Secureworks Taegis XDR (Red Cloak TDR) | Secureworks Taegis XDR (formerly Red Cloak TDR) is an endpoint detection and response technology for the cloud, endpoints and the network. | Cyber Intelligence | Devices | |
SecurityScorecard | SecurityScorecard rates cybersecurity postures of corporate entities through completing scored analysis of cyber threat intelligence signals for the purposes of third party management and IT risk management. | Risk Management | Devices | |
Securonix SNYPR | Securonix SNYPR is a platform for security analytics, using machine learning to detect and respond to threats. | SIEM, UEBA, Cyber Intelligence | Devices, Users | |
Sensu | Sensu is a cloud monitoring solution that provides monitoring workflows automation and visibility into multi-cloud environments. | Cloud Mgmt., Cloud | Devices | |
SentinelOne | SentinelOne is an endpoint protection solution including prevention, detection, and response. | EDR/EPP | Devices | |
SentinelOne Ranger | SentinelOne Ranger creates visibility into your network by using distributed passive and active mapping techniques to discover running services, unmanaged endpoints, IoT devices, and mobiles. | EDR/EPP | Devices | |
Sentra | Sentra offers cloud data security posture management (DSPM), allowing customers to automatically discover, classify, monitor, and protect cloud data. | Cloud Security, Data Security | Devices | |
Sepio | Sepio is an asset risk management platform that provides visibility into organizations' hardware assets and their related security posture. | VA Tool | Devices, Users | |
Serraview | Serraview is workplace management and space optimization software. | HR | Users | |
ServiceNow | ServiceNow provides service management software as a service, including IT services management (ITSM), IT operations management (ITOM) and IT business management (ITBM). | CMDB, ITAM/ITSM, Ticketing, SaaS Management | Devices, Users, SaaS data | |
SevOne Data Platform | SevOne Data Platform is a network and infrastructure management platform that provides monitoring and analytics. | Networking | Devices | |
Shadowserver | Shadowserver gathers and analyzes data on malicious internet activity including malware, botnets, DDoS, fraud, and more. | Cyber Intelligence | Devices | |
SharePoint | SharePoint creates internal websites where organizations store, organize, share, and access information from any device. | Collaboration | Devices, Users | |
Shockwave Cloud | Shockwave Cloud helps identify and track cloud related issues and misconfigurations. | Cloud Infra, Cloud Mgmt, Cloud Security | Devices, Users | |
Shodan | Shodan is a search engine for Internet-connected devices. | IoT | Devices | |
Signal Sciences | Signal Sciences is a web protection platform that protects on-premise, multi-cloud and hybrid-cloud apps, within containers and serverless functions. | AppSec, DevOps | Devices | |
Silverfort | Silverfort is a unified identity protection platform that integrates with IAM solutions to provide secure access to company resources. | IAM, PAM, UEM | Users | |
SimpleMDM | SimpleMDM is a mobile device management solution for Apple devices. | MDM/EMM | Devices | |
Site24x7 | Site24x7 offers a performance monitoring solution for websites, servers, cloud environments, networks, applications, and users. | RMM | Devices | |
Skybox Firewall Assurance | Skybox Firewall Assurance provides automation of firewall management tasks across different firewall vendors and complex rulesets. | Firewall | Devices | |
Slack | Slack is a chat and collaboration hub used to connect people, information, tools, and services. | Collaboration, SaaS Management | Users, SaaS Data | |
Smartsheet | Smartsheet is a cloud-based work management platform that empowers collaboration, drives better decision making, and accelerates innovation. | Collaboration, SaaS Management | Users, SaaS Data | |
SmartSimple | SmartSimple is a grant management and business process solution. | ERP | Users | |
Smokescreen IllusionBlack | Smokescreen uses planted decoys to actively lure and capture attacks on endpoints, networks, and web applications. | Deception | Devices | |
SnapComms | SnapComms is an internal communications software solution. | Collaboration | Users | |
Snipe-IT | Snipe-IT is a free, open source IT asset management system written in PHP. | ITAM/ITSM | Devices | |
Snow Atlas | Snow Atlas is a SaaS management platform designed to provide visibility and optimization of software-as-a-service applications. | SaaS Management | Devices, Users | |
Snowflake Data Warehouse | Snowflake is a data warehouse built on top of the Amazon Web Services or Microsoft Azure cloud infrastructure, and allows storage and compute to scale independently. | Collaboration | Devices, Users | |
Snow Software Asset Management | Snow Software provides Software Asset Management (SAM) products and services to reduce the risk, cost, and complexity associated with software assets and licensing. | ITAM/ITSM | Devices | |
Snow Software Exceptions | Snow Software Exceptions adapter provides a way to track and manage software exceptions. | ITAM/ITSM | Devices | |
Snyk | Snyk is a developer security platform integrating directly into development tools, workflows, and automation pipelines. | AppSec, Containers, DevOps, Software Development Version Control, VA Tool | Devices, Users | |
SolarWinds Network Performance Monitor | SolarWinds Network Performance Monitor is a unified IT systems management system that tracks the performance of networks, applications, systems, and databases on-premises, in a hybrid environment, or in the cloud. | ITAM/ITSM | Devices | |
SolarWinds Pingdom | SolarWinds Pingdom is a website and server monitoring tool that helps organizations track the uptime, performance, and availability of their web-based applications and services. | Infra Monitoring | Users | |
SolarWinds Service Desk (Samanage) | SolarWinds Service Desk (formerly Samanage) is a unified, cloud-based IT service desk and asset management platform. | Ticketing, CMDB, ITAM/ITSM | Users | |
SonicWall | SonicWall next-generation firewalls (NGFW) provide security, control, and visibility to maintain an effective cybersecurity posture. | Firewall | Devices | |
SonicWall Network Security Manager | SonicWall Network Security Manager enables organizations to deploy and manage all firewalls, connected switches and access points in one interface. | Firmware Security, Networking | Devices | |
Sophos Central | Sophos Central is a unified console that provides one place to manage Sophos products, including: endpoint, mobile, encryption, web, email, server, and wireless security. | EDR/EPP | Devices | |
Sophos Cloud Optix | Sophos Cloud Optix is a public cloud visibility and threat response solution that detects, responds, and prevents cloud security and compliance gaps. | Cloud Security, Cloud | Devices, Users | |
Sophos Endpoint Protection | Sophos Endpoint Protection helps secure workstations by adding prevention, detection, and response technology on top of the operating system. | EDR/EPP | Devices | |
SOTI MobiControl | SOTI MobiControl is a software system for managing mobile devices in the enterprise. | MDM/EMM | Devices | |
Spacewalk | Spacewalk is an open-source systems management solution for system provisioning, patching and configuration. | Config Mgmt. | Devices | |
Specops Inventory | Specops Inventory collects and reports information on hardware, software, registry, user settings, operating system, security data, and Active Directory data. | IT Agent, Config Mgmt. | Devices | |
SPEKTRA | NTT SPEKTRA (Sentient Platform for Network Transformation) is a managed network services platform. | Networking | Devices | |
Spiceworks | Spiceworks provides network monitoring to capture, analyze, and monitor network traffic. | Networking | Devices | |
Spirent Velocity | Spirent Velocity is a software deployment and release management tool used for automating application deployments. | DevOps | Devices | |
Splashtop | Splashtop is a remote access and remote support tool. | RMM | Devices, Users | |
Splunk | Splunk captures, indexes, and correlates real-time data in a searchable repository. | SIEM | Devices, Users | |
SpyCloud | SpyCloud is an account takeover prevention and fraud investigation tool that alerts companies when their users' data has been compromised in a third-party breach. | AppSec | Devices | |
SQLite | The SQLite adapter imports device information from an SQLite database. | CMDB, ITAM/ITSM | Devices, Users | |
SQL Server | The SQL Server adapter imports device information from arbitrary SQL servers: Microsoft SQL Server, MySQL and PostgreSQL. | CMDB, ITAM/ITSM | Devices, Users | |
StackRox | StackRox is a container security platform that protects cloud-based applications, detects threats, and manages vulnerabilities, compliance requirements, and configurations. | Containers, VA Tool, Audit/Compliance | Devices | |
Stairwell | Stairwell offers a threat hunting and detection and response platform called “Inception.” | NDR | Devices | |
Statseeker | Statseeker is a network performance monitoring solution. | Infra Monitoring | Devices | |
Sumo Logic | Sumo Logic is a cloud-based service for logs & metrics management for modern apps. | Cloud Mgmt., Cloud | Devices, Users | |
Sunbird | Sunbird dcTrack is a data center infrastructure monitoring product that provides dashboards and KPIs for remote data center management. | Infra Monitoring | Devices | |
Sunflower | Sunflower Lab is a mobile app, web app, and custom software development company. | Software Development Version Control | Devices | |
SureMDM | 42Gears SureMDM is a Unified Endpoint Management (UEM) solution for company-owned and BYOD devices. | MDM/EMM, UEM | Devices | |
SUSE Manager | SUSE Manager is an open-source infrastructure management tool for Linux systems. | Infra Monitoring | Devices | |
Sweepatic | Sweepatic automates continuous mapping, monitoring, and managing of all internet-connected assets and risks to deliver an attack surface management platform. | Attack Surface Mgmt. | Devices | |
Symantec Cloud Secure Web Gateway (WSS Agent) | Symantec WSS is a cloud-delivered secure web gateway that protects against malware and enforces policies to access the web. | Secure Web Gateways | Devices | |
Symantec Cloud Workload Protection (CWP) | Symantec Cloud Workload Protection (CWP) automates security policy enforcement to protect public cloud workloads. | Config Mgmt., EDR/EPP | Devices | |
Symantec Control Compliance Suite (CCS) | Symantec Control Compliance Suite (CCS) is a solution to help identify security gaps and vulnerabilities and automate compliance assessments for over 100 regulations, mandates, and best practice frameworks including GDPR, HIPAA, NIST, PCI and SWIFT. Symantec CCS discovers and inventories all networks and assets including managed and unmanaged devices allowing for assets to be profiled and ranked for risk potential. | VA Tool | Devices | |
Symantec Data Center Security (DCS) Server Advanced | Symantec Data Center Security Server Advanced delivers security detection, monitoring, and prevention capabilities for both physical and virtual server infrastructures. | Data Security | Devices | |
Symantec DLP | Symantec DLP is a data loss protection and prevention solution. Its management console, the DLP Enforce Platform, and its reporting tool, IT Analytics for DLP, allows writing and enforce policies to reduce information risks. | DLP, Data Security | Devices | |
Symantec Endpoint Detection and Response (EDR) | Symantec Endpoint Detection and Response (EDR) detects, protects, and responds to threats to the organization's network. | EDR/EPP | Devices | |
Symantec Endpoint Encryption | Symantec Endpoint Encryption combines full-disk and removable media encryption with centralized management to protect sensitive information and ensure regulatory compliance. | Encryption, Data Security | Devices | |
Symantec Endpoint Management Suite (Altiris) | Symantec Endpoint Management Suite (formerly Altiris) manages, patches, and remediates application and OS configurations on desktops, laptops and servers to strengthen endpoint security and maximize user productivity. | ITAM/ITSM, Config Mgmt. | Devices | |
Symantec Endpoint Protection 12.x | Symantec Endpoint Protection manages events, policies, and registration for the client computers that connect to customer networks. | EDR/EPP | Devices | |
Symantec Endpoint Protection 14.x | Symantec Endpoint Protection manages events, policies, and registration for the client computers that connect to customer networks. | EDR/EPP | Devices | |
Symantec Endpoint Protection Cloud | Symantec Endpoint Protection Cloud unifies threat protection and device management for PC, Mac, mobile devices, and servers to protect endpoints from ransomware, zero-day threats, and other sophisticated attacks. | EDR/EPP | Devices | |
SymphonyAI Summit | SymphonyAI Summit is an ITSM solution that provides automation libraries for automating repetitive and manual tasks. | ITAM/ITSM | Devices | |
Syncro MSP | Syncro MSP is a combined remote monitoring and management (RMM) and professional services automation (PSA) platform that manages invoicing, credit card payments, help desk, customer relationship tracking, remote access and support, and more managed IT services. | RMM | Devices | |
Syxsense | Syxsense is an endpoint security management tool that combines IT management, patch management, and vulnerability scanning. | EDR/EPP | Devices | |
SysAid | SysAid is an integrated ITSM, Service Desk and Help Desk software solution. | ITAM/ITSM, Ticketing | Devices, Users | |
Sysdig - Monitor | Sysdig is a monitoring, troubleshooting, cost-optimization, and alerting suite for containers, cloud, and Kubernetes environments. | Infra Monitoring | Devices, Users | |
Sysdig - Secure | Sysdig is a monitoring, troubleshooting, cost-optimization, and alerting suite for containers, cloud, and Kubernetes environments. | Infra Monitoring | Devices | |
Tableau | Tableau is a data visualization and analysis tool used to create charts, graphs, maps, dashboards, and stories. | Cloud Mgmt., Cyber Intelligence | Users | |
Tailscale | Tailscale is a minimal-configuration WireGuard-based VPN. | Secure Web Gateways | Devices, Users | |
TalentLMS | TalentLMS is an all-in-one training platform. | Collaboration, HR | Users | |
Talon | Talon is a secure enterprise browser designed to defend against malware and prevent data loss for managed and unmanaged devices. | Secure Enterprise Browser | Devices | |
Tangoe Managed Mobility Services (MMS) | Tangoe Managed Mobility Services (MMS) provides end-to-end mobile lifecycle management. | ITAM/ITSM, Infra Monitoring, License Mgmt, IoT, MDM/EMM | Devices, Users | |
Tanium Asset | Tanium Asset provides an inventory of hardware and software assets including servers, laptops, and desktops for thorough insight. | ITAM/ITSM, Config Mgmt. | Devices | |
Tanium Comply | Tanium Comply conducts vulnerability and compliance assessments against operating systems, applications, security configurations, and policies. | Audit/Compliance | Devices | |
Tanium Discover | Tanium Discover scans for unmanaged assets with almost no impact on the network. | ITAM/ITSM, Config Mgmt. | Devices | |
Tanium Interact | Tanium Interact lets you ask questions to gather live endpoint data in order to create an up-to-date inventory of hardware and software assets. | ITAM/ITSM, Config Mgmt. | Devices | |
Tanium Client Status | Tanium Client Status provides an inventory of all clients that have registered with the Tanium platform. | ITAM/ITSM, Config Mgmt. | Devices | |
TCPWave (IPAM) | TCPWave IPAM allows administrators to manage their DNS and DHCP infrastructure for on-premise and cloud environments. | Networking | Devices | |
TeamCity | TeamCity is a build management and continuous integration server. | DevOps, Software Development Version Control | Devices | |
TeamDynamix | TeamDynamix is an ITSM/ESM and project portfolio management solution with enterprise integration and automation. | ITAM/ITSM | Users, Devices | |
TeamViewer | TeamViewer is remote access and remote control computer software, allowing maintenance of computers and other devices. | RMM | Devices | |
Tenable.asm | Tenable Attack Surface Management (formerly Tenable.asm) continuously maps the internet and discovers connections to internet-facing assets. | Attack surface mgmt. | Devices | |
Tenable Identity Exposure (formerly Tenable.ad) | Tenable Identity Exposure (formerly Tenable.ad) provides real-time security monitoring for Microsoft Active Directory (AD) infrastructures. | Audit/Compliance | Users | |
Tenable.io Scan Export CSV | Tenable Vulnerability Management CSV File (Formerly Tenable.io) provides the ability to import a Tenable Vulnerability Management (Formerly Tenable.io) scan CSV. | VA Tool | Devices | |
Tenable Nessus | Tenable Nessus is a vulnerability scanning platform for auditors and security analysts. | VA Tool | Devices | |
Tenable Nessus CSV File | Tenable Nessus CSV File Adapter imports device information from vulnerability scan data. | VA Tool | Devices | |
Tenable.io | Tenable.io automatically discovers and assesses a customer's environment for vulnerabilities, misconfigurations, and other cybersecurity issues. | VA Tool | Devices, Users | |
Tenable.OT (Indegy) | Tenable.OT (Indegy) (previously Indegy Industrial Cybersecurity Suite) protects industrial networks from cyber threats, malicious insiders, and human error. | OT | Devices | |
Tenable.ot | Tenable.ot provides the ability to identify operational technology (OT) assets, communicate risk, and prioritize action. | OT | Devices | |
Tenable.sc (SecurityCenter) | Tenable.sc (formerly SecurityCenter) consolidates and evaluates vulnerability data, prioritizing security risks. | VA Tool | Deices | |
Teramind | Teramind is an employee monitoring, user behavior analytics, and insider threat detection solution. | DLP, UEBA | Devices, Users | |
Tesma | Tesma provides a central database for business information and makes it available in real-time. | Collaboration | Devices | |
Tessian | Tessian is a cloud email security platform that prevents email threats and protects against data loss. | DLP, Email Security | Devices | |
Thinkst Canary | Thinkst Canary is deception technology deployed as tokens to catch malicious activity. | Cloud Security, Data Security, Deception | Devices | |
ThousandEyes | ThousandEyes is a network infrastructure monitoring and troubleshooting platform | Infra Monitoring, Networking | Devices | |
ThreatLocker | ThreatLocker is a zero-trust endpoint protection platform. | EDR/EPP | Devices | |
Threat Stack | Threat Stack is a provider of cloud security management and compliance solutions. | Cloud Security, Cloud | Devices | |
Tines | Tines is a no-code Security Orchestration Automation & Response (SOAR) solution. | ITAM/ITSM, SOAR, Software Development Version Control | Users | |
TOPdesk Enterprise Service Management | TOPdesk Enterprise Service Management (ESM) lets service teams process requests from a single platform. | Cloud Mgmt, Collaboration, ITAM/ITSM | Devices | |
Torii | Torii is a SaaS Management Platform letting IT professionals discover, optimize, and control SaaS usage and costs. | SaaS Mgmt, Cloud Infra. & Mgmt. | Users | |
Trace3 LAMP | Trace3 Technology Lifecycle Management Platform (LAMP) is an IT Asset Management (ITAM) platform. | Cloud Mgmt, DevOps, ITAM/ITSM, Infra Monitoring | Devices | |
Trellix MVision | Trellix MVision is a CASB solution that protects data and stops threats in the cloud across SaaS, PaaS, IaaS, and on-premise environments. | Cloud Security | Devices | |
Trello | Trello is a collaboration and project management tool that helps teams organize and manage their work tasks and projects. | Collaboration, Ticketing | Users | |
Trend Micro Apex One (OfficeScan) | Trend Micro Apex One (formerly OfficeScan) is an endpoint security solution protecting against malware, scripts, injection, ransomware, memory and browser attacks, and exploits. | EDR/EPP | Devices | |
Trend Micro Cloud App Security | Trend Micro Cloud App Security provides threat and data protection for cloud applications and services such as Google G Suite, Dropbox, Microsoft 365, and more. | Cloud Security, Cloud | Users | |
Trend Micro Conformity | Trend Micro Conformity provides real-time monitoring, automated security and compliance checks, and auto-remediation for cloud infrastructure. | Cloud Security | Devices | |
Trend Micro Deep Security | Trend Micro Deep Security can automatically virtually patch server, cloud, VDI and application vulnerabilities. | Config Mgmt., EDR/EPP | Devices | |
Trend Micro Vision One | Trend Micro Vision One is a threat defense platform that includes: Advanced extended detection and response (XDR) capabilities. | EDR/EPP | Devices | |
Trend Micro Worry-Free | Trend Micro worry-free is an endpoint and SaaS solution protecting against malware, scripts, injection, ransomware, memory and browser attacks, and exploits. | EDR/EPP | Devices | |
Tripwire Enterprise | Tripwire Enterprise is a security configuration management (SCM) suite that provides fully integrated solutions for policy, file integrity and remediation management. | Config Mgmt., EDR/EPP | Devices, Software, SaaS Applications | |
TrueFort | TrueFort offers application behavior analytics, control, and protection. | AppSec, DevOps | Devices | |
TruffleHog | TruffleHog is a security tool that scans code repositories for vulnerabilities related to secret keys, such as private encryption keys and passwords. | AppSec, DevOps | Devices | |
TruPortal | TruPortal is a secure, web-based access credential system for physical access. | IAM, IoT | Devices | |
Trustwave | Trustwave is a managed security services provider focused on managed detection and response. | RMM | Users | |
Tufin SecureTrack | Tufin SecureTrack is a firewall management solution that delivers security, compliance, and connectivity across physical networks and hybrid cloud. | Firewall | Devices | |
Twilio | Twilio is a customer engagement platform that offers programmable communication solutions. | CRM, Cloud Infra | Accounts/Tenants | |
Twistlock | Twistlock provides container and cloud native cybersecurity for teams using Docker, Kubernetes, serverless, and other cloud native technologies. | Containers, Cloud | Devices | |
TYCHON | TYCHON is an endpoint analytics and remediation platform that allows users to search, visualize, remediate, and monitor security compliance across assets. | Attack Surface Mgmt., EDR/EPP, ITAM/ITSM | Devices | |
Ubiquiti Networks UniFi Controller | The UniFi Controller is a wireless network management software solution for managing multiple wireless networks using a web browser. | Networking | Devices | |
Udemy | Udemy is an online learning and teaching marketplace. | Collaboration | Devices | |
UKG Pro (Ultimate Software UltiPro) | UKG Pro (formerly Ultimate Software UltiPro) is cloud-based human capital management (HCM) software. | HCM, IAM | Users | |
UnifiedFX PhoneView | UnifiedFX PhoneView is a Cisco Preferred Solutions Partner which offers Cisco Phone Management Software. | MDM/EMM | Devices | |
Unimus | Unimus is a network configuration and automation tool which provides information on devices, backups, and configurations. | Networking | Devices | |
Unisys Stealth | Unisys Stealth transforms existing networks—both on-premises and in the cloud—into a Zero Trust Network through identity-based microsegmentation. | Networking | Devices | |
United Security Providers | United Security Providers is a Managed Security Services provider. | Data Security, NAC | Devices | |
Unitrends | Unitrends (a Kaseya company) provides all-in-one enterprise backup continuity and disaster recovery solutions. | DLP | Devices | |
Universal SSH Key Manager (UKM) | Universal SSH Key Manager (UKM) is an enterprise grade SSH user key management solution that uses a non-disruptive approach to gain and retain control of the SSH infrastructure. | ITAM/ITSM | Devices | |
UpGuard CyberRisk | UpGuard CyberRisk provides third-party vendor risk and external cyber risk monitoring. The platform has two main modules: UpGuard BreachSight which monitors company external risk posture and Vendor Risk monitors and helps manages the risk posture of third party vendors. | Cyber Intelligence | Devices, Users | |
UpKeep | UpKeep Asset Operations Management Platform is a mobile-first CMMS (computerized maintenance management system), EAM (enterprise asset management), and IIoT (industrial internet of things) suite of solutions. | IoT, RMM, ITAM/ITSM | Devices | |
Uptrends | Uptrends is a cloud-based solution for monitoring websites, servers, APIs, and network performance. Integrate Uptrends with the Axonius Cybersecurity Asset Management Platform. | Infra Monitoring, RMM | Devices, Users | |
Uptycs | Uptycs is an osquery-powered security analytics platform pairs a universal agent with analytics for fleet visibility, intrusion detection, incident investigation, vulnerability management & compliance for Linux, macOS, Windows, containers, and cloud workloads. | UEM, MDM/EMM | Devices | |
Uyuni | Uyuni is an open-source configuration and infrastructure management solution for software-defined infrastructure. | Config/Patch Mgmt | Devices | |
vArmour | vArmour details application and user relationships across cloud, data center, and hybrid IT environments. | Cloud Security, Networking | Devices, Users | |
Varonis CSV | Varonis helps prioritize risks around sensitive repositories, monitor the use of personal accounts, and identify costly misconfigurations. | Data Security | Devices | |
Vectra AI | Vectra AI is a cybersecurity platform that uses AI to detect and respond to cyberattacks. | Networking | Devices | |
Veeam | Veeam provides backup, disaster recovery and modern data protection software for virtual, physical and multi-cloud infrastructures. | Deception, Storage Management | Devices | |
Velociraptor | Velociraptor is an open-source endpoint monitoring, digital forensic and cyber response platform. | EDR/EPP | Devices | |
Venafi | Venafi secures and protects cryptographic keys and digital certificates. | Certificate Mgmt., Data Security | Devices | |
Venminder | Venminder is a third-party risk management tool that helps manage and monitor the entire vendor lifecycle, including on/off-boarding, contract tracking, and risk assessment. | Audit/Compliance, Risk Management | SaaS Applications | |
Veracode | Veracode provides static, dynamic, and software composition scanning to identify vulnerabilities in the software development lifecycle. | AppSec, VA Tool | Devices | |
Veritas NetBackup | Veritas NetBackup is an enterprise backup solution offering data management, automation, artificial intelligence, and elastic architecture. | Data Security, Storage Management | Devices | |
Verkada | Verkada is a cloud-based security platform offering video surveillance, access control, and environmental sensors. | IoT | Devices, Users | |
Vicarius | Vicarius is a consolidated vulnerability discovery, prioritization, and remediation solution. | VA Tool | Devices | |
Viptela (Cisco) SD-WAN | Cisco SD-WAN (previously Viptela) allows users to establish an SD-WAN overlay fabric that connects data centers, branches, campuses, and colocation facilities. | Networking, Secure Web Gateways | Devices | |
Virtru Gmail Encryption | Virtru Gmail Encryption protects Gmail messages and attachments with end-to-end encryption while maintaining user ownership and control. | Encryption | Users | |
VMware Carbon Black App Control (Carbon Black CB Protection) | VMware Carbon Black App Control (formerly Carbon Black CB Protection) protects critical systems and servers to prevent unwanted changes and ensure continuous compliance with regulatory mandates. | EDR/EPP | Devices | |
VMware Carbon Black Cloud (Carbon Black CB Defense) | VMware Carbon Black Cloud (formerly Carbon Black CB Defense) is a cloud native platform delivering next-generation antivirus and endpoint detection and response. This adapter is also compatible with Carbon Black Cloud Enterprise EDR (formerly CB ThreatHunter) and Carbon Black Cloud Audit and Remediation (formerly CB LiveOps). | EDR/EPP | Devices | |
VMware Carbon Black EDR (Carbon Black CB Response) | VMware Carbon Black EDR (formerly Carbon Black CB Response) is a threat hunting and incident response solution that delivers continuous visibility in offline, air-gapped, and disconnected environments using threat intel and customizable detections. | EDR/EPP | Devices | |
VMware Carbon Black LiveOps | VMware Carbon Black LiveOps is part of the CB Predictive Security Cloud™ (PSC), and allows customers to query endpoints and remediate issues in real time. Integrate VMware Carbon Black LiveOps with the Axonius Cybersecurity Asset Management Platform. | EDR/EPP, IT Agent | Devices | |
VMware Carbon Black Cloud Workload | VMware Carbon Black Cloud Workload is a security solution for workloads, aiming to reduce the attack surface and to protect critical assets. | Attack Surface Mgmt., EDR/EPP | Devices | |
VMWare ESXi and vSphere | VMware ESXi is an enterprise-class, type-1 hypervisor for deploying and serving virtual computers. VMware vSphere is VMware's cloud computing virtualization platform. | Virtualization, ITAM/ITSM, Cloud | Devices | |
VMware Horizon | VMware Horizon is a platform for secure delivery of virtual desktops and apps across the hybrid cloud. | Virtualization, ITAM/ITSM, Cloud | Devices | |
VMware NSX | VMware NSX provides an agile software-defined infrastructure to build cloud-native application environments. | Networking | Devices | |
VMware NSX Advanced Load Balancer | VMware NSX Advanced Load Balancer (formerly AVI Networks) delivers multi-cloud application services used for load balancing, web application firewall and container ingress. | Cloud Infra, Cloud Mgmt. | Devices | |
VMware SD-WAN | VMware SD-WAN (formerly by VeloCloud) is a software-based network technology that virtualizes WAN connections. | Networking | Devices | |
VMware vCloud Director | VMware vCloud Director is a cloud service-delivery platform. | Cloud Mgmt., Cloud | Devices, Users | |
VMware vRealize Operations (vROps) | VMware vRealize Operations (vROps) delivers an IT operations management platform for private, hybrid, and multi-cloud environments that covers the physical, virtual and cloud infrastructure, including VMs and containers. | Cloud Infra, Cloud | Devices | |
VMware Workspace ONE (Airwatch) | VMWare Workspace ONE (formerly AirWatch) provides enterprise mobility management (EMM) software and standalone management systems for content, applications, and email. | MDM/EMM, UEM | Devices | |
vRealize Automation SaltStack Config (formerly SaltStack) | vRealize Automation SaltStack intelligent automation delivers event-driven security, cloud, and configuration management. | SOAR, Config Mgmt. | Devices | |
Vulcan Cyber | The Vulcan Cyber ExposureOS is designed to help information security teams aggregate, correlate, prioritize, and remediate exposure risk across all attack surfaces, from one platform. | VA Tool | Devices, Users, Vulnerabilities, SaaS Applications | |
Vultr | Vultr is a global cloud hosting company offering high-performance cloud servers, cloud GPUs, bare metal, and cloud storage. | Cloud Infra | Devices, Users | |
Wasabi | Wasabi is a cloud data storage company focused on high-performance object storage services. | Cloud Infra, Storage Management | Devices, Users | |
Wasp AssetCloud | AssetCloud is an asset tracking solution that enables organizations to monitor, audit and report on devices and software. | ITAM/ITSM | Devices, Users | |
watchTowr | The watchTowr platform provides Continuous Automated Red Teaming (CART) and Attack Surface Management (ASM) to help businesses discover high-impact vulnerabilities. | Attack Surface Mgmt | Devices | |
Wazuh | Wazuh is a free, open source and enterprise-ready security monitoring solution for threat detection, integrity monitoring, incident response and compliance. | EDR/EPP | Devices | |
Webroot Endpoint Protection | Webroot Endpoint Protection protects against threats across email, browsers, files, URLs, ads, apps, and more. | EDR/EPP | Devices | |
Web Server Information | Web Server Information provides information about the web server for a given website domain, including the server type, its version and operating system, the content management system (CMS) name and its version, the installed CMS plugins, versions and more. | ITAM/ITSM | Devices | |
WhatsUp Gold | WhatsUp Gold is network monitoring software. | Networking | Devices | |
Windows DHCP Server | Windows DHCP Server is a networking server used to lease IP addresses and manage other configuration information. | Networking | Devices | |
Windows Management Instrumentation (WMI) | Windows Management Instrumentation (WMI) is a set of specifications from Microsoft for consolidating the management of devices and applications in a Windows network. WMI provides users with information about the status of local or remote computer systems. | ITAM/ITSM | Devices | |
Windows Server Failover Clustering (WSFC) | Windows Server Failover Clustering (WSFC) is a feature of the Windows Server platform for improving the high availability (HA) of applications and services. WSFC is the successor to Microsoft Cluster Service (MSCS). | Cloud Infra, Cloud | Devices | |
Windows Server Update Services (WSUS) | Windows Server Update Services (WSUS), previously Software Update Services (SUS), enables administrators to manage the distribution of updates and hotfixes released for Microsoft products. | Config Mgmt. | Devices | |
Windows Server Update Services (WSUS) SQL | Windows Server Update Services (WSUS) - SQL, previously Software Update Services (SUS), enables administrators to manage the distribution of updates and hotfixes released for Microsoft products. | Config/Patch Mgmt | Devices | |
Wiz | Wiz analyzes all layers of the cloud stack to identify high-risk attack vectors to be prioritized and fixed. | Cloud Security | Devices | |
Wiz Reports | Wiz Reports provides additional data for Wiz assets. | Cloud Security | Devices, Users | |
WordPress | WordPress is a web content management system. | Collaboration | Users | |
Workday | Workday offers software solutions for financial management, human resources, and planning. | ERP, SaaS Management | Users, SaaS Data | |
Workday Adaptive Planning | Workday Adaptive Planning is a cloud-based planning and budgeting platform that helps organizations manage financial, workforce, and operational planning, providing data-driven insights for decision-making. | Cloud Mgmt, ERP, Audit/Compliance | Users | |
Workspace One - Intelligence Report API | Workspace ONE Intelligence reporting uses a cloud-based report storage system to gather data and create the reports. | MDM/EMM | Devices | |
WP Engine | WP Engine is a website hosting provider aimed at providing managed hosting solutions for websites and applications. | Secure Web Gateways, | Users | |
Wrike | Wrike is software designed to help teams plan, organize, manage, and track tasks and projects. | Collaboration | Users | |
xAssets | xAssets provides IT asset management software. | ITAM/ITSM | Devices | |
XMC Extreme Management Center | XMC Extreme Management Center is a wired and wireless network management and automation software. | Networking | Devices | |
Xshield | ColorTokens Xshield is a zero trust-based, cloud-delivered micro-segmentation solution that secures critical corporate assets, including applications and workloads. | Cloud Security, Networking | Devices | |
Zabbix | Zabbix is an open source monitoring software tool for networks, servers, virtual machines and cloud services. | Cloud Mgmt., Cloud | Devices | |
ZenDesk | Zendesk is a cloud-based help desk management solution offering customizable tools to build customer service portal, knowledge base and online communities. | Collaboration, SaaS Management | Users, SaaS Data | |
Zenoss | Zenoss enables monitoring of all physical and virtual networks as one part of a real-time model that includes both cloud and on-premises infrastructure. | Infra Monitoring, RMM | Devices | |
ZeroFox | ZeroFox is an intelligence-based analysis and remediation engine used to detect digital risks such as phishing, malware, impersonation, and piracy targeted at digital assets. | Cyber Intelligence, Risk Management | Users | |
Zero Networks | Zero Networks automates the development and enforcement secure remote connectivity and software-defined segmentation. | NAC | Devices, Users | |
Zerto | Zerto is a data loss protection solution that provides disaster recovery, backup and workload mobility software for virtualized infrastructures and cloud environments. | DLP, Data Security | Devices | |
Zerto ZVM | Zerto ZVM is a data loss protection solution that provides disaster recovery, backup and workload mobility software for virtualized infrastructures and cloud environments. This adapter supports on-prem deployment. | DLP, Data Security | Devices | |
Zimperium | Zimperium zIPS is a mobile threat defense solution for enterprises, providing protection to both corporate owned and BYOD devices. | EDR/EPP | Devices and Users | |
Zoom | Zoom is a remote conferencing service that provides video conferencing, online meetings, chat, and mobile collaboration. | Remote Conferencing, SaaS Management | Devices, Users, SaaS data | |
Zscaler Client Connector | Zscaler Client Connector enables secure access to business applications from any device. | Cloud Security, IAM, Secure Web Gateways | Devices | |
Zscaler Web Security | Zscaler Web Security is a secure Internet and web gateway service that stops malware, advanced threats, phishing, browser exploits, malicious URLs, botnets, and more. | Secure Web Gateways, SaaS Management | Devices, Users, SaaS data | |
Zscaler Workload Segmentation | Zscaler Workload Segmentation is a SaaS solution for applying and managing network segmentation in cloud and on-prem environments. | Networking | Devices | |
Zscaler ZDX | Zscaler Digital Experience (ZDX) is a monitoring solution providing end-to-end visibility and troubleshooting of end-user performance issues for any user or application, regardless of location. | RMM | Devices, Users |