Adapters List
  • 23 May 2024
  • 90 Minutes to read
  • Dark
  • PDF

Adapters List

  • Dark
  • PDF

Article summary

To aggregate and correlate asset data, Axonius securely fetches data from your IT, Security, and business solutions using pre-built integrations with hundreds of security and management solutions, known as adapters.

The table below describes each of the adapters supported. Use the Search box to search for adapters, and to filter the display by 'Solution Categories' and 'Types of Assets Fetched'.

For details about connecting adapters, see the Adapters Page.


Adapter LogoAdapter NameDescriptionSolution CategoriesTypes of Assets Fetched
one_e_adapter1E Tachyon1E Tachyon is a remote endpoint management solution built on a single agent for speed, visibility, and control of all endpoints.UEM, MDM/EMMDevices
1Password1Password is a password manager providing a place for users to store various passwords, software licenses, and other sensitive information in a virtual vault.
Password Management
3Play%20Media%20Logo3Play Media
3Play Media offers video accessibility services through transcription, captioning, and audio description.
Collaboration, CRM
7SIGNAL MobileEyelogo7SIGNAL Mobile Eye
7SIGNAL Mobile Eye is a Wi-Fi performance management and monitoring SaaS application that helps enterprises optimize wireless device connectivity.
 Networking, Infra monitoring
A10 provides load balancing for application deliverability, availability, and security.
Cluster Management, NetworkingDevices
Abnormal Security LogoAbnormal Security
Abnormal Security is an email security provider that helps companies protect against targeted email attacks.
Email Security
Absolute Software(1)AbsoluteAbsolute specializes in software to manage and secure Windows computers and Android smartphones.EDR/EPP, MDM/EMMDevices
ACloudGuruLogoA Cloud Guru
A Cloud Guru is an online learning platform that specializes in teaching cloud computing and related technologies.

Cloud Mgmt, ITAM/ITSM, Security Awareness

AcronisLogoAcronisAcronis is a backup solution providing data protection and recovery for servers and endpoints.
Data Security

Action1 is a cloud-based platform that automates patch management and vulnerability remediation.

Cloud Mgmt, Cloud Security, Config/Patch Mgmt, DevOps, ITAM/ITSM, Infra Monitoring
Acunetix is an automated web application security testing tool that checks for vulnerabilities like SQL Injection, Cross-site scripting, and other exploitable vulnerabilities.
AppSecDevices, Users
adaptive_shield_adapter.pngAdaptive ShieldAdaptive Shield is a security posture management platform used to help businesses manage their cloud services.Cloud Security, CloudUsers
Addigy is a real-time Apple mobile device management platform (MDM) that is combined with live agent capabilities.
MDM/EMMDevices, Users
Admin by Request

Admin By Request provides centralized and auditable management of local admin rights.

PAMDevices, Users
Adobe-logo.comAdobeAdobe offers digital content creation and publication applications across 20+ areas including graphics, photography, illustration, multimedia/video, and more.
Collaboration, SaaS Management
Users, SaaS Data
Adobe Acrobat SignAdobe Acrobat Sign
Adobe Sign allows users to create, edit, collaborate, e-sign, and share PDFs, on any device.
Adobe_Experience_Cloud_logo_RGBAdobe Workfront
Adobe Workfront is work and project management software for enterprise resource management, cross-team collaboration, and strategic planning.
adp_adapterADPADP is a provider of human resources management software and services.HR, IAMUsers
ADP Vantage HCM
ADP Vantage HCM is an all-in-one HR platform that includes payroll, benefits, and talent management administration.
Aha! is a platform enabling customers to build roadmaps, manage projects and development.
Collaboration, TicketingUsers
Aircall is a cloud-based phone system.CollaborationUsers
Airlock Digital
Airlock Digital is an application whitelisting software provider.EDR/EPP, Data SecurityDevices
Airtable EnterpriseAirtable Enterprise is a spreadsheet-database hybrid serving as a low-code platform for building collaborative apps.CollaborationUsers
Akamai_logoAkamai App and API Security
Akamai App and API Security provides protection against web application attacks including SQL injections, cross-site scripting, and remote file inclusion.
AppSec, FirewallDevices
Akamai CDN Cloud LogoAkamai CDN Cloud
Akamai CDN Cloud is a content delivery network that accelerates web and video content delivery globally.
Cloud Infra, Cloud Mgmt, Cloud Security, AppSec,

Secure Web Gateways

AkamaiEAALogo(1)Akamai EAAAkamai Enterprise Application Access (EAA) is part of the edge platform that helps companies secure applications that run behind a firewall or in a public cloud.
Cloud Security
Devices, Users
Akamai AKAssets provides data on users, components and applications.
ITAM/ITSMDevices, Users
Akeyless is a SaaS-based solution that provides secrets management and zero-trust access.
Password ManagementUsers
AKIPS is a secure on-prem, multi-vendor network-monitoring system for the enterprise market.
Infra MonitoringDevices
alcide_adapterAlcideAlcide provides cloud and Kubernetes discovery, K8s audit and compliance scanner, microservices anomaly detection and security policies management and enforcement.Cloud Security, CloudDevices
alertlogic_adapterAlert LogicAlert Logic provides vulnerability and asset visibility, endpoint protection, threat detection, incident management, and a web application firewall.EDR/EPPDevices
alertlogic_adapterAlert Logic MDRAlert Logic delivers managed detection and response (MDR) with comprehensive coverage for public clouds, SaaS, on-premises, and hybrid environments.EDR/EPP, NDRDevices
AlgoSec_logoAlgoSec Firewall Analyzer
AlgoSec Firewall Analyzer (AFA) is a device analysis solution that builds a model of users' network security postures and Layer 3 connectivity.
alibaba_adapterAlibaba CloudAlibaba Cloud provides cloud computing services and cloud Infrastructure as a service.Cloud Infra, CloudDevices
AlloyLogoAlloyAlloy Software provides IT Service Management, IT Asset Management, and Network Inventory software.
 Amazon Web Services (AWS)Amazon Web Services (ECS/EKS/EC2) includes the high-performance container orchestration service that supports Docker containers and containerized applications on AWS, Kubernetes Management Infrastructure across Multiple AWS Zones, as well as the EC2 instances themselves.Cloud Infra, CloudDevices, Users
Amplitude is a digital analytics platform that tracks and analyzes user behavior across various platforms.

Anecdotes is a compliance management platform.

AnomaliThreatstreamLogoAnomali ThreatStreamAnomali ThreatStream is a threat intelligence management platform.
Cyber IntelligenceDevices
apachecloudstack-logoApache CloudStackApache CloudStack is open-source software used to deploy and manage large networks of virtual machines.Infra Monitoring, VirtualizationDevices
Apple%20App%20Store%20Connect%20LogoApple App Store Connect
Apple App Store Connect is a platform for developers to manage, release, and report on their iOS apps.
DevOps, Software Development Version Control, SaaS Management
Apple-logoApple Business Manager
Apple Business Manager supports deployment and remote MDM enrollment of corporate-owned Apple devices.
AppNeta provides monitoring of network paths, flows, packets, and web applications.
Networking, RMMDevices
aqua_adapterAqua SecurityAqua Security provides container and cloud native cybersecurity for teams using Docker, Kubernetes, serverless, and other cloud native technologies.Containers, CloudDevices, Users
arista-cloudvisionArista CloudVisionCloudVision Portal (CVP) is the web-based GUI for the CloudVision platform, which enables network-wide workload orchestration and workflow automation.NetworkingDevices
arista_eos_adapterArista Extensible Operating System (EOS)Arista Extensible Operating System (EOS) is the core of Arista cloud networking solutions for next-generation data centers and cloud networks.NetworkingDevices
image.pngArmisArmis is an agentless IoT security solution that lets enterprises see and control any device or network.IoT Devices is a cloud-based security platform that scans APIs to identify vulnerabilities.
VA Tool, Cloud Security
aruba_adapterArubaAruba connects to Aruba switches and routers.NetworkingDevices
airwave_adapterAruba AirWaveAruba AirWave is a network management system for wired and wireless infrastructure and provides granular visibility into devices, users, and applications on the network.NetworkingDevices
aruba_central_adapterAruba CentralAruba Central is a unified cloud-based network operations, assurance and security platform that simplifies the deployment, management, and optimization of wireless, wired and WAN environments.NetworkingDevices
Aruba ClearPasslogoAruba ClearPassAruba ClearPass is a network access control (NAC) solution that allows enterprises to identify devices, enforce policies, and remediate threats.NAC Devices
Aruba Mobility Master
Aruba Mobility Master enables deployment and management of up to 1,000 Mobility Controllers to scale large deployments. Integrate Aruba Mobility Master with the Axonius Cybersecurity Asset Management Platform.
Asana is a web and mobile work management platform designed to help teams organize, track, and manage their work.
Collaboration, SaaS Management
Users, SaaS data
AsimilyLogoAsimily Insight
Asimily provides a vulnerability management platform that scans for devices, vulnerabilities and attack paths, and helps organizations prioritize and manage risk for IoMT, IoT, and laboratory devices.
AssetPandaAssetPanda is a cloud-based asset tracking and management platform.ITAM/ITSMDevices, Users
AssetSonar maintains, tracks, and manages a single source of truth for the IT asset landscape.
Assure1 by FederosFederos Assure1 is an automated service assurance platform for operational intelligence. It collects and normalizes performance-related information, allowing users to monitor and manage critical networks and services.Infra MonitoringDevices
atera_adapterAteraAtera is a cloud-based remote monitoring and management (RMM) platform for MSPs and IT professionals.ITAM/ITSM, RMMDevices
aternity_adapterAternityAternity is a device performance monitoring solution that provides insights into performance and health of laptops, desktops, VDI, and mobile devices, along with self-healing capabilities to automatically resolve issues.ITAM/ITSM, Config Mgmt.Devices
jira_software_adapterAtlassian (Formerly Atlassian Jira Software)
Atlassian Jira Software is a work management tool for various use cases, from requirements and test case management to agile software development.
DevOps, SaaS Management
Users. SaaS Data
Atlassian Access(1)Atlassian AccessAtlassian Access is an identity and access management solution for controlling user access to applications and resources.
Atlassian%20Confluence%20LogoAtlassian Confluence
Atlassian Confluence provides information on Confluence entities, like pages and blog posts, spaces, users, groups, and more.
jira_adapterAtlassian Jira Assets PlatformAtlassian Jira Assets Platform links software with Jira to populate an asset inventory, letting users query for assets and link them to issues.ITAM/ITSMDevices
AttackIQLogoAttackIQAttackIQ is a breach and attack simulation that allows for remote testing and continuous security validation.Attack Surface MgmtDevices
Attivo_logoAttivo BOTSinkAttivo BOTSink offers network-based threat deception for post-compromise threat detection.DeceptionDevices
Auth0 provides authentication and authorization solutions for web, mobile, and legacy applications.
AutodeskCloudPlatformLogoAutodesk Cloud Platform
Autodesk Cloud Platform is comprised of the Forma, Fusion and, Flow industry clouds.
CollaborationDevices, Users
Automatos is a platform that delivers solutions to surmount challenges in IT asset management.
automox_adapterAutomoxAutomox is a cloud-based patch and configuration management solution for Windows, Linux, Mac, and third-party software.Config Mgmt.Devices, Users
auvik_adapterAuvikAuvik is an IT asset and network monitoring solution for managing entire network infrastructures, including physical servers, data centers, workstations and more.NetworkingDevices
The Aviatrix cloud network platform delivers a single platform for multi-cloud networking, security, and operational visibility.
Cloud Mgmt.Devices
AvigilonAltaLogoAvigilon Alta (formerly Openpath)

Avigilon Alta (formerly Openpath) is a cloud-based physical access control solution for unified video and access control.

awake_adapterAwake SecurityAwake Security is a network traffic analysis solution that's capable of detecting and visualizing behavioral, mal-intent and compliance incidents.NetworkingDevices
NetworkDiscoveryLogoAxonius Network Discovery
Axonius-provided Axonius Network Discovery adapter, performing standardized network discovery.
image.pngAxonius UsersThe Axonius Users adapter fetches users with Axonius credentials and their permissions using our API client.ITAM/ITSMUsers
Azure Classic VMsMicrosoft Azure is a cloud computing service created by Microsoft for building, testing, deploying, and managing applications and services through a global network of Microsoft-managed data centers. This adapter fetches information for classic VMs (deprecated by Microsoft).Cloud Infra, VirtualizationDevices
download (2)Azure Defender for IoTAzure Defender for IoT is a solution for asset discovery, vulnerability management, and threat detection for Internet of Things (IoT) and operational technology (OT) devices.OT/IoT Devices
azure_devops_adapter)Azure DevOpsAzure DevOps is a Microsoft product that provides version control, reporting, requirements management, project management, automated builds, testing and release management capabilities.DevOpsUsers
azure_devops_adapterAzure DevOps (On-Prem)
Azure DevOps (On-Prem) is a Microsoft product that provides version control, reporting, requirements management, project management, automated builds, testing and release management capabilities.
DevOpsUsers, Groups
BackblazeBackblaze provides cloud backup and storage services.
Cloud InfraDevices, Users
BackstagelogoBackstageBackstage is an open platform for building developer portals.
BackupRadarBackup RadarBackup Radar is a backup monitoring, reporting, and compliance solution.Infra MonitoringDevices
bamboohr_adapterBambooHRBambooHR is HR software used to collect, maintain, and analyze data for hiring, onboarding employees, and managing company culture.HR, IAM, SaaS ManagementUsers, SaaS data
baramundi_adapterbaramundibaramundi provides organizations with cross-platform management of networked endpoints in IT and manufacturing environments.UEM, MDM/EMMDevices
fyde_vpn_adapterBarracuda CloudGen Access (Fyde)Barracuda CloudGen Access (formerly Fyde) provides granular access for enterprise apps and workloads, and continuously monitorsaccess requests to enforce policy controls.IAM Devices, Users
Barracuda CloudGen Firewall
Barracuda CloudGen Firewall provides real-time network protection against a broad range of network threats, vulnerabilities, and exploits.
NetworkingDevices, Users
BeyondTrust BeyondInsightBeyondTrust BeyondInsight provides discovery, management, auditing, and monitoring for any privileged credential.PAMDevices
beyond_trust_adapterBeyondTrust Password SafeBeyondTrust Password Safe provides discovery, management, auditing, and monitoring for any privileged credential.PAM, IAMDevices, Users
beyond_trust_adapterBeyondTrust Privilege Management CloudBeyondTrust Privilege Management Cloud delivers privilege management and application control, allowing organizations to eliminate admin rights across the entire business and enforce least privilege.
PAM, Cloud Security
Devices, Users
beyond_trust_adapterBeyondTrust Privilege Management OnPremBeyondTrust Privilege Management OnPrem delivers privilege management and application control, allowing organizations to eliminate admin rights across the entire business and enforce least privilege.PAM, IAMDevices, Users
beyond_trust_privileged_identity_adapterBeyondTrust Privileged Identity (Lieberman RED Identity Management)BeyondTrust Privileged Identity (formerly Lieberman RED Identity Management) is a password management solution that helps companies secure, manage, and administer credentials for privileged users and IT vendors.PAM, IAMUsers
bomgar_adapterBeyondTrust Remote Support (Bomgar)BeyondTrust Remote Support (formerly Bomgar) allows support technicians to remotely connect to end-user systems through firewalls from their computer or mobile devices.IT Agent, Config Mgmt.Devices
BGPRTOECT%20DNS%20Guard%20LogoBGProtect DNS Guard
BGProtect DNS Guard provides DNS monitoring to help detect changes to DNS records.
Infra Monitoring, Networking
BGPRTOECT%20Route%20Guard%20LogoBGProtect Route Guard
BGProtect Route Guard provides BGP analysis, route geographical analysis, network ownership, and reachability to detect IP hijacks.
Infra Monitoring, Networking
BigFix provides remote control, patch management, software distribution, operating system deployment, network access protection, and hardware and software inventory functionality.
IT Agent, Config Mgmt.Devices
BigFix Compliance Analytics (formerly SCA)
BigFix Compliance Analytics (formerly SCA) is a web-based application designed to help you manage security, vulnerability, and risk assessment.
Audit/Compliance, VA ToolDevices
bigid_adapterBigIDBigID is data security solution that provides enterprise protection and privacy of personal data.Data SecurityDevices
BillLogoBILLBILL is a leading provider of cloud-based software that digitizes and automates back-office financial processes.License Mgmt, SaaS MgmtUsers, SaaS data 
Bionic_adapter.pngBionic Bionic is an agentless platform that helps teams to manage, operate and protect applications.AppSec, DevOpsDevices
BinaryEdgeBinaryEdge scans the public internet to create real-time threat intelligence streams and reporting.Cyber IntelligenceDevices
BishopFoxLogoBishop FoxBishop Fox performs offensive security, penetration testing, red teaming, and attack surface management.Attack Surface MgmtDevices
bitbucket logoBitbucketBitbucket is a web-based version control repository hosting service for source code and development projects that use either Mercurial or Git revision control systems.DevOpsDevices
bitdefender_adapterBitdefender GravityZone Business SecurityBitdefender GravityZone Business Security uses machine learning and heuristics to protect against malware, phishing, ransomware, exploits and zero-days.EDR/EPPDevices
bitfit_adapterbitFitbitFit is a business development and information technology company that collects all of your IT operations data and combines it into a unified cloud system.ITAM/ITSMDevices, Users
bitsight_security_ratings_adapterBitSight Security RatingsBitSight Security Ratings are a data-driven and dynamic measurement of an organization’s cybersecurity performance.Cyber IntelligenceDevices
BitwardenLogoBitwardenBitwarden is an open-source password manager.
Password Management
blackberry_uem_adapterBlackBerry Unified Endpoint Management (UEM)BlackBerry Unified Endpoint Management (UEM) delivers endpoint management and policy control for devices and apps on-premise or in the cloud.EDR/EPP, MDM/EMM, UEMDevices
kitelogo1Black KiteBlack Kite provides cyber risk assessments that analyze the organization’s supply chain cybersecurity posture from three dimensions: technical, financial and compliance.Risk ManagementDevices
Block64 BlockBox

Block64 is an agentless, appliance-based asset management solution collecting data about assets across the network and using that to provide actionable insights.

BloodHound is used to find relationships within an Active Directory (AD) domain to discover attack paths.
Attack Surface Mgmt.Devices

BloxOne Threat Defense
BloxOne Threat Defense uses the cloud to detect threats while tightly integrating with companies' on-premises ecosystem.
Cloud SecurityDevices, Users
bluecat_adapterBlueCat Enterprise DNSBlueCat Enterprise DNS connects all disparate DNS and DHCP with centralized management of all clients and critical assets.NetworkingDevices
Broadcom_logoBlueCoat ProxySG
Edge Secure Web Gateway (BlueCoat ProxySG) from Broadcom provides URL filtering, central policy management, and security against malware attacks.
Secure Web GatewaysDevices
bmc_atrium_adapterBMC Atrium ADDMBMC Atrium ADDM is a digital enterprise management solution that automates application discovery and dependency mapping.CMDB, ITAM/ITSMDevices
bmc_atrium_adapterBMC Atrium CMDBBMC Atrium CMDB stores information about the configuration items (CIs) in your IT environment and the relationships between them.CMDB, ITAM/ITSMDevices
BMC Atrium CMDB onPrem
BMC Atrium CMDB stores information about the configuration items (CIs) in your IT environment and the relationships between them.
BMC  Helix Client Management
BMC  Helix Client Management is an automated endpoint management solution to inventory and track hardware and software endpoints; manage software licensing, patching, and event management; and remotely manage users' devices for updates or troubleshooting.
Devices, Users
bmc_truesight_adapterBMC TrueSight Automation for ServersTrueSight Automation for Servers automates vulnerability management, patching, compliance, configuration changes, software deployments, and service provisioning in the data center and cloud.Config Mgmt.Devices
bmc_truesight_adapterBMC TrueSight Presentation ServerBMC TrueSight Presentation Server consumes data from various BMC TrueSight products to provide a consolidated set of views for monitoring the infrastructure, real and synthetic applications, and capacity planning.DevOpsDevices
BossDeskLogoBOSSDeskBOSSDesk is an IT Service Management and Help Desk Software for both On-Premise and in the Cloud.ITAM/ITSMDevices
box_adapterBox PlatformBox Platform provides data security, file sharing, collaborating, and content management tools. Box Platform provides access to Box APIs.Data Security, SaaS ManagementUsers, SaaS Data
BreachsenseLogoBreachsenseBreachsense monitors the dark web, private hacker forums, and criminal marketplaces to detect data leaks.
Cyber Intelligence
Devices, Users
Bricata is a network detection and response platform.
Brivo is a cloud-based access control solution that helps protect building, employees, visitors, customers, residents and data.
Buildkite is a continuous integration tool designed to improve software developer productivity.
Software Development Version Control
Devices, Users
Burp SuiteBurp Suite is a penetration testing and vulnerability finder tool often used for checking web application security.Vulnerability Assessment ToolDevices
ca_cmdb_adapterCA Service ManagementCA Service Management is an IT service management (ITSM) solution that offers incident management and IT asset managementITAM/ITSM, CMDBDevices
ca_spectrum_adapterCA SpectrumCA Spectrum is a services and network infrastructure management system that enables the modeling of LAN, WAN, wired, wireless, physical, and virtual networksNetworkingDevices
Cato NetworksCato SASE is a cloud-native secure access service edge built on a full mesh topology, with over 65 global PoPs, and replaces the need for enterprises to route using MPLS.Firewall, Networking, Secure Web GatewaysDevices, Users
CDWCDW is a multi-brand technology solutions provider
License mgmt
SaaS Data
censys_adapterCensysCensys monitors infrastructure and discovers unknown assets across the Internet.IoT Devices
centrify_adapterCentrify Identity ServicesCentrify Identity Services manages application access, endpoints, and network infrastructure.IAMUsers
Ceridian DayforceCeridian Dayforce is an HR cloud platform that delivers payroll, benefits, workforce, and talent management.HRUsers
CerteroLogoCerteroCertero is an IT hardware, software, SaaS, and cloud asset management solution.ITAM/ITSMDevices
CFEngine_iconCFEngineCFEngine is a software development automated workflow solution.CollaborationDevices
ChangeGearChangeGear is an AI-powered IT service management platform.HRDevices
CheckPoint%20Cloud%20Guard%20LogoCheck Point CloudGuardCheck Point CloudGuard automates governance across multi-cloud assets and services including security posture assessment, misconfiguration detection, and enforcement of security best practices and compliance frameworks.Cloud Infra, IAMDevices, Users
Check%20Point%20LogoCheck Point Harmony Endpoint
Check Point Harmony Endpoint is a suite of endpoint protection products that include mobile, email, collaboration, and SASE security.
Attack Surface Mgmt., Email Security, NetworkingDevices
Check Point Harmony Endpoint
Check Point Harmony Mobile
Check Point Harmony Mobile uses file protection capabilities to block the download of malicious files to mobile devices and prevent file-based cyberattacks on organizations.
Check%20Point%20LogoCheck Point InfinityCheck Point Infinity protects against cyber threats across networks, endpoint, cloud and mobile devices. This adapter supports the entire Infinity platform, including Check Point firewalls.EDR/EPP, Firewall Devices
checkmarx_adapterCheckmarx SAST (CxSAST)Checkmarx SAST (CxSAST) is a static application security testing solution used to identify security vulnerabilities in custom code. It is used by development, DevOps, and security teams to scan source code early in the SDLC, identify vulnerabilities, and provide actionable insights to remediate them.AppSec, DevOpsDevices
Checkmk provides powerful monitoring of networks, servers, clouds, containers, and applications.
Containers, Infra Monitoring, RMMDevices, Users
chef_adapterChefChef provides continuous automation for building, deploying, and managing infrastructure, compliance, and applications in legacy and hybrid environments.Config Mgmt.Devices, Users
Cherwell IT Service Management adapterCherwell IT Service ManagementCherwell IT Service Management is a service desk platform enabling automation for process workflows, supporting tasks, and related approvals.ITAM/ITSMDevices
Cherwell IT Service Management DatabaseCherwell IT Service Management DatabaseCherwell IT Service Management Database is a service desk platform enabling automation for process workflows, supporting tasks, and related approvals.ITAM/ITSMDevices
CHGLogoCHG Meridan
CHG-Meridian develops, finances, and manages technology usage.
CipherTrustManagerLogoCipherTrust Manager
Thales CipherTrust Manager is a key management solution for the CipherTrust Data Security Platform.EncryptionDevices
CIS CAT Pro is a tool for automating CIS Benchmark testing and reporting.
Risk ManagementDevices
cisco_adapterCiscoCisco connects to Cisco switches and routers.NetworkingDevices
cisco_amp_adapterCisco Advanced Malware Protection (AMP)Cisco Advanced Malware Protection (AMP) includes threat intelligence, sandboxing, and malware blocking to detect, contain, and remove malware.EDR/EPPDevices
CiscoAppDynamicsLogoCisco AppDynamicsCisco AppDynamics is an application performance monitoring tool.AppSecDevices, Users
Cisco Application Policy Infrastructure Controller (APIC)Cisco Application Policy Infrastructure Controller (APIC) is the main architectural component of Cisco ACI. It is the unified point of automation and management for the Cisco ACI fabric, policy enforcement, and health monitoring and optimizes performance and agility.NetworkingDevices
Cisco CSPC LogoCisco Common Service Platform Collector (CSPC)
The Cisco Common Service Platform Collector (CSPC) is an SNMP-based tool that discovers and collects information from the Cisco devices installed on companies' networks.
Cisco CX  Cloud
CX Cloud combines Cisco technology with AI/ML-driven insights, use cases, and contextual learning.
Cyber intelligence
Cisco DCNM
 Cisco Data Center Network Manager (DCNM) is a network management solution for next generation data centers.
Storage mgmt
cisco_dna_adapterCisco DNA CenterCisco DNA Center is a software-based network automation and assurance solution.NetworkingDevices
cisco_firepower_management_center_adapterCisco Firepower Management CenterCisco Firepower Management Center provides management over firewalls, application control, intrusion prevention, URL filtering, and advanced malware protection.NetworkingDevices
cisco_ise_adapterCisco Identity Services Engine (ISE)Cisco Identity Services Engine (ISE) is a network administration product that enables the creation and enforcement of security and access policies for endpoint devices connected to the company’s routers and switches.IAMDevices
Cisco Industrial Network Director (IND)Cisco Industrial Network Director (IND) enables deployment and monitoring of Cisco Industrial Ethernet switches in industrial networks.Networking, OTDevices, Users
Cisco Intersight LogoCisco Intersight
Cisco Intersight is a cloud operations platform that consists of optional, modular capabilities of infrastructure, workload optimization, and Kubernetes services.
Cloud Infra, Cluster ManagementDevices
cisco_meraki_adapterCisco MerakiCisco Meraki solutions include wireless, switching, security, EMM, communications, and security cameras, all centrally managed from the web.NetworkingDevices
cisco_prime_adapterCisco PrimeCisco Prime offers a suite of tools to automate the management of wired and wireless Cisco networks.NetworkingDevices
Cisco Secure WorkloadCisco Secure Workload (formerly Tetration)Cisco Secure Workload (formerly Tetration) is a micro-segmentation platform that offers zero trust-based workload protection for multi cloud data centers.
IAM Devices
cisco_security_manager_adapter(1)Cisco Security ManagerCisco Security Manager provides policy enforcement and rapid troubleshooting of security events, offering summarized reports across the security deployment.NetworkingDevices
cisco_stealthwatchCisco StealthwatchCisco Stealthwatch is an agentless malware detection solution that provides visibility and network traffic security analytics across the extended network, including endpoints, branch, data center, and cloud.NetworkingDevices
Cisco Smart Net Total Care (SNTC)Cisco Smart Net Total Care is a smart services assistant providing hardware, web, and mobile support to enable efficient operations.NetworkingDevices
Cisco UCS Central (UCS)
Cisco Unified Computing System (UCS) is a data center server computer product line that brings together compute, networking, and storage, all in a single system to power applications.
Storage ManagementDevices
cisco_ucsm_adapterCisco UCS ManagerCisco UCS Manager supports the entire Cisco UCS server and Cisco HyperFlex Series hyperconverged infrastructure portfolios. It enables server, fabric, and storage provisioning, as well as device discovery, inventory, configuration, diagnostics, monitoring, fault detection, auditing, and statistics collection.NetworkingDevices
cisco_umbrella_adapterCisco UmbrellaCisco Umbrella is a secure internet gateway in the cloud, including DNS and IP layer enforcement and command and control callback blocking.NetworkingDevices, Users
cisco_ucm_adapterCisco Unified Communications ManagerCisco Unified Communications Manager provides secure and manageable call control and session management.IoT Devices
cisco_webex_adapterCisco WebexCisco Webex is an enterprise solution for video conferencing, online meetings, screen share, and webinars. Web conferencing, cloud calling and equipment.Remote ConferencingDevices, Users
Citrix ADCCitrix ADC is an application delivery and load balancing solution for monolithic and microservices-based applications.Networking, DevOpsDevices
Citrix Application Delivery Management LogoCitrix Application Delivery Management (ADM)
Citrix Application Delivery Management (ADM) is a platform enabling automation, orchestration, management, and analytics across hybrid multi-cloud environments.
Cloud Infra, Cloud Mgmt, Config/Patch Mgmt, Infra Monitoring, Virtualization
Citrix DaaS
Citrix DaaS (device as a service) is a cloud-based solution that allows companies to securely deliver DaaS and VDI apps and desktops to any device, over any network.
Citrix DirectorCitrix Director is a web-based monitoring console for Citrix XenApp and XenDesktop virtualization platforms that allows administrators to control and monitor virtual applications and desktops.Virtualization, ITAM/ITSM, Cloud, DevOps, Devices, Users
Citrix Endpoint Management (XenMobile)Citrix Endpoint Management (formerly XenMobile) is a solution for managing endpoints, offering mobile device management (MDM) and mobile application management (MAM) capabilities.UEM, MDM/EMMDevices
Citrix ShareFile

ShareFile is a secure content collaboration, file sharing, and sync software.

ClarotyCloudLogoClaroty CTDClaroty CTD discovers assets and monitors communication patterns for ICS networks.OTDevices
ClarotyCloudLogoClaroty xDomeClaroty xDome is a cyber-physical security (CPS) platform for IoT security.
Cloud Security, Cyber Intelligence, Infra Monitoring, IoT, OT
CloudCheckr is multi-cloud optimization and resource management software that includes cost management, security and compliance management, and resource utilization.
Cloud Mgmt.Devices
image.pngCloudHealthCloudHealth is a cloud management platform to analyze and manage cloud cost, usage, security, and governance.Cloud Infra, CloudDevices
cloudfit.pngCloudfit CFSCloudFit CFS delivers managed, custom applications for cloud, hybrid, and on-premise environments.Cloud Infra, CloudDevices
cloudflare_adapterCloudflare DNSCloudflare DNS runs one of the largest DNS networks in the world.NetworkingDevices, Users
CloudFlare Zero Trust
Deliver Zero Trust Network Access on CloudFlare's Edge.
Secure Web GatewaysDevices, Users
cloudpassage_adapterCloudPassage HaloCloudPassage Halo is a security automation platform providing visibility, protection, and continuous compliance monitoring for AWS and Azure deployments.Cloud Infra, CloudDevices
CoalfireOneCoalfireOne provides year-round visibility and proactive management of your compliance program.Risk Mgmt.Devices
CrashPlan_iconCode42 Incyder
Code42 Incyder (formerly Code42) is a next-gen DLP solution used to detect insider threats, satisfy regulatory compliance, and accelerate incident response investigations.
DLP, Data SecurityDevices, Users
cofense_phishme_adapterCofense PhishMeCofense PhishMe provides phishing awareness training and threat simulations for employees.Security Awareness, GRC, Email SecurityUsers
CohesityCohesity is a cloud data platform that provides a comprehensive range of data management services.Cloud Mgmt.Devices
CollibralogoCollibraCollibra is a data catalog platform and tool that helps organizations better understand and manage their data assets.
Audit/ComplianceDevices, Users
ComLaudeLogoCom LaudeCom Laude is a domain name registrar, providing domain name management services.
License ManagementDevices, Users
commvault_adapterCommvaultCommvault enables data protection, backup and recovery, and information management solutions.Data SecurityDevices, Users
 ConfluentConfluent is a data streaming platform that enables you to easily access, store, and manage data as continuous, real-time streams.Data Security, Storage ManagementDevices, Users

ConnectSecure provides managed service providers (MSPs) a vulnerability scanning and compliance management tool for their SMB clients.

VA ToolDevices
ConnectWise Automate

ConnectWise Automate monitors, manages, and supports client networks. using out-of-the-box scripts, continuous monitoring, and automation capabilities.

RMM, Config/Patch MgmtDevices
image.pngContrast SecurityContrast Security protects software applications against cyberattacks.AppSec, DevOpsDevices
Cradlepoint develops cloud-managed wireless edge networking equipment.
CrashPlan provides backup and recovery, ransomware recovery, and device migration services for small businesses and enterprises.
Data SecurityDevices, Users
Cribl is a vendor-agnostic observability pipeline used to collect, reduce, enrich, normalize, and route data.
Infra MonitoringDevices, Users
crowd_strike_adapterCrowdStrike FalconCrowdStrike Falcon delivers next-generation antivirus, endpoint detection and response (EDR), managed threat hunting, and threat intelligence.EDR/EPP, SaaS Management
Devices, Users, SaaS data
CrowdStrike Falcon Discover_logoCrowdStrike Falcon Discover
CrowdStrike Falcon Discover is a network security monitoring tool that provides real-time visibility into devices, users, and applications.
crowd_strike_adapterCrowdStrike Kubernetes Protection
CrowdStrike Kubernetes Protection provides cloud-native application security, including breach prevention, workload protection, and cloud security posture management.
Cloud Security
CrowdStrike Falcon Identity Protection (formerly Preempt)CrowdStrike Falcon Identity Protection (formerly Preempt)  lets organizations reduce user risk on their attack surface and preempt threats in real-time with Conditional Access. It continuously analyzes, adapts and responds to threats based on identity, behavior, and risk to resolve insider threats and targeted attacks.IAMDevices, Users
crestron xio cloud logoCrestron XiO Cloud
Crestron XiO Cloud is a technology operations management platform that allows users to configure and manage all Crestron device from one central location.
csc_adapterCSCDomainManagerCSCDomainManager is a web-based portfolio management platform consolidating domains alongside social media usernames, SSL digital certificates, and DNS.NetworkingDevices
CSI Leasing

The CSI Adapter tracks hardware contract expiration details.

License Mgmt.
csv_adapterCSVThe CSV adapter imports .csv files with inventory information including: devices and serial numbers, users, and installed software data.CMDB, ITAM/ITSMDevices, Users
CSV - Applications
The CSV - Applications adapter imports SaaS Vendor information from a CSV file.
SaaS ManagementSaaS Data
CSV - DNS Records
The DNS CSV adapter enables the discovery of SaaS applications based on the organizations web browsing records.
SaaS Management
SaaS Data
CSV - Expenses
CSV - Expenses File Adapter imports information about transactions related to SaaS from a CSV file.
SaaS ManagementSaaS Data
CSV-LicensesCSV - Licenses adapter imports information about SaaS licenses from a CSV file.
 SaaS Management

SaaS Data
CTLCiderLogoCTL CiderCTL Cider is a DevOps focused application that provides information regarding node health, resources, and availability.DevOpsDevices
CyberarkAleroLogoCyberArk AleroCyberArk Alero secures remote access to critical systems for employees and third-party vendors.PAMUsers
cyberark_epm_adapterCyberArk Endpoint Privilege ManagerCyberArk Endpoint Privilege Manager enforces least privilege, providing credential theft protection and application control at scale.PAM, IAMDevices
CyberArk IdaptiveIdaptive Identity Management Platform is an identity and access management solution that unifies identity and access management services.IAMDevices, Users
CyberArkPrivilegeCloudLogoCyberArk Privilege Cloud
CyberArk Privilege Cloud is a privileged access management (PAM) solution for securing, managing, and monitoring privileged accounts.
cyberark_adapterCyberArk Privileged Account SecurityCyberArk Privileged Account Security provides privileged password management, session recording, least privilege enforcement, and privileged data analytics.PAM, IAMUsers
cybereason_adapterCybereason Deep Detect & RespondCybereason Deep Detect & Respond (EDR) defends against advanced attacks by collecting and analyzing behavioral data to identify suspicious activities.EDR/EPPDevices
Global Risk Exchange logoCyberGRX (Global Risk Exchange)
CyberGRX (Global Risk Exchange) is a collaborative risk exchange platform for managing third-party cyber risk assessments.
Cyberhaven provides a data detection and response (DDR) solution, based on big data graph analytics of all user interactions with data over time and across the enterprise.
Data SecurityDevices
cyberint-logoCyberint Argos EdgeCyberint Argos Edge is an attack surface management solution providing findings into the external attack surface, phishing threats, brand impersonation, and more.Attack Surface Mgmt, Cyber IntelligenceDevices
cycognitoCyCognito PlatformThe CyCognito platform delivers proactive attack surface protection and digital risk protection across your entire extended IT ecosystem to help you identify, categorize, prioritize and eliminate your attacker-exposed risk.Cyber IntelligenceDevices
cylance_adapterCylancePROTECTCylancePROTECT uses artificial intelligence to detect and protect against ransomware, advanced threats, fileless malware, and malicious documents.EDR/EPPDevices

Cymulate is a breach and attack simulation (BAS) platform that helps companies optimize security posture by testing internal and external defenses.

Cyber Intelligence, Attack Surface ManagementDevices
cynet_adapterCynet 360Cynet 360 is a detection and response security platform for finding, ranking, and remediating unknown, camouflaged threats.EDR/EPPDevices
darktrace_adapterDarktraceDarktrace Immune System protects workforce and data from sophisticated attackers, by detecting, investigating and responding to cyber-threats.Cyber Intelligence, EDR/EPPDevices
Databricks combines data warehouses & data lakes into a lakehouse architecture that handles  data, analytics, and AI use cases.
Cloud Infra, Networking
datadog_adapterDatadogDatadog is a monitoring service for cloud-scale applications, providing monitoring of servers, databases, tools, and services.Cloud Mgmt., CloudDevices, Users
datto_rmm_adapterDatto RMM (Autotask Endpoint Management)Datto RMM (formerly Autotask Endpoint Management) is a cloud-based Remote Monitoring and Management (RMM) platform that provides device auditing, real-time monitoring, and automatic patching.EDR/EPP, Config/Patch Mgmt., RMMDevices
Deep InstinctlogoDeep Instinct
Deep Instinct is an anti-ransomware and anti-malware solution that leverages deep learning to help prevent malware from executing inside organizations' environments.
Cyber intelligence
DefenseStorm provides CyberSecurity, CyberCompliance and CyberFraud solutions specifically built for banking.
NDR, Risk ManagementDevices
Delinea Privilege Manager LogoDelinea Privilege Manager (Thycotic)
Delinea Privilege Manager (formerly Thycotic) mitigates malware and security threats from exploiting applications by removing local administrative rights and enforcing least privilege on endpoints.
PAMDevices, Users
Delinea Privilege Manager LogoDelinea Secret Server (Thycotic)Delinea Secret Server (formerly Thycotic) is a Privileged Access Management (PAM) solution for protecting your privileged accounts, available both on premise or in the cloud.
BoomiDell BoomiDell Boomi’s iPaaS platform enables businesses to discover, manage, and orchestrate data while connecting applications, processes, and people.
Cloud InfraDevices
Dell ECS
Dell ECS (Elastic Cloud Storage) is a software-defined object storage platform that provides organizations with an on-premise alternative to public cloud solutions.
Storage Management
Devices, Users
Dell EMC AvamarDell EMC Avamar is a backup and recovery solution that enables daily backups of physical and virtual environments, NAS servers, enterprise applications, remote offices and desktops/laptops.DLP, Data SecurityDevices
Dell iDRAC

The Integrated Dell Remote Access Controller (iDRAC) is designed for secure local and remote server management and helps IT administrators deploy, update and monitor Dell EMC PowerEdge servers.

Dell OpenManage EnterpriseDell OpenManage Enterprise is a one-to-many systems management console. It facilitates lifecycle management for Dell EMC PowerEdge servers in one console.Infra Monitoring, ITAM/ITSMDevices
DellPowerMaxLogoDell PowerMax
Dell PowerMax is an NVMe-based (Non-Volatile Memory Express), mission-critical data storage offering.
ITAM/ITSM, Storage Management
DellPowerStoreLogoDell PowerProtect DD Management Center

Dell PowerProtect Data Domain Management Center is a centralized storage management solution that provides aggregate capacity, replication and performance management, and reporting.

Storage Management
Dell PowerScale OneFS 
Dell PowerScale OneFS is a scale-out network attached storage (NAS) platform that addresses unstructured data needs at the edge, the core, or the cloud.
Storage Management
DellPowerStoreLogoDell PowerStoreDell PowerStore is a flexible, scalable data storage appliance designed for data-centric infrastructures.Storage Management
Devices, Users
DellPowerStoreLogoDell RecoverPointDell RecoverPoint is a data protection and disaster recovery solution.Storage Management
DellPowerStoreLogoDell Unisphere For Unity
Dell Unisphere enables Dell EMC Unity customers to manage storage systems.
Storage Management
Dell VPLEXDell VPLEX delivers continuous data availability, transparent data mobility, and nondisruptive data migration for mission-critical applications.Storage ManagementDevices
Dell WYSE ManagementDell Wyse Management Suite is a cloud solution that enables an IT admin to securely manage Dell client devices.UEM, RMMDevices
device42_adapterDevice42Device42 is a cloud-based CMDB for physical, virtual, and cloud servers and containers, network components, software, services, applications, and their relationships and dependencies.CMDB, ITAM/ITSMDevices
DeviceTotal is an agentless attack surface management solution.
Attack Surface Mgmt
DevoDevoDevo is a cloud-native logging and security analytics solution that delivers real-time visibility for security and operations teams.
SIEMDevices, Users
DialpadLogoDialpadDialpad is a cloud-based communication and collaboration platform for voice, video, and messaging.
Digi LogoDigiDigi provides IoT solutions including hardware, software, and services for connecting and managing IoT devices and networks.
IoT, Infra MonitoringDevices
DigiCert CertCentralDigiCert CertCentralDigiCert CertCentral consolidates tasks for issuing, installing, inspecting, remediating, and renewing certificates.Certificate Mgmt. Devices
digicert_pki_platform_adapterDigiCert PKI Platform (Symantec Managed PKI)DigiCert PKI Platform (formerly Symantec Managed PKI) provides a cloud-based enterprise solution for issuing and managing digital certificates used to enable strong authentication and encryption.Certificate Mgmt. Devices
digitalguardiandlpDigital Guardian DLP
Digital Guardian DLP is a SaaS-based platform that provides data-loss prevention across Windows, Mac, and Linux systems and applications.
DigitalOcean_LogoDigitalOceanDigitalOcean is a cloud hosting provider that offers cloud computing services and Infrastructure-as-a-Service (IaaS).
Cloud InfraDevices
digital_shadows_adapterDigital Shadows SearchLightDigital Shadows SearchLight is a digital risk protection solution that protects organizations against external risk exposure.Cyber IntelligenceDevices
dns_made_easy_adapterDNS Made EasyDNS Made Easy offers DNS management services.NetworkingDevices
DockerDocker is a platform designed to help developers build, share, and run container applications.
ContainersDevices, Users
Docker Engine LogoDocker EngineDocker Engine is an open-source containerization technology that helps development teams build and manage applications.
Containers, Cloud Mgmt, DevOps, Cloud Infra, Infra MonitoringDevices
DocuSignDocuSign helps organizations connect and automate how they prepare, sign, act on and manage agreements.AppSec, Collaboration, SaaS Management
Users, SaaS data
DOJ’s proprietary Cyber Security Assessment and Management (CSAM) automates assessments and authorizations to provide a comprehensive assessment and continuous monitoring service.
Risk Management
domotzDomotzDomotz is network monitoring software.NetworkingDevices
DopeSecurityLogoDope Security Flightdeck

Dope Security is an endpoint-based secure web gateway solution.

Cloud Security, Secure Web Gateways
dragos_platformDragos PlatformThe Dragos Platform identifies ICS network assets, malicious activity, and provides guidance to investigate incidents.OT, Network SecurityDevices
dropbox_adapterDropboxDropbox is a file hosting service that offers cloud storage, file synchronization, personal cloud, and client software.Cloud Mgmt., CloudDevices, Users
druva_adapterDruva Cloud PlatformDruva Cloud Platform is a data protection as-a-service that provides management across all customer data sources that are scalable, predictable and on-demand.DLP, Data SecurityDevices, Users
duo_adapterDuo BeyondDuo Beyond identifies corporate vs. personal devices, blocks untrusted devices, and give users secure access to internal applications.IAMDevices, Users
DynamicsCMDBHelpDeskLogoDynamics CMDB (HelpDesk)HelpDesk integrated with Microsoft Dynamics provides a complete ticketing solution.TicketingDevices
dynatrace_adapterDynatraceDynatrace is a software intelligence platform providing application performance management and cloud infrastructure monitoring.Cloud Mgmt., CloudDevices, Users
EagleEyeNetworksLogoEagle Eye NetworksEagle Eye Networks provides cloud-based video surveillance products for physical security and business operations applications.Security AwarenessDevices
EasyVistaSErviceLoEasyVista Service Manager
EasyVista is an ITSM (IT Service Management) solution including change, release, incident, problem, and knowledge management.
ECI_logoECI FMAudit
ECI FMAudit is print management software that allows users to remotely monitor print environments and maintain visibility into their operations.
EclypsiumEclypsiumEclypsium protects the foundation of the computing infrastructure, controlling risks and stopping threats to enterprise firmware and hardware devices.Firmware Security Devices
EcoStruxure IT Advisor(1)EcoStruxure IT Advisor (Electric EcoStruxture)
EcoStruxure IT Advisor (Schneider Electric) is asset and planning software that facilitates OpEx management.
Cloud Infrastructure
edgescan_adapterEdgescan Fullstack Vulnerability ManagementEdgescan Fullstack Vulnerability Management is a cloud-based continuous vulnerability management and penetration testing solution that discovers, validates and rates vulnerabilities by running continuous asset profiling to detect rogue/exposed ports, hosts or even hidden API’s.VA ToolDevices
Efecte LogoEfecteEfecte is an IT service management (ITSM) and collaboration platform with a focus on SaaS security and configuration management.
CMDB, Collaboration, IAM, ITAM/ITSM, Risk Management, SaaS Management, Audit/Compliance
EfficientIP SOLIDserver DDI
EfficientIP SOLIDserver DDI suite is designed to deliver virtual and hardware appliances for critical DNS-DHCP-IPAM services.NetworkingDevices
EkranEkran System is a cybersecurity software vendor delivering a full-cycle insider risk management platform.
PAM, Audit/ComplianceUsers
ElasticDefendLogoElastic DefendElastic Defend (formerly Endgame) is a tool for malware prevention, detection, and response.
EDR/EPP, IT AgentDevices
elastic_search_adapterElasticsearchThe Elasticsearch adapter imports device information from an Elasticsearch database.CMDB, ITAM/ITSMDevices
eMASSeMASSeMASS is a federal system designed to help maintain information assurance situational awareness, manage risk, and comply with federal regulations.Risk ManagementDevices, Users
endgame_adapterEndgameEndgame is an endpoint protection platform that combines on-line and off-line protection against exploits, phishing, malware, ransomware, and fileless attacks.EDR/EPPDevices
EntrustLogoEntrustEntrust provides identity, payment, and data security solutions.Certificate Management, Audit/ComplianceDevices
Equinix provides digital infrastructure and data center services.
Eracent provides IT asset management and software asset management solutions to help customers inventory assets and optimize licensing costs.
ermetic-logoErmeticErmetic is a cloud infrastructure security platform, focusing on identity protection.Cloud SecurityDevices
ESETCloudLogoESET PROTECTESET is an Endpoint Protection Platform (EPP) for Windows, Mac, Linux, Android, and iOS operating systems.
ESETCloudLogoESET Endpoint SecurityESET Endpoint Security is an anti-malware suite for Windows including web filtering, firewall, USB drive and botnet protection.EDR/EPPDevices
eyeInspectForeScout eyeInspect is a compliance and threat analysis tool for ICS and OT environments.
OT, Audit/ComplianceDevices
exabeam-logoExabeamExabeam is a cloud-based platform combining SIEM, threat detection, investigation, and response (TDIR) and XDR capabilities. Integrate Exabeam with the Axonius Cybersecurity Asset Management Platform.SIEMDevices
Exabeam Cloud LogoExabeam CloudExabeam Cloud is a cloud-based Security Information and Event Management (SIEM) solution.
SIEM, Cloud Security
exabeam-logoExabeam Data Lake
Exabeam Data Lake (previously known as Exabeam Log Manager) is a cloud-native data lake architecture to securely ingest, parse, and store security data at scale from any location, across multi-year data.
extra_hop_adapterExtraHop Reveal(x)ExtraHop Reveal(x) is a network detection and response (NDR) solution that provides visibility, real-time threat detection, and response.NDR Devices
ExtraHopRevealX360LogoExtraHop Reveal(x) 360ExtraHop Reveal(x) 360 is a SaaS-based network detection and response (NDR) platform that provides unified security across on-premises and cloud environments.NDR, Networking, Cloud Infra, Cloud Security, IAMDevices
ExtremeCloud IQ
ExtremeCloud IQ enables management of wireless access points, switches, and routers.
ExtremeCloudIQSiteEngineLogoExtremeCloud IQ Site EngineExtremeCloud IQ Site Engine is an IT operations tool for web-based reporting, network analysis, troubleshooting, and helpdesk.
Infra Monitoring, Networking
extreme_networks_extreme_control_adapterExtreme Networks ExtremeControlExtreme Networks ExtremeControl is a Network Access Control (NAC) solution that provides role-based access controls and reporting on user activity across all devices.NAC Devices
wing_adapterExtreme Networks ExtremeWireless WiNGExtreme Networks ExtremeWireless WiNG in a WLAN operating system designed to scale efficiently from the smallest networks to large, geographically dispersed deployments.NetworkingDevices

 EZOfficeinventory is a cloud-based asset tracking platform used for tracking physical and digital assets.

ITAM/ITSMDevices, Users
F-Secure Policy Manager
F-Secure Policy Manager provides a centralized management console for the security of the managed hosts in the network.UEM, MDM/EMMDevices
fsecure_adapterF-Secure Protection Service for Business (PSB)F-Secure Protection Service for Business (PSB) is a central management portal for managing VPN, mobile device management, software update management, workstation, and server security.UEM, MDM/EMM Devices
f5_icontrol_adapterF5 BIG-IP iControlF5 iControl is a Web services-enabled open API providing granular control over the configuration and management of F5's application delivery platform, BIG-IP.NetworkingDevices
f5_big_iq_adapterF5 BIG-IQ Centralized ManagementF5 BIG-IQ Centralized Management provides centralized management, licensing, monitoring, and analytics for BIG-IP infrastructure.Infra Monitoring, ITAM/ITSMDevices
fireeye_hx_adapterFireEye Endpoint Security (formerly HX)FireEye Endpoint Security (formerly HX) detects and protects against unknown endpoint threats and exploits with integrated threat intelligence.EDR/EPPDevices
FireEyeEndpointSecurityLogonTrackerLogoFireEye Endpoint Security Logon TrackerFireEye Endpoint Security Logon Tracker enables the investigation of lateral movement within Windows enterprise environments.Infra MonitoringDevices
FireMon Asset Manager LogoFireMon Asset Manager

FireMon Asset Manager is a network visibility solution for cyber situational awareness and compliance monitoring.

Attack Surface Mgmt, Cloud Infra, Cloud Mgmt, Cloud Security, Config/Patch Mgmt, ITAM/ITSM, Infra Monitoring, Networking, Risk Mgmt, Audit/Compliance
firemon_adapterFireMon Security ManagerFireMon Security Manager is a network security solution that provides real-time visibility, control, and management for network security devices across hybrid cloud environments.Networking, Cloud SecurityDevices
FleetDM LogoFleetDM
FleetDM Fleet (formerly Kolide Fleet) is an is an open-source query manager for device management.
flexera_adapterFlexera IT Asset ManagementFlexera lets enterprises gain visibility and control of IT assets, reduce ongoing software costs, and maintain continuous license compliance.ITAM/ITSMDevices

Flexera Software Vulnerability Research

Flexera Software Vulnerability Research provides access to verified intelligence from Secunia Research.
Cyber IntelligenceDevices
Flexera SVMFlexera Security Vulnerability Manager (SVM) is a vulnerability assessment, patch management, and vulnerability intelligence platform.
VA ToolDevices
flexnet_adapterFlexNet Manager Suite CloudFlexNet Manager Suite Cloud from Flexera is a SaaS offering for software license compliance and license optimization.License Mgmt. Devices, SaaS data
forcepoint_adapterForcepoint Insider ThreatForcepoint Insider Threat is a security analytics tool for searching, detecting and mitigating malicious actors or insider threats.UEBAUsers
forcepoint_adapterForcepoint ONEForcepoint ONE provides data protection that monitors real-time traffic and prevents data loss.Cloud Security, DLP, Secure Web GatewaysDevices
forcepoint_adapterForcepoint Web Security Endpoint CSV FileForcepoint Web Security Endpoint CSV File imports CSV files with device information.IAM, Config Mgmt.Devices
Forcepoint ZTNA Private Access
Forcepoint ZTNA Private Access (formerly Forcepoint Web Security Endpoint) enables end-users to authenticate and receive policy enforcement via the Forcepoint Web Security Cloud infrastructure.
IAM, Config Mgmt.
foreman_adapterForemanForeman is a free open source project that automates repetitive tasks, quickly deploys applications, and proactively manages server lifecyle, on-premises or in the cloud.Config Mgmt.Devices
image.pngForeScout CounterACTForeScout CounterACT platform provides insight into network-connected devices.NAC Devices
Forescout Switch PluginForescout Switch Plugin is a component of the ForeScout CounterACT Network Module and provides switch to endpoint information as well as VLAN and ACL management capabilities.
NAC, NetworkingDevices
forgerock-logoForgeRockForgeRock Directory Services is a high-performance identity store that provides the necessary encryption to protect enterprise data at rest and encryption.DirectoryDevices, Users
FortiClient EMS
FortiClient Enterprise Management Server (FortiClient EMS) is a security management solution that enables scalable and centralized management of multiple endpoints.
FortiCloudLogoFortiCloudFortiCloud is a cloud-based platform offering compliance, security and management services for Fortinet solutions.
Cloud Mgmt, Cloud Security, IAM, Audit/Compliance
ensilo_adapterFortiEDR (enSilo)FortiEDR (formerly enSilo) automates and orchestrates detection, prevention, and response against malware and ransomware.EDR/EPPDevices
FortifyData_logoFortifyDataFortifyData is a threat exposure management platform for identifying, monitoring, and managing cyber risk.
Risk ManagementDevices
fortify_ssc_adapterFortify Software Security CenterFortify Software Security Center offers security assurance solutions that address the threats posed by security flaws in business-critical software apps.AppSec, DevOpsDevices
FortiNAC is a network access control solution that provides protection against IoT threats, control of third-party devices, and automated responses to networking events.
Fortinet FortiGate
Fortinet FortiGate is a next-generation firewall providing security and visibility for end-to-end protection across the entire enterprise network.
fortigate_adapterFortiPortalFortiPortal is a cloud-based security policy, wireless management, and analytics for MSSPs, enterprises, education and government customers.Networking, Remote Monitoring and ManagementDevices
Forward NetworksForward Networks is revolutionizing the way large networks are managed. Forward's advanced software delivers a digital twin of the network, enabling network operators to ensure that the network is secure, reliable, and agile. The platform supports devices from all major networking vendors and cloud operators, including AWS, Azure, and Google Cloud Platform.
Networking, Infra MonitoringDevices
freeipa_adapterFreeIPAFreeIPA is a free and open source identity management system for Linux environments.IAMDevices, Users
fresh_service_adapterFreshserviceFreshservice is a cloud-based IT help desk and service management solution that enables organizations to simplify their IT operations.ITAM/ITSM, SaaS ManagementDevices, Users, SaaS data
digital_defense_frontline_adapterFrontline VMFrontline VM, a frontline cloud system, is a vulnerability management application that performs comprehensive security assessments and helps prioritize and track the results, making remediation more efficient and effective.VA ToolDevices
Genian NAC identifies and monitors all hardware and software in the network environment to determine each device’s security state then establish the appropriate level of access to ensure compliance.
gigamon_fm_adapterGigamon GigaVUE-FM (Fabric Manager)Gigamon GigaVUE-FM (Fabric Manager) delivers management and monitoring of all physical and virtual nodes across your on-premises, virtual and public-cloud deployments.NetworkingDevices
gigamon_threatinsight_adapterGigamon ThreatINSIGHTGigamon ThreatINSIGHT is a cloud-native network detection and response (NDR) platform that provides threat activity detection and the data and context needed for cybersecurity response and investigation.MDR, Cyber IntelligenceDevices
GitHubGitHubGitHub provides hosting for software development version control using Git, including distributed version control and source code management (SCM) functionality.Software Development Version Control, DevOps, SaaS ManagementUsers, SaaS data
git_lab_adapterGitLabGitLab is an open-source DevOps lifecycle tool that provides a wiki, issue-tracking, and continuous integration and deployment pipeline features.DevOpsDevices, Users
GlobalSignAtlasGlobal Sign Atlas
GlobalSign Atlas offers cloud certificate management and automation.
Certificate Mgmt
GLPI is an open-source service management software tool to manage Helpdesk and IT assets.

Devices, Users
Gluware offers a cloud-based network orchestration platform that helps automate and orchestrate large multi-vendor, mission-critical networks.
GoDaddy is a domain registrar that also offers additional services such as website building and management, website and email hosting, SSL security, and more.
Gong is a customer data management platform that automatically captures and updates data from integrated tools, allowing for consolidated visibility into all customer interactions, across all stages of the relationship.
CRM, SaaS Management
Users, SaaS data
Google BigQueryBigQuery is a serverless, highly-scalable, and cost-effective cloud data warehouse with an in-memory BI Engine and machine learning built in.
GoogleChronicleSecurityLogoGoogle Chronicle SecurityGoogle Chronicle Security is designed for enterprises to privately retain, analyze, and search security and network telemetry.Cloud SecurityDevices
GCPGoogle Cloud Platform (GCP)Google Cloud Platform (GCP) is a suite of cloud computing services. Alongside a set of management tools, it provides a series of modular cloud services including computing, data storage, data analytics and machine learning.Cloud Infra, Cloud, Virtualization, ITAM/ITSM, ContainersDevices, Users
GSheetsiconGoogle Sheets
Google Sheets is a spreadsheet application included as part of the free, web-based Google Docs Editors suite offered by Google.
Devices, Users
google_mdm_adapter(2)Google Workspace (G Suite)Google Workspace (formerly G Suite) is a collection of cloud computing, productivity, collaboration, device, user, and data management tools developed by Google.MDM/EMM, IAM, SaaS Management
Devices, Users, SaaS data
GoSecure Titan PNGGoSecure Titan
GoSecure Titan integrates endpoint, network, and email threat detection into a single endpoint detection and response service.
GreenhouseGreenhouse is a talent acquisition software company that offers its suite of tools and services to help businesses with the hiring process.
HRUsers, SaaS data
greynoise-logo3GreyNoiseGreyNoise collects, analyzes, and filters internet scan activity.Cyber IntelligenceDevices
GRR_logoGRR Rapid Response
GRR Rapid Response is an incident response framework focused on remote live forensics delivered through a client-server architecture.
guardicore_adapterGuardicoreGuardicore is a data center and cloud security company that protects the organization’s core assets.Cloud Security, CloudDevices, Users
GytpollogoGytpolGYTPOL is a security configuration management solution providing both visibility of devices and automation of the hardening process.
CMDB, Config/Patch MgmtDevices
HalcyonlogoHalcyonThe Halcyon Anti-Ransomware and Cyber Resilience Platform offers layered ransomware protection.
HaloITSMHaloITSMHaloITSM is a cloud-based IT service management solution designed for ITIL-aligned service delivery.
Devices, Users
HAProxy is free and open source software that provides a high availability load balancer and reverse proxy for TCP and HTTP-based applications.
NetworkingDevices, Users
hashicorp_adapterHashiCorp ConsulHashiCorp Consul is a multi-cloud service networking platform to connect and secure services across any runtime platform and public or private cloud.NetworkingDevices
HashiCorp NomadHashiCorp Nomad deploys new and legacy applications across multiple datacenters, regions, and clouds.
Cloud ManagementDevices
haveibeenpwned_adapterHave I Been PwnedHave I Been Pwned is a website to check if email accounts have been compromised in a data breach.VA ToolUsers
Hawk_iconHawk is a fully automated, multi-tenant, cloud-based, managed detection and response (MDR) service.
NDR., SIEMDevices
Heimdal SecurityHeimdal Security protects organizations and home users against malware attacks.
Data Security, EDR/PP
HitachiOsCenterLogoHitachi Operations Center
Hitachi Ops Center provides data infrastructure management including automation, analytics, and protection.
Hoxhunt provides security awareness training for employees based on cognitive automation and risk calculations.
Security AwarenessUsers
HP AnywareHP Anyware supports hybrid work environments allowing users to access their digital workspaces without a VPN.
HP Device Manager (HPDM)HP Device Manager (HPDM) is an enterprise-class application for managing and administrating thin client devices on large- and small-scale networks.Config Mgmt., ITAM/ITSM, RMMUsers
hp_ilo_adapterHP Integrated Lights-Out (iLO)HP Integrated Lights-Out (iLO) is server management software that enables the configuration, monitoring, and updating of HPE servers.Config Mgmt.Devices
hp_nnmi_adapterHP Network Node Manager i (NNMi)HP Network Node Manager i (NNMi) is a network health and performance monitoring software with scalability and device support.NetworkingDevices
hp_nnmi_adapterHP NNMi XML FileHP NNMi XML File is a network health and performance monitoring platform.NetworkingUsers
hpe_imc_adapterHPE Intelligent Management Center (IMC)HPE Intelligent Management Center (IMC) is a networking solution that delivers management across campus core and data center networks.NetworkingDevices, Users
hpe_oneview_adapterHPE OneViewHPE OneView is an integrated IT management solution that transforms compute, storage, and networking into software-defined infrastructure for task automation.ITAM/ITSMDevices
HPE storage area networking (SAN) provides storage solutions for performance, scalability, and manageability.
Storage Management
HPE SANlogoHPE Switches
HPE Switches provide switch inventory and ARP table information.
Infra Monitoring
Devices, ARP tables
HP Web JetadminHP Web Jetadmin is a fleet management software solution for the remote configuration, maintenance, and monitoring of HP and standard MIB-compliant 3rd party printers and MFPs.Infra Monitoring, ITAM/ITSM, Config Mgmt.Devices
HuaweieSightLogoHuawei eSightHuawei eSight is an enterprise operation and maintenance (O&M) platform that provides cross-vendor and cross-product converged management, visualized monitoring, and intelligent analysis for enterprise ICT devices..Infra MonitoringDevices
HuaweieSightLogoHuawei eSight 21.xHuawei eSight is an enterprise operation and maintenance (O&M) platform that provides cross-vendor and cross-product converged management, visualized monitoring, and intelligent analysis for enterprise ICT devices.
Infra Monitoring
HuaweiOceanStorDoradoV3LogoHuawei OceanStor Dorado V3
Huawei OceanStor Dorado V3 is an all-flash storage solution.
Storage Management
HubSpot3HubSpotHubSpot provides software products for inbound marketing, sales, and customer service.CRM, SaaS Management
Users, SaaS data
Huntress is a managed endpoint detection and response (EDR) solution.

HYCU is a SaaS-based data management product including data protection, migration and disaster recovery.

image.pngHyperSQLThe HyperSQL adapter imports device information from an HyperSQL database.CMDB, ITAM/ITSMDevices
hypr_passwordless_adapterHYPR PasswordlessHYPR Passwordless provides passwordless security solutions.IAMDevices, Users
bigfix_inventory_adapterIBM BigFix InventoryIBM BigFix Inventory gathers information about installed software and hardware in your IT infrastructure.IT Agent, Config Mgmt.Devices
softlayer_adapterIBM CloudIBM's cloud computing platform combines platform as a service (PaaS) with infrastructure as a service (IaaS) and cloud services.Cloud Infra, CloudDevices
guardium_adapter.pngIBM GuardiumIBM Guardium prevents leaks from databases, data warehouses, and Big Data environments. It ensures the integrity of information and automates compliance controls across heterogeneous environments.Data SecurityDevices
IBM Hardware Management Console (HMC)

The Hardware Management Console (HMC) is a hardware appliance that you can use to configure and control one or more managed systems. You can use the HMC to create and manage logical partitions and activate Capacity Upgrade on Demand. Using service applications, the HMC communicates with managed systems to detect, consolidate, and send information to service and support for analysis.Infra Monitoring, Cluster Management, Containers

IBM License Metric Tool
IBM License Metric Tool (ILMT) helps manage license allocation services on supported systems.
License MgmtDevices
maas360_adapterIBM MaaS360 with WatsonIBM MaaS360 with Watson is a Unified Endpoint Management (UEM) platform covering endpoints, end-users, apps, content, and data. It also gives visibility and control to manage mobile devices running iOS, macOS, Android, and Windows.CMDB, ITAM/ITSM, MDM/EMM, UEMDevices
IBM Maximo
IBM Maximo Application Suite offers a single platform for asset management, monitoring, maintenance, computer vision, safety and reliability.
ibmIBM Power Hardware Management Console (HMC)
The Hardware Management Console (HMC) is a hardware appliance that you can use to configure and control one or more managed systems. You can use the HMC to create and manage logical partitions and activate Capacity Upgrade on Demand. Using service applications, the HMC communicates with managed systems to detect, consolidate, and send information to service and support for analysis.
Infra Monitoring, Cluster Management, Containers
ibm_qradar_adapterIBM QRadarIBM QRadar is a Security Information and Event Management (SIEM) solution that enables security teams to detect, prioritize and response to threats across the enterprise.SIEMDevices, Users
IBM Spectrum Protect Plus
IBM Spectrum Protect Plus provides recovery, replication, retention, and reuse for VMs, databases, applications, file systems, SaaS workloads, and containers in hybrid cloud environments.
Infra MonitoringDevices
ibm_tivoli_taddm_adapterIBM Tivoli Application Dependency Discovery Manager (TADDM)IBM Tivoli Application Dependency Discovery Manager (TADDM) is a configuration management tool that helps IT operations personnel ensure and improve application availability in application environments.Config Mgmt.Devices
IBM Turbonomic LogoIBM Turbonomic
IBM Turbonomic is a performance and cost optimization platform for public, private, and hybrid cloud.

Cloud Mgmt, DevOps, Infra Monitoring, ITAM/ITSM

IBM Urban CodeIBM UrbanCode provides software delivery for any mix of on-premises, cloud, and mainframe applications.
Config/Patch Mgmt
Devices, Users
IBM Cloud Virtual Private Cloud (VPC) is a secure software-defined network (SDN) on which customers can build isolated private clouds. 
Cloud Infra
iboss_cloud_adapteriboss cloudiboss cloud is cloud-based platform that secures user Internet access in the cloud.Networking, Cloud SecurityDevices, Users
iCIMS is an enterprise recruiting platform allowing employers to attract, engage, hire, and advance employees.
icinga_adapterIcingaIcinga is an open-source computer system and network monitoring application. It monitors data centers and clouds availability and performance, gives access to data and raises alerts.NetworkingDevices
IFSAssysLogIFS Assyst
IFS Assyst is IT service management (ITSM) software that helps automate business processes
IGEL Universal Management Suite (UMS)IGEL Universal Management Suite (UMS) is a single management solution for decentralized endpoints.MDM/EMMDevices
illumio_adapterIllumio Adaptive Security Platform (ASP)Illumio Adaptive Security Platform (ASP) secures computing platforms in cloud, on-prem, or hybrid environments without any dependency on the underlying network.NetworkingDevices
illusive_adapterIllusive NetworksIllusive Networks deceives cyber attackers by planting false information about a given network's resources.Deception, Cyber IntelligenceDevices
ImmuniwebLogoImmuniWebImmuniWeb develops machine learning and AI technologies providing continuous monitoring for web applications and APIs.AppSec, DevOpsDevices
imperva_dam_adapter(1)Imperva Data Activity Monitoring (DAM)Imperva Data Activity Monitoring (DAM) defines and enforces data security and compliance policies across the cloud and on-premises including relational databases, mainframes, big data platforms, data warehouses, and enterprise file stores.IT Agent, Config Mgmt.Devices
Imperva WAF
Imperva Web Application Firewall (WAF) allows customers to monitor, filter, and block incoming and outgoing data packets from a web application or website.
AppSec, Firewall
ImpervalogoImperva WAF Cloud
Imperva Web Application Firewall (WAF) allows customers to monitor, filter, and block incoming and outgoing data packets from a web application or website.  
AppSec, Firewall
Infinidat(1)InfiniboxInfinidat InfiniBox provides enterprise storage for mixed application workloads.
Storage ManagementDevices
infinipoint_adapterInfinipointInfinipoint is a cloud-based automated cyber hygiene platform that enables continuous detection and remediation of risks across the organization’s IT assets.ITAM/ITSM, Config  Mgmt.Devices, Users
infoblox_adapterInfoblox DDIInfoblox DDI consolidates DNS, DHCP, IP address management, and other core network services into a single platform, managed from a common console.NetworkingDevices
Infoblox BloxOneBloxOne DDI delivers central control and automation of DNS, DHCP and IP address management for hybrid and multi-cloud networks.Networking, IPAMDevices
image.pngInfoblox NetMRIInfoblox NetMRI provides network change and configuration management (NCCM), enabling users to automate network change, understand network health, manage network configurations, and meet a variety of compliance requirements.NetworkingDevices, Users
Infor EAMInfor EAM is an asset management system that helps digitizing and optimizing maintenance operations.ITAM/ITSMDevices, Users
intel-logoIntel DCMCIntel® Data Center Manager is a software solution that collects and analyzes the real-time health, power, and thermals of a variety of devices in data centers.Infra Monitoring, RMMDevices
intelEMAlogoIntel EMAIntel® Endpoint Management Assistant (Intel® EMA) software provides the ability to remotely and securely manage Intel® Active Management Technology (Intel® AMT) devices beyond the firewall, via the cloud, on known Wi-Fi networks.RMMDevices
Intezer_iconIntezer ProtectIntezer Protect offers runtime cloud workload protection.Cloud Mgmt., Cloud SecurityDevices
intrigue_adapterIntrigueIntrigue enables IT and Security teams with a complete and always up to date view of Cloud and Internet-exposed assets and exposures.Cyber IntelligenceDevices
Intruder is an online vulnerability scanner that enables the identification of misconfigurations, missing patches, encryption weaknesses, application bugs, and more.
VA Tool
Invicti (formerly Netsparker) is DAST and IAST vulnerability scanning for web applications.
ip_fabric_adapterIP FabricIP Fabric is a network management system used to discover, verify, visualize and document large scale networks.NetworkingDevices
Island is an enterprise browser, built on Chromium, with numerous built-in capabilities for protecting against user-, data-, and network-based threats.
Secure Web GatewaysDevices, Users
itglue-logo1IT GlueIT Glue is a SOC 2-compliant IT documentation management platform designed for managed service providers (MSPs).Storage ManagementUsers
iTopiTopIiTop is an open source ITSM solution allows management of configuration items and their relationships in a flexible CMDB.CMDB, ITAM/ITSMDevices, Users
 Ivanti Connect Secure
Ivanti Connect Secure provides zero trust secured access from any device to applications and services in the cloud and data center.
ivanti_endpoint_security_adapterIvanti Endpoint SecurityIvanti Endpoint Security, powered by Heat, provides application control, antivirus, patch management, and device control to protect endpoints.EDR/EPPDevices
Ivanti Neurons
Ivanti Neurons is a unified endpoint management tool that discovers and remediates security threats.
Ivanti Patch Management
 Ivanti Neurons for Patch Management continuously senses, discovers, and remediates security threats.
Config/Patch Management,
ivanti_security_controls_adapterIvanti Security ControlsIvanti Security Controls is a unified IT management platform used for managing and protecting Windows-based machines, Red Hat Enterprise and CentOS Linux machines, and VMware ESXi Hypervisors.UEM, MDM/EMMDevices
ivanti_sm_adapterIvanti Service ManagerIvanti Service Manager, is a cloud based ITSM solution that provides workflows automation, IT help desk and support ticket features, and ITIL service management processes.ITAM/ITSMDevices, Users
ivanti_sm_adapterIvanti Unified Endpoint Manager (Landesk)Ivanti Unified Endpoint Manager (formerly Landesk) helps IT administrators gather detailed device data, automate software and OS deployments, personalize workspace environments, and fix user issues.UEM, Config/Patch Management, ITAM/ITSMDevices
jamf_adapterJamf ProJamf Pro is an enterprise mobility management (EMM) tool that provides unified endpoint management for Apple devices.MDM/EMM, SaaS Management
Devices, SaaS data
jamf_protect_adapterJamf ProtectJamf Protect is an endpoint protection solution that prevents macOS malware, detects and remediates Mac-specific threats, and monitors endpoints for compliance.EDR/EPPDevices
JamfTrustLogoJamf TrustJamf Trust provides enterprise-level security and remote access for mobile devices.MDM/EMMDevices
JenkinsLogoJenkinsJenkins is an open-source automation server for continuous integration and delivery, facilitating software building, testing, and deployment.
DevOps, Software Development Version Control
JetPatch is a centralized patch management platform focusing on end-to-end enterprise patch management and vulnerability remediation.
Config/Patch Mgmt.Devices
JFrog_iconJFrog Artifactory  JFrog Artifactory is a DevOps solution for housing and managing artifacts, binaries, packages, files, containers, and components throughout the software development lifecycle.
DevOpsDevices, Users
JFrog Xray(1)JFrog Xray
JFrog Xray is a software composition analysis (SCA) tool that scans software artifacts for security vulnerabilities, open source license compliance, and software quality.
AppSec, DevOps, VA Tool
jira_service_desk_adapterJira Service ManagementJira Service Management (Service Desk) enables to receive, track, manage, and resolve requests from customers.
ITAM/ITSM, CMDB, Ticketing
Devices, Users
json_adapterJSONThe JSON adapter is able to import .json files with information about devices, users, or installed software.CMDB, ITAM/ITSMDevices, Users
jumpcloud_adapterJumpCloudJumpCloud is a Directory-as-a-Service (DaaS) solution to authenticate, authorize, and manage users, devices, and applications via a common directory in the cloud.IAM, Directory, SaaS ManagementDevices, Users, SaaS data
junos_adapterJuniper JunosThe Juniper Junos Adapter connects to Juniper switches and routers.NetworkingDevices
juniper_adapterJuniper Junos Space Network Management PlatformJuniper Junos Space Network Management Platform automates management of Juniper's switching, routing, and security devices.NetworkingDevices
Kandji_iconKandjiKandji is an Apple device management (MDM) solution for macOS, iOS, iPadOS, and tvOS.MDM/EMMDevices
kaseya_adapterKaseya VSAKaseya VSA is a remote monitoring and management solution for remote control, discovery, patch management, and monitoring.IT Agent, Config Mgmt.Devices
kaspersky_sc_adapterKaspersky Security CenterKaspersky Security Center is an administration console for Kaspersky Labs security solutions and systems management tools.EDR/EPPIAM
KeeperKeeper is a password and secrets management solution that helps protect and monitor passwords, secrets, and remote connections.
Password mgmt.
Kemp CentralKemp CentralKemp 360 Central is an application delivery and management platform for infrastructure monitoring of all data centers, private clouds, IaaS, PaaS, and public cloud.Infra MonitoringDevices
image.pngKenna Security PlatformKenna Security Platform is a vulnerability assessment solution that provides risk scoring, prioritization, and benchmarking.VA ToolDevices
keycloak_adapterKeycloakKeycloak is an open source identity and access management solution.IAMUsers
Keyfactor provides PKI as-a-Service enabling protection of every device, workload, and digital transaction with a unique and trusted identity.  
knowbe4_adapterKnowBe4KnowBe4 provides Security Awareness Training for anti-phishing behavior, social engineering and ransomware attacks, and general security awareness.Security Awareness, GRCUsers
kolide k2_adapterKolide K2Kolide K2 is a paid cloud-hosted SaaS platform for gathering detailed device information and securing endpoints.EDR/EPPDevices, Users
kubernetes_adapterKubernetesKubernetes (K8s) is an open-source system for automating deployment, scaling, and management of containerized applications.Containers, CloudDevices
lopht_crack_adapterL0phtCrack 7L0phtCrack 7 is a password auditing and recovery application.Password Mgmt., IAMUsers
LaceworkLacework provides cloud security automation for AWS, Azure, and GCP with a comprehensive view of risks across cloud workloads and containers.Cloud Security, CloudDevices, Users
lakeside-iconLakeside SysTrack
Lakeside SysTrack is a digital experience monitoring solution used for workplace analytics, IT asset optimization, and end-user troubleshooting.
landscape-logoLandscapeLandscape by Canonical is a management tool used to deploy, monitor and manage Ubuntu servers.Config/Patch Mgmt, RMMDevices
lansweeper_adapterLansweeperLansweeper is an IT asset management and Network Inventory software tool for Windows, Linux, Mac, and Network devices.IT Agent, Config Mgmt., CMDB, ITAM/ITSMDevices
Lansweeper Cloud
Lansweeper Cloud federates data from all local Lansweeper discovery instances into a single source of truth.
IT Agent, Config Mgmt., CMDB, ITAM/ITSM
lastpass_adapterLastPassLastPass is a password manager that stores encrypted passwords online.Password Mgmt., IAM, SaaS ManagementUsers, SaaS data
LatticeLogoLatticeLattice is a people management platform that allows human resources teams to engage employees and measure performance.
LaunchDarklyLaunchDarkly is a continuous delivery platform and feature management platform that provides feature flags as a service.Software Development Version ControlUsers
LeanIX LogoLeanIX
LeanIX is a cloud-based software platform that helps companies manage and optimize their IT infrastructure and applications.
ITAM/ITSM, Infra Monitoring, CMDB
LenelOnGuardLogoLenel OnGuardLenel OnGuard is an integrated access control and alarm monitoring system.Security AwarenessUsers
librenms_adapterLibreNMSLibreNMS is a network monitoring solution that provides auto-discovery for network hardware and operating systems including Cisco, Linux, Juniper, Foundry, and more.NetworkingDevices
limacharlie_adapterLimaCharlieLimaCharlie provides endpoint-driven information security tools to run an MSSP or SOC, as well as APIs that allow users to build and monetize their own products.DevOpsDevices
LinodeLogoLinodeLinode, acquired by Akamai, is a cloud hosting provider that provides Linux-based virtual machines, cloud infrastructure, and managed services.Cloud Infra, VirtualizationDevices, Users
linux_ssh_adapterLinux SSHLinux Secure Shell uses remote command execution over the SSH protocol to gather information about the endpoint Linux machine.ITAM/ITSMDevices
Litmos is a learning management system that provides pre-built courses and eLearning solutions.
Collaboration, HRUsers
logmein_adapterLogMeIn CentralLogMeIn Central is a cloud-based endpoint management solution that enables monitoring and management of endpoint infrastructure.MDM/EMM, UEMDevices, Users
logicmonitor_adapterLogicMonitorLogicMonitor is an automated infrastructure monitoring platform for enterprise IT and managed service providers.Infra Monitoring, ITAM/ITSMDevices
image.pngLogRhythmLogRhythm combines SIEM, user and entity behavior analytics, network traffic and behavior analytics, and security automation and orchestration.SIEMDevices
lookout_adapterLookout Mobile Endpoint SecurityLookout Mobile Endpoint Security is a mobile security solution that provides comprehensive risk management across iOS and Android devices to secure against app, device, and network-based threats while providing visibility and control over data leakage.EDR/EPPDevices

LucidchartLucidchart allows users to collaborate on drawing, revising and sharing charts and diagrams.Collaboration, SaaS ManagementUsers, SaaS data
malwarebytes_adapterMalwarebytes Endpoint Protection (Cloud Platform)Malwarebytes Endpoint Protection is a cloud-based security platform that combines detection and remediation technologies into a single cloud-managed agent.EDR/EPPDevices
malwarebytes_adapterMalwarebytes Endpoint Security (On-Prem Platform)Malwarebytes Endpoint Security protects endpoints from ransomware, automates endpoint remediation, and provides continuous visibility and monitoring.EDR/EPPDevices
manageengine-logoManageEngine Endpoint (Desktop) Central and Patch Manager PlusManageEngine  Endpoint (Desktop) Central and Patch Manager Plus is a desktop management and mobile device management software for managing desktops in LAN and across WAN and mobile devices from a central location.EDR/EPP, MDM/EMMDevices
ManageEngine Firewall Analyzer
ManageEngine Firewall Analyzer is an agentless log analytics and configuration management software that analyzes logs from firewalls and generates real-time alert notifications and security and bandwidth reports.
manageengine-logoManageEngine MDM
ManageEngine MDM is a mobile device management solution.
MDM/EMMDevices, Users
ManageEngineNCMLogoManageEngine Network Configuration Manager
ManageEngine Network Configuration Manager is multi-vendor network change & configuration management software for switches, routers, and firewalls.
NetworkingDevices, Users
manageengine-logoManageEngine OpManager
ManageEngine OpManager enables monitoring of routers, switches, firewalls, servers and VMs for fault and performance.
Infra MonitoringDevices
manageengine-logoManageEngine OpUtils
ManageEngine OpUtils is an IP address and switch port management software geared toward helping engineers efficiently monitor, diagnose, and troubleshoot IT resources.
IPAM, NetworkingDevices
ManageEnginePasswordManagerProLogoManageEngine PasswordManagerPro
ManageEngine PasswordManagerPro is a complete solution to control, manage, monitor, and audit the entire life cycle of privileged access.
manageengine-logoManageEngine Service Desk Plus
ManageEngine Service Desk Plus is an IT help desk and customer support system.
Mandiant Advantage is a multi-vendor XDR platform that delivers Mandiant’s transformative expertise and frontline intelligence to security teams of all sizes.
Attack Surface Mgmt, Cyber IntelligenceDevices
MarkMonitor provides domain management, security, and consulting.
IPAMDevices, Users
masscan_adapterMasscanMasscan is a free internet port scanner utility.VA ToolDevices
epo_adapterMcAfee ePolicy Orchestrator (ePO)McAfee ePolicy Orchestrator (ePO) is a security management platform that provides real-time monitoring of security solutions.EDR/EPPDevices
medigate_adapterMedigateMedigate is a medical device security platform that protects connected medical devices on health care provider networks, allowing inventory management and facilitating detection and prevention capabilities.NetworkingDevices
men_and_mice_adapterMen&Mice DNS ManagementMen&Mice DNS Management is a Network Management software providing secure, centralized, and highly resilient control of DNS across diverse platforms.NetworkingDevices, Users
groupwise.png)Micro Focus GroupWiseMicro Focus GroupWise is a collaboration software solution that provides email, calendaring, and instant messaging.CollaborationUsers
NetIQ_iconMicro Focus Server Automation (HP Server Automation, Opsware)Micro Focus Server Automation (formerly known as HP Server Automation or Opsware) provides operating system provisioning, automated patch management, and compliance control.Config Mgmt.Devices
NetIQ_iconMicro Focus SiteScopeMicro Focus SiteScope (previously HPE SiteScope) provides monitoring capabilities for IT infrastructure, including servers, databases, network, media, and more.Infra Monitoring, Cloud Mgmt., ITAM/ITSM, CloudDevices
active_directory_adapterMicrosoft Active Directory (AD)Microsoft Active Directory (AD) is a directory service for Windows domain networks that authenticates and authorizes all users and computers.IAM, Directory Devices, Users
azure_adapterMicrosoft AzureMicrosoft Azure is a cloud computing service created by Microsoft for building, testing, deploying, and managing applications and services through a global network of Microsoft-managed data centers.Cloud Infra, CloudDevices
bitlocker_adapterMicrosoft BitLocker Administration and Monitoring (MBAM)Microsoft BitLocker Administration and Monitoring (MBAM) provides a simplified administrative interface for BitLocker Drive Encryption. BitLocker offers protection against data theft or data exposure for computers that are lost or stolen, encrypting all data that is stored on the Windows operating system volumes and drives and configured data drives.DLP, Data SecurityDevices
Microsoft Cloud App Security
Microsoft Cloud App Security is a Cloud Access Security Broker (CASB) that supports various deployment modes including log collection, API connectors, and reverse proxy.Cloud Security, CloudUsers
defender_atp_adapterMicrosoft Defender ATPMicrosoft Defender Advanced Threat Protection (ATP) helps enterprise networks prevent, detect, investigate, and respond to advanced threats.EDR/EPP, SaaS ManagementDevices, SaaS data
MicrosoftDefenderEASMLogoMicrosoft Defender EASM
Microsoft Defender External Attack Surface Management discovers and maps the digital attack surface and provides an external view of a company’s online infrastructure.
Attack Surface Mgmt
defender_atp_adapterMicrosoft Defender for Endpoint for GCCMicrosoft Defender for Endpoint for GCC helps enterprise government networks prevent, detect, investigate, and respond to advanced threats.EDR/EPP, SaaS ManagementDevices, Users
MicroSoftDynamics365LogoMicrosoft Dynamics 365Microsoft Dynamics 365 Finance is a Microsoft enterprise resource planning system for medium to large organizations.HRDevices, Users
MECM%20LogoMicrosoft Endpoint Configuration Manager (MECM)
Microsoft Endpoint Configuration Manager MECM (formerly SCCM) is a systems management software product for managing large groups of computers running Windows NT, Windows Embedded, macOS (OS X), Linux or UNIX, as well as Windows Phone, Symbian, iOS and Android mobile operating systems.
Config Mgmt.
Microsoft%20Entra%20IDMicrosoft Entra ID (Formerly Azure AD) and Microsoft Intune
Microsoft Entra ID (formerly Azure AD) is Microsoft's multi-tenant, cloud-based directory, and identity management service. Microsoft Intune is a cloud-based service in the enterprise mobility management (EMM) space that integrates closely with Entra ID for identity and access control and Azure Information Protection for data protection.

IAM, Directory, SaaS Management

Devices, Users, SaaS Data
hyper_v_adapterMicrosoft Hyper-VMicrosoft Hyper-V is a native hypervisor; it can create virtual machines on x86-64 systems running Windows.Virtualization, ITAM/ITSM, CloudDevices
microsoft_kms_adapterMicrosoft Key Management Service (KMS)Microsoft Key Management Service (KMS) enables organizations to activate systems within their own network, eliminating the need for individual computers to connect to Microsoft for product activation.ITAM/ITSMDevices
microsoft_lyncMicrosoft LyncMicrosoft Lync provides instant messaging (IM), audio and video calls, Lync Meetings, availability (presence) information, and sharing capabilities.CollaborationUsers
SCOM_iconMicrosoft SCOM (System Center Operations Manager)Microsoft SCOM (System Center Operations Manager) is a cross-platform data center monitoring system for operating systems and hypervisors, reporting state, health and performance information of computer systems.Infra Monitoring, RMMDevices
sccm_adapterMicrosoft System Center Virtual Machine Manager (VMM)Microsoft System Center Virtual Machine Manager (VMM) is a unified management application for on-premises, service provider, and Azure cloud virtual machines.Cloud Mgmt., Containers, Virtualization, RMMDevices
Microsoft TeamsMicrosoft TeamsMicrosoft Teams is a workspace for real-time collaboration and communication, meetings, file and app sharing.
Collaboration, Security Awareness
Milestone XProtectLogoMilestone XProtectMilestone XProtect is a video management software (VMS) for video surveillance.RMMDevices, Users
MimecastlogoMimecast - V1Mimecast provides a mail management system designed to protect email, ensure access and simplify the tasks of managing email.
Cloud Security, Data Security, Email Security, Secure Web Gateways, Security Awareness, SaaS Management, Audit/ComplianceUsers
MimecastlogoMimecast - V2Mimecast provides a mail management system designed to protect email, ensure access and simplify the tasks of managing email.
Cloud Security, Data Security, Email Security, Secure Web Gateways, Security Awareness, SaaS Management, Audit/Compliance
minerva_adapterMinerva Labs Endpoint Malware VaccinationMinerva Labs Endpoint Malware Vaccination simulates infection markers, rather than creating them, to contain outbreaks that bypass AV tools.EDR/EPPDevices
MiroMiro is a digital collaboration platform designed to facilitate remote and distributed team communication and project management.Collaboration, SaaS ManagementUsers, SaaS data
MistMist AI leverages data ingested from numerous sources, including APs, switches and firewalls to optimize user experiences and simplify operations across the wireless access, wired access, and SD-WAN domains.Cloud Infra, Cloud Mgmt, Cloud SecurityDevices, Users
mobileiron_adapterMobileIron EMMMobileIron EMM enables enterprises to secure and manage modern operating systems on mobile devices and desktops.MDM/EMMDevices is a cloud-based workflow management platform that allows teams to build and manage projects.Collaboration, SaaS Management
Users, SaaS data
mongodb_adapterMongoDBMongoDB is a document-oriented NoSQL database.DevOpsDevices, Users
MoogsoftLogoMoogsoftMoogsoft is an AI-driven observability platform for monitoring solutions.
Infra Monitoring, DevOps
Devices, Users
Moro Cloud is a software-defined datacenter (SDDC) that offers integrated cloud components such as compute, network, storage, and security.
Cloud Mgmt., Storage ManagementDevices
MosyleMosyle is an Apple Endpoint Management & Security platform with solutions for education providers and enterprises.MDM/EMMDevices, Users
N-able(1)MSP Manager

N-able MSP Manager is cloud-based help desk and billing software for IT service.

MuleSoftAnypointPlatformLogoMuleSoftMuleSoft is an integration platform that helps businesses connect data, applications and devices across on-premises and cloud computing environments.
Collaboration, ITAM/ITSM
Devices, Users
MuleSoftAnypointPlatformLogoMuleSoft Anypoint Platform

The MuleSoft Anypoint Platform is a single solution for developing, deploying, securing, and managing APIs and integrations.

Cloud Infra
MulesoftLogoMulesoft Runtime Fabric
Mulesoft Runtime Fabric is a container service that automates the deployment and orchestration of Mule applications and gateways.
Mutiny is a network monitoring and alerting appliance.
TrellixeOlogoMVISION ePO

MVISION provides hardware, software, and services to investigate cybersecurity attacks, protect against malicious software, and analyze IT security risks.

N2WS Backup & Recovery offers orchestrated recovery for core AWS and Azure services.
Data SecurityDevices, Users
N-able provides integrated monitoring, management, security, and ticketing for managed service providers.
RMM, TicketingDevices
Nagios CoreNagios Core provides monitoring of all mission-critical infrastructure components including applications, services, operating systems, network protocols, systems metrics, and network infrastructure.Infra MonitoringDevices
Nagios XINagios XI provides enterprise server and network monitoring.NetworkingDevices
NamecheaepLogoNamecheapNamecheap offers free public DNS to help users get connected quickly and securely.
nasuni_adapterNasuniNasuni offers a file services platform built for the cloud that delivers infinite scale, built-in backup, global file sharing, and local file server performance.Storage Mgmt. Devices

Nautobot is a network documentation and automation platform for managing network resources.

NAVEX is a governance, risk, and compliance management platform for employee, third-party, and business processes management.
Risk Management, Audit/Compliance
Nectus_adapterNectusNectus is a network discovery, monitoring and visualization software.Networking, Infra Monitoring, ITAM/ITSMDevices
netapp_adapterNetAppNetApp offers hybrid cloud data services for management of applications and data across cloud and on-premises environments.Storage Mgmt. Devices, Users
netbox_adapterNetBoxNetBox is an open source web application to help manage and document computer networks.NetworkingDevices
netbrain_adapter.pngNetBrainNetBrain Integrated Edition is an adaptive automation integrated with existing NMS tools and IT workflows to automate documentation, troubleshooting, network change, and defense.NetworkingDevices
NetdiscoNetdisco is a web-based network management tool designed for network administrators.NetworkingDevices
NetApp Logo PNG(1)NetApp Active IQ Unified Manager
Active IQ Unified Manager provides performance monitoring capabilities and event root-cause analysis for systems running NetApp ONTAP software.
Infra monitoring
netiq_adapterNetIQ Advanced AuthenticationNetIQ Advanced Authentication provides a centralized authentication framework that adds a strong level of authentication (MFA or 2 Factor).IAMDevices
NetIQ_iconNetIQ Identity ManagerNetIQ Identity Manager by MicroFocus uses integrated identity information to create and manage identities and control access to enterprise resources.IAMUsers
NetMotionMobility_logoNetMotion Mobility
NetMotion Mobility is mobile VPN software that maximizes mobile field worker productivity by maintaining and securing their data connections as they move in and out of wireless coverage areas and roam between networks.
NetworkingDevices, Users
Netreo LogoNetreoNetreo is an IT infrastructure monitoring platform.
IAM, ITAM/ITSM, Infra Monitoring
NetskopeNetskopeNetskope Security Cloud provides threat protection for cloud services, websites, and private applications.NetworkingDevices, Users, SaaS data

NetSpyglass provides real-time network mapping, monitoring, visualization, and analytics for multi-vendor data center and WAN network operators.

NetWitnessLogoNetWitness NDRNetWitness provides real-time network forensics with automated threat detection, response, and analysis solutions.NDRDevices
Netwrix(1)Netwrix Auditor
Netwrix Auditor is IT auditing software for detecting security threats and validating compliance.
License Mgmt, ITAM/ITSM
neustar-logoNeustar UltraDNSNeustar UltraDNS is an enterprise grade cloud-based DNS service.NetworkingDevices
new-relicNew RelicNew Relic provides cloud-based software to monitor and track servers, instances and services.RMMDevices
NextDLPLogoNextDLPNextDLP, formerly Qush Security, enables customers to discover risks, educate employees, enforce policies and prevent data loss.
DLP, Data Security, UEBA
next_think_adapterNexthinkNexthink is an IT solution that provides insights into activity across devices, operating systems, and workplace locations to improve IT experiences for employees.ITAM/ITSMDevices, Users
NexthinkInfinityLogoNexthink InfinityNexthink Infinity provides digital workplace experience management software that provides real-time visibility and insights into application performance.
Nexthink NQLNexthink Query Language (NQL)
Nexthink Query Language (NQL) is a programming language developed by Nexthink for querying data from its platform.
ITAM/ITSM, Infra Monitoring
Devices, Users
Ninja One (RMM)Ninja One is an RMM (Remote Monitoring and Management) solution for MSPs and IT organizations, allowing them to automate, manage, and remediate endpoint management tasks.RMMDevices, Users
nmap_adapterNmap Security ScannerNmap Security Scanner is a free and open source utility for network discovery and security auditing.VA ToolDevices
NodeZero by Horizon3 provides continuous autonomous penetration testing via SaaS.
VA ToolDevices
NotionLogoNotionNotion offers a workplace productivity suite that includes solutions for collaboration and communication, task management, project tracking, and more.
Nozomi Guardian And CMC LogoNozomi Guardian and CMC
Nozomi Guardian and CMC (formerly Nozomi Networks Guardian) monitors network communications and device behavior for physical and virtual appliances.
NS1 LogoNS1NS1 is a DNS solution for advanced traffic routing, automation, and application resiliency.
NSightRMM_iconN-Sight RMM
N-Sight RMM provides remote monitoring and access, ticketing, and management for Windows, Linux, and Mac devices.
NTT Application Security LogoNTT Application Security
NTT Application Security (formerly WhiteHat Security) offers application security solutions with expertise in dynamic application security testing (DAST).
AppSec, VA Tool
Devices, Users
nucleussecNucleus Security
Nucleus Security provides unified vulnerability management via integrations with third-party tools including threat intelligence, penetration testing, appsec, network scanners, and more.
VA Tool
nutanix_adapterNutanix AHVNutanix AHV is a hypervisor included with the Enterprise Cloud OS. AHV delivers flexible migrations, security hardening, automated data protection and disaster recovery, and analytics.Virtualization, ITAM/ITSM, CloudDevices
NutanixCloudCostGovernanceLogoNutanix Cloud Manager (NCM) Cost GovernanceNutanix Cloud Manager (NCM) Cost Governance (formerly Beam) provides visibility into cloud spend across multiple cloud environments.
Cloud Mgmt
nutanix-logoNutanix Prism Central
Nutanix delivers hybrid and multicloud management, unified storage, database services, and desktop services to support applications and workloads.
Cloud Infra, Cluster Mgmt, Virtualization
Devices, Users
observeit_adapterObserveITObserveIT provides insider threat security solutions, including employee monitoring, user activity monitoring, behavioral analytics, policy enforcement, and digital forensics.UEBADevices
observiumObserviumObservium is an auto-discovering network monitoring platform supporting a wide range of device types, platforms and operating systems.NetworkingDevices
Obsidium SecurityObsidian delivers a security solution for SaaS applications built around unified visibility, continuous monitoring, and security analytics.Cloud Security, SaaS SecurityUsers
Okta_logoOktaOkta provides cloud software that helps companies manage their employees' passwords, by providing a “single sign-on” experience.IAM, SaaS Management
Devices, Users, SaaS data
omnivista_adapterOmniVista 2500 NMSThe Alcatel-Lucent OmniVista 2500 Network Management System (NMS) provides management tools and network-wide visibility, enabling operators to provision, manage and maintain a mobile infrastructure.NetworkingDevices
Onapsis cybersecurity solutions automate the monitoring and protection of SAP and Oracle applications.
ERP, Infra Monitoring
OnDMARC provides automated management for DMARC, DKIM and SPF records.
Email SecurityDevices
onelogin_adapterOneLoginOneLogin's unified access management platform centralizes access across on-prem and cloud environments to give full control, management, and security for data, devices, and users.IAMUsers
Onspring is cloud-based automated GRC software for business process management.
Risk Management
Oomnitza Enterprise Technology ManagementOomnitza Enterprise Technology Management helps IT teams manage technology assets with an agentless solution for endpoints (laptops, mobile devices, monitors, peripherals, and accessories), software (desktop, cloud, virtual machines), and users.ITAM/ITSMDevices
OpalOpal is an access management platform that helps enterprise companies scale least privilege.
opendcim_adapteropenDCIMopenDCIM is a free open-source Data Center Infrastructure Management solution.NetworkingDevices, Users
OpenLdapOpenLDAP Software is an open source implementation of the Lightweight Directory Access Protocol.
Directory, IAMDevices, Users
openstack_adapterOpenStackOpenStack is an open source software solution for creating private and public clouds.Cloud Infra, CloudDevices
OpenTextZENworksLogoOpenText ZENworksOpenText ZENworks is a unified endpoint management and protection solution.UEMDevices
openvas_adapterOpenVASOpenVAS is a software framework including several services and tools for vulnerability scanning and vulnerability management.VA ToolDevices
OpenVPNOpenVPN Cloud
OpenVPN Cloud is a VPN-as-a-Service solution that eliminates the need for VPN server installation.
Infra Monitoring, NetworkingDevices, Users
opsgenie-logo-4371B345F2-seeklogo.comOpsgenieOpsgenie is an alerting and incident response tool.CollaborationUsers

OpsRampOpsRamp is an AIOps-powered IT operations management (ITOM) solution.ITAM/ITSMDevices

Opsview is a monitoring platform for operating systems, networks, cloud, VMs, containers, databases, applications, and more.

Infra Monitoring, RMMDevices
opswat_adapterOPSWAT MetaAccessOPSWAT MetaAccess prevents risky devices from accessing local networks and cloud applications.NACDevices
oracle_cloud_adapterOracle CloudOracle Cloud is a computing service providing servers, storage, network, applications and services.Cloud Infra, CloudDevices, Users
Oracle Enterprise Manager(1)Oracle Enterprise Manager
Oracle Enterprise Manager is an on-premises management platform that provides a single dashboard to manage all Oracle deployments.
Oracle Fusion HCM Cloud_logoOracle Fusion HCM Cloud
Oracle Cloud Human Capital Management is a cloud-based HCM software application suite for global HR, talent, and workforce management.
Oracle IAM LogoOracle Identity and Access Management (IAM)

Oracle Identity and Access Management (IAM) is a software suite that enables enterprises to manage and automate user identities.


Password Management, Audit/Compliance


Your browser does not support here to download

Oracle Ksplice
Oracle Ksplice provides fast secure kernel and userspace patching without the need for reboots.
Config/Patch Mgmt
Oracle NetsuiteOracle Netsuite is a cloud-based ERP solution that provides global business management solutions.

Users, SaaS data

oracle_vm_adapterOracle VMOracle VM's server virtualization products support x86 and SPARC architectures and a variety of workloads such as Linux, Windows and Oracle Solaris.Virtualization, ITAM/ITSM, CloudDevices
orca_adapterOrca Cloud Visibility PlatformOrca Cloud Visibility Platform delivers visibility to cloud security posture, including prioritized alerts on vulnerabilities, compromises, misconfigurations, and more.Cloud Security, Cloud, VA ToolDevices
OrdrLogoOrdrOrdr provides visibility and security of all connected devices, including unmanaged IoT, OT, and IoMT.Infra MonitoringDevices
OstendioLogoOstendioOstendio is a security, compliance, and risk management platform.Risk Management, Audit/ComplianceDevices
24Outpost24Outpost24 is a cyber risk management platform that helps organizations assess their attack surface and prioritize vulnerabilities.
Attack Surface Mgmt.Devices
ovirt_adapterOvirtoVirt is a free, open-source virtualization management platform.Virtualization, ITAM/ITSM, CloudDevices
PacketFencePacketFencePacketFence is a free open source network access control (NAC) solution which provides the following features: registration, detection of abnormal network activities, proactive vulnerability scans, isolation of problematic devices, remediation through a captive portal, 802.1X, wireless integration and User-Agent / DHCP fingerprinting.NACDevices
PagerDuty is a digital operations platform for system administrators and support teams to manage incident response.
paloalto_cortex_adapter(2)Palo Alto Networks CortexPalo Alto Networks Cortex is an open and integrated, AI-based continuous security platform, allowing security operations teams to speed the analysis of massive data sets.NetworkingDevices
paloalto_xdr_adapter(2)Palo Alto Networks Cortex XDRPalo Alto Networks Cortex XDR is a detection and response app that natively integrates network, endpoint, and cloud data to detect threats and stop sophisticated attacks.EDR/EPPDevices
Palo Alto Networks Cortex Xpanse Palo Alto Networks Cortex Xpanse (Palo Alto Networks Expanse Expander) discovers, monitors, and tracks Internet Assets automatically to reduce risks and exposures.Cyber IntelligenceDevices
paloalto_panorama_adapterPalo Alto Networks PanoramaThe Palo Alto Panorama management server provides centralized monitoring and management of multiple next-generation firewalls and appliance clusters.Networking, FirewallDevices
PAloAltoPrismalogoPalo Alto Networks Prisma Access

Prisma Access SASE from Palo Alto Networks converges network security, SD-WAN, and autonomous digital experience management in the cloud to provide a secure access service edge.
IAM, Networking
Devices, Users
Palo Alto Networks Prisma Cloud Workload Protection
Prisma Cloud Workload Protection (CWPP) provides protection across hosts, containers, and serverless deployments in any cloud, throughout the application lifecycle.
Cloud SecurityDevices
image.pngPalo Alto Prisma CloudPrisma Cloud is a native cloud security platform that provides visibility, threat prevention, compliance assurance, and data protection across multi-cloud environments.Cloud Mgmt., CloudDevices, Users
traps_adapterPalo Alto Traps Endpoint Security ManagerPalo Alto Traps Endpoint Security Manager (ESM) delivers endpoint protection to prevent advanced persistent threats (APTs) and zero-day attacks.EDR/EPPDevices
panorays_adapterPanoraysPanorays is a SaaS-based platform that enables companies to view, manage and engage on the security posture of their third-parties, vendors, suppliers, and business partners.Cyber IntelligenceDevices
papercut_adapterPaperCutPaperCut is a print management solution that provides print job tracking and reporting.IoTDevices
Parsec AppParsecParsec App is a remote desktop application primarily used for playing games through video streaming.Remote Conferencing, CollaborationDevices
Paycor is an automated human capital management (HCM) platform for managing HR and payroll needs in one place.
Paylocity is a cloud-based payroll and human capital management software.
pdq_adapterPDQ InventoryPDQ Inventory is a systems management tool that scans Windows computers to collect hardware, software, and Windows configuration data.ITAM/ITSMDevices, Users
PenteraLogoPenteraPentera recons and maps web-facing attack surface assets. This includes domains, web interfaces, IPs, networks, and gateways.Attack Surface MgmtDevices
PeopleHR is HR automation software (HRIS) for small and growing businesses.
Perimeter_81LogoPerimeter 81Perimeter 81 is a cloud-based secure access service edge (SASE) platform.
Data Security, Encryption
Devices, Users
rca_adapterPersistentPersistent Systems Radia Endpoint Manager (formerly RCA) is an end-user device (PC and mobile device) lifecycle management tool for automating routine client-management tasks.
Config/Patch Mgmt.Devices
Phosphorus provides IoT discovery, password management, and patch management.
php_ipam_adapterphpIPAMphpIPAM is an open-source web IP address management application (IPAM).NetworkingDevices, Users
Pingboard creates real-time organizational charts by automatically synchronizing organizational charts with HRMS software.
PingFederatePingFederate from Ping Identity is an enterprise authentication federation server that enables user authentication and single sign-on.
IAM, SaaS ManagementUsers, SaaS data
Ping offers an identity management solution that includes multi-factor authentication, single sign-on, identity verification, and more.
pingone_adapterPingOne DirectoryPingOne Directory provides a hosted directory service that developers can use to store user authentication and profile data.IAM, DirectoryUsers
image.pngPivotal Cloud FoundryPivotal Cloud Foundry is an app development and deployment platform for public and private clouds.Cloud Mgmt., CloudDevices
pkware_adapterPKWAREPKWARE’s data protection platform finds, classifies, and protects sensitive data, allowing security managers to define data protection policies and monitor activity across the organization.DLP, Data Security, EncryptionDevices
PluralSight offers a variety of video training courses for software developers, IT administrators, and creative professionals through its website.
Polymer DLPlogoPolymer DLP
Polymer is a DLP solution that automates identification, monitoring, and remediation for sensitive data in cloud environments, and helps companies stay compliant with HIPAA, PCI. and GDPR.
Portnox_iconPortnox Clear
Portnox CLEAR provides automated security, visibility and control for every device accessing the network including Internet of Things (IoT), BYOD, mobile and unmanaged systems.
Portnox Core
Portnox CORE is a software-based solution that runs on Windows Servers (physical and virtual) to continually communicate with all existing networking infrastructure, gaining complete visibility into all assets currently connected to the network.
Infra Monitoring
PowerDNS LogoPowerDNS
PowerDNS is an open-source DNS server program, offering both authoritative and recursive DNS services.
Cloud Infra, ITAM/ITSM, Infra Monitoring
PreyPrey is a cross-platform, open source tool that allows you to track and recover your devices.
MDMDevices, Users
PritunlLogoPritunlPritunl is an enterprise distributed OpenVPN, IPsec and WireGuard server.
Data SecurityDevices, Users
privx_adapterPrivXPrivX provides privileged access to on-prem and cloud environments, including control access to servers, network devices and other critical infrastructure according to user roles and privileges.PAM, IAMDevices, Users
psaprojector-logoProjector PSAProjector Professional Services Automation (PSA) software is an operational system for professional services organizations.CollaborationUsers
promisec_adapterPromisec Endpoint ManagerPromisec Endpoint Manager is an agentless endpoint detection and remediation solution that detects, analyzes, and remediates abnormalities.EDR/EPPDevices

Proofpoint is a cybersecurity company that offers solutions to protect workers and their data from threats targeting email, mobile, social, cloud, and other digital channels.

Email SecurityUsers
Proofpoint_iconProofpoint Endpoint DLP
Proofpoint Endpoint DLP helps identify risk user behavior and protect sensitive data.
Proofpoint_iconProofpoint's ObserveIT Insider Threat Management PlatformProofpoint's ObserveIT Insider Threat Management (ITM) platform is a cloud-based solution that provides insider risk detection, incident response, and unified visibility across user activity, data interaction, and threat context.UEBADevices
Proofpoint PoDProofpoint PODProofpoint on Demand (PoD) Email Security classifies types of email, while detecting and blocking threats.
Email Security
Proofpoint_iconProofpoint Security Awareness Training
Proofpoint Security Awareness Training provides interactive and customizable security awareness training.
Security Awareness
Proofpoint_iconProofpoint TAPProofpoint Targeted Attack Protection (TAP) is an email-based security solution for ransomware prevention and other email-based threats.Email SecurityUsers
proxmox_adapterProxmox Virtual Environment (VE)Proxmox Virtual Environment (VE) is an open source server virtualization management solution based on QEMU/KVM and LXC.Virtualization, ITAM/ITSM, CloudDevices
Proxyclick App is a visitor management system that helps companies digitize the check-in process for employees, contractors, and visitors.
HR, Audit/ComplianceUsers
PRTG Network MonitorPRTG is a network monitoring application for Windows and Linux systems and servers, as well as miscellaneous hosts such as switches, routers, and other devices. Infra monitoring, RMMDevices
PulsewayPulseway is a remote monitoring and management (RMM) system solution that enables an admin to monitor, manage and troubleshoot workstations, servers and network devices across an environment remotely.Remote Monitoring and ManagementDevices
Pulumi Cloud Engineering PlatformPulumi provides an Infrastructure as Code solution for Developers and Infrastructure Teams, enabling them to build, deploy, and manage cloud applications and infrastructure using various languages, tools, and engineering practices.Software Development Version Control, DevOpsUsers
puppet_adapterPuppetPuppet is an open-source software configuration management tool.Config Mgmt.Devices
pure_storage_flash_array_adapterPure Storage Pure1Pure Storage Pure1 is a cloud-based storage management solution that provides self-driving storage, data-storage management, and monitoring.Storage Mgmt. Devices
QuadrantLogoQuadrantQuadrant is a Managed Detection and Response solution operating at the intersection of People and Product.Attack surface mgmtDevices
qualys_scans_adapterQualys Cloud PlatformQualys Cloud Platform monitors customers' global security and compliance posture using sensors.VA ToolDevices, Users
QualysContainerSecurityLogoQualys Container SecurityQualys Container Security provides the ability to discover, track, and secure containers.ContainersDevices
Qualys%20PCIQualys PCI ComplianceQualys PCI Compliance evaluates compliance with the Payment Card Industry Data Security Standard (PCI DSS).
Qualys VMDR OT LogoQualys VMDR OT
Qualys VMDR OT is a cloud-based platform for asset inventory and vulnerability management of critical industrial infrastructure.
Config/Patch Mgmt, OT, ITAM, ITSM, VA Tool, Audit/Compliance
kace_adapterQuest KACE Endpoint Systems Management AppliancesQuest KACE Endpoint Systems Management Appliances provision, manage, secure, and service network-connected devices.NetworkingDevices
RackspaceCloudLogoRackspace CloudRackspace Cloud is a set of cloud computing products and services for building, hosting, and managing cloud-based infrastructures.
Cloud Infra, Cloud Mgmt
Radiant%20Logic%20Virtual%20Directory%20Server(1)Radiant Logic Virtual Directory Server (VDS)

Radiant Logic Virtual Directory Server (VDS) is a software layer that consolidates disparate identity sources into a central virtual namespace.

Radiflow provides visibility and anomaly detection for OT assets.
rancher_adapterRancherRancher is an open-source multi-cluster orchestration platform that enables operations teams to deploy, manage, and secure enterprise Kubernetes.Containers, CloudDevices
randori_adapterRandoriRandori is an attack platform which combines continuous reconnaissance, real-time target analysis, and the ability to safely execute attacks on-demand to provide an attacker’s perspective.Cyber IntelligenceDevices
Rapid7LogoRapid7 Insight Account Platform
Rapid7 Insight API: This API provides API access for the entire Rapid7 Insight  platform and suite of products.
License Mgmt
Rapid7 Insight AppSec LogoRapid7 Insight AppSec
Rapid7 Insight AppSec performs black-box security testing to identify vulnerabilities, triage vulnerabilities, prioritize actions, and remediate application risk.
Rapid7InsightCloudSecLogoRapid7 InsightCloudSec
Rapid7 InsightCloudSec (formerly DivvyCloud) manages cloud security posture, secures cloud workloads, and governs identity and access management.
Cloud MgmtDevices
Rapid7%20InsightIDR%20LogoRapid7 InsightIDRRapid7’s InsightIDR is a security center for incident detection and response, authentication monitoring, and endpoint visibility.SIEMDevices
Rapid7 InsightVM LogoRapid7 InsightVMRapid7 InsightVM provides visibility and risk prioritization for vulnerabilities found in local, remote, cloud, containerized, and virtual infrastructure.  VA Tool
nexpose_adapterRapid7 Nexpose and InsightVMRapid7 Nexpose is an on-premise vulnerability management solution, providing discovery, detection, verification, risk classification, impact analysis, reporting and mitigation. Rapid7 InsightVM is a cloud-based vulnerability management solution that combines Rapid7’s Insight platform along with Nexpose core capabilities.VA ToolDevices, Users
rapid7_nexpose_warehouse_adapterRapid7 Nexpose WarehouseRapid7 Nexpose Warehouse fetches device information directly from an external data warehouse.VA ToolDevices
Rapid7 InsightVM_adapter
Rapid7 Threat Command
Rapid7 Threat Command is an external threat intelligence tool that helps users find and mitigate threats targeting organizations.
Cyber Intelligence
RecordedFuture threat intelligence helps identify the vulnerabilities that pose an actual risk to an organization, adding context and data to CVE scoring.
Attack Surface Mgmt., Cyber IntelligenceDevices
redcanary_adapterRed CanaryThe Red Canary suite includes products that record telemetry, detect and investigate threats, and automate remediation.EDR/EPPDevices, Users
ansible_tower_adapter(1)Red Hat Automation Controller
Red Hat Automation Controller (formerly Ansible Tower) is a web console and REST API for operationalizing Ansible across teams, organizations, and the enterpriseITAM/ITSMDevices
Red Hat Customer Portal
The Red Hat Customer Portal provides access to product evaluations, purchasing capabilities, and knowledge management content.
Config/Patch mgmt, Software Development Version Control
red_hat_satellite_adapterRed Hat IdMRed Hat Identity Management (IdM) provides a centralized and unified way to manage identity stores, authentication, policies, and authorization policies in a Linux-based domain.IAMDevices, Users
Red Hat Insights
Red Hat Insights is a managed service for the automated discovery and remediation of issues in Red Hat products.
IT Agent, Config/Patch MgmtDevices
Red Hat OpenShift Container
Red Hat OpenShift is a Kubernetes container platform that allows developers and operators to manage cloud-native applications throughout the DevOps cycle, for any cloud.Cloud Infra., ContainersDevices
red_hat_satellite_adapterRed Hat SatelliteRed Hat Satellite is a system management solution used to deploy, configure, and maintain systems across physical, virtual, and cloud environments.Config Mgmt.Devices
redseal_adapterRedSealRedSeal’s network modeling and risk scoring platform models customers' entire hybrid data center of public cloud, private cloud and physical network.NetworkingDevices
jita_adapterRemediant SecureONE (JITA)Remediant SecureONE is a Just-In-Time Privileged Access Management (JITA) solution that enables control and insight over the distribution, usage, and protection of privileged access across enterprise environments.IAMDevices
RemotePC LogoRemotePCRemotePC is a tool for remote access and control of computers and devices.
ITAM/ITSM, Remote Conferencing
Devices, Users
gotoassist_adapterRescueAssist (GoToAssist)RescueAssist (formerly GoToAssist) is a cloud-based toolset for IT and customer support teams including remote support, IT monitoring, and service desk management.IT Agent, Config Mgmt., Ticketing, ITAM/ITSMDevices
RHSM Management Portal
Red Hat Subscription Management (RHSM) provides tools that help administrators track information about support contracts and software subscriptions.
 License management
RingCentralRingCentral provides cloud-based communication and collaboration products and services including phone, messaging, video meetings, and contact center.
Devices, Users
Rippling provides unified workforce management software to help companies govern employees’ payroll, benefits, expenses, devices, apps, and more.
riskiq_adapterRiskIQ Digital FootprintRiskIQ Digital Footprint software provides an active, comprehensive inventory of all of the organization’s IPs, domains, and hosts.Attack Surface Mgmt., Cyber IntelligenceDevices
RiskReconLogoRiskReconRiskRecon is a cloud-based third-party risk management solution.SaaS Management, Risk ManagementUsers
risksense_adapterRiskSenseRiskSense provides vulnerability prioritization and management to dynamically control and measure cybersecurity risk.VA ToolDevices
Riverbed_NetIM_LogoRiverbed NetIMRiverbed NetIM is a solution for discovering, modeling, monitoring, and troubleshooting your infrastructure.Infra MonitoringDevices
riverbed_adapter(1)Riverbed SteelCentral Controller (SCC)Riverbed SteelCentral Controller SCC facilitates administration tasks for groups of SteelHeads, Interceptors, Mobile Controller, Cores, and Edges.Networking, AppSec, DevOps Devices
Robin (now Symworld Cloud) is a Kubernetes-based platform that automates the deployment, scaling, and lifecycle management of data- and network-intensive applications.
Cloud Mgmt, DevOps
Users, Devices
RSA_logoRSA ArcherRSA Archer is an integrated risk management platform for managing multiple dimensions of risk, including IT, operational, third-party, resiliency, and compliance risk.Risk Mgmt., GRCDevices, Users
RSA_logoRSA SecurID
RSA SecurID provides identity and access management capabilities for on-premise deployments – in authentication, access management, and identity governance.
RubrikRubrik provides data security and data protection on a single platform, including: Zero Trust Data Protection, ransomware investigation, incident containment, sensitive data discovery, and orchestrated application recovery.Data Security, DLPDevices

Rubrik Polaris
Rubrik provides data security and data protection on a single platform, including: Zero Trust Data Protection, ransomware investigation, incident containment, sensitive data discovery, and orchestrated application recovery.
Data Security, DLP
Devices, Users
RudderLogoRudderRudder is an open source audit and configuration management utility to help automate system configuration
config/patch mgmt, IT Agent, Audit/compliance
Ruckus NetworksLogoRUCKUS Cloud
CommScope RUCKUS Cloud is a network management-as-a-service platform that enables IT to provision, manage, optimize, and troubleshoot wired and wireless networks.
Networking, RMM
Devices, Users
RundeckLogoRundeckRundeck is an open-source tool that helps to define build, deploy and manage automation.
Devices, Users
runZero_logo (1)runZero
runZero (formerly Rumble Network Discovery) is a cloud-based network discovery platform that identifies and monitors network-connected IT assets.
SafeBreach offers a breach and attack simulation platform that helps organizations locate and remediate security issues.
Audit/ComplianceDevices, Users
SafeConsole by DataLocker allows administrators to provision, secure, manage, and audit encrypted USB drives, USB ports, and virtual folders.
Sage PeopleSage People is a people management platform that provides employee record management, payroll. processing and management, talent management, and more.HR, IAMUsers

SailPoint IdentityIQ
SailPoint IdentityIQ is an identity and access management (IAM) solution that delivers automated access certifications, policy management, access request and provisioning, password management, and identity intelligence.
Sailpoint Identity ManagerSailPoint provides access governance and identity management.IAMUsers
SailPoint IdentityNow
SailPoint IdentityNow is a SaaS identity and access management (IAM) solution.
IAM, SaaS ManagementUsers, SaaS Data
    sal_adapter SalSal is an open-source reporting solution for managed endpoints.MDM/EMMDevices

Your browser does not support here to download


Salesforce is a customer relationship management solution that gives a single, shared view of every customer.

CRM, SaaS ManagementUsers. SaaS Data
saltstack_adapterSaltStack Open SourceSaltStack Open Source is open-source software for event-driven security, cloud and configuration management.SOAR, Config. Mgmt.Devices
knox-logoSamsung KnoxSamsung Knox is a built-in solution used to secure, deploy, and manage Samsung and Galaxy devices.MDM/EMMDevices
Sap%20AribaSAP AribaSAP Ariba is a cloud-based procurement, spend management, and supply chain services solution.
License Management
SAPConcurLogoSAP Concur 3.x
SAP Concur provides travel, expense and invoice management.
ERPUsers, SaaS Data
SAPConcurLogoSAP Concur 4.x
SAP Concur provides travel, expense and invoice management.
SAPS4HANACloudLogoSAP S/4HANA CloudSAP S/4HANA Cloud is a modular enterprise resource planning (ERP) software that streamlines various business functions.
SAP Success FactorslogoSAP SuccessFactorsSAP SuccessFactors manages various aspects of HR operations, including recruitment, employee performance, HR analytics, payroll, and learning.

Sassafras is IT asset management software that allows organizations to inventory and manage IT assets.
SaviyntSaviynt Enterprise Identity Cloud is a cloud identity and access governance platform.Cloud Security, IAMUsers
Schneider Electric EcoStruxure IT_adapterSchneider Electric EcoStruxure ITSchneider Electric EcoStruxure IT provides software and services for IT and Data Center teams to monitor and manage critical IT infrastructure on-premise, in the cloud, and at the edge.Data Center Infrastructure Mgmt., (DCIM), Data SecurityDevices
ScienceLogic is an IT operations management (ITOM) and AIOps platform for monitoring and managing hybrid cloud infrastructure.
Infra MonitoringDevices, Users
scopnet_adapterScopNETScopNET provides an agent-free solution for the prevention of unauthorized access to corporate networks, integrating switches, routers and firewalls to detect alien devices.NACDevices
secdo_adapterSecdo Endpoint ProtectionSecdo Endpoint Protection automates endpoint forensic analysis and cyber investigations for security teams.EDR/EPPDevices
SecPodSanerNowLogoSecPod SanerNowSecPod SanerNow is an integrated platform that helps businesses secure system devices and monitor potential threats across digital assets.
sectigo_logoSectigoSectigo provides digital certificate lifecycle and PKI management.Certificate ManagementDevices
SecureAuth is an identity access management security solution that provides passwordless authentication, multi-factor authentication, SSO, and more.
SecureCodeLogoSecure Code Warrior
Secure Code Warrior is a training platform that helps developers learn to write secure code.
Security Awareness, Data Security
SecureW2 JoinNow
A suite of network security software that helps organizations deploy WPA2-Enterprise Wi-Fi security and utilize X. 509 certificates beyond Wi-Fi for VPN, Web/Browser authentication and SSL (DPI) Inspection.NACDevices
redcloack_adapterSecureworks Red Cloak

Secureworks Taegis XDR (formerly Red Cloak TDR) is an endpoint detection and response technology for the cloud, endpoints and the network.

Secureworks VDRSecureworks Taegis VDR
Secureworks Taegis VDR is a cloud-based vulnerability management solution.
VA ToolDevices
redcloak_tdr_adapterSecureworks Taegis XDR (Red Cloak TDR)Secureworks Red Cloak Threat Detection and Response (TDR) is a Software as a Service (SaaS) solution that provides security intelligence analytics to data consumed by third-party applications.Cyber IntelligenceDevices
SecurityScorecardSecurityScorecard rates cybersecurity postures of corporate entities through completing scored analysis of cyber threat intelligence signals for the purposes of third party management and IT risk management.Risk ManagementDevices
sensu_adapterSensuSensu is a cloud monitoring solution that provides monitoring workflows automation and visibility into multi-cloud environments.Cloud Mgmt., CloudDevices
sentinelone_adapterSentinelOneSentinelOne is an endpoint protection solution including prevention, detection, and response.EDR/EPPDevices
sentinelone_adapterSentinelOne RangerSentinelOne Ranger creates visibility into your network by using distributed passive and active mapping techniques to discover running services, unmanaged endpoints, IoT devices, and mobiles.EDR/EPPDevices
Sentra offers cloud data security posture management (DSPM), allowing customers to automatically discover, classify, monitor, and protect cloud data.
Cloud Security, Data Security
Sepio is an asset risk management platform that provides visibility into organizations' hardware assets and their related security posture.
VA ToolDevices, Users
Serraview is workplace management and space optimization software.
ServiceNowServiceNow provides service management software as a service, including IT services management (ITSM), IT operations management (ITOM) and IT business management (ITBM).CMDB, ITAM/ITSM, Ticketing, SaaS Management
Devices, Users, SaaS data
image.pngSevOne Data PlatformSevOne Data Platform is a network and infrastructure management platform that provides monitoring and analytics.NetworkingDevices
Shadowserver gathers and analyzes data on malicious internet activity including malware, botnets, DDoS, fraud, and more.
Cyber IntelligenceDevices
SharePoint creates internal websites where organizations store, organize, share, and access information from any device.

Devices, Users
ShockwaveiconShockwave Cloud
Shockwave Cloud helps identify and track cloud related issues and misconfigurations.  
Cloud Infra, Cloud Mgmt, Cloud Security
Devices, Users
shodan_adapterShodanShodan is a search engine for Internet-connected devices.IoTDevices
signalsciences_adapterSignal SciencesSignal Sciences is a web protection platform that protects on-premise, multi-cloud and hybrid-cloud apps, within containers and serverless functions.AppSec, DevOpsDevices
SimpleMDM is a mobile device management solution for Apple devices.
Site24x7 offers a performance monitoring solution for websites, servers, cloud environments, networks, applications, and users.
skybox_adapterSkybox Firewall AssuranceSkybox Firewall Assurance provides automation of firewall management tasks across different firewall vendors and complex rulesets.FirewallDevices
slack_adapterSlackSlack is a chat and collaboration hub used to connect people, information, tools, and services.Collaboration, SaaS ManagementUsers, SaaS Data
SmartsheetSmartsheetSmartsheet is a cloud-based work management platform that empowers collaboration, drives better decision making, and accelerates innovation.Collaboration, SaaS ManagementUsers, SaaS Data
SmartSimpleLogoSmartSimpleSmartSimple is a grant management and business process solution.
Smokescreen  IllusionBlackSmokescreen uses planted decoys to actively lure and capture attacks on endpoints, networks, and web applications.DeceptionDevices
 SnapComms is an internal communications software solution.
snipeit_adapterSnipe-ITSnipe-IT is a free, open source IT asset management system written in PHP.ITAM/ITSMDevices
snowflake-logoSnowflake Data Warehouse
Snowflake is a data warehouse built on top of the Amazon Web Services or Microsoft Azure cloud infrastructure, and allows storage and compute to scale independently.
CollaborationDevices, Users
snow_adapterSnow Software Asset ManagementSnow Software provides Software Asset Management (SAM) products and services to reduce the risk, cost, and complexity associated with software assets and licensing.ITAM/ITSMDevices
Snow Software Exceptions
Snow Software Exceptions adapter provides a way to track and manage software exceptions.
Snyk is a developer security platform integrating directly into development tools, workflows, and automation pipelines.
AppSec, Containers, DevOps, Software Development Version Control, VA Tool
Devices, Users
solarwinds_orion_adapterSolarWinds Network Performance MonitorSolarWinds Network Performance Monitor is a unified IT systems management system that tracks the performance of networks, applications, systems, and databases on-premises, in a hybrid environment, or in the cloud.ITAM/ITSMDevices
Solarwinds PingdomSolarWinds Pingdom
SolarWinds Pingdom is a website and server monitoring tool that helps organizations track the uptime, performance, and availability of their web-based applications and services.
Infra Monitoring
samange_adapter(2)SolarWinds Service Desk (Samanage)SolarWinds Service Desk (formerly Samanage) is a unified, cloud-based IT service desk and asset management platform.Ticketing, CMDB, ITAM/ITSMUsers
sonic_wall_adapterSonicWallSonicWall next-generation firewalls (NGFW) provide security, control, and visibility to maintain an effective cybersecurity posture.FirewallDevices
SonicWall Network Security Manager
SonicWall Network Security Manager enables organizations to deploy and manage all firewalls, connected switches and access points in one interface.
Firmware Security, NetworkingDevices
sophos_central_adapterSophos CentralSophos Central is a unified console that provides one place to manage Sophos products, including: endpoint, mobile, encryption, web, email, server, and wireless security.EDR/EPPDevices
sophos_cloud_optix_adapterSophos Cloud OptixSophos Cloud Optix is a public cloud visibility and threat response solution that detects, responds, and prevents cloud security and compliance gaps.Cloud Security, CloudDevices, Users
sophos_adapterSophos Endpoint ProtectionSophos Endpoint Protection helps secure workstations by adding prevention, detection, and response technology on top of the operating system.EDR/EPPDevices
mobi_control_adapterSOTI MobiControlSOTI MobiControl is a software system for managing mobile devices in the enterprise.MDM/EMMDevices
spacewalk_adapterSpacewalkSpacewalk is an open-source systems management solution for system provisioning, patching and configuration.Config Mgmt.Devices
specops_adapterSpecops InventorySpecops Inventory collects and reports information on hardware, software, registry, user settings, operating system, security data, and Active Directory data.IT Agent, Config Mgmt.Devices
NTT SPEKTRA (Sentient Platform for Network Transformation) is a managed network services platform.
image.pngSpiceworksSpiceworks provides network monitoring to capture, analyze, and monitor network traffic.NetworkingDevices
SplashtopSplashtop is a remote access and remote support tool.
RMMDevices, Users
Splunk logoSplunkSplunk captures, indexes, and correlates real-time data in a searchable repository.SIEMDevices, Users
SpycloudLogoSpyCloudSpyCloud is an account takeover prevention and fraud investigation tool that alerts companies when their users' data has been compromised in a third-party breach.
image.pngSQLiteThe SQLite adapter imports device information from an SQLite database.CMDB, ITAM/ITSMDevices, Users
mssql_adapter(2)SQL ServerThe SQL Server adapter imports device information from arbitrary SQL servers: Microsoft SQL Server, MySQL and PostgreSQL.CMDB, ITAM/ITSM Devices, Users
StackRoxLogoStackRoxStackRox is a container security platform that protects cloud-based applications, detects threats, and manages vulnerabilities, compliance requirements, and configurations.Containers, VA Tool, Audit/ComplianceDevices
Stairwell offers a threat hunting and detection and response platform called “Inception.”
Statseeker is a network performance monitoring solution.
Infra Monitoring
sumo_logic_adapterSumo LogicSumo Logic is a cloud-based service for logs & metrics management for modern apps.Cloud Mgmt., CloudDevices, Users
SunbirdSunbird dcTrack is a data center infrastructure monitoring product that provides dashboards and KPIs for remote data center management.Infra MonitoringDevices
SunflowerSunflower Lab is a mobile app, web app, and custom software development company.Software Development Version ControlDevices
SureMDMLogoSureMDM42Gears SureMDM is a Unified Endpoint Management (UEM) solution for company-owned and BYOD devices.
SUSEManagerLogoSUSE ManagerSUSE Manager is an open-source infrastructure management tool for Linux systems.
Infra Monitoring
SweepaticSweepatic automates continuous mapping, monitoring, and managing of all internet-connected assets and risks to deliver an attack surface management platform.Attack Surface Mgmt.Devices
SymantecWSSLogoSymantec Cloud Secure Web Gateway (WSS Agent)Symantec WSS is a cloud-delivered secure web gateway that protects against malware and enforces policies to access the web.Secure Web GatewaysDevices
symantec_cloud_workload_adapterSymantec Cloud Workload Protection (CWP)Symantec Cloud Workload Protection (CWP) automates security policy enforcement to protect public cloud workloads.Config Mgmt., EDR/EPPDevices
symantec_ccs_adapterSymantec Control Compliance Suite (CCS)Symantec Control Compliance Suite (CCS) is a solution to help identify security gaps and vulnerabilities and automate compliance assessments for over 100 regulations, mandates, and best practice frameworks including GDPR, HIPAA, NIST, PCI and SWIFT. Symantec CCS discovers and inventories all networks and assets including managed and unmanaged devices allowing for assets to be profiled and ranked for risk potential.VA ToolDevices
symantec_dcs_adapterSymantec Data Center Security (DCS) Server AdvancedSymantec Data Center Security Server Advanced delivers security detection, monitoring, and prevention capabilities for both physical and virtual server infrastructures.Data SecurityDevices
symantec_dlp_adapterSymantec DLPSymantec DLP is a data loss protection and prevention solution. Its management console, the DLP Enforce Platform, and its reporting tool, IT Analytics for DLP, allows writing and enforce policies to reduce information risks.DLP, Data SecurityDevices
symantec_edr_adapterSymantec Endpoint Detection and Response (EDR)Symantec Endpoint Detection and Response (EDR) detects, protects, and responds to threats to the organization's network.EDR/EPPDevices
symantec_ee_adapterSymantec Endpoint EncryptionSymantec Endpoint Encryption combines full-disk and removable media encryption with centralized management to protect sensitive information and ensure regulatory compliance.Encryption, Data SecurityDevices
symantec_altiris_adapterSymantec Endpoint Management Suite (Altiris)Symantec Endpoint Management Suite (formerly Altiris) manages, patches, and remediates application and OS configurations on desktops, laptops and servers to strengthen endpoint security and maximize user productivity.ITAM/ITSM, Config Mgmt.Devices
symantec_adapterSymantec Endpoint Protection 12.xSymantec Endpoint Protection manages events, policies, and registration for the client computers that connect to customer networks.EDR/EPPDevices
symantec_adapterSymantec Endpoint Protection 14.xSymantec Endpoint Protection manages events, policies, and registration for the client computers that connect to customer networks.EDR/EPPDevices
symantec_sep_cloud_adapterSymantec Endpoint Protection CloudSymantec Endpoint Protection Cloud unifies threat protection and device management for PC, Mac, mobile devices, and servers to protect endpoints from ransomware, zero-day threats, and other sophisticated attacks.EDR/EPPDevices
SymphonyAISummitLogoSymphonyAI SummitSymphonyAI Summit is an ITSM solution that provides automation libraries for automating repetitive and manual tasks.
Syncro_logoSyncro MSPSyncro MSP is a combined remote monitoring and management (RMM) and professional services automation (PSA) platform that manages invoicing, credit card payments, help desk, customer relationship tracking, remote access and support, and more managed IT services.
Syxsense(1)SyxsenseSyxsense is an endpoint security management tool that combines IT management, patch management, and vulnerability scanning.EDR/EPPDevices
sysaid_adapterSysAidSysAid is an integrated ITSM, Service Desk and Help Desk software solution.ITAM/ITSM, TicketingDevices, Users
SysdigLogoSysdigSysdig is a monitoring, troubleshooting, cost-optimization, and alerting suite for containers, cloud, and Kubernetes environments.
Infra Monitoring
Devices, Users
Syxsense(1)SyxsenseSyxsense is an endpoint security management tool that combines IT management, patch management, and vulnerability scanning.
Tableau is a data visualization and analysis tool used to create charts, graphs, maps, dashboards, and stories.
Cloud Mgmt., Cyber IntelligenceUsers
Tailscale is a minimal-configuration WireGuard-based VPN.
Secure Web GatewaysDevices, Users
TalentLMS is an all-in-one training platform.
Collaboration, HRUsers
Talon is a secure enterprise browser designed to defend against malware and prevent data loss for managed and unmanaged devices.
Secure Enterprise Browser
Tangoe Mobility Services (MMS) LogoTangoe Managed Mobility Services (MMS)
Tangoe Managed Mobility Services (MMS) provides end-to-end mobile lifecycle management.
ITAM/ITSM, Infra Monitoring, License Management, IoT, MDM/EMM
Devices, Users
tanium_asset_adapterTanium AssetTanium Asset provides an inventory of hardware and software assets including servers, laptops, and desktops for thorough insight.ITAM/ITSM, Config Mgmt.Devices
Tanium Comply logoTanium Comply
Tanium Comply conducts vulnerability and compliance assessments against operating systems, applications, security configurations, and policies.
tanium_discover_adapterTanium DiscoverTanium Discover scans for unmanaged assets with almost no impact on the network.ITAM/ITSM, Config Mgmt.Devices
tanium_interact_adapterTanium InteractTanium Interact lets you ask questions to gather live endpoint data in order to create an up-to-date inventory of hardware and software assets.ITAM/ITSM, Config Mgmt.Devices
tanium_status_adapterTanium Client StatusTanium Client Status provides an inventory of all clients that have registered with the Tanium platform.ITAM/ITSM, Config Mgmt.Devices
TCPWave (IPAM)TCPWave IPAM allows administrators to manage their DNS and DHCP infrastructure for on-premise and cloud environments.NetworkingDevices
TeamCity is a build management and continuous integration server.
DevOps, Software Development Version Control
  TeamDynamix- 50ptTeamDynamix
TeamDynamix is an ITSM/ESM and project portfolio management solution with enterprise integration and automation.
Users, Devices
TeamViewer is remote access and remote control computer software, allowing maintenance of computers and other devices.
Tenable.asmTenable Attack Surface Management (formerly Tenable.asm) continuously maps the internet and discovers connections to internet-facing assets.
Attack surface mgmt.
Tenable Identity Exposure (formerly

 Tenable Identity Exposure (formerly provides real-time security monitoring for Microsoft Active Directory (AD) infrastructures.

tenable_io_adapter Scan Export CSV
Tenable Vulnerability Management CSV File (Formerly provides the ability to import a Tenable Vulnerability Management (Formerly scan CSV.
VA ToolDevices
nessus_adapter(1)Tenable NessusTenable Nessus is a vulnerability scanning platform for auditors and security analysts.VA ToolDevices
nessus_adapter(1)Tenable Nessus CSV FileTenable Nessus CSV File Adapter imports device information from vulnerability scan data.VA ToolDevices automatically discovers and assesses a customer's environment for vulnerabilities, misconfigurations, and other cybersecurity issues.VA ToolDevices, Users
tenableotTenable.OT (Indegy)Tenable.OT (Indegy) (previously Indegy Industrial Cybersecurity Suite) protects industrial networks from cyber threats, malicious insiders, and human error.
Tenable.ot provides the ability to identify operational technology (OT) assets, communicate risk, and prioritize action.
Devices (SecurityCenter) (formerly SecurityCenter) consolidates and evaluates vulnerability data, prioritizing security risks.VA ToolDeices
TeramindLogoTeramindTeramind is an employee monitoring, user behavior analytics, and insider threat detection solution.
DLP, UEBADevices, Users
TesmaLogoTesmaTesma provides a central database for business information and makes it available in real-time.
Tessian is a cloud email security platform that prevents email threats and protects against data loss.
DLP, Email SecurityDevices
Canary_iconThinkst CanaryThinkst Canary is deception technology deployed as tokens to catch malicious activity.Cloud Security, Data Security, DeceptionDevices
ThousandEyes is a network infrastructure monitoring and troubleshooting platform
Infra monitoring, Networking
ThreatLockerLogoThreatLockerThreatLocker is a zero-trust endpoint protection platform.
ThreatStackThreat StackThreat Stack is a provider of cloud security management and compliance solutions.Cloud Security, CloudDevices
TinesLogoTinesTines is a no-code Security Orchestration Automation & Response (SOAR) solution.
ITAM/ITSM, SOAR, Software Development Version Control
topdesk(2)TOPdesk Enterprise Service Management
TOPdesk Enterprise Service Management (ESM) lets service teams process requests from a single platform.
Cloud Mgmt, Collaboration, ITAM/ITSM
torii_adapterToriiTorii is a SaaS Management Platform letting IT professionals discover, optimize, and control SaaS usage and costs.SaaS Mgmt, Cloud Infra. & Mgmt.Users
Trace3 LAMP LogoTrace3 LAMP
Trace3 Technology Lifecycle Management Platform (LAMP) is an IT Asset Management (ITAM) platform.
Cloud Mgmt, DevOps, ITAM/ITSM, Infra Monitoring
TrellixeOlogoTrellix MVision
Trellix MVision is a CASB solution that protects data and stops threats in the cloud across SaaS, PaaS, IaaS, and on-premise environments.
Cloud Security
TrelloLogoTrelloTrello is a collaboration and project management tool that helps teams organize and manage their work tasks and projects.
Collaboration, Ticketing
office_scan_adapterTrend Micro Apex One (OfficeScan)Trend Micro Apex One (formerly OfficeScan) is an endpoint security solution protecting against malware, scripts, injection, ransomware, memory and browser attacks, and exploits.EDR/EPPDevices
cloud_app_security_adapterTrend Micro Cloud App SecurityTrend Micro Cloud App Security provides threat and data protection for cloud applications and services such as Google G Suite, Dropbox, Microsoft 365, and more.Cloud Security, CloudUsers
Trend Micro Conformity
Trend Micro Conformity provides real-time monitoring, automated security and compliance checks, and auto-remediation for cloud infrastructure.
Cloud SecurityDevices
deep_security_adapterTrend Micro Deep SecurityTrend Micro Deep Security can automatically virtually patch server, cloud, VDI and application vulnerabilities.Config Mgmt., EDR/EPPDevices
trend micro worry fee_adapter
Trend Micro Vision One
Trend Micro Vision One is a threat defense platform that includes: Advanced extended detection and response (XDR) capabilities.
trend micro worry fee_adapterTrend Micro Worry-FreeTrend Micro worry-free is an endpoint and SaaS solution protecting against malware, scripts, injection, ransomware, memory and browser attacks, and exploits.EDR/EPPDevices
tripwire_enterprise_adapterTripwire EnterpriseTripwire Enterprise is a security configuration management (SCM) suite that provides fully integrated solutions for policy, file integrity and remediation management.Config Mgmt., EDR/EPPDevices
truefort_adapterTrueFortTrueFort offers application behavior analytics, control, and protection.AppSec, DevOpsDevices
TruffleHogLogoTruffleHogTruffleHog is a security tool that scans code repositories for vulnerabilities related to secret keys, such as private encryption keys and passwords.AppSec, DevOpsDevices
TruPortal is a secure, web-based access credential system for physical access.
IAM, IoTDevices
TrustwaveLogoTrustwaveTrustwave is a managed security services provider focused on managed detection and response.RMMUsers
Tufin SecureTrackTufin SecureTrack is a firewall management solution that delivers security, compliance, and connectivity across physical networks and hybrid cloud.FirewallDevices
twistlock_adapterTwistlockTwistlock provides container and cloud native cybersecurity for teams using Docker, Kubernetes, serverless, and other cloud native technologies.Containers, CloudDevices
TYCHON is an endpoint analytics and remediation platform that allows users to search, visualize, remediate, and monitor security compliance across assets.
Attack Surface Mgmt., EDR/EPP, ITAM/ITSM Devices
unifi_adapter(1)Ubiquiti Networks UniFi Controller
The UniFi Controller is a wireless network management software solution for managing multiple wireless networks using a web browser.
Udemy_logoUdemyUdemy is an online learning and teaching marketplace.
ultipro_adapterUKG Pro (Ultimate Software UltiPro)UKG Pro (formerly Ultimate Software UltiPro) is cloud-based human capital management (HCM) software.HCM, IAMUsers
UnifiedFX%20LogoUnifiedFX PhoneView
UnifiedFX PhoneView is a Cisco Preferred Solutions Partner which offers Cisco Phone Management Software.
Unimus is a network configuration and automation tool which provides information on devices, backups, and configurations.
Unisys Stealth_logoUnisys Stealth
Unisys Stealth transforms existing networks—both on-premises and in the cloud—into a Zero Trust Network through identity-based microsegmentation.
UnitedSecurityLogoUnited Security Providers
United Security Providers is a Managed Security Services provider.
Data Security, NAC
Unitrends (a Kaseya company) provides all-in-one enterprise backup continuity and disaster recovery solutions.
Universal SSH Key Manager (UKM)
Universal SSH Key Manager (UKM) is an enterprise grade SSH user key management solution that uses a non-disruptive approach to gain and retain control of the SSH infrastructure.ITAM/ITSMDevices
upguard_adapterUpGuard CyberRiskUpGuard CyberRisk provides third-party vendor risk and external cyber risk monitoring. The platform has two main modules: UpGuard BreachSight which monitors company external risk posture and Vendor Risk monitors and helps manages the risk posture of third party vendors.Cyber IntelligenceDevices, Users
UpKeep Asset Operations Management Platform is a mobile-first CMMS (computerized maintenance management system), EAM (enterprise asset management), and IIoT (industrial internet of things) suite of solutions.
Uptrends is a cloud-based solution for monitoring websites, servers, APIs, and network performance. Integrate Uptrends with the Axonius Cybersecurity Asset Management Platform.
Infra Monitoring, RMM
Devices, Users
uptycs_adapter(1)UptycsUptycs is an osquery-powered security analytics platform pairs a universal agent with analytics for fleet visibility, intrusion detection, incident investigation, vulnerability management & compliance for Linux, macOS, Windows, containers, and cloud workloads.UEM, MDM/EMMDevices
Uyuni is an open-source configuration and infrastructure management solution for software-defined infrastructure.
Config/Patch Mgmt

vArmour details application and user relationships across cloud, data center, and hybrid IT environments.

Cloud Security, NetworkingDevices, Users
Varonis_iconVaronis CSV
Varonis helps prioritize risks around sensitive repositories, monitor the use of personal accounts, and identify costly misconfigurations. 
Data SecurityDevices
vectra_adapterVectra AIVectra AI is a cybersecurity platform that uses AI to detect and respond to cyberattacks.NetworkingDevices
VeeamVeeam provides backup, disaster recovery and modern data protection software for virtual, physical and multi-cloud infrastructures.Deception, Storage ManagementDevices
Velociraptor is an open-source endpoint monitoring, digital forensic and cyber response platform.
venafi_adapterVenafiVenafi secures and protects cryptographic keys and digital certificates.Certificate Mgmt., Data SecurityDevices
Veracode provides static, dynamic, and software composition scanning to identify vulnerabilities in the software development lifecycle.
AppSec, VA ToolDevices
Veritas%20NetBackup%20LogoVeritas NetBackupVeritas NetBackup is an enterprise backup solution offering data management, automation, artificial intelligence, and elastic architecture.
Data Security, Storage Management
Vicarius is a consolidated vulnerability discovery, prioritization, and remediation solution.  
VA Tool

Viptela (Cisco) SD-WAN
Cisco SD-WAN (previously Viptela) allows users to establish an SD-WAN overlay fabric that connects data centers, branches, campuses, and colocation facilities.
Networking, Secure Web GatewaysDevices
Virtru_logoVirtru Gmail Encryption
Virtru Gmail Encryption protects Gmail messages and attachments with end-to-end encryption while maintaining user ownership and control.
carbonblack_protection_adapterVMware Carbon Black App Control (Carbon Black CB Protection)VMware Carbon Black App Control (formerly Carbon Black CB Protection) protects critical systems and servers to prevent unwanted changes and ensure continuous compliance with regulatory mandates.EDR/EPPDevices
carbonblack_defense_adapter(2)VMware Carbon Black Cloud (Carbon Black CB Defense)VMware Carbon Black Cloud (formerly Carbon Black CB Defense) is a cloud native platform delivering next-generation antivirus and endpoint detection and response. This adapter is also compatible with Carbon Black Cloud Enterprise EDR (formerly CB ThreatHunter) and Carbon Black Cloud Audit and Remediation (formerly CB LiveOps).EDR/EPPDevices
carbonblack_response_adapterVMware Carbon Black EDR (Carbon Black CB Response)VMware Carbon Black EDR (formerly Carbon Black CB Response) is a threat hunting and incident response solution that delivers continuous visibility in offline, air-gapped, and disconnected environments using threat intel and customizable detections.EDR/EPPDevices
cb-logoVMware Carbon Black LiveOpsVMware Carbon Black LiveOps is part of the CB Predictive Security Cloud (PSC), and allows customers to query endpoints and remediate issues in real time. Integrate VMware Carbon Black LiveOps with the Axonius Cybersecurity Asset Management Platform.EDR/EPP, IT AgentDevices
CarbonBlack_Cloud_Workload_logoVMware Carbon Black Cloud WorkloadVMware Carbon Black Cloud Workload is a security solution for workloads, aiming to reduce the attack surface and to protect critical assets.Attack Surface Mgmt., EDR/EPPDevices
esx_adapter(1)VMWare ESXi and vSphereVMware ESXi is an enterprise-class, type-1 hypervisor for deploying and serving virtual computers. VMware vSphere is VMware's cloud computing virtualization platform.Virtualization, ITAM/ITSM, CloudDevices
vmware_Horizon.pngVMware HorizonVMware Horizon is a platform for secure delivery of virtual desktops and apps across the hybrid cloud.Virtualization, ITAM/ITSM, CloudDevices
VMwareNSXLogo.pngVMware NSXVMware NSX provides an agile software-defined infrastructure to build cloud-native application environments.NetworkingDevices
VMware NSX Advanced Load BalancerVMware NSX Advanced Load Balancer
VMware NSX Advanced Load Balancer (formerly AVI Networks) delivers multi-cloud application services used for load balancing, web application firewall and container ingress.
Cloud Infra, Cloud Mgmt.
VMware SD-WAN (formerly by VeloCloud) is a software-based network technology that virtualizes WAN connections.
vcloud_director_adapterVMware vCloud DirectorVMware vCloud Director is a cloud service-delivery platform.Cloud Mgmt., CloudDevices
vmware_vrops_adapterVMware vRealize Operations (vROps)VMware vRealize Operations (vROps) delivers an IT operations management platform for private, hybrid, and multi-cloud environments that covers the physical, virtual and cloud infrastructure, including VMs and containers.Cloud Infra, CloudDevices
airwatch_adapter(2)VMware Workspace ONE (Airwatch)VMWare Workspace ONE (formerly AirWatch) provides enterprise mobility management (EMM) software and standalone management systems for content, applications, and email.MDM/EMM, UEMDevices
vRealize Automation SaltStack Config (formerly SaltStack)
vRealize Automation SaltStack intelligent automation delivers event-driven security, cloud, and configuration management.
SOAR, Config Mgmt.Devices
vulcan-logo2VulcanVulcan Cyber is a vulnerability visualization, assessment and remediation platform.VA ToolDevices
Vultr SVGVultrVultr is a global cloud hosting company offering high-performance cloud servers, cloud GPUs, bare metal, and cloud storage.
Cloud Infra
Devices, Users
WasabiLogoWasabiWasabi is a cloud data storage company focused on high-performance object storage services.
Cloud Infra, Storage Management
Devices, Users
Wasp AssetCloud
AssetCloud is an asset tracking solution that enables organizations to monitor, audit and report on devices and software.ITAM/ITSMDevices, Users
The watchTowr platform provides Continuous Automated Red Teaming (CART) and Attack Surface Management (ASM) to help businesses discover high-impact vulnerabilities.
Attack Surface Mgmt
wazuh_adapterWazuhWazuh is a free, open source and enterprise-ready security monitoring solution for threat detection, integrity monitoring, incident response and compliance.
webroot_adapterWebroot Endpoint ProtectionWebroot Endpoint Protection protects against threats across email, browsers, files, URLs, ads, apps, and more.EDR/EPPDevices
webscan_adapterWeb Server InformationWeb Server Information provides information about the web server for a given website domain, including the server type, its version and operating system, the content management system (CMS) name and its version, the installed CMS plugins, versions and more.ITAM/ITSMDevices
WhatsUp_Gold_iconWhatsUp Gold
WhatsUp Gold is network monitoring software.
dhcp_adapterWindows DHCP ServerWindows DHCP Server is a networking server used to lease IP addresses and manage other configuration information.NetworkingDevices
wmi_adapterWindows Management Instrumentation (WMI)Windows Management Instrumentation (WMI) is a set of specifications from Microsoft for consolidating the management of devices and applications in a Windows network. WMI provides users with information about the status of local or remote computer systems.ITAM/ITSMDevices
failover_cluster_adapter(1)Windows Server Failover Clustering (WSFC)Windows Server Failover Clustering (WSFC) is a feature of the Windows Server platform for improving the high availability (HA) of applications and services. WSFC is the successor to Microsoft Cluster Service (MSCS).Cloud Infra, CloudDevices
wsus_adapterWindows Server Update Services (WSUS)Windows Server Update Services (WSUS), previously Software Update Services (SUS), enables administrators to manage the distribution of updates and hotfixes released for Microsoft products.Config Mgmt.Devices
WSUS-SQL LogoWindows Server Update Services (WSUS) SQL
Windows Server Update Services (WSUS) - SQL, previously Software Update Services (SUS), enables administrators to manage the distribution of updates and hotfixes released for Microsoft products.
Config/Patch Mgmt
WizLogoWizWiz analyzes all layers of the cloud stack to identify high-risk attack vectors to be prioritized and fixed.Cloud SecurityDevices
Wiz%20Reports%20LogoWiz ReportsWiz Reports provides additional data for Wiz assets.
Cloud Security
Devices, Users
Wordpress PNGWordPressWordPress is a web content management system.
workday_adapterWorkdayWorkday offers software solutions for financial management, human resources, and planning.ERP, SaaS ManagementUsers, SaaS Data
Workspace One - Intelligence Report API
Workspace ONE Intelligence reporting uses a cloud-based report storage system to gather data and create the reports.


WP EngineLohoWP Engine

WP Engine is a website hosting provider aimed at providing managed hosting solutions for websites and applications.

Secure Web Gateways,
xAssetsLogoxAssetsxAssets provides IT asset management software.ITAM/ITSMDevices
xmc-logoXMC Extreme Management CenterXMC Extreme Management Center is a wired and wireless network management and automation software.NetworkingDevices
ColorTokens Xshield is a zero trust-based, cloud-delivered micro-segmentation solution that secures critical corporate assets, including applications and workloads.
Cloud Security, Networking 
zabbix_adapterZabbixZabbix is an open source monitoring software tool for networks, servers, virtual machines and cloud services.Cloud Mgmt., CloudDevices
ZenDesk_IconZenDeskZendesk is a cloud-based help desk management solution offering customizable tools to build customer service portal, knowledge base and online communities.
Collaboration, SaaS Management
Users, SaaS Data
Zenoss_iconZenossZenoss enables monitoring of all physical and virtual networks as one part of a real-time model that includes both cloud and on-premises infrastructure.Infra Monitoring, RMMDevices
ZeroFoxZeroFox is an intelligence-based analysis and remediation engine used to detect digital risks such as phishing, malware, impersonation, and piracy targeted at digital assets.Cyber Intelligence, Risk ManagementUsers
Zero NetworksZero Networks automates the development and enforcement secure remote connectivity and software-defined segmentation.NACDevices, Users
zerto_adapterZertoZerto is a data loss protection solution that provides disaster recovery, backup and workload mobility software for virtualized infrastructures and cloud environments.DLP, Data SecurityDevices
Zerto ZVM
Zerto ZVM is a data loss protection solution that provides disaster recovery, backup and workload mobility software for virtualized infrastructures and cloud environments. This adapter supports on-prem deployment.
DLP, Data Security
ZimperiumLogo Zimperium
 Zimperium zIPS is a mobile threat defense solution for enterprises, providing protection to both corporate owned and BYOD devices.
Devices and Users
zoom_adapterZoomZoom is a remote conferencing service that provides video conferencing, online meetings, chat, and mobile collaboration.Remote Conferencing, SaaS ManagementDevices, Users, SaaS data
ZscalerClientConnectorLogoZscaler Client Connector
Zscaler Client Connector enables secure access to business applications from any device.
Cloud Security, IAM, Secure Web Gateways
zscaler_adapterZscaler Web SecurityZscaler Web Security is a secure Internet and web gateway service that stops malware, advanced threats, phishing, browser exploits, malicious URLs, botnets, and more.Secure Web Gateways, SaaS ManagementDevices, Users, SaaS data
zscaler_adapterZscaler Workload Segmentation
Zscaler Workload Segmentation is a SaaS solution for applying and managing network segmentation in cloud and on-prem environments.
zscaler_adapterZscaler ZDX
Zscaler Digital Experience (ZDX) is a monitoring solution providing end-to-end visibility and troubleshooting of end-user performance issues for any user or application, regardless of location.
RMMDevices, Users

VMware NSX Advanced Load Balancer

Was this article helpful?

What's Next
Changing your password will log you out immediately. Use the new password to log back in.
First name must have atleast 2 characters. Numbers and special characters are not allowed.
Last name must have atleast 1 characters. Numbers and special characters are not allowed.
Enter a valid email
Enter a valid password
Your profile has been successfully updated.