13 Integrations with 12Port Horizon

View a list of 12Port Horizon integrations and software that integrates with 12Port Horizon below. Compare the best 12Port Horizon integrations as well as features, ratings, user reviews, and pricing of software that integrates with 12Port Horizon. Here are the current 12Port Horizon integrations in 2026:

  • 1
    Google Authenticator
    Google Authenticator generates 2-Step Verification codes on your phone. 2-Step Verification provides stronger security for your Google Account by requiring a second step of verification when you sign in. In addition to your password, you’ll also need a code generated by the Google Authenticator app on your phone. You can use your Google Account to more easily and securely sign in to thousands of sites and services on the web, while keeping your privacy choices transparent in one place. Protect your Google Account with Security Checkup. This detailed tool provides you with personalized and practical recommendations to help you strengthen the security of your Google Account. Hacked passwords are more common than you think. Two-step verification protects you from unauthorized access to your account. To do this, it requests a second step after entering the password.
  • 2
    Cisco Duo
    Cisco Duo is a cloud-based identity security solution that protects organizations from identity-based threats and boosts workforce productivity. Trusted by over 40,000 organizations worldwide, Duo delivers an exceptional access management experience across all users, devices, and applications, making access to resources secure, seamless, and easy. Duo with Cisco Identity Intelligence provides deep visibility across your identity ecosystem, adding a powerful security layer to any identity infrastructure. Offer users a world-class access experience through Duo Passport to eliminate MFA friction and fatigue without sacrificing security. To stop threats, Duo verifies user identities with strong authenticators including Duo passwordless, Verified Duo Push with number matching, and phishing-resistant factors like biometrics and FIDO2 security keys. Paired with deep insights into users’ devices, Duo gives you the control to adaptively limit access based on device health or user risk.
    Leader badge
    Starting Price: $3 per user per month
  • 3
    MySQL

    MySQL

    Oracle

    MySQL is the world's most popular open source database. With its proven performance, reliability, and ease-of-use, MySQL has become the leading database choice for web-based applications, used by high profile web properties including Facebook, Twitter, YouTube, and all five of the top five websites*. Additionally, it is an extremely popular choice as embedded database, distributed by thousands of ISVs and OEMs.
    Starting Price: Free
  • 4
    SQL Server

    SQL Server

    Microsoft

    Intelligence and security are built into Microsoft SQL Server 2019. You get extras without extra cost, along with best-in-class performance and flexibility for your on-premises needs. Take advantage of the efficiency and agility of the cloud by easily migrating to the cloud without changing code. Unlock insights and make predictions faster with Azure. Develop using the technology of your choice, including open source, backed by Microsoft's innovations. Easily integrate data into your apps and use a rich set of cognitive services to build human-like intelligence across any scale of data. AI is native to the data platform—you can unlock insights faster from all your data, on-premises and in the cloud. Combine your unique enterprise data and the world's data to build an intelligence-driven organization. Work with a flexible data platform that gives you a consistent experience across platforms and gets your innovations to market faster—you can build your apps and then deploy anywhere.
    Starting Price: Free
  • 5
    Microsoft Defender XDR
    Microsoft Defender XDR is an industry-leading extended detection and response (XDR) platform that provides unified investigation and response capabilities across various assets, including endpoints, IoT devices, hybrid identities, email, collaboration tools, and cloud applications. It offers centralized visibility, powerful analytics, and automatic cyberattack disruption to help organizations detect and respond to threats more effectively. By integrating multiple security services, such as Microsoft Defender for Endpoint, Microsoft Defender for Office 365, Microsoft Defender for Identity, and Microsoft Defender for Cloud Apps, it enables security teams to correlate signals across these services, providing a comprehensive view of threats and facilitating coordinated responses. This integration allows for automatic actions to prevent or stop attacks and self-heal affected assets, enhancing overall security posture.
  • 6
    Radius

    Radius

    Radius Bob

    CRM for insurance agencies. Never Lose a Lead or Client again because of misplaced information, hard drive crash, corrupted spreadsheet or a tipped over file cabinet. Organize and Manage all of your Leads & Clients with Radius. An all-in-one Solution for your Agency. No need for a separate email marketing software, use Radius to send Auto Responders, Drip Marketing, Mass Emails & SMS/Text Messages. Every Radius Lead & Client has its own history, reminders & tasks, notes, information, and file storage. Also using the Radius Dropbox helps keep your organized by automatically importing emails. Integrate Radius with how you do Business. Define Custom Form Fields, Lead Temperatures, Client Status and more. Ingrate Radius with your website, quote engine, lead vendor or third party app.
    Starting Price: $34 per month
  • 7
    Apache Groovy

    Apache Groovy

    The Apache Software Foundation

    Apache Groovy is a powerful, optionally typed and dynamic language, with static-typing and static compilation capabilities, for the Java platform aimed at improving developer productivity thanks to a concise, familiar and easy to learn syntax. It integrates smoothly with any Java program, and immediately delivers to your application powerful features, including scripting capabilities, Domain-Specific Language authoring, runtime and compile-time meta-programming and functional programming. Concise, readable and expressive syntax, easy to learn for Java developers. Closures, builders, runtime & compile-time meta-programming, functional programming, type inference, and static compilation. Flexible & malleable syntax, advanced integration & customization mechanisms, to integrate readable business rules in your applications. Great for writing concise and maintainable tests, and for all your build and automation tasks.
    Starting Price: Free
  • 8
    Barawave

    Barawave

    Barawave

    Barawave: A robust Cloud ERP platform designed to unify business operations, from finance and HR to inventory and CRM. With real-time insights, automated workflows, and customizable dashboards, Barawave simplifies decision-making and boosts productivity. Key features include integrated financial management, customer relationship tools, employee tracking, inventory control, and in-depth reporting. Scalable and secure, Barawave adapts to your business needs, offering seamless remote access and data protection. Manage all facets of your operations in one powerful, user-friendly platform with Barawave.
    Starting Price: $0
  • 9
    Active Directory
    Active Directory stores information about objects on the network and makes this information easy for administrators and users to find and use. Active Directory uses a structured data store as the basis for a logical, hierarchical organization of directory information. This data store, also known as the directory, contains information about Active Directory objects. These objects typically include shared resources such as servers, volumes, printers, and the network user and computer accounts. For more information about the Active Directory data store, see Directory data store. Security is integrated with Active Directory through logon authentication and access control to objects in the directory. With a single network logon, administrators can manage directory data and organization throughout their network, and authorized network users can access resources anywhere on the network. Policy-based administration eases the management of even the most complex network.
    Starting Price: $1 per user per month
  • 10
    PowerShell

    PowerShell

    Microsoft

    PowerShell is a cross-platform task automation and configuration management framework, consisting of a command-line shell and scripting language. Unlike most shells, which accept and return text, PowerShell is built on top of the .NET Common Language Runtime (CLR), and accepts and returns .NET objects. This fundamental change brings entirely new tools and methods for automation. Unlike traditional command-line interfaces, PowerShell cmdlets are designed to deal with objects. An object is structured information that is more than just the string of characters appearing on the screen. Command output always carries extra information that you can use if you need it. If you've used text-processing tools to process data in the past, you'll find that they behave differently when used in PowerShell. In most cases, you don't need text-processing tools to extract specific information. You directly access portions of the data using standard PowerShell object syntax.
    Starting Price: Free
  • 11
    Oracle Cloud Infrastructure
    Oracle Cloud Infrastructure supports traditional workloads and delivers modern cloud development tools. It is architected to detect and defend against modern threats, so you can innovate more. Combine low cost with high performance to lower your TCO. Oracle Cloud is a Generation 2 enterprise cloud that delivers powerful compute and networking performance and includes a comprehensive portfolio of infrastructure and platform cloud services. Built from the ground up to meet the needs of mission-critical applications, Oracle Cloud supports all legacy workloads while delivering modern cloud development tools, enabling enterprises to bring their past forward as they build their future. Our Generation 2 Cloud is the only one built to run Oracle Autonomous Database, the industry's first and only self-driving database. Oracle Cloud offers a comprehensive cloud computing portfolio, from application development and business analytics to data management, integration, security, AI & blockchain.
  • 12
    PostgreSQL

    PostgreSQL

    PostgreSQL Global Development Group

    PostgreSQL is a powerful, open-source object-relational database system with over 30 years of active development that has earned it a strong reputation for reliability, feature robustness, and performance. There is a wealth of information to be found describing how to install and use PostgreSQL through the official documentation. The open-source community provides many helpful places to become familiar with PostgreSQL, discover how it works, and find career opportunities. Learm more on how to engage with the community. The PostgreSQL Global Development Group has released an update to all supported versions of PostgreSQL, including 15.1, 14.6, 13.9, 12.13, 11.18, and 10.23. This release fixes 25 bugs reported over the last several months. This is the final release of PostgreSQL 10. PostgreSQL 10 will no longer receive security and bug fixes. If you are running PostgreSQL 10 in a production environment, we suggest that you make plans to upgrade.
  • 13
    Yubico YubiKey
    Protect your digital world with YubiKey. Stop account takeovers, go passwordless and modernize your multifactor authentication. Get the world’s leading security key for superior security, user experience and return on investment. Designed for personal and business use, the YubiKey comes in a variety of shapes and with different features to fit your needs. Take our quick Product Finder Quiz to find the right key for you. The YubiKey works with hundreds of services and software applications. We’re here to guide you getting started whether for personal or business use. The industry's #1 security key, enabling strong two-factor, multi-factor and passwordless authentication. With a simple touch, the multi-protocol YubiKey protects access to computers, networks, and online services. No more reaching for your smartphone, or re-typing passcodes. Just plug in your YubiKey, tap, and it does the rest for you.
  • Previous
  • You're on page 1
  • Next