84 Integrations with Delinea Cloud Access Controller
View a list of Delinea Cloud Access Controller integrations and software that integrates with Delinea Cloud Access Controller below. Compare the best Delinea Cloud Access Controller integrations as well as features, ratings, user reviews, and pricing of software that integrates with Delinea Cloud Access Controller. Here are the current Delinea Cloud Access Controller integrations in 2026:
-
1
ConnectWise PSA
ConnectWise
ConnectWise PSA, formerly ConnectWise Manage, is a robust business management platform made for companies that offer, service, and support technology. Trusted by more than 100,000 users, ConnectWise PSA offers a wealth of features that enables teams to achieve greater accountability, operational efficiency, and profitability. The platform comes with help desk, time tracking and billing, project management, account management, agreements, sales and marketing, procurement, and reporting tools. -
2
Microsoft 365
Microsoft
Microsoft 365 for Individuals is a complete productivity suite that combines powerful applications, secure cloud storage, and AI-driven tools to help users achieve more in their daily lives. It integrates popular apps like Word, Excel, PowerPoint, Outlook, OneNote, and OneDrive, all enhanced with Copilot—Microsoft’s intelligent AI companion. The platform enables seamless collaboration, creativity, and organization across devices, including PC, Mac, iPhone, iPad, and Android. With Microsoft Designer, users can create stunning visuals, while Clipchamp adds professional-grade video editing capabilities. Built-in Microsoft Defender provides advanced security for personal data and devices. Microsoft 365 empowers individuals to imagine, create, and accomplish with greater efficiency and confidence.Starting Price: $9.99/month -
3
Google Authenticator
Google
Google Authenticator generates 2-Step Verification codes on your phone. 2-Step Verification provides stronger security for your Google Account by requiring a second step of verification when you sign in. In addition to your password, you’ll also need a code generated by the Google Authenticator app on your phone. You can use your Google Account to more easily and securely sign in to thousands of sites and services on the web, while keeping your privacy choices transparent in one place. Protect your Google Account with Security Checkup. This detailed tool provides you with personalized and practical recommendations to help you strengthen the security of your Google Account. Hacked passwords are more common than you think. Two-step verification protects you from unauthorized access to your account. To do this, it requests a second step after entering the password. -
4
Cisco Duo
Cisco
Cisco Duo is a cloud-based identity security solution that protects organizations from identity-based threats and boosts workforce productivity. Trusted by over 40,000 organizations worldwide, Duo delivers an exceptional access management experience across all users, devices, and applications, making access to resources secure, seamless, and easy. Duo with Cisco Identity Intelligence provides deep visibility across your identity ecosystem, adding a powerful security layer to any identity infrastructure. Offer users a world-class access experience through Duo Passport to eliminate MFA friction and fatigue without sacrificing security. To stop threats, Duo verifies user identities with strong authenticators including Duo passwordless, Verified Duo Push with number matching, and phishing-resistant factors like biometrics and FIDO2 security keys. Paired with deep insights into users’ devices, Duo gives you the control to adaptively limit access based on device health or user risk.Starting Price: $3 per user per month -
5
Kubernetes
Kubernetes
Kubernetes (K8s) is an open-source system for automating deployment, scaling, and management of containerized applications. It groups containers that make up an application into logical units for easy management and discovery. Kubernetes builds upon 15 years of experience of running production workloads at Google, combined with best-of-breed ideas and practices from the community. Designed on the same principles that allows Google to run billions of containers a week, Kubernetes can scale without increasing your ops team. Whether testing locally or running a global enterprise, Kubernetes flexibility grows with you to deliver your applications consistently and easily no matter how complex your need is. Kubernetes is open source giving you the freedom to take advantage of on-premises, hybrid, or public cloud infrastructure, letting you effortlessly move workloads to where it matters to you.Starting Price: Free -
6
Slack
Salesforce
Slack is a cloud-based project collaboration and team interaction software solution specially designed to seamlessly facilitate communication across organizations. Featuring powerful tools and services integrated into a single platform, Slack provides private channels to promote interaction within smaller teams, direct channels to help send messages directly to colleagues, and public channels that enables members across organizations to start conversations. Available on Mac, Windows, Android, and iOS apps, Slack offers a plethora of features that include chat, file sharing, collaborative workspace, real-time notifications, two-way audio and video, screen sharing, document imaging, activity tracking and logging, and more.Starting Price: $6.67 per user per month -
7
Trello
Trello
Trello helps teams work more collaboratively and get more done. Trello’s boards, lists, and cards enable teams to organize and prioritize projects in a fun, flexible, and rewarding way. Whether it’s for work, a side project or even the next family vacation, Trello helps your team stay organized. Dive into the details by adding comments, attachments, due dates, and more directly to Trello cards. Collaborate on projects from beginning to end. Let the robots do the work! Boost productivity by unleashing the power of automation across your entire team with Butler, and remove tedious tasks from your to-do lists. Use Trello the way your team works best. We’ve got the flexibility & features to fit any team’s style. It’s easy to get your team up and running with Trello. We’ve collected all of the boards and tools your team needs to succeed in one handy resource. Integrate the apps your team already uses directly into your workflow.Starting Price: $12.50 per user per month -
8
GitHub
GitHub
GitHub is the world’s most secure, most scalable, and most loved developer platform. Join millions of developers and businesses building the software that powers the world. Build with the world’s most innovative communities, backed by our best tools, support, and services. If you manage multiple contributors , there’s a free option: GitHub Team for Open Source. We also run GitHub Sponsors, where we help fund your work. The Pack is back. We’ve partnered up to give students and teachers free access to the best developer tools—for the school year and beyond. Work for a government-recognized nonprofit, association, or 501(c)(3)? Get a discounted Organization account on us.Starting Price: $7 per month -
9
Authy
Twilio
Enable 2FA for your favorite sites. Go beyond the password and protect yourself from hackers and account takeovers. Simple to setup, secure cloud backup, multi device support. Defeat cyber criminals & avoid account takeovers with stronger security, for free! Watch the video below to learn more about why you should enable 2FA for your accounts. Relying on just usernames and passwords to secure your online accounts is no longer considered safe. Data breaches occur daily and hackers are always inventing new ways to take over your accounts. Protect yourself by enabling two-factor authentication (2FA). This blocks anyone using your stolen data by verifying your identity through your device. Enable 2FA now to protect your accounts online. -
10
ConnectWise ScreenConnect
ConnectWise
ConnectWise ScreenConnect, formerly ConnectWise Control, is a remote support solution for Managed Service Providers (MSP), Value Added Resellers (VAR), internal IT teams, and managed security providers. Fast, reliable, secure, and simple to use, ConnectWise ScreenConnect helps businesses solve their customers' issues faster from any location. The platform features remote support, remote access, remote meeting, customization, and integrations with leading business tools. Raise the bar for remote support and reduce customer downtime. Give technicians the ability to deliver superior service through reliable, direct connections to access desktops, mobile devices, and more when needed. Fast, flexible, and secure remote desktop and mobile support solutions for every industry and need. Not sure which version you need? Try all the features and we'll guide you on the best fit for your situation. Free 14-day trial, no credit card required.Starting Price: $27 per month -
11
ConnectWise Automate
ConnectWise
Solve IT problems at the speed of business with ConnectWise Automate. A robust remote monitoring and management (RMM) platform, ConnectWise Automate helps boost the effectiveness of IT teams. It offers teams the ability to discover all devices and users that need to be proactively monitored, remove delivery roadblocks, and support more endpoints without adding headaches or head count. -
12
Microsoft Authenticator
Microsoft
Go passwordless. Enter your username and confirm your sign-in with your phone. It’s that easy! Passwords can be forgotten, stolen, or compromised. With Authenticator, your phone provides an extra layer of security on top of your PIN or fingerprint. Use Authenticator to sign-in to Outlook, OneDrive, Office, and more. Protect all of your accounts with two-step verification. The app also helps you secure all of your online accounts by using the industry standard time-based OTP (one-time password) codes. -
13
Microsoft SharePoint
Microsoft
Microsoft SharePoint is a secure, enterprise-grade collaboration and content management platform that connects teams, information, and workflows. With AI-powered Copilot and SharePoint agents, users can instantly generate pages, summarize content, and surface insights from within their sites. It enables seamless document management, version control, and real-time collaboration—both inside and outside your organization. Customizable templates and drag-and-drop tools make it easy to design visually engaging intranet sites and portals. SharePoint also provides robust security and compliance features, including access controls, data governance, and conditional policies. Integrated deeply into Microsoft 365, it helps businesses streamline communication, boost productivity, and accelerate their AI transformation.Starting Price: $1.00/one-time/user -
14
Amazon Web Services (AWS)
Amazon
Amazon Web Services (AWS) is the world’s most comprehensive cloud platform, trusted by millions of customers across industries. From startups to global enterprises and government agencies, AWS provides on-demand solutions for compute, storage, networking, AI, analytics, and more. The platform empowers organizations to innovate faster, reduce costs, and scale globally with unmatched flexibility and reliability. With services like Amazon EC2 for compute, Amazon S3 for storage, SageMaker for AI/ML, and CloudFront for content delivery, AWS covers nearly every business and technical need. Its global infrastructure spans 120 availability zones across 38 regions, ensuring resilience, compliance, and security. Backed by the largest community of customers, partners, and developers, AWS continues to lead the cloud industry in innovation and operational expertise. -
15
Microsoft Azure
Microsoft
Microsoft's Azure is a cloud computing platform that allows for rapid and secure application development, testing and management. Azure. Invent with purpose. Turn ideas into solutions with more than 100 services to build, deploy, and manage applications—in the cloud, on-premises, and at the edge—using the tools and frameworks of your choice. Continuous innovation from Microsoft supports your development today, and your product visions for tomorrow. With a commitment to open source, and support for all languages and frameworks, build how you want, and deploy where you want to. On-premises, in the cloud, and at the edge—we’ll meet you where you are. Integrate and manage your environments with services designed for hybrid cloud. Get security from the ground up, backed by a team of experts, and proactive compliance trusted by enterprises, governments, and startups. The cloud you can trust, with the numbers to prove it. -
16
SWIVEL ERP
SWIVEL Software
Swivel Software a single cloud platform global logistics systems software management solution. Streamline your supply chain daily operations, integrating your business with your customer and partner efficiently, ensuring gap variations components are set by our technical team providing the values and diversity within your supply chain (SOR) standard operations requirements. SWIVEL 360 cloud technology management systems is providing logistics companies with the visibility and collaborated solutions around the globe. SWIVEL ERP enables logistics providers to streamline their operations with efficiency. International logistics companies’ branches can operate using the same ERP platform to eliminate errors and acquire more time to service their customers. Our language and documents pack serve as the application of one GLOBAL system. The Freight Forwarder’s objectives are efficiency and scalability to boost bookings and increase revenue/profit without increasing company overhead.Starting Price: $40.00/month/user -
17
Okta
Okta
One platform, infinite ways to connect to your employees and customers. Build auth into any app. Create secure, delightful experiences quickly by offloading customer identity management to Okta. Get security, scalability, reliability, and flexibility by combining Okta’s Customer Identity products to build the stack you need. Protect and enable your employees, contractors, and partners. Secure your employees—wherever they are—with Okta’s workforce identity solutions. Get the tools to secure and automate cloud journeys, with full support for hybrid environments along the way. Companies around the world trust Okta with their workforce identity. -
18
IBM Cloud
IBM
IBM Cloud® capabilities enable business agility and resiliency. Explore the platform that gives you 2.5x value. Designed for industry, security and the freedom to build and run anywhere. Business workflow transformation with automation and AI. Strong technology partner ecosystem that delivers value for industry needs. Industry and business domain expertise and solutions. Automated and auditable processes. Unique capabilities for the highest levels of cloud security and monitoring. Consistent security and controls posture across all applications. Containerized capabilities for DevOps, automation, data and security. Ease of integration and a consistent application development lifecycle. Advanced technologies including IBM Watson®, analytics, IoT, and edge. -
19
IBM QRadar SIEM
IBM
Market-leading SIEM built to outpace the adversary with speed, scale and accuracy As digital threats loom large and cyber adversaries grow increasingly sophisticated, the roles of SOC analysts are more critical than ever. Going beyond threat detection and response, QRadar SIEM enables security teams face today’s threats proactively with advanced AI, powerful threat intelligence, and access to cutting-edge content to maximize analyst potential. Whether you need cloud-native architecture built for hybrid scale and speed or a solution to complement your on-premises infrastructure, IBM can provide you with a SIEM to meet your needs. Experience the power of IBM enterprise-grade AI designed to amplify the efficiency and expertise of every security team. With QRadar SIEM, analysts can reduce repetitive manual tasks like case creation and risk prioritization to focus on critical investigation and remediation efforts. -
20
Microsoft Entra ID
Microsoft
Microsoft Entra ID (formerly known as Azure Active Directory) is a comprehensive identity and access management cloud solution that combines core directory services, application access management, and advanced identity protection. Safeguard your organization with a cloud identity and access management solution that connects employees, customers, and partners to their apps, devices, and data. Protect access to resources and data using strong authentication and risk-based adaptive access policies without compromising user experience. Provide a fast, easy sign-in experience across your multicloud environment to keep your users productive, reduce time managing passwords, and increase productivity. Manage all your identities and access to all your applications in a central location, whether they’re in the cloud or on-premises, to improve visibility and control. -
21
Automation Anywhere
Automation Anywhere
Automation Anywhere is the leader in Agentic Process Automation (APA), putting AI to work across organizations. The company’s platform is powered with specialized AI agents, generative AI, and offers process discovery, RPA end-to-end process orchestration, document processing and analytics, with a security and governance-first approach. Automation Anywhere empowers organizations worldwide to unleash productivity gains, improve customer experiences and create new revenue streams. The company is guided by its vision to fuel the future of work by unleashing human potential through Agentic AI-powered automation.Starting Price: $750.00 -
22
Devolutions Server
Devolutions
Devolutions Server (DVLS) is a self-hosted solution designed to streamline account and credential management across your organization. Without centralized control, teams often struggle with unsecured credentials, unauthorized access, and inconsistent security practices. DVLS addresses these issues by offering a secure, shared account and credential management platform with the ability to enforce access policies, manage user roles, and provide detailed auditing. DVLS also includes optional privileged access components for organizations that require more granular control over sensitive accounts. Fully integrated with Remote Desktop Manager, it offers a seamless way to manage credentials and remote sessions, ensuring that all access is secure and well-governed. Whether you’re a small team or a large enterprise, Devolutions Server simplifies credential management and improves security.Starting Price: $3/month/user -
23
Microsoft Sentinel
Microsoft
Standing watch, by your side. Intelligent security analytics for your entire enterprise. See and stop threats before they cause harm, with SIEM reinvented for a modern world. Microsoft Sentinel is your birds-eye view across the enterprise. Put the cloud and large-scale intelligence from decades of Microsoft security experience to work. Make your threat detection and response smarter and faster with artificial intelligence (AI). Eliminate security infrastructure setup and maintenance, and elastically scale to meet your security needs—while reducing IT costs. Collect data at cloud scale—across all users, devices, applications, and infrastructure, both on-premises and in multiple clouds. Detect previously uncovered threats and minimize false positives using analytics and unparalleled threat intelligence from Microsoft. Investigate threats with AI and hunt suspicious activities at scale, tapping into decades of cybersecurity work at Microsoft. -
24
SQL Server
Microsoft
Intelligence and security are built into Microsoft SQL Server 2019. You get extras without extra cost, along with best-in-class performance and flexibility for your on-premises needs. Take advantage of the efficiency and agility of the cloud by easily migrating to the cloud without changing code. Unlock insights and make predictions faster with Azure. Develop using the technology of your choice, including open source, backed by Microsoft's innovations. Easily integrate data into your apps and use a rich set of cognitive services to build human-like intelligence across any scale of data. AI is native to the data platform—you can unlock insights faster from all your data, on-premises and in the cloud. Combine your unique enterprise data and the world's data to build an intelligence-driven organization. Work with a flexible data platform that gives you a consistent experience across platforms and gets your innovations to market faster—you can build your apps and then deploy anywhere.Starting Price: Free -
25
WatchGuard Network Security
WatchGuard Technologies
Our products provide your security systems with complete, uncompromising visibility into your network. You will find that this helps to keep pace with increasing network speed and complexity, while gaining the insight needed to better detect and contain breaches, and achieve a rapid recovery. By implementing Network Critical solutions you can improve your existing security system's network performance, therefore increasing your ROI. Firstly, SPAN ports. These have been a long-term, insufficient, solution to network security. It is remarkably easy for hackers to infiltrate routers, switches and entire networks without detection. SPAN does not provide access to real-time information either, which is another key issue that may greatly affect your network's security. This is because SPAN ports groom your data, unlike Network TAPs, that act as a window, where you can look through at any time, in real-time. -
26
Microsoft Defender for Identity
Microsoft
Help Security Operations teams protect on-premises identities and correlate signals with Microsoft 365 using Microsoft Defender for Identity. Helps eliminate on-premises vulnerabilities to prevent attacks before they happen. Helps Security Operations teams use their time effectively by understanding the greatest threats. Helps Security Operations by prioritizing information so they focus on real threats, not false signals. Get cloud-powered insights and intelligence in each stage of the attack lifecycle with Microsoft Defender for Identity. Help Security Operations identify configuration vulnerabilities and get recommendations for resolving them with Microsoft Defender for Identity. Identity security posture management assessments are integrated directly with Secure Score for visibility. Prioritize the riskiest users in your organization using a user investigation priority score based on observed risky behavior and number of prior incidents. -
27
Jenkins
Jenkins
The leading open source automation server, Jenkins provides hundreds of plugins to support building, deploying and automating any project. As an extensible automation server, Jenkins can be used as a simple CI server or turned into the continuous delivery hub for any project. Jenkins is a self-contained Java-based program, ready to run out-of-the-box, with packages for Windows, Linux, macOS and other Unix-like operating systems. Jenkins can be easily set up and configured via its web interface, which includes on-the-fly error checks and built-in help. With hundreds of plugins in the Update Center, Jenkins integrates with practically every tool in the continuous integration and continuous delivery toolchain. Jenkins can be extended via its plugin architecture, providing nearly infinite possibilities for what Jenkins can do. Jenkins can easily distribute work across multiple machines, helping drive builds, tests and deployments across multiple platforms faster. -
28
IBM Aspera
IBM
IBM Aspera takes a different approach to tackling the challenges of big data movement over global WANs. Rather than optimize or accelerate data transfer, eliminates underlying bottlenecks by using its proprietary fasp technology that utilizes available network bandwidth to maximize speed and quickly scale up with no theoretical limit. Using fasp, transfers are secure end-to-end and are largely unaffected by file size, transfer distance, or network conditions, making transfer times up to 100Xs faster than TCP-based protocols. Aspera offers SaaS, on-prem, and hybrid solutions to meet the needs of modernizing infrastructures. All solutions offer robust security and compliance, intuitive file sharing, workflow automation, central administration, and real-time visibility. Quickly and easily initiate transfers across hybrid infrastructures, including support for cloud-to-cloud transfers. IBM Aspera offers unmatched transfer speeds, end-to-end security, reliability, and bandwidth control.Starting Price: $250.20/year -
29
AuthX
AuthX
The most advanced authentication platform in the world. Log in online anytime, anywhere with your face, finger, palm, push or any other modality we support. It’s secure authentication that is simple, smart and occasionally magical. Use Authx to on any system and into any application from anywhere. Use any capability to log in and change preferred methodology anytime you like. Authx is secure, scalable and extremely easy to use. Register once and use everywhere. Enjoy Authx with all the time-saving solutions you need to securely authenticate. Authx is always secure and reliable and our experts are here to support you 24/7. Use Authx Mobile for iOS and Android and push an authentication right to your phone. Log in with your Face, Finger or Palm. Authx Mobile enables you to authenticate with Push as well as biometrics on your phone. You can log into your applications with a simple touch of your access card or in range with BLE.Starting Price: $2.99 per month -
30
OneLogin
OneLogin
Secure critical company information and empower employees with OneLogin, a trusted identity and access management (IAM) solution for the modern enterprise. Designed to strengthen enterprise security while simplifying business logins, OneLogin is an excellent solution for companies looking to enforce security policies with ease. OneLogin includes top-rated features such as single sign-on (SS), unified directory, user provisioning, adaptive authentication, mobile identitiy, compliance reporting, and more. -
31
ServiceNow
ServiceNow
Digitize your workflows - they'll love you for it. Your company can be more productive and your people more engaged. ServiceNow makes work, work better for people. Transform old, manual ways of working into modern digital workflows, so employees and customers get what they need, when they need it—fast, simple, easy. ServiceNow delivers digital workflows that create great experiences and unlock productivity for employees and the enterprise. We simplify the complexity of work on a single, enterprise cloud platform. The Now Platform: The intelligent and intuitive cloud platform for work. Choose from our workflows or build your own apps. Built on the Now Platform, our product portfolio delivers the IT, Employee, and Customer Workflows that matter with enterprise solutions to help drive every part of your digital transformation. Create the great experiences you want and unlock the productivity you need, now with native mobile capabilities for everyday work across the enterprise.Starting Price: $100 per month -
32
Azure DevOps
Microsoft
Azure DevOps is a comprehensive set of modern development tools that help teams plan smarter, collaborate better, and deliver software faster. It provides services like Azure Boards for work tracking, Azure Pipelines for continuous integration and deployment, Azure Repos for Git-based source control, and Azure Test Plans for quality assurance. With built-in support for GitHub Copilot, developers can boost productivity by leveraging AI-assisted coding. The platform offers seamless integration with a variety of tools and supports any language, platform, or cloud environment. Azure DevOps emphasizes security with extensive compliance certifications and a dedicated engineering team. Trusted by leading global companies, it enables organizations to accelerate development cycles while maintaining high code quality and operational agility.Starting Price: $6 per user per month -
33
Advanced Web Application Firewall (WAF) protect your apps with behavioral analytics, proactive bot defense, and application-layer encryption of sensitive data. Use the ROI Estimator from F5 and Forrester to find out how Advanced WAF can improve your security posture and save you money. The F5 F5 BIG-IP Advanced WAF provides a powerful set of security features that will keep your Web Applications safe from attack. Many WAFs offer a basic level of protection from attack at the higher layers of the OSI stack, but the F5 Advanced WAF takes things even further and offers some serious security features like Anti Bot Mobile SDK, Credential Stuffing threat feeds, Proactive Bot Defense, and Datasafe to name a few. Protect your apps, APIs, and data against the most prevalent attacks such as zero-day vulnerabilities, app-layer DoS attacks, threat campaigns, application takeover, and bots.
-
34
SafeNet Trusted Access
Thales
SafeNet Trusted Access, Identity-as-a-Service. SafeNet Trusted Access is a cloud-based access management solution that makes it easy to manage access to both cloud services and enterprise applications with an integrated platform combining single sign-on, multi-factor authentication and scenario-based access policies. Businesses and organizations looking to accelerate the deployment of cloud services for end users encounter hurdles to efficiently managing online identities and access security, while ensuring user convenience and regulatory compliance. SafeNet Trusted Access simplifies user access to cloud services, streamlines cloud identity management, and helps eliminate password hassles for IT and users, while providing a single pane view of access events across your app estate to ensure that the right user has access to the right application at the right level of trust. -
35
CylanceENDPOINT
BlackBerry
For over a decade, Cylance® AI has been deployed by businesses and governments around the world, stopping both current and future zero-day attacks with validated accuracy. Now it also incorporates the intelligence of generative AI. Cylance® Assistant, our generative AI model trained on BlackBerry's award-winning cyber threat intelligence, helps you achieve more with less. It uses private LLMs for enhanced privacy and accuracy to proactively predict your needs and provide expert guidance. Included with CylanceENDPOINT™, this feature provides lightning-fast expert guidance to security analysts. The result: quicker investigations and efficient resolution of potential security threats.Starting Price: $29 per year -
36
Splunk Cloud Platform
Cisco
Turn data into answers with Splunk deployed and managed securely, reliably and scalably as a service. With your IT backend managed by our Splunk experts, you can focus on acting on your data. Splunk-provisioned and managed infrastructure delivers a turnkey, cloud-based data analytics solution. Go live in as little as two days. Managed software upgrades ensure you always have the latest functionality. Tap into the value of your data in days with fewer requirements to turn data into action. Splunk Cloud meets the FedRAMP security standards, and helps U.S. federal agencies and their partners drive confident decisions and decisive actions at mission speeds. Drive productivity and contextual insights with Splunk’s mobile apps, augmented reality and natural language capabilities. Extend the utility of your Splunk solutions to any location with a simple phrase or the tap of a finger. From infrastructure management to data compliance, Splunk Cloud is built to scale. -
37
SailPoint
SailPoint Technologies
You can’t do business without technology and you can’t securely access technology without identity security. In today’s era of “work from anywhere”, managing and governing access for every digital identity is critical to the protection of your business and the data that it runs on. Only SailPoint Identity Security can help you enable your business and manage the cyber risk associated with the explosion of technology access in the cloud enterprise – ensuring each worker has the right access to do their job – no more, no less. Gain unmatched visibility and intelligence while automating and accelerating the management of all user identities, entitlements, systems, data and cloud services. Automate, manage and govern access in real-time, with AI-enhanced visibility and controls. Enable business to run with speed, security and scale in a cloud-critical, threat-intensive world. -
38
Check Point CloudGuard
Check Point Software Technologies
The Check Point CloudGuard platform provides you cloud native security, with advanced threat prevention for all your assets and workloads – in your public, private, hybrid or multi-cloud environment – providing you unified security to automate security everywhere. Prevention First Email Security: Stop zero-day attacks. Remain ahead of attackers with unparalleled global threat intel. Leverage the power of layered email security. Native Solution, at the Speed of Your Business: Fast, straightforward deployment of invisible inline API based prevention. Unified Solution for Cloud Email & Office Suites: Granular insights and clear reporting with a single dashboard and license fee across mailboxes and enterprise apps. Check Point CloudGuard provides cloud native security for all your assets and workloads, across multi-clouds, allowing you to automate security everywhere, with unified threat prevention and posture management. -
39
SonicWall Capture Client
SonicWall
SonicWall Capture Client is a unified client platform that delivers multiple endpoint protection capabilities, including next-generation malware protection and application vulnerability intelligence. It leverages cloud sandbox file testing, comprehensive reporting, and enforcement for endpoint protection. Additionally, provide consistent assurance of client security, with easy-to-use and actionable intelligence and reporting. Examine files that are possibly waiting to activate in a cloud sandbox. Rely on dynamic white/blacklisting and cloud intelligence. Utilize advanced static analysis to identify threats during download. Exercise shared threat intelligence from SonicWall’s verdict database. View threat visualization maps to see where threats came from and went. Effortlessly understand your security posture. Catalog your applications and see which ones are vulnerable. -
40
Soffid IAM
Soffid
Soffid provides full Single Sign On experience and full identity and access management features by policy-based centralized orchestration of user identities. Everything delivered by a full open source solution. Improve user productivity with Soffid IAM. Soffid provides a single configuration tool for the administrator and provides an easy to use self service portal for the end users. One single tool for everyone to enhance user productivity! Increase IT internal and external security. Soffid uses state of the art security standards. Identity and Access Management provides a new vision on security, no longer based in the old school firewall vision, but centered in who, when and how is the user accessing specific resources to improve external and internal security. Increase IT flexibility. Soffid enables the option of managing all the IT assets not based on their location but based on who is accessing them. -
41
Cisco ACI
Cisco
Achieve resource elasticity with automation through common policies for data center operations. Extend consistent policy management across multiple on-premises and cloud instances for security, governance, and compliance. Get business continuity, disaster recovery, and highly secure networking with a zero-trust security model. Transform Day 2 operations to a more proactive model and automate troubleshooting, root-cause analysis, and remediation. Optimizes performance, and single-click access facilitates automation and centralized management. Extend on-premises ACI networks into remote locations, bare-metal clouds, and colocation providers without hardware. Cisco's Multi-Site Orchestrator offers provisioning and health monitoring, and manages Cisco ACI networking policies, and more. This solution provides automated network connectivity, consistent policy management, and simplified operations for multicloud environments. -
42
SecureAuth
SecureAuth
With SecureAuth, every digital journey is simple, seamless, and secure to support your Zero Trust initiatives. Protect employees, partners, and contractors with frictionless user experience while reducing business risk and increasing productivity. Enable your evolving digital business initiatives with simple, secure, unified customer experience. SecureAuth leverages adaptive risk analytics, using hundreds of variables like human patterns, device and browser fingerprinting, and geolocation to create each user’s unique digital DNA. This enables real-time continuous authentication, providing the highest level of security throughout the digital journey. Enable employees, contractors and partners with a powerful approach to identity security that simplifies adoption of new applications, accelerates efficiency, increases security and helps drive your digital initiatives. Use insights and analytics to drive digital initiatives and speed up the decision making process.Starting Price: $1 per month -
43
Axonius
Axonius
Axonius gives customers the confidence to control complexity by providing a system of record for all digital infrastructure. With a comprehensive understanding of all assets including devices, identities, software, SaaS applications, vulnerabilities, security controls, and the context between all assets, customers are able to mitigate threats, navigate risk, decrease incident response time, automate action, and inform business-level strategy — all while eliminating manual, repetitive tasks. Recognized as creators of the Cyber Asset Attack Surface Management (CAASM) category and innovators in SaaS Management Platform (SMP) and SaaS Security Posture Management (SSPM), Axonius is deployed in minutes and integrates with hundreds of data sources to provide a comprehensive asset inventory, uncover gaps, and automatically enforce policies and automate action. -
44
Ping Identity
Ping Identity
Ping Identity builds identity security for the global enterprise with an intelligent identity platform that offers comprehensive capabilities including single sign-on (SSO), multi-factor authentication (MFA), directory, and more. Ping helps enterprises balance security and user experience for workforce, customer, and partner identity types with a variety of cloud deployment options including identity-as-a-service (IDaaS), containerized software, and more. Ping has solutions for both IT and developer teams. Enable digital collaboration with simple integrations to these popular tools. Support your employees wherever they are with integrations to these popular tools. Deploy quickly with interoperability across the entire identity ecosystem. Whether you just want single sign-on (SSO) or a risk-based, adaptive authentication authority, starting off with a PingOne solution package lets you only pay for what you need, and gives you room to grow.Starting Price: $5 per user per month -
45
ESET Cyber Security
ESET
Fast and powerful security without slowdowns, against all types of malware. Secures Mac, Windows and Linux devices. Protects you against all types of malware, including viruses, ransomware, worms and spyware. Enjoy the full power of your computer. Play, work and browse the internet without slowdowns. Easy to install, renew and upgrade, our security is also designed for simple set up of all routine tasks. We value your loyalty! Renewing ESET takes a few clicks and you are settled. Download and use your existing license key to activate your software. Update your subscription preferences and eStore account information. Protect yourself from ransomware and other types of malware with ESET's time-proven multilayered protection, trusted by over 110 million users worldwide. Play, work and browse the internet without slowdowns. Stay unplugged and online longer with battery-saving mode, and enjoy gaming without distracting pop-ups.Starting Price: $39.99 per year -
46
InsightCloudSec
Rapid7
You transform your business, we’ll keep your cloud services secure. InsightCloudSec enables you to drive innovation through continuous security and compliance. Achieve continuous security and compliance and prevent misconfigurations through unified visibility and monitoring and real-time automated remediation. Secure configurations and workloads through automated cloud security and vulnerability management across dynamic cloud environments. Manage identity and effective access across ephemeral resources, at scale. InsightCloudSec is a fully-integrated cloud-native security platform, your whole cloud security toolbox in a single solution. Consumer privacy (or the lack thereof) is a huge societal concern and the focus on protecting privacy is manifesting itself through many forms, including regulations like the California Consumer Privacy Act and General Data Protection Regulation.Starting Price: $66,000 per year -
47
Omada Identity Suite
Omada
Omada is a global leader in IGA, offering innovative, user-centric solutions to manage and secure digital identities. Omada Identity Cloud delivers a simplified, yet powerful IGA experience leveraging intelligent automation and Gen AI/ML capabilities to enhance security, compliance, and efficiency. Omada empowers organizations with advanced analytics and comprehensive visibility, enabling informed decisions about access rights and identity management. By automating key processes, Omada helps businesses reduce risk exposure, optimize operations, and maintain compliance while streamlining administration to reduce IT costs and improve overall security posture. With Omada, organizations can effectively manage modern identity challenges, ensuring the right people have the right access to the right resources at the right time. -
48
ACTIVE Camps
ACTIVE Camps
ACTIVE Camps is a cutting-edge cloud-based camp management software that delivers online registration, marketing, and communications solutions within a suite. Designed for camps of all sizes, ACTIVE Camps helps users make smart, data-driven decisions while helping them deliver great experiences to their campers and families. The user-friendly online registration feature enables users to easily manage camp registration from the website through customizable forms. Other key features include secure online payment processing, waitlist option, easy follow-up form tracking, multiple payment options, automated confirmation emails, among others. -
49
Rapid7 Incident Command
Rapid7
Rapid7 Incident Command is an AI-powered next-generation SIEM designed to deliver unified visibility and faster threat response across modern attack surfaces. It brings together logs, telemetry, asset context, and threat intelligence into a single, actionable view across cloud, SaaS, endpoints, and hybrid environments. Incident Command uses AI-driven behavioral detections and alert triage to cut through noise and surface the threats that matter most. Every alert is enriched with exposure, vulnerability, asset risk, and third-party intelligence to guide decisive action. Built-in SOAR automation and guided AI response workflows help reduce dwell time and accelerate containment. The platform supports advanced investigations with natural language search, attack path reconstruction, and MITRE ATT&CK alignment. Rapid7 Incident Command enables security teams to scale their SOC with speed, clarity, and confidence. -
50
TeleSign
TeleSign
Deliver timely, personalized information through global SMS/RCS and voice cloud communications. Gain a deeper understanding of your customers from actionable global phone number and subscriber data intelligence. Code once and message your customers at scale using TeleSign’s Messaging API - complete with waterfall delivery between channels. TeleSign Messaging API includes SMS, RCS, and WhatsApp to help you build secure digital communications that connect you with your customers anywhere in the world. Integrate a single Messaging API and start sending reliable, secure SMS, RCS and WhatsApp messages to your customers today. Choose one or all three channels to broaden your programmable messaging strategy and expand your audience. Reach more customers with 120+ optimized points-of-presence and 700+ direct-to-carrier routes.