70 Integrations with Fortinet SD-WAN
View a list of Fortinet SD-WAN integrations and software that integrates with Fortinet SD-WAN below. Compare the best Fortinet SD-WAN integrations as well as features, ratings, user reviews, and pricing of software that integrates with Fortinet SD-WAN. Here are the current Fortinet SD-WAN integrations in 2026:
-
1
VEEUE
ADCom Solutions
VEEUE is an enterprise-class PaaS designed to monitor and manage every circuit and device within medium to enterprise size companies. Built on ServiceNow®, Zenoss®, LogicMonitor®, and Sisense, VEEUE is 100% carrier and manufacture agnostic and provides unparalleled observability and management capability in one single pane of glass from anywhere in the world. VEEUE is backed by a 24x7x365 US-based NOC. The platform extracts metrics from over 250 manufacturers, systems, and device types leveraging standard APIs and protocols including SNMP, WinRM and SSH. VEEUE™ correlates information across your environment to provide clear visualization of connected components by the services they support. See the state of all IT services and predict which ones could be impacted by events or outages from a single dashboard. We designed VEEUE™ to be a complete managed services solution that simplifies your complex world of IT.Starting Price: $5.29 MRR -
2
SparkView
beyond SSL
Fast, secure and reliable remote access to desktops, applications and servers. SparkView offers a simple and secure way to connect untrusted devices to your desktops and applications. The ZTNA solution with no installation on the client provides secure remote access from any device with a browser. All via HTML5 technology. The solution for remote office / mobile work and home office. Best web RDP client - advantages of SparkView: - ZTNA compliant remote access to applications, desktops and servers - Access from any device with browser (e.g. Chrome, Firefox, Edge, Opera, Safari, etc.) - No installation on clients or the target systems - One central point for administration, security and authorization - HTML5 technology - Flexible, stable and scalable - Low support and management overhead - Supports common protocols such as RDP, SSH, Telnet, VNC and HTTP(S) - No Java, no Flash, no ActiveX, no plugin, no rolloutStarting Price: $60 per year -
3
Netreo
Netreo
Netreo is the most comprehensive full stack IT infrastructure management and observability platform. We provide a single source of truth for proactive performance and availability monitoring for large enterprise networks, infrastructure, applications and business services. Our solution is used by: - IT Executives to have full visibility from the business service right down into the infrastructure and network that supports it. - IT Engineering departments as a decision support system for capacity planning, and architecting modern solutions. - IT Operations teams for real time visibility into what is failing in their environment, what bottlenecks exist and who it is affecting. We provide all of these insights for systems and vendor mixes in large heterogeneous and constantly evolving environments. We have an extensive and growing list of supported vendors (over 350 integrations) including network vendors, servers, storage, virtualization, cloud platforms and others.Starting Price: $5/resource/mo -
4
Fortinet
Fortinet
Fortinet is a global leader in cybersecurity solutions, known for its comprehensive and integrated approach to safeguarding digital networks, devices, and applications. Founded in 2000, Fortinet provides a wide range of products and services, including firewalls, endpoint protection, intrusion prevention systems, and secure access solutions. At the core of its offerings is the Fortinet Security Fabric, a unified platform that seamlessly integrates security tools to deliver visibility, automation, and real-time threat intelligence across the entire network. Trusted by businesses, governments, and service providers worldwide, Fortinet emphasizes innovation, scalability, and performance, ensuring robust defense against evolving cyber threats while supporting digital transformation and business continuity. -
5
SIRP
SIRP
SIRP is an AI-native Autonomous SOC platform. Not a SOAR upgrade. A replacement for the architecture that made SOAR necessary in the first place. Where legacy SOAR executes static playbooks, SIRP deploys AI agents that analyze alerts, compute risk, and execute response decisions autonomously, within defined policy boundaries, with full audit coverage. No manual triage. No static playbook logic. No human in the loop for routine Tier-1 cases. The platform learns from every outcome. Detection gets sharper. Response gets faster. The SOC operates at machine speed without surrendering governance or control on decisions that warrant human judgment. Built for enterprise SOC teams and MSSPs that are done waiting for a copilot to tell them what to do. -
6
LoginTC
Cyphercor
Cyphercor is a two factor authentication provider that offers a best-in-class solution that's effortless, intuitive, and cost-effective called "LoginTC". LoginTC adds an additional layer of security to your systems and applications including VPNs, Firewalls, remote desktop, active directory, and more with it's innovative 2fa software. LoginTC offers a wide range of two factor options for end-users to authenticate, including SMS, email, push notifications, hardware tokens, U2F, OTP, bypass codes, and more. LoginTC was built with the principle that administrators are users too, and offers a solution that's not just easy for end users day-to-day, but is also simple for administrators to manage and setup. In fact, if you aren't set-up in one hour, the first month of your subscription is on us. LoginTC can help you reduce your insurance costs and meet compliance regulations with ease.Starting Price: $3/month/user -
7
Alibaba Cloud SSL Certificates Service
Alibaba Cloud
Alibaba Cloud SSL Certificates Service allows customers to directly apply, purchase and manage SSL certificates on Alibaba Cloud. This service is offered in cooperation with qualified certificate authorities. From this platform, customers can select the expected certificate authority and its certificate products to enjoy full-site HTTPS security solutions. Manage digital certificates on a unified platform for optimal cost efficiency. Supports all mainstream Linux and Windows operating systems, Alibaba Cloud network, VPC, hybrid cloud, and conventional IDC environments. Implement full-site HTTPS at minimum cost with one single platform to manage a number of digital certificates that can be applied to multiple Alibaba Cloud services. View certificates used by various cloud businesses and manage your own certificate orders on a unified platform.Starting Price: $199 per year -
8
Alibaba Cloud Anti-Bot Service
Alibaba Cloud
Anti-Bot Service provides comprehensive bot defense for Web applications, HTML5 websites, mobile apps, and APIs. It can effectively reduce the risks caused by specific vulnerabilities. You can use Anti-Bot Service in the following scenarios: flight seating occupancy, online scalping, user enumeration, and core API exploitation. Anti-Bot Service is a reverse proxy technology based SaaS solution that allows you to specify custom protection policies to identify and control malicious traffic. You can also view the protection status in the console. Provides comprehensive anti-bot protection that covers the Web, mobile apps, and APIs. Get protection with simple access configurations, no code change required on the server side. Provides large amounts of security threat information on the cloud and timely updates protection policies against attacks. Identifies and filters malicious traffic without affecting the user experience.Starting Price: $707.55 per month -
9
Aruba Cloud Monitoring
Aruba Cloud
With the Cloud Monitoring service, it is possible to monitor all your websites, Cloud Servers, dedicates servers whether they are hosted in the Aruba Cloud data centers or with other providers. In cases of failures or errors detected in the monitored resource or service, Cloud Monitoring will automatically and immediately send you a notification via email or SMS, so you can always know the progress of your infrastructure in real time and if need be, take action as soon as possible. By using the charts found in the Cloud Monitoring control panel you can quickly register and analyze all the activity of the monitored services, and easily identify any problem and see how it repeats during the course of time. Through the Cloud Monitoring Control Panel, it is possible to setup checks and alerts to warn you when a service is not active. All of this makes Cloud Monitoring an essential service for managing your services.Starting Price: €2.99 per month -
10
Elastic Observability
Elastic
Rely on the most widely deployed observability platform available, built on the proven Elastic Stack (also known as the ELK Stack) to converge silos, delivering unified visibility and actionable insights. To effectively monitor and gain insights across your distributed systems, you need to have all your observability data in one stack. Break down silos by bringing together the application, infrastructure, and user data into a unified solution for end-to-end observability and alerting. Combine limitless telemetry data collection and search-powered problem resolution in a unified solution for optimal operational and business results. Converge data silos by ingesting all your telemetry data (metrics, logs, and traces) from any source in an open, extensible, and scalable platform. Accelerate problem resolution with automatic anomaly detection powered by machine learning and rich data analytics.Starting Price: $16 per month -
11
Armis Centrix
Armis
Armis Centrix™ is a comprehensive cyber exposure management platform that provides continuous, real-time visibility and protection across IT, OT, IoT, and IoMT environments. Powered by the Armis AI-driven Asset Intelligence Engine, it identifies every connected device, assesses cyber risk, and monitors vulnerabilities across an organization’s entire digital attack surface. The platform automates risk scoring, streamlines compliance reporting, and supports rapid incident response through deep asset intelligence. With capabilities that span asset management, OT/IoT security, medical device protection, and early warning threat detection, Armis Centrix™ enhances operational resilience for modern enterprises. VIPR Pro adds advanced prioritization and remediation to connect findings directly to actionable fixes. Designed as a cloud-native, frictionless platform, Armis Centrix™ empowers organizations to reduce exposure, strengthen security posture, and maintain continuity at scale. -
12
Expel
Expel
We create space for you to do what you love about security (even if it's not thinking about it). Managed security: 24x7 detection, response, and resilience. We spot attacks and provide immediate answers. Recommendations are specific and data-driven. Transparent cybersecurity, no more MSSPs. No “internal analyst console.” No curtain to look (or hide) behind. No more wondering. Full visibility, see and use the same interface our analysts use. Get a real-time look at how we're making critical decisions. Watch investigations unfold. When we spot an attack, we’ll give you answers, written in plain English, that tell you exactly what to do. See exactly what our analysts are doing, even as an investigation is unfolding. You choose your own security tech. We make it work harder. Resilience recommendations measurably improve your security. Our analysts provide specific recommendations based on data from your environment and past trends. -
13
Trustwave DbProtect
Trustwave
A highly scalable database security platform that enables organizations to secure their relational databases and big data stores, both on premises and in the cloud, with a distributed architecture and enterprise-level analytics. Databases contain sensitive and proprietary information, making them a prized target for cybercriminals who are constantly looking for ways to access valuable data for large financial payoffs. Trustwave DbProtect helps your business overcome resource limitations to uncover database configuration errors, access control issues, missing patches, and other weaknesses that could lead to data leakage and misuse and other serious repercussions. A real-time view of database assets, vulnerabilities, risk levels, user privileges, anomalies and incidents via a single intuitive dashboard. The ability to detect, alert and take corrective action against suspicious activities, intrusions and policy violations. -
14
Spoom
Spoom
Do you really have the overview? Different reports are created throughout the company, data and statistics are kept up to date and a lot of time is spent on this. Sales, marketing, customer service, production, HR, they all have their reportings & KPIs, but what do you do with all these data? Does every stakeholder get to see it? Do you remember why you track all these data? Can you see the impact of these KPIs on your companies goals & vision? And above all, does everyone know about its existence? Make connections between different data that were previously spread across different departments. Visualize the impact of KPIs on your companies goals and vision, and discover new opportunities. Create clarity when you and your employees need it most and see the impact of data on your future business, company and teams. Make sure everybody is on the same page and every action taken by your employees can be linked to your strategy.Starting Price: €40 per user per month -
15
Qualys WAS
Qualys
Robust cloud solution for continuous web app discovery and detection of vulnerabilities and misconfigurations. Fully cloud-based, it’s easy to deploy and manage, and scales to millions of assets. WAS finds and catalogs all web apps in your network, including new and unknown ones, and scales from a handful of apps to thousands. With Qualys WAS, you can tag your applications with your own labels and then use those labels to control reporting and limit access to scan data. WAS’ dynamic deep scanning covers all apps on your perimeter, in your internal environment and under active development, and even APIs that support your mobile devices. It also covers public cloud instances, and gives you instant visibility of vulnerabilities like SQLi and XSS. Authenticated, complex and progressive scans are supported. With programmatic scanning of SOAP and REST API services, WAS tests IoT services and APIs used by mobile apps and modern mobile architectures. -
16
AuthPoint
WatchGuard
Our unique multi-factor authentication (MFA) solution not only helps to reduce the likelihood of network disruptions and data breaches arising from lost or stolen credentials, but we deliver this important capability entirely from the Cloud for easy set-up and management. AuthPoint goes beyond traditional 2-Factor Authentication (2FA) by considering innovative ways to positively identify users, and our large ecosystem of 3rd party integrations means that you can use MFA to protect access. Ultimately, WatchGuard AuthPoint is the right solution at the right time to make MFA a reality for the businesses who desperately need it to block attacks. AuthPoint uses a push message, QR code, or one-time password (OTP) as an additional factor proving your identity, and our mobile device DNA matches the authorized user’s phone when granting access to systems and applications. Therefore, any attacker who clones a user’s device in an attempt to access a protected system would be blocked. -
17
GigaSECURE
Gigamon
The GigaSECURE® Security Delivery Platform is a next-generation network packet broker focused on threat prevention, detection, prediction and containment. The right tools get the right traffic at the right time, every time. Enable network security tools to keep up with increasing network speed. Gain insight into network traffic. Optimize and deliver relevant data for tool consumption. Reduce tool sprawl and lower costs. Efficient prevention coupled with rapid detection and containment improves your overall security posture. Threats don't stand a chance. GigaSECURE enables security teams to obtain broad access to and control of network data, no matter where it resides. It can be customized to extract specific application sessions, metadata and decrypted traffic. In this architecture, security tools can operate inline or out-of-band at peak performance without compromising network resiliency or speed. -
18
PowerTerm InterConnect
Ericom
The PowerTerm InterConnect Series is comprised of several robust terminal emulation applications supporting the host access needs of large and small organizations. It allows enterprises to standardize on a single host access solution. PowerTerm InterConnect products provides fast and reliable access to data residing on the broadest range of hosts, such as IBM Mainframe zSeries, IBM AS/400 iSeries, UNIX, OpenVMS, Tandem, HP. Each of the PowerTerm InterConnect products enables terminal emulation via various communication modes. PowerTerm InterConnect offers a flexible and extensive feature set to maximize users' time while providing a wide range of options. Using Power Script Language, users can automate tasks and increase efficiency. PowerTerm InterConnect's small footprint makes it a simple, fast and effective means of running legacy applications and it is easily installable on any PC. -
19
PowerTerm Pro
Ericom
The PowerTerm Pro Series is Ericom Software's premier terminal emulation solution for Windows that simplifies and extends legacy access functionality. Supporting a diverse range of hosts and emulation types, PowerTerm Pro enables corporations to standardize on a single host access solution. Featuring a customizable GUI, SSL, SSH and secure file transfer (SFTP), PowerTerm Pro and PowerTerm Pro Enterprise offer a number of options, so corporations can choose the PowerTerm Pro product that meets their host, security, server and productivity needs. Easy-to-use intuitive GUI (graphic user interface) enables users to do their work quickly and efficiently, with drag-and-drop tools for quick data accessibility and AS/400 DFT for easy file transfer between PC and AS/400 host. PowerTerm Pro terminal emulation software is installed on a central server and accessed via a Windows desktop with per-user licensing. -
20
Aruba Jelastic Cloud
Aruba Cloud
Jelastic Cloud is a Cloud service that offers maximum scalability of virtualized resources thanks to the combination of the PaaS (Platform as a Service) and CaaS (Container as a Service) models. Container technology is based on the use of micro clouds called cloudlets, with 128MB of RAM and 400MHz of vCPU, which can be used directly within the Jelastic platform. The service is available on a pay-per-use basis and preconfigured plans with monthly fees. Jelastic Cloud lets you create, change and clone your chosen environment in seconds. The infrastructure takes shape in real-time thanks to the virtualization of resources (storage, servers, load balancers, databases etc.) and the many technologies available (Docker, Ruby, PHP, Java, etc.) Jelastic Cloud allows different pricing models, as well as various flat-rate options, a pay-per-use option is also available, which means you can take advantage of platform scalability while only paying for the resources you actually use.Starting Price: €0.0040 per hour -
21
LOGIQ
LOGIQ.AI
LOGIQ.AI’s LogFlow provides centralized control of your observability data pipelines. As data streams arrive, they are automatically organized and optimized for your business teams and knowledge workers. XOps teams can centralize data flow management, gain data EPS control, and increase data quality and relevance. Built on any object store, LogFlow’s InstaStore enables infinite data retention and on-demand data replay to any target observability platform of your choice. Analyze operational metrics across applications and infrastructure and gain actionable insights that help you scale with confidence while maintaining high availability. Fuel business decisions and better user experiences by collecting, transforming, and analyzing behavioral data and usage patterns from business systems. Don’t let new attack techniques catch you off guard. Detect and analyze threat patterns from multiple sources and automate threat prevention and remediation. -
22
Zentry
Zentry Security
Least privileged application access with consistent security for any user, anywhere. Transient authentication provides granular, least-privileged access to mission-critical infrastructure. Zentry Trusted Access provides clientless, browser-based, streamlined zero-trust application access for small to medium-sized enterprises. Organizations see gains in security posture and compliance, a reduced attack surface, and greater visibility into users and applications. Zentry Trusted Access is a cloud-native solution that is simple to configure, and even simpler to use. Employees, contractors, and third parties just need an HTML5 browser to securely connect to applications in the cloud and data center, no clients are needed. Leveraging zero trust technologies like multi-factor authentication and single sign-on, only validated users obtain access to applications and resources. All sessions are encrypted end-to-end with TLS, and each is governed by granular policies. -
23
BugZero
BugZero
BugZero decreases risk and increases IT operational intelligence by integrating your ITSM tool to collect, filter, correlate, and track non-security bugs specific to your vendor products. Vendor operational bugs are an ongoing problem for every IT organization. These bugs, embedded in virtually every critical system, threaten business productivity and profitability. Precisely maps all applicable software and firmware bugs to each device or system in your organization. Eliminates the “noise” of less important bugs by selecting the bug severity levels that will trigger tickets in your ITSM tool. Delivers visibility into the presence, criticality, and risks of vendor bugs residing in the infrastructure. Ensures accurate and up-to-date operational bug data by taking action on bugs as soon as they are published by vendors. The solution is up, running, and reporting on vendor operational bug data within hours. -
24
Link
Link
Find the perfect available domain name or transfer your domain to one of our hosting plans. We offer plans to suit everyone from the small business owner to operators of multiple websites with high-volume traffic. Everything you need to create the perfect website. Choose a website design template, or your very own design. If you already have a website, you can easily transfer it to one of our hosting plans. We are with you every step of the way. Find or transfer your domain name, build your site, and make it a success. Bare Metal servers provide performance, flexibility, on-demand provisioning, and control. Link is an easy-to use virtual private server (VPS) that offers you everything needed to quickly deploy and start business. Flash backed local disk performance with persistence and durability. Give your website an added layer of security and credibility with an SSL certificate. give your business a truly professional look with a personalized email.Starting Price: $2.99 per month -
25
FortiGate Cloud
Fortinet
FortiGate Cloud simplifies network operations for Fortinet FortiGate and the connected devices, FortiSwitch, FortiAP, and FortiExtender for initial deployment, setup, and ongoing maintenance. FortiGate Cloud brings enterprise-grade analytics and reporting for small to medium-sized businesses enabling organizations of all sizes complete visibility into their attack surface. FortiGate Cloud is a cloud-based software-as-a-service (SaaS) offering a range of management, reporting, and analytics for FortiGate next-generation firewalls. FortiGate Cloud simplifies the initial deployment, setup, and ongoing management of FortiGate with SD-WAN functions, FortiSwitch, FortiAP, and FortiExtender with zero-touch provisioning, providing you with visibility of your entire deployment. FortiGate Cloud grows with your requirements from a single FortiGate to a complete managed security services management solution for thousands of devices across multiple customers. -
26
FortiGSLB Cloud
Fortinet
FortiGSLB Cloud is a DNS-based service that helps to ensure business continuity by keeping an application online and available when a local area experiences unexpected traffic spikes or network downtime. FortiGSLB enables you to deploy redundant resources around the globe to maintain the availability of your business-critical applications. FortiGSLB enables you to deploy redundant resources around the globe to maintain the availability of your business-critical applications. Provides load-sharing and failover functionality with a reach and level of resiliency that exceeds that of traditional device-based solutions. Offers multisite application visibility with advanced application testing. Provides primary authoritative DNS server with standard DNS type zone, A/AAAA, NS, CNAME, MX, TXT, PTR, SRV, and advanced security function DNSSEC. FortiGSLB integrates with Fortinet products, such as FortiADC and FortiGate. -
27
FortiAIOps
Fortinet
FortiAIOps delivers proactive visibility and speeds IT operations, powered by AI. FortiAIOps is an artificial intelligence with machine learning (AI/ML) solution for Fortinet networks. This ensures quick data collection and identification of network anomalies. Fortinet network devices (FortiAPs, FortiSwitches, FortiGates, SD-WAN, FortiExtender) across the network feed the FortiAIOps dataset, enabling insights and event correlation for the network operations center (NOC). Enable visibility into your network across the full OSI stack. For example, get Layer 1 information, such as full RF spectrum analysis to understand interference on your Wi-Fi network. And, get Layer 7 application information that allows you to see what applications are traversing your Ethernet and your SD-WAN connections. Utilize a suite of troubleshooting tools to probe the network and understand diagnose issues. VLAN probing, cable verification, spectrum analysis, service assurance, and more. -
28
FortiMonitor
Fortinet
FortiMonitor modernizes network monitoring to enable end-to-end visibility into the overall user experience. FortiMonitor is a comprehensive, SaaS-based digital experience monitoring (DEM) platform that helps organizations modernize their performance-monitoring tools. It provides visibility into endpoint application performance and digital experience, no matter where the user resides or where the application is hosted. See how FortiMonitor empowers NetOps teams with end-to-end network and application performance monitoring that helps improve customer and employee digital experience. SD-WAN underlay monitoring enables DEM insights across active SD-WAN members, surfacing user-level metrics on application reachability. Metrics on SSL resolution time, DNS resolution time, time to first byte, time to last byte, and RTT, plus standard packet loss, delay, and jitter, are delivered per underlay. -
29
FortiVoice
Fortinet
FortiVoice and FortiFone deliver simplified communications with integrated calling, conferencing, chat, fax, and mobility. Fortinet offers enterprise-grade phone systems, combining the all-inclusive FortiVoice system and HD-audio FortiFone. This solution helps organizations keep up with changing communication needs due to evolving infrastructure, remote/hybrid work, and BYOD. Our single platform with integrated calling, conferencing, chat, fax, and mobile support empowers organizations to connect teams and streamline modern communications without increasing resources and costs. FortiVoice delivers a rich set of communications and security features in one intuitive platform to simplify management across offices, devices, and users. FortiVoice is easy to deploy and customize to align with your business workflow for optimal operational efficiency. Built on the latest security and encryption technologies, FortiVoice secure UC protects business conversations, and safeguards information. -
30
Comarch EDI
Comarch
Comprehensive and secure platform for B2B collaboration in a supply chain. The Comarch EDI platform provides data exchange with every business partner. In relation to technological advancement and the volume of documents we recommend a solution tailored to the business needs of your company. We provide a number of functionalities that will streamline communication with business partners. A GDSN-certified catalog that facilitates management of product data exchanged with many business partners worldwide that makes it possible to define several attributes – both general and available for a particular business partner. This functionality ensures high quality of data and coherence throughout the entire value chain. The solution for optimizing processes in a supply chain. It enables effective communication with logistics operators and guarantees fast and secure data flow and access to the current status of a logistic process. -
31
Oracle Big Data Discovery
Oracle
Oracle Big Data Discovery is a stunningly visual, intuitive product that leverages the power of Hadoop to transform raw data into business insight in minutes, without the need to learn complex tools or rely only on highly specialized resources. With Oracle Big Data Discovery, customers can easily find relevant data sets in Hadoop, explore the data and quickly understand its potential, transform and enrich data to make it better, analyze the data to discover new insights, share results and publish back to Hadoop for use across the enterprise. In your organization, use BDD as the center of your data lab, as a unified environment for navigating and exploring all of your data sources in Hadoop, and to create projects and BDD applications. In BDD, a wider number of people can work with big data, compared with traditional analytics tools. You spend less time on data loading and updates, and can focus on actual data analysis of big data. -
32
Microland
Microland Limited
Cyber-resilience has never been more difficult or more critical. We all know it: an organization can suffer a critical breach at any moment and the response will make or break a business's reputation. Once a malicious attack has been identified, it takes several days to counter the threat. Meanwhile: data privacy and protection are compromised, and your future is at stake. Microland's 24/7 Security Operations Centers (SOCs) deliver services to predict and respond to security breaches. Our nextGen SOC operations relentlessly monitor cyber threats, securing your expanding digital footprint all the way to the edge. If you’ve already been breached, we provide a swift path to resolution. You can’t move forward if you’re constantly looking over your shoulder. Microland secures your digital journey against threats, so you can focus on the future. Best-of-breed tools and IPs secure all points along a digital journey protecting data regardless of how and where it is processed and manipulated. -
33
Vectra AI
Vectra
Vectra enables enterprises to immediately detect and respond to cyberattacks across cloud, data center, IT and IoT networks. As the leader in network detection and response (NDR), Vectra uses AI to empower the enterprise SOC to automate threat discovery, prioritization, hunting and response. Vectra is Security that thinks. We have developed an AI-driven cybersecurity platform that detects attacker behaviors to protect your hosts and users from being compromised, regardless of location. Unlike other solutions, Vectra Cognito provides high fidelity alerts instead of more noise, and does not decrypt your data so you can be secure and maintain privacy. Today’s cyberattacks will use any means of entry, so we provide a single platform to cover cloud, data center, enterprise networks, and IoT devices, not just critical assets. The Vectra NDR platform is the ultimate AI-powered cyberattack detection and threat-hunting platform. -
34
Medigate
Medigate
Healthcare’s Security and Clinical Analytics Company. #1 IoT device security solution designed for Healthcare. Medigate has invested in building out the largest medical device and protocol database so you can have the most detailed device inventories and accurate threat detection available. Medigate offers the industry’s only truly dedicated medical device security platform that identifies and protects all Internet of Medical Things (IoMT) devices connected to a healthcare provider’s network. Unlike general IoT solutions, we’ve built our cyber security platform specifically and only for the unique needs of medical devices and clinical networks. Our solution safeguards clinical networks from all angles by providing complete visibility into all connected medical devices to identify risk based on clinical context, detect anomalies according to manufacturers’ protocols and actively block malicious activities by integrating into your existing firewalls or NAC. -
35
The Respond Analyst
Respond
Accelerate investigations and improve analyst productivity with a XDR Cybersecurity Solution. The Respond Analyst™, an XDR Engine, automates the discovery of security incidents by turning resource-intensive monitoring and initial analysis into thorough and consistent investigations. Unlike other XDR solutions, the Respond Analyst connects disparate evidence using probabilistic mathematics and integrated reasoning to determine the likelihood that events are malicious and actionable. The Respond Analyst augments security operations teams by significantly reducing the need to chase false positives resulting in more time for threat hunting. The Respond Analyst allows you to choose best-of-breed controls to modernize your sensor grid. The Respond Analyst integrates with the leading security vendor offerings across important categories such as EDR, IPS, Web Filtering, EPP, Vulnerability Scanning, Authentication, and more. -
36
ARIA SDS Packet Intelligence
ARIA Cybersecurity Solutions
The ARIA Packet Intelligence (PI) application gives OEMs, service providers, and security professionals a better way to use SmartNIC technology to support two important use cases: advanced packet-level network analytics and cyber-threat detection, response, and containment. Network analytics: ARIA PI provides complete visibility into all network traffic and feeds valuable analytics data to packet delivery accounting tools, quality of service systems, and SLA monitoring applications. All of this helps companies provide better service and maximize revenues tied to usage-based billing. Cyber-threat detection, response, and containment: ARIA PI also feeds metadata to threat detection tools for complete visibility into all network traffic, including east-west data flows. This improves the effectiveness of existing security solutions, such as SIEMs and IDS/IPS tools, and gives security teams a better way to detect, respond, contain, and remediate even the most advanced cyber threats. -
37
SecureW2
SecureW2
Even for organizations under 500 employees, a 2020 IBM report found credential compromise averaged $2.35M in costs. Eliminate the threat by using x.509 certificates for Wi-Fi, VPN, Web Apps, Endpoint Login & more. Leverage your existing Wi-Fi, Web, Firewall and VPN infrastructure with zero technology forklift upgrades. With SecureW2, you can verify that only trusted users and devices can access your network and applications. Enabling 802.1x in the cloud has never been easier. SecureW2 provides everything you need to use your Azure, Okta, or Google to enroll and manage certificates for secure Wi-Fi authentication. Plus it comes with the World’s only Dynamic Cloud RADIUS server, giving you everything you need for secure WPA2-Enterprise network authentication. Onboard every major operating system with ease and deliver secure connections with no IT burden. Secure your network with certificates using the generation, delivery, authentication and renewal technology. -
38
SmartShare
EASI
The flexible Collaboration Suite for efficient teams. SmartShare brings all crucial information about what's going on together in one single, centralized system. The famous Company Overview feature shows all possible information about a customer in one single screen: ongoing projects, deals, contracts, offerings, etc. SmartShare brings structure in the way people work and share information. Collaboration between colleagues and teams is drastically improved thanks to the centralization of information in the shared environment. Customers report a time gain of 1h per day per employee. An advanced integrated access rights management system allows to make sure that information is only accessible to persons with sufficient access rights. Access rights can be managed at multiple level: individual, team, binder, project, document, etc. Emails are managed in the shared environment, which brings a huge productivity gain and efficient collaboration. -
39
RapidScale Identity as a Service
RapidScale
RapidScale’s Identity as a Service (IDaaS) is ideal for organizations wrestling with making network access easy for staff, without compromising security. Built on the backbone of Azure Active Directory, our IDaaS solution provides potent security out of the box. Protect your critical data and applications no matter where they’re located – in cloud, hosted or on-premises environments. We have options supporting single sign-on (SSO), multi-factor authentication (MFA), password synchronization, and much more. It’s easy to make your login security even stronger with our options for identity services. Employ advanced password sync functions like user password reset and changing, writeback and more, along with a wealth of other services so you can control access more finitely. It’s easy to manage your IDaaS services through our full-service portal, along with your other RapidScale solutions. Alternately, let us manage your IDaaS deployment for you. -
40
Proofpoint Adaptive Email Security
Proofpoint
Proofpoint's Adaptive Email Security provides advanced, integrated protection against phishing, Business Email Compromise (BEC), and other email-borne threats. Powered by behavioral AI, this solution continuously adapts to evolving threats, offering real-time protection before, during, and after email delivery. By consolidating email security into a single platform, organizations can simplify operations, reduce vendor complexity, and achieve significant time and cost savings. It offers advanced features such as internal mail protection, real-time coaching, and unified visibility, making it an essential tool for protecting sensitive communications and ensuring compliance. -
41
AuthControl Sentry
Swivel Secure
Deployed in over 54 countries and implemented across enterprises including finance, government, healthcare, education, and manufacturing, AuthControl Sentry® provides organisations with true multi-factor authentication (MFA). It delivers an intelligent solution to prevent unauthorised access to applications and data. AuthControl Sentry® has the flexibility to support a range of architectural requirements and the ability to ensure maximum adoption, thanks to its variety of authentication factors. Patented PINsafe® technology for ultimate security. Supports on-premise and cloud for changeable architecture. A single tenancy and single-tiered cloud solution ensures optimised customization. Risk-based authentication and single sign-on as standard. Integrates seamlessly with hundreds of applications. Ensures maximum adoption with an extensive range of authenticators. -
42
OcNOS
IP Infusion
OcNOS is a robust, programmable and innovative operating system, featuring a single software image that runs across the entire portfolio of Open Compute platforms from leading network device vendors. This guarantees consistent operations, workflow automation and high availability, while significantly reducing operational expenses. OcNOS borrows heavily from the popular ZebOS line of products, which provides a rich feature density and robustness that has been built up over the years and validated in thousands of diverse customer networks. OcNOS provides industry standard CLI, supports all standard MIBs and other standard operation and management tools. Its integrated centralized management and provisioning layer allows for transaction-based configuration and device feature modelling. The management layer has support for Netconf, REST APIs besides custom CLI generation capability. This allows an OcNOS system to be configured, managed and controlled by Network Management System. -
43
PangaeAPI
SOFTwarfare
PangaeAPI™ is a purpose-built integration platform as a service (IPaaS) that secures, manages, and monitors mission-critical integrations. By establishing a standardized integration methodology, PangaeAPI improves operational outcomes, limits attack surfaces, and reduces costs associated with API maintenance, security, and compatibility. With PangaeAPI, your team can easily connect and integrate your various security tools in order to seamlessly share data, replacing cumbersome, time-consuming manual processes for these integrations. In addition to the tangible savings of cost and time, implementing our PangaeAPI platform improves security response time and allows your team to complete more security tasks. More than ever, companies need to find the best possible way to maintain, secure and monitor mission-critical operations to ensure that sensitive data and applications are safeguarded from outside attacks. With PangaeAPI, we take the tedious legwork out of this process. -
44
Otava
Otava
Otava Gen3 Cloud makes cloud computing incredibly easy. Leveraging VMware Cloud Director, you can quickly add and configure resources in your environment and dream big. Consumption-based billing allows for full transparency of usage and volume at the detailed level. Which means you have easy access to the full set of interoperable VMware Cloud Infrastructure capabilities delivered as a service. It’s just another way Otava makes your cloud experience O’ so easy! Our passion for excellence fuels us to explore new solutions and bring them to life with our partners and clients. Through innovation and collaboration, we overcome every regulatory and security challenge and execute with fierce dedication. You can count on us to do what we say we’re going to do, because we won’t let anything stand in our way. Secure, compliant hybrid cloud computing for service providers, channel partners and enterprise clients. -
45
AriLinc
Infintrix Global
AriLinc is an industrial IoT gateway that converts various PLC Modbus RTU and Modbus TCP into Modbus TCP, OPC UA, MQTT, AWS, and other protocols. AriLinc adopts an embedded Linux system, supports TSL, SSL encryption, provides 1 RS232/RS485 optional serial input, 1 power output, 2 Ethernet ports and 2 USB ports, and supports SIM card and SD card. The built-in 4G network or Ethernet access to the Internet has the characteristics of fast speed and low latency. The Lora Gateway S281 series are special for data acquisition via Lora technology, supports wireless sensors and a wireless RS485 serial data converter. It is widely used in agricultural greenhouses, chemical plant, electroplating plant, hospital sites and storage warehouses for real-time temperature and humidity collection/monitoring. We offer comprehensive IT solutions, customized software development, mobile application & web development along with offshore IT consultancy services. -
46
New Era
New Era Technology
Facilitate modern workplaces with world-class collaboration and unified communication services. New Era provides communication solutions that streamline and integrate a vast array of collaboration and UC technologies, including audio visual technology, telephony, audio conferencing, web conferencing, video conferencing, unified messaging, instant messaging, digital signage, and more. We offer a complete end-to-end managed service for your entire unified collaboration environment. By empowering organizations to support their users from any location and device, we help drive productivity and achieve better business outcomes, ensuring users get the very best collaboration experience, enabling them to operate effectively regardless of whether they sit on-site or remote. Our vendor-agnostic approach allows us to integrate and manage multiple vendors and collaboration technologies. Let’s build a personalized service to meet your company’s communication needs. -
47
The Thrive Platform
The Thrive Platform
Managing the needs of hundreds or thousands of workers, in the office and outside of it, is a big job for any IT department. But it’s a job that is only getting harder in the face of budget and staff cuts, a rising number of applications needed, and trends such as remote work and bringing your own device. The Thrive Platform, powered by ServiceNow, enables IT, teams, to deliver better service with less time and effort. By making self-service easy and automating frequent manual tasks, like password resets or new hire provisioning, the Thrive Platform transforms how IT is done. The Thrive Platform provides tailored experiences depending on the role, streamlining the day-to-day for IT while making technology self-service second nature for everyone else. Built and managed by a dedicated expert team at Thrive, the Thrive Platform makes life better for everyone with custom workflows and easy-to-follow instructions. -
48
LogMan.io
TeskaLabs
TeskaLabs Logman.io is a modern and effective tool for log management, collection, archiving, and log analysis. Scalable Log Management can be easily upgraded to the full-scale tool TeskaLabs SIEM (security information and event management). Be always one step ahead of all potential threats and achieve a total overview of the security of your IT infrastructure. Thanks to timely and clear threat detection, TeskaLabs LogMan.io protects important data and sensitive information. TeskaLabs is a cybersecurity expert and therefore all our products meet the security standards of your company. LogMan.io ensures regulatory compliance with legislation covering cyber security and GDPR. Logman.io can grow with your needs. It can be easily upgraded to TeskaLabs SIEM. You can promptly get a central essential overview of the entire IT infrastructure, a full-scale tool for threat modeling, risk management, and vulnerability scanning. -
49
TeskaLabs SIEM
TeskaLabs
A state-of-the-art tool for security information and event management. A security surveillance tool that allows you to automatically monitor, correlate, and evaluate security events and create reports in real-time. TeskaLabs SIEM will bring a central overview of the entire company infrastructure and early detection helps eliminate risks and their possible effects on the operation of your company. TeskaLabs SIEM will always be one step ahead of potential threats and you will gain absolute supervision. TeskaLabs is a cybersecurity expert and therefore all our products meet the security standards of your company. TeskaLabs SIEM ensures regulatory compliance with legislation covering Cyber Security, GDPR, and ISO 27001:2013. Automated real-time detection and reporting of known incidents and anomalies will allow you to quickly react and prioritize the solution to individual incidents. Time savings allow you to proactively search for potential threats. -
50
LONI
LONI
Take action instantly from anywhere. Real-time vendor-agnostic network management tool for your existing network, security, & cloud infrastructure with the power of true ZeroCode automation. Unified management, automation, intelligence, and operations for your security, cloud, network, and IOT infrastructure. Single source of truth for actionable data. Manage any device with an IP address. Automate any task in your IT infrastructure without writing a single line of code. Let infrastructure engineers focus on infrastructure and let LONI focus on code. Never restore a configuration or device from scratch again with our rollback feature. The power to leverage your smartphone, tablet, or smartwatch for the automation and management of your network, cloud, or IoT infrastructure. Instantly mitigate any cyber attack from your smartphone, tablet, or smartwatch. Automate and manage your security infrastructure with the power of mobile.