19 Integrations with GLPI
View a list of GLPI integrations and software that integrates with GLPI below. Compare the best GLPI integrations as well as features, ratings, user reviews, and pricing of software that integrates with GLPI . Here are the current GLPI integrations in 2026:
-
1
Securden Endpoint Privilege Manager
Securden
Securden Endpoint Privilege Manager (EPM) helps enterprises remove admin rights without impacting productivity on Windows, Mac, and Linux endpoints. Securden EPM helps elevate applications for standard users and grant admin rights on a Just-in-Time basis, eliminating standing privileges while maintaining seamless operations. Enforce application control using allowlisting and blocklisting, enable on-demand and policy-based granular application elevation, and manage privileges even on offline endpoints. Capabilities include JIT local admin rights, application usage tracking, and local administrator group monitoring. Secure remote access supports IT helpdesk operations, while built-in controls help meet compliance requirements such as HIPAA, PCI-DSS, GDPR, and NERC-CIP. A highly scalable architecture and wide array of integrations make Securden EPM ideal for securing enterprise endpoints at scale. -
2
Securden Unified PAM
Securden
Securden Unified PAM is a privileged access security solution that lets you discover, centrally store, organize, share, manage, and keep track of all privileged identities, passwords, keys, documents, and other identities. It helps you establish a centralized password management system, automate management with approval workflows, control ‘who’ can access ‘what’, monitor, and record all access to critical IT assets, and enforce password security best practices. The major modules of Securden Unified PAM are password management, privileged account management, secure remote access, application control, endpoint privilege management, privileged session management, and SSH key management. The platform supports compliance with NIS2, DORA, NIST, PCI-DSS, HIPAA, and ISO-IEC 27001. Installation typically takes only a few minutes, and a complete production-ready PAM can be achieved in less than a month with Securden Unified PAM.Starting Price: Per User Pricing -
3
Dolibarr
Dolibarr
Open Source ERP & CRM for business. One web suite to manage your business. • Enable only the feature you expect : Whatever your needs (customer relationship, sales, human resources, logistic, stock, invoicing, accounting, manufacturing, marketing, foundation management, surveys, ...), you can setup the application to match your need, and only your need... See features • No more double entry in your Information System : Integration between the features / modules is ready "in-the-box". Users are immediately ready to work, even without customization. • Upgrade at any time : The upgrades of new versions are integrated by design into the development process. So you can upgrade at any time to the latest version, whatever is your current version, without losing any data. Users always benefits the latest features and innovations. • A customizable and extensible application: The market place is open to everybody to centralize several hundreds of external add-ons done to enhance the app.Starting Price: $0 -
4
Google Authenticator
Google
Google Authenticator generates 2-Step Verification codes on your phone. 2-Step Verification provides stronger security for your Google Account by requiring a second step of verification when you sign in. In addition to your password, you’ll also need a code generated by the Google Authenticator app on your phone. You can use your Google Account to more easily and securely sign in to thousands of sites and services on the web, while keeping your privacy choices transparent in one place. Protect your Google Account with Security Checkup. This detailed tool provides you with personalized and practical recommendations to help you strengthen the security of your Google Account. Hacked passwords are more common than you think. Two-step verification protects you from unauthorized access to your account. To do this, it requests a second step after entering the password. -
5
Slack
Salesforce
Slack is a cloud-based project collaboration and team interaction software solution specially designed to seamlessly facilitate communication across organizations. Featuring powerful tools and services integrated into a single platform, Slack provides private channels to promote interaction within smaller teams, direct channels to help send messages directly to colleagues, and public channels that enables members across organizations to start conversations. Available on Mac, Windows, Android, and iOS apps, Slack offers a plethora of features that include chat, file sharing, collaborative workspace, real-time notifications, two-way audio and video, screen sharing, document imaging, activity tracking and logging, and more.Starting Price: $6.67 per user per month -
6
Microsoft Teams
Microsoft
Solving today's complex business problems takes teams of engaged people working together. We’ve built an online guide to teach you and your team the secrets of successful teamwork. When you have a place to create and make decisions as a team, there’s no limit to what you can achieve. Teams brings everything together in a shared workspace where you can chat, meet, share files, and work with business apps. Get your team on the same page with group chat, online meetings, calling, and web conferencing. Collaborate on files with built-in Microsoft 365 (formerly Office 365) apps like Word, Excel, PowerPoint, and SharePoint. Add in your favorite Microsoft apps and third-party services to keep the business moving forward. Get end-to-end security, administrative control, and compliance—all powered by Microsoft 365. Teams is designed for groups of all kinds. Get started with the free, no-commitments version. You can also get Teams as part of the best-in-class suite of productivity tools.Starting Price: $12.50 per user per month -
7
Telegram
Telegram
Telegram messages are heavily encrypted and can self-destruct. Telegram lets you access your messages from multiple devices. Telegram delivers messages faster than any other application. Telegram servers are spread worldwide for security and speed. Telegram has an open API and protocol free for everyone. Telegram is free forever. No ads. No subscription fees. Telegram servers are spread worldwide for security and speed. Telegram has an open API and protocol free for everyone. Telegram is free forever. No ads. No subscription fees. Telegram keeps your messages safe from hacker attacks. Telegram has no limits on the size of your media and chats. Help make messaging safe again – spread the word about Telegram. -
8
Mattermost
Mattermost
Mattermost is a flexible, open source messaging platform that enables secure team collaboration. Build intuitive workflows and collaborate across large teams without worrying about security or data privacy. Get up and running quickly with hundreds of existing integrations, or build out custom workflows that scale to tens of thousands of concurrent users. Many of the world’s leading privacy-conscious enterprises work better with Mattermost by connecting people, tools, and automation to increase collaboration. DevOps teams use Mattermost to power collaboration at every stage of the DevOps lifecycle. Mattermost unifies people, tools, data, and automations to help your team increase innovation and agility. Mattermost is an open source Slack alternative. It's written in Golang and React and runs as a single Linux binary with MySQL or PostgreSQL. Use the features you like (file sharing, real-time group chat and webhooks—to name a few) and access the source code.Starting Price: $3.25 per user per month -
9
iTop
Combodo
If you're looking for a reliable, flexible, and cost-effective way to manage your IT services easily, iTop is the comprehensive solution designed with your needs in mind. Whether you’re an infrastructure manager handling complex systems, a service support leader striving for customer satisfaction, or a decision-maker focused on ROI and compliance, iTop adapts to your processes to simplify your tasks, streamline operations, and enhance service quality. iTop is an open-source, web-based ITSM and CMDB platform that aligns with ITIL best practices, offering flexibility for adapting to diverse organizational needs. Originally developed as an open-source project, iTop has continually evolved to address the challenges of modern IT management. With iTop, you get a solution that scales with your growth, providing tools to tackle your most pressing IT challenges while maintaining service continuity and improving team productivity.Starting Price: $0 -
10
Monitorpack Guard
Monitorpack
Monitorpack is an agentless IT monitoring solution designed to provide proactive monitoring, effective incident management and detailed reporting, all with seamless integration into the Microsoft ecosystem. You supervise all your sites with a new concept of solution which allows you to monitor everything, you have a complete ecosystem for supervision, maintenance and intervention, Use Automatic ticketing to all helpdesk solutions providing "email to ticket" option, You will Centralized all your Business Units/sites on a single reporting portal, Know the availability rate per site, per application environment (system, messaging, Active Directory, databases, etc.) Benefit from the sustainability of the latest Microsoft SQL server technologies, SQL Server Reporting Services. Freely provided SQL packages that you can use on-premises or in Azure with paginated reports.Starting Price: Addon of Monitorpack Discovery -
11
Nagios Core
Nagios Enterprises
Nagios Core is the monitoring and alerting engine that serves as the primary application around which hundreds of Nagios projects are built. Nagios Core serves as the basic event scheduler, event processor, and alert manager for elements that are monitored. It features several APIs that are used to extend its capabilities to perform additional tasks, is implemented as a daemon written in C for performance reasons, & is designed to run natively on Linux/*nix systems. Alerts with escalation capabilities are delivered to IT staff via email and SMS to ensure fast detection of outages. Event handlers can automatically restart failed applications, servers, devices, and services when problems are found. Gain a centralized view of your entire IT operations and review detailed status information through the web interface. -
12
Zabbix
Zabbix
Zabbix is the ultimate enterprise-level software designed for real-time monitoring of millions of metrics collected from tens of thousands of servers, virtual machines and network devices. Zabbix is Open Source and comes at no cost. Detect problem states within the incoming metric flow automatically. No need to peer at incoming metrics continuously. The native web interface provides multiple ways of presenting a visual overview of your IT environment. Save yourself from thousands of repetitive notifications and focus on root causes of a problem with Zabbix Event correlation mechanism. Automate monitoring of large, dynamic environments.Build distributed monitoring solution while keeping centralized control. Integrate Zabbix with any part of your IT environment. Get access to all Zabbix functionality from external applications through Zabbix API. -
13
Metabase
Metabase
Meet the easy, open source way for everyone in your company to ask questions and learn from data. Connect to your data and get it in front of your team. Dashboards (like this one) are easy to build, share, and explore. Anyone on your team can get answers to questions about your data with just a few clicks, whether it's the CEO or Customer Support. When the questions get more complicated, SQL and our notebook editor are there for the data savvy. Visual joins, multiple aggregations and filtering steps give you the tools to dig deeper into your data. Add variables to your queries to create interactive visualizations that users can tweak and explore. Set up alerts and scheduled reports to get the right data in front of the right people at the right time. Start in a couple clicks with the hosted version, or use Docker to get up and running on your own for free. Connect to your existing data, invite your team, and you have a BI solution that would usually take a sales call. -
14
Axonius
Axonius
Axonius gives customers the confidence to control complexity by providing a system of record for all digital infrastructure. With a comprehensive understanding of all assets including devices, identities, software, SaaS applications, vulnerabilities, security controls, and the context between all assets, customers are able to mitigate threats, navigate risk, decrease incident response time, automate action, and inform business-level strategy — all while eliminating manual, repetitive tasks. Recognized as creators of the Cyber Asset Attack Surface Management (CAASM) category and innovators in SaaS Management Platform (SMP) and SaaS Security Posture Management (SSPM), Axonius is deployed in minutes and integrates with hundreds of data sources to provide a comprehensive asset inventory, uncover gaps, and automatically enforce policies and automate action. -
15
Nagios XI
Nagios Enterprises, LLC
Provides monitoring of all mission-critical infrastructure components including applications, services, operating systems, network protocols, systems metrics, and network infrastructure. Hundreds of third-party addons provide for monitoring of virtually all in-house applications, services, and systems. Provides a central view of your entire IT operations network and business processes. Powerful dashboards provide at-a-glance access to powerful monitoring information and third-party data. Views provide users with quick access to the information they find most useful. Automated, integrated trending and capacity planning graphs allow organizations to plan for infrastructure upgrades before outdated systems catch them by surprise. Alerts are sent to IT staff, business stakeholders, and end-users via email or mobile text messages, providing them with outage details so they can start resolving issues immediately.Starting Price: $1995.00/one-time -
16
OverSOC
OverSOC
rive your attack surface with a single source of truth. Gather and unify your IT & Cyber data to quickly discover your inventory gaps, prioritize your remediation actions, and accelerate your audits. Collect data from all the tools used by your IT and SecOps teams (via API), as well as data from your business teams (via flat files), and bring them together in a single, agent-free database. Automate the ingestion, standardization, and consolidation of your data in a common frame of reference. No more duplicate assets, no more copy-pasting into spreadsheets and manual dashboards. Maximize your data enrichment by integrating external data sources such as security bulletins from certified sources. Query your cyber data via the filter system and get accurate answers about the state of your information system. Use OverSOC's pre-recorded filters, based on specific customer needs, or create your own filters and save them to share with your collaborators. -
17
AWS Marketplace
Amazon
AWS Marketplace is a curated digital catalog that enables customers to discover, purchase, deploy, and manage third-party software, data products, AI agents, and services directly within the AWS ecosystem. It provides access to thousands of listings across categories like security, machine learning, business applications, and DevOps tools. With flexible pricing models such as pay-as-you-go, annual subscriptions, and free trials, AWS Marketplace simplifies procurement and billing by integrating costs into a single AWS invoice. It also supports rapid deployment with pre-configured software that can be launched on AWS infrastructure. This streamlined approach allows businesses to accelerate innovation, reduce time-to-market, and maintain better control over software usage and costs. -
18
Cyberwatch
Cyberwatch
Manage all your vulnerabilities, from their detection to their correction. Cyberwatch helps you to get a complete and contextualized list of assets and technologies in your Information System. Cyberwatch continuously searches for vulnerabilities published by the authorities (CERT-FR, NVD...) and present on your IT assets. Cyberwatch evaluates your vulnerabilities based on their CVSS score, the existence of an exploit, and the business context of the affected machine. Cyberwatch lets you make the right decisions using dashboards and simple actions (comment, exclude...). Cyberwatch natively embeds a Patch Management module, compatible with your infrastructure (WSUS / RedHat Satellite...). Define your compliance rules and control your information system. Cyberwatch helps you to get a complete and contextualized list of assets and technologies in your Information System. Cyberwatch allows you to define your objectives thanks to an encyclopedia of rules with pre-sets. -
19
ServiceNav
Coservit
Infrastructure, network, application, and cloud, with one platform you can monitor your system. The catalogue of more than 1500 service templates is ready to use. Deploy the ServiceNav Box in less than 15 minutes and, automatically discover the devices on your network. No impact on your IT: ServiceNav uses no agents, and leverages certified product APIs. Familiar with Nagios? Reuse your collection programs and extend the possibilities of ServiceNav. Thousands of devices to integrate? Use the configuration import features. Why don't you take the lead? ServiceNav IT monitoring software gives you the keys to anticipate all the availability and performance issues of your IT in all its dimensions: infrastructure, application and network. More than a simple IT monitoring software, it is a real facilitator for your communication with its intuitive reports and dashboards.
- Previous
- You're on page 1
- Next