23 Integrations with Intelligent Management Center
View a list of Intelligent Management Center integrations and software that integrates with Intelligent Management Center below. Compare the best Intelligent Management Center integrations as well as features, ratings, user reviews, and pricing of software that integrates with Intelligent Management Center. Here are the current Intelligent Management Center integrations in 2026:
-
1
GoSecure
GoSecure
GoSecure, a recognized cybersecurity leader and innovator, combines more than 20+ years of market-leading security technology with highly skilled professionals who become an extension of in-house security team to mitigate threats before they can compromise business operations. GoSecure Titan® Managed Security Services pioneers the integration of endpoint, network, and email threat detection into a single Managed Extended Detection & Response (MXDR) service. Our GoSecure Titan® Platform offers superior visibility and protection, detecting more threats and reducing security costs with faster threat mitigation. GoSecure Professional Security Services provides a full portfolio of testing and assessment services to evaluate cybersecurity maturity, identify risks and gaps. We define a roadmap tailored to your situation, needs, and budget, improving security posture. Our Professional Services find issues, our Managed Services fix them, helping you thrive. -
2
Virtana Platform
Virtana
Know before you go to the public cloud with a single AI-powered observability platform to migrate, control cost, optimize performance, monitor, and drive uptime for your infrastructure across data centers, private and public clouds. The most difficult challenges facing enterprises as they seek to leverage public clouds are how to “know before you go” which workloads to migrate and how to avoid unexpected costs and performance degradation once workloads are operating in the cloud. With the Virtana unified observability platform, you can migrate and optimize across hybrid, public, and private cloud environments. This modular hybrid-cloud infrastructure optimization platform collects high-fidelity data — then apply AIOps technologies, including machine learning and advanced data analytics to to provide intelligent observability of singular workloads to make better decisions about what to move and where to move it while still meeting performance requirements. -
3
C3 AI Ex Machina
C3 AI
C3 AI Ex Machina enables anyone to develop, scale, and apply AI insights without writing code. You know what has happened. Now you’ll know what will happen. Access and prep petabytes of data with prebuilt connectors to enterprise systems. Scale your workspace with one click as data and use cases grow. Prebuilt templates, training, documentation, and an active user community make it easy to get up to speed fast. Take action on your insights by seamlessly publishing predictions to your enterprise systems or configuring custom business applications for use across your company. Seamlessly scale from 4GB to 1PB+ and auto start and stop to only pay for what you use. Ensure your work will scale and the value you deliver will last. Collaborate, operate, and scale on the same platform that powers billions of AI predictions for the world’s largest companies.Starting Price: $395 per user per month -
4
Imperva CDN
Imperva
Deploying your websites and applications around the globe can lead to more cyber attacks and fraud, unless you have effective security. The Imperva Content Delivery Network (CDN) brings content caching, load balancing, and failover built natively into a comprehensive Web Application and API Protection (WAAP) platform, so your applications are securely delivered across the globe. Let machine learning do the work for you. It efficiently caches your dynamically-generated pages, while ensuring content freshness. This significantly improves cache utilization and further reduces bandwidth usage. Take advantage of multiple content and networking optimization techniques to minimize page rendering time and improve user experience. Imperva’s global CDN uses advanced caching and optimization techniques to improve connection and response speeds while lowering bandwidth costs. -
5
Imperva WAF
Imperva
Web application attacks prevent important transactions and steal sensitive data. Imperva Web Application Firewall (WAF) analyzes traffic to your applications to stop these attacks and ensure uninterrupted business operations. A noisy WAF forces you to choose between blocking legitimate traffic or manually containing attacks your WAF let through. Imperva Research Labs ensure accuracy to WAF customers as the threat landscape changes. Automatic policy creation and fast rule propagation empower your security teams to use third-party code without risk while working at the pace of DevOps. Imperva WAF is a key component of a comprehensive Web Application and API Protection (WAAP) stack that secures from edge to database, so the traffic you receive is only the traffic you want. We provide the best website protection in the industry – PCI-compliant, automated security that integrates analytics to go beyond OWASP Top 10 coverage, and reduces the risks created by third-party code. -
6
Imperva DDoS Protection
Imperva
Imperva DDoS Protection secures all your assets at the edge for uninterrupted operation. Ensure business continuity with guaranteed uptime. When it comes to DDoS mitigation, the rule of thumb is: ‘moments to go down, hours to recover’. This is why, when defending against an attack, every second counts. Imperva gives you the peace of mind that attack traffic will be automatically blocked at the edge – without you having to scale up in bandwidth to pay for it. Imperva DDoS Protection for Websites is an always-on service that immediately mitigates any type or size of DDoS attack targeting web applications. Our DDoS protection for websites complements the Imperva cloud web application firewall (WAF), which blocks hacking attempts and attacks by malicious bots. A change to your DNS records ensures that all HTTP/S traffic to your domain(s) is routed through the Imperva network. Acting as a secure proxy, Imperva DDoS protection for websites masks your origin server IP. -
7
Scuba Database Vulnerability Scanner. Download Scuba, a free tool that uncovers hidden security risks. Scan enterprise databases for vulnerabilities and misconfiguration. Know the risks to your databases. Get recommendations on how to mitigate identified issues. Available for Windows, Mac, Linux (x32), and Linux (x64), Scuba offers over 2,300 assessment tests for Oracle, Microsoft SQL, SAP Sybase, IBM DB2 and MySQL. Scuba is a free tool that scans leading enterprise databases for security vulnerabilities and configuration flaws, including patch levels, that allows you to uncover potential database security risks. It includes more than 2,300 assessment tests for Oracle, Microsoft SQL Server, SAP Sybase, IBM DB2 and MySQL. It’s possible to run a Scuba scan from any Windows, Mac or Linux client. Depending on your database size, users, groups and network connection, an average Scuba scan normally takes 2-3 minutes. No pre-installation or other dependencies are required.
-
8
MAAS
Canonical
Self-service, remote installation of Windows, CentOS, ESXi and Ubuntu on real servers turns your data centre into a bare metal cloud. Metal-As-A-Service (MAAS) provisioning with Windows, ESXi, Linux. Bare metal cloud with on-demand servers. Remote edge cluster operations. Infrastructure monitoring and discovery. Ansible, Chef, Puppet, SALT, Juju integration. Super fast install from scratch. VMWare ESXi, Windows, CentOS, RHEL, Ubuntu. Custom images with pre-installed apps. Disk and network configuration. API-driven DHCP, DNS, PXE, IPAM. REST API for provisioning. LDAP user authentication. Role-based access control (RBAC). Hardware testing and commissioning. MAAS delivers the fastest OS installation times in the industry thanks to its optimised image-based installer. Works on all certified servers from any major vendor. Discovers servers in racks, chassis and data centre networks. Supports major system BMCs and chassis controllers.Starting Price: $30 -
9
Cloud Raxak
Cloud Raxak
Businesses want to take advantage of the flexibility, scalability, and speed of the cloud. However, lack of proactive and automated processes for cloud management can lead to challenges such as increased costs, higher residual risk, and the impediment of DevOps. By delivering consistent security and compliance across cloud environments, Cloud Raxak enables businesses to undergo successful cloud transformations while reducing the risk, time, and costs involved. Raxak Protect is a SaaS-based security offering that empowers IT and application development teams, by simplifying and automating security and compliance across private and public clouds. eading edge security profiles based on government and industry standards (CIS, DISA & NIST STIGs, PCI-DSS, HIPAA, FFIEC, FISMA, etc.). Automatic integration and application of security profiles, so that cloud apps can be deployed quickly, cost-effectively, and without human error. -
10
EditShare
EditShare
By removing complexity, our innovative range of products improve production workflows and free media professionals to unleash their creativity. EditShare drives your entire workflow, from ingest to archive, with collaborative storage and media management solutions. Our EFSv cloud platform lets your teams work on any project, from any location, all at the same time. We work closely with our industry partners to provide seamless integration with your tools of choice. We’ll work with your team to determine a recommended product suite, so you can get a firsthand look at our integrated workflow solutions. Companies around the world have been using EditShare solutions for more than 15 years. Take a look at some of their amazing work. Creative Storytelling Made Easier with EditShare. Free to choose your own creative toolset as well as a full set of RESTful APIs enabling you to support workflows to suit your needs. -
11
Dqlite
Canonical
Dqlite is a fast, embedded, persistent SQL database with Raft consensus that is perfect for fault-tolerant IoT and Edge devices. Dqlite (“distributed SQLite”) extends SQLite across a cluster of machines, with automatic failover and high-availability to keep your application running. It uses C-Raft, an optimised Raft implementation in C, to gain high-performance transactional consensus and fault tolerance while preserving SQlite’s outstanding efficiency and tiny footprint. C-Raft is tuned to minimize transaction latency. C-Raft and dqlite are both written in C for maximum cross-platform portability. Published under the LGPLv3 license with a static linking exception for maximum compatibility. Includes common CLI pattern for database initialization and voting member joins and departures. Minimal, tunable delay for failover with automatic leader election. Disk-backed database with in-memory options and SQLite transactions. -
12
Multipass
Canonical
Get an instant Ubuntu VM with a single command. Multipass can launch and run virtual machines and configure them with cloud-init like a public cloud. Prototype your cloud launches locally for free. The first five minutes with Multipass let you know how easy it is to have a lightweight cloud handy. Let’s launch a few LTS instances, list them, exec a command, use cloud-init and clean up old instances to start. The ”Ubuntu Server CLI cheat sheet“ is your fast path to learning the Linux command line - from basic file management to deploying Kubernetes and OpenStack. Multipass provides a command line interface to launch, manage and generally fiddle about with instances of Linux. The downloading of a minty-fresh image takes a matter of seconds, and within minutes a VM can be up and running. Launch instances of Ubuntu and initialise them with cloud-init metadata like AWS, Azure, Google, IBM and Oracle clouds. Simulate your own cloud deployment on your workstation. -
13
MicroStack
Canonical
Install and run OpenStack on Linux in minutes. Made for developers and great for edge, IoT, and appliances. A full OpenStack in a single snap package. MicroStack is an upstream multi-node OpenStack deployment which can run directly on your workstation. Although made for developers, it is also suitable for edge, IoT and appliances. Grab MicroStack from the Snap Store and get your OpenStack running right away. Get a full OpenStack system running in minutes. Runs safely on your laptop with state of the art isolation. Pure upstream OpenStack delivered to your laptop. Includes all key OpenStack components: Keystone, Nova, Neutron, Glance, and Cinder. All the cool things you probably want to try on a small, standard OpenStack are all built-in. Use MicroStack in your CI/CD pipelines and get on with your day without headaches. MicroStack requires at least 8 GB RAM and a multi-core processor. -
14
Mir Display Server
Canonical
Whether you want an information kiosk, digital signage display, in-car entertainment stack, or home automation interface, Mir on Ubuntu is your fastest path to deployment. Mir is a system-level component that can be used to unlock next-generation user experiences. It runs on a range of Linux powered devices including traditional desktops, IoT and embedded products. Mir is a replacement for the X window server system, commonly used on Linux desktop devices. It allows device makers and desktop users to have a well-defined, efficient, flexible, and secure platform for their graphical environment. Historically, graphical user interfaces Linux have been powered by the X windowing system. X has a long and successful history and it has served the purposes of both system level and application level UI well for more than 3 decades. However, users nowadays expect a more consistent, integrated and secure user experience than is possible to offer on top of the X windowing system. -
15
MicroK8s
Canonical
Low-ops, minimal production Kubernetes, for devs, cloud, clusters, workstations, Edge and IoT. MicroK8s automatically chooses the best nodes for the Kubernetes datastore. When you lose a cluster database node, another node is promoted. No admin needed for your bulletproof edge. MicroK8s is small, with sensible defaults that ‘just work’. A quick install, easy upgrades and great security make it perfect for micro clouds and edge computing. Full enterprise support available, with no subscription needed. Optional 24/7 support with 10 year security maintenance. Under the cell tower. On the racecar. On satellites or everyday appliances, MicroK8s delivers the full Kubernetes experience on IoT and micro clouds. Fully containerized deployment with compressed over-the-air updates for ultra-reliable operations. MicroK8s will apply security updates automatically by default, defer them if you want. Upgrade to a newer version of Kubernetes with a single command. It’s really that easy. -
16
AD Enterprise
AccessData
Today’s digital forensics teams face many challenges in a world filled with an overwhelming amount of data. From multiple office locations, to massive employee pools and remote workers, AD Enterprise provides deep visibility into live data directly at the endpoint, helping you conduct faster, more targeted enterprise-wide post-breach, HR and compliance investigations in a single, robust solution. With AD Enterprise, you can respond quickly, remotely and covertly while maintaining chain of custody, and facilitate focused forensic investigations and post-breach analysis, without interruption to business operations. Preview live data at the endpoint, then filter on any attributes and choose to retrieve only the data that matters to your investigation, saving time and cost. Perform collections from endpoints in multiple locations by deploying our remote Enterprise Agent to a broad range of operating systems, including Windows, Mac, Linux and more. -
17
Quin-C
AccessData
AccessData® is reimagining digital forensics and legal review to help you uncover critical evidence faster, make more meaningful connections across data and build stronger cases. With Quin-C™, a pioneering technology from AccessData, you can empower forensic & legal teams at every skill level to conduct and close more accurate, advanced investigations faster than ever before. Quin-C works seamlessly with the AccessData solutions you already know and trust, to give you maximum control over the way you collect, process, review, analyze and report on key pieces of data. Feature-rich and easy to use, Quin-C delivers groundbreaking technology to maximize the output of investigative, forensic, IT and legal teams alike. In combination with AccessData core products, Quin-C is the fastest, most scalable solution on the market today. Quin-C dramatically improves efficiency and throughput with next-generation features that guide current and future investigations. -
18
AD Lab
AccessData
Divide and conquer with AD Lab. This proven tool helps you power through massive data sets, handle various data types and run multiple cases at the same time, all within a collaborative, scalable environment. AD Lab uniquely enables distributed processing, allowing investigators to utilize additional hardware to dramatically increase their case processing and resolution speed. While a single-person lab can radically speed up their processing using the four-worker distributed processing engines (DPEs) available with FTK®, labs handling massive data sets, utilizing a distributed workforce, or looking to collaborate with attorneys, HR or other parties, can step up to AD Lab. As a centralized investigative platform, AD Lab adds powerful web-based review functionality and expanded DPE capabilities (up to 16 with the 6.2 release) with a centralized processing farm and centralized database infrastructure. -
19
ServiceNow IT Operations Management
ServiceNow
Predict issues, reduce user impact, and automate resolutions with AIOps. Move away from reactive IT operations with insights and automation. Identify anomalies and solve issues before they occur with cross-team automation workflows. Deliver proactive digital operations with AIOps. Stop chasing false positives and identify anomalies with less guesswork. Collect and analyze telemetry data for enhanced visibility and reduced noise. Find the root cause of incidents and share actionable insights across teams. Reduce outages by taking action based on guided recommendations. Shorten recovery times by rapidly implementing solutions based on insights. Simplify repetitive tasks with pre-built playbooks and knowledge base resources. Create a performance-driven culture across teams. Give DevOps and Site Reliability Engineers (SREs) visibility into microservices to improve observability and speed up incident response. Go beyond IT operations to manage the entire digital lifecycle. -
20
Synack
Synack
Comprehensive penetration testing with actionable results. Continuous security scaled by the world’s most skilled ethical hackers and AI technology. We are Synack, the most trusted Crowdsourced Security Platform. What can you expect when you entrust your pentesting to the Synack Crowdsourced Security platform? Become one of the select few SRT members and hack among the best in the world, sharpening your skills and putting them to the test. Hydra is an intelligent AI scanning tool that alerts our SRT members of possible vulnerabilities, changes, or events. In addition to bounties for finding vulnerabilities, Missions provide payment for methodology-based security checks. Trust is earned, and our currency is straightforward. A commitment to protect our customers and their customers. Utter confidentiality. Optional anonymity. Total control over the process. Complete confidence when you need to focus on your business. -
21
ParkView Hardware Monitoring
Parkplace Technologies
ParkView Hardware Monitoring™ is a hosted service that boosts Uptime by proactively monitoring data center storage, server and networking hardware 24/7. ParkView™ develops baselines, specific to your environment, that help filter out noise, resulting in alerts being sent only for actionable events. ParkView™ can even predict some events before they occur. When remediation is needed, ParkView™ automatically opens incident tickets and triages the issue. Then, Park Place engineers are dispatched immediately to your data center, making the service experience as efficient as possible. ParkView Hardware Monitoring™ proactively identifies faults 24/7 without the need for customer action of any kind. ParkView Hardware Monitoring™ supports all storage, server and networking equipment and all OEM vendors currently supported by Park Place Technologies. We set up security features based on each customer’s individual security requirements. -
22
Cylera Platform
Cylera
Cylera's cybersecurity and analytics solution is designed to deploy quickly and seamlessly integrate into your network saving you time, money, and headaches. Passive integration reduces risk of disruptions. Complete on-prem and cloud network visibility provides full deployment. Out-of-the-box integrations with pre-built APIs allow for quick deployment. Flexible architecture enables multiple sites and teams to collaborate. Cylera is more than just another cybersecurity platform. Purpose-built for complex, high-impact environments, our platform combines comprehensive contextual awareness with a deep understanding of operational workflows. Enabled by our AI-driven cybersecurity & intelligence platform, we provide real-time visibility to solve information technology and cybersecurity obstacles. Passively monitor your existing networks with Cylera. Cylera integrates with several of the platforms you use every day. -
23
Canonical Juju
Canonical
Better operators for enterprise apps with a full application graph and declarative integration for both Kubernetes and legacy estate. Juju operator integration allows us to keep each operator as simple as possible, then compose them to create rich application graph topologies that support complex scenarios with a simple, consistent experience and much less YAML. The UNIX philosophy of ‘doing one thing well’ applies to large-scale operations code too, and the benefits of clarity and reuse are exactly the same. Small is beautiful. Juju allows you to adopt the operator pattern for your entire estate, including legacy apps. Model-driven operations dramatically reduce maintenance and operations costs for traditional workloads without re-platforming to K8s. Once charmed, legacy apps become multi-cloud ready, too. The Juju Operator Lifecycle Manager (OLM) uniquely supports both container and machine-based apps, with seamless integration between them.
- Previous
- You're on page 1
- Next