2 Integrations with Ivanti Security Controls

View a list of Ivanti Security Controls integrations and software that integrates with Ivanti Security Controls below. Compare the best Ivanti Security Controls integrations as well as features, ratings, user reviews, and pricing of software that integrates with Ivanti Security Controls. Here are the current Ivanti Security Controls integrations in 2025:

  • 1
    CentOS

    CentOS

    CentOS

    CentOS Linux is a community-supported distribution derived from sources freely provided to the public on Red Hat or CentOS git for Red Hat Enterprise Linux (RHEL). As such, CentOS Linux aims to be functionally compatible with RHEL. The CentOS Project mainly changes packages to remove upstream vendor branding and artwork. CentOS Linux is no-cost and free to redistribute. Each CentOS version is maintained until the equivalent RHEL version goes out of general support. A new CentOS version is made available once a new RHEL version is rebuilt - approximately every 6-12 months for minor point releases and several years for major version bumps. The length of time the rebuild takes varies from weeks for point releases to months for major version bumps. This results in a secure, low-maintenance, reliable, predictable and reproducible Linux environment.
  • 2
    Ivanti

    Ivanti

    Ivanti

    Ivanti offers integrated IT management solutions designed to automate and secure technology across organizations. Their Unified Endpoint Management platform provides intuitive control from a single console to manage any device from any location. Ivanti’s Enterprise Service Management delivers actionable insights to streamline IT operations and improve employee experiences. The company also provides comprehensive network security and exposure management tools to protect assets and prioritize risks effectively. Trusted by over 34,000 customers worldwide, including Conair and City of Seattle, Ivanti supports secure, flexible work environments. Their solutions enable businesses to boost productivity while maintaining strong security and operational visibility.
  • Previous
  • You're on page 1
  • Next