20 Integrations with Kriptos
View a list of Kriptos integrations and software that integrates with Kriptos below. Compare the best Kriptos integrations as well as features, ratings, user reviews, and pricing of software that integrates with Kriptos. Here are the current Kriptos integrations in 2025:
-
1
Google Cloud Platform
Google
Google Cloud is a cloud-based service that allows you to create anything from simple websites to complex applications for businesses of all sizes. New customers get $300 in free credits to run, test, and deploy workloads. All customers can use 25+ products for free, up to monthly usage limits. Use Google's core infrastructure, data analytics & machine learning. Secure and fully featured for all enterprises. Tap into big data to find answers faster and build better products. Grow from prototype to production to planet-scale, without having to think about capacity, reliability or performance. From virtual machines with proven price/performance advantages to a fully managed app development platform. Scalable, resilient, high performance object storage and databases for your applications. State-of-the-art software-defined networking products on Google’s private fiber network. Fully managed data warehousing, batch and stream processing, data exploration, Hadoop/Spark, and messaging.Starting Price: Free ($300 in free credits) -
2
Safetica
Safetica
Safetica Intelligent Data Security protects sensitive enterprise data wherever your team uses it. With advanced data discovery, context-aware classification, proactive threat prevention and adaptive security, Safetica provides comprehensive visibility and control over your data. ✔️ Discover what to protect: Precisely locate personally identifiable information, intellectual property, financials, and more wherever it is used across the enterprise, cloud, and endpoint devices. ✔️ Prevent threats: Understand and mitigate risky behavior with automatic detection of suspicious file access, email communication and web browsing. Get the alerts you need to proactively uncover risk and prevent data breaches. ✔️ Keep your data safe: Intercept unauthorized exposure of sensitive personal data, trade secrets and intellectual property. ✔️ Work smarter: Help teams work, with in-moment data handling cues as they access and share sensitive information. -
3
Microsoft OneDrive
Microsoft
Access, share, and collaborate on all your files from anywhere. OneDrive connects you to all your files in Office 365 so you can share and work together from anywhere while protecting your work. Easily store, access and discover your personal and shared work files in Office 365, including Microsoft Teams, from all your devices. Edits you make offline are automatically uploaded next time you connect. Work faster and smarter with anyone inside or outside your organization. Securely share files and work together in real-time using Word, Excel and PowerPoint across web, mobile and desktop. Create, view, edit, and share files on the go with the OneDrive mobile app. Easily capture whiteboards and scan work receipts, business cards, and other paper documents for safe keeping. OneDrive helps protect your files. You can easily recover files from accidental deletes or malicious attacks and administrators can manage security policies to help keep your information safe.Starting Price: $2 per user per month -
4
Microsoft PowerPoint
Microsoft
Microsoft PowerPoint empowers you to design captivating presentations that inspire, inform, and engage your audience. With Copilot, PowerPoint’s built-in AI assistant, you can instantly generate outlines, craft slides from text prompts, and refine your content with smart design suggestions. It offers professional templates, customizable layouts, and multimedia integration for impactful storytelling. The Speaker Coach helps you rehearse with confidence, improving pacing, tone, and delivery. Seamless real-time collaboration enables teams to co-edit and present from anywhere across desktop, web, and mobile devices. With its intuitive tools and cloud connectivity through Microsoft 365, PowerPoint transforms ideas into polished, persuasive presentations.Starting Price: $9.99 per month -
5
Google Drive
Google
Store, share, and access your files from any device. Your first 15 GB of storage are free. With Drive Enterprise, businesses only pay for the storage employees use. It comes with Google Docs, Sheets, and Slides — and works seamlessly with Microsoft Office. Keep photos, stories, designs, drawings, recordings, videos, and more. Your first 15 GB of storage are free with a Google Account. Your files in Drive can be reached from any smartphone, tablet, or computer. So wherever you go, your files follow. You can quickly invite others to view, download, and collaborate on all the files you want–no email attachment needed. Get started with Drive for free.Starting Price: Free -
6
Microsoft SharePoint
Microsoft
Microsoft SharePoint is a secure, enterprise-grade collaboration and content management platform that connects teams, information, and workflows. With AI-powered Copilot and SharePoint agents, users can instantly generate pages, summarize content, and surface insights from within their sites. It enables seamless document management, version control, and real-time collaboration—both inside and outside your organization. Customizable templates and drag-and-drop tools make it easy to design visually engaging intranet sites and portals. SharePoint also provides robust security and compliance features, including access controls, data governance, and conditional policies. Integrated deeply into Microsoft 365, it helps businesses streamline communication, boost productivity, and accelerate their AI transformation.Starting Price: $1.00/one-time/user -
7
Microsoft Excel
Microsoft
Microsoft Excel is the industry-standard spreadsheet application that helps users organize, analyze, and visualize data with precision and power. Whether you’re managing budgets, tracking performance, or analyzing complex datasets, Excel simplifies every task with intuitive tools and intelligent automation. With Copilot, you can now ask Excel to write formulas, summarize data, or create visualizations—all powered by AI. From basic spreadsheets to advanced financial modeling, Excel adapts to your skill level and workflow. Its cloud collaboration through Microsoft 365 lets multiple users edit, share, and comment in real time from any device. With flexible templates, built-in charts, and cross-platform integration, Excel turns numbers into insights you can act on.Starting Price: $8.25 per user per month -
8
Microsoft Word
Microsoft
Microsoft Word is the world’s leading word processing software, designed to help you write, read, and create with confidence. Powered by Copilot, Word uses AI to help you generate ideas, refine drafts, and edit your writing with clarity and precision. Whether you’re working on essays, reports, proposals, or creative writing, Word delivers professional results across devices—desktop, web, and mobile. With Editor and built-in collaboration tools, teams can co-author documents in real time while maintaining consistency and accuracy. Integrated with Microsoft 365, Word also connects seamlessly with apps like Excel, PowerPoint, and OneDrive for a complete productivity experience. Trusted by millions, Word empowers individuals and businesses to create polished, impactful content anytime, anywhere.Starting Price: $9.99 per month -
9
Microsoft Office 2021
Microsoft
For customers who aren’t ready for the cloud, Office 2021 is the next on-premises version of Word, Excel, PowerPoint, Project, Visio, Access, and Publisher. Create presentations, data models, and reports with tools and capabilities like PowerPoint Morph, new chart types in Excel, and improved inking across apps. Manage your time, email, and contacts more easily with features like Focused Inbox, travel and delivery summary cards in Outlook, and Focus Mode in Word.Starting Price: $249.99 -
10
Endpoint Protector
CoSoSys
Endpoint Protector is an advanced, all-in-one Data Loss Prevention solution for Windows, macOS and Linux, that puts an end to data leaks and data theft and offers seamless control of portable storage devices. Endpoint Protector’s filtering capabilities for data at rest and in motion range from file type to predefined content based on dictionaries, regular expressions or data protection regulations such as GDPR, PCI DSS, CCPA, HIPAA, etc. Endpoint Protector features several specialized modules that can be mixed and matched based on client needs. The modules comprise: Content Aware Protection, Device Control, Enforced Encryption, and eDiscovery . It makes work more convenient, secure and enjoyable, offering an excellent ROI. -
11
Symantec Content Analysis
Broadcom
Symantec Content Analysis automatically escalates and brokers potential zero-day threats for dynamic sandboxing and validation before sending content to users. Analyze unknown content from one central location. Leveraging Symantec ProxySG, this malware analyzer uses a unique multi-layer inspection and dual-sandboxing approach to reveal malicious behavior and expose zero-day threats, and safely detonate suspicious files and URLs. Content Analysis delivers multi-layer file inspection to better protect your organization against known and unknown threats. Unknown or suspicious content from sources like ProxySG, messaging gateway, or other tools is delivered to Content Analysis for deep inspection, interrogation, analysis and ultimately blocking, if deemed malicious. Recent enhancements to Content Analysis strengthens this platform even further. -
12
McAfee Total Protection
McAfee
McAfee® Total Protection is the protection for today's security needs, so you can enjoy life online. Includes premium antivirus, safe browsing. With ID theft protection and secure VPN. It’s more than just antivirus software—it’s peace of mind. At McAfee, we protect what matters – you. We protect over 500 million devices with award-winning antivirus, but understand that you need a solution that protects your personal info, privacy, and helps you navigate safely online. Our multi-layered identity protection helps secure your accounts by alerting you if your info gets leaked online and generating & storing complex passwords automatically. Keep your credit card and personal info safe from prying eyes everywhere you go by turning unsecured networks into your own private connection with our secure VPN. Color-coded links expose dangerous and fraudulent sites on search results and social media pages—we’ll even steer you back to safety if you misclick.Starting Price: $19.99 per year -
13
Blancco Drive Eraser
Blancco
Ensure your sensitive data, regardless of the underlying technology, has been permanently sanitized from servers, laptops, Chromebooks, desktops, and drives with the most certified data erasure software solution on the market. Through our certified erasure process, organizations now have a secure method to erase data on storage devices in a cost-effective and eco-friendly manner. Guarantee your data has been erased from any type of drive-in desktop/laptop computers, servers, and storage environments with the most certified and patented erasure solution (Patent No. 9286231). Blancco’s secure erasure methods ensure data is written across the full logical capacity of the drive (and not just compressed). Whether you’re an ITAD, data center, enterprise, or other business that processes a large amount of data-bearing IT assets, there’s a solution for you. With the flexibility to address a wide range of assets, from loose drives to HDDs and SSDs, Blancco Drive Eraser is customizable. -
14
GTB Technologies DLP
GTB Technologies
Data Loss Prevention is defined as a system that performs real-time data classification on data at rest and in motion while automatically enforcing data security policies. Data in motion is data going to the cloud, internet, devices, or the printer. Our solution is the technology leader. Protecting on-premises, off-premises, and the cloud whether it be Mac, Linux, or Windows; our Data Loss Prevention security engine accurately detects structured & unstructured data at the binary level. GTB is the only Data Loss Prevention solution that accurately protects data when off the network. Discover, identify, classify, inventory, index, redact, re-mediate, index, control and protect your data including PII, PCI, PHI, IP, unstructured data, structured data, FERC, NERC, SOX, GLBA & more. Our patented and patent-pending, proprietary technology is able to prevent the syncing of sensitive data to unsanctioned or private clouds, while allowing its users to automatically identify “sync folders”. -
15
Trend Micro Cloud Edge
Trend Micro
Trend Micro Cloud Edge integrates with existing tools and processes for maximum efficiency and optimal security. Combines a physical appliance with an industry-unique cloud scanning function for maximum performance and protection. Benefit from a next-generation, on-premises unified threat management appliance plus the convenience of security as a service. Protection managed natively from the cloud provides zero-touch deployment, multi-tenant management, and complete control of your customers’ security in one central location. Simple deployment and user-friendly management allow you to maintain security without compromising on performance. With our unique, pay-as-you-go MSP pricing model, there are no upfront costs and no term commitments. Cloud Edge intelligently combines a comprehensive set of protection techniques and features, providing maximum protection and performance to your customers. -
16
Netskope
Netskope
Today, there’s more data and users outside the enterprise than inside, causing the network perimeter as we know it to dissolve. We need a new perimeter. One that is built in the cloud, and follows and protects data — wherever it goes. One that provides protection without slowing down or creating friction for the business. One that enables fast and secure access to the cloud and web using one of the world’s largest and fastest security networks, so you never have to sacrifice security for performance. This is the new perimeter. This is the Netskope Security Cloud. Reimagine your perimeter. That’s the vision of Netskope. The organic adoption of cloud and mobile in the enterprise presents challenges for security teams when it comes to managing risk without slowing down the business. Security has traditionally managed risk by applying heavy-handed controls, but today’s business wants to move fast without having velocity throttled. Netskope is redefining cloud, network, and data security. -
17
Sophos Cloud Native Security
Sophos
Complete multi-cloud security coverage across environments, workloads, and identities. Boost efficiency with a single integrated cloud security platform. Sophos Cloud Native Security unifies security tools across workloads, cloud environments, and entitlements management. Integrated with SIEM, collaboration, workflow, and DevOps tools to increase agility across an organization. Your cloud environments need to be tough, hard to compromise and quick to recover. Our comprehensive and intuitive security and remediation tools can be managed by your security teams, or via Managed Services to fast-track your cyber resilience to best meet the security incidents of today. Leverage our extended detection and response (XDR) tools to identify and stop malware, exploits, misconfigurations, and anomalous behaviors. Hunt for threats, prioritize detections, and automatically connect security events to optimize investigation and response. -
18
Palo Alto Networks Threat Prevention
Palo Alto Networks
Organizations face a barrage of attacks by threat actors driven by a variety of motives, including profit, ideology/hacktivism, or even organizational discontent. Attackers’ tactics continue to evolve, and traditional IPS solutions have not been able to keep pace and effectively protect organizations. To prevent intrusions, malware and command-and-control at each stage of its lifecycle and shut down advanced threats, Threat Prevention accelerates the security capabilities of our next-generation firewalls, protecting the network from advanced threats by identifying and scanning all traffic, applications, users, and content, across all ports and protocols. Daily threat intelligence is automatically curated, delivered to the NGFW and implemented by Threat Prevention to stop all threats. Reduce resources, complexity and latency by automatically blocking known malware, vulnerability exploits, and C2 using existing hardware and security teams. -
19
Forcepoint Data Classification
Forcepoint
Forcepoint Data Classification leverages Machine Learning (ML) and Artificial Intelligence (AI) to increase the accuracy of data classification for unstructured data to improve your team’s efficiency, reduce false alerts and better prevent data loss. Insight generated using AI drives an innovative approach to classification so you can accurately and efficiently determine how data should be classified, at scale. Coverage of the broadest range of data types in the industry powers efficiency and streamlines compliance while delivering better protection for organizations’ data. Increase the speed and efficiency of data classification to reduce false positives and spend more time on legitimate data security incidents. Forcepoint enables organizations to discover, classify, monitor, and protect data with a complementary suite of data security products. Gain a panoramic view of unstructured data across your organization. -
20
Proofpoint Enterprise Archive
Proofpoint
Legal, compliance and security pressures are evolving in the face of today’s data growth. That’s why you need a new secure approach to your data archiving challenges. Proofpoint Enterprise Archive is a cloud-based archiving solution that simplifies your legal discovery, regulatory compliance and end-user data access. It provides you with a secure and searchable central repository of a wide range of content types without the headaches of managing an email archive in-house. Meet your e-discovery obligations quickly, cost-effectively and defensibly. Our fully automated data archiving solution helps you collect, preserve, discover and manage the disposition of information. It works across the industry’s broadest collection of electronically stored information (ESI) sources. That includes email, enterprise collaboration data, social media data and SMS messages. With our advanced e-discovery features, you can expedite early case assessments and empower your legal team.
- Previous
- You're on page 1
- Next