31 Integrations with Lucidum
View a list of Lucidum integrations and software that integrates with Lucidum below. Compare the best Lucidum integrations as well as features, ratings, user reviews, and pricing of software that integrates with Lucidum. Here are the current Lucidum integrations in 2025:
-
1
BambooHR
BambooHR
BambooHR is an award-winning HR platform that helps your growing organizations automate, centralize, and connect your people data all in one place. It gives you a one-stop shop to: - Manage data - Hire top talent - Run payroll - Measure the employee experience - And connect integrations By consolidating your HR software with the BambooHR platform, you are freeing yourself up to focus on what matters most—growing your people, improving the employee experience, and taking your organization forward.Starting Price: $175 per month -
2
Auvik
Auvik Networks
Auvik's cloud-based network monitroing and management software gives you instant insight into the networks you manage, and automates complex and time-consuming network tasks. You get complete network visibility and control. Real-time network mapping & inventory means you'll always know exactly whats where, even as your users move. Automated config backup & restore on network devices means you'll mitigate network risk with no manual effort. And deep network traffic insights is a game changer. Whether you are a corporate IT professional or a Managed Service Provider, Auvik has a simple, out of the box solution for you and your team that only take minutes to deploy. -
3
Asana
Asana
Asana helps teams orchestrate their work–from daily tasks to strategic cross-functional initiatives. With Asana, teams are more confident, move faster, and accomplish more with less—no matter where they are located. More than 119,000 paying customers and millions of free organizations across 190 countries rely on Asana to manage everything from company objectives to digital transformation to product launches and marketing campaigns. In Asana, you can track the status of initiatives with ease and get an accurate view of how you’re progressing towards goals. Report on project progress in minutes with real-time work reporting to create visibility for teams and stakeholders. Join millions of users getting work done with a free trial.Starting Price: Free -
4
Atera
Atera
Atera, the first and only Agentic AI platform for IT management, offers IT teams and MSPs a digital workforce of AI agents to preemptively and autonomously manage their entire IT operations. Its all-in-one platform combines RMM, helpdesk, ticketing, and automation to reduce downtime, improve SLAs, and free IT teams to focus on strategic work over mundane tasks. At the core of Atera’s platform are two powerful AI agents built to enhance every layer of IT operations. AI Copilot helps technicians troubleshoot devices, run diagnostics, and generate actionable solutions in real time. IT Autopilot delivers 24/7/365, autonomously resolving Tier-1 issues and reducing IT workload by up to 40%. It acts like a personal AI technician for every employee, freeing your team to focus on what really matters. Trusted by 13K+ customers in over 120 countries, Atera scales with your needs while maintaining the highest security and compliance standards.Starting Price: 30-DAY FREE TRIAL -
5
Airtable
Airtable
Organize your work your way with Airtable. An all-in-one collaboration software, Airtable combines the power of a relational database with the flexibility and ease of use of a spreadsheet. It works across platforms and devices, and syncs data in real-time. Users can choose from different formats to view the tasks at hand, including grid, calendar, Kanban, gallery, and forms.Starting Price: $12.00/month/user -
6
Amazon Web Services (AWS)
Amazon
Whether you're looking for compute power, database storage, content delivery, or other functionality, AWS has the services to help you build sophisticated applications with increased flexibility, scalability and reliability. Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud platform, offering over 175 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups, largest enterprises, and leading government agencies—are using AWS to lower costs, become more agile, and innovate faster. AWS has significantly more services, and more features within those services, than any other cloud provider–from infrastructure technologies like compute, storage, and databases–to emerging technologies, such as machine learning and artificial intelligence, data lakes and analytics, and Internet of Things. This makes it faster, easier, and more cost effective to move your existing applications to the cloud. -
7
Addigy
Addigy
Addigy is the the only Apple Device Management platform that lets IT admins manage Apple devices in real-time, including macOS, iOS, iPadOS and tvOS devices. Our cloud-based multi-tenant platform combines MDM with live agent capabilities to manage and secure your Apple ecosystem — whether you’re managing 100 devices or 10,000. Addigy Guarantees Your Apple Success! How? Let us show you: • Real-time monitoring and management of all your Apple devices. • Secure user onboarding, fully automated. Deploy a new Mac in less than 5 minutes. • Custom compliance support to enforce policies for both groups and individual devices. • Easy software updates. Report, configure, and deploy all OS and third-party software updates. • Instant remote access to macOS devices for fast troubleshooting and issue resolution. Everything your team needs for optimal Apple management—and nothing you don’t.Starting Price: $5 to $6 per device -
8
Bitbucket
Atlassian
Bitbucket is more than just Git code management. Bitbucket gives teams one place to plan projects, collaborate on code, test, and deploy. Free for small teams under 5 and priced to scale with Standard ($3/user/mo) or Premium ($6/user/mo) plans. Keep your projects organized by creating Bitbucket branches right from Jira issues or Trello cards. Build, test and deploy with integrated CI/CD. Benefit from configuration as code and fast feedback loops. Approve code review more efficiently with pull requests. Create a merge checklist with designated approvers and hold discussions right in the source code with inline comments. Bitbucket Pipelines with Deployments lets you build, test and deploy with integrated CI/CD. Benefit from configuration as code and fast feedback loops. Know your code is secure in the Cloud with IP whitelisting and required 2-step verification. Restrict access to certain users, and control their actions with branch permissions and merge checks for quality code.Starting Price: $15 per month -
9
Aha!
Aha! Labs
Aha! is the world's #1 product development software. We help more than 1 million product builders go from discovery to delivery and bring their strategy to life. Our suite of tools includes Aha! Roadmaps, Aha! Discovery, Aha! Ideas, Aha! Whiteboards, Aha! Knowledge, Aha! Teamwork, and Aha! Develop. Aha! Roadmaps Set plans based on strategy, resources, and what customers value most. Aha! Discovery Jump-start customer interviews and discover key product insights. Aha! Ideas Engage with customers more deeply to better understand what they will pay for. Aha! Whiteboards Product teams deserve a whiteboarding tool that is tailored to their needs. Aha! Knowledge Centralize product information so that internal teams and customers can easily access the resources they need. Aha! Teamwork Manage projects your way while staying aligned with key objectives. Aha! Develop Connect to the roadmap, optimize your workload, and streamline development workflows.Starting Price: $59 per user per month -
10
Bitdefender GravityZone
Bitdefender
Bitdefender GravityZone provides full visibility into organizations' overall security posture, global security threats, and control over its security services that protect virtual or physical desktops, servers and mobile devices. All Bitdefender's Enterprise Security solutions are managed within the GravityZone through a single console, Control Center, that provides control, reporting, and alerting services for various roles within the organization -
11
Absolute Secure Endpoint
Absolute Software
Manage and secure your data, devices, and applications with an unbreakable connection to every endpoint — on or off your network. Absolute gives you unparalleled line-of-sight to your devices and data. The self-healing connection keeps critical applications such as SCCM, VPN, antivirus, and encryption present, healthy, and up-to-date. And sensitive data remains protected, even when accessed from outside your network. Maintain complete control of every endpoint, with a comprehensive library of automated, custom workflows — no scripting required. Reduce the load on your IT and security teams with pre-built commands for enforcing Windows updates, managing device configurations, and resolving issues — from helpdesk tickets to security events. Absolute is the only endpoint security solution factory-installed by every major PC manufacturer. Embedded in the BIOS of over half a billion devices, chances are, you already have it. All you have to do is activate it. -
12
Automox
Automox
Cloud-native and globally available, Automox enforces OS & third-party patch management, security configurations, and custom scripting across Windows, Mac, and Linux from a single intuitive console. IT and SecOps can quickly gain control and share visibility of on-prem, remote and virtual endpoints without the need to deploy costly infrastructure.Starting Price: $3.00 -
13
Asset Panda
Asset Panda
Asset Panda's cloud-based no code solution goes beyond asset tracking to create customizable apps that save time and money. Organizations of all sizes in every industry have benefited from our secure and easy-to-use system that works the way they do. Asset Panda's ability to implement custom workflows, actions, and groups enables our clients to replace time-consuming processes that slow down their organizations. As a result, they see time savings that result in an ROI as high as 800%. With a powerful combination of web and mobile apps, the system provides any time, anywhere access to everything that's most important to our clients. Our mobile apps also have barcode scanning built in, which eliminates the need to purchase expensive and bulky barcode scanning equipment. Role-based user management enables access to Asset Panda across an entire organization and ensures that users will only see what they need to. -
14
bitFit
bitFit
Gone are the days of getting bogged down in the back-and-forth of equipment requests and delays – bitFit helps you automate the stockroom and IT equipment ordering process so your team can spend more time focused on productivity. Our stockroom features enable your organization to standardize equipment being offered and distribute your IT assets according to where they’re needed most. Eliminate time spent by IT operations, finance and other employees by streamlining the process of getting team members the equipment they need to be productive. See how automation can save your team hundreds of hours, reducing manual work to zero. Far too many companies lose track of their infrastructure purchases the moment there is an asset tag assigned to it. After purchase, no one knows what the utilization and return on those assets is over time.Starting Price: $250/month -
15
baramundi Management Suite
baramundi Software USA
Modular, scalable and highly cost-effective Unified Endpoint Management system for comprehensive IT management, security and workflow automation. Modules work together via a single database in a single user interface. Select any of 18 available modules now and add others as needed for OS Install & Cloning, Patch Management, Vulnerability Management, MDM, Remote Control, Inventory, VM Management, SNMP Device Management, Application Control, Disaster Recovery, Personal Backup and more.Starting Price: $5000.00/one-time -
16
Wasp AssetCloud
Wasp Barcode Technologies
AssetCloud by Wasp Barcode technologies is a complete asset tracking software that automates how businesses tag, track, and report their fixed assets. Feature-rich and easy-to-use, AssetCloud improves check-in and checkout processes and offers centralized role-based security, faster auditing, and error-free reporting. AssetCloud has numerous use cases, including tool tracking, equipment tracking, IT asset tracking, and facility management, among others. -
17
BigID
BigID
BigID is data visibility and control for all types of data, everywhere. Reimagine data management for privacy, security, and governance across your entire data landscape. With BigID, you can automatically discover and manage personal and sensitive data – and take action for privacy, protection, and perspective. BigID uses advanced machine learning and data intelligence to help enterprises better manage and protect their customer & sensitive data, meet data privacy and protection regulations, and leverage unmatched coverage for all data across all data stores. 2 -
18
BeyondTrust Password Safe
BeyondTrust
Discover, manage, audit, and monitor privileged accounts of all types. Scan, identify and profile all assets and applications with auto-onboarding of privileged accounts. Store, manage and rotate privileged account passwords, eliminating embedded credentials and ensuring password strength. Log and monitor all privileged credential activity and sessions for compliance and forensic review. Use Password Safe to get finely-tuned and automatic password management and privilege approval controls, detailed session management (including real-time monitoring), and all the audit trail information and forensics needed to meet compliance requirements. Automatically discover and onboard accounts. Store, manage and rotate privileged passwords, eliminating embedded credentials in scripts and code. Log and monitor all privileged credential activity and sessions for compliance and forensic review. -
19
Arista NDR
Arista
Today, a zero trust networking approach to security is paramount for organizations looking to build a robust cybersecurity program. Irrespective of which device, application, or user is accessing an enterprise resource, zero trust focuses on complete visibility and control over all activity on the network. Arista’s zero trust networking principles, based on NIST 800-207, help customers address this challenge with three cornerstones: visibility, continuous diagnostics, and enforcement. The Arista NDR platform delivers continuous diagnostics for the entire enterprise threat landscape, processes countless points of data, senses abnormalities or threats, and reacts if necessary—all in a matter of seconds. The Arista solution stands out from traditional security because it is designed to mimic the human brain. It recognizes malicious intent and learns over time, giving defenders greater visibility and insight into what threats exist and how to respond to them. -
20
Riverbed Aternity
Riverbed Technology
The Riverbed Aternity platform provides AI-powered analytics and self-healing control to improve employee productivity and customer satisfaction, get to market fast with high quality apps, drive down the cost of IT operations, and mitigate the risk of IT transformation. Riverbed Aternity delivers AI-enabled insights based on real end user experience data and high-fidelity telemetry across endpoints, application, infrastructure and network. With capabilities such as DXI (benchmarking), Intelligent Service Desk, AI-enabled troubleshooting, Digital Workplace teams can drive continuous service improvement and prevent incidents across the enterprise. Discover how Aternity can help enterprises gain full-estate visibility, reduce IT asset costs, advance sustainable IT and improve both employee and customer happiness. -
21
Aqua
Aqua Security
Full lifecycle security for container-based and serverless applications, from your CI/CD pipeline to runtime production environments. Aqua runs on-prem or in the cloud, at any scale. Prevent them before they happen, stop them when they happen. Aqua Security’s Team Nautilus focuses on uncovering new threats and attacks that target the cloud native stack. By researching emerging cloud threats, we aspire to create methods and tools that enable organizations to stop cloud native attacks. Aqua protects applications from development to production, across VMs, containers, and serverless workloads, up and down the stack. Release and update software at DevOps speed with security automation. Detect vulnerabilities and malware early and fix them fast, and allow only safe artifacts to progress through your CI/CD pipeline. Protect cloud native applications by minimizing their attack surface, detecting vulnerabilities, embedded secrets, and other security issues during the development cycle. -
22
Barracuda CloudGen Access
Barracuda
Securely manage your remote workforce with instant provisioning of company or employee-owned devices and unmanaged contractor endpoints. Mitigate breach risks with Zero Trust secure access. Deliver continuous verification of user and device identity and trust to reduce attack surface. Empower employees with streamlined access, increased security and upgraded performance compared to traditional VPN technology. Security starts with access. The CloudGen Access Zero Trust model establishes unparalleled access control across users and devices without the performance pitfalls of a traditional VPN. It provides remote, conditional, and contextual access to resources and reduces over-privileged access and associated third-party risks. With CloudGen Access, employees and partners can access corporate apps and cloud workloads without creating additional attack surfaces. -
23
BeyondTrust Privileged Remote Access
BeyondTrust
Secure, manage, and audit vendor and internal remote privileged access without a VPN. Watch demo. Give legitimate users the access they need to be productive, while keeping attackers out. Give contractors and vendors privileged access to critical assets without giving them a VPN. Satisfy internal and external compliance requirements with comprehensive audit trails and session forensics. Guarantee adoption with a system that actually lets users do their jobs faster and easier than they do today. Prevent “privilege creep” and quickly enforce least privilege to protect your IT assets. Make least privilege productive and combat data breaches, without sacrificing security. Standardized, secure, and complete privileged session management solution that controls the access to and from any platform in any environment. Eliminate manual credential check-in and check-out. -
24
Airlock
Airlock
Airlock's Secure Access Hub protects applications, APIs and data from identity theft and the most common attacks on Web applications. Security meets convenience, Airlock offers your customers a customer journey without media breaks with single sign-on, social registration, comprehensive user self-services and consent management. Acting in line with the market means reacting quickly. The Airlock Secure Access Hub therefore provides all important security functions such as registration, authentication and self services. So you can concentrate all your IT resources on your business processes. The Airlock Secure Access Hub helps to meet all international compliance standards - from GDPR over PSD2, PCI-DSS, OWASP to MAS. The upstream enforcement point for access policies onto applications and services allows compliance with regulations without having to make adjustments in each individual application. -
25
Bionic
Bionic
Bionic uses an agentless approach to collect all of your application artifacts and provides a deeper level of application visibility that your CSPM tool cannot. Bionic continuously collects your application artifacts and creates an inventory of all of your applications, services, message brokers, and databases. Bionic integrates as a step in CI/CD pipelines and detects critical risks in the application layer and code, so teams can validate security posture in production. Bionic analyzes your code, performing checks for critical CVEs, and provides deeper insights into the blast radius of potential attacks surfaces. Bionic prioritizes code vulnerabilities based on the context of the overall application architecture. Create customized policies to prioritize architecture risk based on your company's security standards. -
26
Adaptive Shield
Adaptive Shield
Adaptive Shield is the SaaS Security Posture Management (SSPM) platform of choice to regain control over the company’s SaaS stack security. Adaptive Shield equips CISOs and IT security teams with a solution that integrates with all the business-critical SaaS apps, interprets every security setting misconfiguration, and gives full visibility and control in a single pane of glass. The core of the solution is the detailed and granular security checks being continuously performed across the SaaS stack. As a SaaS app that integrates with any SaaS app, Adaptive Shield can be live within minutes, delivering clear visibility into the whole SaaS ecosystem with a posture score per app. Continuously monitor and remediate SaaS misconfigurations automatically. While the native security controls of SaaS apps are often robust, it falls on the responsibility of the organization to ensure that all configurations are properly set, from global settings to every user role and privilege. -
27
Admin By Request
Admin By Request
With rapid provisioning of Just-In-Time privilege elevation across your entire workforce. On-board and manage workstations and servers via a user-friendly portal. To reveal risky users and assets through thread and behavioral analytics to identify malicious software and prevent data breaches and malware attacks. By elevating applications - not users. Delegate privileges based on the user or groups to save time and monetary resources. Whether a developer in the IT department, a tech newbie in HR, or a third-party consultant needing to service one of your endpoints, there's a method of elevation appropriate for every user. All features come out-of-the-box with Admin By Request and can be tailored to the needs of individual users or groups. -
28
BlackBerry UEM
BlackBerry
With diverse endpoints that include smartphones, tablets, laptops and other devices with different ownership models and running different operating systems, it’s essential for organizations to have control and visibility across the entire ecosystem. BlackBerry® offers solutions to open up choice for your employees while maintaining security. Employees are increasingly looking for the flexibility to use their smartphone of choice for work. When done securely, this can reduce costs and boost morale. A comprehensive Mobile Device Management strategy needs to deliver flexibility that can evolve with your changing mobility needs. BlackBerry solutions can allow you to deploy MDM securely and in a way that meets your business needs. -
29
BeyondTrust Endpoint Privilege Management
BeyondTrust
Eliminate unnecessary privileges and elevate rights to Windows, Mac, Unix, Linux and network devices without hindering productivity. Our experience implementing across over 50 million endpoints has helped create a deployment approach with rapid time to value. Available on-premise or in the cloud, BeyondTrust enables you to eliminate admin rights quickly and efficiently, without disrupting user productivity or driving up service desk tickets. Unix and Linux systems present high-value targets for external attackers and malicious insiders. The same holds true for networked devices, such as IoT, ICS and SCADA. Gaining root or other privileged credentials makes it easy for attackers to fly under the radar and access sensitive systems and data. BeyondTrust Privilege Management for Unix & Linux is an enterprise-class, gold-standard privilege management solution that helps security and IT organizations achieve compliance. -
30
BitSight
BitSight
Make data-driven decisions to reduce cyber risk with the world's leading security ratings platform. BitSight offers the most widely adopted Security Ratings solution with a mission to change the way the world addresses cyber risk. BitSight provides data-driven, dynamic measurements of an organization’s cybersecurity performance: derived from objective, verifiable information, material and validated measurements, created by a trusted, independent organization. BitSight for Security Performance Management helps security and risk leaders take a risk-based, outcome-driven approach to managing the performance of their organization’s cybersecurity program through broad measurement, continuous monitoring, and detailed planning and forecasting in an effort to measurably reduce cyber risk. Have the confidence to make faster, more strategic cyber risk management decisions. -
31
ADP Celergo
ADP
ADP® Celergo offers managed payroll services through a platform with extensive and flexible reporting. This innovative technology, combined with the support of ADP’s client services team, simplifies and helps ensure accurate sourcing, managing, and delivery of payroll services across multiple countries. ADP has reimagined work with a global payroll solution that centralizes your international payroll data into a single system of record. With all of your payroll data aggregated in a single place, you’ll have the ability to think big and drill down deep. Add to this easy integration with ADP’s Global View HCM and other popular HR systems, and your payroll data becomes a powerful strategic tool. ADP has service centers around the world and across all time zones to make sure we can support your needs no matter where your teams are located.
- Previous
- You're on page 1
- Next