26 Integrations with Netwrix Auditor
View a list of Netwrix Auditor integrations and software that integrates with Netwrix Auditor below. Compare the best Netwrix Auditor integrations as well as features, ratings, user reviews, and pricing of software that integrates with Netwrix Auditor. Here are the current Netwrix Auditor integrations in 2025:
- 
    1
    Microsoft 365Microsoft Microsoft 365 for Individuals is a complete productivity suite that combines powerful applications, secure cloud storage, and AI-driven tools to help users achieve more in their daily lives. It integrates popular apps like Word, Excel, PowerPoint, Outlook, OneNote, and OneDrive, all enhanced with Copilot—Microsoft’s intelligent AI companion. The platform enables seamless collaboration, creativity, and organization across devices, including PC, Mac, iPhone, iPad, and Android. With Microsoft Designer, users can create stunning visuals, while Clipchamp adds professional-grade video editing capabilities. Built-in Microsoft Defender provides advanced security for personal data and devices. Microsoft 365 empowers individuals to imagine, create, and accomplish with greater efficiency and confidence.Starting Price: $9.99/month
- 
    2
    Microsoft SharePointMicrosoft Microsoft SharePoint is a secure, enterprise-grade collaboration and content management platform that connects teams, information, and workflows. With AI-powered Copilot and SharePoint agents, users can instantly generate pages, summarize content, and surface insights from within their sites. It enables seamless document management, version control, and real-time collaboration—both inside and outside your organization. Customizable templates and drag-and-drop tools make it easy to design visually engaging intranet sites and portals. SharePoint also provides robust security and compliance features, including access controls, data governance, and conditional policies. Integrated deeply into Microsoft 365, it helps businesses streamline communication, boost productivity, and accelerate their AI transformation.Starting Price: $1.00/one-time/user
- 
    3
    Microsoft ExchangeMicrosoft Work smarter with business-class email and calendaring. Exchange helps you collaborate on your critical documents and gives you a focused inbox that prioritizes important messages and adapts to your work style, so you can get more done–faster. Get access to a more personalized inbox with helpful features and a smarter, more organized way to view and interact with email. Search enhancements give you faster and more complete results. With Add-ins, get powerful customization and extensibility, which connect you to modern services and internal line-of-business applications. Organize your time with a calendaring system that goes beyond basic scheduling of appointments and commitments. Automatically capture events from email such as flights and hotel reservations, and get suggestions about where to meet based on your location. Microsoft Exchange Online offers a hosted email service for business. Exchange Online helps protect your information with advanced capabilities.
- 
    4
    Microsoft Entra IDMicrosoft Microsoft Entra ID (formerly known as Azure Active Directory) is a comprehensive identity and access management cloud solution that combines core directory services, application access management, and advanced identity protection. Safeguard your organization with a cloud identity and access management solution that connects employees, customers, and partners to their apps, devices, and data. Protect access to resources and data using strong authentication and risk-based adaptive access policies without compromising user experience. Provide a fast, easy sign-in experience across your multicloud environment to keep your users productive, reduce time managing passwords, and increase productivity. Manage all your identities and access to all your applications in a central location, whether they’re in the cloud or on-premises, to improve visibility and control.
- 
    5
    SQL ServerMicrosoft Intelligence and security are built into Microsoft SQL Server 2019. You get extras without extra cost, along with best-in-class performance and flexibility for your on-premises needs. Take advantage of the efficiency and agility of the cloud by easily migrating to the cloud without changing code. Unlock insights and make predictions faster with Azure. Develop using the technology of your choice, including open source, backed by Microsoft's innovations. Easily integrate data into your apps and use a rich set of cognitive services to build human-like intelligence across any scale of data. AI is native to the data platform—you can unlock insights faster from all your data, on-premises and in the cloud. Combine your unique enterprise data and the world's data to build an intelligence-driven organization. Work with a flexible data platform that gives you a consistent experience across platforms and gets your innovations to market faster—you can build your apps and then deploy anywhere.Starting Price: Free
- 
    6
    Netwrix StrongpointNetwrix Netwrix Strongpoint helps organizations build smart controls that automate the hardest parts of SOX compliance management and audit reporting, access reviews and segregation of duties, data security, and change management. Netwrix Strongpoint works with NetSuite and Salesforce. With tight controls to track and protect what’s in scope, Strongpoint customers are able to produce airtight audit reporting on demand, greatly reducing the cost and time of SOX compliance prep. See what’s safe to change and what requires additional review. Then, use highly sophisticated impact analysis tools to streamline the discovery process. Not subject to SOX? Netwrix Strongpoint’s award-winning data security, configuration management, and change management tools help businesses running complex business systems maintain transparency and harden their business-critical applications against security risks.Starting Price: $1000/month
- 
    7
    Netwrix PingCastleNetwrix Netwrix Active Directory Risk Assessment is a free tool that identifies security gaps in your Active Directory and Group Policy. It provides visibility into account permissions and configurations, helping to detect and mitigate potential risks. The tool offers a comprehensive report detailing vulnerabilities, such as accounts with passwords set to never expire, disabled accounts that are not securely managed, and accounts with high privileges. By highlighting these issues, it enables organizations to take corrective actions to enhance their security posture. The assessment is straightforward to use, requiring no installation; it runs as a portable executable, making it convenient for IT administrators to evaluate their Active Directory environments quickly. Regular use of this tool can assist in maintaining a secure and compliant IT infrastructure by proactively identifying and addressing potential security weaknesses.Starting Price: Free
- 
    8
    Netwrix Enterprise AuditorNetwrix Netwrix Enterprise Auditor automates the collection and analysis of the data you need to answer the most difficult questions you face in the management and security of dozens of critical IT assets, including data, directories, and systems. All organizations, regardless of size, require tools to help them manage and secure the various technology resources that power their businesses. However, no organization has the ability to afford, efficiently operate, or maintain separate point products for every technology they leverage. What they need are solutions that are flexible enough to bend to their unique requirements, while also providing the extensibility to deliver a common set of capabilities across multiple platforms within their IT ecosystem. Netwrix Enterprise Auditor contains over 40 built-in data collection modules covering both on-premises and cloud-based platforms from Operating Systems to Office 365.Starting Price: $10.00/one-time/user
- 
    9
    Fortra Event ManagerFortra Real-time cybersecurity insight and response platform. As threats grow more sophisticated, speed is essential. Risks need to be identified and addressed before damage can occur. Fortra's SIEM software, Event Manager, prioritizes security risks in real time. Automated escalation and streamlined incident response with security event management fast-tracks your response time and resolution. Organizations today collect more security data than ever. Many security events require little to no attention, but serious issues require a rapid response. In that sea of security data, it's easy for important information to be overlooked. Event Manager reduces alert fatigue by identifying and escalating critical security events, enabling security analysts to respond quickly and effectively. In addition to default settings filtering out insignificant information or benign threats, users can fine tune the data they see, and add inclusion/exclusion rules about what exactly should be processed.
- 
    10
    Active DirectoryMicrosoft Active Directory stores information about objects on the network and makes this information easy for administrators and users to find and use. Active Directory uses a structured data store as the basis for a logical, hierarchical organization of directory information. This data store, also known as the directory, contains information about Active Directory objects. These objects typically include shared resources such as servers, volumes, printers, and the network user and computer accounts. For more information about the Active Directory data store, see Directory data store. Security is integrated with Active Directory through logon authentication and access control to objects in the directory. With a single network logon, administrators can manage directory data and organization throughout their network, and authorized network users can access resources anywhere on the network. Policy-based administration eases the management of even the most complex network.Starting Price: $1 per user per month
- 
    11
    Netwrix Privilege Secure for Access Management enables secure, task-based administrative access delivered just-in-time and with just-enough privilege. Reduce opportunity for lateral movement attacks through privileged account reduction. With Netwrix Privilege Secure for Access Management, organizations are empowered to reduce their risk footprint through a task-based approach to Privileged Access Management. Netwrix Privilege Secure for Access Management provides Administrators the exact level of privileges needed, exactly when they’re needed, for only as long as they’re needed, and returns the environment to a no-access-by-default state, immediately upon completion. Kill standing privilege by eliminating standing privilege. Instead, create temporary accounts with just enough access to perform the task at hand and remove them when the job is complete.
- 
    12
    Fine-grained rollback and recovery for Active Directory. Malicious or accidental changes to AD represent a significant security and performance risk. As the primary authentication and authorization service for the majority of IT systems, the importance of Active Directory (AD) integrity and availability is paramount. Rolling back or recovering changes – whether from human error or malicious intent – leveraging native AD capabilities is difficult at best, and in some cases impossible. While the AD Recycle Bin, when enabled, can recover a deleted object, Microsoft does not offer an out-of-the-box way to rollback changes to directory objects to a previous state. Netwrix Recovery for Active Directory enables organizations to quickly and easily rollback and recover unintended directory changes. e. Easily browse multiple snapshots and leverage granular full text search to effortlessly rollback and recover only the information that is required.
- 
    13
    Netwrix Data ClassificationNetwrix Does your organization’s ever-growing data give you a headache? Netwrix Data Classification solves your data-related challenges, such as mitigating the risk of data breaches, realizing the full value of your content, increasing employee productivity and passing compliance audits with less effort. Find sensitive content, such as financial data, medical records and other PII, both on premises and in the cloud. Automatically quarantine critical or sensitive data stored in unsecure locations or accessible by large groups of users to minimize its exposure until you can make a thoughtful remediation decision. Gain a better understanding of data patterns specific to your organization. With compound term processing and statistical analysis, you’ll get more relevant results than by relying on keywords and semantic analysis. Kick off your discovery in minutes with out-of-the-box rules that identify data protected by GDPR, PCI DSS, HIPAA and other regulations.
- 
    14
    SpoomSpoom Do you really have the overview? Different reports are created throughout the company, data and statistics are kept up to date and a lot of time is spent on this. Sales, marketing, customer service, production, HR, they all have their reportings & KPIs, but what do you do with all these data? Does every stakeholder get to see it? Do you remember why you track all these data? Can you see the impact of these KPIs on your companies goals & vision? And above all, does everyone know about its existence? Make connections between different data that were previously spread across different departments. Visualize the impact of KPIs on your companies goals and vision, and discover new opportunities. Create clarity when you and your employees need it most and see the impact of data on your future business, company and teams. Make sure everybody is on the same page and every action taken by your employees can be linked to your strategy.Starting Price: €40 per user per month
- 
    15
    Netwrix Password Policy EnforcerNetwrix Frustrate hackers, satisfy auditors and delight users with password policy enforcer from Netwrix. Leaked and weak passwords remain a gaping hole in IT networks, making it far too easy for attackers to gain the foothold they need to steal sensitive data, damage systems and unleash ransomware. Unfortunately, native Windows tools often cannot deliver the detailed configurations and rules required for modern password policies, leaving IT teams struggling to keep up with the changing threat landscape and evolving compliance requirements. Meanwhile, user productivity suffers and IT helpdesks are swamped as users grapple with unclear requirements for new passwords. Learn how Netwrix Password Policy Enforcer can help you achieve truly effective password enforcement without all the hassles.
- 
    16
    Netwrix 1SecureNetwrix Netwrix 1Secure is a SaaS solution designed to protect your IT infrastructure by monitoring critical changes in your environment, enabling you to respond to potential threats before serious damage occurs. It helps you discover risks in your IT environment before they become a problem. The solution offers alerts on critical changes, advanced search and filtering, risk assessment, human-readable reports, actionable dashboards, and exportable risk reports. Netwrix 1Secure relies on certified Microsoft Azure data centers, encrypts all data at rest and in transit, and supports multifactor authentication. Catch unintended or malicious changes in your IT infrastructure and assess the risks that threaten your organization. Be notified promptly about suspicious activity in your Microsoft 365 environment, Active Directory, or file servers, so you can respond in time to prevent serious damage. Customize the alerts based on your needs.
- 
    17
    Netwrix Endpoint ProtectorNetwrix Netwrix Endpoint Protector is an advanced enterprise-grade Data Loss Prevention (DLP) solution designed to protect sensitive data from unauthorized sharing and malicious extraction from employee endpoints. It offers cross-platform capabilities, supporting Windows, macOS, and Linux operating systems, ensuring comprehensive security across diverse IT environments. The solution provides customizable device control to manage USB and peripheral ports, preventing unauthorized data transfers and mitigating risks associated with data leaks. Additionally, it includes content inspection features that enforce sophisticated policies based on sensitive data categories, keywords, and file types, effectively preventing unauthorized data transfers. Netwrix Endpoint Protector also assists organizations in achieving regulatory compliance with standards such as GDPR, HIPAA, and PCI DSS by securing personally identifiable information, protected health information, and payment card information.
- 
    18
    Netwrix GroupIDNetwrix The user accounts and groups in your Active Directory and Microsoft Entra ID (formerly Azure AD) provide access to your sensitive data and systems. But trying to manage groups and users manually is a huge burden on your precious IT resources and often leads to errors that create security vulnerabilities. Netwrix GroupID automates and delegates group and user management to ensure your directories remain current, empowering you to enhance security while increasing IT productivity. Create queries that dynamically determine group membership based on users’ current attributes. In addition, ensure any attribute change to a parent group is automatically reflected in its child groups. Automatically provision and deprovision user accounts by syncing data from an authoritative source such as your HRIS platform. Sync changes to groups and users across identity stores in near real time — without any third-party connector.
- 
    19
    VMware ESXiBroadcom Discover a robust, bare-metal hypervisor that installs directly onto your physical server. With direct access to and control of underlying resources, VMware ESXi effectively partitions hardware to consolidate applications and cut costs. It’s the industry leader for efficient architecture, setting the standard for reliability, performance, and support. IT teams are under constant pressure to meet fluctuating market trends and heightened customer demands. At the same time, they must stretch IT resources to accommodate increasingly complex projects. Fortunately, ESXi helps balance the need for both better business outcomes and IT savings.
- 
    20
    Nutanix Files StorageNutanix Nutanix Files Storage is a simple, flexible and intelligent scale-out file storage service for the data driven era. Update non-disruptively with a single click, and manage all storage from a single pane of glass. Scale-up or scale-out flexibly on the hardware of your choice and enjoy cloud-like consumption. Know your data, who’s using it, and how—and then drive automated management and control. IDC study shows how Nutanix Files Storage reduces operational overhead by 66% over traditional siloed storage resulting in 414% ROI and 7 month pay back. Nutanix Files Storage is built to handle billions of files and tens of thousands of user sessions. As your environment grows, just one click will elastically scale your cluster up by adding more compute and/or memory to the file server VMs, or out by adding more file server VMs. All from a single platform. You can also provide object and block storage using the same resources.
- 
    21
    SmartShareEASI The flexible Collaboration Suite for efficient teams. SmartShare brings all crucial information about what's going on together in one single, centralized system. The famous Company Overview feature shows all possible information about a customer in one single screen: ongoing projects, deals, contracts, offerings, etc. SmartShare brings structure in the way people work and share information. Collaboration between colleagues and teams is drastically improved thanks to the centralization of information in the shared environment. Customers report a time gain of 1h per day per employee. An advanced integrated access rights management system allows to make sure that information is only accessible to persons with sufficient access rights. Access rights can be managed at multiple level: individual, team, binder, project, document, etc. Emails are managed in the shared environment, which brings a huge productivity gain and efficient collaboration.
- 
    22
    Azure MarketplaceMicrosoft Azure Marketplace is a comprehensive online store that provides access to thousands of certified, ready-to-use software applications, services, and solutions from Microsoft and third-party vendors. It enables businesses to discover, purchase, and deploy software directly within the Azure cloud environment. The marketplace offers a wide range of products, including virtual machine images, AI and machine learning models, developer tools, security solutions, and industry-specific applications. With flexible pricing options like pay-as-you-go, free trials, and subscription models, Azure Marketplace simplifies the procurement process and centralizes billing through a single Azure invoice. It supports seamless integration with Azure services, enabling organizations to enhance their cloud infrastructure, streamline workflows, and accelerate digital transformation initiatives.
- 
    23
    ONTAPNetApp ONTAP: The industry-leading enterprise data management software. You need a solid foundation for your seamless hybrid cloud. NetApp® ONTAP® data management software gives you every advantage possible—everywhere. Looks like you just won the data management lottery. Seamlessly manage your data as it flows to and from wherever you need it most. We get it—you have more than one “#1 priority” right now…Help your business grow. Reliably support your current applications. Anticipate and prepare for the future. Plus, do it all without additional IT budget. With ONTAP, you don’t need to compromise to achieve these priorities. Quickly respond to new business challenges, simplify your day-to-day activities, and impress your team. Sound like your cup of tea? Whatever your data management needs—on your premises and in the cloud—ONTAP has you covered.
- 
    24
    Netwrix Change TrackerNetwrix Netwrix Change Tracker provides critical and fundamental cyber security prevention and detection. It does this by leveraging the required security best practice disciplines of system configuration and integrity assurance combined with the most comprehensive and intelligent change control solution available. Netwrix Change Tracker will ensure that your IT systems remain in a known, secure and compliant state at all times. Netwrix Change Tracker includes context-based File Integrity Monitoring and File Whitelisting to assure all change activity is automatically analyzed and validated. Complete and certified CIS and DISA STIG configuration hardening ensures all systems remain securely configured at all times and, coupled with the most intelligent change control technology, provides unparalleled change noise reduction along with the ultimate reassurance that the changes occurring within your production environment are consistent, safe and as required.
- 
    25
    VMware vSphereBroadcom Get the power of the enterprise workload engine. Boost workload performance, improve security and speed up innovation for your business. vSphere delivers essential services for the modern hybrid cloud. The new vSphere has been rearchitected with native Kubernetes to run existing enterprise applications alongside modern containerized applications in a unified manner. Transform on-premises infrastructure with cloud integration. Boost productivity with central management, global insights and automation. Power up with add-on cloud services. Meet the throughput and latency needs of distributed workloads by accelerating networking functions on the DPU. Free up GPU resources for faster AI/ML model training and higher complexity models.
- 
    26
    Oracle DatabaseOracle Oracle database products offer customers cost-optimized and high-performance versions of Oracle Database, the world's leading converged, multi-model database management system, as well as in-memory, NoSQL, and MySQL databases. Oracle Autonomous Database, available on-premises via Oracle Cloud@Customer or in the Oracle Cloud Infrastructure, enables customers to simplify relational database environments and reduce management workloads. Oracle Autonomous Database eliminates the complexity of operating and securing Oracle Database while giving customers the highest levels of performance, scalability, and availability. Oracle Database can be deployed on-premises when customers have data residency and network latency concerns. Customers with applications that are dependent on specific Oracle database versions have complete control over the versions they run and when those versions change.
- Previous
- You're on page 1
- Next