35 Integrations with Securden Password Vault for Enterprises
View a list of Securden Password Vault for Enterprises integrations and software that integrates with Securden Password Vault for Enterprises below. Compare the best Securden Password Vault for Enterprises integrations as well as features, ratings, user reviews, and pricing of software that integrates with Securden Password Vault for Enterprises. Here are the current Securden Password Vault for Enterprises integrations in 2026:
-
1
Freshservice
Freshworks
If you're looking for an IT service desk solution that's actually simple, turn to Freshservice. A plug-and-play ITIL service desk by Freshworks, Freshservice helps businesses modernize IT and other business functions--without the cost and complexity. Freshservice offers everything teams need for proactive IT service management, including ticketing and asset management, configuration management and enhanced impact analysis, robust incident management functionalities, and more.Starting Price: $19/agent/month -
2
Zendesk
Zendesk
Zendesk is an AI-powered service solution that’s easy to set up, use, and scale. It works out-of-the-box and adapts quickly, enabling businesses to move faster. Built on billions of CX interactions, Zendesk AI supports the whole service journey—from self-service to agents to admins—helping teams resolve issues faster and operate efficiently at scale. Zendesk empowers agents with tools, insights, and context to deliver personalized service on any channel—social messaging, phone, or email. It unifies personalized conversations, omnichannel case management, AI workflows, automation, and a Marketplace of 1200+ apps. Easy to implement, it frees teams from relying on IT or costly partners. Serving over 130K global brands in 30+ languages, Zendesk simplifies business complexity to create meaningful customer connections. Headquartered in San Francisco, it operates worldwide.Starting Price: $25/agent/month -
3
Freshdesk
Freshworks
Freshdesk (a product of Freshworks Inc.) is a modern, AI-powered customer service solution with enterprise capability without the enterprise complexity. Freshdesk unifies channels, conversations, AI capabilities, customer insights, and advanced ticketing into one place in the Freshdesk Command Center so agents are ready to resolve complaints. With Freddy, People-first AI, customer service teams can take AI agents live in minutes to fully resolve complex and simple queries, get response and resolution assistance from AI copilot, and stay ahead with AI insights. Freshdesk also comes packed with advanced workflows, automations, and self service so you can easily set up and scale customer service on any channel–whether you’re a support team of 10 or 500. Freshdesk is quick to set up, easy to use, and designed for rapid impact—it delivers 225% ROI, 95% omnichannel first contact resolution rate, and up to 80% resolutions with AI agents.Starting Price: $29/month/user -
4
Chrome OS
Google
Chromebooks have the everything button. It’s one button that helps you find what you need fast. Like files. And apps. And answers online. Press it, and get what you need — all from one place. Work and play with up to 12 hours on a single charge. With Chromebook, you don’t even need to remember your charger. Battery life may vary based on device and upon usage and other conditions. No Wi-Fi, no problem. Recent documents, spreadsheets, presentations and emails are all available with offline access. Pre-download content and enable offline access for documents, presentations and emails to view offline later. Swipe, tap and scroll the way you want. There are many touchscreen-enabled* Chromebooks. Instant tethering with Chromebook keeps you connected to your phone’s Wi-Fi hotspot automatically. -
5
Google Authenticator
Google
Google Authenticator generates 2-Step Verification codes on your phone. 2-Step Verification provides stronger security for your Google Account by requiring a second step of verification when you sign in. In addition to your password, you’ll also need a code generated by the Google Authenticator app on your phone. You can use your Google Account to more easily and securely sign in to thousands of sites and services on the web, while keeping your privacy choices transparent in one place. Protect your Google Account with Security Checkup. This detailed tool provides you with personalized and practical recommendations to help you strengthen the security of your Google Account. Hacked passwords are more common than you think. Two-step verification protects you from unauthorized access to your account. To do this, it requests a second step after entering the password. -
6
Cisco Duo
Cisco
Cisco Duo is a cloud-based identity security solution that protects organizations from identity-based threats and boosts workforce productivity. Trusted by over 40,000 organizations worldwide, Duo delivers an exceptional access management experience across all users, devices, and applications, making access to resources secure, seamless, and easy. Duo with Cisco Identity Intelligence provides deep visibility across your identity ecosystem, adding a powerful security layer to any identity infrastructure. Offer users a world-class access experience through Duo Passport to eliminate MFA friction and fatigue without sacrificing security. To stop threats, Duo verifies user identities with strong authenticators including Duo passwordless, Verified Duo Push with number matching, and phishing-resistant factors like biometrics and FIDO2 security keys. Paired with deep insights into users’ devices, Duo gives you the control to adaptively limit access based on device health or user risk.Starting Price: $3 per user per month -
7
Jira
Atlassian
Jira is the only project management tool you need to plan and track work across every team. Jira by Atlassian is the #1 software development tool for teams planning and building great products. Trusted by thousands of teams, Jira offers access to a wide range of tools for planning, tracking, and releasing world-class software, capturing and organizing issues, assigning work, and following team activity. It also integrates with leading developer tools for end-to-end traceability. From short projects, to large cross-functional programs, Jira helps break big ideas down into achievable steps. Organize work, create milestones, map dependencies and more. Link work to goals so everyone can see how their work contributes to company objectives and stay aligned to what’s important. Your next move, suggested by AI. Atlassian Intelligence takes your big ideas and automatically suggests the tasks to help get it done.Starting Price: Free -
8
Microsoft Outlook
Microsoft
Microsoft Outlook is the all-in-one email, calendar, and contact management platform designed to keep you organized and connected across your digital life. With Outlook, you can manage multiple accounts—including Gmail, Yahoo, and iCloud—within one unified inbox. Intelligent scheduling tools and shared calendars help you stay on top of meetings, events, and personal reminders. The built-in Microsoft Copilot assists with writing emails, summarizing long threads, and managing tasks to boost productivity. Outlook also offers enterprise-grade security, filtering out spam, phishing, and malware to keep your data safe. Whether on desktop, mobile, or web, Outlook helps you manage communication and time with clarity and confidence. -
9
Safari
Apple
Safari is the best way to experience the internet on all your Apple devices. It brings robust customization options, powerful privacy protections, and industry-leading battery life — so you can browse how you like, when you like. And when it comes to speed, it’s the world’s fastest browser. Safari now includes new personalization options including a customizable start page and even more third-party extensions. The reimagined start page gives you the power to set a custom background image and fine-tune your browser window with your favorite features — like Reading List, Favorites, iCloud Tabs, Siri Suggestions, and even a Privacy Report. Safari Extensions add functionality to your browser to help you explore the web the way you want. Find and add your favorite extensions in the dedicated Safari section on the App Store. With a blazing-fast JavaScript engine, Safari is the world’s fastest browser.Starting Price: Free -
10
Mozilla Firefox
Mozilla
Mozilla Firefox is a free, open-source web browser developed by the Mozilla Foundation, a non-profit organization dedicated to internet health and privacy. Designed to prioritize user privacy and security, Firefox offers features like Total Cookie Protection, which provides outstanding privacy by default. The browser includes tools such as Firefox View, allowing users to see tabs open on other devices and access recent history, and built-in PDF editing capabilities, enabling form edits directly within the browser. Available across various platforms, including Windows, macOS, Linux, Android, and iOS, Firefox ensures a consistent and secure browsing experience. Its commitment to user-centric development and transparency makes it a preferred choice for those seeking a trustworthy alternative to proprietary browsers.Starting Price: Free -
11
Microsoft Authenticator
Microsoft
Go passwordless. Enter your username and confirm your sign-in with your phone. It’s that easy! Passwords can be forgotten, stolen, or compromised. With Authenticator, your phone provides an extra layer of security on top of your PIN or fingerprint. Use Authenticator to sign-in to Outlook, OneDrive, Office, and more. Protect all of your accounts with two-step verification. The app also helps you secure all of your online accounts by using the industry standard time-based OTP (one-time password) codes. -
12
GitLab
GitLab
GitLab is a complete DevOps platform. With GitLab, you get a complete CI/CD toolchain out-of-the-box. One interface. One conversation. One permission model. GitLab is a complete DevOps platform, delivered as a single application, fundamentally changing the way Development, Security, and Ops teams collaborate. GitLab helps teams accelerate software delivery from weeks to minutes, reduce development costs, and reduce the risk of application vulnerabilities while increasing developer productivity. Source code management enables coordination, sharing and collaboration across the entire software development team. Track and merge branches, audit changes and enable concurrent work, to accelerate software delivery. Review code, discuss changes, share knowledge, and identify defects in code among distributed teams via asynchronous review and commenting. Automate, track and report code reviews.Starting Price: $29 per user per month -
13
Microsoft Edge
Microsoft
The browser for business is here. Built on Chromium open source, backed by Microsoft security and innovation. Microsoft Edge is the fast and secure browser that helps you protect your data, and save time and money. Microsoft Edge is available on supported versions of Windows, macOS, iOS, and Android. Microsoft Edge is the best browser for Windows. Sync your passwords, favorites, and settings across multiple devices and start using Microsoft Edge today. Microsoft Edge was designed to feel at home on a Mac. Easily sync your passwords, favorites, and settings across many devices. Download Microsoft Edge as your new trusted web browser today. Microsoft Edge is available to download on your iOS device. Sync your passwords, favorites, and collections, across your signed-in devices. Scan the QR code to install the app. Microsoft Edge is available to download on your Android device. Sync your passwords, favorites, and collections, across your signed-in devices.Starting Price: Free -
14
Okta
Okta
One platform, infinite ways to connect to your employees and customers. Build auth into any app. Create secure, delightful experiences quickly by offloading customer identity management to Okta. Get security, scalability, reliability, and flexibility by combining Okta’s Customer Identity products to build the stack you need. Protect and enable your employees, contractors, and partners. Secure your employees—wherever they are—with Okta’s workforce identity solutions. Get the tools to secure and automate cloud journeys, with full support for hybrid environments along the way. Companies around the world trust Okta with their workforce identity. -
15
IBM QRadar SIEM
IBM
Market-leading SIEM built to outpace the adversary with speed, scale and accuracy As digital threats loom large and cyber adversaries grow increasingly sophisticated, the roles of SOC analysts are more critical than ever. Going beyond threat detection and response, QRadar SIEM enables security teams face today’s threats proactively with advanced AI, powerful threat intelligence, and access to cutting-edge content to maximize analyst potential. Whether you need cloud-native architecture built for hybrid scale and speed or a solution to complement your on-premises infrastructure, IBM can provide you with a SIEM to meet your needs. Experience the power of IBM enterprise-grade AI designed to amplify the efficiency and expertise of every security team. With QRadar SIEM, analysts can reduce repetitive manual tasks like case creation and risk prioritization to focus on critical investigation and remediation efforts. -
16
Microsoft Entra ID
Microsoft
Microsoft Entra ID (formerly known as Azure Active Directory) is a comprehensive identity and access management cloud solution that combines core directory services, application access management, and advanced identity protection. Safeguard your organization with a cloud identity and access management solution that connects employees, customers, and partners to their apps, devices, and data. Protect access to resources and data using strong authentication and risk-based adaptive access policies without compromising user experience. Provide a fast, easy sign-in experience across your multicloud environment to keep your users productive, reduce time managing passwords, and increase productivity. Manage all your identities and access to all your applications in a central location, whether they’re in the cloud or on-premises, to improve visibility and control. -
17
Splunk Enterprise
Cisco
Splunk Enterprise is a powerful platform that turns data into actionable insights across security, IT, and business operations. It enables organizations to search, analyze, and visualize data from virtually any source, providing a unified view across edge, cloud, and hybrid environments. With real-time monitoring, alerts, and dashboards, teams can detect issues quickly and act decisively. Splunk AI and machine learning features predict problems before they happen, improving resilience and decision-making. The platform scales to handle terabytes of data and integrates with thousands of apps, making it a flexible solution for enterprises of all sizes. Trusted by leading organizations worldwide, Splunk helps teams move from visibility to action. -
18
RSA SecurID
RSA Security
RSA SecurID enables organizations of all sizes to mitigate identity risk and maintain compliance without impeding user productivity. It ensures users have appropriate access and confirms they are who they say they are with a modern, convenient user experience. In addition, RSA SecurID provides unified visibility and control across organizations’ many islands of identity. RSA SecurID marries multi-factor authentication with identity governance and lifecycle controls to address the security challenges associated with delivering convenient access to dynamic user populations across complex environments. It evaluates risk and business context to provide identity and access assurance. Digital transformation creates unprecedented authentication, access management and identity governance challenges for organizations. After all, more users need access to more systems from more devices than ever. RSA SecurID helps organizations address these challenges—and the identity. -
19
Jenkins
Jenkins
The leading open source automation server, Jenkins provides hundreds of plugins to support building, deploying and automating any project. As an extensible automation server, Jenkins can be used as a simple CI server or turned into the continuous delivery hub for any project. Jenkins is a self-contained Java-based program, ready to run out-of-the-box, with packages for Windows, Linux, macOS and other Unix-like operating systems. Jenkins can be easily set up and configured via its web interface, which includes on-the-fly error checks and built-in help. With hundreds of plugins in the Update Center, Jenkins integrates with practically every tool in the continuous integration and continuous delivery toolchain. Jenkins can be extended via its plugin architecture, providing nearly infinite possibilities for what Jenkins can do. Jenkins can easily distribute work across multiple machines, helping drive builds, tests and deployments across multiple platforms faster. -
20
Ansible
Red Hat
Ansible is a radically simple automation engine that automates cloud provisioning, configuration management, application deployment, intra-service orchestration, and many other IT needs. Ansible Automation Platform has grown over the past years to provide powerful automation solutions that work for operators, administrators and IT decision makers across a variety of technology domains. It’s a leading enterprise automation solution from Red Hat®, a thriving open source community, and the de facto standard technology of IT automation. Scale automation, manage complex deployments, and speed productivity with an enterprise automation platform that can be used across entire IT teams. Red Hat or partner consulting services help you advance your end-to-end automation journey for faster time to value.Starting Price: Free -
21
Java
Oracle
The Java™ Programming Language is a general-purpose, concurrent, strongly typed, class-based object-oriented language. It is normally compiled to the bytecode instruction set and binary format defined in the Java Virtual Machine Specification. In the Java programming language, all source code is first written in plain text files ending with the .java extension. Those source files are then compiled into .class files by the javac compiler. A .class file does not contain code that is native to your processor; it instead contains bytecodes — the machine language of the Java Virtual Machine1 (Java VM). The java launcher tool then runs your application with an instance of the Java Virtual Machine.Starting Price: Free -
22
OneLogin
OneLogin
Secure critical company information and empower employees with OneLogin, a trusted identity and access management (IAM) solution for the modern enterprise. Designed to strengthen enterprise security while simplifying business logins, OneLogin is an excellent solution for companies looking to enforce security policies with ease. OneLogin includes top-rated features such as single sign-on (SS), unified directory, user provisioning, adaptive authentication, mobile identitiy, compliance reporting, and more. -
23
ServiceNow
ServiceNow
Digitize your workflows - they'll love you for it. Your company can be more productive and your people more engaged. ServiceNow makes work, work better for people. Transform old, manual ways of working into modern digital workflows, so employees and customers get what they need, when they need it—fast, simple, easy. ServiceNow delivers digital workflows that create great experiences and unlock productivity for employees and the enterprise. We simplify the complexity of work on a single, enterprise cloud platform. The Now Platform: The intelligent and intuitive cloud platform for work. Choose from our workflows or build your own apps. Built on the Now Platform, our product portfolio delivers the IT, Employee, and Customer Workflows that matter with enterprise solutions to help drive every part of your digital transformation. Create the great experiences you want and unlock the productivity you need, now with native mobile capabilities for everyday work across the enterprise.Starting Price: $100 per month -
24
Python
Python
The core of extensible programming is defining functions. Python allows mandatory and optional arguments, keyword arguments, and even arbitrary argument lists. Whether you're new to programming or an experienced developer, it's easy to learn and use Python. Python can be easy to pick up whether you're a first-time programmer or you're experienced with other languages. The following pages are a useful first step to get on your way to writing programs with Python! The community hosts conferences and meetups to collaborate on code, and much more. Python's documentation will help you along the way, and the mailing lists will keep you in touch. The Python Package Index (PyPI) hosts thousands of third-party modules for Python. Both Python's standard library and the community-contributed modules allow for endless possibilities.Starting Price: Free -
25
Chef
Progress Software
Chef turns infrastructure into code. With Chef, you can automate how you build, deploy, and manage your infrastructure. Your infrastructure becomes as versionable, testable, and repeatable as application code. Chef Infrastructure Management ensures configurations are applied consistently in every environment with infrastructure management automation. Chef Compliance makes it easy to maintain and enforce compliance across the enterprise. Deliver successful application outcomes consistently at scale with Chef App Delivery. Chef Desktop allows IT teams to automate the deployment, management, and ongoing compliance of IT resources. Ensure configurations are applied consistently in every environment. Powerful policy-based configuration management system software. Runbook automation to consistently define, package & deliver applications. IT automation & DevOps dashboards for operational visibility. -
26
Ping Identity
Ping Identity
Ping Identity builds identity security for the global enterprise with an intelligent identity platform that offers comprehensive capabilities including single sign-on (SSO), multi-factor authentication (MFA), directory, and more. Ping helps enterprises balance security and user experience for workforce, customer, and partner identity types with a variety of cloud deployment options including identity-as-a-service (IDaaS), containerized software, and more. Ping has solutions for both IT and developer teams. Enable digital collaboration with simple integrations to these popular tools. Support your employees wherever they are with integrations to these popular tools. Deploy quickly with interoperability across the entire identity ecosystem. Whether you just want single sign-on (SSO) or a risk-based, adaptive authentication authority, starting off with a PingOne solution package lets you only pay for what you need, and gives you room to grow.Starting Price: $5 per user per month -
27
Puppet Enterprise
Puppet
Puppet is redefining what’s possible for continuous operations. Easily automate your environment to deliver at cloud speed and cloud scale with products that are responsive and predictive by design. 90% of the largest US-based companies rely on Puppet’s infrastructure as code to simplify the complexity of modern IT infrastructure. At Puppet, we’re redefining what is possible for continuous operations. We empower IT operations teams to easily automate their infrastructure, enabling them to deliver at cloud speed and cloud scale. Our scalable approach to infrastructure automation enables teams to innovate rapidly, with security and compliance baked in. We’re leading the way from find-and-fix to predicting at scale. No more surprises. We move at the speed of business, delivering infrastructure automation software that gives your teams back their time, and promises them, and your business. peace of mind.Starting Price: $120 per month -
28
Active Directory
Microsoft
Active Directory stores information about objects on the network and makes this information easy for administrators and users to find and use. Active Directory uses a structured data store as the basis for a logical, hierarchical organization of directory information. This data store, also known as the directory, contains information about Active Directory objects. These objects typically include shared resources such as servers, volumes, printers, and the network user and computer accounts. For more information about the Active Directory data store, see Directory data store. Security is integrated with Active Directory through logon authentication and access control to objects in the directory. With a single network logon, administrators can manage directory data and organization throughout their network, and authorized network users can access resources anywhere on the network. Policy-based administration eases the management of even the most complex network.Starting Price: $1 per user per month -
29
Terraform
HashiCorp
Terraform is an open-source infrastructure as code software tool that provides a consistent CLI workflow to manage hundreds of cloud services. Terraform codifies cloud APIs into declarative configuration files. Write infrastructure as code using declarative configuration files. HashiCorp Configuration Language (HCL) allows for concise descriptions of resources using blocks, arguments, and expressions. Run terraform plan to check whether the execution plan for a configuration matches your expectations before provisioning or changing infrastructure. Apply changes to hundreds of cloud providers with terraform apply to reach the desired state of the configuration. Define infrastructure as code to manage the full lifecycle — create new resources, manage existing ones, and destroy those no longer needed. -
30
Azure Key Vault
Microsoft
Enhance data protection and compliance with Key Vault. Secure key management is essential to protect data in the cloud. Use Azure Key Vault to encrypt keys and small secrets like passwords that use keys stored in hardware security modules (HSMs). For more assurance, import or generate keys in HSMs, and Microsoft processes your keys in FIPS validated HSMs (hardware and firmware) - FIPS 140-2 Level 2 for vaults and FIPS 140-2 Level 3 for HSM pools. With Key Vault, Microsoft doesn’t see or extract your keys. Monitor and audit your key use with Azure logging—pipe logs into Azure HDInsight or your security information and event management (SIEM) solution for more analysis and threat detection. -
31
JavaScript
JavaScript
JavaScript is a scripting language and programming language for the web that enables developers to build dynamic elements on the web. Over 97% of the websites in the world use client-side JavaScript. JavaScript is one of the most important scripting languages on the web. Strings in JavaScript are contained within a pair of either single quotation marks '' or double quotation marks "". Both quotes represent Strings but be sure to choose one and STICK WITH IT. If you start with a single quote, you need to end with a single quote. There are pros and cons to using both IE single quotes tend to make it easier to write HTML within Javascript as you don’t have to escape the line with a double quote. Let’s say you’re trying to use quotation marks inside a string. You’ll need to use opposite quotation marks inside and outside of JavaScript single or double quotes.Starting Price: Free -
32
VMware Cloud
Broadcom
Build, run, manage, connect and protect all of your apps on any cloud. The Multi-Cloud solutions from VMware deliver a cloud operating model for all applications. Support your digital business initiatives with the world’s most proven and widely deployed cloud infrastructure. Leverage the same skills you use in the data center, while tapping into the depth and breadth of six global hyperscale public cloud providers and 4,000+ VMware Cloud Provider Partners. With hybrid cloud built on VMware Cloud Foundation, you get consistent infrastructure and operations for new and existing cloud native applications, from data center to cloud to edge. This consistency improves agility and reduces complexity, cost and risk. Build, run and manage modern apps on any cloud, meeting diverse needs with on-premises and public cloud resources. Manage both container-based workloads and traditional VM-based workloads on a single platform. -
33
Yubico YubiKey
Yubico
Protect your digital world with YubiKey. Stop account takeovers, go passwordless and modernize your multifactor authentication. Get the world’s leading security key for superior security, user experience and return on investment. Designed for personal and business use, the YubiKey comes in a variety of shapes and with different features to fit your needs. Take our quick Product Finder Quiz to find the right key for you. The YubiKey works with hundreds of services and software applications. We’re here to guide you getting started whether for personal or business use. The industry's #1 security key, enabling strong two-factor, multi-factor and passwordless authentication. With a simple touch, the multi-protocol YubiKey protects access to computers, networks, and online services. No more reaching for your smartphone, or re-typing passcodes. Just plug in your YubiKey, tap, and it does the rest for you. -
34
OpenText Core Behavioral Signals
OpenText
OpenText™ Core Behavioral Signals is an advanced threat detection solution that leverages user entity behavior analytics (UEBA) and 100% online, unsupervised machine learning to identify behavioral anomalies within an organization. It enables security teams to detect insider risks, novel attacks, and advanced persistent threats without relying on predefined rules or manual updates. The platform continuously adapts to evolving organizational behaviors, improving threat hunter effectiveness and reducing false positives. Analysts can transform billions of events into a manageable number of actionable threat leads, enhancing efficiency. It also features dynamic dashboards and detailed anomaly timelines to provide clear insights into risk over time. Integration with existing security systems and APIs supports streamlined threat hunting and response. -
35
LDAP
LDAP
LDAP is a comprehensive resource dedicated to the Lightweight Directory Access Protocol (LDAP), a mature, flexible, and well-supported standards-based mechanism for interacting with directory servers. Often utilized for authentication and storing information about users, groups, and applications, an LDAP directory server serves as a general-purpose data store applicable in various scenarios. Provides basic information about directory services and the LDAP protocol. Assists in finding the appropriate directory server, client API, or LDAP-based tools suitable for different environments. Offers links to various standards documents and reference guides for in-depth exploration of the protocol. Features posts related to directory services, including software release news, new standards documents, specifications, and how-to articles.
- Previous
- You're on page 1
- Next