14 Integrations with ServiceNow Asset Management

View a list of ServiceNow Asset Management integrations and software that integrates with ServiceNow Asset Management below. Compare the best ServiceNow Asset Management integrations as well as features, ratings, user reviews, and pricing of software that integrates with ServiceNow Asset Management. Here are the current ServiceNow Asset Management integrations in 2025:

  • 1
    6clicks

    6clicks

    6clicks

    6clicks is an easy way to implement your risk and compliance program or achieve compliance with ISO 27001, SOC 2, PCI-DSS, HIPAA, NIST, FedRamp and many other standards. Hundreds of businesses trust 6clicks to set up and automate their risk and compliance programs and streamline audit, vendor risk assessment, incident and risk management and policy implementation. Easily import standards, laws, regulations or templates from our massive content library, use AI-powered features to automate manual tasks, and integrate 6clicks with over 3,000 apps you know and love. 6clicks has been built for businesses of all shapes and sizes and is also used by advisors with a world-class partner program and white label capability available. 6clicks was founded in 2019 and has offices in the United States, United Kingdom, India and Australia.
  • 2
    OpenLM

    OpenLM

    OpenLM.com

    OpenLM is a leading provider of software license management solutions for engineering software applications. OpenLM software provides monitoring, auditing, reporting and management capabilities for engineering software running under all the leading license managers, such as FLEXlm, Sentinel RMS/HASP, Reprise RLM, IBM LUM, DSLS, MathLM, ArcGis etc. Also supports cloud licenses Office 365, Adobe Cloud, Autodesk Cloud and ESRI Online. OpenLM software is compatible with license managers running on Unix, Linux, MacOS, and Windows Operating systems. Infrastructure minimal hardware requirements • Dual core CPU • 4 GB memory (Recommended – 8 GB) • .NET Framework 4.7.2 or higher • Static MAC address (Cloud based servers must use ENI) The OpenLM Server can be installed on a Windows’ machine only.
    Starting Price: $1980.00/one-time
  • 3
    AssetLabs Streamline License Tracker
    Track all your software licenses by normalizing, categorizing, and automatically identifying license types using your SCCM or other inventory data. Easily identify Auditable vs free and open source. Streamline differentiates Office Suites from standalone office apps. Automatically finds license deficits, de-duplicates multiple installs and applies product use rights and downgrade rights. Free trial for unlimited users!
    Starting Price: $1.00/month
  • 4
    BelManage
    BelManage allows users to reduce their software license and maintenance costs, monitor their cybersecurity status and configuration details. BelManage is based on Belarc’s Cloud architecture, uses a single Intranet server and database, and automatically creates an accurate and up-to-date central repository (CMDB) of software, hardware and security configuration details. Belarc’s cloud architecture allows users to simplify and automate the monitoring of all of their desktops, laptops, servers and virtual machines throughout the world, using a single server and database. The BelManage server can be located on premises, on our customer's cloud or hosted by Belarc via SaaS.
    Starting Price: $10 per computer
  • 5
    NorthStar Navigator

    NorthStar Navigator

    NorthStar.io, Inc.

    NorthStar is redefining Risk-Based Vulnerability Management with simple, contextual vulnerability prioritization for easier remediation. Common challenges NorthStar addresses are listed below: • Prioritize issues that should be addressed first in order to make the best use of limited resources. • Address lingering exposures that could impact critical business services, applications, and data stores. • Bridge the visibility gap and discrepancies that exist between vulnerability assessment and patch management. • Track reduction in risk over time and validate the most important issues are being addressed first. • Deliver a complete view of their environment – all assets, vulnerabilities and exposures. • Eliminate manual processes and unnecessary spreadsheet work.
    Starting Price: $8 per device
  • 6
    CloudFabrix

    CloudFabrix

    CloudFabrix Software

    Data-centric AIOps Platform for Hybrid Deployments Powered by Robotic Data Automation Fabric (RDAF) Enabling the Autonomous Enterprise! - CloudFabrix was founded on a deep desire to enable Autonomous Enterprises. As we interviewed several big and small enterprises, one thing became very apparent. As Digital businesses were becoming more complex and abstract, it was impossible for traditional data management disciplines and frameworks to meet these requirements. As we dug deeper, 3 building blocks emerged as key pillars for embarking on an autonomous enterprise journey – the enterprise needed to adopt 1) Data-First 2) AI-First 3) Automate Everywhere strategy CloudFabrix AIOps platform provides the following services. 1) Alert Noise Reduction 2) Incident Management 3) Predictive Analytics & Anomaly Detection 4) FinOps/Asset Intelligence & Analytics 5) Log Intelligence
    Starting Price: $0.03/GB
  • 7
    CyCognito

    CyCognito

    CyCognito

    Expose all the hidden security gaps in your organization using nation-state grade technology. CyCognito’s Global Bot Network uses attacker-like reconnaissance techniques to scan, discover and fingerprint billions of digital assets all over the world. No input or configuration needed. Uncover the unknown. The Discovery Engine uses graph data modeling to map your organization’s full attack surface. You get a clear view of every single asset an attacker could reach — what they are and how they relate to your business. Using CyCognito’s proprietary risk-detection methods, the attack simulator identifies risks per asset and discovers potential attack vectors. It doesn’t affect business operations and works without deployment, configuration or whitelisting. CyCognito scores each risk based its attractiveness to attackers and impact on the business, dramatically reducing the thousands of attack vectors organizations may have to those critical few dozen that need your focus
    Starting Price: $11/asset/month
  • 8
    Vulcan Cyber

    Vulcan Cyber

    Vulcan Cyber

    At Vulcan Cyber we’re changing the way businesses reduce cyber risk through vulnerability remediation orchestration. We help IT security teams go beyond remedial vulnerability management to help them drive vulnerability remediation outcomes. The Vulcan platform consolidates vulnerability and asset data, with threat intelligence and customizable risk parameters to deliver risk-based vulnerability prioritization insights. But we don't stop there. Vulcan remediation intelligence takes the vulnerabilities that matter to your business and attaches the remedies and fixes needed to mitigate the threat. Then Vulcan orchestrates and measures the rest of the remediation process with integrations and inputs into application security, DevSecOps, patch management, configuration management, and cloud security tools, teams and functions. From scan to fix, Vulcan Cyber delivers the unique ability to orchestrate the entire vulnerability remediation process to GET FIX DONE at scale.
    Starting Price: $999 / month
  • 9
    RadiantOne

    RadiantOne

    Radiant Logic

    Make identity a business enabler with a unified platform that transforms your existing infrastructure into a resource for the entire organization. RadiantOne is the cornerstone of complex identity infrastructures. Harness your identity data with intelligent integration to drive better business outcomes, improve security and compliance posture, increase speed-to-market, and more. Without RadiantOne, companies must rely on custom coding, rework, and ongoing maintenance to make new initiatives work with existing environments. Expensive solutions can’t be deployed on time or on budget, negatively impacting ROI and causing employee frustration. Identity frameworks that can’t scale waste time and resources, with employees struggling to deploy new solutions for users. Rigid, static systems can’t meet changing requirements, leading to duplicate efforts and repeated processes.
  • 10
    Bocada

    Bocada

    Bocada

    Bocada offers a single dashboard for automated backup operations oversight, asset protection, and compliance reporting. Backup Monitoring: Track past and current backup performance trends with built-in, highly configurable reports. Save preconfigured report templates, schedule them to run at your desired cadence, and automatically distribute them to key stakeholders. Compliance Oversight: Create backup audit reports for any period, geography, server group, or backup product in minutes.. Enjoy a wholly independent solution to show auditors that you meet key data protection metrics. Asset Protection: Safeguard valuable resources across your IT environment with automated unprotected asset discovery, failure alerting, and unusual backup behavior detection. Stay one step ahead of issues impacting data restorability. Workflow Automation: Remove tedious, manual touch points out of your remediation workflows with automated failure ticketing and built-in issue identification.
  • 11
    Cisco Cyber Vision
    The deeper integration between IT, cloud and industrial control networks (ICS) is exposing your industrial operations to cyber threats. Cisco Cyber Vision has been specifically developed for OT and IT teams to work together to ensure production continuity, resilience and safety. You can now deploy Industrial Internet of Things (IIoT) technologies and capture the benefits of your industry digitization efforts. Kick-start your OT security project by building an accurate list of all your industrial assets, communication patterns and network topologies. Feed your SOC (security operations center) with OT context and leverage the time and money you have invested in IT cybersecurity to secure your OT network. Take OT security to the next level: Have detailed information to comply with regulations and enable effective collaboration between OT and IT experts.
  • 12
    Kumoco Cloud Manager
    Explore the capabilities of your cloud estate and find out how to make it work harder. Pilot your cloud estate from anywhere with our dashboard view, accessible from any device. Leverage utilization recommendations and lower-priced spot instances to reduce your cloud spend by up to 80%. Keep your data safe and your estate compliant with 24/7 automated monitoring from Cloud Manager. Fully automated workflows make cost recommendations and flag compliance issues so you can take action quickly and save on resource costs. Analyze your cloud costs to allocate and recharge them to your customers and internal business units. Our dashboard and advanced automation services make your cloud work harder for you. We offer structure and process that provides clarity to all team members on why the work they are doing is important and additionally provide a dashboard and trend to show the business and the delivery teams the value they are adding.
  • 13
    Check Point Infinity
    Organizations frequently implement multiple cyber security solutions in pursuit of better protections. As a result, they are frequently left with a patchwork security architecture that results in a high TCO. By adopting a consolidated security approach with Check Point Infinity architecture, businesses realize preemptive protection against advanced fifth-generation attacks, while achieving a 50% increase in operational efficiency and 20% reduction in security costs. The first consolidated security architecture across networks, cloud, mobile and IoT, providing the highest level of threat prevention against both known and unknown cyber-threats. 64 different threat prevention engines blocking against known and unknown threats, powered by threat intelligence. Infinity-Vision is the unified management platform for Check Point Infinity, the first modern, consolidated cyber security architecture built to prevent today’s most sophisticated attacks across networks, cloud, endpoints, etc.
  • 14
    Check Point IPS

    Check Point IPS

    Check Point IPS

    Intrusion Prevention Systems detect or prevent attempts to exploit weaknesses in vulnerable systems or applications, protecting you in the race to exploit the latest breaking threat. Check Point IPS protections in our Next Generation Firewall are updated automatically. Whether the vulnerability was released years ago, or a few minutes ago, your organization is protected. Check Point IPS delivers thousands of signature and behavioral preemptive protections. Our acceleration technologies let you safely enable IPS. A low false positive rate saves your staff valuable time. Enable IPS on any Check Point security gateway reducing total cost of ownership. On-demand hyperscale threat prevention performance providing enterprises cloud level expansion and resiliency on premises. Provide users with secure, seamless remote access to corporate networks and resources when traveling or working remotely.
  • Previous
  • You're on page 1
  • Next