8 Integrations with SpyCloud
View a list of SpyCloud integrations and software that integrates with SpyCloud below. Compare the best SpyCloud integrations as well as features, ratings, user reviews, and pricing of software that integrates with SpyCloud. Here are the current SpyCloud integrations in 2026:
-
1
Mailchimp
Intuit Mailchimp
Mailchimp is a marketing automation platform boasting 11 million users worldwide to personalize every email and SMS for every customer using AI-powered insights and content creation tools. With a 99% delivery rate and over 300 integrations, Mailchimp helps businesses connect with their customers, foster repeat business, and build lasting brand loyalty while fitting into their existing workflows. Businesses including TEDTalks, Shutterstock, Boston Market, Nikon India use Mailchimp to drive revenue through emails. Founded in 2001 and based in Atlanta with offices in Brooklyn, Oakland, Vancouver, London, Seattle, and Santa Monica. In 2021 Mailchimp was acquired by Intuit Inc. (Nasdaq: INTU), the global financial technology platform that makes Intuit TurboTax, Credit Karma, QuickBooks, and Mailchimp. Since then, the company has released 100+ new features to help its customers.Starting Price: $9.99 per month -
2
Avast Business Hub
Avast
The Business Hub is an integrated, cloud-based security platform for businesses and IT service providers to manage all Avast Business solutions deployed in their networks. It provides real-time visibility of threats, comprehensive reporting, and management capabilities, all from a single pane of glass. Formerly known as CloudCare, the Business Hub is an easy-to-use cloud security platform with a refreshing new UI.Starting Price: $36.99 -
3
Cisco ACI
Cisco
Achieve resource elasticity with automation through common policies for data center operations. Extend consistent policy management across multiple on-premises and cloud instances for security, governance, and compliance. Get business continuity, disaster recovery, and highly secure networking with a zero-trust security model. Transform Day 2 operations to a more proactive model and automate troubleshooting, root-cause analysis, and remediation. Optimizes performance, and single-click access facilitates automation and centralized management. Extend on-premises ACI networks into remote locations, bare-metal clouds, and colocation providers without hardware. Cisco's Multi-Site Orchestrator offers provisioning and health monitoring, and manages Cisco ACI networking policies, and more. This solution provides automated network connectivity, consistent policy management, and simplified operations for multicloud environments. -
4
LevelBlue USM Anywhere
LevelBlue
Elevate your security with LevelBlue USM Anywhere, an advanced open XDR platform designed to scale with your evolving IT landscape and growing business needs. Combining sophisticated analytics, robust security orchestration, and automation, USM Anywhere offers built-in threat intelligence for quicker and more precise threat detection, as well as streamlined response coordination. Its flexibility is unmatched, with extensive integrations—referred to as BlueApps—that enhance its detection and orchestration across hundreds of third-party security and productivity tools. These integrations also enable you to trigger automated and orchestrated responses effortlessly. Begin your 14-day free trial now and discover how our platform simplifies cybersecurity. -
5
Active Directory
Microsoft
Active Directory stores information about objects on the network and makes this information easy for administrators and users to find and use. Active Directory uses a structured data store as the basis for a logical, hierarchical organization of directory information. This data store, also known as the directory, contains information about Active Directory objects. These objects typically include shared resources such as servers, volumes, printers, and the network user and computer accounts. For more information about the Active Directory data store, see Directory data store. Security is integrated with Active Directory through logon authentication and access control to objects in the directory. With a single network logon, administrators can manage directory data and organization throughout their network, and authorized network users can access resources anywhere on the network. Policy-based administration eases the management of even the most complex network.Starting Price: $1 per user per month -
6
TruSTAR
TruSTAR
TruSTAR's cloud-native Intelligence Management platform transforms intelligence from third-party providers and historical events for seamless integration and accelerated automation across core detection, orchestration and response tools. TruSTAR transforms your intelligence for seamless integration and actionable automation across your ecosystem of teams and tools. TruSTAR is platform agnostic. Get investigation context and enrichment inside your mission-critical security tools. Our Open API enables you to connect to any application, anytime. Automate detection, triage, investigation, and dissemination workflows from a single endpoint. Managing intelligence in enterprise security is about managing data to drive automation. TruSTAR normalizes and prepares intelligence for orchestration, significantly reducing playbook complexity. Spend less time wrangling data, and more time catching bad guys. The TruSTAR platform has been designed to provide maximum flexibility. -
7
Chronicle SOAR
Chronicle
Employ playbooks for fast time-to-value and ease of scaling as you grow. Address common day-to-day challenges (phishing or ransomware) with ready to run use cases, complete with playbooks, simulated alerts and tutorials. Create playbooks that orchestrate hundreds of the tools you rely on with simple drag and drop. Plus, automate repetitive tasks to respond faster and free up time for higher value work. Maintain, optimize, troubleshoot, and iterate playbooks with lifecycle management capabilities including run analytics, reusable playbook blocks, version control, and rollback. Integrate threat intelligence at every step and visualize the most important contextual data for each threat – who did what, and when – and the relationships between all involved entities attached to an event, product, or source. Patented technology automatically groups contextually related alerts into a single threat-centric case, enabling a single analyst to efficiently investigate and respond to a threat. -
8
Cloudup
Automattic
By simply dragging and dropping videos, photos, music, links and files, Cloudup lets you instantly and securely share anything, without waiting for uploads or downloads, and at no cost. Life moves fast. So should your sharing. No more slow uploads or managing files and folders. Cloudup lets you stream large files (up to 200 MB each) that your friends can view instantly using the web, phone and desktop apps. Don't waste any more time. Cloudup streams can be shared by secure URL links before your uploads even finish! You can password-protect or even share streams by email or with Facebook and Twitter. Cloudup set out with one goal in mind: to make sharing anything – files, videos, links, music, documents, code, text, etc., simple and beautiful for both the sharer and the recipient. Drag, drop, and stream.
- Previous
- You're on page 1
- Next