7 Integrations with iSecurity SIEM / DAM Support

View a list of iSecurity SIEM / DAM Support integrations and software that integrates with iSecurity SIEM / DAM Support below. Compare the best iSecurity SIEM / DAM Support integrations as well as features, ratings, user reviews, and pricing of software that integrates with iSecurity SIEM / DAM Support. Here are the current iSecurity SIEM / DAM Support integrations in 2025:

  • 1
    RSA SecurID

    RSA SecurID

    RSA Security

    RSA SecurID enables organizations of all sizes to mitigate identity risk and maintain compliance without impeding user productivity. It ensures users have appropriate access and confirms they are who they say they are with a modern, convenient user experience. In addition, RSA SecurID provides unified visibility and control across organizations’ many islands of identity. RSA SecurID marries multi-factor authentication with identity governance and lifecycle controls to address the security challenges associated with delivering convenient access to dynamic user populations across complex environments. It evaluates risk and business context to provide identity and access assurance. Digital transformation creates unprecedented authentication, access management and identity governance challenges for organizations. After all, more users need access to more systems from more devices than ever. RSA SecurID helps organizations address these challenges—and the identity.
  • 2
    Splunk Cloud Platform
    Turn data into answers with Splunk deployed and managed securely, reliably and scalably as a service. With your IT backend managed by our Splunk experts, you can focus on acting on your data. Splunk-provisioned and managed infrastructure delivers a turnkey, cloud-based data analytics solution. Go live in as little as two days. Managed software upgrades ensure you always have the latest functionality. Tap into the value of your data in days with fewer requirements to turn data into action. Splunk Cloud meets the FedRAMP security standards, and helps U.S. federal agencies and their partners drive confident decisions and decisive actions at mission speeds. Drive productivity and contextual insights with Splunk’s mobile apps, augmented reality and natural language capabilities. Extend the utility of your Splunk solutions to any location with a simple phrase or the tap of a finger. From infrastructure management to data compliance, Splunk Cloud is built to scale.
  • 3
    McAfee Total Protection
    McAfee® Total Protection is the protection for today's security needs, so you can enjoy life online. Includes premium antivirus, safe browsing. With ID theft protection and secure VPN. It’s more than just antivirus software—it’s peace of mind. At McAfee, we protect what matters – you. We protect over 500 million devices with award-winning antivirus, but understand that you need a solution that protects your personal info, privacy, and helps you navigate safely online. Our multi-layered identity protection helps secure your accounts by alerting you if your info gets leaked online and generating & storing complex passwords automatically. Keep your credit card and personal info safe from prying eyes everywhere you go by turning unsecured networks into your own private connection with our secure VPN. Color-coded links expose dangerous and fraudulent sites on search results and social media pages—we’ll even steer you back to safety if you misclick.
    Starting Price: $19.99 per year
  • 4
    TriBuild

    TriBuild

    TriBuild Systems

    Project Management Software for Contractors. Increase profits with TriBuild’s web-based and mobile contractor software for construction project management at your fingertips. Pull your RFIs, Submittals, Change Orders, Documents, Drawings and Field issues or delay updates together into one centralized, standardized, and organized source. Contractor software intelligently designed to collaborate, document and report with time saving simplicity and accuracy. Our training and support team consists of experienced project managers and customer service experts that are here every day to ensure that you get the best value out of your TriBuild software subscription. Here a few of the ways we work to help make you a success.
  • 5
    GFI EndPointSecurity
    Bring your own device (BYOD) and portable storage device use in the workplace significantly increase the likelihood of your business facing data leakage issues. GFI EndPointSecurity features risk assessment capabilities that identify assets possibly doubling as sources of data leaks. All functionality is built into a dashboard that provides relevant information, suggestions for boosting protection, and shortcuts to common security tasks. The data awareness module provides another layer of endpoint protection by scanning each relevant file and searching for the most common types of information susceptible to a security breach (e.g. SSNs, PANs, etc.). The module supports inputs in the form of regular expressions and dictionary files. It also contributes to your data loss prevention (DLP) and compliance efforts. Use enhanced file control capabilities to scan archived files and block files based on size.
  • 6
    IBM Tivoli Monitoring
    IBM Tivoli Monitoring products monitor the performance and availability of distributed operating systems and applications. These products are based on a set of common service components, referred to collectively as Tivoli Management Services. Tivoli Management Services components provide security, data transfer and storage, notification mechanisms, user interface presentation, and communication services in an agent-server-client architecture (Figure 1). These services are shared by a number of other products, including IBM Tivoli XE mainframe monitoring products and IBM Tivoli Composite Application Manager products, as well as other IBM Tivoli Monitoring products such as Tivoli Monitoring for Applications, Tivoli Monitoring for Cluster Managers, Tivoli Monitoring for Databases, Tivoli Monitoring for Energy Management, Tivoli Monitoring for Messaging and Collaboration, Tivoli Monitoring for Messaging and Collaboration, and Tivoli Monitoring for Virtual Environments.
  • 7
    OpenText Enterprise Security Manager
    OpenText™ Enterprise Security Manager (ESM) is a robust Security Information and Event Management (SIEM) solution designed to provide comprehensive real-time threat detection and automated response. It features an industry-leading correlation engine that alerts analysts instantly to threat-correlated events, dramatically reducing the time required to detect and respond to cyber threats. ESM integrates native Security Orchestration, Automation, and Response (SOAR) capabilities, enabling organizations to streamline their security operations and lower total cost of ownership. With the ability to analyze over 100,000 events per second and support more than 450 event sources, it delivers enterprise-wide event visibility and enhanced threat intelligence. The platform’s scalable architecture supports customization through rulesets, dashboards, and reports tailored to unique security needs. It also offers multi-tenancy capabilities for centralized management across distributed business units.
  • Previous
  • You're on page 1
  • Next