19 Integrations with InsightAppSec

View a list of InsightAppSec integrations and software that integrates with InsightAppSec below. Compare the best InsightAppSec integrations as well as features, ratings, user reviews, and pricing of software that integrates with InsightAppSec. Here are the current InsightAppSec integrations in 2025:

  • 1
    Microsoft 365

    Microsoft 365

    Microsoft

    Introducing Microsoft 365 (formerly Microsoft Office 365). Be more creative and achieve what matters with Outlook, OneDrive, Word, Excel, PowerPoint, OneNote, SharePoint, Microsoft Teams, Yammer, and more. With a Microsoft 365 subscription, you get the latest Office apps—both the desktop and the online versions—and updates when they happen. On your desktop, on your tablet, and on your phone.* Microsoft 365 + your device + the Internet = productivity wherever you are. OneDrive makes the work you do available to you from anywhere—and to others when you collaborate or share. Help at every turn. Email, chat, or call and talk to a real live person. Get Office today—choose the option that's right for you
    Leader badge
    Starting Price: $5 per user per month
  • 2
    Jira

    Jira

    Atlassian

    Jira is the only project management tool you need to plan and track work across every team. Jira by Atlassian is the #1 software development tool for teams planning and building great products. Trusted by thousands of teams, Jira offers access to a wide range of tools for planning, tracking, and releasing world-class software, capturing and organizing issues, assigning work, and following team activity. It also integrates with leading developer tools for end-to-end traceability. From short projects, to large cross-functional programs, Jira helps break big ideas down into achievable steps. Organize work, create milestones, map dependencies and more. Link work to goals so everyone can see how their work contributes to company objectives and stay aligned to what’s important. Your next move, suggested by AI. Atlassian Intelligence takes your big ideas and automatically suggests the tasks to help get it done.
    Leader badge
    Starting Price: Free
  • 3
    Jenkins

    Jenkins

    Jenkins

    The leading open source automation server, Jenkins provides hundreds of plugins to support building, deploying and automating any project. As an extensible automation server, Jenkins can be used as a simple CI server or turned into the continuous delivery hub for any project. Jenkins is a self-contained Java-based program, ready to run out-of-the-box, with packages for Windows, Linux, macOS and other Unix-like operating systems. Jenkins can be easily set up and configured via its web interface, which includes on-the-fly error checks and built-in help. With hundreds of plugins in the Update Center, Jenkins integrates with practically every tool in the continuous integration and continuous delivery toolchain. Jenkins can be extended via its plugin architecture, providing nearly infinite possibilities for what Jenkins can do. Jenkins can easily distribute work across multiple machines, helping drive builds, tests and deployments across multiple platforms faster.
  • 4
    Selenium

    Selenium

    Software Freedom Conservancy

    Selenium automates browsers. That's it! What you do with that power is entirely up to you. Primarily it is for automating web applications for testing purposes, but is certainly not limited to just that. Boring web-based administration tasks can (and should) also be automated as well. If you want to create robust, browser-based regression automation suites and tests, scale and distribute scripts across many environments, then you want to use Selenium WebDriver, a collection of language specific bindings to drive a browser - the way it is meant to be driven. If you want to create quick bug reproduction scripts, create scripts to aid in automation-aided exploratory testing, then you want to use Selenium IDE; a Chrome and Firefox add-on that will do simple record-and-playback of interactions with the browser. If you want to scale by distributing and running tests on several machines and manage multiple environments from a central point.
  • 5
    Azure Pipelines
    Automate your builds and deployments with Pipelines so you spend less time with the nuts and bolts and more time being creative. Get cloud-hosted pipelines for Linux, macOS, and Windows. Build web, desktop and mobile applications. Deploy to any cloud or on‑premises. Build, test, and deploy Node.js, Python, Java, PHP, Ruby, C/C++, .NET, Android, and iOS apps. Run in parallel on Linux, macOS, and Windows. Easily build and push images to container registries like Docker Hub and Azure Container Registry. Deploy containers to individual hosts or Kubernetes. Explore and implement a wide range of community-built build, test, and deployment tasks, along with hundreds of extensions from Slack to SonarCloud. Implement continuous delivery (CD) of your software to any cloud, including Azure, AWS, and GCP. Visualize deployment to any number of interdependent stages.
  • 6
    Carbon Black EDR
    Carbon Black Endpoint Detection and Response (EDR) by Broadcom offers a comprehensive solution for detecting, investigating, and responding to cybersecurity threats on endpoints. It utilizes advanced behavioral analysis and machine learning to identify suspicious activities in real time, providing security teams with actionable insights to prevent data breaches and mitigate risks. With its cloud-based architecture, Carbon Black EDR enables continuous monitoring, visibility into endpoint activity, and automated threat response. It’s designed to support organizations of all sizes by improving threat detection, reducing investigation time, and enhancing overall endpoint security.
  • 7
    CyberArk Privileged Access Manager
    Keep your business safe by preventing the malicious use of privileged accounts and credentials – a common path to an organization’s most valuable assets. The CyberArk PAM as a Service solution leverages leading automation technologies to protect your business as it grows. Attackers never stop seeking ways in. Manage privileged access to minimize risk. Prevent credential exposure and keep critical assets from falling into the wrong hands. Maintain compliance with recorded key events and tamper-resistant audits. Privileged Access Manager easily integrates with a host of applications, platforms and automation tools.
  • 8
    Jira Work Management
    Business project management software. See all project information at a glance with Jira Work Management (formerly Jira Core). Manage your projects and keep your team organized. Managing projects and tasks in Jira Work Management starts with a workflow. Workflows define your process and enable your team to track tasks. Jira Work Management Cloud instances also have boards that allow you to visualize your workflows and drag and drop tasks from to-do to done. Currently available in cloud offering only. Task management is easier with statuses, comments, and attachments in one place. Everyone knows a project's details at a glance without having to email or set up a meeting. Plus, with notifications you'll know when your attention is needed. How many tasks are still in progress? Which team member has too much on their plate? Using Jira Work Management, you can follow the status of your team's projects in different ways: with a quick overview, customized dashboards, and more.
    Starting Price: $5 per user per month
  • 9
    VMware NSX

    VMware NSX

    Broadcom

    Full-Stack Network and Security Virtualization with VMware NSX. Enable your virtual cloud network to connect and protect applications across your data center, multi cloud, bare metal, and container infrastructure. VMware NSX Data Center delivers a complete L2-L7 networking and security virtualization platform — providing the ability to manage the entire network as a single entry from a single pane of glass. Bring one-click provisioning to your networking and security services — access powerful flexibility, agility, and scale — by running a complete L2-L7 stack in software, decoupled from underlying physical hardware. Manage consistent networking and security policies across private and public clouds, from a single pane of glass, regardless of where your application runs – VM, container, or bare metal. Deliver granular protection for your apps via micro-segmentation to the individual workload.
    Starting Price: $4,250
  • 10
    Selenium IDE

    Selenium IDE

    Selenium IDE

    Open source record and playback test automation for the web. Simple, turn-key solution to quickly author reliable end-to-end tests. Works out of the box for any web app. Enjoy easier test debugging with rich IDE features like setting breakpoints and pausing on exceptions. Run your tests on any browser/OS combination in parallel using the command-line runner for Selenium IDE. Getting started with Selenium IDE requires no additional setup other than installing the extension on your browser. One of our driving philosophies is to provide an easy-to-use tool that will give instant feedback. We believe that the easier we can make it, the more likely people are to author tests, which in turn results in better-tested apps. Selenium IDE records multiple locators for each element it interacts with. If one locator fails during playback, the others will be tried until one is successful. Through the use of the run command, you can re-use one test case inside of another.
    Starting Price: Free
  • 11
    BMC Helix ITSM
    SaaS-Based predictive IT service management for your modern enterprise. BMC Helix ITSM is industry-leading service management that uses cognitive automation technologies to transform best-practice ITSM principles you’ve come to appreciate from Remedy, delivered on your choice of cloud. Everything you need to deliver predictive, industry-leading service management. Cognitive automation capabilities that transform the agent experience. BMC Helix Multi-Cloud Service Management for a secure, seamless service experience across multi-cloud environments. Powerful, stunning reports and visualizations allowing data driven insights. Modern persona-based UX optimized across devices. Container deployment to run in any type of public cloud. New BMC Helix Integration Platform delivers industry-leading iPaaS to increase usability, adaptability, and scalability. Transform the agent experience with cognitive automation.
  • 12
    Swagger

    Swagger

    SmartBear

    Simplify API development for users, teams, and enterprises with the Swagger open source and professional toolset. Find out how Swagger can help you design and document your APIs at scale. The power of Swagger tools starts with the OpenAPI Specification — the industry standard for RESTful API design. Individual tools to create, update and share OpenAPI definitions with consumers. SwaggerHub is the platform solution to support OpenAPI workflows at scale. Swagger open source and pro tools have helped millions of API developers, teams, and organizations deliver great APIs. Swagger offers the most powerful and easiest to use tools to take full advantage of the OpenAPI Specification.
  • 13
    Modulo Risk Manager

    Modulo Risk Manager

    Modulo Security Solutions

    Solution for automation of Governance, Risks and Compliance. GRC - Governance, Risks and Compliance is already a reality in organizations. Its adoption, however, implies the development and maintenance of a framework that enables integration and collaboration between areas, avoiding silos and ensuring greater transparency and consistency in corporate processes. The Risk Manager Module Software implements an effective process for automating and integrating Governance, Risk and Compliance processes, eliminating silos and reducing costs. Based on the GRC Metaframework, a proprietary methodology developed based on international norms and standards for risk management (Risk Management) and Information Security, fully aligned with ISO 31000, the Risk Manager Module allows the measurement and control of risks, compliance with standards and regulations required for your business and IT governance.
  • 14
    Rapid7 Command Platform
    The Command Platform provides attack surface visibility designed to accelerate operations and create a more comprehensive security picture you can trust. Focus on real risks with more complete visibility of your attack surface. The Command Platform allows you to pinpoint security gaps and anticipate imminent threats. Detect and respond to real security incidents across your entire network. With relevant context, recommendations and automation, expertly respond every time. Backed by a more comprehensive attack surface view, the Command Platform unifies endpoint-to-cloud exposure management and detection and response, enabling your team to confidently anticipate threats and detect and respond to cyber attacks. A continuous 360° attack surface view teams can trust to detect and prioritize security issues from endpoint to cloud. Attack surface visibility with proactive exposure mitigation and remediation prioritization across your hybrid environment.
  • 15
    RedSeal

    RedSeal

    RedSeal Networks

    Secure all your network environments—public clouds, private clouds, and on premises— in one comprehensive, dynamic visualization. Trusted by all four branches of the military, the world’s most trusted financial institutions, power grid companies, and mission-critical government agencies. A digital transformation is accelerating migration to the cloud, especially as so many people work remotely. Security teams are scrambling to manage security for resources in one, two or more public clouds as well as for resources remaining on premises. Most security tools only work in one of these environments, leaving security teams with common, urgent concerns. Continuously validate and ensure security compliance with your network segmentation policies and regulations.
  • 16
    Cisco pxGrid
    With Cisco pxGrid (Platform Exchange Grid), your multiple security products can now share data and work together. This open, scalable, and IETF standards-driven platform helps you automate security to get answers and contain threats faster. Use one API for open, automated data sharing and control. Cisco pxGrid can help an entire ecosystem of dissimilar, IETF standards-track technologies work together. Manage your security through a single interface. See your security posture more clearly and concisely. Get all relevant information and actionable intelligence on a single screen. Customize the way you share and view security data. Stop any attack, anywhere in the network, immediately and automatically. With pxGrid, any connected technology can instruct the Cisco Identity Services Engine (ISE) to contain a threat. Cisco pxGrid enables cross-platform network system collaboration across your IT infrastructure. Monitor security, detect threats, and set network policy.
  • 17
    Coalfire

    Coalfire

    Coalfire

    Only Coalfire brings the cloud expertise, technology, and innovative approaches that empower your organization to capitalize on the promise of digital transformation. Coalfire is the cybersecurity advisor that helps private and public sector organizations avert threats, close gaps, and effectively manage risk. By providing independent and tailored advice, assessments, technical testing, and cyber engineering services, we help clients develop scalable programs that improve their security posture, achieve their business objectives, and fuel their continued success. Coalfire has been a cybersecurity thought leader for more than 16 years and has offices throughout the United States and Europe. Unlock the full potential of your cloud – and lock in your success. Beat them at their game. Partner with the adversary of your adversaries. A business-aligned, modern cybersecurity program. Advantage you.
  • 18
    BeyondTrust Endpoint Privilege Management
    Eliminate unnecessary privileges and elevate rights to Windows, Mac, Unix, Linux and network devices without hindering productivity. Our experience implementing across over 50 million endpoints has helped create a deployment approach with rapid time to value. Available on-premise or in the cloud, BeyondTrust enables you to eliminate admin rights quickly and efficiently, without disrupting user productivity or driving up service desk tickets. Unix and Linux systems present high-value targets for external attackers and malicious insiders. The same holds true for networked devices, such as IoT, ICS and SCADA. Gaining root or other privileged credentials makes it easy for attackers to fly under the radar and access sensitive systems and data. BeyondTrust Privilege Management for Unix & Linux is an enterprise-class, gold-standard privilege management solution that helps security and IT organizations achieve compliance.
  • 19
    Do Status
    Cloud Services Monitoring. Create a personalized dashboard of all services you rely on. Be alerted when they encounter issues. Keep on top of services you depend on with our unified service Unified Dashboard. Subscribe to services you rely on and view them on a dashboard showing its latest status. Use our fullscreen feature to view the dashboard on a large screen or TV for constant view of your dependencies. Unified Alerts. Receive alerts on Email or Slack when services encounter issues. With other platforms like PagerDuty, Webhooks, Microsoft Teams coming soon. Do Status monitors 100s of cloud services for issues. We actively monitor statuses published by popular cloud services and provide all statuses on to a unified dashboard. Do Status also alerts you when services encounter issues. Create a personal dashboard for a quick view to all your dependencies in one place. Get alerts when your dependencies encounter issues.
  • Previous
  • You're on page 1
  • Next