docs.axonius.com Open in urlscan Pro
2606:4700::6812:79f  Public Scan

Submitted URL: https://hello.axonius.com/api/mailings/click/PMRGSZBCHIZTINRXG42CYITVOJWCEORCNB2HI4DTHIXS6ZDPMNZS4YLYN5XGS5LTFZRW63JPMRXWG...
Effective URL: https://docs.axonius.com/docs/adapters-list
Submission: On November 29 via api from US — Scanned from DE

Form analysis 2 forms found in the DOM

<form>
  <div class="infoBox">Changing your password will log you out immediately. Use the new password to log back in.</div>
  <div class="mb-3"><label>Current password</label> <input type="password" class="form-control" id="currentPassword" name="currentPassword">
    <div class="cp_error_message cpErrorCount hidden">Current password is required</div>
  </div>
  <div class="mb-3"><label>New password</label> <input type="password" class="form-control" id="newPassword" name="newPassword">
    <div class="np_error_message cpErrorCount hidden">New password must be at least 8 characters long. It should contain at least one upper and lower case letter, number, and a special character.</div>
  </div>
  <div class="mb-3"><label>Confirm password</label> <input type="password" class="form-control" id="confirmPassword" name="confirmPassword">
    <div class="cop_error_message cpErrorCount hidden">Confirm password must be at least 8 characters long. It should contain at least one upper and lower case letter, number, and a special character.</div>
    <div class="password-mismatch cpErrorCount hidden">Confirm password should be same as new password</div>
  </div>
  <div class="text-right"><button class="updatePassword btn-primary" id="updatePassword">Update</button></div>
</form>

<form id="reader_update_form">
  <div class="mb-3 edit-profile">
    <div class="profile-container">
      <div class="col-full">
        <div class="user-image">
          <div class="user-image-img"><img src="//cdn.document360.io/static/images/avatar.png"></div><label for="profile-image" class="fal fa-pencil" aria-hidden="true"></label> <input type="file" name="profileImage" id="profile-image" class="d-hide"
            accept="image/*">
        </div>
      </div>
      <div class="col-half"><label class="new-email-label">First Name</label> <input class="form-control" id="firstname" name="firstName">
        <div class="firstname_error_message counterror">First name must have atleast 2 characters. Numbers and special characters are not allowed.</div>
      </div>
      <div class="col-half"><label class="new-email-label">Last Name</label> <input class="form-control" id="lastname" name="lastName">
        <div class="lastname_error_message counterror">Last name must have atleast 1 characters. Numbers and special characters are not allowed.</div>
      </div>
      <div class="col-full"><label class="new-email-label">New email</label> <input type="email" class="form-control" id="newEmail" name="newEmail">
        <div class="newemail_error_message counterror">Enter a valid email</div>
      </div>
      <div class="col-full"><label class="new-email-label">Re-enter your password</label> <input type="password" class="form-control" id="confirm_current_password" name="confirmCurrentPassword">
        <div class="password_error_message counterror">Enter a valid password</div>
      </div>
    </div>
    <div class="update-email-success-message">Your profile has been successfully updated.</div>
  </div>
  <div class="text-right"><button class="updateEmail btn-primary" id="profile_update">Update</button>
    <div class="update-email-logout"><a href="/Account/Logout" class="btn-primary">Logout</a></div>
  </div>
</form>

Text Content

MENU
 * Start Free Trial
 * Support Center
 * Axonius.com
 * Home

Login
 * Start Free Trial
 * Support Center
 * Axonius.com
 * Home

Login


 * 
   
 * Axonius Platform
    * Axonius Platform
    * Enforcements

   
   
 * 



 * Start Free Trial
 * Support Center
 * Axonius.com
 * Home

Login

Contents x
No matching results found
 * Using Axonius Platform
   * Getting Started with Axonius Platform
     * The Axonius Platform
     * Getting Started with Axonius
     * Connect Adapters
     * Examine a Device Profile
     * Save a Query
     * Tag a Device
     * Create and Execute an Enforcement Set
     * Create a Dashboard Chart
     * Generate a Report
   * Using the Axonius Interface
     * Getting to Know the Axonius Interface Updated
     * Searching for Assets
     * Account Settings
     * Working with Tables Updated
   * Using Adapters
     * Adapters Page
     * Adding a New Adapter Connection Updated
     * Adapter Advanced Settings Updated
     * Advanced Configuration for Adapters
     * Adapter Discovery Configuration
     * Adapter Connections Updated
     * Setting Adapter Ingestion Rules
     * Adapters Fetch History Updated
     * Adapters Fetch Events Updated
     * Discovery Cycle
     * System Lifecycle and Discovery Log Charts
   * Axonius Assets
     * Assets Page
     * Compute
       * Compute Overview
       * Devices Page
       * Vulnerabilities
         * Vulnerabilities Updated
         * Vulnerabilities Profile Updated
         * Vulnerabilities Repository
     * Identity
       * Identity Overview
       * Users Page
     * Applications
       * Applications Overview Updated
       * Software Management
         * Software Updated
         * Software Profile Updated
       * SaaS Applications
       * SaaS Applications Repository
       * Application Risk Score
       * Application Extensions
       * Extension Types
       * User Extensions
       * Application Settings
       * Licenses
       * Expenses
       * Activities
     * Tickets
       * Tickets
     * Network
       * Network Overview
     * Storage
       * Storage Overview
     * Alerts & Incidents
       * Alerts and Incidents Overview
   * Working with Asset Pages
     * Setting Page Columns Display
     * Asset Profile Page
     * Asset Profile Page - Complex Fields
     * Exporting Asset Data to CSV
     * Asset Investigation
     * Comparison Report for Assets
     * Asset Actions
     * Working with Custom Data
     * Working with Tags
     * Monitoring Third-Party Tickets
     * Manually Creating an Asset
   * Asset Graph
     * Asset Graph Updated
   * Queries
     * Creating Queries with the Query Wizard Updated
     * Creating Queries Using Filters
     * Adding Multiple Values to Query Expressions
     * Using AI Query Assistant to Create Queries
     * Saved Queries
     * Queries Page Updated
     * Managing Queries Updated
     * Viewing Query History
   * Enforcement Center
     * Enforcement Center Overview New
     * Enforcement Sets
       * Enforcement Center Page Updated
       * Creating Enforcement Sets Updated
       * Managing Enforcement Sets New
       * Using Predefined Enforcement Sets
       * Testing an Enforcement Set
       * Working with Dynamic Value Statements
         * Dynamic Value Statement Concepts
         * Creating Enforcement Action Dynamic Value Statements
         * Enforcement Action Dynamic Value Statement Syntax Table Updated
         * Useful Tips and Tricks for Working with Dynamic Value Statements New
         * Using the Syntax Helper Updated
         * Using the Dynamic Value Statement Wizard
         * "All" Statement Syntax
         * Switch/Case Statement Syntax
         * Using Functions, Operators, and Keywords Updated
         * Dynamic Value Statement Examples and Use Cases Updated
       * Scheduling Enforcement Set Runs Updated
       * Viewing Enforcement Set Run History Updated
       * Duplicating Enforcement Sets
       * Viewing Editing and Deleting Enforcement Sets Updated
       * Terminating an Enforcement Set Run
       * Running Enforcement Sets
       * Enforcement Action Index
     * Workflows
       * Workflows Page
       * Creating a Workflow
       * Workflow Events
         * Supported Workflow Events
         * Configuring Third-Party System Webhook Events
       * Managing Workflows
       * Duplicating Workflows
       * Viewing and Editing Workflows
       * Deleting and Deactivating Workflows
       * Running a Workflow
       * Terminating a Workflow Run
       * Viewing Workflows Run History
   * Findings Center
     * Findings Overview
     * Alerts
       * Alerts Overview
       * Viewing Alerts
       * Viewing Alert Information
       * Modifying Alert Status
     * Rules Manager
       * Rules Overview
       * Viewing Rules
       * Viewing Findings Rule Information
       * Creating a Findings Rule
       * Managing Findings Rules
   * Reports
     * Reports Page
     * Configuring Reports Updated
     * Report Content
   * Data Analytics
     * Analyzing Query Data - Creating Data Analytics Reports
     * Pivot Table Filter Operators
   * Dashboards
     * Dashboards Page Updated
     * Managing Dashboards New
     * System Charts
       * System Charts
       * System Lifecycle and Discovery Log Charts
     * Using Custom Charts
       * Working with Custom Charts
       * Chart Query Configuration
       * Query Intersection Chart
       * Query Comparison Chart
       * Field Segmentation Chart Updated
       * Adapter Segmentation Chart
       * Field Summary Chart Updated
       * Query Timeline Chart Updated
       * Pivot Chart Updated
       * Matrix Data Chart
       * Text Only
     * Working with Charts
       * Chart Actions
       * Updating a Dashboard Dynamically
       * Updating a Chart Dynamically
       * Setting Asset Count Threshold Colors
       * Comparing Today's Query Results to a Previous Date
       * Viewing Query Results from a Historical Date New
       * Defining a Custom Label for Chart Legends
       * Hiding the Total Asset Count
       * Viewing the Asset Preview
       * Creating a Query on-the-Fly New
     * Importing and Exporting Dashboards
     * Importing Dashboards and Queries with the API
     * Dashboard Templates
       * Using Dashboard Templates
       * Visibility and Trends
         * Comprehensive Asset Inventory
         * Data Hygiene
         * Device Inventory Management
         * Executive Report
         * Linux Devices Inventory
         * Mergers & Acquisitions
         * Mobile Device Inventory
         * Network Device Inventory
         * Printer Inventory
         * ServiceNow Reconciliation
         * User Inventory Management
         * Users' Passwords Insights
         * Windows Servers Inventory
         * Windows Workstations Inventory
       * Vulnerabilities Management
         * CISA Known Exploited Vulnerabilities
         * Environment Hygiene
         * Log4Shell Tracker
         * Security Posture
       * Cloud Environment Insights
         * AWS Inventory
         * Cloud Inventory
         * Google Cloud Provider Inventory
         * Microsoft Azure Inventory
       * Compliance and Risk
         * CrowdStrike Agent Coverage
         * Incident Response Device
         * Incident Response User
         * NIST 800-53: Identify ID.AM
         * Software Hygiene
       * Remote Workforce
         * Okta Configurations and Insights
         * Zoom Configurations and Insights
       * SaaS Management
         * Azure AD Overview
         * Google Overview
         * SaaS Overview
         * SaaS Configurations Management
         * SaaS Applications Management
         * Users Management
   * Cloud Asset Compliance Center
     * Cloud Asset Compliance Overview
     * Cloud Asset Compliance Page
     * Cloud Compliance Dashboard
     * Cloud Asset Compliance for AWS
       * AWS Adapter Configuration for Cloud Asset Compliance
     * Cloud Asset Compliance for GCP
       * GCP Configuration for Cloud Asset Compliance
     * Cloud Asset Compliance for Azure
     * Cloud Asset Compliance Enforcement Actions
       * Cloud Asset Compliance Enforcement Actions
       * Send Email
       * Create Jira Issue
   * Activity Logs
     * Activity Logs Page
   * System Settings
     * System Settings - Overview
     * Using the System Settings Page
     * Configuring Lifecycle Settings
       * Lifecycle Settings - Overview
       * Configuring Discovery Settings
       * Configuring Retention Settings
       * Configuring Advanced Lifecycle Settings
     * Managing GUI
       * Configuring User Interface Settings
       * Configuring Login Settings
     * Managing Access Settings
       * Managing LDAP and SAML
         * Using Identity Providers
         * LDAP Login Settings
         * SAML-Based Login Settings Updated
         * SAML Based Authentication - Examples
           * Example: SAML Based Authentication with Okta Updated
           * Example: SAML Based Authentication with Microsoft Active Directory
             (AD)
           * Example: SAML Based Authentication with Microsoft Azure Active
             Directory (Azure AD)
       * Managing External Passwords Updated
       * Configuring System External URL
       * Configuring Proxy Settings
       * Enterprise Password Management Integrations
         * Akeyless Vault Integration
         * AWS Secrets Manager Integration
         * Azure Key Vault Integration
         * BeyondTrust Password Safe Integration
         * Click Studios Passwordstate Updated
         * CyberArk Integration
           * CyberArk Integration
           * AAM Installation and Configuration
         * GCP Secret Manager
         * HashiCorp Vault Integration
         * Delinea Integration
     * Managing Users and Roles
       * Role Based Access Control (RBAC) Management
         * Managing Users
         * Deleting the Default admin Account
         * Impersonating Users
         * Managing Roles Updated
         * Managing Service Accounts Updated
         * Special Permissions
         * Permissions List
       * Working with Data Scopes
         * Managing Data Scopes
         * Switching Data Scopes
     * Managing External Integrations
       * Configuring Atlassian Opsgenie Settings
       * Configuring Email Settings
       * Configuring HTTPS Log Settings
       * Configuring Jira Settings
       * Configuring Syslog Settings
       * Viewing and Configuring Webhook Settings
       * Configuring ChatGPT Settings
     * Managing Privacy and Security
       * Managing Password Settings
       * Managing Timeout Settings
       * Managing Certificate Settings
       * Mutual TLS
     * Managing Enrichment
       * Configuring Enrichment Settings
     * Configuring Data Settings
       * Managing Custom Fields
       * Managing Tags
       * Managing Custom Relationships New
       * Core Node and Central Core Node Configuration Updated
       * Configuring Cache and Performance
       * Configuring Correlation Settings
       * Configuring Data Aggregation Settings
       * Configuring CSV Export Settings
     * Managing API Settings
     * Configuring Additional System Settings
       * Manage Tunnels
       * Displaying Getting Started Checklist
       * Configuring Notification Settings
       * Configuring Activity Logs Settings
       * Configuring Remote Support
     * Viewing System Information
     * System Warnings Updated
 * Connecting Adapters
   * Adapters List
   * Adapters 1-A-B
     * 1E Tachyon
     * 7SIGNAL Mobile Eye
     * 1Password Updated
     * A10
     * Absolute
     * Acunetix
     * Adaptive Shield
     * Addigy
     * Admin by Request
     * Adobe Updated
     * Adobe Acrobat Sign
     * Adobe Workfront Updated
     * ADP
     * ADP Vantage HCM
     * Aha!
     * Aircall New
     * Airlock Digital
     * Airtable Enterprise
     * Akamai App and API Security
     * Akamai EAA
     * AKAssets
     * Akeyless New
     * AkiPS
     * Alcide
     * Alert Logic
     * Alert Logic MDR
     * AlgoSec Firewall Analyzer
     * Alibaba Cloud
     * Amazon Web Services (AWS)
       * Connecting Axonius to AWS Resources
       * Configuring the AWS Adapter Using Organizations
       * AWS Parameters
       * AWS Advanced Settings
       * AWS Advanced Configuration File
       * Connecting the AWS Adapter Using an IAM User
       * Configuring an S3 Bucket to use with Axonius
       * AWS Permissions
     * Apache CloudStack
     * Apple Business Manager
     * AppNeta
     * Aqua Security
     * Arista CloudVision
     * Arista Extensible Operating System (EOS)
     * Armis
     * Aruba
     * Aruba AirWave
     * Aruba Central
     * Aruba ClearPass Updated
     * Aruba Mobility Master
     * Asana
     * Asimily Insight New
     * AssetPanda Updated
     * AssetSonar
     * Assure1 by Federos
     * Atera
     * Aternity
     * Atlassian Jira Assets Platform
     * Atlassian (Formerly Atlassian Jira Software) Updated
     * AttackIQ
     * Attivo BOTSink
     * Auth0
     * Automox
     * Auvik
     * Aviatrix
     * Avi Networks
     * Avigilon Alta (formerly Openpath)
     * Awake Security
     * Axonius Network Discovery
     * Axonius Users
     * Azure Classic VMs
     * Azure Defender for Cloud
     * Azure Defender for IoT
     * Azure DevOps Updated
     * Backblaze
     * Backstage
     * Backup Radar
     * BambooHR
     * baramundi
     * Barracuda CloudGen Access (Fyde)
     * Barracuda CloudGen Firewall
     * BeyondTrust Cloud Privilege Manager
     * BeyondTrust Insight SQL
     * BeyondTrust Password Safe Updated
     * BeyondTrust Privileged Identity (Lieberman RED Identity Management)
     * BeyondTrust Privilege Management for Windows
     * BeyondTrust Remote Support (Bomgar)
     * BigFix Updated
     * BigFix Compliance Analytics (formerly SCA)
     * BigID
     * BILL
     * BinaryEdge
     * Bionic
     * Bishop Fox
     * Bitbucket
     * bitFit
     * BitSight Security Ratings Updated
     * BlackBerry Unified Endpoint Management (UEM)
     * Black Kite
     * Block64 BlockBox
     * BloxOne Threat Defense New
     * BlueCat Enterprise DNS
     * BloodHound
     * Bitdefender GravityZone Business Security
     * BlueCoat ProxySG
     * BMC Atrium ADDM
     * BMC Atrium CMDB
     * BMC Atrium CMDB onPrem
     * BMC Helix Client Management
     * BMC TrueSight Automation for Servers
     * BMC TrueSight Presentation Server
     * BOSSDesk
     * Box Platform
     * Bricata
     * Brivo
     * Burp Suite
     * Buildkite
   * Adapters C
     * CA Service Management
     * CA Spectrum
     * Cato Networks
     * CDW New
     * Censys
     * Centrify Identity Services
     * Ceridian Dayforce
     * Certero
     * CFEngine
     * ChangeGear
     * Checkmarx SAST
     * Checkmk
     * Check Point CloudGuard
     * Check Point Harmony Endpoint
     * Check Point Harmony Mobile
     * Check Point Infinity Updated
     * Chef
     * Cherwell IT Service Management
     * Cherwell IT Service Management (SQL)
     * CHG Meridian New
     * CipherTrust Manager New
     * CIS CAT Pro
     * Cisco
     * Cisco Advanced Malware Protection (AMP)
     * Cisco AppDynamics New
     * Cisco Application Policy Infrastructure Controller (APIC) Updated
     * Cisco CX Cloud
     * Cisco DCNM
     * Cisco DNA Center
     * Cisco Firepower Management Center
     * Cisco Identity Services Engine (ISE)
     * Cisco Industrial Network Director
     * Cisco Intersight
     * Cisco Meraki
     * Cisco Prime
     * Cisco Secure Workload (Formerly Tetration)
     * Cisco Security Manager
     * Cisco Smart Net Total Care
     * Cisco Stealthwatch
     * Cisco UCS Central
     * Cisco UCS Manager
     * Cisco Umbrella
     * Cisco Unified Communications Manager (UCM)
     * Cisco Webex
     * Citrix ADC
     * Citrix DaaS
     * Citrix Director
     * Citrix Endpoint Management (XenMobile)
     * Citrix ShareFile
     * Claroty Updated
     * CloudCheckr
     * CloudFit CFS
     * Cloudflare DNS
     * CloudFlare Zero Trust
     * CloudHealth
     * CoalfireOne
     * Code42 Incyder
     * Cofense PhishMe
     * Cohesity
     * Collibra
     * Com Laude New
     * Commvault
     * Confluent
     * ConnectSecure
     * ConnectWise Automate
     * Contrast Security
     * Cradlepoint
     * CrashPlan
     * Crestron XiO Cloud
     * Cribl New
     * CrowdStrike Falcon
     * CrowdStrike Falcon Discover
     * CrowdStrike Falcon Identity Protection (Preempt)
     * CrowdStrike Falcon Spotlight
     * CrowdStrike Kubernetes Protection
     * CSI Leasing
     * CSV Updated
     * CSV Legacy Remote File Configuration
     * CSV - Applications New
     * CSV - DNS Records New
     * CSV - Expenses New
     * CSV - Licenses New
     * CSCDomainManager
     * CTL Cider
     * CyberArk Alero New
     * CyberArk Endpoint Privilege Manager Updated
     * CyberArk Idaptive
     * CyberArk Privileged Account Security
     * Cybereason Deep Detect & Respond
     * Cyberhaven
     * Cyberint Argos Edge
     * CyCognito Platform Updated
     * CylancePROTECT
     * Cymulate
     * Cynet 360
   * Adapters D-G
     * Darktrace
     * Databricks
     * Datadog
     * Datto RMM (Autotask Endpoint Management)
     * Deep Instinct
     * DefenseStorm
     * Delinea Privilege Manager (Thycotic)
     * Delinea Secret Server (Thycotic)
     * Dell Boomi
     * Dell ECS
     * Dell EMC Avamar
     * Dell iDRAC
     * Dell OpenManage Enterprise
     * Dell PowerProtect DD Management Center
     * Dell PowerScale OneFS
     * Dell PowerStore
     * Dell RecoverPoint New
     * Dell TechDirect
     * Dell Unisphere For Unity
     * Dell VPLEX
     * Dell WYSE Management
     * Device42
     * Devo
     * DigiCert CertCentral
     * DigiCert PKI Platform (Symantec Managed PKI)
     * Digital Guardian DLP
     * DigitalOcean
     * Digital Shadows SearchLight
     * Dismap - JSON New
     * DNS Made Easy
     * DOJ CSAM
     * DocuSign
     * Docker
     * Domotz
     * Dragos Platform Updated
     * Dropbox
     * Druva Cloud Platform
     * Duo Beyond
     * Dynamics CMDB (HelpDesk)
     * Dynatrace
     * Eagle Eye Networks New
     * Easyvista Service Manager
     * ECI FMAudit
     * Eclypsium
     * EdgeScan Fullstack Vulnerability Management
     * EfficientIP SOLIDserver DDI
     * Ekran
     * Elastic Defend New
     * Elasticsearch
     * eMASS
     * Endgame
     * Entrust New
     * Equinix
     * Eracent
     * Ermetic
     * ESET Endpoint Security
     * Exabeam
     * Exabeam Datalake
     * Expensify
     * ExtraHop Reveal(x)
     * ExtraHop Reveal(x) 360
     * ExtremeCloud IQ
     * Extreme Networks ExtremeControl
     * Extreme Networks ExtremeWireless WiNG
     * EyeInspect New
     * EZOfficeInventory
     * F5 BIG-IP iControl
     * F5 BIG-IQ Centralized Management
     * F-Secure Policy Manager
     * F-Secure Protection Service for Business (PSB)
     * Feedly New
     * FireEye Endpoint Security (formerly HX)
     * FireEye Endpoint Security Logon Tracker New
     * FireMon Security Manager
     * FleetDM
     * Flexera IT Asset Management
     * Flexera Software Vulnerability Research
     * Flexera SVM
     * FlexNet Manager Suite Cloud
     * Forcepoint Insider Threat New
     * Forcepoint ONE
     * Forcepoint Web Security Endpoint CSV File
     * Forcepoint ZTNA Private Access
     * Foreman
     * ForeScout CounterACT
     * Forescout Switch Plugin
     * ForgeRock
     * FortiClient EMS
     * FortiEDR (enSilo)
     * FortifyData
     * Fortify Software Security Center
     * FortiNAC
     * Fortinet FortiGate
     * FortiPortal
     * Forward Networks
     * FreeIPA
     * Freshservice
     * Frontline VM
     * Genian
     * Gigamon GigaVUE-FM (Fabric Manager)
     * Gigamon ThreatINSIGHT
     * GitHub Updated
     * GitLab
     * GlobalSign Atlas
     * GLPI
     * GluWare
     * GoDaddy
     * Gong
     * Google Chronicle Security
     * Google Cloud Platform (GCP)
     * Google BigQuery
     * Google Sheets
     * Google Workspace (G Suite) Updated
     * GoSecure Titan
     * Greenbone Vulnerability Management (OpenVAS)
     * Greenhouse
     * GreyNoise
     * GRR Rapid Response
     * Guardicore
     * Gytpol
   * Adapters H-L
     * HAProxy
     * Halcyon
     * HashiCorp Consul
     * HashiCorp Nomad
     * Have I Been Pwned
     * Hawk
     * Heimdal Security
     * Hibob
     * Hitachi Operations Center
     * Hoxhunt New
     * HP Anyware
     * HP Device Manager (HPDM)
     * HP Integrated Lights-Out (iLO)
     * HP Network Node Manager i (NNMi)
     * HP NNMi XML File
     * HPE Intelligent Management Center (IMC)
     * HPE OneView
     * HPE SAN
     * HPE Switches New
     * HP Web Jetadmin
     * Huawei eSight
     * HubSpot Updated
     * Huntress
     * HYCU
     * HyperSQL
     * HYPR Passwordless
     * IBM Cloud
     * IBM Guardium
     * IBM Hardware Management Console (HMC)
     * BigFix Inventory
     * IBM License Metric Tool
     * IBM Maximo New
     * IBM Power Hardware Management Console (HMC)
     * IBM QRadar
     * IBM Spectrum Protect Plus
     * IBM Tivoli Application Dependency Discovery Manager (TADDM)
     * IBM VPC
     * IBM MaaS360 with Watson
     * IBM UrbanCode
     * iboss cloud
     * iCIMS
     * Icinga
     * IFS Assyst
     * IGEL Universal Management Suite (UMS)
     * Illumio Adaptive Security Platform (ASP)
     * Illusive Networks
     * ImmuniWeb New
     * Imperva Data Activity Monitoring (DAM) Updated
     * Imperva WAF
     * Imperva WAF Cloud
     * Infinibox
     * Infinipoint
     * Infoblox BloxOne
     * Infoblox DDI
     * Infoblox NetMRI
     * Infor EAM
     * Intel DCMC
     * Intel EMA
     * Intezer Protect
     * Intrigue
     * Intruder.io
     * Invicti
     * IP Fabric
     * Island
     * IT Glue
     * iTop
     * Ivanti Connect Secure
     * Ivanti Endpoint Security
     * Ivanti Neurons Updated
     * Ivanti Patch Management
     * Ivanti Security Controls
     * Ivanti Service Manager Updated
     * Ivanti Unified Endpoint Manager (Landesk)
     * Jamf Pro Updated
     * Jamf Protect
     * Jamf Trust New
     * JetPatch
     * JFrog Artifactory
     * Jira Service Management Updated
     * JSON
     * JumpCloud
     * Juniper Junos
     * Juniper Junos Space
     * Kandji
     * Kaseya VSA
     * Kaspersky Security Center
     * Keeper
     * Kemp Central
     * Kenna Security Platform
     * Keycloak
     * Keyfactor
     * KnowBe4
     * Kolide K2
     * Kubernetes
     * Lacework Updated
     * Lakeside SysTrack
     * Landscape
     * Lansweeper
     * Lansweeper Cloud Updated
     * LastPass
     * LaunchDarkly
     * Lenel OnGuard New
     * LibreNMS
     * LimaCharlie
     * Linode
     * Linux SSH
     * Litmos
     * LogicMonitor
     * LogMeIn Central
     * L0phtCrack 7
     * Lookout Mobile Endpoint Security
     * LogRhythm
     * Lucidchart
   * Adapters M-N
     * Malwarebytes Endpoint Security (On-Prem Platform)
     * Malwarebytes Endpoint Protection (Cloud Platform)
     * ManageEngine Endpoint (Desktop) Central and Patch Manager Plus
     * ManageEngine Firewall Analyzer
     * ManageEngine Mobile Device Management
     * ManageEngine Network Configuration Manager New
     * ManageEngine OpManager
     * ManageEngine OpUtils
     * ManageEngine PasswordManagerPro New
     * ManageEngine ServiceDesk Plus
     * ManageEngine Service Desk Plus (SDP) - Deprecated
     * Mandiant
     * MarkMonitor
     * Masscan
     * McAfee ePolicy Orchestrator (ePO)
     * McAfee MVision Cloud
     * Medigate
     * Men&Mice DNS Management
     * Micro Focus GroupWise
     * Micro Focus Universal CMDB
     * Micro Focus Server Automation (HP Server Automation, Opsware)
     * Micro Focus SiteScope
     * Microsoft Active Directory (AD) Updated
     * Microsoft Azure Updated
     * Microsoft Azure Active Directory (Azure AD) and Microsoft Intune Updated
     * Microsoft BitLocker Administration and Monitoring (MBAM)
     * Microsoft Cloud App Security Updated
     * Microsoft Defender for Endpoint (Microsoft Defender ATP) Updated
     * Microsoft Dynamics 365
     * Microsoft Endpoint Configuration Manager (MECM) Updated
     * Microsoft Hyper-V
     * Microsoft Key Management Service (KMS)
     * Microsoft Lync
     * Microsoft SCOM
     * Microsoft System Center Virtual Machine Manager
     * Milestone XProtect
     * Mimecast
     * Minerva Labs Endpoint Malware Vaccination
     * Miro
     * Mist
     * MobileIron EMM
     * Monday Updated
     * MongoDB
     * MoroCloud
     * Mosyle
     * MSP Manager
     * Mulesoft
     * Mulesoft Runtime Fabric
     * Mutiny
     * MVISION ePO
     * N2WS
     * N-able
     * N-Able N-Sight RMM
     * Nagios Core
     * Nagios XI
     * Namecheap
     * Nasuni
     * Nectus
     * NetApp
     * NetApp Active IQ Unified Manager
     * NetBox
     * NetBrain Integrated Edition
     * Netdisco
     * NetIQ Advanced Authentication
     * NetIQ Identity Manager
     * NetMotion Mobility
     * Netskope
     * NetSpyglass
     * NetWitness NDR New
     * Neustar UltraDNS
     * New Relic
     * NextDLP
     * Nexthink
     * Ninja One (RMM)
     * NodeZero
     * Notion
     * Nozomi Guardian and CMC
     * Netwrix Auditor
     * Nucleus Security
     * Nutanix Prism Central
     * Nutanix AHV
     * Nmap Security Scanner
   * Adapters O-R
     * Observium
     * ObserveIT
     * Obsidian Security
     * Okta
     * OmniVista 2500 NMS
     * OnDMARC
     * OneLogin
     * Onspring-Compass New
     * Oomnitza Enterprise Technology Management
     * Opal
     * openDCIM
     * OpenLDAP
     * OpenStack
     * OpenText ZENworks New
     * OpenVPN Cloud
     * Opsgenie
     * OpsRamp
     * OPSWAT MetaAccess
     * Opsview
     * Oracle Cloud
     * Oracle Enterprise Manager
     * Oracle Fusion HCM Cloud New
     * Oracle Ksplice
     * Oracle Netsuite New
     * Oracle VM
     * Orca Cloud Visibility Platform Updated
     * Ordr New
     * Ostendio New
     * Outpost24
     * oVirt
     * PacketFence
     * PagerDuty
     * Palo Alto Networks Cortex
     * Palo Alto Networks Cortex XDR
     * Palo Alto Networks Cortex Xpanse
     * Palo Alto Networks IoT Security (Zingbox)
     * Palo Alto Networks Panorama
     * Palo Alto Networks Prisma Access
     * Palo Alto Networks Prisma Cloud
     * Palo Alto Networks Prisma Cloud Workload Protection
     * Palo Alto Traps Endpoint Security Manager
     * Panorays
     * PaperCut
     * Parsec
     * Paycor
     * Paylocity
     * PDQ Inventory
     * Pentera New
     * PeopleHR
     * PeopleSoft New
     * Persistent Systems Radia Endpoint Manager
     * Phosphorus
     * phpIPAM
     * Pingboard
     * PingFederate
     * PingID
     * PingOne Directory
     * Pivotal Cloud Foundry
     * PKWARE
     * PluralSight
     * Polymer DLP
     * Portnox Clear
     * Portnox Core
     * Prey
     * Pritunl New
     * PrivX
     * Projector PSA
     * Promisec Endpoint Manager
     * Proofpoint
     * Proofpoint Endpoint DLP
     * Proofpoint's ObserveIT Insider Threat Management Platform
     * Proofpoint POD
     * Proofpoint Security Awareness Training
     * Proofpoint TAP Updated
     * Proofpoint ZTNA (Meta)
     * Proxmox Virtual Environment (VE)
     * PRTG Network Monitor
     * Pulseway
     * Pulumi Cloud Engineering Platform
     * Puppet
     * Pure Storage Pure1 Updated
     * Quadrant
     * Qualys Cloud Platform
     * Qualys Container Security New
     * Quest KACE Endpoint Systems Management Appliances
     * Radiflow
     * Rancher Updated
     * Randori
     * Rapid7 Insight Account Platform
     * DivvyCloud
     * Rapid7 InsightIDR Updated
     * Rapid7 InsightVM
     * Rapid7 Nexpose and InsightVM
     * Rapid7 Nexpose Warehouse Updated
     * Rapid7 Threat Command
     * RecordedFuture
     * Red Canary
     * Red Hat Automation Controller (Ansible Tower)
     * Red Hat Customer Portal
     * Red Hat IdM
     * Red Hat Insights
     * Red Hat OpenShift Container
     * Red Hat Satellite
     * RedSeal
     * Remediant SecureONE (JITA)
     * RescueAssist (GoToAssist) New
     * RHSM Management Portal
     * RingCentral
     * Rippling
     * RiskIQ Digital Footprint
     * RiskRecon New
     * RiskSense
     * Riverbed NetIM
     * Riverbed SteelCentral Controller (SCC)
     * Robin
     * RSA Archer
     * RSA SecurID
     * Rubrik
     * Rubrik Polaris
     * RUCKUS Cloud
     * Rudder
     * runZero
   * Adapters S
     * SafeBreach
     * SafeConsole
     * Sage People
     * SailPoint IdentityIQ Updated
     * SailPoint Identity Manager
     * SailPoint IdentityNow
     * Sal Updated
     * Salesforce
     * Samsung Knox
     * SAP Concur
     * SAP Success Factors
     * Saviynt
     * Sassafras
     * Schneider Electric EcoStruxure IT
     * ScienceLogic
     * ScopNET
     * Sectigo Updated
     * SecureAuth
     * Secure Code Warrior
     * Secureworks Red Cloak
     * Secureworks Taegis VDR
     * Secureworks Taegis XDR (Red Cloak TDR)
     * SecureW2 JoinNow
     * SecurityScorecard
     * Sensu
     * SentinelOne Updated
     * SentinelOne Ranger
     * Sentra
     * Sepio Updated
     * Serraview
     * ServiceNow Updated
     * SevOne Data Platform
     * Shadowserver
     * SharePoint
     * Shockwave Cloud
     * Shodan
     * Signal Sciences
     * SimpleMDM
     * Site24x7
     * Skybox Firewall Assurance
     * Slack Updated
     * Smartsheet
     * Smokescreen IllusionBlack
     * Snapcomms
     * Snipe-IT
     * Snowflake Data Warehouse New
     * Snow Software Asset Management
     * Snow Software Exceptions
     * Snyk
     * SolarWinds Network Performance Monitor Updated
     * SolarWinds Service Desk (Samanage)
     * SonicWall
     * SonicWall Network Security Manager
     * Sophos Central Updated
     * Sophos Cloud Optix
     * Sophos Endpoint Protection
     * SOTI MobiControl
     * Spacewalk
     * Specops Inventory
     * Spiceworks
     * Splashtop
     * Splunk
     * Spycloud
     * SQLite
     * SQL Server
     * StackRox New
     * Stairwell
     * Statseeker
     * Sumo Logic
     * Sunbird
     * Sunflower
     * Sweepatic
     * Symantec Cloud Workload Protection (CWP)
     * Symantec Cloud Secure Web Gateway (WSS Agent)
     * Symantec Control Compliance Suite (CCS)
     * Symantec Data Center Security (DCS) Server Advanced
     * Symantec DLP
     * Symantec Endpoint Detection and Response (EDR)
     * Symantec Endpoint Encryption
     * Symantec Endpoint Management Suite (Altiris)
     * Symantec Endpoint Protection 12.x
     * Symantec Endpoint Protection 14.x
     * Symantec Endpoint Protection Cloud
     * Syncro MSP
     * SysAid
     * Syxsense
   * Adapters T-Z
     * Tableau
     * Tailscale
     * TalentLMS
     * Talon
     * Tanium Asset
     * Tanium Comply
     * Tanium Discover
     * Tanium Interact
     * Tanium Client Status
     * TCPWave (IPAM)
     * TeamDynamix Updated
     * TeamCity
     * TeamViewer
     * Tenable.asm
     * Tenable Identity Exposure (formerly Tenable.ad)
     * Tenable.io Updated
     * Tenable.io Scan Export CSV
     * Tenable Nessus Updated
     * Tenable Nessus CSV File Updated
     * Tenable.OT (Indegy)
     * Tenable.ot
     * Tenable.sc (SecurityCenter) Updated
     * TeQube Teqtivity
     * Tesma New
     * Tessian
     * Thinkst Canary
     * ThousandEyes
     * Threat Stack
     * TOPdesk Enterprise Service Management
     * Torii
     * Trend Micro Apex One (OfficeScan)
     * Trend Micro Cloud App Security
     * Trend Micro Conformity
     * Trend Micro Deep Security Updated
     * Trend Micro Vision One
     * Tripwire Enterprise
     * TrueFort
     * TruffleHog New
     * TruPortal
     * Trustwave
     * Tufin SecureTrack
     * Twistlock Updated
     * Trend Micro Worry-Free
     * Tychon
     * Ubiquiti Networks UniFi Controller
     * Udemy
     * UKG Pro (Ultimate Software UltiPro) Updated
     * Unimus
     * UpGuard CyberRisk
     * UpKeep
     * Uptycs Updated
     * Unisys Stealth
     * Unitrends
     * Universal SSH Key Manager (UKM)
     * Uptrends
     * Uyuni
     * vArmour
     * Varonis CSV New
     * Vectra AI
     * Veeam
     * Velociraptor
     * Venafi
     * Veracode
     * Vicarius
     * Viptela (Cisco) SD-WAN
     * Virtru Gmail Encryption
     * VMware Carbon Black App Control (Carbon Black CB Protection)
     * VMware Carbon Black Cloud Workload
     * VMware Carbon Black EDR (Carbon Black CB Response)
     * VMware Carbon Black LiveOps
     * VMware Carbon Black Cloud (Carbon Black CB Defense)
     * VMware ESXi and vSphere Updated
     * VMware NSX
     * VMware SD-WAN Updated
     * VMWare Tanzu
     * VMware vCloud Director
     * VMware vRealize Operations (vROps)
     * VMware Workspace ONE (AirWatch)
     * vRealize Automation SaltStack Config (formerly SaltStack Enterprise)
     * Vulcan
     * Vultr
     * VMware Horizon
     * Wasp AssetCloud
     * Wazuh
     * Webroot Endpoint Protection
     * Web Server Information Updated
     * WhiteHat Updated
     * Windows DHCP Server
     * Windows Management Instrumentation (WMI) Updated
     * Windows Server Failover Clustering (WSFC)
     * WhatsUp Gold
     * Wiz
     * WordPress
     * Workday
     * Workspace One - Intelligence Report API
     * WP Engine
     * xAssets New
     * XMC Extreme Management Center
     * Xshield
     * Windows Server Update Services (WSUS)
     * Zabbix Updated
     * ZenDesk Updated
     * Zenoss New
     * ZeroFox
     * Zero Networks
     * Zerto
     * Zerto ZVM
     * Zimperium
     * Zoom Updated
     * Zscaler Web Security
     * Zscaler Workload Segmentation
     * Zscaler ZDX
   * Deploying the Axonius System
     * Axonius Deployment Options
     * Axonius Cybersecurity Asset Management: Customer-hosted (on-premise /
       private cloud)
     * Axonius-hosted (SaaS)
     * System Deployment - Deploying the Virtual Appliance
     * Configuring the Axonius Platform
     * Working With Additional Axonius Collector Nodes
     * Installing Axonius OVA File on a Local VMware Workstation
     * Central Core Architecture
     * Core Node and Central Core Node Configuration Updated
     * Installing Axonius Tunnel
 * Release Notes
   * Axonius 6.0
     * What's New in Axonius Version 6.0
     * What's New in Axonius 6.0.10 New
     * What's New in Axonius 6.0.8 New
     * What's New in Axonius 6.0.6
     * What's New in Axonius 6.0.4
     * What's New in Axonius 6.0.2
     * Axonius 6.0 Ongoing Adapter and Enforcement Action Updates
   * Previous Releases
     * Axonius 5.0
       * What's New in Axonius 5.0 New
       * What's New in Axonius 5.0.7
       * What's New in Axonius 5.0.6
       * What's New in Axonius 5.0.5
       * What's New in Axonius 5.0.3
       * What's New in Axonius 5.0.2
       * What's New in Axonius 5.0.1
       * What's New in Axonius 5.0 compared to 4.8.8
       * Axonius 5.0 Ongoing Adapter and Enforcement Action Updates
     * Axonius 4.8
       * What's New in Axonius 4.8
       * What's New in Axonius 4.8.8
       * What's New in Axonius 4.8.7
       * What's New in Axonius 4.8.6
       * What's New in Axonius 4.8.5
       * What's New in Axonius 4.8.4
       * What's New in Axonius 4.8.3 New
       * What's New in Axonius 4.8.2
       * What's New in Axonius 4.8.1
       * What's New in Axonius 4.8.0 compared to 4.7.8
       * Axonius-4.8 Ongoing Adapter and Enforcement Actions Updates
     * Axonius 4.7
       * What's New in Axonius 4.7
       * What's New in Axonius 4.7.8
       * What's New in Axonius 4.7.7
       * What's New in Axonius 4.7.6
       * What's New in Axonius 4.7.5
       * What's New in Axonius 4.7.4
       * What's New in Axonius 4.7.1
       * What's New in Axonius 4.7.0 compared to 4.6.18
       * Axonius-4.7 Adapter and Enforcement Actions Updates
     * Axonius 4.6
       * What's New in Axonius 4.6
       * What's New in Axonius 4.6.18
       * What's New in Axonius 4.6.16
       * What's New in Axonius 4.6.15
       * What's New in Axonius 4.6.14
       * What's New in Axonius 4.6.13
       * What's New in Axonius 4.6.12
       * What's New in Axonius 4.6.17
       * What's New in Axonius 4.6.8
       * Axonius 4.6 Adapter and Enforcement Action Updates
       * Axonius-4.6 On-Going Adapter and Enforcement Actions Updates
     * Axonius 4.1-4.5
       * Axonius 4.5 Adapter and Enforcement Action Updates
       * Release Notes - Axonius 4.5
       * What's New in Axonius - Axonius 4.4
       * What's New in Axonius - Axonius 4.3
       * What's New in Axonius 4.1
     * Axonius 3.x Releases
       * What's New in Axonius 3.13
       * What's New in Axonius 3.12
       * What's New in Axonius 3.11
       * What's New in Axonius 3.10
       * What's New in Axonius 3.9
       * What's New in Axonius 3.8
       * What's New in Axonius 3.7
       * What's New in Axonius 3.6
       * What's New in Axonius 3.5
       * What's New in Axonius 3.4
       * What's New in Axonius 3.3
       * What's New in Axonius 3.2
       * What's New in Axonius 3.1
       * What's New in Axonius 3.0
     * Axonius 2.x Releases
       * What's New in Axonius 2.15
       * What's New in Axonius 2.14
       * What's New in Axonius 2.13
       * What's New in Axonius 2.12
       * What's New in Axonius 2.11
       * What's New in Axonius 2.10
       * What's New in Axonius 2.9
       * What's New in Axonius 2.8
       * What's New in Axonius 2.7
       * What's New in Axonius 2.6
       * What's New in Axonius 2.5
 * Use Cases
   * Use Cases
   * Finding Endpoints Missing Agents
   * Finding Endpoint Agents Not Functioning Correctly
   * Finding Devices Not Being Scanned For Vulnerabilities
   * Discovering Cloud Instances Not Being Scanned For Vulnerabilities
   * Finding Unmanaged Devices
   * Finding Rogue Devices On Privileged Networks
   * Accelerate Incident Response Investigations
   * CMDB Reconciliation & Maintenance
   * Find Ephemeral Devices
   * Find Unsanctioned Software
   * Compiling a User Inventory
   * Managing Windows & Linux Servers
   * Finding Obsolete Devices
   * Identifying and Prioritizing Vulnerabilities
   * Identifying Shadow SaaS Applications
   * Optimizing SaaS Spend
   * Identifying Misconfigured SaaS App Settings
   * Identifying Suspicious User Behavior
 * Axonius-as-a-Service Trials
   * Activating Your Axonius-hosted (SaaS) Trial
   * What's New in Axonius Version 6.0
 * Axonius API
   * Axonius REST API and Python API Client
   * Import/Export Dashboards and Queries via API



Powered by

--------------------------------------------------------------------------------



Adapters List
 * 29 Nov 2023
 * 81 Minutes to read

Share this



 * Print
 * Share
   Twitter
   Linkedin
   Facebook
   Email
 * Dark
   Light
 * PDF

Contents


ADAPTERS LIST

 * Updated on 29 Nov 2023
 * 81 Minutes to read

 * Print
 * Share
   Twitter
   Linkedin
   Facebook
   Email
 * Dark
   Light
 * PDF

--------------------------------------------------------------------------------

Article Summary



Share feedback

Thanks for sharing your feedback!

To aggregate and correlate asset data, Axonius securely fetches data from your
IT, Security, and business solutions using pre-built integrations with hundreds
of security and management solutions, known as adapters.

The table below describes each of the adapters supported. Use the Search box to
search for adapters, and to filter the display by 'Solution Categories' and
'Types of Assets Fetched'.

For details about connecting adapters, see the Adapters Page.









 

Adapter LogoAdapter NameDescriptionSolution CategoriesTypes of Assets Fetched1E
Tachyon1E Tachyon is a remote endpoint management solution built on a single
agent for speed, visibility, and control of all endpoints.UEM,
MDM/EMMDevices1Password1Password is a password manager providing a place for
users to store various passwords, software licenses, and other sensitive
information in a virtual vault.
Password Management
Users7SIGNAL Mobile Eye
7SIGNAL Mobile Eye is a Wi-Fi performance management and monitoring SaaS
application that helps enterprises optimize wireless device connectivity.
 Networking, Infra monitoring
DevicesA10
A10 provides load balancing for application deliverability, availability, and
security.
Cluster Management, NetworkingDevicesAbsoluteAbsolute specializes in software to
manage and secure Windows computers and Android smartphones.EDR/EPP,
MDM/EMMDevicesAcunetix
Acunetix is an automated web application security testing tool that checks for
vulnerabilities like SQL Injection, Cross-site scripting, and other exploitable
vulnerabilities.
AppSecDevices, UsersAdaptive ShieldAdaptive Shield is a security posture
management platform used to help businesses manage their cloud services.Cloud
Security, CloudUsersAddigy
Addigy is a real-time Apple mobile device management platform (MDM) that is
combined with live agent capabilities.
MDM/EMMDevices, UsersAdmin by Request

Admin By Request provides centralized and auditable management of local admin
rights.

PAMDevices, UsersAdobeAdobe offers digital content creation and publication
applications across 20+ areas including graphics, photography, illustration,
multimedia/video, and more.
Collaboration, SaaS Management
Users, SaaS Data
Adobe Acrobat Sign
Adobe Sign allows users to create, edit, collaborate, e-sign, and share PDFs, on
any device.
Collaboration
Users
Adobe Workfront
Adobe Workfront is work and project management software for enterprise resource
management, cross-team collaboration, and strategic planning.
CollaborationUsersADPADP is a provider of human resources management software
and services.HR, IAMUsers
ADP Vantage HCM
ADP Vantage HCM is an all-in-one HR platform that includes payroll, benefits,
and talent management administration.
HRUsersAha!
Aha! is a platform enabling customers to build roadmaps, manage projects and
development.
Collaboration, TicketingUsersAircall
Aircall is a cloud-based phone system.CollaborationUsersAirlock Digital
Airlock Digital is an application whitelisting software provider.EDR/EPP, Data
SecurityDevicesAirtable EnterpriseAirtable Enterprise is a spreadsheet-database
hybrid serving as a low-code platform for building collaborative
apps.CollaborationUsersAkamai EAA
Akamai Enterprise Application Access (EAA) is part of the edge platform that
helps companies secure applications that run behind a firewall or in a public
cloud.
Cloud SecurityDevices, UsersAkamai App and API Security
Akamai App and API Security provides protection against web application attacks
including SQL injections, cross-site scripting, and remote file inclusion.
AppSec, FirewallDevicesAKAssets
Akamai AKAssets provides data on users, components and applications.
ITAM/ITSMDevices, UsersAkeyless
Akeyless is a SaaS-based solution that provides secrets management and
zero-trust access.
Password ManagementUsersAKIPS
AKIPS is a secure on-prem, multi-vendor network-monitoring system for the
enterprise market.
Infra MonitoringDevicesAlcideAlcide provides cloud and Kubernetes discovery, K8s
audit and compliance scanner, microservices anomaly detection and security
policies management and enforcement.Cloud Security, CloudDevicesAlert LogicAlert
Logic provides vulnerability and asset visibility, endpoint protection, threat
detection, incident management, and a web application
firewall.EDR/EPPDevicesAlert Logic MDRAlert Logic delivers managed detection and
response (MDR) with comprehensive coverage for public clouds, SaaS, on-premises,
and hybrid environments.EDR/EPP, NDRDevicesAlgoSec Firewall Analyzer
AlgoSec Firewall Analyzer (AFA) is a device analysis solution that builds a
model of users' network security postures and Layer 3 connectivity.
NetworkingDevicesAlibaba CloudAlibaba Cloud provides cloud computing services
and cloud Infrastructure as a service.Cloud Infra, CloudDevices Amazon Web
Services (AWS)Amazon Web Services (ECS/EKS/EC2) includes the high-performance
container orchestration service that supports Docker containers and
containerized applications on AWS, Kubernetes Management Infrastructure across
Multiple AWS Zones, as well as the EC2 instances themselves.Cloud Infra,
CloudDevices, UsersApache CloudStackApache CloudStack is open-source software
used to deploy and manage large networks of virtual machines.Infra Monitoring,
VirtualizationDevicesApple Business Manager
Apple Business Manager supports deployment and remote MDM enrollment of
corporate-owned Apple devices.
MDM/EMM, RMMDevicesAppNeta
AppNeta provides monitoring of network paths, flows, packets, and web
applications.
Networking, RMMDevicesAqua SecurityAqua Security provides container and cloud
native cybersecurity for teams using Docker, Kubernetes, serverless, and other
cloud native technologies.Containers, CloudDevicesArista CloudVisionCloudVision
Portal (CVP) is the web-based GUI for the CloudVision platform, which enables
network-wide workload orchestration and workflow
automation.NetworkingDevicesArista Extensible Operating System (EOS)Arista
Extensible Operating System (EOS) is the core of Arista cloud networking
solutions for next-generation data centers and cloud
networks.NetworkingDevicesArmisArmis is an agentless IoT security solution that
lets enterprises see and control any device or network.IoT DevicesArubaAruba
connects to Aruba switches and routers.NetworkingDevicesAruba AirWaveAruba
AirWave is a network management system for wired and wireless infrastructure and
provides granular visibility into devices, users, and applications on the
network.NetworkingDevicesAruba CentralAruba Central is a unified cloud-based
network operations, assurance and security platform that simplifies the
deployment, management, and optimization of wireless, wired and WAN
environments.NetworkingDevicesAruba ClearPassAruba ClearPass is a network access
control (NAC) solution that allows enterprises to identify devices, enforce
policies, and remediate threats.NAC Devices
Aruba Mobility Master
Aruba Mobility Master enables deployment and management of up to 1,000 Mobility
Controllers to scale large deployments. Integrate Aruba Mobility Master with the
Axonius Cybersecurity Asset Management Platform.
NetworkingDevicesAsana
Asana is a web and mobile work management platform designed to help teams
organize, track, and manage their work.
Collaboration, SaaS Management
Users, SaaS data
Asimily Insight
Asimily provides a vulnerability management platform that scans for devices,
vulnerabilities and attack paths, and helps organizations prioritize and manage
risk for IoMT, IoT, and laboratory devices.
IoT
Devices
AssetPandaAssetPanda is a cloud-based asset tracking and management
platform.ITAM/ITSMDevices, UsersAssetSonar
AssetSonar maintains, tracks, and manages a single source of truth for the IT
asset landscape.
ITAM/ITSM
Devices
Assure1 by FederosFederos Assure1 is an automated service assurance platform for
operational intelligence. It collects and normalizes performance-related
information, allowing users to monitor and manage critical networks and
services.Infra MonitoringDevicesAteraAtera is a cloud-based remote monitoring
and management (RMM) platform for MSPs and IT professionals.ITAM/ITSM,
RMMDevicesAternityAternity is a device performance monitoring solution that
provides insights into performance and health of laptops, desktops, VDI, and
mobile devices, along with self-healing capabilities to automatically resolve
issues.ITAM/ITSM, Config Mgmt.DevicesAtlassian Jira Assets PlatformAtlassian
Jira Assets Platform links software with Jira to populate an asset inventory,
letting users query for assets and link them to
issues.ITAM/ITSMDevicesAttackIQAttackIQ is a breach and attack simulation that
allows for remote testing and continuous security validation.Attack Surface
MgmtDevices Jira Service Management
Jira Service Management (Service Desk) enables to receive, track, manage, and
resolve requests from customers.ITAM/ITSM, CMDB, TicketingDevices,
UsersAtlassian (Formerly Atlassian Jira Software)Atlassian Jira Software is a
work management tool for various use cases, from requirements and test case
management to agile software development.DevOps, SaaS ManagementUsers. SaaS
DataAttivo BOTSinkAttivo BOTSink offers network-based threat deception for
post-compromise threat detection.DeceptionDevicesAuth0
Auth0 provides authentication and authorization solutions for web, mobile, and
legacy applications.
IAMUserAutomoxAutomox is a cloud-based patch and configuration management
solution for Windows, Linux, Mac, and third-party software.Config Mgmt.Devices,
UsersAuvikAuvik is an IT asset and network monitoring solution for managing
entire network infrastructures, including physical servers, data centers,
workstations and more.NetworkingDevicesAviatrix
The Aviatrix cloud network platform delivers a single platform for multi-cloud
networking, security, and operational visibility.
Cloud Mgmt.DevicesAvi Networks
Avi Networks (now part of VMware) delivers multi-cloud application services used
for load balancing, web application firewall and container ingress.
Cloud Infra, Cloud Mgmt.DevicesAvigilon Alta (formerly Openpath)


Avigilon Alta (formerly Openpath) is a cloud-based physical access control
solution for unified video and access control.

IAMUsersAwake SecurityAwake Security is a network traffic analysis solution
that's capable of detecting and visualizing behavioral, mal-intent and
compliance incidents.NetworkingDevicesAxonius Network Discovery
Axonius-provided Axonius Network Discovery adapter, performing standardized
network discovery.
Network
Devices
Axonius UsersThe Axonius Users adapter fetches users with Axonius credentials
and their permissions using our API client.ITAM/ITSMUsersAzure Classic
VMsMicrosoft Azure is a cloud computing service created by Microsoft for
building, testing, deploying, and managing applications and services through a
global network of Microsoft-managed data centers. This adapter fetches
information for classic VMs (deprecated by Microsoft).Cloud Infra,
VirtualizationDevicesAzure Defender for IoTAzure Defender for IoT is a solution
for asset discovery, vulnerability management, and threat detection for Internet
of Things (IoT) and operational technology (OT) devices.OT/IoT DevicesAzure
DevOpsAzure DevOps is a Microsoft product that provides version control,
reporting, requirements management, project management, automated builds,
testing and release management capabilities.DevOpsUsersBackblazeBackblaze
provides cloud backup and storage services.
Cloud InfraDevices, UsersBackstageBackstage is an open platform for building
developer portals.
DevOps
DevicesBackup RadarBackup Radar is a backup monitoring, reporting, and
compliance solution.Infra MonitoringDevicesBambooHRBambooHR is HR software used
to collect, maintain, and analyze data for hiring, onboarding employees, and
managing company culture.HR, IAM, SaaS ManagementUsers, SaaS
databaramundibaramundi provides organizations with cross-platform management of
networked endpoints in IT and manufacturing environments.UEM,
MDM/EMMDevicesBarracuda CloudGen Access (Fyde)Barracuda CloudGen Access
(formerly Fyde) provides granular access for enterprise apps and workloads, and
continuously monitorsaccess requests to enforce policy controls.IAM Devices,
Users
Barracuda CloudGen Firewall
Barracuda CloudGen Firewall provides real-time network protection against a
broad range of network threats, vulnerabilities, and exploits.
NetworkingDevices, UsersBeyondTrust Cloud Privilege Manager
BeyondTrust Cloud Privilege Manager delivers privilege management and
application control, allowing organizations to eliminate admin rights across the
entire business and enforce least privilege.
PAM, Cloud SecurityDevices, UsersBeyondTrust Insight SQLBeyondTrust Insight SQL
provides discovery, management, auditing, and monitoring for any privileged
credential.PAMDevicesBeyondTrust Password SafeBeyondTrust Password Safe provides
discovery, management, auditing, and monitoring for any privileged
credential.PAM, IAMDevices, UsersBeyondTrust Privilege Management for
WindowsBeyondTrust Privilege Management for Windows delivers privilege
management and application control, allowing organizations to eliminate admin
rights across the entire business and enforce least privilege.PAM, IAMDevices,
UsersBeyondTrust Privileged Identity (Lieberman RED Identity
Management)BeyondTrust Privileged Identity (formerly Lieberman RED Identity
Management) is a password management solution that helps companies secure,
manage, and administer credentials for privileged users and IT vendors.PAM,
IAMUsersBeyondTrust Remote Support (Bomgar)BeyondTrust Remote Support (formerly
Bomgar) allows support technicians to remotely connect to end-user systems
through firewalls from their computer or mobile devices.IT Agent, Config
Mgmt.Devices
BigFix
BigFix provides remote control, patch management, software distribution,
operating system deployment, network access protection, and hardware and
software inventory functionality.
IT Agent, Config Mgmt.DevicesBigFix Compliance Analytics (formerly SCA)
BigFix Compliance Analytics (formerly SCA) is a web-based application designed
to help you manage security, vulnerability, and risk assessment.
Audit/Compliance, VA ToolDevicesBigIDBigID is data security solution that
provides enterprise protection and privacy of personal data.Data
SecurityDevicesBILLBILL is a leading provider of cloud-based software that
digitizes and automates back-office financial processes.License Mgmt, SaaS
MgmtUsers, SaaS data Bionic Bionic is an agentless platform that helps teams to
manage, operate and protect applications.AppSec,
DevOpsDevicesBinaryEdgeBinaryEdge scans the public internet to create real-time
threat intelligence streams and reporting.Cyber IntelligenceDevicesBishop
FoxBishop Fox performs offensive security, penetration testing, red teaming, and
attack surface management.Attack Surface MgmtDevicesBitbucketBitbucket is a
web-based version control repository hosting service for source code and
development projects that use either Mercurial or Git revision control
systems.DevOpsDevicesBitdefender GravityZone Business SecurityBitdefender
GravityZone Business Security uses machine learning and heuristics to protect
against malware, phishing, ransomware, exploits and
zero-days.EDR/EPPDevicesbitFitbitFit is a business development and information
technology company that collects all of your IT operations data and combines it
into a unified cloud system.ITAM/ITSMDevices, UsersBitSight Security
RatingsBitSight Security Ratings are a data-driven and dynamic measurement of an
organization’s cybersecurity performance.Cyber IntelligenceDevicesBlackBerry
Unified Endpoint Management (UEM)BlackBerry Unified Endpoint Management (UEM)
delivers endpoint management and policy control for devices and apps on-premise
or in the cloud.EDR/EPP, MDM/EMM, UEMDevicesBlack KiteBlack Kite provides cyber
risk assessments that analyze the organization’s supply chain cybersecurity
posture from three dimensions: technical, financial and compliance.Risk
ManagementDevicesBlock64 BlockBox

Block64 is an agentless, appliance-based asset management solution collecting
data about assets across the network and using that to provide actionable
insights.

ITAM/ITSMDevicesBloodHound
BloodHound is used to find relationships within an Active Directory (AD) domain
to discover attack paths.
Attack Surface Mgmt.Devices
BloxOne Threat Defense
BloxOne Threat Defense uses the cloud to detect threats while tightly
integrating with companies' on-premises ecosystem.
Cloud SecurityDevices, UsersBlueCat Enterprise DNSBlueCat Enterprise DNS
connects all disparate DNS and DHCP with centralized management of all clients
and critical assets.NetworkingDevicesBlueCoat ProxySG
Edge Secure Web Gateway (BlueCoat ProxySG) from Broadcom provides URL filtering,
central policy management, and security against malware attacks.
Secure Web GatewaysDevicesBMC Atrium ADDMBMC Atrium ADDM is a digital enterprise
management solution that automates application discovery and dependency
mapping.CMDB, ITAM/ITSMDevicesBMC Atrium CMDBBMC Atrium CMDB stores information
about the configuration items (CIs) in your IT environment and the relationships
between them.CMDB, ITAM/ITSMDevices
BMC Atrium CMDB onPrem
BMC Atrium CMDB stores information about the configuration items (CIs) in your
IT environment and the relationships between them.
CMDBDevices
BMC  Helix Client Management
BMC  Helix Client Management is an automated endpoint management solution to
inventory and track hardware and software endpoints; manage software licensing,
patching, and event management; and remotely manage users' devices for updates
or troubleshooting.
IT Agent, MDM/EMM, RMM
Devices, Users
BMC TrueSight Automation for ServersTrueSight Automation for Servers automates
vulnerability management, patching, compliance, configuration changes, software
deployments, and service provisioning in the data center and cloud.Config
Mgmt.DevicesBMC TrueSight Presentation ServerBMC TrueSight Presentation Server
consumes data from various BMC TrueSight products to provide a consolidated set
of views for monitoring the infrastructure, real and synthetic applications, and
capacity planning.DevOpsDevicesBOSSDeskBOSSDesk is an IT Service Management and
Help Desk Software for both On-Premise and in the Cloud.ITAM/ITSMDevicesBox
PlatformBox Platform provides data security, file sharing, collaborating, and
content management tools. Box Platform provides access to Box APIs.Data
Security, SaaS ManagementUsers, SaaS DataBricata
Bricata is a network detection and response platform.
NDRDevicesBrivo
Brivo is a cloud-based access control solution that helps protect building,
employees, visitors, customers, residents and data.
IAM
Devices
Buildkite
Buildkite is a continuous integration tool designed to improve software
developer productivity.
Software Development Version Control
Devices, UsersBurp SuiteBurp Suite is a penetration testing and vulnerability
finder tool often used for checking web application security.Vulnerability
Assessment ToolDevicesCA Service ManagementCA Service Management is an IT
service management (ITSM) solution that offers incident management and IT asset
managementITAM/ITSM, CMDBDevicesCA SpectrumCA Spectrum is a services and network
infrastructure management system that enables the modeling of LAN, WAN, wired,
wireless, physical, and virtual networksNetworkingDevicesCato NetworksCato SASE
is a cloud-native secure access service edge built on a full mesh topology, with
over 65 global PoPs, and replaces the need for enterprises to route using
MPLS.Firewall, Networking, Secure Web GatewaysDevices, UsersCDWCDW is a
multi-brand technology solutions provider
License mgmt
SaaS DataCensysCensys monitors infrastructure and discovers unknown assets
across the Internet.IoT DevicesCentrify Identity ServicesCentrify Identity
Services manages application access, endpoints, and network
infrastructure.IAMUsersCeridian DayforceCeridian Dayforce is an HR cloud
platform that delivers payroll, benefits, workforce, and talent
management.HRUsersCerteroCertero is an IT hardware, software, SaaS, and cloud
asset management solution.ITAM/ITSMDevicesCFEngineCFEngine is a software
development automated workflow solution.CollaborationDevicesChangeGearChangeGear
is an AI-powered IT service management platform.HRDevicesCheck Point
CloudGuardCheck Point CloudGuard automates governance across multi-cloud assets
and services including security posture assessment, misconfiguration detection,
and enforcement of security best practices and compliance frameworks.Cloud
Infra, IAMDevices, UsersCheck Point Harmony Endpoint
Check Point Harmony Endpoint is a suite of endpoint protection products that
include mobile, email, collaboration, and SASE security.
Attack Surface Mgmt., Email Security, NetworkingDevices
Check Point Harmony Mobile
Check Point Harmony Mobile uses file protection capabilities to block the
download of malicious files to mobile devices and prevent file-based
cyberattacks on organizations.
EDR/EPP
Devices
Check Point InfinityCheck Point Infinity protects against cyber threats across
networks, endpoint, cloud and mobile devices. This adapter supports the entire
Infinity platform, including Check Point firewalls.EDR/EPP,
Firewall DevicesCheckmarx SAST (CxSAST)Checkmarx SAST (CxSAST) is a static
application security testing solution used to identify security vulnerabilities
in custom code. It is used by development, DevOps, and security teams to scan
source code early in the SDLC, identify vulnerabilities, and provide actionable
insights to remediate them.AppSec, DevOpsDevicesCheckmk
Checkmk provides powerful monitoring of networks, servers, clouds, containers,
and applications.
Containers, Infra Monitoring, RMMDevices, UsersChefChef provides continuous
automation for building, deploying, and managing infrastructure, compliance, and
applications in legacy and hybrid environments.Config Mgmt.Devices,
UsersCherwell IT Service ManagementCherwell IT Service Management is a service
desk platform enabling automation for process workflows, supporting tasks, and
related approvals.ITAM/ITSMDevicesCherwell IT Service Management
DatabaseCherwell IT Service Management Database is a service desk platform
enabling automation for process workflows, supporting tasks, and related
approvals.ITAM/ITSMDevicesCipherTrust Manager
Thales CipherTrust Manager is a key management solution for the CipherTrust Data
Security Platform.EncryptionDevicesCIS CAT Pro
CIS CAT Pro is a tool for automating CIS Benchmark testing and reporting.
Risk ManagementDevicesCiscoCisco connects to Cisco switches and
routers.NetworkingDevicesCisco Advanced Malware Protection (AMP)Cisco Advanced
Malware Protection (AMP) includes threat intelligence, sandboxing, and malware
blocking to detect, contain, and remove malware.EDR/EPPDevicesCisco
AppDynamicsCisco AppDynamics is an application performance monitoring
tool.AppSecDevices, UsersCisco Application Policy Infrastructure Controller
(APIC)Cisco Application Policy Infrastructure Controller (APIC) is the main
architectural component of Cisco ACI. It is the unified point of automation and
management for the Cisco ACI fabric, policy enforcement, and health monitoring
and optimizes performance and agility.NetworkingDevicesCisco CX  Cloud
CX Cloud combines Cisco technology with AI/ML-driven insights, use cases, and
contextual learning.
Cyber intelligence
Devices
Cisco DCNM
 Cisco Data Center Network Manager (DCNM) is a network management solution for
next generation data centers.
Storage mgmt
DevicesCisco DNA CenterCisco DNA Center is a software-based network automation
and assurance solution.NetworkingDevicesCisco Firepower Management CenterCisco
Firepower Management Center provides management over firewalls, application
control, intrusion prevention, URL filtering, and advanced malware
protection.NetworkingDevicesCisco Identity Services Engine (ISE)Cisco Identity
Services Engine (ISE) is a network administration product that enables the
creation and enforcement of security and access policies for endpoint devices
connected to the company’s routers and switches.IAMDevicesCisco Industrial
Network Director (IND)Cisco Industrial Network Director (IND) enables deployment
and monitoring of Cisco Industrial Ethernet switches in industrial
networks.Networking, OTDevices, UsersCisco Intersight
Cisco Intersight is a cloud operations platform that consists of optional,
modular capabilities of infrastructure, workload optimization, and Kubernetes
services.
Cloud Infra, Cluster ManagementDevicesCisco MerakiCisco Meraki solutions include
wireless, switching, security, EMM, communications, and security cameras, all
centrally managed from the web.NetworkingDevicesCisco PrimeCisco Prime offers a
suite of tools to automate the management of wired and wireless Cisco
networks.NetworkingDevicesCisco Secure Workload (formerly Tetration)Cisco Secure
Workload (formerly Tetration) is a micro-segmentation platform that offers zero
trust-based workload protection for multi cloud data centers.
IAM Devices
Cisco Security ManagerCisco Security Manager provides policy enforcement and
rapid troubleshooting of security events, offering summarized reports across the
security deployment.NetworkingDevicesCisco StealthwatchCisco Stealthwatch is an
agentless malware detection solution that provides visibility and network
traffic security analytics across the extended network, including endpoints,
branch, data center, and cloud.NetworkingDevicesCisco Smart Net Total Care
(SNTC)Cisco Smart Net Total Care is a smart services assistant providing
hardware, web, and mobile support to enable efficient
operations.NetworkingDevices
Cisco UCS Central (UCS)
Cisco Unified Computing System (UCS) is a data center server computer product
line that brings together compute, networking, and storage, all in a single
system to power applications.
Storage ManagementDevicesCisco UCS ManagerCisco UCS Manager supports the entire
Cisco UCS server and Cisco HyperFlex Series hyperconverged infrastructure
portfolios. It enables server, fabric, and storage provisioning, as well as
device discovery, inventory, configuration, diagnostics, monitoring, fault
detection, auditing, and statistics collection.NetworkingDevicesCisco
UmbrellaCisco Umbrella is a secure internet gateway in the cloud, including DNS
and IP layer enforcement and command and control callback
blocking.NetworkingDevices, Users
Cisco Unified Communications ManagerCisco Unified Communications Manager
provides secure and manageable call control and session
management.IoT DevicesCisco WebexCisco Webex is an enterprise solution for video
conferencing, online meetings, screen share, and webinars. Web conferencing,
cloud calling and equipment.Remote ConferencingDevices, UsersCitrix ADCCitrix
ADC is an application delivery and load balancing solution for monolithic and
microservices-based applications.Networking, DevOpsDevicesCitrix DaaS
Citrix DaaS (device as a service) is a cloud-based solution that allows
companies to securely deliver DaaS and VDI apps and desktops to any device, over
any network.
VirtualizationDevicesCitrix DirectorCitrix Director is a web-based monitoring
console for Citrix XenApp and XenDesktop virtualization platforms that allows
administrators to control and monitor virtual applications and
desktops.Virtualization, ITAM/ITSM, Cloud, DevOps, Devices, UsersCitrix Endpoint
Management (XenMobile)Citrix Endpoint Management (formerly XenMobile) is a
solution for managing endpoints, offering mobile device management (MDM) and
mobile application management (MAM) capabilities.UEM, MDM/EMMDevicesCitrix
ShareFile

ShareFile is a secure content collaboration, file sharing, and sync software.

CollaborationUsersClarotyClaroty discovers assets and monitors communication
patterns for ICS networks.OT DevicesCloudCheckr
CloudCheckr is multi-cloud optimization and resource management software that
includes cost management, security and compliance management, and resource
utilization.
Cloud Mgmt.DevicesCloudHealthCloudHealth is a cloud management platform to
analyze and manage cloud cost, usage, security, and governance.Cloud Infra,
CloudDevicesCloudfit CFSCloudFit CFS delivers managed, custom applications for
cloud, hybrid, and on-premise environments.Cloud Infra, CloudDevicesCloudflare
DNSCloudflare DNS runs one of the largest DNS networks in the
world.NetworkingDevices, Users
CloudFlare Zero Trust
Deliver Zero Trust Network Access on CloudFlare's Edge.
Secure Web GatewaysDevices, UsersCloudPassage HaloCloudPassage Halo is a
security automation platform providing visibility, protection, and continuous
compliance monitoring for AWS and Azure deployments.Cloud Infra,
CloudDevicesCoalfireOneCoalfireOne provides year-round visibility and proactive
management of your compliance program.Risk Mgmt.DevicesCode42 Incyder
Code42 Incyder (formerly Code42) is a next-gen DLP solution used to detect
insider threats, satisfy regulatory compliance, and accelerate incident response
investigations.
DLP, Data SecurityDevices, UsersCofense PhishMeCofense PhishMe provides phishing
awareness training and threat simulations for employees.Security Awareness, GRC,
Email SecurityUsersCohesityCohesity is a cloud data platform that provides a
comprehensive range of data management services.Cloud
Mgmt.DevicesCollibraCollibra is a data catalog platform and tool that helps
organizations better understand and manage their data assets.
Audit/ComplianceDevices, UsersCom LaudeCom Laude is a domain name registrar,
providing domain name management services.
License ManagementDevices, UsersCommvaultCommvault enables data protection,
backup and recovery, and information management solutions.Data SecurityDevices,
Users ConfluentConfluent is a data streaming platform that enables you to easily
access, store, and manage data as continuous, real-time streams.Data Security,
Storage ManagementDevices, UsersConnectSecure

ConnectSecure provides managed service providers (MSPs) a vulnerability scanning
and compliance management tool for their SMB clients.

VA ToolDevicesConnectWise Automate

ConnectWise Automate monitors, manages, and supports client networks. using
out-of-the-box scripts, continuous monitoring, and automation capabilities.

RMM, Config/Patch MgmtDevicesContrast SecurityContrast Security protects
software applications against cyberattacks.AppSec, DevOpsDevicesCradlepoint
Cradlepoint develops cloud-managed wireless edge networking equipment.
NetworkingDevicesCrashPlan
CrashPlan provides backup and recovery, ransomware recovery, and device
migration services for small businesses and enterprises.
Data SecurityDevices, UsersCribl
Cribl is a vendor-agnostic observability pipeline used to collect, reduce,
enrich, normalize, and route data.
Infra MonitoringDevices, UsersCrowdStrike FalconCrowdStrike Falcon delivers
next-generation antivirus, endpoint detection and response (EDR), managed threat
hunting, and threat intelligence.EDR/EPP, SaaS Management
Devices, Users, SaaS data
CrowdStrike Falcon Discover
CrowdStrike Falcon Discover is a network security monitoring tool that provides
real-time visibility into devices, users, and applications.
Networking
Devices
CrowdStrike Kubernetes Protection
CrowdStrike Kubernetes Protection provides cloud-native application security,
including breach prevention, workload protection, and cloud security posture
management.
Cloud Security
Devices
CrowdStrike Falcon Identity Protection (formerly Preempt)CrowdStrike Falcon
Identity Protection (formerly Preempt)  lets organizations reduce user risk on
their attack surface and preempt threats in real-time with Conditional Access.
It continuously analyzes, adapts and responds to threats based on identity,
behavior, and risk to resolve insider threats and targeted attacks.IAMDevices,
UsersCrowdStrike Falcon SpotlightCrowdStrike Falcon Spotlight is a real-time,
scanless vulnerability management solution.
VA ToolDevicesCrestron XiO Cloud
Crestron XiO Cloud is a technology operations management platform that allows
users to configure and manage all Crestron device from one central location.
CollabertationDevicesCSCDomainManagerCSCDomainManager is a web-based portfolio
management platform consolidating domains alongside social media usernames, SSL
digital certificates, and DNS.NetworkingDevicesCSI Leasing

The CSI Adapter tracks hardware contract expiration details.

License Mgmt.
DevicesCSVThe CSV adapter imports .csv files with inventory information
including: devices and serial numbers, users, and installed software data.CMDB,
ITAM/ITSMDevices, Users
CSV - Applications
The CSV - Applications adapter imports SaaS Vendor information from a CSV file.
SaaS ManagementSaaS Data
CSV - DNS Records
The DNS CSV adapter enables the discovery of SaaS applications based on the
organizations web browsing records.
SaaS Management
SaaS Data

CSV - Expenses
CSV - Expenses File Adapter imports information about transactions related to
SaaS from a CSV file.
SaaS ManagementSaaS Data

CSV-LicensesCSV - Licenses adapter imports information about SaaS licenses from
a CSV file.
 SaaS Management

SaaS Data
CTL CiderCTL Cider is a DevOps focused application that provides information
regarding node health, resources, and availability.DevOpsDevicesCyberArk
AleroCyberArk Alero secures remote access to critical systems for employees and
third-party vendors.PAMDevices, UsersCyberArk Endpoint Privilege ManagerCyberArk
Endpoint Privilege Manager enforces least privilege, providing credential theft
protection and application control at scale.PAM, IAMDevicesCyberArk
IdaptiveIdaptive Identity Management Platform is an identity and access
management solution that unifies identity and access management
services.IAMDevices, UsersCyberArk Privileged Account SecurityCyberArk
Privileged Account Security provides privileged password management, session
recording, least privilege enforcement, and privileged data analytics.PAM,
IAMUsersCybereason Deep Detect & RespondCybereason Deep Detect & Respond (EDR)
defends against advanced attacks by collecting and analyzing behavioral data to
identify suspicious activities.EDR/EPPDevicesCyberhaven
Cyberhaven provides a data detection and response (DDR) solution, based on big
data graph analytics of all user interactions with data over time and across the
enterprise.
Data SecurityDevicesCyberint Argos EdgeCyberint Argos Edge is an attack surface
management solution providing findings into the external attack surface,
phishing threats, brand impersonation, and more.Attack Surface Mgmt, Cyber
IntelligenceDevicesCyCognito PlatformThe CyCognito platform delivers proactive
attack surface protection and digital risk protection across your entire
extended IT ecosystem to help you identify, categorize, prioritize and eliminate
your attacker-exposed risk.Cyber IntelligenceDevicesCylancePROTECTCylancePROTECT
uses artificial intelligence to detect and protect against ransomware, advanced
threats, fileless malware, and malicious documents.EDR/EPPDevicesCymulate

Cymulate is a breach and attack simulation (BAS) platform that helps companies
optimize security posture by testing internal and external defenses.

Cyber Intelligence, Attack Surface ManagementDevicesCynet 360Cynet 360 is a
detection and response security platform for finding, ranking, and remediating
unknown, camouflaged threats.EDR/EPPDevicesDarktraceDarktrace Immune System
protects workforce and data from sophisticated attackers, by detecting,
investigating and responding to cyber-threats.Cyber Intelligence,
EDR/EPPDevicesDatabricks
Databricks combines data warehouses & data lakes into a lakehouse architecture
that handles  data, analytics, and AI use cases.
Cloud Infra, Networking
Devices
DatadogDatadog is a monitoring service for cloud-scale applications, providing
monitoring of servers, databases, tools, and services.Cloud Mgmt., CloudDevices,
Users
Datto RMM (Autotask Endpoint Management)Datto RMM (formerly Autotask Endpoint
Management) is a cloud-based Remote Monitoring and Management (RMM) platform
that provides device auditing, real-time monitoring, and automatic
patching.EDR/EPP, Config/Patch Mgmt., RMMDevicesDeep Instinct
Deep Instinct is an anti-ransomware and anti-malware solution that leverages
deep learning to help prevent malware from executing inside organizations'
environments.
Cyber intelligence
DevicesDefenseStorm
DefenseStorm provides CyberSecurity, CyberCompliance and CyberFraud solutions
specifically built for banking.
NDR, Risk ManagementDevicesDell BoomiDell Boomi’s iPaaS platform enables
businesses to discover, manage, and orchestrate data while connecting
applications, processes, and people.
Cloud InfraDevices
Dell ECS
Dell ECS (Elastic Cloud Storage) is a software-defined object storage platform
that provides organizations with an on-premise alternative to public cloud
solutions.
Storage Management
Devices, UsersDell EMC AvamarDell EMC Avamar is a backup and recovery solution
that enables daily backups of physical and virtual environments, NAS servers,
enterprise applications, remote offices and desktops/laptops.DLP, Data
SecurityDevicesDell iDRAC

The Integrated Dell Remote Access Controller (iDRAC) is designed for secure
local and remote server management and helps IT administrators deploy, update
and monitor Dell EMC PowerEdge servers.

RMM, ITAM/ITSMDevicesDell OpenManage EnterpriseDell OpenManage Enterprise is a
one-to-many systems management console. It facilitates lifecycle management for
Dell EMC PowerEdge servers in one console.Infra Monitoring, ITAM/ITSMDevicesDell
PowerProtect DD Management Center


Dell PowerProtect Data Domain Management Center is a centralized storage
management solution that provides aggregate capacity, replication and
performance management, and reporting.

Storage Management
Devices
Dell PowerScale OneFS 
Dell PowerScale OneFS is a scale-out network attached storage (NAS) platform
that addresses unstructured data needs at the edge, the core, or the cloud.
Storage Management
Devices
Dell PowerStoreDell PowerStore is a flexible, scalable data storage appliance
designed for data-centric infrastructures.Storage Management
Devices, UsersDell RecoverPointDell RecoverPoint is a data protection and
disaster recovery solution.Storage Management
DevicesDell Unisphere For Unity
Dell Unisphere enables Dell EMC Unity customers to manage storage systems.
Storage Management
Devices
Dell VPLEXDell VPLEX delivers continuous data availability, transparent data
mobility, and nondisruptive data migration for mission-critical
applications.Storage ManagementDevicesDell WYSE ManagementDell Wyse Management
Suite is a cloud solution that enables an IT admin to securely manage Dell
client devices.UEM, RMMDevicesDevoDevo is a cloud-native logging and security
analytics solution that delivers real-time visibility for security and
operations teams.SIEMDevices, UsersDevice42Device42 is a cloud-based CMDB for
physical, virtual, and cloud servers and containers, network components,
software, services, applications, and their relationships and dependencies.CMDB,
ITAM/ITSMDevicesDigiCert CertCentralDigiCert CertCentral consolidates tasks for
issuing, installing, inspecting, remediating, and renewing
certificates.Certificate Mgmt. DevicesDigiCert PKI Platform (Symantec Managed
PKI)DigiCert PKI Platform (formerly Symantec Managed PKI) provides a cloud-based
enterprise solution for issuing and managing digital certificates used to enable
strong authentication and encryption.Certificate Mgmt. DevicesDigital Guardian
DLP
Digital Guardian DLP is a SaaS-based platform that provides data-loss prevention
across Windows, Mac, and Linux systems and applications.
DLPDevicesDigitalOceanDigitalOcean is a cloud hosting provider that offers cloud
computing services and Infrastructure-as-a-Service (IaaS).
Cloud InfraDevices
Digital Shadows SearchLightDigital Shadows SearchLight is a digital risk
protection solution that protects organizations against external risk
exposure.Cyber IntelligenceDevicesDivvyCloudDivvyCloud offers security,
compliance, and governance guardrails for public and private cloud
infrastructures.Cloud Mgmt., CloudDevicesDNS Made EasyDNS Made Easy offers DNS
management services.NetworkingDevicesDockerDocker is a platform designed to help
developers build, share, and run container applications.
ContainersDevices, UsersDocuSignDocuSign helps organizations connect and
automate how they prepare, sign, act on and manage agreements.AppSec,
Collaboration, SaaS Management
Users, SaaS data
DOJ CSAM
DOJ’s proprietary Cyber Security Assessment and Management (CSAM) automates
assessments and authorizations to provide a comprehensive assessment and
continuous monitoring service.
Risk Management
Devices
DomotzDomotz is network monitoring software.NetworkingDevicesDragos PlatformThe
Dragos Platform identifies ICS network assets, malicious activity, and provides
guidance to investigate incidents.OT, Network SecurityDevicesDropboxDropbox is a
file hosting service that offers cloud storage, file synchronization, personal
cloud, and client software.Cloud Mgmt., CloudDevices, Users
Druva Cloud PlatformDruva Cloud Platform is a data protection as-a-service that
provides management across all customer data sources that are scalable,
predictable and on-demand.DLP, Data SecurityDevices, UsersDuo BeyondDuo Beyond
identifies corporate vs. personal devices, blocks untrusted devices, and give
users secure access to internal applications.IAMUsersDynamics CMDB
(HelpDesk)HelpDesk integrated with Microsoft Dynamics provides a complete
ticketing solution.TicketingDevicesDynatraceDynatrace is a software intelligence
platform providing application performance management and cloud infrastructure
monitoring.Cloud Mgmt., CloudDevices, UsersEagle Eye NetworksEagle Eye Networks
provides cloud-based video surveillance products for physical security and
business operations applications.Security AwarenessDevicesEasyvista Service
Manager
EasyVista is an ITSM (IT Service Management) solution including change, release,
incident, problem, and knowledge management.
ITAM/ITSM
Devices
ECI FMAudit
ECI FMAudit is print management software that allows users to remotely monitor
print environments and maintain visibility into their operations.
RMMDevicesEclypsiumEclypsium protects the foundation of the computing
infrastructure, controlling risks and stopping threats to enterprise firmware
and hardware devices.Firmware Security Devicesedgescanedgescan Fullstack
Vulnerability Management is a cloud-based continuous vulnerability management
and penetration testing solution that discovers, validates and rates
vulnerabilities by running continuous asset profiling to detect rogue/exposed
ports, hosts or even hidden API’s.VA ToolDevicesEfficientIP SOLIDserver DDI
EfficientIP SOLIDserver DDI suite is designed to deliver virtual and hardware
appliances for critical DNS-DHCP-IPAM services.NetworkingDevicesEkranEkran
System is a cybersecurity software vendor delivering a full-cycle insider risk
management platform.
PAM, Audit/ComplianceUsersElastic DefendElastic Defend (formerly Endgame) is a
tool for malware prevention, detection, and response.
EDR/EPP, IT AgentDevicesElasticsearchThe Elasticsearch adapter imports device
information from an Elasticsearch database.CMDB, ITAM/ITSMDeviceseMASSeMASS is a
federal system designed to help maintain information assurance situational
awareness, manage risk, and comply with federal regulations.Risk
ManagementDevices, UsersEndgameEndgame is an endpoint protection platform that
combines on-line and off-line protection against exploits, phishing, malware,
ransomware, and fileless attacks.EDR/EPPDevicesEntrustEntrust provides identity,
payment, and data security solutions.Certificate Management,
Audit/ComplianceDevicesEquinix
Equinix provides digital infrastructure and data center services.
NetworkingUsersEracent
Eracent provides IT asset management and software asset management solutions to
help customers inventory assets and optimize licensing costs.
ITAM/ITSMDevicesErmeticErmetic is a cloud infrastructure security platform,
focusing on identity protection.Cloud SecurityDevicesESET Endpoint SecurityESET
Endpoint Security is an anti-malware suite for Windows including web filtering,
firewall, USB drive and botnet protection.EDR/EPPDeviceseyeInspectForeScout
eyeInspect is a compliance and threat analysis tool for ICS and OT environments.
OT, Audit/ComplianceDevicesExabeamExabeam is a cloud-based platform combining
SIEM, threat detection, investigation, and response (TDIR) and XDR capabilities.
Integrate Exabeam with the Axonius Cybersecurity Asset Management
Platform.SIEMDevicesExabeam Data Lake
Exabeam Data Lake (previously known as Exabeam Log Manager) is a cloud-native
data lake architecture to securely ingest, parse, and store security data at
scale from any location, across multi-year data.
SIEMDevicesExtraHop Reveal(x)ExtraHop Reveal(x) is a network detection and
response (NDR) solution that provides visibility, real-time threat detection,
and response.NDR DevicesExtraHop Reveal(x) 360ExtraHop Reveal(x) 360 is a
SaaS-based network detection and response (NDR) platform that provides unified
security across on-premises and cloud environments.NDR, Networking, Cloud Infra,
Cloud Security, IAMDevices
ExtremeCloud IQ
ExtremeCloud IQ enables management of wireless access points, switches, and
routers.
NDRDevicesExtreme Networks ExtremeControlExtreme Networks ExtremeControl is a
Network Access Control (NAC) solution that provides role-based access controls
and reporting on user activity across all devices.NAC DevicesExtreme Networks
ExtremeWireless WiNGExtreme Networks ExtremeWireless WiNG in a WLAN operating
system designed to scale efficiently from the smallest networks to large,
geographically dispersed deployments.NetworkingDevicesEzOfficeInventory

 EZOfficeinventory is a cloud-based asset tracking platform used for tracking
physical and digital assets.

ITAM/ITSMDevices, UsersF-Secure Policy Manager
F-Secure Policy Manager provides a centralized management console for the
security of the managed hosts in the network.UEM, MDM/EMMDevicesF-Secure
Protection Service for Business (PSB)F-Secure Protection Service for Business
(PSB) is a central management portal for managing VPN, mobile device management,
software update management, workstation, and server security.UEM,
MDM/EMM DevicesF5 BIG-IP iControlF5 iControl is a Web services-enabled open API
providing granular control over the configuration and management of F5's
application delivery platform, BIG-IP.NetworkingDevicesF5 BIG-IQ Centralized
ManagementF5 BIG-IQ Centralized Management provides centralized management,
licensing, monitoring, and analytics for BIG-IP infrastructure.Infra Monitoring,
ITAM/ITSMDevicesFireEye Endpoint Security (formerly HX)FireEye Endpoint Security
(formerly HX) detects and protects against unknown endpoint threats and exploits
with integrated threat intelligence.EDR/EPPDevicesFireEye Endpoint Security
Logon TrackerFireEye Endpoint Security Logon Tracker enables the investigation
of lateral movement within Windows enterprise environments.Infra
MonitoringDevicesFireMon Security ManagerFireMon Security Manager is a network
security solution that provides real-time visibility, control, and management
for network security devices across hybrid cloud environments.Networking, Cloud
SecurityDevices
FleetDM
FleetDM Fleet (formerly Kolide Fleet) is an is an open-source query manager for
device management.
EDR/EPPDevicesFlexera IT Asset ManagementFlexera lets enterprises gain
visibility and control of IT assets, reduce ongoing software costs, and maintain
continuous license compliance.ITAM/ITSMDevices


Flexera Software Vulnerability Research

Flexera Software Vulnerability Research provides access to verified intelligence
from Secunia Research.
Cyber IntelligenceDevicesFlexera SVMFlexera Security Vulnerability Manager (SVM)
is a vulnerability assessment, patch management, and vulnerability intelligence
platform.
VA ToolDevicesFlexNet Manager Suite CloudFlexNet Manager Suite Cloud from
Flexera is a SaaS offering for software license compliance and license
optimization.License Mgmt. Devices, SaaS dataForcepoint Insider ThreatForcepoint
Insider Threat is a security analytics tool for searching, detecting and
mitigating malicious actors or insider threats.UEBAUsersForcepoint ONEForcepoint
ONE provides data protection that monitors real-time traffic and prevents data
loss.Cloud Security, DLP, Secure Web GatewaysDevicesForcepoint Web Security
Endpoint CSV FileForcepoint Web Security Endpoint CSV File imports CSV files
with device information.IAM, Config Mgmt.Devices
Forcepoint ZTNA Private Access
Forcepoint ZTNA Private Access (formerly Forcepoint Web Security Endpoint)
enables end-users to authenticate and receive policy enforcement via the
Forcepoint Web Security Cloud infrastructure.
IAM, Config Mgmt.
DevicesForemanForeman is a free open source project that automates repetitive
tasks, quickly deploys applications, and proactively manages server lifecyle,
on-premises or in the cloud.Config Mgmt.DevicesForeScout CounterACTForeScout
CounterACT platform provides insight into network-connected
devices.NAC DevicesForescout Switch PluginForescout Switch Plugin is a component
of the ForeScout CounterACT Network Module and provides switch to endpoint
information as well as VLAN and ACL management capabilities.
NAC, NetworkingDevicesForgeRockForgeRock Directory Services is a
high-performance identity store that provides the necessary encryption to
protect enterprise data at rest and encryption.DirectoryDevices, Users
FortiClient EMS
FortiClient Enterprise Management Server (FortiClient EMS) is a security
management solution that enables scalable and centralized management of multiple
endpoints.
EDR/EPP
DevicesFortifyData
FortifyData is a threat exposure management platform for identifying,
monitoring, and managing cyber risk.
Risk ManagementDevicesFortiEDR (enSilo)FortiEDR (formerly enSilo) automates and
orchestrates detection, prevention, and response against malware and
ransomware.EDR/EPPDevicesFortify Software Security CenterFortify Software
Security Center offers security assurance solutions that address the threats
posed by security flaws in business-critical software apps.AppSec,
DevOpsDevicesFortiNAC
FortiNAC is a network access control solution that provides protection against
IoT threats, control of third-party devices, and automated responses to
networking events.
NACDevices
Fortinet FortiGate
Fortinet FortiGate is a next-generation firewall providing security and
visibility for end-to-end protection across the entire enterprise network.
FirewallDevicesFortiPortalFortiPortal is a cloud-based security policy, wireless
management, and analytics for MSSPs, enterprises, education and government
customers.Networking, Remote Monitoring and ManagementDevicesForward
NetworksForward Networks is revolutionizing the way large networks are managed.
Forward's advanced software delivers a digital twin of the network, enabling
network operators to ensure that the network is secure, reliable, and agile. The
platform supports devices from all major networking vendors and cloud operators,
including AWS, Azure, and Google Cloud Platform.
Networking, Infra MonitoringDevicesFreeIPAFreeIPA is a free and open source
identity management system for Linux environments.IAMDevices,
UsersFreshserviceFreshservice is a cloud-based IT help desk and service
management solution that enables organizations to simplify their IT
operations.ITAM/ITSM, SaaS ManagementDevices, Users, SaaS dataFrontline
VMFrontline VM, a frontline cloud system, is a vulnerability management
application that performs comprehensive security assessments and helps
prioritize and track the results, making remediation more efficient and
effective.VA ToolDevicesGenian
Genian NAC identifies and monitors all hardware and software in the network
environment to determine each device’s security state then establish the
appropriate level of access to ensure compliance.
NACDevicesGigamon GigaVUE-FM (Fabric Manager)Gigamon GigaVUE-FM (Fabric Manager)
delivers management and monitoring of all physical and virtual nodes across your
on-premises, virtual and public-cloud deployments.NetworkingDevicesGigamon
ThreatINSIGHTGigamon ThreatINSIGHT is a cloud-native network detection and
response (NDR) platform that provides threat activity detection and the data and
context needed for cybersecurity response and investigation.MDR, Cyber
IntelligenceDevicesGitHubGitHub provides hosting for software development
version control using Git, including distributed version control and source code
management (SCM) functionality.Software Development Version Control, DevOps,
SaaS ManagementUsers, SaaS dataGitLabGitLab is an open-source DevOps lifecycle
tool that provides a wiki, issue-tracking, and continuous integration and
deployment pipeline features.DevOpsDevices, UsersGlobal Sign Atlas
GlobalSign Atlas offers cloud certificate management and automation.
Certificate Mgmt
Devices

GLPIGLPI is an open-source service management software tool to manage Helpdesk
and IT assets.

Devices, Users
Gluware 
Gluware offers a cloud-based network orchestration platform that helps automate
and orchestrate large multi-vendor, mission-critical networks.
Networking
Devices
GoDaddy
GoDaddy is a domain registrar that also offers additional services such as
website building and management, website and email hosting, SSL security, and
more.
NetworkingDevicesGong
Gong is a customer data management platform that automatically captures and
updates data from integrated tools, allowing for consolidated visibility into
all customer interactions, across all stages of the relationship.
CRM, SaaS Management
Users, SaaS data
Google BigQueryBigQuery is a serverless, highly-scalable, and cost-effective
cloud data warehouse with an in-memory BI Engine and machine learning built in.
CMDBDevicesGoogle Chronicle SecurityGoogle Chronicle Security is designed for
enterprises to privately retain, analyze, and search security and network
telemetry.Cloud SecurityDevicesGoogle Cloud Platform (GCP)Google Cloud Platform
(GCP) is a suite of cloud computing services. Alongside a set of management
tools, it provides a series of modular cloud services including computing, data
storage, data analytics and machine learning.Cloud Infra, Cloud, Virtualization,
ITAM/ITSM, ContainersDevices, UsersGoogle Sheets
Google Sheets is a spreadsheet application included as part of the free,
web-based Google Docs Editors suite offered by Google.
Collaboration
Devices, Users
Google Workspace (G Suite)Google Workspace (formerly G Suite) is a collection of
cloud computing, productivity, collaboration, device, user, and data management
tools developed by Google.MDM/EMM, IAM, SaaS Management
Devices, Users, SaaS data
GoSecure Titan
GoSecure Titan integrates endpoint, network, and email threat detection into a
single endpoint detection and response service.
EDR/EPP
Devices
GreenhouseGreenhouse is a talent acquisition software company that offers its
suite of tools and services to help businesses with the hiring process.
HRUsers, SaaS dataGreyNoiseGreyNoise collects, analyzes, and filters internet
scan activity.Cyber IntelligenceDevicesGRR Rapid Response
GRR Rapid Response is an incident response framework focused on remote live
forensics delivered through a client-server architecture.
EDR/EPPDevicesGuardicoreGuardicore is a data center and cloud security company
that protects the organization’s core assets.Cloud Security, CloudDevices,
UsersGytpolGYTPOL is a security configuration management solution providing both
visibility of devices and automation of the hardening process.
CMDB, Config/Patch MgmtDevicesHAProxy

HAProxy is free and open source software that provides a high availability load
balancer and reverse proxy for TCP and HTTP-based applications
Networking
Devices, Users
HalcyonThe Halcyon Anti-Ransomware and Cyber Resilience Platform offers layered
ransomware protection.EDR/EPPDevicesHashiCorp ConsulHashiCorp Consul is a
multi-cloud service networking platform to connect and secure services across
any runtime platform and public or private cloud.NetworkingDevicesHashiCorp
NomadHashiCorp Nomad deploys new and legacy applications across multiple
datacenters, regions, and clouds.
Cloud ManagementDevicesHave I Been PwnedHave I Been Pwned is a website to check
if email accounts have been compromised in a data breach.VA ToolUsersHawk
HAWK.io is a fully automated, multi-tenant, cloud-based, managed detection and
response (MDR) service.
NDR., SIEMDevicesHeimdal SecurityHeimdal Security protects organizations and
home users against malware attacks.
Data Security, EDR/PPDevicesHitachi Operations Center
Hitachi Ops Center provides data infrastructure management including automation,
analytics, and protection.
RMM
Devices
Hoxhunt
Hoxhunt provides security awareness training for employees based on cognitive
automation and risk calculations.
Security AwarenessUsersHP AnywareHP Anyware supports hybrid work environments
allowing users to access their digital workspaces without a VPN.
Networking
DevicesHP Device Manager (HPDM)HP Device Manager (HPDM) is an enterprise-class
application for managing and administrating thin client devices on large- and
small-scale networks.Config Mgmt., ITAM/ITSM, RMMUsersHP Integrated Lights-Out
(iLO)HP Integrated Lights-Out (iLO) is server management software that enables
the configuration, monitoring, and updating of HPE servers.Config Mgmt.DevicesHP
Network Node Manager i (NNMi)HP Network Node Manager i (NNMi) is a network
health and performance monitoring software with scalability and device
support.NetworkingDevicesHP NNMi XML FileHP NNMi XML File is a network health
and performance monitoring platform.NetworkingUsersHPE Intelligent Management
Center (IMC)HPE Intelligent Management Center (IMC) is a networking solution
that delivers management across campus core and data center
networks.NetworkingDevices, UsersHPE OneViewHPE OneView is an integrated IT
management solution that transforms compute, storage, and networking into
software-defined infrastructure for task automation.ITAM/ITSMDevicesHPE SAN
HPE storage area networking (SAN) provides storage solutions for performance,
scalability, and manageability.
Storage Management
Devices
HPE Switches
HPE Switches provide switch inventory and ARP table information.
Infra Monitoring
Devices, ARP tables
HP Web JetadminHP Web Jetadmin is a fleet management software solution for the
remote configuration, maintenance, and monitoring of HP and standard
MIB-compliant 3rd party printers and MFPs.Infra Monitoring, ITAM/ITSM, Config
Mgmt.DevicesHuawei eSightHuawei eSight is an enterprise operation and
maintenance (O&M) platform that provides cross-vendor and cross-product
converged management, visualized monitoring, and intelligent analysis for
enterprise ICT devices..Infra MonitoringDevicesHubSpotHubSpot provides software
products for inbound marketing, sales, and customer service.CRM, SaaS Management
Users, SaaS data
Huntress
Huntress is a managed endpoint detection and response (EDR) solution.

EDR/EPP
Devices
HYCU
HYCU is a SaaS-based data management product including data protection,
migration and disaster recovery.

DevicesHyperSQLThe HyperSQL adapter imports device information from an HyperSQL
database.CMDB, ITAM/ITSMDevicesHYPR PasswordlessHYPR Passwordless provides
passwordless security solutions.IAMDevices, UsersIBM BigFix InventoryIBM BigFix
Inventory gathers information about installed software and hardware in your IT
infrastructure.IT Agent, Config Mgmt.DevicesIBM CloudIBM's cloud computing
platform combines platform as a service (PaaS) with infrastructure as a service
(IaaS) and cloud services.Cloud Infra, CloudDevicesIBM GuardiumIBM Guardium
prevents leaks from databases, data warehouses, and Big Data environments. It
ensures the integrity of information and automates compliance controls across
heterogeneous environments.Data SecurityDevicesIBM Hardware Management Console
(HMC)

The Hardware Management Console (HMC) is a hardware appliance that you can use
to configure and control one or more managed systems. You can use the HMC to
create and manage logical partitions and activate Capacity Upgrade on Demand.
Using service applications, the HMC communicates with managed systems to detect,
consolidate, and send information to service and support for analysis.Infra
Monitoring, Cluster Management, Containers

DevicesIBM License Metric Tool
IBM License Metric Tool (ILMT) helps manage license allocation services on
supported systems.
License MgmtDevicesIBM MaaS360 with WatsonIBM MaaS360 with Watson is a Unified
Endpoint Management (UEM) platform covering endpoints, end-users, apps, content,
and data. It also gives visibility and control to manage mobile devices running
iOS, macOS, Android, and Windows.CMDB, ITAM/ITSM, MDM/EMM, UEMDevicesIBM Maximo
IBM Maximo Application Suite offers a single platform for asset management,
monitoring, maintenance, computer vision, safety and reliability.
CMDBDevicesIBM QRadarIBM QRadar is a Security Information and Event Management
(SIEM) solution that enables security teams to detect, prioritize and response
to threats across the enterprise.SIEMDevices, UsersIBM Spectrum Protect Plus
IBM Spectrum Protect Plus provides recovery, replication, retention, and reuse
for VMs, databases, applications, file systems, SaaS workloads, and containers
in hybrid cloud environments.
Infra MonitoringDevicesIBM Tivoli Application Dependency Discovery Manager
(TADDM)IBM Tivoli Application Dependency Discovery Manager (TADDM) is a
configuration management tool that helps IT operations personnel ensure and
improve application availability in application environments.Config
Mgmt.DevicesIBM Urban CodeIBM UrbanCode provides software delivery for any mix
of on-premises, cloud, and mainframe applications.
Config/Patch Mgmt
Devices, UsersIBM VPC
IBM Cloud Virtual Private Cloud (VPC) is a secure software-defined network (SDN)
on which customers can build isolated private clouds. 
Cloud Infra
Devices
iboss cloudiboss cloud is cloud-based platform that secures user Internet access
in the cloud.Networking, Cloud SecurityDevices, UsersiCIMS
iCIMS is an enterprise recruiting platform allowing employers to attract,
engage, hire, and advance employees.
HRUsersIcingaIcinga is an open-source computer system and network monitoring
application. It monitors data centers and clouds availability and performance,
gives access to data and raises alerts.NetworkingDevicesIFS Assys
IFS Assys is IT service management (ITSM) software that helps automate business
processes
ITAM/ITSM
Devices
IGEL Universal Management Suite (UMS)IGEL Universal Management Suite (UMS) is a
single management solution for decentralized endpoints.MDM/EMMDevicesIllumio
Adaptive Security Platform (ASP)Illumio Adaptive Security Platform (ASP) secures
computing platforms in cloud, on-prem, or hybrid environments without any
dependency on the underlying network.NetworkingDevicesIllusive NetworksIllusive
Networks deceives cyber attackers by planting false information about a given
network's resources.Deception, Cyber IntelligenceDevicesImmuniWebImmuniWeb
develops machine learning and AI technologies providing continuous monitoring
for web applications and APIs.AppSec, DevOpsDevicesImperva Data Activity
Monitoring (DAM)Imperva Data Activity Monitoring (DAM) defines and enforces data
security and compliance policies across the cloud and on-premises including
relational databases, mainframes, big data platforms, data warehouses, and
enterprise file stores.IT Agent, Config Mgmt.Devices 
Imperva WAF
Imperva Web Application Firewall (WAF) allows customers to monitor, filter, and
block incoming and outgoing data packets from a web application or website.
AppSec, Firewall
Devices
Imperva WAF Cloud
Imperva Web Application Firewall (WAF) allows customers to monitor, filter, and
block incoming and outgoing data packets from a web application or website.  
AppSec, Firewall
Devices
InfiniboxInfinidat InfiniBox provides enterprise storage for mixed application
workloads.
Storage ManagementDevices
InfinipointInfinipoint is a cloud-based automated cyber hygiene platform that
enables continuous detection and remediation of risks across the organization’s
IT assets.ITAM/ITSM, Config  Mgmt.Devices, UsersInfoblox DDIInfoblox DDI
consolidates DNS, DHCP, IP address management, and other core network services
into a single platform, managed from a common console.NetworkingDevices
Infoblox BloxOneBloxOne DDI delivers central control and automation of DNS, DHCP
and IP address management for hybrid and multi-cloud networks.Networking,
IPAMDevicesInfoblox NetMRIInfoblox NetMRI provides network change and
configuration management (NCCM), enabling users to automate network change,
understand network health, manage network configurations, and meet a variety of
compliance requirements.NetworkingDevices, UsersInfor EAMInfor EAM is an asset
management system that helps digitizing and optimizing maintenance
operations.ITAM/ITSMDevices, UsersIntel DCMCIntel® Data Center Manager is a
software solution that collects and analyzes the real-time health, power, and
thermals of a variety of devices in data centers.Infra Monitoring,
RMMDevicesIntel EMAIntel® Endpoint Management Assistant (Intel® EMA) software
provides the ability to remotely and securely manage Intel® Active Management
Technology (Intel® AMT) devices beyond the firewall, via the cloud, on known
Wi-Fi networks.RMMDevicesIntezer ProtectIntezer Protect offers runtime cloud
workload protection.Cloud Mgmt., Cloud SecurityDevicesIntrigueIntrigue enables
IT and Security teams with a complete and always up to date view of Cloud and
Internet-exposed assets and exposures.Cyber IntelligenceDevicesIntruder.io
Intruder is an online vulnerability scanner that enables the identification of
misconfigurations, missing patches, encryption weaknesses, application bugs, and
more.
VA Tool
Devices
Invicti
Invicti (formerly Netsparker) is DAST and IAST vulnerability scanning for web
applications.
AppSecDevicesIP FabricIP Fabric is a network management system used to discover,
verify, visualize and document large scale networks.NetworkingDevicesIsland
Island is an enterprise browser, built on Chromium, with numerous built-in
capabilities for protecting against user-, data-, and network-based threats.
Secure Web GatewaysDevices, UsersIT GlueIT Glue is a SOC 2-compliant IT
documentation management platform designed for managed service providers
(MSPs).Storage ManagementUsersiTopIiTop is an open source ITSM solution allows
management of configuration items and their relationships in a flexible
CMDB.CMDB, ITAM/ITSMDevices, Users Ivanti Connect Secure
Ivanti Connect Secure provides zero trust secured access from any device to
applications and services in the cloud and data center.
Networking
Users
 
Ivanti Endpoint SecurityIvanti Endpoint Security, powered by Heat, provides
application control, antivirus, patch management, and device control to protect
endpoints.EDR/EPPDevicesIvanti Neurons
Ivanti Neurons is a unified endpoint management tool that discovers and
remediates security threats.
UEMDevices
Ivanti Patch Management
 Ivanti Neurons for Patch Management continuously senses, discovers, and
remediates security threats.
Config/Patch Management,
DevicesIvanti Security ControlsIvanti Security Controls is a unified IT
management platform used for managing and protecting Windows-based machines, Red
Hat Enterprise and CentOS Linux machines, and VMware ESXi Hypervisors.UEM,
MDM/EMMDevicesIvanti Service ManagerIvanti Service Manager, is a cloud based
ITSM solution that provides workflows automation, IT help desk and support
ticket features, and ITIL service management processes.ITAM/ITSMDevices,
UsersIvanti Unified Endpoint Manager (Landesk)Ivanti Unified Endpoint Manager
(formerly Landesk) helps IT administrators gather detailed device data, automate
software and OS deployments, personalize workspace environments, and fix user
issues.UEM, Config/Patch Management, ITAM/ITSMDevicesJamf ProJamf Pro is an
enterprise mobility management (EMM) tool that provides unified endpoint
management for Apple devices.MDM/EMM, SaaS Management
Devices, SaaS data
Jamf ProtectJamf Protect is an endpoint protection solution that prevents macOS
malware, detects and remediates Mac-specific threats, and monitors endpoints for
compliance.EDR/EPPDevicesJamf TrustJamf Trust provides enterprise-level security
and remote access for mobile devices.MDM/EMMDevicesJetPatch
JetPatch is a centralized patch management platform focusing on end-to-end
enterprise patch management and vulnerability remediation.
Config/Patch Mgmt.DevicesJFrog Artifactory  JFrog Artifactory is a DevOps
solution for housing and managing artifacts, binaries, packages, files,
containers, and components throughout the software development lifecycle.
DevOpsDevices, UsersJSONThe JSON adapter is able to import .json files with
information about devices, users, or installed software.CMDB, ITAM/ITSMDevices,
UsersJumpCloudJumpCloud is a Directory-as-a-Service (DaaS) solution to
authenticate, authorize, and manage users, devices, and applications via a
common directory in the cloud.IAM, Directory, SaaS ManagementDevices, Users,
SaaS dataJuniper JunosThe Juniper Junos Adapter connects to Juniper switches and
routers.NetworkingDevicesJuniper Junos Space Network Management PlatformJuniper
Junos Space Network Management Platform automates management of Juniper's
switching, routing, and security devices.NetworkingDevicesKandjiKandji is an
Apple device management (MDM) solution for macOS, iOS, iPadOS, and
tvOS.MDM/EMMDevicesKaseya VSAKaseya VSA is a remote monitoring and management
solution for remote control, discovery, patch management, and monitoring.IT
Agent, Config Mgmt.DevicesKaspersky Security CenterKaspersky Security Center is
an administration console for Kaspersky Labs security solutions and systems
management tools.EDR/EPPIAMKeeperKeeper is a password and secrets management
solution that helps protect and monitor passwords, secrets, and remote
connections.
Password mgmt.
UsersKemp CentralKemp 360 Central is an application delivery and management
platform for infrastructure monitoring of all data centers, private clouds,
IaaS, PaaS, and public cloud.Infra MonitoringDevicesKenna Security PlatformKenna
Security Platform is a vulnerability assessment solution that provides risk
scoring, prioritization, and benchmarking.VA ToolDevicesKeycloakKeycloak is an
open source identity and access management solution.IAMUsersKeyfactor
Keyfactor provides PKI as-a-Service enabling protection of every device,
workload, and digital transaction with a unique and trusted identity.  
IAM
Devices
KnowBe4KnowBe4 provides Security Awareness Training for anti-phishing behavior,
social engineering and ransomware attacks, and general security
awareness.Security Awareness, GRCUsersKolide K2Kolide K2 is a paid cloud-hosted
SaaS platform for gathering detailed device information and securing
endpoints.EDR/EPPDevicesKubernetesKubernetes (K8s) is an open-source system for
automating deployment, scaling, and management of containerized
applications.Containers, CloudDevicesL0phtCrack 7L0phtCrack 7 is a password
auditing and recovery application.Password Mgmt., IAMUsersLaceworkLacework
provides cloud security automation for AWS, Azure, and GCP with a comprehensive
view of risks across cloud workloads and containers.Cloud Security,
CloudDevices, UsersLakeside SysTrack
Lakeside SysTrack is a digital experience monitoring solution used for workplace
analytics, IT asset optimization, and end-user troubleshooting.
RMMDevicesLandscapeLandscape by Canonical is a management tool used to deploy,
monitor and manage Ubuntu servers.Config/Patch Mgmt,
RMMDevicesLansweeperLansweeper is an IT asset management and Network Inventory
software tool for Windows, Linux, Mac, and Network devices.IT Agent, Config
Mgmt., CMDB, ITAM/ITSMDevices
Lansweeper Cloud
Lansweeper Cloud federates data from all local Lansweeper discovery instances
into a single source of truth.
IT Agent, Config Mgmt., CMDB, ITAM/ITSM
DevicesLastPassLastPass is a password manager that stores encrypted passwords
online.Password Mgmt., IAM, SaaS ManagementUsers, SaaS
dataLaunchDarklyLaunchDarkly is a continuous delivery platform and feature
management platform that provides feature flags as a service.Software
Development Version ControlUsersLenel OnGuardLenel OnGuard is an integrated
access control and alarm monitoring system.Security
AwarenessUsersLibreNMSLibreNMS is a network monitoring solution that provides
auto-discovery for network hardware and operating systems including Cisco,
Linux, Juniper, Foundry, and more.NetworkingDevicesLimaCharlieLimaCharlie
provides endpoint-driven information security tools to run an MSSP or SOC, as
well as APIs that allow users to build and monetize their own
products.DevOpsDevicesLinodeLinode, acquired by Akamai, is a cloud hosting
provider that provides Linux-based virtual machines, cloud infrastructure, and
managed services.Cloud Infra, VirtualizationDevices, UsersLinux SSHLinux Secure
Shell uses remote command execution over the SSH protocol to gather information
about the endpoint Linux machine.ITAM/ITSMDevicesLitmos
Litmos is a learning management system that provides pre-built courses and
eLearning solutions.
Collaboration, HRUsersLogMeIn CentralLogMeIn Central is a cloud-based endpoint
management solution that enables monitoring and management of endpoint
infrastructure.MDM/EMM, UEMDevices, UsersLogicMonitorLogicMonitor is an
automated infrastructure monitoring platform for enterprise IT and managed
service providers.Infra Monitoring, ITAM/ITSMDevicesLogRhythmLogRhythm combines
SIEM, user and entity behavior analytics, network traffic and behavior
analytics, and security automation and orchestration.SIEMDevicesLookout Mobile
Endpoint SecurityLookout Mobile Endpoint Security is a mobile security solution
that provides comprehensive risk management across iOS and Android devices to
secure against app, device, and network-based threats while providing visibility
and control over data leakage.EDR/EPPDevices
LucidchartLucidchart allows users to collaborate on drawing, revising and
sharing charts and diagrams.Collaboration, SaaS ManagementUsers, SaaS
dataMalwarebytes Endpoint Protection (Cloud Platform)Malwarebytes Endpoint
Protection is a cloud-based security platform that combines detection and
remediation technologies into a single cloud-managed
agent.EDR/EPPDevicesMalwarebytes Endpoint Security (On-Prem
Platform)Malwarebytes Endpoint Security protects endpoints from ransomware,
automates endpoint remediation, and provides continuous visibility and
monitoring.EDR/EPPDevicesManageEngine Endpoint (Desktop) Central and Patch
Manager PlusManageEngine  Endpoint (Desktop) Central and Patch Manager Plus is a
desktop management and mobile device management software for managing desktops
in LAN and across WAN and mobile devices from a central location.EDR/EPP,
MDM/EMMDevices
ManageEngine Firewall Analyzer
ManageEngine Firewall Analyzer is an agentless log analytics and configuration
management software that analyzes logs from firewalls and generates real-time
alert notifications and security and bandwidth reports.
Networking
Devices
ManageEngine MDM
ManageEngine MDM is a mobile device management solution.
MDM/EMMDevices, UsersManageEngine Network Configuration Manager
ManageEngine Network Configuration Manager is multi-vendor network change &
configuration management software for switches, routers, and firewalls.
NetworkingDevices, UsersManageEngine OpManager
ManageEngine OpManager enables monitoring of routers, switches, firewalls,
servers and VMs for fault and performance.
Infra MonitoringDevicesManageEngine OpUtils
ManageEngine OpUtils is an IP address and switch port management software geared
toward helping engineers efficiently monitor, diagnose, and troubleshoot IT
resources.
IPAM, NetworkingDevicesManageEngine PasswordManagerPro
ManageEngine PasswordManagerPro is a complete solution to control, manage,
monitor, and audit the entire life cycle of privileged access.
PAMDevicesManageEngine Service Desk Plus
ManageEngine Service Desk Plus is an IT help desk and customer support system.
TicketingDevicesMandiant
Mandiant Advantage is a multi-vendor XDR platform that delivers Mandiant’s
transformative expertise and frontline intelligence to security teams of all
sizes.
Attack Surface Mgmt, Cyber IntelligenceDevicesMarkMonitor
MarkMonitor provides domain management, security, and consulting.
IPAMDevicesMasscanMasscan is a free internet port scanner utility.VA
ToolDevicesMcAfee ePolicy Orchestrator (ePO)McAfee ePolicy Orchestrator (ePO) is
a security management platform that provides real-time monitoring of security
solutions.EDR/EPPDevicesMcAfee MVision CloudMcAfee MVision Cloud is a CASB
solution that protects data and stops threats in the cloud across SaaS, PaaS,
IaaS, and on-premise environments.Cloud SecurityDevicesMedigateMedigate is a
medical device security platform that protects connected medical devices on
health care provider networks, allowing inventory management and facilitating
detection and prevention capabilities.NetworkingDevicesMen&Mice DNS
ManagementMen&Mice DNS Management is a Network Management software providing
secure, centralized, and highly resilient control of DNS across diverse
platforms.NetworkingDevices, UsersMicro Focus GroupWiseMicro Focus GroupWise is
a collaboration software solution that provides email, calendaring, and instant
messaging.CollaborationUsersMicro Focus Server Automation (HP Server Automation,
Opsware)Micro Focus Server Automation (formerly known as HP Server Automation or
Opsware) provides operating system provisioning, automated patch management, and
compliance control.Config Mgmt.DevicesMicro Focus SiteScopeMicro Focus SiteScope
(previously HPE SiteScope) provides monitoring capabilities for IT
infrastructure, including servers, databases, network, media, and more.Infra
Monitoring, Cloud Mgmt., ITAM/ITSM, CloudDevicesMicrosoft Active Directory
(AD)Microsoft Active Directory (AD) is a directory service for Windows domain
networks that authenticates and authorizes all users and computers.IAM,
Directory Devices, UsersMicrosoft AzureMicrosoft Azure is a cloud computing
service created by Microsoft for building, testing, deploying, and managing
applications and services through a global network of Microsoft-managed data
centers.Cloud Infra, CloudDevicesMicrosoft Azure Active Directory (Azure AD) and
Microsoft IntuneMicrosoft Azure Active Directory (Azure AD) is Microsoft's
multi-tenant, cloud-based directory, and identity management service. Microsoft
Intune is a cloud-based service in the enterprise mobility management (EMM)
space that integrates closely with Azure Active Directory (Azure AD) for
identity and access control and Azure Information Protection for data
protection.IAM, Directory, SaaS ManagementDevices, Users, SaaS DataMicrosoft
BitLocker Administration and Monitoring (MBAM)Microsoft BitLocker Administration
and Monitoring (MBAM) provides a simplified administrative interface for
BitLocker Drive Encryption. BitLocker offers protection against data theft or
data exposure for computers that are lost or stolen, encrypting all data that is
stored on the Windows operating system volumes and drives and configured data
drives.DLP, Data SecurityDevicesMicrosoft Cloud App Security
Microsoft Cloud App Security is a Cloud Access Security Broker (CASB) that
supports various deployment modes including log collection, API connectors, and
reverse proxy.Cloud Security, CloudUsersMicrosoft Defender ATPMicrosoft Defender
Advanced Threat Protection (ATP) helps enterprise networks prevent, detect,
investigate, and respond to advanced threats.EDR/EPP, SaaS ManagementDevices,
SaaS dataMicrosoft Dynamics 365Microsoft Dynamics 365 Finance is a Microsoft
enterprise resource planning system for medium to large organizations.HRDevices,
Users
Microsoft Endpoint Configuration Manager (MECM)
Microsoft Endpoint Configuration Manager MECM (formerly SCCM) is a systems
management software product for managing large groups of computers running
Windows NT, Windows Embedded, macOS (OS X), Linux or UNIX, as well as Windows
Phone, Symbian, iOS and Android mobile operating systems.
Config Mgmt.
DevicesMicrosoft Hyper-VMicrosoft Hyper-V is a native hypervisor; it can create
virtual machines on x86-64 systems running Windows.Virtualization, ITAM/ITSM,
CloudDevicesMicrosoft Key Management Service (KMS)Microsoft Key Management
Service (KMS) enables organizations to activate systems within their own
network, eliminating the need for individual computers to connect to Microsoft
for product activation.ITAM/ITSMDevicesMicrosoft LyncMicrosoft Lync provides
instant messaging (IM), audio and video calls, Lync Meetings, availability
(presence) information, and sharing capabilities.CollaborationUsersMicrosoft
SCOM (System Center Operations Manager)Microsoft SCOM (System Center Operations
Manager) is a cross-platform data center monitoring system for operating systems
and hypervisors, reporting state, health and performance information of computer
systems.Infra Monitoring, RMMDevicesMicrosoft System Center Virtual Machine
Manager (VMM)Microsoft System Center Virtual Machine Manager (VMM) is a unified
management application for on-premises, service provider, and Azure cloud
virtual machines.Cloud Mgmt., Containers, Virtualization, RMMDevicesMilestone
XProtectMilestone XProtect is a video management software (VMS) for video
surveillance.RMMDevices, UsersMimecastMimecast provides email security, data
management and compliance, and security awareness and user behavior
solutions.Email Security, Security AwarenessUsersMinerva Labs Endpoint Malware
VaccinationMinerva Labs Endpoint Malware Vaccination simulates infection
markers, rather than creating them, to contain outbreaks that bypass AV
tools.EDR/EPPDevicesMiroMiro is a digital collaboration platform designed to
facilitate remote and distributed team communication and project
management.Collaboration, SaaS ManagementUsers, SaaS dataMistMist AI leverages
data ingested from numerous sources, including APs, switches and firewalls to
optimize user experiences and simplify operations across the wireless access,
wired access, and SD-WAN domains.Cloud Infra, Cloud Mgmt, Cloud
SecurityDevicesMobileIron EMMMobileIron EMM enables enterprises to secure and
manage modern operating systems on mobile devices and desktops.MDM/EMMDevices
 MondayMonday.com is a cloud-based workflow management platform that allows
teams to build and manage projects.Collaboration, SaaS Management
Users, SaaS data
MongoDBMongoDB is a document-oriented NoSQL database.DevOpsDevices,
UsersMoroCloud
Moro Cloud is a software-defined datacenter (SDDC) that offers integrated cloud
components such as compute, network, storage, and security.
Cloud Mgmt., Storage ManagementDevicesMosyleMosyle is an Apple Endpoint
Management & Security platform with solutions for education providers and
enterprises.MDM/EMMDevices, UsersMSP Manager


N-able MSP Manager is cloud-based help desk and billing software for IT service.

TicketingDevices
Mulesoft Runtime Fabric
Mulesoft Runtime Fabric is a container service that automates the deployment and
orchestration of Mule applications and gateways.
Container
DevicesMutiny
Mutiny is a network monitoring and alerting appliance.
Networking
Devices
N2WS
N2WS Backup & Recovery offers orchestrated recovery for core AWS and Azure
services.
Data SecurityDevices, Users
N-able
N-able provides integrated monitoring, management, security, and ticketing for
managed service providers.
RMM, TicketingDevicesNagios CoreNagios Core provides monitoring of all
mission-critical infrastructure components including applications, services,
operating systems, network protocols, systems metrics, and network
infrastructure.Infra MonitoringDevicesNagios XINagios XI provides enterprise
server and network monitoring.NetworkingDevicesNamecheap
Namecheap offers free public DNS to help users get connected quickly and
securely.
IPAM
Devices
NasuniNasuni offers a file services platform built for the cloud that delivers
infinite scale, built-in backup, global file sharing, and local file server
performance.Storage Mgmt. DevicesNectusNectus is a network discovery, monitoring
and visualization software.Networking, Infra Monitoring,
ITAM/ITSMDevicesNetAppNetApp offers hybrid cloud data services for management of
applications and data across cloud and on-premises environments.Storage
Mgmt. Devices, UsersNetBoxNetBox is an open source web application to help
manage and document computer networks.NetworkingDevicesNetBrain Integrated
EditionNetBrain Integrated Edition is an adaptive automation integrated with
existing NMS tools and IT workflows to automate documentation, troubleshooting,
network change, and defense.NetworkingDevicesNetdiscoNetdisco is a web-based
network management tool designed for network
administrators.NetworkingDevicesNetApp Active IQ Unified Manager
Active IQ Unified Manager provides performance monitoring capabilities and event
root-cause analysis for systems running NetApp ONTAP software.
Infra monitoring
DevicesNetIQ Advanced AuthenticationNetIQ Advanced Authentication provides a
centralized authentication framework that adds a strong level of authentication
(MFA or 2 Factor).IAMDevicesNetIQ Identity ManagerNetIQ Identity Manager by
MicroFocus uses integrated identity information to create and manage identities
and control access to enterprise resources.IAMUsersNetMotion Mobility
NetMotion Mobility is mobile VPN software that maximizes mobile field worker
productivity by maintaining and securing their data connections as they move in
and out of wireless coverage areas and roam between networks.
NetworkingDevices, UsersNetskopeNetskope Security Cloud provides threat
protection for cloud services, websites, and private
applications.NetworkingDevicesNetWitness NDR

NetWitness provides real-time network forensics with automated threat detection,
response, and analysis solutions.

NDRDevicesNetSpyglass

NetSpyglass provides real-time network mapping, monitoring, visualization, and
analytics for multi-vendor data center and WAN network operators.

NetworkingDevicesNetwrix Auditor
Netwrix Auditor is IT auditing software for detecting security threats and
validating compliance.
License Mgmt, ITAM/ITSM
Users
Neustar UltraDNSNeustar UltraDNS is an enterprise grade cloud-based DNS
service.NetworkingDevicesNew RelicNew Relic provides cloud-based software to
monitor and track servers, instances and services.RMMDevicesNexthinkNexthink is
an IT solution that provides insights into activity across devices, operating
systems, and workplace locations to improve IT experiences for
employees.ITAM/ITSMDevices, UsersNinja One (RMM)Ninja One is an RMM (Remote
Monitoring and Management) solution for MSPs and IT organizations, allowing them
to automate, manage, and remediate endpoint management tasks.RMMDevices,
UsersNmap Security ScannerNmap Security Scanner is a free and open source
utility for network discovery and security auditing.VA ToolDevicesNozomi
Guardian and CMCNozomi Guardian and CMC (formerly Nozomi Networks Guardian)
monitors network communications and device behavior for physical and virtual
appliances.OT/IoTDevicesNodeZero
NodeZero by Horizon3 provides continuous autonomous penetration testing via
SaaS.
VA ToolDevicesNotionNotion offers a workplace productivity suite that includes
solutions for collaboration and communication, task management, project
tracking, and more.
CollaborationUsersN-Sight RMM
N-Sight RMM provides remote monitoring and access, ticketing, and management for
Windows, Linux, and Mac devices.
RMMDevicesNucleus Security
Nucleus Security provides unified vulnerability management via integrations with
third-party tools including threat intelligence, penetration testing, appsec,
network scanners, and more.
VA Tool
DevicesNutanix AHVNutanix AHV is a hypervisor included with the Enterprise Cloud
OS. AHV delivers flexible migrations, security hardening, automated data
protection and disaster recovery, and analytics.Virtualization, ITAM/ITSM,
CloudDevicesNutanix Prism Central
Nutanix delivers hybrid and multicloud management, unified storage, database
services, and desktop services to support applications and workloads.
Cloud Infra, Cluster Mgmt, Virtualization
Devices, Users
ObserveITObserveIT provides insider threat security solutions, including
employee monitoring, user activity monitoring, behavioral analytics, policy
enforcement, and digital forensics.UEBADevicesObserviumObservium is an
auto-discovering network monitoring platform supporting a wide range of device
types, platforms and operating systems.NetworkingDevicesObsidium
SecurityObsidian delivers a security solution for SaaS applications built around
unified visibility, continuous monitoring, and security analytics.Cloud
Security, SaaS SecurityDevices, UsersOktaOkta provides cloud software that helps
companies manage their employees' passwords, by providing a “single sign-on”
experience.IAM, SaaS Management
Devices, Users, SaaS data
OmniVista 2500 NMSThe Alcatel-Lucent OmniVista 2500 Network Management System
(NMS) provides management tools and network-wide visibility, enabling operators
to provision, manage and maintain a mobile
infrastructure.NetworkingDevicesOnDMARC
OnDMARC provides automated management for DMARC, DKIM and SPF records.
Email SecurityDevicesOneLoginOneLogin's unified access management platform
centralizes access across on-prem and cloud environments to give full control,
management, and security for data, devices, and users.IAMUsersOnspring Compass
Onspring is cloud-based automated GRC software for business process management.
Risk Management
Devices
Oomnitza Enterprise Technology ManagementOomnitza Enterprise Technology
Management helps IT teams manage technology assets with an agentless solution
for endpoints (laptops, mobile devices, monitors, peripherals, and accessories),
software (desktop, cloud, virtual machines), and users.ITAM/ITSMDevicesOpalOpal
is an access management platform that helps enterprise companies scale least
privilege.
IAMUsersopenDCIMopenDCIM is a free open-source Data Center Infrastructure
Management solution.NetworkingDevices, UsersOpenLdapOpenLDAP Software is an open
source implementation of the Lightweight Directory Access Protocol.

Directory, IAMDevices, UsersOpenStackOpenStack is an open source software
solution for creating private and public clouds.Cloud Infra,
CloudDevicesOpenText ZENworksOpenText ZENworks is a unified endpoint management
and protection solution.UEMDevicesOpenVASOpenVAS is a software framework
including several services and tools for vulnerability scanning and
vulnerability management.VA ToolDevicesOpenVPN Cloud
OpenVPN Cloud is a VPN-as-a-Service solution that eliminates the need for VPN
server installation.
Infra Monitoring, NetworkingDevices, UsersOpsgenieOpsgenie is an alerting and
incident response tool.CollaborationUsers
 OpsRampOpsRamp is an AIOps-powered IT operations management (ITOM) solution.
ITAM/ITSMDevicesOpsview

Opsview is a monitoring platform for operating systems, networks, cloud, VMs,
containers, databases, applications, and more.

Infra Monitoring, RMMDevicesOPSWAT MetaAccessOPSWAT MetaAccess prevents risky
devices from accessing local networks and cloud applications.NACDevicesOracle
CloudOracle Cloud is a computing service providing servers, storage, network,
applications and services.Cloud Infra, CloudDevices, UsersOracle Enterprise
Manager
Oracle Enterprise Manager is an on-premises management platform that provides a
single dashboard to manage all Oracle deployments

RMMDevices
Oracle Fusion HCM Cloud
Oracle Cloud Human Capital Management is a cloud-based HCM software application
suite for global HR, talent, and workforce management.
HRUsers       

Your browser does not support SVG.click here to download


Oracle Ksplice
Oracle Ksplice provides fast secure kernel and userspace patching without the
need for reboots
Config/Patch Mgmt
Devices
Oracle NetsuiteOracle Netsuite is a cloud-based ERP solution that provides
global business management solutions.
ERP

Users, SaaS data


Oracle VMOracle VM's server virtualization products support x86 and SPARC
architectures and a variety of workloads such as Linux, Windows and Oracle
Solaris.Virtualization, ITAM/ITSM, CloudDevicesOrca Cloud Visibility
PlatformOrca Cloud Visibility Platform delivers visibility to cloud security
posture, including prioritized alerts on vulnerabilities, compromises,
misconfigurations, and more.Cloud Security, Cloud, VA ToolDevicesOrdrOrdr
provides visibility and security of all connected devices, including unmanaged
IoT, OT, and IoMT.Infra MonitoringDevicesOstendioOstendio is a security,
compliance, and risk management platform.Risk Management,
Audit/ComplianceDevicesOutpost24Outpost24 is a cyber risk management platform
that helps organizations assess their attack surface and prioritize
vulnerabilities.
Attack Surface Mgmt.DevicesOvirtoVirt is a free, open-source virtualization
management platform.Virtualization, ITAM/ITSM,
CloudDevicesPacketFencePacketFence is a free open source network access control
(NAC) solution which provides the following features: registration, detection of
abnormal network activities, proactive vulnerability scans, isolation of
problematic devices, remediation through a captive portal, 802.1X, wireless
integration and User-Agent / DHCP fingerprinting.NACDevicesPagerDuty
PagerDuty is a digital operations platform for system administrators and support
teams to manage incident response.
Collaboration
Users
Palo Alto Networks CortexPalo Alto Networks Cortex is an open and integrated,
AI-based continuous security platform, allowing security operations teams to
speed the analysis of massive data sets.NetworkingDevicesPalo Alto Networks
Cortex XDRPalo Alto Networks Cortex XDR is a detection and response app that
natively integrates network, endpoint, and cloud data to detect threats and stop
sophisticated attacks.EDR/EPPDevicesPalo Alto Networks Cortex Xpanse Palo Alto
Networks Cortex Xpanse (Palo Alto Networks Expanse Expander) discovers,
monitors, and tracks Internet Assets automatically to reduce risks and
exposures.Cyber IntelligenceDevicesPalo Alto Networks PanoramaThe Palo Alto
Panorama management server provides centralized monitoring and management of
multiple next-generation firewalls and appliance clusters.Networking,
FirewallDevicesPalo Alto Networks Prisma Access


Prisma Access SASE from Palo Alto Networks converges network security, SD-WAN,
and autonomous digital experience management in the cloud to provide a secure
access service edge.
IAM, Networking
Devices, Users

Palo Alto Networks Prisma Cloud Workload Protection
Prisma Cloud Workload Protection (CWPP) provides protection across hosts,
containers, and serverless deployments in any cloud, throughout the application
lifecycle.
Cloud SecurityDevicesPalo Alto Prisma CloudPrisma Cloud is a native cloud
security platform that provides visibility, threat prevention, compliance
assurance, and data protection across multi-cloud environments.Cloud Mgmt.,
CloudDevices, UsersPalo Alto Traps Endpoint Security ManagerPalo Alto Traps
Endpoint Security Manager (ESM) delivers endpoint protection to prevent advanced
persistent threats (APTs) and zero-day attacks.EDR/EPPDevicesPanoraysPanorays is
a SaaS-based platform that enables companies to view, manage and engage on the
security posture of their third-parties, vendors, suppliers, and business
partners.Cyber IntelligenceDevicesPaperCutPaperCut is a print management
solution that provides print job tracking and reporting.IoTDevicesParsecParsec
App is a remote desktop application primarily used for playing games through
video streaming.Remote Conferencing, CollaborationDevicesPaycor
Paycor is an automated human capital management (HCM) platform for managing HR
and payroll needs in one place.
HRUsersPaylocity
Paylocity is a cloud-based payroll and human capital management software.
HR
Users
PDQ InventoryPDQ Inventory is a systems management tool that scans Windows
computers to collect hardware, software, and Windows configuration
data.ITAM/ITSMDevices, UsersPenteraPentera recons and maps web-facing attack
surface assets. This includes domains, web interfaces, IPs, networks, and
gateways.Attack Surface MgmtDevicesPeopleHR
PeopleHR is HR automation software (HRIS) for small and growing businesses.
HRUsersPersistentPersistent Systems Radia Endpoint Manager (formerly RCA) is an
end-user device (PC and mobile device) lifecycle management tool for automating
routine client-management tasks.
Config/Patch Mgmt.DevicesPhosphorus
Phosphorus provides IoT discovery, password management, and patch management.
IoTDevicesphpIPAMphpIPAM is an open-source web IP address management application
(IPAM).NetworkingDevices, UsersPingboard
Pingboard creates real-time organizational charts by automatically synchronizing
organizational charts with HRMS software.
HR
Users

PingFederatePingFederate from Ping Identity is an enterprise authentication
federation server that enables user authentication and single sign-on.
IAM, SaaS ManagementUsers, SaaS Data
PingID
Ping offers an identity management solution that includes multi-factor
authentication, single sign-on, identity verification, and more.
IAMUsersPingOne DirectoryPingOne Directory provides a hosted directory service
that developers can use to store user authentication and profile data.IAM,
DirectoryUsersPivotal Cloud FoundryPivotal Cloud Foundry is an app development
and deployment platform for public and private clouds.Cloud Mgmt.,
CloudDevicesPKWAREPKWARE’s data protection platform finds, classifies, and
protects sensitive data, allowing security managers to define data protection
policies and monitor activity across the organization.DLP, Data Security,
EncryptionDevicesPluralSight
PluralSight offers a variety of video training courses for software developers,
IT administrators, and creative professionals through its website.
CollaborationUsersPolymer DLP
Polymer is a DLP solution that automates identification, monitoring, and
remediation for sensitive data in cloud environments, and helps companies stay
compliant with HIPAA, PCI. and GDPR.
DLP
Users
Portnox Clear
Portnox CLEAR provides automated security, visibility and control for every
device accessing the network including Internet of Things (IoT), BYOD, mobile
and unmanaged systems.
NACDevices
Portnox Core
Portnox CORE is a software-based solution that runs on Windows Servers (physical
and virtual) to continually communicate with all existing networking
infrastructure, gaining complete visibility into all assets currently connected
to the network.
Infra Monitoring
Devices
PreyPrey is a cross-platform, open source tool that allows you to track and
recover your devices.
MDMDevices, UsersPritunlPritunl is an enterprise distributed OpenVPN, IPsec and
WireGuard server.
Data SecurityDevices, UsersPrivXPrivX provides privileged access to on-prem and
cloud environments, including control access to servers, network devices and
other critical infrastructure according to user roles and privileges.PAM,
IAMDevices, UsersProjector PSAProjector Professional Services Automation (PSA)
software is an operational system for professional services
organizations.CollaborationUsersPromisec Endpoint ManagerPromisec Endpoint
Manager is an agentless endpoint detection and remediation solution that
detects, analyzes, and remediates abnormalities.EDR/EPPDevicesProofpoint

Proofpoint is a cybersecurity company that offers solutions to protect workers
and their data from threats targeting email, mobile, social, cloud, and other
digital channels.

Email SecurityUsersProofpoint Endpoint DLP
Proofpoint Endpoint DLP helps identify risk user behavior and protect sensitive
data.
DLPDevicesProofpoint's ObserveIT Insider Threat Management PlatformProofpoint's
ObserveIT Insider Threat Management (ITM) platform is a cloud-based solution
that provides insider risk detection, incident response, and unified visibility
across user activity, data interaction, and threat context.UEBADevicesProofpoint
PODProofpoint on Demand (PoD) Email Security classifies types of email, while
detecting and blocking threats.
Email Security
DevicesProofpoint Security Awareness Training
Proofpoint Security Awareness Training provides interactive and customizable
security awareness training.
Security Awareness
UsersProofpoint TAPProofpoint Targeted Attack Protection (TAP) is an email-based
security solution for ransomware prevention and other email-based threats.Email
SecurityUsersProxmox Virtual Environment (VE)Proxmox Virtual Environment (VE) is
an open source server virtualization management solution based on QEMU/KVM and
LXC.Virtualization, ITAM/ITSM, CloudDevicesPRTG Network MonitorPRTG is a network
monitoring application for Windows and Linux systems and servers, as well as
miscellaneous hosts such as switches, routers, and other devices. Infra
monitoring, RMMDevicesPulsewayPulseway is a remote monitoring and management
(RMM) system solution that enables an admin to monitor, manage and troubleshoot
workstations, servers and network devices across an environment remotely.Remote
Monitoring and ManagementDevicesPulumi Cloud Engineering PlatformPulumi provides
an Infrastructure as Code solution for Developers and Infrastructure Teams,
enabling them to build, deploy, and manage cloud applications and infrastructure
using various languages, tools, and engineering practices.Software Development
Version Control, DevOpsUsersPuppetPuppet is an open-source software
configuration management tool.Config Mgmt.DevicesPure Storage Pure1Pure Storage
Pure1 is a cloud-based storage management solution that provides self-driving
storage, data-storage management, and monitoring.Storage
Mgmt. DevicesQuadrantQuadrant is a Managed Detection and Response solution
operating at the intersection of People and Product.Attack surface
mgmtDevicesQualys Cloud PlatformQualys Cloud Platform monitors customers' global
security and compliance posture using sensors.VA ToolDevices, UsersQualys
Container SecurityQualys Container Security provides the ability to discover,
track, and secure containers.ContainersDevicesQuest KACE Endpoint Systems
Management AppliancesQuest KACE Endpoint Systems Management Appliances
provision, manage, secure, and service network-connected
devices.NetworkingDevicesQushQush enables customers to discover risks, educate
employees, enforce policies and prevent data loss.
DLP, Data Security, UEBADevicesRadiflow
Radiflow provides visibility and anomaly detection for OT assets.
OTDevicesRancherRancher is an open-source multi-cluster orchestration platform
that enables operations teams to deploy, manage, and secure enterprise
Kubernetes.Containers, CloudDevicesRandoriRandori is an attack platform which
combines continuous reconnaissance, real-time target analysis, and the ability
to safely execute attacks on-demand to provide an attacker’s perspective.Cyber
IntelligenceDevicesRapid7 InsightIDRRapid7’s InsightIDR is a security center for
incident detection and response, authentication monitoring, and endpoint
visibility.SIEMDevicesRapid7 InsightVMRapid7 InsightVM provides visibility and
risk prioritization for vulnerabilities found in local, remote, cloud,
containerized, and virtual infrastructure.  VA Tool
Devices
Rapid7 Insight Account Platform
Rapid7 Insight API: This API provides API access for the entire Rapid7 Insight
 platform and suite of products.  
License Mgmt
Users
Rapid7 Nexpose and InsightVMRapid7 Nexpose is an on-premise vulnerability
management solution, providing discovery, detection, verification, risk
classification, impact analysis, reporting and mitigation. Rapid7 InsightVM is a
cloud-based vulnerability management solution that combines Rapid7’s Insight
platform along with Nexpose core capabilities.VA ToolDevicesRapid7 Nexpose
WarehouseRapid7 Nexpose Warehouse fetches device information directly from an
external data warehouse.VA ToolDevices
Rapid7 Threat Command
Rapid7 Threat Command is an external threat intelligence tool that helps users
find and mitigate threats targeting organizations.
Cyber Intelligence
UsersRecordedFuture
RecordedFuture threat intelligence helps identify the vulnerabilities that pose
an actual risk to an organization, adding context and data to CVE scoring.
Attack Surface Mgmt., Cyber IntelligenceDevicesRed CanaryThe Red Canary suite
includes products that record telemetry, detect and investigate threats, and
automate remediation.EDR/EPPDevices, UsersRed Hat Automation Controller
Red Hat Automation Controller (formerly Ansible Tower) is a web console and REST
API for operationalizing Ansible across teams, organizations, and the
enterpriseITAM/ITSMDevices
Red Hat Customer Portal
The Red Hat Customer Portal provides access to product evaluations, purchasing
capabilities, and knowledge management content.
Config/Patch mgmt, Software Development Version Control
DevicesRed Hat IdMRed Hat Identity Management (IdM) provides a centralized and
unified way to manage identity stores, authentication, policies, and
authorization policies in a Linux-based domain.IAMDevices, Users
Red Hat Insights
Red Hat Insights is a managed service for the automated discovery and
remediation of issues in Red Hat products.
IT Agent, Config/Patch MgmtDevicesRed Hat OpenShift Container
Red Hat OpenShift is a Kubernetes container platform that allows developers and
operators to manage cloud-native applications throughout the DevOps cycle, for
any cloud.Cloud Infra., ContainersDevicesRed Hat SatelliteRed Hat Satellite is a
system management solution used to deploy, configure, and maintain systems
across physical, virtual, and cloud environments.Config
Mgmt.DevicesRedSealRedSeal’s network modeling and risk scoring platform models
customers' entire hybrid data center of public cloud, private cloud and physical
network.NetworkingDevicesRemediant SecureONE (JITA)Remediant SecureONE is a
Just-In-Time Privileged Access Management (JITA) solution that enables control
and insight over the distribution, usage, and protection of privileged access
across enterprise environments.IAMDevicesRescueAssist (GoToAssist)RescueAssist
(formerly GoToAssist) is a cloud-based toolset for IT and customer support teams
including remote support, IT monitoring, and service desk management.IT Agent,
Config Mgmt., Ticketing, ITAM/ITSMDevicesRHSM Management Portal
Red Hat Subscription Management (RHSM) provides tools that help administrators
track information about support contracts and software subscriptions.
 License management
DevicesRingCentralRingCentral provides cloud-based communication and
collaboration products and services including phone, messaging, video meetings,
and contact center.
Collaboration
Devices, UsersRippling
Rippling provides unified workforce management software to help companies govern
employees’ payroll, benefits, expenses, devices, apps, and more.
HRUsersRiskIQ Digital FootprintRiskIQ Digital Footprint software provides an
active, comprehensive inventory of all of the organization’s IPs, domains, and
hosts.Attack Surface Mgmt., Cyber IntelligenceDevicesRiskReconRiskRecon is a
cloud-based third-party risk management solution.SaaS Management, Risk
ManagementUsersRiskSenseRiskSense provides vulnerability prioritization and
management to dynamically control and measure cybersecurity risk.VA
ToolDevicesRiverbed NetIMRiverbed NetIM is a solution for discovering, modeling,
monitoring, and troubleshooting your infrastructure.Infra
MonitoringDevicesRiverbed SteelCentral Controller (SCC)Riverbed SteelCentral
Controller SCC facilitates administration tasks for groups of SteelHeads,
Interceptors, Mobile Controller, Cores, and Edges.Networking, AppSec,
DevOps DevicesRobin
Robin (now Symworld Cloud) is a Kubernetes-based platform that automates the
deployment, scaling, and lifecycle management of data- and network-intensive
applications.
Cloud Mgmt, DevOps
Users, Devices
RSA ArcherRSA Archer is an integrated risk management platform for managing
multiple dimensions of risk, including IT, operational, third-party, resiliency,
and compliance risk.Risk Mgmt., GRCDevices, UsersRSA SecurID
RSA SecurID provides identity and access management capabilities for on-premise
deployments – in authentication, access management, and identity governance.
IAMUsersRubrikRubrik provides data security and data protection on a single
platform, including: Zero Trust Data Protection, ransomware investigation,
incident containment, sensitive data discovery, and orchestrated application
recovery.Data Security, DLPDevices
Rubrik Polaris
Rubrik provides data security and data protection on a single platform,
including: Zero Trust Data Protection, ransomware investigation, incident
containment, sensitive data discovery, and orchestrated application recovery.
Data Security, DLP
Users
RudderRudder is an open source audit and configuration management utility to
help automate system configuration
config/patch mgmt, IT Agent, Audit/compliance
DevicesRUCKUS Cloud
CommScope RUCKUS Cloud is a network management-as-a-service platform that
enables IT to provision, manage, optimize, and troubleshoot wired and wireless
networks.
Networking, RMM
Devices, Users
runZero
runZero (formerly Rumble Network Discovery) is a cloud-based network discovery
platform that identifies and monitors network-connected IT assets.
NetworkingDevicesSafeBreach
SafeBreach offers a breach and attack simulation platform that helps
organizations locate and remediate security issues.
Audit/ComplianceDevices, UsersSafeConsole
SafeConsole by DataLocker allows administrators to provision, secure, manage,
and audit encrypted USB drives, USB ports, and virtual folders.
DLPUsersSage PeopleSage People is a people management platform that provides
employee record management, payroll. processing and management, talent
management, and more.HR, IAMUsers
SailPoint IdentityIQ
SailPoint IdentityIQ is an identity and access management (IAM) solution that
delivers automated access certifications, policy management, access request and
provisioning, password management, and identity intelligence.
IAMUsersSailpoint Identity ManagerSailPoint provides access governance and
identity management.IAMUsersSailPoint IdentityNow
SailPoint IdentityNow is a SaaS identity and access management (IAM) solution.
IAM, SaaS ManagementUsers, SaaS Data     SalSal is an open-source reporting
solution for managed endpoints.MDM/EMMDevices       

Your browser does not support SVG.click here to download


Salesforce

Salesforce is a customer relationship management solution that gives a single,
shared view of every customer.

CRM, SaaS ManagementUsers. SaaS DataSaltStack Open SourceSaltStack Open Source
is open-source software for event-driven security, cloud and configuration
management.SOAR, Config. Mgmt.DevicesSamsung KnoxSamsung Knox is a built-in
solution used to secure, deploy, and manage Samsung and Galaxy
devices.MDM/EMMDevicesSassafras

Sassafras is IT asset management software that allows organizations to inventory
and manage IT assets.
ITAM/ITSM
Devices
SaviyntSaviynt Enterprise Identity Cloud is a cloud identity and access
governance platform.Cloud Security, IAMUsersSchneider Electric EcoStruxure
ITSchneider Electric EcoStruxure IT provides software and services for IT and
Data Center teams to monitor and manage critical IT infrastructure on-premise,
in the cloud, and at the edge.Data Center Infrastructure Mgmt., (DCIM), Data
SecurityDevicesScienceLogic
ScienceLogic is an IT operations management (ITOM) and AIOps platform for
monitoring and managing hybrid cloud infrastructure.
Infra MonitoringDevicesScopNETScopNET provides an agent-free solution for the
prevention of unauthorized access to corporate networks, integrating switches,
routers and firewalls to detect alien devices.NACDevicesSecdo Endpoint
ProtectionSecdo Endpoint Protection automates endpoint forensic analysis and
cyber investigations for security teams.EDR/EPPDevicesSectigoSectigo provides
digital certificate lifecycle and PKI management.Certificate
ManagementDevicesSecureAuth
SecureAuth is an identity access management security solution that provides
passwordless authentication, multi-factor authentication, SSO, and more.
IAMUsersSecure Code Warrior
Secure Code Warrior is a training platform that helps developers learn to write
secure code.
Security Awareness, Data Security
Users
SecureW2 JoinNow
A suite of network security software that helps organizations deploy
WPA2-Enterprise Wi-Fi security and utilize X. 509 certificates beyond Wi-Fi for
VPN, Web/Browser authentication and SSL (DPI) Inspection.NACDevicesSecureworks
Red Cloak

Secureworks Taegis XDR (formerly Red Cloak TDR) is an endpoint detection and
response technology for the cloud, endpoints and the network.

EDR/EPPDevicesSecureworks Taegis VDR
Secureworks Taegis VDR is a cloud-based vulnerability management solution.
VA ToolDevicesSecureworks Taegis XDR (Red Cloak TDR)Secureworks Red Cloak Threat
Detection and Response (TDR) is a Software as a Service (SaaS) solution that
provides security intelligence analytics to data consumed by third-party
applications.Cyber IntelligenceDevicesSecurityScorecardSecurityScorecard rates
cybersecurity postures of corporate entities through completing scored analysis
of cyber threat intelligence signals for the purposes of third party management
and IT risk management.Risk ManagementDevicesSensuSensu is a cloud monitoring
solution that provides monitoring workflows automation and visibility into
multi-cloud environments.Cloud Mgmt., CloudDevicesSentinelOneSentinelOne is an
endpoint protection solution including prevention, detection, and
response.EDR/EPPDevicesSentinelOne RangerSentinelOne Ranger creates visibility
into your network by using distributed passive and active mapping techniques to
discover running services, unmanaged endpoints, IoT devices, and
mobiles.EDR/EPPDevicesSentra
Sentra offers cloud data security posture management (DSPM), allowing customers
to automatically discover, classify, monitor, and protect cloud data.
Cloud Security, Data Security
Devices
Sepio
Sepio is an asset risk management platform that provides visibility into
organizations' hardware assets and their related security posture.
VA ToolDevices, UsersSerraview 
Serraview is workplace management and space optimization software.
HR
Users
ServiceNowServiceNow provides service management software as a service,
including IT services management (ITSM), IT operations management (ITOM) and IT
business management (ITBM).CMDB, ITAM/ITSM, Ticketing, SaaS Management
Devices, Users, SaaS data
SevOne Data PlatformSevOne Data Platform is a network and infrastructure
management platform that provides monitoring and
analytics.NetworkingDevicesShadowserver
Shadowserver gathers and analyzes data on malicious internet activity including
malware, botnets, DDoS, fraud, and more.
Cyber IntelligenceDevicesSharePoint
SharePoint creates internal websites where organizations store, organize, share,
and access information from any device.

Collaboration
Devices, Users
Shockwave Cloud
Shockwave Cloud helps identify and track cloud related issues and
misconfigurations.  
Cloud Infra, Cloud Mgmt, Cloud Security
Devices, Users
ShodanShodan is a search engine for Internet-connected devices.IoTDevicesSignal
SciencesSignal Sciences is a web protection platform that protects on-premise,
multi-cloud and hybrid-cloud apps, within containers and serverless
functions.AppSec, DevOpsDevicesSimpleMDM
SimpleMDM is a mobile device management solution for Apple devices.
MDM/EMMDevicesSite24x7
Site24x7 offers a performance monitoring solution for websites, servers, cloud
environments, networks, applications, and users.
RMMDevicesSkybox Firewall AssuranceSkybox Firewall Assurance provides automation
of firewall management tasks across different firewall vendors and complex
rulesets.FirewallDevicesSlackSlack is a chat and collaboration hub used to
connect people, information, tools, and services.Collaboration, SaaS
ManagementUsers, SaaS DataSmartsheetSmartsheet is a cloud-based work management
platform that empowers collaboration, drives better decision making, and
accelerates innovation.Collaboration, SaaS ManagementUsers, SaaS DataSmokescreen
 IllusionBlackSmokescreen uses planted decoys to actively lure and capture
attacks on endpoints, networks, and web applications.DeceptionDevices SnapComms
 SnapComms is an internal communications software solution.
Collaboration
UsersSnipe-ITSnipe-IT is a free, open source IT asset management system written
in PHP.ITAM/ITSMDevicesSnowflake Data Warehouse
Snowflake is a data warehouse built on top of the Amazon Web Services or
Microsoft Azure cloud infrastructure, and allows storage and compute to scale
independently.
CollaborationDevices, Users
Snow Software Asset ManagementSnow Software provides Software Asset Management
(SAM) products and services to reduce the risk, cost, and complexity associated
with software assets and licensing.ITAM/ITSMDevices
Snow Software Exceptions
Snow Software Exceptions adapter provides a way to track and manage software
exceptions.
ITAM/ITSM
DevicesSnyk
Snyk is a developer security platform integrating directly into development
tools, workflows, and automation pipelines.
AppSec, Containers, DevOps, Software Development Version Control, VA Tool
Devices, Users
SolarWinds Network Performance MonitorSolarWinds Network Performance Monitor is
a unified IT systems management system that tracks the performance of networks,
applications, systems, and databases on-premises, in a hybrid environment, or in
the cloud.ITAM/ITSMDevicesSolarWinds Service Desk (Samanage)SolarWinds Service
Desk (formerly Samanage) is a unified, cloud-based IT service desk and asset
management platform.Ticketing, CMDB, ITAM/ITSMUsersSonicWallSonicWall
next-generation firewalls (NGFW) provide security, control, and visibility to
maintain an effective cybersecurity posture.FirewallDevices
SonicWall Network Security Manager
SonicWall Network Security Manager enables organizations to deploy and manage
all firewalls, connected switches and access points in one interface.
Firmware Security, NetworkingDevicesSophos CentralSophos Central is a unified
console that provides one place to manage Sophos products, including: endpoint,
mobile, encryption, web, email, server, and wireless
security.EDR/EPPDevicesSophos Cloud OptixSophos Cloud Optix is a public cloud
visibility and threat response solution that detects, responds, and prevents
cloud security and compliance gaps.Cloud Security, CloudDevices, UsersSophos
Endpoint ProtectionSophos Endpoint Protection helps secure workstations by
adding prevention, detection, and response technology on top of the operating
system.EDR/EPPDevicesSOTI MobiControlSOTI MobiControl is a software system for
managing mobile devices in the enterprise.MDM/EMMDevicesSpacewalkSpacewalk is an
open-source systems management solution for system provisioning, patching and
configuration.Config Mgmt.DevicesSpecops InventorySpecops Inventory collects and
reports information on hardware, software, registry, user settings, operating
system, security data, and Active Directory data.IT Agent, Config
Mgmt.DevicesSpiceworksSpiceworks provides network monitoring to capture,
analyze, and monitor network traffic.NetworkingDevicesSplashtopSplashtop is a
remote access and remote support tool.
RMMDevices, UsersSplunkSplunk captures, indexes, and correlates real-time data
in a searchable repository.SIEMDevices, UsersSpycloudSpyCloud is an account
takeover prevention and fraud investigation tool that alerts companies when
their users' data has been compromised in a third-party breach.
AppSecUsersSQLiteThe SQLite adapter imports device information from an SQLite
database.CMDB, ITAM/ITSMDevices, UsersSQL ServerThe SQL Server adapter imports
device information from arbitrary SQL servers: Microsoft SQL Server, MySQL and
PostgreSQL.CMDB, ITAM/ITSM Devices, UsersStackRoxStackRox is a container
security platform that protects cloud-based applications, detects threats, and
manages vulnerabilities, compliance requirements, and configurations.Containers,
VA Tool, Audit/ComplianceDevicesStairwell
Stairwell offers a threat hunting and detection and response platform called
“Inception.”
NDR
Devices
Statseeker
Statseeker is a network performance monitoring solution.
Infra Monitoring
Devices
SAP SuccessFactors
SAP SuccessFactors manages various aspects of HR operations, including
recruitment, employee performance, HR analytics, payroll, and learning.
HRUsersSumo LogicSumo Logic is a cloud-based service for logs & metrics
management for modern apps.Cloud Mgmt., CloudDevices, UsersSunbirdSunbird
dcTrack is a data center infrastructure monitoring product that provides
dashboards and KPIs for remote data center management.Infra
MonitoringDevicesSunflowerSunflower Lab is a mobile app, web app, and custom
software development company.Software Development Version
ControlDevicesSweepaticSweepatic automates continuous mapping, monitoring, and
managing of all internet-connected assets and risks to deliver an attack surface
management platform.Attack Surface Mgmt.DevicesSymantec Cloud Secure Web Gateway
(WSS Agent)Symantec WSS is a cloud-delivered secure web gateway that protects
against malware and enforces policies to access the web.Secure Web
GatewaysDevicesSymantec Cloud Workload Protection (CWP)Symantec Cloud Workload
Protection (CWP) automates security policy enforcement to protect public cloud
workloads.Config Mgmt., EDR/EPPDevicesSymantec Control Compliance Suite
(CCS)Symantec Control Compliance Suite (CCS) is a solution to help identify
security gaps and vulnerabilities and automate compliance assessments for over
100 regulations, mandates, and best practice frameworks including GDPR, HIPAA,
NIST, PCI and SWIFT. Symantec CCS discovers and inventories all networks and
assets including managed and unmanaged devices allowing for assets to be
profiled and ranked for risk potential.VA ToolDevicesSymantec Data Center
Security (DCS) Server AdvancedSymantec Data Center Security Server Advanced
delivers security detection, monitoring, and prevention capabilities for both
physical and virtual server infrastructures.Data SecurityDevicesSymantec
DLPSymantec DLP is a data loss protection and prevention solution. Its
management console, the DLP Enforce Platform, and its reporting tool, IT
Analytics for DLP, allows writing and enforce policies to reduce information
risks.DLP, Data SecurityDevicesSymantec Endpoint Detection and Response
(EDR)Symantec Endpoint Detection and Response (EDR) detects, protects, and
responds to threats to the organization's network.EDR/EPPDevicesSymantec
Endpoint EncryptionSymantec Endpoint Encryption combines full-disk and removable
media encryption with centralized management to protect sensitive information
and ensure regulatory compliance.Encryption, Data SecurityDevicesSymantec
Endpoint Management Suite (Altiris)Symantec Endpoint Management Suite (formerly
Altiris) manages, patches, and remediates application and OS configurations on
desktops, laptops and servers to strengthen endpoint security and maximize user
productivity.ITAM/ITSM, Config Mgmt.DevicesSymantec Endpoint Protection
12.xSymantec Endpoint Protection manages events, policies, and registration for
the client computers that connect to customer networks.EDR/EPPDevicesSymantec
Endpoint Protection 14.xSymantec Endpoint Protection manages events, policies,
and registration for the client computers that connect to customer
networks.EDR/EPPDevicesSymantec Endpoint Protection CloudSymantec Endpoint
Protection Cloud unifies threat protection and device management for PC, Mac,
mobile devices, and servers to protect endpoints from ransomware, zero-day
threats, and other sophisticated attacks.EDR/EPPDevicesSyncro MSPSyncro MSP is a
combined remote monitoring and management (RMM) and professional services
automation (PSA) platform that manages invoicing, credit card payments, help
desk, customer relationship tracking, remote access and support, and more
managed IT services.
RMMDevicesSyxsenseSyxsense is an endpoint security management tool that combines
IT management, patch management, and vulnerability
scanning.EDR/EPPDevicesSysAidSysAid is an integrated ITSM, Service Desk and Help
Desk software solution.ITAM/ITSM, TicketingDevices, Users
Tableau
Tableau is a data visualization and analysis tool used to create charts, graphs,
maps, dashboards, and stories.
Cloud Mgmt., Cyber IntelligenceUsersTailscale
Tailscale is a minimal-configuration WireGuard-based VPN.
Secure Web GatewaysDevices, UsersTalentLMS
TalentLMS is an all-in-one training platform.
Collaboration, HRUsersTalon
Talon is a secure enterprise browser designed to defend against malware and
prevent data loss for managed and unmanaged devices.
Secure Enterprise Browser
DevicesTanium AssetTanium Asset provides an inventory of hardware and software
assets including servers, laptops, and desktops for thorough insight.ITAM/ITSM,
Config Mgmt.DevicesTanium Comply
Tanium Comply conducts vulnerability and compliance assessments against
operating systems, applications, security configurations, and policies.
Audit/Compliance
DevicesTanium DiscoverTanium Discover scans for unmanaged assets with almost no
impact on the network.ITAM/ITSM, Config Mgmt.DevicesTanium InteractTanium
Interact lets you ask questions to gather live endpoint data in order to create
an up-to-date inventory of hardware and software assets.ITAM/ITSM, Config
Mgmt.DevicesTanium Client StatusTanium Client Status provides an inventory of
all clients that have registered with the Tanium platform.ITAM/ITSM, Config
Mgmt.DevicesTCPWave (IPAM)TCPWave IPAM allows administrators to manage their DNS
and DHCP infrastructure for on-premise and cloud
environments.NetworkingDevicesTeamCity
TeamCity is a build management and continuous integration server.
DevOps, Software Development Version Control
Devices
  TeamDynamix
TeamDynamix is an ITSM/ESM and project portfolio management solution with
enterprise integration and automation.
ITAM/ITSM
Users, Devices
TeamViewer
TeamViewer is remote access and remote control computer software, allowing
maintenance of computers and other devices.
RMMDevicesTenable.asmTenable Attack Surface Management (formerly Tenable.asm)
continuously maps the internet and discovers connections to internet-facing
assets.
Attack surface mgmt.
DevicesTenable Identity Exposure (formerly Tenable.ad)


 Tenable Identity Exposure (formerly Tenable.ad) provides real-time security
monitoring for Microsoft Active Directory (AD) infrastructures.

Audit/Compliance
Users
Tenable.io Scan Export CSV
Tenable Vulnerability Management CSV File (Formerly Tenable.io) provides the
ability to import a Tenable Vulnerability Management (Formerly Tenable.io) scan
CSV.
VA ToolDevicesTenable NessusTenable Nessus is a vulnerability scanning platform
for auditors and security analysts.VA ToolDevicesTenable Nessus CSV FileTenable
Nessus CSV File Adapter imports device information from vulnerability scan
data.VA ToolDevicesTenable.ioTenable.io automatically discovers and assesses a
customer's environment for vulnerabilities, misconfigurations, and other
cybersecurity issues.VA ToolDevices, UsersTenable.OT (indegy)Tenable.OT (Indegy)
(previously Indegy Industrial Cybersecurity Suite) protects industrial networks
from cyber threats, malicious insiders, and human error.
OTDevices
Tenable.ot
Tenable.ot provides the ability to identify operational technology (OT) assets,
communicate risk, and prioritize action.
OT
Devices
Tenable.sc (SecurityCenter)Tenable.sc (formerly SecurityCenter) consolidates and
evaluates vulnerability data, prioritizing security risks.VA ToolDeicesTessian
Tessian is a cloud email security platform that prevents email threats and
protects against data loss.
DLP, Email SecurityDevicesThinkst CanaryThinkst Canary is deception technology
deployed as tokens to catch malicious activity.Cloud Security, Data Security,
DeceptionDevicesThousandEyes
ThousandEyes is a network infrastructure monitoring and troubleshooting platform
Infra monitoring, Networking
Devices
Threat StackThreat Stack is a provider of cloud security management and
compliance solutions.Cloud Security, CloudDevices
Thycotic Privilege Manager
Thycotic Privilege Manager mitigates malware and security threats from
exploiting applications by removing local administrative rights and enforcing
least privilege on endpoints.
PAMDevices, UsersThycotic Secret ServerThycotic Secret Server is a Privileged
Access Management (PAM) solution for protecting your privileged accounts,
available both on premise or in the cloud.PAM, IAMUsersToriiTorii is a SaaS
Management Platform letting IT professionals discover, optimize, and control
SaaS usage and costs.SaaS Mgmt, Cloud Infra. & Mgmt.UsersTrellix ePO
Trellix provides hardware, software, and services to investigate cybersecurity
attacks, protect against malicious software, and analyze IT security risks.
EDR/EPP
Devices
Trend Micro Apex One (OfficeScan)Trend Micro Apex One (formerly OfficeScan) is
an endpoint security solution protecting against malware, scripts, injection,
ransomware, memory and browser attacks, and exploits.EDR/EPPDevicesTrend Micro
Cloud App SecurityTrend Micro Cloud App Security provides threat and data
protection for cloud applications and services such as Google G Suite, Dropbox,
Microsoft 365, and more.Cloud Security, CloudUsers
Trend Micro Conformity
Trend Micro Conformity provides real-time monitoring, automated security and
compliance checks, and auto-remediation for cloud infrastructure.
Cloud SecurityDevicesTrend Micro Deep SecurityTrend Micro Deep Security can
automatically virtually patch server, cloud, VDI and application
vulnerabilities.Config Mgmt., EDR/EPPDevices
Trend Micro Vision One
Trend Micro Vision One is a threat defense platform that includes: Advanced
extended detection and response (XDR) capabilities.
EDR/EPP
Devices
Trend Micro worry FreeTrend Micro worry-free is an endpoint and SaaS solution
protecting against malware, scripts, injection, ransomware, memory and browser
attacks, and exploits.EDR/EPPDevicesTripwire EnterpriseTripwire Enterprise is a
security configuration management (SCM) suite that provides fully integrated
solutions for policy, file integrity and remediation management.Config Mgmt.,
EDR/EPPDevicesTrueFortTrueFort offers application behavior analytics, control,
and protection.AppSec, DevOpsDevicesTruffleHogTruffleHog is a security tool that
scans code repositories for vulnerabilities related to secret keys, such as
private encryption keys and passwords.AppSec, DevOpsDevicesTruPortal
TruPortal is a secure, web-based access credential system for physical access.
IAM, IoTDevicesTrustwaveTrustwave is a managed security services provider
focused on managed detection and response.RMMUsersTufin SecureTrackTufin
SecureTrack is a firewall management solution that delivers security,
compliance, and connectivity across physical networks and hybrid
cloud.FirewallDevicesTwistlockTwistlock provides container and cloud native
cybersecurity for teams using Docker, Kubernetes, serverless, and other cloud
native technologies.Containers, CloudDevicesTYCHON
TYCHON is an endpoint analytics and remediation platform that allows users to
search, visualize, remediate, and monitor security compliance across assets.
Attack Surface Mgmt., EDR/EPP, ITAM/ITSM DevicesUdemy
Udemy is an online learning and teaching marketplace.
CollaborationDevicesUbiquiti Networks UniFi ControllerThe UniFi Controller is a
wireless network management software solution for managing multiple wireless
networks using a web browser.NetworkingDevicesUKG Pro (Ultimate Software
UltiPro)UKG Pro (formerly Ultimate Software UltiPro) is cloud-based human
capital management (HCM) software.HCM, IAMUsersUnimus
Unimus is a network configuration and automation tool which provides information
on devices, backups, and configurations.
Networking
Devices
Unisys Stealth
Unisys Stealth transforms existing networks—both on-premises and in the
cloud—into a Zero Trust Network through identity-based microsegmentation.
NetworkingDevicesUnitrends
Unitrends (a Kaseya company) provides all-in-one enterprise backup continuity
and disaster recovery solutions.
DLP
Devices
Universal SSH Key Manager (UKM)
Universal SSH Key Manager (UKM) is an enterprise grade SSH user key management
solution that uses a non-disruptive approach to gain and retain control of the
SSH infrastructure.ITAM/ITSMDevicesUpGuard CyberRiskUpGuard CyberRisk provides
third-party vendor risk and external cyber risk monitoring. The platform has two
main modules: UpGuard BreachSight which monitors company external risk posture
and Vendor Risk monitors and helps manages the risk posture of third party
vendors.Cyber IntelligenceDevices, UsersUpkeep
UpKeep Asset Operations Management Platform is a mobile-first CMMS (computerized
maintenance management system), EAM (enterprise asset management), and IIoT
(industrial internet of things) suite of solutions.
 ITAM/ITSM,  IoT, RMM
Devices
Uptrends
Uptrends is a cloud-based solution for monitoring websites, servers, APIs, and
network performance. Integrate Uptrends with the Axonius Cybersecurity Asset
Management Platform.
Infra Monitoring, RMM
Devices, Users
UptycsUptycs is an osquery-powered security analytics platform pairs a universal
agent with analytics for fleet visibility, intrusion detection, incident
investigation, vulnerability management & compliance for Linux, macOS, Windows,
containers, and cloud workloads.UEM, MDM/EMMDevicesUyuni
Uyuni is an open-source configuration and infrastructure management solution for
software-defined infrastructure.
Config/Patch Mgmt
Devices
vArmour

vArmour details application and user relationships across cloud, data center,
and hybrid IT environments.

Cloud Security, NetworkingDevices, UsersVaronis CSV
Varonis helps prioritize risks around sensitive repositories, monitor the use of
personal accounts, and identify costly misconfigurations. 
Data SecurityDevicesVectra AIVectra AI is a cybersecurity platform that uses AI
to detect and respond to cyberattacks.NetworkingDevicesVeeamVeeam provides
backup, disaster recovery and modern data protection software for virtual,
physical and multi-cloud infrastructures.Deception, Storage
ManagementDevicesVelociraptor
Velociraptor is an open-source endpoint monitoring, digital forensic and cyber
response platform.
EDR/EPP
Devices, Users
VenafiVenafi secures and protects cryptographic keys and digital
certificates.Certificate Mgmt., Data SecurityDevicesVeracode
Veracode provides static, dynamic, and software composition scanning to identify
vulnerabilities in the software development lifecycle.
AppSec, VA ToolDevicesVicarius
Vicarius is a consolidated vulnerability discovery, prioritization, and
remediation solution.  
VA Tool
Devices

Viptela (Cisco) SD-WAN
Cisco SD-WAN (previously Viptela) allows users to establish an SD-WAN overlay
fabric that connects data centers, branches, campuses, and colocation
facilities.
Networking, Secure Web GatewaysDevicesVirtru Gmail Encryption
Virtru Gmail Encryption protects Gmail messages and attachments with end-to-end
encryption while maintaining user ownership and control.
EncryptionUsersVMware Carbon Black App Control (Carbon Black CB
Protection)VMware Carbon Black App Control (formerly Carbon Black CB Protection)
protects critical systems and servers to prevent unwanted changes and ensure
continuous compliance with regulatory mandates.EDR/EPPDevicesVMware Carbon Black
Cloud (Carbon Black CB Defense)VMware Carbon Black Cloud (formerly Carbon Black
CB Defense) is a cloud native platform delivering next-generation antivirus and
endpoint detection and response. This adapter is also compatible with Carbon
Black Cloud Enterprise EDR (formerly CB ThreatHunter) and Carbon Black Cloud
Audit and Remediation (formerly CB LiveOps).EDR/EPPDevicesVMware Carbon Black
EDR (Carbon Black CB Response)VMware Carbon Black EDR (formerly Carbon Black CB
Response) is a threat hunting and incident response solution that delivers
continuous visibility in offline, air-gapped, and disconnected environments
using threat intel and customizable detections.EDR/EPPDevicesVMware Carbon Black
LiveOpsVMware Carbon Black LiveOps is part of the CB Predictive Security Cloud™
(PSC), and allows customers to query endpoints and remediate issues in real
time. Integrate VMware Carbon Black LiveOps with the Axonius Cybersecurity Asset
Management Platform.EDR/EPP, IT AgentDevicesVMware Carbon Black Cloud
WorkloadVMware Carbon Black Cloud Workload is a security solution for workloads,
aiming to reduce the attack surface and to protect critical assets.Attack
Surface Mgmt., EDR/EPPDevicesVMWare ESXi and vSphereVMware ESXi is an
enterprise-class, type-1 hypervisor for deploying and serving virtual computers.
VMware vSphere is VMware's cloud computing virtualization
platform.Virtualization, ITAM/ITSM, CloudDevicesVMware HorizonVMware Horizon is
a platform for secure delivery of virtual desktops and apps across the hybrid
cloud.Virtualization, ITAM/ITSM, CloudDevicesVMware NSXVMware NSX provides an
agile software-defined infrastructure to build cloud-native application
environments.NetworkingDevicesVMware SD-WAN
VMware SD-WAN (formerly by VeloCloud) is a software-based network technology
that virtualizes WAN connections.
NetworkingDevicesVMware vCloud DirectorVMware vCloud Director is a cloud
service-delivery platform.Cloud Mgmt., CloudDevicesVMware vRealize Operations
(vROps)VMware vRealize Operations (vROps) delivers an IT operations management
platform for private, hybrid, and multi-cloud environments that covers the
physical, virtual and cloud infrastructure, including VMs and containers.Cloud
Infra, CloudDevicesVMware Workspace ONE (Airwatch)VMWare Workspace ONE (formerly
AirWatch) provides enterprise mobility management (EMM) software and standalone
management systems for content, applications, and email.MDM/EMM, UEMDevices
vRealize Automation SaltStack Config (formerly SaltStack)
vRealize Automation SaltStack intelligent automation delivers event-driven
security, cloud, and configuration management.
SOAR, Config Mgmt.DevicesVulcanVulcan Cyber is a vulnerability visualization,
assessment and remediation platform.VA ToolDevicesVultrVultr is a global cloud
hosting company offering high-performance cloud servers, cloud GPUs, bare metal,
and cloud storage.
Cloud Infra
Devices, UsersWazuhWazuh is a free, open source and enterprise-ready security
monitoring solution for threat detection, integrity monitoring, incident
response and compliance.EDR/EPPDevicesWasp AssetCloud
AssetCloud is an asset tracking solution that enables organizations to monitor,
audit and report on devices and software.ITAM/ITSMDevices, UsersWebroot Endpoint
ProtectionWebroot Endpoint Protection protects against threats across email,
browsers, files, URLs, ads, apps, and more.EDR/EPPDevicesWeb Server
InformationWeb Server Information provides information about the web server for
a given website domain, including the server type, its version and operating
system, the content management system (CMS) name and its version, the installed
CMS plugins, versions and more.ITAM/ITSMDevicesWhatsUp Gold
WhatsUp Gold is network monitoring software.
NetworkingDevicesWhitehat
WhiteHat provides SAST, DAST, SCA, and IaC security solutions. devices.
AppSec
Devices
Windows DHCP ServerWindows DHCP Server is a networking server used to lease IP
addresses and manage other configuration information.NetworkingDevicesWindows
Management Instrumentation (WMI)Windows Management Instrumentation (WMI) is a
set of specifications from Microsoft for consolidating the management of devices
and applications in a Windows network. WMI provides users with information about
the status of local or remote computer systems.ITAM/ITSMDevicesWindows Server
Failover Clustering (WSFC)Windows Server Failover Clustering (WSFC) is a feature
of the Windows Server platform for improving the high availability (HA) of
applications and services. WSFC is the successor to Microsoft Cluster Service
(MSCS).Cloud Infra, CloudDevicesWindows Server Update Services (WSUS)Windows
Server Update Services (WSUS), previously Software Update Services (SUS),
enables administrators to manage the distribution of updates and hotfixes
released for Microsoft products.Config Mgmt.DevicesWizWiz analyzes all layers of
the cloud stack to identify high-risk attack vectors to be prioritized and
fixed.Cloud SecurityDevicesWordPressWordPress is a web content management
system.
Collaboration
UsersWorkdayWorkday offers software solutions for financial management, human
resources, and planning.ERP, SaaS ManagementUsers, SaaS DataWorkspace One -
Intelligence Report API
Workspace ONE Intelligence reporting uses a cloud-based report storage system to
gather data and create the reports.


MDM/EMM

DevicesWP Engine


WP Engine is a website hosting provider aimed at providing managed hosting
solutions for websites and applications.

Secure Web Gateways,
UsersxAssetsxAssets provides IT asset management software.ITAM/ITSMDevicesXMC
Extreme Management CenterXMC Extreme Management Center is a wired and wireless
network management and automation software.NetworkingDevicesXshield
ColorTokens Xshield is a zero trust-based, cloud-delivered micro-segmentation
solution that secures critical corporate assets, including applications and
workloads.
Cloud Security, Networking 
DevicesZabbixZabbix is an open source monitoring software tool for networks,
servers, virtual machines and cloud services.Cloud Mgmt.,
CloudDevicesZenDeskZendesk is a cloud-based help desk management solution
offering customizable tools to build customer service portal, knowledge base and
online communities.
Collaboration, SaaS Management
Users, SaaS DataZenossZenoss enables monitoring of all physical and virtual
networks as one part of a real-time model that includes both cloud and
on-premises infrastructure.Infra Monitoring, RMMDevicesZeroFoxZeroFox is an
intelligence-based analysis and remediation engine used to detect digital risks
such as phishing, malware, impersonation, and piracy targeted at digital
assets.Cyber Intelligence, Risk ManagementUsersZero NetworksZero Networks
automates the development and enforcement secure remote connectivity and
software-defined segmentation.NACDevices, UsersZertoZerto is a data loss
protection solution that provides disaster recovery, backup and workload
mobility software for virtualized infrastructures and cloud environments.DLP,
Data SecurityDevices
Zerto ZVM
Zerto ZVM is a data loss protection solution that provides disaster recovery,
backup and workload mobility software for virtualized infrastructures and cloud
environments. This adapter supports on-prem deployment.
DLP, Data Security
Devices
 Zimperium  
 Zimperium zIPS is a mobile threat defense solution for enterprises, providing
protection to both corporate owned and BYOD devices.
EDR/EPP
Devices and Users
ZoomZoom is a remote conferencing service that provides video conferencing,
online meetings, chat, and mobile collaboration.Remote Conferencing, SaaS
ManagementDevices, Users, SaaS dataZscaler Web SecurityZscaler Web Security is a
secure Internet and web gateway service that stops malware, advanced threats,
phishing, browser exploits, malicious URLs, botnets, and more.Secure Web
Gateways, SaaS ManagementDevices, Users, SaaS data
Zscaler Workload Segmentation
Zscaler Workload Segmentation is a SaaS solution for applying and managing
network segmentation in cloud and on-prem environments.
NetworkingDevices
Zscaler ZDX
Zscaler Digital Experience (ZDX) is a monitoring solution providing end-to-end
visibility and troubleshooting of end-user performance issues for any user or
application, regardless of location.
RMMDevices, Users














--------------------------------------------------------------------------------

Was this article helpful?
Yes No
Thank you for your feedback! Our team will get back to you
How can we improve this article?
Your feedback
Need more information
Difficult to understand
Inaccurate or irrelevant content
Missing/broken link
Others
Comment
Comment (Optional)
Character limit : 500
Enter comment and email here - optional
Email (Optional)
Email
Notify me about change

Please enter a valid email
Cancel


--------------------------------------------------------------------------------

Previous
System Warnings
Next
1E Tachyon





   © Copyright 2023 Axonius. All Rights Reserved.
 * Privacy Policy
 * Terms and Conditions

 * 
 * 
 * 



Change password!
Changing your password will log you out immediately. Use the new password to log
back in.
Current password
Current password is required
New password
New password must be at least 8 characters long. It should contain at least one
upper and lower case letter, number, and a special character.
Confirm password
Confirm password must be at least 8 characters long. It should contain at least
one upper and lower case letter, number, and a special character.
Confirm password should be same as new password
Update

Change profile
Success!
First Name
First name must have atleast 2 characters. Numbers and special characters are
not allowed.
Last Name
Last name must have atleast 1 characters. Numbers and special characters are not
allowed.
New email
Enter a valid email
Re-enter your password
Enter a valid password
Your profile has been successfully updated.
Update
Logout