docs.axonius.com
Open in
urlscan Pro
2606:4700::6812:79f
Public Scan
Submitted URL: https://hello.axonius.com/api/mailings/click/PMRGSZBCHIZTINRXG42CYITVOJWCEORCNB2HI4DTHIXS6ZDPMNZS4YLYN5XGS5LTFZRW63JPMRXWG...
Effective URL: https://docs.axonius.com/docs/adapters-list
Submission: On November 29 via api from US — Scanned from DE
Effective URL: https://docs.axonius.com/docs/adapters-list
Submission: On November 29 via api from US — Scanned from DE
Form analysis
2 forms found in the DOM<form>
<div class="infoBox">Changing your password will log you out immediately. Use the new password to log back in.</div>
<div class="mb-3"><label>Current password</label> <input type="password" class="form-control" id="currentPassword" name="currentPassword">
<div class="cp_error_message cpErrorCount hidden">Current password is required</div>
</div>
<div class="mb-3"><label>New password</label> <input type="password" class="form-control" id="newPassword" name="newPassword">
<div class="np_error_message cpErrorCount hidden">New password must be at least 8 characters long. It should contain at least one upper and lower case letter, number, and a special character.</div>
</div>
<div class="mb-3"><label>Confirm password</label> <input type="password" class="form-control" id="confirmPassword" name="confirmPassword">
<div class="cop_error_message cpErrorCount hidden">Confirm password must be at least 8 characters long. It should contain at least one upper and lower case letter, number, and a special character.</div>
<div class="password-mismatch cpErrorCount hidden">Confirm password should be same as new password</div>
</div>
<div class="text-right"><button class="updatePassword btn-primary" id="updatePassword">Update</button></div>
</form>
<form id="reader_update_form">
<div class="mb-3 edit-profile">
<div class="profile-container">
<div class="col-full">
<div class="user-image">
<div class="user-image-img"><img src="//cdn.document360.io/static/images/avatar.png"></div><label for="profile-image" class="fal fa-pencil" aria-hidden="true"></label> <input type="file" name="profileImage" id="profile-image" class="d-hide"
accept="image/*">
</div>
</div>
<div class="col-half"><label class="new-email-label">First Name</label> <input class="form-control" id="firstname" name="firstName">
<div class="firstname_error_message counterror">First name must have atleast 2 characters. Numbers and special characters are not allowed.</div>
</div>
<div class="col-half"><label class="new-email-label">Last Name</label> <input class="form-control" id="lastname" name="lastName">
<div class="lastname_error_message counterror">Last name must have atleast 1 characters. Numbers and special characters are not allowed.</div>
</div>
<div class="col-full"><label class="new-email-label">New email</label> <input type="email" class="form-control" id="newEmail" name="newEmail">
<div class="newemail_error_message counterror">Enter a valid email</div>
</div>
<div class="col-full"><label class="new-email-label">Re-enter your password</label> <input type="password" class="form-control" id="confirm_current_password" name="confirmCurrentPassword">
<div class="password_error_message counterror">Enter a valid password</div>
</div>
</div>
<div class="update-email-success-message">Your profile has been successfully updated.</div>
</div>
<div class="text-right"><button class="updateEmail btn-primary" id="profile_update">Update</button>
<div class="update-email-logout"><a href="/Account/Logout" class="btn-primary">Logout</a></div>
</div>
</form>
Text Content
MENU * Start Free Trial * Support Center * Axonius.com * Home Login * Start Free Trial * Support Center * Axonius.com * Home Login * * Axonius Platform * Axonius Platform * Enforcements * * Start Free Trial * Support Center * Axonius.com * Home Login Contents x No matching results found * Using Axonius Platform * Getting Started with Axonius Platform * The Axonius Platform * Getting Started with Axonius * Connect Adapters * Examine a Device Profile * Save a Query * Tag a Device * Create and Execute an Enforcement Set * Create a Dashboard Chart * Generate a Report * Using the Axonius Interface * Getting to Know the Axonius Interface Updated * Searching for Assets * Account Settings * Working with Tables Updated * Using Adapters * Adapters Page * Adding a New Adapter Connection Updated * Adapter Advanced Settings Updated * Advanced Configuration for Adapters * Adapter Discovery Configuration * Adapter Connections Updated * Setting Adapter Ingestion Rules * Adapters Fetch History Updated * Adapters Fetch Events Updated * Discovery Cycle * System Lifecycle and Discovery Log Charts * Axonius Assets * Assets Page * Compute * Compute Overview * Devices Page * Vulnerabilities * Vulnerabilities Updated * Vulnerabilities Profile Updated * Vulnerabilities Repository * Identity * Identity Overview * Users Page * Applications * Applications Overview Updated * Software Management * Software Updated * Software Profile Updated * SaaS Applications * SaaS Applications Repository * Application Risk Score * Application Extensions * Extension Types * User Extensions * Application Settings * Licenses * Expenses * Activities * Tickets * Tickets * Network * Network Overview * Storage * Storage Overview * Alerts & Incidents * Alerts and Incidents Overview * Working with Asset Pages * Setting Page Columns Display * Asset Profile Page * Asset Profile Page - Complex Fields * Exporting Asset Data to CSV * Asset Investigation * Comparison Report for Assets * Asset Actions * Working with Custom Data * Working with Tags * Monitoring Third-Party Tickets * Manually Creating an Asset * Asset Graph * Asset Graph Updated * Queries * Creating Queries with the Query Wizard Updated * Creating Queries Using Filters * Adding Multiple Values to Query Expressions * Using AI Query Assistant to Create Queries * Saved Queries * Queries Page Updated * Managing Queries Updated * Viewing Query History * Enforcement Center * Enforcement Center Overview New * Enforcement Sets * Enforcement Center Page Updated * Creating Enforcement Sets Updated * Managing Enforcement Sets New * Using Predefined Enforcement Sets * Testing an Enforcement Set * Working with Dynamic Value Statements * Dynamic Value Statement Concepts * Creating Enforcement Action Dynamic Value Statements * Enforcement Action Dynamic Value Statement Syntax Table Updated * Useful Tips and Tricks for Working with Dynamic Value Statements New * Using the Syntax Helper Updated * Using the Dynamic Value Statement Wizard * "All" Statement Syntax * Switch/Case Statement Syntax * Using Functions, Operators, and Keywords Updated * Dynamic Value Statement Examples and Use Cases Updated * Scheduling Enforcement Set Runs Updated * Viewing Enforcement Set Run History Updated * Duplicating Enforcement Sets * Viewing Editing and Deleting Enforcement Sets Updated * Terminating an Enforcement Set Run * Running Enforcement Sets * Enforcement Action Index * Workflows * Workflows Page * Creating a Workflow * Workflow Events * Supported Workflow Events * Configuring Third-Party System Webhook Events * Managing Workflows * Duplicating Workflows * Viewing and Editing Workflows * Deleting and Deactivating Workflows * Running a Workflow * Terminating a Workflow Run * Viewing Workflows Run History * Findings Center * Findings Overview * Alerts * Alerts Overview * Viewing Alerts * Viewing Alert Information * Modifying Alert Status * Rules Manager * Rules Overview * Viewing Rules * Viewing Findings Rule Information * Creating a Findings Rule * Managing Findings Rules * Reports * Reports Page * Configuring Reports Updated * Report Content * Data Analytics * Analyzing Query Data - Creating Data Analytics Reports * Pivot Table Filter Operators * Dashboards * Dashboards Page Updated * Managing Dashboards New * System Charts * System Charts * System Lifecycle and Discovery Log Charts * Using Custom Charts * Working with Custom Charts * Chart Query Configuration * Query Intersection Chart * Query Comparison Chart * Field Segmentation Chart Updated * Adapter Segmentation Chart * Field Summary Chart Updated * Query Timeline Chart Updated * Pivot Chart Updated * Matrix Data Chart * Text Only * Working with Charts * Chart Actions * Updating a Dashboard Dynamically * Updating a Chart Dynamically * Setting Asset Count Threshold Colors * Comparing Today's Query Results to a Previous Date * Viewing Query Results from a Historical Date New * Defining a Custom Label for Chart Legends * Hiding the Total Asset Count * Viewing the Asset Preview * Creating a Query on-the-Fly New * Importing and Exporting Dashboards * Importing Dashboards and Queries with the API * Dashboard Templates * Using Dashboard Templates * Visibility and Trends * Comprehensive Asset Inventory * Data Hygiene * Device Inventory Management * Executive Report * Linux Devices Inventory * Mergers & Acquisitions * Mobile Device Inventory * Network Device Inventory * Printer Inventory * ServiceNow Reconciliation * User Inventory Management * Users' Passwords Insights * Windows Servers Inventory * Windows Workstations Inventory * Vulnerabilities Management * CISA Known Exploited Vulnerabilities * Environment Hygiene * Log4Shell Tracker * Security Posture * Cloud Environment Insights * AWS Inventory * Cloud Inventory * Google Cloud Provider Inventory * Microsoft Azure Inventory * Compliance and Risk * CrowdStrike Agent Coverage * Incident Response Device * Incident Response User * NIST 800-53: Identify ID.AM * Software Hygiene * Remote Workforce * Okta Configurations and Insights * Zoom Configurations and Insights * SaaS Management * Azure AD Overview * Google Overview * SaaS Overview * SaaS Configurations Management * SaaS Applications Management * Users Management * Cloud Asset Compliance Center * Cloud Asset Compliance Overview * Cloud Asset Compliance Page * Cloud Compliance Dashboard * Cloud Asset Compliance for AWS * AWS Adapter Configuration for Cloud Asset Compliance * Cloud Asset Compliance for GCP * GCP Configuration for Cloud Asset Compliance * Cloud Asset Compliance for Azure * Cloud Asset Compliance Enforcement Actions * Cloud Asset Compliance Enforcement Actions * Send Email * Create Jira Issue * Activity Logs * Activity Logs Page * System Settings * System Settings - Overview * Using the System Settings Page * Configuring Lifecycle Settings * Lifecycle Settings - Overview * Configuring Discovery Settings * Configuring Retention Settings * Configuring Advanced Lifecycle Settings * Managing GUI * Configuring User Interface Settings * Configuring Login Settings * Managing Access Settings * Managing LDAP and SAML * Using Identity Providers * LDAP Login Settings * SAML-Based Login Settings Updated * SAML Based Authentication - Examples * Example: SAML Based Authentication with Okta Updated * Example: SAML Based Authentication with Microsoft Active Directory (AD) * Example: SAML Based Authentication with Microsoft Azure Active Directory (Azure AD) * Managing External Passwords Updated * Configuring System External URL * Configuring Proxy Settings * Enterprise Password Management Integrations * Akeyless Vault Integration * AWS Secrets Manager Integration * Azure Key Vault Integration * BeyondTrust Password Safe Integration * Click Studios Passwordstate Updated * CyberArk Integration * CyberArk Integration * AAM Installation and Configuration * GCP Secret Manager * HashiCorp Vault Integration * Delinea Integration * Managing Users and Roles * Role Based Access Control (RBAC) Management * Managing Users * Deleting the Default admin Account * Impersonating Users * Managing Roles Updated * Managing Service Accounts Updated * Special Permissions * Permissions List * Working with Data Scopes * Managing Data Scopes * Switching Data Scopes * Managing External Integrations * Configuring Atlassian Opsgenie Settings * Configuring Email Settings * Configuring HTTPS Log Settings * Configuring Jira Settings * Configuring Syslog Settings * Viewing and Configuring Webhook Settings * Configuring ChatGPT Settings * Managing Privacy and Security * Managing Password Settings * Managing Timeout Settings * Managing Certificate Settings * Mutual TLS * Managing Enrichment * Configuring Enrichment Settings * Configuring Data Settings * Managing Custom Fields * Managing Tags * Managing Custom Relationships New * Core Node and Central Core Node Configuration Updated * Configuring Cache and Performance * Configuring Correlation Settings * Configuring Data Aggregation Settings * Configuring CSV Export Settings * Managing API Settings * Configuring Additional System Settings * Manage Tunnels * Displaying Getting Started Checklist * Configuring Notification Settings * Configuring Activity Logs Settings * Configuring Remote Support * Viewing System Information * System Warnings Updated * Connecting Adapters * Adapters List * Adapters 1-A-B * 1E Tachyon * 7SIGNAL Mobile Eye * 1Password Updated * A10 * Absolute * Acunetix * Adaptive Shield * Addigy * Admin by Request * Adobe Updated * Adobe Acrobat Sign * Adobe Workfront Updated * ADP * ADP Vantage HCM * Aha! * Aircall New * Airlock Digital * Airtable Enterprise * Akamai App and API Security * Akamai EAA * AKAssets * Akeyless New * AkiPS * Alcide * Alert Logic * Alert Logic MDR * AlgoSec Firewall Analyzer * Alibaba Cloud * Amazon Web Services (AWS) * Connecting Axonius to AWS Resources * Configuring the AWS Adapter Using Organizations * AWS Parameters * AWS Advanced Settings * AWS Advanced Configuration File * Connecting the AWS Adapter Using an IAM User * Configuring an S3 Bucket to use with Axonius * AWS Permissions * Apache CloudStack * Apple Business Manager * AppNeta * Aqua Security * Arista CloudVision * Arista Extensible Operating System (EOS) * Armis * Aruba * Aruba AirWave * Aruba Central * Aruba ClearPass Updated * Aruba Mobility Master * Asana * Asimily Insight New * AssetPanda Updated * AssetSonar * Assure1 by Federos * Atera * Aternity * Atlassian Jira Assets Platform * Atlassian (Formerly Atlassian Jira Software) Updated * AttackIQ * Attivo BOTSink * Auth0 * Automox * Auvik * Aviatrix * Avi Networks * Avigilon Alta (formerly Openpath) * Awake Security * Axonius Network Discovery * Axonius Users * Azure Classic VMs * Azure Defender for Cloud * Azure Defender for IoT * Azure DevOps Updated * Backblaze * Backstage * Backup Radar * BambooHR * baramundi * Barracuda CloudGen Access (Fyde) * Barracuda CloudGen Firewall * BeyondTrust Cloud Privilege Manager * BeyondTrust Insight SQL * BeyondTrust Password Safe Updated * BeyondTrust Privileged Identity (Lieberman RED Identity Management) * BeyondTrust Privilege Management for Windows * BeyondTrust Remote Support (Bomgar) * BigFix Updated * BigFix Compliance Analytics (formerly SCA) * BigID * BILL * BinaryEdge * Bionic * Bishop Fox * Bitbucket * bitFit * BitSight Security Ratings Updated * BlackBerry Unified Endpoint Management (UEM) * Black Kite * Block64 BlockBox * BloxOne Threat Defense New * BlueCat Enterprise DNS * BloodHound * Bitdefender GravityZone Business Security * BlueCoat ProxySG * BMC Atrium ADDM * BMC Atrium CMDB * BMC Atrium CMDB onPrem * BMC Helix Client Management * BMC TrueSight Automation for Servers * BMC TrueSight Presentation Server * BOSSDesk * Box Platform * Bricata * Brivo * Burp Suite * Buildkite * Adapters C * CA Service Management * CA Spectrum * Cato Networks * CDW New * Censys * Centrify Identity Services * Ceridian Dayforce * Certero * CFEngine * ChangeGear * Checkmarx SAST * Checkmk * Check Point CloudGuard * Check Point Harmony Endpoint * Check Point Harmony Mobile * Check Point Infinity Updated * Chef * Cherwell IT Service Management * Cherwell IT Service Management (SQL) * CHG Meridian New * CipherTrust Manager New * CIS CAT Pro * Cisco * Cisco Advanced Malware Protection (AMP) * Cisco AppDynamics New * Cisco Application Policy Infrastructure Controller (APIC) Updated * Cisco CX Cloud * Cisco DCNM * Cisco DNA Center * Cisco Firepower Management Center * Cisco Identity Services Engine (ISE) * Cisco Industrial Network Director * Cisco Intersight * Cisco Meraki * Cisco Prime * Cisco Secure Workload (Formerly Tetration) * Cisco Security Manager * Cisco Smart Net Total Care * Cisco Stealthwatch * Cisco UCS Central * Cisco UCS Manager * Cisco Umbrella * Cisco Unified Communications Manager (UCM) * Cisco Webex * Citrix ADC * Citrix DaaS * Citrix Director * Citrix Endpoint Management (XenMobile) * Citrix ShareFile * Claroty Updated * CloudCheckr * CloudFit CFS * Cloudflare DNS * CloudFlare Zero Trust * CloudHealth * CoalfireOne * Code42 Incyder * Cofense PhishMe * Cohesity * Collibra * Com Laude New * Commvault * Confluent * ConnectSecure * ConnectWise Automate * Contrast Security * Cradlepoint * CrashPlan * Crestron XiO Cloud * Cribl New * CrowdStrike Falcon * CrowdStrike Falcon Discover * CrowdStrike Falcon Identity Protection (Preempt) * CrowdStrike Falcon Spotlight * CrowdStrike Kubernetes Protection * CSI Leasing * CSV Updated * CSV Legacy Remote File Configuration * CSV - Applications New * CSV - DNS Records New * CSV - Expenses New * CSV - Licenses New * CSCDomainManager * CTL Cider * CyberArk Alero New * CyberArk Endpoint Privilege Manager Updated * CyberArk Idaptive * CyberArk Privileged Account Security * Cybereason Deep Detect & Respond * Cyberhaven * Cyberint Argos Edge * CyCognito Platform Updated * CylancePROTECT * Cymulate * Cynet 360 * Adapters D-G * Darktrace * Databricks * Datadog * Datto RMM (Autotask Endpoint Management) * Deep Instinct * DefenseStorm * Delinea Privilege Manager (Thycotic) * Delinea Secret Server (Thycotic) * Dell Boomi * Dell ECS * Dell EMC Avamar * Dell iDRAC * Dell OpenManage Enterprise * Dell PowerProtect DD Management Center * Dell PowerScale OneFS * Dell PowerStore * Dell RecoverPoint New * Dell TechDirect * Dell Unisphere For Unity * Dell VPLEX * Dell WYSE Management * Device42 * Devo * DigiCert CertCentral * DigiCert PKI Platform (Symantec Managed PKI) * Digital Guardian DLP * DigitalOcean * Digital Shadows SearchLight * Dismap - JSON New * DNS Made Easy * DOJ CSAM * DocuSign * Docker * Domotz * Dragos Platform Updated * Dropbox * Druva Cloud Platform * Duo Beyond * Dynamics CMDB (HelpDesk) * Dynatrace * Eagle Eye Networks New * Easyvista Service Manager * ECI FMAudit * Eclypsium * EdgeScan Fullstack Vulnerability Management * EfficientIP SOLIDserver DDI * Ekran * Elastic Defend New * Elasticsearch * eMASS * Endgame * Entrust New * Equinix * Eracent * Ermetic * ESET Endpoint Security * Exabeam * Exabeam Datalake * Expensify * ExtraHop Reveal(x) * ExtraHop Reveal(x) 360 * ExtremeCloud IQ * Extreme Networks ExtremeControl * Extreme Networks ExtremeWireless WiNG * EyeInspect New * EZOfficeInventory * F5 BIG-IP iControl * F5 BIG-IQ Centralized Management * F-Secure Policy Manager * F-Secure Protection Service for Business (PSB) * Feedly New * FireEye Endpoint Security (formerly HX) * FireEye Endpoint Security Logon Tracker New * FireMon Security Manager * FleetDM * Flexera IT Asset Management * Flexera Software Vulnerability Research * Flexera SVM * FlexNet Manager Suite Cloud * Forcepoint Insider Threat New * Forcepoint ONE * Forcepoint Web Security Endpoint CSV File * Forcepoint ZTNA Private Access * Foreman * ForeScout CounterACT * Forescout Switch Plugin * ForgeRock * FortiClient EMS * FortiEDR (enSilo) * FortifyData * Fortify Software Security Center * FortiNAC * Fortinet FortiGate * FortiPortal * Forward Networks * FreeIPA * Freshservice * Frontline VM * Genian * Gigamon GigaVUE-FM (Fabric Manager) * Gigamon ThreatINSIGHT * GitHub Updated * GitLab * GlobalSign Atlas * GLPI * GluWare * GoDaddy * Gong * Google Chronicle Security * Google Cloud Platform (GCP) * Google BigQuery * Google Sheets * Google Workspace (G Suite) Updated * GoSecure Titan * Greenbone Vulnerability Management (OpenVAS) * Greenhouse * GreyNoise * GRR Rapid Response * Guardicore * Gytpol * Adapters H-L * HAProxy * Halcyon * HashiCorp Consul * HashiCorp Nomad * Have I Been Pwned * Hawk * Heimdal Security * Hibob * Hitachi Operations Center * Hoxhunt New * HP Anyware * HP Device Manager (HPDM) * HP Integrated Lights-Out (iLO) * HP Network Node Manager i (NNMi) * HP NNMi XML File * HPE Intelligent Management Center (IMC) * HPE OneView * HPE SAN * HPE Switches New * HP Web Jetadmin * Huawei eSight * HubSpot Updated * Huntress * HYCU * HyperSQL * HYPR Passwordless * IBM Cloud * IBM Guardium * IBM Hardware Management Console (HMC) * BigFix Inventory * IBM License Metric Tool * IBM Maximo New * IBM Power Hardware Management Console (HMC) * IBM QRadar * IBM Spectrum Protect Plus * IBM Tivoli Application Dependency Discovery Manager (TADDM) * IBM VPC * IBM MaaS360 with Watson * IBM UrbanCode * iboss cloud * iCIMS * Icinga * IFS Assyst * IGEL Universal Management Suite (UMS) * Illumio Adaptive Security Platform (ASP) * Illusive Networks * ImmuniWeb New * Imperva Data Activity Monitoring (DAM) Updated * Imperva WAF * Imperva WAF Cloud * Infinibox * Infinipoint * Infoblox BloxOne * Infoblox DDI * Infoblox NetMRI * Infor EAM * Intel DCMC * Intel EMA * Intezer Protect * Intrigue * Intruder.io * Invicti * IP Fabric * Island * IT Glue * iTop * Ivanti Connect Secure * Ivanti Endpoint Security * Ivanti Neurons Updated * Ivanti Patch Management * Ivanti Security Controls * Ivanti Service Manager Updated * Ivanti Unified Endpoint Manager (Landesk) * Jamf Pro Updated * Jamf Protect * Jamf Trust New * JetPatch * JFrog Artifactory * Jira Service Management Updated * JSON * JumpCloud * Juniper Junos * Juniper Junos Space * Kandji * Kaseya VSA * Kaspersky Security Center * Keeper * Kemp Central * Kenna Security Platform * Keycloak * Keyfactor * KnowBe4 * Kolide K2 * Kubernetes * Lacework Updated * Lakeside SysTrack * Landscape * Lansweeper * Lansweeper Cloud Updated * LastPass * LaunchDarkly * Lenel OnGuard New * LibreNMS * LimaCharlie * Linode * Linux SSH * Litmos * LogicMonitor * LogMeIn Central * L0phtCrack 7 * Lookout Mobile Endpoint Security * LogRhythm * Lucidchart * Adapters M-N * Malwarebytes Endpoint Security (On-Prem Platform) * Malwarebytes Endpoint Protection (Cloud Platform) * ManageEngine Endpoint (Desktop) Central and Patch Manager Plus * ManageEngine Firewall Analyzer * ManageEngine Mobile Device Management * ManageEngine Network Configuration Manager New * ManageEngine OpManager * ManageEngine OpUtils * ManageEngine PasswordManagerPro New * ManageEngine ServiceDesk Plus * ManageEngine Service Desk Plus (SDP) - Deprecated * Mandiant * MarkMonitor * Masscan * McAfee ePolicy Orchestrator (ePO) * McAfee MVision Cloud * Medigate * Men&Mice DNS Management * Micro Focus GroupWise * Micro Focus Universal CMDB * Micro Focus Server Automation (HP Server Automation, Opsware) * Micro Focus SiteScope * Microsoft Active Directory (AD) Updated * Microsoft Azure Updated * Microsoft Azure Active Directory (Azure AD) and Microsoft Intune Updated * Microsoft BitLocker Administration and Monitoring (MBAM) * Microsoft Cloud App Security Updated * Microsoft Defender for Endpoint (Microsoft Defender ATP) Updated * Microsoft Dynamics 365 * Microsoft Endpoint Configuration Manager (MECM) Updated * Microsoft Hyper-V * Microsoft Key Management Service (KMS) * Microsoft Lync * Microsoft SCOM * Microsoft System Center Virtual Machine Manager * Milestone XProtect * Mimecast * Minerva Labs Endpoint Malware Vaccination * Miro * Mist * MobileIron EMM * Monday Updated * MongoDB * MoroCloud * Mosyle * MSP Manager * Mulesoft * Mulesoft Runtime Fabric * Mutiny * MVISION ePO * N2WS * N-able * N-Able N-Sight RMM * Nagios Core * Nagios XI * Namecheap * Nasuni * Nectus * NetApp * NetApp Active IQ Unified Manager * NetBox * NetBrain Integrated Edition * Netdisco * NetIQ Advanced Authentication * NetIQ Identity Manager * NetMotion Mobility * Netskope * NetSpyglass * NetWitness NDR New * Neustar UltraDNS * New Relic * NextDLP * Nexthink * Ninja One (RMM) * NodeZero * Notion * Nozomi Guardian and CMC * Netwrix Auditor * Nucleus Security * Nutanix Prism Central * Nutanix AHV * Nmap Security Scanner * Adapters O-R * Observium * ObserveIT * Obsidian Security * Okta * OmniVista 2500 NMS * OnDMARC * OneLogin * Onspring-Compass New * Oomnitza Enterprise Technology Management * Opal * openDCIM * OpenLDAP * OpenStack * OpenText ZENworks New * OpenVPN Cloud * Opsgenie * OpsRamp * OPSWAT MetaAccess * Opsview * Oracle Cloud * Oracle Enterprise Manager * Oracle Fusion HCM Cloud New * Oracle Ksplice * Oracle Netsuite New * Oracle VM * Orca Cloud Visibility Platform Updated * Ordr New * Ostendio New * Outpost24 * oVirt * PacketFence * PagerDuty * Palo Alto Networks Cortex * Palo Alto Networks Cortex XDR * Palo Alto Networks Cortex Xpanse * Palo Alto Networks IoT Security (Zingbox) * Palo Alto Networks Panorama * Palo Alto Networks Prisma Access * Palo Alto Networks Prisma Cloud * Palo Alto Networks Prisma Cloud Workload Protection * Palo Alto Traps Endpoint Security Manager * Panorays * PaperCut * Parsec * Paycor * Paylocity * PDQ Inventory * Pentera New * PeopleHR * PeopleSoft New * Persistent Systems Radia Endpoint Manager * Phosphorus * phpIPAM * Pingboard * PingFederate * PingID * PingOne Directory * Pivotal Cloud Foundry * PKWARE * PluralSight * Polymer DLP * Portnox Clear * Portnox Core * Prey * Pritunl New * PrivX * Projector PSA * Promisec Endpoint Manager * Proofpoint * Proofpoint Endpoint DLP * Proofpoint's ObserveIT Insider Threat Management Platform * Proofpoint POD * Proofpoint Security Awareness Training * Proofpoint TAP Updated * Proofpoint ZTNA (Meta) * Proxmox Virtual Environment (VE) * PRTG Network Monitor * Pulseway * Pulumi Cloud Engineering Platform * Puppet * Pure Storage Pure1 Updated * Quadrant * Qualys Cloud Platform * Qualys Container Security New * Quest KACE Endpoint Systems Management Appliances * Radiflow * Rancher Updated * Randori * Rapid7 Insight Account Platform * DivvyCloud * Rapid7 InsightIDR Updated * Rapid7 InsightVM * Rapid7 Nexpose and InsightVM * Rapid7 Nexpose Warehouse Updated * Rapid7 Threat Command * RecordedFuture * Red Canary * Red Hat Automation Controller (Ansible Tower) * Red Hat Customer Portal * Red Hat IdM * Red Hat Insights * Red Hat OpenShift Container * Red Hat Satellite * RedSeal * Remediant SecureONE (JITA) * RescueAssist (GoToAssist) New * RHSM Management Portal * RingCentral * Rippling * RiskIQ Digital Footprint * RiskRecon New * RiskSense * Riverbed NetIM * Riverbed SteelCentral Controller (SCC) * Robin * RSA Archer * RSA SecurID * Rubrik * Rubrik Polaris * RUCKUS Cloud * Rudder * runZero * Adapters S * SafeBreach * SafeConsole * Sage People * SailPoint IdentityIQ Updated * SailPoint Identity Manager * SailPoint IdentityNow * Sal Updated * Salesforce * Samsung Knox * SAP Concur * SAP Success Factors * Saviynt * Sassafras * Schneider Electric EcoStruxure IT * ScienceLogic * ScopNET * Sectigo Updated * SecureAuth * Secure Code Warrior * Secureworks Red Cloak * Secureworks Taegis VDR * Secureworks Taegis XDR (Red Cloak TDR) * SecureW2 JoinNow * SecurityScorecard * Sensu * SentinelOne Updated * SentinelOne Ranger * Sentra * Sepio Updated * Serraview * ServiceNow Updated * SevOne Data Platform * Shadowserver * SharePoint * Shockwave Cloud * Shodan * Signal Sciences * SimpleMDM * Site24x7 * Skybox Firewall Assurance * Slack Updated * Smartsheet * Smokescreen IllusionBlack * Snapcomms * Snipe-IT * Snowflake Data Warehouse New * Snow Software Asset Management * Snow Software Exceptions * Snyk * SolarWinds Network Performance Monitor Updated * SolarWinds Service Desk (Samanage) * SonicWall * SonicWall Network Security Manager * Sophos Central Updated * Sophos Cloud Optix * Sophos Endpoint Protection * SOTI MobiControl * Spacewalk * Specops Inventory * Spiceworks * Splashtop * Splunk * Spycloud * SQLite * SQL Server * StackRox New * Stairwell * Statseeker * Sumo Logic * Sunbird * Sunflower * Sweepatic * Symantec Cloud Workload Protection (CWP) * Symantec Cloud Secure Web Gateway (WSS Agent) * Symantec Control Compliance Suite (CCS) * Symantec Data Center Security (DCS) Server Advanced * Symantec DLP * Symantec Endpoint Detection and Response (EDR) * Symantec Endpoint Encryption * Symantec Endpoint Management Suite (Altiris) * Symantec Endpoint Protection 12.x * Symantec Endpoint Protection 14.x * Symantec Endpoint Protection Cloud * Syncro MSP * SysAid * Syxsense * Adapters T-Z * Tableau * Tailscale * TalentLMS * Talon * Tanium Asset * Tanium Comply * Tanium Discover * Tanium Interact * Tanium Client Status * TCPWave (IPAM) * TeamDynamix Updated * TeamCity * TeamViewer * Tenable.asm * Tenable Identity Exposure (formerly Tenable.ad) * Tenable.io Updated * Tenable.io Scan Export CSV * Tenable Nessus Updated * Tenable Nessus CSV File Updated * Tenable.OT (Indegy) * Tenable.ot * Tenable.sc (SecurityCenter) Updated * TeQube Teqtivity * Tesma New * Tessian * Thinkst Canary * ThousandEyes * Threat Stack * TOPdesk Enterprise Service Management * Torii * Trend Micro Apex One (OfficeScan) * Trend Micro Cloud App Security * Trend Micro Conformity * Trend Micro Deep Security Updated * Trend Micro Vision One * Tripwire Enterprise * TrueFort * TruffleHog New * TruPortal * Trustwave * Tufin SecureTrack * Twistlock Updated * Trend Micro Worry-Free * Tychon * Ubiquiti Networks UniFi Controller * Udemy * UKG Pro (Ultimate Software UltiPro) Updated * Unimus * UpGuard CyberRisk * UpKeep * Uptycs Updated * Unisys Stealth * Unitrends * Universal SSH Key Manager (UKM) * Uptrends * Uyuni * vArmour * Varonis CSV New * Vectra AI * Veeam * Velociraptor * Venafi * Veracode * Vicarius * Viptela (Cisco) SD-WAN * Virtru Gmail Encryption * VMware Carbon Black App Control (Carbon Black CB Protection) * VMware Carbon Black Cloud Workload * VMware Carbon Black EDR (Carbon Black CB Response) * VMware Carbon Black LiveOps * VMware Carbon Black Cloud (Carbon Black CB Defense) * VMware ESXi and vSphere Updated * VMware NSX * VMware SD-WAN Updated * VMWare Tanzu * VMware vCloud Director * VMware vRealize Operations (vROps) * VMware Workspace ONE (AirWatch) * vRealize Automation SaltStack Config (formerly SaltStack Enterprise) * Vulcan * Vultr * VMware Horizon * Wasp AssetCloud * Wazuh * Webroot Endpoint Protection * Web Server Information Updated * WhiteHat Updated * Windows DHCP Server * Windows Management Instrumentation (WMI) Updated * Windows Server Failover Clustering (WSFC) * WhatsUp Gold * Wiz * WordPress * Workday * Workspace One - Intelligence Report API * WP Engine * xAssets New * XMC Extreme Management Center * Xshield * Windows Server Update Services (WSUS) * Zabbix Updated * ZenDesk Updated * Zenoss New * ZeroFox * Zero Networks * Zerto * Zerto ZVM * Zimperium * Zoom Updated * Zscaler Web Security * Zscaler Workload Segmentation * Zscaler ZDX * Deploying the Axonius System * Axonius Deployment Options * Axonius Cybersecurity Asset Management: Customer-hosted (on-premise / private cloud) * Axonius-hosted (SaaS) * System Deployment - Deploying the Virtual Appliance * Configuring the Axonius Platform * Working With Additional Axonius Collector Nodes * Installing Axonius OVA File on a Local VMware Workstation * Central Core Architecture * Core Node and Central Core Node Configuration Updated * Installing Axonius Tunnel * Release Notes * Axonius 6.0 * What's New in Axonius Version 6.0 * What's New in Axonius 6.0.10 New * What's New in Axonius 6.0.8 New * What's New in Axonius 6.0.6 * What's New in Axonius 6.0.4 * What's New in Axonius 6.0.2 * Axonius 6.0 Ongoing Adapter and Enforcement Action Updates * Previous Releases * Axonius 5.0 * What's New in Axonius 5.0 New * What's New in Axonius 5.0.7 * What's New in Axonius 5.0.6 * What's New in Axonius 5.0.5 * What's New in Axonius 5.0.3 * What's New in Axonius 5.0.2 * What's New in Axonius 5.0.1 * What's New in Axonius 5.0 compared to 4.8.8 * Axonius 5.0 Ongoing Adapter and Enforcement Action Updates * Axonius 4.8 * What's New in Axonius 4.8 * What's New in Axonius 4.8.8 * What's New in Axonius 4.8.7 * What's New in Axonius 4.8.6 * What's New in Axonius 4.8.5 * What's New in Axonius 4.8.4 * What's New in Axonius 4.8.3 New * What's New in Axonius 4.8.2 * What's New in Axonius 4.8.1 * What's New in Axonius 4.8.0 compared to 4.7.8 * Axonius-4.8 Ongoing Adapter and Enforcement Actions Updates * Axonius 4.7 * What's New in Axonius 4.7 * What's New in Axonius 4.7.8 * What's New in Axonius 4.7.7 * What's New in Axonius 4.7.6 * What's New in Axonius 4.7.5 * What's New in Axonius 4.7.4 * What's New in Axonius 4.7.1 * What's New in Axonius 4.7.0 compared to 4.6.18 * Axonius-4.7 Adapter and Enforcement Actions Updates * Axonius 4.6 * What's New in Axonius 4.6 * What's New in Axonius 4.6.18 * What's New in Axonius 4.6.16 * What's New in Axonius 4.6.15 * What's New in Axonius 4.6.14 * What's New in Axonius 4.6.13 * What's New in Axonius 4.6.12 * What's New in Axonius 4.6.17 * What's New in Axonius 4.6.8 * Axonius 4.6 Adapter and Enforcement Action Updates * Axonius-4.6 On-Going Adapter and Enforcement Actions Updates * Axonius 4.1-4.5 * Axonius 4.5 Adapter and Enforcement Action Updates * Release Notes - Axonius 4.5 * What's New in Axonius - Axonius 4.4 * What's New in Axonius - Axonius 4.3 * What's New in Axonius 4.1 * Axonius 3.x Releases * What's New in Axonius 3.13 * What's New in Axonius 3.12 * What's New in Axonius 3.11 * What's New in Axonius 3.10 * What's New in Axonius 3.9 * What's New in Axonius 3.8 * What's New in Axonius 3.7 * What's New in Axonius 3.6 * What's New in Axonius 3.5 * What's New in Axonius 3.4 * What's New in Axonius 3.3 * What's New in Axonius 3.2 * What's New in Axonius 3.1 * What's New in Axonius 3.0 * Axonius 2.x Releases * What's New in Axonius 2.15 * What's New in Axonius 2.14 * What's New in Axonius 2.13 * What's New in Axonius 2.12 * What's New in Axonius 2.11 * What's New in Axonius 2.10 * What's New in Axonius 2.9 * What's New in Axonius 2.8 * What's New in Axonius 2.7 * What's New in Axonius 2.6 * What's New in Axonius 2.5 * Use Cases * Use Cases * Finding Endpoints Missing Agents * Finding Endpoint Agents Not Functioning Correctly * Finding Devices Not Being Scanned For Vulnerabilities * Discovering Cloud Instances Not Being Scanned For Vulnerabilities * Finding Unmanaged Devices * Finding Rogue Devices On Privileged Networks * Accelerate Incident Response Investigations * CMDB Reconciliation & Maintenance * Find Ephemeral Devices * Find Unsanctioned Software * Compiling a User Inventory * Managing Windows & Linux Servers * Finding Obsolete Devices * Identifying and Prioritizing Vulnerabilities * Identifying Shadow SaaS Applications * Optimizing SaaS Spend * Identifying Misconfigured SaaS App Settings * Identifying Suspicious User Behavior * Axonius-as-a-Service Trials * Activating Your Axonius-hosted (SaaS) Trial * What's New in Axonius Version 6.0 * Axonius API * Axonius REST API and Python API Client * Import/Export Dashboards and Queries via API Powered by -------------------------------------------------------------------------------- Adapters List * 29 Nov 2023 * 81 Minutes to read Share this * Print * Share Twitter Linkedin Facebook Email * Dark Light * PDF Contents ADAPTERS LIST * Updated on 29 Nov 2023 * 81 Minutes to read * Print * Share Twitter Linkedin Facebook Email * Dark Light * PDF -------------------------------------------------------------------------------- Article Summary Share feedback Thanks for sharing your feedback! To aggregate and correlate asset data, Axonius securely fetches data from your IT, Security, and business solutions using pre-built integrations with hundreds of security and management solutions, known as adapters. The table below describes each of the adapters supported. Use the Search box to search for adapters, and to filter the display by 'Solution Categories' and 'Types of Assets Fetched'. For details about connecting adapters, see the Adapters Page. Adapter LogoAdapter NameDescriptionSolution CategoriesTypes of Assets Fetched1E Tachyon1E Tachyon is a remote endpoint management solution built on a single agent for speed, visibility, and control of all endpoints.UEM, MDM/EMMDevices1Password1Password is a password manager providing a place for users to store various passwords, software licenses, and other sensitive information in a virtual vault. Password Management Users7SIGNAL Mobile Eye 7SIGNAL Mobile Eye is a Wi-Fi performance management and monitoring SaaS application that helps enterprises optimize wireless device connectivity. Networking, Infra monitoring DevicesA10 A10 provides load balancing for application deliverability, availability, and security. Cluster Management, NetworkingDevicesAbsoluteAbsolute specializes in software to manage and secure Windows computers and Android smartphones.EDR/EPP, MDM/EMMDevicesAcunetix Acunetix is an automated web application security testing tool that checks for vulnerabilities like SQL Injection, Cross-site scripting, and other exploitable vulnerabilities. AppSecDevices, UsersAdaptive ShieldAdaptive Shield is a security posture management platform used to help businesses manage their cloud services.Cloud Security, CloudUsersAddigy Addigy is a real-time Apple mobile device management platform (MDM) that is combined with live agent capabilities. MDM/EMMDevices, UsersAdmin by Request Admin By Request provides centralized and auditable management of local admin rights. PAMDevices, UsersAdobeAdobe offers digital content creation and publication applications across 20+ areas including graphics, photography, illustration, multimedia/video, and more. Collaboration, SaaS Management Users, SaaS Data Adobe Acrobat Sign Adobe Sign allows users to create, edit, collaborate, e-sign, and share PDFs, on any device. Collaboration Users Adobe Workfront Adobe Workfront is work and project management software for enterprise resource management, cross-team collaboration, and strategic planning. CollaborationUsersADPADP is a provider of human resources management software and services.HR, IAMUsers ADP Vantage HCM ADP Vantage HCM is an all-in-one HR platform that includes payroll, benefits, and talent management administration. HRUsersAha! Aha! is a platform enabling customers to build roadmaps, manage projects and development. Collaboration, TicketingUsersAircall Aircall is a cloud-based phone system.CollaborationUsersAirlock Digital Airlock Digital is an application whitelisting software provider.EDR/EPP, Data SecurityDevicesAirtable EnterpriseAirtable Enterprise is a spreadsheet-database hybrid serving as a low-code platform for building collaborative apps.CollaborationUsersAkamai EAA Akamai Enterprise Application Access (EAA) is part of the edge platform that helps companies secure applications that run behind a firewall or in a public cloud. Cloud SecurityDevices, UsersAkamai App and API Security Akamai App and API Security provides protection against web application attacks including SQL injections, cross-site scripting, and remote file inclusion. AppSec, FirewallDevicesAKAssets Akamai AKAssets provides data on users, components and applications. ITAM/ITSMDevices, UsersAkeyless Akeyless is a SaaS-based solution that provides secrets management and zero-trust access. Password ManagementUsersAKIPS AKIPS is a secure on-prem, multi-vendor network-monitoring system for the enterprise market. Infra MonitoringDevicesAlcideAlcide provides cloud and Kubernetes discovery, K8s audit and compliance scanner, microservices anomaly detection and security policies management and enforcement.Cloud Security, CloudDevicesAlert LogicAlert Logic provides vulnerability and asset visibility, endpoint protection, threat detection, incident management, and a web application firewall.EDR/EPPDevicesAlert Logic MDRAlert Logic delivers managed detection and response (MDR) with comprehensive coverage for public clouds, SaaS, on-premises, and hybrid environments.EDR/EPP, NDRDevicesAlgoSec Firewall Analyzer AlgoSec Firewall Analyzer (AFA) is a device analysis solution that builds a model of users' network security postures and Layer 3 connectivity. NetworkingDevicesAlibaba CloudAlibaba Cloud provides cloud computing services and cloud Infrastructure as a service.Cloud Infra, CloudDevices Amazon Web Services (AWS)Amazon Web Services (ECS/EKS/EC2) includes the high-performance container orchestration service that supports Docker containers and containerized applications on AWS, Kubernetes Management Infrastructure across Multiple AWS Zones, as well as the EC2 instances themselves.Cloud Infra, CloudDevices, UsersApache CloudStackApache CloudStack is open-source software used to deploy and manage large networks of virtual machines.Infra Monitoring, VirtualizationDevicesApple Business Manager Apple Business Manager supports deployment and remote MDM enrollment of corporate-owned Apple devices. MDM/EMM, RMMDevicesAppNeta AppNeta provides monitoring of network paths, flows, packets, and web applications. Networking, RMMDevicesAqua SecurityAqua Security provides container and cloud native cybersecurity for teams using Docker, Kubernetes, serverless, and other cloud native technologies.Containers, CloudDevicesArista CloudVisionCloudVision Portal (CVP) is the web-based GUI for the CloudVision platform, which enables network-wide workload orchestration and workflow automation.NetworkingDevicesArista Extensible Operating System (EOS)Arista Extensible Operating System (EOS) is the core of Arista cloud networking solutions for next-generation data centers and cloud networks.NetworkingDevicesArmisArmis is an agentless IoT security solution that lets enterprises see and control any device or network.IoT DevicesArubaAruba connects to Aruba switches and routers.NetworkingDevicesAruba AirWaveAruba AirWave is a network management system for wired and wireless infrastructure and provides granular visibility into devices, users, and applications on the network.NetworkingDevicesAruba CentralAruba Central is a unified cloud-based network operations, assurance and security platform that simplifies the deployment, management, and optimization of wireless, wired and WAN environments.NetworkingDevicesAruba ClearPassAruba ClearPass is a network access control (NAC) solution that allows enterprises to identify devices, enforce policies, and remediate threats.NAC Devices Aruba Mobility Master Aruba Mobility Master enables deployment and management of up to 1,000 Mobility Controllers to scale large deployments. Integrate Aruba Mobility Master with the Axonius Cybersecurity Asset Management Platform. NetworkingDevicesAsana Asana is a web and mobile work management platform designed to help teams organize, track, and manage their work. Collaboration, SaaS Management Users, SaaS data Asimily Insight Asimily provides a vulnerability management platform that scans for devices, vulnerabilities and attack paths, and helps organizations prioritize and manage risk for IoMT, IoT, and laboratory devices. IoT Devices AssetPandaAssetPanda is a cloud-based asset tracking and management platform.ITAM/ITSMDevices, UsersAssetSonar AssetSonar maintains, tracks, and manages a single source of truth for the IT asset landscape. ITAM/ITSM Devices Assure1 by FederosFederos Assure1 is an automated service assurance platform for operational intelligence. It collects and normalizes performance-related information, allowing users to monitor and manage critical networks and services.Infra MonitoringDevicesAteraAtera is a cloud-based remote monitoring and management (RMM) platform for MSPs and IT professionals.ITAM/ITSM, RMMDevicesAternityAternity is a device performance monitoring solution that provides insights into performance and health of laptops, desktops, VDI, and mobile devices, along with self-healing capabilities to automatically resolve issues.ITAM/ITSM, Config Mgmt.DevicesAtlassian Jira Assets PlatformAtlassian Jira Assets Platform links software with Jira to populate an asset inventory, letting users query for assets and link them to issues.ITAM/ITSMDevicesAttackIQAttackIQ is a breach and attack simulation that allows for remote testing and continuous security validation.Attack Surface MgmtDevices Jira Service Management Jira Service Management (Service Desk) enables to receive, track, manage, and resolve requests from customers.ITAM/ITSM, CMDB, TicketingDevices, UsersAtlassian (Formerly Atlassian Jira Software)Atlassian Jira Software is a work management tool for various use cases, from requirements and test case management to agile software development.DevOps, SaaS ManagementUsers. SaaS DataAttivo BOTSinkAttivo BOTSink offers network-based threat deception for post-compromise threat detection.DeceptionDevicesAuth0 Auth0 provides authentication and authorization solutions for web, mobile, and legacy applications. IAMUserAutomoxAutomox is a cloud-based patch and configuration management solution for Windows, Linux, Mac, and third-party software.Config Mgmt.Devices, UsersAuvikAuvik is an IT asset and network monitoring solution for managing entire network infrastructures, including physical servers, data centers, workstations and more.NetworkingDevicesAviatrix The Aviatrix cloud network platform delivers a single platform for multi-cloud networking, security, and operational visibility. Cloud Mgmt.DevicesAvi Networks Avi Networks (now part of VMware) delivers multi-cloud application services used for load balancing, web application firewall and container ingress. Cloud Infra, Cloud Mgmt.DevicesAvigilon Alta (formerly Openpath) Avigilon Alta (formerly Openpath) is a cloud-based physical access control solution for unified video and access control. IAMUsersAwake SecurityAwake Security is a network traffic analysis solution that's capable of detecting and visualizing behavioral, mal-intent and compliance incidents.NetworkingDevicesAxonius Network Discovery Axonius-provided Axonius Network Discovery adapter, performing standardized network discovery. Network Devices Axonius UsersThe Axonius Users adapter fetches users with Axonius credentials and their permissions using our API client.ITAM/ITSMUsersAzure Classic VMsMicrosoft Azure is a cloud computing service created by Microsoft for building, testing, deploying, and managing applications and services through a global network of Microsoft-managed data centers. This adapter fetches information for classic VMs (deprecated by Microsoft).Cloud Infra, VirtualizationDevicesAzure Defender for IoTAzure Defender for IoT is a solution for asset discovery, vulnerability management, and threat detection for Internet of Things (IoT) and operational technology (OT) devices.OT/IoT DevicesAzure DevOpsAzure DevOps is a Microsoft product that provides version control, reporting, requirements management, project management, automated builds, testing and release management capabilities.DevOpsUsersBackblazeBackblaze provides cloud backup and storage services. Cloud InfraDevices, UsersBackstageBackstage is an open platform for building developer portals. DevOps DevicesBackup RadarBackup Radar is a backup monitoring, reporting, and compliance solution.Infra MonitoringDevicesBambooHRBambooHR is HR software used to collect, maintain, and analyze data for hiring, onboarding employees, and managing company culture.HR, IAM, SaaS ManagementUsers, SaaS databaramundibaramundi provides organizations with cross-platform management of networked endpoints in IT and manufacturing environments.UEM, MDM/EMMDevicesBarracuda CloudGen Access (Fyde)Barracuda CloudGen Access (formerly Fyde) provides granular access for enterprise apps and workloads, and continuously monitorsaccess requests to enforce policy controls.IAM Devices, Users Barracuda CloudGen Firewall Barracuda CloudGen Firewall provides real-time network protection against a broad range of network threats, vulnerabilities, and exploits. NetworkingDevices, UsersBeyondTrust Cloud Privilege Manager BeyondTrust Cloud Privilege Manager delivers privilege management and application control, allowing organizations to eliminate admin rights across the entire business and enforce least privilege. PAM, Cloud SecurityDevices, UsersBeyondTrust Insight SQLBeyondTrust Insight SQL provides discovery, management, auditing, and monitoring for any privileged credential.PAMDevicesBeyondTrust Password SafeBeyondTrust Password Safe provides discovery, management, auditing, and monitoring for any privileged credential.PAM, IAMDevices, UsersBeyondTrust Privilege Management for WindowsBeyondTrust Privilege Management for Windows delivers privilege management and application control, allowing organizations to eliminate admin rights across the entire business and enforce least privilege.PAM, IAMDevices, UsersBeyondTrust Privileged Identity (Lieberman RED Identity Management)BeyondTrust Privileged Identity (formerly Lieberman RED Identity Management) is a password management solution that helps companies secure, manage, and administer credentials for privileged users and IT vendors.PAM, IAMUsersBeyondTrust Remote Support (Bomgar)BeyondTrust Remote Support (formerly Bomgar) allows support technicians to remotely connect to end-user systems through firewalls from their computer or mobile devices.IT Agent, Config Mgmt.Devices BigFix BigFix provides remote control, patch management, software distribution, operating system deployment, network access protection, and hardware and software inventory functionality. IT Agent, Config Mgmt.DevicesBigFix Compliance Analytics (formerly SCA) BigFix Compliance Analytics (formerly SCA) is a web-based application designed to help you manage security, vulnerability, and risk assessment. Audit/Compliance, VA ToolDevicesBigIDBigID is data security solution that provides enterprise protection and privacy of personal data.Data SecurityDevicesBILLBILL is a leading provider of cloud-based software that digitizes and automates back-office financial processes.License Mgmt, SaaS MgmtUsers, SaaS data Bionic Bionic is an agentless platform that helps teams to manage, operate and protect applications.AppSec, DevOpsDevicesBinaryEdgeBinaryEdge scans the public internet to create real-time threat intelligence streams and reporting.Cyber IntelligenceDevicesBishop FoxBishop Fox performs offensive security, penetration testing, red teaming, and attack surface management.Attack Surface MgmtDevicesBitbucketBitbucket is a web-based version control repository hosting service for source code and development projects that use either Mercurial or Git revision control systems.DevOpsDevicesBitdefender GravityZone Business SecurityBitdefender GravityZone Business Security uses machine learning and heuristics to protect against malware, phishing, ransomware, exploits and zero-days.EDR/EPPDevicesbitFitbitFit is a business development and information technology company that collects all of your IT operations data and combines it into a unified cloud system.ITAM/ITSMDevices, UsersBitSight Security RatingsBitSight Security Ratings are a data-driven and dynamic measurement of an organization’s cybersecurity performance.Cyber IntelligenceDevicesBlackBerry Unified Endpoint Management (UEM)BlackBerry Unified Endpoint Management (UEM) delivers endpoint management and policy control for devices and apps on-premise or in the cloud.EDR/EPP, MDM/EMM, UEMDevicesBlack KiteBlack Kite provides cyber risk assessments that analyze the organization’s supply chain cybersecurity posture from three dimensions: technical, financial and compliance.Risk ManagementDevicesBlock64 BlockBox Block64 is an agentless, appliance-based asset management solution collecting data about assets across the network and using that to provide actionable insights. ITAM/ITSMDevicesBloodHound BloodHound is used to find relationships within an Active Directory (AD) domain to discover attack paths. Attack Surface Mgmt.Devices BloxOne Threat Defense BloxOne Threat Defense uses the cloud to detect threats while tightly integrating with companies' on-premises ecosystem. Cloud SecurityDevices, UsersBlueCat Enterprise DNSBlueCat Enterprise DNS connects all disparate DNS and DHCP with centralized management of all clients and critical assets.NetworkingDevicesBlueCoat ProxySG Edge Secure Web Gateway (BlueCoat ProxySG) from Broadcom provides URL filtering, central policy management, and security against malware attacks. Secure Web GatewaysDevicesBMC Atrium ADDMBMC Atrium ADDM is a digital enterprise management solution that automates application discovery and dependency mapping.CMDB, ITAM/ITSMDevicesBMC Atrium CMDBBMC Atrium CMDB stores information about the configuration items (CIs) in your IT environment and the relationships between them.CMDB, ITAM/ITSMDevices BMC Atrium CMDB onPrem BMC Atrium CMDB stores information about the configuration items (CIs) in your IT environment and the relationships between them. CMDBDevices BMC Helix Client Management BMC Helix Client Management is an automated endpoint management solution to inventory and track hardware and software endpoints; manage software licensing, patching, and event management; and remotely manage users' devices for updates or troubleshooting. IT Agent, MDM/EMM, RMM Devices, Users BMC TrueSight Automation for ServersTrueSight Automation for Servers automates vulnerability management, patching, compliance, configuration changes, software deployments, and service provisioning in the data center and cloud.Config Mgmt.DevicesBMC TrueSight Presentation ServerBMC TrueSight Presentation Server consumes data from various BMC TrueSight products to provide a consolidated set of views for monitoring the infrastructure, real and synthetic applications, and capacity planning.DevOpsDevicesBOSSDeskBOSSDesk is an IT Service Management and Help Desk Software for both On-Premise and in the Cloud.ITAM/ITSMDevicesBox PlatformBox Platform provides data security, file sharing, collaborating, and content management tools. Box Platform provides access to Box APIs.Data Security, SaaS ManagementUsers, SaaS DataBricata Bricata is a network detection and response platform. NDRDevicesBrivo Brivo is a cloud-based access control solution that helps protect building, employees, visitors, customers, residents and data. IAM Devices Buildkite Buildkite is a continuous integration tool designed to improve software developer productivity. Software Development Version Control Devices, UsersBurp SuiteBurp Suite is a penetration testing and vulnerability finder tool often used for checking web application security.Vulnerability Assessment ToolDevicesCA Service ManagementCA Service Management is an IT service management (ITSM) solution that offers incident management and IT asset managementITAM/ITSM, CMDBDevicesCA SpectrumCA Spectrum is a services and network infrastructure management system that enables the modeling of LAN, WAN, wired, wireless, physical, and virtual networksNetworkingDevicesCato NetworksCato SASE is a cloud-native secure access service edge built on a full mesh topology, with over 65 global PoPs, and replaces the need for enterprises to route using MPLS.Firewall, Networking, Secure Web GatewaysDevices, UsersCDWCDW is a multi-brand technology solutions provider License mgmt SaaS DataCensysCensys monitors infrastructure and discovers unknown assets across the Internet.IoT DevicesCentrify Identity ServicesCentrify Identity Services manages application access, endpoints, and network infrastructure.IAMUsersCeridian DayforceCeridian Dayforce is an HR cloud platform that delivers payroll, benefits, workforce, and talent management.HRUsersCerteroCertero is an IT hardware, software, SaaS, and cloud asset management solution.ITAM/ITSMDevicesCFEngineCFEngine is a software development automated workflow solution.CollaborationDevicesChangeGearChangeGear is an AI-powered IT service management platform.HRDevicesCheck Point CloudGuardCheck Point CloudGuard automates governance across multi-cloud assets and services including security posture assessment, misconfiguration detection, and enforcement of security best practices and compliance frameworks.Cloud Infra, IAMDevices, UsersCheck Point Harmony Endpoint Check Point Harmony Endpoint is a suite of endpoint protection products that include mobile, email, collaboration, and SASE security. Attack Surface Mgmt., Email Security, NetworkingDevices Check Point Harmony Mobile Check Point Harmony Mobile uses file protection capabilities to block the download of malicious files to mobile devices and prevent file-based cyberattacks on organizations. EDR/EPP Devices Check Point InfinityCheck Point Infinity protects against cyber threats across networks, endpoint, cloud and mobile devices. This adapter supports the entire Infinity platform, including Check Point firewalls.EDR/EPP, Firewall DevicesCheckmarx SAST (CxSAST)Checkmarx SAST (CxSAST) is a static application security testing solution used to identify security vulnerabilities in custom code. It is used by development, DevOps, and security teams to scan source code early in the SDLC, identify vulnerabilities, and provide actionable insights to remediate them.AppSec, DevOpsDevicesCheckmk Checkmk provides powerful monitoring of networks, servers, clouds, containers, and applications. Containers, Infra Monitoring, RMMDevices, UsersChefChef provides continuous automation for building, deploying, and managing infrastructure, compliance, and applications in legacy and hybrid environments.Config Mgmt.Devices, UsersCherwell IT Service ManagementCherwell IT Service Management is a service desk platform enabling automation for process workflows, supporting tasks, and related approvals.ITAM/ITSMDevicesCherwell IT Service Management DatabaseCherwell IT Service Management Database is a service desk platform enabling automation for process workflows, supporting tasks, and related approvals.ITAM/ITSMDevicesCipherTrust Manager Thales CipherTrust Manager is a key management solution for the CipherTrust Data Security Platform.EncryptionDevicesCIS CAT Pro CIS CAT Pro is a tool for automating CIS Benchmark testing and reporting. Risk ManagementDevicesCiscoCisco connects to Cisco switches and routers.NetworkingDevicesCisco Advanced Malware Protection (AMP)Cisco Advanced Malware Protection (AMP) includes threat intelligence, sandboxing, and malware blocking to detect, contain, and remove malware.EDR/EPPDevicesCisco AppDynamicsCisco AppDynamics is an application performance monitoring tool.AppSecDevices, UsersCisco Application Policy Infrastructure Controller (APIC)Cisco Application Policy Infrastructure Controller (APIC) is the main architectural component of Cisco ACI. It is the unified point of automation and management for the Cisco ACI fabric, policy enforcement, and health monitoring and optimizes performance and agility.NetworkingDevicesCisco CX Cloud CX Cloud combines Cisco technology with AI/ML-driven insights, use cases, and contextual learning. Cyber intelligence Devices Cisco DCNM Cisco Data Center Network Manager (DCNM) is a network management solution for next generation data centers. Storage mgmt DevicesCisco DNA CenterCisco DNA Center is a software-based network automation and assurance solution.NetworkingDevicesCisco Firepower Management CenterCisco Firepower Management Center provides management over firewalls, application control, intrusion prevention, URL filtering, and advanced malware protection.NetworkingDevicesCisco Identity Services Engine (ISE)Cisco Identity Services Engine (ISE) is a network administration product that enables the creation and enforcement of security and access policies for endpoint devices connected to the company’s routers and switches.IAMDevicesCisco Industrial Network Director (IND)Cisco Industrial Network Director (IND) enables deployment and monitoring of Cisco Industrial Ethernet switches in industrial networks.Networking, OTDevices, UsersCisco Intersight Cisco Intersight is a cloud operations platform that consists of optional, modular capabilities of infrastructure, workload optimization, and Kubernetes services. Cloud Infra, Cluster ManagementDevicesCisco MerakiCisco Meraki solutions include wireless, switching, security, EMM, communications, and security cameras, all centrally managed from the web.NetworkingDevicesCisco PrimeCisco Prime offers a suite of tools to automate the management of wired and wireless Cisco networks.NetworkingDevicesCisco Secure Workload (formerly Tetration)Cisco Secure Workload (formerly Tetration) is a micro-segmentation platform that offers zero trust-based workload protection for multi cloud data centers. IAM Devices Cisco Security ManagerCisco Security Manager provides policy enforcement and rapid troubleshooting of security events, offering summarized reports across the security deployment.NetworkingDevicesCisco StealthwatchCisco Stealthwatch is an agentless malware detection solution that provides visibility and network traffic security analytics across the extended network, including endpoints, branch, data center, and cloud.NetworkingDevicesCisco Smart Net Total Care (SNTC)Cisco Smart Net Total Care is a smart services assistant providing hardware, web, and mobile support to enable efficient operations.NetworkingDevices Cisco UCS Central (UCS) Cisco Unified Computing System (UCS) is a data center server computer product line that brings together compute, networking, and storage, all in a single system to power applications. Storage ManagementDevicesCisco UCS ManagerCisco UCS Manager supports the entire Cisco UCS server and Cisco HyperFlex Series hyperconverged infrastructure portfolios. It enables server, fabric, and storage provisioning, as well as device discovery, inventory, configuration, diagnostics, monitoring, fault detection, auditing, and statistics collection.NetworkingDevicesCisco UmbrellaCisco Umbrella is a secure internet gateway in the cloud, including DNS and IP layer enforcement and command and control callback blocking.NetworkingDevices, Users Cisco Unified Communications ManagerCisco Unified Communications Manager provides secure and manageable call control and session management.IoT DevicesCisco WebexCisco Webex is an enterprise solution for video conferencing, online meetings, screen share, and webinars. Web conferencing, cloud calling and equipment.Remote ConferencingDevices, UsersCitrix ADCCitrix ADC is an application delivery and load balancing solution for monolithic and microservices-based applications.Networking, DevOpsDevicesCitrix DaaS Citrix DaaS (device as a service) is a cloud-based solution that allows companies to securely deliver DaaS and VDI apps and desktops to any device, over any network. VirtualizationDevicesCitrix DirectorCitrix Director is a web-based monitoring console for Citrix XenApp and XenDesktop virtualization platforms that allows administrators to control and monitor virtual applications and desktops.Virtualization, ITAM/ITSM, Cloud, DevOps, Devices, UsersCitrix Endpoint Management (XenMobile)Citrix Endpoint Management (formerly XenMobile) is a solution for managing endpoints, offering mobile device management (MDM) and mobile application management (MAM) capabilities.UEM, MDM/EMMDevicesCitrix ShareFile ShareFile is a secure content collaboration, file sharing, and sync software. CollaborationUsersClarotyClaroty discovers assets and monitors communication patterns for ICS networks.OT DevicesCloudCheckr CloudCheckr is multi-cloud optimization and resource management software that includes cost management, security and compliance management, and resource utilization. Cloud Mgmt.DevicesCloudHealthCloudHealth is a cloud management platform to analyze and manage cloud cost, usage, security, and governance.Cloud Infra, CloudDevicesCloudfit CFSCloudFit CFS delivers managed, custom applications for cloud, hybrid, and on-premise environments.Cloud Infra, CloudDevicesCloudflare DNSCloudflare DNS runs one of the largest DNS networks in the world.NetworkingDevices, Users CloudFlare Zero Trust Deliver Zero Trust Network Access on CloudFlare's Edge. Secure Web GatewaysDevices, UsersCloudPassage HaloCloudPassage Halo is a security automation platform providing visibility, protection, and continuous compliance monitoring for AWS and Azure deployments.Cloud Infra, CloudDevicesCoalfireOneCoalfireOne provides year-round visibility and proactive management of your compliance program.Risk Mgmt.DevicesCode42 Incyder Code42 Incyder (formerly Code42) is a next-gen DLP solution used to detect insider threats, satisfy regulatory compliance, and accelerate incident response investigations. DLP, Data SecurityDevices, UsersCofense PhishMeCofense PhishMe provides phishing awareness training and threat simulations for employees.Security Awareness, GRC, Email SecurityUsersCohesityCohesity is a cloud data platform that provides a comprehensive range of data management services.Cloud Mgmt.DevicesCollibraCollibra is a data catalog platform and tool that helps organizations better understand and manage their data assets. Audit/ComplianceDevices, UsersCom LaudeCom Laude is a domain name registrar, providing domain name management services. License ManagementDevices, UsersCommvaultCommvault enables data protection, backup and recovery, and information management solutions.Data SecurityDevices, Users ConfluentConfluent is a data streaming platform that enables you to easily access, store, and manage data as continuous, real-time streams.Data Security, Storage ManagementDevices, UsersConnectSecure ConnectSecure provides managed service providers (MSPs) a vulnerability scanning and compliance management tool for their SMB clients. VA ToolDevicesConnectWise Automate ConnectWise Automate monitors, manages, and supports client networks. using out-of-the-box scripts, continuous monitoring, and automation capabilities. RMM, Config/Patch MgmtDevicesContrast SecurityContrast Security protects software applications against cyberattacks.AppSec, DevOpsDevicesCradlepoint Cradlepoint develops cloud-managed wireless edge networking equipment. NetworkingDevicesCrashPlan CrashPlan provides backup and recovery, ransomware recovery, and device migration services for small businesses and enterprises. Data SecurityDevices, UsersCribl Cribl is a vendor-agnostic observability pipeline used to collect, reduce, enrich, normalize, and route data. Infra MonitoringDevices, UsersCrowdStrike FalconCrowdStrike Falcon delivers next-generation antivirus, endpoint detection and response (EDR), managed threat hunting, and threat intelligence.EDR/EPP, SaaS Management Devices, Users, SaaS data CrowdStrike Falcon Discover CrowdStrike Falcon Discover is a network security monitoring tool that provides real-time visibility into devices, users, and applications. Networking Devices CrowdStrike Kubernetes Protection CrowdStrike Kubernetes Protection provides cloud-native application security, including breach prevention, workload protection, and cloud security posture management. Cloud Security Devices CrowdStrike Falcon Identity Protection (formerly Preempt)CrowdStrike Falcon Identity Protection (formerly Preempt) lets organizations reduce user risk on their attack surface and preempt threats in real-time with Conditional Access. It continuously analyzes, adapts and responds to threats based on identity, behavior, and risk to resolve insider threats and targeted attacks.IAMDevices, UsersCrowdStrike Falcon SpotlightCrowdStrike Falcon Spotlight is a real-time, scanless vulnerability management solution. VA ToolDevicesCrestron XiO Cloud Crestron XiO Cloud is a technology operations management platform that allows users to configure and manage all Crestron device from one central location. CollabertationDevicesCSCDomainManagerCSCDomainManager is a web-based portfolio management platform consolidating domains alongside social media usernames, SSL digital certificates, and DNS.NetworkingDevicesCSI Leasing The CSI Adapter tracks hardware contract expiration details. License Mgmt. DevicesCSVThe CSV adapter imports .csv files with inventory information including: devices and serial numbers, users, and installed software data.CMDB, ITAM/ITSMDevices, Users CSV - Applications The CSV - Applications adapter imports SaaS Vendor information from a CSV file. SaaS ManagementSaaS Data CSV - DNS Records The DNS CSV adapter enables the discovery of SaaS applications based on the organizations web browsing records. SaaS Management SaaS Data CSV - Expenses CSV - Expenses File Adapter imports information about transactions related to SaaS from a CSV file. SaaS ManagementSaaS Data CSV-LicensesCSV - Licenses adapter imports information about SaaS licenses from a CSV file. SaaS Management SaaS Data CTL CiderCTL Cider is a DevOps focused application that provides information regarding node health, resources, and availability.DevOpsDevicesCyberArk AleroCyberArk Alero secures remote access to critical systems for employees and third-party vendors.PAMDevices, UsersCyberArk Endpoint Privilege ManagerCyberArk Endpoint Privilege Manager enforces least privilege, providing credential theft protection and application control at scale.PAM, IAMDevicesCyberArk IdaptiveIdaptive Identity Management Platform is an identity and access management solution that unifies identity and access management services.IAMDevices, UsersCyberArk Privileged Account SecurityCyberArk Privileged Account Security provides privileged password management, session recording, least privilege enforcement, and privileged data analytics.PAM, IAMUsersCybereason Deep Detect & RespondCybereason Deep Detect & Respond (EDR) defends against advanced attacks by collecting and analyzing behavioral data to identify suspicious activities.EDR/EPPDevicesCyberhaven Cyberhaven provides a data detection and response (DDR) solution, based on big data graph analytics of all user interactions with data over time and across the enterprise. Data SecurityDevicesCyberint Argos EdgeCyberint Argos Edge is an attack surface management solution providing findings into the external attack surface, phishing threats, brand impersonation, and more.Attack Surface Mgmt, Cyber IntelligenceDevicesCyCognito PlatformThe CyCognito platform delivers proactive attack surface protection and digital risk protection across your entire extended IT ecosystem to help you identify, categorize, prioritize and eliminate your attacker-exposed risk.Cyber IntelligenceDevicesCylancePROTECTCylancePROTECT uses artificial intelligence to detect and protect against ransomware, advanced threats, fileless malware, and malicious documents.EDR/EPPDevicesCymulate Cymulate is a breach and attack simulation (BAS) platform that helps companies optimize security posture by testing internal and external defenses. Cyber Intelligence, Attack Surface ManagementDevicesCynet 360Cynet 360 is a detection and response security platform for finding, ranking, and remediating unknown, camouflaged threats.EDR/EPPDevicesDarktraceDarktrace Immune System protects workforce and data from sophisticated attackers, by detecting, investigating and responding to cyber-threats.Cyber Intelligence, EDR/EPPDevicesDatabricks Databricks combines data warehouses & data lakes into a lakehouse architecture that handles data, analytics, and AI use cases. Cloud Infra, Networking Devices DatadogDatadog is a monitoring service for cloud-scale applications, providing monitoring of servers, databases, tools, and services.Cloud Mgmt., CloudDevices, Users Datto RMM (Autotask Endpoint Management)Datto RMM (formerly Autotask Endpoint Management) is a cloud-based Remote Monitoring and Management (RMM) platform that provides device auditing, real-time monitoring, and automatic patching.EDR/EPP, Config/Patch Mgmt., RMMDevicesDeep Instinct Deep Instinct is an anti-ransomware and anti-malware solution that leverages deep learning to help prevent malware from executing inside organizations' environments. Cyber intelligence DevicesDefenseStorm DefenseStorm provides CyberSecurity, CyberCompliance and CyberFraud solutions specifically built for banking. NDR, Risk ManagementDevicesDell BoomiDell Boomi’s iPaaS platform enables businesses to discover, manage, and orchestrate data while connecting applications, processes, and people. Cloud InfraDevices Dell ECS Dell ECS (Elastic Cloud Storage) is a software-defined object storage platform that provides organizations with an on-premise alternative to public cloud solutions. Storage Management Devices, UsersDell EMC AvamarDell EMC Avamar is a backup and recovery solution that enables daily backups of physical and virtual environments, NAS servers, enterprise applications, remote offices and desktops/laptops.DLP, Data SecurityDevicesDell iDRAC The Integrated Dell Remote Access Controller (iDRAC) is designed for secure local and remote server management and helps IT administrators deploy, update and monitor Dell EMC PowerEdge servers. RMM, ITAM/ITSMDevicesDell OpenManage EnterpriseDell OpenManage Enterprise is a one-to-many systems management console. It facilitates lifecycle management for Dell EMC PowerEdge servers in one console.Infra Monitoring, ITAM/ITSMDevicesDell PowerProtect DD Management Center Dell PowerProtect Data Domain Management Center is a centralized storage management solution that provides aggregate capacity, replication and performance management, and reporting. Storage Management Devices Dell PowerScale OneFS Dell PowerScale OneFS is a scale-out network attached storage (NAS) platform that addresses unstructured data needs at the edge, the core, or the cloud. Storage Management Devices Dell PowerStoreDell PowerStore is a flexible, scalable data storage appliance designed for data-centric infrastructures.Storage Management Devices, UsersDell RecoverPointDell RecoverPoint is a data protection and disaster recovery solution.Storage Management DevicesDell Unisphere For Unity Dell Unisphere enables Dell EMC Unity customers to manage storage systems. Storage Management Devices Dell VPLEXDell VPLEX delivers continuous data availability, transparent data mobility, and nondisruptive data migration for mission-critical applications.Storage ManagementDevicesDell WYSE ManagementDell Wyse Management Suite is a cloud solution that enables an IT admin to securely manage Dell client devices.UEM, RMMDevicesDevoDevo is a cloud-native logging and security analytics solution that delivers real-time visibility for security and operations teams.SIEMDevices, UsersDevice42Device42 is a cloud-based CMDB for physical, virtual, and cloud servers and containers, network components, software, services, applications, and their relationships and dependencies.CMDB, ITAM/ITSMDevicesDigiCert CertCentralDigiCert CertCentral consolidates tasks for issuing, installing, inspecting, remediating, and renewing certificates.Certificate Mgmt. DevicesDigiCert PKI Platform (Symantec Managed PKI)DigiCert PKI Platform (formerly Symantec Managed PKI) provides a cloud-based enterprise solution for issuing and managing digital certificates used to enable strong authentication and encryption.Certificate Mgmt. DevicesDigital Guardian DLP Digital Guardian DLP is a SaaS-based platform that provides data-loss prevention across Windows, Mac, and Linux systems and applications. DLPDevicesDigitalOceanDigitalOcean is a cloud hosting provider that offers cloud computing services and Infrastructure-as-a-Service (IaaS). Cloud InfraDevices Digital Shadows SearchLightDigital Shadows SearchLight is a digital risk protection solution that protects organizations against external risk exposure.Cyber IntelligenceDevicesDivvyCloudDivvyCloud offers security, compliance, and governance guardrails for public and private cloud infrastructures.Cloud Mgmt., CloudDevicesDNS Made EasyDNS Made Easy offers DNS management services.NetworkingDevicesDockerDocker is a platform designed to help developers build, share, and run container applications. ContainersDevices, UsersDocuSignDocuSign helps organizations connect and automate how they prepare, sign, act on and manage agreements.AppSec, Collaboration, SaaS Management Users, SaaS data DOJ CSAM DOJ’s proprietary Cyber Security Assessment and Management (CSAM) automates assessments and authorizations to provide a comprehensive assessment and continuous monitoring service. Risk Management Devices DomotzDomotz is network monitoring software.NetworkingDevicesDragos PlatformThe Dragos Platform identifies ICS network assets, malicious activity, and provides guidance to investigate incidents.OT, Network SecurityDevicesDropboxDropbox is a file hosting service that offers cloud storage, file synchronization, personal cloud, and client software.Cloud Mgmt., CloudDevices, Users Druva Cloud PlatformDruva Cloud Platform is a data protection as-a-service that provides management across all customer data sources that are scalable, predictable and on-demand.DLP, Data SecurityDevices, UsersDuo BeyondDuo Beyond identifies corporate vs. personal devices, blocks untrusted devices, and give users secure access to internal applications.IAMUsersDynamics CMDB (HelpDesk)HelpDesk integrated with Microsoft Dynamics provides a complete ticketing solution.TicketingDevicesDynatraceDynatrace is a software intelligence platform providing application performance management and cloud infrastructure monitoring.Cloud Mgmt., CloudDevices, UsersEagle Eye NetworksEagle Eye Networks provides cloud-based video surveillance products for physical security and business operations applications.Security AwarenessDevicesEasyvista Service Manager EasyVista is an ITSM (IT Service Management) solution including change, release, incident, problem, and knowledge management. ITAM/ITSM Devices ECI FMAudit ECI FMAudit is print management software that allows users to remotely monitor print environments and maintain visibility into their operations. RMMDevicesEclypsiumEclypsium protects the foundation of the computing infrastructure, controlling risks and stopping threats to enterprise firmware and hardware devices.Firmware Security Devicesedgescanedgescan Fullstack Vulnerability Management is a cloud-based continuous vulnerability management and penetration testing solution that discovers, validates and rates vulnerabilities by running continuous asset profiling to detect rogue/exposed ports, hosts or even hidden API’s.VA ToolDevicesEfficientIP SOLIDserver DDI EfficientIP SOLIDserver DDI suite is designed to deliver virtual and hardware appliances for critical DNS-DHCP-IPAM services.NetworkingDevicesEkranEkran System is a cybersecurity software vendor delivering a full-cycle insider risk management platform. PAM, Audit/ComplianceUsersElastic DefendElastic Defend (formerly Endgame) is a tool for malware prevention, detection, and response. EDR/EPP, IT AgentDevicesElasticsearchThe Elasticsearch adapter imports device information from an Elasticsearch database.CMDB, ITAM/ITSMDeviceseMASSeMASS is a federal system designed to help maintain information assurance situational awareness, manage risk, and comply with federal regulations.Risk ManagementDevices, UsersEndgameEndgame is an endpoint protection platform that combines on-line and off-line protection against exploits, phishing, malware, ransomware, and fileless attacks.EDR/EPPDevicesEntrustEntrust provides identity, payment, and data security solutions.Certificate Management, Audit/ComplianceDevicesEquinix Equinix provides digital infrastructure and data center services. NetworkingUsersEracent Eracent provides IT asset management and software asset management solutions to help customers inventory assets and optimize licensing costs. ITAM/ITSMDevicesErmeticErmetic is a cloud infrastructure security platform, focusing on identity protection.Cloud SecurityDevicesESET Endpoint SecurityESET Endpoint Security is an anti-malware suite for Windows including web filtering, firewall, USB drive and botnet protection.EDR/EPPDeviceseyeInspectForeScout eyeInspect is a compliance and threat analysis tool for ICS and OT environments. OT, Audit/ComplianceDevicesExabeamExabeam is a cloud-based platform combining SIEM, threat detection, investigation, and response (TDIR) and XDR capabilities. Integrate Exabeam with the Axonius Cybersecurity Asset Management Platform.SIEMDevicesExabeam Data Lake Exabeam Data Lake (previously known as Exabeam Log Manager) is a cloud-native data lake architecture to securely ingest, parse, and store security data at scale from any location, across multi-year data. SIEMDevicesExtraHop Reveal(x)ExtraHop Reveal(x) is a network detection and response (NDR) solution that provides visibility, real-time threat detection, and response.NDR DevicesExtraHop Reveal(x) 360ExtraHop Reveal(x) 360 is a SaaS-based network detection and response (NDR) platform that provides unified security across on-premises and cloud environments.NDR, Networking, Cloud Infra, Cloud Security, IAMDevices ExtremeCloud IQ ExtremeCloud IQ enables management of wireless access points, switches, and routers. NDRDevicesExtreme Networks ExtremeControlExtreme Networks ExtremeControl is a Network Access Control (NAC) solution that provides role-based access controls and reporting on user activity across all devices.NAC DevicesExtreme Networks ExtremeWireless WiNGExtreme Networks ExtremeWireless WiNG in a WLAN operating system designed to scale efficiently from the smallest networks to large, geographically dispersed deployments.NetworkingDevicesEzOfficeInventory EZOfficeinventory is a cloud-based asset tracking platform used for tracking physical and digital assets. ITAM/ITSMDevices, UsersF-Secure Policy Manager F-Secure Policy Manager provides a centralized management console for the security of the managed hosts in the network.UEM, MDM/EMMDevicesF-Secure Protection Service for Business (PSB)F-Secure Protection Service for Business (PSB) is a central management portal for managing VPN, mobile device management, software update management, workstation, and server security.UEM, MDM/EMM DevicesF5 BIG-IP iControlF5 iControl is a Web services-enabled open API providing granular control over the configuration and management of F5's application delivery platform, BIG-IP.NetworkingDevicesF5 BIG-IQ Centralized ManagementF5 BIG-IQ Centralized Management provides centralized management, licensing, monitoring, and analytics for BIG-IP infrastructure.Infra Monitoring, ITAM/ITSMDevicesFireEye Endpoint Security (formerly HX)FireEye Endpoint Security (formerly HX) detects and protects against unknown endpoint threats and exploits with integrated threat intelligence.EDR/EPPDevicesFireEye Endpoint Security Logon TrackerFireEye Endpoint Security Logon Tracker enables the investigation of lateral movement within Windows enterprise environments.Infra MonitoringDevicesFireMon Security ManagerFireMon Security Manager is a network security solution that provides real-time visibility, control, and management for network security devices across hybrid cloud environments.Networking, Cloud SecurityDevices FleetDM FleetDM Fleet (formerly Kolide Fleet) is an is an open-source query manager for device management. EDR/EPPDevicesFlexera IT Asset ManagementFlexera lets enterprises gain visibility and control of IT assets, reduce ongoing software costs, and maintain continuous license compliance.ITAM/ITSMDevices Flexera Software Vulnerability Research Flexera Software Vulnerability Research provides access to verified intelligence from Secunia Research. Cyber IntelligenceDevicesFlexera SVMFlexera Security Vulnerability Manager (SVM) is a vulnerability assessment, patch management, and vulnerability intelligence platform. VA ToolDevicesFlexNet Manager Suite CloudFlexNet Manager Suite Cloud from Flexera is a SaaS offering for software license compliance and license optimization.License Mgmt. Devices, SaaS dataForcepoint Insider ThreatForcepoint Insider Threat is a security analytics tool for searching, detecting and mitigating malicious actors or insider threats.UEBAUsersForcepoint ONEForcepoint ONE provides data protection that monitors real-time traffic and prevents data loss.Cloud Security, DLP, Secure Web GatewaysDevicesForcepoint Web Security Endpoint CSV FileForcepoint Web Security Endpoint CSV File imports CSV files with device information.IAM, Config Mgmt.Devices Forcepoint ZTNA Private Access Forcepoint ZTNA Private Access (formerly Forcepoint Web Security Endpoint) enables end-users to authenticate and receive policy enforcement via the Forcepoint Web Security Cloud infrastructure. IAM, Config Mgmt. DevicesForemanForeman is a free open source project that automates repetitive tasks, quickly deploys applications, and proactively manages server lifecyle, on-premises or in the cloud.Config Mgmt.DevicesForeScout CounterACTForeScout CounterACT platform provides insight into network-connected devices.NAC DevicesForescout Switch PluginForescout Switch Plugin is a component of the ForeScout CounterACT Network Module and provides switch to endpoint information as well as VLAN and ACL management capabilities. NAC, NetworkingDevicesForgeRockForgeRock Directory Services is a high-performance identity store that provides the necessary encryption to protect enterprise data at rest and encryption.DirectoryDevices, Users FortiClient EMS FortiClient Enterprise Management Server (FortiClient EMS) is a security management solution that enables scalable and centralized management of multiple endpoints. EDR/EPP DevicesFortifyData FortifyData is a threat exposure management platform for identifying, monitoring, and managing cyber risk. Risk ManagementDevicesFortiEDR (enSilo)FortiEDR (formerly enSilo) automates and orchestrates detection, prevention, and response against malware and ransomware.EDR/EPPDevicesFortify Software Security CenterFortify Software Security Center offers security assurance solutions that address the threats posed by security flaws in business-critical software apps.AppSec, DevOpsDevicesFortiNAC FortiNAC is a network access control solution that provides protection against IoT threats, control of third-party devices, and automated responses to networking events. NACDevices Fortinet FortiGate Fortinet FortiGate is a next-generation firewall providing security and visibility for end-to-end protection across the entire enterprise network. FirewallDevicesFortiPortalFortiPortal is a cloud-based security policy, wireless management, and analytics for MSSPs, enterprises, education and government customers.Networking, Remote Monitoring and ManagementDevicesForward NetworksForward Networks is revolutionizing the way large networks are managed. Forward's advanced software delivers a digital twin of the network, enabling network operators to ensure that the network is secure, reliable, and agile. The platform supports devices from all major networking vendors and cloud operators, including AWS, Azure, and Google Cloud Platform. Networking, Infra MonitoringDevicesFreeIPAFreeIPA is a free and open source identity management system for Linux environments.IAMDevices, UsersFreshserviceFreshservice is a cloud-based IT help desk and service management solution that enables organizations to simplify their IT operations.ITAM/ITSM, SaaS ManagementDevices, Users, SaaS dataFrontline VMFrontline VM, a frontline cloud system, is a vulnerability management application that performs comprehensive security assessments and helps prioritize and track the results, making remediation more efficient and effective.VA ToolDevicesGenian Genian NAC identifies and monitors all hardware and software in the network environment to determine each device’s security state then establish the appropriate level of access to ensure compliance. NACDevicesGigamon GigaVUE-FM (Fabric Manager)Gigamon GigaVUE-FM (Fabric Manager) delivers management and monitoring of all physical and virtual nodes across your on-premises, virtual and public-cloud deployments.NetworkingDevicesGigamon ThreatINSIGHTGigamon ThreatINSIGHT is a cloud-native network detection and response (NDR) platform that provides threat activity detection and the data and context needed for cybersecurity response and investigation.MDR, Cyber IntelligenceDevicesGitHubGitHub provides hosting for software development version control using Git, including distributed version control and source code management (SCM) functionality.Software Development Version Control, DevOps, SaaS ManagementUsers, SaaS dataGitLabGitLab is an open-source DevOps lifecycle tool that provides a wiki, issue-tracking, and continuous integration and deployment pipeline features.DevOpsDevices, UsersGlobal Sign Atlas GlobalSign Atlas offers cloud certificate management and automation. Certificate Mgmt Devices GLPIGLPI is an open-source service management software tool to manage Helpdesk and IT assets. Devices, Users Gluware Gluware offers a cloud-based network orchestration platform that helps automate and orchestrate large multi-vendor, mission-critical networks. Networking Devices GoDaddy GoDaddy is a domain registrar that also offers additional services such as website building and management, website and email hosting, SSL security, and more. NetworkingDevicesGong Gong is a customer data management platform that automatically captures and updates data from integrated tools, allowing for consolidated visibility into all customer interactions, across all stages of the relationship. CRM, SaaS Management Users, SaaS data Google BigQueryBigQuery is a serverless, highly-scalable, and cost-effective cloud data warehouse with an in-memory BI Engine and machine learning built in. CMDBDevicesGoogle Chronicle SecurityGoogle Chronicle Security is designed for enterprises to privately retain, analyze, and search security and network telemetry.Cloud SecurityDevicesGoogle Cloud Platform (GCP)Google Cloud Platform (GCP) is a suite of cloud computing services. Alongside a set of management tools, it provides a series of modular cloud services including computing, data storage, data analytics and machine learning.Cloud Infra, Cloud, Virtualization, ITAM/ITSM, ContainersDevices, UsersGoogle Sheets Google Sheets is a spreadsheet application included as part of the free, web-based Google Docs Editors suite offered by Google. Collaboration Devices, Users Google Workspace (G Suite)Google Workspace (formerly G Suite) is a collection of cloud computing, productivity, collaboration, device, user, and data management tools developed by Google.MDM/EMM, IAM, SaaS Management Devices, Users, SaaS data GoSecure Titan GoSecure Titan integrates endpoint, network, and email threat detection into a single endpoint detection and response service. EDR/EPP Devices GreenhouseGreenhouse is a talent acquisition software company that offers its suite of tools and services to help businesses with the hiring process. HRUsers, SaaS dataGreyNoiseGreyNoise collects, analyzes, and filters internet scan activity.Cyber IntelligenceDevicesGRR Rapid Response GRR Rapid Response is an incident response framework focused on remote live forensics delivered through a client-server architecture. EDR/EPPDevicesGuardicoreGuardicore is a data center and cloud security company that protects the organization’s core assets.Cloud Security, CloudDevices, UsersGytpolGYTPOL is a security configuration management solution providing both visibility of devices and automation of the hardening process. CMDB, Config/Patch MgmtDevicesHAProxy HAProxy is free and open source software that provides a high availability load balancer and reverse proxy for TCP and HTTP-based applications Networking Devices, Users HalcyonThe Halcyon Anti-Ransomware and Cyber Resilience Platform offers layered ransomware protection.EDR/EPPDevicesHashiCorp ConsulHashiCorp Consul is a multi-cloud service networking platform to connect and secure services across any runtime platform and public or private cloud.NetworkingDevicesHashiCorp NomadHashiCorp Nomad deploys new and legacy applications across multiple datacenters, regions, and clouds. Cloud ManagementDevicesHave I Been PwnedHave I Been Pwned is a website to check if email accounts have been compromised in a data breach.VA ToolUsersHawk HAWK.io is a fully automated, multi-tenant, cloud-based, managed detection and response (MDR) service. NDR., SIEMDevicesHeimdal SecurityHeimdal Security protects organizations and home users against malware attacks. Data Security, EDR/PPDevicesHitachi Operations Center Hitachi Ops Center provides data infrastructure management including automation, analytics, and protection. RMM Devices Hoxhunt Hoxhunt provides security awareness training for employees based on cognitive automation and risk calculations. Security AwarenessUsersHP AnywareHP Anyware supports hybrid work environments allowing users to access their digital workspaces without a VPN. Networking DevicesHP Device Manager (HPDM)HP Device Manager (HPDM) is an enterprise-class application for managing and administrating thin client devices on large- and small-scale networks.Config Mgmt., ITAM/ITSM, RMMUsersHP Integrated Lights-Out (iLO)HP Integrated Lights-Out (iLO) is server management software that enables the configuration, monitoring, and updating of HPE servers.Config Mgmt.DevicesHP Network Node Manager i (NNMi)HP Network Node Manager i (NNMi) is a network health and performance monitoring software with scalability and device support.NetworkingDevicesHP NNMi XML FileHP NNMi XML File is a network health and performance monitoring platform.NetworkingUsersHPE Intelligent Management Center (IMC)HPE Intelligent Management Center (IMC) is a networking solution that delivers management across campus core and data center networks.NetworkingDevices, UsersHPE OneViewHPE OneView is an integrated IT management solution that transforms compute, storage, and networking into software-defined infrastructure for task automation.ITAM/ITSMDevicesHPE SAN HPE storage area networking (SAN) provides storage solutions for performance, scalability, and manageability. Storage Management Devices HPE Switches HPE Switches provide switch inventory and ARP table information. Infra Monitoring Devices, ARP tables HP Web JetadminHP Web Jetadmin is a fleet management software solution for the remote configuration, maintenance, and monitoring of HP and standard MIB-compliant 3rd party printers and MFPs.Infra Monitoring, ITAM/ITSM, Config Mgmt.DevicesHuawei eSightHuawei eSight is an enterprise operation and maintenance (O&M) platform that provides cross-vendor and cross-product converged management, visualized monitoring, and intelligent analysis for enterprise ICT devices..Infra MonitoringDevicesHubSpotHubSpot provides software products for inbound marketing, sales, and customer service.CRM, SaaS Management Users, SaaS data Huntress Huntress is a managed endpoint detection and response (EDR) solution. EDR/EPP Devices HYCU HYCU is a SaaS-based data management product including data protection, migration and disaster recovery. DevicesHyperSQLThe HyperSQL adapter imports device information from an HyperSQL database.CMDB, ITAM/ITSMDevicesHYPR PasswordlessHYPR Passwordless provides passwordless security solutions.IAMDevices, UsersIBM BigFix InventoryIBM BigFix Inventory gathers information about installed software and hardware in your IT infrastructure.IT Agent, Config Mgmt.DevicesIBM CloudIBM's cloud computing platform combines platform as a service (PaaS) with infrastructure as a service (IaaS) and cloud services.Cloud Infra, CloudDevicesIBM GuardiumIBM Guardium prevents leaks from databases, data warehouses, and Big Data environments. It ensures the integrity of information and automates compliance controls across heterogeneous environments.Data SecurityDevicesIBM Hardware Management Console (HMC) The Hardware Management Console (HMC) is a hardware appliance that you can use to configure and control one or more managed systems. You can use the HMC to create and manage logical partitions and activate Capacity Upgrade on Demand. Using service applications, the HMC communicates with managed systems to detect, consolidate, and send information to service and support for analysis.Infra Monitoring, Cluster Management, Containers DevicesIBM License Metric Tool IBM License Metric Tool (ILMT) helps manage license allocation services on supported systems. License MgmtDevicesIBM MaaS360 with WatsonIBM MaaS360 with Watson is a Unified Endpoint Management (UEM) platform covering endpoints, end-users, apps, content, and data. It also gives visibility and control to manage mobile devices running iOS, macOS, Android, and Windows.CMDB, ITAM/ITSM, MDM/EMM, UEMDevicesIBM Maximo IBM Maximo Application Suite offers a single platform for asset management, monitoring, maintenance, computer vision, safety and reliability. CMDBDevicesIBM QRadarIBM QRadar is a Security Information and Event Management (SIEM) solution that enables security teams to detect, prioritize and response to threats across the enterprise.SIEMDevices, UsersIBM Spectrum Protect Plus IBM Spectrum Protect Plus provides recovery, replication, retention, and reuse for VMs, databases, applications, file systems, SaaS workloads, and containers in hybrid cloud environments. Infra MonitoringDevicesIBM Tivoli Application Dependency Discovery Manager (TADDM)IBM Tivoli Application Dependency Discovery Manager (TADDM) is a configuration management tool that helps IT operations personnel ensure and improve application availability in application environments.Config Mgmt.DevicesIBM Urban CodeIBM UrbanCode provides software delivery for any mix of on-premises, cloud, and mainframe applications. Config/Patch Mgmt Devices, UsersIBM VPC IBM Cloud Virtual Private Cloud (VPC) is a secure software-defined network (SDN) on which customers can build isolated private clouds. Cloud Infra Devices iboss cloudiboss cloud is cloud-based platform that secures user Internet access in the cloud.Networking, Cloud SecurityDevices, UsersiCIMS iCIMS is an enterprise recruiting platform allowing employers to attract, engage, hire, and advance employees. HRUsersIcingaIcinga is an open-source computer system and network monitoring application. It monitors data centers and clouds availability and performance, gives access to data and raises alerts.NetworkingDevicesIFS Assys IFS Assys is IT service management (ITSM) software that helps automate business processes ITAM/ITSM Devices IGEL Universal Management Suite (UMS)IGEL Universal Management Suite (UMS) is a single management solution for decentralized endpoints.MDM/EMMDevicesIllumio Adaptive Security Platform (ASP)Illumio Adaptive Security Platform (ASP) secures computing platforms in cloud, on-prem, or hybrid environments without any dependency on the underlying network.NetworkingDevicesIllusive NetworksIllusive Networks deceives cyber attackers by planting false information about a given network's resources.Deception, Cyber IntelligenceDevicesImmuniWebImmuniWeb develops machine learning and AI technologies providing continuous monitoring for web applications and APIs.AppSec, DevOpsDevicesImperva Data Activity Monitoring (DAM)Imperva Data Activity Monitoring (DAM) defines and enforces data security and compliance policies across the cloud and on-premises including relational databases, mainframes, big data platforms, data warehouses, and enterprise file stores.IT Agent, Config Mgmt.Devices Imperva WAF Imperva Web Application Firewall (WAF) allows customers to monitor, filter, and block incoming and outgoing data packets from a web application or website. AppSec, Firewall Devices Imperva WAF Cloud Imperva Web Application Firewall (WAF) allows customers to monitor, filter, and block incoming and outgoing data packets from a web application or website. AppSec, Firewall Devices InfiniboxInfinidat InfiniBox provides enterprise storage for mixed application workloads. Storage ManagementDevices InfinipointInfinipoint is a cloud-based automated cyber hygiene platform that enables continuous detection and remediation of risks across the organization’s IT assets.ITAM/ITSM, Config Mgmt.Devices, UsersInfoblox DDIInfoblox DDI consolidates DNS, DHCP, IP address management, and other core network services into a single platform, managed from a common console.NetworkingDevices Infoblox BloxOneBloxOne DDI delivers central control and automation of DNS, DHCP and IP address management for hybrid and multi-cloud networks.Networking, IPAMDevicesInfoblox NetMRIInfoblox NetMRI provides network change and configuration management (NCCM), enabling users to automate network change, understand network health, manage network configurations, and meet a variety of compliance requirements.NetworkingDevices, UsersInfor EAMInfor EAM is an asset management system that helps digitizing and optimizing maintenance operations.ITAM/ITSMDevices, UsersIntel DCMCIntel® Data Center Manager is a software solution that collects and analyzes the real-time health, power, and thermals of a variety of devices in data centers.Infra Monitoring, RMMDevicesIntel EMAIntel® Endpoint Management Assistant (Intel® EMA) software provides the ability to remotely and securely manage Intel® Active Management Technology (Intel® AMT) devices beyond the firewall, via the cloud, on known Wi-Fi networks.RMMDevicesIntezer ProtectIntezer Protect offers runtime cloud workload protection.Cloud Mgmt., Cloud SecurityDevicesIntrigueIntrigue enables IT and Security teams with a complete and always up to date view of Cloud and Internet-exposed assets and exposures.Cyber IntelligenceDevicesIntruder.io Intruder is an online vulnerability scanner that enables the identification of misconfigurations, missing patches, encryption weaknesses, application bugs, and more. VA Tool Devices Invicti Invicti (formerly Netsparker) is DAST and IAST vulnerability scanning for web applications. AppSecDevicesIP FabricIP Fabric is a network management system used to discover, verify, visualize and document large scale networks.NetworkingDevicesIsland Island is an enterprise browser, built on Chromium, with numerous built-in capabilities for protecting against user-, data-, and network-based threats. Secure Web GatewaysDevices, UsersIT GlueIT Glue is a SOC 2-compliant IT documentation management platform designed for managed service providers (MSPs).Storage ManagementUsersiTopIiTop is an open source ITSM solution allows management of configuration items and their relationships in a flexible CMDB.CMDB, ITAM/ITSMDevices, Users Ivanti Connect Secure Ivanti Connect Secure provides zero trust secured access from any device to applications and services in the cloud and data center. Networking Users Ivanti Endpoint SecurityIvanti Endpoint Security, powered by Heat, provides application control, antivirus, patch management, and device control to protect endpoints.EDR/EPPDevicesIvanti Neurons Ivanti Neurons is a unified endpoint management tool that discovers and remediates security threats. UEMDevices Ivanti Patch Management Ivanti Neurons for Patch Management continuously senses, discovers, and remediates security threats. Config/Patch Management, DevicesIvanti Security ControlsIvanti Security Controls is a unified IT management platform used for managing and protecting Windows-based machines, Red Hat Enterprise and CentOS Linux machines, and VMware ESXi Hypervisors.UEM, MDM/EMMDevicesIvanti Service ManagerIvanti Service Manager, is a cloud based ITSM solution that provides workflows automation, IT help desk and support ticket features, and ITIL service management processes.ITAM/ITSMDevices, UsersIvanti Unified Endpoint Manager (Landesk)Ivanti Unified Endpoint Manager (formerly Landesk) helps IT administrators gather detailed device data, automate software and OS deployments, personalize workspace environments, and fix user issues.UEM, Config/Patch Management, ITAM/ITSMDevicesJamf ProJamf Pro is an enterprise mobility management (EMM) tool that provides unified endpoint management for Apple devices.MDM/EMM, SaaS Management Devices, SaaS data Jamf ProtectJamf Protect is an endpoint protection solution that prevents macOS malware, detects and remediates Mac-specific threats, and monitors endpoints for compliance.EDR/EPPDevicesJamf TrustJamf Trust provides enterprise-level security and remote access for mobile devices.MDM/EMMDevicesJetPatch JetPatch is a centralized patch management platform focusing on end-to-end enterprise patch management and vulnerability remediation. Config/Patch Mgmt.DevicesJFrog Artifactory JFrog Artifactory is a DevOps solution for housing and managing artifacts, binaries, packages, files, containers, and components throughout the software development lifecycle. DevOpsDevices, UsersJSONThe JSON adapter is able to import .json files with information about devices, users, or installed software.CMDB, ITAM/ITSMDevices, UsersJumpCloudJumpCloud is a Directory-as-a-Service (DaaS) solution to authenticate, authorize, and manage users, devices, and applications via a common directory in the cloud.IAM, Directory, SaaS ManagementDevices, Users, SaaS dataJuniper JunosThe Juniper Junos Adapter connects to Juniper switches and routers.NetworkingDevicesJuniper Junos Space Network Management PlatformJuniper Junos Space Network Management Platform automates management of Juniper's switching, routing, and security devices.NetworkingDevicesKandjiKandji is an Apple device management (MDM) solution for macOS, iOS, iPadOS, and tvOS.MDM/EMMDevicesKaseya VSAKaseya VSA is a remote monitoring and management solution for remote control, discovery, patch management, and monitoring.IT Agent, Config Mgmt.DevicesKaspersky Security CenterKaspersky Security Center is an administration console for Kaspersky Labs security solutions and systems management tools.EDR/EPPIAMKeeperKeeper is a password and secrets management solution that helps protect and monitor passwords, secrets, and remote connections. Password mgmt. UsersKemp CentralKemp 360 Central is an application delivery and management platform for infrastructure monitoring of all data centers, private clouds, IaaS, PaaS, and public cloud.Infra MonitoringDevicesKenna Security PlatformKenna Security Platform is a vulnerability assessment solution that provides risk scoring, prioritization, and benchmarking.VA ToolDevicesKeycloakKeycloak is an open source identity and access management solution.IAMUsersKeyfactor Keyfactor provides PKI as-a-Service enabling protection of every device, workload, and digital transaction with a unique and trusted identity. IAM Devices KnowBe4KnowBe4 provides Security Awareness Training for anti-phishing behavior, social engineering and ransomware attacks, and general security awareness.Security Awareness, GRCUsersKolide K2Kolide K2 is a paid cloud-hosted SaaS platform for gathering detailed device information and securing endpoints.EDR/EPPDevicesKubernetesKubernetes (K8s) is an open-source system for automating deployment, scaling, and management of containerized applications.Containers, CloudDevicesL0phtCrack 7L0phtCrack 7 is a password auditing and recovery application.Password Mgmt., IAMUsersLaceworkLacework provides cloud security automation for AWS, Azure, and GCP with a comprehensive view of risks across cloud workloads and containers.Cloud Security, CloudDevices, UsersLakeside SysTrack Lakeside SysTrack is a digital experience monitoring solution used for workplace analytics, IT asset optimization, and end-user troubleshooting. RMMDevicesLandscapeLandscape by Canonical is a management tool used to deploy, monitor and manage Ubuntu servers.Config/Patch Mgmt, RMMDevicesLansweeperLansweeper is an IT asset management and Network Inventory software tool for Windows, Linux, Mac, and Network devices.IT Agent, Config Mgmt., CMDB, ITAM/ITSMDevices Lansweeper Cloud Lansweeper Cloud federates data from all local Lansweeper discovery instances into a single source of truth. IT Agent, Config Mgmt., CMDB, ITAM/ITSM DevicesLastPassLastPass is a password manager that stores encrypted passwords online.Password Mgmt., IAM, SaaS ManagementUsers, SaaS dataLaunchDarklyLaunchDarkly is a continuous delivery platform and feature management platform that provides feature flags as a service.Software Development Version ControlUsersLenel OnGuardLenel OnGuard is an integrated access control and alarm monitoring system.Security AwarenessUsersLibreNMSLibreNMS is a network monitoring solution that provides auto-discovery for network hardware and operating systems including Cisco, Linux, Juniper, Foundry, and more.NetworkingDevicesLimaCharlieLimaCharlie provides endpoint-driven information security tools to run an MSSP or SOC, as well as APIs that allow users to build and monetize their own products.DevOpsDevicesLinodeLinode, acquired by Akamai, is a cloud hosting provider that provides Linux-based virtual machines, cloud infrastructure, and managed services.Cloud Infra, VirtualizationDevices, UsersLinux SSHLinux Secure Shell uses remote command execution over the SSH protocol to gather information about the endpoint Linux machine.ITAM/ITSMDevicesLitmos Litmos is a learning management system that provides pre-built courses and eLearning solutions. Collaboration, HRUsersLogMeIn CentralLogMeIn Central is a cloud-based endpoint management solution that enables monitoring and management of endpoint infrastructure.MDM/EMM, UEMDevices, UsersLogicMonitorLogicMonitor is an automated infrastructure monitoring platform for enterprise IT and managed service providers.Infra Monitoring, ITAM/ITSMDevicesLogRhythmLogRhythm combines SIEM, user and entity behavior analytics, network traffic and behavior analytics, and security automation and orchestration.SIEMDevicesLookout Mobile Endpoint SecurityLookout Mobile Endpoint Security is a mobile security solution that provides comprehensive risk management across iOS and Android devices to secure against app, device, and network-based threats while providing visibility and control over data leakage.EDR/EPPDevices LucidchartLucidchart allows users to collaborate on drawing, revising and sharing charts and diagrams.Collaboration, SaaS ManagementUsers, SaaS dataMalwarebytes Endpoint Protection (Cloud Platform)Malwarebytes Endpoint Protection is a cloud-based security platform that combines detection and remediation technologies into a single cloud-managed agent.EDR/EPPDevicesMalwarebytes Endpoint Security (On-Prem Platform)Malwarebytes Endpoint Security protects endpoints from ransomware, automates endpoint remediation, and provides continuous visibility and monitoring.EDR/EPPDevicesManageEngine Endpoint (Desktop) Central and Patch Manager PlusManageEngine Endpoint (Desktop) Central and Patch Manager Plus is a desktop management and mobile device management software for managing desktops in LAN and across WAN and mobile devices from a central location.EDR/EPP, MDM/EMMDevices ManageEngine Firewall Analyzer ManageEngine Firewall Analyzer is an agentless log analytics and configuration management software that analyzes logs from firewalls and generates real-time alert notifications and security and bandwidth reports. Networking Devices ManageEngine MDM ManageEngine MDM is a mobile device management solution. MDM/EMMDevices, UsersManageEngine Network Configuration Manager ManageEngine Network Configuration Manager is multi-vendor network change & configuration management software for switches, routers, and firewalls. NetworkingDevices, UsersManageEngine OpManager ManageEngine OpManager enables monitoring of routers, switches, firewalls, servers and VMs for fault and performance. Infra MonitoringDevicesManageEngine OpUtils ManageEngine OpUtils is an IP address and switch port management software geared toward helping engineers efficiently monitor, diagnose, and troubleshoot IT resources. IPAM, NetworkingDevicesManageEngine PasswordManagerPro ManageEngine PasswordManagerPro is a complete solution to control, manage, monitor, and audit the entire life cycle of privileged access. PAMDevicesManageEngine Service Desk Plus ManageEngine Service Desk Plus is an IT help desk and customer support system. TicketingDevicesMandiant Mandiant Advantage is a multi-vendor XDR platform that delivers Mandiant’s transformative expertise and frontline intelligence to security teams of all sizes. Attack Surface Mgmt, Cyber IntelligenceDevicesMarkMonitor MarkMonitor provides domain management, security, and consulting. IPAMDevicesMasscanMasscan is a free internet port scanner utility.VA ToolDevicesMcAfee ePolicy Orchestrator (ePO)McAfee ePolicy Orchestrator (ePO) is a security management platform that provides real-time monitoring of security solutions.EDR/EPPDevicesMcAfee MVision CloudMcAfee MVision Cloud is a CASB solution that protects data and stops threats in the cloud across SaaS, PaaS, IaaS, and on-premise environments.Cloud SecurityDevicesMedigateMedigate is a medical device security platform that protects connected medical devices on health care provider networks, allowing inventory management and facilitating detection and prevention capabilities.NetworkingDevicesMen&Mice DNS ManagementMen&Mice DNS Management is a Network Management software providing secure, centralized, and highly resilient control of DNS across diverse platforms.NetworkingDevices, UsersMicro Focus GroupWiseMicro Focus GroupWise is a collaboration software solution that provides email, calendaring, and instant messaging.CollaborationUsersMicro Focus Server Automation (HP Server Automation, Opsware)Micro Focus Server Automation (formerly known as HP Server Automation or Opsware) provides operating system provisioning, automated patch management, and compliance control.Config Mgmt.DevicesMicro Focus SiteScopeMicro Focus SiteScope (previously HPE SiteScope) provides monitoring capabilities for IT infrastructure, including servers, databases, network, media, and more.Infra Monitoring, Cloud Mgmt., ITAM/ITSM, CloudDevicesMicrosoft Active Directory (AD)Microsoft Active Directory (AD) is a directory service for Windows domain networks that authenticates and authorizes all users and computers.IAM, Directory Devices, UsersMicrosoft AzureMicrosoft Azure is a cloud computing service created by Microsoft for building, testing, deploying, and managing applications and services through a global network of Microsoft-managed data centers.Cloud Infra, CloudDevicesMicrosoft Azure Active Directory (Azure AD) and Microsoft IntuneMicrosoft Azure Active Directory (Azure AD) is Microsoft's multi-tenant, cloud-based directory, and identity management service. Microsoft Intune is a cloud-based service in the enterprise mobility management (EMM) space that integrates closely with Azure Active Directory (Azure AD) for identity and access control and Azure Information Protection for data protection.IAM, Directory, SaaS ManagementDevices, Users, SaaS DataMicrosoft BitLocker Administration and Monitoring (MBAM)Microsoft BitLocker Administration and Monitoring (MBAM) provides a simplified administrative interface for BitLocker Drive Encryption. BitLocker offers protection against data theft or data exposure for computers that are lost or stolen, encrypting all data that is stored on the Windows operating system volumes and drives and configured data drives.DLP, Data SecurityDevicesMicrosoft Cloud App Security Microsoft Cloud App Security is a Cloud Access Security Broker (CASB) that supports various deployment modes including log collection, API connectors, and reverse proxy.Cloud Security, CloudUsersMicrosoft Defender ATPMicrosoft Defender Advanced Threat Protection (ATP) helps enterprise networks prevent, detect, investigate, and respond to advanced threats.EDR/EPP, SaaS ManagementDevices, SaaS dataMicrosoft Dynamics 365Microsoft Dynamics 365 Finance is a Microsoft enterprise resource planning system for medium to large organizations.HRDevices, Users Microsoft Endpoint Configuration Manager (MECM) Microsoft Endpoint Configuration Manager MECM (formerly SCCM) is a systems management software product for managing large groups of computers running Windows NT, Windows Embedded, macOS (OS X), Linux or UNIX, as well as Windows Phone, Symbian, iOS and Android mobile operating systems. Config Mgmt. DevicesMicrosoft Hyper-VMicrosoft Hyper-V is a native hypervisor; it can create virtual machines on x86-64 systems running Windows.Virtualization, ITAM/ITSM, CloudDevicesMicrosoft Key Management Service (KMS)Microsoft Key Management Service (KMS) enables organizations to activate systems within their own network, eliminating the need for individual computers to connect to Microsoft for product activation.ITAM/ITSMDevicesMicrosoft LyncMicrosoft Lync provides instant messaging (IM), audio and video calls, Lync Meetings, availability (presence) information, and sharing capabilities.CollaborationUsersMicrosoft SCOM (System Center Operations Manager)Microsoft SCOM (System Center Operations Manager) is a cross-platform data center monitoring system for operating systems and hypervisors, reporting state, health and performance information of computer systems.Infra Monitoring, RMMDevicesMicrosoft System Center Virtual Machine Manager (VMM)Microsoft System Center Virtual Machine Manager (VMM) is a unified management application for on-premises, service provider, and Azure cloud virtual machines.Cloud Mgmt., Containers, Virtualization, RMMDevicesMilestone XProtectMilestone XProtect is a video management software (VMS) for video surveillance.RMMDevices, UsersMimecastMimecast provides email security, data management and compliance, and security awareness and user behavior solutions.Email Security, Security AwarenessUsersMinerva Labs Endpoint Malware VaccinationMinerva Labs Endpoint Malware Vaccination simulates infection markers, rather than creating them, to contain outbreaks that bypass AV tools.EDR/EPPDevicesMiroMiro is a digital collaboration platform designed to facilitate remote and distributed team communication and project management.Collaboration, SaaS ManagementUsers, SaaS dataMistMist AI leverages data ingested from numerous sources, including APs, switches and firewalls to optimize user experiences and simplify operations across the wireless access, wired access, and SD-WAN domains.Cloud Infra, Cloud Mgmt, Cloud SecurityDevicesMobileIron EMMMobileIron EMM enables enterprises to secure and manage modern operating systems on mobile devices and desktops.MDM/EMMDevices MondayMonday.com is a cloud-based workflow management platform that allows teams to build and manage projects.Collaboration, SaaS Management Users, SaaS data MongoDBMongoDB is a document-oriented NoSQL database.DevOpsDevices, UsersMoroCloud Moro Cloud is a software-defined datacenter (SDDC) that offers integrated cloud components such as compute, network, storage, and security. Cloud Mgmt., Storage ManagementDevicesMosyleMosyle is an Apple Endpoint Management & Security platform with solutions for education providers and enterprises.MDM/EMMDevices, UsersMSP Manager N-able MSP Manager is cloud-based help desk and billing software for IT service. TicketingDevices Mulesoft Runtime Fabric Mulesoft Runtime Fabric is a container service that automates the deployment and orchestration of Mule applications and gateways. Container DevicesMutiny Mutiny is a network monitoring and alerting appliance. Networking Devices N2WS N2WS Backup & Recovery offers orchestrated recovery for core AWS and Azure services. Data SecurityDevices, Users N-able N-able provides integrated monitoring, management, security, and ticketing for managed service providers. RMM, TicketingDevicesNagios CoreNagios Core provides monitoring of all mission-critical infrastructure components including applications, services, operating systems, network protocols, systems metrics, and network infrastructure.Infra MonitoringDevicesNagios XINagios XI provides enterprise server and network monitoring.NetworkingDevicesNamecheap Namecheap offers free public DNS to help users get connected quickly and securely. IPAM Devices NasuniNasuni offers a file services platform built for the cloud that delivers infinite scale, built-in backup, global file sharing, and local file server performance.Storage Mgmt. DevicesNectusNectus is a network discovery, monitoring and visualization software.Networking, Infra Monitoring, ITAM/ITSMDevicesNetAppNetApp offers hybrid cloud data services for management of applications and data across cloud and on-premises environments.Storage Mgmt. Devices, UsersNetBoxNetBox is an open source web application to help manage and document computer networks.NetworkingDevicesNetBrain Integrated EditionNetBrain Integrated Edition is an adaptive automation integrated with existing NMS tools and IT workflows to automate documentation, troubleshooting, network change, and defense.NetworkingDevicesNetdiscoNetdisco is a web-based network management tool designed for network administrators.NetworkingDevicesNetApp Active IQ Unified Manager Active IQ Unified Manager provides performance monitoring capabilities and event root-cause analysis for systems running NetApp ONTAP software. Infra monitoring DevicesNetIQ Advanced AuthenticationNetIQ Advanced Authentication provides a centralized authentication framework that adds a strong level of authentication (MFA or 2 Factor).IAMDevicesNetIQ Identity ManagerNetIQ Identity Manager by MicroFocus uses integrated identity information to create and manage identities and control access to enterprise resources.IAMUsersNetMotion Mobility NetMotion Mobility is mobile VPN software that maximizes mobile field worker productivity by maintaining and securing their data connections as they move in and out of wireless coverage areas and roam between networks. NetworkingDevices, UsersNetskopeNetskope Security Cloud provides threat protection for cloud services, websites, and private applications.NetworkingDevicesNetWitness NDR NetWitness provides real-time network forensics with automated threat detection, response, and analysis solutions. NDRDevicesNetSpyglass NetSpyglass provides real-time network mapping, monitoring, visualization, and analytics for multi-vendor data center and WAN network operators. NetworkingDevicesNetwrix Auditor Netwrix Auditor is IT auditing software for detecting security threats and validating compliance. License Mgmt, ITAM/ITSM Users Neustar UltraDNSNeustar UltraDNS is an enterprise grade cloud-based DNS service.NetworkingDevicesNew RelicNew Relic provides cloud-based software to monitor and track servers, instances and services.RMMDevicesNexthinkNexthink is an IT solution that provides insights into activity across devices, operating systems, and workplace locations to improve IT experiences for employees.ITAM/ITSMDevices, UsersNinja One (RMM)Ninja One is an RMM (Remote Monitoring and Management) solution for MSPs and IT organizations, allowing them to automate, manage, and remediate endpoint management tasks.RMMDevices, UsersNmap Security ScannerNmap Security Scanner is a free and open source utility for network discovery and security auditing.VA ToolDevicesNozomi Guardian and CMCNozomi Guardian and CMC (formerly Nozomi Networks Guardian) monitors network communications and device behavior for physical and virtual appliances.OT/IoTDevicesNodeZero NodeZero by Horizon3 provides continuous autonomous penetration testing via SaaS. VA ToolDevicesNotionNotion offers a workplace productivity suite that includes solutions for collaboration and communication, task management, project tracking, and more. CollaborationUsersN-Sight RMM N-Sight RMM provides remote monitoring and access, ticketing, and management for Windows, Linux, and Mac devices. RMMDevicesNucleus Security Nucleus Security provides unified vulnerability management via integrations with third-party tools including threat intelligence, penetration testing, appsec, network scanners, and more. VA Tool DevicesNutanix AHVNutanix AHV is a hypervisor included with the Enterprise Cloud OS. AHV delivers flexible migrations, security hardening, automated data protection and disaster recovery, and analytics.Virtualization, ITAM/ITSM, CloudDevicesNutanix Prism Central Nutanix delivers hybrid and multicloud management, unified storage, database services, and desktop services to support applications and workloads. Cloud Infra, Cluster Mgmt, Virtualization Devices, Users ObserveITObserveIT provides insider threat security solutions, including employee monitoring, user activity monitoring, behavioral analytics, policy enforcement, and digital forensics.UEBADevicesObserviumObservium is an auto-discovering network monitoring platform supporting a wide range of device types, platforms and operating systems.NetworkingDevicesObsidium SecurityObsidian delivers a security solution for SaaS applications built around unified visibility, continuous monitoring, and security analytics.Cloud Security, SaaS SecurityDevices, UsersOktaOkta provides cloud software that helps companies manage their employees' passwords, by providing a “single sign-on” experience.IAM, SaaS Management Devices, Users, SaaS data OmniVista 2500 NMSThe Alcatel-Lucent OmniVista 2500 Network Management System (NMS) provides management tools and network-wide visibility, enabling operators to provision, manage and maintain a mobile infrastructure.NetworkingDevicesOnDMARC OnDMARC provides automated management for DMARC, DKIM and SPF records. Email SecurityDevicesOneLoginOneLogin's unified access management platform centralizes access across on-prem and cloud environments to give full control, management, and security for data, devices, and users.IAMUsersOnspring Compass Onspring is cloud-based automated GRC software for business process management. Risk Management Devices Oomnitza Enterprise Technology ManagementOomnitza Enterprise Technology Management helps IT teams manage technology assets with an agentless solution for endpoints (laptops, mobile devices, monitors, peripherals, and accessories), software (desktop, cloud, virtual machines), and users.ITAM/ITSMDevicesOpalOpal is an access management platform that helps enterprise companies scale least privilege. IAMUsersopenDCIMopenDCIM is a free open-source Data Center Infrastructure Management solution.NetworkingDevices, UsersOpenLdapOpenLDAP Software is an open source implementation of the Lightweight Directory Access Protocol. Directory, IAMDevices, UsersOpenStackOpenStack is an open source software solution for creating private and public clouds.Cloud Infra, CloudDevicesOpenText ZENworksOpenText ZENworks is a unified endpoint management and protection solution.UEMDevicesOpenVASOpenVAS is a software framework including several services and tools for vulnerability scanning and vulnerability management.VA ToolDevicesOpenVPN Cloud OpenVPN Cloud is a VPN-as-a-Service solution that eliminates the need for VPN server installation. Infra Monitoring, NetworkingDevices, UsersOpsgenieOpsgenie is an alerting and incident response tool.CollaborationUsers OpsRampOpsRamp is an AIOps-powered IT operations management (ITOM) solution. ITAM/ITSMDevicesOpsview Opsview is a monitoring platform for operating systems, networks, cloud, VMs, containers, databases, applications, and more. Infra Monitoring, RMMDevicesOPSWAT MetaAccessOPSWAT MetaAccess prevents risky devices from accessing local networks and cloud applications.NACDevicesOracle CloudOracle Cloud is a computing service providing servers, storage, network, applications and services.Cloud Infra, CloudDevices, UsersOracle Enterprise Manager Oracle Enterprise Manager is an on-premises management platform that provides a single dashboard to manage all Oracle deployments RMMDevices Oracle Fusion HCM Cloud Oracle Cloud Human Capital Management is a cloud-based HCM software application suite for global HR, talent, and workforce management. HRUsers Your browser does not support SVG.click here to download Oracle Ksplice Oracle Ksplice provides fast secure kernel and userspace patching without the need for reboots Config/Patch Mgmt Devices Oracle NetsuiteOracle Netsuite is a cloud-based ERP solution that provides global business management solutions. ERP Users, SaaS data Oracle VMOracle VM's server virtualization products support x86 and SPARC architectures and a variety of workloads such as Linux, Windows and Oracle Solaris.Virtualization, ITAM/ITSM, CloudDevicesOrca Cloud Visibility PlatformOrca Cloud Visibility Platform delivers visibility to cloud security posture, including prioritized alerts on vulnerabilities, compromises, misconfigurations, and more.Cloud Security, Cloud, VA ToolDevicesOrdrOrdr provides visibility and security of all connected devices, including unmanaged IoT, OT, and IoMT.Infra MonitoringDevicesOstendioOstendio is a security, compliance, and risk management platform.Risk Management, Audit/ComplianceDevicesOutpost24Outpost24 is a cyber risk management platform that helps organizations assess their attack surface and prioritize vulnerabilities. Attack Surface Mgmt.DevicesOvirtoVirt is a free, open-source virtualization management platform.Virtualization, ITAM/ITSM, CloudDevicesPacketFencePacketFence is a free open source network access control (NAC) solution which provides the following features: registration, detection of abnormal network activities, proactive vulnerability scans, isolation of problematic devices, remediation through a captive portal, 802.1X, wireless integration and User-Agent / DHCP fingerprinting.NACDevicesPagerDuty PagerDuty is a digital operations platform for system administrators and support teams to manage incident response. Collaboration Users Palo Alto Networks CortexPalo Alto Networks Cortex is an open and integrated, AI-based continuous security platform, allowing security operations teams to speed the analysis of massive data sets.NetworkingDevicesPalo Alto Networks Cortex XDRPalo Alto Networks Cortex XDR is a detection and response app that natively integrates network, endpoint, and cloud data to detect threats and stop sophisticated attacks.EDR/EPPDevicesPalo Alto Networks Cortex Xpanse Palo Alto Networks Cortex Xpanse (Palo Alto Networks Expanse Expander) discovers, monitors, and tracks Internet Assets automatically to reduce risks and exposures.Cyber IntelligenceDevicesPalo Alto Networks PanoramaThe Palo Alto Panorama management server provides centralized monitoring and management of multiple next-generation firewalls and appliance clusters.Networking, FirewallDevicesPalo Alto Networks Prisma Access Prisma Access SASE from Palo Alto Networks converges network security, SD-WAN, and autonomous digital experience management in the cloud to provide a secure access service edge. IAM, Networking Devices, Users Palo Alto Networks Prisma Cloud Workload Protection Prisma Cloud Workload Protection (CWPP) provides protection across hosts, containers, and serverless deployments in any cloud, throughout the application lifecycle. Cloud SecurityDevicesPalo Alto Prisma CloudPrisma Cloud is a native cloud security platform that provides visibility, threat prevention, compliance assurance, and data protection across multi-cloud environments.Cloud Mgmt., CloudDevices, UsersPalo Alto Traps Endpoint Security ManagerPalo Alto Traps Endpoint Security Manager (ESM) delivers endpoint protection to prevent advanced persistent threats (APTs) and zero-day attacks.EDR/EPPDevicesPanoraysPanorays is a SaaS-based platform that enables companies to view, manage and engage on the security posture of their third-parties, vendors, suppliers, and business partners.Cyber IntelligenceDevicesPaperCutPaperCut is a print management solution that provides print job tracking and reporting.IoTDevicesParsecParsec App is a remote desktop application primarily used for playing games through video streaming.Remote Conferencing, CollaborationDevicesPaycor Paycor is an automated human capital management (HCM) platform for managing HR and payroll needs in one place. HRUsersPaylocity Paylocity is a cloud-based payroll and human capital management software. HR Users PDQ InventoryPDQ Inventory is a systems management tool that scans Windows computers to collect hardware, software, and Windows configuration data.ITAM/ITSMDevices, UsersPenteraPentera recons and maps web-facing attack surface assets. This includes domains, web interfaces, IPs, networks, and gateways.Attack Surface MgmtDevicesPeopleHR PeopleHR is HR automation software (HRIS) for small and growing businesses. HRUsersPersistentPersistent Systems Radia Endpoint Manager (formerly RCA) is an end-user device (PC and mobile device) lifecycle management tool for automating routine client-management tasks. Config/Patch Mgmt.DevicesPhosphorus Phosphorus provides IoT discovery, password management, and patch management. IoTDevicesphpIPAMphpIPAM is an open-source web IP address management application (IPAM).NetworkingDevices, UsersPingboard Pingboard creates real-time organizational charts by automatically synchronizing organizational charts with HRMS software. HR Users PingFederatePingFederate from Ping Identity is an enterprise authentication federation server that enables user authentication and single sign-on. IAM, SaaS ManagementUsers, SaaS Data PingID Ping offers an identity management solution that includes multi-factor authentication, single sign-on, identity verification, and more. IAMUsersPingOne DirectoryPingOne Directory provides a hosted directory service that developers can use to store user authentication and profile data.IAM, DirectoryUsersPivotal Cloud FoundryPivotal Cloud Foundry is an app development and deployment platform for public and private clouds.Cloud Mgmt., CloudDevicesPKWAREPKWARE’s data protection platform finds, classifies, and protects sensitive data, allowing security managers to define data protection policies and monitor activity across the organization.DLP, Data Security, EncryptionDevicesPluralSight PluralSight offers a variety of video training courses for software developers, IT administrators, and creative professionals through its website. CollaborationUsersPolymer DLP Polymer is a DLP solution that automates identification, monitoring, and remediation for sensitive data in cloud environments, and helps companies stay compliant with HIPAA, PCI. and GDPR. DLP Users Portnox Clear Portnox CLEAR provides automated security, visibility and control for every device accessing the network including Internet of Things (IoT), BYOD, mobile and unmanaged systems. NACDevices Portnox Core Portnox CORE is a software-based solution that runs on Windows Servers (physical and virtual) to continually communicate with all existing networking infrastructure, gaining complete visibility into all assets currently connected to the network. Infra Monitoring Devices PreyPrey is a cross-platform, open source tool that allows you to track and recover your devices. MDMDevices, UsersPritunlPritunl is an enterprise distributed OpenVPN, IPsec and WireGuard server. Data SecurityDevices, UsersPrivXPrivX provides privileged access to on-prem and cloud environments, including control access to servers, network devices and other critical infrastructure according to user roles and privileges.PAM, IAMDevices, UsersProjector PSAProjector Professional Services Automation (PSA) software is an operational system for professional services organizations.CollaborationUsersPromisec Endpoint ManagerPromisec Endpoint Manager is an agentless endpoint detection and remediation solution that detects, analyzes, and remediates abnormalities.EDR/EPPDevicesProofpoint Proofpoint is a cybersecurity company that offers solutions to protect workers and their data from threats targeting email, mobile, social, cloud, and other digital channels. Email SecurityUsersProofpoint Endpoint DLP Proofpoint Endpoint DLP helps identify risk user behavior and protect sensitive data. DLPDevicesProofpoint's ObserveIT Insider Threat Management PlatformProofpoint's ObserveIT Insider Threat Management (ITM) platform is a cloud-based solution that provides insider risk detection, incident response, and unified visibility across user activity, data interaction, and threat context.UEBADevicesProofpoint PODProofpoint on Demand (PoD) Email Security classifies types of email, while detecting and blocking threats. Email Security DevicesProofpoint Security Awareness Training Proofpoint Security Awareness Training provides interactive and customizable security awareness training. Security Awareness UsersProofpoint TAPProofpoint Targeted Attack Protection (TAP) is an email-based security solution for ransomware prevention and other email-based threats.Email SecurityUsersProxmox Virtual Environment (VE)Proxmox Virtual Environment (VE) is an open source server virtualization management solution based on QEMU/KVM and LXC.Virtualization, ITAM/ITSM, CloudDevicesPRTG Network MonitorPRTG is a network monitoring application for Windows and Linux systems and servers, as well as miscellaneous hosts such as switches, routers, and other devices. Infra monitoring, RMMDevicesPulsewayPulseway is a remote monitoring and management (RMM) system solution that enables an admin to monitor, manage and troubleshoot workstations, servers and network devices across an environment remotely.Remote Monitoring and ManagementDevicesPulumi Cloud Engineering PlatformPulumi provides an Infrastructure as Code solution for Developers and Infrastructure Teams, enabling them to build, deploy, and manage cloud applications and infrastructure using various languages, tools, and engineering practices.Software Development Version Control, DevOpsUsersPuppetPuppet is an open-source software configuration management tool.Config Mgmt.DevicesPure Storage Pure1Pure Storage Pure1 is a cloud-based storage management solution that provides self-driving storage, data-storage management, and monitoring.Storage Mgmt. DevicesQuadrantQuadrant is a Managed Detection and Response solution operating at the intersection of People and Product.Attack surface mgmtDevicesQualys Cloud PlatformQualys Cloud Platform monitors customers' global security and compliance posture using sensors.VA ToolDevices, UsersQualys Container SecurityQualys Container Security provides the ability to discover, track, and secure containers.ContainersDevicesQuest KACE Endpoint Systems Management AppliancesQuest KACE Endpoint Systems Management Appliances provision, manage, secure, and service network-connected devices.NetworkingDevicesQushQush enables customers to discover risks, educate employees, enforce policies and prevent data loss. DLP, Data Security, UEBADevicesRadiflow Radiflow provides visibility and anomaly detection for OT assets. OTDevicesRancherRancher is an open-source multi-cluster orchestration platform that enables operations teams to deploy, manage, and secure enterprise Kubernetes.Containers, CloudDevicesRandoriRandori is an attack platform which combines continuous reconnaissance, real-time target analysis, and the ability to safely execute attacks on-demand to provide an attacker’s perspective.Cyber IntelligenceDevicesRapid7 InsightIDRRapid7’s InsightIDR is a security center for incident detection and response, authentication monitoring, and endpoint visibility.SIEMDevicesRapid7 InsightVMRapid7 InsightVM provides visibility and risk prioritization for vulnerabilities found in local, remote, cloud, containerized, and virtual infrastructure. VA Tool Devices Rapid7 Insight Account Platform Rapid7 Insight API: This API provides API access for the entire Rapid7 Insight platform and suite of products. License Mgmt Users Rapid7 Nexpose and InsightVMRapid7 Nexpose is an on-premise vulnerability management solution, providing discovery, detection, verification, risk classification, impact analysis, reporting and mitigation. Rapid7 InsightVM is a cloud-based vulnerability management solution that combines Rapid7’s Insight platform along with Nexpose core capabilities.VA ToolDevicesRapid7 Nexpose WarehouseRapid7 Nexpose Warehouse fetches device information directly from an external data warehouse.VA ToolDevices Rapid7 Threat Command Rapid7 Threat Command is an external threat intelligence tool that helps users find and mitigate threats targeting organizations. Cyber Intelligence UsersRecordedFuture RecordedFuture threat intelligence helps identify the vulnerabilities that pose an actual risk to an organization, adding context and data to CVE scoring. Attack Surface Mgmt., Cyber IntelligenceDevicesRed CanaryThe Red Canary suite includes products that record telemetry, detect and investigate threats, and automate remediation.EDR/EPPDevices, UsersRed Hat Automation Controller Red Hat Automation Controller (formerly Ansible Tower) is a web console and REST API for operationalizing Ansible across teams, organizations, and the enterpriseITAM/ITSMDevices Red Hat Customer Portal The Red Hat Customer Portal provides access to product evaluations, purchasing capabilities, and knowledge management content. Config/Patch mgmt, Software Development Version Control DevicesRed Hat IdMRed Hat Identity Management (IdM) provides a centralized and unified way to manage identity stores, authentication, policies, and authorization policies in a Linux-based domain.IAMDevices, Users Red Hat Insights Red Hat Insights is a managed service for the automated discovery and remediation of issues in Red Hat products. IT Agent, Config/Patch MgmtDevicesRed Hat OpenShift Container Red Hat OpenShift is a Kubernetes container platform that allows developers and operators to manage cloud-native applications throughout the DevOps cycle, for any cloud.Cloud Infra., ContainersDevicesRed Hat SatelliteRed Hat Satellite is a system management solution used to deploy, configure, and maintain systems across physical, virtual, and cloud environments.Config Mgmt.DevicesRedSealRedSeal’s network modeling and risk scoring platform models customers' entire hybrid data center of public cloud, private cloud and physical network.NetworkingDevicesRemediant SecureONE (JITA)Remediant SecureONE is a Just-In-Time Privileged Access Management (JITA) solution that enables control and insight over the distribution, usage, and protection of privileged access across enterprise environments.IAMDevicesRescueAssist (GoToAssist)RescueAssist (formerly GoToAssist) is a cloud-based toolset for IT and customer support teams including remote support, IT monitoring, and service desk management.IT Agent, Config Mgmt., Ticketing, ITAM/ITSMDevicesRHSM Management Portal Red Hat Subscription Management (RHSM) provides tools that help administrators track information about support contracts and software subscriptions. License management DevicesRingCentralRingCentral provides cloud-based communication and collaboration products and services including phone, messaging, video meetings, and contact center. Collaboration Devices, UsersRippling Rippling provides unified workforce management software to help companies govern employees’ payroll, benefits, expenses, devices, apps, and more. HRUsersRiskIQ Digital FootprintRiskIQ Digital Footprint software provides an active, comprehensive inventory of all of the organization’s IPs, domains, and hosts.Attack Surface Mgmt., Cyber IntelligenceDevicesRiskReconRiskRecon is a cloud-based third-party risk management solution.SaaS Management, Risk ManagementUsersRiskSenseRiskSense provides vulnerability prioritization and management to dynamically control and measure cybersecurity risk.VA ToolDevicesRiverbed NetIMRiverbed NetIM is a solution for discovering, modeling, monitoring, and troubleshooting your infrastructure.Infra MonitoringDevicesRiverbed SteelCentral Controller (SCC)Riverbed SteelCentral Controller SCC facilitates administration tasks for groups of SteelHeads, Interceptors, Mobile Controller, Cores, and Edges.Networking, AppSec, DevOps DevicesRobin Robin (now Symworld Cloud) is a Kubernetes-based platform that automates the deployment, scaling, and lifecycle management of data- and network-intensive applications. Cloud Mgmt, DevOps Users, Devices RSA ArcherRSA Archer is an integrated risk management platform for managing multiple dimensions of risk, including IT, operational, third-party, resiliency, and compliance risk.Risk Mgmt., GRCDevices, UsersRSA SecurID RSA SecurID provides identity and access management capabilities for on-premise deployments – in authentication, access management, and identity governance. IAMUsersRubrikRubrik provides data security and data protection on a single platform, including: Zero Trust Data Protection, ransomware investigation, incident containment, sensitive data discovery, and orchestrated application recovery.Data Security, DLPDevices Rubrik Polaris Rubrik provides data security and data protection on a single platform, including: Zero Trust Data Protection, ransomware investigation, incident containment, sensitive data discovery, and orchestrated application recovery. Data Security, DLP Users RudderRudder is an open source audit and configuration management utility to help automate system configuration config/patch mgmt, IT Agent, Audit/compliance DevicesRUCKUS Cloud CommScope RUCKUS Cloud is a network management-as-a-service platform that enables IT to provision, manage, optimize, and troubleshoot wired and wireless networks. Networking, RMM Devices, Users runZero runZero (formerly Rumble Network Discovery) is a cloud-based network discovery platform that identifies and monitors network-connected IT assets. NetworkingDevicesSafeBreach SafeBreach offers a breach and attack simulation platform that helps organizations locate and remediate security issues. Audit/ComplianceDevices, UsersSafeConsole SafeConsole by DataLocker allows administrators to provision, secure, manage, and audit encrypted USB drives, USB ports, and virtual folders. DLPUsersSage PeopleSage People is a people management platform that provides employee record management, payroll. processing and management, talent management, and more.HR, IAMUsers SailPoint IdentityIQ SailPoint IdentityIQ is an identity and access management (IAM) solution that delivers automated access certifications, policy management, access request and provisioning, password management, and identity intelligence. IAMUsersSailpoint Identity ManagerSailPoint provides access governance and identity management.IAMUsersSailPoint IdentityNow SailPoint IdentityNow is a SaaS identity and access management (IAM) solution. IAM, SaaS ManagementUsers, SaaS Data SalSal is an open-source reporting solution for managed endpoints.MDM/EMMDevices Your browser does not support SVG.click here to download Salesforce Salesforce is a customer relationship management solution that gives a single, shared view of every customer. CRM, SaaS ManagementUsers. SaaS DataSaltStack Open SourceSaltStack Open Source is open-source software for event-driven security, cloud and configuration management.SOAR, Config. Mgmt.DevicesSamsung KnoxSamsung Knox is a built-in solution used to secure, deploy, and manage Samsung and Galaxy devices.MDM/EMMDevicesSassafras Sassafras is IT asset management software that allows organizations to inventory and manage IT assets. ITAM/ITSM Devices SaviyntSaviynt Enterprise Identity Cloud is a cloud identity and access governance platform.Cloud Security, IAMUsersSchneider Electric EcoStruxure ITSchneider Electric EcoStruxure IT provides software and services for IT and Data Center teams to monitor and manage critical IT infrastructure on-premise, in the cloud, and at the edge.Data Center Infrastructure Mgmt., (DCIM), Data SecurityDevicesScienceLogic ScienceLogic is an IT operations management (ITOM) and AIOps platform for monitoring and managing hybrid cloud infrastructure. Infra MonitoringDevicesScopNETScopNET provides an agent-free solution for the prevention of unauthorized access to corporate networks, integrating switches, routers and firewalls to detect alien devices.NACDevicesSecdo Endpoint ProtectionSecdo Endpoint Protection automates endpoint forensic analysis and cyber investigations for security teams.EDR/EPPDevicesSectigoSectigo provides digital certificate lifecycle and PKI management.Certificate ManagementDevicesSecureAuth SecureAuth is an identity access management security solution that provides passwordless authentication, multi-factor authentication, SSO, and more. IAMUsersSecure Code Warrior Secure Code Warrior is a training platform that helps developers learn to write secure code. Security Awareness, Data Security Users SecureW2 JoinNow A suite of network security software that helps organizations deploy WPA2-Enterprise Wi-Fi security and utilize X. 509 certificates beyond Wi-Fi for VPN, Web/Browser authentication and SSL (DPI) Inspection.NACDevicesSecureworks Red Cloak Secureworks Taegis XDR (formerly Red Cloak TDR) is an endpoint detection and response technology for the cloud, endpoints and the network. EDR/EPPDevicesSecureworks Taegis VDR Secureworks Taegis VDR is a cloud-based vulnerability management solution. VA ToolDevicesSecureworks Taegis XDR (Red Cloak TDR)Secureworks Red Cloak Threat Detection and Response (TDR) is a Software as a Service (SaaS) solution that provides security intelligence analytics to data consumed by third-party applications.Cyber IntelligenceDevicesSecurityScorecardSecurityScorecard rates cybersecurity postures of corporate entities through completing scored analysis of cyber threat intelligence signals for the purposes of third party management and IT risk management.Risk ManagementDevicesSensuSensu is a cloud monitoring solution that provides monitoring workflows automation and visibility into multi-cloud environments.Cloud Mgmt., CloudDevicesSentinelOneSentinelOne is an endpoint protection solution including prevention, detection, and response.EDR/EPPDevicesSentinelOne RangerSentinelOne Ranger creates visibility into your network by using distributed passive and active mapping techniques to discover running services, unmanaged endpoints, IoT devices, and mobiles.EDR/EPPDevicesSentra Sentra offers cloud data security posture management (DSPM), allowing customers to automatically discover, classify, monitor, and protect cloud data. Cloud Security, Data Security Devices Sepio Sepio is an asset risk management platform that provides visibility into organizations' hardware assets and their related security posture. VA ToolDevices, UsersSerraview Serraview is workplace management and space optimization software. HR Users ServiceNowServiceNow provides service management software as a service, including IT services management (ITSM), IT operations management (ITOM) and IT business management (ITBM).CMDB, ITAM/ITSM, Ticketing, SaaS Management Devices, Users, SaaS data SevOne Data PlatformSevOne Data Platform is a network and infrastructure management platform that provides monitoring and analytics.NetworkingDevicesShadowserver Shadowserver gathers and analyzes data on malicious internet activity including malware, botnets, DDoS, fraud, and more. Cyber IntelligenceDevicesSharePoint SharePoint creates internal websites where organizations store, organize, share, and access information from any device. Collaboration Devices, Users Shockwave Cloud Shockwave Cloud helps identify and track cloud related issues and misconfigurations. Cloud Infra, Cloud Mgmt, Cloud Security Devices, Users ShodanShodan is a search engine for Internet-connected devices.IoTDevicesSignal SciencesSignal Sciences is a web protection platform that protects on-premise, multi-cloud and hybrid-cloud apps, within containers and serverless functions.AppSec, DevOpsDevicesSimpleMDM SimpleMDM is a mobile device management solution for Apple devices. MDM/EMMDevicesSite24x7 Site24x7 offers a performance monitoring solution for websites, servers, cloud environments, networks, applications, and users. RMMDevicesSkybox Firewall AssuranceSkybox Firewall Assurance provides automation of firewall management tasks across different firewall vendors and complex rulesets.FirewallDevicesSlackSlack is a chat and collaboration hub used to connect people, information, tools, and services.Collaboration, SaaS ManagementUsers, SaaS DataSmartsheetSmartsheet is a cloud-based work management platform that empowers collaboration, drives better decision making, and accelerates innovation.Collaboration, SaaS ManagementUsers, SaaS DataSmokescreen IllusionBlackSmokescreen uses planted decoys to actively lure and capture attacks on endpoints, networks, and web applications.DeceptionDevices SnapComms SnapComms is an internal communications software solution. Collaboration UsersSnipe-ITSnipe-IT is a free, open source IT asset management system written in PHP.ITAM/ITSMDevicesSnowflake Data Warehouse Snowflake is a data warehouse built on top of the Amazon Web Services or Microsoft Azure cloud infrastructure, and allows storage and compute to scale independently. CollaborationDevices, Users Snow Software Asset ManagementSnow Software provides Software Asset Management (SAM) products and services to reduce the risk, cost, and complexity associated with software assets and licensing.ITAM/ITSMDevices Snow Software Exceptions Snow Software Exceptions adapter provides a way to track and manage software exceptions. ITAM/ITSM DevicesSnyk Snyk is a developer security platform integrating directly into development tools, workflows, and automation pipelines. AppSec, Containers, DevOps, Software Development Version Control, VA Tool Devices, Users SolarWinds Network Performance MonitorSolarWinds Network Performance Monitor is a unified IT systems management system that tracks the performance of networks, applications, systems, and databases on-premises, in a hybrid environment, or in the cloud.ITAM/ITSMDevicesSolarWinds Service Desk (Samanage)SolarWinds Service Desk (formerly Samanage) is a unified, cloud-based IT service desk and asset management platform.Ticketing, CMDB, ITAM/ITSMUsersSonicWallSonicWall next-generation firewalls (NGFW) provide security, control, and visibility to maintain an effective cybersecurity posture.FirewallDevices SonicWall Network Security Manager SonicWall Network Security Manager enables organizations to deploy and manage all firewalls, connected switches and access points in one interface. Firmware Security, NetworkingDevicesSophos CentralSophos Central is a unified console that provides one place to manage Sophos products, including: endpoint, mobile, encryption, web, email, server, and wireless security.EDR/EPPDevicesSophos Cloud OptixSophos Cloud Optix is a public cloud visibility and threat response solution that detects, responds, and prevents cloud security and compliance gaps.Cloud Security, CloudDevices, UsersSophos Endpoint ProtectionSophos Endpoint Protection helps secure workstations by adding prevention, detection, and response technology on top of the operating system.EDR/EPPDevicesSOTI MobiControlSOTI MobiControl is a software system for managing mobile devices in the enterprise.MDM/EMMDevicesSpacewalkSpacewalk is an open-source systems management solution for system provisioning, patching and configuration.Config Mgmt.DevicesSpecops InventorySpecops Inventory collects and reports information on hardware, software, registry, user settings, operating system, security data, and Active Directory data.IT Agent, Config Mgmt.DevicesSpiceworksSpiceworks provides network monitoring to capture, analyze, and monitor network traffic.NetworkingDevicesSplashtopSplashtop is a remote access and remote support tool. RMMDevices, UsersSplunkSplunk captures, indexes, and correlates real-time data in a searchable repository.SIEMDevices, UsersSpycloudSpyCloud is an account takeover prevention and fraud investigation tool that alerts companies when their users' data has been compromised in a third-party breach. AppSecUsersSQLiteThe SQLite adapter imports device information from an SQLite database.CMDB, ITAM/ITSMDevices, UsersSQL ServerThe SQL Server adapter imports device information from arbitrary SQL servers: Microsoft SQL Server, MySQL and PostgreSQL.CMDB, ITAM/ITSM Devices, UsersStackRoxStackRox is a container security platform that protects cloud-based applications, detects threats, and manages vulnerabilities, compliance requirements, and configurations.Containers, VA Tool, Audit/ComplianceDevicesStairwell Stairwell offers a threat hunting and detection and response platform called “Inception.” NDR Devices Statseeker Statseeker is a network performance monitoring solution. Infra Monitoring Devices SAP SuccessFactors SAP SuccessFactors manages various aspects of HR operations, including recruitment, employee performance, HR analytics, payroll, and learning. HRUsersSumo LogicSumo Logic is a cloud-based service for logs & metrics management for modern apps.Cloud Mgmt., CloudDevices, UsersSunbirdSunbird dcTrack is a data center infrastructure monitoring product that provides dashboards and KPIs for remote data center management.Infra MonitoringDevicesSunflowerSunflower Lab is a mobile app, web app, and custom software development company.Software Development Version ControlDevicesSweepaticSweepatic automates continuous mapping, monitoring, and managing of all internet-connected assets and risks to deliver an attack surface management platform.Attack Surface Mgmt.DevicesSymantec Cloud Secure Web Gateway (WSS Agent)Symantec WSS is a cloud-delivered secure web gateway that protects against malware and enforces policies to access the web.Secure Web GatewaysDevicesSymantec Cloud Workload Protection (CWP)Symantec Cloud Workload Protection (CWP) automates security policy enforcement to protect public cloud workloads.Config Mgmt., EDR/EPPDevicesSymantec Control Compliance Suite (CCS)Symantec Control Compliance Suite (CCS) is a solution to help identify security gaps and vulnerabilities and automate compliance assessments for over 100 regulations, mandates, and best practice frameworks including GDPR, HIPAA, NIST, PCI and SWIFT. Symantec CCS discovers and inventories all networks and assets including managed and unmanaged devices allowing for assets to be profiled and ranked for risk potential.VA ToolDevicesSymantec Data Center Security (DCS) Server AdvancedSymantec Data Center Security Server Advanced delivers security detection, monitoring, and prevention capabilities for both physical and virtual server infrastructures.Data SecurityDevicesSymantec DLPSymantec DLP is a data loss protection and prevention solution. Its management console, the DLP Enforce Platform, and its reporting tool, IT Analytics for DLP, allows writing and enforce policies to reduce information risks.DLP, Data SecurityDevicesSymantec Endpoint Detection and Response (EDR)Symantec Endpoint Detection and Response (EDR) detects, protects, and responds to threats to the organization's network.EDR/EPPDevicesSymantec Endpoint EncryptionSymantec Endpoint Encryption combines full-disk and removable media encryption with centralized management to protect sensitive information and ensure regulatory compliance.Encryption, Data SecurityDevicesSymantec Endpoint Management Suite (Altiris)Symantec Endpoint Management Suite (formerly Altiris) manages, patches, and remediates application and OS configurations on desktops, laptops and servers to strengthen endpoint security and maximize user productivity.ITAM/ITSM, Config Mgmt.DevicesSymantec Endpoint Protection 12.xSymantec Endpoint Protection manages events, policies, and registration for the client computers that connect to customer networks.EDR/EPPDevicesSymantec Endpoint Protection 14.xSymantec Endpoint Protection manages events, policies, and registration for the client computers that connect to customer networks.EDR/EPPDevicesSymantec Endpoint Protection CloudSymantec Endpoint Protection Cloud unifies threat protection and device management for PC, Mac, mobile devices, and servers to protect endpoints from ransomware, zero-day threats, and other sophisticated attacks.EDR/EPPDevicesSyncro MSPSyncro MSP is a combined remote monitoring and management (RMM) and professional services automation (PSA) platform that manages invoicing, credit card payments, help desk, customer relationship tracking, remote access and support, and more managed IT services. RMMDevicesSyxsenseSyxsense is an endpoint security management tool that combines IT management, patch management, and vulnerability scanning.EDR/EPPDevicesSysAidSysAid is an integrated ITSM, Service Desk and Help Desk software solution.ITAM/ITSM, TicketingDevices, Users Tableau Tableau is a data visualization and analysis tool used to create charts, graphs, maps, dashboards, and stories. Cloud Mgmt., Cyber IntelligenceUsersTailscale Tailscale is a minimal-configuration WireGuard-based VPN. Secure Web GatewaysDevices, UsersTalentLMS TalentLMS is an all-in-one training platform. Collaboration, HRUsersTalon Talon is a secure enterprise browser designed to defend against malware and prevent data loss for managed and unmanaged devices. Secure Enterprise Browser DevicesTanium AssetTanium Asset provides an inventory of hardware and software assets including servers, laptops, and desktops for thorough insight.ITAM/ITSM, Config Mgmt.DevicesTanium Comply Tanium Comply conducts vulnerability and compliance assessments against operating systems, applications, security configurations, and policies. Audit/Compliance DevicesTanium DiscoverTanium Discover scans for unmanaged assets with almost no impact on the network.ITAM/ITSM, Config Mgmt.DevicesTanium InteractTanium Interact lets you ask questions to gather live endpoint data in order to create an up-to-date inventory of hardware and software assets.ITAM/ITSM, Config Mgmt.DevicesTanium Client StatusTanium Client Status provides an inventory of all clients that have registered with the Tanium platform.ITAM/ITSM, Config Mgmt.DevicesTCPWave (IPAM)TCPWave IPAM allows administrators to manage their DNS and DHCP infrastructure for on-premise and cloud environments.NetworkingDevicesTeamCity TeamCity is a build management and continuous integration server. DevOps, Software Development Version Control Devices TeamDynamix TeamDynamix is an ITSM/ESM and project portfolio management solution with enterprise integration and automation. ITAM/ITSM Users, Devices TeamViewer TeamViewer is remote access and remote control computer software, allowing maintenance of computers and other devices. RMMDevicesTenable.asmTenable Attack Surface Management (formerly Tenable.asm) continuously maps the internet and discovers connections to internet-facing assets. Attack surface mgmt. DevicesTenable Identity Exposure (formerly Tenable.ad) Tenable Identity Exposure (formerly Tenable.ad) provides real-time security monitoring for Microsoft Active Directory (AD) infrastructures. Audit/Compliance Users Tenable.io Scan Export CSV Tenable Vulnerability Management CSV File (Formerly Tenable.io) provides the ability to import a Tenable Vulnerability Management (Formerly Tenable.io) scan CSV. VA ToolDevicesTenable NessusTenable Nessus is a vulnerability scanning platform for auditors and security analysts.VA ToolDevicesTenable Nessus CSV FileTenable Nessus CSV File Adapter imports device information from vulnerability scan data.VA ToolDevicesTenable.ioTenable.io automatically discovers and assesses a customer's environment for vulnerabilities, misconfigurations, and other cybersecurity issues.VA ToolDevices, UsersTenable.OT (indegy)Tenable.OT (Indegy) (previously Indegy Industrial Cybersecurity Suite) protects industrial networks from cyber threats, malicious insiders, and human error. OTDevices Tenable.ot Tenable.ot provides the ability to identify operational technology (OT) assets, communicate risk, and prioritize action. OT Devices Tenable.sc (SecurityCenter)Tenable.sc (formerly SecurityCenter) consolidates and evaluates vulnerability data, prioritizing security risks.VA ToolDeicesTessian Tessian is a cloud email security platform that prevents email threats and protects against data loss. DLP, Email SecurityDevicesThinkst CanaryThinkst Canary is deception technology deployed as tokens to catch malicious activity.Cloud Security, Data Security, DeceptionDevicesThousandEyes ThousandEyes is a network infrastructure monitoring and troubleshooting platform Infra monitoring, Networking Devices Threat StackThreat Stack is a provider of cloud security management and compliance solutions.Cloud Security, CloudDevices Thycotic Privilege Manager Thycotic Privilege Manager mitigates malware and security threats from exploiting applications by removing local administrative rights and enforcing least privilege on endpoints. PAMDevices, UsersThycotic Secret ServerThycotic Secret Server is a Privileged Access Management (PAM) solution for protecting your privileged accounts, available both on premise or in the cloud.PAM, IAMUsersToriiTorii is a SaaS Management Platform letting IT professionals discover, optimize, and control SaaS usage and costs.SaaS Mgmt, Cloud Infra. & Mgmt.UsersTrellix ePO Trellix provides hardware, software, and services to investigate cybersecurity attacks, protect against malicious software, and analyze IT security risks. EDR/EPP Devices Trend Micro Apex One (OfficeScan)Trend Micro Apex One (formerly OfficeScan) is an endpoint security solution protecting against malware, scripts, injection, ransomware, memory and browser attacks, and exploits.EDR/EPPDevicesTrend Micro Cloud App SecurityTrend Micro Cloud App Security provides threat and data protection for cloud applications and services such as Google G Suite, Dropbox, Microsoft 365, and more.Cloud Security, CloudUsers Trend Micro Conformity Trend Micro Conformity provides real-time monitoring, automated security and compliance checks, and auto-remediation for cloud infrastructure. Cloud SecurityDevicesTrend Micro Deep SecurityTrend Micro Deep Security can automatically virtually patch server, cloud, VDI and application vulnerabilities.Config Mgmt., EDR/EPPDevices Trend Micro Vision One Trend Micro Vision One is a threat defense platform that includes: Advanced extended detection and response (XDR) capabilities. EDR/EPP Devices Trend Micro worry FreeTrend Micro worry-free is an endpoint and SaaS solution protecting against malware, scripts, injection, ransomware, memory and browser attacks, and exploits.EDR/EPPDevicesTripwire EnterpriseTripwire Enterprise is a security configuration management (SCM) suite that provides fully integrated solutions for policy, file integrity and remediation management.Config Mgmt., EDR/EPPDevicesTrueFortTrueFort offers application behavior analytics, control, and protection.AppSec, DevOpsDevicesTruffleHogTruffleHog is a security tool that scans code repositories for vulnerabilities related to secret keys, such as private encryption keys and passwords.AppSec, DevOpsDevicesTruPortal TruPortal is a secure, web-based access credential system for physical access. IAM, IoTDevicesTrustwaveTrustwave is a managed security services provider focused on managed detection and response.RMMUsersTufin SecureTrackTufin SecureTrack is a firewall management solution that delivers security, compliance, and connectivity across physical networks and hybrid cloud.FirewallDevicesTwistlockTwistlock provides container and cloud native cybersecurity for teams using Docker, Kubernetes, serverless, and other cloud native technologies.Containers, CloudDevicesTYCHON TYCHON is an endpoint analytics and remediation platform that allows users to search, visualize, remediate, and monitor security compliance across assets. Attack Surface Mgmt., EDR/EPP, ITAM/ITSM DevicesUdemy Udemy is an online learning and teaching marketplace. CollaborationDevicesUbiquiti Networks UniFi ControllerThe UniFi Controller is a wireless network management software solution for managing multiple wireless networks using a web browser.NetworkingDevicesUKG Pro (Ultimate Software UltiPro)UKG Pro (formerly Ultimate Software UltiPro) is cloud-based human capital management (HCM) software.HCM, IAMUsersUnimus Unimus is a network configuration and automation tool which provides information on devices, backups, and configurations. Networking Devices Unisys Stealth Unisys Stealth transforms existing networks—both on-premises and in the cloud—into a Zero Trust Network through identity-based microsegmentation. NetworkingDevicesUnitrends Unitrends (a Kaseya company) provides all-in-one enterprise backup continuity and disaster recovery solutions. DLP Devices Universal SSH Key Manager (UKM) Universal SSH Key Manager (UKM) is an enterprise grade SSH user key management solution that uses a non-disruptive approach to gain and retain control of the SSH infrastructure.ITAM/ITSMDevicesUpGuard CyberRiskUpGuard CyberRisk provides third-party vendor risk and external cyber risk monitoring. The platform has two main modules: UpGuard BreachSight which monitors company external risk posture and Vendor Risk monitors and helps manages the risk posture of third party vendors.Cyber IntelligenceDevices, UsersUpkeep UpKeep Asset Operations Management Platform is a mobile-first CMMS (computerized maintenance management system), EAM (enterprise asset management), and IIoT (industrial internet of things) suite of solutions. ITAM/ITSM, IoT, RMM Devices Uptrends Uptrends is a cloud-based solution for monitoring websites, servers, APIs, and network performance. Integrate Uptrends with the Axonius Cybersecurity Asset Management Platform. Infra Monitoring, RMM Devices, Users UptycsUptycs is an osquery-powered security analytics platform pairs a universal agent with analytics for fleet visibility, intrusion detection, incident investigation, vulnerability management & compliance for Linux, macOS, Windows, containers, and cloud workloads.UEM, MDM/EMMDevicesUyuni Uyuni is an open-source configuration and infrastructure management solution for software-defined infrastructure. Config/Patch Mgmt Devices vArmour vArmour details application and user relationships across cloud, data center, and hybrid IT environments. Cloud Security, NetworkingDevices, UsersVaronis CSV Varonis helps prioritize risks around sensitive repositories, monitor the use of personal accounts, and identify costly misconfigurations. Data SecurityDevicesVectra AIVectra AI is a cybersecurity platform that uses AI to detect and respond to cyberattacks.NetworkingDevicesVeeamVeeam provides backup, disaster recovery and modern data protection software for virtual, physical and multi-cloud infrastructures.Deception, Storage ManagementDevicesVelociraptor Velociraptor is an open-source endpoint monitoring, digital forensic and cyber response platform. EDR/EPP Devices, Users VenafiVenafi secures and protects cryptographic keys and digital certificates.Certificate Mgmt., Data SecurityDevicesVeracode Veracode provides static, dynamic, and software composition scanning to identify vulnerabilities in the software development lifecycle. AppSec, VA ToolDevicesVicarius Vicarius is a consolidated vulnerability discovery, prioritization, and remediation solution. VA Tool Devices Viptela (Cisco) SD-WAN Cisco SD-WAN (previously Viptela) allows users to establish an SD-WAN overlay fabric that connects data centers, branches, campuses, and colocation facilities. Networking, Secure Web GatewaysDevicesVirtru Gmail Encryption Virtru Gmail Encryption protects Gmail messages and attachments with end-to-end encryption while maintaining user ownership and control. EncryptionUsersVMware Carbon Black App Control (Carbon Black CB Protection)VMware Carbon Black App Control (formerly Carbon Black CB Protection) protects critical systems and servers to prevent unwanted changes and ensure continuous compliance with regulatory mandates.EDR/EPPDevicesVMware Carbon Black Cloud (Carbon Black CB Defense)VMware Carbon Black Cloud (formerly Carbon Black CB Defense) is a cloud native platform delivering next-generation antivirus and endpoint detection and response. This adapter is also compatible with Carbon Black Cloud Enterprise EDR (formerly CB ThreatHunter) and Carbon Black Cloud Audit and Remediation (formerly CB LiveOps).EDR/EPPDevicesVMware Carbon Black EDR (Carbon Black CB Response)VMware Carbon Black EDR (formerly Carbon Black CB Response) is a threat hunting and incident response solution that delivers continuous visibility in offline, air-gapped, and disconnected environments using threat intel and customizable detections.EDR/EPPDevicesVMware Carbon Black LiveOpsVMware Carbon Black LiveOps is part of the CB Predictive Security Cloud™ (PSC), and allows customers to query endpoints and remediate issues in real time. Integrate VMware Carbon Black LiveOps with the Axonius Cybersecurity Asset Management Platform.EDR/EPP, IT AgentDevicesVMware Carbon Black Cloud WorkloadVMware Carbon Black Cloud Workload is a security solution for workloads, aiming to reduce the attack surface and to protect critical assets.Attack Surface Mgmt., EDR/EPPDevicesVMWare ESXi and vSphereVMware ESXi is an enterprise-class, type-1 hypervisor for deploying and serving virtual computers. VMware vSphere is VMware's cloud computing virtualization platform.Virtualization, ITAM/ITSM, CloudDevicesVMware HorizonVMware Horizon is a platform for secure delivery of virtual desktops and apps across the hybrid cloud.Virtualization, ITAM/ITSM, CloudDevicesVMware NSXVMware NSX provides an agile software-defined infrastructure to build cloud-native application environments.NetworkingDevicesVMware SD-WAN VMware SD-WAN (formerly by VeloCloud) is a software-based network technology that virtualizes WAN connections. NetworkingDevicesVMware vCloud DirectorVMware vCloud Director is a cloud service-delivery platform.Cloud Mgmt., CloudDevicesVMware vRealize Operations (vROps)VMware vRealize Operations (vROps) delivers an IT operations management platform for private, hybrid, and multi-cloud environments that covers the physical, virtual and cloud infrastructure, including VMs and containers.Cloud Infra, CloudDevicesVMware Workspace ONE (Airwatch)VMWare Workspace ONE (formerly AirWatch) provides enterprise mobility management (EMM) software and standalone management systems for content, applications, and email.MDM/EMM, UEMDevices vRealize Automation SaltStack Config (formerly SaltStack) vRealize Automation SaltStack intelligent automation delivers event-driven security, cloud, and configuration management. SOAR, Config Mgmt.DevicesVulcanVulcan Cyber is a vulnerability visualization, assessment and remediation platform.VA ToolDevicesVultrVultr is a global cloud hosting company offering high-performance cloud servers, cloud GPUs, bare metal, and cloud storage. Cloud Infra Devices, UsersWazuhWazuh is a free, open source and enterprise-ready security monitoring solution for threat detection, integrity monitoring, incident response and compliance.EDR/EPPDevicesWasp AssetCloud AssetCloud is an asset tracking solution that enables organizations to monitor, audit and report on devices and software.ITAM/ITSMDevices, UsersWebroot Endpoint ProtectionWebroot Endpoint Protection protects against threats across email, browsers, files, URLs, ads, apps, and more.EDR/EPPDevicesWeb Server InformationWeb Server Information provides information about the web server for a given website domain, including the server type, its version and operating system, the content management system (CMS) name and its version, the installed CMS plugins, versions and more.ITAM/ITSMDevicesWhatsUp Gold WhatsUp Gold is network monitoring software. NetworkingDevicesWhitehat WhiteHat provides SAST, DAST, SCA, and IaC security solutions. devices. AppSec Devices Windows DHCP ServerWindows DHCP Server is a networking server used to lease IP addresses and manage other configuration information.NetworkingDevicesWindows Management Instrumentation (WMI)Windows Management Instrumentation (WMI) is a set of specifications from Microsoft for consolidating the management of devices and applications in a Windows network. WMI provides users with information about the status of local or remote computer systems.ITAM/ITSMDevicesWindows Server Failover Clustering (WSFC)Windows Server Failover Clustering (WSFC) is a feature of the Windows Server platform for improving the high availability (HA) of applications and services. WSFC is the successor to Microsoft Cluster Service (MSCS).Cloud Infra, CloudDevicesWindows Server Update Services (WSUS)Windows Server Update Services (WSUS), previously Software Update Services (SUS), enables administrators to manage the distribution of updates and hotfixes released for Microsoft products.Config Mgmt.DevicesWizWiz analyzes all layers of the cloud stack to identify high-risk attack vectors to be prioritized and fixed.Cloud SecurityDevicesWordPressWordPress is a web content management system. Collaboration UsersWorkdayWorkday offers software solutions for financial management, human resources, and planning.ERP, SaaS ManagementUsers, SaaS DataWorkspace One - Intelligence Report API Workspace ONE Intelligence reporting uses a cloud-based report storage system to gather data and create the reports. MDM/EMM DevicesWP Engine WP Engine is a website hosting provider aimed at providing managed hosting solutions for websites and applications. Secure Web Gateways, UsersxAssetsxAssets provides IT asset management software.ITAM/ITSMDevicesXMC Extreme Management CenterXMC Extreme Management Center is a wired and wireless network management and automation software.NetworkingDevicesXshield ColorTokens Xshield is a zero trust-based, cloud-delivered micro-segmentation solution that secures critical corporate assets, including applications and workloads. Cloud Security, Networking DevicesZabbixZabbix is an open source monitoring software tool for networks, servers, virtual machines and cloud services.Cloud Mgmt., CloudDevicesZenDeskZendesk is a cloud-based help desk management solution offering customizable tools to build customer service portal, knowledge base and online communities. Collaboration, SaaS Management Users, SaaS DataZenossZenoss enables monitoring of all physical and virtual networks as one part of a real-time model that includes both cloud and on-premises infrastructure.Infra Monitoring, RMMDevicesZeroFoxZeroFox is an intelligence-based analysis and remediation engine used to detect digital risks such as phishing, malware, impersonation, and piracy targeted at digital assets.Cyber Intelligence, Risk ManagementUsersZero NetworksZero Networks automates the development and enforcement secure remote connectivity and software-defined segmentation.NACDevices, UsersZertoZerto is a data loss protection solution that provides disaster recovery, backup and workload mobility software for virtualized infrastructures and cloud environments.DLP, Data SecurityDevices Zerto ZVM Zerto ZVM is a data loss protection solution that provides disaster recovery, backup and workload mobility software for virtualized infrastructures and cloud environments. This adapter supports on-prem deployment. DLP, Data Security Devices Zimperium Zimperium zIPS is a mobile threat defense solution for enterprises, providing protection to both corporate owned and BYOD devices. EDR/EPP Devices and Users ZoomZoom is a remote conferencing service that provides video conferencing, online meetings, chat, and mobile collaboration.Remote Conferencing, SaaS ManagementDevices, Users, SaaS dataZscaler Web SecurityZscaler Web Security is a secure Internet and web gateway service that stops malware, advanced threats, phishing, browser exploits, malicious URLs, botnets, and more.Secure Web Gateways, SaaS ManagementDevices, Users, SaaS data Zscaler Workload Segmentation Zscaler Workload Segmentation is a SaaS solution for applying and managing network segmentation in cloud and on-prem environments. NetworkingDevices Zscaler ZDX Zscaler Digital Experience (ZDX) is a monitoring solution providing end-to-end visibility and troubleshooting of end-user performance issues for any user or application, regardless of location. RMMDevices, Users -------------------------------------------------------------------------------- Was this article helpful? Yes No Thank you for your feedback! Our team will get back to you How can we improve this article? Your feedback Need more information Difficult to understand Inaccurate or irrelevant content Missing/broken link Others Comment Comment (Optional) Character limit : 500 Enter comment and email here - optional Email (Optional) Email Notify me about change Please enter a valid email Cancel -------------------------------------------------------------------------------- Previous System Warnings Next 1E Tachyon © Copyright 2023 Axonius. All Rights Reserved. * Privacy Policy * Terms and Conditions * * * Change password! Changing your password will log you out immediately. Use the new password to log back in. Current password Current password is required New password New password must be at least 8 characters long. It should contain at least one upper and lower case letter, number, and a special character. Confirm password Confirm password must be at least 8 characters long. It should contain at least one upper and lower case letter, number, and a special character. Confirm password should be same as new password Update Change profile Success! First Name First name must have atleast 2 characters. Numbers and special characters are not allowed. Last Name Last name must have atleast 1 characters. Numbers and special characters are not allowed. New email Enter a valid email Re-enter your password Enter a valid password Your profile has been successfully updated. Update Logout