Gain complete context on any device or user in your environment with pre-built integrations that connect Axonius to the solutions you already use.
1E Tachyon is a remote endpoint management solution built on a single agent for speed, visibility, and control of ...
Absolute specializes in software to manage and secure Windows computers and Android smartphones.
Alcide provides cloud and Kubernetes discovery, K8s audit and compliance scanner, microservices anomaly detection ...
Alert Logic provides vulnerability and asset visibility, endpoint protection, threat detection, incident ...
Alibaba Cloud provides cloud computing services and cloud Infrastructure as a service.
Amazon Web Services (AWS) includes a broad set of global cloud based products. It supports EC2, ECS, EKS, IAM, ...
Aqua Security provides container and cloud native cybersecurity for teams using Docker, Kubernetes, serverless, ...
Arista Extensible Operating System (EOS) is the core of Arista cloud networking solutions for next-generation data ...
Armis is an agentless device security platform to see and protect unmanaged and IoT devices.
Aruba connects to Aruba switches and routers.
Aruba AirWave is a network management system for wired and wireless infrastructure and provides granular ...
Aruba Central is a unified cloud-based network operations, assurance and security platform that simplifies the ...
Aruba ClearPass is a network access control (NAC) solution that allows enterprises to identify devices, enforce ...
Aternity is a device performance monitoring solution that provides insights into performance and health of ...
Atlassian Jira Asset Platform links software with Jira to populate an asset inventory, letting users query for ...
Automox is a cloud-based patch and configuration management solution for Windows, Linux, Mac, and third-party ...
Auvik is an IT asset and network monitoring solution for managing entire network infrastructures, including ...
Awake Security is a network traffic analysis solution that's capable of detecting and visualizing behavioral, ...
BambooHR is HR software used to collect, maintain, and analyze data for hiring, onboarding employees, and managing ...
Barracuda CloudGen Access (formerly Fyde) provides granular access for enterprise apps and workloads, and ...
BeyondTrust Privileged Identity (formerly Lieberman RED Identity Management) is a password management solution ...
BeyondTrust Remote Support (formerly Bomgar) allows support technicians to remotely connect to end-user systems ...
BigID is data security solution that provides enterprise protection and privacy of personal data.
Bitbucket is a web-based version control repository hosting service for source code and development projects that ...
Bitdefender GravityZone Business Security uses machine learning and heuristics to protect against malware, ...
bitFit is a business development and information technology company that collects all of your IT operations data ...
BitSight Security Ratings are a data-driven and dynamic measurement of an organization’s cybersecurity performance.
BlackBerry Unified Endpoint Management (UEM) delivers endpoint management and policy control for devices and apps ...
BlueCat Enterprise DNS connects all disparate DNS and DHCP with centralized management of all clients and critical ...
BMC Atrium CMDB stores information about the configuration items (CIs) in your IT environment and the ...
Box Platform provides data security, file sharing, collaborating, and content management tools. Box Platform ...
CA Service Management is an IT service management (ITSM) solution that offers incident management and IT asset ...
CA Spectrum is a services and network infrastructure management system that enables the modeling of LAN, WAN, ...
Censys monitors infrastructure and discovers unknown assets across the Internet.
Centrify Identity Services manages application access, endpoints, and network infrastructure.
Check Point Infinity protects against cyber threats across networks, endpoint, cloud and mobile devices. This ...
Checkmarx SAST (CxSAST) is a static application security testing solution used to identify security ...
Chef provides continuous automation for building, deploying, and managing infrastructure, compliance, and ...
Cherwell IT Service Management is a service desk platform enabling automation for process workflows, supporting ...
Cisco connects to Cisco switches and routers.
Cisco Advanced Malware Protection (AMP) includes threat intelligence, sandboxing, and malware blocking to detect, ...
Cisco Firepower Management Center provides management over firewalls, application control, intrusion prevention, ...
Cisco Identity Services Engine (ISE) is a network administration product that enables the creation and enforcement ...
Cisco Meraki solutions include wireless, switching, security, EMM, communications, and security cameras, all ...
Cisco Prime offers a suite of tools to automate the management of wired and wireless Cisco networks.
Cisco Stealthwatch is an agentless malware detection solution that provides visibility and network traffic ...
Cisco UCS Manager supports the entire Cisco UCS server and Cisco HyperFlex Series hyperconverged infrastructure ...
Cisco Umbrella is a secure internet gateway in the cloud, including DNS and IP layer enforcement and command and ...
Cisco Unified Communications Manager provides secure and manageable call control and session management.
Citrix Endpoint Management (formerly XenMobile) is a solution for managing endpoints, offering mobile device ...
Claroty discovers assets and monitors communication patterns for ICS networks.
Cloudflare DNS runs one of the largest DNS networks in the world.
CloudHealth is a cloud management platform to analyze and manage cloud cost, usage, security, and governance.
CloudPassage Halo is a security automation platform providing visibility, protection, and continuous compliance ...
Code42 is a next-gen DLP solution used to detect insider threats, satisfy regulatory compliance, and accelerate ...
Cofense PhishMe provides phishing awareness training and threat simulations for employees.
Commvault enables data protection, backup and recovery, and information management solutions.
Contrast Security protects software applications against cyberattacks.
CrowdStrike Falcon delivers next-generation antivirus, endpoint detection and response (EDR), managed threat ...
CSCDomainManager is a web-based portfolio management platform consolidating domains alongside social media ...
The CSV adapter imports .csv files with inventory information including: devices and serial numbers, users, and ...
CyberArk Privileged Account Security provides privileged password management, session recording, least privilege ...
Cybereason Deep Detect & Respond (EDR) defends against advanced attacks by collecting and analyzing behavioral ...
The CyCognito platform delivers proactive attack surface protection and digital risk protection across your entire ...
CylancePROTECT uses artificial intelligence to detect and protect against ransomware, advanced threats, fileless ...
Cynet 360 is a detection and response security platform for finding, ranking, and remediating unknown, camouflaged ...
Datadog is a monitoring service for cloud-scale applications, providing monitoring of servers, databases, tools, ...
Datto RMM (formerly Autotask Endpoint Management) is a cloud-based Remote Monitoring and Management (RMM) platform ...
Dell EMC Avamar is a backup and recovery solution that enables daily backups of physical and virtual environments, ...
Dell OpenManage Enterprise is a one-to-many systems management console. It facilitates lifecycle management for ...
Device42 is a cloud-based CMDB for physical, virtual, and cloud servers and containers, network components, ...
DigiCert CertCentral consolidates tasks for issuing, installing, inspecting, remediating, and renewing ...
DigiCert PKI Platform (formerly Symantec Managed PKI) provides a cloud-based enterprise solution for issuing and ...
Digital Shadows SearchLight is a digital risk protection solution that protects organizations against external ...
DivvyCloud offers security, compliance, and governance guardrails for public and private cloud infrastructures.
DNS Made Easy offers DNS management services.
Dropbox is a file hosting service that offers cloud storage, file synchronization, personal cloud, and client ...
Druva Cloud Platform is a data protection as-a-service that provides management across all customer data sources ...
Duo Beyond identifies corporate vs. personal devices, blocks untrusted devices, and give users secure access to ...
Dynatrace is a software intelligence platform providing application performance management and cloud ...
Eclypsium protects the foundation of the computing infrastructure, controlling risks and stopping threats to ...
edgescan Fullstack Vulnerability Management is a cloud-based continuous vulnerability management and penetration ...
Endgame is an endpoint protection platform that combines on-line and off-line protection against exploits, ...
enSilo automates and orchestrates detection, prevention, and response against advanced malware and ransomware.
ESET Endpoint Security is an anti-malware suite for Windows including web filtering, firewall, USB drive and ...
ExtraHop Reveal(x) is a network detection and response (NDR) solution that provides visibility, real-time threat ...
F-Secure Protection Service for Business (PSB) is a central management portal for managing VPN, mobile device ...
F5 iControl is a Web services-enabled open API providing granular control over the configuration and management of ...
F5 BIG-IQ Centralized Management provides centralized management, licensing, monitoring, and analytics for BIG-IP ...
FireEye Endpoint Security (formerly HX) detects and protects against unknown endpoint threats and exploits with ...
FireMon Security Manager is a network security solution that provides real-time visibility, control, and ...
Flexera lets enterprises gain visibility and control of IT assets, reduce ongoing software costs, and maintain ...
Forcepoint Web Security Endpoint enables end-users to authenticate and receive policy enforcement via the ...
Forcepoint Web Security Endpoint CSV File imports CSV files with device information.
Foreman is a free open source project that automates repetitive tasks, quickly deploys applications, and ...
ForeScout CounterACT platform provides insight into network-connected devices.
Fortinet FortiGate is a next-generation firewall providing security and visibility for end-to-end protection ...
FreeIPA is a free and open-source identity management system for Linux environments.
Freshservice is a cloud-based IT help desk and service management solution that enables organizations to simplify ...
Frontline VM, a Frontline.Cloud system, is a vulnerability management application that performs comprehensive ...
G Suite is a set of cloud computing, productivity, collaboration, device, user, and data management tools ...
Gigamon GigaVUE-FM (Fabric Manager) delivers management and monitoring of all physical and virtual nodes across ...
Gigamon ThreatINSIGHT is a cloud-native network detection and response (NDR) platform that provides threat ...
GitHub provides hosting for software development version control using Git, including distributed version control ...
GitLab is an open-source DevOps lifecycle tool that provides a wiki, issue-tracking, and continuous integration ...
Google Cloud Platform (GCP) is a suite of cloud computing services. Alongside a set of management tools, it ...
Guardicore is a data center and cloud security company that protects the organization’s core assets.
HashiCorp Consul is a multi-cloud service networking platform to connect and secure services across any runtime ...
Have I Been Pwned is a website to check if email accounts have been compromised in a data breach.
HP Integrated Lights-Out (iLO) is server management software that enables the configuration, monitoring, and ...
HP Network Node Manager i (NNMi) is a network health and performance monitoring software with scalability and ...
HPE Intelligent Management Center (IMC) is a networking solution that delivers management across campus core and ...
HPE OneView is an integrated IT management solution that transforms compute, storage, and networking into ...
The HyperSQL adapter imports device information from an HyperSQL database.
IBM BigFix provides remote control, patch management, software distribution, operating system deployment, network ...
IBM BigFix Inventory gathers information about installed software and hardware in your IT infrastructure.
IBM's cloud computing platform combines platform as a service (PaaS) with infrastructure as a service (IaaS) and ...
IBM Guardium prevents leaks from databases, data warehouses, and Big Data environments. It ensures the integrity ...
IBM MaaS360 with Watson is a Unified Endpoint Management (UEM) platform covering endpoints, end-users, apps, ...
IBM QRadar is a Security Information and Event Management (SIEM) solution that enables security teams to detect, ...
IBM Tivoli Application Dependency Discovery Manager (TADDM) is a configuration management tool that helps IT ...
iboss cloud is a cloud-based platform that secures user Internet access in the cloud.
Icinga is an open-source computer system and network monitoring application. It monitors data centers and clouds ...
Illumio Adaptive Security Platform (ASP) secures computing platforms in cloud, on-prem, or hybrid environments ...
Illusive Networks deceives cyber attackers by planting false information about a given network's resources.
Imperva Data Activity Monitoring (DAM) defines and enforces data security and compliance policies across the cloud ...
Indegy Industrial Cybersecurity Suite protects industrial networks from cyber threats, malicious insiders, and ...
Infinipoint is a cloud-based automated cyber hygiene platform that enables continuous detection and remediation of ...
Infoblox DDI consolidates DNS, DHCP, IP address management, and other core network services into a single ...
Infoblox NetMRI provides network change and configuration management (NCCM), enabling users to automate network ...
Intrigue enables IT and Security teams with a complete and always up to date view of Cloud and Internet-exposed ...
IP Fabric is a network management system used to discover, verify, visualize and document large scale networks.
iTop is an open source ITSM solution allows management of configuration items and their relationships in a ...
Ivanti Endpoint Security, powered by Heat, provides application control, antivirus, patch management, and device ...
Ivanti Security Controls is a unified IT management platform used for managing and protecting Windows-based ...
Ivanti Service Manager, is a cloud based ITSM solution that provides workflows automation, IT help desk and ...
Ivanti Unified Endpoint Manager (formerly Landesk) helps IT administrators gather detailed device data, automate ...
Jamf Pro is an enterprise mobility management (EMM) tool that provides unified endpoint management for Apple ...
Jamf Protect is an endpoint protection solution that prevents macOS malware, detects and remediates Mac-specific ...
The JSON adapter is able to import .json files with information about devices, users, or installed software.
JumpCloud is a Directory-as-a-Service (DaaS) solution to authenticate, authorize, and manage users, devices, and ...
The Juniper Junos Adapter connects to Juniper switches and routers.
Juniper Junos Space Network Management Platform automates management of Juniper's switching, routing, and security ...
Kaseya VSA is a remote monitoring and management solution for remote control, discovery, patch management, and ...
Kaspersky Security Center is an administration console for Kaspersky Labs security solutions and systems ...
Kenna Security Platform is a vulnerability assessment solution that provides risk scoring, prioritization, and ...
Keycloak is an open source identity and access management solution.
KnowBe4 provides Security Awareness Training for anti-phising behavior, social engineering and ransomware attacks, ...
Kolide Fleet is an open source osquery manager.
Kubernetes (K8s) is an open-source system for automating deployment, scaling, and management of containerized ...
L0phtCrack 7 is a password auditing and recovery application.
Lansweeper is an agentless IT asset management and Network Inventory software tool for Microsoft Windows OS.
LibreNMS is a network monitoring solution that provides auto-discovery for network hardware and operating systems ...
LimaCharlie provides endpoint-driven information security tools to run an MSSP or SOC, as well as APIs that allow ...
Linux Secure Shell (SSH) uses remote command execution over the SSH protocol to gather information about the ...
LogicMonitor is an automated infrastructure monitoring platform for enterprise IT and managed service providers.
LogMeIn Central is a cloud-based endpoint management solution that enables monitoring and management of endpoint ...
LogRhythm combines SIEM, user and entity behavior analytics, network traffic and behavior analytics, and security ...
Malwarebytes Endpoint Protection is a cloud-based security platform that combines detection and remediation ...
Malwarebytes Endpoint Security protects endpoints from ransomware, automates endpoint remediation, and provides ...
ManageEngine Desktop Central is a desktop management and mobile device management software for managing desktops ...
Masscan is a free internet port scanner utility.
McAfee ePolicy Orchestrator (ePO) is a security management platform that provides real-time monitoring of security ...
Medigate is a medical device security platform that protects connected medical devices on health care provider ...
Men&Mice DNS Management is a Network Management platform providing secure, centralized, and resilient control of ...
Micro Focus Server Automation (formerly known as HP Server Automation or Opsware) provides operating system ...
Microsoft Active Directory (AD) is a directory service for Windows domain networks that authenticates and ...
Microsoft Azure is a cloud computing service created by Microsoft for building, testing, deploying, and managing ...
Microsoft Azure Active Directory (Azure AD) is Microsoft's multi-tenant, cloud-based directory, and identity ...
Microsoft BitLocker Administration and Monitoring (MBAM) provides a simplified administrative interface for ...
Microsoft Defender Advanced Threat Protection (ATP) helps enterprise networks prevent, detect, investigate, and ...
Microsoft Hyper-V is a native hypervisor; it can create virtual machines on x86-64 systems running Windows.
Microsoft Key Management Service (KMS) enables organizations to activate systems within their own network, ...
Microsoft Lync provides instant messaging (IM), audio and video calls, Lync Meetings, availability (presence) ...
Microsoft System Center Configuration Manager (SCCM) is a systems management software product for managing large ...
Minerva Labs Endpoint Malware Vaccination simulates infection markers, rather than creating them, to contain ...
MobileIron EMM enables enterprises to secure and manage modern operating systems on mobile devices and desktops.
NetBox is an open source web application to help manage and document computer networks.
NetBrain Integrated Edition is an adaptive automation integrated with existing NMS tools and IT workflows to ...
NetIQ Advanced Authentication provides a centralized authentication framework that adds a strong level of ...
Netskope Security Cloud provides threat protection for cloud services, websites, and private applications.
Nexthink is an IT solution that provides insights into activity across devices, operating systems, and workplace ...
Nmap Security Scanner is a free and open source utility for network discovery and security auditing.
Nutanix AHV is a hypervisor included with the Enterprise Cloud OS. AHV delivers flexible migrations, security ...
ObserveIT provides insider threat security solutions, including employee monitoring, user activity monitoring, ...
Observium is an auto-discovering network monitoring platform supporting a wide range of device types, platforms ...
Okta provides cloud software that helps companies manage their employees' passwords, by providing a “single ...
The Alcatel-Lucent OmniVista 2500 Network Management System (NMS) provides management tools and network-wide ...
OneLogin's unified access management platform centralizes access across on-prem and cloud environments to give ...
openDCIM is a free open-source Data Center Infrastructure Management solution.
OpenStack is an open source software solution for creating private and public clouds.
OpenVAS is a software framework including several services and tools for vulnerability scanning and vulnerability ...
OPSWAT MetaAccess prevents risky devices from accessing local networks and cloud applications.
Oracle Cloud is a computing service providing servers, storage, network, applications and services.
Oracle VM's server virtualization products support x86 and SPARC architectures and a variety of workloads such as ...
Orca Cloud Visibility Platform delivers visibility to cloud security posture, including prioritized alerts on ...
PacketFence is a free open source network access control (NAC) solution which provides the following features: ...
Palo Alto Networks Cortex is an open and integrated, AI-based continuous security platform, allowing security ...
Palo Alto Networks Cortex XDR is a detection and response app that natively integrates network, endpoint, and ...
The Palo Alto Panorama management server provides centralized monitoring and management of multiple ...
Panorays is a SaaS-based platform that enables companies to view, manage and engage on the security posture of ...
PDQ Inventory is a systems management tool that scans Windows computers to collect hardware, software, and Windows ...
phpIPAM is an open-source web IP address management application (IPAM).
PingOne Directory provides a hosted directory service that developers can use to store user authentication and ...
Pivotal Cloud Foundry is an app development and deployment platform for public and private clouds.
PKWARE’s data protection platform finds, classifies, and protects sensitive data, allowing security managers to ...
Preempt lets organizations reduce user risk on their attack surface and preempt threats in real-time with ...
Prisma Cloud is a native cloud security platform that provides visibility, threat prevention, compliance ...
PrivX provides privileged access to on-prem and cloud environments, including control access to servers, network ...
Promisec Endpoint Manager is an agentless endpoint detection and remediation solution that detects, analyzes, and ...
Proxmox Virtual Environment (VE) is an open source server virtualization management solution based on QEMU/KVM and ...
Pulse Connect Secure provides zero trust secured access from any device to applications and services in the cloud ...
Puppet is an open-source software configuration management tool.
Pure Storage Pure1 is a cloud-based storage management solution that provides self-driving storage, data-storage ...
Qualys Cloud Platform monitors customers' global security and compliance posture using sensors.
Quest KACE Endpoint Systems Management Appliances provision, manage, secure, and service network-connected devices.
Rancher is an open-source multi-cluster orchestration platform that enables operations teams to deploy, manage and ...
Randori is an attack platform which combines continuous reconnaissance, real-time target analysis, and the ability ...
Rapid7 Nexpose is an on-premise vulnerability management solution, including discovery, detection, verification, ...
Adapters Inventory Adapters Inventory 100% 11 nexpose wa 1 of 2 Context: IP1 Rapid7 Nexpose Warehouse Rapid7 ...
The Red Canary suite includes products that record telemetry, detect and investigate threats, and automate ...
Red Hat Ansible Tower is a web console and REST API for operationalizing Ansible across teams, organizations, and ...
Red Hat Satellite is a system management solution used to deploy, configure, and maintain systems across physical, ...
RedSeal’s network modeling and risk scoring platform models customers' entire hybrid data center of public cloud, ...
Remediant SecureONE is a Just-In-Time Privileged Access Management (JITA) solution that enables control and ...
RescueAssist (formerly GoToAssist) is a cloud-based toolset for IT and customer support teams including remote ...
RiskIQ Digital Footprint software provides an active, comprehensive inventory of all of the organization’s IPs, ...
Riverbed SteelCentral Controller SCC facilitates administration tasks for groups of SteelHeads, Interceptors, ...
RSA Archer is an integrated risk management platform for managing multiple dimensions of risk, including IT, ...
Rumble Network Discovery is a cloud-based network discovery platform that identifies and monitors ...
Sal is an open-source reporting solution for managed endpoints.
SaltStack Enterprise intelligent automation delivers event-driven security, cloud, and configuration management.
SaltStack Open Source is open-source software for event-driven security, cloud and configuration management.
Samanage is a unified, cloud-based IT service desk and asset management platform.
ScopNET provides an agent-free solution for the prevention of unauthorized access to corporate networks, ...
Secdo Endpoint Protection automates endpoint forensic analysis and cyber investigations for security teams.
Secureworks Red Cloak is an endpoint detection and response technology that continuously monitors endpoints for ...
Sensu is a cloud monitoring solution that provides monitoring workflows automation and visibility into multi-cloud ...
SentinelOne is an endpoint protection solution including prevention, detection, and response.
ServiceNow provides service management software as a service, including IT services management (ITSM), IT ...
SevOne Data Platform is a network and infrastructure management platform that provides monitoring and analytics.
Shodan is a search engine for Internet-connected devices.
Signal Sciences is a web protection platform that protects on-premise, multi-cloud and hybrid-cloud apps, within ...
Skybox Firewall Assurance provides automation of firewall management tasks across different firewall vendors and ...
Slack is a chat and collaboration hub used to connect people, information, tools, and services.
Snipe-IT is a free, open source IT asset management system written in PHP.
Snow Software provides Software Asset Management (SAM) products and services to reduce the risk, cost, and ...
SolarWinds Network Performance Monitor is a unified IT systems management system that tracks the performance of ...
SonicWall next-generation firewalls (NGFW) provide security, control, and visibility to maintain an effective ...
Sophos Central is a unified console that provides one place to manage Sophos products, including: endpoint, ...
Sophos Cloud Optix is a public cloud visibility and threat response solution that detects, responds, and prevents ...
Sophos Endpoint Protection helps secure workstations by adding prevention, detection, and response technology on ...
SOTI MobiControl is a software system for managing mobile devices in the enterprise.
Spacewalk is an open-source systems management solution for system provisioning, patching and configuration.
Specops Inventory collects and reports information on hardware, software, registry, user settings, operating ...
Spiceworks provides network monitoring to capture, analyze, and monitor network traffic.
Splunk captures, indexes, and correlates real-time data in a searchable repository.
The SQL Server adapter imports device information from arbitrary SQL servers: Microsoft SQL Server, MySQL, Oracle ...
The SQLite adapter imports device information from an SQLite database.
Sumo Logic is a cloud-based service for logs & metrics management for modern apps
Symantec Cloud Workload Protection (CWP) automates security policy enforcement to protect public cloud workloads.
Symantec Control Compliance Suite (CCS) is a solution to help identify security gaps and vulnerabilities and ...
Symantec Data Center Security Server Advanced delivers security detection, monitoring, and prevention capabilities ...
Symantec DLP is a data loss protection and prevention solution. Its management console, the DLP Enforce Platform, ...
Symantec Endpoint Detection and Response (EDR) detects, protects, and responds to threats to the organization's ...
Symantec Endpoint Encryption combines full-disk and removable media encryption with centralized management to ...
Symantec Endpoint Management Suite (formerly Altiris) manages, patches, and remediates application and OS ...
Symantec Endpoint Protection manages events, policies, and registration for the client computers that connect to ...
Symantec Endpoint Protection Cloud unifies threat protection and device management for PC, Mac, mobile devices, ...
SysAid is an integrated ITSM, Service Desk and Help Desk software solution.
Tanium Asset provides an inventory of hardware and software assets including servers, laptops, and desktops for ...
Tanium Discover scans for unmanaged assets with almost no impact on the network.
Tanium Interact lets you ask questions to gather live endpoint data in order to create an up-to-date inventory of ...
Tanium System Status provides an inventory of all clients that have registered with the Tanium platform.
Tenable Nessus is a vulnerability scanning platform for auditors and security analysts.
Tenable Nessus CSV File Adapter imports device information from vulnerability scan data.
Tenable.io automatically discovers and assesses a customer's environment for vulnerabilities, misconfigurations, ...
Tenable.sc (formerly SecurityCenter) consolidates and evaluates vulnerability data, prioritizing security risks.
Thycotic Secret Server is a Privileged Access Management (PAM) solution for protecting your privileged accounts, ...
Torii is a SaaS Management Platform letting IT professionals discover, optimize, and control SaaS usage and costs.
Traps Endpoint Security Manager (ESM) prevents advanced persistent threats (APTs) and zero-day attacks. Traps also ...
Trend Micro Apex One (formerly OfficeScan) is an endpoint security solution protecting against malware, scripts, ...
Trend Micro Deep Security can automatically virtually patch server, cloud, VDI and application vulnerabilities.
Tripwire Enterprise is a security configuration management (SCM) suite that provides fully integrated solutions ...
TrueFort offers application behavior analytics, control, and protection.
Twistlock provides container and cloud native cybersecurity for teams using Docker, Kubernetes, serverless, and ...
The UniFi Controller is a wireless network management software solution for managing multiple wireless networks ...
UpGuard CyberRisk provides third-party vendor risk and external cyber risk monitoring. The platform has two main ...
Uptycs is an osquery-powered security analytics platform pairs a universal agent with analytics for fleet ...
Vectra AI is a cybersecurity platform that uses AI to detect and respond to cyberattacks.
Venafi secures and protects cryptographic keys and digital certificates.
VMware Carbon Black App Control protects critical systems and servers to prevent unwanted changes and ensure ...
VMware Carbon Black Cloud is a cloud native platform delivering next-generation antivirus and endpoint detection ...
VMware Carbon Black EDR is a threat hunting and incident response solution that delivers continuous visibility in ...
VMware ESXi is an enterprise-class, type-1 hypervisor for deploying and serving virtual computers.
VMware Horizon is a platform for secure delivery of virtual desktops and apps across the hybrid cloud.
VMware vCloud Director is a cloud service-delivery platform.
VMware vRealize Operations (vROps) delivers an IT operations management platform for private, hybrid, and ...
VMWare Workspace ONE (formerly AirWatch) provides enterprise mobility management (EMM) software and standalone ...
Wazuh is a free, open source and enterprise-ready security monitoring solution for threat detection, integrity ...
Web Server Information provides information about the web server for a given website domain, including the server ...
Webroot Endpoint Protection protects against threats across email, browsers, files, URLs, ads, apps, and more.
Windows DHCP Server is a networking server used to lease IP addresses and manage other configuration information.
Windows Management Instrumentation (WMI) is a set of specifications from Microsoft for consolidating the ...
Windows Server Failover Clustering (WSFC) is a feature of the Windows Server platform for improving the high ...
Windows Server Update Services (WSUS), previously Software Update Services (SUS), enables administrators to manage ...
Workday offers software solutions for financial management, human resources, and planning.
Zabbix is an open source monitoring software tool for networks, servers, virtual machines and cloud services.
Zerto is a data loss protection solution that provides disaster recovery, backup and workload mobility software ...
Zoom is a remote conferencing service that provides video conferencing, online meetings, chat, and mobile ...
Zscaler Web Security is a secure Internet and web gateway service that stops malware, advanced threats, phishing, ...
We currently integrate with over solutions and are continuously adding more. If we don’t integrate with a solution, but should, tell us about it in the form below. You don’t have to be a customer to request an adapter for the Axonius platform!