Axonius integrates with 178 security and management solutions to discover all assets - managed and unmanaged, cloud and on-premises.
Absolute specializes in software to manage and secure Windows computers and Android smartphones.
Alert Logic provides vulnerability and asset visibility, endpoint protection, threat detection, incident management, and a web application firewall.
Alibaba Cloud provides cloud computing services and cloud Infrastructure as a service.
The Amazon Web Services (AWS) adapter includes a broad set of global cloud based products. It supports EC2, ECS, EKS, IAM, EBS, ELB, RDS, S3, VPC and Workspaces.
Aqua Security provides container and cloud-native cybersecurity for teams using Docker, Kubernetes, serverless, and other cloud-native technologies.
Arista Extensible Operating System (EOS) is the core of Arista cloud networking solutions for next-generation data centers and cloud networks.
Armis is an agentless IoT security solution that lets enterprises see and control any device or network.
The Aruba Adapter connects to Aruba switches and routers.
Aruba AirWave is a network management system for wired and wireless infrastructure and provides granular visibility into devices, users, and applications on the network.
Aruba ClearPass is a network access control (NAC) solution that allows enterprises to identify devices, enforce policies, and remediate threats.
Automox is a cloud-based patch and configuration management solution for Windows, Linux, Mac, and third-party software.
BambooHR is HR software used to collect, maintain, and analyze data for hiring, onboarding employees, and managing company culture.
BeyondTrust Remote Support (formerly Bomgar) allows support technicians to remotely connect to end-user systems through firewalls from their computer or mobile devices.
Bitdefender GravityZone Business Security uses machine learning and heuristics to offer protection against malware, phishing, ransomware, exploits and zero-days.
BitSight Security Ratings are a data-driven and dynamic measurement of an organization’s cybersecurity performance.
BlackBerry Unified Endpoint Management (UEM) delivers endpoint management and policy control for devices and apps on-premise or in the cloud.
BlueCat Enterprise DNS connects all disparate DNS and DHCP with centralized management of all clients and critical assets.
CA Service Management is an IT service management (ITSM) solution that offers incident management and IT asset management.
CA Spectrum is a services and network infrastructure management system that enables the modeling of LAN, WAN, wired, wireless, physical, and virtual networks.
Carbon Black CB Defense includes antivirus and EDR in a cloud-delivered platform to stop malware, non-malware attacks, and ransomware. (Note: This adapter is also compatible with CB ThreatHunter and CB LiveOps)
Carbon Black CB Protection includes application control and critical infrastructure protection for critical systems and fixed-function devices in highly regulated environments.
Carbon Black CB Response includes EDR and threat hunting for security operations centers and incident response teams.
Censys monitors infrastructure and discovers unknown assets anywhere on the Internet.
Check Point Infinity protects against cyber threats across networks, endpoint, cloud and mobile devices.
Chef provides continuous automation for building, deploying, and managing infrastructure, compliance, and applications in legacy and hybrid environments.
Cherwell IT Service Management is a service desk platform enabling automation for process workflows, supporting tasks, and related approvals.
Cisco Advanced Malware Protection (AMP) includes threat intelligence, sandboxing, and malware blocking to detect, contain, and remove malware.
Cisco Firepower Management Center provides management over firewalls, application control, intrusion prevention, URL filtering, and advanced malware protection.
Cisco Identity Services Engine (ISE) is a network administration product that enables the creation and enforcement of security and access policies for endpoint devices connected to the company’s routers and switches.
Cisco Meraki solutions include wireless, switching, security, EMM, communications, and security cameras, all centrally managed from the web.
Cisco Prime offers a suite of tools to automate the management of wired and wireless Cisco networks.
Cisco Stealthwatch is an agentless malware detection solution that provides visibility and network traffic security analytics across the extended network, including endpoints, branch, data center, and cloud.
Cisco UCS Manager supports the entire Cisco UCS server and Cisco HyperFlex Series hyperconverged infrastructure portfolios. It enables server, fabric, and storage provisioning as well as, device discovery, inventory, configuration, diagnostics, monitoring, fault detection, auditing, and statistics collection.
Cisco Umbrella is a secure internet gateway in the cloud, including DNS and IP layer enforcement and command and control callback blocking.
Cisco Unified Communications Manager provides secure and manageable call control and session management.
Claroty discovers assets and monitors communication patterns for ICS networks.
Cloudflare DNS runs one of the largest DNS networks in the world.
CloudPassage Halo is a security automation platform providing visibility, protection, and continuous compliance monitoring for AWS and Azure deployments.
Code42 provides data protection and visibility for data at rest and in motion on both endpoints and the cloud.
CrowdStrike Falcon delivers next-generation antivirus, endpoint detection and response (EDR), managed threat hunting, and threat intelligence.
The CSV Serials Adapter is able to import .csv files with inventory information including the serial number of a device and supplemental device data.
Cybereason Deep Detect & Respond (EDR) defends against advanced attacks by collecting and analyzing behavioral data to identify suspicious activities.
CyCognito CyCAST Platform is an automated, cloud-based security testing service that simulates attackers’ reconnaissance techniques to find organizations’ security blind spots.
CylancePROTECT uses artificial intelligence to detect and protect against ransomware, advanced threats, fileless malware, and malicious documents.
Cynet 360 is a detection and response security platform for finding, ranking, and remediating unknown, camouflaged threats.
Datadog is a monitoring service for cloud-scale applications, providing monitoring of servers, databases, tools, and services.
Datto RMM (formerly Autotask Endpoint Management) is a cloud-based Remote Monitoring and Management (RMM) platform that provides device auditing, real-time monitoring, and automatic patching.
Device42 is a cloud-based CMDB for physical, virtual, and cloud servers and containers, network components, software, services, applications, and their relationships and dependencies.
DivvyCloud offers security, compliance, and governance guardrails for public and private cloud infrastructures.
Dropbox is a file hosting service that offers cloud storage, file synchronization, personal cloud, and client software.
Druva Cloud Platform is a data protection as-a-service that provides management across all customer data sources that are scalable, predictable and on-demand.
Duo Beyond identifies corporate vs. personal devices, blocks untrusted devices, and give users secure access to internal applications.
Dynatrace is a software intelligence platform providing application performance management and cloud infrastructure monitoring.
edgescan Fullstack Vulnerability Management is a cloud-based continuous vulnerability management and penetration testing solution that discovers, validates and rates vulnerabilities by running continuous asset profiling to detect rogue/exposed ports, hosts or even hidden API’s.
Endgame is an endpoint protection platform that combines on-line and off-line protection against exploits, phishing, malware, ransomware, and fileless attacks.
enSilo automates and orchestrates detection, prevention, and response against advanced malware and ransomware.
ESET Endpoint Security is an anti-malware suite for Windows including web filtering, firewall, USB drive and botnet protection.
F5 iControl is a Web services-enabled open API providing granular control over the configuration and management of F5’s application delivery platform, BIG-IP.
FireEye Endpoint Security (formerly HX) detects and protects against unknown endpoint threats and exploits with integrated threat intelligence.
Forcepoint Web Security Endpoint enables end-users to authenticate and receive policy enforcement via the Forcepoint Web Security Cloud infrastructure.
Foreman is a free open source project that automates repetitive tasks, quickly deploys applications, and proactively manages server lifecyle, on-premises or in the cloud.
The Forescout CounterACT platform provides insight into network-connected devices.
Fortinet FortiGate is a next-generation firewall providing security and visibility for end-to-end protection across the entire enterprise network.
Freshservice is a cloud-based IT help desk and service management solution that enables organizations to simplify their IT operations.
GitHub provides hosting for software development version control using Git, including distributed version control and source code management (SCM) functionality.
The Google Compute/Kubernetes Engine Adapter supports both GCE’s virtual machines as well as the GKE environment for deploying containerized applications.
Google Mobile Management is an MDM solution for G Suite customers for Android, iOS, Windows and other smartphones.
Guardicore is a data center and cloud security company that protects the organization’s core assets.
HashiCorp Consul is a multi-cloud service networking platform to connect and secure services across any runtime platform and public or private cloud.
Have I Been Pwned is a website to check if email accounts have been compromised in a data breach.
IBM BigFix provides remote control, patch management, software distribution, operating system deployment, network access protection and hardware and software inventory functionality.
IBM BigFix Inventory gathers information about installed software and hardware in your IT infrastructure.
IBM’s cloud computing platform combines platform as a service (PaaS) with infrastructure as a service (IaaS) and cloud services.
IBM Guardium Vulnerability Assessment scans data infrastructures (databases, data warehouses and big data environments) to detect vulnerabilities and exposures such as missing patches, weak passwords, unauthorized changes, and misconfigured privileges and suggests remedial actions.
IBM MaaS360 with Watson is a Unified Endpoint Management (UEM) platform covering endpoints, end-users, apps, content, and data. It also gives visibility and control to manage mobile devices running iOS, macOS, Android, and Windows.
IBM Tivoli Application Dependency Discovery Manager (TADDM) is a configuration management tool that helps IT operations personnel ensure and improve application availability in application environments.
Icinga is an open-source computer system and network monitoring application. It monitors data centers, cloud availability, performance, provides access to data, and raises alerts.
Illusive Networks deceives cyber attackers by planting false information about a given network’s resources.
Imperva Data Activity Monitoring (DAM) defines and enforces data security and compliance policies across the cloud and on-premises including relational databases, mainframes, big data platforms, data warehouses, and enterprise file stores.
Indegy Industrial Cybersecurity Suite protects industrial networks from cyber threats, malicious insiders, and human error, including threat detection and mitigation, asset tracking, vulnerability management, configuration control, and device integrity checks.
Infoblox DDI consolidates DNS, DHCP, IP address management, and other core network services into a single platform, managed from a common console.
Jamf Pro is an enterprise mobility management (EMM) tool that provides unified endpoint management for Apple devices.
JumpCloud is a Directory-as-a-Service (DaaS) solution to authenticate, authorize, and manage users, devices, and applications via a common directory in the cloud.
The Juniper Junos Adapter connects to Juniper switches and routers.
Juniper Junos Space Network Management Platform automates the management of Juniper’s switching, routing, and security devices.
Kaseya VSA is a remote monitoring and management solution for remote control, discovery, patch management, and monitoring.
Kaspersky Security Center is an administration console for Kaspersky Labs security solutions and systems management tools.
Lansweeper is an agentless IT asset management and Network Inventory software tool for Microsoft Windows OS.
LibreNMS is a network monitoring solution that provides auto-discovery for network hardware and operating systems including Cisco, Linux, Juniper, Foundry, and more.
The Linux Secure Shell Adapter uses remote command execution over the SSH protocol to gather information about the endpoint Linux machine.
LogRhythm combines SIEM, user and entity behavior analytics, network traffic and behavior analytics, and security automation and orchestration.
Malwarebytes protects endpoints from ransomware, automates endpoint remediation, and provides continuous visibility and monitoring.
ManageEngine Desktop Central is a desktop management and mobile device management software for managing desktops in LAN and across WAN and mobile devices from a central location.
Masscan is a free internet port scanner utility.
McAfee ePolicy Orchestrator (ePO) is a security management platform that provides real-time monitoring of security solutions.
Medigate is a medical device security platform that protects connected medical devices on health care provider networks, allowing inventory management and facilitating detection and prevention capabilities.
Microsoft Active Directory (AD) is a directory service for Windows domain networks that authenticates and authorizes all users and computers.
Microsoft Azure is a cloud computing service created by Microsoft for building, testing, deploying, and managing applications and services through a global network of Microsoft-managed data centers.
Microsoft Azure Active Directory (Azure AD) is Microsoft’s multi-tenant, cloud-based directory, and identity management service.
Microsoft BitLocker Administration and Monitoring (MBAM) provides a simplified administrative interface for BitLocker Drive Encryption. BitLocker offers protection against data theft or data exposure for computers that are lost or stolen, encrypting all data that is stored on the Windows operating system volumes and drives and configured data drives.
Microsoft Hyper-V is a native hypervisor; it can create virtual machines on x86-64 systems running Windows.
The Microsoft SQL Server Adapter imports device information from arbitrary SQL servers.
Microsoft System Center Configuration Manager (SCCM) is a systems management software product for managing large groups of computers running Windows NT, Windows Embedded, macOS (OS X), Linux or UNIX, as well as Windows Phone, Symbian, iOS and Android mobile operating systems
Minerva Labs Endpoint Malware Vaccination simulates infection markers, rather than creating them, to contain outbreaks that bypass AV tools.
MobileIron EMM enables enterprises to secure and manage modern operating systems on mobile devices and desktops.
NetBox is an open source web application to help manage and document computer networks.
NetBrain Integrated Edition is an adaptive automation integrated with existing NMS tools and IT workflows to automate documentation, troubleshooting, network change, and defense.
Nmap Security Scanner is a free and open source utility for network discovery and security auditing.
ObserveIT provides insider threat security solutions, including employee monitoring, user activity monitoring, behavioral analytics, policy enforcement, and digital forensics.
Okta provides cloud software that helps companies manage their employees’ passwords, by providing a “single sign-on” experience.
The Alcatel-Lucent OmniVista 2500 Network Management System (NMS) provides management tools and network-wide visibility, enabling operators to provision, manage and maintain a mobile infrastructure.
OpenStack is an open source software solution for creating private and public clouds.
OPSWAT MetaAccess prevents risky devices from accessing local networks and cloud applications.
Oracle Cloud is a computing service providing servers, storage, network, applications and services.
Oracle VM’s server virtualization products support x86 and SPARC architectures and a variety of workloads such as Linux, Windows and Oracle Solaris.
Orca Cloud Visibility Platform delivers full-stack visibility including prioritized alerts on vulnerabilities, compromises, misconfigurations, and more across all cloud accounts.
PacketFence is a free open source network access control (NAC) solution which provides the following features: registration, detection of abnormal network activities, proactive vulnerability scans, isolation of problematic devices, remediation through a captive portal, 802.1X, wireless integration and User-Agent / DHCP fingerprinting.
Palo Alto Networks Cortex is an open and integrated, AI-based continuous security platform, allowing security operations teams to speed the analysis of massive data sets.
Palo Alto Networks Cortex XDR is a detection and response app that natively integrates network, endpoint, and cloud data to detect threats and stop sophisticated attacks.
The Palo Alto Panorama management server provides centralized monitoring and management of multiple next-generation firewalls and appliance clusters.
PKWARE’s data protection platform finds, classifies, and protects sensitive data, allowing security managers to define data protection policies and monitor activity across the organization.
Promisec Endpoint Manager is an agentless endpoint detection and remediation solution that detects, analyzes, and remediates abnormalities.
Proxmox Virtual Environment (VE) is an open source server virtualization management solution based on QEMU/KVM and LXC.
Puppet is an open-source software configuration management tool.
Qualys Cloud Platform monitors customers’ global security and compliance posture using sensors.
Quest KACE Endpoint Systems Management Appliances provision, manage, secure, and service network-connected devices.
Randori is an attack platform that combines continuous reconnaissance, real-time target analysis, and the ability to safely execute attacks on-demand to provide an attacker’s perspective.
Rapid7 Nexpose is an on-premise vulnerability management solution, including discovery, detection, verification, risk classification, impact analysis, reporting and mitigation.
The Red Canary suite includes products that record telemetry, detect and investigate threats, and automate remediation.
RedSeal’s network modeling and risk scoring platform models customers’ entire hybrid data center of public cloud, private cloud and physical network.
RescueAssist (formerly GoToAssist) is a cloud-based toolset for IT and customer support teams including remote support, IT monitoring, and service desk management.
Riverbed SteelCentral Controller SCC facilitates administration tasks for groups of SteelHeads, Interceptors, Mobile Controller, Cores, and Edges.
Rumble is a cloud-based network discovery platform that identifies and monitors network-connected IT assets.
SaltStack intelligent automation delivers, event-driven security, cloud and configuration management for the complexity and scale of a software-defined world.
SaltStack Enterprise intelligent automation delivers event-driven security, cloud and configuration management.
Samanage is a unified, cloud-based IT service desk and asset management platform.
Secdo Endpoint Protection automates endpoint forensic analysis and cyber investigations for security teams.
Secureworks Red Cloak is an endpoint detection and response technology that continuously monitors endpoints for signs of adversary activity.
SentinelOne is an endpoint protection solution including prevention, detection, and response.
ServiceNow provides service management software as a service, including IT services management (ITSM), IT operations management (ITOM) and IT business management (ITBM).
Shodan is the world’s first search engine for Internet-connected devices.
Signal Sciences is a web protection platform that Protects on-premise, multi-cloud and hybrid-cloud apps, within containers and serverless functions.
Skybox Firewall Assurance provides automation of firewall management tasks across different firewall vendors and complex rulesets.
Snipe-IT is a free, open source IT asset management system written in PHP.
Snow Software provides Software Asset Management (SAM) products and services to reduce the risk, cost, and complexity associated with software assets and licensing.
Solarwinds is a unified IT systems management system that tracks the performance of networks, applications, systems, and databases on-premises, in a hybrid environment, or in the cloud.
Sophos Endpoint Protection helps secure workstations by adding prevention, detection, and response technology on top of the operating system.
SOTI MobiControl is a software system for managing mobile devices in the enterprise.
Spacewalk is an open-source systems management solution for system provisioning, patching and configuration.
Specops Inventory collects and reports information on hardware, software, registry, user settings, operating system, security data, and Active Directory data.
Splunk captures, indexes, and correlates real-time data in a searchable repository.
Symantec Cloud Workload Protection (CWP) automates security policy enforcement to protect public cloud workloads.
Symantec Control Compliance Suite (CCS) is a solution to help identify security gaps and vulnerabilities and automate compliance assessments for over 100 regulations, mandates, and best practice frameworks including GDPR, HIPAA, NIST, PCI and SWIFT.
Symantec DLP is a data loss protection and prevention solution. Its management console, the DLP Enforce Platform, and its reporting tool, IT Analytics for DLP, allows writing and enforce policies to reduce information risks.
Symantec Endpoint Encryption combines full-disk and removable media encryption with centralized management to protect sensitive information and ensure regulatory compliance.
Symantec Endpoint Management Suite (formerly Altiris) manages, patches, and remediates application and OS configurations on desktops, laptops and servers to strengthen endpoint security and maximize user productivity.
Symantec Endpoint Protection 12.x manages events, policies, and registration for the client computers that connect to customer networks.
Symantec Endpoint Protection manages events, policies, and registration for the client computers that connect to customer networks.
Symantec Endpoint Protection Cloud unifies threat protection and device management for PC, Mac, mobile devices, and servers to protect endpoints from ransomware, zero-day threats, and other sophisticated attacks.
SysAid is an integrated ITSM, Service Desk and Help Desk software solution.
Tanium discovers IT assets and gathers live endpoint data to help create an up-to-date inventory of hardware and software assets.
Tenable Nessus is a vulnerability scanning platform for auditors and security analysts.
Tenable.io automatically discovers and assesses a customer’s environment for vulnerabilities, misconfigurations, and other cybersecurity issues.
Tenable.sc (formerly SecurityCenter) consolidates and evaluates vulnerability data, prioritizing security risks.
Trend Micro Apex One (formerly OfficeScan) is an endpoint security solution protecting against malware, scripts, injection, ransomware, memory and browser attacks, and exploits.
Trend Micro Deep Security can automatically virtually patch server, cloud, VDI and application vulnerabilities.
Tripwire® Enterprise is a security configuration management (SCM) suite that provides fully integrated solutions for policy, file integrity and remediation management.
TrueFort offers application behavior analytics, control, and protection.
Twistlock provides container and cloud native cybersecurity for teams using Docker, Kubernetes, serverless, and other cloud native technologies.
The UniFi Controller is a wireless network management software solution for managing multiple wireless networks using a web browser.
VMware AirWatch provides enterprise mobility management (EMM) software and standalone management systems for content, applications, and email.
VMware ESXi is an enterprise-class, type-1 hypervisor for deploying and serving virtual computers.
VMware vCloud Director is a cloud service-delivery platform to operate and manage cloud-service businesses.
Web Server Information provides information about the web server for a given website domain, including the server type, its version and operating system, the content management system (CMS) name and its version, the installed CMS plugins, versions and more.
Webroot Endpoint Protection protects against threats across email, browsers, files, URLs, ads, apps, and more.
Zabbix is an open source monitoring software tool for networks, servers, virtual machines and cloud services.
Zscaler Web Security, part of the Zscaler Cloud Security Platform, is a secure Internet and web gateway delivered as a service, stops malware, advanced threats, phishing, browser exploits, malicious URLs, botnets, and more.
We currently integrate with 178 systems and solutions and are adding more each month. If we don’t integrate with your system but should be, tell us about it in the form below and we’ll be in touch.