39 Integrations with Vulcan Cyber

View a list of Vulcan Cyber integrations and software that integrates with Vulcan Cyber below. Compare the best Vulcan Cyber integrations as well as features, ratings, user reviews, and pricing of software that integrates with Vulcan Cyber. Here are the current Vulcan Cyber integrations in 2026:

  • 1
    Google Cloud Platform
    Google Cloud is a cloud-based service that allows you to create anything from simple websites to complex applications for businesses of all sizes. New customers get $300 in free credits to run, test, and deploy workloads. All customers can use 25+ products for free, up to monthly usage limits. Use Google's core infrastructure, data analytics & machine learning. Secure and fully featured for all enterprises. Tap into big data to find answers faster and build better products. Grow from prototype to production to planet-scale, without having to think about capacity, reliability or performance. From virtual machines with proven price/performance advantages to a fully managed app development platform. Scalable, resilient, high performance object storage and databases for your applications. State-of-the-art software-defined networking products on Google’s private fiber network. Fully managed data warehousing, batch and stream processing, data exploration, Hadoop/Spark, and messaging.
    Leader badge
    Starting Price: Free ($300 in free credits)
    View Software
    Visit Website
  • 2
    Amazon Elastic Container Service (Amazon ECS)
    Amazon Elastic Container Service (Amazon ECS) is a fully managed container orchestration service. Customers such as Duolingo, Samsung, GE, and Cook Pad use ECS to run their most sensitive and mission-critical applications because of its security, reliability, and scalability. ECS is a great choice to run containers for several reasons. First, you can choose to run your ECS clusters using AWS Fargate, which is serverless compute for containers. Fargate removes the need to provision and manage servers, lets you specify and pay for resources per application, and improves security through application isolation by design. Second, ECS is used extensively within Amazon to power services such as Amazon SageMaker, AWS Batch, Amazon Lex, and Amazon.com’s recommendation engine, ensuring ECS is tested extensively for security, reliability, and availability.
  • 3
    Slack

    Slack

    Salesforce

    Slack is a cloud-based project collaboration and team interaction software solution specially designed to seamlessly facilitate communication across organizations. Featuring powerful tools and services integrated into a single platform, Slack provides private channels to promote interaction within smaller teams, direct channels to help send messages directly to colleagues, and public channels that enables members across organizations to start conversations. Available on Mac, Windows, Android, and iOS apps, Slack offers a plethora of features that include chat, file sharing, collaborative workspace, real-time notifications, two-way audio and video, screen sharing, document imaging, activity tracking and logging, and more.
    Leader badge
    Starting Price: $6.67 per user per month
  • 4
    Microsoft Teams
    Solving today's complex business problems takes teams of engaged people working together. We’ve built an online guide to teach you and your team the secrets of successful teamwork. When you have a place to create and make decisions as a team, there’s no limit to what you can achieve. Teams brings everything together in a shared workspace where you can chat, meet, share files, and work with business apps. Get your team on the same page with group chat, online meetings, calling, and web conferencing. Collaborate on files with built-in Microsoft 365 (formerly Office 365) apps like Word, Excel, PowerPoint, and SharePoint. Add in your favorite Microsoft apps and third-party services to keep the business moving forward. Get end-to-end security, administrative control, and compliance—all powered by Microsoft 365. Teams is designed for groups of all kinds. Get started with the free, no-commitments version. You can also get Teams as part of the best-in-class suite of productivity tools.
    Leader badge
    Starting Price: $12.50 per user per month
  • 5
    Microsoft Azure
    Microsoft's Azure is a cloud computing platform that allows for rapid and secure application development, testing and management. Azure. Invent with purpose. Turn ideas into solutions with more than 100 services to build, deploy, and manage applications—in the cloud, on-premises, and at the edge—using the tools and frameworks of your choice. Continuous innovation from Microsoft supports your development today, and your product visions for tomorrow. With a commitment to open source, and support for all languages and frameworks, build how you want, and deploy where you want to. On-premises, in the cloud, and at the edge—we’ll meet you where you are. Integrate and manage your environments with services designed for hybrid cloud. Get security from the ground up, backed by a team of experts, and proactive compliance trusted by enterprises, governments, and startups. The cloud you can trust, with the numbers to prove it.
  • 6
    Jira Service Management
    Jira Service Management (formerly Jira Service Desk) empowers Dev and Ops teams to collaborate at high-velocity, so they can respond to business changes and deliver great customer and employee service experiences fast. Tune Jira Service Management to meet your unique needs. Empower every team, from IT to HR to legal, to set up a service desk quickly and continuously adapt at scale. Deliver great service experiences fast - without the complexity of traditional ITSM solutions. Track work across the enterprise through an open, collaborative platform. Link issues across Jira and ingest data from other software development tools, so your IT support and operations teams have richer contextual information to rapidly respond to requests, incidents, and changes. Deliver more customer impact while managing risk. Accelerate critical development work, eliminate toil, and deploy changes with ease, with a complete audit trail for every change.
    Starting Price: $20 per user per month
  • 7
    Nessus

    Nessus

    Tenable

    Nessus is trusted by more than 30,000 organizations worldwide as one of the most widely deployed security technologies on the planet - and the gold standard for vulnerability assessment. From the beginning, we've worked hand-in-hand with the security community. We continuously optimize Nessus based on community feedback to make it the most accurate and comprehensive vulnerability assessment solution in the market. 20 years later and we're still laser focused on community collaboration and product innovation to provide the most accurate and complete vulnerability data - so you don't miss critical issues which could put your organization at risk. Today, Nessus is trusted by more than 30,000 organizations worldwide as one of the most widely deployed security technologies on the planet - and the gold standard for vulnerability assessment.
  • 8
    CrowdStrike Falcon
    CrowdStrike Falcon is a cloud-native cybersecurity platform that provides advanced protection against a wide range of cyber threats, including malware, ransomware, and sophisticated attacks. It leverages artificial intelligence (AI) and machine learning to detect and respond to threats in real time, offering endpoint protection, threat intelligence, and incident response capabilities. The platform uses a lightweight agent that continuously monitors endpoints for signs of malicious activity, providing visibility and protection without significant impact on system performance. Falcon’s cloud-based architecture ensures fast updates, scalability, and rapid threat response across large, distributed environments. Its comprehensive security features help organizations prevent, detect, and mitigate potential cyber risks, making it a powerful tool for modern enterprise cybersecurity.
  • 9
    Snowflake

    Snowflake

    Snowflake

    Snowflake is a comprehensive AI Data Cloud platform designed to eliminate data silos and simplify data architectures, enabling organizations to get more value from their data. The platform offers interoperable storage that provides near-infinite scale and access to diverse data sources, both inside and outside Snowflake. Its elastic compute engine delivers high performance for any number of users, workloads, and data volumes with seamless scalability. Snowflake’s Cortex AI accelerates enterprise AI by providing secure access to leading large language models (LLMs) and data chat services. The platform’s cloud services automate complex resource management, ensuring reliability and cost efficiency. Trusted by over 11,000 global customers across industries, Snowflake helps businesses collaborate on data, build data applications, and maintain a competitive edge.
    Starting Price: $2 compute/month
  • 10
    Amazon EC2
    Amazon Elastic Compute Cloud (Amazon EC2) is a web service that provides secure, resizable compute capacity in the cloud. It is designed to make web-scale cloud computing easier for developers. Amazon EC2’s simple web service interface allows you to obtain and configure capacity with minimal friction. It provides you with complete control of your computing resources and lets you run on Amazon’s proven computing environment. Amazon EC2 delivers the broadest choice of compute, networking (up to 400 Gbps), and storage services purpose-built to optimize price performance for ML projects. Build, test, and sign on-demand macOS workloads. Access environments in minutes, dynamically scale capacity as needed, and benefit from AWS’s pay-as-you-go pricing. Access the on-demand infrastructure and capacity you need to run HPC applications faster and cost-effectively. Amazon EC2 delivers secure, reliable, high-performance, and cost-effective compute infrastructure to meet demanding business needs.
  • 11
    Snyk

    Snyk

    Snyk

    Snyk is the leader in developer security. We empower the world’s developers to build secure applications and equip security teams to meet the demands of the digital world. Our developer-first approach ensures organizations can secure all of the critical components of their applications from code to cloud, leading to increased developer productivity, revenue growth, customer satisfaction, cost savings and an overall improved security posture. Snyk’s Developer Security Platform automatically integrates with a developer’s workflow and is purpose-built for security teams to collaborate with their development teams. Snyk is used by 1,200 customers worldwide today, including industry leaders such as Asurion, Google, Intuit, MongoDB, New Relic, Revolut and Salesforce. Snyk is recognized on the Forbes Cloud 100 2021, the 2021 CNBC Disruptor 50 and was named a Visionary in the 2021 Gartner Magic Quadrant for AST.
    Starting Price: $0
  • 12
    Ansible

    Ansible

    Red Hat

    Ansible is a radically simple automation engine that automates cloud provisioning, configuration management, application deployment, intra-service orchestration, and many other IT needs. Ansible Automation Platform has grown over the past years to provide powerful automation solutions that work for operators, administrators and IT decision makers across a variety of technology domains. It’s a leading enterprise automation solution from Red Hat®, a thriving open source community, and the de facto standard technology of IT automation. Scale automation, manage complex deployments, and speed productivity with an enterprise automation platform that can be used across entire IT teams. Red Hat or partner consulting services help you advance your end-to-end automation journey for faster time to value.
    Starting Price: Free
  • 13
    ServiceNow

    ServiceNow

    ServiceNow

    Digitize your workflows - they'll love you for it. Your company can be more productive and your people more engaged. ServiceNow makes work, work better for people. Transform old, manual ways of working into modern digital workflows, so employees and customers get what they need, when they need it—fast, simple, easy. ServiceNow delivers digital workflows that create great experiences and unlock productivity for employees and the enterprise. We simplify the complexity of work on a single, enterprise cloud platform. The Now Platform: The intelligent and intuitive cloud platform for work. Choose from our workflows or build your own apps. Built on the Now Platform, our product portfolio delivers the  IT,  Employee, and  Customer Workflows that matter with enterprise solutions to help drive every part of your digital transformation. Create the great experiences you want and unlock the productivity you need, now with native mobile capabilities for everyday work across the enterprise.
    Starting Price: $100 per month
  • 14
    Mend.io

    Mend.io

    Mend.io

    Mend.io offers the first AI native application security platform, empowering organizations to build and run a proactive AppSec program tuned for AI powered development. The unified platform secures AI generated code and embedded AI components, drives risk reduction through AI powered remediation, automates compliance, and provides a holistic enterprise scale view of risks and clear actions for developers across your entire codebase.
    Starting Price: $1,000 per developer, per year
  • 15
    Qualys VMDR
    The industry's most advanced, scalable and extensible solution for vulnerability management. Fully cloud-based, Qualys VMDR provides global visibility into where your IT assets are vulnerable and how to protect them. With VMDR 2.0, enterprises are empowered with visibility and insight into cyber risk exposure - making it easy to prioritize vulnerabilities, assets, or groups of assets based on business risk. Security teams can take action to mitigate risk, helping the business measure its true risk, and track risk reduction over time. Discover, assess, prioritize, and patch critical vulnerabilities and reduce cybersecurity risk in real time and across your global hybrid IT, OT, and IoT landscape. Quantify risk across vulnerabilities, assets, and groups of assets to help your organization proactively mitigate risk exposure and track risk reduction over time with Qualys TruRisk™
  • 16
    Chef

    Chef

    Progress Software

    Chef turns infrastructure into code. With Chef, you can automate how you build, deploy, and manage your infrastructure. Your infrastructure becomes as versionable, testable, and repeatable as application code. Chef Infrastructure Management ensures configurations are applied consistently in every environment with infrastructure management automation. Chef Compliance makes it easy to maintain and enforce compliance across the enterprise. Deliver successful application outcomes consistently at scale with Chef App Delivery. Chef Desktop allows IT teams to automate the deployment, management, and ongoing compliance of IT resources. Ensure configurations are applied consistently in every environment. Powerful policy-based configuration management system software. Runbook automation to consistently define, package & deliver applications. IT automation & DevOps dashboards for operational visibility.
  • 17
    Jira Work Management
    Business project management software. See all project information at a glance with Jira Work Management (formerly Jira Core). Manage your projects and keep your team organized. Managing projects and tasks in Jira Work Management starts with a workflow. Workflows define your process and enable your team to track tasks. Jira Work Management Cloud instances also have boards that allow you to visualize your workflows and drag and drop tasks from to-do to done. Currently available in cloud offering only. Task management is easier with statuses, comments, and attachments in one place. Everyone knows a project's details at a glance without having to email or set up a meeting. Plus, with notifications you'll know when your attention is needed. How many tasks are still in progress? Which team member has too much on their plate? Using Jira Work Management, you can follow the status of your team's projects in different ways: with a quick overview, customized dashboards, and more.
    Starting Price: $5 per user per month
  • 18
    Chef Infra

    Chef Infra

    Progress Software

    Chef® Infra® configuration management software eliminates manual efforts and ensures infrastructure remains consistent and compliant over its lifetime — even in the most complex, heterogenous, and large-scale environments. Define configurations and policies as code that are testable, enforceable and can be delivered at scale as part of automated pipelines. Ensure configurations only change if a system diverges from the desired defined state and automatically correct configuration drift, if needed. Manage Windows and Linux systems running on prem, ARM systems running in the cloud or Macs laptops running at the edge all the same way. Use simple declarative definitions for common tasks or easily extend them to support the most unique environmental requirements. Enforce policy by converging the system to the state declared by the various resources. Reduce risks by iterating on policy changes before pushing them to production.
    Starting Price: $127 per year
  • 19
    NorthStar Navigator

    NorthStar Navigator

    NorthStar.io, Inc.

    NorthStar is redefining Risk-Based Vulnerability Management with simple, contextual vulnerability prioritization for easier remediation. Common challenges NorthStar addresses are listed below: • Prioritize issues that should be addressed first in order to make the best use of limited resources. • Address lingering exposures that could impact critical business services, applications, and data stores. • Bridge the visibility gap and discrepancies that exist between vulnerability assessment and patch management. • Track reduction in risk over time and validate the most important issues are being addressed first. • Deliver a complete view of their environment – all assets, vulnerabilities and exposures. • Eliminate manual processes and unnecessary spreadsheet work.
    Starting Price: $8 per device
  • 20
    Jira Align

    Jira Align

    Atlassian

    Jira Align (formerly AgileCraft) connects your business strategy to technical execution. Aggregate team-level data to make all work visible across your enterprise in real-time. Get everyone on the same page to determine scope, roadmaps and dependencies across teams and portfolios. Connect strategic investments with customer value created to drive outcomes faster and more reliably. Communicate the value of funding strategic initiatives to investors, analysts, and employees. Connect strategy to execution to drive enterprise value of your high-level mission and vision. Execute against sprint work that tracks back to your company’s high-level strategy. Ensure programs run smoothly and resources are perfectly allocated for on-time delivery. Manage idea intake, prioritize the feature backlog, and track progress with real-time roadmaps. Drive digital transformation with a framework customized to scale agile in your enterprise.
    Starting Price: $75 per user per month
  • 21
    Puppet Enterprise
    Puppet is redefining what’s possible for continuous operations. Easily automate your environment to deliver at cloud speed and cloud scale with products that are responsive and predictive by design. 90% of the largest US-based companies rely on Puppet’s infrastructure as code to simplify the complexity of modern IT infrastructure. At Puppet, we’re redefining what is possible for continuous operations. We empower IT operations teams to easily automate their infrastructure, enabling them to deliver at cloud speed and cloud scale. Our scalable approach to infrastructure automation enables teams to innovate rapidly, with security and compliance baked in. We’re leading the way from find-and-fix to predicting at scale. No more surprises. We move at the speed of business, delivering infrastructure automation software that gives your teams back their time, and promises them, and your business. peace of mind.
    Starting Price: $120 per month
  • 22
    Black Duck

    Black Duck

    Black Duck

    Black Duck, part of the Synopsys Software Integrity Group, is a leading provider of application security testing (AST) solutions. Their comprehensive portfolio includes tools for static analysis, software composition analysis (SCA), dynamic analysis, and interactive analysis, enabling organizations to identify and mitigate security vulnerabilities throughout the software development life cycle. By automating the discovery and management of open-source software, Black Duck ensures compliance with security and licensing standards. Their solutions are designed to help organizations build trust in their software by managing application security, quality, and compliance risks at the speed their business demands. Black Duck empowers businesses to innovate securely and deliver software with confidence.
  • 23
    Rapid7 InsightVM
    Better understand the risk in your modern environment so you can work in lockstep with technical teams. Align traditionally siloed teams and drive impact with the shared view and common language of InsightVM. Take a proactive approach to security with tracking and metrics that create accountability and recognize progress. InsightVM not only provides visibility into the vulnerabilities in your modern IT environment—including local, remote, cloud, containerized, and virtual infrastructure—but also clarity into how those vulnerabilities translate into business risk and which are most likely to be targeted by attackers. InsightVM is not a silver bullet. Instead, it provides the shared view and common language needed to align traditionally siloed teams and drive impact. It also supports a proactive approach to vulnerability management with tracking and metrics that create accountability for remediators, demonstrate impact across teams, and celebrate progress.
  • 24
    Burp Suite

    Burp Suite

    PortSwigger

    Burp Suite is a leading range of cybersecurity tools, brought to you by PortSwigger. We believe in giving our users a competitive advantage through superior research. Each new edition of Burp Suite shares a common ancestor. The DNA running through our family tree represents decades of excellence in research. As the industry has shown time and time again, Burp Suite is the tool you can trust with your online security. We designed Enterprise Edition with simplicity as a top priority. Discover easy scheduling, elegant reports and straightforward remediation advice - all in one powerful package. The toolkit that started it all. Find out why Burp Pro has been the penetration testing industry's weapon of choice for well over a decade. Nurturing the next generation of WebSec professionals and promoting strong online security. Community Edition gives everyone access to the basics of Burp.
    Starting Price: $399 per user per year
  • 25
    NTT Application Security
    The NTT Application Security Platform provides all of the services required to secure the entire software development lifecycle. From solutions for the security team, to fast and accurate products for developers in DevOps environments, we help organizations enjoy all of the benefits of digital transformation without the security headaches. Get smart about application security. With the best in-class application security technology, our always-on assessments are constantly detecting attack vectors and scanning your application code. NTT Sentinel Dynamic accurately identifies and verifies vulnerabilities in your websites and web applications. NTT Sentinel Source and NTT Scout scan your entire source code, identify vulnerabilities, and provide detailed vulnerability descriptions and remediation advice.
  • 26
    JFrog Xray
    DevSecOps Next Generation – Securing Your Binaries. Identify security vulnerabilities and license violations early in the development process and block builds with security issues from deployment. Automated and continuous governance and auditing of software artifacts and dependencies throughout the software development lifecycle from code to production. Additional functionalities include: - Deep recursive scanning of components drilling down to analyze all artifacts and dependencies and creating a graph of relationships between software components. - On-Prem, Cloud, Hybrid, or Multi-Cloud Solution - Impact analysis of how an issue in one component affects all dependent components with a display chain of impacts in a component dependency graph. - JFrog’s vulnerabilities database, continuously updated with new component vulnerability data, includes VulnDB, the industry’s most comprehensive security vulnerability database.
  • 27
    Amazon Inspector
    Amazon Inspector is an automated security assessment service that helps improve the security and compliance of applications deployed on AWS. Amazon Inspector automatically assesses applications for exposure, vulnerabilities, and deviations from best practices. After performing an assessment, Amazon Inspector produces a detailed list of security findings prioritized by level of severity. These findings can be reviewed directly or as part of detailed assessment reports which are available via the Amazon Inspector console or API. Amazon Inspector security assessments help you check for unintended network accessibility of your Amazon EC2 instances and for vulnerabilities on those EC2 instances. Amazon Inspector assessments are offered to you as pre-defined rules packages mapped to common security best practices and vulnerability definitions. Accelerate MTTR by using over 50 sources for vulnerability intelligence to help identify zero-day vulnerabilities quickly.
  • 28
    Prisma Cloud

    Prisma Cloud

    Palo Alto Networks

    Comprehensive cloud native security. Prisma™ Cloud delivers comprehensive security across the development lifecycle on any cloud, enabling you to develop cloud native applications with confidence. The move to the cloud has changed all aspects of the application development lifecycle – security being foremost among them. Security and DevOps teams face a growing number of entities to secure as the organization adopts cloud native approaches. Ever-changing environments challenge developers to build and deploy at a frantic pace, while security teams remain responsible for the protection and compliance of the entire lifecycle. Firsthand accounts of Prisma Cloud’s best-in-class cloud security capabilities from some of our satisfied customers.
  • 29
    ServiceNow Asset Management
    Asset Management automates your IT asset lifecycles with intuitive workflows. Make informed decisions about asset capacity, refresh, and vendors. Know and control your assets. Optimize asset lifecycle investments to deliver better IT services and make smarter decisions. Reduce asset costs. Lower asset costs and automate asset lifecycle processes to minimize wasted resources. Mitigate risk. Enforce asset policies and regulatory requirements to limit risks. Transform your business with digital IT workflows. Modernize your operations to optimize productivity, cost, and resilience with a single platform for IT. Maximize your investment with ServiceNow Impact. Realize value faster with experts on demand, premium support, and preventive tools to guide your digital transformation. Our digital experiences can help your organization, so it simply works better.
  • 30
    Microsoft Intune
    Transform IT service delivery for your modern workplace. Simplify modern workplace management and achieve digital transformation with Microsoft Intune. Create the most productive Microsoft 365 environment for users to work on devices and apps they choose, while protecting data. Securely manage iOS, Android, Windows, and macOS devices with a single endpoint management solution. Streamline and automate deployment, provisioning, policy management, app delivery, and updates. Stay up to date with a highly scalable, globally distributed cloud service architecture. Leverage the intelligent cloud for insights and baselines for your security policies and configuration settings. Help safeguard data when you don’t manage devices used by employees or partners to access work files. Intune app protection policies provide granular control over Office 365 data on mobile devices.
  • 31
    Tenable One
    Tenable One radically unifies security visibility, insight and action across the attack surface, equipping modern organizations to isolate and eradicate priority cyber exposures from IT infrastructure to cloud environments to critical infrastructure and everywhere in between. The world’s only AI-powered exposure management platform. See every asset across your entire attack surface—from cloud environments to operational technologies, infrastructure to containers, and remote workers to modern web-apps with Tenable's market-leading vulnerability management sensors. With more than 20 trillion aspects of threat, vulnerability, misconfiguration and asset information, Tenable’s machine-learning powered predictions reduce remediation efforts by enabling you to focus first on the risks that matter most. Drive improvements required to reduce the probability of a business-impacting cyber event from occurring by communicating objective measures of risk.
  • 32
    GroundHog FMS

    GroundHog FMS

    GroundHog

    Our state-of-the-art fleet management system uses AI-based scheduling algorithms and the best-of-breed technology with off-the-shelf hardware to increase tons mined per shift, faster and safer. Continuously optimize haul cycles to maximize shovel and excavator performance to meet TPH requirements at the crushers. Automatically capture cycle time data from onboard telemetry and high-precision GPS systems to streamline all load-haul cycles. Dynamically optimize routing to various feed points and stockpiles to meet blend and tons-per-hour requirements. Continuously monitor machine health, tire performance, and fuel to maximize equipment utilization and minimize any down maintenance. GroundHog has established relationships with a wide variety of OEMs and after-market sensor makers including payload, tire pressure, weighbridges, load scanners, drills, and others. The system runs on algorithms and technology infrastructures used at companies like Uber and Facebook.
  • 33
    GroundHog Safety Training LMS
    Safety Directors use GroundHog Safety Training LMS to ensure that every employee has been properly safety trained on a task before they perform their job. Trainers use GroundHog QR Tags and the training grid to quickly look up every task an employee has been trained on. And the next set of training they need to complete to meet their individual development plans. Safety directors monitor their Hog score, get weekly reports, and 30, 60, and 90-day reminders of employees that need to be retrained. GroundHog Safety Training LMS integrates with various HR management systems and fleet management systems so management has a 360-degree view of every employee. Supervisors can quickly look up alternate resources to perform a job when an employee does not show up. Perform training and issue compliant training certificates, anywhere, anytime. Safety teams can easily organize training data by site, crew, job type, seniority, and any other user-defined parameters.
  • 34
    rapidInspect

    rapidInspect

    GroundHog

    rapidInspect is a safety analytics and digital inspection app that helps mines meet MSHA’s digital recordkeeping requirements. Easy to implement in as little as 15 minutes, rapidInspect performs inspections, records hazards, and sends alerts using a tablet or mobile phone to miners and/or their supervisors. Corrective action is promptly taken. Workplace exam records are readily available to mine managers in compliance with MSHA rules. Mine managers are also given powerful safety analytics and geographic hazard viewing to swiftly boost mine safety. rapidInspect was created on the principle that safety should extend beyond mere compliance. Using a mobile phone or tablet, health & safety personnel regularly inspect the workplace areas to investigate the area of any hazards or risks of severe injury or harm to any person. They immediately communicate the hazard or potential hazard through real-time messaging and notifications via the rapidInspect platform to the mine manager.
  • 35
    ServiceNow Configuration Management Database
    To effectively manage and improve your systems, you need to know exactly what assets are in your IT environment and have current, accurate configuration data. With an accurate configuration management database (CMDB), it's easy to understand your organization's IT environment, particularly in the areas of service impact analysis, asset management, compliance, and configuration management. The ServiceNow® CMDB provides a single system of record for IT. When paired with ServiceNow Service Mapping, the CMDB becomes service‑aware—which enables your ServiceNow applications to be service‑aware as well. Now with your CMDB, you gain full visibility of your infrastructure and services, leading to more control of your environment and better decisions.
  • 36
    Qualys TruRisk Platform
    Qualys TruRisk Platform (formerly Qualys Cloud Platform). The revolutionary architecture that powers Qualys’ IT, security, and compliance cloud apps. Qualys TruRisk Platform gives you a continuous, always-on assessment of your global IT, security, and compliance posture, with 2-second visibility across all your IT assets, wherever they reside. And with automated, built-in threat prioritization, patching and other response capabilities, it’s a complete, end-to-end security solution. On premises, at endpoints, on mobile, in containers or in the cloud, Qualys TruRisk Platform sensors are always on, giving you continuous 2-second visibility of all your IT assets. Remotely deployable, centrally managed and self-updating, the sensors come as physical or virtual appliances, or lightweight agents. Qualys TruRisk Platform provides an end-to-end solution, allowing you to avoid the cost and complexities that come with managing multiple security vendors.
    Starting Price: $500.00/month
  • 37
    Checkmarx

    Checkmarx

    Checkmarx

    The Checkmarx Software Security Platform provides a centralized foundation for operating your suite of software security solutions for Static Application Security Testing (SAST), Interactive Application Security Testing (IAST), Software Composition Analysis (SCA), and application security training and skills development. Built to address every organization’s needs, the Checkmarx Software Security Platform provides the full scope of options: including private cloud and on-premises solutions. Allowing a range of implementation options ensures customers can start securing their code immediately, rather than going through long processes of adapting their infrastructure to a single implementation method. The Checkmarx Software Security Platform transforms the standard for secure application development, providing one powerful resource with industry-leading capabilities.
  • 38
    Veracode

    Veracode

    Veracode

    Veracode offers a holistic, scalable way to manage security risk across your entire application portfolio. We are the only solution that can provide visibility into application status across all testing types, including SAST, DAST, SCA, and manual penetration testing, in one centralized view.
  • 39
    Ivanti Neurons for Patch Management
    Most exploits target known vulnerabilities—those for which a patch has been available for at least a year. You can’t rely on manual processes, or on users themselves, to ensure systems are fully patched. Ivanti DSM integrates Patch Management to identify and patch vulnerabilities across heterogeneous OSes, configurations, and all major third party applications. Your servers, desktops, and laptops are equally protected across your entire organization.
  • Previous
  • You're on page 1
  • Next