21 Integrations with Bitdefender Advanced Threat Intelligence
View a list of Bitdefender Advanced Threat Intelligence integrations and software that integrates with Bitdefender Advanced Threat Intelligence below. Compare the best Bitdefender Advanced Threat Intelligence integrations as well as features, ratings, user reviews, and pricing of software that integrates with Bitdefender Advanced Threat Intelligence. Here are the current Bitdefender Advanced Threat Intelligence integrations in 2026:
-
1
Sherweb
Sherweb
A secure and reliable solution for your online business. Everything you need to get started. A user-friendly control panel to manage your website. Experienced support technicians. Access to a huge library of pre-configured web apps for your website. With Sherweb as your trusted cloud partner, you’ll be surprised by what you can achieve. Our full-fledged cloud management platform, driven by evolving business needs, empowers IT professionals to leverage agile solutions paired with 5-star service by trusted experts they can count on. We’re born in the cloud – IT folks rest easy knowing our ever-expanding portfolio of innovative products has been hand-picked and pre-vetted, including a selection of proprietary software you won’t find anywhere else. We bring you a mature, powerful platform that doesn’t make you choose between saving time and saving costs. Automate and integrate just about anything, leveraging our cutting-edge APIs.Starting Price: $7.25 per month -
2
Cloudmore
Cloudmore
Whether you're a business looking to solve a recurring services procurement challenge, a vendor transitioning to recurring revenue, or a service provider moving to the cloud, Cloudmore has a solution for you. One place to sell, manage and bill your subscription channel partners and customers. Solve the procurement challenge for recurring and metered services. Reduce your billing processing time and remove costly billing errors. Users can self serve to discover and acquire the services they need. Showcase and sell your services in an internal or external marketplace. Select services from Cloudmore's service catalog and sell these to your users in their curated e-store. Manage pricing on a global or per customer basis. Create offers and quotes from your service catalog. Your admin users can discover, provision and manage services and view monthly billing details.Starting Price: 499 -
3
Elastiflow
Elastiflow
The most complete network observability solution for use with modern data platforms, providing unprecedented insights at any scale. ElastiFlow allows organizations to achieve unprecedented levels of network performance, availability, and security. ElastiFlow provides granular information about network traffic flows, including source and destination IP addresses, ports, protocols, and the amount of data transmitted. This information allows network administrators to gain deep insights into the network's performance and identify potential issues. ElastiFlow is highly valuable for diagnosing and troubleshooting network issues such as congestion, high latency, or packet loss. By analyzing the network traffic, administrators can pinpoint the cause of the problem and take appropriate action to resolve it. By leveraging ElastiFlow, organizations can improve their security posture, detect and respond to threats more effectively, and maintain compliance with regulatory requirements.Starting Price: Free -
4
Nango
Nango
Nango is the most comprehensive product integration platform, enabling developers to ship integrations with over 300 APIs in hours. It abstracts away API specificities through pre-built integrations, developer tooling, and UI components. With Nango, you gain full control over the code and access to external APIs, allowing you to build exactly the integrations your customers need as if you were building in-house. The platform offers built-in support for all authorization types and quirks, a single interface with your own data models, and seamless UIs for best-in-class integration experiences. Developer tools are configured per API, handling pagination, rate limits, and more. Nango also provides an AI co-pilot trained on hundreds of integrations to assist in building custom solutions. For those requiring expert assistance, Nango offers access to API experts and an integrations service where Nango engineers build custom integrations for you.Starting Price: $250 per month -
5
ThreatSync
WatchGuard
From distributed enterprises with 10 branch offices to small and midsize businesses (SMBs) with employees working outside of the network, it can be a struggle to manage security consistently and cohesively across your organization. It is critical for SMBs and distributed enterprise organizations to not only have visibility into both their network and endpoint event data, but to be able to quickly and efficiently leverage actionable insight to remove threats. ThreatSync, a critical component of TDR, collects event data from the WatchGuard Firebox, Host Sensor and enterprise-grade threat intelligence feeds, analyzes this data using a proprietary algorithm, and assigns a comprehensive threat score and rank. This powerful correlation engine enables cloud-based threat prioritization to empower IT team to quickly and confidently respond to threats. Collects and correlates threat event data from the Firebox and Host Sensor. -
6
NETGEAR Insight
NETGEAR Insight
NETGEAR Insight is your gateway to easy networking and advanced services. Whether it's content filtering, business VPN or instant captive portal get the most of your network in the simplest and fastest way. Secure data traffic between work-from-home employees or between business locations, so that no unauthorized access can obtain your company’s information on Orbi Pro (SXK80, SXK50, SXK30). Insight business VPN seamlessly provides work-from-home employees the same network access and experience compared to while they are in office. For IT managers and MSPs, network management and configurations are handled easily with features including administering VPN access on a group level, managing VPN access for users or business sites and receiving reports and notifications on VPN downtime. Block access to undesirable and malicious websites may decrease work efficiency and be a threat to wired and wireless networks.Starting Price: $9.99 per year -
7
SecurityHQ
SecurityHQ
SecurityHQ is a world leading independent Managed Security Service Provider (MSSP), that detects, and responds to threats, instantly. As your security partner, we alert and act on threats for you. Gain access to an army of analysts that work with you, as an extension of your team, 24/7, 365 days a year. Receive tailored advice and full visibility to ensure peace of mind, with our Global Security Operation Centres. Utilize our award-winning security solutions, knowledge, people, and process capabilities, to accelerate business and reduce risk and overall security costs. Most Popular Services: Managed Detection and Response (MDR) Endpoint Detection and Response (EDR) Managed Extended Detection and Response (XDR) Vulnerability Management Services Managed Firewall Digital Forensics & Incident Response Managed Network Detection and Response (NDR) Penetration Testing CISO as a Service -
8
PC Matic
PC Matic
PC Matic Pro's application whitelisting is a critical preventative layer of cyber-protection that resides on top of other endpoint security solutions. zero trust whitelisting solutions prevent hacking and cyber-attacks. Block all malware, ransomware, and malicious scripts from executing. Protect your business data, users, and network with our whitelist cybersecurity solution. PC Matic Pro represents a long overdue shift in the cybersecurity industry to absolute prevention. Today's threats to critical infrastructure, industry, and all levels of government demand nothing less. PC Matic Pro provides a patented default-deny security layer at the device that blocks all unknown executions without introducing headaches for IT. Unlike traditional security solutions, customer infections aren’t required to strengthen the whitelist architecture. Local overrides can be added after prevention with a focus on accuracy and without concern for responding to an already active infection.Starting Price: $50 per year -
9
ThreatAware
ThreatAware
Leveraging API feeds from your existing tools, validate your controls are correctly deployed and functioning across every cyber asset. Our clients come from all industries, from legal to finance, charities to retail. We are trusted by leading organizations to discover and protect their valuable cyber assets. Create a highly accurate device inventory by connecting to your existing systems via API. When issues arise the workflow automation engine can trigger actions via a webhook. ThreatAware provides clarity of the security control health of your cyber assets in a clear and simple design. Gain a macro view of your security control health regardless of how many controls you are monitoring. Generated from any field from a device, allows you to quickly group your cyber assets for monitoring and configuration purposes. When your monitoring systems accurately depicts your live environment, every alert is real. -
10
Motileo
Motileo
Motileo is a sales performance and team engagement platform that uses gamification to transform everyday business activities and KPIs into competitive, motivating experiences designed to improve productivity and results. It connects directly to existing tools such as CRM systems and automatically pulls key performance indicators like calls made, meetings booked, deals closed, or revenue generated, converting these metrics into real-time competitions, achievements, and progress tracking for individual team members and entire departments. Motileo introduces game-like mechanics into the workplace by turning targets into achievements, milestones, and missions that guide employees toward measurable outcomes while keeping them engaged in the process. Teams can participate in customizable competitions or one-on-one battles that spark friendly rivalry and encourage consistent effort, while automated recognition systems reward users with points or coins that can be redeemed.Starting Price: €25 per month -
11
ThreatConnect Risk Quantifier (RQ)
ThreatConnect
ThreatConnect RQ is a financial cyber risk quantification solution that allows users to identify and communicate the cybersecurity risks that matter most to an organization in terms of financial impact. It aims to enable users to make better strategic and tactical-level. RQ automates the generation of financial cyber risk reporting as it relates to the business, cybersecurity initiatives, and controls. -
12
Datto RMM
Datto, a Kaseya company
Datto RMM is a secure, reliable and modern cloud-based remote monitoring and management platform that gives MSPs the ability to securely and reliably manage their customers IT infrastructures. Built to remove complexity, costs, and risks, it includes powerful automation and monitoring tools such as ransomware detection, patch management, and remote control takeover to help MSPs proactively prevent IT issues, respond faster to incidents, and deliver a better service to their customers. Protect and quickly restore PCs with reliable, image-based, all-in-one cloud backup and disaster recovery. Cloud-to-cloud backup and fast recovery for critical data in Microsoft 365 and G Suite applications. Fast and easy file and folder backup and restore with support for Windows and Mac. Safe file sync and share with a centrally managed, secure collaboration platform. Protect and quickly restore servers with reliable, image-based, all-in-one business continuity and disaster recovery. -
13
DNSWatch
WatchGuard
WatchGuard DNSWatch is a Cloud-based service adding DNS-level filtering to detect and block potentially dangerous connections and protect networks and employees from damaging attacks. WatchGuard analysts triage any critical alerts, following up with an easy-to-understand accounting that includes detailed insights about the potential infection. When the attack uses phishing, and an employee clicks the link, DNSWatch automatically redirects them away from the malicious site and offers resources that reinforce phishing education. Hackers rely on DNS to execute attacks on unsuspecting victims, so careful examination of DNS requests is a great way to find and ultimately intercept attacks! DNSWatch brings DNS-level filtering into our Total Security Suite, providing an added layer of security to stop malware infections. Unwitting attempts to connect to known malicious DNS addresses by your users are automatically blocked, and the user is seamlessly redirected to a safe landing page. -
14
AdaptiveMobile Security
AdaptiveMobile Security
Security and business intelligence services enabled by continuous supervized machine learning and security expertise providing managed threat detection, response, analysis and insight. Monitoring and assessment of evolving suspicious activity within our global deployments across every continent, 24 hours a day, every day. Our mobile and security skills form the foundation of our capabilities, ensuring the security of mobile services today and in the future. Providing continuous real-time security enforcement, using distributed artificial intelligence and machine learning policy decision engines. Enabling frictionless security from attack for all subscribers. Advanced threat detection and mitigation methods through industry-first research and collaboration. First to market in the telecoms industry for innovative security defenses, threat discovery and managed cyber & telecom security offerings. -
15
Cybraics
Cybraics
Stop chasing alerts and prevent incidents before they happen with the world's leading XDR platform that revolutionizes threat detection, log management, and response. Close the gaps and free your team with our silo-breaking, enterprise-class industry-leading XDR platform that covers compliance and simplifies security operations. Cybraics nLighten™ isn't just another security tool. Born out of AI and machine learning research with the U.S. Department of Defense, it's the catalyst to unlock actionable intelligence from the scattered and siloed data, logs, and alerts across multiple security tools in your network. And with Cybraics, powerful threat detection doesn't need to come at a premium. Powered by Adaptive Analytic Detection (AAD) and Persistent Behavior Tracing (PBT). Maximize security team efficacy with 96% automated actionable case creation and a 95% reduction in false positives. Reduce detection and response time from months to minutes. -
16
ThreatBlockr
ThreatBlockr
The only solution that blocks every threat from every path in your network. Networks relying primarily on archaic firewall technology without including other more modern security layers like ThreatBlockr® are easy prey for cybercriminals. Firewalls are easily blinded by encrypted attacks. They’re easily traversed by port forwarding fragmented packet attacks. They’re often misconfigured. They can also get confused by simple extended web and messaging protocols. Side-channel attacks, BYOD, and WFH all compound the problem. Organizations use ThreatBlockr® to gain instant network protection without having to drastically re-engineer their existing security stacks, whether they are on-premise, in the cloud, or both. Fix your security stack by deploying ThreatBlockr® today, and get back to working with the confidence that you’re secure, wherever you are. Enable an ideal protected network while improving firewall efficiency. -
17
Blink
Blink Ops
Blink is an ROI force multiplier for security teams and business leaders looking to quickly and easily secure a wide variety of use cases. Get full visibility and coverage of alerts across your organization and security stack. Utilize automated flows to reduce noise and false positives in alerts. Scan for attacks and proactively identify insider threats and vulnerabilities. Create automated workflows that add relevant context, streamline communications, and reduce MTTR. Take action on alerts and improve your cloud security posture with no-code automation and generative AI. Shift-left access requests, streamline approvals flows, and unblock developers while keeping your applications secure. Continuously monitor your application for SOC2, ISO, GDPR, or other compliance checks and enforce controls. -
18
Fleet
Fleet
Fleet is an all-in-one platform that simplifies the rental, management, and renewal of computer equipment and office furniture for businesses. It offers a comprehensive solution that includes equipment leasing, centralized management, IT support, and eco-friendly renewal options. With Fleet, companies can conserve cash flow, reduce time spent on equipment management, and ensure their teams are equipped with the latest technology. The platform also emphasizes sustainability by providing refurbished equipment options and facilitating the recycling or donation of used devices. Our MDM solution allows you to remotely deploy, monitor, and manage devices across your organization, ensuring global governance and strong security standards. Our cybersecurity solutions are backed by ISO 27001 and SOC 2 certifications. Access the latest devices tailored to your specific requirements without large upfront investments. -
19
Akitra Andromeda
Akitra
Akitra Andromeda is a next-generation, AI-enabled compliance automation platform designed to streamline and simplify regulatory adherence for businesses of all sizes. It supports a wide range of compliance frameworks, including SOC 2, ISO 27001, HIPAA, PCI DSS, SOC 1, GDPR, NIST 800-53, and custom frameworks, enabling organizations to achieve continuous compliance efficiently. The platform offers over 240 integrations with major cloud platforms and SaaS services, facilitating seamless incorporation into existing workflows. Akitra's automation capabilities reduce the time and cost associated with manual compliance management by automating monitoring and evidence-gathering processes. The platform provides a comprehensive template library for policies and controls, assisting organizations in establishing a complete compliance program. Continuous monitoring ensures that assets remain secure and compliant around the clock. -
20
Oriso
Oriso
Oriso offers a Canadian-hosted, fully independent cloud platform built for simplicity, transparency, and control, addressing the needs of businesses, MSPs, and developers with Infrastructure as a Service (IaaS), Desktop as a Service (DaaS), Software as a Service (SaaS), and Backup as a Service (BaaS). With its “IC3” Cloud Management Platform, users can create, manage, and scale virtual machines in minutes without support tickets or delays, while enjoying transparent fixed pricing, local 24/7 support, ISO 27001 certification, and end-to-end sovereignty. It empowers organizations to migrate workloads, such as Microsoft 365 or Google Workspace backups, or to deliver their own software as a cloud-based SaaS offering while retaining full control of resources, branding, and tenancy. Its solution set also enables secure data transfers (for example, from Amazon S3 into Oriso’s sovereign Canadian cloud) and provides disaster-recovery, multi-site uptime, and more. -
21
Jotti
Jotti
Jotti's malware scan is a free service that lets you scan suspicious files with several anti-virus programs. You can submit up to 5 files at the same time. There is a 250MB limit per file. Please be aware that no security solution offers 100% protection, not even when it uses several anti-virus engines. All files are shared with anti-virus companies so detection accuracy of their anti-virus products can be improved. We are not interested in names, addresses, or other information providing insight into the identities of our visitors, but we do log and use some of the data you provide. We recognize that privacy is important and we want you to completely understand what happens with the information you send to us. We store files you send in for scanning and share these with anti-malware companies. We do this to help anti-malware companies improve the detection accuracy of their security products. We treat your files confidentially.
- Previous
- You're on page 1
- Next