What Integrates with Aruba ClearPass?
Find out what Aruba ClearPass integrations exist in 2025. Learn what software and services currently integrate with Aruba ClearPass, and sort them by reviews, cost, features, and more. Below is a list of products that Aruba ClearPass currently integrates with:
-
1
UnSpot
UnSpot
$2.50 186 RatingsUnSpot is a hybrid office platform that offers everything you need. Our software is powerful. UnSpot offers a desk reservation system, scheduling software and navigation system. Simplify workspace, schedule meetings and gain insight into office data with a single smart solution. UnSpot allows you to book desks easily, create schedules and optimize your workspace. -
2
Archie empowers thousands of hybrid offices and coworking spaces to streamline operations seamlessly. Whether it's managing desk and meeting room bookings, tracking visitors, or analyzing workspace efficiency, Archie offers a dedicated solution that makes running your space a breeze. What sets Archie apart is its sleek, modern interface paired with robust admin capabilities. You truly have to experience it to appreciate the depth of its features. From visual floor plans and visitor check-ins to meeting room scheduling, desk assignments, multi-location support, and smart automations with real-time alerts— Archie covers it all. Plus, with native integrations to over 40 tools like Microsoft Teams, Slack, Zoom, Google Calendar, Outlook, Stripe, Xero, QuickBooks, Kisi, and more, Archie fits right into your existing workflows.
-
3
You can now manage your assets and workplace seamlessly. Eptura's platform allows you to bring together all aspects of your work so that your employees and business can achieve their full potential. Bring your entire work world together in one place. Our tools provide you with unparalleled visibility into your workspace, allowing you to better understand how your employees are using it while managing your assets and facilities. Eptura provides you with powerful insights to ensure that your workspace supports your business in every way. Maximize your space and make the most of your employees' time. Keep your assets running smoothly. Encourage collaboration between teams and forecast your future maintenance requirements.
-
4
Carbon Black EDR
Broadcom
1 RatingCarbon Black EDR by Broadcom provides a robust endpoint security solution that combines real-time threat detection, behavioral analysis, and machine learning to protect organizations from sophisticated cyber threats. The platform monitors endpoint activity across networks, offering continuous visibility and automated responses to potential security incidents. By leveraging a cloud-based architecture, Carbon Black EDR ensures seamless scalability and fast deployment, helping organizations mitigate risks, detect threats faster, and respond effectively. It’s ideal for businesses seeking a proactive solution to safeguard their systems from evolving cybersecurity threats. -
5
CYREBRO is a true 24/7/365 Managed Detection and Response (MDR) solution, delivered through its cloud-based SOC Platform. CYREBRO rapidly detects, analyzes, investigates and responds to cyber threats. CYREBRO is a turnkey solution that uses a proprietary detection engine for threat detection and orchestration, SOAR for automations, correlations and investigations, SOC Platform for real-time investigation data and visibility, and top tier analyst and incident response teams. CYREBRO easily connects to hundreds of different tools and systems, delivering time to value within mere hours. With 1,500+ proprietary detection algorithms constantly optimized, CYREBRO constantly monitors companies of all sizes facing different types of risks and attacks, shortening mean time to respond (MTTR).
-
6
Sine
Sine
$65.00/month Sine's visitor management software makes it easy to streamline your workplace check-in. Sine is trusted by global brands and allows users to quickly and easily check-in employees, contractors, visitors, and other assets throughout the workplace. It allows users to instantly print badges, take visitor photo IDs, and sign NDA's from one platform. Sine's visitor management software is accessible on the web, tablet, as well as mobile devices. -
7
OfficeRnD Flex
OfficeRnD
$124.00/month OfficeRnD Flex helps flex space operators, property managers, and landlords excel in flex space management. The platform automates and streamlines administrative processes, enables data-driven decision-making, and provides a modern and tech-enabled experience to the end customer. -
8
Axonius
Axonius
Axonius gives IT and security teams the confidence to control complexity by providing a system of record for all digital infrastructure. With a comprehensive understanding of all assets including devices, identities, software, SaaS applications, vulnerabilities, security controls, and the context between them, customers are able to mitigate threats, navigate risk, decrease incident response time, automate action, and inform business-level strategy — all while eliminating manual, repetitive tasks. -
9
Microsoft Defender for IoT
Microsoft
$0.001 per device per monthContinuous asset discovery, vulnerability management, threat detection, and continuous asset discovery for your Internet of Things and operational technology devices (OT). Ensure IoT/OT innovation by accelerating IoT/OT innovation through comprehensive security across all IoT/OT devices. Microsoft Defender for IoT is an agentless, network-layer security solution that can be quickly deployed by end-user organizations. It works with diverse industrial equipment and integrates with Microsoft Sentinel and other SOC tools. You can deploy on-premises and in Azure-connected environments. Microsoft Defender for IoT is a lightweight agent that embeds device-layer security in new IoT/OT initiatives. Passive, agentless network monitoring allows you to get a complete inventory and analysis of all your IoT/OT assets. This is done without any impact on the IoT/OT networks. Analyze a variety of industrial protocols to identify the device details, including manufacturer, type, firmware level, IP or Media Access Control address. -
10
InsightCloudSec
Rapid7
$66,000 per yearAs you revolutionize your business, we ensure your cloud services remain protected. InsightCloudSec empowers you to foster innovation while maintaining ongoing security and compliance. By providing unified visibility and monitoring, along with real-time automated remediation, you can achieve continuous security and prevent misconfigurations. Our platform secures configurations and workloads through automated cloud security and vulnerability management tailored for dynamic cloud environments. You can effectively manage identities and access across transient resources at scale. InsightCloudSec serves as a comprehensive cloud-native security platform, offering all the essential tools for cloud security in one solution. In today's world, the concern for consumer privacy is more pressing than ever, influencing a variety of protective measures, including regulations such as the California Consumer Privacy Act and the General Data Protection Regulation, which highlight the need for robust privacy protections. This growing emphasis on safeguarding personal data reflects the increasing awareness of its significance in our society. -
11
inspace
inspace
$2.99 per monthOur software revolutionizes the hybrid workspace by simplifying everything from desk allocations to meeting room arrangements, thereby improving employee satisfaction and boosting productivity. By delivering data-driven insights, Inspace provides leaders with essential tools to enhance space efficiency and foster a harmonious work environment. Businesses, both large and small, utilize this platform to enrich their hybrid work experience while gathering valuable data regarding office usage patterns. This solution bridges the gap between individuals, technology, and the workspace, ensuring seamless connectivity regardless of location. You can choose from a wide array of pre-built integrations or utilize our custom API to create the ideal solution tailored to your specific requirements. Additionally, with Inspace's flexible integration options, you can transform your workplace into a more efficient and collaborative space. Dive into various categories of productivity-enhancing integrations that will not only streamline workflows but also elevate the overall workplace experience for everyone involved. -
12
SMSEagle
Proximus Sp. z o.o.
€989SMSEagle, a hardware SMS gateway, allows SMS messages to be sent to a telecommunication carrier directly without using 3rd-party services or the Internet. This is done by using a SIM Card, built-in modules with an external antenna to communicate with a telecommunications operator directly (works like mobile phones). Hardware SMS gateways, also called SMS servers, integrate hardware and software to manage communication. The device provides various methods of integration with external systems such as API, Email to SMS, etc. -
13
NIM
Tools4ever
$1.55/month/ user NIM simplifies the provisioning of users and lifecycle management. It offers both power and simplicity. It manages large numbers of users and systems for educational and commercial institutions. NIM aggregates information from multiple sources to streamline provisioning, rostering and exports. The Role Mining Tool simplifies role modeling while real-time impacts analysis helps in audits. Its customizable apps, automated processes and improved accuracy and efficiency are all a result of its customizable apps and automated process. NIM's flexible interface simplifies complex tasks and ensures organizations achieve high productivity. -
14
Armis
Armis Security
Armis, the leading asset visibility and security company, provides a unified asset intelligence platform designed to address the new extended attack surface that connected assets create. Fortune 100 companies trust our real-time and continuous protection to see with full context all managed, unmanaged assets across IT, cloud, IoT devices, IoMT, OT, ICS, and 5G. Armis provides passive cyber asset management, risk management, and automated enforcement. Armis is a privately held company and headquartered in California. -
15
WatchTower Security Management App
Check Point
Stay vigilant with Check Point's WatchTower Security Management app, allowing you to address security threats swiftly from your mobile device. This user-friendly application offers real-time insights into network activities, providing alerts when vulnerabilities arise, and facilitating immediate action to block potential threats while managing security policies across several gateways. You can monitor all devices connected to your network and identify any emerging risks, receiving timely notifications about malicious activities or unauthorized access. Rapidly responding to malware incidents is made easier as you can isolate infected devices and gather detailed information for in-depth analysis. Tailor your alerts to focus on the most critical security events that matter to you. Additionally, you can categorize all security incidents and delve deeper for further insights. Safeguard your network by configuring advanced security settings for multiple gateways through a secure web user interface, ensuring comprehensive protection. This proactive approach to network management empowers users to maintain a secure environment efficiently. -
16
Multi-Domain Security Management
Check Point
Multi-Domain Security Management enhances security and oversight by dividing security management into various virtual domains. Organizations, regardless of their size, can effortlessly establish virtual domains tailored to geographic locations, business units, or specific security functions, thereby bolstering security and streamlining management processes. This approach facilitates detailed and distinct role-based administration within a multi-tenant security management framework. A unified security management setup governs VPNs, firewalls, intrusion prevention systems, and other protective measures. Administrators can create, monitor, and regulate all network security management domains through a single interface. Additionally, it allows for the centralized management of numerous administrators within the multi-domain security management framework. Administrators can be granted permissions to oversee particular domains or various facets of the multi-domain system, enabling multiple administrators to collaborate across different security management domains simultaneously. This collaborative environment ensures that security measures are effectively maintained and adapted to the evolving needs of the organization. -
17
Switch Automation
Switch Automation
Switch Automation is a global real estate software company that helps property owners and facility managers reduce operating costs, improve energy efficiency and deliver exceptional occupant satisfaction. Our comprehensive smart building platform integrates with traditional building systems as well as Internet of Things (IoT) technologies to analyze, automate and control assets in real-time. We serve enterprise customers and partners in a variety of industries including financial services, retail, grocery, commercial real estate and more. -
18
Medigate
Medigate
Medigate is a leading company focused on enhancing security and clinical analytics within the healthcare sector, offering the premier IoT device security solution tailored specifically for medical environments. The company has dedicated resources to develop the largest database of medical devices and protocols, ensuring you have access to comprehensive device inventories and precise threat detection capabilities. Medigate boasts the industry's only specialized medical device security platform, which effectively identifies and safeguards all Internet of Medical Things (IoMT) devices linked to a healthcare provider's network. Unlike generic IoT security solutions, our platform is uniquely tailored to meet the specific requirements of medical devices and clinical networks, ensuring optimal protection. Our solution fortifies clinical networks by delivering thorough visibility into connected medical devices, allowing for risk assessment based on clinical context and anomaly detection according to manufacturers’ guidelines. Furthermore, it actively prevents malicious activities by seamlessly integrating with your existing firewalls or Network Access Control systems. In this way, Medigate not only protects healthcare environments but also enhances the overall safety and efficiency of patient care. -
19
Nozomi Networks
Nozomi Networks
Nozomi Networks Guardian™ provides comprehensive visibility, security, and monitoring capabilities for various assets, including OT, IoT, IT, edge, and cloud environments. The Guardian sensors transmit data to Vantage, allowing for unified security management that can be accessed from any location through the cloud. Additionally, they can relay information to the Central Management Console for detailed data analysis, whether at the edge or within the public cloud. Leading companies across multiple sectors, such as energy, manufacturing, transportation, and building automation, trust Guardian to safeguard their essential infrastructure and operations worldwide. On the other hand, Nozomi Networks Vantage™ harnesses the advantages of software as a service (SaaS) to provide unparalleled security and visibility throughout your OT, IoT, and IT networks. Vantage plays a crucial role in accelerating digital transformation, particularly for extensive and intricate distributed networks. You can secure an unlimited number of OT, IoT, IT, edge, and cloud assets from any location. Its scalable SaaS platform allows you to streamline all aspects of your security management into a single, cohesive application, enhancing overall operational efficiency. The integration of Guardian and Vantage creates a powerful synergy that optimizes security across diverse environments. -
20
FortiManager
Fortinet
The swift rise of digital transformation (DX) technologies has increased the complexity and susceptibility of networks and their security measures. Although malicious cyberattacks continue to pose a significant threat, a recent study by Ponemon indicates that over half of the security breaches reported last year originated from harmless sources that could have been avoided. Implementing a security strategy that emphasizes automation-driven network operations can serve as an effective solution. Integrated within the Fortinet Security Fabric, FortiManager facilitates centralized management for network operations, ensuring compliance with best practices and enhancing workflow automation to bolster defense against breaches. You can manage all your Fortinet devices through a unified console management system. With FortiManager, you gain comprehensive visibility into your network, which allows for efficient provisioning and access to cutting-edge automation tools. This platform not only offers insights into network traffic and potential threats through a centralized dashboard but also delivers enterprise-grade features and advanced security management capabilities. Consequently, leveraging FortiManager can significantly enhance your organization’s overall security posture while streamlining operational processes. -
21
Fidentity
Fidentity
A comprehensive solution designed to protect your staff, workplace, and guests is now available. The facial recognition feature offers organizations a reliable method to confirm the identities of individuals entering the premises during check-in. Additionally, it enables visitors to check into a Visitor Management System (VMS) without needing to touch a kiosk, enhancing convenience and safety. The integration of thermal temperature screening allows businesses to monitor the temperatures of both employees and visitors upon entry, adding an important security measure. With touchless check-in, individuals can safely and securely complete their check-in process without the risk of exposure to infectious diseases. Furthermore, mobile check-in empowers users to utilize their own devices to perform a touchless check-in by simply scanning a QR code. This innovative approach not only streamlines the process but also reinforces security, as it allows companies to quickly notify employees of emergencies and provide them with an effective exit strategy to reach a safe location. By implementing these technologies, organizations can create a safer environment for everyone involved. -
22
MetricFire
MetricFire
Designed by engineers specifically for engineers, our Prometheus monitoring solution is incredibly simple to set up, configure, and start transmitting metrics. We manage the scaling of your Prometheus infrastructure, so you can concentrate on your work without any concerns. With our service, your data is stored long-term with triple redundancy, allowing you to leverage insights without the burden of database management. You’ll receive automatic updates and plugins, ensuring your Prometheus and Grafana stack remains current without any additional effort on your part. Everything necessary for effective management of your Prometheus metrics is at your disposal. We prioritize your autonomy, steering clear of vendor lock-in, and you can obtain a complete data export whenever you need it. This approach combines the advantages of an open-source solution with the reliability and security of a SaaS platform. We ensure your data is securely backed up with threefold redundancy and stored safely for a full year. Scale effortlessly, as we take care of all the complexities for you, and rest assured that Prometheus specialists are ready to assist you around the clock. In this way, you can consistently rely on expert support whenever you need it. -
23
Pica8 AmpCon
Pica8
Enterprise campus networks, remote sites, and data center infrastructures are transitioning from numerous Cisco Catalyst switches to PicOS Software Switches, utilizing hardware from Dell and Edgecore. Pica8’s AmpCon™ Network Controller streamlines and automates switch deployments via a unified graphical user interface, serving as an alternative to Cisco DNA Center. This transition not only enhances operational freedom but also reduces costs, a benefit that resonates with every executive at the C-level. As a sophisticated network controller, AmpCon oversees the lifecycle of countless open network switches within enterprise campuses and branch or retail office access networks. The platform consists of a suite of server-based tools that empower organizations to remotely install, configure, and provision hundreds or even thousands of PicOS Software Switches on white box hardware. Furthermore, AmpCon stands out as the first solution to integrate both advanced proprietary and open technologies, granting network operators unprecedented visibility and control over their networking software. This innovative approach ensures enterprises can adapt to changing technological needs more efficiently than ever before. -
24
Blink
Blink Ops
Blink serves as a powerful ROI enhancer for security teams and business executives aiming to efficiently secure an extensive range of scenarios. It provides comprehensive visibility and coverage of alerts throughout your organization and security infrastructure. By leveraging automated processes, it minimizes noise and decreases the incidence of false alarms in alerts. Additionally, it scans for attacks while proactively detecting insider threats and vulnerabilities. Users can establish automated workflows that incorporate pertinent context, simplify communication, and shorten mean time to resolution (MTTR). Alerts can be acted upon to bolster your cloud security posture through no-code automation and generative AI. The platform also facilitates shift-left access requests, streamlines approval processes, and allows developers to work without hindrance, all while ensuring application security. Furthermore, it enables ongoing monitoring of applications for compliance with SOC2, ISO, GDPR, and other standards, helping to enforce necessary controls. This comprehensive approach not only improves security but also enhances operational efficiency across the board. -
25
Azure Marketplace
Microsoft
The Azure Marketplace serves as an extensive digital storefront, granting users access to a vast array of certified, ready-to-use software applications, services, and solutions provided by both Microsoft and various third-party vendors. This platform allows businesses to easily explore, purchase, and implement software solutions directly within the Azure cloud ecosystem. It features a diverse selection of products, encompassing virtual machine images, AI and machine learning models, developer tools, security features, and applications tailored for specific industries. With various pricing structures, including pay-as-you-go, free trials, and subscriptions, Azure Marketplace makes the procurement process more straightforward and consolidates billing into a single Azure invoice. Furthermore, its seamless integration with Azure services empowers organizations to bolster their cloud infrastructure, streamline operational workflows, and accelerate their digital transformation goals effectively. As a result, businesses can leverage cutting-edge technology solutions to stay competitive in an ever-evolving market. -
26
Claroty
Claroty
Our platform, driven by Continuous Threat Detection (CTD) and Secure Remote Access (SRA) solutions, offers a comprehensive suite of industrial cybersecurity controls that integrate flawlessly with your current infrastructure, scale easily, and boast the lowest total cost of ownership (TCO) in the industry. These robust cybersecurity controls are built around the REVEAL, PROTECT, DETECT, CONNECT framework, ensuring you have the necessary tools to enhance your industrial cybersecurity, no matter your current stage in the journey. The Claroty Platform is utilized across various industries, each presenting its own specific operational and security challenges. Effective industrial cybersecurity begins with a clear understanding of what needs protection, and our platform eliminates the obstacles that hinder industrial networks from securely connecting to essential business operations, allowing for innovation while maintaining an acceptable risk threshold. By prioritizing security without sacrificing operational efficiency, our solution enables businesses to thrive in an increasingly complex digital landscape. -
27
Cynerio
Cynerio
We cover all threats with automated security and risk reduction on every Healthcare IoT device, from medical/IoMT devices to Enterprise IoT systems and OT systems. This ensures patient safety, data confidentiality and operational continuity. Cynerio promotes proactive and preventive cybersecurity through automated risk reduction, threat mitigation and attack prevention tools. We also offer step-by-step remediation programs based on a zero trust framework that incorporates clinical context to make hospitals secure fast. Hospital networks are extremely vulnerable to IoT devices from Healthcare. Insecure devices increase cyber attack surface and pose a major threat to patient safety as well as the operational continuity of hospitals.
- Previous
- You're on page 1
- Next