What Integrates with BlueCat Edge?
Find out what BlueCat Edge integrations exist in 2025. Learn what software and services currently integrate with BlueCat Edge, and sort them by reviews, cost, features, and more. Below is a list of products that BlueCat Edge currently integrates with:
-
1
Entrust Certificate Hub
Entrust
1 RatingManage your certificates by automating, controlling and finding them. Certificate Hub allows you to manage all your digital certificates from one portal. Certificate Hub manages all aspects of digital certificates, from discovery and audit to issuance or orchestration. Certificate Hub makes it easy and intuitive for your entire organization to manage certificates. Certificate Hub centralizes certificate lifecycle management across multiple CAs. This makes it easy to locate and control all digital certificates within your infrastructure. Certificate Hub scans your CA databases and networks for information about certificates. Your team is kept informed and accountable with automated notifications and reports. With a browser-based interface, you can find, control, and manage all aspects of your certificates across multiple CAs. Certificate Hub is container-based and can be used for commercial cloud hosting or on-premises. -
2
Axonius
Axonius
Axonius gives IT and security teams the confidence to control complexity by providing a system of record for all digital infrastructure. With a comprehensive understanding of all assets including devices, identities, software, SaaS applications, vulnerabilities, security controls, and the context between them, customers are able to mitigate threats, navigate risk, decrease incident response time, automate action, and inform business-level strategy — all while eliminating manual, repetitive tasks. -
3
Armis
Armis Security
Armis, the leading asset visibility and security company, provides a unified asset intelligence platform designed to address the new extended attack surface that connected assets create. Fortune 100 companies trust our real-time and continuous protection to see with full context all managed, unmanaged assets across IT, cloud, IoT devices, IoMT, OT, ICS, and 5G. Armis provides passive cyber asset management, risk management, and automated enforcement. Armis is a privately held company and headquartered in California. -
4
6connect
6connect
Transformative network automation and provisioning solutions for ISPs and enterprises globally. It’s designed for effortless deployment and integration, whether utilizing the 6connect cloud or implementing ProVision within your firewall. Restore order to your operations by steering clear of the expensive challenges associated with ad hoc solutions and manual management of network resources. Benefit from comprehensive global resource management, fully automated IP address management (IPAM), and simplified administration of DNS, DNSSEC, and DHCP. With a versatile data model that effortlessly accommodates multi-tenant permissions, it also works harmoniously with RADIUS, LDAP, two-factor authentication (2FA), and SAML2. This solution integrates, synchronizes, and automates workflows across numerous DNS platforms, making migrations incredibly straightforward. DHCP configuration and scope management are simplified, and the system seamlessly interfaces with other technologies. From allocation to assignment, including Carrier-Grade NAT (CGN) to IPv6, ProVision expertly manages IP addresses. It features a robust API tailored for seamless integration across global systems, ensuring speed, thorough documentation, and thorough testing. Additionally, user-friendly peering workflows are built in, encompassing everything from email communication to BGP configuration pushes and comprehensive reporting, ensuring that all your networking needs are efficiently met. Such capabilities position ProVision as an indispensable tool in modern network management. -
5
Snow Commander
Snow
Snow Commander serves as a robust hybrid cloud management solution that harnesses automation to enhance business responsiveness, control, and operational effectiveness. This innovative tool allows IT departments to remove tedious manual approval workflows, granting end users a rapid self-service option for accessing both public and private cloud resources, which is essential for maintaining the pace of agile development teams. By streamlining hybrid cloud management, organizations can significantly boost their agility and efficiency. Snow Commander facilitates a seamless experience for end users seeking quick access to cloud resources while providing IT with crucial visibility for monitoring resource utilization. The self-service portal, complemented by automation for provisioning, ensures that development teams remain uninterrupted in their workflow. Additionally, its advanced workload engine supports change orchestration, integrating cost analysis, governance frameworks, and automation features. With its adaptable capabilities, Snow Commander not only enhances operational processes but also encourages innovation across the organization. -
6
Medigate
Medigate
Medigate is a leading company focused on enhancing security and clinical analytics within the healthcare sector, offering the premier IoT device security solution tailored specifically for medical environments. The company has dedicated resources to develop the largest database of medical devices and protocols, ensuring you have access to comprehensive device inventories and precise threat detection capabilities. Medigate boasts the industry's only specialized medical device security platform, which effectively identifies and safeguards all Internet of Medical Things (IoMT) devices linked to a healthcare provider's network. Unlike generic IoT security solutions, our platform is uniquely tailored to meet the specific requirements of medical devices and clinical networks, ensuring optimal protection. Our solution fortifies clinical networks by delivering thorough visibility into connected medical devices, allowing for risk assessment based on clinical context and anomaly detection according to manufacturers’ guidelines. Furthermore, it actively prevents malicious activities by seamlessly integrating with your existing firewalls or Network Access Control systems. In this way, Medigate not only protects healthcare environments but also enhances the overall safety and efficiency of patient care. -
7
Upsider
Upsider
Streamline your hiring process to secure top talent efficiently. Leverage advanced candidate identification and engagement tools that can cut down your sourcing timeline from several weeks to just minutes. Transform your sourcing methodology into a systematic approach with cutting-edge tools designed to identify, connect with, and convert potential hires seamlessly. Utilize our AI-powered sourcing engine to discover twice as many ideal candidates in a significantly shorter timeframe. Conduct thorough research on prospective candidates effortlessly, accessing comprehensive information about their work history, skills, social presence, and contact details. The integration of Upsider’s ATS simplifies the scoring and engagement of both incoming and previous applicants. By analyzing data from countless sources and millions of businesses, Upsider’s AI pinpoints the most suitable candidates for your needs. Enhance and elevate your recruiting results through the use of real-time analytics, allowing for informed decision-making. Additionally, Upsider's exceptional customer success team is available to support your efforts, acting as an extension of your workforce to offer supplementary resources that complement our innovative technology. Together, these features can revolutionize your recruitment strategy and improve overall hiring outcomes. -
8
Understanding what a digital risk protection solution entails can significantly enhance your readiness by revealing who is targeting you, their objectives, and their methods for potential compromise. Google Digital Risk Protection offers a comprehensive digital risk protection solution through both self-managed SaaS products and an all-encompassing service model. Each alternative equips security experts with the ability to see beyond their organization, recognize high-risk attack vectors, and detect malicious activities stemming from both the deep and dark web, as well as attack campaigns occurring on the surface web. Furthermore, the Google Digital Risk Protection solution supplies detailed insights into threat actors, including their tactics, techniques, and procedures, thereby enriching your cyber threat profile. By effectively mapping your attack surface and keeping tabs on activities in the deep and dark web, you can also gain valuable visibility into risk factors that could jeopardize the extended enterprise and supply chain. This proactive approach not only safeguards your organization but also enhances overall resilience against future threats.
-
9
Datacard Secura
Entrust
Datacard®, Secura™, identity and credential management software revolutionizes the process of issuing and managing highly-secure passports and national IDs, PIV card, and other government credentials. It streamlines the entire process from enrollment, identity verification, approval of applications, document issuance and post-issuance management. You can choose from high volume, desktop, or mobile issuance options. Allows for updates, cancellation, and other post-issuance processes. Pre-configured workflows are faster than custom development. Allows biometric and biographic capture as well as breeder document processing. Interfaces with external sources to verify identities and manage them. Includes business rules, profiles, data preparation capabilities, and other information. The risk of overruns in time and cost is greatly reduced by the absence of customization. Integration with other components of your credential ecosystem is easier when you use a standards-based architecture.
- Previous
- You're on page 1
- Next