What Integrates with C1Risk?
Find out what C1Risk integrations exist in 2025. Learn what software and services currently integrate with C1Risk, and sort them by reviews, cost, features, and more. Below is a list of products that C1Risk currently integrates with:
-
1
Jira
Atlassian
Free 24,200 RatingsJira is a project management tool that allows you to plan and track the work of your entire team. Atlassian's Jira is the #1 tool for software development teams to plan and build great products. Jira is trusted by thousands of teams. It offers a range of tools to help plan, track, and release world-class software. It also allows you to capture and organize issues, assign work, and follow team activity. It integrates with leading developer software for end-toend traceability. Jira can help you break down big ideas into manageable steps, whether they are small projects or large cross-functional programs. Organize your work, create milestones and dependencies, and more. Linking work to goals allows everyone to see how their work contributes towards company objectives, and to stay aligned with what's important. Your next step, suggested by AI. Atlassian Intelligence automatically suggests tasks to help you get your big ideas done. -
2
Salesforce provides tailored CRM solutions with Starter Suite and Pro Suite, designed to support small businesses at every stage of growth. Starter Suite delivers a simple yet powerful way to unify marketing, sales, customer service, and commerce through an intuitive platform that includes AI-powered features and a 30-day free trial. Pro Suite expands on these capabilities with advanced automation, customizable workflows, enhanced pipeline visibility, real-time chat, and integration with a broad ecosystem of apps on AppExchange. Whether you need a streamlined CRM or a more robust tool to handle complex business processes, Salesforce offers scalable options that grow with you. Both suites come with marketing campaign tools, service automation, and ecommerce capabilities, helping you find leads, close deals, and delight customers efficiently.
-
3
Slack
Salesforce
$6.67 per user per month 249 RatingsSlack is a cloud-based platform that enhances project collaboration and team communication, specifically tailored to foster smooth interaction within organizations. With a robust suite of tools and services unified in one platform, Slack allows for private channels that encourage engagement among smaller groups, direct messaging options for sending information straight to coworkers, and public channels that invite discussions among members from different organizations. Accessible on various operating systems including Mac, Windows, Android, and iOS, Slack boasts a wide array of features such as chat capabilities, file sharing, collaborative workspaces, instant notifications, two-way audio and video calls, screen sharing, document imaging, and activity tracking, among other functionalities. Additionally, its user-friendly interface and versatile integration options make it a popular choice for teams seeking to enhance their productivity and communication effectiveness. -
4
Google
Google
Free 23 RatingsOur goal is to systematically arrange the information available globally so that it can be easily accessed and utilized by everyone. When you conduct a search, you encounter thousands, if not millions, of webpages filled with valuable information. The process through which Google determines which results to display begins well before you initiate your search, driven by a dedication to deliver the best possible information for your needs. Prior to your search, Google meticulously organizes data about webpages within its Search index, which serves as a colossal repository that surpasses the collective knowledge stored in all the libraries around the globe. In mere moments, Google’s Search algorithms sift through hundreds of billions of webpages contained in our index to identify the most pertinent and useful results tailored to your query. To enhance your search experience, Google presents results in various practical formats, including maps with directions, images, videos, and narratives, and we continually innovate to introduce new methods of information presentation. This ongoing evolution underscores our commitment to improving how you access and interact with the vast wealth of information available online. -
5
One platform, infinite ways for you to connect with your customers and employees. Any app can be made authable. Okta can help you create secure and delightful experiences quickly. Okta's Customer ID products can be combined to create the stack you need. This will provide security, scalability and reliability. Protect and empower your employees, contractors, partners. Okta's workforce identification solutions will protect your employees no matter where they are. You will have the tools you need to automate cloud journeys and support hybrid environments. Okta is trusted by companies around the globe to protect their workforce identities.
-
6
Jira Service Management
Atlassian
$20 per user per month 6 RatingsJira Service Management (formerly Jira Service Desk), empowers Dev/Ops teams to work at high-velocity to respond to business changes quickly and provide great customer and employee service experiences. Tune Jira Service Management for your specific needs. Every team member, from IT to legal to HR, can set up a service desk quickly, and then adapt to scale. Provide great service experiences quickly - without the complexity and cost of traditional ITSM solutions. An open, collaborative platform allows you to track work across your enterprise. You can link issues across Jira, as well as ingest data from other software-development tools, to give your IT support and operations teams richer contextual information that allows them to quickly respond to incidents, requests, and changes. Manage risk and deliver more customer impact. You can accelerate critical development work, eliminate the need for manual labor, and deploy changes quickly with an audit trail for each change. -
7
Nessus is recognized by over 30,000 organizations globally, establishing itself as a leading security technology and the benchmark for vulnerability assessments. Since its inception, we have collaborated closely with the security community, ensuring that Nessus is continuously refined based on user feedback, making it the most precise and thorough solution available. After two decades, our commitment to community-driven enhancements and innovation remains steadfast, allowing us to deliver the most reliable and comprehensive vulnerability data, ensuring that critical vulnerabilities that could jeopardize your organization are never overlooked. As we move forward, our dedication to improving security practices continues to be our top priority, reinforcing Nessus's position as a trusted tool in the fight against cyber threats.
-
8
Azure API Apps
Microsoft
4 RatingsContinuous integration along with deployment slots allows you to link your preferred version control system to your API, enabling automatic deployment of commits, which simplifies the process of implementing code changes significantly. You can advance your API to production, conduct tests on a duplicate of your application provided by deployment slots, and seamlessly shift traffic to the updated version without experiencing any downtime. For enhanced security, your API can be secured with just a few clicks via Azure Active Directory, social media single sign-on, or OAuth, eliminating the need for code modifications while ensuring that the sign-on SDKs for your services are always current. Additionally, establish on-premises connectivity to link your API with your corporate or local network, utilizing connections that offer enterprise-level security, allowing you to serve APIs on your intranet as if they were operating locally, or to interface with existing internal network resources effectively. This comprehensive approach not only streamlines deployment but also enhances security and connectivity, making it easier for businesses to manage their API environments. -
9
ServiceNow
ServiceNow
$100 per month 1 RatingEmbrace digital workflows and watch your team flourish. By leveraging advanced solutions, your organization can enhance productivity and foster greater employee engagement. ServiceNow revolutionizes the way work is done, transforming outdated manual processes into efficient digital workflows, ensuring that both employees and customers receive prompt and seamless support. With ServiceNow, you gain access to digital workflows that not only enhance user experiences but also boost overall productivity for both staff and the organization as a whole. Our platform streamlines work complexities through a unified cloud system, known as the Now Platform: an intelligent and user-friendly solution tailored for modern work environments. You can select from our pre-designed workflows or craft custom applications tailored to your needs. Built on the Now Platform, our diverse product portfolio addresses critical IT, Employee, and Customer Workflows, providing the enterprise solutions necessary for a thorough digital transformation. Elevate the experiences you offer and unleash the productivity you seek, now enhanced with native mobile functionalities for daily tasks across your organization. This transition to digital workflows is not just beneficial; it is essential for staying competitive in today's fast-paced business landscape. -
10
Ping Identity
Ping Identity
$5 per user per monthPing Identity provides global enterprise identity security with an intelligent identity platform. It offers comprehensive capabilities such as single sign-on (SSO), multifactor authentication (MFA), directory and many more. Ping helps enterprises balance security and user experience for workforce, customer, and partner identity types with a variety of cloud deployment options including identity-as-a-service (IDaaS), containerized software, and more. Ping offers solutions for both developers and IT teams. Allow digital collaboration through simple integrations to these popular tools. These integrations allow you to support your employees wherever they may be using these popular tools. You can deploy quickly and have interoperability throughout the entire identity ecosystem. You can choose to have a single sign-on (SSO), or an adaptive, risk-based authentication authority. A PingOne package allows you to only pay for what is necessary and allows you to grow. -
11
Everbridge Mass Notification
Everbridge
Every day, a range of critical incidents occur, such as extreme weather events, workplace violence, active shooter situations, terrorism, and IT or power outages. With Everbridge Mass Notification, you can rapidly connect with and inform your entire organization in the event of an emergency, all within mere seconds. This platform supports two-way communication, enabling you to effectively mobilize your response team. It ensures the safety of your personnel while safeguarding your operations, supply chains, and brand reputation. You can communicate swiftly and reliably during crises with a system that is trusted by millions across more than 200 countries and territories. Additionally, the platform features secure collaboration that protects your data through over 325 security controls, allowing you to store information in your chosen country. You can broadcast messages to nearly any communication device or channel, whether it be audio, text, or mobile. Selecting your audience is straightforward, as you can choose individuals or groups using lists or geo-targeting. This functionality facilitates critical two-way communication, ensuring that you remain informed about the safety of your people. Ultimately, having a dependable communication strategy in place can make all the difference in effectively managing emergencies and maintaining operational continuity. -
12
Qualys Container Security
Qualys
Qualys Cloud Security offers a vulnerability analysis plug-in specifically designed for the CI/CD tool Jenkins, with plans to expand to additional platforms such as Bamboo, TeamCity, and CircleCI in the near future. Users can conveniently download these plug-ins straight from the container security module. This integration allows security teams to engage in the DevOps workflow, ensuring that vulnerable images are blocked from entering the system, while developers receive practical insights to address vulnerabilities effectively. It is possible to establish policies aimed at preventing the inclusion of vulnerable images in repositories, with settings adjustable based on factors like vulnerability severity and particular QIDs. The plug-in also provides an overview of the build, detailing vulnerabilities, information on software that can be patched, available fixed versions, and the specific image layers affected. Given that container infrastructure is inherently immutable, it is essential for containers to be consistent with the original images they are created from, thus necessitating rigorous security measures throughout the development lifecycle. By implementing these strategies, organizations can enhance their ability to maintain secure and compliant container environments. -
13
Nexpose
Rapid7
Vulnerability management tools are essential for responding effectively at the moment a threat arises. With new vulnerabilities emerging daily, it's crucial to have ongoing intelligence that enables you to identify, locate, and prioritize these risks for your organization while ensuring that your exposure is minimized. Nexpose, the on-premises solution from Rapid7, provides real-time monitoring of vulnerabilities and continuously updates its data to adapt to the latest threats, allowing for immediate action when necessary. For those seeking enhanced features like Remediation Workflow or the universal Insight Agent, InsightVM offers a robust platform for vulnerability management. How current is your information? Is it outdated by days or even weeks? With Nexpose, you can rest assured that you're working with data that is never more than a few seconds old, delivering a dynamic view of your ever-evolving network landscape. This immediacy not only enhances your response capabilities but also strengthens your overall security posture. -
14
Archer
RSA Security
With decades of expertise and numerous deployments across various areas of risk management, our platform caters to organizations at any stage of their risk management journey. Whether your team is seeking to consolidate visibility in an advanced Risk Management function or is just beginning to explore a specific risk area, our solution fosters efficiency and collaboration among all stakeholders. Archer provides a unified understanding of risk, simplifying cooperative efforts in its management. By employing consistent taxonomies, policies, and metrics for all risk data, we enhance visibility for all users, boost collaboration, and streamline processes. Delve into our all-encompassing strategy for integrated risk management by scheduling a demo of Archer. Experience the user interface firsthand and learn how our features, dashboards, and capabilities can effectively tackle your organization’s distinct risk and compliance challenges, regardless of whether you choose our on-premises solution or SaaS model. Additionally, our commitment to innovation ensures that we continuously adapt and improve our offerings to meet the evolving needs of your organization. -
15
Black Kite
Black Kite
The Black Kite RSI employs a systematic approach that includes examining, converting, and modeling data gathered from a range of open-source intelligence (OSINT) channels, such as internet-wide scanners, hacker forums, and the deep or dark web, among others. By leveraging this data alongside machine learning techniques, it uncovers correlations among control items to generate reliable approximations. This process is operationalized through a platform designed to seamlessly integrate with various tools, including questionnaires, vendor management systems, and established process workflows. Moreover, it automates compliance with cybersecurity regulations, thereby mitigating the risk of breaches through a robust defense-in-depth strategy. The platform capitalizes on Open-Source Intelligence (OSINT) and non-intrusive cyber scans to detect possible security threats without ever engaging directly with the target customer. It identifies vulnerabilities and attack patterns across 20 distinct categories and over 400 controls, positioning Black Kite as three times more thorough than its competitors in the industry, thereby ensuring a deeper level of security and risk assessment. This comprehensive approach not only enhances security measures but also fosters greater confidence in safeguarding sensitive information. -
16
Introducing the ultimate multicloud monitoring solution that offers real-time analytics for diverse environments, previously known as SignalFx. This platform enables monitoring across any environment using a highly scalable streaming architecture. It features open, adaptable data collection and delivers rapid visualizations of services in mere seconds. Designed specifically for dynamic and ephemeral cloud-native environments, it supports various scales including Kubernetes, containers, and serverless architectures. Users can promptly detect, visualize, and address issues as they emerge. It empowers real-time infrastructure performance monitoring at cloud scale through innovative predictive streaming analytics. With over 200 pre-built integrations for various cloud services and ready-to-use dashboards, it facilitates swift visualization of your entire operational stack. Additionally, the system can autodiscover, break down, group, and explore various clouds, services, and systems effortlessly. This comprehensive solution provides a clear understanding of how your infrastructure interacts across multiple services, availability zones, and Kubernetes clusters, enhancing operational efficiency and response times.
-
17
Kira
Litera
Attorneys at the premier law firms utilize Kira's advanced AI and collaborative workflows to precisely identify, extract, and analyze contractual clauses and data points, ensuring they deliver exceptional insights and thorough diligence products to their clients. Don't miss out on potential profits; embrace Total Diligence to unlock new revenue opportunities and strengthen client relationships by reducing their risk exposure. Kira efficiently highlights key provisions and organizes data for streamlined analysis, making it an invaluable tool for legal teams. Its state-of-the-art machine learning technology in contract analysis has proven beneficial for top teams around the world. By employing Kira's AI-powered contract analysis, firms can enhance client value while effectively managing risks. This system empowers corporate teams across various departments to make informed, enterprise-wide decisions and reveal vital insights that drive success. -
18
Oracle Database
Oracle
Oracle's database offerings provide clients with cost-effective and high-efficiency options, including the renowned multi-model database management system, as well as in-memory, NoSQL, and MySQL databases. The Oracle Autonomous Database, which can be accessed on-premises through Oracle Cloud@Customer or within the Oracle Cloud Infrastructure, allows users to streamline their relational database systems and lessen management burdens. By removing the intricacies associated with operating and securing Oracle Database, Oracle Autonomous Database ensures customers experience exceptional performance, scalability, and reliability. Furthermore, organizations concerned about data residency and network latency can opt for on-premises deployment of Oracle Database. Additionally, clients who rely on specific versions of Oracle databases maintain full authority over their operational versions and the timing of any updates. This flexibility empowers businesses to tailor their database environments according to their unique requirements. -
19
BitSight
BitSight
Leverage the leading security ratings platform to make informed decisions that minimize cyber risk. BitSight is recognized for its extensively utilized Security Ratings solution, aiming to transform global approaches to cyber risk management. By offering dynamic, data-driven insights into an organization's cybersecurity effectiveness, BitSight utilizes objective and verifiable data, ensuring that measurements are both substantial and validated by a reputable, independent entity. The BitSight framework for Security Performance Management empowers security and risk professionals to adopt a risk-centric and results-oriented methodology in overseeing their cybersecurity initiatives. This encompasses comprehensive assessment, ongoing monitoring, and meticulous planning and forecasting, all designed to significantly lower cyber risk exposure. With BitSight, organizations can enhance their confidence in making swift and strategic decisions regarding cyber risk management. Ultimately, this proactive stance fosters a more resilient cybersecurity posture in an ever-evolving threat landscape.
- Previous
- You're on page 1
- Next