What Integrates with Cisco Catalyst Center?

Find out what Cisco Catalyst Center integrations exist in 2025. Learn what software and services currently integrate with Cisco Catalyst Center, and sort them by reviews, cost, features, and more. Below is a list of products that Cisco Catalyst Center currently integrates with:

  • 1
    Squadcast Reviews
    Squadcast is a tool for incident management that was specifically designed for SRE. Squadcast Actions can help you create a culture of blamelessness by reducing the need to have physical war rooms.
  • 2
    NorthStar Navigator Reviews

    NorthStar Navigator

    NorthStar.io, Inc.

    $8 per device
    NorthStar allows organizations to easily incorporate threat intelligence and business context to enable a risk-based approach to their vulnerability management program. The Platform automates the collection, normalization, consolidation and correlation of threat intelligence, asset, software, and vulnerability data. Combined with a transparent scoring model, NorthStar automates the tedious and manual process of prioritizing vulnerability remediation.
  • 3
    Axonius Reviews
    Axonius gives IT and security teams the confidence to control complexity by providing a system of record for all digital infrastructure. With a comprehensive understanding of all assets including devices, identities, software, SaaS applications, vulnerabilities, security controls, and the context between them, customers are able to mitigate threats, navigate risk, decrease incident response time, automate action, and inform business-level strategy — all while eliminating manual, repetitive tasks.
  • 4
    Altair Knowledge Hub Reviews
    Self-service analytics tools were designed to empower end-users by enhancing their agility and fostering a data-driven culture. Unfortunately, this boost in agility often resulted in fragmented and isolated workflows due to a lack of data governance, leading to chaotic data management practices. Knowledge Hub offers a solution that effectively tackles these challenges, benefiting business users while simultaneously streamlining and fortifying IT governance. Featuring an easy-to-use browser-based interface, it automates the tasks involved in data transformation, making it the only collaborative data preparation tool available in today's market. This enables business teams to collaborate effortlessly with data engineers and scientists, providing a tailored experience for creating, validating, and sharing datasets and analytical models that are both governed and reliable. With no coding necessary, a wider audience can contribute to collaborative efforts, ultimately leading to better-informed decision-making. Governance, data lineage, and collaboration are seamlessly managed within a cloud-compatible solution specifically designed to foster innovation. Additionally, the platform's extensibility and low- to no-code capabilities empower individuals from various departments to efficiently transform data, encouraging a culture of shared insights and collaboration throughout the organization.
  • 5
    Splunk User Behavior Analytics Reviews
    Protecting against unseen dangers through user and entity behavior analytics is essential. This approach uncovers irregularities and hidden threats that conventional security measures often overlook. By automating the integration of numerous anomalies into a cohesive threat, security analysts can work more efficiently. Leverage advanced investigative features and robust behavioral baselines applicable to any entity, anomaly, or threat. Employ machine learning to automate threat detection, allowing for a more focused approach to hunting with high-fidelity, behavior-based alerts that facilitate prompt review and resolution. Quickly pinpoint anomalous entities without the need for human intervention. With a diverse array of over 65 anomaly types and more than 25 threat classifications spanning users, accounts, devices, and applications, organizations maximize their ability to identify and address threats and anomalies. This combination of human insight and machine intelligence empowers businesses to enhance their security posture significantly. Ultimately, the integration of these advanced capabilities leads to a more resilient and proactive defense against evolving threats.
  • 6
    Quickwork Reviews

    Quickwork

    Quickwork

    $20 per month
    Quickwork is used by enterprises to create simple and complex workflows. It also allows them to create and publish APIs that are secure, and to manage conversational interactions between employees, customers, and partners. This helps to provide an excellent user experience. Quickwork is an all-in one platform that provides the tools and services needed to build powerful and scalable integrations. It also offers serverless APIs and conversational experiences. Drag and drop applications to create powerful integrations. No need to write a line of code. You can choose from 1000s of apps for business, consumer, analytics, messaging and IoT. Quickwork's API Management allows you to convert any workflow into an REST API in a single click. Our serverless infrastructure allows you to scale your APIs elastically and securely. Create and manage real-time messaging and conversational workflows across multiple channels with human agents, IoT devices, and chatbots.
  • 7
    Centreon Reviews
    Centreon is a global provider for business-aware IT monitoring to ensure high performance and continuous operations. The company's AIOps-ready platform, which is holistic and ready for use in today's complex hybrid cloud infrastructures, is designed to meet the needs of these distributed clouds. Centreon monitors all aspects of the IT Infrastructure, from Cloud-to Edge for a clear and comprehensive view. Centreon eliminates blind spots by monitoring all equipment, middleware, and applications that are part modern IT workflows. This includes legacy assets on-premise, private and public clouds, and all the way to edge of the network where smart devices and customers come together to create business value. Centreon is always up-to-date and can support even the most dynamic environments. It has auto-discovery capabilities that allow it to keep track of Software Defined Network (SDN), AWS or Azure cloud assets and Wi-Fi access points, as well as any other component of today’s agile IT infrastructure.
  • 8
    Cisco Cyber Vision Reviews
    Your industrial operations are at risk from cyber threats due to the deeper integration of IT, cloud, and industrial control networks (ICS). Cisco Cyber Vision was specifically designed for OT and IT teams to collaborate to ensure production continuity and safety. Now you can deploy Industrial Internet of Things technologies and reap the benefits of industry digitization efforts. Start your OT security project with an accurate list of your industrial assets, communication patterns, and network topologies. Your SOC (security operation center) should have OT context. This will allow you to leverage the money and time you have spent on IT cybersecurity to protect your OT network. You can take OT security to the next step: Provide detailed information to comply regulations and facilitate collaboration between IT and OT experts.
  • 9
    Pica8 AmpCon Reviews
    Enterprise campus networks, remote sites, and data center infrastructures are transitioning from numerous Cisco Catalyst switches to PicOS Software Switches, utilizing hardware from Dell and Edgecore. Pica8’s AmpCon™ Network Controller streamlines and automates switch deployments via a unified graphical user interface, serving as an alternative to Cisco DNA Center. This transition not only enhances operational freedom but also reduces costs, a benefit that resonates with every executive at the C-level. As a sophisticated network controller, AmpCon oversees the lifecycle of countless open network switches within enterprise campuses and branch or retail office access networks. The platform consists of a suite of server-based tools that empower organizations to remotely install, configure, and provision hundreds or even thousands of PicOS Software Switches on white box hardware. Furthermore, AmpCon stands out as the first solution to integrate both advanced proprietary and open technologies, granting network operators unprecedented visibility and control over their networking software. This innovative approach ensures enterprises can adapt to changing technological needs more efficiently than ever before.
  • 10
    Azure Marketplace Reviews
    The Azure Marketplace serves as an extensive digital storefront, granting users access to a vast array of certified, ready-to-use software applications, services, and solutions provided by both Microsoft and various third-party vendors. This platform allows businesses to easily explore, purchase, and implement software solutions directly within the Azure cloud ecosystem. It features a diverse selection of products, encompassing virtual machine images, AI and machine learning models, developer tools, security features, and applications tailored for specific industries. With various pricing structures, including pay-as-you-go, free trials, and subscriptions, Azure Marketplace makes the procurement process more straightforward and consolidates billing into a single Azure invoice. Furthermore, its seamless integration with Azure services empowers organizations to bolster their cloud infrastructure, streamline operational workflows, and accelerate their digital transformation goals effectively. As a result, businesses can leverage cutting-edge technology solutions to stay competitive in an ever-evolving market.
  • 11
    Cisco SD-Access Reviews
    Enhance the security and flexibility of your contemporary business network. With our cutting-edge solution for automating user policies and network access, your IT operations can achieve greater efficiency, your network can become more secure, and the user experience can remain consistent across wired, wireless, and VPN connections. Cisco SD-Access, part of Cisco DNA, creates a cohesive policy-driven network framework that aligns with business objectives through security, automation, and assurance. This solution enhances the automation and assurance features of Cisco DNA Center, offering a software-defined method for network segmentation, which is essential for implementing a zero-trust architecture. Leverage AI and machine learning-driven advanced analytics to identify and categorize endpoints effectively. Examine traffic patterns between various groups and establish robust access policies. By employing group-based access policies, you can achieve efficient multilevel segmentation, ultimately facilitating a zero-trust security model. Implementing these strategies not only boosts security but also fosters a more resilient and responsive network environment overall.
  • 12
    Cynerio Reviews
    We cover all threats with automated security and risk reduction on every Healthcare IoT device, from medical/IoMT devices to Enterprise IoT systems and OT systems. This ensures patient safety, data confidentiality and operational continuity. Cynerio promotes proactive and preventive cybersecurity through automated risk reduction, threat mitigation and attack prevention tools. We also offer step-by-step remediation programs based on a zero trust framework that incorporates clinical context to make hospitals secure fast. Hospital networks are extremely vulnerable to IoT devices from Healthcare. Insecure devices increase cyber attack surface and pose a major threat to patient safety as well as the operational continuity of hospitals.
  • Previous
  • You're on page 1
  • Next