What Integrates with Workspace ONE?
Find out what Workspace ONE integrations exist in 2025. Learn what software and services currently integrate with Workspace ONE, and sort them by reviews, cost, features, and more. Below is a list of products that Workspace ONE currently integrates with:
-
1
EZO AssetSonar is a powerful IT asset management solution designed to deliver real-time visibility across your digital infrastructure. It enables organizations to effectively track and manage hardware, software, and licenses, helping reduce risk, control IT costs, and stay compliant. With features like automated software discovery, license tracking, and normalization, AssetSonar tackles common challenges such as SaaS sprawl, shadow IT, and redundant tools. The platform integrates seamlessly with popular ITSM and endpoint management tools including Jamf, Zendesk, Intune, and SCCM, streamlining workflows and enabling continuous oversight of your IT environment. By automating manual processes and centralizing asset data, AssetSonar empowers IT teams to shift focus from operational tasks to strategic planning. Enhance efficiency, gain full lifecycle visibility, and make informed IT procurement decisions with EZO AssetSonar.
-
2
Setyl
Setyl
41 RatingsGain full visibility and control over your IT assets, licenses, usage and spend with Setyl — the complete IT management platform. Setyl is a cloud-based IT asset and license management platform (ITAM), which connects to your existing tech stack with 100s of out-of-the-box integrations. Use Setyl to manage all your hardware assets, software applications, SaaS subscriptions, licenses, vendors, admins, users and spend in one place — helping you to: 1. Streamline and scale your IT operations, including employee onboarding and offboarding. 2. Identify and eliminate wasted IT spend. 3. Safeguard against compliance and audit risks, including ISO 27001, SOC 2, and more. With its intuitive interface and low learning curve, the Setyl platform offers a user-friendly experience and facilitates collaboration across your organization. Features include: • Asset and license register • Asset lifecycle management • SaaS subscription, software application and license management • Employee onboarding and offboarding workflows • ISO 27001 and SOC 2 compliance • Shadow IT detection • Vendor audits and due diligence • IT spend management and reporting • Fully guided support -
3
Kasm Technologies
$0 Free Community Edition 125 RatingsKasm Workspaces streams your workplace environment directly to your web browser…on any device and from any location. Kasm is revolutionizing the way businesses deliver digital workspaces. We use our open-source web native container streaming technology to create a modern devops delivery of Desktop as a Service, application streaming, and browser isolation. Kasm is more than a service. It is a platform that is highly configurable and has a robust API that can be customized to your needs at any scale. Workspaces can be deployed wherever the work is. It can be deployed on-premise (including Air-Gapped Networks), in the cloud (Public and Private), or in a hybrid. -
4
Access and access management today have become more complex and frustrating. strongDM redesigns access around the people who need it, making it incredibly simple and usable while ensuring total security and compliance. We call it People-First Access. End users enjoy fast, intuitive, and auditable access to the resources they need. Administrators gain precise controls, eliminating unauthorized and excessive access permissions. IT, Security, DevOps, and Compliance teams can easily answer who did what, where, and when with comprehensive audit logs. It seamlessly and securely integrates with every environment and protocol your team needs, with responsive 24/7 support.
-
5
Microsoft Entra ID
Microsoft
4 RatingsMicrosoft Entra ID, previously known as Azure Active Directory, serves as a robust cloud-based identity and access management solution that integrates essential directory services, application access control, and sophisticated identity protection measures. Enhance your organization's security with this cloud identity solution, which effectively links employees, clients, and partners to their applications, devices, and valuable data. Utilize robust authentication methods and risk-adjusted access policies to secure resource access without sacrificing user experience. Ensure a quick and straightforward sign-in process throughout your multicloud infrastructure to boost user productivity, minimize password management time, and enhance overall efficiency. Centralize the management of all identities and access to applications, whether they reside in the cloud or on-premises, to gain better visibility and control over your organization’s resources. This comprehensive approach not only protects sensitive information but also fosters a seamless and efficient working environment for all users. -
6
KACE is an endpoint management solution that offers a single point of control for managing IT systems across the entire organization. From initial deployment to ongoing maintenance, KACE is designed to fulfill all endpoint security and deployment needs—helping businesses quickly deploy, monitor, and manage their devices using a unified inventory database. KACE improves device security with on-demand hardware and software discovery, patch management, compliance reporting, and real-time monitoring of mobile endpoints. KACE is a Unified Endpoint Management solution that offers a single point of control for managing IT systems across the entire organization, inside or outside your network. This comprehensive solution takes the stress out of keeping devices secure and compliant so you can do more. Unified Endpoint Management by KACE. Where Next Meets Now.
-
7
Beyond Identity
Beyond Identity
$0/User/ Month Beyond Identity provides the strongest authentication on the planet, eliminating passwords completely for customers, employees, and developers. Unique to Beyond Identity, users never have to pick up a second device to enroll or authenticate, passwords are completely eliminated from user flows and your database, and organizations can implement risk-based access controls using granular user and device risk captured in real-time. By default, Beyond Identity authenticates with invisible MFA that only leverages unphishable factors. This allows organizations to secure access to applications and critical data by eliminating account takeover, ransomware, and all credential-based attacks all while improving the user experience -
8
Bigtincan
Bigtincan
$39.50 per user per monthBigtincan’s sales enablement platform empowers organizations to transform customer interactions into lasting relationships through four essential pillars: management of sales content, training and coaching for sales teams, automation of documents, and effective internal communication. Crafted in partnership with Apple, our platform is device-independent and features a stunning, user-friendly interface that can be customized to reflect your brand and align with your teams' workflows. The user experience is consistent across both desktop and mobile platforms, positioning Bigtincan as one of the few truly mobile-centric sales enablement solutions available today. Moreover, organizations can enhance the core capabilities of the Bigtincan Hub by opting for integrated software solutions, such as a contemporary learning management system (LMS), document automation tools, and a digital catalog application, all available as additional features. To further optimize functionality, Bigtincan supports over 100 third-party integrations, ensuring a seamless experience within your company's existing technology ecosystem. This flexibility and adaptability make Bigtincan an ideal choice for businesses seeking to enhance their sales processes and foster deeper customer connections. -
9
MyGuide
EdCast
Boost employee efficiency and streamline work processes with smart in-app guidance tools. Enable your users to complete tasks more swiftly and with greater assurance. Remove tedious and repetitive duties from their workload. By automating certain steps, you can significantly cut down the time spent on unproductive tasks, allowing users to focus on what truly matters. Engage users with interactive, high-quality content, such as in-app videos that enhance the learning experience and build confidence in task execution. Provide in-app guidance within an immersive virtual setting, allowing users to practice steps and understand the app's functionality in real-time without the fear of making errors in the actual application. Deliver precise, step-by-step instructions to users exactly when and where they need them. Foster a seamless learning experience integrated into their workflow, empowering users to work more rapidly and effectively, ultimately enhancing overall productivity. This approach not only streamlines operations but also cultivates a more competent and confident workforce. -
10
Active Directory
Microsoft
$1 per user per monthActive Directory serves as a centralized repository for information regarding various objects within a network, facilitating easy access and management for both administrators and users. It employs a structured data storage approach, which underpins a logical and hierarchical arrangement of directory information. This repository, referred to as the directory, holds details about various Active Directory entities, which commonly include shared resources like servers, volumes, printers, as well as user and computer accounts on the network. For a deeper understanding of the Active Directory data repository, one can refer to the section on Directory data store. Security measures are seamlessly integrated with Active Directory, encompassing logon authentication and the control of access to directory objects. Through a single network logon, administrators are empowered to oversee directory information and organizational structures across the entire network, while authorized users can readily access resources from any location within the network. Additionally, policy-based administration simplifies the management process, making it more efficient even for the most intricate network configurations. This framework not only enhances security but also streamlines resource management, making network operations more effective. -
11
Dusk IOP
Dusk Mobile
Dusk IOP, proudly Australian owned and operated, unites teams and data to enhance operational efficiency. By leveraging visibility, actionable insights, intelligence, and automation, it empowers your field workforce, back office, and customers to collaborate seamlessly within a unified digital environment. The platform excels in workforce scheduling, project management, and streamlined workflows, establishing a new standard for automation, compliance, safety, and transparency. With a single-view system that integrates effortlessly with your existing infrastructure, you can easily manage resources or teams using drag-and-drop dispatch and reassign tasks with just a click. It comes equipped with built-in constraints for skills, shifts, locations, and more to ensure optimal planning. Additionally, Dusk IOP facilitates the management of Agile projects, offering notifications and multiple viewing options, including Gantt, Task View, Kanban, and a dynamic risk matrix, thus enhancing project efficiency. You can also digitize your paper forms from your virtual workspace, making processes smoother and more effective. By gaining a clear understanding of actual job costs—which encompass tool time, travel time, and allowances—you can significantly boost your profitability and make informed decisions for future projects. -
12
AdminStudio
Flexera
Empower your teams with enhanced capabilities for faster and more extensive application deployment. Effortlessly automate the downloading, testing, re-packaging, and publishing of thousands of third-party installers without any manual effort involved. Quickly evaluate deployment options to leverage supported vendor installers effectively. Enhance quality by proactively identifying and addressing application issues before they reach deployment. Achieve consistency through a unified and repeatable process for building, customizing, and testing application delivery. Minimize operational risks that often arise from compatibility problems and application conflicts. Seamlessly integrate with your current package request workflows using a well-documented REST API or by utilizing our PowerShell cmdlets. Gain insights on where to concentrate your testing efforts by analyzing Java dependencies and identifying shared files among applications. Additionally, generate App Attach image files from MSIX packages to streamline the management of Windows Virtual Desktop (WVD), further simplifying the overall deployment process. With these advancements, your application deployment can become not only quicker but also more reliable and efficient. -
13
AuthPoint
WatchGuard
Our distinctive multi-factor authentication (MFA) system not only minimizes the chances of network outages and data breaches due to lost or compromised credentials, but it also provides this crucial functionality entirely from the Cloud, ensuring effortless setup and management. AuthPoint transcends conventional 2-Factor Authentication (2FA) by exploring creative methods to reliably verify users, and our extensive network of third-party integrations enables you to implement MFA for safeguarding access. In essence, WatchGuard AuthPoint presents an optimal solution at a pivotal moment, making MFA attainable for businesses that urgently require it to thwart potential attacks. The system incorporates a push notification, QR code, or one-time password (OTP) as an extra verification step to confirm your identity, while our mobile device DNA technology aligns with the authorized user's phone when granting access to various systems and applications. Consequently, any malicious actor attempting to replicate a user's device in order to infiltrate a secured system would face an insurmountable barrier. This comprehensive approach not only secures sensitive information but also enhances overall organizational security protocols. -
14
Pradeo
Pradeo
The digital transformation has created a mobile-first and cloud-first world. This has greatly increased the amount of mobile data that can be transferred between mobile devices, apps, servers, and other mobile devices. Companies digitalizing their services and frameworks has led to corporate and personal data being easily accessed by mobile devices. This exposes them to a whole new set of threats, including data theft, malware, network exploit, and device manipulation. A mobile fleet is a direct link to an organization's information system, regardless of whether it's made up of corporate devices or BYOD. The proliferation of mobile devices in all industries (government, banking and health) increases the risk of sensitive corporate data being stolen or leaked. IT security departments often refuse to manage personal devices in the corporate environment, but grant them access to corporate mobile services. This is to preserve privacy, financial security, and flexibility. -
15
Stratodesk NoTouch
Stratodesk
Stratodesk NoTouch, the #1 Thin Client OS and management software in the world, is available now. Stratodesk NoTouch is a combination of NoTouch OS, NoTouch Center and can transform any PC, Thin Client or Laptop into a centrally managed Thin Endpoint. NoTouch OS can be instantly deployed to thousands of devices, and managed from oStratodesk NoTouch. NoTouch OS is the best Thin Client OS and management solution. Stratodesk NoTouch is a combination of NoTouch OS, NoTouch Center and can be used to transform any PC, Thin Client or Laptop into a centrally managed Thin Endpoint. NoTouch OS can be instantly deployed to thousands of devices and managed from one browser. NoTouch OS is a minimal-sized OS that can be installed from your server onto your computer, laptop, thin client, or Raspberry Pi device. NoTouch Center is the best endpoint management software to manage your VDI endpoints. -
16
Adaptiva OneSite Anywhere
Adaptiva
Adaptiva OneSite Anywhere provides IT administrators with comprehensive visibility and control over all endpoints, no matter their location – be it at home, in the office, or at a café. As remote work becomes the norm, delivering content such as patches, updates, and operating systems efficiently poses significant challenges, particularly when it comes to managing production traffic, preventing bandwidth issues, and ensuring high software delivery success rates, especially via VPN. This innovative solution allows for the secure management of endpoints at remarkable speed and scale, whether they are located on-site, connected through a VPN, or accessed over the internet without any VPN connection. By integrating a cutting-edge software distribution engine with a groundbreaking cloud architecture, OneSite Anywhere effectively broadens the enterprise network's reach to encompass the entire internet, enhancing overall operational efficiency and responsiveness. This capability is essential for adapting to the evolving landscape of work environments. -
17
Softchoice
Softchoice
The VMware Enterprise Licensing Agreement (ELA) streamlines software asset management (SAM) for VMware, maximizing the value of your investments. Even highly skilled IT departments can find it challenging to procure, deploy, and oversee thousands of enterprise VMware assets, and the complexity of negotiations and renewals can further complicate matters. Lacking a thorough grasp of VMware's licensing programs, terms, and conditions can lead to overspending and falling behind in compliance. By simplifying licensing and cutting costs, a VMware ELA provides comprehensive coverage and three-year terms, allowing IT teams to focus on more strategic tasks rather than being bogged down by licensing issues. Partnering with Softchoice guarantees that you will derive optimal value from your ELA. Enhancing your software asset management approach is essential to fully leverage your VMware resources, making enterprise software agreements a more economical choice for acquiring the technology that drives your business forward. Ultimately, a well-structured SAM strategy can significantly improve operational efficiency and cost-effectiveness. -
18
Tenable One
Tenable
Tenable One offers a groundbreaking solution that consolidates security visibility, insights, and actions across the entire attack surface, empowering contemporary organizations to identify and eliminate critical cyber risks spanning IT infrastructure, cloud systems, essential infrastructure, and beyond. It stands as the only AI-driven platform for managing exposures in the market today. With Tenable's advanced vulnerability management sensors, you can gain a comprehensive view of every asset within your attack surface, including cloud systems, operational technologies, infrastructure, containers, remote employees, and modern web applications. By analyzing over 20 trillion components related to threats, vulnerabilities, misconfigurations, and asset data, Tenable’s machine-learning capabilities streamline remediation efforts by allowing you to prioritize the most significant risks first. This focused approach fosters necessary enhancements to minimize the likelihood of serious cyber incidents while providing clear and objective assessments of risk levels. In this rapidly evolving digital landscape, having such precise visibility and predictive power is essential for safeguarding organizational assets. -
19
Zimperium Mobile Threat Defense (MTD)
Zimperium
Zimperium Mobile Threat Defense (MTD) - formerly known as zIPS - is a privacy-first application that provides comprehensive mobile security for enterprises. Zimperium MTD is designed to protect an employee’s corporate-owned or BYO device from advanced persistent threats without sacrificing privacy or personal data. Once deployed on a mobile device, Zimperium MTD begins protecting the device against all primary attack vectors, even when the device is not connected to a network. Zimperium reduces risk by analyzing risky apps and jailbreaks on the device before giving access to corporate email and apps. Zimperium MTD provides comprehensive protection for mobile devices. It provides the risk intelligence and forensic data necessary for security administrators to raise their mobile security confidence. As the mobile attack surface expands and evolves, so does Zimperium’s on-device, machine learning-powered detection. Zimperium MTD detects across all four threat categories — device compromises, network attacks, phishing and content, and malicious apps. -
20
Salesfloor
Salesfloor
With our mobile clienteling solution, retail associates can engage with customers while they are in-store, seamlessly transition to online sales, and earn additional commissions. This results in a more tailored shopping experience for customers, while retailers benefit from improved online conversion rates, higher average order values, and reduced return rates. Salesfloor stands out as an award-winning platform that integrates clienteling, virtual selling, and mobile point-of-sale capabilities. Retail associates leverage Salesfloor to provide personalized and convenient interactions for customers through various channels, including live chat, video calls, emails, and SMS. Customers can reach out to a nearby store associate in real-time using these methods, as well as through appointment requests for virtual or in-person consultations. Associates can facilitate sales across multiple platforms, ensuring that each sale is properly credited to the corresponding associate or store. By empowering associates to cater to customers in a personalized manner across all channels, retailers can cultivate deeper and more meaningful customer relationships that enhance loyalty and satisfaction. This innovative approach not only boosts sales but also enriches the overall customer experience. -
21
Intercede MyID
Intercede
MyID® credential management software empowers governments and major corporations to issue and oversee digital identities through highly secure multi-factor authentication methods for citizens, extensive workforces, and supply chains. Currently, MyID facilitates robust authentication for millions, granting them access to vital data, systems, and networks. For information security professionals, MyID offers straightforward integration and oversight of digital identity issuance and management. End users, including both citizens and employees, benefit from uncomplicated and secure access to organizational systems, networks, and resources through multi-factor authentication on a range of devices. In an era marked by escalating risks of cyber terrorism, identity theft, and criminal activities, MyID® stands as a reliable solution for credential management with a strong emphasis on cybersecurity. MyID's standout features—security, dependability, and interoperability—ensure it remains a top choice in the market. With MyID, you can trust that where data security is paramount, you will find the best solutions available. -
22
Cypago
Cypago
Streamline your operations, reduce expenses, and enhance customer trust through no-code automation workflows. Boost your security Governance, Risk, and Compliance (GRC) maturity by implementing seamless and automated processes that span across different functional areas. This comprehensive approach will provide all the essential information needed to achieve and sustain compliance with various security frameworks and IT settings. Gain valuable continuous insights into your compliance status and risk management. By harnessing the power of genuine automation, you can reclaim thousands of hours previously spent on manual tasks. Ensure that security policies and procedures are actively enforced to uphold accountability. Experience a holistic audit automation solution that encompasses everything from generating and customizing audit scopes to collecting evidence across different data silos and conducting thorough gap analyses, all while producing reports that auditors can trust. Audits can be simplified and made significantly more efficient compared to traditional methods. Shift from disorder to compliance effortlessly and gain immediate clarity on the access rights and permissions of your employees and user base. Embrace this transformative journey towards a more organized and secure operational landscape. -
23
ExpenseSmart
Cass Information Systems
ExpenseSmart® serves as a comprehensive cloud-based platform designed to give you complete oversight of your telecom inventory, usage, and costs, while facilitating the quick and straightforward provisioning of both fixed and mobile telecom assets. This all-in-one solution consolidates all fixed, mobile, and IT expenditures and data into a single accessible location. Users can analyze inventory, usage, expenses, and essential information categorized by region, cost center, or even at the individual business unit level. You can adjust the level of detail displayed, ranging from an overview of global trends to specific usage metrics for individual users. Furthermore, the segmentation options are highly adaptable, tailored to fit the unique requirements of your organization. You can generate and view necessary reports—such as usage trends or instances of zero billing—whenever and however you prefer, whether directly in the ExpenseSmart® portal or scheduled for convenient access. The platform's user interface is designed to be highly intuitive and responsive across devices, ensuring a seamless experience for all users. Additionally, the platform's capabilities extend to real-time analytics, allowing for proactive decision-making based on current data. -
24
Deep Instinct
Deep Instinct
Deep Instinct is unique in applying end-to-end deeplearning to cybersecurity. Deep Instinct's approach is preemptive, unlike response-based solutions that wait for an attack to occur before reacting. Deep Instinct's preventative approach ensures customers are protected in no time. Files and vectors are automatically analyzed before execution. This is crucial in a dangerous environment where it is impossible to act quickly. Deep Instinct is designed to eradicate cyber threats from an enterprise. It detects and blocks the most evasive known as well as unknown cyberattacks with unmatched accuracy. Third-party tests are performed regularly and have the highest detection rates. The lightweight solution provides protection for endpoints, networks and servers as well as mobile devices. It can be applied to all OSs and protects against file-based and fileless attacks. -
25
Eclypsium
Eclypsium
Eclypsium®, which protects enterprise devices at the hardware and fundamental firmware layers, ensures their health and integrity. This is something that traditional security cannot protect. Eclypsium adds a layer of security to protect the vital servers, networking gear, laptops, and computers at the heart of every company. Eclypsium provides security for the hardware and firmware, as opposed to traditional security that protects only the software layers of a device. Eclypsium detects and corrects low-level vulnerabilities and threats to traditional security, from the device's initial boot process to its most fundamental code. High-fidelity views of all enterprise devices, including servers, networking gear and laptops, are available. Automatically identify vulnerabilities and threats in every hardware and firmware component of each device. You can access devices on-premises and remotely, including remote work and BYOD. -
26
Compyl
Compyl
Your Governance, Risk, and Compliance (GRC) program must align with the specific needs of your business. The Compyl platform empowers your organization to effectively scale and enhance its GRC processes in a way that best suits the operational methods of your team. This comprehensive and adaptable GRC solution aids in minimizing risk, ensuring compliance, and fostering growth within your organization. Compliance teams often find themselves overwhelmed and unable to keep pace with demands. By automating tedious and error-prone manual tasks, your team can reclaim valuable time to concentrate on high-priority responsibilities. However, focusing solely on compliance is not enough to mitigate organizational risks. It is essential to have clear insight into your risk posture to take proactive measures and illustrate risk reduction progress over time. Additionally, functional and application silos can lead to significant risk gaps and blind spots. Thus, having a singular, integrated view of risk is crucial for communicating risk impacts and facilitating improved decision-making. Centralizing all compliance and risk activities within one cohesive platform can lead to more effective management of these critical areas. Ultimately, the right approach can transform your risk management strategy and enhance overall organizational resilience. -
27
Oomnitza
Oomnitza
Oomnitza is the most flexible Enterprise Technology Management platform in the industry. It automates key business processes for IT. Our SaaS solution features agentless integrations, best practice workflows and low-code workflows. It enables enterprises to achieve operational, security, and financial efficiency quickly leveraging their existing endpoints, applications, network infrastructure, and cloud infrastructure systems. We work with some of the most innovative and well-known companies to optimize their resources, reduce cyber risk, expedite audits, and enhance digital experience. Learn more at Oomnitza.com.
- Previous
- You're on page 1
- Next