What Integrates with Zentry?

Find out what Zentry integrations exist in 2025. Learn what software and services currently integrate with Zentry, and sort them by reviews, cost, features, and more. Below is a list of products that Zentry currently integrates with:

  • 1
    Cisco Duo Reviews
    Top Pick

    Cisco Duo

    Cisco

    $3 per user per month
    1,321 Ratings
    See Software
    Learn More
    Secure your workforce with powerful, simple access security. We are Cisco Duo. Our modern access security system is designed to protect all users, devices, applications, so you can focus on what you do best. Secure access for all users and devices, in any environment, from any location. You will enjoy the peace of mind that only total device visibility and trust can provide. A SaaS solution that natively protects all applications and is easy to deploy, scaleable and quick to respond to threats. Duo's access security protects all applications from compromised credentials and devices. It also provides comprehensive coverage that helps you meet compliance requirements. Duo integrates natively with applications to provide flexible, user friendly security that is easy to implement and manage. It's a win-win-win for administrators, users, and IT staff. Multi-factor authentication, dynamic device trust and adaptive authentication are key components of your zero-trust journey. Secure SSO is also a part of the mix.
  • 2
    Okta Reviews
    Top Pick
    One platform, infinite ways for you to connect with your customers and employees. Any app can be made authable. Okta can help you create secure and delightful experiences quickly. Okta's Customer ID products can be combined to create the stack you need. This will provide security, scalability and reliability. Protect and empower your employees, contractors, partners. Okta's workforce identification solutions will protect your employees no matter where they are. You will have the tools you need to automate cloud journeys and support hybrid environments. Okta is trusted by companies around the globe to protect their workforce identities.
  • 3
    Microsoft Entra ID Reviews
    Microsoft Entra ID, previously known as Azure Active Directory, serves as a robust cloud-based identity and access management solution that integrates essential directory services, application access control, and sophisticated identity protection measures. Enhance your organization's security with this cloud identity solution, which effectively links employees, clients, and partners to their applications, devices, and valuable data. Utilize robust authentication methods and risk-adjusted access policies to secure resource access without sacrificing user experience. Ensure a quick and straightforward sign-in process throughout your multicloud infrastructure to boost user productivity, minimize password management time, and enhance overall efficiency. Centralize the management of all identities and access to applications, whether they reside in the cloud or on-premises, to gain better visibility and control over your organization’s resources. This comprehensive approach not only protects sensitive information but also fosters a seamless and efficient working environment for all users.
  • 4
    Microsoft Defender XDR Reviews
    Microsoft Defender XDR stands out as a top-tier extended detection and response platform, delivering cohesive investigation and response functionalities across a wide range of assets such as endpoints, IoT devices, hybrid identities, email systems, collaboration tools, and cloud applications. It provides organizations with centralized oversight, robust analytical capabilities, and the ability to automatically disrupt cyber threats, thus improving their ability to identify and react to potential risks. By merging various security offerings, including Microsoft Defender for Endpoint, Microsoft Defender for Office 365, Microsoft Defender for Identity, and Microsoft Defender for Cloud Apps, it allows security teams to unify signals from these services, resulting in a holistic perspective on threats and enabling synchronized response efforts. This seamless integration supports automated measures to thwart or mitigate attacks while also self-repairing impacted assets, ultimately strengthening the organization’s security framework. Additionally, the platform’s advanced features empower teams to stay ahead of evolving threats in an increasingly complex digital landscape.
  • 5
    RSA SecurID Reviews
    RSA SecurID empowers organizations, regardless of their size, to effectively manage identity risks and ensure compliance while enhancing user productivity. The solution guarantees that users receive the necessary access and verifies their identities through a user-friendly and modern experience. Moreover, RSA SecurID offers comprehensive visibility and control over the diverse identity landscapes within organizations. By integrating multi-factor authentication with identity governance and lifecycle management, RSA SecurID tackles the security obstacles tied to providing seamless access for dynamic user groups in intricate environments. It assesses risk and situational context to deliver robust identity and access assurance. With the rise of digital transformation, organizations face unparalleled challenges in authentication, access management, and identity governance. Given that an increasing number of users require access to a wider range of systems through various devices, RSA SecurID is instrumental in helping organizations navigate these complexities and secure their identities effectively. Consequently, organizations can confidently embrace technological advancements while safeguarding their digital assets.
  • 6
    Cisco ACI Reviews
    Achieve flexible resource management through the implementation of automation guided by standardized policies for data center operations. By ensuring consistent policy administration across various on-premises and cloud environments, you can enhance security, governance, and compliance. This approach guarantees business continuity, effective disaster recovery, and secure networking under a zero-trust security framework. Moreover, it transforms Day 2 operations into a proactive model that automates troubleshooting, root-cause analysis, and remediation tasks. This not only optimizes performance but also allows for single-click access to facilitate automation and centralized control. Extend your on-premises ACI networks seamlessly to remote sites, bare-metal clouds, and colocation facilities without the need for additional hardware. Cisco's Multi-Site Orchestrator plays a crucial role by offering provisioning, health monitoring, and management of Cisco ACI networking policies, among other functionalities. This comprehensive solution streamlines network connectivity, maintains uniform policy management, and simplifies operations across various multicloud settings, ultimately enhancing operational efficiency and scalability for enterprises.
  • 7
    Juniper Identity Management Service Reviews
    Ensuring the protection of corporate data ranks as one of the highest priorities in security management. Insiders who have direct access to sensitive information can easily exploit inadequate user controls. To effectively safeguard corporate resources, it is essential to implement and enforce user access policies across all platforms, including enterprise systems, mobile devices, and cloud environments. The Juniper Identity Management Service plays a vital role in enhancing enterprise security by authenticating users and regulating their access. Acting as the primary barrier against corporate breaches, it helps to protect valuable assets. Employees are clearly identified and assigned specific corporate roles, which dictate their access to various applications and data. This service works seamlessly with SRX Series next-generation firewalls, allowing security teams to align application activities and security policies with the designated user roles. Furthermore, it can produce comprehensive user metrics and audit reports, providing in-depth insights for reporting and analysis. By implementing such a system, organizations can significantly reduce security risks and enhance their overall security posture.
  • 8
    Fortinet SD-WAN Reviews
    Fortinet has established itself as the leading SD-WAN provider in terms of market share revenue growth. Its SD-WAN solution offers sophisticated routing, self-healing features, and adaptable security through either a network firewall or SASE-based cloud-delivered services, all integrated into a cohesive package. The Fortinet Secure SD-WAN (software-defined wide-area network) empowers businesses to both transform and secure their WAN edges comprehensively. By adopting a Security-driven Networking strategy that operates on a single operating system with a unified management console, organizations can enjoy an enhanced user experience, improved security effectiveness through the convergence of networking and security, and increased operational continuity and efficiency. Designed to tackle contemporary complexities and threats, Fortinet Secure SD-WAN caters to the essential business needs of its customers. Furthermore, its architecture is built to evolve, safeguarding investments as organizations embark on a digital-first path and facilitate a work-from-anywhere environment, ensuring they remain resilient in the face of changing technological landscapes.
  • 9
    Palo Alto Networks AutoFocus Reviews
    The effectiveness of tomorrow's operations hinges on exceptional threat intelligence gathered today. Enhance your investigation, prevention, and response capabilities using AutoFocus. Palo Alto Networks, recognized for its leading next-generation firewall, offers a top-tier repository of threat intelligence, derived from an extensive network of sensors, accessible to any team or tool. AutoFocus™ serves as a comprehensive resource for threat intelligence, providing your teams with immediate insights into every incident, enriched by unparalleled context from Unit 42 threat researchers. You can also integrate detailed threat intelligence directly into analysts' existing tools, greatly accelerating the processes of investigation, prevention, and response. Gain distinctive visibility into attacks with data sourced from the industry’s most expansive network, endpoint, and cloud intelligence sources. Furthermore, enrich every threat with in-depth context provided by the esteemed Unit 42 threat researchers, ensuring your organization remains one step ahead of potential threats. This holistic approach not only empowers your teams but also fortifies your security posture against evolving cyber threats.
  • Previous
  • You're on page 1
  • Next