Discern Security integrates with the security tools in our customers' environments to help them strengthen their defense against threats. Below are some of the tools currently connected with Discern Security.
Endpoint Detection and Response (EDR)
Endpoint Detection and Response (EDR)
Endpoint Detection and Response (EDR)
Endpoint Detection and Response (EDR)
Endpoint Detection and Response (EDR)
Endpoint Protection Platform (EPP)
Collaboration and Productivity Suite
Unified Endpoint Management (UEM)
Endpoint Detection and Response (EDR)
Collaboration and Productivity Suite
Cloud Security Posture Management (CSPM)
Cloud Access Security Broker (CASB)
Identity and Access Management (IAM)
Unified Endpoint Management (UEM)
Data Loss Prevention (DLP)
Email Security
Identity and Access Management (IAM)
Endpoint Detection and Response (EDR)
Email Security
Identity and Access Management (IAM)
IT Service Management (ITSM)
Configuration Management Database (CMDB)
Endpoint Detection and Response (EDR)
Zero Trust Network Access (ZTNA)
Cloud Access Security Broker (CASB)
Zero Trust Network Access (ZTNA)
Patch Management
Secure Web Gateway (SWG)
Unified Endpoint Management (UEM)
Unified Endpoint Management (UEM)
Security Orchestration Automation and Response (SOAR)
Security Information and Event Management (SIEM)
Endpoint Privilege Management (EPM)
Identity and Access Management (IAM)
Security Orchestration Automation and Response (SOAR)
Security Information and Event Management (SIEM)
Security Orchestration Automation and Response (SOAR)
Security Information and Event Management (SIEM)
Configuration Management Database (CMDB)
Security Information and Event Management (SIEM)
Vulnerability Management
Vulnerability Management
Vulnerability Management
Web Application Firewall (WAF)
IT Service Management (ITSM)
Data Loss Prevention (DLP)
Endpoint Detection and Response (EDR)
Phishing Simulation
Security Awareness Training
Security Information and Event Management (SIEM)
Endpoint Protection Platform (EPP)
Email Security
Security Information and Event Management (SIEM)
Email Security
Identity and Access Management (IAM), Identity Governance and Administration
IT Service Management (ITSM)
IT Service Management (ITSM)
Security Information and Event Management (SIEM)
MetaCompliance
Cloud Security Posture Management (CSPM)
Cyber Risk Management
Endpoint Detection and Response (EDR)
Privileged Access Management (PAM)
Cyber Asset Attack Surface Management (CAASM)
IT Service Management (ITSM)
Cloud Security and Asset Management
IT Service Management (ITSM), Configuration Management Database
Configuration Management Database (CMDB)
Team Collaboration Platform
Cloud Security
Managed Detection and Response (MDR)
Email Security
Endpoint Application Allowlisting
Unified Endpoint Management (UEM)
Endpoint Detection and Response (EDR)