List of Cisco Catalyst Center Integrations
This is a list of platforms and tools that integrate with Cisco Catalyst Center. This list is updated as of April 2025.
-
1
Squadcast
Squadcast
Streamline incident response, enhance collaboration, foster a blameless culture.Squadcast serves as an incident management solution tailored for Site Reliability Engineers (SREs). Its features, such as Squadcast Actions, promote a blameless culture by lessening the reliance on traditional physical war rooms during incident response. This not only streamlines communication but also fosters collaboration among teams, ultimately enhancing the overall efficiency of incident resolution. -
2
NorthStar Navigator
NorthStar.io, Inc.
Empower your organization with seamless threat intelligence integration.NorthStar empowers organizations to seamlessly integrate threat intelligence and business insights, facilitating a risk-oriented strategy for their vulnerability management initiatives. The platform streamlines the gathering, standardization, unification, and analysis of data related to threats, assets, software, and vulnerabilities. By utilizing a clear scoring system, NorthStar eliminates the cumbersome and manual task of determining the priority for addressing vulnerabilities, thus enhancing overall efficiency. This innovative approach not only saves time but also ensures that resources are allocated effectively to mitigate risks. -
3
Axonius
Axonius
Streamline your digital infrastructure management with enhanced security.Axonius empowers IT and security teams to effectively manage complexity by serving as a definitive repository for their entire digital infrastructure. By offering a detailed insight into all assets, such as devices, identities, software, SaaS applications, vulnerabilities, and security measures, clients can proactively address threats, assess risks, reduce response times to incidents, automate processes, and guide strategic business decisions, all while minimizing the burden of repetitive manual work. This capability not only streamlines operations but also enhances overall security posture. -
4
Altair Knowledge Hub
Altair
Empower your team with seamless, collaborative data management solutions.Self-service analytics platforms were created to empower users by improving their flexibility and reliance on data. However, this increased flexibility often led to disjointed workflows and a lack of oversight, creating a somewhat disorderly environment for data management. Knowledge Hub addresses these issues by providing a solution tailored for business users while ensuring streamlined governance for IT teams. With its user-friendly browser interface, it automates the process of data transformation, distinguishing itself as the only collaborative data preparation tool currently available. This platform enables business teams to work effectively alongside data engineers and scientists, allowing them to create, validate, and share reliable datasets and analytical models in a customized manner. Importantly, it eliminates the need for coding skills, empowering a broader range of users to engage in data sharing and make informed decisions. Governance, data lineage, and collaborative tasks are efficiently handled through a cloud-ready infrastructure designed to stimulate innovation. Furthermore, its low- to no-code extensibility empowers various stakeholders across the organization to effortlessly transform data, thereby fostering a culture centered on data-driven decision-making. In this manner, Knowledge Hub not only boosts productivity but also cultivates a cohesive strategy for data use across different departments, ultimately leading to better organizational outcomes. Such a comprehensive approach not only optimizes processes but also enhances collaboration among diverse teams. -
5
Splunk User Behavior Analytics
Splunk
Empowering security with advanced behavior analytics and automation.Safeguarding against hidden threats through user and entity behavior analytics is crucial for modern security practices. This methodology reveals deviations and covert risks that traditional security systems frequently miss. By streamlining the synthesis of various anomalies into a unified threat, security professionals can enhance their operational efficiency. Utilize sophisticated investigative tools and strong behavioral baselines that are relevant to any entity, anomaly, or potential threat. Implement machine learning to automate the identification of threats, which allows for a more concentrated approach to threat hunting with precise, behavior-driven alerts that support swift assessment and action. Anomalous entities can be swiftly identified without requiring human involvement, resulting in a more efficient process. With a comprehensive selection of over 65 types of anomalies and more than 25 classifications of threats encompassing users, accounts, devices, and applications, organizations significantly improve their capacity to detect and mitigate risks. This synergy of human expertise and machine-driven insights enables companies to substantially bolster their security frameworks. Ultimately, the adoption of these sophisticated capabilities fosters a more robust and anticipatory defense strategy against constantly evolving threats, ensuring a safer operational environment. -
6
Quickwork
Quickwork
Seamlessly integrate workflows, APIs, and conversations effortlessly.Quickwork serves as a versatile platform for businesses to design both straightforward and intricate workflows with ease. It enables organizations to develop and publish secure APIs while facilitating seamless conversational exchanges among employees, customers, and partners, thereby enhancing the overall user experience. As a comprehensive solution, Quickwork equips users with the necessary tools and services to construct robust and scalable integrations. The platform includes features like serverless APIs and interactive conversational experiences. Users can simply drag and drop applications to forge impactful integrations, eliminating the need for any coding expertise. With access to thousands of applications spanning business, consumer needs, analytics, messaging, and IoT, Quickwork empowers extensive customization. Its API Management feature allows for the effortless conversion of any workflow into a REST API with just one click. Furthermore, the serverless infrastructure ensures that your APIs can be scaled both elastically and securely. Additionally, Quickwork facilitates the creation and management of real-time messaging and conversational workflows that engage multiple channels, integrating human agents, IoT devices, and chatbots to provide comprehensive solutions. This holistic approach not only simplifies operations but also fosters enhanced connectivity and efficiency across various business functions. -
7
Centreon
Centreon
Comprehensive IT monitoring for seamless, optimized business operations.Centreon stands as a worldwide leader in IT monitoring that emphasizes business awareness to ensure optimal performance and uninterrupted operations. The company's AIOps-ready platform is comprehensive and tailored to function effectively within the intricacies of modern hybrid cloud environments, adeptly addressing the challenges posed by distributed clouds. By monitoring every facet of IT infrastructure, from cloud services to edge devices, Centreon provides a detailed and all-encompassing perspective. It eradicates blind spots by overseeing all hardware, middleware, and applications integral to contemporary IT workflows. This monitoring encompasses legacy systems on-premises, as well as assets in private and public clouds, extending all the way to the network's edge where smart devices and customer interactions converge to generate business value. Always keeping pace with the latest developments, Centreon is adept at managing even the most fluid operational settings. Its auto-discovery features enable seamless tracking of Software Defined Networks (SDN), AWS or Azure cloud resources, Wi-Fi access points, and all other components vital to today’s flexible IT infrastructure. Through continuous innovation and a commitment to adaptability, Centreon ensures that organizations maintain a competitive edge in an ever-evolving digital landscape. -
8
Cisco Cyber Vision
Cisco
Strengthen security, enhance efficiency: Unite IT and OT.The integration of IT, cloud, and industrial control networks (ICS) has heightened the vulnerability of your industrial operations to cyber threats. To address this challenge, Cisco Cyber Vision has been specifically created to foster teamwork between OT and IT departments, ensuring the safety and continuity of production. Embracing Industrial Internet of Things technologies can help you capitalize on the advantages of digital transformation in the industry. It is essential to kick off your OT security initiative by compiling a precise inventory of your industrial assets, communication flows, and network architectures. Enhancing your Security Operations Center (SOC) with OT context will enable you to utilize the investments made in IT cybersecurity to safeguard your OT infrastructure. You can elevate your OT security strategy by providing comprehensive compliance information that encourages collaboration between IT and OT specialists, ultimately strengthening the overall security framework. This integration between teams not only improves security but also enhances operational efficiency across your organization. -
9
Pica8 AmpCon
Pica8
Transform your network management with seamless, cost-effective agility.Enterprise networks, including campus setups, remote locations, and data center infrastructures, are moving away from multiple Cisco Catalyst switches in favor of PicOS Software Switches, leveraging hardware from Dell and Edgecore. The Pica8’s AmpCon™ Network Controller facilitates and automates switch deployments through a cohesive graphical user interface, offering a compelling alternative to Cisco DNA Center. This shift not only provides greater operational flexibility but also results in significant cost savings, a factor that appeals to executives at the C-suite level. As a versatile network management tool, AmpCon manages the lifecycle of numerous open network switches across enterprise campuses and branch or retail office access networks. The platform is equipped with a comprehensive suite of server-based tools, enabling organizations to remotely install, configure, and provision hundreds or even thousands of PicOS Software Switches on white box hardware. Additionally, AmpCon distinguishes itself as the first solution to seamlessly blend both advanced proprietary technologies and open standards, affording network operators exceptional visibility and control over their networking infrastructure. This forward-thinking strategy guarantees that enterprises can respond to evolving technological demands with unmatched agility. Ultimately, the transition to AmpCon is not just a technological upgrade; it represents a strategic shift towards a more adaptable and cost-effective networking future. -
10
Cisco SD-Access
Cisco
Transform your network: secure, adaptable, and effortlessly efficient.Elevate the security and adaptability of your modern business network with our state-of-the-art solution for automating user policies and managing network access. By streamlining IT operations, this approach enhances overall efficiency, fortifies network security, and ensures a seamless user experience across wired, wireless, and VPN connections. Cisco SD-Access, integrated within Cisco DNA, formulates a unified, policy-oriented network framework that harmonizes with business goals through its focus on security, automation, and assurance. This powerful solution augments the automation and assurance capabilities of Cisco DNA Center, providing a software-defined strategy for network segmentation that is crucial for establishing a zero-trust architecture. Utilize AI and machine learning to conduct advanced analytics, effectively identifying and classifying endpoints. Additionally, analyze traffic patterns among different groups to create strong access policies. By implementing group-based access policies, you can achieve efficient multilevel segmentation, thereby enabling a robust zero-trust security model. The adoption of these methodologies not only amplifies security measures but also cultivates a more adaptable and resilient network environment, ensuring your organization is well-equipped to handle future challenges. Ultimately, a proactive stance on security will allow your network to evolve and respond dynamically to emerging threats. -
11
Cynerio
Cynerio
Empowering healthcare with proactive IoT security and resilience.We address a wide array of threats by implementing automated security measures and risk management strategies for all types of Healthcare IoT devices, ranging from medical and IoMT devices to Enterprise IoT and OT systems. This comprehensive approach guarantees the protection of patient safety, the confidentiality of data, and the uninterrupted operation of healthcare facilities. Cynerio advocates for a proactive and preventive stance on cybersecurity, utilizing automated tools that facilitate risk reduction, threat mitigation, and attack prevention. Additionally, we provide detailed remediation strategies grounded in a zero trust framework, which integrates clinical context to swiftly enhance hospital security. The vulnerability of hospital networks to Healthcare IoT devices cannot be overstated, as insecure devices significantly broaden the cyber attack surface and threaten both patient safety and the seamless functioning of healthcare operations. By addressing these concerns, we help healthcare organizations maintain a robust security posture. -
12
Azure Marketplace
Microsoft
Unlock cloud potential with diverse solutions for businesses.The Azure Marketplace operates as a vast digital platform, offering users access to a multitude of certified software applications, services, and solutions from Microsoft along with numerous third-party vendors. This marketplace enables businesses to efficiently find, obtain, and deploy software directly within the Azure cloud ecosystem. It showcases a wide range of offerings, including virtual machine images, frameworks for AI and machine learning, developer tools, security solutions, and niche applications designed for specific sectors. With a variety of pricing options such as pay-as-you-go, free trials, and subscription-based plans, the Azure Marketplace streamlines the purchasing process while allowing for consolidated billing through a unified Azure invoice. Additionally, it guarantees seamless integration with Azure services, which empowers organizations to strengthen their cloud infrastructure, improve operational efficiency, and accelerate their journeys toward digital transformation. In essence, the Azure Marketplace is crucial for enterprises aiming to stay ahead in a rapidly changing technological environment while fostering innovation and adaptability. This platform is not just a marketplace; it is a gateway to unlocking the potential of cloud capabilities for businesses worldwide.
- Previous
- You're on page 1
- Next