List of Cisco Secure Email Threat Defense Integrations

This is a list of platforms and tools that integrate with Cisco Secure Email Threat Defense. This list is updated as of May 2026.

  • 1
    Leader badge
    Microsoft 365 Reviews & Ratings

    Microsoft 365

    Microsoft

    Unleash productivity with intelligent tools and seamless collaboration.
    Microsoft 365 is a powerful cloud-based productivity platform designed to help individuals and organizations work smarter and more efficiently. It combines widely used applications such as Word, Excel, PowerPoint, Outlook, and Teams into a single integrated ecosystem. With Microsoft 365 Copilot, AI functionality is embedded directly into these tools, providing intelligent assistance for a wide range of tasks. Users can create documents, analyze data, and build presentations faster with AI-generated suggestions and automation features. The platform supports seamless collaboration by enabling real-time editing, file sharing, and communication across teams. OneDrive cloud storage ensures that files are securely stored and accessible from anywhere, whether on desktop, web, or mobile devices. Copilot enhances productivity by helping users summarize information, generate ideas, and organize workflows efficiently. It also allows users to incorporate their own files into prompts, ensuring outputs are tailored to their specific needs. Microsoft 365 is designed with flexibility in mind, supporting a variety of work styles and environments. The platform emphasizes user control over AI, allowing individuals to decide how and when to use intelligent features. It also simplifies complex tasks such as data analysis, presentation creation, and email management. By integrating productivity tools with advanced AI capabilities, Microsoft 365 improves efficiency and reduces manual effort. Overall, it enables users to collaborate more effectively, make better decisions, and achieve more in less time.
  • 2
    Altair Knowledge Hub Reviews & Ratings

    Altair Knowledge Hub

    Altair

    Empower your team with seamless, collaborative data management solutions.
    Self-service analytics platforms were created to empower users by improving their flexibility and reliance on data. However, this increased flexibility often led to disjointed workflows and a lack of oversight, creating a somewhat disorderly environment for data management. Knowledge Hub addresses these issues by providing a solution tailored for business users while ensuring streamlined governance for IT teams. With its user-friendly browser interface, it automates the process of data transformation, distinguishing itself as the only collaborative data preparation tool currently available. This platform enables business teams to work effectively alongside data engineers and scientists, allowing them to create, validate, and share reliable datasets and analytical models in a customized manner. Importantly, it eliminates the need for coding skills, empowering a broader range of users to engage in data sharing and make informed decisions. Governance, data lineage, and collaborative tasks are efficiently handled through a cloud-ready infrastructure designed to stimulate innovation. Furthermore, its low- to no-code extensibility empowers various stakeholders across the organization to effortlessly transform data, thereby fostering a culture centered on data-driven decision-making. In this manner, Knowledge Hub not only boosts productivity but also cultivates a cohesive strategy for data use across different departments, ultimately leading to better organizational outcomes. Such a comprehensive approach not only optimizes processes but also enhances collaboration among diverse teams.
  • 3
    Splunk User Behavior Analytics Reviews & Ratings

    Splunk User Behavior Analytics

    Cisco

    Empowering security with advanced behavior analytics and automation.
    Safeguarding against hidden threats through user and entity behavior analytics is crucial for modern security practices. This methodology reveals deviations and covert risks that traditional security systems frequently miss. By streamlining the synthesis of various anomalies into a unified threat, security professionals can enhance their operational efficiency. Utilize sophisticated investigative tools and strong behavioral baselines that are relevant to any entity, anomaly, or potential threat. Implement machine learning to automate the identification of threats, which allows for a more concentrated approach to threat hunting with precise, behavior-driven alerts that support swift assessment and action. Anomalous entities can be swiftly identified without requiring human involvement, resulting in a more efficient process. With a comprehensive selection of over 65 types of anomalies and more than 25 classifications of threats encompassing users, accounts, devices, and applications, organizations significantly improve their capacity to detect and mitigate risks. This synergy of human expertise and machine-driven insights enables companies to substantially bolster their security frameworks. Ultimately, the adoption of these sophisticated capabilities fosters a more robust and anticipatory defense strategy against constantly evolving threats, ensuring a safer operational environment.
  • 4
    Trellix Detection as a Service Reviews & Ratings

    Trellix Detection as a Service

    Trellix

    Proactively safeguard your workflows with advanced threat detection.
    Recognize possible threats during every phase of your operational workflows. Scrutinize your cloud framework and the business logic relating to the data stored in your cloud applications. Maintain the integrity of your documents and content by leveraging the latest threat intelligence, complemented by advanced machine learning, artificial intelligence, and correlation engines. Effortlessly connect with your trusted cloud services, online applications, and collaboration tools. Perform scans on files, hashes, and URLs for potential malware in a live virtual setting while ensuring the protection of your internal resources. Integrate Detection as a Service into your Security Operations Center routines, Security Information and Event Management analytics, data storage systems, and applications, among other areas. Evaluate the potential for secondary or cumulative impacts during various stages of the cyber-attack lifecycle to reveal hidden exploits and malware threats. Take advantage of our intuitive Chrome extension to submit MD5 hashes or local files, which can be seamlessly integrated into your current toolsets or workflows to further bolster your security measures. This integration not only optimizes your threat detection capabilities but also significantly enhances your team's ability to tackle new security challenges as they arise, fostering a proactive approach to cybersecurity.
  • 5
    Swimlane Reviews & Ratings

    Swimlane

    Swimlane

    Agentic AI automation for every security function
    At Swimlane, we believe the convergence of agentic AI and automation can solve the most challenging security, compliance, and IT/OT operations problems. Only Swimlane, the first and only AI hyperautomation platform for every security function, gives enterprises and MSSPs the scale and flexibility needed to integrate and automate across their entire security ecosystem. Swimlane’s roots in integrations and automation give us an edge when it comes to building an Agentic AI architecture for the future.
  • Previous
  • You're on page 1
  • Next