List of LogMeIn Central by GoTo Integrations
This is a list of platforms and tools that integrate with LogMeIn Central by GoTo. This list is updated as of April 2025.
-
1
Control D is a versatile DNS filtering and traffic redirection service that utilizes advanced Secure DNS protocols such as DNS-over-HTTPS, DNS-over-TLS, and DNS-over-QUIC, while also accommodating traditional DNS. With Control D, users can effectively eliminate harmful threats, restrict various types of undesirable content across the network—including advertisements, trackers, IoT data, adult material, social media, and more—while also redirecting traffic through transparent proxies and monitoring network activities and usage patterns at a client-specific level. Consider it your own personalized Authoritative DNS resolver for the entire Internet, providing you with detailed control over which domains are allowed to be resolved, redirected, or blocked. This capability not only enhances security but also empowers users to tailor their online experience according to their preferences.
-
2
ScalePad
ScalePad
Transform asset management with automated insights and efficiency.ScalePad, which was formerly known as Warranty Master, provides an automated approach to effectively manage hardware, software, and warranty services. By becoming one of the over 8,000 partners, you can enhance your asset lifecycle management and gain vital insights that boost both productivity and profitability. Are you looking for an easy way to obtain in-depth insights on your hardware and software assets, including potential revenue streams, comparative asset data, and a comprehensive, sortable inventory? Watch our video to learn how ScalePad can streamline the asset management process for you! You can swiftly collect essential data from your integrations and handle both software and hardware together, minimizing downtime. Our easy-to-read reports are tailored for clarity, benefiting your team and clients alike while fostering stronger relationships through transparent and valuable information. With strong connections to manufacturers like Dell, HP, and Lenovo, ScalePad ensures that you have access to real-time, accurate, and updated data to keep you prepared for strategic decision-making. This cutting-edge platform is designed to evolve with your requirements, making it an indispensable resource for any organization aiming to enhance their asset management practices. By leveraging ScalePad's capabilities, you can significantly improve your operational efficiency and drive greater success within your organization. -
3
Axonius
Axonius
Streamline your digital infrastructure management with enhanced security.Axonius empowers IT and security teams to effectively manage complexity by serving as a definitive repository for their entire digital infrastructure. By offering a detailed insight into all assets, such as devices, identities, software, SaaS applications, vulnerabilities, and security measures, clients can proactively address threats, assess risks, reduce response times to incidents, automate processes, and guide strategic business decisions, all while minimizing the burden of repetitive manual work. This capability not only streamlines operations but also enhances overall security posture. -
4
Indent
Indent
Streamlined access, enhanced security, empowering teams for success.Robust security is crucial, yet it should not become an obstacle; rapid access can drive higher profits. Implement a streamlined access system that is both fast and intuitive, preventing any hassle for your team. Users should be able to request access to applications seamlessly, while managers can promptly approve or deny these requests via Slack, all while keeping a thorough audit trail in place. Remove the burdensome task of manually managing approval processes. Each access granted represents a possible security vulnerability. Indent empowers teams to bolster security and uphold the principle of least privilege by offering temporary access to users, ensuring that efficiency remains intact. Simplify the manual procedures necessary for SOC 2, SOX, ISO, and HITRUST compliance by embedding controls and policies directly into the access request framework. Provide access only when essential, as opposed to granting permanent access, which helps reduce your licensing costs. Indent facilitates considerable savings while delivering a smooth experience for end users. As your company grows rapidly, it is vital for your team to take calculated risks that promise significant rewards. This strategy not only protects your operations but also encourages your team to make bold and effective decisions. Ultimately, fostering a culture of decisive action can lead to innovation and long-term success. -
5
DoubleClue
DoubleClue
Secure your digital identity with advanced multi-factor authentication.DoubleClue, created by HWS Group in Bavaria, acts as a comprehensive Identity and Access Management solution aimed at managing identities, permissions, and access rights. It enhances corporate networks' defenses against cyber threats targeting digital identities, often referred to as the "human factor," by utilizing sophisticated multi-factor authentication techniques. The platform also features an extensive password management system along with secure cloud storage for handling sensitive data. With a strong emphasis on identity protection, password safety, and cloud security, all backed by adaptive multi-factor authentication (MFA), DoubleClue can be implemented either on-premises or within a cloud environment. This cutting-edge solution tackles a vital aspect of business security that traditional firewalls and antivirus programs frequently neglect—the human element, which is often the weakest link in IT security. By leveraging a comprehensive all-in-one platform, organizations can secure all digital accesses, applications, passwords, and confidential information effectively. In the modern digital workspace, where employees demand greater flexibility, DoubleClue enables them to work from any location and across multiple devices without compromising their IT security. Moreover, this level of adaptability is essential as remote work continues to gain traction in various industries. Ultimately, DoubleClue not only safeguards corporate assets but also fosters a secure environment for a dynamic workforce. -
6
Intel Tiber AI Studio
Intel
Revolutionize AI development with seamless collaboration and automation.Intel® Tiber™ AI Studio is a comprehensive machine learning operating system that aims to simplify and integrate the development process for artificial intelligence. This powerful platform supports a wide variety of AI applications and includes a hybrid multi-cloud architecture that accelerates the creation of ML pipelines, as well as model training and deployment. Featuring built-in Kubernetes orchestration and a meta-scheduler, Tiber™ AI Studio offers exceptional adaptability for managing resources in both cloud and on-premises settings. Additionally, its scalable MLOps framework enables data scientists to experiment, collaborate, and automate their machine learning workflows effectively, all while ensuring optimal and economical resource usage. This cutting-edge methodology not only enhances productivity but also cultivates a synergistic environment for teams engaged in AI initiatives. With Tiber™ AI Studio, users can expect to leverage advanced tools that facilitate innovation and streamline their AI project development. -
7
Network Glue
IT Glue
Streamline network management with automated documentation and discovery.Experience a comprehensive solution that automates discovery, documentation, password management, and the creation of network diagrams. Trust us to conduct thorough site assessments. The Network Glue collector adeptly identifies all devices across your clients' networks, no matter the manufacturer. It also reveals setups within Active Directory, providing detailed information about the AD roles assigned to each workstation and server, while effortlessly importing AD users from both on-premises and hybrid systems. Say goodbye to overlooked devices and missing user data, as our system ensures that all network devices, along with user details from Azure AD and Active Directory—whether they are cloud-based, hybrid, or on-premises—are meticulously documented and updated in IT Glue. This documentation also extends to virtual network components in Hyper-V and VMware environments. Understanding that design isn't everyone's forte, Network Glue takes the reins in generating complex network diagrams for you. With unique icons that promote a swift grasp of network configurations, these diagrams are fully integrated with IT Glue, providing instant access to pertinent information upon selecting a device icon. Additionally, our solution not only streamlines operational workflows but also empowers IT teams to redirect their attention to other pressing responsibilities while ensuring that network documentation remains precise and up-to-date. This holistic approach transforms the way organizations manage their IT infrastructure, ultimately driving productivity and reliability. -
8
MyGlue
IT Glue
Streamline collaboration, enhance security, and boost productivity effortlessly.MyGlue acts as a unified platform for collaboration and intranet communication, creating a seamless route for engaging with end-users effectively. It eliminates the hazards tied to insecure email exchanges, informal conversations, and fragmented discussions. As IT professionals face the challenge of managing an ever-growing array of devices, data, and user accounts, adding a collaboration and intranet solution to your resources allows for the secure and easy distribution of IT documentation while collaborating with end-users. Packed with features reminiscent of IT Glue, MyGlue includes essential tools such as a password vault, checklists, and advanced security options like audit trails, version history, and SOC 2 compliance, ensuring that end-users have everything they need for successful password and document management. The newly introduced MyGlue help center streamlines the sharing of crucial documents, providing useful guides and tutorials at your fingertips. Discover a holistic approach to managing communication, documentation, and password handling across your organization and all teams, guaranteeing that everyone remains connected and well-informed. This integrated solution not only enhances productivity but also fosters a collaborative atmosphere within your workplace, making it an invaluable asset for any organization. With MyGlue, your team can confidently navigate the complexities of modern IT management while staying synchronized and engaged. -
9
ClickShare Conference
Barco
Transform meetings effortlessly with seamless wireless connectivity solutions.ClickShare is an innovative wireless technology designed for presentations and meetings, facilitating effortless and natural communication among participants. It boasts a triple-agnostic feature, allowing seamless connections with your laptop, chosen conferencing platform, and any brand of AV USB peripherals. With the BYOM concept, users can effortlessly bring their own meeting preferences into the conference room. This solution is both secure and cloud-managed, making it suitable for enterprises seeking a robust connection. To initiate an engaging meeting experience, simply connect the button to your laptop and click to connect, benefiting from automatic presence detection. This system not only connects to the meeting room but also enables advanced features like screen sharing. Compatible with Miracast, Google Cast, and AirPlay, ClickShare enhances your meeting experience. The ClickShare Conference variant takes it a step further by wirelessly integrating with your meeting room equipment, enriching the collaborative experience. In under seven seconds, you can start conferencing and collaborating using your preferred tools directly from your device. The convenience and efficiency of ClickShare truly redefine the way meetings are conducted. -
10
Datto RMM
Datto, a Kaseya company
Empowering MSPs with seamless, secure IT management solutions.Datto RMM is a comprehensive cloud-based platform that empowers Managed Service Providers (MSPs) to effectively oversee and safeguard their clients' IT environments with modern and dependable solutions. Its design focuses on minimizing complexity, expenses, and potential risks, ensuring a seamless experience for users. The platform boasts robust automation and monitoring capabilities, including ransomware detection, patch management, and remote access, enabling MSPs to proactively address IT challenges, swiftly react to incidents, and enhance customer service. Additionally, it features an all-in-one cloud backup and disaster recovery system that is image-based, facilitating cloud-to-cloud backups and rapid recovery of vital data across Microsoft 365 and G Suite applications. With support for both Windows and Mac systems, users can quickly backup and restore files and folders, while secure file synchronization and sharing are streamlined through a centrally managed collaboration system. Furthermore, the solution allows for the prompt and reliable restoration of servers, demonstrating its effectiveness as a comprehensive business continuity and disaster recovery tool for organizations of all sizes. This multifaceted approach ensures that MSPs can maintain high levels of service and operational efficiency for their clients. -
11
AuthPoint
WatchGuard
Elevate security with advanced, seamless multi-factor authentication solutions.Our unique multi-factor authentication (MFA) solution significantly reduces the risk of data breaches and network disruptions caused by lost or compromised credentials, all while providing essential features through the Cloud for easy setup and management. AuthPoint goes beyond traditional 2-Factor Authentication (2FA) by implementing cutting-edge techniques for user verification, and our broad array of third-party integrations enhances the functionality of MFA for superior access protection. Essentially, WatchGuard AuthPoint emerges as the premier choice at a pivotal time, catering to businesses that need immediate solutions to counteract potential threats. By employing methods such as push notifications, QR codes, or one-time passwords (OTPs) for additional verification, AuthPoint guarantees strong identity validation, while our mobile device DNA technology authenticates the registered user's phone prior to granting access to systems and applications. Any unauthorized individual attempting to mimic a user's device to breach a secure system would encounter significant obstacles. Consequently, organizations can function with heightened assurance, confident that their security protocols are both sophisticated and effective, enabling a secure environment for sensitive data. This comprehensive approach to security not only protects against unauthorized access but also fosters a culture of safety within the organization. -
12
Intelligent ABM
Spiceworks Ziff Davis
Unlock deeper insights, engage the right B2B buyers.Deepening your comprehension of purchasing groups within specific accounts is essential for attaining superior marketing results. In an innovative partnership, Spiceworks Ziff Davis and Aberdeen are providing B2B technology sellers with unparalleled insight into the complete buying team, including everyone from senior executives to technical implementers. By merging SWZD’s unique first-party data with Aberdeen’s insightful third-party intent indicators, this alliance aims to offer a robust, thorough, and diverse range of intent signals across various B2B sectors such as IT, marketing, HR, and finance. Leverage our exceptional actionable intent data to pinpoint, prioritize, and engage with accounts that exhibit a strong propensity to make a purchase. With the Intelligent ABM strategy, you can concentrate on reaching the most relevant prospects who are actively in search of your offerings. This method, bolstered by actionable intent signals, enables you to customize your messaging to resonate with the entire buying group, ultimately strengthening connections and driving positive results. By synchronizing your marketing initiatives with these insights, you can significantly refine your engagement strategies, boost conversion rates, and maximize your overall marketing effectiveness. Additionally, this comprehensive understanding of your target accounts will empower you to craft more informed and impactful marketing campaigns. -
13
Check Point Quantum SD-WAN
Check Point
Secure your network while optimizing performance and efficiency.Numerous conventional SD-WAN solutions tend to overlook security, resulting in increased vulnerabilities for branch networks. In contrast, Quantum SD-WAN effectively addresses these security issues by merging strong protective measures with exceptional internet and network performance. Installed at the branch level through a software blade in Quantum Gateways, it delivers extensive defense against various threats, including zero-day exploits, phishing attacks, and ransomware, while also improving routing efficiency for users and over 10,000 applications. By incorporating converged security features via Quantum Gateways, it guarantees sub-second failover for unstable connections and adheres to industry best practices for the automatic identification of more than 10,000 applications. The platform features a unified cloud-based management system that combines security and SD-WAN functionalities, successfully closing security gaps with its integrated threat prevention capabilities. Furthermore, it helps significantly minimize networking costs through the use of multiple affordable links, enhances call quality during video calls, and reduces the administrative workload linked to SD-WAN configurations. Moreover, the extensive visibility, comprehensive logs, and a meticulous audit trail across all branch locations further reinforce its effectiveness, making it an excellent option for organizations aiming to bolster their network security while optimizing operational efficiency. In this way, Quantum SD-WAN not only enhances security but also aligns with the need for cost-effective and efficient networking solutions in today’s digital landscape. -
14
Datto Workplace
Datto, a Kaseya company
Seamless file sharing and synchronization for secure collaboration.Datto Workplace provides a robust platform for file synchronization and sharing tailored for managed service providers, ensuring top-notch security and operational efficiency. This business-centric collaboration tool enables users to access and share files seamlessly from various devices. It presents a straightforward and scalable solution suitable for all organizational roles, ranging from sales personnel to high-level executives. Users have the flexibility to adjust settings to align with specific business needs, facilitating an easy implementation process. Managed service providers can generate reports on system activities, monitor user engagement, and conduct on-demand audits. By integrating with essential business applications like Microsoft, G Suite, and Active Directory, users can collaborate securely across devices. Clients can rely on Datto Workplace's impressive 99.99% uptime and adherence to HIPAA, GDPR, and SOC 2 standards for compliance. The platform not only delivers the necessary security and mobility but also grants businesses the control they need for effective operations. This comprehensive approach ensures that organizations can maintain productivity while prioritizing data safety and compliance.
- Previous
- You're on page 1
- Next