5 Integrations with Tectia

View a list of Tectia integrations and software that integrates with Tectia below. Compare the best Tectia integrations as well as features, ratings, user reviews, and pricing of software that integrates with Tectia. Here are the current Tectia integrations in 2026:

  • 1
    IBM z/OS
    IBM® z/OS® brings the computing power and resources of the IBM Z® platform to help you drive business transformation and accelerate innovation. Get the stable, secure environment your organization requires to improve performance for mission-critical workloads and meet future challenges. A highly secure and scalable operating system for running mission-critical applications. The new IBM® z16™ platform accelerates decision velocity, protects against threats across your business, and modernizes for hybrid cloud. IBM z/OS V2.5 enables innovative development to support hybrid cloud and AI business applications, along with next-level technologies for security and resilience. With a continuous delivery model, new z/OS capabilities are available quarterly with no impact on stability, complexity, or costs. Achieve rapid application development and provisioning for hybrid cloud deployment. Simplified and modern experience for easier installation, management, etc.
  • 2
    HashiCorp Vault
    Secure, store and tightly control access to tokens, passwords, certificates, encryption keys for protecting secrets and other sensitive data using a UI, CLI, or HTTP API. Secure applications and systems with machine identity and automate credential issuance, rotation, and more. Enable attestation of application and workload identity, using Vault as the trusted authority. Many organizations have credentials hard coded in source code, littered throughout configuration files and configuration management tools, and stored in plaintext in version control, wikis, and shared volumes. Safeguarding and ensuring that a credentials isn’t leaked, or in the likelihood it is, that the organization can quickly revoke access and remediate, is a complex problem to solve.
  • 3
    NetThunder

    NetThunder

    NetThunder

    NetThunder is deployed in one of two ways, either as an appliance, or as a system of connected appliances, we call that The Storm™. This allows NetThunder to provide computing solutions for a large variety of situations and is future-proof. A single appliance can easily be converted into The Storm™. The NetThunder platform allows you to scale at will. Unlike most hypercoverged infrastructure, NetThunder offers specialized modules the controller will autoconfigure for your environment - optimizing to maximum performance. Configuring multiple networks and a SAN is as simple as red-wire to red-wire. Our subscription pricing model means no huge upfront buy-in cost. NetThunder is deployed either as an appliance or a system of connected appliances we call The Storm™. This allows NetThunder to provide computing and storage solutions for a large variety of use cases.
    Starting Price: $50 per month
  • 4
    Acceptto Zero Trust Identity (CIAM)
    You need to know that your customers are who they say they are, customers don’t want to jump through hoops to prove it and they want you to keep their credentials safe. Protect your customers identities through a delicate balance of security and a frictionless, pleasant customer experience. Real-time, continuous identity monitoring & validation Post-Authorization. Eliminate account takeover (ATO) instantly with intelligent MFA. Risk-based policy orchestrated continuous authentication. Acceptto is a transformative cybersecurity company driving a paradigm shift in identity access management by treating authentication not as a single event, but rather a continuum. Our AI/ML powered Passwordless Continuous AuthenticationTM technology analyzes and verifies user identity, inferring behavioral data to detect anomalies and eliminate dependence on vulnerable binary authentications. We deliver the smartest, most resilient and breach-proof identity validation technology.
  • 5
    Entitle

    Entitle

    BeyondTrust

    Entitle fuses a security-first approach to provisioning and governance, with a commitment to business enablement for all teams, from R&D and sales to H&R and finance. Speed up provisioning to unlock security policies that automatically update with changing infrastructure and employee needs. Grant permissions to specific resources, like Google Drive folders, database tables, Git repositories, and more. Keep privileged resources and roles safe by granting access only when needed, and removing them when not. Give peers, managers, and resource owners the power to approve access requests, for authorizations you can trust. With automated access requests and zero-touch provisioning, DevOps, IT, and all teams can save serious time and resources. Users can request access to what they need via Slack, Teams, Jira, or email for a seamless approval process. Grant bulk permissions for fast onboarding and offboarding to keep up with organizational changes.
  • Previous
  • You're on page 1
  • Next