4 Integrations with Symantec EDR

View a list of Symantec EDR integrations and software that integrates with Symantec EDR below. Compare the best Symantec EDR integrations as well as features, ratings, user reviews, and pricing of software that integrates with Symantec EDR. Here are the current Symantec EDR integrations in 2026:

  • 1
    Symphony

    Symphony

    Symphony Communication

    Symphony Communication has 4 interconnected platforms; Messaging, Voice, Directory, Analytics. The software is designed for the financial services industry. Symphony Messaging is an internal & external workplace chat app. The Federation feature enables off-channel messaging over WhatsApp, SMS, WeChat, and LINE, in compliance with financial industry requirements. The desktop and mobile app enables flexible working. Symphony Voice is the voice communication platform made for global finance. This includes the Cloud9 trader voice product which connects traders and trader-adjacent teams. The award-winning wireless turret phone alternative offers seamless deployment, rich features, in a fully cloud-native software as a service. The interconnected Symphony Directory feature enables you to search, find and contact financial counterparties in seconds. Symphony is trusted by over ½ millions users and 1,000 institutions, including 10/10 of the world's largest investment banks.
  • 2
    PC Matic

    PC Matic

    PC Matic

    PC Matic Pro's application whitelisting is a critical preventative layer of cyber-protection that resides on top of other endpoint security solutions. zero trust whitelisting solutions prevent hacking and cyber-attacks. Block all malware, ransomware, and malicious scripts from executing. Protect your business data, users, and network with our whitelist cybersecurity solution. PC Matic Pro represents a long overdue shift in the cybersecurity industry to absolute prevention. Today's threats to critical infrastructure, industry, and all levels of government demand nothing less. PC Matic Pro provides a patented default-deny security layer at the device that blocks all unknown executions without introducing headaches for IT. Unlike traditional security solutions, customer infections aren’t required to strengthen the whitelist architecture. Local overrides can be added after prevention with a focus on accuracy and without concern for responding to an already active infection.
    Starting Price: $50 per year
  • 3
    Blink

    Blink

    Blink Ops

    Blink is an ROI force multiplier for security teams and business leaders looking to quickly and easily secure a wide variety of use cases. Get full visibility and coverage of alerts across your organization and security stack. Utilize automated flows to reduce noise and false positives in alerts. Scan for attacks and proactively identify insider threats and vulnerabilities. Create automated workflows that add relevant context, streamline communications, and reduce MTTR. Take action on alerts and improve your cloud security posture with no-code automation and generative AI. Shift-left access requests, streamline approvals flows, and unblock developers while keeping your applications secure. Continuously monitor your application for SOC2, ISO, GDPR, or other compliance checks and enforce controls.
  • 4
    CA Auditor for z/OS
    With each new generation of computers, operating systems become more complex. These complexities have made auditing the operating systems more time consuming and difficult. Any operating system, even the mainframe, can be subject to security exposures due to errors in installation, customizations, and/or product bugs and maintenance. CA Auditor is a comprehensive software package that can perform an automated technical review of the system, hardware and software environment and identify integrity exposures. Identifies potential areas of security risk and exposure from improperly configured implementations. Capability to perform a high-level look at the operating system and components. Provides the capability to monitor usage and ensure the integrity of your system files. CA Auditor addresses a significant exposure point in the z/OS operating system by empowering you to perform comprehensive auditing, integrity checks, and verifications.
  • Previous
  • You're on page 1
  • Next