Find an Integration

Our Technology Partner Ecosystem

Product Integrations for Smarter Security

WatchGuard partners with industry-leading technology companies to develop tight integrations for stronger security, easier deployments, and better interoperability in your IT environments. Each integration is verified and documented with an integration guide for step-by-step configuration.

Filter Partners

Product Family

Google Cloud BOVPN Virtual Interface

Typ:
VPN
Description

WatchGuard Fireware OS integrates with Google Cloud to provide VPN services in BOVPN virtual interface (route-based mode).

Google Workspace

Typ:
Web Applications
Description

WatchGuard AuthPoint integrates with Google Workspace to provide multi-factor authentication.

Google Workspace LDAP Synchronization with AuthPoint

Typ:
Web Applications
Description

WatchGuard AuthPoint integrates with Google Workspace to sync users.

GoToMeeting

Typ:
Cloud Applications
Description

WatchGuard AuthPoint integrates with GoToMeeting to provide multi-factor authentication.

GuestAir

Typ:
Wi-Fi Cloud
Description

WatchGuard Fireware OS integrates with GuestAir to turn your Wi-Fi hotspot into a secure and highly-customizable captive portal. This integration allows for additional authentication methods to collect guest information

HaloPSA

Typ:
Cloud Applications
Description

WatchGuard AuthPoint integrates with HaloPSA to provide SAML 2.0 authentication into the HaloPSA environment.

HID ActivID

Typ:
Identity and Access Management
Description

AuthPoint integrates with HID ActivID to provide token-based multi-factor authentication access to network resources.

Hillstone

Typ:
Remote Access and VPN
Description

WatchGuard AuthPoint integrates with Hillstone Networks to provide multi-factor authentication.

HOB Cyber Security

Typ:
VPN
Description

WatchGuard Fireware OS integrates with HOB RD VPN to provide secure remote access to network resources.

HP ArcSight

Typ:
SIEM
Description

WatchGuard Fireware OS integrates with HP Arcsight Data Platform to collect and analyze network security log data for advanced threat detection.