Integrations

Not just a tool or an application, but a powerful, ever-evolving cybersecurity ecosystem

CyberCTRL’s open integration platform seamlessly integrates with all the latest and greatest cybersecurity and privacy risk management tools—whether these are entirely new tools or new versions of existing tools.

With more than 350 integrations already built-in—across hardware systems; ticketing applications; external scanners; controls; services; and asset/portfolio systems—and the ability to easily and effectively integrate with many more, cyberCTRL is fully customizable to any configuration and environment.

Plus all customizations and integrations are included under one single, monthly subscription price.

Don’t see your integration? No problem! Contact us to see what’s possible.

Integration Category
Asset Panda Asset Management and Inventory Tracking
ManageEngine AssetExplorer Asset Management and Inventory Tracking
Abnormal Security Communication
Asana Communication
Google BigQuery Communication
Ironscales Communication
Mattermost Communication
Microsoft Exchange Communication
Microsoft OneDrive Communication
Microsoft Safelinks Communication
Microsoft Teams Communication
Secure Practice Mailrisk Communication
Slack Communication
Symantec Blacklist Ioc Communication
Symantec Email Security.cloud Communication
Trello (coming soon) Communication
Twilio Communication
Twitter Communication
Zoom Communication
GitHub DevOps and Application Security
GitLab DevOps and Application Security
Opsgenie DevOps and Application Security
Atlassian Confluence Document Management
Box Document Management
Dropbox Document Management
Google Docs Document Management
Office365 Document Management
Absolute Security Endpoint Security and Management
Armis Endpoint Security and Management
Cisco AMP for Endpoints Endpoint Security and Management
Claroty Endpoint Security and Management
Cybereason Endpoint Security and Management
Cylance CylancePROTECT Endpoint Security and Management
Dynatrace Endpoint Security and Management
ESET Security Management Center Endpoint Security and Management
FireEye Endpoint Security Endpoint Security and Management
Forcepoint Management Endpoint Security and Management
Forescout EyeExtend Connect Endpoint Security and Management
Fortinet FortiEDR Endpoint Security and Management
Illumio Endpoint Security and Management
Infocyte Hunt Endpoint Security and Management
Intsights Threat Command Endpoint Security and Management
Jamf Endpoint Security and Management
McAfee Advanced Threat Defense Endpoint Security and Management
McAfee ePolicy Orchestrator Endpoint Security and Management
McAfee ePolicy Orchestrator via Data Exchange Layer Endpoint Security and Management
McAfee MVISION Endpoint Security and Management
Microsoft Defender Advanced Threat Protection Endpoint Security and Management
Microsoft Intune Endpoint Security and Management
Netskope Endpoint Security and Management
Netskope V2 API Endpoint Security and Management
OpenText EnCase eDiscovery Endpoint Security and Management
Palo Alto Networks Cortex Xdr Endpoint Security and Management
Qualys Asset Management Endpoint Security and Management
Qualys Fim Endpoint Security and Management
Quest KACE SMA Endpoint Security and Management
Seclytics Endpoint Security and Management
SentinelOne Endpoint Security and Management
Sophos API Endpoint Security and Management
Sucuri Website Monitoring Endpoint Security and Management
Symantec Endpoint Detection And Response Endpoint Security and Management
Symantec Endpoint Security Endpoint Security and Management
Symantec Securitycloud Endpoint Security and Management
Symantec Symantec Endpoint Protection Manager Endpoint Security and Management
Tanium Endpoint Security and Management
Trend Micro Apex Central Endpoint Security and Management
Trend Micro Tippingpoint Endpoint Security and Management
VMware Carbon Black App Control Endpoint Security and Management
VMware Carbon Black Cloud Endpoint Security and Management
VMware Carbon Black Cloud Audit And Remediation Endpoint Security and Management
VMware Carbon Black Cloud Endpoint Standard Endpoint Security and Management
VMware Carbon Black EDR Endpoint Security and Management
VMware Carbon Black Enterprise EDR Endpoint Security and Management
VMware Workspace One Endpoint Security and Management
Microsoft 365 Security Governance and Risk Management
Nuix Governance and Risk Management
RSA Archer Governance and Risk Management
BambooHR Human Resources
Gusto Human Resources
Cisco Identity Services Engine Identity and Access Management
Cyberark Privileged Access Security Identity and Access Management
Google Duo Identity and Access Management
Google Workspace Identity and Access Management
Idaptiv Identity and Access Management
Jumpcloud Identity and Access Management
Microsoft Active Directory Identity and Access Management
Office365 Identity and Access Management
Okta Identity and Access Management
Onelogin Identity and Access Management
Sailpoint IdentityQ Identity and Access Management
Amazon Web Services Infrastructure
Amazon Web Services (AWS) Infrastructure
Apache Activemq Infrastructure
Databricks Infrastructure
DigitalOcean Infrastructure
Google Cloud (coming soon) Infrastructure
Google Compute Engine Infrastructure
Google Workspace Infrastructure
Kafka Infrastructure
Linode Infrastructure
McAfee Data Exchange Layer Infrastructure
Microsoft Azure Infrastructure
Microsoft Azure Network Security Groups Infrastructure
Microsoft Azure Virtual Machines Infrastructure
Packet Infrastructure
Pastebin Infrastructure
Salesforce Infrastructure
Trend Micro Vision One Infrastructure
Venafi Trust Protection Platform Infrastructure
Vultr Infrastructure
abuse.ch URLhaus Investigation
AlienVault Open Threat Exchange Investigation
AlienVault ThreatCrowd Investigation
Analyst1 Investigation
Anomali ThreatStream Investigation
BlackDuck OpenHub Investigation
Bricata NDR Investigation
Check Point Reputation Investigation
Cisco Phishtank Investigation
Cisco Threat Response Investigation
Cisco Umbrella Investigation
Cofense Intelligence Investigation
Cofense Triage Investigation
Coffer Investigation
CrowdStrike Falcon Investigation
CrowdStrike Hybrid Analysis Falcon Sandbox Investigation
Cuckoo Cuckoo Sandbox Investigation
CVE Search Investigation
Cybersixgill Actionable Alerts Investigation
Cybersixgill Darkfeed Investigation
Cybersixgill DVE Enrichment Investigation
Cybersixgill DVE Feed Ingestion Investigation
Cybraics Investigation
Cymru TotalHash Investigation
Darktrace Investigation
Defense Storm API Investigation
Digital Shadows Investigation
DomainTools Investigation
Elastic Endgame Investigation
Evox Computing C1fApp Investigation
Exabeam User and Entity Behavior Analytics Investigation
Expel Workbench Investigation
Farsight DNSDB Investigation
FireEye ThreatScape Investigation
Flashpoint Api Investigation
Google Safe Browsing Investigation
GreyNoise Investigation
Group-IB Intelligence API Investigation
Hacker Target dnsdumpster Investigation
Hatching Triage Investigation
IBM XForce Investigation
Infoblox BloxOne Threat Defense Investigation
Insidersecurity Monitor Investigation
Intezer Analyze Investigation
IPinfo ipinfo.io Investigation
IPQualityScore Investigation
ja3er Investigation
Joe Security Joe Sandbox Investigation
KnowBe4 Investigation
Lastline Analyst Investigation
Lastline Knowledge Base Investigation
LookingGlass Cyber VIRUS TRACKER Investigation
LookingGlass ScoutPRIME Investigation
Maltiverse Investigation
Malware Information Sharing Platform Investigation
Mandiant Automated Defense Investigation
Mandiant Threat Intelligence Investigation
Mandiant Threat Intelligence v4 Investigation
Marathon Studios Inc. AbuseIPDB Investigation
MaxMind GeoLite2 Investigation
McAfee Active Response Investigation
McAfee Threat Intelligence Exchange Investigation
MITRE CRITs Investigation
MxToolbox Investigation
National Institute of Standards and Technology National Vulnerabilities Database CVE and CPE Investigation
Nivel Technologies MacVendors.com Investigation
NS Search Investigation
OASIS STIX/TAXII Investigation
OPSWAT MetaDefender Investigation
Palo Alto Networks AutoFocus Investigation
Palo Alto Networks WildFire Investigation
Payload Security Hybrid Analysis Falcon Sandbox Investigation
Phish.AI Investigation
Phishlabs Investigation
Plino Anti Spam Filtert Investigation
Postmark Spam Assassin Investigation
Pulsedive Threat Intelligence Investigation
Recorded Future Investigation
RiskIQ PassiveTotal Investigation
Robtex Investigation
Saint Security Malwares Investigation
Salesforce JA3 Investigation
SANS Internet Storm Center Investigation
Secureworks Taegis XDR Investigation
ShadowDragon MalNet Investigation
Shodan Investigation
Sixgill Darkfeed Investigation
Sixgill Sixgill Actionable Alerts Investigation
Sixgill Sixgill DVE Enrich Investigation
Sixgill Sixgill DVE feed Ingestion Investigation
SlashNext Phishing Incident Response Investigation
Spamhaus Investigation
Spamhaus Spamhaus Check Url Investigation
SpyCloud Investigation
Stellar Cyber Open XDR Investigation
Symantec Advanced Threat Protection Investigation
Symantec Data Loss Prevention Investigation
Symantec DeepSight Investigation
Symantec Endpoint Protection Investigation
Symantec Insight Investigation
Symantec MSS Secure Web Service Investigation
TCO Exploitalert Investigation
TCPIPUtils Investigation
TheHive Project TheHive Investigation
ThreatConnect Investigation
Threatminer Investigation
ThreatQuotient ThreatQ Investigation
Trend Micro Deep Discovery Analyzer Investigation
TruSTAR Investigation
United States Department of Homeland Security US-CERT Investigation
urlscan.io Investigation
VirusTotal Investigation
VMRay VMRay Cloud Investigation
Vulners Investigation
ZeroFOX Investigation
Zscaler Investigation
Agari Phishing Defense Miscellaneous
Bit Defender Advanced Threat Intelligence Miscellaneous
Code42 Incydr Miscellaneous
Cognitiv+ Web API Miscellaneous
CrowdStrike Identity Protection Miscellaneous
Cylance API Miscellaneous
Dataminr Pulse Miscellaneous
Devo Miscellaneous
Docusign Miscellaneous
Elastic Elasticsearch 8 Miscellaneous
Fireeye Detection On Demand Miscellaneous
FireEye Helix Miscellaneous
Fortinet Fortigate Miscellaneous
Greenplum Greenplum Database Query Miscellaneous
Hunter IO Miscellaneous
Microsoft Power BI Miscellaneous
Oracle SQL Database Query Miscellaneous
Palo Alto Expanse Miscellaneous
Screenshotmachine Miscellaneous
Spotify Miscellaneous
Tripwire Enterprise Miscellaneous
Ukhs Leankit Miscellaneous
Alert Logic Network Security and Management
Alienvault USM Anywhere Network Security and Management
Alienvault USM Central Network Security and Management
AnyRun Network Security and Management
Armorblox Email Security Network Security and Management
Attivo Networks Botsink Network Security and Management
Axonius Network Security and Management
Check Point R80 Network Security and Management
Cisco Email Security (Ironport) Network Security and Management
Cisco Firepower Management Center Network Security and Management
Cisco Firepower Threat Defense Network Security and Management
Cisco Meraki Network Security and Management
Cisco Secure Malware Analytics Network Security and Management
Extreme Networks Extreme Cloud IQ Network Security and Management
F5 Networks BIG-IP Network Security and Management
FireEye All Appliances Network Security and Management
Fireeye Cm Network Security and Management
FireEye Nx Network Security and Management
Fortinet Fortimanager Network Security and Management
Guardicore Centra Network Security and Management
Illusive Networks Network Security and Management
Imperva Securesphere Network Security and Management
Ironnet Irondefense Network Security and Management
iZOOlogic iZOOlabs Network Security and Management
KnowBe4 Phisher Network Security and Management
Lacework Network Security and Management
McAfee Network Security Manger Network Security and Management
McAfee WebGateway Network Security and Management
Microsoft Cloud App Security Network Security and Management
Microsoft Graph API Network Security and Management
Mimecast Network Security and Management
Netscout Arbor Edge Defense Network Security and Management
Nozomi Networks Nozomi Network Security and Management
Palo Alto Networks PAN-OS/Panorama Network Security and Management
Palo Alto Networks Urlfiltering Network Security and Management
Proofpoint Network Security and Management
RockNSM Docket Network Security and Management
Scythe Network Security and Management
SecurityTrails API Network Security and Management
Snipe-IT Network Security and Management
Solarwinds Orion Network Security and Management
Sonicwall Sonicwall API Network Security and Management
Sophos XG Firewall Network Security and Management
Symantec Management Center Network Security and Management
Symantec ProxySG Network Security and Management
Vectra Cognito Network Security and Management
Adlumin SIEM and Log Management
Datadog SIEM and Log Management
Elastic Elasticsearch SIEM and Log Management
Elastic Security SIEM and Log Management
Elastic Security v8 SIEM and Log Management
Exabeam Security Management Platform SIEM and Log Management
Firemon Global Policy Controller SIEM and Log Management
Fluency SIEM and Log Management
Forescout SIEM and Log Management
Forescout Counteract SIEM and Log Management
Fortinet Fortisiem SIEM and Log Management
Google Chronicle SIEM and Log Management
Graylog SIEM and Log Management
Guardicore Siem SIEM and Log Management
Humio Log Management SIEM and Log Management
IBM QRadar SIEM and Log Management
LogicMonitor RestAPI SIEM and Log Management
Logpoint SIEM and Log Management
Logrhythm SIEM and Log Management
McAfee Data Loss Prevention SIEM and Log Management
McAfee Enterprise Security Manager SIEM and Log Management
Micro Focus ArcSight ESM SIEM and Log Management
Microsoft Azure Sentinel SIEM and Log Management
Minemeld SIEM and Log Management
Neo23x0 Sigma SIEM and Log Management
Palo Alto Networks Evident.io SIEM and Log Management
Rapid7 Insightidr SIEM and Log Management
Rapid7 InsightVM SIEM and Log Management
RSA NetWitness Suite SIEM and Log Management
Securonix SNYPR SIEM and Log Management
Splunk SIEM and Log Management
Sumo Logic SIEM and Log Management
Tufin SecureTrack SIEM and Log Management
Atlassian Confluence Ticket Management
Atlassian Jira Ticket Management
BMC Footprints Ticket Management
BMC Remedy Ticket Management
Cherwell Service Management Ticket Management
Connect Wise Manage Ticket Management
Cydarm Ticket Management
Dell Secureworks Ticket Management
Enhancesoft OSTicket Ticket Management
Freshdesk Ticket Management
Freshworks Freshdesk Ticket Management
Freshworks Freshservice Ticket Management
Ivanti Neurons for ITSM Ticket Management
Juvare Webeoc Ticket Management
Manageengine Servicedesk Plus Ticket Management
Micro Focus Service Manager Ticket Management
OTRS Ticket Management
PagerDuty Ticket Management
Proofpoint Threat Response Ticket Management
Redmine Ticket Management
Request Tracker Ticket Management
Salesforce Ticket Management
ServiceNow Ticket Management
Sysaid Ticket Management
Unify Circuit Ticket Management
Zendesk Ticket Management
Zoho Desk Ticket Management
KnowBe4 Training and Learning Management
Have I Been Pwned Vulnerability and Patch Management
Kenna Security Vulnerability and Patch Management
Qualys Vulnerability Scanner Vulnerability and Patch Management
Tenable io Vulnerability and Patch Management
Tenable Nessus Vulnerability Scanner Vulnerability and Patch Management
Tenable Tenable.sc Vulnerability and Patch Management
Vulcan Cyber Vulnerability and Patch Management