Integrations
Not just a tool or an application, but a powerful, ever-evolving cybersecurity ecosystem
CyberCTRL’s open integration platform seamlessly integrates with all the latest and greatest cybersecurity and privacy risk management tools—whether these are entirely new tools or new versions of existing tools.
With more than 350 integrations already built-in—across hardware systems; ticketing applications; external scanners; controls; services; and asset/portfolio systems—and the ability to easily and effectively integrate with many more, cyberCTRL is fully customizable to any configuration and environment.
Plus all customizations and integrations are included under one single, monthly subscription price.
Don’t see your integration? No problem! Contact us to see what’s possible.
Integration | Category |
---|---|
Asset Panda | Asset Management and Inventory Tracking |
ManageEngine AssetExplorer | Asset Management and Inventory Tracking |
Abnormal Security | Communication |
Asana | Communication |
Google BigQuery | Communication |
Ironscales | Communication |
Mattermost | Communication |
Microsoft Exchange | Communication |
Microsoft OneDrive | Communication |
Microsoft Safelinks | Communication |
Microsoft Teams | Communication |
Secure Practice Mailrisk | Communication |
Slack | Communication |
Symantec Blacklist Ioc | Communication |
Symantec Email Security.cloud | Communication |
Trello (coming soon) | Communication |
Twilio | Communication |
Communication | |
Zoom | Communication |
GitHub | DevOps and Application Security |
GitLab | DevOps and Application Security |
Opsgenie | DevOps and Application Security |
Atlassian Confluence | Document Management |
Box | Document Management |
Dropbox | Document Management |
Google Docs | Document Management |
Office365 | Document Management |
Absolute Security | Endpoint Security and Management |
Armis | Endpoint Security and Management |
Cisco AMP for Endpoints | Endpoint Security and Management |
Claroty | Endpoint Security and Management |
Cybereason | Endpoint Security and Management |
Cylance CylancePROTECT | Endpoint Security and Management |
Dynatrace | Endpoint Security and Management |
ESET Security Management Center | Endpoint Security and Management |
FireEye Endpoint Security | Endpoint Security and Management |
Forcepoint Management | Endpoint Security and Management |
Forescout EyeExtend Connect | Endpoint Security and Management |
Fortinet FortiEDR | Endpoint Security and Management |
Illumio | Endpoint Security and Management |
Infocyte Hunt | Endpoint Security and Management |
Intsights Threat Command | Endpoint Security and Management |
Jamf | Endpoint Security and Management |
McAfee Advanced Threat Defense | Endpoint Security and Management |
McAfee ePolicy Orchestrator | Endpoint Security and Management |
McAfee ePolicy Orchestrator via Data Exchange Layer | Endpoint Security and Management |
McAfee MVISION | Endpoint Security and Management |
Microsoft Defender Advanced Threat Protection | Endpoint Security and Management |
Microsoft Intune | Endpoint Security and Management |
Netskope | Endpoint Security and Management |
Netskope V2 API | Endpoint Security and Management |
OpenText EnCase eDiscovery | Endpoint Security and Management |
Palo Alto Networks Cortex Xdr | Endpoint Security and Management |
Qualys Asset Management | Endpoint Security and Management |
Qualys Fim | Endpoint Security and Management |
Quest KACE SMA | Endpoint Security and Management |
Seclytics | Endpoint Security and Management |
SentinelOne | Endpoint Security and Management |
Sophos API | Endpoint Security and Management |
Sucuri Website Monitoring | Endpoint Security and Management |
Symantec Endpoint Detection And Response | Endpoint Security and Management |
Symantec Endpoint Security | Endpoint Security and Management |
Symantec Securitycloud | Endpoint Security and Management |
Symantec Symantec Endpoint Protection Manager | Endpoint Security and Management |
Tanium | Endpoint Security and Management |
Trend Micro Apex Central | Endpoint Security and Management |
Trend Micro Tippingpoint | Endpoint Security and Management |
VMware Carbon Black App Control | Endpoint Security and Management |
VMware Carbon Black Cloud | Endpoint Security and Management |
VMware Carbon Black Cloud Audit And Remediation | Endpoint Security and Management |
VMware Carbon Black Cloud Endpoint Standard | Endpoint Security and Management |
VMware Carbon Black EDR | Endpoint Security and Management |
VMware Carbon Black Enterprise EDR | Endpoint Security and Management |
VMware Workspace One | Endpoint Security and Management |
Microsoft 365 Security | Governance and Risk Management |
Nuix | Governance and Risk Management |
RSA Archer | Governance and Risk Management |
BambooHR | Human Resources |
Gusto | Human Resources |
Cisco Identity Services Engine | Identity and Access Management |
Cyberark Privileged Access Security | Identity and Access Management |
Google Duo | Identity and Access Management |
Google Workspace | Identity and Access Management |
Idaptiv | Identity and Access Management |
Jumpcloud | Identity and Access Management |
Microsoft Active Directory | Identity and Access Management |
Office365 | Identity and Access Management |
Okta | Identity and Access Management |
Onelogin | Identity and Access Management |
Sailpoint IdentityQ | Identity and Access Management |
Amazon Web Services | Infrastructure |
Amazon Web Services (AWS) | Infrastructure |
Apache Activemq | Infrastructure |
Databricks | Infrastructure |
DigitalOcean | Infrastructure |
Google Cloud (coming soon) | Infrastructure |
Google Compute Engine | Infrastructure |
Google Workspace | Infrastructure |
Kafka | Infrastructure |
Linode | Infrastructure |
McAfee Data Exchange Layer | Infrastructure |
Microsoft Azure | Infrastructure |
Microsoft Azure Network Security Groups | Infrastructure |
Microsoft Azure Virtual Machines | Infrastructure |
Packet | Infrastructure |
Pastebin | Infrastructure |
Salesforce | Infrastructure |
Trend Micro Vision One | Infrastructure |
Venafi Trust Protection Platform | Infrastructure |
Vultr | Infrastructure |
abuse.ch URLhaus | Investigation |
AlienVault Open Threat Exchange | Investigation |
AlienVault ThreatCrowd | Investigation |
Analyst1 | Investigation |
Anomali ThreatStream | Investigation |
BlackDuck OpenHub | Investigation |
Bricata NDR | Investigation |
Check Point Reputation | Investigation |
Cisco Phishtank | Investigation |
Cisco Threat Response | Investigation |
Cisco Umbrella | Investigation |
Cofense Intelligence | Investigation |
Cofense Triage | Investigation |
Coffer | Investigation |
CrowdStrike Falcon | Investigation |
CrowdStrike Hybrid Analysis Falcon Sandbox | Investigation |
Cuckoo Cuckoo Sandbox | Investigation |
CVE Search | Investigation |
Cybersixgill Actionable Alerts | Investigation |
Cybersixgill Darkfeed | Investigation |
Cybersixgill DVE Enrichment | Investigation |
Cybersixgill DVE Feed Ingestion | Investigation |
Cybraics | Investigation |
Cymru TotalHash | Investigation |
Darktrace | Investigation |
Defense Storm API | Investigation |
Digital Shadows | Investigation |
DomainTools | Investigation |
Elastic Endgame | Investigation |
Evox Computing C1fApp | Investigation |
Exabeam User and Entity Behavior Analytics | Investigation |
Expel Workbench | Investigation |
Farsight DNSDB | Investigation |
FireEye ThreatScape | Investigation |
Flashpoint Api | Investigation |
Google Safe Browsing | Investigation |
GreyNoise | Investigation |
Group-IB Intelligence API | Investigation |
Hacker Target dnsdumpster | Investigation |
Hatching Triage | Investigation |
IBM XForce | Investigation |
Infoblox BloxOne Threat Defense | Investigation |
Insidersecurity Monitor | Investigation |
Intezer Analyze | Investigation |
IPinfo ipinfo.io | Investigation |
IPQualityScore | Investigation |
ja3er | Investigation |
Joe Security Joe Sandbox | Investigation |
KnowBe4 | Investigation |
Lastline Analyst | Investigation |
Lastline Knowledge Base | Investigation |
LookingGlass Cyber VIRUS TRACKER | Investigation |
LookingGlass ScoutPRIME | Investigation |
Maltiverse | Investigation |
Malware Information Sharing Platform | Investigation |
Mandiant Automated Defense | Investigation |
Mandiant Threat Intelligence | Investigation |
Mandiant Threat Intelligence v4 | Investigation |
Marathon Studios Inc. AbuseIPDB | Investigation |
MaxMind GeoLite2 | Investigation |
McAfee Active Response | Investigation |
McAfee Threat Intelligence Exchange | Investigation |
MITRE CRITs | Investigation |
MxToolbox | Investigation |
National Institute of Standards and Technology National Vulnerabilities Database CVE and CPE | Investigation |
Nivel Technologies MacVendors.com | Investigation |
NS Search | Investigation |
OASIS STIX/TAXII | Investigation |
OPSWAT MetaDefender | Investigation |
Palo Alto Networks AutoFocus | Investigation |
Palo Alto Networks WildFire | Investigation |
Payload Security Hybrid Analysis Falcon Sandbox | Investigation |
Phish.AI | Investigation |
Phishlabs | Investigation |
Plino Anti Spam Filtert | Investigation |
Postmark Spam Assassin | Investigation |
Pulsedive Threat Intelligence | Investigation |
Recorded Future | Investigation |
RiskIQ PassiveTotal | Investigation |
Robtex | Investigation |
Saint Security Malwares | Investigation |
Salesforce JA3 | Investigation |
SANS Internet Storm Center | Investigation |
Secureworks Taegis XDR | Investigation |
ShadowDragon MalNet | Investigation |
Shodan | Investigation |
Sixgill Darkfeed | Investigation |
Sixgill Sixgill Actionable Alerts | Investigation |
Sixgill Sixgill DVE Enrich | Investigation |
Sixgill Sixgill DVE feed Ingestion | Investigation |
SlashNext Phishing Incident Response | Investigation |
Spamhaus | Investigation |
Spamhaus Spamhaus Check Url | Investigation |
SpyCloud | Investigation |
Stellar Cyber Open XDR | Investigation |
Symantec Advanced Threat Protection | Investigation |
Symantec Data Loss Prevention | Investigation |
Symantec DeepSight | Investigation |
Symantec Endpoint Protection | Investigation |
Symantec Insight | Investigation |
Symantec MSS Secure Web Service | Investigation |
TCO Exploitalert | Investigation |
TCPIPUtils | Investigation |
TheHive Project TheHive | Investigation |
ThreatConnect | Investigation |
Threatminer | Investigation |
ThreatQuotient ThreatQ | Investigation |
Trend Micro Deep Discovery Analyzer | Investigation |
TruSTAR | Investigation |
United States Department of Homeland Security US-CERT | Investigation |
urlscan.io | Investigation |
VirusTotal | Investigation |
VMRay VMRay Cloud | Investigation |
Vulners | Investigation |
ZeroFOX | Investigation |
Zscaler | Investigation |
Agari Phishing Defense | Miscellaneous |
Bit Defender Advanced Threat Intelligence | Miscellaneous |
Code42 Incydr | Miscellaneous |
Cognitiv+ Web API | Miscellaneous |
CrowdStrike Identity Protection | Miscellaneous |
Cylance API | Miscellaneous |
Dataminr Pulse | Miscellaneous |
Devo | Miscellaneous |
Docusign | Miscellaneous |
Elastic Elasticsearch 8 | Miscellaneous |
Fireeye Detection On Demand | Miscellaneous |
FireEye Helix | Miscellaneous |
Fortinet Fortigate | Miscellaneous |
Greenplum Greenplum Database Query | Miscellaneous |
Hunter IO | Miscellaneous |
Microsoft Power BI | Miscellaneous |
Oracle SQL Database Query | Miscellaneous |
Palo Alto Expanse | Miscellaneous |
Screenshotmachine | Miscellaneous |
Spotify | Miscellaneous |
Tripwire Enterprise | Miscellaneous |
Ukhs Leankit | Miscellaneous |
Alert Logic | Network Security and Management |
Alienvault USM Anywhere | Network Security and Management |
Alienvault USM Central | Network Security and Management |
AnyRun | Network Security and Management |
Armorblox Email Security | Network Security and Management |
Attivo Networks Botsink | Network Security and Management |
Axonius | Network Security and Management |
Check Point R80 | Network Security and Management |
Cisco Email Security (Ironport) | Network Security and Management |
Cisco Firepower Management Center | Network Security and Management |
Cisco Firepower Threat Defense | Network Security and Management |
Cisco Meraki | Network Security and Management |
Cisco Secure Malware Analytics | Network Security and Management |
Extreme Networks Extreme Cloud IQ | Network Security and Management |
F5 Networks BIG-IP | Network Security and Management |
FireEye All Appliances | Network Security and Management |
Fireeye Cm | Network Security and Management |
FireEye Nx | Network Security and Management |
Fortinet Fortimanager | Network Security and Management |
Guardicore Centra | Network Security and Management |
Illusive Networks | Network Security and Management |
Imperva Securesphere | Network Security and Management |
Ironnet Irondefense | Network Security and Management |
iZOOlogic iZOOlabs | Network Security and Management |
KnowBe4 Phisher | Network Security and Management |
Lacework | Network Security and Management |
McAfee Network Security Manger | Network Security and Management |
McAfee WebGateway | Network Security and Management |
Microsoft Cloud App Security | Network Security and Management |
Microsoft Graph API | Network Security and Management |
Mimecast | Network Security and Management |
Netscout Arbor Edge Defense | Network Security and Management |
Nozomi Networks Nozomi | Network Security and Management |
Palo Alto Networks PAN-OS/Panorama | Network Security and Management |
Palo Alto Networks Urlfiltering | Network Security and Management |
Proofpoint | Network Security and Management |
RockNSM Docket | Network Security and Management |
Scythe | Network Security and Management |
SecurityTrails API | Network Security and Management |
Snipe-IT | Network Security and Management |
Solarwinds Orion | Network Security and Management |
Sonicwall Sonicwall API | Network Security and Management |
Sophos XG Firewall | Network Security and Management |
Symantec Management Center | Network Security and Management |
Symantec ProxySG | Network Security and Management |
Vectra Cognito | Network Security and Management |
Adlumin | SIEM and Log Management |
Datadog | SIEM and Log Management |
Elastic Elasticsearch | SIEM and Log Management |
Elastic Security | SIEM and Log Management |
Elastic Security v8 | SIEM and Log Management |
Exabeam Security Management Platform | SIEM and Log Management |
Firemon Global Policy Controller | SIEM and Log Management |
Fluency | SIEM and Log Management |
Forescout | SIEM and Log Management |
Forescout Counteract | SIEM and Log Management |
Fortinet Fortisiem | SIEM and Log Management |
Google Chronicle | SIEM and Log Management |
Graylog | SIEM and Log Management |
Guardicore Siem | SIEM and Log Management |
Humio Log Management | SIEM and Log Management |
IBM QRadar | SIEM and Log Management |
LogicMonitor RestAPI | SIEM and Log Management |
Logpoint | SIEM and Log Management |
Logrhythm | SIEM and Log Management |
McAfee Data Loss Prevention | SIEM and Log Management |
McAfee Enterprise Security Manager | SIEM and Log Management |
Micro Focus ArcSight ESM | SIEM and Log Management |
Microsoft Azure Sentinel | SIEM and Log Management |
Minemeld | SIEM and Log Management |
Neo23x0 Sigma | SIEM and Log Management |
Palo Alto Networks Evident.io | SIEM and Log Management |
Rapid7 Insightidr | SIEM and Log Management |
Rapid7 InsightVM | SIEM and Log Management |
RSA NetWitness Suite | SIEM and Log Management |
Securonix SNYPR | SIEM and Log Management |
Splunk | SIEM and Log Management |
Sumo Logic | SIEM and Log Management |
Tufin SecureTrack | SIEM and Log Management |
Atlassian Confluence | Ticket Management |
Atlassian Jira | Ticket Management |
BMC Footprints | Ticket Management |
BMC Remedy | Ticket Management |
Cherwell Service Management | Ticket Management |
Connect Wise Manage | Ticket Management |
Cydarm | Ticket Management |
Dell Secureworks | Ticket Management |
Enhancesoft OSTicket | Ticket Management |
Freshdesk | Ticket Management |
Freshworks Freshdesk | Ticket Management |
Freshworks Freshservice | Ticket Management |
Ivanti Neurons for ITSM | Ticket Management |
Juvare Webeoc | Ticket Management |
Manageengine Servicedesk Plus | Ticket Management |
Micro Focus Service Manager | Ticket Management |
OTRS | Ticket Management |
PagerDuty | Ticket Management |
Proofpoint Threat Response | Ticket Management |
Redmine | Ticket Management |
Request Tracker | Ticket Management |
Salesforce | Ticket Management |
ServiceNow | Ticket Management |
Sysaid | Ticket Management |
Unify Circuit | Ticket Management |
Zendesk | Ticket Management |
Zoho Desk | Ticket Management |
KnowBe4 | Training and Learning Management |
Have I Been Pwned | Vulnerability and Patch Management |
Kenna Security | Vulnerability and Patch Management |
Qualys Vulnerability Scanner | Vulnerability and Patch Management |
Tenable io | Vulnerability and Patch Management |
Tenable Nessus Vulnerability Scanner | Vulnerability and Patch Management |
Tenable Tenable.sc | Vulnerability and Patch Management |
Vulcan Cyber | Vulnerability and Patch Management |