What Integrates with Risk Radar?
Find out what Risk Radar integrations exist in 2025. Learn what software and services currently integrate with Risk Radar, and sort them by reviews, cost, features, and more. Below is a list of products that Risk Radar currently integrates with:
-
1
Trellix Detection as a Service
Trellix
Detect threats anywhere in your workflow. Inspect the cloud infrastructure, and the business logic behind the data stored in your cloud applications. Validate your files with the latest threat information and multiple dynamic machine-learning, AI, and correlation engine. Integrate easily across trusted cloud services, collaboration tools, and web applications. Scan files, URLs, hashes and other data for malware in a virtual environment, without risking internal assets. Integrate Detection-as-a-Service into your SOC workflows and SIEM analytics. Data repositories, apps, and more. Discover malware and exploits that have never been seen before by determining the possibility of secondary effects or combinatory effects in multiple phases of a cyber-attack chain. Our easy-to-use Chrome plugin allows you to submit MD5 hashes and local files. It integrates easily into existing workflows and tools. -
2
StellarProtect
TXOne Networks
Industrial-grade, next generation endpoint security for modernized assets. StellarProtectâ„¢, the first all-terrain protection system in the world, is a unique defense solution that was specifically designed for operational technology. Its advanced threat scanning reduces known threats while its next-gen machine-learning engine blocks unknown threats. This protection does not require internet access. StellarProtect's ICS filtering is based on an inventory application and certificate list. This allows for the most lightweight operation. StellarProtect is highly effective in all environmental conditions and has a very low impact on endpoint performance. StellarProtect provides patternless protection against known and unknown malware through machine learning and ICS rootof trust. ICS root of Trust collects over a thousand ICS licenses and certificates, verifying them in advance to reduce overhead protection. -
3
Sovrin
Sovrin
You can manage your digital IDs online using the Sovrin Network. This open-source project creates a global utility for self-sovereign identities. It is time to change the current system of siloed identity, endless passwords, insecure databases, and siloed passwords. The time has come for frictionless, secure identity verification of one's self-sovereignness. The Sovrin Network, the new standard in digital identity, is designed to bring the trust and personal control of analog IDs such as driver's licenses or ID cards to the Internet. Sovrin is a metasystem that can be used by any application. It allows people, organizations, and other entities to prove their identity using trusted, verifiable digital credentials. "Self-sovereign" refers to the individual who controls their credentials and can use them whenever they like, without having to ask permission from an intermediary.
- Previous
- You're on page 1
- Next