What Integrates with ThreatStream?
Find out what ThreatStream integrations exist in 2024. Learn what software and services currently integrate with ThreatStream, and sort them by reviews, cost, features, and more. Below is a list of products that ThreatStream currently integrates with:
-
1
Zscaler, the creator of Zero Trust Exchange, uses the most powerful security cloud on the planet in order to make doing business and navigating changes easier, faster, and more productive. Zscaler Zero Trust Exchange allows for fast, secure connections. It also allows employees to work anywhere via the internet as their corporate network. It is based on the zero trust principle that least-privileged access and provides comprehensive security through context-based identity and policy enforcement. The Zero Trust Exchange is available in 150 data centers around the world, ensuring that your users are close to the service, as well as the cloud providers and applications they use, such Microsoft 365 and AWS. It provides unparalleled security and a great user experience, ensuring the fastest route between your users' destinations.
-
2
Splunk Cloud Platform
Splunk
1 RatingSplunk is a secure, reliable, and scalable service that turns data into answers. Our Splunk experts will manage your IT backend so you can concentrate on your data. Splunk's cloud-based data analytics platform is fully managed and provisioned by Splunk. In as little as two days, you can go live. Software upgrades can be managed to ensure that you have the most recent functionality. With fewer requirements, you can tap into the data's value in days. Splunk Cloud is compliant with FedRAMP security standards and assists U.S. federal agencies, their partners, and them in making confident decisions and taking decisive actions at rapid speed. Splunk's mobile apps and augmented reality, as well as natural language capabilities, can help you increase productivity and contextual insight. Splunk solutions can be extended to any location by simply typing a phrase or tapping a finger. Splunk Cloud is designed to scale, from infrastructure management to data compliance. -
3
Adobe Acrobat
Adobe
$12.99 per month 79 RatingsAdobe Acrobat lets you stay connected with your team, no matter where you are working, thanks to simple workflows on desktop, mobile and web. Your needs are constantly changing. Your needs are always changing, and so is the way you work. Adobe Acrobat is constantly being improved and new features are added. When you purchase Adobe Acrobat Pro you will always receive the latest features as soon as they are released. Acrobat DC is used by more than five million organizations worldwide to create and edit smart PDFs, convert them to Microsoft Office formats and much more. Adobe Acrobat is the perfect tool to use when you are on the go and need to collaborate with colleagues located in different locations. Keep the collaboration going, no matter where you are. Adobe Acrobat allows you to share PDFs that can be viewed, signed, and reviewed. You can also track the progress of these PDFs from any device. -
4
CrowdStrike Falcon
CrowdStrike
8 RatingsThe Falcon Platform is flexible, extensible, and adaptable when it comes to your endpoint security requirements. You can choose from the bundles listed above or any of these modules. Additional modules can be added to Falcon Endpoint Protection packages. Individual modules can be purchased without the need for a Falcon Endpoint Protection bundle. Customers who have more stringent compliance requirements or operational requirements will find our specialized products useful. -
5
ServiceNow
ServiceNow
$100 per month 1 RatingDigitize your workflows and they will love you for it. Your company will be more productive and your employees more engaged. ServiceNow makes work more enjoyable for employees. ServiceNow transforms old, manual ways to work into modern digital workflows so customers and employees get what they need when they need it. It's fast, simple, and easy. ServiceNow provides digital workflows that deliver great experiences and increase productivity for employees and enterprises. ServiceNow simplifies the complexity of work with a single enterprise cloud platform. The Now Platform: An intelligent, intuitive cloud platform that allows you to work smarter. You can choose from our workflows, or create your own apps. Our product portfolio is built on the Now Platform and delivers the IT, Employee, Customer, and Customer Workflows that matter. We also offer enterprise solutions to help you drive every aspect of your digital transformation. Get the amazing experiences you desire and unlock the productivity that you need. Now, native mobile capabilities are available for every day work across the enterprise. -
6
Elastic Observability
Elastic
$16 per monthThe most widely used observability platform, built on the ELK Stack, is the best choice. It converges silos and delivers unified visibility and actionable insight. All your observability data must be in one stack to effectively monitor and gain insight across distributed systems. Unify all data from the application, infrastructure, user, and other sources to reduce silos and improve alerting and observability. Unified solution that combines unlimited telemetry data collection with search-powered problem resolution for optimal operational and business outcomes. Converge data silos with the ingesting of all your telemetry data from any source, in an open, extensible and scalable platform. Automated anomaly detection powered with machine learning and rich data analysis can speed up problem resolution. -
7
VMRay
VMRay
VMRay provides technology partners and enterprises worldwide with the best-in-class, scalable and automated malware analysis and detection systems that significantly reduce their vulnerability to malware-related threats and attacks. -
8
Qualys TruRisk Platform
Qualys
$500.00/month Qualys TruRisk Platform, formerly Qualys Cloud Platform. The revolutionary architecture behind Qualys IT, security and compliance cloud apps. Qualys TruRisk Platform provides a continuous, always on assessment of your global security, compliance, and IT posture. You can see all your IT assets in 2 seconds, no matter where they are located. With automated, built in threat prioritization and patching, as well as other response capabilities, this is a complete end-to-end solution. Qualys TruRisk Platform sensor are always active, whether on premises, endpoints, mobile, containers, or in the cloud. This gives you continuous visibility of your IT assets in just 2 seconds. The sensors are self-updating and centrally managed, they can be remotely deployed, and they can also be virtual appliances or lightweight agents. Qualys TruRisk Platform is an end-toend solution that allows you to avoid the costs and complexity of managing multiple security vendors. -
9
ReversingLabs Titanium Platform
ReversingLabs
Advanced malware analysis platform that detects malicious files faster through automated static analysis. It can be used in any cloud and any environment. More than 360 file formats were processed and 3600 file types were identified from various platforms, applications and malware families. Real-time, deep inspection and analysis of files. This can be scaled to 150 million files per hour without dynamic execution. Connectors that are tightly coupled integrate industry-leading email, SIEM and SOAR platforms, as well as EDR, SIEM and SIEM. Unique Automated Static Analysis completely dissects the internal contents of files in just 5 ms, without execution, which eliminates the need for dynamic analysis in most instances. -
10
Dragos Platform
Dragos
The Dragos Platform is the most trusted industrial controls systems (ICS) cybersecurity technology. It provides comprehensive visibility of your ICS/OT assets, threats and best-practice guidance on how to respond before a major compromise. Dragos Platform was designed by practitioners and is a security tool that ensures your team has the most current tools to fight industrial adversaries. It was developed by experts who are on the frontlines of fighting, combating, and responding to the most advanced ICS threats. The Dragos Platform analyses multiple data sources, including protocols, network traffic and data historians, host logs and asset characterizations. This gives you unparalleled visibility into your ICS/OT environment. The Dragos Platform quickly detects malicious behavior in your ICS/OT network and provides context to alerts. False positives are reduced for unrivalled threat detection. -
11
Sixgill Sense
Sixgill
The platform is easy to use and quick to implement machine learning and computer vision workflows. Sense makes it easy to create and deploy AI IoT solutions on any cloud, edge or on-premise. Learn how Sense makes it easy for AI/ML teams to create and deploy AI IoT solutions to any cloud, the edge or on-premise. It is powerful enough for ML engineers but simple enough for subject matter experts. Sense Data Annotation maximizes the success of your machine-learning models by making it the easiest and fastest way to label image and video data for high-quality training datasets. The Sense platform provides one-touch labeling integration to enable continuous machine learning at edge for simplified management. -
12
ThreatBlockr
ThreatBlockr
The only way to stop every threat from reaching your network is to use ThreatBlockr®. Cybercriminals are attracted to networks that rely solely on outdated firewall technology. They don't include other modern security layers such as ThreatBlockr®. Encrypted attacks can easily blindfire on firewalls. They can be easily accessed by port forwarding fragmented, packet attack. They are often misconfigured. They can also be confused by simple extended internet and messaging protocols. Side-channel attacks and BYOD can all make the problem worse. ThreatBlockr®, which is available on-premise or in the cloud, allows organizations to instantly protect their networks without having to re-engineer existing security systems. ThreatBlockr®, a security solution that can be deployed today, will help you get back to work with the assurance that you are secure from wherever you may be. You can create a perfect protected network and increase firewall efficiency. -
13
Chronicle SOAR
Chronicle
Playbooks can be used to speed up time-to-value, and allow for easy scaling as you grow. You can address common problems like ransomware and phishing with ready-to-use use cases that include playbooks, simulated alarms, and tutorials. Drag and drop is all it takes to create playbooks that organize hundreds of the tools that you rely upon. Automate repetitive tasks to help you respond faster and make more time for high-value work. Optimize, troubleshoot and iterate playbooks using lifecycle management capabilities such as run analytics, reusable blocks, version control, rollback, and run analytics. Integrate threat intelligence at each step and visualize the most relevant contextual data for each threat, including who did what and when, and the relationships between all entities attached to an event or product. The patent-pending technology automatically groups related alerts into one threat-centric case. This allows a single analyst the ability to efficiently investigate and respond.
- Previous
- You're on page 1
- Next