CISA’s KEV additions: Stay on top of the recently added CVEs, and how to fix them | Read more >>

Q1 Vulnerability Watch: Discover the notable vulnerabilities form Q1 2023 and start Q2 more secure | Get the report >>

The CyberRisk Summit is back: Join us on May 23 to learn how cyber risk experts put vulnerability risk in context | Get your free ticket >>

CISA’s KEV additions: Stay on top of the recently added CVEs, and how to fix them | Read more >>

Q1 Vulnerability Watch: Discover the notable vulnerabilities form Q1 2023 and start Q2 more secure | Get the report >>

The CyberRisk Summit is back: Join us on May 23 to learn how cyber risk experts put vulnerability risk in context | Get your free ticket >>

TRY VULCAN FREE

Vulcan Cyber connectors

Check out our out-of-the-box cyber risk & vulnerability management  integrations, or connect your own tools.

New in integrations: Vulcan platform now supports Veracode SCA, Acunetix, NetSparker. Watch for more!

Looking for a specific integration? Try Vulcan Free and connect your own cyber risk tools START FOR FREE

SEARCH BY:

ACUNETIX

Audit your web applications by checking for vulnerabilities like SQL Injection, Cross site scripting and other exploitable vulnerabilities

Amazon Inspector

Prioritize and fix vulnerability scan findings across applications deployed on AWS

ANSIBLE

Deploy auto-generated Ansible playbooks to high-priority infrastructure vulnerabilities

AQUA Container security (CWPP)

Protect cloud native applications by minimizing their attack surface, and detecting vulnerabilities, embedded secrets, and other security issues during the development cycle

AQUA SECURITY

Protect cloud native applications by minimizing their attack surface, and detecting vulnerabilities, embedded secrets, and other security issues during the development cycle

ATLASSIAN JIRA

Automatically create, assign and track Jira tickets containing the right fix to each vulnerability

AWS EC2

Ingest host data from AWS EC2 to enrich asset risk posture and better prioritize vulnerabilities

AWS ECR

Ingest Docker container data from AWS ECR to enrich asset risk posture and better prioritize vulnerabilities

AWS ECS

Ingest container data from AWS ECS to enrich asset risk posture and better prioritize vulnerabilities

Axonius

Enrich vulnerability and risk prioritization results with asset level context from Axonius

BITSIGHT

Gain cyber risk analytics and reporting to track remediation performance and progress

Black Duck

Prioritize and fix Black Duck security findings across open source components

Bugcrowd

Prioritize and fix pen-testing and bug-bounty findings discovered by Bugcrowd

BurpSuite

Prioritize and fix Burpsuite application security findings across web applications and code projects

Checkmarx CxSAST

Prioritize all Checkmarx application scan findings across code projects

Chef

Deploy auto-generated Chef cookbooks to high-priority infrastructure vulnerabilities

CrowdStrike

Protect endpoints from fast-moving threats with automated mitigation actions

Detectify

Get complete coverage of your application attack surface and enrich discovered assets with IPs, protocols, and ports

Fortify DAST

Prioritize and fix Fortify security findings across web applications

Fortify SAST

Prioritize and fix Fortify application scan findings across code projects

GCP

Ingest GCP asset data to enrich asset risk posture and better prioritize vulnerabilities

GitHub Code Scanning

Code scanning is a feature that you use to analyze the code in a GitHub repository to find security vulnerabilities and coding errors

GitHub Dependabot

Dependabot provides automated dependency updates built into GitHub

HackerOne

Prioritize and fix pen-testing and bug-bounty findings discovered by HackerOne

Intsights

Enrich asset and vulnerability data with threat intelligence to better understand asset risk posture and prioritize vulnerabilities

Ivanti

Deploy auto-generated patches to high-priority Windows vulnerabilities on key Machine Groups

Jamf

Increase asset awareness and context in your vulnerability and risk analysis with Jamf integration

jFrog Xray

Prioritize and fix container and application security findings discovered by JFrog

Mandiant

Integrate your Mandiant service with Vulcan Cyber to automatically incorporate Mandiant's threat intelligence for more accurate risk analysis

Microsoft Azure

Ingest Azure asset data to enrich asset risk posture and better prioritize vulnerabilities

Microsoft Defender for Cloud

Deliver better cloud security posture management and orchestrated cyber risk reduction for Microsoft cloud assets

Microsoft Defender for Endpoint

Deliver orchestrated cyber risk reduction for Microsoft and Linux endpoints

Microsoft Defender Vulnerability Management

Deliver risk based prioritization and orchestrated cyber risk reduction

Microsoft Intune

Ingest Intune asset data to enrich asset risk posture and better prioritize vulnerabilities

Microsoft SCCM asset data

Ingest SCCM asset data to enrich asset risk posture and better prioritize vulnerabilities

Microsoft SCCM software updates

Deploy auto-generated Software Updates Groups to high-priority Windows vulnerabilities on key Device Collections

Microsoft Teams

Automatically share crucial vulnerability data to the relevant Teams channels

Netsparker

Scan websites, web applications (regardless of the platform or the language with which they are built) and web services, and identify security flaws

Orca Security

Analyze, prioritize and mitigate cloud security risks faster

Outpost24

Analyze and prioritize scan data from Outpost24 for applications, cloud and infrastructure assets

Prisma Cloud Compute

Prioritize and fix vulnerability scan findings across cloud-native hosts and containers

Prisma Cloud CSPM

Prioritize and fix vulnerability scan findings across cloud-native hosts and containers

Puppet

Deploy auto-generated patches to high-priority application vulnerabilities

Qualys

Prioritize and fix Qualys vulnerability scan findings across infrastructures

Rapid7

Prioritize and fix Rapid7 vulnerability scan findings across infrastructures

Rapid7 IntsightAppSep

Efficiently reduce risk in modern web applications

Recorded future

Enrich with intelligence to gain complete coverage across attack surfaces

Security ScoreCard

Understand your accurate organization risk with security posture ratings and advanced reporting

SentinelOne

Collect and analyze asset and vulnerability data from SentinelOne for more accurate vulnerability and risk prioritization

ServiceNow CMDB

Ingest ServiceNow asset data to enrich asset risk posture and better prioritize vulnerabilities.

ServiceNow ITSM

Automatically create, assign and track ServiceNow incidents containing the right fix to each vulnerability

ShiftLeft SAST/SCA

Identify, analyze and prioritize vulnerabilities in application code to make fixes earlier in the development cycle

Slack

Automatically share crucial vulnerability data to the relevant Slack channels

Snowflake

Ingest asset and vulnerability data from Snowflake to better understand asset risk posture and prioritize vulnerabilities

Snyk

Prioritize and fix vulnerabilities in open source libraries and containers discovered by Snyk

SonarQube

Mitigate application risk with integrated secure code from SonarQube

Sonatype

Mitigate application risk with integrated secure code from Sonatype

Synack

Analyze pen testing data from Synak for additional vulnerability and risk context to deliver more accurate awareness and prioritization

Tanium

Enrich vulnerability prioritization data with asset context from Tanium

Tenable Nessus

Prioritize and fix Nessus vulnerability scan findings across cloud infrastructure

Tenable.io

Prioritize and fix Tenable.io vulnerability scan findings across cloud infrastructure

Tenable.io WAS

Prioritize and fix dynamic web application scan findings across websites

Tenable.sc

Prioritize and fix Tenable.sc vulnerability scan findings across on-prem infrastructure

Veracode SAST

Prioritize and fix Veracode application scan findings across code projects

Veracode SCA

Provides visibility into application status across all common testing types in a single view

Vulcan ConnectX

A universal connector that allows the Vulcan Cyber platform to collect data from virtually any vulnerability

WhiteHat

Prioritize and fix WhiteHat application security findings across web applications and code projects

WhiteSource

Prioritize and fix WhiteSource security findings across open source components

Wiz

Analyze and prioritize your cloud vulnerability and risk quickly and accurately with Wiz integration

Own your risk.