Contact us

Vulcan Integrations

All
Application Security
Asset Data
Collaboration Tools
Deployment Tools
Other
Scan Data
Threat Intelligence
  • All
  • Application Security
  • Asset Data
  • Collaboration Tools
  • Deployment Tools
  • Other
  • Scan Data
  • Threat Intelligence

AWS EC2

Ingest host data from AWS EC2 to enrich asset risk posture and better prioritize vulnerabilities

AWS ECR

Ingest Docker container data from AWS ECR to enrich asset risk posture and better prioritize vulnerabilities

AWS ECS

Ingest container data from AWS ECS to enrich asset risk posture and better prioritize vulnerabilities

Azure

Ingest Azure asset data to enrich asset risk posture and better prioritize vulnerabilities

GCP

Ingest GCP asset data to enrich asset risk posture and better prioritize vulnerabilities

Microsoft Intune

Ingest Intune asset data to enrich asset risk posture and better prioritize vulnerabilities

ServiceNow CMDB

Ingest ServiceNow asset data to enrich asset risk posture and better prioritize vulnerabilities

Microsoft SCCM

Ingest SCCM asset data to enrich asset risk posture and better prioritize vulnerabilities

Did We Miss One?

Qualys

Prioritize and fix Qualys vulnerability scan findings across infrastructures

Rapid7

Prioritize and fix Rapid7 vulnerability scan findings across infrastructures

Tenable Nessus

Prioritize and fix Nessus vulnerability scan findings across cloud infrastructure

Tenable.io

Prioritize and fix Tenable.io vulnerability scan findings across cloud infrastructure

Tenable.io WAS

Prioritize and fix dynamic web application scan findings across websites

Tenable.sc

Prioritize and fix Tenable.sc vulnerability scan findings across on-prem infrastructure

AWS Inspector

Prioritize and fix vulnerability scan findings across applications deployed on AWS

Prisma Cloud Compute

Prioritize and fix vulnerability scan findings across cloud-native hosts and containers

Black Duck

Prioritize and fix Black Duck security findings across open source components

WhiteSource

Prioritize and fix WhiteSource security findings across open source components

Checkmarx CxSAST

Prioritize all Checkmarx application scan findings across code projects

Veracode SAST

Prioritize and fix Veracode application scan findings across code projects

Fortify SAST

Prioritize and fix Fortify application scan findings across code projects

Fortify DAST

Prioritize and fix Fortify security findings across web applications

Bugcrowd

Prioritize and fix pen-testing and bug-bounty findings discovered by Bugcrowd

HackerOne

Prioritize and fix pen-testing and bug-bounty findings discovered by HackerOne

jFrog Xray

Prioritize and fix container and application security findings discovered by JFrog

Snyk

Prioritize and fix vulnerabilities in open source libraries and containers discovered by Snyk

WhiteHat

Prioritize and fix WhiteHat application security findings across web applications and code projects

Intsights

Enrich asset and vulnerability data with threat intelligence to better understand asset risk posture and prioritize vulnerabilities

ServiceNow ITSM

Automatically create, assign and track ServiceNow incidents containing the right fix to each vulnerability

Atlassian Jira

Automatically create, assign and track Jira tickets containing the right fix to each vulnerability

Slack

Automatically share crucial vulnerability data to the relevant Slack channels

Microsoft Teams

Automatically share crucial vulnerability data to the relevant Teams channels

Chef

Deploy auto-generated Chef cookbooks to high-priority infrastructure vulnerabilities

Ansible

Deploy auto-generated Ansible playbooks to high-priority infrastructure vulnerabilities

Ivanti

Deploy auto-generated patches to high-priority Windows vulnerabilities on key Machine Groups

Microsoft SCCM

Deploy auto-generated Software Updates Groups to high-priority Windows vulnerabilities on key Device Collections

Puppet

Deploy auto-generated patches to high-priority application vulnerabilities

Snowflake

Ingest asset and vulnerability data from Snowflake to better understand asset risk posture and prioritize vulnerabilities

Request a Demo

Read Up

Lorem ipsum dolor sit amet, consetetur sadipscing elitr.
Lorem ipsum dolor sit amet, consetetur sadipscing elitr.
Lorem ipsum dolor sit amet, consetetur sadipscing elitr.

Request an Integration