New Google vulnerability: Learn about zero-day CVE-2022-3075 in Chorme web browser  | Fix now >> 

The CyberRisk Summit on-demand: Watch the latest #CRS anytime, anywhere | Watch now  >>

New report: Mapping MITRE ATT&CK framework to CVEs |  Read more  >>

Vulcan Cyber connectors

Check out our out-of-the-box cyber risk & vulnerability management  integrations, or connect your own tools.

New in integrations: Vulcan platform now supports Veracode SCA, Acunetix, NetSparker. Watch for more!

Looking for a specific integration? Try Vulcan Free and connect your own cyber risk tools START FOR FREE

SEARCH BY:

Vulcan ConnectX

A universal connector that allows the Vulcan Cyber platform to collect data from virtually any vulnerability

Tenable.sc

Prioritize and fix Tenable.sc vulnerability scan findings across on-prem infrastructure

Tenable.io WAS

Prioritize and fix dynamic web application scan findings across websites

Tenable Nessus

Prioritize and fix Nessus vulnerability scan findings across cloud infrastructure

Snyk

Prioritize and fix vulnerabilities in open source libraries and containers discovered by Snyk

Wiz

Analyze and prioritize your cloud vulnerability and risk quickly and accurately with Wiz integration

WhiteHat

Prioritize and fix WhiteHat application security findings across web applications and code projects

WhiteSource

Prioritize and fix WhiteSource security findings across open source components

Detectify

Get complete coverage of your application attack surface and enrich discovered assets with IPs, protocols, and ports

Veracode SCA

Provides visibility into application status across all common testing types in a single view

Veracode SAST

Prioritize and fix Veracode application scan findings across code projects

Tanium

Enrich vulnerability prioritization data with asset context from Tanium

Synack

Analyze pen testing data from Synak for additional vulnerability and risk context to deliver more accurate awareness and prioritization

Sonatype

Mitigate application risk with integrated secure code from Sonatype

SonarQube

Mitigate application risk with integrated secure code from SonarQube

Slack

Automatically share crucial vulnerability data to the relevant Slack channels

Snowflake

Ingest asset and vulnerability data from Snowflake to better understand asset risk posture and prioritize vulnerabilities

ShiftLeft SAST/SCA

Identify, analyze and prioritize vulnerabilities in application code to make fixes earlier in the development cycle

ServiceNow ITSM

Automatically create, assign and track ServiceNow incidents containing the right fix to each vulnerability

ServiceNow CMDB

Ingest ServiceNow asset data to enrich asset risk posture and better prioritize vulnerabilities.

SentinelOne

Collect and analyze asset and vulnerability data from SentinelOne for more accurate vulnerability and risk prioritization

Rapid7

Prioritize and fix Rapid7 vulnerability scan findings across infrastructures

Qualys

Prioritize and fix Qualys vulnerability scan findings across infrastructures

Puppet

Deploy auto-generated patches to high-priority application vulnerabilities

Prisma Cloud Compute

Prioritize and fix vulnerability scan findings across cloud-native hosts and containers

Outpost24

Analyze and prioritize scan data from Outpost24 for applications, cloud and infrastructure assets

Orca Security

Analyze, prioritize and mitigate cloud security risks faster

Netsparker

Scan websites, web applications (regardless of the platform or the language with which they are built) and web services, and identify security flaws

Microsoft Teams

Automatically share crucial vulnerability data to the relevant Teams channels

Microsoft SCCM software updates

Deploy auto-generated Software Updates Groups to high-priority Windows vulnerabilities on key Device Collections

Microsoft SCCM asset data

Ingest SCCM asset data to enrich asset risk posture and better prioritize vulnerabilities

Microsoft Intune

Ingest Intune asset data to enrich asset risk posture and better prioritize vulnerabilities

Microsoft Azure

Ingest Azure asset data to enrich asset risk posture and better prioritize vulnerabilities

Mandiant

Integrate your Mandiant service with Vulcan Cyber to automatically incorporate Mandiant's threat intelligence for more accurate risk analysis

jFrog Xray

Prioritize and fix container and application security findings discovered by JFrog

Jamf

Increase asset awareness and context in your vulnerability and risk analysis with Jamf integration

Ivanti

Deploy auto-generated patches to high-priority Windows vulnerabilities on key Machine Groups

Intsights

Enrich asset and vulnerability data with threat intelligence to better understand asset risk posture and prioritize vulnerabilities

HackerOne

Prioritize and fix pen-testing and bug-bounty findings discovered by HackerOne

GCP

Ingest GCP asset data to enrich asset risk posture and better prioritize vulnerabilities

GitHub Dependabot

Dependabot provides automated dependency updates built into GitHub

GitHub Code Scanning

Code scanning is a feature that you use to analyze the code in a GitHub repository to find security vulnerabilities and coding errors

Fortify SAST

Prioritize and fix Fortify application scan findings across code projects

Fortify DAST

Prioritize and fix Fortify security findings across web applications

Chef

Deploy auto-generated Chef cookbooks to high-priority infrastructure vulnerabilities

Checkmarx CxSAST

Prioritize all Checkmarx application scan findings across code projects

BurpSuite

Prioritize and fix Burpsuite application security findings across web applications and code projects

Black Duck

Prioritize and fix Black Duck security findings across open source components

Bugcrowd

Prioritize and fix pen-testing and bug-bounty findings discovered by Bugcrowd

Microsoft Defender for Cloud

Deliver better cloud security posture management and orchestrated cyber risk reduction for Microsoft cloud assets

Axonius

Enrich vulnerability and risk prioritization results with asset level context from Axonius

AWS ECS

Ingest container data from AWS ECS to enrich asset risk posture and better prioritize vulnerabilities

AWS ECR

Ingest Docker container data from AWS ECR to enrich asset risk posture and better prioritize vulnerabilities

AWS EC2

Ingest host data from AWS EC2 to enrich asset risk posture and better prioritize vulnerabilities

ATLASSIAN JIRA

Automatically create, assign and track Jira tickets containing the right fix to each vulnerability

AQUA SECURITY

Protect cloud native applications by minimizing their attack surface, and detecting vulnerabilities, embedded secrets, and other security issues during the development cycle

ANSIBLE

Deploy auto-generated Ansible playbooks to high-priority infrastructure vulnerabilities

ACUNETIX

Audit your web applications by checking for vulnerabilities like SQL Injection, Cross site scripting and other exploitable vulnerabilities

Microsoft Defender Vulnerability Management

Deliver risk based prioritization and orchestrated cyber risk reduction

Amazon Inspector

Prioritize and fix vulnerability scan findings across applications deployed on AWS

Microsoft Defender for Endpoint

Deliver orchestrated cyber risk reduction for Microsoft and Linux endpoints

Tenable.io

Prioritize and fix Tenable.io vulnerability scan findings across cloud infrastructure

CrowdStrike

Protect endpoints from fast-moving threats with automated mitigation actions

Own your risk.