BlogCareersContact Us

Vulcan Cyber connectors

Check out our out-of-the-box integrations, or connect your own tools.
Looking for a specific integration?
Try Vulcan Free and connect your own cyber risk tools
SEARCH BY:
All

Vulcan ConnectX

Vulcan ConnectX is a universal connector that allows the Vulcan Cyber platform to collect data from virtually any vulnerability and risk detection solution, infrastructure, cloud containers, code, applications, and more.

Acunetix

Acunetix is an automated web application security testing tool that audits your web applications by checking for vulnerabilities like SQL Injection, Cross site scripting and other exploitable vulnerabilities.

Ansible

Deploy auto-generated Ansible playbooks to high-priority infrastructure vulnerabilities

Aqua Security

Protect cloud native applications by minimizing their attack surface, and detecting vulnerabilities, embedded secrets, and other security issues during the development cycle.

Atlassian Jira

Automatically create, assign and track Jira tickets containing the right fix to each vulnerability

Amazon Inspector

Prioritize and fix vulnerability scan findings across applications deployed on AWS

AWS EC2

Ingest host data from AWS EC2 to enrich asset risk posture and better prioritize vulnerabilities

AWS ECR

Ingest Docker container data from AWS ECR to enrich asset risk posture and better prioritize vulnerabilities

AWS ECS

Ingest container data from AWS ECS to enrich asset risk posture and better prioritize vulnerabilities

Axonius

Enrich vulnerability and risk prioritization results with asset level context from Axonius.

Bugcrowd

Prioritize and fix pen-testing and bug-bounty findings discovered by Bugcrowd

Black Duck

Prioritize and fix Black Duck security findings across open source components

BurpSuite

Prioritize and fix Burpsuite application security findings across web applications and code projects

Checkmarx CxSAST

Prioritize all Checkmarx application scan findings across code projects

Chef

Deploy auto-generated Chef cookbooks to high-priority infrastructure vulnerabilities

CrowdStrike

Help enterprise security teams reduce vulnerability risk with immediate, automated mitigation actions ultimately protecting critical business assets and endpoints from fast-moving threats.

Fortify DAST

Prioritize and fix Fortify security findings across web applications

Fortify SAST

Prioritize and fix Fortify application scan findings across code projects

GitHub Code Scanning

Code scanning is a feature that you use to analyze the code in a GitHub repository to find security vulnerabilities and coding errors.

GitHub Dependabot

Dependabot provides automated dependency updates built into GitHub.

GCP

Ingest GCP asset data to enrich asset risk posture and better prioritize vulnerabilities

HackerOne

Prioritize and fix pen-testing and bug-bounty findings discovered by HackerOne

Intsights

Enrich asset and vulnerability data with threat intelligence to better understand asset risk posture and prioritize vulnerabilities

Ivanti

Deploy auto-generated patches to high-priority Windows vulnerabilities on key Machine Groups

Jamf

Increase asset awareness and context in your vulnerability and risk analysis with Jamf integration.

jFrog Xray

Prioritize and fix container and application security findings discovered by JFrog

Mandiant

Integrate your Mandiant service with Vulcan Cyber to automatically incorporate Mandiant's threat intelligence for more accurate risk analysis.

Microsoft Azure

Ingest Azure asset data to enrich asset risk posture and better prioritize vulnerabilities

Microsoft Defender for Cloud

Integrate Vulcan Cyber™ cyber risk management with Microsoft Defender for Cloud to deliver better cloud security posture management and orchestrated cyber risk reduction for Microsoft cloud assets.

Microsoft Defender for Endpoint

Integrate Vulcan Cyber™ cyber risk management with Microsoft Defender for Endpoint to deliver orchestrated cyber risk reduction for Microsoft and Linux endpoints.

Microsoft Defender Vulnerability Management

Integrate Vulcan Cyber™ cyber risk management with Microsoft Defender Vulnerability Management to deliver risk based prioritization and orchestrated cyber risk reduction.

Microsoft Intune

Ingest Intune asset data to enrich asset risk posture and better prioritize vulnerabilities

Microsoft SCCM asset data

Ingest SCCM asset data to enrich asset risk posture and better prioritize vulnerabilities

Microsoft SCCM software updates

Deploy auto-generated Software Updates Groups to high-priority Windows vulnerabilities on key Device Collections

Microsoft Teams

Automatically share crucial vulnerability data to the relevant Teams channels

Netsparker

Scan websites, web applications (regardless of the platform or the language with which they are built) and web services, and identify security flaws.

Analyze, prioritize and mitigate cloud security risks faster.

Outpost24

Analyze and prioritize scan data from Outpost24 for applications, cloud and infrastructure assets.

Prisma Cloud Compute

Prioritize and fix vulnerability scan findings across cloud-native hosts and containers

Puppet

Deploy auto-generated patches to high-priority application vulnerabilities

Qualys

Prioritize and fix Qualys vulnerability scan findings across infrastructures

Rapid7

Prioritize and fix Rapid7 vulnerability scan findings across infrastructures

SentinelOne

Collect and analyze asset and vulnerability data from SentinelOne for more accurate vulnerability and risk prioritization.

ServiceNow CMDB

Ingest ServiceNow asset data to enrich asset risk posture and better prioritize vulnerabilities

ServiceNow ITSM

Automatically create, assign and track ServiceNow incidents containing the right fix to each vulnerability

ShiftLeft SAST/SCA

Identify, analyze and prioritize vulnerabilities in application code to make fixes earlier in the development cycle.

Slack

Automatically share crucial vulnerability data to the relevant Slack channels

Snowflake

Ingest asset and vulnerability data from Snowflake to better understand asset risk posture and prioritize vulnerabilities

Snyk

Prioritize and fix vulnerabilities in open source libraries and containers discovered by Snyk

SonarQube

Mitigate application risk with integrated secure code from SonarQube

Sonatype

Mitigate application risk with integrated secure code from Sonatype

Synak

Analyze pen testing data from Synak for additional vulnerability and risk context to deliver more accurate awareness and prioritization.

Tenable Nessus

Prioritize and fix Nessus vulnerability scan findings across cloud infrastructure

Tenable.io

Prioritize and fix Tenable.io vulnerability scan findings across cloud infrastructure

Tenable.io WAS

Prioritize and fix dynamic web application scan findings across websites

Tenable.sc

Prioritize and fix Tenable.sc vulnerability scan findings across on-prem infrastructure

Tanium

Enrich vulnerability prioritization data with asset context from Tanium.

Veracode SAST

Prioritize and fix Veracode application scan findings across code projects

Veracode SCA

Provides visibility into application status across all common testing types in a single view.

WhiteHat

Prioritize and fix WhiteHat application security findings across web applications and code projects

WhiteSource

Prioritize and fix WhiteSource security findings across open source components

Wiz

Analyze and prioritize your cloud vulnerability and risk quickly and accurately with Wiz integration.

Own your risk.