Integrazioni per Data Fabric for Security

Usa gli strumenti che desideri

Riunisci tutti i tuoi dati con il nostro Data Fabric for Security e ottieni una visione completa del tuo livello di rischio. Gli oltre 150 connector predefiniti si integrano con gli strumenti di sicurezza e le piattaforme cloud più comuni, mentre il nostro connector AnySource™ ti consente di importare qualsiasi altra cosa: applicazioni personalizzate, file piatti e molto altro.

Il Data Fabric for Security è alla base delle soluzioni esistenti e future per la gestione dell'esposizione, tra cui: Asset Exposure Management, Risk360 e Unified Vulnerability Management.

Filtra per

Integrazioni

Acunetix
Acunetix
Altro 
The Zscaler Data Fabric for Security features a prebuilt connector to Akamai API Security (formerly known as NoName)
Akamai API Security (NoName)
Sicurezza delle API 
Apiiro SCA
Apiiro SCA
SCA 
Apiiro Secrets
Apiiro Secrets
Secrets Management 
Apiiro Terraform
Apiiro Terraform
Gestione delle vulnerabilità, Configuration Management 
Aqua
Aqua
Container Security, CSPM 
ArcticWolf
ArcticWolf
CSPM, Risposta agli incidenti, Gestione delle vulnerabilità 
Armis Devices
Armis
Asset Discovery & Management, Raccolta di informazioni sulle minacce. 
Arnica
Arnica
Configuration Management, SCA 
AttackForge
AttackForge
Penetration Testing 
The Zscaler Data Fabric for Security features a prebuilt connector to AWS Accounts.
AWS Accounts
AWS 
AWS CloudTrail
AWS CloudTrail
Logs, AWS, IT Services Management 
AWS DNS Query Logs
AWS DNS Query Logs
AWS, Logs 
AWS EC2
AWS EC2
Cloud Inventory, AWS 
AWS ECR
AWS ECR
AWS, Cloud Inventory 
AWS EKS
AWS EKS
Cloud Inventory, AWS 
AWS Inspector
AWS Inspector
AWS, Gestione delle vulnerabilità 
The Zscaler Data Fabric for Security features a prebuilt connector to AWS Network.
AWS Network
AWS, Gestione della rete 
AWS RDS
AWS RDS
AWS, Cloud Inventory, Backup & Recovery 
AWS S3
AWS S3
AWS, Data Storage 
AWS SecurityHub
AWS SecurityHub
AWS, CSPM 
AWS Server Logs
AWS Server Logs
AWS, Logs 
Axonius Platform
Axonius Platform
Asset Discovery & Management 
Azure Blob Storage
Azure Blob Storage
Azure/Microsoft, Data Storage 
Azure Defender Alerts
Azure Defender Alerts
Azure/Microsoft, Risposta agli incidenti 
Azure Defender Assets
Azure Defender Assets
Azure/Microsoft, Asset Discovery & Management, CSPM 
Azure Defender Incidents
Azure Defender Incidents
Azure/Microsoft, Risposta agli incidenti 
Azure Defender Software Vulnerabilities by Machine
Azure Defender Software Vulnerabilities by Machine
Azure/Microsoft, Gestione delle vulnerabilità 
Azure Defender Vulnerabilities
Azure Defender Vulnerabilities
Azure/Microsoft, Gestione delle vulnerabilità 
Bitsight
Bitsight
EASM 
Black Duck
Black Duck
SCA 
Box
Box
Data Storage 
The Zscaler Data Fabric for Security features a prebuilt connector to Burp Suite
Burp Suite
Penetration Testing, Gestione delle vulnerabilità 
The Zscaler Data Fabric for Security features a prebuilt connector to Broadcom Carbon Black
Carbon Black
EDR, Risposta agli incidenti 
Checkmarx - SAST
Checkmarx - SAST
SAST 
Checkmarx - SCA
Checkmarx - SCA
SCA 
CISA KEV
CISA KEV
Gestione delle vulnerabilità, Raccolta di informazioni sulle minacce. 
Cisco DNA
Cisco DNA
Automation 
Claroty
Claroty xDome
Altro 
Code42
Code42
DLP 
CrowdStrike Falcon
CrowdStrike Falcon
EDR, Risposta agli incidenti, Gestione delle vulnerabilità 
CyCognito
CyCognito
EASM 
Cyera
Cyera
Asset Discovery & Management, DLP 
Data Theorem
Data Theorem
Asset Discovery & Management, Compliance 
Datto
Datto
Backup & Recovery 
Dependabot
Dependabot
SCA 
Digital Shadows
Digital Shadows
SOAR 
DockerHub
DockerHub
CI/CD, Logs 
EKS S3 Logs
EKS S3 Logs
Logs, Data Storage, Container Security, AWS 
Exploit Database
Exploit Database
Raccolta di informazioni sulle minacce. 
Exploit Prediction Scoring System (EPSS)
Exploit Prediction Scoring System (EPSS)
Gestione delle vulnerabilità, Raccolta di informazioni sulle minacce. 
Flexera
Flexera
Asset Discovery & Management, IT Services Management 
Freshservice
Freshservice
IT Services Management, Business Applications 
GitHub
GitHub
CI/CD, Issue Trackers 
GitHub Audit Logs
GitHub Audit Logs
Logs 
Google Access Transparency
Google Access Transparency
Google 
Google Cloud Platform Assets
Google Cloud Platform Assets
Google, Gestione delle vulnerabilità 
Google Cloud Platform Misconfigurations
Google Cloud Platform Misconfigurations
Google, Gestione delle vulnerabilità 
Google Cloud Platform Vulnerabilities
Google Cloud Platform Vulnerabilities
Google, Gestione delle vulnerabilità 
Google Context Aware Access
Google Context Aware Access
Google 
Google Sheets
Google Sheets
Business Applications, Google 
Google Workspace - Admin Activity
Google Workspace - Admin Activity
Logs, IT Services Management, Google 
Google Workspace - Calendar Activity
Google Workspace - Calendar Activity
Business Applications, Google, Logs 
Google Workspace - Chat Activity
Google Workspace - Chat Activity
Business Applications, Google, Logs 
Google Workspace - Chrome Activity
Google Workspace - Chrome Activity
Business Applications, Google, Logs 
Google Workspace - Data Studio Activity
Google Workspace - Data Studio Activity
Google, Logs 
Google Workspace - Drive Activity
Google Workspace - Drive Activity
Business Applications, Google, Logs 
Google Workspace - Enterprise Groups Activity
Google Workspace - Enterprise Groups Activity
Business Applications, Google, Logs 
Google Workspace - Google Cloud Platform Activity
Google Workspace - Google Cloud Platform Activity
Business Applications, Google, Logs 
Google Workspace - Groups Activity
Google Workspace - Groups Activity
Business Applications, Google, Logs 
Google Workspace - Jamboard Activity
Google Workspace - Jamboard Activity
Business Applications, Google, Logs 
Google Workspace - Keep Activity
Google Workspace - Keep Activity
Business Applications, Google, Logs 
Google Workspace - Login Activity
Google Workspace - Login Activity
Logs, IT Services Management, Google 
Google Workspace - Mobile Activity
Google Workspace - Mobile Activity
Logs, IT Services Management, Google 
Google Workspace - OAuth2 Token Activity
Google Workspace - OAuth2 Token Activity
Logs, IT Services Management, Google, IAM 
Google Workspace - Rules Activity
Google Workspace - Rules Activity
Business Applications, Google, Logs 
Google Workspace - SAML Activity
Google Workspace - SAML Activity
Business Applications, Google, Logs 
Google Workspace - Tokens Activity
Google Workspace - Tokens Activity
Business Applications, Google, Logs 
Google Workspace - User Accounts Activity
Google Workspace - User Accounts Activity
Business Applications, Google, Logs 
Grype
Grype
Container Security, Gestione delle vulnerabilità 
HackerOne
HackerOne
Penetration Testing 
Halo
Halo
Network Scanning 
HCL BigFix
HCL BigFix
EDR 
Horizon3.ai
Horizon3.ai
Penetration Testing 
IBM Security Randori Recon Detections
IBM Security Randori Recon Detections
Asset Discovery & Management 
IBM Security Randori Recon Targets
IBM Security Randori Recon Targets
Asset Discovery & Management, Altro 
Illumio
Illumio
Network Scanning 
Invicti
Invicti
DAST 
Jamf
Jamf
IT Services Management 
Jfrog Xray
Jfrog Xray
SCA 
Jira Audit Logs
Jira Audit Logs
Logs, IT Services Management 
Jira Issues
Jira Issues
Issue Trackers, IT Services Management 
Kodem
Kodem
Gestione delle vulnerabilità, Notifications, Asset Discovery & Management 
Lacework
Lacework FortiCNAPP
CSPM, Network Scanning, Container Security 
Legit Security
Legit Security
CI/CD, SCA, Automation 
Mandiant
Mandiant
Raccolta di informazioni sulle minacce. 
The Zscaler Data Fabric for Security features a prebuilt connector to Mend.io
Mend.io
Container Security, SAST 
Microsoft Intune
Microsoft Intune
Azure/Microsoft, Asset Discovery & Management 
Microsoft Intune Audit Events
Microsoft Intune Audit Events
Azure/Microsoft, Logs 
Microsoft Office 365
Microsoft Office 365
Business Applications, Azure/Microsoft 
Mysql
Mysql
Data Storage, Search & Query 
The Zscaler Data Fabric for Security features a prebuilt connector to Netbox
Netbox
Gestione della rete 
NPM
NPM
CI/CD 
NVD
NVD
Raccolta di informazioni sulle minacce. 
Okta
Okta
IAM, Logs 
Oligo
Oligo
Altro 
Orca
Orca
CSPM, Raccolta di informazioni sulle minacce., Gestione delle vulnerabilità 
OSV
OSV
Raccolta di informazioni sulle minacce. 
Package Installer for Python (PIP)
Package Installer for Python (PIP)
CI/CD 
PAN Prisma Cloud
PAN Prisma Cloud
Container Security, CSPM 
Permiso
Permiso
IAM 
Qualys
Qualys
Gestione delle vulnerabilità, DAST, Container Security, Network Scanning 
Quokka
Quokka
DAST, SAST 
Rapid7
Rapid7
CSPM, SIEM, Gestione delle vulnerabilità, Raccolta di informazioni sulle minacce. 
Rapid7 InsightCloudSec
Rapid7 InsightCloudSec
CSPM, CI/CD, IAM, Gestione delle vulnerabilità 
Recorded Future Intelligence Cloud Platform
Recorded Future Intelligence Cloud Platform
Raccolta di informazioni sulle minacce. 
runZero
runZero
Asset Discovery & Management, Gestione delle vulnerabilità 
The Zscaler Data Fabric for Security features a prebuilt connector to SailPoint
SailPoint
IAM 
Security Scorecard
Security Scorecard
EASM, Raccolta di informazioni sulle minacce., Altro 
SentinelOne
SentinelOne
EDR, Gestione delle vulnerabilità 
ServiceNow
ServiceNow
Issue Trackers, IT Services Management 
Snowflake
Snowflake
Data Storage 
Snyk
Snyk
SCA, Container Security 
Snyk SAST
Snyk SAST
SAST 
Sonarcloud
Sonarcloud
SAST 
Sonarqube
Sonarqube
SAST, Asset Discovery & Management 
Status Cake
Status Cake
Observability 
Tanium
Tanium
Configuration Management, Gestione delle vulnerabilità, Compliance 
Tenable
Tenable
Asset Discovery & Management, DAST, Gestione delle vulnerabilità 
Tenable Nessus
Tenable Nessus
Network Scanning 
The Zscaler Data Fabric for Security features a prebuilt connector to Trend Micro Apex One
Trend Micro Apex One
EDR 
Veoci
Veoci
Backup & Recovery, Business Applications 
Veracode
Veracode
SAST, DAST, SCA 
Veracode SCA
Veracode SCA
SCA 
VulnCheckKEV
VulnCheck KEV
Raccolta di informazioni sulle minacce. 
Wiz
Wiz
CSPM, Configuration Management, Gestione delle vulnerabilità 
Zendesk
Zendesk
Business Applications 
Zscaler
Zscaler
Zscaler 
Zscaler AnySource
Zscaler AnySource
Anything 
Zscaler AnyTarget
Zscaler AnyTarget
Automation, Anything 
Avalor UVM Threat Intelligence
Zscaler Threat Intelligence
Raccolta di informazioni sulle minacce., Zscaler