Data Fabric para integraciones de seguridad

Utilice las herramientas que desee

Reúna todos sus datos con nuestro Data Fabric for Security y obtenga una visión completa de su riesgo. Nuestros más de 150 conectores prediseñados integran las herramientas de seguridad y plataformas en la nube más comunes, y nuestro conector AnySource™ le permite incorporar cualquier otro elemento: aplicaciones personalizadas, archivos planos y más.

Data Fabric for Security impulsa las soluciones de gestión de exposición actuales y futuras, como la gestión de exposición de activos, Risk360 y la gestión unificada de vulnerabilidades.

Filtrar por

Integraciones

Acunetix
Acunetix
Otro 
The Zscaler Data Fabric for Security features a prebuilt connector to Akamai API Security (formerly known as NoName)
Akamai API Security (NoName)
Seguridad de API 
Apiiro SCA
Apiiro SCA
SCA 
Apiiro Secrets
Apiiro Secrets
Secrets Management 
Apiiro Terraform
Apiiro Terraform
Gestión de vulnerabilidades, Configuration Management 
Aqua
Aqua
Container Security, CSPM 
ArcticWolf
ArcticWolf
CSPM, Respuesta a incidentes, Gestión de vulnerabilidades 
Armis Devices
Armis
Asset Discovery & Management, Información sobre amenazas 
Arnica
Arnica
Configuration Management, SCA 
AttackForge
AttackForge
Penetration Testing 
The Zscaler Data Fabric for Security features a prebuilt connector to AWS Accounts.
AWS Accounts
AWS 
AWS CloudTrail
AWS CloudTrail
Logs, AWS, IT Services Management 
AWS DNS Query Logs
AWS DNS Query Logs
AWS, Logs 
AWS EC2
AWS EC2
Cloud Inventory, AWS 
AWS ECR
AWS ECR
AWS, Cloud Inventory 
AWS EKS
AWS EKS
Cloud Inventory, AWS 
AWS Inspector
AWS Inspector
AWS, Gestión de vulnerabilidades 
The Zscaler Data Fabric for Security features a prebuilt connector to AWS Network.
AWS Network
AWS, Gestión de redes 
AWS RDS
AWS RDS
AWS, Cloud Inventory, Backup & Recovery 
AWS S3
AWS S3
AWS, Data Storage 
AWS SecurityHub
AWS SecurityHub
AWS, CSPM 
AWS Server Logs
AWS Server Logs
AWS, Logs 
Axonius Platform
Axonius Platform
Asset Discovery & Management 
Azure Blob Storage
Azure Blob Storage
Azure/Microsoft, Data Storage 
Azure Defender Alerts
Azure Defender Alerts
Azure/Microsoft, Respuesta a incidentes 
Azure Defender Assets
Azure Defender Assets
Azure/Microsoft, Asset Discovery & Management, CSPM 
Azure Defender Incidents
Azure Defender Incidents
Azure/Microsoft, Respuesta a incidentes 
Azure Defender Software Vulnerabilities by Machine
Azure Defender Software Vulnerabilities by Machine
Azure/Microsoft, Gestión de vulnerabilidades 
Azure Defender Vulnerabilities
Azure Defender Vulnerabilities
Azure/Microsoft, Gestión de vulnerabilidades 
Bitsight
Bitsight
EASM 
Black Duck
Black Duck
SCA 
Box
Box
Data Storage 
The Zscaler Data Fabric for Security features a prebuilt connector to Burp Suite
Burp Suite
Penetration Testing, Gestión de vulnerabilidades 
The Zscaler Data Fabric for Security features a prebuilt connector to Broadcom Carbon Black
Carbon Black
EDR, Respuesta a incidentes 
Checkmarx - SAST
Checkmarx - SAST
SAST 
Checkmarx - SCA
Checkmarx - SCA
SCA 
CISA KEV
CISA KEV
Gestión de vulnerabilidades, Información sobre amenazas 
Cisco DNA
Cisco DNA
Automatización 
Claroty
Claroty xDome
Otro 
Code42
Code42
DLP 
CrowdStrike Falcon
CrowdStrike Falcon
EDR, Respuesta a incidentes, Gestión de vulnerabilidades 
CyCognito
CyCognito
EASM 
Cyera
Cyera
Asset Discovery & Management, DLP 
Data Theorem
Data Theorem
Asset Discovery & Management, Compliance 
Datto
Datto
Backup & Recovery 
Dependabot
Dependabot
SCA 
Digital Shadows
Digital Shadows
SOAR 
DockerHub
DockerHub
CI/CD, Logs 
EKS S3 Logs
EKS S3 Logs
Logs, Data Storage, Container Security, AWS 
Exploit Database
Exploit Database
Información sobre amenazas 
Exploit Prediction Scoring System (EPSS)
Exploit Prediction Scoring System (EPSS)
Gestión de vulnerabilidades, Información sobre amenazas 
Flexera
Flexera
Asset Discovery & Management, IT Services Management 
Freshservice
Freshservice
IT Services Management, Business Applications 
GitHub
GitHub
CI/CD, Issue Trackers 
GitHub Audit Logs
GitHub Audit Logs
Logs 
Google Access Transparency
Google Access Transparency
Google 
Google Cloud Platform Assets
Google Cloud Platform Assets
Google, Gestión de vulnerabilidades 
Google Cloud Platform Misconfigurations
Google Cloud Platform Misconfigurations
Google, Gestión de vulnerabilidades 
Google Cloud Platform Vulnerabilities
Google Cloud Platform Vulnerabilities
Google, Gestión de vulnerabilidades 
Google Context Aware Access
Google Context Aware Access
Google 
Google Sheets
Google Sheets
Business Applications, Google 
Google Workspace - Admin Activity
Google Workspace - Admin Activity
Logs, IT Services Management, Google 
Google Workspace - Calendar Activity
Google Workspace - Calendar Activity
Business Applications, Google, Logs 
Google Workspace - Chat Activity
Google Workspace - Chat Activity
Business Applications, Google, Logs 
Google Workspace - Chrome Activity
Google Workspace - Chrome Activity
Business Applications, Google, Logs 
Google Workspace - Data Studio Activity
Google Workspace - Data Studio Activity
Google, Logs 
Google Workspace - Drive Activity
Google Workspace - Drive Activity
Business Applications, Google, Logs 
Google Workspace - Enterprise Groups Activity
Google Workspace - Enterprise Groups Activity
Business Applications, Google, Logs 
Google Workspace - Google Cloud Platform Activity
Google Workspace - Google Cloud Platform Activity
Business Applications, Google, Logs 
Google Workspace - Groups Activity
Google Workspace - Groups Activity
Business Applications, Google, Logs 
Google Workspace - Jamboard Activity
Google Workspace - Jamboard Activity
Business Applications, Google, Logs 
Google Workspace - Keep Activity
Google Workspace - Keep Activity
Business Applications, Google, Logs 
Google Workspace - Login Activity
Google Workspace - Login Activity
Logs, IT Services Management, Google 
Google Workspace - Mobile Activity
Google Workspace - Mobile Activity
Logs, IT Services Management, Google 
Google Workspace - OAuth2 Token Activity
Google Workspace - OAuth2 Token Activity
Logs, IT Services Management, Google, IAM 
Google Workspace - Rules Activity
Google Workspace - Rules Activity
Business Applications, Google, Logs 
Google Workspace - SAML Activity
Google Workspace - SAML Activity
Business Applications, Google, Logs 
Google Workspace - Tokens Activity
Google Workspace - Tokens Activity
Business Applications, Google, Logs 
Google Workspace - User Accounts Activity
Google Workspace - User Accounts Activity
Business Applications, Google, Logs 
Grype
Grype
Container Security, Gestión de vulnerabilidades 
HackerOne
HackerOne
Penetration Testing 
Halo
Halo
Network Scanning 
HCL BigFix
HCL BigFix
EDR 
Horizon3.ai
Horizon3.ai
Penetration Testing 
IBM Security Randori Recon Detections
IBM Security Randori Recon Detections
Asset Discovery & Management 
IBM Security Randori Recon Targets
IBM Security Randori Recon Targets
Asset Discovery & Management, Otro 
Illumio
Illumio
Network Scanning 
Invicti
Invicti
DAST 
Jamf
Jamf
IT Services Management 
Jfrog Xray
Jfrog Xray
SCA 
Jira Audit Logs
Jira Audit Logs
Logs, IT Services Management 
Jira Issues
Jira Issues
Issue Trackers, IT Services Management 
Kodem
Kodem
Gestión de vulnerabilidades, Notifications, Asset Discovery & Management 
Lacework
Lacework FortiCNAPP
CSPM, Network Scanning, Container Security 
Legit Security
Legit Security
CI/CD, SCA, Automatización 
Mandiant
Mandiant
Información sobre amenazas 
The Zscaler Data Fabric for Security features a prebuilt connector to Mend.io
Mend.io
Container Security, SAST 
Microsoft Intune
Microsoft Intune
Azure/Microsoft, Asset Discovery & Management 
Microsoft Intune Audit Events
Microsoft Intune Audit Events
Azure/Microsoft, Logs 
Microsoft Office 365
Microsoft Office 365
Business Applications, Azure/Microsoft 
Mysql
Mysql
Data Storage, Search & Query 
The Zscaler Data Fabric for Security features a prebuilt connector to Netbox
Netbox
Gestión de redes 
NPM
NPM
CI/CD 
NVD
NVD
Información sobre amenazas 
Okta
Okta
IAM, Logs 
Oligo
Oligo
Otro 
Orca
Orca
CSPM, Información sobre amenazas, Gestión de vulnerabilidades 
OSV
OSV
Información sobre amenazas 
Package Installer for Python (PIP)
Package Installer for Python (PIP)
CI/CD 
PAN Prisma Cloud
PAN Prisma Cloud
Container Security, CSPM 
Permiso
Permiso
IAM 
Qualys
Qualys
Gestión de vulnerabilidades, DAST, Container Security, Network Scanning 
Quokka
Quokka
DAST, SAST 
Rapid7
Rapid7
CSPM, SIEM, Gestión de vulnerabilidades, Información sobre amenazas 
Rapid7 InsightCloudSec
Rapid7 InsightCloudSec
CSPM, CI/CD, IAM, Gestión de vulnerabilidades 
Recorded Future Intelligence Cloud Platform
Recorded Future Intelligence Cloud Platform
Información sobre amenazas 
runZero
runZero
Asset Discovery & Management, Gestión de vulnerabilidades 
The Zscaler Data Fabric for Security features a prebuilt connector to SailPoint
SailPoint
IAM 
Security Scorecard
Security Scorecard
EASM, Información sobre amenazas, Otro 
SentinelOne
SentinelOne
EDR, Gestión de vulnerabilidades 
ServiceNow
ServiceNow
Issue Trackers, IT Services Management 
Snowflake
Snowflake
Data Storage 
Snyk
Snyk
SCA, Container Security 
Snyk SAST
Snyk SAST
SAST 
Sonarcloud
Sonarcloud
SAST 
Sonarqube
Sonarqube
SAST, Asset Discovery & Management 
Status Cake
Status Cake
Observability 
Tanium
Tanium
Configuration Management, Gestión de vulnerabilidades, Compliance 
Tenable
Tenable
Asset Discovery & Management, DAST, Gestión de vulnerabilidades 
Tenable Nessus
Tenable Nessus
Network Scanning 
The Zscaler Data Fabric for Security features a prebuilt connector to Trend Micro Apex One
Trend Micro Apex One
EDR 
Veoci
Veoci
Backup & Recovery, Business Applications 
Veracode
Veracode
SAST, DAST, SCA 
Veracode SCA
Veracode SCA
SCA 
VulnCheckKEV
VulnCheck KEV
Información sobre amenazas 
Wiz
Wiz
CSPM, Configuration Management, Gestión de vulnerabilidades 
Zendesk
Zendesk
Business Applications 
Zscaler
Zscaler
Zscaler 
Zscaler AnySource
Zscaler AnySource
Anything 
Zscaler AnyTarget
Zscaler AnyTarget
Automatización, Anything 
Avalor UVM Threat Intelligence
Zscaler Threat Intelligence
Información sobre amenazas, Zscaler