Data Fabric for Security Integrations

Use the tools you want

Bring all your data together with our Data Fabric for Security and gain a comprehensive view of your risk. Our 150+ pre-built connectors integrate the most common security tools and cloud platforms, and our AnySource™ Connector enables you to bring in anything else—custom applications, flat files, and more.

The Data Fabric for Security powers current and future Exposure Management solutions including Asset Exposure Management, Risk360, and Unified Vulnerability Management.

Filter by

Integrations

Acunetix
Acunetix
Other 
The Zscaler Data Fabric for Security features a prebuilt connector to Akamai API Security (formerly known as NoName)
Akamai API Security (NoName)
API Security 
Apiiro SCA
Apiiro SCA
SCA 
Apiiro Secrets
Apiiro Secrets
Secrets Management 
Apiiro Terraform
Apiiro Terraform
Vulnerability Management, Configuration Management 
Aqua
Aqua
Container Security, CSPM 
ArcticWolf
ArcticWolf
CSPM, Incident Response, Vulnerability Management 
Armis Devices
Armis
Asset Discovery & Management, Threat Intelligence 
Arnica
Arnica
Configuration Management, SCA 
AttackForge
AttackForge
Penetration Testing 
The Zscaler Data Fabric for Security features a prebuilt connector to AWS Accounts.
AWS Accounts
AWS 
AWS CloudTrail
AWS CloudTrail
Logs, AWS, IT Services Management 
AWS DNS Query Logs
AWS DNS Query Logs
AWS, Logs 
AWS EC2
AWS EC2
Cloud Inventory, AWS 
AWS ECR
AWS ECR
AWS, Cloud Inventory 
AWS EKS
AWS EKS
Cloud Inventory, AWS 
AWS Inspector
AWS Inspector
AWS, Vulnerability Management 
The Zscaler Data Fabric for Security features a prebuilt connector to AWS Network.
AWS Network
AWS, Network Management 
AWS RDS
AWS RDS
AWS, Cloud Inventory, Backup & Recovery 
AWS S3
AWS S3
AWS, Data Storage 
AWS SecurityHub
AWS SecurityHub
AWS, CSPM 
AWS Server Logs
AWS Server Logs
AWS, Logs 
Axonius Platform
Axonius Platform
Asset Discovery & Management 
Azure Blob Storage
Azure Blob Storage
Azure/Microsoft, Data Storage 
Azure Defender Alerts
Azure Defender Alerts
Azure/Microsoft, Incident Response 
Azure Defender Assets
Azure Defender Assets
Azure/Microsoft, Asset Discovery & Management, CSPM 
Azure Defender Incidents
Azure Defender Incidents
Azure/Microsoft, Incident Response 
Azure Defender Software Vulnerabilities by Machine
Azure Defender Software Vulnerabilities by Machine
Azure/Microsoft, Vulnerability Management 
Azure Defender Vulnerabilities
Azure Defender Vulnerabilities
Azure/Microsoft, Vulnerability Management 
Bitsight
Bitsight
EASM 
Black Duck
Black Duck
SCA 
Box
Box
Data Storage 
The Zscaler Data Fabric for Security features a prebuilt connector to Burp Suite
Burp Suite
Penetration Testing, Vulnerability Management 
The Zscaler Data Fabric for Security features a prebuilt connector to Broadcom Carbon Black
Carbon Black
EDR, Incident Response 
Checkmarx - SAST
Checkmarx - SAST
SAST 
Checkmarx - SCA
Checkmarx - SCA
SCA 
CISA KEV
CISA KEV
Vulnerability Management, Threat Intelligence 
Cisco DNA
Cisco DNA
Automation 
Claroty
Claroty xDome
Other 
Code42
Code42
DLP 
CrowdStrike Falcon
CrowdStrike Falcon
EDR, Incident Response, Vulnerability Management 
CyCognito
CyCognito
EASM 
Cyera
Cyera
Asset Discovery & Management, DLP 
Data Theorem
Data Theorem
Asset Discovery & Management, Compliance 
Datto
Datto
Backup & Recovery 
Dependabot
Dependabot
SCA 
Digital Shadows
Digital Shadows
SOAR 
DockerHub
DockerHub
CI/CD, Logs 
EKS S3 Logs
EKS S3 Logs
Logs, Data Storage, Container Security, AWS 
Exploit Database
Exploit Database
Threat Intelligence 
Exploit Prediction Scoring System (EPSS)
Exploit Prediction Scoring System (EPSS)
Vulnerability Management, Threat Intelligence 
Flexera
Flexera
Asset Discovery & Management, IT Services Management 
Freshservice
Freshservice
IT Services Management, Business Applications 
GitHub
GitHub
CI/CD, Issue Trackers 
GitHub Audit Logs
GitHub Audit Logs
Logs 
Google Access Transparency
Google Access Transparency
Google 
Google Cloud Platform Assets
Google Cloud Platform Assets
Google, Vulnerability Management 
Google Cloud Platform Misconfigurations
Google Cloud Platform Misconfigurations
Google, Vulnerability Management 
Google Cloud Platform Vulnerabilities
Google Cloud Platform Vulnerabilities
Google, Vulnerability Management 
Google Context Aware Access
Google Context Aware Access
Google 
Google Sheets
Google Sheets
Business Applications, Google 
Google Workspace - Admin Activity
Google Workspace - Admin Activity
Logs, IT Services Management, Google 
Google Workspace - Calendar Activity
Google Workspace - Calendar Activity
Business Applications, Google, Logs 
Google Workspace - Chat Activity
Google Workspace - Chat Activity
Business Applications, Google, Logs 
Google Workspace - Chrome Activity
Google Workspace - Chrome Activity
Business Applications, Google, Logs 
Google Workspace - Data Studio Activity
Google Workspace - Data Studio Activity
Google, Logs 
Google Workspace - Drive Activity
Google Workspace - Drive Activity
Business Applications, Google, Logs 
Google Workspace - Enterprise Groups Activity
Google Workspace - Enterprise Groups Activity
Business Applications, Google, Logs 
Google Workspace - Google Cloud Platform Activity
Google Workspace - Google Cloud Platform Activity
Business Applications, Google, Logs 
Google Workspace - Groups Activity
Google Workspace - Groups Activity
Business Applications, Google, Logs 
Google Workspace - Jamboard Activity
Google Workspace - Jamboard Activity
Business Applications, Google, Logs 
Google Workspace - Keep Activity
Google Workspace - Keep Activity
Business Applications, Google, Logs 
Google Workspace - Login Activity
Google Workspace - Login Activity
Logs, IT Services Management, Google 
Google Workspace - Mobile Activity
Google Workspace - Mobile Activity
Logs, IT Services Management, Google 
Google Workspace - OAuth2 Token Activity
Google Workspace - OAuth2 Token Activity
Logs, IT Services Management, Google, IAM 
Google Workspace - Rules Activity
Google Workspace - Rules Activity
Business Applications, Google, Logs 
Google Workspace - SAML Activity
Google Workspace - SAML Activity
Business Applications, Google, Logs 
Google Workspace - Tokens Activity
Google Workspace - Tokens Activity
Business Applications, Google, Logs 
Google Workspace - User Accounts Activity
Google Workspace - User Accounts Activity
Business Applications, Google, Logs 
Grype
Grype
Container Security, Vulnerability Management 
HackerOne
HackerOne
Penetration Testing 
Halo
Halo
Network Scanning 
HCL BigFix
HCL BigFix
EDR 
Horizon3.ai
Horizon3.ai
Penetration Testing 
IBM Security Randori Recon Detections
IBM Security Randori Recon Detections
Asset Discovery & Management 
IBM Security Randori Recon Targets
IBM Security Randori Recon Targets
Asset Discovery & Management, Other 
Illumio
Illumio
Network Scanning 
Invicti
Invicti
DAST 
Jamf
Jamf
IT Services Management 
Jfrog Xray
Jfrog Xray
SCA 
Jira Audit Logs
Jira Audit Logs
Logs, IT Services Management 
Jira Issues
Jira Issues
Issue Trackers, IT Services Management 
Kodem
Kodem
Vulnerability Management, Notifications, Asset Discovery & Management 
Lacework
Lacework FortiCNAPP
CSPM, Network Scanning, Container Security 
Legit Security
Legit Security
CI/CD, SCA, Automation 
Mandiant
Mandiant
Threat Intelligence 
The Zscaler Data Fabric for Security features a prebuilt connector to Mend.io
Mend.io
Container Security, SAST 
Microsoft Intune
Microsoft Intune
Azure/Microsoft, Asset Discovery & Management 
Microsoft Intune Audit Events
Microsoft Intune Audit Events
Azure/Microsoft, Logs 
Microsoft Office 365
Microsoft Office 365
Business Applications, Azure/Microsoft 
Mysql
Mysql
Data Storage, Search & Query 
The Zscaler Data Fabric for Security features a prebuilt connector to Netbox
Netbox
Network Management 
NPM
NPM
CI/CD 
NVD
NVD
Threat Intelligence 
Okta
Okta
IAM, Logs 
Oligo
Oligo
Other 
Orca
Orca
CSPM, Threat Intelligence, Vulnerability Management 
OSV
OSV
Threat Intelligence 
Package Installer for Python (PIP)
Package Installer for Python (PIP)
CI/CD 
PAN Prisma Cloud
PAN Prisma Cloud
Container Security, CSPM 
Permiso
Permiso
IAM 
Qualys
Qualys
Vulnerability Management, DAST, Container Security, Network Scanning 
Quokka
Quokka
DAST, SAST 
Rapid7
Rapid7
CSPM, SIEM, Vulnerability Management, Threat Intelligence 
Rapid7 InsightCloudSec
Rapid7 InsightCloudSec
CSPM, CI/CD, IAM, Vulnerability Management 
Recorded Future Intelligence Cloud Platform
Recorded Future Intelligence Cloud Platform
Threat Intelligence 
runZero
runZero
Asset Discovery & Management, Vulnerability Management 
The Zscaler Data Fabric for Security features a prebuilt connector to SailPoint
SailPoint
IAM 
Security Scorecard
Security Scorecard
EASM, Threat Intelligence, Other 
SentinelOne
SentinelOne
EDR, Vulnerability Management 
ServiceNow
ServiceNow
Issue Trackers, IT Services Management 
Snowflake
Snowflake
Data Storage 
Snyk
Snyk
SCA, Container Security 
Snyk SAST
Snyk SAST
SAST 
Sonarcloud
Sonarcloud
SAST 
Sonarqube
Sonarqube
SAST, Asset Discovery & Management 
Status Cake
Status Cake
Observability 
Tanium
Tanium
Configuration Management, Vulnerability Management, Compliance 
Tenable
Tenable
Asset Discovery & Management, DAST, Vulnerability Management 
Tenable Nessus
Tenable Nessus
Network Scanning 
The Zscaler Data Fabric for Security features a prebuilt connector to Trend Micro Apex One
Trend Micro Apex One
EDR 
Veoci
Veoci
Backup & Recovery, Business Applications 
Veracode
Veracode
SAST, DAST, SCA 
Veracode SCA
Veracode SCA
SCA 
VulnCheckKEV
VulnCheck KEV
Threat Intelligence 
Wiz
Wiz
CSPM, Configuration Management, Vulnerability Management 
Zendesk
Zendesk
Business Applications 
Zscaler
Zscaler
Zscaler 
Zscaler AnySource
Zscaler AnySource
Anything 
Zscaler AnyTarget
Zscaler AnyTarget
Automation, Anything 
Avalor UVM Threat Intelligence
Zscaler Threat Intelligence
Threat Intelligence, Zscaler