Demisto

Demisto Enterprise integrates with an ever-growing list of products, from SIEMs and endpoint tools to threat intelligence platforms and non-security products. By integrating with Demisto Enterprise, your products can leverage the industry’s leading Security Orchestration, Automation, and Response (SOAR) platform to standardize, scale, and accelerate incident response.

Integrate with Demisto

Build and list your own technical product integration on Demisto!

Click below for more details.

Become a Channel Partner

If you are interested in becoming a channel/reseller, please start here.

AbuseIPDB logo

AbuseIPDB

Demisto integrates with AbuseIPDB, an IP address blacklist for webmasters and sysadmins to report,identify or check IP addresses that have been associated with malicious activity online.

Accenture Security Logo

Accenture Security

Demisto integrates with iDefense’s vulnerability intelligence of 1,000+ technology vendors, malware tools and techniques, IOCs, target organizations, threat actors, etc.

active directory logo

Active Directory Query

Query active directory for user, computer and other objects in real time from Demisto’s automated playbooks.

Aella Data Logo

Aella Data

Demisto integrates with Aella Data for AI-driven breach detection and investigation.

algosec logo

AlgoSec

Demisto integrates with AlgoSec BusinessFlow, Firewall Analyzer, and FireFlow.

AlienVault OTX

Demisto integrates with AlienVault OTX to enable data enrichment and IOC hunting.

AlienVault USM Anywhere

Demisto integrates with AlienVault USM Anywhere to search and monitor events from AlienVault USM Anywhere.

Amazon AWS Logo

Amazon CloudWatch Logs

Desmisto integrates with Amazon CloudWatch Logs for management of log files from Amazon EC2 instances, AWS CloudTrail, Route 53, and other sources.

Amazon AWS Logo

Amazon EC2

Demisto integrates with EC2 for orchestration of compute capacity tasks.

Amazon AWS Logo

Amazon GuardDuty

Demisto integrates with Amazon GuardDuty for threat detection andf monitoring.

Amazon AWS Logo

Amazon Route 53

Demisto integrates with Amazon Route 53 for orchestration of cloud DNS management tasks.

Anomali

Demisto integrates with Anomali ThreatStream for forensics and malware analysis.

ANY.RUN logo

ANY.RUN

Demisto integrates with AnyRun for orchestration of malware analysis investigation.

Apache Active MQ Logo

Apache ActiveMQ

Demisto integrates with Apache ActiveMQ for orchestration of authentication and messaging incidents.

ARIA Cybersecurity Solutions Logo

ARIA SDS Packet Intelligence

Demisto integrates with ARIA SDS to accelerate incident response by automating cyber-attack containment at the conversation level, and provide protection against future attacks.

attack IQ logo

AttackIQ Platform

Demisto integrates with AttackIQ, an attack simulation platform, for vulnerability management orchestration.

Attivo Networks Logo

Attivo Networks

Demisto integrates with Attivo Networks ThreatDefend platform to provide in-network threat deception for post-compromise threat detection.

Awake Security Logo with Solution Brief

Awake Security

Demisto integrates with Awake Security for automated network detection and response.

Amazon AWS Logo

AWS Athena

Demisto integrates with AWS Athena for orchestration of Athena queries as part of cloud security operations and incident response.

Amazon AWS Logo

AWS CloudTrail

Demisto integrates with AWS CloudTrail for tracking user activity and API iusage.

Amazon AWS Logo

AWS IAM

Demisto integrates with AWS IAM for orchestration of identity and access management tasks

Amazon AWS Logo

AWS Lambda

Demisto integrates with AWS Lambda for orchestration of Lambda functions as part of cloud security operations and incident response.

Amazon AWS Logo

AWS S3

Demisto integrates with AWS S3 for orchestration of cloud security response and IT tasks.

Amazon AWS Logo

AWS SageMaker

Demisto’s machine learning phishing email classifier is available on the Amazon Sagemaker marketplace.

Amazon AWS Logo

AWS Security Hub

Demisto integrates with AWS Security Hub for bidirectional management of finding from Security Hub or other security products.

Amazon AWS Logo

AWS SQS

Demisto integrates with Amazon SQS for orchestration of SQS tasks as part of security operations and incident response.

BitDam Logo

BitDam

Demisto integrates with BitDam for email gateway security orchestration.

Blockade

Blockade

Blockade brings antivirus-like capabilities to users who run the Chrome browser, blocking malicious resources from being viewed or loaded inside of the browser.

BMC Remedy AR System

A professional development environment that provides a foundation for Business Service Management (BSM) solutions.

Box Logo

Box

Demisto integrates with Box to manage Box users.

C2SEC Logo

C2SEC iRisk Enterprise Platform

The Demisto integration with C2SEC enables the orchestration of domain management and automated retrieval of information about leaked credentials, encryption, network and application related vulnerabilities.

carbonblack live response logo

Carbon Black Defense

Next-generation antivirus + EDR in one cloud-delivered platform that stops range of malware and non-malware attacks.

carbonblack live response logo

Carbon Black Enterprise Protection

Reduced risk and exposure by automating response to security incidents and using rich endpoint data from Carbon Black and automated playbooks from Demisto.

Censys

Censys lets researchers find specific hosts and create aggregate reports on how devices, websites, and certificates are configured and deployed.

Centreon

Demisto integrates with Centreon for orchestration of IT and network monitoring.

CheckPhish Logo

CheckPhish

This integration automates URL checking for suspicious behavior.

Cherwell Logo

Cherwell

Demisto integrates with Cherwell for orchestration of cloud-based IT service management tasks.

CIRCL Logo

CIRCL Passive DNS

Demisto integrates with CIRCL for DNS and SSL certificate information inquiry orchestration.

cisco logo

Cisco AMP

AMP continuously analyzes file activity across your extended network, so you can quickly detect, contain, and remove advanced malware.

cisco logo

Cisco CloudLock

Cloudlock is a cloud-native CASB that helps protect your cloud users, data, and apps.

cisco logo

Cisco Email Security

Demisto integrates with Cisco Email Security to protect against ransomware, business email compromise, spoofing, and phishing.

cisco logo

Cisco Meraki

Demisto integrates with Cisco Meraki for device and firewall management.

cisco logo

Cisco Spark

Demisto integrates with messaging platform Cisco Spark for user and team management.

cisco logo

Cisco Threat Grid

Threat Grid combines advanced sandboxing with threat intelligence into one unified solution to protect organizations from malware.

cisco logo

Cisco Umbrella Investigate

Cisco Umbrella Investigate provides a complete view of Internet domains, IP addresses, and systems to pinpoint attackers’ infrastructures and predict future threats.

cisco logo

Cisco Webex Teams

Demisto integrates with Cisco Webex for orchestration of video conferencing administrative tasks.

confer logo

Confer

Collect alerts from Confer and create incidents inside of Demisto Enterprise.

CounterTack GoSecure Logo

CounterTack

Demisto integrates with CounterTack for orchestrartion of endpoint security incident response.

CrowdStrike Demisto Solution Brief

Crowdstrike Falcon Host

Automatically check reputation of files, URL and IP addresses, query endpoint for rich forensics data and take actions back via Demisto playbooks and from investigation war-room.

CrowdStrike Demisto Solution Brief

CrowdStrike Falcon Intel

Automatically check reputation of files, URL and IP addresses, query endpoint for rich forensics data and take actions back via Demisto playbooks.

CrowdStrike Demisto Solution Brief

Crowdstrike Falcon Sandbox

Demisto integrates with Falcon Sandbox to orchestrate fetching and resolving detections, searching devices, getting behaviors by ID, containing hosts, and lifting host containment.

CrowdStrike Demisto Solution Brief

CrowdStrike Falcon Streaming

Demisto integrates with the Falcon Streaming API to provide a constant source of information for real-time threat detection and prevention.

cuckoo sandbox logo

Cuckoo

Analyze malware using the open source Cuckoo sandbox via automated playbooks.

cve logo

CVE Search

Demisto integrates with CVE Search for vulnerability management.

Cybertriage Logo

Cyber Triage

Demisto partners with Cyber Triage for practical endpoint response.

cyberark logo

CyberArk

Demisto integrates with CyberArk Application Identity Manager for accounts and credentials.

Cybereason

This integration enables search for connections and processes on Cybereason.

Cylance Logo

CylanceINFINITY

Demisto integrates with Cylance INFINITY for orchestration of threat intelligence analysis .

Cylance Logo

CylancePROTECT

Demisto integrates with Cylance Protect for orchestration of endpoint security incident response and endpoint enrichment.

Dell Technologies Logo

Dell Secureworks

Demisto integrated with Dell Secureworks for automation of ticketing and case management tasks.

Devo Logo - Solution Brief

Devo

Demisto integrates with Devo for orchestration of real-time operations analytics.

Digital Shadows

Digital Shadows monitors and manages an organization’s digital risk across the widest range of data sources within the open, deep, and dark web.

Dnstwist Logo

Dnstwist

Demisto integrates with Dnstwist for automation of phishing incident response and remediation.

Domain Tools Logo - Solution Brief

DomainTools

Query cyber threat intelligence data about domains, IP and URLs from DomainTools.

Duo Logo

Duo

Duo is a comprehensive security solution confirms the identity of users and health of their devices before they connect to your applications.

EclecticIQ logo

EclecticIQ Platform

Demisto integrates with EclecticIQ for automation of reputation queries and threat intel incident response.

Elastic Logo Solution Brief

Elasticsearch

Run custom and pre-defined queries against your Elasticsearch instance to look for IOC, analyze logs or other tasks.

endgame logo

Endgame

Endgame enables endpoint protection built to stop advanced attacks before damage and loss occurs.

microsoft logo

EWS

Demisto integrates with EWS for orchestration of EWS operations.

microsoft logo

EWS v2

Demisto integrates with EWS for orchestration of EWS operations.

Exabeam

Automatically enrich incident data with user risk score and complete session details from Exabeam and trigger responses to watchlist based on investigation.

F5 Logo

F5 Networks

Demisto integrates with F5 for firewall policy management.

Facebook ThreatExchange

Demisto integrates with ThreatExchange for automated ingestion, enrichment and querying of threat intelligence about applications, IP addresses, URLs and hashes.

Farsight Security

Demisto integrates with Farsight Security to access real-time and historical Passive Domain Name System data.

Fidelis Logo

Fidelis Elevate

Demisto integrates with Fidelis Elevate to automate detection and response to network threats and data leakage.

FireEye

Analyze malware samples collected from endpoint and other security tools automatically using Fireeye.

FireEye AX Series

Demisto integrates with FireEye AX to orchestrate malware analysis including automating file detonation, report ingestion and data enrichment.

FireEye ETP

Demisto integrates with FireEye ETP for email security orchestration.

FireEye Helix

Demisto integrates with FireEye Helix for automated security operations and incident response.

FireEye HX

Demisto integrates with FireEye HX for faster endpoint threat prevention and response.

Forcepoint

Forcepoint CASB

Demisto integrates with Forcepoint CASB to provide visibility and control over sanctioned and unsanctioned cloud apps.

Fortinet Logo

Fortinet Fortigate

Demisto integrates with Fortinet for orchestration of Fortigate firewall and policy administration.

Fortinet Logo

Fortinet FortiSIEM

Demisto integrates with Fortinet for automated ingestion, searching, and update of FortiSIEM events and management of resource lists.

Freshworks Logo

Freshdesk

Demisto integrates with Freshdesk for orchestration of ticketing and case management tasks.

giphy logo

Giphy

Demisto’s integration with Giphy enables the display of gifs in Demisto’s war room.

GitHub Logo

GitHub API

This integration enables the execution of GitHub commands from within Demisto.

google apps logo

Google Apps

Demisto integrates with both GSuite and Admin API for authentication and messaging.

Google Cloud Logo

Google BigQuery

Demisto’s integration with Google enables automated or manual querying of BigQuery within Demisto.

Google Cloud Logo

Google Cloud Storage

This integration enables automated or manual querying of Google Cloud Storage’s file storage web service within Demisto.

Google Logo

Google Docs

Demisto integrates with Google Docs to enable automation of document creation, querying and updating.

Google Cloud Logo

Google Resource Manager

Demisto’s integration enables Google Resource Manager commands to be executed automatically or manually within Demisto.

Google Logo

Google Safe Browsing

Demisto’s integration with Google Safe Browsing enables URL reputation checks within Demisto.

Google Logo

Google Vault

Demisto’s integration with Google Safe Browsing enables URL reputation checks within Demisto.

grr logo

GRR

Demisto integrates with GRR to enable Rapid Response framework for investigations.

GuardiCore logo

GuardiCore

Demisto integrates with GuardiCore to provide data center breach detection.

Hashicorp Logo

HashiCorp Vault

Demisto’s integration enables HashiCorp Vault commands to manage secrets and protect sensitive data to be executed from Demisto.

haveibeenpwned logo

Have I Been Pwned?

Demisto integrates with Have I Been Pwned? to check whether emails or domains have been compromised in recent breaches.

Hybrid Analysis Logo

Hybrid Analysis

Demisto integrates with Hybrid Analysis for orchestration of automated malware analysis and incident response.

IBM Logo

IBM Resilient Systems

Demisto integrates with IBM Resilient Systems for orchestration of ticketing and case management tasks.

IBM-XFE

IBM XFE

Check for reputation of IP addresses, URL and files using IBM X-Force exchange database from automated playbooks and war-room.

icebrg logo

Icebrg

Icebrg reduces risk by accelerating threat detection, triage, and response to rapidly-evolving breaches across global networks.

iDefense logo

iDefense

Demisto integrates with iDefense for contextual, timely, and actionable security intelligence.

Imperva

Demisto integrates with Incapsula to manage sites and IPs.

InfoArmor Logo

InfoArmor VigilanteATI

Demisto’s integration with InfoArmor enables automation and orchestration of threat intel tasks such as gathering leak information, vulnerable host data and updating watchlists.

Intezer Logo

Intezer Analyze

Demisto integrates with Intezer Analyze for malware detection and analysis.

IPinfo Logo

ipinfo

Demisto integrates with the ipinfo.io API to get data about an IP address.

ipstack logo

ipstack

The integration with IPStack and IPStack Docker automation of IP to geolocation mapping.

IronNet Logo

IronNet IronDefense

Demisto integrates with IronNet for the orchestration of network traffic analysis (NTA) incident response.

IsItPhishing logo

IsItPhishing

Collaborative web service that provides validation on whether a URL is a phishing page.

Jamf

Demisto integrates with Jamf for comprehensive device management.

JASK Logo

JASK

Demisto integrates with JASK for automated security operations and incident response

JsonWhois Logo

JsonWhois

This integration enables automated data enrichment for domains and IP addresses.

kafka logo

Kafka

Kafka is an open-source distributed streaming platform.

kenna logo

Kenna

Kenna is a Risk Intelligence & Vulnerability platform that enables InfoSec teams to prioritize and remediate vulnerabilities faster.

Koodous

Check Android app samples against the Koodous API using this integration.

lastline logo

Lastline Analyst

Demisto integrates with Lastline Analyst for advanced malware isolation and inspection.

Lockpath logo

Lockpath

Demisto integrates with Keylight, an enterprise GRC platform with tools for managing risk and compliance.

Logrithm Logo

LogRhythm

Create incidents from alarms in Logrhythm automatically and search for logs from within Demisto interface.

LogRhythm Logo

LogRhythm Rest

Demisto’s integration with LogRhythm Rest enables automation of host creation and updates and query execution.

Looker Logo

Looker

The Demisto-Looker integration provides the ability to query, save and run looks, and fetch look results as incidents.

mail-listener

Mail Listener

Automatically create incidents from the emails in a security mailbox. Custom parsers can trigger different types from same mailbox.

mail-sender

Mail Sender

Automatically send notification emails for task assignment, incident assignment or other actions from Demisto Enterprise.

Malwr

Analyze files using the Malwr sandbox using this integration.

Mattermost Logo

Mattermost

This integration enables the automation of Matermost messaging tasks within Demisto.

McAfee DAM

Demisto integrates with McAfee Database Activity Monitoring for real-time, reliable protection for business-critical databases.

McAfee DXL

Demisto integrates with McAfee DXL for secure, fast messaging across security and allied apps.

McAfee ePO

Demisto integrates with McAfee ePolicy Administrator for unified policy management.

McAfee ESM

Import critical alerts from McAFee ESM as incidents into Demisto Enterprise and automate response actions.

McAfee NSM

Demisto integrates with McAfee NSM for simple, centralized control for distributed network security appliances.

McAfee Web Gateway

McAfee Web Gateway delivers high-performance web security through an on-premises appliance that can be deployed both as dedicated hardware and a virtual machine.

micro focus logo

Micro Focus

Micro Focus (specifically, ArcSight) integrates with Demisto through its ESM SIEM and events logger, allowing seamless creation and updation of events.

microsoft logo

Microsoft Azure Compute

This integration with Azure Compute enables the orchestration tasks related to creating and managing Azure Virtual Machines.

microsoft logo

Microsoft Exchange 2016 Compliance Search

This integration with Exchange 2016 Compliance Search enables the initiation of a compliance search, removal of compliance search or checking of status and results of compliance searches.

microsoft logo

Microsoft Graph Groups

This integration enables the creation and managing of different types of groups and group functionality form within Demisto.

Microsoft Logo - Demisto Solution Brief

Microsoft Graph Mail

This integration with Microsoft Graph API enables orchestration of Microsoft Graph Mail tasks such as searching emails, deleting emails and investigating attachments.

Microsoft Logo - Demisto Solution Brief

Microsoft Graph User

This integration with Microsoft Graph API enables orchestration of Microsoft Graph User tasks such as creating, deleting and updating user permissions.

microsoft logo

Microsoft Teams

This integration mirrors investigations between Demisto and Teams, and enables teams to send messages and notifications for new incidents, assigned incidents and tasks from Demisto Enterprise.

Mimecast Logo

Mimecast

Demisto integrates with Mimecast for unified email management.

misp logo

MISP

Demisto integrates with MISP for automated threat intelligence incident response such as automated file and IP reputation checking, enriching and managing MISP events.

moloch logo

Moloch

Moloch is a large scale, open source, full packet capturing, indexing, and database system.

MXToolBox

MXToolBox

This integration enables access of MX records, DNS, blacklists and SMTP diagnostics in one integrated tool.

MySQL

Run SQL queries for gathering rich information against any MySQL database.

Nessus

Nessus is a vulnerability scanner for auditors and security analysts by Tenable Network Security.

Netcraft Logo

Netcraft

This integration enables the automation of Netcraft open and takedown requests from within Demisto.

Netskope

Demisto integrates with Netskope for orchestration of cloud security incident response.

nmap logo

nmap

Demisto integrates with nmap to run scans with the given parameters.

Okta Solution Brief

Okta

Demisto integrates with Okta’s cloud based identity management service.

openphish logo

OpenPhish

OpenPhish uses proprietary AI algorithms to automatically identify zero-day phishing sites and provide actionable, real-time threat intelligence.

opsgenie logo

OpsGenie

Demisto integrates with OpsGenie for alerting and incident management for Dev and Ops teams.

OPSWAT Metadefender

The Metadefender multi-scanning engine uses 30+ anti-malware engines to scan files for threats, significantly increasing malware detection.

osxcollector logo

OSXCollector

Collect rich forensics data from Mac OSX endpoints using the Demisto Enterprise and OSXCollector integration.

PacketMail Logo

PacketMail

This integration with Packetmail enables automation of intel lookups for IP addresses.

packetsled logo

Packetsled

Demisto integrates with Packetsled for automated network visibility and packet captures.

PagerDuty Logo

PagerDuty

Get user on call or trigger pagerduty alerts from Demisto Enterprise.

Palo Alto Networks Logo

Palo Alto Networks Traps

Description: Demisto integrates with Traps for endpoint protection and automated incident response to stop threats on endpoints and coordinate enforcement across network and cloud security.

payload security logo

Payload Security

Demisto integrates with VxStream Sandbox from Payload Security for fully automated malware analysis.

Perception Point Logo

Perception Point

Demisto integrates with Perception Point for email security incident response orchestration and quarantined email management.

Perch Logo

Perch

Demisto integrates with Perch for automated threat detection and response.

phish ai logo

Phish.AI PhishProtect

Demisto integrates with Phish.AI for automated threat intelligence for more effective phishing response.

Phish Labs Logo

PhishLabs IOC

This integration enables live IOC feeds from PhishLabs for automated enrichment of indicators.

phishtank logo

PhishTank

Demisto integrates with PhishTank to check URL reputation.

pipl logo

Pipl

Automatically search for people details based on various attributes like email.

PolySwarm Logo

PolySwarm

Demisto integrates with PolySwarm for automated data enrichment leveraging PolySwarm’s real-time, crowd-sourced threat intelligence.

postgre sql logo

PostgreSQL

This integration allows users to query the PostgreSQL database.

Prisma Cloud Solution Brief

Prisma Cloud

Demisto partners with Prisma Cloud for automated cloud threat compliance and response.

Proofpoint Logo

Proofpoint TAP

This integration enables the ingestion and orchestration of TAP incidents within Demisto.

ProtectWise

Demisto playbooks use data collected by ProtectWise for hunting file, IP, domain and other indicators, enabling fast and accurate responses to incidents.

qradar logo

QRadar

QRadar from IBM Security is an integrated analytics platform that streamlines critical capabilities into common workflows and helps increase analyst efficiency.

Qualys

Demisto integrates with Qualys for network security and vulnerability management.

Rapid7 Nexpose

Collect vulnerability data and initiate incidents upon discovery of major vulnerabilities in sensitive systems.

Recorded Future

Centralize threat intelligence across sources in real-time and respond at machine speed.

Red Canary Logo

Red Canary

This integration enables the orchestration of RedCanary endpoint data management actions within Demisto.

rekall logo

Rekall

Conduct memory analysis using Rekall with real-time interactive ChatOps.

RemoteAccess

Use SSH and WMI to run actions on compromised endpoints via automated playbooks or from investigation war-room.

riskiq logo

RiskIQ PassiveTotal

Demisto integrates with PassiveTotal from RiskIQ for threat infrastructure analysis from a variety of sources.

rsa logo

RSA Archer

Demisto integrates with Archer for policy management.

rsa logo

RSA NetWitness

RSA and Demisto provide an evolved SIEM and threat defense offering to overcome SOCs’ biggest challenges through automation and response.

S/MIME Integration Logo

S/MIME Messaging

This integration enables the use of S/MIME (Secure Multipurpose Internet Mail Extensions) in sending and receiving secure MIME data.

SafeBreach

Demisto integrates with SafeBreach for orchestration of attack simulation and response.

Salesforce

Demisto integrates with Salesforce CRM Services for object management.

saml logo

SAML

Single sign-on support for any SAML 2.0 supported provider.

secureworks logo

SecureWorks

Demisto integrates with SecureWorks to enable ticket management with Dell’s Counter Threat Operations Center.

Security Advisor Logo

SecurityAdvisor

This integration enables the automation of security coaching and awareness communications.

SentinelOne Logo

SentinelOne

Collect high severity alerts and run advanced queries against endpoints from Demisto server.

ServiceNow Logo

ServiceNow

Create and update tickets from Demisto playbooks automatically.

shodan logo

Shodan

Shodan is a search engine for Internet-connected devices integrated with Demisto for data enrichment.

Skyformation logo

Skyformation

Demisto integrates with Skyformation for orchestration of cloud application security.

slack logo

Slack

Send notifications to Slack (direct messages and channels) for new incidents, assigned incidents and assigned tasks from Demisto Enterprise.

SlashNext Logo

SlashNext Phishing IR

This integration enables users to fully automate the phishing incident response process such as the analysis of suspicious URLs.

SNDBOX Logo

SNDBOX

Demisto integrates with SNDBOX for automated AI-driven malware analysis and response.

splunk logo

Splunk

Splunk and Demisto have partnered to provide customers with the unique capability of automating investigations including quick and effective collection of data from endpoints and immediate response that includes enforcement on the endpoints.

Sumo Logic Logo

Sumo Logic

Demisto integrates with Sumo Logic to provide a cloud-based service for logs and metrics management.

Symantec Logo

Symantec

Demisto integrates with Symantec to provide ATP, Endpoint Protection, and Webpulse site review.

Symantec Logo

Symantec Endpoint Protection

Artificial intelligence fused with critical endpoint technologies deliver the most complete endpoint security on the planet.

Symantec Logo

Symantec Messaging Gateway

Symantec Messaging Gateway protects against spam, malware, and targeted attacks through email encryption and advanced content filtering.

Symantec Logo

Symantec MSS

Leverage the power of Symantec Managed Security Services for continual threat monitoring and 24×7 customized guidance.

Tanium

Search and run queries against Tanium server from playbooks or via ChatOps enabled war-room within Demisto Enterprise.

tcell logo

tCell

tCell and Demisto have partnered to provide customers with the unique capability of automating investigations including quick and effective collection of data from endpoints and immediate response that includes enforcement on the endpoints.

tcpiputils logo

TCPIPUtils

Demisto integrates with TCPIPUtils for comprehensive enrichment and reputation checks for domains, IPs, and providers.

Tenable Logo for Solution Brief

Tenable

Demisto integrates with Tenable.io, Tenable.sc and Nessus for vulnerability management orchestration.

Thinkst Canary Logo

Thinkst Canary

This integration enables the automated ingestion of Canary events and IP queries for incident response.

micro focus logo

Threat Central

Automatically enrich incidents with latest intelligence from Threat Central for IP address, URL and other indicators.

Threat Crowd Logo

Threat Crowd

Demisto’s integration with Threat Crowd enables report queries on a wide variety of indicators.

ThreatConnect

Demisto integrates with ThreatConnect to find threats, evaluate risk, and mitigate harm to your organization.

ThreatMiner Logo

ThreatMiner

This integration enables the automated retrieval of domain, IP and file data from ThreatMiner.

Threatquotient logo

ThreatQuotient

Demisto integrates with ThreatQ, a threat intelligence platform that collects and interprets intelligence data from open sources, for orchestration and automation of incident data enrichment.

ThreatX Logo

ThreatX

Demisto integrates with ThreatX for automated web security enforcement and incident response.

tren micro logo

Trend Micro

Demisto integrates with Trend Micro to help eliminate security gaps across any user activity and endpoint.

Tufin Logo - Solution Brief

Tufin

Demisto integrates with Tufin SecureTrack for automated security policy management.

twilio logo

Twilio

Twilio is a cloud communication platform for building messages applications at scale.

Uptycs Logo

Uptycs

Demisto integrates with Uptycs for orchestration of endpoint system and security analytics as part of incident response.

URLHaus Logo

URLHaus

Demisto integrates with URLHaus for ingestion of enriched data on malicious URLs for malware distribution.

urlscan logo

urlscan.io

Demisto integrates with urlscan.io to help scan websites for reputation.

vectra logo

Vectra

Vectra and Demisto have partnered to provide customers with the unique capability of automating investigations including quick and effective collection of data from endpoints and immediate response that includes enforcement on the endpoints.

venafi logo

Venafi

Demisto integrates with Venafi for key management and certificate management actions.

verodin logo

Verodin

This integration allows users to manage Verodin simulations and topology.

Virus Total

Check for reputation of IP addresses, URL and files using VirusTotal database from automated playbooks and war-room.

VMRay

Demisto integrates with VMRay for agentless threat analysis and detection.

vmware logo

VMware vCenter Server

VMware vCenter Server is a centralized management application that lets you manage virtual machines and ESXi hosts centrally.

volatility foundation

Volatility

Use volatility to analyze memory dumps for infected systems as part of playbook automations or interactive ChatOps commands.

VulnDB Solution Brief Logo

VulnDB

Demisto integrates with VulnDB for the latest vulnerabilities in end user software and third party libraries.

What's My Browser - Logo

What’sMyBrowser

Demisto integrates with What’sMyBrowser to automate the parsing of user agents and determine if they are malicious as well as enrich information about the agent.

whois logo

Whois

Enrich all the indicators related to an incident with the relevant whois information automatically.

Zendesk Logo

Zendesk Help Center

Integrated help with knowledge base articles available within the Demisto Enterprise product.

ZeroFox Logo

ZeroFOX

Demisto integrates with ZeroFOX for orchestration of social media and digital platform threat detection and investigation.

Zoom Logo

Zoom

This integration enables the automation of Zoom user and meeting management from within Demisto.