Demisto Enterprise integrates with a growing list of dozens of products, including security products as well as collaboration and notification platforms. By integrating with Demisto Enterprise, partners enable their products with the industry’s first Bot-powered security ChatOps platform for automating playbooks and response tasks, and detecting duplicate incidents.
Become a Partner
Demisto is a 100% channel company with great benefits for partners. Also integrating with Demisto is easy for security product partners and often Demisto team will do the heavy lifting. Join our technology and channel partner network and help us help you.
Avantgarde Partners is a thought leader in the emerging security automation and orchestration market and provides the premier managed security services program for playbook development and ongoing tuning.
Credence Security delivers Cyber and IT security technologies and solutions that protect organisations against advanced persistent threats, malicious adversaries and internal malpractice.
Headquartered in Dubai, UAE and serves enterprises across the Middle East, Africa & India
doIT solutions GmbH was founded in 2010 and is based in Germany, Gelnhausen. We offer turnkey IT security and networking solutions and handle IT projects from the early stage to conception, implementation, and operation
DRS is an ICT services and solutions provider specialising in providing innovation and agility in security, risk management and governance. Partnering with leading technology providers, DRS offers a complete portfolio of professional security services.
Palo Alto Panorama
Automate data enrichment and analysis with Demisto’s playbooks and Palo Alto Networks WildFire. In addition, remediate via automation scripts adjusting Palo Alto Networks Panorama™ policy.
Performanta, the global purple tribe, delivering the bedrock of quality managed cyber security services and consulting to our customers, enabling them to do business safely.
Demisto playbooks leverage data collected by ProtectWise for hunting file, IP, domain and other indicators across the enterprise, enabling faster and more accurate response to incidents.
rSolutions is a leading cyber security firm strategically aligned with best of breed security vendors to assist clients in securing their enterprises.
For over 30 years, Sayers has been committed to designing unique and innovative IT solutions to meet each of our client’s specific needs. Our team of engineers brings a comprehensive knowledge of the most innovative IT solutions on the market and an unparalleled commitment to helping businesses identify their challenges and then providing them with the right IT solutions, including cloud and virtualization services, data center storage, security and mobility, and professional services. Our experience has taught us that solving difficult business issues takes a lot more than just providing the right technology. That’s why we’re committed to going above and beyond to provide personal support at every stage of the implementation process. Our mission is to make a difference in each of our client’s businesses, and we won’t stop until we do.
SMSAM Systems Ltd.
SMSAM SYSTEMS LTD is a leading PAN African Cyber Security consulting firm which have partnered many of Africa’s largest financial services companies and businesses that operate in different verticals. We provide a consultative approach, understanding a user’s requirements before presenting potential solutions. Solutions are considered from the standpoint of both the end user and the IT team, establishing with all parties how any new technology will impact them and their business processes.
We have developed a strong coalition of support that ensures open lines of communication are available to provide early access to new technologies and resolve potential challenges. Our strategic partnerships provide access to additional tools and support, and increase our depth of expertise.
Sysec Cyber Security
Sysec Cyber Security specializes in the field of information security and data communication. Sysec Cyber Security provides integration and consulting services based on our broad-vision and vast experience with legacy and emerging technologies.
ThreatExchange by Facebook
Learn more about threats & make your systems safer with the ThreatExchange API by Facebook, within Demisto playbooks.
Vectra AI combines human proficiency and advanced threat research with a broad set of data science and modern machine learning techniques to provide automated threat detection, triage and correlation 24/7 across the entire enterprise.
Crowdstrike Falcon Intel
Automatically check reputation of files, URL and IP addresses, query endpoint for rich forensics data and take actions back via Demisto playbooks.
Automatically enrich incident data with user risk score and complete session details from Exabeam and trigger responses like adding user to watchlist based on investigation.
Automatically check the threat intelligence of files and hashes with the Cylance Inifinity API.
Active Directory Query
Query active directory for user, computer and other objects in real time from Demisto’s automated playbooks.
Carbon Black Enterprise Response
Query and take action across your enterprise using Carbon Black Live Response from Demisto’s playbooks.
Use volatility to analyze memory dumps for infected systems as part of playbook automations or interactive ChatOps commands.
Automatically create incidents from the emails in a security mailbox. Custom parsers can trigger different types from same mailbox.
Send notifications to Slack (direct messages and channels) for new incidents, assigned incidents and assigned tasks from Demisto Enterprise.
Automatically enrich incidents with latest intelligence from Threat Central for IP address, URL and other indicators.
Navilogic is a dedicated team of experienced, certified professionals with deep knowledge of enterprise and IT programs, services and technologies.
Blue Turtle is one of South Africa’s leading enterprise technology management companies, focused on IT and Service Management solutions.
Import critical alerts from McAFee ESM as incidents into Demisto Enterprise and automate response actions.
Automatically whitelist and blacklist web URLs in Forcepoint Triton from within Demisto playbooks.
Enrich all the indicators related to an incident with the relevant whois information automatically.
Automatically send notification emails for task assignment, incident assignment or other actions from Demisto Enterprise.
Automatically update IOC blacklist and change firewall policy from Demisto Enterprise based on the incident investigation data.
Check for reputation of IP addresses, URL and files using IBM X-Force exchange database from automated playbooks and war-room.
Collect vulnerability data and initiate incidents upon discovery of major vulnerabilities in sensitive systems.
Use SSH and WMI to run actions on compromised endpoints via automated playbooks or from investigation war-room.
Carbon Black Enterprise Protection
Reduced risk and exposure by automating response to security incidents and using rich endpoint data from Carbon Black and automated playbooks from Demisto.
Crowdstrike Falcon Host
Automatically check reputation of files, URL and IP addresses, query endpoint for rich forensics data and take actions back via Demisto playbooks and from investigation war-room.
Search and run queries against Tanium server from playbooks or via ChatOps enabled war-room within Demisto Enterprise.
Zendesk Help Center
Integrated help with knowledge base articles available within the Demisto Enterprise product.
Analyze malware samples collected from endpoint and other security tools automatically using Fireeye.
Collect high severity alerts and run advanced queries against endpoints from Demisto server.
Check for reputation of IP addresses, URL and files using VirusTotal database from automated playbooks and war-room.
Create incidents from alarms in Logrhythm automatically and search for logs from within Demisto interface.
Run custom and pre-defined queries against your Elasticsearch instance to look for IOC, analyze logs or other tasks.
Active Directory Authentication
Query active directory for user and system details using different attributes like email, username, system name etc.