Demisto Enterprise integrates with an ever-growing list of partners, from SIEMs and endpoint tools to threat intelligence platforms and non-security products. By integrating with Demisto Enterprise, partner products can leverage the industry’s first bot-powered security operations platform to standardize, scale, and accelerate incident response.
Become a Partner
Demisto is a 100% channel-friendly company with great benefits and robust joint go-to-market strategies for partners, VARs, and resellers. Start the process to become a technology or channel partner below.
Query active directory for user and system details using different attributes like email, username, system name etc.
Query active directory for user, computer and other objects in real time from Demisto’s automated playbooks.
Demisto integrates with AlgoSec BusinessFlow, Firewall Analyzer, and FireFlow.
Demisto integrates with AlienVault OTX to enable data enrichment and IOC hunting.
Demisto integrates with Amazon SQS for orchestration of SQS tasks as part of security operations and incident response.
Demisto integrates with AWS for managing images, snapshots, and instances.
Demisto integrates with Anomali ThreatStream for forensics and malware analysis.
Demisto integrates with AWS S3 for orchestration of cloud security response and IT tasks.
Blockade brings antivirus-like capabilities to users who run the Chrome browser, blocking malicious resources from being viewed or loaded inside of the browser.
A professional development environment that provides a foundation for Business Service Management (BSM) solutions.
Demisto integrates with RemedyOnDemand for ticket management.
Demisto integrates with Box to manage Box users.
Next-generation antivirus + EDR in one cloud-delivered platform that stops range of malware and non-malware attacks.
Reduced risk and exposure by automating response to security incidents and using rich endpoint data from Carbon Black and automated playbooks from Demisto.
Query and take action across your enterprise using Carbon Black Live Response from Demisto’s playbooks.
Demisto integrates with CB Live Response to collect information and take action on remote endpoints in real time.
Censys lets researchers find specific hosts and create aggregate reports on how devices, websites, and certificates are configured and deployed.
Demisto integrates with Centreon for orchestration of IT and network monitoring.
Automatically update IOC blacklist and change firewall policy from Demisto Enterprise based on incident investigation data.
Demisto integrates with Check Point SandBlast to help prevent malware and zero-day attacks.
This integration allows you to query, upload and download data using Check Point Sandblast on a local gateway.
AMP continuously analyzes file activity across your extended network, so you can quickly detect, contain, and remove advanced malware.
Cloudlock is a cloud-native CASB that helps protect your cloud users, data, and apps.
Demisto integrates with Cisco Email Security to protect against ransomware, business email compromise, spoofing, and phishing.
Demisto integrates with Cisco Meraki for device and firewall management.
Demisto integrates with messaging platform Cisco Spark for user and team management.
Threat Grid combines advanced sandboxing with threat intelligence into one unified solution to protect organizations from malware.
Cisco Umbrella Investigate provides a complete view of Internet domains, IP addresses, and systems to pinpoint attackers’ infrastructures and predict future threats.
Demisto integrates with Cofense for human-vetted, phishing-specific threat intelligence.
Collect alerts from Confer and create incidents inside of Demisto Enterprise.
Automatically check reputation of files, URL and IP addresses, query endpoint for rich forensics data and take actions back via Demisto playbooks and from investigation war-room.
Automatically check reputation of files, URL and IP addresses, query endpoint for rich forensics data and take actions back via Demisto playbooks.
Demisto integrates with the Falcon Streaming API to provide a constant source of information for real-time threat detection and prevention.
Analyze malware using the open source Cuckoo sandbox via automated playbooks.
Demisto integrates with CVE Search for vulnerability management.
Demisto integrates with CyberArk Application Identity Manager for accounts and credentials.
This integration enables search for connections and processes on Cybereason.
Automatically check the threat intelligence of files and hashes with the Cylance Inifinity API.
Digital Shadows monitors and manages an organization’s digital risk across the widest range of data sources within the open, deep, and dark web.
Query cyber threat intelligence data about domains, IP and URLs from DomainTools.
Duo is a comprehensive security solution confirms the identity of users and health of their devices before they connect to your applications.
EasyVista Service Manager manages the entire process of designing, managing and delivering IT services.
Run custom and pre-defined queries against your Elasticsearch instance to look for IOC, analyze logs or other tasks.
Endgame enables endpoint protection built to stop advanced attacks before damage and loss occurs.
Search and delete malicious email using EWS API from within Demisto playbooks.
Automatically enrich incident data with user risk score and complete session details from Exabeam and trigger responses to watchlist based on investigation.
Demisto integrates with F5 for firewall policy management.
Demisto integrates with Farsight Security to access real-time and historical Passive Domain Name System data.
Analyze malware samples collected from endpoint and other security tools automatically using Fireeye.
Demisto integrates with FireEye HX for faster endpoint threat prevention and response.
Demisto integrates with FireEye iSight for threat intelligence.
Demisto integrates with Forcepoint CASB to provide visibility and control over sanctioned and unsanctioned cloud apps.
Automatically whitelist and blacklist web URLs in Forcepoint Triton from within Demisto playbooks.
Demisto integrates with Giphy for displaying GIFs in the War Room to enhance discussions.
Demisto integrates with both GSuite and Admin API for authentication and messaging.
Demisto integrates with GRR to enable Rapid Response framework for investigations.
Demisto integrates with GuardiCore to provide data center breach detection.
Demisto integrates with EnCase to request scans of specific endpoints.
Demisto integrates with Have I Been Pwned? to check whether emails or domains have been compromised in recent breaches.
Check for reputation of IP addresses, URL and files using IBM X-Force exchange database from automated playbooks and war-room.
Icebrg reduces risk by accelerating threat detection, triage, and response to rapidly-evolving breaches across global networks.
Demisto integrates with iDefense for contextual, timely, and actionable security intelligence.
Demisto integrates with Incapsula to manage sites and IPs.
Demisto integrates with Intezer Analyze for malware detection and analysis.
IntSights delivers rapid, accurate cyberthreat intelligence and incident mitigation in real time.
Demisto integrates with the ipinfo.io API to get data about an IP address.
Collaborative web service that provides validation on whether a URL is a phishing page.
Demisto integrates with Jamf for comprehensive device management.
Demisto integrates with Jira for ticket management.
Demisto integrates with Joe Security Sandbox to automate detonation and malware analysis.
Kafka is an open-source distributed streaming platform.
Kenna is a Risk Intelligence & Vulnerability platform that enables InfoSec teams to prioritize and remediate vulnerabilities faster.
Check Android app samples against the Koodous API using this integration.
Demisto integrates with Lastline Analyst for advanced malware isolation and inspection.
Demisto integrates with Keylight, an enterprise GRC platform with tools for managing risk and compliance.
Create incidents from alarms in Logrhythm automatically and search for logs from within Demisto interface.
Automatically create incidents from the emails in a security mailbox. Custom parsers can trigger different types from same mailbox.
Automatically send notification emails for task assignment, incident assignment or other actions from Demisto Enterprise.
Analyze files using the Malwr sandbox using this integration.
Demisto integrates with McAfee Active Response for comprehensive endpoint detection and response.
Demisto integrates with McAfee Advanced Threat Defense for protection against stealthy, zero-day malware.
Demisto integrates with McAfee Database Activity Monitoring for real-time, reliable protection for business-critical databases.
Demisto integrates with McAfee DXL for secure, fast messaging across security and allied apps.
Demisto integrates with McAfee ePolicy Administrator for unified policy management.
Import critical alerts from McAFee ESM as incidents into Demisto Enterprise and automate response actions.
Demisto integrates with McAfee NSM for simple, centralized control for distributed network security appliances.
Demisto integrates with McAfee Threat Intelligence Exchange to optimize threat detection and response.
McAfee Web Gateway delivers high-performance web security through an on-premises appliance that can be deployed both as dedicated hardware and a virtual machine.
Micro Focus (specifically, ArcSight) integrates with Demisto through its ESM SIEM and events logger, allowing seamless creation and updation of events.
Demisto integrates with Micro Focus Service Support Manager for automated IT Service Management.
This integration enables queries to the MSSQL server.
Demisto integrates with Mimecast for unified email management.
Demisto integrates with the Malware Information Sharing Platform for threat information sharing.
Moloch is a large scale, open source, full packet capturing, indexing, and database system.
This integration enables access of MX records, DNS, blacklists and SMTP diagnostics in one integrated tool.
Run SQL queries for gathering rich information against any MySQL database.
Nessus is a vulnerability scanner for auditors and security analysts by Tenable Network Security.
Demisto integrates with Netskope for orchestration of cloud security incident response.
Demisto integrates with nmap to run scans with the given parameters.
Demisto integrates with Okta’s cloud based identity management service.
OpenPhish uses proprietary AI algorithms to automatically identify zero-day phishing sites and provide actionable, real-time threat intelligence.
Demisto integrates with OpsGenie for alerting and incident management for Dev and Ops teams.
The Metadefender multi-scanning engine uses 30+ anti-malware engines to scan files for threats, significantly increasing malware detection.
Collect rich forensics data from Mac OSX endpoints using the Demisto Enterprise and OSXCollector integration.
Demisto integrates with Packetsled for automated network visibility and packet captures.
Get user on call or trigger pagerduty alerts from Demisto Enterprise.
Demisto integrates with AutoFocus for threat intelligence, analysis, and prevention workflows.
Demisto’s integration with LightCyber empowers you to stop active attackers and malware operating inside your network.
Demisto integrates with Palo Alto Panorama for network security and firewall management.
Automate data enrichment and analysis with Demisto’s playbooks and Palo Alto Networks’ WildFire.
Demisto integrates with VxStream Sandbox from Payload Security for fully automated malware analysis.
Demisto integrates with Phish.AI for automated threat intelligence for more effective phishing response.
Demisto integrates with PhishTank to check URL reputation.
Automatically search for people details based on various attributes like email.
This integration allows users to query the PostgreSQL database.
Demisto integrates with Preempt Behavioral Firewall for detection and enforcement based on user identity.
Demisto playbooks use data collected by ProtectWise for hunting file, IP, domain and other indicators, enabling fast and accurate responses to incidents.
QRadar from IBM Security is an integrated analytics platform that streamlines critical capabilities into common workflows and helps increase analyst efficiency.
Demisto integrates with Qualys for network security and vulnerability management.
Collect vulnerability data and initiate incidents upon discovery of major vulnerabilities in sensitive systems.
Centralize threat intelligence across sources in real-time and respond at machine speed.
Conduct memory analysis using Rekall with real-time interactive ChatOps.
Use SSH and WMI to run actions on compromised endpoints via automated playbooks or from investigation war-room.
Demisto integrates with PassiveTotal from RiskIQ for threat infrastructure analysis from a variety of sources.
Demisto integrates with Archer for policy management.
RSA and Demisto provide an evolved SIEM and threat defense offering to overcome SOCs’ biggest challenges through automation and response.
Demisto integrates with SafeBreach for orchestration of attack simulation and response.
Demisto integrates with Salesforce CRM Services for object management.
Single sign-on support for any SAML 2.0 supported provider.
Secdo’s automated incident response platform hunts threats in real time and delivers an endpoint detection and response solution.
SecureControls makes IT Security more effective, easier, and more efficient.
Demisto integrates with SecureWorks to enable ticket management with Dell’s Counter Threat Operations Center.
Collect high severity alerts and run advanced queries against endpoints from Demisto server.
Create and update tickets from Demisto playbooks automatically.
Shodan is a search engine for Internet-connected devices integrated with Demisto for data enrichment.
Demisto integrates with Skyformation for orchestration of cloud application security.
Send notifications to Slack (direct messages and channels) for new incidents, assigned incidents and assigned tasks from Demisto Enterprise.
Splunk and Demisto have partnered to provide customers with the unique capability of automating investigations including quick and effective collection of data from endpoints and immediate response that includes enforcement on the endpoints.
Demisto integrates with Sumo Logic to provide a cloud-based service for logs and metrics management.
Demisto integrates with Symantec to provide ATP, Endpoint Protection, and Webpulse site review.
Artificial intelligence fused with critical endpoint technologies deliver the most complete endpoint security on the planet.
Symantec Messaging Gateway protects against spam, malware, and targeted attacks through email encryption and advanced content filtering.
Leverage the power of Symantec Managed Security Services for continual threat monitoring and 24×7 customized guidance.
Search and run queries against Tanium server from playbooks or via ChatOps enabled war-room within Demisto Enterprise.
tCell and Demisto have partnered to provide customers with the unique capability of automating investigations including quick and effective collection of data from endpoints and immediate response that includes enforcement on the endpoints.
Demisto integrates with TCPIPUtils for comprehensive enrichment and reputation checks for domains, IPs, and providers.
Automatically enrich incidents with latest intelligence from Threat Central for IP address, URL and other indicators.
Demisto’s integration with Threat Crowd enables report queries on a wide variety of indicators.
Demisto integrates with ThreatConnect to find threats, evaluate risk, and mitigate harm to your organization.
Learn more about threats & make your systems safer with the ThreatExchange API by Facebook, within Demisto playbooks.
Demisto integrates with Trend Micro to help eliminate security gaps across any user activity and endpoint.
TruSTAR’s threat intelligence platform enriches every stage of the security operations workflow from the trusted and relevant data sources.
Twilio is a cloud communication platform for building messages applications at scale.
Demisto integrates with urlscan.io to help scan websites for reputation.
Vectra and Demisto have partnered to provide customers with the unique capability of automating investigations including quick and effective collection of data from endpoints and immediate response that includes enforcement on the endpoints.
Demisto integrates with Venafi for key management and certificate management actions.
This integration allows users to manage Verodin simulations and topology.
Check for reputation of IP addresses, URL and files using VirusTotal database from automated playbooks and war-room.
Demisto integrates with VMRay for agentless threat analysis and detection.
VMware vCenter Server is a centralized management application that lets you manage virtual machines and ESXi hosts centrally.
Use volatility to analyze memory dumps for infected systems as part of playbook automations or interactive ChatOps commands.
Enrich all the indicators related to an incident with the relevant whois information automatically.
Integrated help with knowledge base articles available within the Demisto Enterprise product.
Zscaler is a cloud security solution built for performance and flexible scalability.