Elevate your security with seamless integrations
Unlock the full potential of your cybersecurity ecosystem by integrating your tools and intelligence feeds into one unified platform. With our extensive list of third-party integrations and developer-friendly tools, you'll gain the flexibility to customize, scale, and optimize your defenses to your unique security needs.
-
Accenture
Accenture CTI—one of the world’s largest cybersecurity services providers—leverages its network of global Security Operations Centers and over 7,500 security professionals to develop a nuanced understanding of threats and vulnerabilities at a global level. Our intelligence teams then distill focused insights from that body of knowledge and leverage our integration with EclecticIQ to inject those insights directly into our customers’ operations to deliver improved security outcomes.
-
AlienVault
AlienVault, now integrated with AT&T Cybersecurity, provides the Unified Security Management (USM) platform. This all-in-one solution seamlessly integrates critical security capabilities, including asset discovery, vulnerability assessment, intrusion detection, behavioral monitoring, and SIEM. By unifying these essential tools, USM delivers comprehensive monitoring and robust threat detection to simplify and enhance security management.
-
Amazon
Amazon S3 is an object storage service offering unmatched scalability, data availability, security, and performance. It allows businesses of all sizes to store and protect unlimited data for various use cases, including websites, apps, backups, archives, and analytics. With intuitive management tools and customizable access controls, Amazon S3 meets diverse business and compliance needs. Designed for 99.999999999% durability, it supports millions of applications worldwide.
-
Bitdefender
The Bitdefender Advanced Threat Intelligence solution helps security professionals gain visibility into the latest threats by using up-to-date, contextual intelligence on URLs, IPs, domains, certificates, files, Command and Control servers and Advanced Persistent Threats.
-
CentralOps.net
CentralOps.net is a platform operated by Hexillion Technologies, offering a suite of free online network tools for investigating and troubleshooting internet resources like domain names, IP addresses, email addresses, and URLs. The platform includes utilities such as traceroute, nslookup, dig, whois lookup, ping, and proprietary tools like Domain Dossier and Email Dossier, all compatible with IPv6. It enables users to gather detailed information about domains and IP addresses, including ownership, registrar data, and DNS records.
-
CIRCL - Computer Incident Response Center Luxembourg
The Computer Incident Response Center Luxembourg (CIRCL) is a government-driven initiative focused on gathering, analyzing, reporting, and responding to cybersecurity threats and incidents. One of their key services, the Passive SSL service, maintains a historical database of X.509 certificates observed per IP address, aiding security professionals in tracking SSL certificate usage over time through accessible public datasets and a REST API.
-
CISA
The Cybersecurity and Infrastructure Security Agency (CISA) serves as the operational lead for federal cybersecurity and acts as the national coordinator for critical infrastructure security and resilience. Built on collaboration and partnership, CISA's mission is to reduce risks to the nation's cyber and physical infrastructure through a multi-layered, integrated approach.
-
Cisco
The Cisco Umbrella API helps analysts quickly understand registration details, similar domains and potential malicious ties to observable data. With this integration, analysts can quickly discern threats and attribution intelligence from observables used in active campaigns as the cloud-based enricher provides information relating domains, IP addresses and file hashes. Combining this integration with EclecticIQ Platform enables analysts to dynamically build a repository of intelligence relating to domain activity.
-
Cofense
Cofense is a leader in email security, combining industry-leading security awareness training with advanced threat detection and response solutions. Leveraging data from over 35 million trained employees who actively report suspected phishing threats in real-time, Cofense provides unparalleled threat intelligence. This unique approach enables the company to identify and stop threats that other standard email controls may miss.
-
CrowdStrike
CrowdStrike™ is a leading provider of next-generation endpoint protection, threat intelligence, and related services. Their Falcon platform helps customers prevent targeted attacks, detect advanced threats in real time, and reduce incident response times. CrowdStrike serves major blue-chip companies and sophisticated government agencies globally.
-
Cybereason
Cybereason is a cybersecurity company specializing in endpoint protection, detection, and response. Their Defense Platform offers comprehensive security solutions, including Next-Generation Antivirus (NGAV), Endpoint Detection and Response (EDR), and Extended Detection and Response (XDR), to safeguard organizations against advanced cyber threats. Cybereason's unique MalOp™ (Malicious Operation) technology provides an operation-centric view of attacks, enabling security teams to detect and remediate threats more effectively.
-
Cyfirma
CYFIRMA is a cybersecurity firm specializing in External Threat Landscape Management (ETLM). Their platform integrates cyber intelligence, attack surface discovery, vulnerability intelligence, brand intelligence, situational awareness, and digital risk protection to provide organizations with a comprehensive view of their threat landscape. This approach enables businesses to proactively identify and mitigate potential cyber threats.
-
DomainTools
DomainTools provides an extensive, searchable database of domain name registrations, Whois records, and hosting data, used for online investigations and research. It supports cybersecurity analysts, fraud investigators, domain experts, and marketers in investigating cybercrime, protecting assets, and monitoring online activities.
-
Dragos
Dragos is a cybersecurity company dedicated to safeguarding industrial control systems (ICS) and operational technology (OT) environments. Their platform offers comprehensive asset visibility, advanced threat detection, and effective vulnerability management tailored to the unique challenges of OT systems. By integrating extensive OT-specific threat intelligence, Dragos enables organizations to monitor networks, identify vulnerabilities, and respond to cybersecurity threats with in-depth insights from their team of OT vulnerability analysts and adversary hunters.
-
Elastic
Elastic Security is a comprehensive solution that empowers organizations to protect, investigate, and respond to cyber threats using AI-driven analytics. Built on the Elastic Search AI Platform, it offers capabilities such as Security Information and Event Management (SIEM), endpoint security, and threat research, enabling teams to detect complex threats, streamline investigations, and automate responses.
-
Elemendar
Elemendar, established in 2017, specializes in artificial intelligence solutions for cybersecurity. Their platform automates the conversion of human-authored cyber threat intelligence into machine-readable data, enabling organizations to efficiently detect and respond to cyber threats.
-
Farsight Security
Farsight Security DNSDB is a Passive DNS historical database that provides a unique, fact-based, multifaceted view of the configuration of the global Internet infrastructure. DNSDB leverages the richness of Farsight’s Security Information Exchange (SIE) data-sharing platform and is engineered and operated by leading DNS experts.
-
Flashpoint
Flashpoint is a leading provider of threat intelligence and risk prevention solutions, offering comprehensive data and insights to help organizations identify and mitigate cyber and physical security threats. Their platform delivers actionable intelligence across various domains, including cyber threat intelligence, vulnerability management, and physical security, enabling clients to proactively address emerging risks and protect critical assets.
-
FS-ISAC
The Financial Services Information Sharing and Analysis Center is the global financial industry's go to resource for cyber and physical threat intelligence analysis and sharing. FS-ISAC operates as a member-owned non profit entity. EclecticIQ is an affiliate member.
-
Google Chronicle
Google Security Operations SIEM is a cloud-based service built on Google's core infrastructure, enabling enterprises to securely retain, analyze, and search extensive security and network telemetry. It normalizes, indexes, correlates, and analyzes data to deliver real-time analysis and context on potential threats and risky activities.
-
Group-IB
Group-IB's Threat Intelligence Platform provides actionable insights into cyber threats, offering strategic, operational, and tactical intelligence. It helps organizations anticipate attacks, understand threat trends, and strengthen defenses. The platform integrates with security systems, automating workflows and delivering tailored reports.
-
IBM Security
IBM Security offers one of the most advanced and integrated portfolios of enterprise security products and services. The portfolio, supported by world- renowned IBM Security X-Force® research, enables organizations to effectively manage risk and defend against emerging threats. IBM operates one of the world’s broadest security research, development and delivery organizations, monitors 150 billion+ security events per day in more than 130 countries, and has been granted more than 10,000 security patents worldwide.
-
Infoblox
Infoblox's DDI solution integrates DNS, DHCP, and IP Address Management into a unified platform, streamlining network services across hybrid and multi-cloud environments. This integration enhances network reliability, simplifies management, and provides centralized control, enabling organizations to efficiently manage IP resources, automate workflows, and maintain consistent network operations.
-
Intel 471
Intel 471 offers actor-centric intelligence collection designed for leading cyber threat intelligence teams. Their focus is on infiltrating and maintaining access to closed sources where threat actors collaborate, communicate, and plan attacks, providing unparalleled insights into adversary activities and threats.
-
Joe Security
Joe Security specializes in advanced malware analysis tools, with its flagship product Joe Sandbox offering in-depth analysis of threats across Windows, macOS, Android, and Linux. It uses hybrid code analysis and other technologies to provide detailed threat insights.
-
Kaspersky
Kaspersky's Threat Intelligence services provide organizations with comprehensive insights into cyber threats, enhancing their security posture. The offerings include Threat Data Feeds, Threat Lookup, Threat Analysis, Digital Footprint Intelligence, and APT Intelligence Reporting, all designed to deliver actionable intelligence throughout the incident management cycle. These services integrate seamlessly with existing security systems, enabling instant threat detection, analysis, and alert prioritization, thereby empowering organizations to make informed tactical and strategic decisions.
-
Mandiant
Mandiant is a leading American cybersecurity firm specializing in threat intelligence, incident response, and cybersecurity consulting services. Founded in 2004, the company provides in-depth analysis and remediation of advanced cyber threats, helping organizations protect themselves from evolving digital attacks. Known for its expertise in investigating high-profile breaches, Mandiant became part of Google Cloud in 2022, expanding its global impact on cybersecurity resilience
-
Micro Focus ArcSight
Micro Focus ArcSight ESM identifies and prioritize threats in real time so you can respond and remediate quickly. Correlate security logs from multiple data feeds, improve the accuracy of security alerts with complex use cases, and uncover advanced cyber attacks that previously went undetected.
-
Microsoft
Microsoft is a leading technology company known for developing software, hardware, and cloud services. Its cybersecurity solutions include Microsoft Sentinel, a cloud-native SIEM and SOAR platform that provides intelligent security analytics and threat detection, and Microsoft Defender, a comprehensive suite offering threat protection for endpoints, identity, cloud, and more. Together, these products help organizations detect, prevent, and respond to cyber threats efficiently.
-
National Institute of Standards and Technology (NIST)
The National Institute of Standards and Technology (NIST) is a non-regulatory federal agency within the U.S. Department of Commerce.
-
NSFOCUS
NSFOCUS is a global cybersecurity company specializing in cloud security, DDoS protection, and web security solutions. With over 20 years of experience, they offer services such as Anti-DDoS systems, Web Application Firewalls, and Threat Intelligence to safeguard enterprises and service providers against evolving cyber threats. Their solutions are designed to enhance network security, ensure business continuity, and protect critical assets.
-
Palo Alto Networks
Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate. Our mission is to be the cybersecurity partner of choice, protecting our digital way of life. We help address the world's greatest security challenges with continuous innovation that seizes the latest breakthroughs in artificial intelligence, analytics, automation, and orchestration. By delivering an integrated platform and empowering a growing ecosystem of partners, we are at the forefront of protecting tens of thousands of organizations across clouds, networks, and mobile devices. Our vision is a world where each day is safer and more secure than the one before
-
Proofpoint
Proofpoint's Emerging Threat (ET) Intelligence provides timely and accurate threat intelligence feeds, enabling organizations to identify IP addresses and domains involved in suspicious or malicious activities. These feeds are based on behavior observed directly by Proofpoint ET Labs and can be integrated into various security tools, such as SIEMs, firewalls, and intrusion detection systems.
-
Qualys
Qualys is a comprehensive cloud-based solution that identifies vulnerabilities across all networked assets, including servers, network devices (e.g., routers, switches, firewalls), peripherals (e.g., IP-based printers, fax machines), and workstations. It can effectively assess any device with an IP address to ensure robust security coverage.
-
Recorded Future
The Recorded Future integration provides both a feed and enricher capabilities. With the feed, users have access to the Recorded Future Risk List which includes IP and file hashes, for example. The results are provided in standard STIX/TAXII protocols including TTPs and Indicators. The enricher allows users to query Domains, hashes, URLs and IP addresses.
-
ReliaQuest
ReliaQuest is a cybersecurity company that acquired Digital Shadows, a threat intelligence firm, in June 2022. This acquisition combined ReliaQuest's detection and response capabilities with Digital Shadows' digital risk and threat intelligence technology, enhancing their security operations platform
-
RIPE NCC
RIPE NCC is a not-for-profit Regional Internet Registry for Europe, the Middle East, and parts of Central Asia. It allocates IP resources and provides services like RIPEstat, a platform offering data and analytics on Internet resources, routing, and DNS.
-
RiskIQ
RiskIQ, now part of Microsoft, specializes in digital threat management, offering comprehensive solutions for discovering, analyzing, and mitigating threats to an organization's digital presence. Their platform provides unified insights into web, social, and mobile exposures, enabling enterprises to understand their digital attack surfaces, assess risks, and take protective actions.
-
ServiceNow
ServiceNow Security Incident Response, a security orchestration and automation response (SOAR) solution, helps you rapidly respond to evolving threats while optimizing and orchestrating enterprise security operations. Security Incident Response eliminates the errors and friction natural to manual handoffs across systems, teams and responsibilities.
-
Silobreaker
Silobreaker helps business, security and intelligence professionals make sense of the overwhelming amount of unstructured data on the web. By providing powerful tools and visualisations that cut through the noise and analyse data from hundreds of thousands of open sources, Silobreaker makes it easy for users to monitor and research threats or opportunities.
-
Splunk
Splunk empowers observability, IT, and security teams to enhance organizational security, resilience, and innovation through its open, extensible data platform. Founded in 2003, Splunk supports seamless data sharing across environments, providing comprehensive visibility and context for all business processes.
-
SpyCloud
SpyCloud is a cybersecurity firm specializing in automated identity threat protection, leveraging data from the criminal underground to prevent ransomware, account takeover, and other targeted attacks. Their solutions help organizations check their exposure, protect digital identities, and unmask threat actors.
-
Sumo Logic
Sumo Logic empowers the people who power modern, digital business through its Continuous Intelligence Platform™. Practitioners and developers around the world rely on Sumo Logic to gain real-time analytics and insights from their cloud-native applications, helping them ensure application reliability, secure and protect against modern security threats, and gain insights into their cloud infrastructures.
-
VMRay
VMRay specializes in advanced threat analysis, focusing on detecting and analyzing sophisticated malware and phishing attacks. Their solutions help automate security operations and enhance incident response, serving enterprises, government agencies, and security providers. Based in Germany, VMRay aims to strengthen organizations' resilience against evolving cyber threats.