In order to improve the security of the Internet in France, the ANSSI, the national authority for the security of information systems, regularly performs network scans. The purpose of these network scans is to reduce the number of devices that can be exploited by attackers.
Acunetix Premium is a web application security solution for managing the security of multiple websites, web applications, and APIs. Integration features allow you to automate your DevOps and issue management infrastructures.
Amazon Inspector is an automated vulnerability management service that continually scans AWS workloads for software vulnerabilities and unintended network exposure.
By using an offensive attacker’s point of view, Ambionics has created an efficient and realistic approach which oversteps the limits of classical manual or automated assessment. Through the combination of its powerful technical platform and its team of experts in breach tactics, Ambionics provides to companies an innovative solution for continuous web application security assessment.
See and stop threats across every phase of your software development lifecycle,from code to cloud and back.
By connecting to hundreds of data sources, Axonius gives IT and security teams a comprehensive inventory, uncovers gaps, and triggers automated response actions whenever devices, users, and SaaS apps deviate from policies, controls, and expectations.
Track work with Kanban boards, backlogs, team dashboards, and custom reporting. Combine drag-and-drop sprint planning and flexible work item tracking with comprehensive traceability to have the perfect home for all your ideas–big and small.
BMC Helix CMDB
Your BMC Helix Configuration Management Database (CMDB) gives you crucial information about your digital services and the infrastructure that supports them. It enables your key operational processes, helping you predict, prevent, and resolve service outages, minimize the risk of changes, and respond quickly to end users.
Beyond Security beSecure
Secure your applications and networks with the industry’s only vulnerability management platform to combine XDR, SAST, DAST and mobile security.
Bitsight provides continuous visibility into all your critical external assets. Connect to the BitSight API and to seamlessly import findings within your Hackuity workspace. Findings that are not seen by BitSight for 2 weeks are automatically transitioned to “Fixed” in Hackuity.
Board of Cyber Security Rating
Board of Cyber Security Rating's principle is to rate the cyber security performance and maturity of an organization thanks to an automated, continuous and reproducible evaluation of observable public data.
Connect to your Burp Enterprise API to seamlessly import and synchronize vulnerabilities within your Hackuity Workspace.
Burp Pro scan import permits to create assessments by uploading a Burp archive to the platform.
Easily integrate one-click AppSec testing with a platform built from Checkmarx industry-leading technology. Designed for the cloud development generation and delivered from the cloud, it seamlessly secures your entire codebase so can you deliver and deploy more-secure code
Claroty secures the Extended Internet of Things (XIoT) to achieve unmatched visibility, protection, and threat detection across all cyber-physical systems.
Crowdstrike Falcon Spotlight
Falcon Spotlight provides real-time visibility across your enterprise — giving you relevant and timely information you need to reduce your exposure to attacks with zero impact on your endpoints.
From detection to remediation, manage all your vulnerabilities and enhance your cybersecurity posture. Check the compliance of your IT assets against your standards, and setup a proper in-depth defense
Dynatrace combine deep observability, AIOps, and application security in one open, unified platform to continuously deliver precise answers and intelligent automation from data.
Your EasyVista Configuration Management Database (CMDB) gives you crucial information about your digital services and the infrastructure that supports them. It enables your key operational processes, helping you predict, prevent, and resolve service outages, minimize the risk of changes, and respond quickly to end users.
The Hackuity-Easyvista (ITSM) integration enables you to create and follow issues from the Hackuity App.
Fortify Software Security Center enables management, development, and security teams to work together to triage, track, validate, automate, and manage software security activities.
CodeQL can check your application for security flaws by analysing the code.
GitLab can check your application for security vulnerabilities including:
- Unauthorized access.
- Data leaks.
- Denial of Service (DoS) attacks.
Dependabot security updates are automated pull requests that help you update dependencies with known vulnerabilities.
The Greenbone VM scan import permits to create assessments by uploading a .xml to the platform.
Hackuity assessment Universal format import
This connector permits to import assessment information using the Hackuity assessment Universal method based on CSV format.
Hackuity assets Universal format import
This connector permits to import assets information using the Hackuity asset Universal method based on CSV format.
Helix ALM is a modular suite of ALM tools. You can use this application lifecycle management suite to trace requirements, tests, and issues.
IBM Security QRadar SOAR
IBM Security SOAR, formerly Resilient, is designed to help your security team respond to cyber-threats with confidence, automate with intelligence, and collaborate with consistency.
Invicti Enterprise (formerly Acunetix 360)
Application security with zero noise. Build security automation into every step of your SDLC – so your teams can eliminate hundreds of hours of manual tasks each month.
Jira is a proprietary issue tracking product developed by Atlassian that allows bug tracking and agile project management. The product name is a truncation of Gojira, the Japanese word for Godzilla, which is a reference to a competitor, Bugzilla. (Wikipedia)
Cloud security is a data problem. Lacework CNAPP platform automatically makes sense of all your cloud data and uses your own data to better protect your entire environment — from build time through runtime.
Microsoft Defender for Endpoint
Microsoft Defender for Endpoint is an enterprise endpoint security platform designed to help enterprise networks prevent, detect, investigate, and respond to advanced threats.
NIST National Vulnerability Database (NVD)
The NVD is the U.S. government repository of standards based vulnerability management data represented using the Security Content Automation Protocol (SCAP). This data enables automation of vulnerability management, security measurement, and compliance. The NVD includes databases of security checklist references, security related software flaws, misconfigurations, product names, and impact metrics.
Nmap ("Network Mapper") is a free and open source (license) utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime.
OCD Vulnerability Intelligence Watch
The Vulnerability Intelligence solution identifies security vulnerabilities that represent a real risk to your business if they were exploited by an attacker. This solution from Orange Cyberdefense is for all multinational companies and small and medium businesses. The service model can be managed or bespoke depending on your needs.
The OWASP® Foundation works to improve the security of software through its community-led open source software projects, hundreds of chapters worldwide, tens of thousands of members, and by hosting local and global conferences.
Outpost 24 AppSec
Outpost24 offers all the tools, insights and data you need to uncover security risk exposure across your entire attack surface.
Outpost 24 NetSec
Outpost24 offers all the tools, insights and data you need to uncover security risk exposure across your entire attack surface.
Palo Alto Cortex XSOAR
Cortex™ XSOAR is a comprehensive security orchestration, automation and response (SOAR) platform that unifies case management, automation, real-time collaboration and threat intel management to serve security teams across the incident lifecycle. This connector needs to be setup in the Palo Alto Cortex XSOAR interface. From a war-room, query your Hackuity cockpit in order to seamlessly retrieve information related to your vulnerability stock. This integration was integrated and tested with version 1.25.0 of Hackuity.
PaloAlto Cortex XDR
Cortex XDR delivers enterprise-wide protection by analyzing data from any source to stop sophisticated attacks.
Power BI is a Business Intelligence (BI) solution developed by Microsoft, enabling users to consolidate, analyze, visualize and distribute their Hackuity data.
The Most Complete Cloud-Native Application Protection Platform (CNAPP).
Prisma Cloud secures applications from code to cloud, enabling security and DevOps teams to effectively collaborate to accelerate secure cloud-native application development and deployment.
Continuously detect and track web application technology changes with real-time alerts on new vulnerabilities, new technologies, new versions, and revised ratings.
Qualys VM gives you visibility and control by finding official and “unofficial” apps throughout your environment, and letting you categorize them.
Qualys WAS gives you visibility and control by finding official and “unofficial” apps throughout your environment, and letting you categorize them.
Rapid 7 Insight VM
Rapid7 is advancing security with visibility, analytics, and automation delivered through their Insight cloud. Their solutions simplify the complex, allowing security teams to work more effectively with IT and development to reduce vulnerabilities
SecurityScorecard instantly empowers you with the trust and confidence to make smarter, faster decisions. Gain an outside-in view of your security posture so you can take preventative action.
One platform for superior visibility and enterprise-grade prevention, detection, and response across your attack surface, from endpoints and servers to mobile devices.
Your ServiceNow Configuration Management Database (CMDB) gives you crucial information about your digital services and the infrastructure that supports them. It enables your key operational processes, helping you to predict, prevent, and resolve service outages, minimize the risk of changes, and respond quickly to end users
ServiceNow IT Service Management
ServiceNow develops a cloud computing platform to help companies manage digital workflows for enterprise operations
SonarCloud.io is a cloud-based code analysis service designed to detect code quality issues in 25 different programming languages, continuously ensuring the maintainability, reliability and security of your code.
SonarQube is an open-source platform developed by SonarSource for continuous inspection of code quality to perform automatic reviews with static analysis of code to detect bugs and code smells on 29 programming languages. SonarQube offers reports on duplicated code, coding standards, unit tests, code coverage, code complexity, comments, bugs, and security recommendations
Sonatype Nexus Lifecycle
Automatically find and fix open source vulnerabilities at every stage of the SDLC.
Black Duck is a software composition analysis (SCA) which helps teams manage the security, quality, and license compliance risks that come from the use of open source and third-party code in applications and containers.
Polaris brings market-leading security analysis engines together in a unified platform, giving you the flexibility to run different tests at different times based on application, project, schedule, or SDLC events.
A single platform that delivers complete, accurate and real-time endpoint data regardless of scale and complexity.
Nessus Professional scan import permits to create assessments by uploading a .nessus archive to the platform.
Tenable Security Center
Accurately identify, investigate and prioritize vulnerabilities. Managed On-Prem.
Tenable Vulnerability Management
Accurately identify, investigate and prioritize vulnerabilities. Managed in the Cloud.
Accurately identify, investigate and prioritize vulnerabilities. Managed in the Cloud
Tenacy is a solution dedicated to the CISO for the global management of cybersecurity and risks within organizations. This connector needs to be setup in the Tenacy interface. From the Tenacy interface, query your Hackuity cockpit in order to seamlessly retrieve information related to your vulnerability stock. This integration was integrated and tested with version 1.25.0 of Hackuity.
Trellix Endpoint Detection and Response (EDR) helps security analysts understand alerts, conduct investigations, and quickly respond to threats.
Trivy can check your application for security vulnerabilities
The WPScan CLI tool is a free, for non-commercial use, black box WordPress security scanner written for security professionals and blog maintainers to test the security of their sites. The CLI can use the WordPress Vulnerability Database API to retrieve WordPress vulnerability data in real time.
See and secure your cloud with actionable context. Complete visibility and context for your cloud in minutes so your teams can proactively identify, prioritize, remediate, and prevent risks to your business.
Bug Bounty Application - It provides a crowdsourced platform for bug bounty programs where ethical hackers can report security exploits and vulnerabilities.
A bug bounty is a hunt for vulnerabilities, a challenge to ethical hackers.
Find a bug, get a reward. The more critical the vulnerability, the higher the bounty.
If malicious hackers can do evil, why can’t ethical hackers do good?
Fight fire with fire, that’s the spirit.
HTTPCS vulnerability scanner analyse and sort every URLs found on a website (or a web application) and theirs links to explore in priority the most relevant pages based on data partition algorithm, links analytics and language processing applied to URLs.
We haven’t found any connector matching your request.