Tenacy
Tenacy is a solution dedicated to the CISO for the global management of cybersecurity and risks within organizations. This connector needs to be setup in the Tenacy interface. From the Tenacy interface, query your Hackuity cockpit in order to seamlessly retrieve information related to your vulnerability stock. This integration was integrated and tested with version 1.25.0 of Hackuity.
Close
What can I do with it?
Tenacy is a solution dedicated to the CISO for the global management of cybersecurity and risks within organizations. This connector needs to be setup in the Tenacy interface. From the Tenacy interface, query your Hackuity cockpit in order to seamlessly retrieve information related to your vulnerability stock. This integration was integrated and tested with version 1.25.0 of Hackuity.
ThreatQ
ThreatQ supports an ecosystem of over 450 product and feed integrations, provides the ThreatQ Integration Framework including easy-to-use tools for custom integrations, streamlining threat detection, investigation and response across your security infrastructure.
Vulnerability intelligence
Close
What can I do with it?
This integration allows users to enrich Hackuity with adversaries and malware data from ThreatQ.
Traceable
Traceable is a comprehensive API security platform designed to protect organizations against API-related vulnerabilities and threats. By leveraging advanced machine learning and behavioral analytics, Traceable enables real-time monitoring, threat detection, and risk assessment for APIs.
Close
What can I do with it?
Connect to the Traceable API to seamlessly import and synchronize APIs and related vulnerabilities within your Hackuity platform.
Trend Micro Deep Security
Trend Micro Deep Security is an advanced, multi-layered protection suite designed for cloud, physical, and virtual environments. It delivers robust security capabilities, including intrusion prevention, anti-malware, integrity monitoring, and log inspection. This solution ensures comprehensive defense against threats, simplifies security management, and supports compliance requirements. Deep Security is ideal for businesses seeking efficient, scalable protection for their evolving IT infrastructure.
Close
Trend Micro Deep Security
API connection
What can I do with it?
The Hackuity - Trend Micro Deep Security integration allows user to synchronize multiple information about the assets monitored by Deep Security into your Hackuity platform.
Trend Micro Vision One XDR
Trend Micro VisionOne is a security solution designed to protect physical servers, virtual environments, and cloud environments against threats and vulnerabilities.
Close
Trend Micro Vision One XDR
API connection
What can I do with it?
Trend Micro VisionOne connector allows you to import your servers and workload endpoints into Hackuity.
Veracode
A platform that unifies development and security delivers a successful secure DevOps program.
Close
What can I do with it?
This integration allows users to retrieve vulnerabilities on your targets scanned by Veracode SAST & SCA.
Wiz
See and secure your cloud with actionable context. Complete visibility and context for your cloud in minutes so your teams can proactively identify, prioritize, remediate, and prevent risks to your business.
Close
What can I do with it?
This integration allows users to retrieve cloud resources (container images, machines) data from Wiz.io as well as its related vulnerabilities.
WPScan
The WPScan CLI tool is a free, for non-commercial use, black box WordPress security scanner written for security professionals and blog maintainers to test the security of their sites. The CLI can use the WordPress Vulnerability Database API to retrieve WordPress vulnerability data in real time.
Close
What can I do with it?
The WPScan CLI tool is a free, for non-commercial use, black box WordPress security scanner written for security professionals and blog maintainers to test the security of their sites. The CLI can use the WordPress Vulnerability Database API to retrieve WordPress vulnerability data in real time. Import a WPScan scan by uploading a .JSON WPScan output in the Hackuity workplace to create a vulnerability assessment mapped with the WPScan information.
YesWeHack
Bug Bounty Application - It provides a crowdsourced platform for bug bounty programs where ethical hackers can report security exploits and vulnerabilities.
Close
What can I do with it?
Bug Bounty Application - It provides a crowdsourced platform for bug bounty programs where ethical hackers can report security exploits and vulnerabilities.
Yogosha
Yogosha is an Offensive Security Testing Platform. Agilely launch and manage your security tests from end to end with this vulnerability management platform and its Strike Force of 800+ cybersecurity experts.
Close
What can I do with it?
Yogosha is an Offensive Security Testing Platform. Agilely launch and manage your security tests from end to end with this vulnerability management platform and its Strike Force of 800+ cybersecurity experts. This integration allows users to retrieve VDP and Bug Bounty reports from Yogosha into your Hackuity platform.
Ziwit HTTPCS
HTTPCS vulnerability scanner analyse and sort every URLs found on a website (or a web application) and theirs links to explore in priority the most relevant pages based on data partition algorithm, links analytics and language processing applied to URLs.
Close
Ziwit HTTPCS
API connection
What can I do with it?
HTTPCS vulnerability scanner analyse and sort every URLs found on a website or a web application and theirs links to explore in priority the most relevant pages based on data partition algorithm, links analytics and language processing applied to URLs. Connect to the HTTPCS API and to seamlessly import and synchronize vulnerabilities within your Hackuity workspace.
No results...
We haven’t found any connector matching your request.