Integrations: Application

View All Integrations

1Password

Monitor your password management platform for suspicious activity.

AppOmni

Monitor your Software as a Service security posture.

Asana

Monitor Asana audit logs to identify suspicious activity in real-time.

Atlassian

Monitor Atlassian audit logs to identify suspicious activity in real-time.

Auth0

Monitor user authentication and authorization activities in Auth0.

Bitwarden

Identify any abnormal user activity in your organization's Bitwarden account.

Box

Gain complete visibility into your organization’s content management and file sharing.

Docker

Gain complete visibility into your Docker system events.

Dropbox

Identify any suspicious file-sharing activity within your organization.

Duo

Monitor your access management tools for suspicious activity.

GitHub

Identify any vulnerabilities within your GitHub repositories.

GitLab

Identify any suspicious behavior within your GitLab environment.

Google Workspace

Identify any suspicious activity within your Google Workspace applications.

Jamf Pro

Monitor Jamf Pro login events for suspicious activity.

Lacework

Gain complete visibility into your cloud and container environments.

Material Security

Monitor threats in Google Workspace and M365.

Microsoft 365

Monitor your team’s communication and collaboration tools for suspicious activity.

Microsoft Graph

Monitor security alerts across Microsoft products, services, and partners.

MongoDB Atlas

Monitor events within your MongoDB Atlas organization or project.

Netskope

Identify any suspicious cloud-based app or service activity.

Notion

Continuously monitor your Notion workspace.

Okta

Monitor Okta logs to gain complete visibility into your IdP activity.

OneLogin

Monitor your IdP for suspicious activity.

Salesforce

Monitor your sales operations data for suspicious activity.

Slack

Monitor your team’s communication platform for suspicious activity.

Snyk

Monitor for any changes within your Snyk Organization.

Sublime Security

Monitor email threats.

Sysdig

Gain complete visibility into Sysdig platform activity.

Teleport

Inspect all SSH access activity for signs of suspicious behavior.

Tenable

Gain complete visibility into your network assets.

Tines

Monitor any changes within your Tines tenant.

Zendesk

Monitor unusual activity within your Zendesk account.

Zoom

Monitor abnormal user activity within your Zoom account.

Zscaler

Monitor application, network, and device access.