Integrations: Application
1Password
Monitor your password management platform for suspicious activity.
AppOmni
Monitor your Software as a Service security posture.
Asana
Monitor Asana audit logs to identify suspicious activity in real-time.
Atlassian
Monitor Atlassian audit logs to identify suspicious activity in real-time.
Auth0
Monitor user authentication and authorization activities in Auth0.
Bitwarden
Identify any abnormal user activity in your organization's Bitwarden account.
Box
Gain complete visibility into your organization’s content management and file sharing.
Docker
Gain complete visibility into your Docker system events.
Dropbox
Identify any suspicious file-sharing activity within your organization.
Duo
Monitor your access management tools for suspicious activity.
GitHub
Identify any vulnerabilities within your GitHub repositories.
GitLab
Identify any suspicious behavior within your GitLab environment.
Google Workspace
Identify any suspicious activity within your Google Workspace applications.
Jamf Pro
Monitor Jamf Pro login events for suspicious activity.
Lacework
Gain complete visibility into your cloud and container environments.
Material Security
Monitor threats in Google Workspace and M365.
Microsoft 365
Monitor your team’s communication and collaboration tools for suspicious activity.
Microsoft Graph
Monitor security alerts across Microsoft products, services, and partners.
MongoDB Atlas
Monitor events within your MongoDB Atlas organization or project.
Netskope
Identify any suspicious cloud-based app or service activity.
Notion
Continuously monitor your Notion workspace.
Okta
Monitor Okta logs to gain complete visibility into your IdP activity.
OneLogin
Monitor your IdP for suspicious activity.
Salesforce
Monitor your sales operations data for suspicious activity.
Slack
Monitor your team’s communication platform for suspicious activity.
Snyk
Monitor for any changes within your Snyk Organization.
Sublime Security
Monitor email threats.
Sysdig
Gain complete visibility into Sysdig platform activity.
Teleport
Inspect all SSH access activity for signs of suspicious behavior.
Tenable
Gain complete visibility into your network assets.
Tines
Monitor any changes within your Tines tenant.
Zendesk
Monitor unusual activity within your Zendesk account.
Zoom
Monitor abnormal user activity within your Zoom account.
Zscaler
Monitor application, network, and device access.