Platform Integrations
NopSec UVRM integrates with over 50 threat intelligence and asset data technologies to allow you to assess all of your risk, prioritize remediations, and report on progress
-
GRC & AnalyticsGRC & analytics integrations
-
AssetsCMDB, Infrastructure, Vendor, and cloud/container integrations
-
Remediation & OrchestrationTicketing, orchestration, collaboration, and single sign on integrations
-
ScannersInfrastructure, web app, cloud/container, and configuration scanner integrations
-
Threat IntelligenceThreat intelligence integrations
-
ValidationValidation and end point protection integrations
-
View
All
-
TableauVisual analytics software for business intelligence
-
Microsoft Power BITurn data into opportunity with data visualization tools
-
RSA ArcherHolistic integrated risk management solution that helps organizations manage risk
-
BMC Helix CMDBEnriches ecosystem workflows with a business aware, single reference source for assets
-
ServiceNowSimplify software asset tracking and hardware asset management
-
MS Active DirectoryIdentity platform with enhanced security, access management, scalability, and reliability
-
CrowdStrike Falcon DiscoverNetwork security monitoring and IT hygiene
-
Security ScorecardDiscover and solve cybersecurity, compliance and risk management challenges
-
Risk IQCombine threat intelligence with knowledge of your worldwide digital footprint
-
PanoraysEnable viewing, managing, and engaging the security posture of third-party companies
-
AWS CloudReliable, scalable, and inexpensive cloud computing services
-
Azure CloudThe cloud platform with more than 200 products and cloud services
-
ServiceNowConnect your existing security tools to prioritize respond to vulnerabilities
-
Atlassian JiraPlan, track, and manage your agile and software development projects
-
BMC RemedyPredictive IT service management for your modern enterprise
-
Splunk PhantomHarness your security investments with security orchestration, automation and response
-
DemistoA security orchestration, automation, and response (SOAR) platform
-
SCCMAn integrated solution for managing all of your devices
-
SlackOrganize conversations, access all your tools and quickly find what you need to get work done
-
MS TeamsThe hub for team collaboration in Microsoft 365 integrating people, content, and tools
-
OKTASecure every identity with Single Sign-On, Multi-factor Authentication, Lifecycle Management, and more
-
oneloginThe identity platform for secure, scalable and smart experiences that connect people to technology
-
Microsoft ADFSEnable Federated Identity and Access Management by sharing digital identity and entitlements rights
-
Generic SAML 2.0The open standard for federated identity management and enables single sign on
-
Qualys VMThe most advanced, scalable and extensible solution for vulnerability management and network security
-
Tenable SecurityCenterReal-time vulnerability assessment and management of your security posture
-
Tenable NessusThe trusted gold standard technology for vulnerability assessment
-
Tenable Tenable.io VMAccurately identify, investigate and prioritize vulnerabilities managed in the Cloud
-
Rapid7 Insight VMRapid7 Insight VM
-
CrowdStrike SpotlightQuickly & effectively identify vulnerabilities in your applications & operating systems
-
BeyondTrust RetinaReduce risk with cross-platform vulnerability assessment and remediation
-
SonarQubeCatch bugs and vulnerabilities in your app, with thousands of automated Static Code Analysis rules
-
Portswigger Blurp Suite ProThe world's most popular tool for web security testing
-
Qualys WASCloud solution for continuous web app discovery and detection of vulnerabilities and misconfigurations
-
Tenable Tenable.io WASWeb Application Scanning to help you improve web application security
-
Micro Focus WebinspectDAST software that finds and prioritizes exploitable vulnerabilities in web applications
-
CheckmarxMaking security simple and seamless for developers through application security testing
-
VeracodeEnable creation of more secure software so that you can boost your business and reduce risk
-
IBM AppScanRetrieve AppScan Enterprise reports with the REST web service to import vulnerability data
-
Threat StackProviding cloud security and compliance for infrastructure and applications
-
jFrogShare build artifacts & dependencies from development to production with a complete DevOps Platform
-
Tenable ioAccurately identify, investigate and prioritize vulnerabilities managed in the Cloud
-
AWS InspectorAmazon Inspector from Amazon Web Services (AWS)
-
WhiteSourceAn agile open source security and compliance management solution
-
Tripwire Configuration ManagementAttackers use automated tools to find misconfigured AWS and Azure cloud accounts and storage
-
CrowdStrike Falcon XAutomated analysis and human intelligence, enabling all security teams to get ahead of the attacker
-
FireEye IsightCombining threat intelligence forces and perspectives into one powerful, intelligence-led platform
-
Recorded FutureAnalytics and human expertise to produce superior security intelligence that disrupts adversaries
-
CrowdStrike OverwatchProvide proactive managed hunting services to prioritize and respond to urgent threats
-
BugcrowdReduce risk through our bug bounty, pen testing, & vulnerability disclosure programs
-
CrowdStrike FalconEndpoint security products and services are delivered from the cloud, powered by AI
-
Microsoft Defender ATPEnterprise endpoint security platform designed to help networks prevent, detect, investigate, and respond to threats
-
Singularity PlatformUnify EPP, EDR, IoT control, and workload protection to help teams proactively resolve cybersecurity threats
-
TableauVisual analytics software for business intelligence
-
Microsoft Power BITurn data into opportunity with data visualization tools
-
RSA ArcherHolistic integrated risk management solution that helps organizations manage risk
-
BMC Helix CMDBEnriches ecosystem workflows with a business aware, single reference source for assets
-
ServiceNowSimplify software asset tracking and hardware asset management
-
MS Active DirectoryIdentity platform with enhanced security, access management, scalability, and reliability
-
CrowdStrike Falcon DiscoverNetwork security monitoring and IT hygiene
-
Security ScorecardDiscover and solve cybersecurity, compliance and risk management challenges
-
Risk IQCombine threat intelligence with knowledge of your worldwide digital footprint
-
PanoraysEnable viewing, managing, and engaging the security posture of third-party companies
-
AWS CloudReliable, scalable, and inexpensive cloud computing services
-
Azure CloudThe cloud platform with more than 200 products and cloud services
-
ServiceNowConnect your existing security tools to prioritize respond to vulnerabilities
-
Atlassian JiraPlan, track, and manage your agile and software development projects
-
BMC RemedyPredictive IT service management for your modern enterprise
-
Splunk PhantomHarness your security investments with security orchestration, automation and response
-
DemistoA security orchestration, automation, and response (SOAR) platform
-
SCCMAn integrated solution for managing all of your devices
-
SlackOrganize conversations, access all your tools and quickly find what you need to get work done
-
MS TeamsThe hub for team collaboration in Microsoft 365 integrating people, content, and tools
-
OKTASecure every identity with Single Sign-On, Multi-factor Authentication, Lifecycle Management, and more
-
oneloginThe identity platform for secure, scalable and smart experiences that connect people to technology
-
Microsoft ADFSEnable Federated Identity and Access Management by sharing digital identity and entitlements rights
-
Generic SAML 2.0The open standard for federated identity management and enables single sign on
-
Qualys VMThe most advanced, scalable and extensible solution for vulnerability management and network security
-
Tenable SecurityCenterReal-time vulnerability assessment and management of your security posture
-
Tenable NessusThe trusted gold standard technology for vulnerability assessment
-
Tenable Tenable.io VMAccurately identify, investigate and prioritize vulnerabilities managed in the Cloud
-
Rapid7 Insight VMRapid7 Insight VM
-
CrowdStrike SpotlightQuickly & effectively identify vulnerabilities in your applications & operating systems
-
BeyondTrust RetinaReduce risk with cross-platform vulnerability assessment and remediation
-
SonarQubeCatch bugs and vulnerabilities in your app, with thousands of automated Static Code Analysis rules
-
Portswigger Blurp Suite ProThe world's most popular tool for web security testing
-
Qualys WASCloud solution for continuous web app discovery and detection of vulnerabilities and misconfigurations
-
Tenable Tenable.io WASWeb Application Scanning to help you improve web application security
-
Micro Focus WebinspectDAST software that finds and prioritizes exploitable vulnerabilities in web applications
-
CheckmarxMaking security simple and seamless for developers through application security testing
-
VeracodeEnable creation of more secure software so that you can boost your business and reduce risk
-
IBM AppScanRetrieve AppScan Enterprise reports with the REST web service to import vulnerability data
-
Threat StackProviding cloud security and compliance for infrastructure and applications
-
jFrogShare build artifacts & dependencies from development to production with a complete DevOps Platform
-
Tenable ioAccurately identify, investigate and prioritize vulnerabilities managed in the Cloud
-
AWS InspectorAmazon Inspector from Amazon Web Services (AWS)
-
WhiteSourceAn agile open source security and compliance management solution
-
Tripwire Configuration ManagementAttackers use automated tools to find misconfigured AWS and Azure cloud accounts and storage
-
CrowdStrike Falcon XAutomated analysis and human intelligence, enabling all security teams to get ahead of the attacker
-
FireEye IsightCombining threat intelligence forces and perspectives into one powerful, intelligence-led platform
-
Recorded FutureAnalytics and human expertise to produce superior security intelligence that disrupts adversaries
-
CrowdStrike OverwatchProvide proactive managed hunting services to prioritize and respond to urgent threats
-
BugcrowdReduce risk through our bug bounty, pen testing, & vulnerability disclosure programs
-
CrowdStrike FalconEndpoint security products and services are delivered from the cloud, powered by AI
-
Microsoft Defender ATPEnterprise endpoint security platform designed to help networks prevent, detect, investigate, and respond to threats
-
Singularity PlatformUnify EPP, EDR, IoT control, and workload protection to help teams proactively resolve cybersecurity threats
Not Seeing the Integration You Need?
Let us know! We're always open to feedback that will allow us to better serve your cyber exposure needs.
We Serve Enterprise Security Needs
Request an Integration