We know how important it is for your security solutions to talk to each other. Darktrace was built with an open architecture, making integrations quick and simple. Find some common cases listed below. Custom integrations are available upon request.
Integrations with Darktrace/Endpoint
Azure Sentinel
Analyze Darktrace AI Analyst incidents and model breach alerts in Azure Sentinel.
Enrich the Commvault platform with real time security insights from Darktrace Detect, so organizations can respond to threats reducing impact to their data
Leverage custom playbooks to orchestrate actions triggered by Darktrace AI Analyst incidents and model breaches. Automate commands to pull deeper information back from Darktrace.
Integrate Darktrace with Hunters to allow triaging of Darktrace alerts and incidents via the Hunters console, as well as further investigating and correlating them to related threats
Leverage custom playbooks to orchestrate actions triggered by Darktrace AI Analyst incidents and model breaches. Automate commands to pull deeper information back from Darktrace.
Enrich Darktrace detection with alerts from Microsoft Cloud App Security, the Microsoft Defender suite, Azure Information Protection, and Azure Identity Protection.
Analyze Darktrace AI Analyst incidents and model breach alerts in CIM compatible Splunk dashboards, and poll Splunk data to enrich Darktrace modeling with additional contextual information.
Leverage custom playbooks to orchestrate actions triggered by Darktrace AI Analyst incidents and model breaches. Automate commands to pull deeper information back from Darktrace.