Tuskira offers 150+ integrations
Featured integrations
AWS Cloud
Integrates cloud metadata and workloads for asset discovery and security analysis.
AWS ECR Scans
Collects and correlates vulnerability findings across environments.
AWS EKS
Integrates cloud metadata and workloads for asset discovery and security analysis.
AWS Inspector
Collects and correlates vulnerability findings across environments.
AWS Security Hub
Monitors cloud configurations, workloads, and posture for threats and misconfigurations.
Abnormal Email Security
Ingests email threat data to detect phishing and malicious payloads.
All integrations
AWS Cloud
Integrates cloud metadata and workloads for asset discovery and security analysis.
AWS ECR Scans
Collects and correlates vulnerability findings across environments.
AWS EKS
Integrates cloud metadata and workloads for asset discovery and security analysis.
AWS Inspector
Collects and correlates vulnerability findings across environments.
AWS Security Hub
Monitors cloud configurations, workloads, and posture for threats and misconfigurations.
Abnormal Email Security
Ingests email threat data to detect phishing and malicious payloads.
Azure AKS
Integrates cloud metadata and workloads for asset discovery and security analysis.
Azure Arc
Connects hybrid servers and workloads for unified visibility.
Azure Cloud
Integrates cloud metadata and workloads for asset discovery and security analysis.
BitBucket
Ingests code repositories for context-aware vulnerability mapping.
Burp Suite
Analyzes application security vulnerabilities in code and runtime.
CheckMarx
Analyzes application security vulnerabilities in code and runtime.
Cisco Duo
Imports device inventories and compliance data for exposure analysis.
Cisco Meraki
Provides network visibility and segmentation data for threat simulations.
Cloudflare DNS
Correlates DNS activity to detect malicious domains and network anomalies.
Cloudflare WAF
Validates and optimizes web application firewall rules against simulated attacks.
CrowdStrike EDR
Integrates endpoint telemetry and detection events for validation and response.
CrowdStrike Vulnerability Management
Collects and correlates vulnerability findings across environments.
Contact us if you'd like to suggest a new integration.