Tuskira offers 150+ integrations
Featured integrations
AWS Cloud
Integrates cloud metadata and workloads for asset discovery and security analysis.
AWS ECR Scans
Collects and correlates vulnerability findings across environments.
AWS EKS
Integrates cloud metadata and workloads for asset discovery and security analysis.
AWS Inspector
Collects and correlates vulnerability findings across environments.
AWS Security Hub
Monitors cloud configurations, workloads, and posture for threats and misconfigurations.
Abnormal Email Security
Ingests email threat data to detect phishing and malicious payloads.
All integrations
Falco
Monitors runtime behavior and alerts on suspicious system activity.
GitHub SAST
Analyzes static code for vulnerabilities tied to exploitable risk scenarios.
GitHub SCA
Correlates open-source dependency risks with exploitable attack paths.
Github
Ingests code repositories for context-aware vulnerability mapping.
Gitlab
Ingests code repositories for context-aware vulnerability mapping.
Google Cloud Platform
Integrates cloud metadata and workloads for asset discovery and security analysis.
GCP
Google Mandiant
Adds external threat intelligence for enrichment and correlation.
Halcyon EDR
Integrates endpoint telemetry and detection events for validation and response.
Import Data via CSV
Collects and correlates vulnerability findings across environments.
Invicti DAST
Analyzes application security vulnerabilities in code and runtime.
JIRA Ticketing
Syncs incident and task workflows for automated remediation tracking.
Jamf Pro
Imports device inventories and compliance data for exposure analysis.
Lacework
Monitors cloud configurations, workloads, and posture for threats and misconfigurations.
Lacework VM
Collects and correlates vulnerability findings across environments.
Lineage
Correlates open-source dependency risks with exploitable attack paths.
Microsoft Defender External Attack Surface Management
Maps external attack surface and exposed assets for risk reduction.
Microsoft Defender Vulnerability Management
Collects and correlates vulnerability findings across environments.
Microsoft Defender for Cloud
Monitors cloud configurations, workloads, and posture for threats and misconfigurations.
Contact us if you'd like to suggest a new integration.