External Integrations
Overview
The Secure60 platform intrgrates with hundreds of applications, services, operating systems and devices.
Our integrations team provides custom onboarding instructions for any scenario.
A non exhaustive list of our integrations is as follows:
1Password
- Monitor your password management platform for suspicious activity.
Apache
- Inspect all web activity for signs of suspicious behavior.
Asana
- Monitor Asana audit logs to identify suspicious activity in real-time.
Atlassian
- Monitor Atlassian audit logs to identify suspicious activity in real-time.
Auditd
- Monitor system-level activities in your Linux environment.
Auth0
- Monitor user authentication and authorization activities in Auth0.
AWS ALB
- Monitor requests sent to your load balancer for suspicious activity.
AWS Aurora
- Monitor and detect any suspicious database events.
AWS CloudTrail
- Identify any suspicious activity within your AWS infrastructure.
AWS CloudWatch
- Monitor any resource changes within your AWS environment.
AWS Config
- Monitor the configuration of your AWS resources.
AWS EKS
- Monitor your Kubernetes environment for suspicious activity.
AWS GuardDuty
- Monitor your AWS environment for malicious activity and unauthorized behavior.
AWS S3
- Monitor all requests made to AWS S3 buckets.
AWS Security Hub
- Correlate AWS Security Hub findings.
AWS Transit Gateway
- Monitor the IP traffic flowing through your transit gateway.
AWS VPC
- Monitor the IP traffic going to and from network interfaces in your VPC.
AWS WAF
- Investigate traffic that is analyzed by your web Access Control Lists (ACLs).
Azure
- Continuously monitor your Azure account.
Bitwarden
- Identify any abnormal user activity in your organization’s Bitwarden account.
Box
- Gain complete visibility into your organization’s content management and file sharing.
Carbon Black
- Monitor endpoint activity for suspicious behavior.
Cisco Umbrella
- Identify any suspicious or malicious domain addresses or DNS requests.
Cloudflare
- Inspect network traffic for signs of suspicious behavior.
CrowdStrike
- Gain complete visibility into your managed endpoints.
Docker
- Gain complete visibility into your Docker system events.
Dropbox
- Identify any suspicious file-sharing activity within your organization.
Duo
- Monitor your access management tools for suspicious activity.
Envoy
- Monitor network activity for suspicious behavior.
Fastly
- Monitor network traffic for signs of suspicious behavior.
Fluentd
- Inspect application activity for any signs of suspicious behavior.
GCP
- Gain complete visibility into activity across your cloud service.
GitHub
- Identify any vulnerabilities within your GitHub repositories.
GitLab
- Identify any suspicious behavior within your GitLab environment.
Google Workspace
- Identify any suspicious activity within your Google Workspace applications.
Heroku
- Monitor your Heroku applications, infrastructure, and admin actions.
Jamf Pro
- Monitor Jamf Pro login events for suspicious activity.
Juniper
- Monitor network traffic for attack attempts or probes.
Lacework
- Gain complete visibility into your cloud and container environments.
Microsoft 365
- Monitor your team’s communication and collaboration tools for suspicious activity.
Microsoft Graph
- Monitor security alerts across Microsoft products, services, and partners.
MongoDB Atlas
- Monitor events within your MongoDB Atlas organization or project.
Netskope
- Identify any suspicious cloud-based app or service activity.
Nginx
- Monitor Nginx access logs and gain complete visibility into web server activity.
Notion
- Continuously monitor your Notion workspace.
Okta
- Monitor Okta logs to gain complete visibility into your IdP activity.
OneLogin
- Monitor your IdP for suspicious activity.
Osquery
- Gain complete visibility into your operating system activity.
OSSEC
- Monitor OSSEC logs to gain complete security visibility into host activity.
Salesforce
- Monitor your sales operations data for suspicious activity.
SentinelOne
- Monitor your endpoint data, network activity, and DNS requests.
Slack
- Monitor your team’s communication platform for suspicious activity.
Snyk
- Monitor for any changes within your Snyk Organization.
Sophos
- Monitor endpoint policy violations and data loss prevention events.
Suricata
- Identify any suspicious traffic or domain activity.
Sysdig
- Gain complete visibility into Sysdig platform activity.
Syslog
- Monitor machine and network activity for suspicious behavior.
Tailscale
- Monitor your team’s Tailscale network.
Teleport
- Inspect all SSH access activity for signs of suspicious behavior.
Tenable
- Gain complete visibility into your network assets.
Tines
- Monitor any changes within your Tines tenant.
Windows Event
- Monitor application, system, and security notifications from Windows machines.
Zeek
- Inspect network traffic and DNS protocols for suspicious activity.
Zendesk
- Monitor unusual activity within your Zendesk account.
Zoom
- Monitor abnormal user activity within your Zoom account.
ACM Certificate
- Audit changes to AWS Certificate manager
ALB
- Audit changes to AWS Application Load Balancer
AWS CloudTrail Log Analyzer
- Track account changes in real-time and detect suspicious activity
- Track real-time changes to AWS CloudFormation stacks
CloudWatch Log group
- Track real-time changes to AWS CloudWatch Log group
Config Recorder
- Audit changes to AWS Config Recorder
DynamoDB Table
- Continuously monitor AWS DynamoDB tables for compliance
EC2 AMI
- Monitor which AWS accounts can use AMI to launch instances
EC2 Instance
- Track real-time changes to your EC2 Instance
EC2 Network ACL
- Audit changes to AWS Network ACL
EC2 Security Group
- Audit changes to the security group in your EC2 instances.
EC2 Volume
- Continuously audit your EC2 Volume configurations
EC2 VPC
- Capture traffic activity and monitor actual network traffic flows.
ECS Cluster
- Gain visibility into specific ECS environments in real-time.
GuardDuty
- Track real-time changes to your AWS GuardDuty
IAM
- Track real-time changes to IAM User, Group, Role, and Policy
KMS Key
- Follow the highest standards of cryptographic practices.
Lambda
- Track real-time changes to your AWS Lambda
Password Policy
- Monitor password policies for your AWS account
RDS Instance
- Get alerted in real-time when a RDS change occurs.
Redshift Cluster
- Audit changes to AWS Redshift Clusters
S3 Buckets
- Detect and alert on unauthorized access to your S3 buckets.