Nous savons combien il est important que vos solutions de sécurité communiquent entre elles. Darktrace a été construit avec une architecture ouverte, rendant les intégrations rapides et simples. Vous trouverez ci-dessous quelques cas courants. Des intégrations personnalisées sont disponibles sur demande.
Integrations with Darktrace/Network
Sentinelle d'Azure
Analysez les incidents de Darktrace AI Analyst et modélisez les alertes de violation dans Azure Sentinel.
Leverage custom playbooks to orchestrate actions triggered by Darktrace AI Analyst incidents and model breaches. Automate commands to pull deeper information back from Darktrace.
Integrate Darktrace with Hunters to allow triaging of Darktrace alerts and incidents via the Hunters console, as well as further investigating and correlating them to related threats
Leverage custom playbooks to orchestrate actions triggered by Darktrace AI Analyst incidents and model breaches. Automate commands to pull deeper information back from Darktrace.
Enrich Darktrace detection with alerts from Microsoft Cloud App Security, the Microsoft Defender suite, Azure Information Protection, and Azure Identity Protection.
Analyze Darktrace AI Analyst incidents and model breach alerts in CIM compatible Splunk dashboards, and poll Splunk data to enrich Darktrace modeling with additional contextual information.
Leverage custom playbooks to orchestrate actions triggered by Darktrace AI Analyst incidents and model breaches. Automate commands to pull deeper information back from Darktrace.