Technical Integrations

Critical Start Integrations

Our goal is to fortify the diverse range of technologies crucial to your business operations. We seamlessly integrate with a multitude of products, a list that continuously expands with the evolving tech landscape and your unique needs.  

Endpoint Security

BlackBerry CylanceOPTICS

Crowdstrike Falcon

Microsoft Defender for Endpoint

Palo Alto Networks Cortex XDR

SentinelOne

Trend Micro Vision One

VMware Carbon Black

User/Identity/Phishing

Cisco Secure Email Gateway

Microsoft Defender XDR (Formerly MSFT 365 Defender)

Mimecast Email Security

Proofpoint On Demand Email Security

Proofpoint Targeted Attack Protection

SIEM

Critical Start Managed XDR

Devo

Microsoft Sentinel

Splunk Cloud

Sumo Logic Cloud SIEM

Atlassian Jira

ServiceNow ITSM

ServiceNow SecOps

Anti-Virus

Broadcom Symantec EDR

Symantec Endpoint Protection

Cisco Secure Endpoint

Cynet AutoXDR

ESET Protect

ESET Security Management Center

FireEye Endpoint Security

FireEye Endpoint Security

Minerva (Rapid7) Armor

Trellix ePolicy Orchestrator

Application Security

Contrast Security Contrast Protect

IBM WebSEAL

Authentication

Cisco Duo Security

CyberArk Digital Vault

CyberArk Endpoint Privilege Manager

JumpCloud

LastPass

Microsoft Entra ID (Formerly Azure Active Directory)

Okta

Okta Auth0

OneLogin

Ping Identity

Ping Federate

RSA SecureID

Secure Envoy

Semperis Directory Services Protector

Thycotic Secret Server

Cloud Provider

AWS EC2

AWS ECR

AWS EKS

AWS Kinesis

AWS Kinesis

AWS Lambda

AWS Route 53

AWS S3

Google Cloud DNS

Google Cloud Identity and Access Management

Google Cloud Platform

Google Kubernetes Engine Icon

Google Kubernetes Engine

Google Kubernetes Engine Icon

Kubernetes

Microsoft Azure

Oracle Cloud Infrastructure

Cloud Security

Alibaba Cloud Action Trail

ARGOS

Atlassian Jira Logo

Atlassian Confluence

AWS CloudTrail

AWS CloudWatch

AWS GuardDuty

AWS IAM

AWS Network Firewall

Cloudflare Logs

Cisco Umbrella Logo

Cisco Umbrella

Darktrace Antigena

Darktrace Enterprise Immune System

Darktrace Industrial Immune System

Forcepoint ONE SSE

Lookout Cloud Security

Palo Alto Networks Cortex Data Lake

Palo Alto Networks Prisma Cloud

SailPoint Identity Now

Trend Micro Cloud App Security

ZScaler NSS

ZScaler ZIA

Data Loss Prevention (DLP)

Fortra Digital Guardian

Proofpoint Insider Threat Management (Formerly ObserveIT)

Proofpoint Sigma

Telegram

Databases

Microsoft SQL Server

Oracle Database

Oracle MySQL

Snowflake

Domain Name Systems / Dynamic Host Configuration Protocol (DNS/DHCP)

Bluecat DDI

Cisco DHCP

Cisco Umbrella Logo

Cisco Umbrella

Infoblox BloxOne Threat Defense

Infoblox NIOS

ISC Bind 9

Endpoint Device Management

Tanium

Email / Email Security

Cisco Secure Email Gateway

Microsoft Exchange

Mimecast Email Security

ProofPoint On Demand Email Security

ProofPoint Targeted Attack Protection

Abnormal Security®

Firewall

Barracuda CloudGen Firewall

Checkpoint Firewall

Checkpoint Gaia

Cisco ASA

Cisco FTD

Cisco FWSM

Cisco Meraki

Cisco PIX

Cisco Secure Firewall Management Center

Debian Linux

Forcepoint Stonegate

Fortinet FortiGate NGFW

Fortinet UTM Unified Threat Management

Juniper ISG Integrated Security Gateways

Juniper NSM Network and Security Manager

Juniper SRX

Juniper SSG

Netgate pfSense

Palo Alto Networks

Palo Alto Next Gen Firewall (NGFW)

Palo Alto Networks

Sophos SecureNet NGFW

Watchguard Firebox

Host (OS/VM) Systems 

Apple MacOS

Debian Linux

Eaton Foreseer

Microsoft Windows

RedHat Linux

SentinelOne

Ubuntu Linux

VMware ESXi

VMware vCenter

Network Access Control (NAC)

Cisco Identity Services Engine

Network IDS/IPS

Arista NDR

AWS VPC

Cisco Stealthwatch

Corelight Suricata

Corelight Zeek

FireEye Network Security

IronNet IronDefense

Microsoft DHCP

Netskope Threat Protection

Vectra AI Detect

Vectra Stream

Operational Technology (OT) Security

Claroty Continuous Threat Detection

Dragos

Nozomi Networks

Otorio

Routers / Switches

Cisco Adaptive Security Appliance (ASA)

Cisco Intrusion Prevention System (IPS)

Cisco Identity Services Engine (ISE)

IBM Proventia

Ubiquiti UniFi

Vyatta

Zscaler Internet Access

SaaS Applications

Atlassian Jira

Atlassian Confluence

Box

GitLab

Google Workspace (Formerly Google GSuite)

Microsoft Dynamics 365

Microsoft GitHub

Microsoft Office 365

Microsoft SharePoint

Salesforce Service Cloud

Slack

Zendesk

Virtual Private Network (VPN)

AWS Client VPN

Citrix

Claroty Secure Remote Access

Ivanti Pulse Connect Secure

Palo Alto Networks Global Protect

Zscaler Private Access

Vulnerability Management

Qualys Vulnerability Management

Senserva Pro

Tenable Nessus

Tenable Vulnerability Management

Web Application Firewall (WAF)

Barracuda WAF

F5 BIG-IP Advanced WAF

Imperva Web Application Firewall

Web Proxy

Apache Software Foundation

Apache Tomcat

Application Load Balancer (ALB)

AWS Application Load Balancer (ALB)

AWS Cloudfront Logo

AWS Cloudfront

AWS Electric Load Balancer

AWS Elastic Load Balancer (ELB)

Bluecoat ProxySG

Cisco Ironport

Cisco Secure Web Appliance

Cisco Umbrella Logo

Cisco Umbrella

Citrix NetScaler

AWS Electric Load Balancer

F5 Big IP

F5 Nginx

HAProxy

McAfee Web Gateway

McAfee Web Proxy

Microsoft Forefront Threat Management Gateway

Open Source Varnish Cache

Skyhigh Security

Sophos NGFW

Squid Proxy

Symantec Proxy Security Gateway

Web Server

Citrix NetScaler

Oracle iPlanet

Oracle WebLogic Server

RedHat JBoss

Secure the Future of Cyber in an AI World. Upcoming Webinar - December 12
This is default text for notification bar