Optimize your workflows with top Cybersecurity integrations: seamlessly move and transform data between different apps and databases without getting caught up in API docs and troubleshooting CORS errors.
Mountains of monotonous tasks make building and monitoring your workflows a chore. Not anymore.
Learn more
AbuseIPDB contributes to a safer internet, addressing malicious activities one IP at a time. Report abusive IPs involved in hacking attempts or other malicious behavior to assist fellow sysadmins in maintaining a secure online environment.
AlienVault software, part of the Unified Security Management (USM) platform, provided integrated threat detection, incident response, and compliance management. It offered a centralized solution for monitoring and protecting against cybersecurity threats, helping organizations safeguard their digital assets.
Auth0 Management API is a tool for developers to manage and configure their Auth0 identity and access management service programmatically. It allows for user management, access control, and other administrative tasks through API calls.
Carbon Black, now part of VMware, offers endpoint security software. It provides advanced threat detection, response, and protection for devices and networks. Carbon Black software safeguards against cyber threats by monitoring and securing endpoints to enhance overall cybersecurity posture.
Cisco Meraki is a cloud-managed IT solution that includes networking, security, and device management. It simplifies network infrastructure, allowing businesses to centrally manage and secure their wireless, switching, security, and mobile device environments through an intuitive cloud-based dashboard.
Cisco Secure Endpoint (formerly known as AMP for Endpoints) is a cybersecurity solution that combines antivirus, advanced malware protection, and endpoint detection and response (EDR) capabilities. It helps organizations prevent, detect, and respond to security threats on their endpoints and provides valuable threat intelligence.
Cisco Umbrella is a cloud security platform that offers secure web gateway and DNS filtering services. It protects users and devices from accessing malicious websites and threats by enforcing security policies, helping organizations safeguard their network and data from cyberattacks.
CrowdStrike is a cybersecurity company known for its cloud-based endpoint security platform, Falcon. It provides advanced threat detection and response solutions, leveraging artificial intelligence and machine learning to protect organizations from cyberattacks and breaches.
DigiCert is a leading provider of digital certificates and SSL/TLS security solutions, ensuring secure communication and encryption for websites. With a vast range of services, they help businesses and organizations authenticate and protect their identities and data online.
F5 Big-IP is a suite of application delivery and security services. It provides load balancing, application firewall, and traffic management for applications and websites, optimizing performance and ensuring security, availability, and scalability in data center and cloud environments.
Filescan is a cloud-based file analysis tool that scans and analyzes files for malware and other threats. It provides detailed reports on file behavior and threat levels, helping security teams to identify and mitigate potential risks in their digital environments.
Fortinet FortiGate is a line of integrated security appliances that offer firewall, VPN, intrusion prevention, and other security features. It protects networks from cyber threats, providing robust security and centralized management for organizations of all sizes.
FullContact is a top SaaS provider for privacy-conscious Identity Resolution, employing its patented Identity Graph to facilitate the connection, consolidation, and enhancement of fragmented or incomplete offline, online, professional, and personal identifiers for brands and marketing platforms.
Hybrid Analysis is a cloud-based malware analysis platform. It enables cybersecurity professionals to analyze and understand the behavior of suspicious files and URLs. Using a combination of static and dynamic analysis techniques, it helps identify and combat malware and security threats effectively.
iAuditor by SafetyCulture is a digital inspection app that allows businesses to conduct audits and inspections efficiently. It enables users to easily create checklists, collect data, and generate reports, improving safety and compliance procedures for organizations across various industries.
Imperva WAF (Web Application Firewall) is a cybersecurity solution that protects web applications from online threats and attacks. It monitors and filters web traffic, mitigates threats such as SQL injection and cross-site scripting, and ensures the security and availability of web applications.
Iris DFIR (Digital Forensics and Incident Response) is a platform designed for investigating cybersecurity incidents. It offers tools for forensic analysis, evidence collection, and incident response management, allowing security professionals to efficiently handle and resolve security breaches.
Kibana is an open-source data visualization and exploration tool often used with Elasticsearch. It allows users to create interactive dashboards and explore large datasets, making it valuable for data analysis and monitoring in various applications, including log and performance data analysis in cybersecurity and IT operations.
KnowBe4 is a security awareness and simulated phishing platform that helps organizations educate their employees about cybersecurity threats. It offers training modules, phishing simulations, and assessment tools to test and improve the knowledge of individuals, ensuring they can spot and avoid potential cyberattacks.
Malcore is a malware analysis and detection platform that uses multiple antivirus engines and machine learning algorithms to identify and analyze malicious files. It provides comprehensive reports and threat intelligence, aiding in the proactive defense against malware attacks.
Azure Active Directory (Azure AD) is Microsoft's cloud-based identity and access management service. It provides secure authentication and authorization for users, enabling them to access applications, resources, and services in the Azure cloud and other integrated applications.
Mist, now part of Juniper Networks, offers a cloud-managed wireless networking solution. Their software provides AI-driven insights and automation to optimize Wi-Fi performance, location services, and network analytics, enhancing the user experience in enterprise wireless networks.
OpenCTI is an open-source platform designed for cyber threat intelligence management. It facilitates the collection, analysis, and sharing of threat intelligence data, helping organizations proactively defend against cyber threats by providing insights into vulnerabilities, indicators of compromise, and attacker tactics.
QRadar is IBM's security information and event management (SIEM) software. It centralizes and analyzes log and network flow data to detect and respond to security threats. QRadar helps organizations identify and mitigate security incidents by providing real-time monitoring and in-depth analysis of security data.
Qualys is a cybersecurity company offering cloud-based solutions for vulnerability management, security and compliance. Its software scans and assesses an organization's IT infrastructure to identify vulnerabilities and ensure compliance with security standards, helping businesses protect their systems and data.
Rapid7 Insight Platform is a comprehensive cybersecurity solution that offers advanced analytics, automation, and orchestration capabilities. It helps organizations detect and respond to threats faster, improve their security posture, and gain valuable insights into their network and cloud environments.
Rapid7 InsightVM is a vulnerability management platform that provides real-time visibility into network vulnerabilities, enabling proactive security measures. It offers dynamic risk assessment, prioritization, and remediation guidance, helping organizations enhance their security posture and protect against potential threats.
Recorded Future is a threat intelligence platform that collects and analyzes vast amounts of data from the internet to provide actionable insights on cyber threats. Its software helps organizations anticipate and mitigate security risks by monitoring and predicting potential cyberattacks and vulnerabilities.
Rootly is a platform that streamlines incident management by automating manual tasks. Trusted by thousands globally, it simplifies the incident resolution process, ensuring consistency and efficiency for users.
Sekoia platform empowers security teams with automated incident identification and response capabilities across their entire attack surface. Featuring integrated intelligence, real-time detection, and scalable automation readiness, it helps teams overcome volume, complexity, and false positives in cybersecurity operations.
Shuffler is a platform that offers cloud-based deployment and management of Jupyter notebooks, a popular tool for data analysis and machine learning. It provides collaboration features, version control, and automation for data science teams, simplifying workflow and enhancing productivity in data-related projects.
Spike is an app that helps manage incidents efficiently by providing unlimited alerts and on-call schedules for team members. It ensures all team members are notified promptly and have clear responsibilities to address any issues that arise.
Trellix ePO (ePolicy Orchestrator) is a centralized security management software by McAfee. It streamlines security management, allowing organizations to monitor and control their cybersecurity infrastructure, including antivirus and firewall settings, for comprehensive threat protection and efficient security policy enforcement.
VirusTotal is an online service owned by Google that analyzes files and URLs for malware and security threats. It aggregates antivirus scan results from multiple engines, providing users with a comprehensive assessment of potential threats, aiding in cybersecurity and threat intelligence efforts.
Zabbix is an open-source monitoring software for networks, servers, and applications. It provides real-time monitoring, data visualization, and alerting, enabling proactive issue detection and resolution. Zabbix supports a variety of monitoring methods, including SNMP, IPMI, JMX, and more.
Zscaler ZIA (Zero Trust Internet Access) is a cloud security service that provides secure and direct internet access for users, regardless of their location. It enforces security policies, filters web traffic, and protects against threats, improving cybersecurity and user productivity.
End of results
Didn’t find what you were looking for? Refine your search, or:
What types of Cybersecurity tools can I integrate with n8n?
Are there any specific requirements or limitations for using Cybersecurity integrations?
What are some popular use cases for Cybersecurity integrations in n8n?
How does n8n’s pricing model benefit Cybersecurity workflows?
How can I leverage n8n's AI capabilities in my Cybersecurity workflows?
The world's most popular workflow automation platform for technical teams including