Integrations Summary

Info

Today Threat Response supports integrations of various types.
Click on the integration product name in order to learn more.

Currently Supported Integrations

Product Integration category Use case Version
Abuse Mailbox Monitor Alert Source Monitor a mailbox for user-submitted messages N/A
Alert ETL (Python Scripting) Alert Source Use custom python scripts to ingest alert data from sources not natively supported by Threat Response
Blue Coat ProxySG Proxy, Dynamic Block Lists TR can place URLs into a block list, which is then referenced by Blue Coat ProxySG to enforce browsing policies 6.2 +
BMC Remedy Ticketing System Ticketing Create BMC Remedy tickets using email notifications generated by Threat Response N/A
Carbon Black EIDR EDR IOC Collection 5.x, 6.x
Carbon Black EIDR EDR Manual host isolation using Carbon Black
IOC Collection
N/A
Centrify Identity access management Enforce SSO policies based on the user AD group placement N/A
Check Point Enforcement device Synchronize TR local lists to Checkpoint NGFW devices R75.40 +
Cisco ASA Enforcement Device Cisco ASA can be used to prevent network-based access to malicious hosts, or to restrict access to certain areas of the network for infected users 8.3 +
Cisco FirePOWER NGIPS Alert Source Ingest alerts from Cisco FirePOWER NGIPS platform 5.4.0 +
Cisco IOS Enforcement Device Cisco IOS can be used to prevent network-based access to malicious hosts 12.4 +
Cisco OpenDNS Enforcement Device Enables network administrators to block unwanted or malicious websites for users across their networks using OpenDNS’s DNS sink-holing capabilities. Current
CyberArk Enterprise Vault Enforcement device Enforce privilege credentials usage based on the Security AD groups that TR can place users into 9.1+
Duo Security Two factor authentication solutions Enforce 2FA policies based on the AD security group placement N/A
Emerging Threats Enrichment Integrate with Emerging Threats API in order to enrich IP, URLs, and hashes with available Threat Intelligence N/A
FireEye EX Series Alert Source Ingest alerts about malware delivered over email 6.2.0 +
FireEye NX Series Alert Source Ingest various alerts from NX, including web infections, callbacks, and malware objects 6.2.0 +
Fortinet FortiGate Enforcement device Synchronize TR local lists to Fortigate devices 4.0 +
Google GSuite Email quarantine Connect to Gmail’s API in order to find and quarantine specified emails N/A
HP ArcSight ESM Alert Source SIEM alert ingestion into Threat Response 5.0.1 +
IBM Domino Email quarantine Use the Proofpoint Agent for Domino to find and quarantine specified emails Server: 9.0.1 (Fix-Pack 10) running on Windows Server
IBM QRadar Alert Source SIEM alert ingestion into Threat Response 7.0.0 +
Imperva SecureSphere Enforcement device Enforce service usage or device access based on the Security AD groups that TR can place users into 11.5+
JIRA Ticketing Create JIRA tickets for Threat Response incidents (deprecated as of 3.5) N/A
JSON Custom Response API Custom response Initiate custom JSON responses to 3rd party products with APIs N/A
JSON Event Source Alert Source Ingest alert data from 3rd party devices using JSON based REST API N/A
Juniper Secure Analytics Alert Source SIEM alert ingestion into Threat Response 10.4 +
Juniper SRX (JUNOS) Enforcement device Synchronize TR local lists to Juniper SRX devices 10.4 +
MaxMind Enrichment Enrich IPs using Geo-IP data from Max Mind N/A
Microsoft Active Directory Enrichment Collect user details and metadata from Active Directory Server 2008 R2, Server 2012
Microsoft Azure SSO Identity access management Enforce SSO policies based on the user AD group placement N/A
Microsoft Exchange Email quarantine Interface with MSFT exchange over Web Services API in order to find and quarantine specified emails Exchange 2010, 2013, 2016, 2019, Office 365
Okta Identity access management Enforce SSO policies based on the user AD group placement N/A
OneLogin Identity access management Enforce SSO policies based on the user AD group placement N/A
Palo Alto Networks NGFW Enforcement device Synchronize its local lists to Address Groups and URL profiles in the Palo Alto Networks device 4.1 +
Palo Alto Networks NGFW Proxy, Dynamic Block Lists Create Dynamic Block Lists (DBL) that enable PAN device to pull lists of IPs from Threat Response into a local object. 4.1 +
Palo Alto Networks Panorama Enforcement device Centrally synchronize TR local lists to Address Groups and URL profiles in the PAN devices (through PAN Panorama) 7.0 +
Palo Alto Networks Wildfire Alert Source Ingest wildfire and NGFW alerts into Threat Response 4.0.0 +
Ping Identity Identity access management Enforce SSO policies based on the user AD group placement N/A
Proofpoint CLEAR Alert Source Monitor a mailbox for user-submitted messages via Proofpoint PhishAlarm & PhishAlarm Analyzer N/A
Proofpoint CSV Upload Alert Source Ingest alerts from a CSV file N/A
Proofpoint IMD Alert Source Ingest alerts from Proofpoint Internal Mail Defense N/A
Proofpoint Smart Search Alert Source Ingest alerts from Proofpoint Smart Search CSV File N/A
Proofpoint Smart Search - Export to TRAP Alert Source Ingest alerts from Proofpoint Smart Search Admin Portal via the Export-to-TRAP button N/A
Proofpoint TAP Alert Source Ingest alerts from Proofpoint Targeted Attack Prevention solution 1.5 +
Proofpoint Threat Graph Enrichment Enrich using campaign intelligence from Threat Graph database N/A
RSA Securid Two factor authentication solutions Enforce 2FA policies based on the AD security group placement N/A
SafeNet Two factor authentication solutions Enforce 2FA policies based on the AD security group placement N/A
Soltra Enrichment Consume intelligence from Soltra using STIX and TAXII N/A
Splunk Enterprise Alert Source SIEM alert ingestion into Threat Response 6.0 +
Splunk Enterprise Enrichment Query logs from Splunk and enrich associated alerts 6.0 +
Suricata Alert Source Ingest alerts from Suricata IDS/IPS 2.0 +
Symantec 2FA Two factor authentication solutions Enforce 2FA policies based on the AD security group placement N/A
Tanium EIDR Capability to deploy Proofpoint Client Monitor using Tanium 7.0 +
Tanium EIDR Query Tanium sensors to collect information from endpoints. Executing PC data collection using Tanium 7.0 +
Tanium EIDR Executing PC data collection using Tanium 7.0 +
Virus Total Enrichment Collect detection data from Virus Total and enrich alerts N/A
WHOIS Enrichment Enrich IPs and hostnames using WHOIS data service N/A