Built-In Integrations

Synapsa Platform provides built-in, ready-to-use integrations that are constantly developing, including predefined parsers and API calls for incident response automation, rulesets for policy auditing and enforcement, data feeds threat intelligence and external dynamic lists for securing the availability of IS, SaaS and cloud services.

Some Look Up and Data Feeds integrations are paid 3rd party services and require a valid API key to ensure their proper functionality.

Firewalls

Palo Alto

Palo Alto
  • Next Generation Firewall
  • Predefined API calls for automated threat mitigation, incident respons, and firewall policy auditing
  • Custom, miner-based and built-in data feeds to use external dynamic lists (EDL) for policy management and enforcement
  • Fully automated or semi-automated rulesets deployment
  • CVEs monitoring and alerting

Check Point

Check Point
  • Next Generation Firewall with management server
  • Predefined API calls for automated threat mitigation, incident response and firewall policy auditing
  • Custom, miner-based and built-in data feeds to use external dymanic lists for policy management and enforcement
  • Fully automated or semi-automated rulesets deployment

Fortinet

Fortinet
  • Next Generation Firewall - Fortigates and Forti Manager
  • Predefined API calls for automated threat mitigation, incident response and firewall policy auditing
  • Custom, miner-based and built-in data feeds to use external dymanic lists for policy management and enforcement
  • Fully automated or semi-automated rulesets deployment

Sophos

Sophos
  • Firewall
  • Predefined API calls for automated threat mitigation and incident response
  • Fully automated or semi-automated rulesets deployment

Miners

Flowmon ADS

Flowmon ADS
  • Network Detection and Response, Anomaly Detection System
  • Predefined miner for network cyber threats and anomalies
  • Prepared parsers for automated threat mitigation and incident response based on security events detection
  • Automated creation of IP address data feeds for external dynamic lists usage

Suricata

Suricata
  • Intrusion Detection System
  • Predefined miner for signature based IoCs
  • Prepared parsers for automated threat mitigation and incident response based on security events detection
  • Automated creation of IP address data feeds for external dynamic lists usage

Look Up & Data Feeds

Office 365

Office 365
  • Dynamic IPv4 and IPv6 address list as Data Feed for Microsoft Office 365 services
  • Use external dynamic lists (EDL) to security policy enforcement
  • Easy way to automate Office365 content and data delivery network

Amazon Web Services

Amazon Web Services
  • Dynamic IPv4 and IPv6 address list as Data Feed for Amazon Web Services
  • Use external dynamic lists (EDL) to security and configuration policy enforcement
  • Easy way to automate AWS content and data delivery network

RIPE NCC

RIPE NCC
  • Get any data as Data Feed from Ripe Coordination Centre
  • Use external dynamic lists (EDL) based on AS numbers and maintainer
  • Easy way to automate security policy and leverage AS number criterium
  • Allow your VPN users to only connect from trusted and preferred ISPs

NIST

NIST
  • National Vulnerability Database
  • Single pane of glass for CVEs look up

VirusTotal

VirusTotal
  • Suspicious URLs analysis
  • Single pane of glass for domain, hash and IPs look up
  • Use suspicious result into data feeds for external dynamic lists usage

PhishTank

PhishTank
  • Hourly renewed Data Feed of suspicious phishing URLs
  • Use external dynamic lists (EDL) to security policy enforcement
  • Easy way to automate defense security against known phishing sources

ipstack

ipstack
  • Website visitros IP Adress location look up
  • Identify the IP address details
  • Get the complete geolocation information

BigData Cloud - Data Feeds

BigData Cloud - Data Feeds
  • Hourly renewed Data Feed of TOR exit nodes
  • Feeding firewalls using External Dynamic Lists (EDL)
  • Look up if the IP if a part of TOR network during the investigation

BigData Cloud - Look Up

BigData Cloud - Look Up
  • Search if the IP is on list of TOR exit nodes geolocated to country-level
  • Enhanced information to an Autonomous System (AS) managed and supervised by a single entity or organization

Shodan

Shodan
  • Search engine for the internet of everything
  • Single point of glass for IPs look up
  • Get complete information with map location

ipinfo.io

ipinfo.io
  • The trusted source of IP adresses look up
  • Identify the IP address details
  • Get the complete geolocation information

MACVendors

MACVendors
  • MAC address vendor identification
  • Easy and fast look up

host.io

host.io
  • Powerful and fast information about domains
  • Easy and trusted domain names look up
  • Get the complete geolocation information

This website use cookies and analytical data. In case you agree with that please click on the "I agree" button bellow. Details can be found on a page Information for the processing of personal data.