

IT and SecOps Workflow Automation
Synapsa Interconnector provides intelligent API based interconnections between monitoring, security and change management tools to avoid time consuming manual procedures.
Thanks to predefined and custom parsers, it is able to accelerate overall workflow activities in daily operation.
IT and SecOps save time in the decision-making process and focus more on other necessary steps in daily operation.
How it works?

Interconnector Features
Predefined Parsers
Ready made predefined miner parsers to get useful information from received alerts and events providing feeds for security policy templates which leads to very granular Synapsa rules.
Custom Parsers
Specify Syslog (CEF) based parsers preparation and current ecosystem integration for Automated Threat Mitigation, Incident Response, Security Policy Change Management etc.
User Defined Security Policies
Users can easily configure how to create and run policy to block malicious traffic, mitigate the attack or isolate the threat on connected firewalls and also specify a rollback procedures.
Automatic or On-Approval Approach
Let users make a decision if the policy API call will be applied automatically or need to be approved manually.
Real-time feedback from devices
Let users check if security policies created by them are really existing in security rule-base to make sure a device administrator did not disable or delete them.
Full Control over Rules
Let users fully control what to do with security policies. There is an option to reject, revoke, approve or rollback in case the policy was not completely deployed.
Are you interested?
Interconnector - Built in integrations
Palo Alto

- Next Generation Firewall
- Predefined API calls for automated threat mitigation, incident respons, and firewall policy auditing
- Custom, miner-based and built-in data feeds to use external dynamic lists (EDL) for policy management and enforcement
- Fully automated or semi-automated rulesets deployment
- CVEs monitoring and alerting
Flowmon ADS

- Network Detection and Response, Anomaly Detection System
- Predefined miner for network cyber threats and anomalies
- Prepared parsers for automated threat mitigation and incident response based on security events detection
- Automated creation of IP address data feeds for external dynamic lists usage
Check Point

- Next Generation Firewall with management server
- Predefined API calls for automated threat mitigation, incident response and firewall policy auditing
- Custom, miner-based and built-in data feeds to use external dymanic lists for policy management and enforcement
- Fully automated or semi-automated rulesets deployment
Fortinet

- Next Generation Firewall - Fortigates and Forti Manager
- Predefined API calls for automated threat mitigation, incident response and firewall policy auditing
- Custom, miner-based and built-in data feeds to use external dymanic lists for policy management and enforcement
- Fully automated or semi-automated rulesets deployment