Skip to main content
The Panaseer logo shows a white square and a yellow square around the initial P. To the right of the P there is the copy written ‘anaseer’.
Show main menu Hide main menu

Panaseer connectors

We connect with the tools you already use. With over 100 pre-built connectors and more being developed, Panaseer ensures seamless integration across your security, IT, and business tools.

Connectors built to be configurable and optimized for scale

Tailored for your security needs

A melted shape grid behind colourful shapes represents curiosity and creativity in technology, and includes the panaseer mininature logo.

Panaseer connectors are purpose-built to deliver the precise data needed for accurate security metrics, while seamlessly scaling to handle large data volumes as your organization grows.

Built for accuracy and reliability

Data dots change from red to pink to yellow to green and progress upwards towards a navy regulatory shield, representing progress over time.

Designed to normalize and aggregate data with accuracy, Panaseer connectors are rigorously tested and validated across multiple customers to ensure reliability and high performance.

Configurable & flexible

Blue data dots feed into a pink cog that turns round, to show an efficient process.

With flexible configurations and customer-specific filtering options, Panaseer connectors are thoroughly tested to ensure reliability and accuracy, providing trusted, high-performance integrations.

Absolute

Absolute offers device inventory data APIs for reporting on hardware and platforms, aiding in asset management and security compliance.

Armis

Armis offers a unified asset intelligence platform that helps organizations manage and secure all connected devices, reducing risks from the expanded attack surface.

Aruba ClearPass

Aruba ClearPass offers secure network access control based on roles and devices, managing access for IoT, BYOD, and users across wired, wireless, and VPN infrastructures.

AWS EC2

Amazon EC2 provides scalable, on-demand cloud computing resources, allowing organizations to run applications without investing in physical hardware.

Axonius Devices

Axonius is a cybersecurity asset management platform that provides a unified view of devices, users, and software across an organization's environment.

BeyondTrust BeyondInsight and Password Safe

BeyondTrust BeyondInsight and Password Safe provide secure privileged access management, offering visibility, control, and protection for sensitive accounts and systems.

BigFix

BigFix is an endpoint management platform enabling IT teams to automate compliance and manage diverse operating systems, streamlining processes and enhancing security.

Carbon Black App Control

Carbon Black App Control locks down critical systems to prevent unauthorized changes, ensuring continuous compliance and protecting against threats.

Carbon Black Defense

Carbon Black Defense is a threat detection tool that monitors processes across enterprise networks, capturing data to identify suspicious activities and potential threats.

Cisco Prime

Cisco Prime Infrastructure is a network management tool that simplifies the administration of both wireless and wired networks, improving operational efficiency.

Cisco Secure Endpoint

Cisco Secure Endpoint protects endpoint devices like desktops, laptops, servers, and mobiles from cyber threats, offering comprehensive endpoint security.

Cisco Vulnerability Management (formerly Kenna Security)

Kenna Security uses threat intelligence and data science to assess vulnerability risks, helping teams focus on those that matter most.

Crowdstrike Falcon Insight (EDR)

CrowdStrike Falcon Insight is an Endpoint Detection and Response solution providing real-time visibility into endpoint activities, enabling swift detection and response to threats.

CrowdStrike Falcon Spotlight (Vulnerability)

CrowdStrike Falcon Spotlight provides visibility into endpoint vulnerabilities, enabling security teams to quickly detect and respond to emerging threats.

Crowdstrike Identity Protection

Falcon Complete Identity Protection provides fully managed, real-time identity threat prevention and policy enforcement with expert management, monitoring, and remediation.

CyberArk

CyberArk specializes in privileged access management, offering solutions to securely store, manage, and share passwords across organizations.

CyberArk Privileged Cloud

CyberArk Privilege Cloud is a SaaS solution for securely managing credentials, monitoring sessions, and reducing risk for both human and non-human users.

Elastic Search

Elasticsearch is a distributed search and analytics engine that indexes, searches, and analyzes data in real-time, forming the heart of the Elastic Stack.

Exabeam

Exabeam delivers AI-driven security operations solutions, enabling security teams to enhance threat detection, investigation, and response processes.

FireEye EDR

FireEye EDR is an endpoint detection and response solution that monitors endpoints to detect, investigate, and respond to security threats as part of Helix XDR.

Flexera Software Vulnerabilty Manager

Flexera's Software Vulnerability Manager provides insights into your environment's vulnerability status, helping prioritize and remediate risks.

Forcepoint DLP

Forcepoint DLP lets businesses discover, monitor, and protect data with minimal user impact, auditing in real-time to prevent data loss before it occurs.

Forescout eyeSight

Forescout eyeSight delivers comprehensive visibility into all network-connected devices, auto-classifying them and assessing compliance and risk without disrupting operations.

Freshservice

Freshservice is a cloud-based IT service management tool built on ITIL principles, streamlining service delivery with a focus on user experience and employee satisfaction.

Heimdal Application Control

Heimdall is a security application designed to provide monitoring and protection services, particularly for cloud-based environments

Invicti Web Application Security

Invicti Web Application Security (formerly known as Netsparker) is a robust solution for identifying and managing vulnerabilities in web applications and APIs.

Ivanti Security Controls

Ivanti Security Controls manages and secures IT environments with features like patch management, vulnerability assessment, application control, and endpoint protection.

Jamf Device Manager

Jamf Device Manager is a tool for managing Apple devices, enabling organizations to inventory, update, and secure iOS and macOS devices efficiently.

Jira Service Management

Jira Service Management helps teams plan, assign, track, and manage work, streamlining service delivery and collaboration across the organization.

Kandji

Kandji is an Apple device management and security platform that automates deployment and security for macOS and iOS devices in enterprises.

KnowBe4

KnowBe4 is a security awareness training platform combining education with simulated phishing attacks to help organizations mitigate human risk.

Manage Engine Patch Manager

ManageEngine Patch Manager Plus is a software for automated patch management across servers, desktops, and remote systems.

Manage Engine Endpoint Central

ManageEngine Endpoint Central is a unified endpoint management solution that manages and secures desktops, laptops, servers, mobile devices, and network devices.

McAfee ePO

McAfee ePolicy Orchestrator provides automated management capabilities to identify, manage, and respond to security issues and threats across the enterprise.

Microsoft Active Directory

Active Directory is a directory service that stores network object information, making it easy for administrators and users to find and use resources within a structured hierarchy.

Microsoft Azure Defender for Cloud

Microsoft Defender for Cloud provides unified security management and advanced threat protection across hybrid cloud environments through the application of security policies.

Microsoft Azure Virtual Machine

Microsoft Azure Virtual Machines provide scalable, on-demand cloud computing resources, enabling organizations to run applications without on-premises infrastructure.

Microsoft Active Directory

Active Directory is a directory service that stores network object information, making it easy for administrators and users to find and use resources within a structured hierarchy.

Microsoft Defender

Microsoft Defender for Endpoint is a security platform that helps enterprises prevent, detect, and respond to advanced threats across endpoints.

Microsoft Entra ID

Microsoft Entra ID is a cloud-based identity and access management service that lets administrators securely manage users, devices, and enterprise applications.

Microsoft Intune

Microsoft Intune is a cloud-based tool for unified endpoint management, securing corporate and BYOD devices to protect organizational data.

Microsoft SCCM

Microsoft SCCM allows enterprises to manage and secure devices and applications, providing endpoint protection, patch management, and software distribution.

Microsoft Security Guidance

The Microsoft Security Response Center investigates security vulnerabilities in Microsoft products. The Security Update Guide provides authoritative information on security updates.

Microsoft Sentinel

Microsoft Sentinel is a cloud-native SIEM and SOAR solution that provides intelligent threat detection, automated response, and security analytics across hybrid and multi-cloud environments.

National Vulnerability Database

The National Vulnerability Database (NVD) is the U.S. government's repository of known cybersecurity vulnerabilities, aiding organizations in automating security and compliance.

Netskope

Netskope is a cloud-native security platform offering comprehensive security for cloud services, web, and private applications.

Netwrix Change Tracker

Netwrix Change Tracker is a system integrity monitoring tool used for compliance, intrusion detection, and change control in enterprise IT systems across various industries.

Nexpose

Nexpose is a vulnerability scanner supporting the entire vulnerability management lifecycle, from discovery and detection to reporting and mitigation.

Nucleus

Nucleus automates vulnerability analysis and prioritization, helping organizations make informed risk decisions and effectively mitigate vulnerabilities.

Palo Alto Cortex

Palo Alto Cortex is an XDR platform monitoring cloud, network, and endpoints, unifying prevention, detection, analysis, and response in a centralized solution.

Palo Alto Panorama

Palo Alto Panorama offers centralized management with graphical views of applications, threats, and traffic across Palo Alto Networks firewalls.

Phosphorus IO

Phosphorus IO operates in the IoT Security space, specifically focused on providing security management for various types of IoT devices.

Prisma Cloud

Prisma Cloud is a cloud-native application protection platform securing applications from code to cloud, providing visibility and threat detection across hybrid, multi-cloud environments.

Proofpoint

Proofpoint is an email protection system that blocks spam, phishing, and viruses from inboxes, with customizable settings to block or allow specific emails.

Qualys Patch Management

Qualys Patch Management automates the patching of IT assets, helping organizations streamline updates and enhance security across their infrastructure.

Qualys Policy Compliance

Qualys Policy Compliance helps organizations assess and enforce security and compliance policies across IT infrastructure, ensuring adherence to regulations and best practices.

Qualys VMDR

Qualys VMDR combines vulnerability management, threat prioritization, and patch management into a single, integrated cloud-based security solution.

Rapid7 InsightVM

Rapid7 InsightVM is a vulnerability management tool that consolidates data from various sources to help identify, prioritize, and remediate security risks.

Red Cloak

Secureworks Red Cloak is an endpoint detection and response technology that continuously monitors endpoints for signs of adversary activity.

Red Hat Satellite

Red Hat Satellite is a systems management product allowing administrators to deploy, manage, and maintain Red Hat Enterprise Linux hosts effectively.

SailPoint IdentityIQ

SailPoint IdentityIQ is an identity and access management platform for enterprises, offering lifecycle and compliance management for provisioning, access requests, and certifications.

Sapling

Sapling is an HR software platform that automates HR processes and provides data on employee lifecycle, serving as a valuable data source for security and compliance.

Saviynt

Saviynt offers intelligent identity and access governance solutions, securing applications in a single cloud platform for enterprises.

SentinelOne

SentinelOne protects enterprises from ransomware and malware by detecting malicious behaviors, preventing file encryption, and enabling rollback on Windows devices if needed.

ServiceNow

ServiceNow is a cloud-based platform that automates and streamlines workflows, enhancing operational efficiency by automating routine tasks in enterprises.

Snyk Code

Snyk Code helps developers identify and fix code vulnerabilities early by integrating with development environments, enhancing software security and reducing production risks.

Snyk Open Source

Snyk Open Source identifies and fixes vulnerabilities in open-source libraries, integrating with development workflows to provide security insights and automated remediation.

Solarwinds Orion

SolarWinds Orion is network monitoring software that detects, diagnoses, and resolves network performance issues and outages, enhancing network reliability.

SonarQube

SonarQube is a code quality assurance tool that analyzes source code to provide reports on code quality, combining static and dynamic analysis for continuous improvement.

Sonrai Security

Sonrai Security provides security controls for AWS and Azure accounts, mapping identities to sensitive data and privileges to uncover hidden risks in cloud environments.

Sophos Central

Sophos Central synchronizes intelligence across security products, enhancing protection against advanced malware and targeted attacks.

Splunk

Splunk Enterprise allows organizations to search, analyze, and visualize data from IT infrastructure components, aiding in monitoring, troubleshooting, and security analytics.

Symantec Endpoint Encryption

Symantec Endpoint Encryption (SEE) is an enterprise-level security solution designed to protect sensitive data on endpoint devices through advanced encryption mechanisms.

Symantec Endpoint Protection

Symantec Endpoint Protection is a client-server solution that protects laptops, desktops, and servers in your network against malware, risks, and vulnerabilities.

Symantec Endpoint Security

Symantec Endpoint Security safeguards devices, applications, laptops, desktops, mobiles, servers, and cloud workloads, protecting data wherever data resides.

Tanium Asset Module

Tanium Asset Module is an IT asset management tool that helps organizations monitor hardware, software, and configurations, enhancing oversight and management.

Tanium Comply

Tanium Comply conducts vulnerability and compliance assessments on systems and applications, helping organizations identify risks and simplify audit preparation.

Tanium Discover

Tanium Discover identifies unmanaged assets on a network, helping organizations find rogue devices or outdated systems by continuously scanning and classifying connected devices.

Tenable

Tenable provides vulnerability management solutions offering visibility into the security posture of complex IT infrastructures to help identify and mitigate risks.

Tenable Cloud Security

Tenable Cloud Security helps organizations manage and secure cloud environments by providing visibility, assessment, and remediation of security risks across cloud platforms.

Tenable IO

Tenable.io enables security teams to manage and share Nessus scanners, policies, and results, facilitating vulnerability assessment across the organization.

Tenable Plugin

Tenable creates plugins to detect new vulnerabilities as they're discovered. These plugins include vulnerability details, remediation steps, and algorithms to identify security issues.

Trend Micro Cloud One

Trend Micro Cloud One is a comprehensive cloud security platform that protects applications and data throughout cloud migration and operations, ensuring security in the cloud.

Trend Micro Deep Security

Trend Micro Deep Security offers advanced protection for physical, virtual, and cloud servers, safeguarding applications and data without the need for emergency patching.

Trend Vision One

Trend Vision One is a security platform that monitors and protects users, devices, data centers, and cloud environments, offering comprehensive organizational security.

Veracode

Veracode is a SaaS application security platform that integrates into development pipelines, offering static, dynamic, and software composition analysis to identify vulnerabilities.

Vicarius vRx

Vicarius vRx is a vulnerability assessment and management solution offering real-time scans and asset management from one platform for complete coverage.

VMware CloudHealth

VMware CloudHealth provides insights to optimize cloud costs, improve governance, and build a Cloud Center of Excellence, enhancing cloud management strategies.

VMware vCenter

VMware vCenter is server management software providing a centralized platform to control vSphere environments, enhancing visibility across hybrid clouds.

Wiz CSPM

Wiz CSPM is a cloud security posture management tool that helps organizations reduce risk by providing visibility into cloud assets and prioritizing vulnerabilities.

Wiz.IO

Wiz.IO is a unified cloud security platform offering prevention, detection, and response to help teams reduce risk, gain visibility, and securely develop applications.

Workday

Workday is a cloud-based HR and financial management system, offering data that supports compliance and security processes within organizations.

Zscaler

Zscaler is a cloud-based security platform providing fast, secure access to applications from any device or location, enhancing connectivity and protection.