Skip to main content
The Panaseer logo shows a white square and a yellow square around the initial P. To the right of the P there is the copy written ‘anaseer’.
Show main menu Hide main menu

Panaseer connectors

We connect with the tools you already use. With over 100 pre-built connectors and more being developed, Panaseer ensures seamless integration across your security, IT, and business tools.

Connectors built to be configurable and optimized for scale

Tailored for your security needs

A melted shape grid behind colourful shapes represents curiosity and creativity in technology, and includes the panaseer mininature logo.

Panaseer connectors are purpose-built to deliver the precise data needed for accurate security metrics, while seamlessly scaling to handle large data volumes as your organization grows.

Built for accuracy and reliability

Data dots change from red to pink to yellow to green and progress upwards towards a navy regulatory shield, representing progress over time.

Designed to normalize and aggregate data with accuracy, Panaseer connectors are rigorously tested and validated across multiple customers to ensure reliability and high performance.

Configurable & flexible

Blue data dots feed into a pink cog that turns round, to show an efficient process.

With flexible configurations and customer-specific filtering options, Panaseer connectors are thoroughly tested to ensure reliability and accuracy, providing trusted, high-performance integrations.

Any data source

panaseer

This list is limited to the most popular data sources our Customers use most. Panaseer will connect to any SaaS or on-prem data source that fit the Panaseer security control domains at no cost to you!

Absolute

Absolute

Absolute offers device inventory data APIs for reporting on hardware and platforms, aiding in asset management and security compliance.

Armis

armis

Armis offers a unified asset intelligence platform that helps organizations manage and secure all connected devices, reducing risks from the expanded attack surface.

Aruba ClearPass

Aruba

Aruba ClearPass offers secure network access control based on roles and devices, managing access for IoT, BYOD, and users across wired, wireless, and VPN infrastructures.

AWS EC2

AWS

Amazon EC2 provides scalable, on-demand cloud computing resources, allowing organizations to run applications without investing in physical hardware.

AWS IAMUSER

AWS

Amazon EC2 provides scalable, on-demand cloud computing resources, allowing organizations to run applications without investing in physical hardware.

AWS Inspector

AWS

AWS Inspector is a security assessment service that helps identify vulnerabilities and deviations in applications, networks, and systems.

Axonius Devices

axonius

Axonius is a cybersecurity asset management platform that provides a unified view of devices, users, and software across an organization's environment.

BeyondTrust BeyondInsight and Password Safe

beyond

BeyondTrust BeyondInsight and Password Safe provide secure privileged access management, offering visibility, control, and protection for sensitive accounts and systems.

BigFix

bigfix

BigFix is an endpoint management platform enabling IT teams to automate compliance and manage diverse operating systems, streamlining processes and enhancing security.

Carbon Black App Control

Carbonblack

Carbon Black App Control locks down critical systems to prevent unauthorized changes, ensuring continuous compliance and protecting against threats.

Carbon Black Defense

Carbonblack

Carbon Black Defense is a threat detection tool that monitors processes across enterprise networks, capturing data to identify suspicious activities and potential threats.

Cisco Prime

cisco

Cisco Prime Infrastructure is a network management tool that simplifies the administration of both wireless and wired networks, improving operational efficiency.

Cisco Secure Endpoint

cisco

Cisco Secure Endpoint protects endpoint devices like desktops, laptops, servers, and mobiles from cyber threats, offering comprehensive endpoint security.

Cisco Vulnerability Management (formerly Kenna Security)

cisco

Kenna Security uses threat intelligence and data science to assess vulnerability risks, helping teams focus on those that matter most.

Crowdstrike Falcon Insight (EDR)

Crowdstrike

CrowdStrike Falcon Insight is an Endpoint Detection and Response solution providing real-time visibility into endpoint activities, enabling swift detection and response to threats.

CrowdStrike Falcon Spotlight (Vulnerability)

Crowdstrike

CrowdStrike Falcon Spotlight provides visibility into endpoint vulnerabilities, enabling security teams to quickly detect and respond to emerging threats.

Crowdstrike Identity Protection

Crowdstrike

Falcon Complete Identity Protection provides fully managed, real-time identity threat prevention and policy enforcement with expert management, monitoring, and remediation.

CyberArk

cyberark

CyberArk specializes in privileged access management, offering solutions to securely store, manage, and share passwords across organizations.

CyberArk Privileged Cloud

cyberark

CyberArk Privilege Cloud is a SaaS solution for securely managing credentials, monitoring sessions, and reducing risk for both human and non-human users.

Elastic Search

elastic

Elasticsearch is a distributed search and analytics engine that indexes, searches, and analyzes data in real-time, forming the heart of the Elastic Stack.

End of Life Connector

endoflife

endoflife.date documents EOL dates and support lifecycles for various products.

Exabeam

exabeam

Exabeam delivers AI-driven security operations solutions, enabling security teams to enhance threat detection, investigation, and response processes.

ExtraHop RevealX

extrahop

ExtraHop RevealX is a network detection and response platform offering real-time visibility, threat detection, and incident response capabilities.

FireEye EDR

fireye

FireEye EDR is an endpoint detection and response solution that monitors endpoints to detect, investigate, and respond to security threats as part of Helix XDR.

Flexera Software Vulnerabilty Manager

flexera

Flexera's Software Vulnerability Manager provides insights into your environment's vulnerability status, helping prioritize and remediate risks.

Forcepoint DLP

forcepoint

Forcepoint DLP lets businesses discover, monitor, and protect data with minimal user impact, auditing in real-time to prevent data loss before it occurs.

Forescout eyeSight

forescout

Forescout eyeSight delivers comprehensive visibility into all network-connected devices, auto-classifying them and assessing compliance and risk without disrupting operations.

Freshservice

freshworks

Freshservice is a cloud-based IT service management tool built on ITIL principles, streamlining service delivery with a focus on user experience and employee satisfaction.

Heimdal Application Control

heimdal

Heimdall is a security application designed to provide monitoring and protection services, particularly for cloud-based environments

Invicti Web Application Security

invicti

Invicti Web Application Security (formerly known as Netsparker) is a robust solution for identifying and managing vulnerabilities in web applications and APIs.

Ivanti Risk Sense

ivanti

Ivanti Risk Sense is a risk-based vulnerability management (RBVM) platform designed to help organizations identify, prioritize, and remediate cybersecurity threats efficiently.

Ivanti Security Controls

ivanti

Ivanti Security Controls manages and secures IT environments with features like patch management, vulnerability assessment, application control, and endpoint protection.

Jamf Device Manager

jamf

Jamf Device Manager is a tool for managing Apple devices, enabling organizations to inventory, update, and secure iOS and macOS devices efficiently.

Jira Service Management

jira

Jira Service Management helps teams plan, assign, track, and manage work, streamlining service delivery and collaboration across the organization.

Kandji

kandji

Kandji is an Apple device management and security platform that automates deployment and security for macOS and iOS devices in enterprises.

KnowBe4

knowbe4

KnowBe4 is a security awareness training platform combining education with simulated phishing attacks to help organizations mitigate human risk.

Manage Engine Patch Manager

manageengine

ManageEngine Patch Manager Plus is a software for automated patch management across servers, desktops, and remote systems.

Manage Engine Endpoint Central

manageengine

ManageEngine Endpoint Central is a unified endpoint management solution that manages and secures desktops, laptops, servers, mobile devices, and network devices.

McAfee ePO

mcafee

McAfee ePolicy Orchestrator provides automated management capabilities to identify, manage, and respond to security issues and threats across the enterprise.

Microsoft Active Directory

microsoft

Active Directory is a directory service that stores network object information, making it easy for administrators and users to find and use resources within a structured hierarchy.

Microsoft Azure Defender for Cloud

microsoft

Microsoft Defender for Cloud provides unified security management and advanced threat protection across hybrid cloud environments through the application of security policies.

Microsoft Azure Virtual Machine

microsoft

Microsoft Azure Virtual Machines provide scalable, on-demand cloud computing resources, enabling organizations to run applications without on-premises infrastructure.

Microsoft Active Directory

microsoft

Active Directory is a directory service that stores network object information, making it easy for administrators and users to find and use resources within a structured hierarchy.

Microsoft Defender

microsoft

Microsoft Defender for Endpoint is a security platform that helps enterprises prevent, detect, and respond to advanced threats across endpoints.

Microsoft Entra ID

microsoft

Microsoft Entra ID is a cloud-based identity and access management service that lets administrators securely manage users, devices, and enterprise applications.

Microsoft Intune

microsoft

Microsoft Intune is a cloud-based tool for unified endpoint management, securing corporate and BYOD devices to protect organizational data.

Microsoft SCCM

microsoft

Microsoft SCCM allows enterprises to manage and secure devices and applications, providing endpoint protection, patch management, and software distribution.

Microsoft Security Guidance

microsoft

The Microsoft Security Response Center investigates security vulnerabilities in Microsoft products. The Security Update Guide provides authoritative information on security updates.

Microsoft Sentinel

microsoft

Microsoft Sentinel is a cloud-native SIEM and SOAR solution that provides intelligent threat detection, automated response, and security analytics across hybrid and multi-cloud environments.

National Vulnerability Database

nist

The National Vulnerability Database (NVD) is the U.S. government's repository of known cybersecurity vulnerabilities, aiding organizations in automating security and compliance.

Netskope

netskope

Netskope is a cloud-native security platform offering comprehensive security for cloud services, web, and private applications.

Netwrix Change Tracker

netwrix

Netwrix Change Tracker is a system integrity monitoring tool used for compliance, intrusion detection, and change control in enterprise IT systems across various industries.

Nexpose

rapid7

Nexpose is a vulnerability scanner supporting the entire vulnerability management lifecycle, from discovery and detection to reporting and mitigation.

Nucleus

nucleus

Nucleus automates vulnerability analysis and prioritization, helping organizations make informed risk decisions and effectively mitigate vulnerabilities.

Nutanix VM

nutanix

Nutanix VM runs on AHV, ESXi, or Hyper-V within Nutanix HCI, enabling cloud-like virtualization with high performance, automation, and scalability for workloads.

Palo Alto Cortex

palo alto

Palo Alto Cortex is an XDR platform monitoring cloud, network, and endpoints, unifying prevention, detection, analysis, and response in a centralized solution.

Palo Alto Panorama

palo alto

Palo Alto Panorama offers centralized management with graphical views of applications, threats, and traffic across Palo Alto Networks firewalls.

Phosphorus IO

phosphorus

Phosphorus IO operates in the IoT Security space, specifically focused on providing security management for various types of IoT devices.

Prisma Cloud

palo alto

Prisma Cloud is a cloud-native application protection platform securing applications from code to cloud, providing visibility and threat detection across hybrid, multi-cloud environments.

Proofpoint

proofpoint

Proofpoint is an email protection system that blocks spam, phishing, and viruses from inboxes, with customizable settings to block or allow specific emails.

Qualys CSAM

qualys

Qualys CSAM (CyberSecurity Asset Management) is a cloud-based solution that helps organizations discover, categorize, and manage their IT assets, providing visibility into security risks.

Qualys Patch Management

qualys

Qualys Patch Management automates the patching of IT assets, helping organizations streamline updates and enhance security across their infrastructure.

Qualys Policy Compliance

qualys

Qualys Policy Compliance helps organizations assess and enforce security and compliance policies across IT infrastructure, ensuring adherence to regulations and best practices.

Qualys VMDR

qualys

Qualys VMDR combines vulnerability management, threat prioritization, and patch management into a single, integrated cloud-based security solution.

Rapid7 InsightVM

rapid7

Rapid7 InsightVM is a vulnerability management tool that consolidates data from various sources to help identify, prioritize, and remediate security risks.

Red Cloak

secureworks

Secureworks Red Cloak is an endpoint detection and response technology that continuously monitors endpoints for signs of adversary activity.

Red Hat Satellite

red hat

Red Hat Satellite is a systems management product allowing administrators to deploy, manage, and maintain Red Hat Enterprise Linux hosts effectively.

SailPoint IdentityIQ

sailpoint

SailPoint IdentityIQ is an identity and access management platform for enterprises, offering lifecycle and compliance management for provisioning, access requests, and certifications.

SailPoint Identity Security Cloud

sailpoint

SailPoint Identity Security Cloud helps organizations govern identities and secure access to critical data and apps across the enterprise in a unified, scalable platform.

Sapling

kallidus

Sapling is an HR software platform that automates HR processes and provides data on employee lifecycle, serving as a valuable data source for security and compliance.

Saviynt

saviynt

Saviynt offers intelligent identity and access governance solutions, securing applications in a single cloud platform for enterprises.

SentinelOne

sentinel one

SentinelOne protects enterprises from ransomware and malware by detecting malicious behaviors, preventing file encryption, and enabling rollback on Windows devices if needed.

ServiceNow

servicenow

ServiceNow is a cloud-based platform that automates and streamlines workflows, enhancing operational efficiency by automating routine tasks in enterprises.

Snyk Code

snyk

Snyk Code helps developers identify and fix code vulnerabilities early by integrating with development environments, enhancing software security and reducing production risks.

Snyk Open Source

snyk

Snyk Open Source identifies and fixes vulnerabilities in open-source libraries, integrating with development workflows to provide security insights and automated remediation.

Solarwinds Observability Saas

solarwinds

SolarWinds Observability SaaS is a cloud-native platform to monitor, visualize, and improve the performance of infrastructure, applications, networks, and user experience.

SolarWinds Orion

solarwinds

SolarWinds Orion is network monitoring software that detects, diagnoses, and resolves network performance issues and outages, enhancing network reliability.

SonarQube

sonar

SonarQube is a code quality assurance tool that analyzes source code to provide reports on code quality, combining static and dynamic analysis for continuous improvement.

Sonrai Security

sonrai

Sonrai Security provides security controls for AWS and Azure accounts, mapping identities to sensitive data and privileges to uncover hidden risks in cloud environments.

Sophos Central

sophos

Sophos Central synchronizes intelligence across security products, enhancing protection against advanced malware and targeted attacks.

Splunk

splunk

Splunk Enterprise allows organizations to search, analyze, and visualize data from IT infrastructure components, aiding in monitoring, troubleshooting, and security analytics.

Symantec Endpoint Encryption

symantec

Symantec Endpoint Encryption (SEE) is an enterprise-level security solution designed to protect sensitive data on endpoint devices through advanced encryption mechanisms.

Symantec Endpoint Protection

symantec

Symantec Endpoint Protection is a client-server solution that protects laptops, desktops, and servers in your network against malware, risks, and vulnerabilities.

Symantec Endpoint Security

symantec

Symantec Endpoint Security safeguards devices, applications, laptops, desktops, mobiles, servers, and cloud workloads, protecting data wherever data resides.

Tanium Asset Module

tanium

Tanium Asset Module is an IT asset management tool that helps organizations monitor hardware, software, and configurations, enhancing oversight and management.

Tanium Comply

tanium

Tanium Comply conducts vulnerability and compliance assessments on systems and applications, helping organizations identify risks and simplify audit preparation.

Tanium Discover

tanium

Tanium Discover identifies unmanaged assets on a network, helping organizations find rogue devices or outdated systems by continuously scanning and classifying connected devices.

Tenable

tenable

Tenable provides vulnerability management solutions offering visibility into the security posture of complex IT infrastructures to help identify and mitigate risks.

Tenable Cloud Security

tenable

Tenable Cloud Security helps organizations manage and secure cloud environments by providing visibility, assessment, and remediation of security risks across cloud platforms.

Tenable IO

tenable

Tenable.io enables security teams to manage and share Nessus scanners, policies, and results, facilitating vulnerability assessment across the organization.

Tenable Plugin

tenable

Tenable creates plugins to detect new vulnerabilities as they're discovered. These plugins include vulnerability details, remediation steps, and algorithms to identify security issues.

Trend Micro Cloud One

trend micro

Trend Micro Cloud One is a comprehensive cloud security platform that protects applications and data throughout cloud migration and operations, ensuring security in the cloud.

Trend Micro Deep Security

trend micro

Trend Micro Deep Security offers advanced protection for physical, virtual, and cloud servers, safeguarding applications and data without the need for emergency patching.

Trend Vision One

trend micro

Trend Vision One is a security platform that monitors and protects users, devices, data centers, and cloud environments, offering comprehensive organizational security.

Veracode

veracode

Veracode is a SaaS application security platform that integrates into development pipelines, offering static, dynamic, and software composition analysis to identify vulnerabilities.

Vicarius vRx

vicarius

Vicarius vRx is a vulnerability assessment and management solution offering real-time scans and asset management from one platform for complete coverage.

VMware CloudHealth

vm ware

VMware CloudHealth provides insights to optimize cloud costs, improve governance, and build a Cloud Center of Excellence, enhancing cloud management strategies.

VMware vCenter

vm ware

VMware vCenter is server management software providing a centralized platform to control vSphere environments, enhancing visibility across hybrid clouds.

Wiz CSPM

wiz

Wiz CSPM is a cloud security posture management tool that helps organizations reduce risk by providing visibility into cloud assets and prioritizing vulnerabilities.

Wiz.IO

wiz

Wiz.IO is a unified cloud security platform offering prevention, detection, and response to help teams reduce risk, gain visibility, and securely develop applications.

Workday

workday

Workday is a cloud-based HR and financial management system, offering data that supports compliance and security processes within organizations.

Zscaler

zscaler

Zscaler is a cloud-based security platform providing fast, secure access to applications from any device or location, enhancing connectivity and protection.

Zscaler Internet Access

zscaler

Zscaler Internet Access (ZIA) is a cloud-delivered security service that provides secure internet and SaaS access for users, acting as a secure internet gateway.

Zscaler Private Access

zscaler

Zscaler Private Access is a cloud-based service that provides secure, zero-trust access to private applications for users, regardless of their location or device.