Integrations

Plug it in. 

Power it up.

Connect to anything across your stack in seconds. Radiant brings everything together into one contextual security layer - so no signal gets lost.

Filters
Filters

Popular Integrations

Microsoft Defender For Office

Email

CrowdStrike Falcon

EDR

SentinelOne Deep Visibility

EDR

S3

Storage

Splunk

SIEM

Microsoft Purview DLP

DLP

Vicarius IO

Prioritize and remediate vulnerabilities across your environment

Imperva Cloud WAF

Detect and investigate web application attacks

Microsoft Purview DLP

Identify and investigate data loss prevention alerts

Linux Server Logs

Analyze logs to detect threats and anomalies

Palo Alto Cortex XSIAM

Unified detection, investigation, and automated response

Microsoft Active Directory

Centralized identity and secure access control

Palo Alto Prisma Access

Deliver secure access to apps and data from any location

Zscaler ZPA

Enable secure zero-trust application accessRetry

Cisco Identity Services Engine

Control network access with policy-based authentication

pfSense

Open-source network firewall and routing platform

Mimecast Incyder

Detect and respond to insider data threats

Akamai CDN

Accelerate content delivery with edge security protection

AWS WAF

Protect applications with managed cloud firewall rules

Imperva WAF

Defend web apps from injection and DDoS attacks

F5

Enterprise-grade traffic inspection and filtering

Cloudflare WAF

Protect web apps from online attacks

OWASP ModSecurity

Open-source web application firewall engine

Rapid7 InsightVM

Scan and prioritize system vulnerabilities

Proofpoint TRAP

Automated threat response and phishing remediation

ServiceNow

Automate and manage incident workflows

Jira

Track and resolve security issues efficiently

VirusTotal

Multi-engine malware analysis and threat reputation

Google Webrisk

URL threat intelligence and phishing detection

FireHOL

Open-source firewall management and policy automation

MISP

Share and correlate threat intelligence data

Cisco Umbrella

Block access to malicious domains and IPs

NIST NSRL

Verify and reference known software signatures

Google Web Risk

Identify malicious URLs and phishing threats

S3

Secure and monitor cloud storage access

Adaptive Shield by CrowdStrike

Manage SaaS security posture and risks

Splunk

Analyze and visualize enterprise security data

Rapid7 InsightIDR

Manage and prioritize security events efficiently

Datadog

Monitor logs and alerts for security anomalies

Elastic SIEM

Detect and respond to security incidents in real time

CrowdStrike Next-Gen SIEM

Centralized analytics and event correlation

Zscaler Zero Trust Branch

Secure branch access with zero-trust architecture

Slack

Monitor and protect internal communications

Microsoft Office 365

Secure documents and organizational workflows

Microsoft Teams

Protect collaboration and communication channels

Google Workspace

Manage productivity tools and user access

Zoom

Secure and manage enterprise video meetings

Dragos

Protect industrial control systems and OT networks

Darktrace NDR

AI-powered network detection and response

Vectra NDR

Identify and stop lateral movement in real time

Cisco ISE

Network access control and identity enforcement

Azure App Gateway

Intelligent traffic routing and load balancing

Azure WAF

Cloud-native web application firewall protection

WatchGuard VPN

Encrypted remote access for secure connectivity

WatchGuard Firebox

Advanced network protection and traffic control

Zscaler NSS

Cloud-native security for internet traffic

WatchGuard

Simplified network and firewall management

SonicWall

Real-time protection against network threats

Palo Alto Networks Firewall

High-performance network security and control

Fortinet

Unified network security across all endpoints

Forcepoint Firewall

Data-centric protection for enterprise networks

Cisco Meraki

Manage and secure distributed network infrastructure

Cisco ASA

Enterprise-grade firewall and VPN gateway

Checkpoint Firewall

Prevent and detect network intrusion attempts

Aruba ClearPass

Access management for wired and wireless networks

Cisco Aironet

Wireless network access with secure control

Cisco Firepower

Next-gen intrusion and firewall defense

AWS Firewall

Protect AWS environments from network attacks

Dope Security

Cloud-based secure web gateway platform

Palo Alto Networks Strata

Advanced firewall and network threat protection

Twingate VPN

Zero-trust network access for remote teams

Pulse Secure VPN

Secure remote connections for enterprise users

DeepWatch

Managed detection and response service

Zscaler LSS

Log streaming for visibility and threat detection

Suricata IDS

Open-source intrusion detection and prevention engine

Trend Micro TippingPoint IPS

Inspect and block suspicious network activity

Keycloak

Centralized identity and access management solution

Okta

Secure and automate user sign-ins

Microsoft Entra

Detect identity risks across Microsoft cloud

MicroSoft Entra (Azure AD Identity Protection)

Manage users and domain authentication

Google Cloud Identity

Centralize and protect account access

Cisco DUO

Enable multi-factor authentication for users

1Password

Manage and secure stored credentials

Microsoft Windows Event Logs

System-level event collection and monitoring

Proofpoint TAP

Advanced threat protect for email attacks

Mimecast

Email security, archiving, and continuity service

Microsoft Safelinks

Real-time scanning of links in incoming emails

Gmail

Secure and manage Google Workspace email

KnowBe4

Security awareness & simulation platform

Avanan (Checkpoint)

Cloud-native security for email and collab apps

Darktrace

AI-driven threat detection for email traffic

Microsoft Exchange

Manage and secure corporate email servers

Barracuda Email Gateway Defense

Block spam and targeted email attacks

Microsoft Defender for Office

Protect Office 365 mailboxes from malware

Trend Micro Vision One

Extended detection and response platform

Trellix

Unified EDR and XDR threat defense

SentinelOne Singularity Data Lake

Unified security data storage and analytics at scale

SentinelOne Cloud Funnel

Streamlined log forwarding and data export for analysis

SentinelOne Deep Visibility

Real-time endpoint telemetry for advanced threat hunting

Microsoft Defender for Endpoint

Protect Windows devices from cyber threats

Fleet

Manage and monitor endpoints using osquery

Cylance

AI-based prevention of endpoint malware

Cybereason

Advanced threat hunting and response platform

CrowdStrike Falcon

Endpoint protection powered by behavioral analytics

Sophos Intercept EDR

Detect and stop advanced endpoint attacks

OSSEC

Open-source host intrusion detection system

Kaspersky Security Center

Manage antivirus and device protection

Palo AltoCortex EDR

Detect and respond to endpoint threats

Trend Micro Apex Central

Endpoint protection and security management

Purview

Cloud data governance and compliance

Varonis

Discover and protect sensitive data across systems

ZeroFox

Detect and mitigate external digital threats

GitHub Enterprise

Secure code repositories and development workflows

IBM Guardium

Protect and monitor sensitive database activity

Cribl

Stream and manage observability data efficiently

Netskope

Cloud access security for modern enterprises

Microsoft Defender for Cloud Apps

Control and monitor cloud app usage

Azure

Secure Microsoft cloud environments and services

Google Cloud Platform

Manage and protect GCP workloads

AWS GuardDuty

Detect and analyze threats in AWS

AWS CloudTrail

Monitor and audit cloud activity logs

Palo Alto Networks Prisma Cloud

Protect multi-cloud environments from threats

CrowdStrike CSPM

Secure cloud workloads and configurations

Salt

Protect APIs from attacks and abuse

Join the future
of SOC

Join the future of SOC.