Prioritize and remediate vulnerabilities across your environment
Integrations
Plug it in.
Power it up.
Connect to anything across your stack in seconds. Radiant brings everything together into one contextual security layer - so no signal gets lost.
Popular Integrations
Microsoft Defender For Office
CrowdStrike Falcon
EDR
SentinelOne Deep Visibility
EDR
S3
Storage
Splunk
SIEM
Microsoft Purview DLP
DLP
Vicarius IO
Imperva Cloud WAF
Detect and investigate web application attacks
Microsoft Purview DLP
Identify and investigate data loss prevention alerts
Linux Server Logs
Analyze logs to detect threats and anomalies
Palo Alto Cortex XSIAM
Unified detection, investigation, and automated response
Microsoft Active Directory
Centralized identity and secure access control
Palo Alto Prisma Access
Deliver secure access to apps and data from any location
Zscaler ZPA
Enable secure zero-trust application accessRetry
Cisco Identity Services Engine
Control network access with policy-based authentication
pfSense
Open-source network firewall and routing platform
Mimecast Incyder
Detect and respond to insider data threats
Akamai CDN
Accelerate content delivery with edge security protection
AWS WAF
Protect applications with managed cloud firewall rules
Imperva WAF
Defend web apps from injection and DDoS attacks
F5
Enterprise-grade traffic inspection and filtering
Cloudflare WAF
Protect web apps from online attacks
OWASP ModSecurity
Open-source web application firewall engine
Rapid7 InsightVM
Scan and prioritize system vulnerabilities
Proofpoint TRAP
Automated threat response and phishing remediation
ServiceNow
Automate and manage incident workflows
Jira
Track and resolve security issues efficiently
VirusTotal
Multi-engine malware analysis and threat reputation
Google Webrisk
URL threat intelligence and phishing detection
FireHOL
Open-source firewall management and policy automation
MISP
Share and correlate threat intelligence data
Cisco Umbrella
Block access to malicious domains and IPs
NIST NSRL
Verify and reference known software signatures
Google Web Risk
Identify malicious URLs and phishing threats
S3
Secure and monitor cloud storage access
Adaptive Shield by CrowdStrike
Manage SaaS security posture and risks
Splunk
Analyze and visualize enterprise security data
Rapid7 InsightIDR
Manage and prioritize security events efficiently
Datadog
Monitor logs and alerts for security anomalies
Elastic SIEM
Detect and respond to security incidents in real time
CrowdStrike Next-Gen SIEM
Centralized analytics and event correlation
Zscaler Zero Trust Branch
Secure branch access with zero-trust architecture
Slack
Monitor and protect internal communications
Microsoft Office 365
Secure documents and organizational workflows
Microsoft Teams
Protect collaboration and communication channels
Google Workspace
Manage productivity tools and user access
Zoom
Secure and manage enterprise video meetings
Dragos
Protect industrial control systems and OT networks
Darktrace NDR
AI-powered network detection and response
Vectra NDR
Identify and stop lateral movement in real time
Cisco ISE
Network access control and identity enforcement
Azure App Gateway
Intelligent traffic routing and load balancing
Azure WAF
Cloud-native web application firewall protection
WatchGuard VPN
Encrypted remote access for secure connectivity
WatchGuard Firebox
Advanced network protection and traffic control
Zscaler NSS
Cloud-native security for internet traffic
WatchGuard
Simplified network and firewall management
SonicWall
Real-time protection against network threats
Palo Alto Networks Firewall
High-performance network security and control
Fortinet
Unified network security across all endpoints
Forcepoint Firewall
Data-centric protection for enterprise networks
Cisco Meraki
Manage and secure distributed network infrastructure
Cisco ASA
Enterprise-grade firewall and VPN gateway
Checkpoint Firewall
Prevent and detect network intrusion attempts
Aruba ClearPass
Access management for wired and wireless networks
Cisco Aironet
Wireless network access with secure control
Cisco Firepower
Next-gen intrusion and firewall defense
AWS Firewall
Protect AWS environments from network attacks
Dope Security
Cloud-based secure web gateway platform
Palo Alto Networks Strata
Advanced firewall and network threat protection
Twingate VPN
Zero-trust network access for remote teams
Pulse Secure VPN
Secure remote connections for enterprise users
DeepWatch
Managed detection and response service
Zscaler LSS
Log streaming for visibility and threat detection
Suricata IDS
Open-source intrusion detection and prevention engine
Trend Micro TippingPoint IPS
Inspect and block suspicious network activity
Keycloak
Centralized identity and access management solution
Okta
Secure and automate user sign-ins
Microsoft Entra
Detect identity risks across Microsoft cloud
MicroSoft Entra (Azure AD Identity Protection)
Manage users and domain authentication
Google Cloud Identity
Centralize and protect account access
Cisco DUO
Enable multi-factor authentication for users
1Password
Manage and secure stored credentials
Microsoft Windows Event Logs
System-level event collection and monitoring
Proofpoint TAP
Advanced threat protect for email attacks
Mimecast
Email security, archiving, and continuity service
Microsoft Safelinks
Real-time scanning of links in incoming emails
Gmail
Secure and manage Google Workspace email
KnowBe4
Security awareness & simulation platform
Avanan (Checkpoint)
Cloud-native security for email and collab apps
Darktrace
AI-driven threat detection for email traffic
Microsoft Exchange
Manage and secure corporate email servers
Barracuda Email Gateway Defense
Block spam and targeted email attacks
Microsoft Defender for Office
Protect Office 365 mailboxes from malware
Trend Micro Vision One
Extended detection and response platform
Trellix
Unified EDR and XDR threat defense
SentinelOne Singularity Data Lake
Unified security data storage and analytics at scale
SentinelOne Cloud Funnel
Streamlined log forwarding and data export for analysis
SentinelOne Deep Visibility
Real-time endpoint telemetry for advanced threat hunting
Microsoft Defender for Endpoint
Protect Windows devices from cyber threats
Fleet
Manage and monitor endpoints using osquery
Cylance
AI-based prevention of endpoint malware
Cybereason
Advanced threat hunting and response platform
CrowdStrike Falcon
Endpoint protection powered by behavioral analytics
Sophos Intercept EDR
Detect and stop advanced endpoint attacks
OSSEC
Open-source host intrusion detection system
Kaspersky Security Center
Manage antivirus and device protection
Palo AltoCortex EDR
Detect and respond to endpoint threats
Trend Micro Apex Central
Endpoint protection and security management
Purview
Cloud data governance and compliance
Varonis
Discover and protect sensitive data across systems
ZeroFox
Detect and mitigate external digital threats
GitHub Enterprise
Secure code repositories and development workflows
IBM Guardium
Protect and monitor sensitive database activity
Cribl
Stream and manage observability data efficiently
Netskope
Cloud access security for modern enterprises
Microsoft Defender for Cloud Apps
Control and monitor cloud app usage
Azure
Secure Microsoft cloud environments and services
Google Cloud Platform
Manage and protect GCP workloads
AWS GuardDuty
Detect and analyze threats in AWS
AWS CloudTrail
Monitor and audit cloud activity logs
Palo Alto Networks Prisma Cloud
Protect multi-cloud environments from threats
CrowdStrike CSPM
Secure cloud workloads and configurations
Salt
Protect APIs from attacks and abuse