1-800-335-0403 Blog Careers Contact Us

Integrations and
Enrichments

FEATURED
DETECTION
ENDPOINT
INFRASTRUCTURE
AUTHENTICATION
WORKFLOW
Carbon Black
JASK ingest alerts from Carbon Black (Cb Defense and Cb Response) for high level correlation with other alert types. This also allows SOC teams to use the data from Carbon Black’s user/device data to add context during the triage phase.
Cylance
JASK ingest alerts for high level correlation with other alert types. Their endpoint technology allows the ASOC platform to ingest user/device data to add context during the triage phase.
Demisto
JASK integrates with this SOAR technology in order to begin the automated investigation process. When a JASK Insight reaches a certain threshold, it triggers the proper playbook in your SOAR platform.
Palo Alto Networks
JASK ingests Firewall alerts for correlation across with other alerts. This adds additional context in one place for the alerts.
Splunk
All signals and insights created in JASK can be forwarded to Splunk for long term storage over SYSLOG.
CLOSE