Nos integramos con cientos herramientas tecnológicas. Cualquiera que fuere la herramienta de seguridad que Usted use, nos integramos a ella perfectamente.
Obtén una visión centralizada de todos tus incidentes de ciberseguridad, gestionada por un nuestro Cyber-Brain, recibiendo una visibilidad completa de tus eventos.
CYREBRO se conecta a tus soluciones actuales y cualquiera que añadas en el futuro
CYREBRO constantemente lanza integraciones adicionales
No encontró la integración?
Estamos constantemente desarrollando nuevas integraciones
1Password

800 Series Switch
3Com

Application Delivery Controller (ADC)
A10Networks
Afi
Policy Center
AhnLab
Akamai

Kona Site Defender
Akamai
Application Load Balancer Access Logs
Amazon AWS
CloudFront
Amazon AWS
CloudWatch
Amazon AWS
GuardDuty
Amazon AWS
Network Firewall
Amazon AWS
Route 53
Amazon AWS
Security Hub
Amazon AWS
VPC Flow Logs
Amazon AWS
Web Application Firewall (WAF)
Amazon AWS
ipAngel
Ambiron TrustWave
HTTP Server
Apache
UPS
APC
macOS
Apple

SIFT-IT
Arpeggio Software

SSL VPN Access Gateways
Array Networks

Email Security
AVANAN
VPN Gateway
Avaya

Awake Security

BackBox Software

Email Security Gateway
Barracuda

Firewall
Barracuda

Spam & Virus Firewall
Barracuda

Web Application Firewall (WAF) On-Premise
Barracuda

Web Filter
Barracuda

Privileged Identity (formerly Lieberman ERPM)
BeyondTrust

Remote Support (formerly Bomgar)
BeyondTrust

Bitdefender
CylanceENDPOINT
BlackBerry
SG Series Appliance
Blue Coat
Web Security Service
Blue Coat

Adonis
BlueCat Networks
Box

AAA Service Controller
Bridgewater Systems
ACF2
Broadcom
Brocade Fabric OS
Broadcom

Symantec Advanced Threat Protection (ATP)
Broadcom

Symantec Critical System Protection
Broadcom

Symantec Encryption Management Server
Broadcom

Symantec Endpoint Detection and Response (EDR)
Broadcom

Symantec Endpoint Security
Broadcom

Symantec Gateway Security (SGS)
Broadcom

Symantec Integrated Cyber Defense Exchange (ICDx)
Broadcom

Symantec System Center
Broadcom

Symantec VIP
Broadcom
CA Top Secret
Broadcom
Cato Networks

Infrastructure Services
Centrify
Anti Malware
Check Point
Anti-Bot
Check Point
Antivirus
Check Point
Application Control
Check Point
Data Loss Prevention (DLP)
Check Point
DDoS Protector
Check Point
Firewall
Check Point
Harmony
Check Point
Identity Logging
Check Point
IPS
Check Point
Mobile Access
Check Point
Security Gateway / Management
Check Point
SmartDefense
Check Point
Threat Emulation
Check Point
URL Filtering
Check Point
VPN
Check Point

12000 Series Routers
Cisco

6500 Series Switches
Cisco

7600 Series Routers
Cisco

ACE Firewall
Cisco

ACS
Cisco

Adaptive Security Appliance (ASA)
Cisco

Aironet
Cisco

AMP
Cisco

Carrier Routing System
Cisco

CatOS for Catalyst Switches
Cisco

Cloud Web Security (formerly ScanSafe)
Cisco

Cloudlock
Cisco

CSA
Cisco

Duo
Cisco

Duo
Cisco

Firepower Management Center
Cisco

Firepower Threat Defense
Cisco

Firewall Services Module (FWSM)
Cisco

Identity Services Engine
Cisco

IDS/IPS
Cisco

Integrated Services Router
Cisco

IOS
Cisco

Meraki
Cisco

NAC
Cisco

Nexus
Cisco

PIX
Cisco

Secure Malware Analytics (formerly Threat Grid)
Cisco

Starent Networks Home Agent (HA)
Cisco

Umbrella
Cisco

Unified Communications Manager (formerly CallManager)
Cisco

VPN 3000 Concentrator
Cisco

Wireless LAN Controllers
Cisco

Wireless Services Module (WiSM)
Cisco

Access Gateway
Citrix

Gateway (formerly NetScaler)
Citrix

Continuous Threat Detection (CTD)
Claroty

Audit
Cloudflare

Logs
Cloudflare

Coralogix

Intrusion Prevention System (IPS) (formerly Top Layer)
Corero

Correlog Agent for IBM z/OS
Correlog

Falcon
CrowdStrike

CRYPTOShield
CRYPTOCard

Privileged Threat Analytics
CyberArk

Cybereason

Firewall/VPN Appliance
CyberGuard

XDR Platform
Cynet

Failsafe
Damballa

Prevention for Endpoints
Deep Instinct
Networking N2048P Switch
Dell

Mainframe Event Acquisition System (MEAS)
DG Technology

DCS/DCRS Series
Digital China Networks (DCN)

Digital Guardian (formerly Verdasys)

Documo
Dropbox

Ekran System

Filebeat
Elastic
SF-Sherlock
Enterprise-IT-Security.com
SIEM
Epic Systems

Remote Administrator
ESET

Exabeam
800-Series Switch
Extreme Networks
A2 Series
Extreme Networks
A4 Series
Extreme Networks
B2 Series
Extreme Networks
B3 Series
Extreme Networks
B5 Series
Extreme Networks
C2 Series
Extreme Networks
C3 Series
Extreme Networks
C5 Series
Extreme Networks
D2 Series
Extreme Networks

ExtremeWare OS
Extreme Networks
G3 Series
Extreme Networks
HiGuard
Extreme Networks
I3 Series
Extreme Networks
Intrusion Prevention System (IPS)
Extreme Networks
Matrix E1 Switch
Extreme Networks
Matrix K/N/S Series Switch
Extreme Networks
Netsight ASM
Extreme Networks
Network Access Control (NAC)
Extreme Networks
Stackable and Standalone Switches
Extreme Networks
XSR Security Routers
Extreme Networks

BIG-IP AFM
F5 Networks

BIG-IP APM
F5 Networks

BIG-IP ASM
F5 Networks

BIG-IP LTM
F5 Networks

FirePass
F5 Networks

Enterprise DRM
Fasoo
Federated Directory Server
IBM

XPS
Fidelis

AX
FireEye

CMS
FireEye

Endpoint Security (formerly HX)
FireEye

FX
FireEye

MPS
FireEye

Email Security (EX)
FireEye

Network Security (NX)
FireEye

Data Loss Prevention (DLP)
Forcepoint

Email Cloud
Forcepoint

Security Manager
Forcepoint

Sidewinder
Forcepoint

Stonesoft Management Center
Forcepoint

V-Series Content Gateway
Forcepoint

V-Series Data Security Suite
Forcepoint

Web Security Cloud
Forcepoint

CounterACT
ForeScout

FortiEDR (formerly enSilo)
Fortinet

FortiGate
Fortinet

FortiMail
Fortinet
FreeRADIUS
genugate Firewall
genua
GitHub
Audit Logs
Google Cloud
Cloud DNS
Google Cloud
Cloud Firewall
Google Cloud
Google Cloud Platform

Activity Reports
Google Workspace

Beacon
Great Bay

Comware
H3C

IP Security Devices
H3C

Routers
H3C

Switches
H3C

Wireless LAN Devices
H3C

Active Defense
HBGary
HCL BigFix (formerly IBM BigFix)
HCL

Domino (formerly IBM Lotus Domino)
HCL

Heroku
Aruba Networking ClearPass Policy Manager
HPE
Aruba Networking Mobility Controllers
HPE
Aruba Networks Introspect
HPE

Network Automation
HPE

Networking Switches
HPE

ProCurve
HPE

Tandem Nonstop
HPE

UniX (HPE-UX)
HPE
AR Series Router
Huawei
S Series Switch
Huawei
CloudControl
HyTrust
AIX
IBM
AIX Audit
IBM

Bluemix Platform
IBM
Cloud Activity Tracker
IBM
Customer Information Control System (CICS)
IBM
DataPower Gateway
IBM
Db2
IBM
i
IBM
Information Management System (IMS)
IBM
Informix Audit
IBM
MaaS360
IBM
Privileged Session Recorder
IBM
Proventia Network Intrusion Prevention System (IPS)
IBM
QRadar App Logger
IBM
QRadar Network Security XGS
IBM
QRadar Packet Capture
IBM
Red Hat OpenShift
IBM
Resource Access Control Facility (RACF)
IBM
SAN Volume Controller (SVC)
IBM
Security Access Manager for Enterprise Single Sign-On
IBM
Security Access Manager for Mobile
IBM
Security Directory Server
IBM
Security Network IPS
IBM
Security Randori Recon
IBM
Security ReaQta
IBM
Security Trusteer
IBM
Security Trusteer Apex Advanced Malware Protection
IBM
Security Verify
IBM
Sense
IBM
SmartCloud Orchestrator
IBM
WebSphere Application Server
IBM
z/OS
IBM
zSecure Alert
IBM

Adaptive Security Platform
Illumio
Threat Manager
iManage

Application Security
Imperva

Cloud Web Application Firewall (WAF)
Imperva

Incapsula
Imperva

SecureSphere
Imperva
Infoblox NIOS

Intruder

BIND
ISC

BIND
ISC

ITCube Solutions

Smart Meter
Itron
JamfPro
Jamf
Jira Cloud
Jira
JumpCloud

Application Volume Tracking (AVT)
Juniper Networks

DX Application Acceleration Platform
Juniper Networks

EX Series Ethernet Switch
Juniper Networks

Firewall and VPN
Juniper Networks

Infranet Controller
Juniper Networks

Intrusion Detection and Prevention (IDP)
Juniper Networks

Junos Operating System
Juniper Networks

Junos WebApp Secure
Juniper Networks

M Series Multiservice Edge Routing
Juniper Networks

MX Series Ethernet Services Router
Juniper Networks

Network and Security Manager
Juniper Networks

Security Binary Log Collector
Juniper Networks

SRX Series Services Gateway
Juniper Networks

Steel-Belted Radius
Juniper Networks

T Series Core Platform
Juniper Networks

vGW Virtual Gateway
Juniper Networks

WLC Series Wireless LAN Controller
Juniper Networks

CyberTrace
Kaspersky

Security Cloud Center
Kaspersky
KeePass Password Safe
Keeper Security

SafeNet/i
Kisco

Kiteworks
Auditing
Kubernetes

Defender
Lastline

Magna
LightCyber

DHCP Server
Linux

iptables
Linux

OS
Linux

Malwarebytes

ADAudit Plus
ManageEngine

Application/Change Control
McAfee

ePolicy Orchestrator (EPO)
McAfee

MVISION Cloud (formerly Skyhigh Networks Cloud Security Platform)
McAfee

Network Security Platform (formerly Intrushield)
McAfee

TippingPoint Intrusion Prevention System (IPS)
Trend Micro

365 Defender
Microsoft

Azure Active Directory
Microsoft

Azure API Management (APIM)
Microsoft

Azure Blob Storage
Microsoft

Azure Defender
Microsoft

Azure Files
Microsoft

Azure Managed Kubernetes Service (MKS)
Microsoft

Azure Platform
Microsoft

Defender for Cloud Apps (CASB)
Microsoft

Defender for Endpoint (formerly Defender ATP)
Microsoft

DHCP Server
Microsoft

DNS Debug
Microsoft

Dynamics 365
Microsoft

Exchange Server
Microsoft

Hyper-V
Microsoft

Internet Authentication Service (IAS) & Network Policy Server
Microsoft

Internet Information Services (IIS)
Microsoft

Internet Security and Acceleration (ISA) Server
Microsoft

Intune
Microsoft

Office 365
Microsoft

Office 365 Message Trace
Microsoft

Sharepoint
Microsoft

SQL Server
Microsoft

System Center Operations Manager
Microsoft

Windows Security Event Log
Microsoft
Routers and Wireless
Mikrotik

Email Security
Mimecast

Secure Messaging Service
Mimecast
MongoDB Cloud
MongoDB
Symbol AP
Motorola
DDoS Secure
NCC Group

pfSense
Netgate

Arbor Networks Pravail
Netscout

Arbor Peakflow SP
Netscout

Active
Netskope

StealthINTERCEPT Alerts (formerly STEALTHbits StealthINTERCEPT)
Netwrix

StealthINTERCEPT Analytics (formerly STEALTHbits StealthINTERCEPT)
Netwrix

HTTP Server
NGINX

NetDetector
Niksun
Application Switch
Nortel
Contivity VPN Switches
Nortel
Ethernet Routing Switch 2500/4500/5500
Nortel
Ethernet Routing Switch 8300/8600
Nortel
Multiprotocol Router
Nortel
Secure Network Access Switch (SNAS)
Nortel
Secure Router
Nortel
Switched Firewall 5100
Nortel
Switched Firewall 6000
Nortel
Threat Protection System (TPS) Intrusion Sensor
Nortel
VPN Gateway
Nortel
Okta

Security Platform
Onapsis

Open LDAP

OpenBSD
OpenStack
NetIQ eDirectory (formerly Novell/Micro Focus eDirectory)
OpenText

Acme Packet SBC
Oracle

Audit Vault and Database Firewall (AVDF)
Oracle

BEA WebLogic Server
Oracle

Enterprise Manager
Oracle

Fine Grained Auditing (FGA)
Oracle

Listener
Oracle

RDBMS OS Audit Record
Oracle
Solaris Authentication Messages
Oracle

Sun ONE LDAP
Oracle

Solaris Basic Security Module (BSM)
Oracle
Solaris DHCP Server
Oracle
Solaris Sendmail Logs
Oracle

Orca Security

OSSEC

Cortex XDR
Palo Alto Networks

Endpoint Security Manager
Palo Alto Networks

PA Series
Palo Alto Networks

Prisma Cloud Compute
Palo Alto Networks

Pentera

Perception Point

Perimeter 81

pfSense

MailRelay
PineAPP

NAC
Portnox

Postfix

QJRN/400
Cilasoft / Precisely

ProFTPd

MOVEit (formerly ipswitch MOVEit)
Progress
Enterprise Protection and Enterprise Privacy
Proofpoint

Pulse Connect Secure
Pulse Secure

AppWall
Radware

DefensePro
Radware

Web Application Firewall (WAF)
Reblaze
Advanced Cluster Security for Kubernetes
Red Hat
Resolution1 Security

HR Cloud
Rippling
SteelCentral NetProfiler Audit
Riverbed

Security Cloud
Rubrik

Cloudpath Enrollment System (ES)
Ruckus

FastIron
Ruckus

Data Protection Suite (DPS)
Safend
DataSecure / KeySecure
SafeNet

Security
Salesforce

Security Auditing
Salesforce

Host-based Intrusion Detection System (HIDS)
Samhain Labs
Audit Trail
SAP
Enterprise Threat Detection
SAP
Sybase ASE
SAP

Scoro

Seculert

SentinelOne

Hedgehog
Sentrigo

Network Intrusion Detection System (NIDS)
Snort
Orion
SolarWinds

SonicOS
SonicWall

Enterprise Console
Sophos

Enterprise Console
Sophos

PureMessage
Sophos

UTM (formerly Astaro Security Gateway)
Sophos

Web Security Appliance
Sophos

XG Firewall
Sophos

HTTP Proxy
Squid
CryptoAuditor
SSH

Sucuri

Suricata

Brightmail
Symantec

Data Loss Prevention (DLP)
Symantec

Sysflow

Vulnerability Management (formerly Tenable.io)
Tenable

Human Layer Security (HLS)
Tessian

Vormetric Data Security
Thales Group

Secret Server
Thycotic

Apex Central
Trend Micro

Control Manager
Trend Micro

Deep Discovery Analyzer
Trend Micro

Deep Discovery Director
Trend Micro

Deep Discovery Email Inspector
Trend Micro

Deep Discovery Inspector
Trend Micro

Deep Security
Trend Micro

OfficeScan
Trend Micro

TippingPoint X Series Appliances
Trend Micro

Worry-Free Business Security Services (WFBS-SVC)
Trend Micro

XDR
Trend Micro

Enterprise
Tripwire

Control
Tropos Networks
DbProtect
Trustwave

UniFi Cloud Key
Ubiquiti

UniFi Security Gateway
Ubiquiti
DatAdvantage
Varonis

Vectra
Vectra Networks

NGFW
Venusense

Venusense Firewall
Venusense

Venusense Network Intrusion Prevention System (NIPS)
Venustech

Venusense Unified Threat Management (UTM)
Venustech
Content 360
Vericept

Vulnerability Remediation
Vicarius
AppDefense
VMware

Carbon Black Endpoint
VMware
vCenter
VMware
vCloud Director
VMware
vShield
VMware
Workspace ONE UEM (formerly AirWatch)
VMware

VoiceSpin

Fireware OS
WatchGuard

WithSecure
ZOOM Cloud
ZOOM

Nanolog Streaming Service
Zscaler

Private Access
Zscaler
