Advanced Search
Search Results
9 total results found
Automatically Fetch User Accounts without Manually Importing for OneLogin (via SCIM)
OneLogin (via SCIM) Introduction: OneLogin gives users the ability to access the applications and other resources they need to do their job by logging in once to a single interface. Platforms like OneLogin are known as Identity and Access Management (IAM) ...
Automatically Fetch User Accounts without Manually Importing for JumpCloud
JumpCloud Intoduction JumpCloud allows you to automate user account creation and syncing without manual CSV uploads by integrating with external identity sources like Active Directory, OneLogin, Okta, Azure AD, or APIs. Automatic User Provisioning in JumpCl...
Set Up Integration from SonarQube
SonarQube Introduction SonarQube is a self-hosted or cloud-enabled tool that scans source code to detect bugs, vulnerabilities, code smells, duplications, and coverage issues across 30+ languages. It integrates with build tools (Maven, Gradle, MSBuild) and C...
Setup Integration from Qualys
Qualys VMDR Integration Guide Integrate Qualys Vulnerability Management, Detection and Response (VMDR) with the Elastic Stack via REST API to ingest vulnerability, asset, and detection data directly into Elasticsearch for centralized security monitoring and ...
AQUILA EDR Deployment Via All devices in Microsoft Intune
Deploying Endpoint Detection & Response (EDR) via Microsoft Intune Overview This guide explains how to install an Endpoint Detection & Response (EDR) solution on all devices managed through Microsoft Intune. The process ensures consistent protection across y...
GitHub Integration(Elastic)
GitHub Integration Introduction Elastic’s GitHub integration allows you to ingest GitHub logs, alerts, and developer activities into the Elastic Stack for centralized analysis. This supports use cases like vulnerability management, compliance auditing, and D...
AQUILA - Mimecast API v2 Integration
Mimecast Integration Guide Integrate Mimecast with your security platform via API to collect email threat data, archive logs, DLP events, and other security-related logs for centralized visibility and incident response. API 2.0 is the current standard - It's...
AQUILA - Setup Integration from Auth0
Auth0 Integration Guide Integrate Auth0 to ingest identity-related logs such as login attempts, user authentications, MFA usage, and blocked requests to support identity threat detection and correlation. Credentials & API Access Setup (Auth0) Before setting...
CyTech - EDR Automatic Installation
Endpoint Detection and Response (EDR), is a cybersecurity technology that focuses on detecting, investigating, and responding to suspicious activities and threats on endpoints, such as workstations, laptops, and servers. EDR solutions provide visibility into e...