One platform.
Your entire security stack.

Plug into 150+ tools.
See everything. Act faster.

Integration Ecosystem

Connected where it counts.

From code to cloud, identity to ITSM – Balbix sits at the center of your security universe.

Categories

Application Security
connectors-android

Android

Security scanning focuses on Android app packages and operating system vulnerabilities

Connectors-Blackduck

Black Duck Coverity – SAST

Static application security testing tool that scans source code to find vulnerabilities

Connectors-Blackduck

Black Duck Polaris – DAST

Dynamic application security testing scans running web applications and APIs

Connectors-Blackduck

Black Duck Polaris – SAST

Cloud-based static code analysis service integrated into the Polaris Software Integrity Platform

Connectors-Blackduck

Black Duck Polaris – SCA

Software composition analysis using Black Duck technology to analyze open-source components

Connectors-burpsuite

Burp Suite – DAST

Dynamic testing and penetration testing of web applications

Connectors-burpsuite

Burp Suite – Pen Test

Manual and automated web penetration testing to discover security weaknesses

Connectors-checkmarx

Checkmarx – SAST

Enterprise solution that scans custom code to uncover security vulnerabilities

Connectors-checkmarx

Checkmarx – SCA

Software composition analysis scans open-source libraries and components

Connectors-immuniweb

ImmuniWeb – DAST

AI platform that discovers, tests and protects web and mobile applications using ML-driven dynamic scans

Connectors-Invicti

Invicti – DAST

Accurate dynamic scans across websites, applications and APIs to detect vulnerabilities

connectors-IOS

iOS

Security testing analyzes iOS apps and device configurations for vulnerabilities

Connectors-MobSF

MobSF – DAST

Dynamic analysis of mobile applications to test running apps for security issues

Connectors-MobSF

MobSF – SAST

Mobile Security Framework performs static analysis of Android and iOS applications

Connectors-NST

NST Cyber – DAST

Dynamic application security testing to evaluate web applications for vulnerabilities

Connectors-Qualys

Qualys WAS – DAST

Cloud-based service that automatically crawls and tests custom web applications

Connectors-Snyk

Snyk

Developer security platform for vulnerability scanning and remediation

Connectors-veracode

Veracode – DAST

Dynamic analysis scans running web applications to identify vulnerabilities

Connectors-veracode

Veracode – SAST

Cloud-based service that scans source code to identify security flaws

Connectors-veracode

Veracode – SCA

Software composition analysis examines open-source libraries to detect vulnerabilities

connectors-www

Web

Dynamic testing of web applications to discover security vulnerabilities

Breach and Attack Simulation
Connectors-Cymulate

Cymulate

Breach and attack simulation platform that automates real-world attack scenarios

Connectors-XM Cyber

XM Cyber

Attack Path Management continuously runs attack simulations across hybrid cloud environments

Cloud Platforms - AWS
Connectors-AWS-CloudFront

Amazon CloudFront

Amazon CloudFront is a global content delivery network

Connectors-AWS-DynamoDB

Amazon DynamoDB

Amazon DynamoDB is a managed NoSQL database service

Connectors-AWS_EC2_Instances

Amazon EC2

Amazon Elastic Compute Cloud provides scalable on-demand virtual servers

Connectors-AWS EFS

Amazon EFS

Amazon Elastic File System is a fully managed file storage service

Connectors-AWS-EKS Cloud

Amazon EKS

Amazon Elastic Kubernetes Service is a managed service for running Kubernetes

Connectors-AWS-ElastiCache

Amazon ElastiCache

Amazon ElastiCache is a fully managed in-memory cache service

Connectors-aws-open-search

Amazon OpenSearch

Amazon OpenSearch Service simplifies deployment and management of OpenSearch clusters

Connectors-AWS-RDS

Amazon RDS

Amazon RDS is a managed database service that creates resizable database instances

Connectors-AWS-Route 53

Amazon Route 53

Amazon Route 53 is a highly available and scalable DNS web service

Connectors-AWS-Simple Notification Service

Amazon SNS

Amazon Simple Notification Service automates sending notifications

Connectors-AWS-Simple Queue Service

Amazon SQS

Amazon Simple Queue Service is a fully managed distributed message queuing service

Connectors-AWS-CloudTrail

AWS CloudTrail

AWS CloudTrail records user and API activity across AWS

Connectors-AWS-Lambda

AWS Lambda

AWS Lambda is a serverless computing service

Connectors-AWS S3

AWS S3

Amazon Simple Storage Service provides scalable object storage

Connectors-AWS-Secrets Manager

AWS Secrets Manager

AWS Secrets Manager securely stores and manages secrets like passwords

Cloud Platforms - Azure
Connectors-app-service

Azure App Service

Azure App Service is a fully managed platform for building web applications

Connectors-storage-blob

Azure Blob Storage

Azure Blob Storage is a massively scalable object storage service

Connectors-cache-redis

Azure Cache for Redis

Azure Cache for Redis is a fully managed in-memory cache

Connectors-Azure Container Instances

Azure Container Instances

Azure Container Instances run Docker containers directly on Azure infrastructure

Connectors-Azure_Cosmos_DB

Azure Cosmos DB

Azure Cosmos DB is a globally distributed, multi-model NoSQL database service

Connectors-mysql-cleardb-database

Azure Database for MySQL

Azure Database for MySQL is a managed relational database service

Connectors-PostgreSQL

Azure Database for PostgreSQL

Azure Database for PostgreSQL is a managed PostgreSQL database service

Connectors-functions

Azure Functions

Azure Functions is a serverless compute service

Connectors-key-vault

Azure Key Vault

Azure Key Vault manages and stores secrets, encryption keys and certificates

Connectors-azure-Kubernetes

Azure Kubernetes Service

Azure Kubernetes Service is a managed Kubernetes platform

Connectors-service-bus

Azure Service Bus

Azure Service Bus is a fully managed enterprise message broker

Connectors-sql-database-generic

Azure SQL

Azure SQL offers fully managed SQL databases as a service

Connectors-Azure SQL Managed Instances

Azure SQL Managed Instances

Azure SQL Managed Instances provide fully managed instance-level SQL Server compatibility

Connectors-SQL Virtual Machines

Azure SQL Virtual Machines

Azure SQL Virtual Machines run full SQL Server instances on Azure VMs

Connectors-storage accounts

Azure Storage Accounts

Azure Storage Accounts provide a namespace for storing Azure data services

Connectors-Synapse Analytics

Azure Synapse Analytics

Azure Synapse Analytics is an analytics platform combining big data and data warehousing

Connectors-vm-scale

Azure Virtual Machine Scale Sets

Azure Virtual Machine Scale Sets deploy and manage a set of identical VMs

Connectors-vm

Azure Virtual Machines

Azure Virtual Machines provide on-demand computing resources in Azure

Cloud Platforms - GCP
Connectors-google-cloud-functions

Cloud Functions

Google Cloud Functions provides a serverless execution environment

Connectors-Cloud KMS

Cloud KMS

Google Cloud KMS manages cryptographic keys used to protect data

Connectors-cloud-SQL

Cloud SQL

Google Cloud SQL is a fully managed relational database service

Connectors-Cloud-Storage

Cloud Storage

Google Cloud Storage provides durable, highly available object storage

Connectors-Compute Engine

Compute Engine

Google Compute Engine offers virtual machine instances in Google Cloud

Connectors- GCP - IAM

GCP IAM

Google Cloud IAM provides role-based access control across GCP resources

Connectors-Google GKE

Google Kubernetes Engine

Google Kubernetes Engine is a managed Kubernetes service

Connectors-google-cloud-pub-sub

Pub/Sub

Google Cloud Pub/Sub is a messaging service for asynchronous communication

Connectors-secret-manager

Secret Manager

Google Secret Manager securely stores API keys and other secrets

CMDB
Connectors-cherwell

Cherwell CMDB

Configuration Management Database provides full visibility into infrastructure and services

Connectors-ServiceNow

ServiceNow CMDB

Configuration Management Database provides full visibility into infrastructure and services

Configuration Assessment
Connectors-Qualys

Qualys Policy Compliance

Audits configurations of IT assets against security benchmarks and regulatory policies

Connectors-Tenable_Inc

Tenable Policy Compliance

Audits configurations of IT assets against security benchmarks and regulatory policies

CSPM
Connectors-aqua_security

Aqua Security

Containerized cloud native applications security from development to production

Connectors-lacework

Lacework

Unified code-to-cloud visibility, risk prioritization, and workload protection

Connectors-orca

Orca Security

Agentless cloud security using SideScanning for comprehensive visibility

Connectors-Trend_Micro

Trend Micro Cloud One Workload Security

Maximum protection on workloads with file integrity monitoring and intrusion prevention

Connectors-wiz

Wiz

Unified cloud security platform using agentless approach with contextual analysis

Datacenter
Connectors-Balbix

Balbix Datacenter

Ingests asset and vulnerability data from on-premises data center environments

Endpoint Management
Connectors-Jamf

Jamf Pro

Automated Apple device management and security for Mac, iPhone and iPad devices

Connectors-Kandji

Kandji

Device management platform for Apple devices with automated configuration

Connectors-microsoft-intune

Microsoft Intune

Cloud-based unified endpoint management service for corporate and BYOD devices

Connectors-Tanium

Tanium Asset

Asset Discovery and Inventory provides complete visibility into devices

Connectors-Tanium

Tanium Comply

Configuration compliance assessments and vulnerability scanning on endpoints

Connectors-Tanium

Tanium Patch

Automates distribution and installation of operating system and application patches

Connectors-VMWare-workspace-one

VMware Workspace One UEM

Unified Endpoint Management manages devices across mobile and desktop platforms

Endpoint Protection
Connectors-Broadcom

Broadcom Carbon Black

Endpoint detection and response platform that monitors endpoints

Connectors-Broadcom

Broadcom Symantec Endpoint Security

Antivirus, intrusion prevention and advanced endpoint protection

Connectors-Cisco

Cisco AMP

Advanced Malware Protection for Endpoints monitors endpoint activity

Connectors-Crowstrike

CrowdStrike Falcon

Endpoint protection with antivirus, EDR and threat intelligence

Connectors-Crowstrike

CrowdStrike Spotlight

Continuously identifies software vulnerabilities and misconfigurations across endpoints

Connectors-Windows-defender

Microsoft Defender

Built-in antivirus and endpoint detection and response capabilities

Connectors-Palo Alto Networks Cortex XDR

Palo Alto Networks Cortex XDR

Extended detection and response platform that correlates endpoint, network and cloud telemetry

Connectors-SentinalOne

SentinelOne

Autonomous endpoint protection with AI-based threat detection

Connectors-sophos

Sophos

Endpoint security with antivirus, EDR and anti-ransomware protection

Connectors-Trend_Micro

Trend Micro Apex One Endpoint Security

Comprehensive endpoint security with antivirus, EDR and vulnerability protection

External Attack Surface Management
Connectors-Bitsight

BitSight

Security leaders rapidly identify exposure and detect threats

Connectors-black kite

Black Kite

Third-party cyber risk ratings and continuous monitoring of vendors

Flexible Connector
Connectors-Balbix

Balbix Flexible Connector

Generic ingestion mechanism for importing data from various sources

Forwarder Service
Connectors-Balbix

Balbix Forwarder Service

Collects and forwards data from on-premises or cloud sources to Balbix platform

Identity and Access Management
Connectors-active-directory

Active Directory

On-premises directory service for Windows domain networks

Connectors-Azure Entra

Azure Entra (Azure AD)

Microsoft’s cloud-based identity and access management service

Connectors-Cyberark

CyberArk

Privileged access management platform

Connectors-Okta

Okta

Identity and access management platform

Connectors-PingIdentity

PingIdentity

Identity and access management solutions

IoT/OT
Connectors-Armis

Armis

Agentless device security platform for unmanaged devices, IoT, OT and IT assets

Connectors Claroty

Claroty

Cyber-physical systems security platform for OT, IoT, and connected medical devices, unifying visibility, risk management, and threat detection.

Connectors-nozomi

Nozomi Networks

Operational technology and IoT security by monitoring network traffic

IT Asset Management
Connectors-Device42

Device42

IT asset management and discovery for data centers and cloud

Connectors-Flexera

Flexera

Software asset management and vulnerability insights

Lifecycle and End-of-Life Information
Connectors-EOL lifecycle

EOL Lifecycle

End-of-life dates aggregated from vendor advisories, MITRE, NVD, and endoflife.date

Connector-Microsoft

Microsoft Lifecycle

Microsoft Product Lifecycle information (contributes to overall EOL data)

Open Source and Application Advisories
Connectors-Apache HTTP Server

Apache Httpd

Apache HTTP Server vulnerability advisories

Connectors-Apache_Tomcat

Apache Tomcat

Apache Tomcat security vulnerabilities

Connectors-Jenkins

Jenkins

Jenkins Security Advisories

Connectors-MariaDB

Mariadb

MariaDB Security Vulnerabilities database

Connectors-mongodb

Mongodb

MongoDB Security Vulnerabilities and advisories

Connectors-Mozilla

Mozilla

Mozilla Security Advisories for Firefox and products

Connectors-OpenSSL

OpenSSL

OpenSSL Security Advisories

Connectors-PHP

PHP

PHP Security Advisories and vulnerability reports

Connectors-Pivotal-vmware-tanzu

Pivotal

Pivotal Security Advisories (now part of VMware Tanzu)

Connectors-Postgresql_elephant

Postgre SQL

PostgreSQL Security Information

Connectors-VideoLAN

Videolan

VideoLAN Security Advisories for VLC Media Player

Connectors-Wireshark

Wireshark

Wireshark Security Advisories

Operating System and Distribution Advisories
Connectors-Amazon

Amazon Linux

Amazon Linux Security Advisories

Connectors-Centos

Centos

CentOS Security Advisories and errata

Connectors-Debian

Debian

Debian Security Advisory (DSA) database

Connectors-Oracle

Oracle Linux

Oracle Linux Security Advisories

Connectors-Red_Hat

Redhat

Red Hat Security Advisories (RHSA)

Connectors-Suse

Suse

SUSE Security Updates and advisories

Connectors-Ubuntu

Ubuntu

Ubuntu Security Notices (USN)

Owner Management
Connectors-Balbix

Balbix Owner Hierarchy

Imports hierarchical ownership metadata to map assets to business owners

SASE
Connectors-Cisco

Cisco Umbrella

Cloud-delivered security platform that blocks malicious internet requests at DNS layer

Security Awareness Training
Connectors-Cofense

Cofense

Phishing defense and security awareness training

Connectors-knowbe4

KnowBe4

Security awareness training and phishing simulation

Connectors-phishingbox

PhishingBox

Phishing simulation and security awareness training platform

Connectors-Proofpoint

Proofpoint

Email security and security awareness training

Server Virtualization
Connectors-VMware vCenter

VMware vCenter

Centralizes management of VMware vSphere environments

SFTP
Connectors-Balbix

Balbix SFTP Server

Enables ingestion of files such as vulnerability reports through secure file transfer

Subnet
Connectors-Balbix

Balbix Subnet

Discovery and grouping of assets based on network subnets

Connectors-IPAM

IPAM

Discovery and grouping of assets based on network subnets

Threat Intelligence and Exploit Databases
Connectors-MITRE_ATTACK

Attck

MITRE ATT&CK Framework for adversary tactics and techniques

Connectors-edb-spider-orange

Exploitdb

Offensive Security Exploit Database

Connectors-GitHub

GHSA

GitHub Security Advisory Database

Connectors-GitHub

Gitlab

GitLab Security Advisories and vulnerability database

Connectors-RF

RF

Recorded Future threat intelligence platform

Connectors-VulDB

Vuldb

VulDB vulnerability database

Connectors-VulnCheck

Vulncheck

VulnCheck exploit and vulnerability intelligence

Ticketing
Connectors-jira

JIRA Ticketing

Creates and updates Jira issues for vulnerability remediation workflows

Connectors-ServiceNow

ServiceNow ITSM

Creates incidents and change requests from Balbix findings

Vendor Security Advisories
Connectors-Adobe

Adobe

Adobe Security Bulletins and vulnerability advisories

Connectors-Apple

Apple

Apple Security Updates and vulnerability disclosures

Connectors-Atlassian

Atlassian

Atlassian Security Advisories for their product suite

Connectors-Autodesk

Autodesk

Autodesk Security Advisories and product vulnerabilities

Connectors-Cisco

Cisco

Cisco Security Advisories and vulnerability disclosures

Connectors-Dell

Dell

Dell Security Advisories and firmware vulnerabilities

Connectors-F5_Networks

F5

F5 Networks Security Advisories

Connectors-Fortinet

Fortinet

Fortinet Security Advisories and FortiGuard Labs intelligence

Connectors-Google

Google

Google Security Bulletins and Chrome vulnerabilities

Connectors-Juniper_Networks

Juniper

Juniper Networks Security Advisories

Connectors-McAfee

Mcafee

McAfee Security Bulletins and vulnerability advisories

Connector-Microsoft

Microsoft

Microsoft Security Response Center (MSRC) advisories

Connectors-NetApp

Netapp

NetApp Security Advisories and vulnerability disclosures

Connectors-Oracle

Oracle

Oracle Critical Patch Updates and security alerts

Connectors-Palo Alto Networks

Palo Alto Networks

Palo Alto Networks Security Advisories

Connectors-SAP

SAP

SAP Security Notes and vulnerability advisories

Connectors-Splunk

Splunk

Splunk Security Advisories and vulnerability disclosures

Connectors-Broadcom

Symantec

Symantec/Broadcom Security Response advisories

Connectors-Vmware-by-broadcom

Vmware

VMware Security Advisories and vulnerability disclosures

Connectors-Zoom

Zoom

Zoom Security Advisories and vulnerability bulletins

Vulnerability Assessment
Connectors-Amazon_Web_Services

AWS Inspector

Automated security assessment service that scans AWS workloads

Connectors-Qualys

Qualys Asset Management

Discovers and inventories IT assets and monitors changes

Connectors-Qualys

Qualys VMDR

Integrated solution that discovers assets, detects vulnerabilities, assigns risk scores

Connectors-Rapid7

Rapid7 InsightVM

Uses lightweight agent to collect endpoint data continuously

Connectors-Rapid7

Rapid7 Nexpose

Automated vulnerability scanner that discovers open ports and applications

Connectors-Tenable_Inc

Tenable Security Center

Centralized vulnerability assessment and compliance management

Connectors-Tenable_Inc

Tenable Vulnerability Management

Cloud-based platform that discovers and assesses assets

Vulnerability Databases and Standards
Connectors-Center_for_Internet_Security

CIS

Center for Internet Security benchmarks and advisories

Connectors-Seal_of_Cybersecurity_and_Infrastructure_Security_Agency

CISA

CISA Known Exploited Vulnerabilities Catalog

Connectors-cve_org

CVE.ORG

MITRE Common Vulnerabilities and Exposures database

Connectors-NIST

NVD

NIST National Vulnerability Database

Vulnerability Prioritization
Connectors-Cisco

Cisco Vulnerability Management

Aggregates vulnerability data from scanners and prioritizes remediation

from integration to impact

All data. One source of truth.

Every connector feeds the Balbix AI brain—turning noisy telemetry into prioritized action.

Balbix works with
what you use today

If it’s in your stack, it’s in Balbix.