From code to cloud, identity to ITSM – Balbix sits at the center of your security universe.
Security scanning focuses on Android app packages and operating system vulnerabilities
Static application security testing tool that scans source code to find vulnerabilities
Dynamic application security testing scans running web applications and APIs
Cloud-based static code analysis service integrated into the Polaris Software Integrity Platform
Software composition analysis using Black Duck technology to analyze open-source components
Dynamic testing and penetration testing of web applications
Manual and automated web penetration testing to discover security weaknesses
Enterprise solution that scans custom code to uncover security vulnerabilities
Software composition analysis scans open-source libraries and components
AI platform that discovers, tests and protects web and mobile applications using ML-driven dynamic scans
Accurate dynamic scans across websites, applications and APIs to detect vulnerabilities
Security testing analyzes iOS apps and device configurations for vulnerabilities
Dynamic analysis of mobile applications to test running apps for security issues
Mobile Security Framework performs static analysis of Android and iOS applications
Dynamic application security testing to evaluate web applications for vulnerabilities
Cloud-based service that automatically crawls and tests custom web applications
Developer security platform for vulnerability scanning and remediation
Dynamic analysis scans running web applications to identify vulnerabilities
Cloud-based service that scans source code to identify security flaws
Software composition analysis examines open-source libraries to detect vulnerabilities
Dynamic testing of web applications to discover security vulnerabilities
Breach and attack simulation platform that automates real-world attack scenarios
Attack Path Management continuously runs attack simulations across hybrid cloud environments
Amazon CloudFront is a global content delivery network
Amazon DynamoDB is a managed NoSQL database service
Amazon Elastic Compute Cloud provides scalable on-demand virtual servers
Amazon Elastic File System is a fully managed file storage service
Amazon Elastic Kubernetes Service is a managed service for running Kubernetes
Amazon ElastiCache is a fully managed in-memory cache service
Amazon OpenSearch Service simplifies deployment and management of OpenSearch clusters
Amazon RDS is a managed database service that creates resizable database instances
Amazon Route 53 is a highly available and scalable DNS web service
Amazon Simple Notification Service automates sending notifications
Amazon Simple Queue Service is a fully managed distributed message queuing service
AWS CloudTrail records user and API activity across AWS
AWS Lambda is a serverless computing service
Amazon Simple Storage Service provides scalable object storage
AWS Secrets Manager securely stores and manages secrets like passwords
Azure App Service is a fully managed platform for building web applications
Azure Blob Storage is a massively scalable object storage service
Azure Cache for Redis is a fully managed in-memory cache
Azure Container Instances run Docker containers directly on Azure infrastructure
Azure Cosmos DB is a globally distributed, multi-model NoSQL database service
Azure Database for MySQL is a managed relational database service
Azure Database for PostgreSQL is a managed PostgreSQL database service
Azure Functions is a serverless compute service
Azure Key Vault manages and stores secrets, encryption keys and certificates
Azure Kubernetes Service is a managed Kubernetes platform
Azure Service Bus is a fully managed enterprise message broker
Azure SQL offers fully managed SQL databases as a service
Azure SQL Managed Instances provide fully managed instance-level SQL Server compatibility
Azure SQL Virtual Machines run full SQL Server instances on Azure VMs
Azure Storage Accounts provide a namespace for storing Azure data services
Azure Synapse Analytics is an analytics platform combining big data and data warehousing
Azure Virtual Machine Scale Sets deploy and manage a set of identical VMs
Azure Virtual Machines provide on-demand computing resources in Azure
Google Cloud Functions provides a serverless execution environment
Google Cloud KMS manages cryptographic keys used to protect data
Google Cloud SQL is a fully managed relational database service
Google Cloud Storage provides durable, highly available object storage
Google Compute Engine offers virtual machine instances in Google Cloud
Google Cloud IAM provides role-based access control across GCP resources
Google Kubernetes Engine is a managed Kubernetes service
Google Cloud Pub/Sub is a messaging service for asynchronous communication
Google Secret Manager securely stores API keys and other secrets
Configuration Management Database provides full visibility into infrastructure and services
Configuration Management Database provides full visibility into infrastructure and services
Audits configurations of IT assets against security benchmarks and regulatory policies
Audits configurations of IT assets against security benchmarks and regulatory policies
Containerized cloud native applications security from development to production
Unified code-to-cloud visibility, risk prioritization, and workload protection
Agentless cloud security using SideScanning for comprehensive visibility
Maximum protection on workloads with file integrity monitoring and intrusion prevention
Unified cloud security platform using agentless approach with contextual analysis
Ingests asset and vulnerability data from on-premises data center environments
Automated Apple device management and security for Mac, iPhone and iPad devices
Device management platform for Apple devices with automated configuration
Cloud-based unified endpoint management service for corporate and BYOD devices
Asset Discovery and Inventory provides complete visibility into devices
Configuration compliance assessments and vulnerability scanning on endpoints
Automates distribution and installation of operating system and application patches
Unified Endpoint Management manages devices across mobile and desktop platforms
Endpoint detection and response platform that monitors endpoints
Antivirus, intrusion prevention and advanced endpoint protection
Advanced Malware Protection for Endpoints monitors endpoint activity
Endpoint protection with antivirus, EDR and threat intelligence
Continuously identifies software vulnerabilities and misconfigurations across endpoints
Built-in antivirus and endpoint detection and response capabilities
Extended detection and response platform that correlates endpoint, network and cloud telemetry
Autonomous endpoint protection with AI-based threat detection
Endpoint security with antivirus, EDR and anti-ransomware protection
Comprehensive endpoint security with antivirus, EDR and vulnerability protection
Security leaders rapidly identify exposure and detect threats
Third-party cyber risk ratings and continuous monitoring of vendors
Generic ingestion mechanism for importing data from various sources
Collects and forwards data from on-premises or cloud sources to Balbix platform
On-premises directory service for Windows domain networks
Microsoft’s cloud-based identity and access management service
Privileged access management platform
Identity and access management platform
Identity and access management solutions
Agentless device security platform for unmanaged devices, IoT, OT and IT assets
Cyber-physical systems security platform for OT, IoT, and connected medical devices, unifying visibility, risk management, and threat detection.
Operational technology and IoT security by monitoring network traffic
IT asset management and discovery for data centers and cloud
Software asset management and vulnerability insights
End-of-life dates aggregated from vendor advisories, MITRE, NVD, and endoflife.date
Microsoft Product Lifecycle information (contributes to overall EOL data)
Apache HTTP Server vulnerability advisories
Apache Tomcat security vulnerabilities
Jenkins Security Advisories
MariaDB Security Vulnerabilities database
MongoDB Security Vulnerabilities and advisories
Mozilla Security Advisories for Firefox and products
OpenSSL Security Advisories
PHP Security Advisories and vulnerability reports
Pivotal Security Advisories (now part of VMware Tanzu)
PostgreSQL Security Information
VideoLAN Security Advisories for VLC Media Player
Wireshark Security Advisories
Imports hierarchical ownership metadata to map assets to business owners
Cloud-delivered security platform that blocks malicious internet requests at DNS layer
Phishing defense and security awareness training
Security awareness training and phishing simulation
Phishing simulation and security awareness training platform
Email security and security awareness training
Centralizes management of VMware vSphere environments
Enables ingestion of files such as vulnerability reports through secure file transfer
Discovery and grouping of assets based on network subnets
Discovery and grouping of assets based on network subnets
MITRE ATT&CK Framework for adversary tactics and techniques
Offensive Security Exploit Database
GitHub Security Advisory Database
GitLab Security Advisories and vulnerability database
Recorded Future threat intelligence platform
VulDB vulnerability database
VulnCheck exploit and vulnerability intelligence
Creates and updates Jira issues for vulnerability remediation workflows
Creates incidents and change requests from Balbix findings
Adobe Security Bulletins and vulnerability advisories
Apple Security Updates and vulnerability disclosures
Atlassian Security Advisories for their product suite
Autodesk Security Advisories and product vulnerabilities
Cisco Security Advisories and vulnerability disclosures
Dell Security Advisories and firmware vulnerabilities
F5 Networks Security Advisories
Fortinet Security Advisories and FortiGuard Labs intelligence
Google Security Bulletins and Chrome vulnerabilities
Juniper Networks Security Advisories
McAfee Security Bulletins and vulnerability advisories
Microsoft Security Response Center (MSRC) advisories
NetApp Security Advisories and vulnerability disclosures
Oracle Critical Patch Updates and security alerts
Palo Alto Networks Security Advisories
SAP Security Notes and vulnerability advisories
Splunk Security Advisories and vulnerability disclosures
Symantec/Broadcom Security Response advisories
VMware Security Advisories and vulnerability disclosures
Zoom Security Advisories and vulnerability bulletins
Automated security assessment service that scans AWS workloads
Discovers and inventories IT assets and monitors changes
Integrated solution that discovers assets, detects vulnerabilities, assigns risk scores
Uses lightweight agent to collect endpoint data continuously
Automated vulnerability scanner that discovers open ports and applications
Centralized vulnerability assessment and compliance management
Cloud-based platform that discovers and assesses assets
Center for Internet Security benchmarks and advisories
CISA Known Exploited Vulnerabilities Catalog
MITRE Common Vulnerabilities and Exposures database
NIST National Vulnerability Database
Aggregates vulnerability data from scanners and prioritizes remediation
Every connector feeds the Balbix AI brain—turning noisy telemetry into prioritized action.