Connectors

The more you connect,
the smarter it gets.

Plug any tool into Kiyadata and watch your risk context sharpen instantly. Explore 100+ ready-made connectors designed to integrate seamlessly into your security stack -- no code required.

InsightVM

InsightVM

Comprehensive vulnerability scanning with coverage metrics and asset discovery

Qualys

Qualys

Cloud-based vulnerability management and continuous monitoring

Invicti

Invicti

Web application security scanning with proof-based vulnerability detection

Acunetix

Acunetix

Automated web application security testing and vulnerability assessment

Tenable Nessus

Tenable Nessus

Industry-standard vulnerability scanning with deep plugin coverage and compliance checks

Synack

Synack

Penetration testing findings and external vulnerability intelligence

HackerOne

HackerOne

Bug bounty program findings, vulnerability disclosure, and pen test reports

Snyk

Snyk

Open-source dependency scanning and code vulnerability detection

CheckMarx

CheckMarx

Static and interactive application security testing (SAST/IAST)

GitHub

GitHub

Code repository scanning, Dependabot alerts, and secret detection

GitLab

GitLab

CI/CD pipeline security, SAST/DAST scanning, and dependency analysis

Veracode

Veracode

Enterprise SAST/DAST with software composition analysis and compliance reporting

Azure DevOps

Azure DevOps

Pipeline security, repository scanning, and work item integration

TeamCity

TeamCity

CI/CD build pipeline security, build artifact analysis, and deployment gate enforcement

Wazuh

Wazuh

Open-source SIEM, intrusion detection, and security monitoring

CrowdStrike

CrowdStrike

Endpoint vulnerability detection, agent compliance, and threat telemetry

Tanium

Tanium

Endpoint management, real-time inventory, and compliance data

CyberArk EPM

CyberArk EPM

Endpoint privilege management, application control, and least-privilege enforcement

Intune

Intune

Microsoft endpoint management, device compliance, and patch status

MECM

MECM

Microsoft endpoint configuration, patch compliance, and software deployment management

Wiz

Wiz

Agentless cloud security posture management and vulnerability detection

Orca Security

Orca Security

Cloud-native security with workload and configuration risk analysis

Zscaler

Zscaler

Cloud-native zero trust network security and secure web gateway

F5 Cloud WAF

F5 Cloud WAF

Cloud-based web application firewall with bot protection and DDoS mitigation

F5 Load Balancer

F5 Load Balancer

Load balancer topology, virtual IP management, and traffic analysis

Palo Alto Firewall

Palo Alto Firewall

Firewall policy, network segmentation, and rule management

Infoblox

Infoblox

DNS, DHCP, and IP address management for network visibility and control

Fortinet

Fortinet

Network firewall, IPS, and security fabric integration

Checkpoint

Checkpoint

Firewall management, threat prevention, and network policy enforcement

Forcepoint Firewall

Forcepoint Firewall

Next-gen firewall with data-aware security and threat protection

vCenter

vCenter

Virtualization infrastructure visibility and VM asset discovery

SolarWinds

SolarWinds

Network monitoring, IPAM, and infrastructure visibility

Red Hat Satellite

Red Hat Satellite

Linux system management, patch compliance, and content lifecycle

Active Directory

Active Directory

Identity and access management, organizational structure, and user directory

HashiCorp Vault

HashiCorp Vault

Secrets management, encryption as a service, and privileged access control

ServiceNow

ServiceNow

IT asset management, ticket workflows, and business services mapping

SAP HR

SAP HR

Organizational hierarchy, team ownership mapping, and asset-to-owner resolution

Jira

Jira

Issue tracking, remediation task management, and workflow automation

Slack

Slack

Real-time alerting, notification channels, and team collaboration

BitSight

BitSight

External risk assessment and security configuration monitoring

SecurityScorecard

SecurityScorecard

Domain-level security posture and third-party risk scoring

Recorded Future

Recorded Future

Threat intelligence, vulnerability risk scoring, and exploit activity monitoring

And many security news sources

Kiyadata continuously monitors threat intelligence feeds and security advisories to elevate CVEs that are actively exploited or trending in the wild.

CISA KEVCERT-FRMicrosoft MSRCHacker NewsNVDEPSS+ more

Missing a tool?

Our plug-and-play connector architecture makes adding new sources straightforward. Each connector is a self-contained module -- no changes to the core platform required.

We commit to delivering any new connector within only 2 weeks of your request.

Contact Us About Custom Connectors

Ready to take control of your vulnerability operations?

See how Kiyadata connects your tools, maps your attack paths, and empowers every team to remediate faster.

Request a Demo

30-minute walkthrough. No commitment. Join the industrial leaders who turned compliance into confidence.

Request Demo