Product
Solutions
Company
Integrate without limits.
Automate access decisions, policy enforcement, and traffic controls by integrating Cloudflare Zero Trust directly into your workflows.
Use Google Sheets in NINA to read, write, and update spreadsheets, automate reporting, and process data across your workflows.
Pull threat intelligence from OpenCTI to enrich workflows with context, indicators, and structured security data.
Manage policies, compliance data, directory objects, and system insights by bringing JumpCloud actions into your NINA automations.
Automate identity tasks with Entra ID, including lifecycle events, group updates, and governance workflows.
Use Microsoft Graph Security to track and manage alerts, incidents, indicators, and response actions across Microsoft 365.
Create, update, and manage issues, comments, attachments, and user records by linking Jira directly into your workflows.
Submit URLs, retrieve analysis results, screenshots, and scan histories automatically through urlscan.io.
Check IP reputation, submit abuse reports, perform CIDR lookups, and retrieve blacklist data using AbuseIPDB.
Submit files, retrieve sandbox results, and access automated malware analysis reports with ANY.RUN as part of your workflows.
Use the API node to call external APIs, exchange data, and integrate third-party systems seamlessly.
Read, write, and manage S3 buckets and objects within your automated workflows.
Trigger XSOAR playbooks, incidents, and enrichment steps to orchestrate end-to-end investigation and response workflows.
Upload, download, search, and manage files and folders in Dropbox from inside your workflows.
Query threat intelligence, enrich investigations, and leverage detection data through the CrowdStrike integration.
Query, insert, update, delete, and aggregate MongoDB documents programmatically in your workflows.
Use MISP to manage events, attributes, tags, and collaborative threat intelligence sharing within NINA.
Upload, download, list, delete, and rename files using FTP and SFTP within your workflows.
Send, receive, and organize emails, threads, labels, and drafts by integrating Gmail actions into your automations.
Create, update, and manage events or check availability automatically with Google Calendar.
Create, update, share, and organize files, folders, and shared drives through Google Drive.
Translate text, detect languages, and process multilingual content automatically using Google Translate.
Send messages, manage channels, look up users, run searches, and automate communication tasks using Slack.
Automate email, calendar, and contact workflows through Outlook using the Microsoft Graph API.
Send messages, manage chats, transfer files, and handle callbacks through Telegram.
Send HTTP requests with custom headers and payloads to integrate any external service using the Webhook node.
Search repositories, manage issues and pull requests, update files, and access user data by connecting GitHub directly into your workflows.
Search projects, manage issues and merge requests, update repository files, and work with user data by connecting GitLab directly into your workflows.
Pull threat intelligence from Feedly to bring in articles, CVE data, TTPs, threat actors, and indicators of compromise directly into your workflows.
Search Intelligence X to pull OSINT and threat intelligence into your workflows, including leaked credentials, exposed data, domain information, and other searchable data sources.
Connect to SharePoint Online to manage sites, search and retrieve files, handle documents and metadata, and run bulk operations directly within your workflows.
Use Microsoft Teams in NINA to manage teams, channels, messages, users, and files, and to automate communication and collaboration workflows across your organization
Use Recorded Future in NINA to enrich IOCs, search threat actors, pull MITRE ATT&CK TTPs, and access targeting insights directly within your security workflows.
Manage boards, lists, cards, checklists, labels, and attachments in Trello, and run searches across your workspace directly within your workflows.
Analyze files, URLs, domains, and IP addresses with VirusTotal to detect malware and security threats using aggregated intelligence from multiple security engines.
Search for leaked credentials, retrieve exposure data and statistics, visualize credential relationships, and track validation results directly within your security workflows.
Search for exposed credit card data, retrieve breach datasets, and analyze leaked financial information directly within your security workflows.
Search and retrieve CVE and CPE data to track vulnerabilities, assess impact, and enrich vulnerability management and security workflows.
Retrieve assets, IPs, domains, services, certificates, endpoints, CVEs, and findings to monitor and manage your external attack surface within security workflows.
Search forum threads and posts to monitor threat actor discussions, gather underground intelligence, and enrich threat intelligence and research workflows.
Analyze malware samples and hashes using Zynap Sandbox to scan threats, retrieve analysis results, and enrich security workflows with internal malware intelligence.