Adapters List
  • 15 minutes to read
  • Print
  • Share
  • Dark
    Light

Adapters List

  • Print
  • Share
  • Dark
    Light

Axonius supports and is integrated with a wide array of security and management solutions, also known as adapters, that collect and correlate information about assets.

The table below describes each of the supported adapters. For details on connecting adapters, see the Adapter Screen.

NOTE
Common adapters include documented connection instructions. To view those instructions, click the linked adapter name or search for the adapter name.
We are working on documenting additional connection instructions. If you cannot find a specific piece of information you need, please contact your Axonius account representative.
Adapter Logo Adapter Name Description Security Solution Categories
absolute_adapter Absolute Absolute specializes in software to manage and secure Windows computers and Android smartphones. EDR/EPP, MDM/EMM
alertlogic_adapter Alert Logic Alert Logic provides vulnerability and asset visibility, endpoint protection, threat detection, incident management, and a web application firewall. EDR/EPP
alibaba_adapter Alibaba Cloud Alibaba Cloud provides cloud computing services and cloud Infrastructure as a service. Cloud Infra
aws_adapter Amazon Web Services (AWS) The Amazon Web Services Adapters (ECS/EKS/EC2) includes the high-performance container orchestration service that supports Docker containers and containerized applications on AWS, Kubernetes Management Infrastructure across Multiple AWS Zones, as well as the EC2 instances themselves. Cloud Infra
armis_adapter Armis Armis is an agentless IoT security solution that lets enterprises see and control any device or network. IoT
aruba_adapter Aruba The Aruba Adapter connects to Aruba switches and routers. Networking
clearpass_adapter Aruba ClearPass Aruba ClearPass is a network access control (NAC) solution that allows enterprises to identify devices, enforce policies, and remediate threats. NAC
bomgar_adapter BeyondTrust Remote Support BeyondTrust Remote Support (formerly Bomgar) allows support technicians to remotely connect to end-user systems through firewalls from their computer or mobile devices. IT Agent
bitdefender_adapter Bitdefender GravityZone Business Security Bitdefender GravityZone Business Security uses machine learning and heuristics to protect against malware, phishing, ransomware, exploits and zero-days. EDR/EPP
bitsight_security_ratings_adapter BitSight Security Ratings BitSight Security Ratings are a data-driven and dynamic measurement of an organization’s cybersecurity performance. Cyber Intelligence
blackberry_uem_adapter BlackBerry Unified Endpoint Management (UEM) BlackBerry Unified Endpoint Management (UEM) delivers endpoint management and policy control for devices and apps on-premise or in the cloud. EDR/EPP, MDM/EMM
bluecat_adapter BlueCat Enterprise DNS BlueCat Enterprise DNS connects all disparate DNS and DHCP with centralized management of all clients and critical assets. Networking
ca_cmdb_adapter CA Service Management CA Service Management is an IT service management (ITSM) solution that offers incident management and IT asset management ITAM/ITSM, CMDB
carbonblack_defense_adapter Carbon Black CB Defense Carbon Black CB Defense includes antivirus and EDR in a cloud-delivered platform to stop malware, non-malware attacks, and ransomware. (Note: This adapter is also compatible with CB ThreatHunter and CB LiveOps) EDR/EPP
carbonblack_protection_adapter Carbon Black CB Protection Carbon Black CB Protection includes application control and critical infrastructure protection for critical systems and fixed-function devices in highly regulated environments. EDR/EPP
carbonblack_response_adapter Carbon Black CB Response Carbon Black CB Response includes EDR and threat hunting for security operations centers and incident response teams. EDR/EPP
checkpoint_r80_adapter Check Point Infinity Check Point Infinity protects against cyber threats across networks, endpoint, cloud and mobile devices. EDR/EPP, Firewall
censys_adapter Censys Censys monitors infrastructure and discovers unknown assets anywhere on the Internet. IoT
chef_adapter Chef Chef provides continuous automation for building, deploying, and managing infrastructure, compliance, and applications in legacy and hybrid environments. Config/Patch Mgmt
cisco_adapter Cisco The Cisco Adapter connects to Cisco switches and routers. Networking
cisco_amp_adapter Cisco Advanced Malware Protection (AMP) Cisco Advanced Malware Protection (AMP) includes threat intelligence, sandboxing, and malware blocking to detect, contain, and remove malware. EDR/EPP
cisco_firepower_management_center_adapter Cisco Firepower Management Center Cisco Firepower Management Center provides management over firewalls, application control, intrusion prevention, URL filtering, and advanced malware protection. Networking
cisco_ise_adapter Cisco Identity Services Engine (ISE) Cisco Identity Services Engine (ISE) is a network administration product that enables the creation and enforcement of security and access policies for endpoint devices connected to the company’s routers and switches. IAM
cisco_meraki_adapter Cisco Meraki Cisco Meraki solutions include wireless, switching, security, EMM, communications, and security cameras, all centrally managed from the web. Networking
cisco_prime_adapter Cisco Prime Cisco Prime offers a suite of tools to automate the management of wired and wireless Cisco networks. Networking
cisco_umbrella_adapter Cisco Umbrella Cisco Umbrella is a secure internet gateway in the cloud, including DNS and IP layer enforcement and command and control callback blocking. Networking
claroty_adapter Claroty Claroty discovers assets and monitors communication patterns for ICS networks. OT
cloudflare_adapter Cloudflare DNS Cloudflare DNS runs one of the largest DNS networks in the world. Networking
cloudpassage_adapter CloudPassage Halo CloudPassage Halo is a security automation platform providing visibility, protection, and continuous compliance monitoring for AWS and Azure deployments. Cloud Mgmt
code42_adapter Code42 Code42 is a next-gen DLP solution used to detect insider threats, satisfy regulatory compliance, and accelerate incident response investigations. DLP
crowd_strike_adapter CrowdStrike Falcon CrowdStrike Falcon delivers next-generation antivirus, endpoint detection and response (EDR), managed threat hunting, and threat intelligence. EDR/EPP
csv_adapter CSV Serials The CSV Serials Adapter is able to import .csv files with inventory information including the serial number of a device and supplemental device data. CMDB
cybereason_adapter Cybereason Deep Detect & Respond Cybereason Deep Detect & Respond (EDR) defends against advanced attacks by collecting and analyzing behavioral data to identify suspicious activities. EDR/EPP
cycognito_adapter CyCognito CyCAST Platform CyCognito CyCAST Platform is an automated, cloud-based security testing service that simulates attackers' reconnaissance techniques to find organizations' security blind spots. Cyber Intelligence
cylance_adapter CylancePROTECT CylancePROTECT uses artificial intelligence to detect and protect against ransomware, advanced threats, fileless malware, and malicious documents. EDR/EPP
cynet_adapter Cynet 360 Cynet 360 is a detection and response security platform for finding, ranking, and remediating unknown, camouflaged threats. EDR/EPP
datadog_adapter Datadog Datadog is a monitoring service for cloud-scale applications, providing monitoring of servers, databases, tools, and services. Cloud Mgmt
datto_rmm_adapter Datto RMM Datto RMM (formerly Autotask Endpoint Management) is a cloud-based Remote Monitoring and Management (RMM) platform that provides device auditing, real-time monitoring, and automatic patching. EDR/EPP, Config/Patch Mgmt
device42_adapter Device42 Device42 is a cloud-based CMDB for physical, virtual, and cloud servers and containers, network components, software, services, applications, and their relationships and dependencies. CMDB
divvycloud_adapter DivvyCloud DivvyCloud offers security, compliance, and governance guardrails for public and private cloud infrastructures. Cloud Mgmt
dropbox_adapter Dropbox Dropbox is a file hosting service that offers cloud storage, file synchronization, personal cloud, and client software. Cloud Mgmt
druva_adapter Druva Cloud Platform Druva Cloud Platform is a data protection as-a-service that provides management across all customer data sources that are scalable, predictable and on-demand. DLP
duo_adapter Duo Beyond Duo Beyond identifies corporate vs. personal devices, blocks untrusted devices, and give users secure access to internal applications. IAM
dynatrace_adapter Dynatrace Dynatrace is a software intelligence platform providing application performance management and cloud infrastructure monitoring. Cloud Mgmt
endgame_adapter Endgame Endgame is an endpoint protection platform that combines on-line and off-line protection against exploits, phishing, malware, ransomware, and fileless attacks. EDR/EPP
ensilo_adapter enSilo enSilo automates and orchestrates detection, prevention, and response against advanced malware and ransomware. EDR/EPP
eset_adapter ESET Endpoint Security ESET Endpoint Security is an anti-malware suite for Windows including web filtering, firewall, USB drive and botnet protection. EDR/EPP
f5_icontrol_adapter F5 BIG-IP iControl F5 iControl is a Web services-enabled open API providing granular control over the configuration and management of F5's application delivery platform, BIG-IP. Networking
fireeye_hx_adapter FireEye Endpoint Security (formerly HX) FireEye Endpoint Security (formerly HX) detects and protects against unknown endpoint threats and exploits with integrated threat intelligence. EDR/EPP
forcepoint_csv_adapter Forcepoint Web Security Endpoint Forcepoint Web Security Endpoint enables end-users to authenticate and receive policy enforcement via the Forcepoint Web Security Cloud infrastructure. IAM, Config/Patch Mgmt
foreman_adapter Foreman Foreman is a free open source project that automates repetitive tasks, quickly deploys applications, and proactively manages server lifecyle, on-premises or in the cloud. Config/Patch Mgmt
counter_act_adapter ForeScout CounterACT ForeScout CounterACT platform provides insight into network-connected devices. NAC
fortigate_adapter Fortinet FortiGate Fortinet FortiGate is a next-generation firewall providing security and visibility for end-to-end protection across the entire enterprise network. Firewall
gce_adapter Google Compute/Kubernetes Engine The Google Compute/Kubernetes Engine Adapter supports both GCE's virtual machines as well as the GKE environment for deploying containerized applications. Cloud Infra, Virtualization, Containers
google_mdm_adapter Google Mobile Management Google Mobile Management is an MDM solution for G Suite customers for Android, iOS, Windows and other smartphones. MDM/EMM
haveibeenpwned_adapter Have I Been Pwned Have I Been Pwned is a website to check if email accounts have been compromised in a data breach. Deception
bigfix_adapter IBM BigFix IBM BigFix provides remote control, patch management, software distribution, operating system deployment, network access protection and hardware and software inventory functionality. IT Agent, Config/Patch Mgmt
softlayer_adapter IBM Cloud IBM's cloud computing platform combines platform as a service (PaaS) with infrastructure as a service (IaaS) and cloud services. Cloud Infra
maas360_adapter IBM MaaS360 with Watson IBM MaaS360 with Watson is a Unified Endpoint Management (UEM) platform covering endpoints, end-users, apps, content, and data. It also gives visibility and control to manage mobile devices running iOS, macOS, Android, and Windows. CMDB, MDM/EMM
ibm_tivoli_taddm_adapter IBM Tivoli Application Dependency Discovery Manager (TADDM) IBM Tivoli Application Dependency Discovery Manager (TADDM) is a configuration management tool that helps IT operations personnel ensure and improve application availability in application environments. Config/Patch Mgmt
illusive_adapter Illusive Networks Illusive Networks deceives cyber attackers by planting false information about a given network's resources. Deception
imperva_dam_adapter Imperva Data Activity Monitoring (DAM) Imperva Data Activity Monitoring (DAM) defines and enforces data security and compliance policies across the cloud and on-premises including relational databases, mainframes, big data platforms, data warehouses, and enterprise file stores. IT Agent
infoblox_adapter Infoblox DDI Infoblox DDI consolidates DNS, DHCP, IP address management, and other core network services into a single platform, managed from a common console. Networking
jamf_adapter Jamf Pro Jamf Pro is an enterprise mobility management (EMM) tool that provides unified endpoint management for Apple devices. MDM/EMM
jumpcloud_adapter JumpCloud JumpCloud is a Directory-as-a-Service (DaaS) solution to authenticate, authorize, and manage users, devices, and applications via a common directory in the cloud. IAM
junos_adapter Juniper Junos The Juniper Junos Adapter connects to Juniper switches and routers. Networking
juniper_adapter Juniper Junos Space Network Management Platform Juniper Junos Space Network Management Platform automates management of Juniper's switching, routing, and security devices. Networking
kaseya_adapter Kaseya VSA Kaseya VSA is a remote monitoring and management solution for remote control, discovery, patch management, and monitoring. IT Agent, Config/Patch Mgmt
lansweeper_adapter Lansweeper Lansweeper is an agentless IT asset management and Network Inventory software tool for Microsoft Windows OS. IT Agent, CMDB
librenms_adapter LibreNMS LibreNMS is a network monitoring solution that provides auto-discovery for network hardware and operating systems including Cisco, Linux, Juniper, Foundry, and more. Networking
linux_ssh_adapter Linux SSH Adapter The Linux Secure Shell Adapter uses remote command execution over the SSH protocol to gather information about the endpoint Linux machine. ITAM/ITSM
logrhythm_adapter LogRhythm LogRhythm combines SIEM, user and entity behavior analytics, network traffic and behavior analytics, and security automation and orchestration. SIEM
malwarebytes_adapter Malwarebytes Malwarebytes protects endpoints from ransomware, automates endpoint remediation, and provides continuous visibility and monitoring. EDR/EPP
desktop_central_adapter ManageEngine Desktop Central ManageEngine Desktop Central is a desktop management and mobile device management software for managing desktops in LAN and across WAN and mobile devices from a central location. EDR/EPP, MDM/EMM
epo_adapter McAfee ePolicy Orchestrator (ePO) McAfee ePolicy Orchestrator (ePO) is a security management platform that provides real-time monitoring of security solutions. EDR/EPP
active_directory_adapter Microsoft Active Directory (AD) Microsoft Active Directory (AD) is a directory service for Windows domain networks that authenticates and authorizes all users and computers. IAM
azure_adapter Microsoft Azure Microsoft Azure is a cloud computing service created by Microsoft for building, testing, deploying, and managing applications and services through a global network of Microsoft-managed data centers. Cloud Infra
azure_ad_adapter Microsoft Azure Active Directory (Azure AD) Microsoft Azure Active Directory (Azure AD) is Microsoft's multi-tenant, cloud-based directory, and identity management service. IAM
hyper_v_adapter Microsoft Hyper-V Microsoft Hyper-V is a native hypervisor; it can create virtual machines on x86-64 systems running Windows. Virtualization
mssql_adapter Microsoft SQL Server Adapter The Microsoft SQL Server Adapter imports device information from arbitrary SQL servers. CMDB
sccm_adapter Microsoft System Center Configuration Manager (SCCM) Microsoft System Center Configuration Manager (SCCM) is a systems management software product for managing large groups of computers running Windows NT, Windows Embedded, macOS (OS X), Linux or UNIX, as well as Windows Phone, Symbian, iOS and Android mobile operating systems Config/Patch Mgmt
minerva_adapter Minerva Labs Endpoint Malware Vaccination Minerva Labs Endpoint Malware Vaccination simulates infection markers, rather than creating them, to contain outbreaks that bypass AV tools. EDR/EPP
mobileiron_adapter MobileIron EMM MobileIron EMM enables enterprises to secure and manage modern operating systems on mobile devices and desktops. MDM/EMM
netbox_adapter NetBox NetBox is an open source web application to help manage and document computer networks. Networking
nmap_adapter Nmap Security Scanner Nmap Security Scanner is a free and open source utility for network discovery and security auditing. VA Tool
observeit_adapter ObserveIT ObserveIT provides insider threat security solutions, including employee monitoring, user activity monitoring, behavioral analytics, policy enforcement, and digital forensics. UEBA
okta_adapter Okta Okta provides cloud software that helps companies manage their employees' passwords, by providing a “single sign-on” experience. IAM
openstack_adapter OpenStack OpenStack is an open source software solution for creating private and public clouds. Cloud Infra
opswat_adapter OPSWAT MetaAccess OPSWAT MetaAccess prevents risky devices from accessing local networks and cloud applications. NAC
oracle_cloud_adapter Oracle Cloud Oracle Cloud is a computing service providing servers, storage, network, applications and services. Cloud Infra
oracle_vm_adapter Oracle VM Oracle VM's server virtualization products support x86 and SPARC architectures and a variety of workloads such as Linux, Windows and Oracle Solaris. Virtualization
paloalto_cortex_adapter Palo Alto Networks Cortex Palo Alto Networks Cortex is an open and integrated, AI-based continuous security platform, allowing security operations teams to speed the analysis of massive data sets. Networking
paloalto_panorama_adapter Palo Alto Networks Panorama The Palo Alto Panorama management server provides centralized monitoring and management of multiple next-generation firewalls and appliance clusters. Networking
promisec_adapter Promisec Endpoint Manager Promisec Endpoint Manager is an agentless endpoint detection and remediation solution that detects, analyzes, and remediates abnormalities. EDR/EPP
proxmox_adapter Proxmox Virtual Environment (VE) Proxmox Virtual Environment (VE) is an open source server virtualization management solution based on QEMU/KVM and LXC. Virtualization
puppet_adapter Puppet Puppet is an open-source software configuration management tool. Config/Patch Mgmt
qualys_scans_adapter Qualys Cloud Platform Qualys Cloud Platform monitors customers' global security and compliance posture using sensors. VA Tool
kace_adapter Quest KACE Endpoint Systems Management Appliances Quest KACE Endpoint Systems Management Appliances provision, manage, secure, and service network-connected devices. Networking
nexpose_adapter Rapid7 Nexpose Rapid7 Nexpose is an on-premise vulnerability management solution, including discovery, detection, verification, risk classification, impact analysis, reporting and mitigation. VA Tool
redcanary_adapter Red Canary The Red Canary suite includes products that record telemetry, detect and investigate threats, and automate remediation. EDR/EPP
redseal_adapter RedSeal RedSeal’s network modeling and risk scoring platform models customers' entire hybrid data center of public cloud, private cloud and physical network. Networking
gotoassist_adapter RescueAssist RescueAssist (formerly GoToAssist) is a cloud-based toolset for IT and customer support teams including remote support, IT monitoring, and service desk management. IT Agent, Ticketing
riverbed_adapter(1) Riverbed SteelCentral Controller (SCC) Riverbed SteelCentral Controller SCC facilitates administration tasks for groups of SteelHeads, Interceptors, Mobile Controller, Cores, and Edges. Networking, AppSec
rumble_adapter Rumble Network Discovery Rumble is a cloud-based network discovery platform that identifies and monitors network-connected IT assets. Networking
saltstack_adapter SaltStack SaltStack intelligent automation delivers, event-driven security, cloud and configuration management. SOAR, Config/Patch Mgmt
saltstack_enterprise_adapter SaltStack Enterprise SaltStack Enterprise intelligent automation delivers event-driven security, cloud and configuration management. SOAR, Config/Patch Mgmt
samange_adapter Samanage Samanage is a unified, cloud-based IT service desk and asset management platform. Ticketing, CMDB
secdo_adapter Secdo Endpoint Protection Secdo Endpoint Protection automates endpoint forensic analysis and cyber investigations for security teams. EDR/EPP
redcloack_adapter Secureworks Red Cloak Secureworks Red Cloak is an endpoint detection and response technology that continuously monitors endpoints for signs of adversary activity. EDR/EPP
sentinelone_adapter SentinelOne SentinelOne is an endpoint protection solution including prevention, detection, and response. EDR/EPP
service_now_adapter ServiceNow ServiceNow provides service management software as a service, including IT services management (ITSM), IT operations management (ITOM) and IT business management (ITBM). CMDB, Ticketing
shodan_adapter Shodan Shodan is a search engine for Internet-connected devices. IoT
snipeit_adapter Snipe-IT Snipe-IT is a free, open source IT asset management system written in PHP. ITAM/ITSM
solarwinds_orion_adapter SolarWinds Network Performance Monitor SolarWinds Network Performance Monitor is a unified IT systems management system that tracks the performance of networks, applications, systems, and databases on-premises, in a hybrid environment, or in the cloud. ITAM/ITSM
sophos_adapter Sophos Endpoint Protection Sophos Endpoint Protection helps secure workstations by adding prevention, detection, and response technology on top of the operating system. EDR/EPP
mobi_control_adapter SOTI MobiControl SOTI MobiControl is a software system for managing mobile devices in the enterprise. MDM/EMM
spacewalk_adapter Spacewalk Spacewalk is an open-source systems management solution for system provisioning, patching and configuration. Config/Patch Mgmt
splunk_adapter Splunk Splunk captures, indexes, and correlates real-time data in a searchable repository. SIEM
symantec_cloud_workload_adapter Symantec Cloud Workload Protection (CWP) Symantec Cloud Workload Protection (CWP) automates security policy enforcement to protect public cloud workloads. Config/Patch Mgmt, EDR/EPP
symantec_ee_adapter Symantec Endpoint Encryption Symantec Endpoint Encryption combines full-disk and removable media encryption with centralized management to protect sensitive information and ensure regulatory compliance. Encryption
symantec_altiris_adapter Symantec Endpoint Management Suite Symantec Endpoint Management Suite (formerly Altiris) manages, patches, and remediates application and OS configurations on desktops, laptops and servers to strengthen endpoint security and maximize user productivity. ITAM/ITSM, Config/Patch Mgmt
symantec_adapter Symantec Endpoint Protection 12.x Symantec Endpoint Protection manages events, policies, and registration for the client computers that connect to customer networks. EDR/EPP
symantec_adapter Symantec Endpoint Protection 14.x Symantec Endpoint Protection manages events, policies, and registration for the client computers that connect to customer networks. EDR/EPP
symantec_sep_cloud_adapter Symantec Endpoint Protection Cloud Symantec Endpoint Protection Cloud unifies threat protection and device management for PC, Mac, mobile devices, and servers to protect endpoints from ransomware, zero-day threats, and other sophisticated attacks. EDR/EPP
sysaid_adapter SysAid SysAid is an integrated ITSM, Service Desk and Help Desk software solution. ITAM/ITSM, Ticketing
tanium_adapter Tanium Tanium discovers IT assets and gathers live endpoint data to help create an up-to-date inventory of hardware and software assets. ITAM/ITSM, Config/Patch Mgmt
nessus_adapter(1) Tenable Nessus Tenable Nessus is a vulnerability scanning platform for auditors and security analysts. VA Tool
nessus_adapter(1) Tenable Nessus CSV File Tenable Nessus CSV File Adapter imports device information from vulnerability scan data. VA Tool
tenable_io_adapter Tenable.io Tenable.io automatically discovers and assesses a customer's environment for vulnerabilities, misconfigurations, and other cybersecurity issues. VA Tool
tenable_security_center_adapter Tenable.sc (formerly SecurityCenter) Tenable.sc (formerly SecurityCenter) consolidates and evaluates vulnerability data, prioritizing security risks. VA Tool
office_scan_adapter Trend Micro Apex One Trend Micro Apex One (formerly OfficeScan) is an endpoint security solution protecting against malware, scripts, injection, ransomware, memory and browser attacks, and exploits. EDR/EPP
deep_security_adapter Trend Micro Deep Security Trend Micro Deep Security can automatically virtually patch server, cloud, VDI and application vulnerabilities. Config/Patch Mgmt, EDR/EPP
tripwire_enterprise_adapter Tripwire Enterprise Tripwire Enterprise is a security configuration management (SCM) suite that provides fully integrated solutions for policy, file integrity and remediation management. Config/Patch Mgmt, EDR/EPP
truefort_adapter TrueFort TrueFort offers application behavior analytics, control, and protection. AppSec
twistlock_adapter Twistlock Twistlock provides container and cloud native cybersecurity for teams using Docker, Kubernetes, serverless, and other cloud native technologies. Containers
unifi_adapter Ubiquiti Networks UniFi Controller The UniFi Controller is a wireless network management software solution for managing multiple wireless networks using a web browser. Networking
airwatch_adapter VMWare Airwatch VMWare AirWatch provides enterprise mobility management (EMM) software and standalone management systems for content, applications, and email. MDM/EMM
esx_adapter(1) VMWare ESXi VMware ESXi is an enterprise-class, type-1 hypervisor for deploying and serving virtual computers. Virtualization
webroot_adapter Webroot Endpoint Protection Webroot Endpoint Protection protects against threats across email, browsers, files, URLs, ads, apps, and more. EDR/EPP
zabbix_adapter Zabbix Zabbix is an open source monitoring software tool for networks, servers, virtual machines and cloud services. Cloud Mgmt
zscaler_adapter Zscaler Web Security Zscaler Web Security, part of the Zscaler Cloud Security Platform, is a secure Internet and web gateway delivered as a service, stops malware, advanced threats, phishing, browser exploits, malicious URLs, botnets, and more. EDR/EPP


Was this article helpful?