List of Filigran Integrations
This is a list of platforms and tools that integrate with Filigran. This list is updated as of March 2026.
-
1
Silobreaker
Silobreaker
Empower your decisions with actionable insights from everywhere.Silobreaker equips professionals in the fields of security, business, and intelligence with the tools needed to effectively sift through the immense volume of online data. By taking a proactive approach to intelligence gathering, organizations are better positioned to identify the threats and opportunities they face on a daily basis. Our cloud-based platform synthesizes actionable insights from more than a million online sources, providing users with vital information whenever and wherever it is needed. It acts as an all-encompassing solution that integrates the entire workflow into a single, user-friendly application. This platform encompasses everything from data collection and aggregation to analysis, report generation, and sharing of intelligence. Moreover, the return on investment demonstrates significant value and cost savings when stacked against multiple product purchases, offerings from the same provider, or any 'pay-as-you-go' service options. In a rapidly evolving digital landscape, Silobreaker emerges as an indispensable resource for making informed decisions, ensuring users remain ahead of the curve. Ultimately, leveraging such a tool can profoundly enhance strategic planning and operational effectiveness. -
2
GreyNoise
GreyNoise
Empowering analysts to focus on real cyber threats.We examine, categorize, and scrutinize data from IP addresses that probe the internet, inundating security tools with unnecessary information. This distinctive viewpoint enables analysts to minimize their attention on benign or irrelevant behaviors, allowing them to concentrate more on emerging threats and targeted actions. GreyNoise empowers analysts to pinpoint events that do not warrant their focus. The indicators provided by GreyNoise are typically linked to opportunistic scanning of the web or standard business services, rather than to specific, targeted threats. This contextual information helps analysts prioritize their efforts on critical issues. There is a possibility that your device has been compromised due to such scanning activities on the internet. GreyNoise notifies analysts whenever an IP address appears in our database, facilitating a swift response from security teams to any potential breaches. Additionally, the GreyNoise Query Language (GNQL) equips security teams with the ability to search for patterns of malicious activity throughout the internet. Our tagging system identifies IPs that are actively seeking and exploiting vulnerabilities. By doing so, security teams are able to track the evolution of threat activity, thereby assessing their level of exposure more effectively. With the insights gained from GreyNoise, organizations can enhance their security posture and respond more adeptly to the ever-changing landscape of cyber threats. -
3
Intel 471 TITAN
Intel 471
Empower your security with real-time, actionable intelligence solutions.Cybercriminals remain constantly active, underscoring the necessity for ongoing threat intelligence to anticipate and track their strategies against your organization. Clients place their confidence in TITAN, a highly accessible intelligence software-as-a-service platform crafted by specialists in intelligence and security for their peers in the industry. This platform delivers organized information, customizable dashboards, prompt alerts, and comprehensive intelligence reports that can be accessed via both a web portal and API integration. Beyond its core features, TITAN offers advanced capabilities. By leveraging TITAN's programmable RESTful API, users can develop an array of connectors and integrations, allowing for the seamless integration of personalized intelligence into their security operations. With consistently updated structured technical and non-technical data sourced from our global team and automated systems, TITAN guarantees that users benefit from high-quality intelligence with minimal irrelevant information. Consequently, your team can focus on tackling the most urgent threats while remaining ahead of potential attacks. Additionally, TITAN not only streamlines security processes but also fosters a proactive approach to threat management, ultimately enabling organizations to significantly strengthen their defenses in a rapidly changing cyber threat landscape. -
4
Sekoia.io
Sekoia.io
Revolutionize cybersecurity with intelligent automation and insights.Sekoia.io presents a revolutionary take on traditional cybersecurity practices. By utilizing insights into the behavior of attackers, this platform significantly improves the automation of threat detection and response mechanisms. As a result, cybersecurity teams are better equipped to defend against potential breaches. With the Sekoia.io Security Operations Center (SOC) platform, users can promptly identify cyber threats, minimize their impact, and protect their information systems in real-time and from multiple perspectives. The combination of attacker intelligence and automation in Sekoia.io facilitates quicker identification, understanding, and neutralization of attacks, allowing teams to redirect their focus toward more strategic objectives. Additionally, Sekoia.io streamlines security management across diverse environments, offering detection capabilities that do not rely on prior system knowledge, which simplifies operations and enhances the overall security stance. This holistic approach not only lessens complexity but also significantly strengthens resilience against the ever-changing landscape of cyber threats. Ultimately, Sekoia.io empowers organizations to stay one step ahead in the ongoing battle against cybersecurity risks. -
5
HarfangLab
HarfangLab
Empower your cybersecurity with adaptive threat detection solutions.Recognize files classified as harmful through specific signatures identified by researchers, publishers, and our Cyber Threat Intelligence (CTI) team. Establish detection alerts for Indicators of Compromise (IOCs) associated with recognized threats while enhancing them with custom IOCs to tailor the Endpoint Detection and Response (EDR) system to your unique environment. Our research and development team continuously improves its algorithms, enabling you to detect binaries that are typically regarded as undetectable. Leverage over 1,200 detection rules to identify potential new threats that may not be captured in current IOCs or signature databases. A dedicated engine has been developed to efficiently combat ransomware, while also safeguarding your EDR system from unauthorized changes, thereby ensuring its proper functionality. In addition, it blocks the download and installation of harmful or outdated drivers using our frequently updated list. If any malicious driver attempts to compromise your EDR's monitoring and protective features, you will be promptly notified to take necessary actions. This proactive strategy not only fortifies defense mechanisms but also adapts to the continuously changing landscape of cyber threats, ensuring your security remains resilient and effective. Furthermore, maintaining vigilance and employing these advanced tools will significantly strengthen your overall cybersecurity posture. -
6
Intrinsic
Decoy Technologies
Empower your platform with advanced moderation and security solutions.Create tailored policies that go beyond standard abuse definitions and execute them promptly. Intrinsic acts as a platform that develops AI agents dedicated to building user confidence by seamlessly integrating into existing workflows while progressively enhancing human oversight through secure automation. Optimize the content moderation process for text, images, videos, and reports with a system that perpetually improves its efficacy after each moderation action. Effectively manage review queues and escalation pathways with the help of comprehensive Role-Based Access Control (RBAC) permissions. Leverage insights from performance analytics and thorough monitoring across the platform to guide informed, data-driven strategies. Take advantage of advanced security measures, AI-driven analytics, and robust information governance to ensure your operations are both strong and compliant with regulations. By utilizing these innovative tools, organizations can uphold exceptional levels of user engagement and safety while adapting to evolving challenges. -
7
Cortex XSOAR
Palo Alto Networks
Revolutionize security operations with seamless automation and intelligence.Transform, streamline, and innovate your security operations with the leading platform for security orchestration, automation, and response, which includes integrated threat intelligence management and a built-in marketplace. Elevate your security processes through scalable automation designed for various scenarios, achieving a remarkable reduction of up to 95% in alerts requiring human oversight. Cortex XSOAR collects alerts from multiple sources and utilizes automated workflows and playbooks to enhance incident response efficiency. Its case management capabilities ensure a uniform approach to high-volume attacks while empowering your teams to effectively tackle intricate and isolated threats. The playbooks offered by Cortex XSOAR are further enhanced with real-time collaboration tools, enabling security teams to swiftly adjust and react to new threats. Additionally, Cortex XSOAR presents an innovative approach to handling threat intelligence that combines aggregation, scoring, and sharing with proven playbook-driven automation, making certain that your security practices are both effective and efficient. With these sophisticated features at their disposal, organizations can significantly strengthen their security posture and respond to threats with improved speed and precision, ultimately fostering a more resilient operational environment. This comprehensive solution not only optimizes threat management but also ensures that security teams are equipped to meet the challenges posed by an ever-evolving threat landscape. -
8
Cuckoo Sandbox
Cuckoo
Uncover malware behavior, enhance cybersecurity with automated analysis.You can submit any suspicious file to Cuckoo, and within a short period, it will produce an in-depth report that outlines the file's behavior when executed in a realistic yet secure setting. Malware is a flexible instrument for cybercriminals and various adversaries that threaten your business or organization. In our fast-evolving digital environment, merely identifying and removing malware is not enough; it is essential to understand how these threats operate to fully grasp the context, motives, and goals behind a security breach. Cuckoo Sandbox is an open-source software framework that automates the assessment of malicious files across various platforms, including Windows, macOS, Linux, and Android. This advanced and highly customizable system provides countless opportunities for automated malware analysis. You can examine a wide range of harmful files, such as executables, office documents, PDFs, and emails, as well as malicious websites, all within virtualized environments designed for different operating systems. By comprehending the workings of these threats, organizations can significantly bolster their cybersecurity strategies and better defend against potential attacks. Ultimately, investing in such analysis tools can lead to a more secure digital infrastructure for your organization. -
9
ChapsVision CrossinG
ChapsVision
Securely manage data flows with unparalleled protection and speed.CrossinG® by ChapsVision facilitates the management of data flows, ensuring that interactions between two information systems maintain confidentiality and integrity, all while adhering to strict separations between networks that possess different sensitivity levels. Its advanced partitioning and content analysis features significantly reduce the risk of attacks traversing networks, inhibit the entry of harmful content, and protect against potential data leaks. As a comprehensive, multifunctional appliance, CrossinG® by ChapsVision boasts impressive transfer speeds, intuitive user operation, and guarantees compliance with essential regulations. This product is particularly well-suited for safeguarding critical networks that demand more protection than a conventional firewall can offer. Furthermore, it checks the integrity of incoming files, ensuring that the network is continuously protected from malicious threats. Organizations utilizing CrossinG® can manage their data exchanges with confidence, upholding the highest standards of security and reliability. With its multifaceted capabilities, CrossinG® stands out as an essential tool for modern data protection needs. -
10
Cybersixgill
Cybersixgill
Elevate your cybersecurity with unparalleled underground threat intelligence.Empower your teams to improve their skills in detecting phishing attacks, data compromises, and fraudulent actions more efficiently. By elevating your vulnerability evaluations, refining your incident response strategies, and enhancing brand protection, you gain exclusive access to a remarkable and fully automated collection derived from the deep and dark web, encompassing closed forums, instant messaging services, paste sites, and other vital resources. This exceptional threat intelligence facilitates the development of unique products, all powered by advanced data collection techniques and innovative approaches. The architecture of these solutions is designed to offer substantial business and technological benefits for leaders and their security teams. Unlock the capacity for advanced cybersecurity by leveraging the most extensive underground threat intelligence feed of indicators of compromise (IOCs). By integrating Darkfeed intelligence into your security framework, you can optimize the productivity of your analysts with a continuous influx of harmful hashes, URLs, domains, and IP addresses, ensuring you remain proactive against potential threats before they can affect your organization. This level of anticipatory intelligence guarantees that your security measures are fortified like never before, creating a robust defense against evolving cyber threats. Ultimately, your organization will be better equipped to handle the complexities of the cyber landscape.