CYE Integrations

Enhance your cyber risk management by easily connecting Hyver to tools you already use.

BOOK A DEMO
icon

Track and Manage Findings Across Multiple Tools

Gain a comprehensive understanding of your security landscape, allowing for swift responses to threats and vulnerabilities.

icon

Streamline and Coordinate Mitigation Efforts

Integrate with your organizational systems to manage and enhance remediation planning effectively across teams.

icon

Gain Immediate and Comprehensive Visibility

Receive a consolidated view of all data from your integrated tools, enabling more informed decision-making and risk evaluation.

Explore CYE Integrations

Smoothly integrate with all your existing controls for maximum impact.

Cloud

Defender
for Cloud
Microsoft
Wiz
Wiz
Azure
Azure
AWS
AWS

Vulnerability Management

VMDR
Qualys
Vulnerability
Management
Tenable
InsightVM
Rapid7
Coming Soon
Falcon Exposure
Management
CrowdStrike

Endpoint Security

Defender
for Endpoint
Microsoft
Coming Soon
SentinelOne
SentinelOne
Coming Soon
Falcon
CrowdStrike

Workflow

Jira
Atlassian
ServiceNow
ServiceNow

Identity Management

Active Directory
Microsoft

Cyber Awareness

KMSAT
KnowBe4
CISO, Fortune 100 Company

Hyver has transformed our approach by providing continuous asset tracking and surveillance. We now receive daily actionable intelligence for IT operations and risk assessment.”

Frequently Asked Questions

How often is the data updated in Hyver?

Data is updated automatically daily.

Does the solution require agents for the integrations to work?

No agents are required for SaaS product integrations. For on-prem products, lightweight installation is required. Detailed instructions for the on-prem connectors are available in the Hyver Knowledge Base.

Will the findings ingested from integrated security tools appear on the attack graph?

No, the findings ingested from integrated security tools will not appear on the attack graph. However, they will still contribute to the overall exposure value and impact both maturity and exposure levels on the platform.

Which permissions are required to integrate my security tools?

Permissions are read-only and tool specific. While this is an API-based, non-intrusive integration with no data being changed, some tools (such as AWS and Azure) may require multiple roles or specific configurations to retrieve API data successfully. For detailed information on permissions per integration, please refer to the Knowledge Base.

What if my security tool does not have a dedicated integration?

Use the Import Finding capability to import your findings and vulnerabilities into Hyver. In parallel, you can submit a feature request for the missing integration by contacting CYE support. 

Ready to See Hyver in Action?

BOOK A DEMO