ADT-4 Pro Model Release:The definitive threat intelligence for the AI eraRead the research paper
Integrations

Works with the
stack you already run.

PulseADT connects to your existing SIEM, cloud, identity, endpoint, and ticketing tools. No rip-and-replace. Autonomous defense added on top of what you have.

30+
Integrations available
8
Categories
REST API
Custom integrations via API
Webhooks
Real-time event delivery
Integration Directory

Find your tools.

Available Now - 26
SplunkAvailable

Forward enriched threat events and actuation records to Splunk for unified log management and long-term retention.

Request access
Microsoft SentinelAvailable

Ingest PulseADT hypothesis-chain alerts directly into Sentinel workspaces. Bidirectional incident sync supported.

Request access
IBM QRadarAvailable

Ship normalised CEF events from PulseADT to QRadar for correlation with existing security analytics.

Request access
Palo Alto XSOARAvailable

Trigger PulseADT autonomous actions from XSOAR playbooks or receive containment confirmations as SOAR incidents.

Request access
Amazon Web ServicesAvailable

Native monitoring of EC2, Lambda, EKS, IAM, S3, CloudTrail, VPC flow logs, and GuardDuty findings.

Request access
Microsoft AzureAvailable

Full coverage of Azure AD, Defender for Cloud, VMs, AKS, Key Vault, and Activity Logs.

Request access
Google Cloud PlatformAvailable

Ingest from Cloud Audit Logs, GKE, Cloud Armor, IAM, and Security Command Center.

Request access
CloudflareAvailable

Receive edge threat signals from Cloudflare WAF, DDoS events, and Zero Trust access logs.

Request access
OktaAvailable

Correlate Okta authentication events with endpoint and cloud signals to detect account compromise chains.

Request access
Microsoft Entra IDAvailable

Monitor conditional access, role assignments, MFA bypass attempts, and service principal anomalies.

Request access
Google WorkspaceAvailable

Ingest login, admin activity, and Drive access events for insider threat and BEC detection.

Request access
CyberArkAvailable

Correlate privileged session recordings and vault access events with PulseADT threat chains.

Request access
CrowdStrike FalconAvailable

Ingest Falcon detection events and process telemetry into PulseADT hypothesis chains for full kill-chain correlation.

Request access
Microsoft DefenderAvailable

Receive Defender for Endpoint alerts and enrich with PulseADT identity and cloud context.

Request access
SentinelOneAvailable

Pull SentinelOne threat events into PulseADT for multi-domain correlation and autonomous response.

Request access
PagerDutyAvailable

Route high-severity PulseADT threat confirmations directly to PagerDuty on-call schedules.

Request access
Jira Service ManagementAvailable

Auto-create Jira incidents with full hypothesis-chain context and actuation audit trail on confirmed threats.

Request access
ServiceNowAvailable

Push enriched incident records to ServiceNow ITSM workflows with evidence attachments.

Request access
SlackAvailable

Deliver real-time threat notifications, containment confirmations, and analyst briefings to Slack channels.

Request access
Microsoft TeamsAvailable

Post threat alerts and response summaries to Teams channels with full context and one-click drill-down.

Request access
DatadogAvailable

Export PulseADT metrics and threat event timelines to Datadog for unified observability and dashboarding.

Request access
Elastic StackAvailable

Stream structured threat event data to Elasticsearch for custom SIEM and threat hunting workflows.

Request access
SupabaseAvailable

Native integration for real-time event delivery to Supabase-backed applications and alerting pipelines.

Request access
Amazon S3Available

Archive evidence logs, audit trails, and actuation records to S3 for long-term compliance storage.

Request access
DrataAvailable

Map PulseADT control evidence directly to Drata SOC 2, ISO 27001, and GDPR frameworks automatically.

Request access
VantaAvailable

Push continuous compliance evidence from PulseADT actuation logs into Vanta for automated control monitoring.

Request access
Coming Soon - 7
Chronicle SIEMSoon

Export ADT intelligence feeds and evidence logs to Google Chronicle for threat hunting and compliance analysis.

Vercel / Netlify EdgeSoon

Monitor edge function execution anomalies and deploy-triggered access pattern changes.

JumpCloudSoon

Unified directory and device telemetry from JumpCloud correlated against identity anomalies.

Carbon BlackSoon

Stream endpoint behavioural data from CB into PulseADT signal intelligence layer.

OpsgenieSoon

Send alert notifications and containment confirmations to Opsgenie teams and schedules.

TelegramSoon

Mobile-first alert delivery for security teams using Telegram for operations communication.

SecureframeSoon

Evidence collection feeds from PulseADT into Secureframe compliance workflows.

Build Your Own

Not on the list?
Use the API.

PulseADT exposes a full REST API and webhook system. If your tool is not listed, connect it directly. Every threat event, actuation record, and evidence artifact is available via API in real time.

Example: Receive a threat event via webhook
POST https://your-endpoint.com/pulseadt

{
  "event": "threat.contained",
  "severity": "CRITICAL",
  "asset": "prod-api-server-12",
  "threat_chain": [
    "Credential stuffing detected",
    "Privilege escalation attempt",
    "Lateral movement blocked"
  ],
  "action_taken": "session_terminated",
  "contained_at": "2026-03-09T14:22:01Z",
  "evidence_id": "evt_8k2mNpQx"
}
Get Started

Plug in. Protect everything.

Start your trial and connect your first integration in under 15 minutes.