kate-gibson
VMware Carbon Black Endpoint
Last Updated: August 13, 2024What is VMware Carbon Black Endpoint? VMware Carbon Black Endpoint is a next-generation antivirus (NGAV) and behavioral endpoint detection and response (EDR) solution that protects against the full spectrum of modern cyber-attacks. VMware Carbon Black Cloud includes a universal agent and a console. Why Should You Use the VMware Carbon Black Endpoint Connector? The VMware...
VMware Carbon Black Cloud Workload
Last Updated: August 13, 2024What is VMware Carbon Black Cloud Workload? VMware Carbon Black Cloud Workload (formerly Carbon Black Cloud Workload) is a data center security product that protects your workloads running in a virtualized environment. Why Should You Use the VMware Carbon Black Cloud Workload Connector? The VMware Carbon Black Cloud Workload connector provides visibility into the assets...
VMware Carbon Black Cloud Audit and Remediation
Last Updated: June 29, 2024VMware Carbon Black Cloud Audit and Remediation (formerly VMware CB LiveOps) combines query and response, next-generation antivirus, endpoint detection and response, and managed threat hunting services, in real-time, within a single console and from a single agent. Parameters URL (required): The URL of the VMware Carbon Black Cloud Audit and Remediation API Organization Key (required): The organization...
Vercara UltraDNS
Last Updated: July 17, 2024Vercara UltraDNS (formerly Neustar UltraDNS) is a cloud-based authoritative DNS service that includes fault-tolerant globally redundant architecture, full primary, secondary, and hidden master support, advanced traffic management, advanced reporting, and security features like DNSSEC protection, two-factor authentication, access control lists, audit logs, and a TLS protected portal. Parameters URL (required): The URL of the Vercara UltraDNS...
Venafi Trust Protection Platform
Last Updated: June 29, 2024Venafi Trust Protection Platform is an enterprise key and certificate management solution that secures and protects encryption assets across diverse operating systems and infrastructure environments. Within these environments, Venafi Trust Protection Platform centralizes the management of authentication and encryption technologies across server-side platforms, desktops, laptops, applications, and appliances where vital data resides and is transmitted....
Veeam Backup & Replication
Last Updated: July 13, 2024Veeam Backup & Replication is a comprehensive data protection and disaster recovery solution. Veeam Backup & Replication creates image-level backups of virtual, physical, and cloud machines and restores from them. Veeam Backup & Replication technology optimizes data transfer and resource consumption and provides a centralized console for administering backup, restore, and replication operations. Parameters Host (required): The hostname or IP address of the Veeam server...
Vectra AI
Last Updated: June 29, 2024The Vectra AI Platform provides hybrid attack-surface visibility across identity, public cloud, SaaS, data center networks, and endpoints via Extended Detection and Response (XDR) integration. With patented AI-driven Attack Signal Intelligence, the Vectra AI Platform prioritizes real attacks in real-time with integrated, automated, and co-managed responses. Configuring the Connector for Vectra AI To configure Lucidum...
Using Connectors
Last Updated: December 16, 2025Connectors allow Lucidum to ingest data from your environment and discover, identify, and classify assets, data, and users. Lucidum includes pre-built connectors for the most commonly used solutions for security, vulnerability scanning, cloud, data warehouse, identity management, logs, network, endpoint management, IP management, file sharing, and devops. Profiles To configure a connector, you provide credentials...
Uptycs
Last Updated: June 29, 2024What is Uptycs? Uptycs is a cloud security platform for large hybrid cloud environments. Uptycs protects workloads on servers, laptops, containers, and cloud while extending security visibility from development to runtime. Why Should You Use the Uptycs Connector? The Uptycs connector provides visibility into the assets in your environment. You can use this visibility to:...
UpGuard Vendor Risk
Last Updated: June 29, 2024UpGuard Vendor Risk (formerly UpGuard CyberRisk) is a vendor risk management software that discovers cyber risks from third-party vendors, prevents third-party data breaches, and complies with regulations. UpGuard Vendor Risk combines security ratings, security questionnaires, data leak detection, security profiles, and risk assessment workflows to provide a complete view of your vendors’ security posture. Parameters...