kate-gibson

718 Docs

Addigy

Last Updated: September 11, 2025

Addigy is a cloud-based, multi-tenant mobile device management solution that manages macOS, iOS, iPadOS, and iOS devices. Configuring the Addigy Connector Log in to Lucidum. In the left pane, click Connector. In the Connector page, click Add Connector. Scroll until you find the Connector you want to configure. Click Connect. The Settings page appears. In the Settings page, enter the following: URL. The URL...

Adaptive Shield

Last Updated: July 9, 2024

Adaptive Shield is a SaaS Security Posture Management (SSPM) platform that identifies SaaS misconfigurations and provides visibility to all SaaS apps and devices connected to your core SaaS stack. Configuring the Connector for Adaptive Shield To configure Lucidum to ingest data from Adaptive Shield: Log in to Lucidum. In the left pane, click Connector. In the Connector page,...

Absolute

Last Updated: July 17, 2024

What is Absolute? The Absolute platform is a cloud-based Endpoint Visibility and Control solution that allows you to see all your devices and applications, secure your data, and prove compliance. Why Should You Use the Absolute Connector? The Absolute connector provides visibility into the assets in your environment. You can use this visibility to: ensure...

Abnormal Security

Last Updated: July 18, 2024

What is Abnormal Security? Abnormal provides cloud-native, AI-powered protection against email attacks including phishing, malware, ransomware, social engineering, executive impersonation, supply chain compromise, internal account compromise, spam, and graymail. Why Should You Use the Abnormal Security Connector? The Abnormal Security connector provides visibility into the threats and assets in your environment. You can use this...

1E Tachyon

Last Updated: July 18, 2024

What is 1E Tachyon? Tachyon is a systems management tool that allows you to investigate, remediate issues, and manage operations across all your endpoints in real time. Why Should You Use the 1E Tachyon Connector? The 1E Tachyon connector provides visibility into the assets in your environment. You can use this visibility to: ensure assets...

VMware vRealize

Last Updated: July 17, 2024

What is VMware vRealize Suite? VMware vRealize Suite and vCloud Suite deliver a self-service consumption layer, an automation framework, and self-driving Day 2 operations for VMware Cloud and beyond. Why Should You Use the VMware vRealize Suite Connector? The VMware vRealize Suite connector provides visibility into the assets in your environment. You can use this...

VMware vRealize Automation SaltStack Config

Last Updated: July 9, 2024

VMware vRealize Automation SaltStack Config is an automated configuration management platform that provisions, configures, deploys, manages, and monitors nodes to ensure that the nodes are operating in a consistent, desired state. SaltStack Config uses automation to manages environments at any scale. Parameters URL (required): The URL of the vRealize Automation SaltStack Config API, for example, https://saltstack.company.com....

Vulcan Cyber

Last Updated: July 9, 2024

Vulcan Cyber manages the full vulnerability risk lifecycle for all IT assets and cyber surfaces including application, cloud, and traditional infrastructure environments. Vulcan Cyber analyzes, contextualizes, prioritizes, and manages all vulnerability and risk data while efficiently orchestrating remediation campaigns. Creating an API Token for Vulcan Cyber Before configuring the Vulcan Cyber connector in Lucidum, you...

Wasp AssetCloud

Last Updated: June 29, 2024

Wasp AssetCloud delivers full life-cycle asset management, streamlined auditing, and loss prevention. Configuring the Connector for AssetCloud To configure Lucidum to ingest data from AssetCloud: Log in to Lucidum. In the left pane, click Connector. In the Connector page, click Add Connector. Scroll until you find the Connector you want to configure. Click Connect. The Settings page appears. In the Settings page, enter the...

Wazuh

Last Updated: June 29, 2024

What is Wazuh Security Monitoring Solution? Wazuh Security Monitoring Solution includes an endpoint security agent (provides XDR capabilities) that is deployed to the monitored systems and a server that collects and analyzes data gathered by the agents (provides SIEM capabilities). Why Should You Use the Wazuh Security Monitoring Solution Connector? The Wazuh Security Monitoring Solution...