Overview
The Avalor (Zscaler) integration connects the Praetorian Guard Platform (PGP) with Avalor's security data fabric, now part of Zscaler. Avalor aggregates and normalizes security data across your entire stack — vulnerability scanners, endpoint tools, cloud platforms, and identity systems — and produces unified risk analytics and posture scores. By importing this consolidated data into PGP, you gain a single view of your security posture enriched with Avalor's cross-source risk correlation, without needing to configure each underlying tool individually.
This integration is designed for organizations that use Avalor as their central security data aggregation layer. Rather than duplicating integrations, PGP pulls the already-normalized asset inventory, risk scores, and posture findings from Avalor, combining them with PGP's continuous threat exposure management capabilities. The result is a more complete picture of your attack surface backed by Avalor's data fabric analytics.
What the Integration Does
When connected, PGP performs a read-only import from the Avalor API:
Assets: Avalor's unified asset inventory — servers, endpoints, cloud resources, applications, and identities — is imported into PGP as assets. Each asset includes normalized metadata aggregated from the underlying security tools feeding into Avalor.Risk Scores and Posture Data: Risk analytics produced by Avalor, including composite risk scores, coverage gaps, and posture assessments, are imported as risk metadata attached to the corresponding PGP assets.Security Findings: Vulnerability and misconfiguration findings that Avalor has correlated across multiple data sources are imported into PGP, providing deduplicated and enriched risk context.Data flows one direction only — from Avalor into PGP. The integration never writes back to Avalor or modifies any data in the Avalor platform.
Prerequisites
Before setting up the integration, you need Avalor API credentials:
Log in to the [Avalor platform](https://app.avalor.io) (or your Zscaler-provisioned Avalor instance)Navigate to Settings > API AccessClick Generate API KeyRecord the following values:API Key: The generated key for authenticating API requestsAvalor Instance URL: Your Avalor tenant URL (e.g., https://your-org.avalor.io)Ensure the API key has read-only permissions to asset and risk dataThe API key must have sufficient scope to read assets, findings, and risk scores from your Avalor tenant.
Setup
Go to Integrations, then Security Analytics, then Avalor (Zscaler) in the Guard PlatformEnter your Avalor API credentials in the setup formClick Connect — PGP will validate your credentials by attempting to fetch asset data before savingIf validation fails, verify that your API key has the correct read permissions and that the instance URL matches your Avalor tenant.
What Data Is Synced
Assets
Avalor's unified asset inventory is imported with:
Asset name: Derived from the asset identifier in Avalor (hostname, IP, cloud resource ID)Asset type: Mapped from Avalor's asset classification (server, endpoint, cloud resource, application)Metadata: Source tools, risk score, coverage status, last seen timestamp, and business context tagsRisk Analytics
Risk posture data from Avalor is attached to corresponding assets:
Security Findings
Deduplicated findings from Avalor are imported as risks:
Finding name: Vulnerability or misconfiguration title from AvalorSeverity: Mapped from Avalor's normalized severity (critical, high, medium, low)Source tools: List of underlying tools that contributed to the findingAffected asset: Linked to the corresponding PGP assetAPI Endpoints Used
Base URL: Your Avalor instance URL (e.g., https://your-org.avalor.io)
All requests are authenticated using the API key passed in the request header over HTTPS.
Troubleshooting
Security and Data Handling
Read-only access: The integration only reads data from Avalor. It never creates, modifies, or deletes assets, findings, or configurations in the Avalor platform.Credential handling: Your API key is stored as an encrypted credential within PGP and is never exposed in logs or the UI after initial entry.Authentication: The API key is transmitted over HTTPS in request headers for every API call.Data filtering: Imported assets and findings pass through PGP standard filtering rules, allowing you to control which data is included in your attack surface.