Integrations
Overview of the Integrations page and the integration categories available in the Praetorian Guard Platform
Overview
The Integrations page is your central hub for connecting external security tools, cloud providers, and services with the Praetorian Guard Platform (PGP). By integrating your existing technology stack, you can consolidate security data, automate workflows, and gain comprehensive visibility across your entire attack surface — all from a single platform.
When you navigate to the Integrations page, you'll find the Add Integrations view, which presents a collection of integration cards organized by category. Each card displays the service's logo and name, making it easy to locate and configure the integration you need.
Why Integrate?
Connecting your tools and services to PGP allows you to:
Achieve comprehensive visibility — Combine data from multiple security tools to build a complete picture of your security posture.
Automate asset discovery — Automatically import assets from cloud providers, identity platforms, and security tools instead of manually tracking them.
Enrich vulnerability context — Correlate findings from scanners, EDR solutions, and threat intelligence feeds to prioritize what matters most.
Streamline workflows — Push alerts, tickets, and findings to the platforms your team already uses.
Reduce manual effort — Eliminate the need to collect and correlate data across disconnected tools.
Integration Categories
PGP supports integrations across a wide range of security and IT categories. Below is an overview of each category available on the Integrations page.
Application Security Posture Management
Platforms that provide visibility into application-level security risks by correlating data from code, cloud, and runtime environments to help prioritize remediation efforts.
Application Security Testing
Dynamic application security testing (DAST) tools that scan running web applications to identify vulnerabilities such as injection flaws, authentication issues, and misconfigurations.
Breach Attack Simulation
Tools that simulate real-world cyber attacks against your environment to validate the effectiveness of your security controls and identify gaps in your defenses.
Bug Bounty
Platforms that manage bug bounty programs, allowing you to import externally reported vulnerabilities and track them alongside your other security findings.
Cloud Service Providers
Direct integrations with major cloud computing platforms — including AWS, Azure, GCP, and Digital Ocean — that allow Guard to discover and monitor cloud-hosted resources across your accounts and subscriptions.
Cloud Security Posture Management
Solutions that continuously monitor your cloud infrastructure to identify security risks, compliance violations, and misconfigurations across cloud environments.
Content Delivery Solutions
Integrations with CDN providers that allow Guard to discover and monitor assets distributed through content delivery networks.
Cyber Asset Attack Surface Management
Platforms that help organizations discover, inventory, and manage their digital assets and external attack surface. These integrations enrich Guard's asset data with additional context from specialized discovery tools.
Endpoint Detection and Response
EDR solutions that provide endpoint-level visibility into devices, threats, and security events across your organization's managed endpoints.
Firewalls
Integrations with web application firewalls (WAFs) and network firewalls that allow Guard to discover assets protected behind these services and incorporate firewall context into your security posture.
Identity and Access Management
Identity provider integrations that allow Guard to discover users, connected applications, and directory resources managed through your IAM platform.
IT Service Management
Ticketing and service management platforms that enable you to create and track remediation tickets directly from Guard, integrating vulnerability management into your existing ITSM workflows.
Knowledge Bases
Platforms that store organizational knowledge and documentation. PGP scans these platforms for exposed secrets and sensitive information that may have been inadvertently published.
Managed Detection and Response
MDR services and endpoint management platforms that provide continuous threat monitoring and detection capabilities. These integrations allow Guard to incorporate detection and device management data into your attack surface view.
Managed DNS Providers
Integrations with DNS hosting providers that allow Guard to enumerate all zones and records within your DNS infrastructure for thorough domain discovery.
Passive DNS Providers
Services that collect and analyze historical DNS resolution data. These integrations enhance Guard's ability to discover subdomains and track changes in your DNS footprint over time.
Secure Code Scanning
Static application security testing (SAST) tools that analyze source code for vulnerabilities, coding errors, and security weaknesses before applications are deployed.
Security Information and Event Management
SIEM platforms that aggregate and analyze security event data. These integrations allow you to forward Guard findings into your centralized security monitoring workflows.
Source Code Managers
Integrations with code repository platforms that allow Guard to discover and monitor your organization's repositories as part of your attack surface.
Threat Intelligence
Threat intelligence platforms that provide enriched context about threats, indicators of compromise, and adversary tactics to support security investigations and proactive defense.
Vulnerability Management
Integrations with vulnerability scanning and management platforms that allow you to import scan results into Guard, consolidating findings from multiple scanners into a unified view.
Configuring an Integration
The setup process follows a consistent pattern across all integrations. Click on an integration card to open its configuration interface, which will present you with the specific fields required for that service — typically API keys, authentication credentials, or account identifiers. Most integrations can be configured in just a few steps.
For detailed setup instructions and information about what each integration does, refer to the dedicated Integrations section of the documentation, which provides service-specific guides for every supported integration.
Support
If you have questions about setting up or managing integrations, reach out to our support team at support@praetorian.com.