9 Integrations with Mandiant Managed Defense

View a list of Mandiant Managed Defense integrations and software that integrates with Mandiant Managed Defense below. Compare the best Mandiant Managed Defense integrations as well as features, ratings, user reviews, and pricing of software that integrates with Mandiant Managed Defense. Here are the current Mandiant Managed Defense integrations in 2026:

  • 1
    Google Cloud Platform
    Google Cloud is a cloud-based service that allows you to create anything from simple websites to complex applications for businesses of all sizes. New customers get $300 in free credits to run, test, and deploy workloads. All customers can use 25+ products for free, up to monthly usage limits. Use Google's core infrastructure, data analytics & machine learning. Secure and fully featured for all enterprises. Tap into big data to find answers faster and build better products. Grow from prototype to production to planet-scale, without having to think about capacity, reliability or performance. From virtual machines with proven price/performance advantages to a fully managed app development platform. Scalable, resilient, high performance object storage and databases for your applications. State-of-the-art software-defined networking products on Google’s private fiber network. Fully managed data warehousing, batch and stream processing, data exploration, Hadoop/Spark, and messaging.
    Leader badge
    Starting Price: Free ($300 in free credits)
    View Software
    Visit Website
  • 2
    Amazon Web Services (AWS)
    Amazon Web Services (AWS) is the world’s most comprehensive cloud platform, trusted by millions of customers across industries. From startups to global enterprises and government agencies, AWS provides on-demand solutions for compute, storage, networking, AI, analytics, and more. The platform empowers organizations to innovate faster, reduce costs, and scale globally with unmatched flexibility and reliability. With services like Amazon EC2 for compute, Amazon S3 for storage, SageMaker for AI/ML, and CloudFront for content delivery, AWS covers nearly every business and technical need. Its global infrastructure spans 120 availability zones across 38 regions, ensuring resilience, compliance, and security. Backed by the largest community of customers, partners, and developers, AWS continues to lead the cloud industry in innovation and operational expertise.
  • 3
    Forescout

    Forescout

    Forescout Technologies

    Forescout is a comprehensive cybersecurity platform that offers real-time visibility, control, and automation for managing risks across devices and networks. Its solutions enable organizations to monitor and secure a broad range of IT, IoT, and operational technology (OT) assets, providing proactive protection against cyber threats. With Forescout's Zero Trust framework and integrated threat detection capabilities, businesses can enforce device compliance, secure network access, and continuously monitor for vulnerabilities. Designed for scalability, Forescout's platform provides insights that empower businesses to mitigate risks and enhance their security posture across various industries, from healthcare to manufacturing.
  • 4
    Microsoft Cloud App Security
    Elevate your security posture by taking control of your cloud environment. Identify and combat cyberthreats across all your cloud services with Microsoft Cloud App Security, a cloud access security broker (CASB) that provides multifunction visibility, control over data travel, and sophisticated analytics. Streamline your cloud access security. Manage, control, and audit apps and resources with Cloud App Security. Discover your shadow IT, understand your digital information estate, and control it to your advantage. Use real-time controls to enable threat protection on all the access points that touch your environment. Gain visibility into your cloud apps and services leveraging sophisticated analytics to identify and combat cyberthreats. Control how your data is consumed, no matter where it lives. Identify cloud apps and services used by your organization. Detect unusual behavior across cloud apps to identify ransomware, compromised users, or rogue applications.
    Starting Price: $14.80 per user per month
  • 5
    Gigamon

    Gigamon

    Gigamon

    Fuel Your Digital Transformation Journey. Manage complex digital apps on your network with unparalleled depth and breadth of intelligence. Managing your network daily to ensure constant availability is daunting. Networks are getting faster, data volumes are growing and users and apps are everywhere, which makes monitoring and managing difficult. How are you supposed to drive Digital Transformation? What if you could ensure network uptime while gaining visibility into your data-in-motion across physical, virtual and cloud environments? Gain visibility across all networks, tiers and applications — while getting intelligence across your complex structures of applications. Gigamon solutions can radically improve the effectiveness of your entire network ecosystem. Ready to learn how?
  • 6
    CloudStorm

    CloudStorm

    Keysight Technologies

    Massive concerns around security are driving an increased use of encryption. An all-encrypted world is not far away. At the same time, the scale of traffic continues to grow at an exponential rate and the industry is moving to new cloud-based architectures. Users of services and applications, however, continue to expect their experience to be at or above the current level. To keep pace, network equipment manufacturers race to build higher-scale, more capable network security and application delivery solutions. In turn, the world’s largest cloud data center operators struggle to find the right balance between performance and security in today’s hyper-scale, dynamic world. The uncertainty that comes with this change is best mitigated through cloud-scale validation.
  • 7
    Polarity

    Polarity

    Polarity

    Polarity is a free-floating overlay that automatically searches unlimited sources in parallel to speed up analysis by enriching every tool and workflow. It allows users to add and enrich any information so they and their entire team or organization can stay on the same page and avoid duplicate work. When a user makes an annotation on any data today, their teammate will see that note when they see the same data in the future. Polarity enables users to search once and know everything their enterprise knows about a piece of data, both internally and externally. What used to take 50 tabs and most of your time now takes just 1 tab and 2 seconds, so you can focus on getting the job done, not searching for context. Users can connect Polarity to over 200 different tools inside of their environment or to external open-source tools. With Polarity’s flexible integration framework, anyone can develop a custom integration quickly and get visibility to any dataset.
  • 8
    CardinalOps

    CardinalOps

    CardinalOps

    The CardinalOps platform is an AI-powered threat exposure management solution designed to provide organizations with an integrated view of prevention and detection controls across endpoint, cloud, identity, network, and more. It aggregates findings from misconfigurations, unsecured internet-facing workloads, missing hardening controls, and gaps in detection or prevention to give full visibility of exposures and prioritize actions based on business context and adversary tactics. The system continuously maps detections and controls to the MITRE ATT&CK framework to assess coverage depth and identify broken, noisy, or missing detection rules, while also generating deployment-ready detection content customized to each environment via native API integration with major SIEM/XDR tools such as Splunk, Microsoft Sentinel, IBM QRadar, and others. Through its automation and threat intelligence operationalization features, it helps security teams remediate exposure faster.
  • 9
    Fork

    Fork

    VerSprite Cybersecurity

    Fork is a SaaS threat modeling platform that empowers security and product teams to perform continuous, risk-centric application threat assessments using the proven PASTA (Process for Attack Simulation and Threat Analysis) methodology, helping them identify the most likely and impactful risks in under two hours and align security with business priorities. It combines industry-focused threat libraries with real-time vulnerability data and threat intelligence to quantify residual risk accurately, support business impact analysis, and enforce quality gates throughout the threat modeling process. Fork provides a unified security insights dashboard that correlates threats with your application’s attack surface and integrates trusted frameworks and taxonomies such as MITRE, OWASP, CWE, CVE (with EPSS), CAPEC, ATT&CK, D3FEND, and ASVS to drive targeted mitigations and actionable outcomes.
  • Previous
  • You're on page 1
  • Next