Build on Top of Polarity

Polarity makes it easy to leverage data you’ve already invested in and use it every day across all the people and tools you invested in.

Our dynamic Integration Framework was designed to make it easy to customize the community's existing open source integrations or create your own.

To create an integration you define three things: 1. Type of information you want Polarity to recognize. 2. What action to take, such as search to run or API to connect to. 3. What to overlay on users’ screens, such as interactive maps, graphs, or textual data.

Have a tool you’d like to see integrated with Polarity? Let us know at integrations@polarity.io

If you would like to partner with us, please send us an email to partners@polarity.io

Here are examples of integrations built by customers, partners, and Polarity. To view the full list or to contribute, please visit - https://github.com/polarityio

Categories

Bulk actions

Mandiant logo

Security Operations Incident Response Threat Hunting

The Polarity-Mandiant Threat Intelligence Integration allows analysts to have instant data awareness and recall on any intelligence from Mandiant dataset.

Fireeye logo

Incident Response Threat Hunting

The Polarity FireEye Detection on Demand (DoD) integration allows Polarity to quickly identify malicious files contained within the FireEye platform. The FireEye DoD service only supports looking up MD5 hashes.

Hyas logo

Security Operations

The Polarity-HYAS integration effectively provides “HYAS Insight anywhere” by searching HYAS Insight for IPs, domains, emails, and hashes.

Unshorten.me logo

Security Operations

The Polarity Unshorten.me integration allows Polarity to Un-Shorten URLs created by URL shortening services.

Chronical logo

Security Operations Incident Response Threat Hunting Pen Testing Network Engineering

Polarity's Chronicle Backstory integration allows automated queries to the Events, Assets, and IOC Details endpoints in Chronicle Backstory's API from the Polarity overlay window.

Google Custom Search

Security Operations Incident Response Threat Hunting Pen Testing

The Polarity Google Search Custom Search (CSE) allows the analyst to retrieve and display search results from Google Custom Search programmatically.

Ripestat logo

Security Operations Incident Response Threat Hunting Network Engineering

The Polarity - Gigamon integration searches Gigamon for detection information as well as any associated DHCP, PDNS or Summary information.

MISP Warning List

Security Operations Incident Response Threat Hunting

The Polarity MISP Warning Lists integration searches MISP hash, domain and IPv4 based warning lists and returns related list information.

URL Pivot

Security Operations Incident Response

The Polarity URL Pivot integration allows an analyst to run an on-demand query against an IP, hash, domain or email to return a list of queries that they can then execute in their SIEM or any other URL users want to search.

Cortx XSoar

Security Operations

Polarity's Cortex XSOAR integration allows automated queries against Cortex XSOAR's incident database, creates incidents from entities, and allows a user to execute predefined playbooks from Polarity.

Local-Calling-Guide

The Local-Calling Guide contains local calling, area code, and prefix information for Canada, the United States of America, and other countries which are part of the North American Numbering Plan.

Ripestat logo

Security Operations Incident Response Threat Hunting Network Engineering

The Polarity RIPEstat integration allows Polarity to return all announced prefixes for a given ASN via the RIPEstat Data API.

TrapX logo

Security Operations Incident Response Threat Hunting

The Polarity TrapX integration allows Polarity to search the TrapX DeceptionGrid API to return event information on IP addresses.

Securonix logo logo

Security Operations Incident Response Threat Hunting Network Engineering

The Polarity Securonix integration allows Polarity to search Securonix API to return User Violation information on Emails, Domains and IP's.

Vuln DB logo

Security Operations Incident Response Threat Hunting Pen Testing

The Polarity VulDB integration allows Polarity to search the VulDB API to return vulnerability information related to CVE identifiers or Microsoft Security Bulletin (KB) ID's.

Dig

Security Operations Incident Response Threat Hunting Network Engineering

Dig is a network admin tool for querying DNS servers.

Illuminate Analyst Playbook logo

Security Operations Incident Response Threat Hunting

The Polarity Cisco Threat Response integration allows Polarity to search the Threat Response Enrich API to return information about various indicator types.

Fast Incident Response (FIR)

Security Operations Incident Response

The FIR (Fast Incident Response) integration searches the FIR cybersecurity incident management platform for artifacts contained within cybersecurity incidents.

Malware-Bazzar

Security Operations Incident Response Malware Analysis Threat Hunting

The Polarity Malware Bazaar integration allows Polarity to quickly malicious file hashes contained within the Malware Bazaar platform.

Illuminate Analyst Playbook logo

Security Operations Incident Response Threat Hunting

The Polarity illuminate integration allows Polarity to quickly identify indicators contained within the illuminate platform.

Merriam-Webster  logo

Security Operations Incident Response Malware Analysis

The Polarity - TheHive integration allows Polarity to search TheHive's Search API to return threat information on IP's, Domains and URL's.

Google Translate Logo

The Polarity-Google Translate integration automatically translates english to other languages.

Majestic Millions

Security Operations Incident Response Threat Hunting

Returns information on the 1 million domains with the most referring subdomains.

Font Changer

On-demand integration which converts selected text to a user chosen font for accessibility purposes.

Merriam-Webster  logo

The Polarity - Merriam Webster integraion queries Merriam Webster to return dictionary information about words contained in an on-demand search.

Redmine logo

Security Operations Incident Response

Open source project management application.

Intel 471 logo

Security Operations Incident Response Threat Hunting Network Engineering

The Polarity Intel 471 integration allows Polarity to search the Intel 471 API to return information about various indicator types.

CyberReason logo

Security Operations Incident Response Threat Hunting

The Polarity CyberReason integration allows Polarity to search CyberReason's API to return threat information on IP's, Domains and File Hashes.

Flashpoint logo

Security Operations Incident Response Malware Analysis Threat Hunting

The Polarity-Flashpoint integration enables users to search against Flashpoint Finished Intelligence and Technical Data for additional context on information like IPs, domains and file hashes.

Sharepointlogo

Security Operations Incident Response

The Polarity Sharepoint integration allows freeform text searching for IPs, Hashes and domains in your Sharepoint instance and retrieves related documents.

risk IQ logo

Security Operations Incident Response

Polarity - RiskIQ integration allows Polarity to search RiskIQ Security Intelligence Services (SIS API) to return threat information on IP's, Domains and URL's.

Cyber Risk Analytics

Security Operations Incident Response

The Polarity - Cyber Risk Analytics integration searches Cyber Risk Analytics for known breaches related to domains and emails on your screen.

Screenshot machinie

Security Operations Incident Response

Provides a screenshot of a domain or URl

Google Safe Browsing Logo

Security Operations Incident Response Forensics

Identifies Snort Signatures and allows for quick pivot to rule documentation

hybrid-analysis logo

Security Operations Incident Response Forensics

Hybrid Analysis is a free malware analysis service for the community that detects and analyzes unknown threats using a unique Hybrid Analysis technology.

Windows Secruity Events

Security Operations Incident Response Malware Analysis

Displays information about Windows security audit events

trustar logo

Security Operations Incident Response Malware Analysis

The Polarity TruSTAR integration allows Polarity to search the TruSTAR API to return information about various indicator types.

pwnd logo

Security Operations Incident Response

Check if you have an account that has been compromised in a data breach.

pwnd logo

Security Operations Incident Response

Opendns intelligence

passive total logo

Security Operations Incident Response

Returns passivetotal whois intelligence for domains and emails.

url scan logo

Security Operations

Enriches domains, IP addresses, and SHA256 hashes with contextual information from urlscan.io and notifies you about that information

nexpose logo

Forensics Incident Response

Rapid7 Nexpose looks up IPs for related vulnerabilities that Nexpose has identified

Base 64 Decode

Security Operations Incident Response Malware Analysis Forensics

On-Demand integration which decodes Base64 and URL Encoded strings

EmailRep Logo

Security Operations Incident Response Forensics

Polarity - EmailRep.io integration notifies you if an email has a bad reputation and is potentially suspicous.

abuseipdb logo

Security Operations Incident Response

The Polarity - AbuseIPDB Integration supports enrichment of IP addresses in ipv4 and ipv6 format.

URLHaus

Security Operations Incident Response

The Polarity URLHaus integration takes indicators on your screen and overlays if there are any malicious URLs associated with that indicator.

jira logo

Security Operations Incident Response Helpdesk

ServiceNow delivers digital workflows that create great experiences and unlock productivity for employees and the enterprise.

greynoise logo logo

Security Operations Incident Response Forensics

At GreyNoise, we tell you all of the things not to be worried about. Think of us as "anti-threat intelligence".

iDefense logo logo

Security Operations Incident Response Malware Analysis Forensics

iDefense Security Intelligence Services provides security intelligence through the next generation IntelGraph platform that provides context, visualizations, searching, alerting and a robust RESTful API.

Recorded future logo logo

Security Operations Incident Response Malware Analysis Forensics

Recorded Future’s unique technology collects and analyzes vast amounts of data to deliver relevant cyber threat insights in real time.

Pastebin Dump

Security Operations Incident Response

Instantly know if your account or other personal was "dumped".

World Trading Data

Analysis

The best worldwide market data provider.

Service Now integration logo

Security Operations Incident Response Network Engineering Helpdesk Orchestration

ServiceNow delivers digital workflows that create great experiences and unlock productivity for employees and the enterprise.

RBS Vuln DB logo

Security Operations Incident Response Malware Analysis Forensics

Risk Based Security offers the VulnDB, for comprehensive vulnerability intelligence through a continuously updated data feed.

Reversing Labs A1000

Security Operations Incident Response Malware Analysis

The A1000 Malware Analysis Platform supports advanced hunting and investigations through the TitaniumCore high-speed automated static analysis engine.

PosgressSQL logo

Security Operations Incident Response

PostgreSQL is a powerful, open source object-relational database system.

Discover org integration logo

Security Operations Incident Response

The Resilient IRP enables your security team to integrate its security technologies and create powerful, agile workflows that can automate the response process.

Cybersponse logo

Security Operations Incident Response Orchestration

The CyberSponse CyOPs platform is a holistic and enterprise built security orchestration and security automation workbench that empowers security operation teams.

Zendesk logo integration logo

Security Operations Incident Response Network Engineering Helpdesk

Zendesk is a customer service and engagement platform. The Polarity Zendesk integration displays relevant ticket information based on email addresses and domains.

Discover org integration logo

Sales & Marketing

DiscoverOrg contains the most accurate and robust sales and marketing intelligence available in the market. Polarity brings that information to you in near real time.

Confluence logo integration

Security Operations Incident Response Sales & Marketing Network Engineering Helpdesk

Confluence is content collaboration software that changes how modern teams work.

Unix Epoch time integration

Sales & Marketing

Find customers, close deals faster, and grow accounts with Salesforce, the world’s #1 Customer Relationship Management (CRM) platform.

Unix Epoch time integration

Security Operations Incident Response Orchestration

Swimlane automates manual processes and operational workflows by delivering powerful, consolidated analytics, real-time dashboards and reporting from across your security infrastructure.

meta defender logo

Security Operations Incident Response Malware Analysis

MetaDefender is a cyber security platform for preventing and detecting cyber security threats on multiple data channels.

Palo alto logo

Security Operations Incident Response Malware Analysis

AutoFocus™ is a contextual threat intelligence service that accelerates analysis, correlation, and prevention workflows.

Unix Epoch time integration

Security Operations Incident Response

Pulsedive is a brand-new analyst-centric threat intelligence platform that can provide users with comprehensive community threat intelligence to help identify known threats.

Unix Epoch time integration

Security Operations Incident Response Network Engineering Malware Analysis Forensics

Occasionally our users come across UNIX Epoch time, the representation of time as the number of seconds elapsed since January 1st, 1970. Polarity automatically converts Epoch time to a readable time.

IBM X-Force Logo

Security Operations Incident Response

IBM X-Force Exchange is a cloud-based threat intelligence sharing platform enabling users to rapidly research the latest security threats, aggregate actionable intelligence and collaborate with peers.

Phantom Logo

Security Operations Incident Response Orchestration

The Phantom Platform integrates your existing security technologies, providing a layer of connective tissue between them.

Shodan Logo

Security Operations Incident Response

Shodan is the world’s first search engine for internet connected devices. Shodan has servers located around the world that crawl the Internet 24/7 to provide the latest Internet intelligence.

Q Radar Logo Logo

Security Operations Incident Response Network Engineering

IBM® QRadar® SIEM detects anomalies, uncovers advanced threats and removes false positives.

Alien Vault Logo

Security Operations Incident Response

AlienVault’s OTX allows security researchers and threat data producers to share research and investigate new threats. Anyone interested in threat intelligence can take advantage of OTX.

Threat Connect Logo

Security Operations Incident Response

ThreatConnect is a threat intelligence, analytics, and orchestration in one platform that will save your team time while making informed decisions for your security operations and strategy.

Crits Logo

Security Operations Incident Response

CRITs is an open source malware and threat repository that leverages other open source software to create a unified tool for analysts and security experts engaged in threat defense.

Google Maps Logo

Supply Chain Sales & Marketing Security Operations Incident Response

Google Maps is a web mapping service developed by Google that offers satellite imagery, street maps, 360° panoramic views of streets.

Looking Glass Logo

Security Operations Incident Response Malware Analysis Network Engineering

LookingGlass ScoutPrime is a threat intelligence platform designed to discover, contextualize, prioritize, and orchestrate new and emerging cyber threats.

Active Directory Logo

Security Operations Incident Response Helpdesk Forensics

Microsoft Active Directory is a directory service developed for Windows domain networks.

Full Contact Logo

Security Operations Incident Response Sales & Marketing

FullContact’s enrichment APIs let you transform partial identities into complete profiles to connect with prospects, capture audience insights, and enhance customer experiences.

ThreatQ Logo

Security Operations Incident Response

ThreatQ is a threat intelligence platform designed to accelerate security operations through context, prioritization, and automation, providing security teams greater focus and better decision making.

ReversingLabs Logo

Security Operations Incident Response Malware Analysis

ReversingLabs delivers industry-leading threat detection and analysis solutions that address the latest generation of cyber attacks.

IP Info Logo

Security Operations Incident Response Network Engineering

The ipinfo core API product returns geolocation, ASN, and hostname information for an IP address.

ARIN Logo

Security Operations Incident Response Network Engineering

ARIN is the nonprofit corporation that manages distribution of IPv4 & IPv6 address space and ASNs and offers public access to ARIN registration data.

Service Desk Plus Logo

Helpdesk Security Operations Incident Response

ServiceDesk Plus MSP is a web based, ITIL-ready helpdesk software designed specifically for managed service providers.

Farsight Security Logo

Security Operations Incident Response Network Engineering Forensics

Farsight Security’s DNSDB™ is a Passive DNS historical database that provides a unique, fact-based, multifaceted view of the configuration of the global Internet infrastructure.

MISP Logo

Security Operations Incident Response

The MISP threat sharing platform is a free and open source software helping information sharing of threat intelligence including cyber security indicators.

STAXX Logo

Security Operations Incident Response

Anomali STAXX gives you an easy way to access any STIX/TAXII feed. The STAXX Portal equips users with tools for researching Indicators of Compromise (IOCs).

Anomali Logo

Security Operations Incident Response

Anomali ThreatStream is a Threat Intelligence Platform that speeds detection of threats by uniting your security solutions under one platform and providing tools to operationalize threat intelligence.

Virus Total Logo

Security Operations Incident Response Network Engineering Malware Analysis

Analyze suspicious files and URLs to detect types of malware including viruses, worms, and trojans.

Elastic Search Logo

Security Operations Incident Response Network Engineering

Reliably and securely take data from any source, in any format, and search, analyze, and visualize it in real time.

CVE Logo

Security Operations Incident Response Network Engineering

CVE Search is a tool to import CVE (Common Vulnerabilities and Exposures) and CPE (Common Platform Enumeration) into a MongoDB to facilitate search and processing of CVEs.

MaxMind Logo

Security Operations Incident Response Network Engineering

MaxMind GeoIP2 data identifies the location and other characteristics of Internet users for a wide range of applications including fraud detection, traffic analysis, compliance, and geo-targeting.

Wiki Logo

Analysis

Wikipedia is a free online encyclopedia, created and edited by volunteers around the world and hosted by the Wikimedia Foundation.

Carbon Black Logo

Security Operations Incident Response Malware Analysis

Carbon Black Response is a highly scalable, real-time EDR with unparalleled visibility for top security operations centers and incident response teams

SQL Logo

Security Operations Incident Response

Microsoft SQL Server is a relational database management system. This integration provides a template for connecting to SQL Server to return data from user-defined queries.

Reddis Logo

Security Operations Incident Response

Redis is an open source, in-memory data structure store, used as a database, cache and message broker. This integration provides a template for connecting to Redis to return data from user-defined queries.

UPS Logo

Supply Chain

UPS Developer APIs allow users to display the status and location of packages from UPS.

Splunk Logo

Security Operations Incident Response Network Engineering

Splunk is a platform for aggregating, analyzing, searching and monitoring machine-generated data to make machine data accessible, usable, and valuable to everyone.

Pool Party Logo

Security Operations Incident Response Analysis

PoolParty is a world-class semantic technology suite that offers sharply focused solutions to your knowledge organization and content business.

Domain Tools Logo

Security Operations Incident Response Network Engineering Forensics

DomainTools helps security analysts turn threat data into threat intelligence by taking network indicators, including domains and IPs, and connecting them with nearly every active domain on the Internet.

Want to learn more?

See Polarity in more detail, or check out our blog

Read blog Get Polarity