Plexicus Logo

Command Palette

Search for a command to run...

Plexicus Integrations

Integrate Plexicus CNAPP with your existing development tools. REST API, webhooks, and native integrations for CI/CD pipelines, IDEs, and security tools. Get vulnerability data where your developers work.

Our Integrations

Connect your favorite tools and streamline your workflows.
Popular Integrations
GitHub logo
GitHub
SCM
Integrate with GitHub for seamless code management and CI/CD workflows, showcasing how our tools enhance your development lifecycle.
GitLab logo
GitLab
SCM
Connect with GitLab to streamline your DevOps lifecycle from planning to monitoring, demonstrating our tools' compatibility.
Bitbucket Cloud logo
Bitbucket Cloud
SCM
Integrate Bitbucket Cloud for Git code management, ideal for teams using Jira and Trello, and see how our solutions fit in.
Gitea logo
Gitea
SCM
Connect with Gitea for a lightweight, self-hosted Git service to manage your repositories, highlighting our broad integration capabilities.
Integration
GitHub logo
GitHub
SCM
Integrate with GitHub for seamless code management and CI/CD workflows, showcasing how our tools enhance your development lifecycle.
GitLab logo
GitLab
SCM
Connect with GitLab to streamline your DevOps lifecycle from planning to monitoring, demonstrating our tools' compatibility.
Bitbucket Cloud logo
Bitbucket Cloud
SCM
Integrate Bitbucket Cloud for Git code management, ideal for teams using Jira and Trello, and see how our solutions fit in.
Gitea logo
Gitea
SCM
Connect with Gitea for a lightweight, self-hosted Git service to manage your repositories, highlighting our broad integration capabilities.
Checkmarx SAST logo
Checkmarx SAST
SAST
Integrate Checkmarx SAST for comprehensive static application security testing, allowing our tools to complement your vulnerability detection.
Fortify logo
Fortify
SAST
Connect with Fortify for robust static and dynamic application security testing, showing how our solutions enhance your security posture.
GitHub SAST logo
GitHub SAST
SAST
Utilize GitHub SAST for native static application security testing directly within your GitHub workflows, augmented by our tools.
GitLab SAST logo
GitLab SAST
SAST
Integrate GitLab SAST for built-in static application security testing as part of your GitLab CI/CD pipelines, showcasing our seamless fit.
Opengrep logo
Opengrep
SAST
Integrate Opengrep for fast, pattern-based code analysis and security checks, demonstrating how our tools can extend its functionality.
Bandit logo
Bandit
SAST
Connect Bandit to find common security issues in Python code through static analysis, with our tools providing deeper insights.
Coverity Static Analysis logo
Coverity Static Analysis
SAST
Integrate Coverity Static Analysis for deep code inspection, allowing our tools to work alongside for comprehensive defect identification.
DevSkim logo
DevSkim
SAST
Utilize DevSkim for a lightweight, IDE-integrated security linter, showing how our tools can complement real-time feedback.
Checkov SAST logo
Checkov SAST
SAST
Integrate Checkov for SAST capabilities, focusing on identifying security misconfigurations within your code, enhancing its analysis with our tools.
Sonarqube logo
Sonarqube
SAST
Connect SonarQube for continuous inspection of code quality and security, demonstrating our ability to enrich its reporting.
ZPA logo
ZPA
SAST
Integrate Zscaler Private Access (ZPA) for secure, zero-trust access to your internal applications, showing how our tools support secure environments.
Oracle Pro*C preprocesor logo
Oracle Pro*C preprocesor
SAST
Connect with the Oracle Pro*C Preprocessor for static analysis of Pro*C code, ensuring secure database interactions with our integrated solutions.
Security Code Scan (SCS) logo
Security Code Scan (SCS)
SAST
Utilize Security Code Scan (SCS) for static analysis of C# and VB.NET code, with our tools providing a layer of enhanced security.
Oracle ADF/BC4J semgrep rules logo
Oracle ADF/BC4J semgrep rules
SAST
Integrate Semgrep with custom rules for Oracle ADF/BC4J applications to detect security flaws, showcasing our precise rule integration.
GitLab Secret Detection logo
GitLab Secret Detection
Secrets / PII Scan
Leverage GitLab Secret Detection to automatically scan your repositories for exposed secrets, with our tools adding comprehensive coverage.
GitHub Secret Detection logo
GitHub Secret Detection
Secrets / PII Scan
Enable GitHub Secret Detection to continuously scan your codebases for accidentally committed secrets, showing our enhanced detection capabilities.
TruffleHog logo
TruffleHog
Secrets / PII Scan
Integrate TruffleHog for deep secret scanning across your entire commit history, demonstrating how our tools augment its findings.
GitLeaks logo
GitLeaks
Secrets / PII Scan
Connect GitLeaks to scan Git repositories for hardcoded secrets, with our tools providing an additional layer of protection.
Trivy-Secrets logo
Trivy-Secrets
Secrets / PII Scan
Use Trivy for fast and comprehensive secret scanning in container images, filesystems, and Git repositories, enhanced by our integration.
Checkov Configuration logo
Checkov Configuration
Secrets / PII Scan
Integrate Checkov for static analysis of infrastructure as code (IaC) configurations, showing how our tools complement its misconfiguration prevention.
KICS Configuration logo
KICS Configuration
Secrets / PII Scan
Connect KICS (Keeping Infrastructure as Code Secure) to identify security vulnerabilities and misconfigurations in your IaC, further strengthened by our solutions.
Black Duck logo
Black Duck
SCA (Software Composition Analysis)
Integrate Black Duck for comprehensive software composition analysis (SCA), with our tools enriching your open-source vulnerability insights.
Checkmarx SCA logo
Checkmarx SCA
SCA (Software Composition Analysis)
Connect Checkmarx SCA to analyze your open-source dependencies for known vulnerabilities, demonstrating our ability to enhance this process.
GitHub Dependabot logo
GitHub Dependabot
SCA (Software Composition Analysis)
Enable GitHub Dependabot to automatically find and fix vulnerable dependencies, showcasing how our tools can extend its capabilities.
GitLab Dependency logo
GitLab Dependency
SCA (Software Composition Analysis)
Utilize GitLab Dependency Scanning to identify known vulnerabilities in your project's dependencies, with our tools providing deeper analysis.
DustiLock logo
DustiLock
SCA (Software Composition Analysis)
Integrate DustiLock for dependency analysis and security, helping manage and secure your software supply chain with our added features.
OWASP Dependency-Check logo
OWASP Dependency-Check
SCA (Software Composition Analysis)
Connect OWASP Dependency-Check to identify known vulnerable components in your project's dependencies, showing how our tools enhance this critical scan.
Trivy-SCA logo
Trivy-SCA
SCA (Software Composition Analysis)
Use Trivy for software composition analysis (SCA) to detect vulnerabilities in your application dependencies, further powered by our integration.
GitLab Container Registry logo
GitLab Container Registry
Registry
Integrate GitLab Container Registry for secure storage and management of your Docker images within GitLab, complementing your existing workflows.
Docker Hub logo
Docker Hub
Registry
Connect Docker Hub for public and private container image registry services, demonstrating our seamless interaction with your image sources.
Amazon ECR logo
Amazon ECR
Registry
Utilize Amazon Elastic Container Registry (ECR) for secure and scalable Docker container image storage, showing how our tools enhance cloud security.
Google GAR logo
Google GAR
Registry
Integrate Google Artifact Registry (GAR) for universal package management, including container images, showcasing our broad platform support.
GitHub GHCR logo
GitHub GHCR
Registry
Connect with GitHub Container Registry (GHCR) for hosting and managing your Docker images directly within GitHub, enriching your container security.
JFrog Artifactory logo
JFrog Artifactory
Registry
Integrate JFrog Artifactory as a universal artifact repository manager, with our tools complementing your existing artifact management.
Google GCR logo
Google GCR
Registry
Connect Google Container Registry (GCR) for managing Docker images on Google Cloud Platform, highlighting our robust cloud integrations.
Azure ACR logo
Azure ACR
Registry
Utilize Azure Container Registry (ACR) for building, storing, and managing Docker container images and artifacts in Azure, powered by our tools.
Checkov Container logo
Checkov Container
Container Security
Integrate Checkov for scanning container images and Dockerfiles for security misconfigurations, enhancing its detection with our solutions.
Grype logo
Grype
Container Security
Connect Grype for vulnerability scanning of container images and filesystems, identifying known CVEs with enhanced analysis from our tools.
Trivy-Container logo
Trivy-Container
Container Security
Use Trivy for comprehensive vulnerability scanning of container images, file systems, and Git repositories, demonstrating our powerful integration.
KICS Container logo
KICS Container
Container Security
Integrate KICS to scan container images and Dockerfiles for security vulnerabilities, showcasing how our tools deepen its insights.
Plexalyzer logo
Plexalyzer
Plexicus
Connect Plexalyzer for in-depth analysis of container images, with our tools identifying vulnerabilities and optimizing image size.
AWS logo
AWS
Cloud Deployment
Integrate with Amazon Web Services (AWS) for cloud infrastructure and security monitoring, highlighting our ability to secure your cloud environment.
Azure logo
Azure
Cloud Deployment
Connect with Microsoft Azure for cloud security posture management and resource monitoring, demonstrating our seamless cloud security capabilities.
Google Cloud Platform logo
Google Cloud Platform
Cloud Deployment
Utilize Google Cloud Platform (GCP) for comprehensive cloud security and compliance checks, with our tools enhancing your overall cloud security.
Oracle Cloud logo
Oracle Cloud
Cloud Deployment
Integrate with Oracle Cloud for securing your cloud resources and applications, showing how our solutions extend to various cloud providers.
Cloudsploit logo
Cloudsploit
CSPM
Connect CloudSploit for open-source cloud security posture management, identifying misconfigurations in AWS, Azure, GCP, and Oracle Cloud, enhanced by our tools.
Prowler logo
Prowler
CSPM
Integrate Prowler for AWS security best practices assessments, audits, hardening, and incident response, showcasing our complementary security features.
ClamAV logo
ClamAV
Threat Detection
Integrate Prowler for AWS security best practices assessments, audits, hardening, and incident response, showcasing our complementary security features.
ChainBench logo
ChainBench
SCM Security
Utilize ChainBench for benchmarking and assessing the security of your software supply chain, with our tools providing deeper insights and remediation.
Checkov CI/CD logo
Checkov CI/CD
CI/CD Posture
Connect Checkov to scan CI/CD pipeline configurations for misconfigurations and security best practices, with our tools enhancing your pipeline security.
KICS CI/CD logo
KICS CI/CD
CI/CD Posture
Integrate KICS for analyzing your CI/CD pipeline definitions to prevent security misconfigurations and vulnerabilities, demonstrating our comprehensive CI/CD security.
Trivy-License logo
Trivy-License
License
Use Trivy to identify and report on software licenses within your dependencies, helping manage license compliance with our integrated solutions.
Hadolint logo
Hadolint
IaC Security
Integrate Hadolint for linting Dockerfiles, ensuring best practices and preventing common errors and security issues, with our tools offering deeper analysis.
TFLint logo
TFLint
IaC Security
Connect TFLint for a linter for Terraform, helping to enforce best practices and avoid potential issues in your infrastructure code, enhanced by our integration.
Terrascan logo
Terrascan
IaC Security
Utilize Terrascan for static code analysis for Infrastructure as Code (IaC) to detect security vulnerabilities and compliance violations, showcasing our complementary security.
Checkov IaC logo
Checkov IaC
IaC Security
Integrate Checkov for comprehensive static analysis of Infrastructure as Code (IaC) to identify misconfigurations and security risks, further empowered by our solutions.
KICS IaC logo
KICS IaC
IaC Security
Connect KICS to scan your Infrastructure as Code (IaC) for security vulnerabilities, demonstrating how our tools enhance its detection capabilities.
Syft logo
Syft
SBOM (Software Bill of Materials)
Integrate Syft to generate a Software Bill of Materials (SBOM) from container images and filesystems, identifying all open-source components with our enhanced insights.
Trivy-SBOM logo
Trivy-SBOM
SBOM (Software Bill of Materials)
Use Trivy to generate accurate and comprehensive Software Bill of Materials (SBOMs) for various artifacts, enhancing supply chain security with our robust integration.
Webhook logo
Webhook
Webhook
Integrate with Webhooks to enable real-time communication and automated workflows between different services, showcasing the flexibility of our integration.
Nuclei logo
Nuclei
DAST
Connect Nuclei for fast and customizable vulnerability scanning based on simple YAML templates, with our tools providing deeper analysis and context.
Github Actions logo
Github Actions
CI/CD Pipelines
Integrate with GitHub Actions to automate your software development workflows, including CI/CD, highlighting our seamless integration into your pipelines.
GitLab CI/CD logo
GitLab CI/CD
CI/CD Pipelines
Utilize GitLab CI/CD for continuous integration and continuous delivery directly within GitLab, streamlining your DevOps process with our robust capabilities.
Gitea Actions logo
Gitea Actions
CI/CD Pipelines
Connect Gitea Actions to automate tasks and build CI/CD pipelines within your self-hosted Gitea instances, demonstrating our versatile CI/CD support.
Bitbucket Actions logo
Bitbucket Actions
CI/CD Pipelines
Integrate Bitbucket Actions to build, test, and deploy your code directly from your Bitbucket repositories, showcasing our complete CI/CD integration.
Jenkins logo
Jenkins
CI/CD Pipelines
Connect with Jenkins for powerful open-source automation server to orchestrate your CI/CD pipelines, highlighting our ability to work with established tools.
Trivy Registry Scanner logo
Trivy Registry Scanner
Registry Security
Use Trivy to scan container registries for vulnerabilities in stored images without pulling them locally, demonstrating our efficient and secure scanning.