Abnormal Technology Integrations
Integrate with your existing security tools to centralize insights, streamline workflows, automate processes, and orchestrate remediation actions.
![](https://optimise2.assets-servd.host/gifted-zorilla/production/images/blog/Azure-Active-Directory-Logo.avif?h=55&auto=compress%2Cformat&fit=crop&dm=1681228020&s=ecc7d65eef017b82c545db2cc24acc38)
Azure Active Directory
![](https://optimise2.assets-servd.host/gifted-zorilla/production/images/blog/Azure-Active-Directory-Logo_2023-04-11-154839_ikhp.avif?h=55&auto=compress%2Cformat&fit=crop&dm=1681228122&s=24d03a7661af7b849f8234416bf03f10)
Azure Sentinel
![](https://optimise2.assets-servd.host/gifted-zorilla/production/images/blog/Logo_3.avif?h=55&auto=compress%2Cformat&fit=crop&dm=1681227599&s=5022fc6116ccd2996be1212c86e1d265)
Cortex XSOAR
CrowdStrike Falcon Identity Threat Protection
Google Chronicle
![](https://optimise2.assets-servd.host/gifted-zorilla/production/images/blog/hunters-logo.avif?h=55&auto=compress%2Cformat&fit=crop&dm=1681226696&s=925ac6038c144e4afbb1bbb2d10c8d58)
Hunters SOC Platform
![](https://optimise2.assets-servd.host/gifted-zorilla/production/images/blog/Logo_10.avif?h=55&auto=compress%2Cformat&fit=crop&dm=1681227646&s=fa4a631012a15d5609241fa10cc0edd6)
Okta
![](https://optimise2.assets-servd.host/gifted-zorilla/production/images/blog/Logo_1.avif?h=55&auto=compress%2Cformat&fit=crop&dm=1681228193&s=2872218916dbfe18ec55706e09f7ab07)
QRadar SIEM
![](https://optimise2.assets-servd.host/gifted-zorilla/production/images/blog/Rapid-7-Logo.avif?h=55&auto=compress%2Cformat&fit=crop&dm=1681226843&s=04ca0cf225fe84afb690191ce2cb96b4)
Rapid7 InsightConnect
![](https://optimise2.assets-servd.host/gifted-zorilla/production/images/blog/Revelstoke-SOAR-Logo-Full-Color.avif?h=55&auto=compress%2Cformat&fit=crop&dm=1681226783&s=a3ec28e488ce1308b2cd10d6fc110e3b)
Revelstoke
![](https://optimise2.assets-servd.host/gifted-zorilla/production/images/blog/Logo_7_2023-04-11-154307_bydy.avif?h=55&auto=compress%2Cformat&fit=crop&dm=1681227789&s=49721d703f92d23528d452d39448263c)
ServiceNow ITSM
![](https://optimise2.assets-servd.host/gifted-zorilla/production/images/blog/Logo.avif?h=55&auto=compress%2Cformat&fit=crop&dm=1681226570&s=8c336defcfc4aaf72b0df59adc66de6d)
Splunk Enterprise Security
![](https://optimise2.assets-servd.host/gifted-zorilla/production/images/blog/Logo_2023-04-11-152353_wqxa.avif?h=55&auto=compress%2Cformat&fit=crop&dm=1681226635&s=7446661199ebd204221a76d0300ec4be)
Splunk SOAR
![](https://optimise2.assets-servd.host/gifted-zorilla/production/images/blog/Torq-Logo-Color-RGB.png?h=55&auto=compress%2Cformat&fit=crop&dm=1681228277&s=146d70ac3df1e8d7aac119be1ba01904)
Torq
REST API
Our bi-directional architecture helps you set up your own custom integrations quickly and simply.
Trusted by Global Enterprises
Get AI Protection for Your Human Interactions
Protect your organization from socially-engineered email attacks that target human behavior.
Request a Demo
![](https://img.plasmic.app/img-optimizer/v1/img?src=https%3A%2F%2Fimg.plasmic.app%2Fimg-optimizer%2Fv1%2Fimg%2F1620b1b4a7ef96a0cf0f5552dbf9d14c.png&q=75)