Extend the Power of Polarity

Polarity is an overlay on top of all your existing workflows and tools. You can also build on top of Polarity to extend the power of the platform. Explore available open source projects here:

Example of Polarity's product overlaying a window on any application

Microsoft Active Directory is a directory service developed for Windows domain networks.

Learn more

On-Demand integration which decodes Base64 and URL Encoded strings

Learn more

Polarity's Chronicle Backstory integration allows automated queries to the Events, Assets, and IOC Details endpoints in Chronicle Backstory's API from the Polarity overlay window.

Learn more

The Polarity Cisco Threat Response integration allows Polarity to search the Threat Response Enrich API to return information about various indicator types.

Learn more

Opendns intelligence

Learn more

Confluence is content collaboration software that changes how modern teams work.

Learn more

CRITs is an open source malware and threat repository that leverages other open source software to create a unified tool for analysts and security experts engaged in threat defense.

Learn more

CVE Search is a tool to import CVE (Common Vulnerabilities and Exposures) and CPE (Common Platform Enumeration) into a MongoDB to facilitate search and processing of CVEs.

Learn more

The Polarity - Cyber Risk Analytics integration searches Cyber Risk Analytics for known breaches related to domains and emails on your screen.

Learn more

The Polarity CyberReason integration allows Polarity to search CyberReason's API to return threat information on IP's, Domains and File Hashes.

Learn more

The CyberSponse CyOPs platform is a holistic and enterprise built security orchestration and security automation workbench that empowers security operation teams.

Learn more

Dig is a network admin tool for querying DNS servers.

Learn more

DomainTools helps security analysts turn threat data into threat intelligence by taking network indicators, including domains and IPs, and connecting them with nearly every active domain on the Internet.

image Learn more

Reliably and securely take data from any source, in any format, and search, analyze, and visualize it in real time.

Learn more

Polarity - EmailRep.io integration notifies you if an email has a bad reputation and is potentially suspicous.

Learn more

Occasionally our users come across UNIX Epoch time, the representation of time as the number of seconds elapsed since January 1st, 1970. Polarity automatically converts Epoch time to a readable time.

Learn more

Farsight Security’s DNSDB™ is a Passive DNS historical database that provides a unique, fact-based, multifaceted view of the configuration of the global Internet infrastructure.

Learn more

The FIR (Fast Incident Response) integration searches the FIR cybersecurity incident management platform for artifacts contained within cybersecurity incidents.

Learn more

The Polarity FireEye Detection on Demand (DoD) integration allows Polarity to quickly identify malicious files contained within the FireEye platform. The FireEye DoD service only supports looking up MD5 hashes.

Learn more

The Polarity-Flashpoint integration enables users to search against Flashpoint Finished Intelligence and Technical Data for additional context on information like IPs, domains and file hashes.

Learn more

FullContact’s enrichment APIs let you transform partial identities into complete profiles to connect with prospects, capture audience insights, and enhance customer experiences.

Learn more

The Polarity - Gigamon integration searches Gigamon for detection information as well as any associated DHCP, PDNS or Summary information.

Learn more

The Polarity Google Search Custom Search (CSE) allows the analyst to retrieve and display search results from Google Custom Search programmatically.

Learn more

Google Maps is a web mapping service developed by Google that offers satellite imagery, street maps, 360° panoramic views of streets.

Learn more

The Polarity-Google Translate integration automatically translates english to other languages.

Learn more

At GreyNoise, we tell you all of the things not to be worried about. Think of us as "anti-threat intelligence".

Learn more

Check if you have an account that has been compromised in a data breach.

Learn more

Hybrid Analysis is a free malware analysis service for the community that detects and analyzes unknown threats using a unique Hybrid Analysis technology.

Learn more

IBM X-Force Exchange is a cloud-based threat intelligence sharing platform enabling users to rapidly research the latest security threats, aggregate actionable intelligence and collaborate with peers.

Learn more

iDefense Security Intelligence Services provides security intelligence through the next generation IntelGraph platform that provides context, visualizations, searching, alerting and a robust RESTful API.

Learn more

The Polarity illuminate integration allows Polarity to quickly identify indicators contained within the illuminate platform.

Learn more

The Polarity Intel 471 integration allows Polarity to search the Intel 471 API to return information about various indicator types.

Learn more

The ipinfo core API product returns geolocation, ASN, and hostname information for an IP address.

Learn more

Polarity searches ips, hashes, domains and emails within LookingGlass ScoutPrime to recall associated threat information. LookingGlass ScoutPrime is a threat intelligence platform designed to discover, contextualize, prioritize, and orchestrate new and emerging cyber threats.

Learn more

Returns information on the 1 million domains with the most referring subdomains.

image Learn more

The Polarity Malware Bazaar integration allows Polarity to quickly malicious file hashes contained within the Malware Bazaar platform.

Learn more

The ServiceDesk Plus MSP integration currently searches custom work-order fields to identify tickets related to IP addresses on your screen. ServiceDesk Plus MSP is a web-based, ITIL-ready helpdesk software designed specifically for managed service providers.

Learn more

The Polarity-Mandiant Threat Intelligence Integration allows analysts to have instant data awareness and recall on any intelligence from Mandiant dataset.

Learn more

The Polarity [Maxmind](https://www.maxmind.com/) integration allows Polarity to retrieve geolocation information for IPv4 and IPv6 addresses using the MaxMind GeoIP2 or GeoLite2 databases. MaxMind GeoIP2 data identifies the location and other characteristics of Internet users for a wide range of applications including fraud detection, traffic analysis, compliance, and geo-targeting.

image Learn more

Polarity's MeaDefender integration gives users access to potentially malicious file hash lookups against the MetaDefender OPSWAT REST API. MetaDefender is a cyber security platform for preventing and detecting cyber security threats on multiple data channels.

image Learn more

The Polarity MISP integration allows Polarity to search your instance of MISP to return valid information about domains, IPs, and hashes. The MISP threat sharing platform is a free and open source software helping information sharing of threat intelligence including cyber security indicators.

image Learn more

The Polarity MISP Warning Lists integration searches MISP hash, domain and IPv4 based warning lists and returns related list information.

Learn more

AutoFocus™ is a contextual threat intelligence service that accelerates analysis, correlation, and prevention workflows.

image Learn more

Returns Passivetotal whois intelligence for domains and emails.

image Learn more

The Phantom Platform integrates your existing security technologies, providing a layer of connective tissue between them.

image Learn more

Pulsedive is a brand-new analyst-centric threat intelligence platform that can provide users with comprehensive community threat intelligence to help identify known threats.

image Learn more

IBM® QRadar® SIEM detects anomalies, uncovers advanced threats and removes false positives.

Learn more

Rapid7 Nexpose looks up IPs for related vulnerabilities that Nexpose has identified

image Learn more

Recorded Future’s unique technology collects and analyzes vast amounts of data to deliver relevant cyber threat insights in real time.

image Learn more

Open-source project management application. There is also the Redmine Issue Creator integration, which allows for users to create a ticket in Redmine.

image Learn more

The Resilient IRP enables your security team to integrate its security technologies and create powerful, agile workflows that can automate the response process.

Learn more

ReversingLabs delivers industry-leading threat detection and analysis solutions that address the latest generation of cyber attacks.

image Learn more

The A1000 Malware Analysis Platform supports advanced hunting and investigations through the TitaniumCore high-speed automated static analysis engine.

image Learn more

The Polarity RIPEstat integration allows Polarity to return all announced prefixes for a given ASN via the RIPEstat Data API.

Learn more

Polarity - RiskIQ integration allows Polarity to search RiskIQ Security Intelligence Services (SIS API) to return threat information on IP's, Domains and URL's.

image Learn more

The Polarity Securonix integration allows Polarity to search Securonix API to return User Violation information on Emails, Domains and IP's.

Learn more

The Polarity Sharepoint integration allows freeform text searching for IPs, hashes, and domains in your Sharepoint instance and retrieves related documents.

image Learn more

Swimlane automates manual processes and operational workflows by delivering powerful, consolidated analytics, real-time dashboards, and reporting from across your security infrastructure.

image Learn more

The Polarity - TheHive integration allows Polarity to search TheHive's Search API to return threat information on IP's, Domains and URL's.

image Learn more

ThreatConnect is a threat intelligence, analytics, and orchestration in one platform that will save your team time while making informed decisions for your security operations and strategy.

image Learn more

ThreatQ is a [threat intelligence platform](https://www.threatq.com/threat-intelligence-platform/) designed to accelerate security operations through context, prioritization, and automation, providing security teams greater focus and better decision making.

image Learn more

The Polarity TrapX integration allows Polarity to search the TrapX DeceptionGrid API to return event information on IP addresses.

Learn more

The Polarity TruSTAR integration allows Polarity to search the TruSTAR API to return information about various indicator types.

image Learn more

The Polarity URL Pivot integration allows an analyst to run an on-demand query against an IP, hash, domain or email to return a list of queries that they can then execute in their SIEM or any other URL users want to search.

Learn more

Analyze suspicious files and URLs to detect types of malware including viruses, worms, and trojans.

Learn more

Displays information about Windows security audit events

Learn more

Zendesk is a customer service and engagement platform. The Polarity Zendesk integration displays relevant ticket information based on email addresses and domains.

Learn more

Want to learn more?

See Polarity in more detail, or check out our blog

Read blog Get started