Extend the Power of Polarity

Polarity is an overlay on top of all your existing workflows and tools. You can also build on top of Polarity to extend the power of the platform. Explore available open source projects here:

Example of Polarity's product overlaying a window on any application

AlienVault’s OTX allows security researchers and threat data producers to share research and investigate new threats. Anyone interested in threat intelligence can take advantage of OTX.

Learn more

ARIN is the nonprofit corporation that manages distribution of IPv4 & IPv6 address space and ASNs and offers public access to ARIN registration data.

Learn more

Returns information on the 1 million domains with the most referring subdomains.

image Learn more

The Polarity [Maxmind](https://www.maxmind.com/) integration allows Polarity to retrieve geolocation information for IPv4 and IPv6 addresses using the MaxMind GeoIP2 or GeoLite2 databases. MaxMind GeoIP2 data identifies the location and other characteristics of Internet users for a wide range of applications including fraud detection, traffic analysis, compliance, and geo-targeting.

image Learn more

Polarity's MeaDefender integration gives users access to potentially malicious file hash lookups against the MetaDefender OPSWAT REST API. MetaDefender is a cyber security platform for preventing and detecting cyber security threats on multiple data channels.

image Learn more

Instantly know if your account or other personal was "dumped".

image Learn more

Pulsedive is a brand-new analyst-centric threat intelligence platform that can provide users with comprehensive community threat intelligence to help identify known threats.

image Learn more

Redis is an open source, in-memory data structure store, used as a database, cache and message broker. This integration provides a template for connecting to Redis to return data from user-defined queries.

Learn more

Shodan is the world’s first search engine for internet connected devices. Shodan has servers located around the world that crawl the Internet 24/7 to provide the latest Internet intelligence.

image Learn more

Identifies Snort Signatures and allows for quick pivot to rule documentation

image Learn more

Want to learn more?

See Polarity in more detail, or check out our blog

Read blog Get started