Daylight
Integrations

Daylight ensures complete coverage by integrating seamlessly with your entire IT and security stack. Our agentic services can develop new integrations within days, eliminating blind spots and adapting quickly to your environment.

Every system, signal, and surface is monitored and protected, so threats have nowhere to hide.
integration logo
integration logo
integration logo
integration logo
integration logo
integration logo
integration logo
integration logo
integration logo
integration logo
integration logo
integration logo
integration logo
integration logo
integration logo
integration logo
integration logo
integration logo
integration logo
integration logo
integration logo
integration logo
integration logo
integration logo

Category

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Can’t find what you need?

Request a new integration to ensure complete coverage across your security stack.
1Password
1Password
Identity Security & Access Management
Abnormal
Abnormal
Web & Application Security
AbuseIPDB
AbuseIPDB
Threat Intelligence Enrichment
Amazon GuardDuty
Amazon GuardDuty
Cloud Security & Infrastructure
Amazone Cloudtrail
Amazone Cloudtrail
Cloud Security & Infrastructure
Atlassian
Atlassian
Enterprise Resource Management
Auth0
Auth0
Identity Security & Access Management
Bitbucket
Bitbucket
Enterprise Resource Management
Bold
Bold
Data Security
Box
Box
Cloud Security & Infrastructure
Cato Networks
Cato Networks
Web & Application Security
Cisco AMP
Cisco AMP
Endpoint Detection & Response
Cisco Meraki
Cisco Meraki
Network Security
Cisco Umbrella
Cisco Umbrella
Endpoint Detection & Response
Cloudflare
Cloudflare
Web & Application Security
Coralogix
Coralogix
SIEM & Log Aggregation
CrowdStrike
CrowdStrike
Endpoint Detection & Response
CrowdStrike Falcon Identity Protection
CrowdStrike Falcon Identity Protection
Identity Security & Access Management
Crowdstrike Falcon® Next-Gen SIEM
Crowdstrike Falcon® Next-Gen SIEM
SIEM & Log Aggregation
CyberArk
CyberArk
Identity Security & Access Management
Cyberhaven
Cyberhaven
Data Security
Darktrace
Darktrace
Network Security
Datadog
Datadog
SIEM & Log Aggregation
Discord
Discord
Communication & Ticketing
Elastic
Elastic
SIEM & Log Aggregation
Entra ID
Entra ID
Identity Security & Access Management
ExtraHop
ExtraHop
Network Security
Fortinet
Fortinet
Network Security
Fortinet FortiGate
Fortinet FortiGate
Network Security
GitHub
GitHub
Enterprise Resource Management
GitLab
GitLab
Enterprise Resource Management
Google Chronicle
Google Chronicle
SIEM & Log Aggregation
Google Cloud Platform
Google Cloud Platform
Cloud Security & Infrastructure
Google Kubernetes Engine
Google Kubernetes Engine
Cloud Security & Infrastructure
Google Marketing Platform
Google Marketing Platform
Cloud Security & Infrastructure
Google Workspace
Google Workspace
Identity Security & Access Management
IBM QRadar
IBM QRadar
SIEM & Log Aggregation
IPInfo
IPInfo
Threat Intelligence Enrichment
Incydr (Mimecast)
Incydr (Mimecast)
Data Security
Jira
Jira
Communication & Ticketing
Kandji
Kandji
Endpoint Detection & Response
Keeper Security
Keeper Security
Identity Security & Access Management
KnowBe4
KnowBe4
Email Security
Lacework
Lacework
Cloud Security & Infrastructure
LastPass
LastPass
Identity Security & Access Management
Linear
Linear
Communication & Ticketing
Lumos
Lumos
Identity Security & Access Management
Microsoft 365
Microsoft 365
Cloud Security & Infrastructure
Microsoft Azure
Microsoft Azure
Cloud Security & Infrastructure
Microsoft Defender for Cloud Apps
Microsoft Defender for Cloud Apps
Cloud Security & Infrastructure
Microsoft Defender for Endpoint
Microsoft Defender for Endpoint
Endpoint Detection & Response
Microsoft Defender for Identity
Microsoft Defender for Identity
Identity Security & Access Management
Microsoft Defender for Office 365
Microsoft Defender for Office 365
Web & Application Security
Microsoft Entra ID Protection
Microsoft Entra ID Protection
Identity Security & Access Management
Microsoft Sentinel
Microsoft Sentinel
SIEM & Log Aggregation
Microsoft Teams
Microsoft Teams
Communication & Ticketing
Netskope
Netskope
Web & Application Security
NinjaOne
NinjaOne
Endpoint Detection & Response
Notion
Notion
Enterprise Resource Management
Okta
Okta
Identity Security & Access Management
OneLogin
OneLogin
Identity Security & Access Management
OpsGenie
OpsGenie
Communication & Ticketing
Orca Cloud Security Platform
Orca Cloud Security Platform
Cloud Security & Infrastructure
PagerDuty
PagerDuty
Communication & Ticketing
Palo Alto Cortex XDR
Palo Alto Cortex XDR
Endpoint Detection & Response
Palo Alto Cortex XSIAM
Palo Alto Cortex XSIAM
SIEM & Log Aggregation
Palo Alto Prisma Cloud
Palo Alto Prisma Cloud
Cloud Security & Infrastructure
Panther
Panther
SIEM & Log Aggregation
Prisma
Prisma
Cloud Security & Infrastructure
Proofpoint
Proofpoint
Email Security
Reco
Reco
Identity Security & Access Management
ReversingLabs
ReversingLabs
Threat Intelligence Enrichment
Salesforce
Salesforce
Enterprise Resource Management
Salt Security
Salt Security
Web & Application Security
SentinelOne
SentinelOne
Endpoint Detection & Response
ServiceNow
ServiceNow
Communication & Ticketing
Slack
Slack
Communication & Ticketing
Snowflake
Snowflake
Cloud Security & Infrastructure
Snyk
Snyk
Web & Application Security
Sophos Cloud Optix
Sophos Cloud Optix
Cloud Security & Infrastructure
Sophos Firewall
Sophos Firewall
Network Security
Splunk
Splunk
SIEM & Log Aggregation
Sublime
Sublime
Web & Application Security
Sumo Logic
Sumo Logic
SIEM & Log Aggregation
Tailscale
Tailscale
Web & Application Security
Twingate
Twingate
Web & Application Security
UKG Pro
UKG Pro
Enterprise Resource Management
URLScanner
URLScanner
Threat Intelligence Enrichment
Varonis
Varonis
Cloud Security & Infrastructure
Vmware Carbon Black Cloud
Vmware Carbon Black Cloud
Endpoint Detection & Response
Wallarm
Wallarm
Web & Application Security
Wiz
Wiz
Cloud Security & Infrastructure
Zscaler
Zscaler
Network Security
form submission image form submission image

Ready to escape the dark and elevate your security?

button decoration
Get a demo
moutain illustration