Integrations

30+ Integrations. Migrate at Your Pace.

Stormcloud connects to your existing tools during migration. When you are ready to consolidate, we replace them. No rip-and-replace. No vendor lock-in. Start where you are.

Connector Registry

Every tool has a home inside Stormcloud

Endpoint

5 connectors

Full endpoint visibility. Detection, query, forensic collection, and runtime monitoring.

  • +Stormcloud XDR (Wazuh)
  • +Endpoint Query (osquery)
  • +Forensic Collection (Velociraptor)
  • +Network Threat Detection (Suricata)
  • +Container Runtime (Falco)

Offensive

5 connectors

Continuous pentesting. Network recon, web app scanning, AD attack paths, and exploitation.

  • +Exploitation Framework (Metasploit)
  • +Web Application Scanner (OWASP ZAP)
  • +Network Reconnaissance (Nmap)
  • +Attack Path Analysis (BloodHound)
  • +External Discovery (Amass)

Vulnerability

3 connectors

Template-based and network-level vulnerability scanning with central management.

  • +Vulnerability Scanner (Nuclei)
  • +Network Vulnerability Scanner (OpenVAS)
  • +Vulnerability Management (DefectDojo)

Threat Intel

2 connectors

IOC matching, MITRE ATT&CK integration, and threat sharing across your community.

  • +Threat Intelligence Platform (OpenCTI)
  • +Threat Intelligence Sharing (MISP)

Automation

3 connectors

Case management, enrichment pipelines, and orchestrated response workflows.

  • +Case Management (TheHive)
  • +Response Automation (Cortex)
  • +Workflow Automation (Shuffle)

Compliance

2 connectors

Policy-as-code scanning and GRC management across infrastructure and cloud.

  • +Configuration Compliance (cnspec)
  • +Risk Management (Eramba)

Cloud

4 connectors

Multi-cloud security posture. AWS, Azure, GCP scanning and asset inventory.

  • +Cloud Security Scanner (Prowler)
  • +Cloud Configuration Audit (ScoutSuite)
  • +Cloud Asset Inventory (CloudQuery)
  • +Infrastructure Mapping (Cartography)

Runtime

2 connectors

Container and Kubernetes runtime protection with CIS benchmark scanning.

  • +Container Runtime Sensor (Falco)
  • +Kubernetes Compliance (Kubescape)

Secrets

1 connector

Secret detection across git repositories. Finds hardcoded API keys, passwords, and tokens.

  • +Code Security Scanner (Gitleaks)

Recon

1 connector

Attack surface mapping. Subdomain enumeration, DNS recon, and asset discovery.

  • +External Discovery (Amass)

Policy

1 connector

Rego-based policy enforcement for Kubernetes admission control and infrastructure.

  • +Policy Engine (Open Policy Agent)

How migration works

1

Connect

Point Stormcloud at your existing tools. Credentials stay encrypted. Findings start flowing in minutes.

2

Consolidate

See all findings in one place. Correlate across tools. AI triages and prioritises automatically.

3

Replace

When you are ready, switch to Stormcloud-native capabilities. One vendor. One bill. Full coverage.

Already running security tools?

Good. Stormcloud works with what you have. Connect today, consolidate tomorrow.