16 Integrations with LimaCharlie

View a list of LimaCharlie integrations and software that integrates with LimaCharlie below. Compare the best LimaCharlie integrations as well as features, ratings, user reviews, and pricing of software that integrates with LimaCharlie. Here are the current LimaCharlie integrations in 2024:

  • 1
    Twilio

    Twilio

    Twilio

    Design and deploy your ideal customer engagement experience. Twilio is a single fully-programmable platform with flexible APIs for any channel and over 400+ integrations, backed by a community of over 9 million developers. Build accurate and personalized experiences for your customers, easily and at scale, using SMS and WhatsApp messaging, voice, video, email, and more. Browse documentation and SDKs in multiple coding languages, including Ruby, Python, PHP, Node.js, java, and C#, or jumpstart your first project with our open source code templates to quickly build production-ready communications apps. Sign up and start building today.
    Leader badge
    Starting Price: $0.0085 per min
    View Software
    Visit Website
  • 2
    Slack

    Slack

    Slack

    Slack is a cloud-based project collaboration and team interaction software solution specially designed to seamlessly facilitate communication across organizations. Featuring powerful tools and services integrated into a single platform, Slack provides private channels to promote interaction within smaller teams, direct channels to help send messages directly to colleagues, and public channels that enables members across organizations to start conversations. Available on Mac, Windows, Android, and iOS apps, Slack offers a plethora of features that include chat, file sharing, collaborative workspace, real-time notifications, two-way audio and video, screen sharing, document imaging, activity tracking and logging, and more.
    Leader badge
    Starting Price: $6.67 per user per month
  • 3
    PagerDuty

    PagerDuty

    PagerDuty

    PagerDuty, Inc. (NYSE:PD) is a leader in digital operations management. In an always-on world, organizations of all sizes trust PagerDuty to help them deliver a perfect digital experience to their customers, every time. Teams use PagerDuty to identify issues and opportunities in real time and bring together the right people to fix problems faster and prevent them in the future. PagerDuty's ecosystem of over 350+ integrations, including Slack, Zoom, ServiceNow, AWS, Microsoft Teams, Salesforce, and more, enable teams to centralize their technology stack, get a holistic view of their operations, and optimize processes within their toolsets.
  • 4
    Google Chrome
    Connect to the world on the browser built by Google. Google builds powerful tools that help you connect, play, work and get things done. And all of it works on Chrome. With Google apps like Gmail, Google Pay, and Google Assistant, Chrome can help you stay productive and get more out of your browser.
  • 5
    Microsoft Edge
    The browser for business is here. Built on Chromium open source, backed by Microsoft security and innovation. Microsoft Edge is the fast and secure browser that helps you protect your data, and save time and money. Microsoft Edge is available on supported versions of Windows, macOS, iOS, and Android. Microsoft Edge is the best browser for Windows. Sync your passwords, favorites, and settings across multiple devices and start using Microsoft Edge today. Microsoft Edge was designed to feel at home on a Mac. Easily sync your passwords, favorites, and settings across many devices. Download Microsoft Edge as your new trusted web browser today. Microsoft Edge is available to download on your iOS device. Sync your passwords, favorites, and collections, across your signed-in devices. Scan the QR code to install the app. Microsoft Edge is available to download on your Android device. Sync your passwords, favorites, and collections, across your signed-in devices.
  • 6
    threatYeti by alphaMountain
    threatYeti by alphaMountain, turns security professionals and hobbyists alike into a senior IP threat intelligence analysts with a browser-based platform that renders real-time threat verdicts for any domain, URL, or IP on the internet. With threatYeti, the risk posed by a domain is rendered instantly with a color-coded rating from 1.00 (low risk) to 10.00 (high risk). threatYeti also protects cyber threat analysts and their networks from risky sites. threatYeti’s no-click categorization presents sites into at least one out of 83 categories so that analysts don’t have to visit them and risk encountering objectionable material or downloading malware. threatYeti also displays related hosts, threat factors, passive DNS, certificates, redirect chains and more, giving analysts the full picture of any host. The result is faster, safer investigations that enable organizations to take conclusive action on domain and IP threats.
    Starting Price: $0
  • 7
    Tines

    Tines

    Tines

    Tines provides the world's most security-conscious companies with no-code automation technology to power their business-critical processes. We believe automation works best when subject-matter experts, not distant developers, build it. Our drag-and-drop technology is intuitive but immensely powerful and flexible to give frontline staff everything they need to address repetitive manual processes. Tines allows users to gather internal or external events to trigger multi-step workflows. In line with our belief in approachable and powerful technology, Tines integrates with any technology that offers an API. This means customers aren’t limited to a fixed set of integrations, rather they are free to connect to any tool in their stack. This extends how they protect their business. With Tines, our customers are free from the burdensome, repetitive processes to focus on protecting their business from the next threat.
    Starting Price: $0/user/year
  • 8
    ChromeOS Flex
    Try the cloud-first, fast, easy-to-manage, and secure ChromeOS for PCs and Macs. ChromeOS Flex is a free and sustainable way to modernize devices you already own. It’s easy to deploy across your fleet or simply try it to see what a cloud-first OS has to offer. Install ChromeOS Flex on your PCs and Macs so they are secure, boot fast, don’t slow down over time, update automatically in the background, and can be managed from the cloud. Devices boot quickly, don’t slow down over time, and update in the background, reducing device downtime. Experience fast access to VDI and web apps with an intuitive, clutter-free, and reliable experience. Deploy ChromeOS Flex across your fleet via USB or network deployment and a user’s settings and policies sync to the device almost instantly. Use the Google Admin console to manage updates and configure device policies remotely. Blocked executables and sandboxing technology eliminate the need for antivirus software.
    Starting Price: Free
  • 9
    Torq

    Torq

    Torq

    Torq’s no-code automation modernizes how security and operations teams work with easy workflow building, limitless integrations, and numerous prebuilt templates. Respond to threats faster with automatically triggered flows. Remediate risks as soon as they’re detected in your environment. Shift to a proactive stance by eliminating false positives and reactive work. Build flows with a no-code, drag & drop designer, no developers or professional services needed. Easily connect to any tool in your environment to ensure complete protection. Hundreds of out-of-the-box templates to get you started in minutes. Start with automating a single step, expand your flow to complex branches. Best practice templates get you started fast and REST APIs help you customize as needed. Trigger flows from anywhere, web, Slack, command line, or automatically. Our infrastructure and operations undergo rigorous external audits and meet the highest grade of industry security, privacy and compliance standards.
  • 10
    Zeek

    Zeek

    The Zeek Project

    Zeek (formerly Bro) is the world’s leading platform for network security monitoring. Flexible, open source, and powered by defenders. Zeek has a long history in the open source and digital security worlds. Vern Paxson began developing the project in the 1990s under the name “Bro” as a means to understand what was happening on his university and national laboratory networks. Vern and the project’s leadership team renamed Bro to Zeek in late 2018 to celebrate its expansion and continued development. Zeek is not an active security device, like a firewall or intrusion prevention system. Rather, Zeek sits on a “sensor,” a hardware, software, virtual, or cloud platform that quietly and unobtrusively observes network traffic. Zeek interprets what it sees and creates compact, high-fidelity transaction logs, file content, and fully customized output, suitable for manual review on disk or in a more analyst-friendly tool like a security and information event management (SIEM) system.
    Starting Price: Free
  • 11
    Velociraptor

    Velociraptor

    Velociraptor

    At the press of a (few) buttons, perform targeted collection of digital forensic evidence simultaneously across your endpoints, with speed and precision. Continuously collect endpoint events such as event logs, file modifications and process execution. Centrally store events indefinitely for historical review and analysis. Actively search for suspicious activities using our library of forensic artifacts, then customize to your specific threat-hunting needs. It was developed by Digital Forensic and Incident Response (DFIR) professionals who needed a powerful and efficient way to hunt for specific artifacts and monitor activities across fleets of endpoints. Velociraptor provides you with the ability to more effectively respond to a wide range of digital forensic and cyber incident response investigations and data breaches.
  • 12
    MaxMind

    MaxMind

    MaxMind

    MaxMind GeoIP2 offerings identify the location and other characteristics of Internet users for a wide range of applications including content personalization, fraud detection, ad targeting, traffic analysis, compliance, geo-targeting, geo-fencing and digital rights management. GeoIP2 Precision Services provide you with our most accurate data without having to worry about hosting data on your servers or deploying updates. Accessed through an API or a manual file upload, our Precision Service offerings provide you with the most up-to-date data available. MaxMind's GeoIP2 Databases provide IP intelligence data for high volume environments. By hosting our databases locally, you eliminate any network latency and per-query charges.
  • 13
    Cisco Talos
    Meet Cisco Talos, the industry-leading threat intelligence group fighting the good fight. Cisco Talos is one of the largest commercial threat intelligence teams in the world, comprised of world-class researchers, analysts, and engineers. Industry-leading visibility, actionable intelligence, and vulnerability research drive rapid detection and protection for Cisco customers against known and emerging threats--and stop threats in the wild to protect the Internet at large. Cisco Talos is one of the largest and most trusted providers of cutting-edge security research globally. We provide the data Cisco Security products and services use to take action. The key differentiator of Talos is our process — seeing what is happening broadly across the threat landscape, acting on that data rapidly and meaningfully, and driving protection. Integral to that process is that Talos has more visibility than any other security vendor in the world and unique capabilities and scale in intelligence.
  • 14
    VirusTotal

    VirusTotal

    VirusTotal

    VirusTotal inspects items with over 70 antivirus scanners and URL/domain blocklisting services, in addition to a myriad of tools to extract signals from the studied content. Any user can select a file from their computer using their browser and send it to VirusTotal. VirusTotal offers a number of file submission methods, including the primary public web interface, desktop uploaders, browser extensions and a programmatic API. The web interface has the highest scanning priority among the publicly available submission methods. Submissions may be scripted in any programming language using the HTTP-based public API. VirusTotal can be useful in detecting malicious content and also in identifying false positives, normal and harmless items detected as malicious by one or more scanners. As with files, URLs can be submitted via several different means including the VirusTotal webpage, browser extensions and the API.
  • 15
    YARA

    YARA

    YARA

    YARA is a tool aimed at (but not limited to) helping malware researchers to identify and classify malware samples. With YARA you can create descriptions of malware families (or whatever you want to describe) based on textual or binary patterns. Each description, a.k.a rule, consists of a set of strings and a boolean expression which determine its logic. YARA-CI may be a useful addition to your toolbelt. This is GitHub application that provides continuous testing for your rules, helping you to identify common mistakes and false positives. The above rule is telling YARA that any file containing one of the three strings must be reported as silent_banker.
  • 16
    Chronicle Threat Intelligence
    Drive better detections with high quality, actionable, out-of-the-box threat detection content curated, built, and maintained by Google Cloud Threat Intelligence researchers. Native detection sets cover a variety of threats across vectors, including Windows-based attacks like ransomware, remote-access tools (RAT), infostealers, data exfiltration, and suspicious activity. Unlock new detection coverage with new analytics regularly built by Google Cloud Threat Intelligence researchers uncovering new and latent attacks. Use GCTI detections to build response actions and write rules customized to your environment. Leverage the VirusTotal Augment widget to drive efficiencies in SOC processes, and enable faster search for artifacts like domains, IPs, URLs or hashes. Gain context beyond your network perimeter, expand your telemetry and explore related VirusTotal IoCs in a graphical manner.
  • Previous
  • You're on page 1
  • Next