A Comprehensive View Of The Human Firewall
SecurityCoach uses standard APIs to quickly and easily integrate with your existing security products from vendors like CrowdStrike, Microsoft, Cisco, Netskope, Zscaler and more. Our ecosystem of technology partnerships is rapidly expanding to support our customers and strengthen the human firewall.
To allow SecurityCoach access to your security platforms, you’ll set up an integration in your KnowBe4 console. These integrations allow SecurityCoach to track when certain actions are detected. Setting up integrations is a quick and easy process, and we provide integration guides for each vendor on our Knowledge Base. Once integrated, events and other data from your security platforms will be displayed on your SecurityCoach dashboard.
Endpoint Security

Bitdefender
Endpoint Security

Carbon Black
Email & Web Security

Cisco
Email & Web Security

Cloudflare
SOAR / SIEM

Code42
Integrate your KnowBe4 SecurityCoach and Code42 Incydr platforms to watch for data security threats and coach users in real time when risky behaviors surface.
code 42
Endpoint Security

CrowdStrike
Endpoint Security

Cylance
Email & Web Security
Identity & Access Management

Other

Kevin Mitnick Security Awareness Training
You can use phishing data as an event source from your KMSAT console to create real-time coaching campaigns with the KMSAT integration for SecurityCoach.
Endpoint Security

Malwarebytes
Email & Web Security | Endpoint Security
Identity & Access Managment

Microsoft
Email & Web Security

Netskope
Identity & Access Management

OKTA
Email & Web Security

Proofpoint
Endpoint Security

SentinelOne
Communication

Slack
Use the KnowBe4 SecurityCoach integration with Slack to send real time coaching tips to your end users when risky events are detected.
Endpoint Security

Sonicwall
Endpoint Security

Sophos
Communication

Teams
Use the KnowBe4 SecurityCoach integration with Microsoft Teams to send real time coaching tips to your end users when risky events are detected.
Email & Web Security

Zscaler
Built-In Detection Rules
Detection rules specify what risky activity you want to track using the data provided by your integrated security vendors. SecurityCoach recommends rules based on common security topics in order of priority, with Very High and High Risk activity rules first.