A Comprehensive View Of The Human Firewall
SecurityCoach uses standard APIs to quickly and easily integrate with your existing security products from vendors like CrowdStrike, Microsoft, Cisco, Netskope, Zscaler and more. Our ecosystem of technology partnerships is rapidly expanding to support our customers and strengthen the human firewall.
To allow SecurityCoach access to your security platforms, you’ll set up an integration in your KnowBe4 console. These integrations allow SecurityCoach to track when certain actions are detected. Setting up integrations is a quick and easy process, and we provide integration guides for each vendor on our Knowledge Base. Once integrated, events and other data from your security platforms will be displayed on your SecurityCoach dashboard.
Endpoint Security
Bitdefender
Endpoint Security
Carbon Black
Email & Web Security
Cisco
Email & Web Security
Cloudflare
SOAR / SIEM
Code42
Integrate your KnowBe4 SecurityCoach and Code42 Incydr platforms to watch for data security threats and coach users in real time when risky behaviors surface.
code 42
Endpoint Security
CrowdStrike
Endpoint Security
Cylance
Email & Web Security
Identity & Access Management
Other
Kevin Mitnick Security Awareness Training
You can use phishing data as an event source from your KMSAT console to create real-time coaching campaigns with the KMSAT integration for SecurityCoach.
Endpoint Security
Malwarebytes
Email & Web Security | Endpoint Security
Identity & Access Managment
Microsoft
Email & Web Security
Netskope
Identity & Access Management
OKTA
Email & Web Security
Proofpoint
Endpoint Security
SentinelOne
Communication
Slack
Use the KnowBe4 SecurityCoach integration with Slack to send real time coaching tips to your end users when risky events are detected.
Endpoint Security
Sonicwall
Endpoint Security
Sophos
Communication
Teams
Use the KnowBe4 SecurityCoach integration with Microsoft Teams to send real time coaching tips to your end users when risky events are detected.
Email & Web Security
Zscaler
Built-In Detection Rules
Detection rules specify what risky activity you want to track using the data provided by your integrated security vendors. SecurityCoach recommends rules based on common security topics in order of priority, with Very High and High Risk activity rules first.