Skip to content

Commit c4d2705

Browse files
committed
Update technological-partners.md
1 parent 4257fc0 commit c4d2705

File tree

1 file changed

+8
-8
lines changed

1 file changed

+8
-8
lines changed

defender-endpoint/technological-partners.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Technological partners of Microsoft Defender XDR
33
ms.reviewer:
4-
description: View technological partners of Microsoft 365 Defender to enhance detection, investigation, and threat intelligence capabilities of the platform.
4+
description: View technological partners of Microsoft Defender XDR to enhance detection, investigation, and threat intelligence capabilities of the platform.
55
ms.service: defender-endpoint
66
ms.subservice: reference
77
ms.author: deniseb
@@ -14,7 +14,7 @@ ms.collection:
1414
- tier3
1515
ms.topic: article
1616
search.appverid: met150
17-
ms.date: 09/21/2024
17+
ms.date: 06/03/2025
1818
---
1919

2020
# Technological partners of Microsoft Defender XDR
@@ -23,7 +23,7 @@ ms.date: 09/21/2024
2323

2424
- Microsoft Defender XDR
2525
- Microsoft Defender for Endpoint
26-
- Microsoft Defender for Vulnerability Management
26+
- Microsoft Defender Vulnerability Management
2727
- Microsoft Defender for Office 365
2828
- Microsoft Defender for Identity
2929
- Microsoft Defender for Cloud Apps
@@ -33,7 +33,7 @@ ms.date: 09/21/2024
3333
> [!NOTE]
3434
> **Try our new APIs using MS Graph security API**. Find out more at: [Use the Microsoft Graph security API - Microsoft Graph | Microsoft Learn](/graph/api/resources/security-api-overview).
3535
36-
Microsoft Defender XDR supports third-party integrations to help secure users with effective threat protection, detection, investigation, and response, in various security fields of endpoints, vulnerability management, email, identities, cloud apps.
36+
Microsoft Defender XDR supports non-Microsoft software integration to help secure users with effective threat protection, detection, investigation, and response, in various security fields of endpoints, vulnerability management, email, identities, cloud apps.
3737

3838
The following are the solution's categories:
3939

@@ -55,18 +55,18 @@ The following are the solution's categories:
5555

5656
|Product name|Vendor|Description|
5757
|---|---|---|
58-
|[Microsoft Sentinel](/azure/sentinel/microsoft-365-defender-sentinel-integration)|Microsoft|Microsoft Sentinel is a scalable, cloud-native, security information and event management (SIEM) and security orchestration, automation, and response (SOAR) solution. Microsoft Sentinel delivers intelligent security analytics and threat intelligence across the enterprise, providing a single solution for attack detection, threat visibility, proactive hunting, and threat response.|
58+
|[Microsoft Sentinel](/azure/sentinel/microsoft-365-defender-sentinel-integration)|Microsoft|Microsoft Sentinel is a scalable, cloud-native, security information, and event management (SIEM) and security orchestration, automation, and response (SOAR) solution. Microsoft Sentinel delivers intelligent security analytics and threat intelligence across the enterprise, providing a single solution for attack detection, threat visibility, proactive hunting, and threat response.|
5959
|[Splunk](https://go.microsoft.com/fwlink/?linkid=2201963)|Splunk|The Microsoft Defender for Endpoint Add-on allows Splunk users to ingest all of the alerts and supporting information to their Splunk.|
6060
|[ArcSight](https://go.microsoft.com/fwlink/?linkid=2202142)|Micro Focus|ArcSight allows multiple analytics capabilities for correlation, search, UEBA, enhanced and automated response, and log management.|
6161
|[Elastic Security](https://go.microsoft.com/fwlink/?linkid=2201772)|Elastic|Elastic Security combines SIEM threat detection features with endpoint prevention and response capabilities in one solution.|
62-
|[IBM Security QRadar SIEM](https://go.microsoft.com/fwlink/?linkid=2201876)|IBM|IBM Security QRadar SIEM enables centralized visibility and intelligent security analytics to detect, investigate and respond to your critical cybersecurity threats.|
62+
|[IBM Security QRadar SIEM](https://go.microsoft.com/fwlink/?linkid=2201876)|IBM|IBM Security QRadar SIEM enables centralized visibility and intelligent security analytics to detect, investigate, and respond to your critical cybersecurity threats.|
6363
|[AttackIQ Platform](https://go.microsoft.com/fwlink/?linkid=2201971)|AttackIQ|AttackIQ Platform validates whether MDE is configured properly by launching continuous attacks safely on production assets.|
6464

6565
### Security orchestration, automation, and response (SOAR)
6666

6767
|Product name|Vendor|Description|
6868
|---|---|---|
69-
|[Microsoft Sentinel](https://go.microsoft.com/fwlink/?linkid=2201962)|Microsoft|Microsoft Sentinel is a scalable, cloud-native, security information and event management (SIEM) and security orchestration, automation, and response (SOAR) solution. Microsoft Sentinel delivers intelligent security analytics and threat intelligence across the enterprise, providing a single solution for attack detection, threat visibility, proactive hunting, and threat response.|
69+
|[Microsoft Sentinel](https://go.microsoft.com/fwlink/?linkid=2201962)|Microsoft|Microsoft Sentinel is a scalable, cloud-native, security information, and event management (SIEM) and security orchestration, automation, and response (SOAR) solution. Microsoft Sentinel delivers intelligent security analytics and threat intelligence across the enterprise, providing a single solution for attack detection, threat visibility, proactive hunting, and threat response.|
7070
|[ArcSight](https://go.microsoft.com/fwlink/?linkid=2202142)|Micro Focus|ArcSight provides multiple analytics capabilities for correlation, search, UEBA, enhanced and automated response, and log management.|
7171
|[Splunk SOAR](https://go.microsoft.com/fwlink/?linkid=2201773)|Splunk|Splunk SOAR orchestrates workflows and automates tasks in seconds to work smarter and respond faster.|
7272
|[Security Incident Response](https://go.microsoft.com/fwlink/?linkid=2201874)|ServiceNow|The ServiceNow® Security Incident Response application tracks the progress of security incidents from discovery and initial analysis, through containment, eradication, and recovery, and into the final post-incident review, knowledge base article creation, and closure.|
@@ -100,7 +100,7 @@ The following are the solution's categories:
100100
|[Aruba ClearPass Policy Manager](https://go.microsoft.com/fwlink/?linkid=2201878)|Aruba, a Hewlett Packard Enterprise company|Network Access Control applies consistent policies and granular security controls to wired and wireless networks|
101101
|[Vectra Network Detection and Response (NDR)](https://go.microsoft.com/fwlink/?linkid=2201969)|Vectra|Vectra applies AI & security research to detect and respond to cyber-attacks in real time.|
102102
|[Blue Hexagon for Network](https://go.microsoft.com/fwlink/?linkid=2201780)|Blue Hexagon|Blue Hexagon built the industry's first real-time deep learning platform for network threat protection.|
103-
|[CyberMDX](https://go.microsoft.com/fwlink/?linkid=2201880)|CyberMDX|Cyber MDX integrates comprehensive healthcare assets visibility, threat prevention and repose into your Microsoft Defender for Endpoint environment.|
103+
|[CyberMDX](https://go.microsoft.com/fwlink/?linkid=2201880)|CyberMDX|Cyber MDX integrates comprehensive healthcare assets visibility, threat prevention, and response into your Microsoft Defender for Endpoint environment.|
104104
|[HYAS Protect](https://www.hyas.com/hyas-protect)|HYAS|HYAS Protect utilizes authoritative knowledge of attacker infrastructure to proactively protect MDE endpoints from cyber attacks.|
105105
|[Better Mobile Security Platform](https://go.microsoft.com/fwlink/?linkid=2202043)|Better Mobile Security Inc.|Provides solution for Threat, Phishing, and Privacy Protection and Simulation.|
106106
|[Vulnerability Control](https://go.microsoft.com/fwlink/?linkid=2201965)|Skybox security|Global security posture management leader with solutions for vulnerability management and network security policy management.|

0 commit comments

Comments
 (0)