Integrations
When identity sources overlap, integration becomes a complex puzzle. Joining data from disparate systems is resource-intensive, slowing down operations and draining valuable power. A persistent cache is the key to unlocking performance in such scenarios.
Hydden provides the solution to all organizations that face the challenge of managing a diverse user base across numerous applications. Identity architects grapple with the complexities of presenting consistent identity views, often hierarchical or flat, to these diverse applications. A simple LDAP proxy falls short in addressing these multifaceted needs.
Hydden easily integrates with on-premise and cloud systems. Hydden connects and retrieves essential information effortlessly from Platforms, IDP’s, SaaS applications, cloud stores and databases, On-premise systems, applications and databases.
Here at Hydden, we refer to integrations as collectors that serve as gateways for our data sources. Collectors are part of our list of modules that can be configured for the Discovery process.
Cloud Integrations
In today’s increasingly cloud-centric world, organizations are rapidly adopting cloud-based applications and infrastructure. As the attack surface expands to include these cloud environments, ensuring the security of digital identities becomes paramount. Hydden provides a crucial bridge between on-premises and cloud-based systems, enabling organizations to gain comprehensive visibility and control over their identity landscape.
AWS
A cloud collector to discover Users, Service Accounts, Computer Accounts, Groups, Group Membership, MFA Configuration, and Status (enabled/disabled). The AWS collector provides visibility into users and service accounts that have access to the SaaS platforms.
For configuration details, refer to How to Configure an AWS Data Source.
Azure Entra ID
A cloud collector to discover Users, Service Accounts, Computer Accounts, Groups, Group Membership, MFA Configuration, and Status (enabled/disabled). The Azure collector provides visibility into users and service accounts that have access to the SaaS platforms.
For configuration details, refer to How to Configure an Azure Entra ID Data Source.
GitHub
A cloud collector to discover members of and organization and their associated team/groups.
For configuration details, refer to How to Configure a GitHub Data Source.
The Google Cloud Platform collector discovers Service Accounts, Roles, and Groups. The Google Workspace collector discovers User Accounts, Roles, and Groups.The Google collectors provide visibility into users and service accounts that have access to the SaaS platforms.
For configuration details, refer to How to Configure Google Cloud Platform and Workspace Data Sources.
Have I Been Pawned
Have I Been Pwned is a cloud collector to discover breach data. The collector creates visibility into which accounts and identities have been victim of publicly disclosed breaches.
Keeper
The collector collects all users of the Keeper vault for your organization.
Okta
A cloud collector to discover Users, Service Accounts, Computer Accounts, Groups, Group Membership, MFA Configuration, and Status (enabled/disabled). The Okta collector provides visibility into users and service accounts that have access to the SaaS platforms.
For configuration details, refer to How to Configure an Okta Data Source.
Salesforce
The Salesforce collector to discovers Users, Service Accounts, Computer Accounts, Groups, Group Membership, MFA Configuration, and Status (enabled/disabled). The collector has visibility into users and service accounts that have access to the SaaS platforms.
Slack
The Slack collector discovers Users and MFA Configuration. The collector has visibility into all users that have access to the application.
Database Integrations
Database integrations are the backbone of any effective identity platform. By seamlessly connecting to diverse databases, Hydden gains access to a wealth of critical identity data. These integrations enable real-time monitoring of user activities, privilege assignments, and access patterns, providing valuable insights to security teams.
PostgreSQL
A PostgreSQL collector discovers Users, Service Accounts, Computer Accounts, Groups, Group Memberships, and Status (enabled/disabled). The collector has visibility into all users and groups that have access to the database.
SQLServer
The SQLServer collector discovers Users, Service Accounts, Computer Accounts, Groups, Group Memberships, Status (enabled/disabled), and Federated Accounts (MSFT SQL only). The collector has visibility into all users and groups that have access to the database.
Data Center Integrations
A robust identity monitoring platform requires seamless integration with diverse data center environments. By connecting to critical systems such as Active Directory, LDAP, and cloud identity providers, organizations can gain real-time visibility into identity-related events and anomalies. These integrations empower security teams to proactively identify and mitigate potential threats, ensuring the integrity and security of their digital infrastructure.
Active Directory
The Active Directory collector discovers Users, Service Accounts, Computer Accounts, Groups, Group Memberships, and Status (enabled/disabled). The collector has visibility into all computer, user, and service accounts (both human and non-human) with access to the directory.
Apache (Linux)
The Apache (Linux) collector discovers Users, Groups, and Status (enabled/disabled). The collector has visibility into all users and groups that have access to the application by leveraging local client service on an organization’s network. No agent is installed on the server/application.
LDAP
The LDAP collector discovers Users, Groups, and Status (enabled/disabled). The collector has visibility into all users and groups that have access to the application by leveraging local client service on an organization’s network. No agent is installed on the server/application.
Linux Host
The Linux Host collector discovers Users, Groups, and Status (enabled/disabled). The collector has visibility into users and service accounts that have access to workstations and/or servers.
Windows and WindowsRm Host
Using either RPC or WinRM, the Hydden Windows Host collector discovers Users, Groups, and Status (enabled/disabled). The collector has visibility into users and service accounts that have access to workstations and/or servers.
Orchestration Integrations
Orchestration Integrations empower identity monitoring platforms to automate incident response, significantly reducing the time it takes to detect and mitigate identity threats. By seamlessly integrating with various security orchestration, automation, and response (SOAR) platforms, these integrations enable automated workflows to execute tasks such as disabling compromised accounts, triggering security alerts, and initiating incident investigations. Hydden’s proactive approach strengthens overall security posture and minimizes potential damage from identity-based attacks.
Kubernetes
The collector for the orchestration engine to discover Users, Groups, Group Membership, and Status (enabled/disabled). Has visibility into all users and groups that have access to the containers within a cluster.
Kubernetes Pods
The collector has visibility into all users and groups that have access on each container within the pod.