Connectors Overview
This article details what a connector is, how to install a connector, and which connectors are supported in a Brinqa Platform.
What is a connector?
A connector is a stand-alone Java application that connects to a data source and retrieves data. With Brinqa connectors, organizations can automate, simplify, and streamline the process of extracting data for analysis while simultaneously accomplishing critical goals of data transformation, normalization, and contextualization.
The Brinqa connector framework formalizes the ways of interconnection between systems via Application Programming Interfaces (APIs), database extracts, and structured formats like comma-separated values (CSV), JavaScript Object Notation (JSON), and Extensible Markup Language (XML). The Brinqa connector library includes connectors to hundreds of systems covering configuration management database (CMDB), asset management, vulnerability monitoring, threat intelligence, patch management, identity provider (IDP), intrusion prevention system (IPS), security ratings, ticketing, task management, and more.
Brinqa connector store
The Integrations > Connectors page, also known as the Brinqa connector store, contains the connectors that Brinqa supports:
On this page, you can search for a specific connector by typing in the search bar, or you can click the Categories menu to filter them by their purpose (Application Security, Asset Management, Vulnerability Management, etc.).
You can also filter the connectors by selecting Installed to view the connectors you have already installed or Updates to see which connectors have available updates. Brinqa recommends that you apply updates to the connectors you have installed as soon as they are made available. You can also use the Integration+ filter to display connectors that come preconfigured with mappings to Brinqa's unified data models and attributes. See Integration+ connectors for additional information.
Install a connector
Before you can use a connector in a data integration, you must install it first. To do so, follow these steps:
-
Navigate to the connector store (Integrations > Connectors).
-
Click Integration+ to display the Integration+ connectors.
-
Locate the connector you want to install and click Install.
-
Once the connector is installed, the Install button turns into a Use button. Click Use to configure the connector and begin importing data.
Repeat these steps for each connector you want to use. For information on how to configure your connectors, see create a data integration and the individual connector documentation.
Update a connector
When updates for connectors become available, it's important to apply these updates to leverage the latest functionalities. To update an installed connector in the Brinqa Platform, follow these steps:
-
Navigate to the connector store (Integrations > Connectors).
-
Click the Updates filter. This displays all connectors with available updates.
-
Locate the connector you want to update and click Update.
-
Once the connector has been updated, the Update button turns into a Use button.
Updating connectors can introduce a variety of new functionalities, such as support for additional objects and attributes that the connector brings in, improvements to the connector's API framework, performance improvements, bug fixes, security enhancements, and more. Brinqa recommends that you update your connectors when updates are available to ensure you are taking full advantage of the latest improvements and capabilities. For more details on the latest connector updates, see Integration+ connector releases.
Integration+ connectors
Integration+ connectors in the Brinqa Platform provide you with a streamlined method of bringing in and appropriately mapping your data. Integration+ connectors are pre-configured with the necessary mappings to Brinqa's unified data models (UDM) and attributes, offering you out-of-the-box compatibility with Brinqa's standardized schema for data sets. When you use an Integration+ connector, you save time and effort as you are not required to manually map the data from the connected data source to the UDM. The connector already understands how to normalize the incoming data into the format the Brinqa Platform expects, effectively "speaking the language" of the Platform.
Attribute mappings
In contrast to Integration+ connectors, when you use a non-Integration+ connector, the data retrieved by the connector does not automatically map to the UDM attributes. In this case, you or someone from your team must manually configure the attribute mappings.
To view the attribute mappings, follow these steps:
-
Navigate to Administration > Data > Models.
-
Navigate to the data model you want to view the mappings for. For example, Host.
-
On the left-hand side of the page, click Consolidation.
-
Locate the section on the page titled "Attribute mappings" to view the mappings.
For additional information on attribute mappings, see Enrich data through attribute mappings.
List of connectors
The table below details the Integration+ connectors available in the Brinqa Platform:
Connector Name | Connector Category | Types of Data Retrieved |
---|---|---|
Amazon EC2 | Amazon Web Services | Instance |
Aqua Security | Container Security | Container, Container Image, Host, Vulnerability, Vulnerability Definition |
Axonius | Asset Management | Device |
Black Duck | Application Security | Component, Component Version, Open Source Finding, Open Source Finding Definition, Project, Project Version |
Burp Suite Enterprise | Application Security | Issue, Issue Definition, Scan, Site |
Burp Suite Professional | Application Security | Dynamic Code Finding, Dynamic Code Finding Definition, Site |
Checkmarx One | Application Security | Application, Infrastructure Code As Finding, Open Source Code Finding, Open Source Code Finding Definition, Package, Project, Scan, Static Code Finding, Static Code Finding Definition |
Check Point CloudGuard | Cloud Security | Alert, Alert Definition, Cloud Resource |
CISA Known Exploited Vulnerabilities | Threat Intelligence | Exploited Vulnerability |
Crowdstrike | Endpoint Protection | Device, Vulnerability, Vulnerability Definition |
CSV Connector | File | Database records |
CyCognito | Attack Surface Management | Certificate, Domain, IP Address, IP Range, Issue, Issue Definition, Web Application |
Device42 | Asset Management | Customer, Device, Subnet |
First EPSS | Threat Intelligence | EPSS |
Fortify Static Code Analyzer | Application Security | Code Project, Static Code Finding, Static Code Finding Definition |
Fortify WebInspect | Application Security | Dynamic Code Finding, Finding, Site |
GitHub | Application Security | Code Repository, Open Source Finding, Open Source Finding Definition, Package, Secret Scanning Alert, Secret Scanning Alert Definition, Static Code Finding , Static Code Finding Definition |
Google Cloud Asset Inventory | Google Cloud | Compute Instance |
HackerOne | Application Security | Activity, Pentest Finding, Pentest Finding Definition, Site, Weakness |
Intigriti | Application Security | Pentest Finding, Pentest Finding Definition, Program, Site |
Invicti | Application Security | Issue, Issue Definition, Scan, Website |
Jamf Pro | Endpoint Management | Computer, Installed Software, Mobile Device, Person, Software |
JFrog Artifactory | Application Security | File, Project, Repository, User |
JFrog Xray | Application Security | Vulnerability, Vulnerability Definition |
Jira Cloud | IT Service Management | Issue |
Jira Data Center | IT Service Management | Issue |
JSON Connector | File | Database records |
LDAP | Directory Services | Computer, Group, Printer, Site, Subnet, User |
LeanIX EAM | System Management | Application, Business Capability, Data Object, Interface, IT Component, Process, Project, Provider, Subscription, Technical Stack, User, User Group |
ManageEngine ServiceDesk Plus | IT Service Management | Request |
Mandiant | Threat Intelligence | Vulnerability |
Mend.io | Application Security | Application, Code Project, Open Source Finding, Open Source Finding Definition, Package, Static Code Finding, Static Code Finding Definition |
Microsoft Azure Compute | Microsoft Azure | Virtual Machine |
Microsoft Defender for Cloud | Microsoft Azure | Alert, Alert Definition, Assessment, Assessment Metadata, Asset |
Microsoft Defender for Endpoint | Endpoint Protection | Machine, Vulnerability, Vulnerability Definition |
Microsoft Intune | Endpoint Management | Host, Mobile Device |
NetBox | Network Management | Cluster, Device, Prefixes, Virtual LAN, Virtual Machine |
NIST NVD | Threat Intelligence | Product, Vulnerability, Weakness |
NowSecure Auto | Application Security | Application, Assessment, Dynamic Code Finding, Dynamic Code Finding Definition, Static Code Finding, Static Code Finding Definition, Vulnerability Audit Record |
Onapsis | System, Applications, Products (SAP) Security | Asset, Vulnerability, Vulnerability Definition |
Prisma Cloud | Cloud Security | Account Group, Cloud Account, Cloud Resource, Violation, Violation Definition |
Prisma Cloud Compute | Container Security | Cloud Service, Code Repository, Container, Container Image, Host, Serverless, Violation, Violation Definition, Vulnerability, Vulnerability Definition |
Qualys Policy Compliance | Compliance Management | Control, Host, Violation |
Qualys Vulnerability Management | Vulnerability Management | Host, Vulnerability, Vulnerability Definition |
Qualys Web Application Scanning | Application Security | Application, Finding, Vulnerability Definition |
Rapid7 InsightAppSec | Application Security | Application, Dynamic Code Finding, Dynamic Code Finding Definition, Site |
Rapid7 InsightVM | Vulnerability Management | Host, Vulnerability, Vulnerability Definition |
Rapid7 Nexpose Data Warehouse | Vulnerability Management | Host, Vulnerability, Vulnerability Definition |
Recorded Future | Threat Intelligence | Vulnerability Risk, Vulnerability Risk Indicator |
runZero | Asset Management | Asset, Vulnerability, Vulnerability Definition |
Semgrep | Application Security | Code Project, Static Code Finding, Static Code Finding Definition |
SentinelOne | Endpoint Protection | Application, Application Install, Device |
ServiceNow | IT Service Management | Application, Business Service, CI Relationship, Cluster, Communication Device, Computer, Group, Group Member, Location, Mass Storage Device, Network Gear, Printer, Server, Task, User, Virtual Machine Instance |
Snyk | Application Security | Component, Ignore, Open Source Issue, Open Source Issue Definition, Project, Static Code Issue, Static Code Issue Definition, Violation, Violation Definition |
SonarQube | Application Security | Code Project, Static Code Finding, Static Code Finding Definition |
SQL Connector | Data Store | Database Records |
Tenable Nessus | Vulnerability Management | Host, Scan, Vulnerability, Vulnerability Definition |
Tenable Web Application Scanning | Application Security | Site, Vulnerability, Vulnerability Definition |
Tenable.io | Vulnerability Management | Assessment, Host, Vulnerability, Vulnerability Definition |
Tenable.sc | Vulnerability Management | Host, Vulnerability, Vulnerability Definition |
Veracode | Application Security | Application, Component, Dynamic Code Finding, Dynamic Code Finding Definition, Open Source Finding, Open Source Finding Definition, Pentest Finding, Pentest Finding Definition, Site, Static Code Finding, Static Code Finding Definition |
VulnDB | Vulnerability Management | Product, Product Version, Vendor, Vulnerability |
WhiteHat Sentinel | Application Security | Application, Attack Vector, Finding, Issue, Site, Vulnerability Definition |
Wiz | Cloud Security | Backup Service, Bucket, CI/CD Service, Compute Instance Group, Container, Container Image, Container Registry, Container Service, DaemonSet, Database Server, Deployment, Encryption Key, File System Service, Firewall, Issue, Issue Definition, Kubernetes Cluster, Raw Access Policy, Resource Group, Serverless, Storage Account, Subscription, Virtual Machine, Virtual Machine Image, Virtual Network, Vulnerability, Vulnerability Definition, Web Service |