Skip to main content

Connectors Overview

This article details what a connector is, how to install a connector, and which connectors are supported in a Brinqa Platform.

What is a connector?

A connector is a stand-alone Java application that connects to a data source and retrieves data. With Brinqa connectors, organizations can automate, simplify, and streamline the process of extracting data for analysis while simultaneously accomplishing critical goals of data transformation, normalization, and contextualization.

The Brinqa connector framework formalizes the ways of interconnection between systems via Application Programming Interfaces (APIs), database extracts, and structured formats like comma-separated values (CSV), JavaScript Object Notation (JSON), and Extensible Markup Language (XML). The Brinqa connector library includes connectors to hundreds of systems covering configuration management database (CMDB), asset management, vulnerability monitoring, threat intelligence, patch management, identity provider (IDP), intrusion prevention system (IPS), security ratings, ticketing, task management, and more.

Brinqa connector store

The Integrations > Connectors page, also known as the Brinqa connector store, contains the connectors that Brinqa supports:

On this page, you can search for a specific connector by typing in the search bar, or you can click the Categories menu to filter them by their purpose (Application Security, Asset Management, Vulnerability Management, etc.).

You can also filter the connectors by selecting Installed to view the connectors you have already installed or Updates to see which connectors have available updates. Brinqa recommends that you apply updates to the connectors you have installed as soon as they are made available. You can also use the Integration+ filter to display connectors that come preconfigured with mappings to Brinqa's unified data models and attributes. See Integration+ connectors for additional information.

Install a connector

Before you can use a connector in a data integration, you must install it first. To do so, follow these steps:

  1. Navigate to the connector store (Integrations > Connectors).

  2. Click Integration+ to display the Integration+ connectors.

  3. Locate the connector you want to install and click Install.

    Install button on the connector

  4. Once the connector is installed, the Install button turns into a Use button. Click Use to configure the connector and begin importing data.

    Use the connector

Repeat these steps for each connector you want to use. For information on how to configure your connectors, see create a data integration and the individual connector documentation.

Update a connector

When updates for connectors become available, it's important to apply these updates to leverage the latest functionalities.

To see if a connector update is available, navigate to Integrations > Sources. The Connector version and Update available columns display the current version of the connector and whether an update is available or not, respectively.

To update an installed connector in the Brinqa Platform, follow these steps:

  1. Navigate to the connector store (Integrations > Connectors).

  2. Click the Updates filter. This displays all connectors with available updates.

  3. Locate the connector you want to update and click Update.

    Snyk 3.0.0 connector

  4. Once the connector has been updated, the Update button turns into a Use button.

    Snyk 3.0.2 connector

Updating connectors can introduce a variety of new functionalities, such as support for additional objects and attributes that the connector brings in, improvements to the connector's API framework, performance improvements, bug fixes, security enhancements, and more. Brinqa recommends that you update your connectors when updates are available to ensure you are taking full advantage of the latest improvements and capabilities. For more details on the latest connector updates, see Integration+ connector releases.

Post-update steps

After updating a connector, you must update your integration to use the latest version of the connector. To do so, follow these steps:

  1. Navigate to the integration page (Integration > Sources) and open your configuration.

  2. Click the Connector drop-down and select the most recent version.

  3. Click Next to save the changes.

  4. Run the integration to verify that everything functions as expected with the updated connector.

For more information about resolving issues related to outdated connector versions, see the Troubleshooting tip.

info

If you need to use a previous version of a connector, please contact Brinqa Support.

How Brinqa secures your connector credentials

Brinqa implements a robust security framework to ensure that sensitive data, such as your API keys, client secrets, and passwords, are securely stored and protected from unauthorized access. Some ways that Brinqa secures your credentials includes:

  • Encryption: All credentials, such as client secrets, passwords, and API keys, are encrypted before they are stored in Brinqa's secure vault database. We use industry-standard encryption algorithms to protect data both at rest and in transit. Your credentials are never exposed in plain text.

  • Secure storage: Credentials are stored in a secure vault within the Brinqa Platform. This vault provides a high level of security, ensuring that sensitive information is isolated and protected from unauthorized access.

  • Filesystem encryption: The underlying filesystem where encrypted credentials are stored is also encrypted. This additional layer of security ensures that, even if access to the storage layer is compromised, the data remains encrypted and protected.

  • Regular audits and monitoring: Brinqa conducts regular security audits to ensure that our systems comply with the latest security standards and best practices. Continuous monitoring is also in place to detect any anomalies or potential threats. This proactive approach allows us to address issues promptly and ensure the ongoing security of your credentials.

  • Compliance: Brinqa adheres to stringent security standards and compliance requirements. Brinqa's security practices are designed to meet industry regulations, and we continually update our security measures to align with evolving compliance standards.

Integration+ connectors

Integration+ connectors in the Brinqa Platform provide you with a streamlined method of bringing in and appropriately mapping your data. Integration+ connectors are pre-configured with the necessary mappings to Brinqa's unified data models (UDM) and attributes, offering you out-of-the-box compatibility with Brinqa's standardized schema for datasets. When you use an Integration+ connector, you save time and effort as you are not required to manually map the data from the connected data source to the UDM. The connector already understands how to normalize the incoming data into the format the Brinqa Platform expects, effectively "speaking the language" of the Platform.

Attribute mappings

In contrast to most Integration+ connectors, non-Integration+ connectors do not automatically map the data they retrieve to UDM attributes. In these cases, you, a member of your team, or a Brinqa Support specialist must manually configure the attribute mappings. Certain Integration+ connectors, such as Azure DevOps, Brinqa Connect, CSV Connector, JSON Connector, and ServiceNow, also require manual mappings due to the dynamic nature of the data they retrieve.

To view the attribute mappings, follow these steps:

  1. Navigate to Administration Administration button > Data > Models.

  2. Navigate to the data model you want to view the mappings for. For example, Host.

  3. On the left-hand side of the page, click Consolidation.

  4. Locate the section on the page titled "Attribute mappings" to view the mappings.

For additional information on attribute mappings, see Enrich data through attribute mappings.

List of connectors

The table below details the Integration+ connectors available in the Brinqa Platform:

Connector NameConnector CategoryTypes of Data Retrieved
Amazon DynamoDBAmazon Web ServicesAmazon DynamoDB Tables
Amazon EC2Amazon Web ServicesInstance
Amazon InspectorAmazon Web ServicesAWS EC2 Instance, Cloud Resource, Code Vulnerability, Code Vulnerability Definition, Network Reachability Finding, Network Reachability Finding Definition, Package Vulnerability, Package Vulnerability Definition
Aqua Security (SaaS)Container SecurityContainer, Container Image, Host, Vulnerability, Vulnerability Definition
Aqua Security (Server)Container SecurityContainer, Container Image, Host, Vulnerability, Vulnerability Definition
AssetNoteExternal Attack Surface ManagementCloud Asset, IP Address, Sub Domain, Vulnerability, Vulnerability Definition
AxoniusAsset ManagementDevice
Black DuckApplication SecurityComponent, Component Version, Open Source Finding, Open Source Finding Definition, Project, Project Version
BitSightSecurity Rating ServicesAsset, Company, Finding
BugcrowdApplication SecurityProgram, Submission
Burp Suite EnterpriseApplication SecurityIssue, Issue Definition, Scan, Site
Burp Suite ProfessionalApplication SecurityDynamic Code Finding, Dynamic Code Finding Definition, Site
CensysExternal Attack Surface ManagementCertificate, Domain, Host, Risk Event, Risk Instance, Risk Type, Storage Bucket
Checkmarx OneApplication SecurityApplication, Infrastructure Code As Finding, Open Source Code Finding, Open Source Code Finding Definition, Package, Project, Scan, Static Code Finding, Static Code Finding Definition
Checkmarx SASTApplication SecurityApplication, Assessment, Code Project, Open Source Finding, Open Source Finding Definition, Package, Static Code Finding, Static Code Finding Definition, Team
Check Point CloudGuardCloud SecurityAlert, Alert Definition, Cloud Resource
CISA Known Exploited VulnerabilitiesThreat IntelligenceExploited Vulnerability
CortexSystem ManagementCatalog, Person, Team
CrowdstrikeEndpoint ProtectionDevice, Vulnerability, Vulnerability Definition
CSV ConnectorFileDatabase records
CyCognitoAttack Surface ManagementCertificate, Domain, IP Address, IP Range, Issue, Issue Definition, Web Application
Device42Asset ManagementCustomer, Device, Subnet
First EPSSThreat IntelligenceEPSS
FleetAsset ManagementHost, Installed Package, Package, Vulnerability, Vulnerability Definition
Flexera Software Vulnerability ResearchVulnerability ManagementAdvisory, Product, Product Release, Vendor, Vulnerability Definition
Fortify Static Code AnalyzerApplication SecurityCode Project, Static Code Finding, Static Code Finding Definition
Fortify WebInspectApplication SecurityDynamic Code Finding, Finding, Site
GitLabApplication SecurityCode Project, Code Repository, Open Source Finding, Open Source Finding Definition, Package, Person, Static Code Finding, Static Code Finding Definition
GitHubApplication SecurityCode Repository, Open Source Finding, Open Source Finding Definition, Package, Secret Scanning Alert, Secret Scanning Alert Definition, Static Code Finding , Static Code Finding Definition
Google Cloud Asset InventoryGoogle CloudCompute Instance
Google Security Command CenterGoogle CloudBucket, Compute Instance, Finding, Finding Definition, Firewall
HackerOneApplication SecurityActivity, Pentest Finding, Pentest Finding Definition, Site, Weakness
InfoBlox DDINetwork ManagementHost, Network
IntigritiApplication SecurityPentest Finding, Pentest Finding Definition, Program, Site
InvictiApplication SecurityIssue, Issue Definition, Scan, Website
Ivanti Security ControlsPatch ManagementAssessed Machine, CVE, Detected Patch State, Machine, Patch, Patch Applies To, Patch Scan, Product
Jamf ProEndpoint ManagementComputer, Installed Software, Mobile Device, Person, Software
JFrog ArtifactoryApplication SecurityFile, Project, Repository, User
JFrog XrayApplication SecurityVulnerability, Vulnerability Definition
Jira CloudIT Service ManagementIssue
Jira Data CenterIT Service ManagementIssue
JSON ConnectorFileDatabase records
LDAPDirectory ServicesComputer, Group, Printer, Site, Subnet, User
LeanIX EAMSystem ManagementApplication, Business Capability, Data Object, Interface, IT Component, Process, Project, Provider, Subscription, Technical Stack, User, User Group
ManageEngine ServiceDesk PlusIT Service ManagementRequest
MandiantThreat IntelligenceVulnerability
Mend.ioApplication SecurityApplication, Code Project, Open Source Finding, Open Source Finding Definition, Package, Static Code Finding, Static Code Finding Definition
Microsoft Azure ComputeMicrosoft AzureVirtual Machine
Microsoft Azure DevOpsIT Service ManagementWork Items
Microsoft Defender for CloudMicrosoft AzureAlert, Alert Definition, Assessment, Assessment Metadata, Asset
Microsoft Defender for EndpointEndpoint ProtectionMachine, Vulnerability, Vulnerability Definition
Microsoft Endpoint Configuration ManagementConfiguration ManagementAsset, Software Install, Software Product
Microsoft IntuneEndpoint ManagementHost, Mobile Device
Microsoft Security Response CenterThreat IntelligenceProduct, Security Bulletin, Security Update
NetBoxNetwork ManagementCluster, Device, Prefixes, Virtual LAN, Virtual Machine
NIST NVDThreat IntelligenceProduct, Vulnerability, Weakness
Noname SecurityAPI SecurityApplication, Dynamic Code Finding, Dynamic Code Finding Definition, Site
NowSecure AutoApplication SecurityApplication, Assessment, Dynamic Code Finding, Dynamic Code Finding Definition, Static Code Finding, Static Code Finding Definition, Vulnerability Audit Record
OnapsisSystem, Applications, Products (SAP) SecurityAsset, Vulnerability, Vulnerability Definition
OpsLevelSystem ManagementInfrastructure, Repository, Service, Team, User
OrcaCloud SecurityAlert, Alert Definition, Cloud Account, Container, Container Image, Database, Function, Package, Storage, User, Virtual Machine, Virtual Machine Image, Vulnerability, Vulnerability Definition, Vulnerability Package
PlexTracApplication SecurityAsset, Assessment, Client, Finding
Prisma CloudCloud SecurityAccount Group, Cloud Account, Cloud Resource, Violation, Violation Definition
Prisma Cloud ComputeContainer SecurityCloud Service, Code Repository, Container, Container Image, Host, Serverless, Violation, Violation Definition, Vulnerability, Vulnerability Definition
Qualys Container SecurityContainer SecurityCompliance Details, Container, Control, Exception, Host, Image, Registry, Vulnerability Container, Vulnerability Image
Qualys Cybersecurity Asset ManagementAsset ManagementAsset, Installed Software, Software
Qualys Policy ComplianceCompliance ManagementControl, Host, Violation
Qualys Policy Compliance Reporting ServiceCompliance ManagementHost, Policy, Violation, Violation Definition
Qualys Vulnerability ManagementVulnerability ManagementHost, Vulnerability, Vulnerability Definition
Qualys Web Application ScanningApplication SecurityApplication, Finding, Vulnerability Definition
RAD SecurityCloud SecurityCluster, Finding, Finding Definition, Image, Plugin, Resource, Threat Vector, Threat Vector Definition
Rapid7 InsightAppSecApplication SecurityApplication, Dynamic Code Finding, Dynamic Code Finding Definition, Site
Rapid7 InsightCloudSecCloud SecurityAccess Key, Bucket, Cloud Account, Cloud Log Configuration, Encryption Key, User Account, Violation, Violation Definition, Virtual Machine
Rapid7 InsightVMVulnerability ManagementHost, Vulnerability, Vulnerability Definition
Rapid7 Nexpose Data WarehouseVulnerability ManagementHost, Vulnerability, Vulnerability Definition
Rapid7 NexposeVulnerability ManagementAsset, Vulnerability, Vulnerability Definition
Recorded FutureThreat IntelligenceVulnerability Risk, Vulnerability Risk Indicator
Red Hat SatelliteSystem ManagementErrata, Host, Installed Package, Package, Product, Repository, Subscription
runZeroAsset ManagementAsset, Vulnerability, Vulnerability Definition
SemgrepApplication SecurityCode Project, Static Code Finding, Static Code Finding Definition
SentinelOneEndpoint ProtectionApplication, Application Install, Device
ServiceNowIT Service ManagementApplication, Business Service, CI Relationship, Cluster, Communication Device, Computer, Group, Group Member, Location, Mass Storage Device, Network Gear, Printer, Server, Task, User, Virtual Machine Instance
SnykApplication SecurityComponent, Ignore, Open Source Issue, Open Source Issue Definition, Project, Static Code Issue, Static Code Issue Definition, Violation, Violation Definition
SonarQubeApplication SecurityCode Project, Static Code Finding, Static Code Finding Definition
Sonatype Nexus IQApplication SecurityApplication, Component, Policy Violation, Policy Violation Definition, Remediation, Security Issue, Security Issue Definition
SQL ConnectorData StoreDatabase Records
Tanium AssetAsset ManagementAsset
Tenable NessusVulnerability ManagementHost, Scan, Vulnerability, Vulnerability Definition
Tenable Web Application ScanningApplication SecuritySite, Vulnerability, Vulnerability Definition
Tenable.ioVulnerability ManagementAssessment, Host, Vulnerability, Vulnerability Definition
Tenable.scVulnerability ManagementHost, Vulnerability, Vulnerability Definition
Trend Micro Cloud ConformityCloud SecurityAccess Controls Role, Account, Check, Event, Group, Report, Service, User
Trend Micro Deep SecurityEndpoint ProtectionComputer, Computer Group, Computer Intrusion Prevention, Intrusion Prevention
VeracodeApplication SecurityApplication, Component, Dynamic Code Finding, Dynamic Code Finding Definition, Open Source Finding, Open Source Finding Definition, Pentest Finding, Pentest Finding Definition, Site, Static Code Finding, Static Code Finding Definition
VulnDBVulnerability ManagementProduct, Product Version, Vendor, Vulnerability
watchTowrExternal Attack Surface ManagementCloud Storage, Container, Domain, Finding, Finding Definition, IP, IP Range, Mobile Application, Repository, SaaS Platform, Subdomain
WhiteHat SentinelApplication SecurityApplication, Attack Vector, Finding, Issue, Site, Vulnerability Definition
WizCloud SecurityBackup Service, Bucket, CI/CD Service, Compute Instance Group, Container, Container Image, Container Registry, Container Service, DaemonSet, Database Server, Deployment, Encryption Key, File System Service, Firewall, Issue, Issue Definition, Kubernetes Cluster, Raw Access Policy, Resource Group, Serverless, Storage Account, Subscription, Virtual Machine, Virtual Machine Image, Virtual Network, Vulnerability, Vulnerability Definition, Web Service