Illusive Integrations

Capitalize on the powerful synergies made possible by Illusive’s technology integration solutions

Power Your SOC with Real-Time Endpoint Forensics

Illusive offers a range of pre-built integrations and enables CEF/Syslog integration with any SIEM. Illusive can also ingest incidents from any other source and collect real-time host forensics of the same depth provided for Illusive-generated incidents. All incident records are manageable through Illusive’s console, and can be viewed using the Illusive Forensics Timeline.

Contact Us

SIEM Solutions

To integrate with any SIEM tool, Illusive sends data via the CEF/Syslog protocol.

HP ArcSight

Integrating Illusive with HP ArcSight log & event management solution creates a strong bi-directional relationship. Illusive feeds ArcSight reliable, real-time data such as incident reports and high fidelity alerts, while ArcSight makes its database available to Illusive so it may enrich its threat forensics. With this integration, customers benefit from a more complete, actionable perspective on activities in the system.


The integration between Illusive and Splunk’s SIEM and log managements solutions allows Illusive to obtain rich data that empowers its detection capabilities, data analysis process, and forensics data, while also feeding Splunk with reliable, real-time attack information and high fidelity alerts.

Mitigation Solutions

Cisco ISE & pxGrid

Eliminate APT attacks at the earliest possible stage by pairing Illusive’s high-fidelity detection with Cisco ISE & pxGrid’s mitigation capabilities. With this integration, users can define and execute automated mitigation sequences directly from the Illusive console, and automatically block attacks in real time.

Privilege Account Management Solutions

CyberArk Application Identity Manager

CyberArk provides a comprehensive solution for protecting, monitoring, detecting and responding to all privileged account activity. Illusive integrates with CyberArk Application Identity Manager to securely retrieve privileged credentials, secured and managed by CyberArk, to access hosts on the network for deceptions deployment and forensics collection. By integrating the CyberArk solution with Illusive, organizations benefit from the superior deception technology combined with the leading privileged accounts security solution.

Management Solutions

Illusive supports seamless integration with all management solutions, including open source tools such as Puppet and Ansible, and proprietary tools such as the below:

Microsoft SCCM

Microsoft System Center Configuration Manager (SCCM) allows administrators to manage application deployment and security of devices across an enterprise. Illusive integrates with SCCM to deploy and monitor deceptions so customers can maintain a unified deployment architecture and use their own deployment tools policies.


The Tanium platform offers endpoint visibility and control across an entire organization. The integration between Tanium and Illusive allows the user to deploy and monitor deceptions using his existing endpoint management & deployment tool.

Threat Protection Solutions

Google VirusTotal

Illusive syncs with VirusTotal to pool their collective forensic resources. From this integration, users can capitalize on reports that analyze processes on hosts and identify sources of infiltration.

Cisco Umbrella

By pairing Illusive with OpenDNS, admins are notified when there’s an attempt to reach a malicious site or IP address, and receive Illusive’s real-time, source-based forensics.

Contact Us