/ WIT OS · Integrations
Plug in your stack. Every signal. Every action.
WIT OS speaks your stack natively. 63+ connectors — typed, OAuth-first, tested in production — exposed to MAESTRO playbooks and reasoned over by Astute RAG.
/ Browse the catalog
Every tool you already trust. Already wired.
Filter by category or search by name. Each connector is natively typed, OAuth-first, tested in production, and exposed to MAESTRO playbooks.
Amazon Web Services
Compute, identity, network, data, and security primitives across every AWS region.
Microsoft Azure
Resource Manager, Entra ID, Defender for Cloud, and Sentinel — bidirectional.
Google Cloud
GCP projects, IAM, networking, BigQuery, and Chronicle SIEM telemetry.
Oracle Cloud
OCI tenancies, compartments, and security zones managed alongside the rest of the fabric.
DigitalOcean
Droplets, Kubernetes, and managed databases for lighter-weight workloads.
Cloudflare
Edge configuration, WAF rules, and DDoS posture continuously evaluated against policy.
Okta
Universal directory, MFA, and conditional access — fully observed and acted on.
Microsoft Entra ID
AzureAD signals, conditional access, and PIM — bidirectional including identity revocation.
Google Workspace
Directory, admin events, alerts, and DLP signals routed through Astute RAG.
JumpCloud
Cross-platform directory with policy-driven access decisions surfaced in the Admin Workspace.
Duo Security
MFA telemetry, risk-based authentication, and device trust.
Ping Identity
SSO and access management integrated into the cross-stack response layer.

CrowdStrike Falcon
Falcon EDR alerts feed into autonomous response; isolation actions go back through MAESTRO.
Microsoft Defender
Defender for Endpoint, Identity, and Cloud — first-class telemetry across the suite.
SentinelOne
Singularity XDR fused with the broader stack — endpoint actions trigger identity + cloud responses.
Sophos
Sophos Central endpoint events correlated with identity and email signals.
Trend Micro
Vision One telemetry and policy actions integrated through MAESTRO.
Intune
Device policy, configuration profiles, and Conditional Access actioned in real time.
Jamf
Apple device management — inventory, configuration, and security state across the fleet.
Splunk
Both source and sink — no double-bookkeeping. ES + SOAR fully integrated.
Microsoft Sentinel
Sentinel workspaces ingest WIT OS findings and emit incidents back for cross-stack response.
Elastic Security
Elastic Stack as both observability and SIEM — agents read and write rules.
Datadog
Metrics, logs, and APM signals into Astute RAG; alerts back via MAESTRO playbooks.
New Relic
APM, logs, and infra observability for EEOS experience reasoning.
Grafana
Dashboards, alerting, and Loki/Mimir/Tempo telemetry under one connector.
Sentry
Application errors and performance regressions surfaced into EEOS workflows.
Cisco
Catalyst, Meraki, and Umbrella telemetry reasoned over by ENOS.

Palo Alto Networks
Cortex XDR, Prisma Cloud, and NGFW signal orchestrated by ESOS for unified response.
Fortinet
FortiGate logs and policy actions correlated with the identity and cloud surfaces.
F5
BIG-IP and Distributed Cloud telemetry — included in ENOS posture reasoning.

Kentik
Flow data and traffic intelligence — the primary L3/L4 source feeding ENOS.
Arista
EOS switches and CloudVision — fabric state observed and acted on by ENOS agents.
Tenable
Asset inventory and Nessus findings deduplicated against KEV and EPSS prioritization.
Qualys
VMDR scans and policy compliance routed into the WIT ONE remediation workflow.
Rapid7
InsightVM and InsightIDR signals correlated with the rest of the SecOps fabric.
Wiz
Cloud posture findings reconciled against ECOS and prioritized by attack-path reachability.
Snyk
Application security findings — code, dependencies, containers, IaC.
Aqua Security
Container and Kubernetes runtime security feeding into ESOS hunting workflows.
ServiceNow
Bidirectional tickets, change requests, and approval workflows with the full ITSM lifecycle.
Jira
Issues, sprints, and approvals — every WIT OS action threadable back to a Jira ticket.
Linear
Linear issues and cycles for the engineering-first ITSM motion.
Zendesk
Customer-facing tickets coordinated with internal incident workflows.
Slack
Channel routing, threaded approvals, and verified comms playbooks.
Microsoft Teams
Team-channel notifications, adaptive cards, and approval workflows.
Telegram
Operator pager and verified-message delivery — used by the NHANCE agent fabric in production.
PagerDuty
Schedules, escalation policies, and incident lifecycle — pages back into the Admin Workspace.
Opsgenie
Atlassian Opsgenie alerts with on-call routing and escalation.

Abnormal AI
Behavioral email signals enriching identity-based threat hunting in ESOS.
Proofpoint
Email gateway findings and TAP/TRAP signals integrated into the response fabric.
Mimecast
Secure email gateway events fused with downstream endpoint and identity activity.
GitHub
Org events, secret-scanning findings, branch protection — repo-level posture under one fabric.
GitLab
Pipelines, audit events, and secrets management integrated into the response loop.
Docker
Image registries and scanned vulnerabilities visible to the Vuln Mgmt agent.
Kubernetes
Cluster, namespace, and workload state reasoned over by ECOS.
Terraform
IaC drift detection and approved-change pipelines wired into ECOS.
HashiCorp Vault
Secrets management and dynamic credentials brokered through MAESTRO.
Salesforce
CRM context routed into Adaptive Workspaces — every CSM/AE engagement narratively grounded.
HubSpot
Marketing/sales workflow signals available to revenue-focused workspaces.
Notion
Documents and team databases ingested into Astute RAG with citations preserved.
Box
Document workflow events and DLP signals fused with the rest of the SaaS posture.
Dropbox
File-event telemetry plus content classification surfaced to the security fabric.
Airtable
Ops-team databases connected through MAESTRO for low-code workflow extensions.
Workday
HRIS events that feed identity lifecycle automation — joiners, movers, leavers.
/ Missing something?
We ship custom connectors in 1-2 weeks.
If your stack has a connector we haven't built yet, our team scopes it during procurement and ships it before go-live. Every customer engagement comes with custom-connector capacity.

Ready to run on WIT OS?
Talk to the team about a managed deployment, a pilot, or a custom agent — we typically respond within an hour.