Zscaler Deception × Tines

Integrating Tines and Zscaler Deception offers streamlined detection and automated response to security threats, enhancing overall cybersecurity posture with minimal manual intervention.

Pre-built templates

With Tines, you can easily take any action that has a defined API. We've already pre-built some of the most popular ones for you, so you can build quickly.

Unsolate a Carbon Black Isolate
Unisolate CrowdStrike Falcon IPs
Unisolate Checkpoint Firewall
Test VMware Carbon Black EDR Settings
Test CrowdStrike Falcon Settings
Test Check Point Settings
Set CrowdStrike Falcon Setting
Set Check Point Firewall Setting
Set Carbon Black Setting
Reset CrowdStrike Falcon setting
Reset Check Point Firewall settings
Isolate an attacker using Zscaler Private Access
Get whitelisted issues for a given domain
Get VMware Carbon Black EDR Setting
Get the risk remediation roadmap based on scan results
Get Policy Packages
Get Policy Layer
Get list of Isolated IPs
Get list of IoC IP indicators added to CrowdStrike
Get list of IoC Hash indicators added to CrowdStrike

Build your own connections

With Tines, you can easily take any action that has a defined API using an HTTP request. To build even more quickly, copy a cURL command and paste it into the storyboard.

cURL request

curl -v -X GET --location "https://api.nasa.gov/neo/rest/v1/neo/browse?api_key=DEMO_KEY" -H 'Content-Type: application/json'

Paste in your Tines story

Trusted by industry innovators

CanvaCode42CoinbaseDropboxElasticNotion
MarsMcKessonOpenTableSnowflakeReddit

Built by you,
powered by Tines

Already have an account? Log in.