Binary Defense Subprocessors
Security
Binary Defense provides advanced cybersecurity solutions, including managed detection and response services, to protect organizations from evolving cyber threats.
| Name | Category | Purpose | Country | Data Processed |
|---|---|---|---|---|
| DROPZONE.AI, INC. | AI | AI-driven autonomous investigation and security operations automation platform. | - | |
| Google LLC ↗ PP | Cloud Infrastructure | Log Management and Monitoring Platform (SecOps) Threat Intel Platform (Google Threat Intelligence) | - | |
| Twilio Inc. ↗ PP | Communications | Twilio provides Binary Defense with automated voice call capabilities used to notify clients in response to priority SOC incidents. | - | |
| Palo Alto Networks, Inc. ↗ PP | Security | Log Correlation and Monitoring Platform Log Management and Monitoring Platform Unified Data Management Platform | - | |
| Tidal Cybersecurity | Security | Provide analytic functions to fuse threat intelligence, threat models, and security tooling configuration to generate risk and confidence scores based on current detection coverage. | - | |
| D3 Security Management Systems Inc. | Security | *if Client is leveraging* Log Correlation and Monitoring Platform | - | |
| ServiceNow, Inc. ↗ PP | IT Service Management | Customer Service Ticketing Software | - | |
| PagerDuty, Inc. ↗ PP | Communications | *if Client is leveraging* Notification Service for Incident Management | - | |
| AlienVault, Inc. | Security | *if Client is leveraging and purchasing access to Binary Defense’s multi-tenant instance* Log Management and Monitoring Platform | - | |
| Microsoft Corporation (Sentinel) ↗ PP | Cloud Infrastructure | *if Client is leveraging and purchasing access to Binary Defense’s multi-tenant instance or purchasing Vision* Log Management and Monitoring Platform | - | |
| Devo Technology, Inc. | Security | *if Client is leveraging and purchasing access to Binary Defense’s multi-tenant instance* Log Management and Monitoring Platform | - | |
| Sumo Logic, Inc. ↗ PP | Analytics | *if Client is leveraging and purchasing access to Binary Defense’s multi-tenant instance* Log Management and Monitoring Platform | - | |
| ExtraHop ↗ PP | Security | Log Management and Monitoring Platform | - | |
| LinkSquares | Legal | Legal management | - | |
| SAGE | Finance | Finance management | - | |
| Confluence | Productivity | Project management and collaboration | - | |
| Asana ↗ PP | Productivity | Project management | - | |
| LucidChart ↗ PP | Productivity | Flowchart and Graphs | - | |
| ProofPoint ↗ PP | Security | Email security | - | |
| Slack ↗ PP | Communications | Communications Platform | - | |
| Zoom ↗ PP | Communications | Communications Platform | - | |
| AWS ↗ | Cloud Infrastructure | Service Hosting | - | |
| Azure ↗ | Cloud Infrastructure | Service Hosting | - | |
| Intel471 Titan | Security | Threat Intel Platform | - | |
| Domain Tools Iris Detect | Security | Internet infrastructure detection, monitoring, and enforcement tool | - | |
| SalesForce ↗ PP | CRM | Customer relationship management system | - | |
| Joe Sandbox | Security | Automated malware analysis | - | |
| Binalyze | Security | Investigation and incident response automation platform | - |
No changes recorded yet. Changes will appear here after the next scan detects updates.
Summary
28
Total Subprocessors
3
Countries
10
Categories
93%
in United States
Subprocessors by Country
Subprocessors by Category
Biggest overlap with
Other companies using the most of the same subprocessors
Common in your industry
Top subprocessors used by other Security companies