{"id":35324,"date":"2021-05-07T07:18:07","date_gmt":"2021-05-07T07:18:07","guid":{"rendered":"https:\/\/d3securitymaivdigital.local\/?post_type=partners&#038;p=35324"},"modified":"2025-03-27T17:11:06","modified_gmt":"2025-03-27T17:11:06","slug":"stellar-cyber","status":"publish","type":"d3-integration","link":"https:\/\/d3security.com\/integrations\/stellar-cyber\/","title":{"rendered":"Stellar Cyber"},"content":{"rendered":"\n<div class=\"wp-block-d3-security-integration-hero alignfull is-layout-constrained\" x-data=\"wp_block_d3_security_integration_hero\"><div class=\"inner-blocks alignwide is-layout-flow\">\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-container-core-group-is-layout-41c06ba8 wp-block-group-is-layout-constrained\">\n<p class=\"has-text-align-center is-style-kicker\"><strong>Stellar Cyber + D3 Morpheus<\/strong><\/p>\n\n\n\n<h1 class=\"wp-block-heading has-text-align-center\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-orange-color\">Bring Together<\/mark> the Power of Open XDR and Morpheus<\/strong><\/h1>\n<\/div>\n<\/div><div class=\"background-svg alignfull\"><svg data-src=\"https:\/\/d3security.com\/wp-content\/themes\/d3-security\/assets\/images\/bg-hero-integration.svg\" data-unique-ids=\"disabled\" data-cache=\"disabled\" width=\"3106\" height=\"1128\"><\/svg><div class=\"integration-logo\"><img decoding=\"async\" src=\"https:\/\/d3security.com\/wp-content\/uploads\/2024\/07\/stellarcyber.svg\"\/><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-group alignfull has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\" style=\"padding-top:var(--wp--preset--spacing--50);padding-bottom:var(--wp--preset--spacing--70)\">\n<div class=\"wp-block-group alignwide is-layout-flow wp-block-group-is-layout-flow\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<p class=\"has-lavender-color has-text-color has-link-color has-x-large-font-size wp-elements-5b9d0bd3df5dcc9737db4532e155b189\">D3 Morpheus\u2019s integration with Stellar Cyber Open XDR multiplies the investigation and response power of each platform, breaking down tool silos and integrating across the stack. MSSPs and internal security teams use Morpheus and Stellar Cyber to create automated workflows for alert detection, analysis, and response.<\/p>\n\n\n\n<p><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<div class=\"wp-block-d3-security-icon-with-content color-grape size-16 has-mask-color\" style=\"--mask-color:var(--wp--preset--color--grape);--mask-hex:#8669C4;--mask-image:url('https:\/\/d3security.com\/wp-content\/uploads\/2024\/07\/icon-post-type-blog.svg');--size:16px\"><div class=\"icon\"><\/div><div>\n<p><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-grape-color\"><strong>Ingest data<\/strong><\/mark> from all your tools and turn alerts into high-fidelity incidents<\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-d3-security-icon-with-content color-grape size-16 has-mask-color\" style=\"--mask-color:var(--wp--preset--color--grape);--mask-hex:#8669C4;--mask-image:url('https:\/\/d3security.com\/wp-content\/uploads\/2024\/07\/icon-intelligence.svg');--size:16px\"><div class=\"icon\"><\/div><div>\n<p><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-grape-color\"><strong>Leverage AI <\/strong><\/mark>in incident response<\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-d3-security-icon-with-content color-grape size-16 has-mask-color\" style=\"--mask-color:var(--wp--preset--color--grape);--mask-hex:#8669C4;--mask-image:url('https:\/\/d3security.com\/wp-content\/uploads\/2024\/07\/icon-reduce.svg');--size:16px\"><div class=\"icon\"><\/div><div>\n<p><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-grape-color\">Filter<\/mark><\/strong> out alert noise<\/p>\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-d3-security-promo-bar alignfull is-layout-constrained\"><div class=\"alignwide\"><div class=\"promo-heading\"><div class=\"has-xx-large-font-size\">Get the <strong>D3 Integrations Guide<\/strong><\/div><\/div><div class=\"inner-blocks\">\n<div class=\"wp-block-leadin-hubspot-form-block \">\n\t\t\t\t\t\t<script>\n\t\t\t\t\t\t\twindow.hsFormsOnReady = window.hsFormsOnReady || [];\n\t\t\t\t\t\t\twindow.hsFormsOnReady.push(()=>{\n\t\t\t\t\t\t\t\thbspt.forms.create({\n\t\t\t\t\t\t\t\t\tportalId: 281391,\n\t\t\t\t\t\t\t\t\tformId: \"b4218879-fb73-4b81-8c5f-b90de40b252b\",\n\t\t\t\t\t\t\t\t\ttarget: \"#hbspt-form-1776720072000-2415350207\",\n\t\t\t\t\t\t\t\t\tregion: \"na1\",\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t})});\n\t\t\t\t\t\t<\/script>\n\t\t\t\t\t\t<div class=\"hbspt-form\" id=\"hbspt-form-1776720072000-2415350207\"><\/div><\/div>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-group alignfull has-global-padding is-layout-constrained wp-container-core-group-is-layout-03795e95 wp-block-group-is-layout-constrained\" style=\"margin-top:0;margin-bottom:0;padding-top:0;padding-bottom:var(--wp--preset--spacing--70)\">\n<div class=\"wp-block-d3-security-section-heading alignfull color-midnight is-layout-\" style=\"--content-size:;--color:var(--wp--preset--color--midnight);--hex:#2D2147\"><div class=\"section-header-separator alignfull\"><\/div><div class=\"inner-blocks is-layout-flow wp-block-d3-security-section-heading-is-layout-flow\">\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<h2 class=\"wp-block-heading has-text-align-center\"><strong><strong>Benefits and Capabilities<\/strong><\/strong><\/h2>\n<\/div>\n<\/div><div class=\"connecting-lines\"><div><\/div><div><\/div><div><\/div><div><\/div><div><\/div><div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-group alignwide is-layout-flow wp-container-core-group-is-layout-d7e64215 wp-block-group-is-layout-flow\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-top is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"has-lavender-color has-text-color has-link-color wp-elements-445452f75b198120e34d123be87897b6\">D3\u2019s integration team takes the burden of integrations off your hands by building, maintaining, and upgrading the best possible connections between tools. We work closely with Stellar Cyber to provide a powerful integration that enables more efficient security workflows, clearer visibility across the entire attack surface, and increases the value of existing tool investments. Other capabilities include:<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<ul class=\"wp-block-list has-lavender-color has-text-color has-link-color wp-elements-e1d7069b4170350d50fd8139fef3fbb5\">\n<li>Escalating incidents from Stellar Cyber to D3 for further analysis and response<\/li>\n\n\n\n<li>Searching Stellar Cyber\u2019s wealth of security data from D3<\/li>\n\n\n\n<li>Correlating threat intelligence against IOCs in both platforms<\/li>\n\n\n\n<li>Updating Stellar Cyber incidents with the results of D3 investigations<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignwide is-layout-flow wp-block-group-is-layout-flow\">\n<div class=\"wp-block-d3-security-separator is-style-single-connecting-line-above color-amethyst\" style=\"--color:var(--wp--preset--color--amethyst);--hex:#787CA9\"><div><div class=\"connecting-lines\"><div><\/div><div><\/div><div><\/div><\/div><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignwide is-layout-flow wp-block-group-is-layout-flow\">\n<div class=\"wp-block-d3-security-divided-tiles border-amethyst\" style=\"--border-color:var(--wp--preset--color--amethyst);--border-hex:#787CA9\"><div class=\"inner-blocks block-list__layout\">\n<div class=\"wp-block-d3-security-divided-tiles-item\"><div>\n<div class=\"wp-block-d3-security-divided-tiles-content\"><div>\n<div class=\"wp-block-group is-layout-flow wp-container-core-group-is-layout-19eabfb7 wp-block-group-is-layout-flow\">\n<div class=\"wp-block-d3-security-icon color-violet size-60 has-mask-color\" style=\"--mask-color:var(--wp--preset--color--violet);--mask-hex:#C162FF;--mask-image:url('https:\/\/d3security.com\/wp-content\/themes\/d3-security\/assets\/images\/icon-branch.svg');--size:60px\"><div class=\"icon\"><\/div><\/div>\n\n\n\n<div class=\"wp-block-group is-layout-flow wp-container-core-group-is-layout-e3d1c41b wp-block-group-is-layout-flow\">\n<p class=\"has-text-align-left is-style-kicker has-small-font-size\"><strong>Use Case 1<\/strong><\/p>\n\n\n\n<h5 class=\"wp-block-heading has-text-align-left\"><strong><strong><strong>Incident Escalation and Response<\/strong><\/strong><\/strong><\/h5>\n\n\n\n<p class=\"has-lavender-color has-text-color has-link-color wp-elements-ccc66ef1bfecce73a4e000e0dba826c7\">When a high-fidelity incident in Stellar Cyber requires escalation, it can be pulled into Morpheus, retaining data such as its risk score and TTPs. Morpheus parses the IOCs from the incident and correlates them against past incident data, integrated threat intelligence sources, and data from integrated security tools. The user can then trigger a Morpheus playbook to remediate the threat, which will orchestrate response actions such as quarantining endpoints, updating firewall rules, deleting malicious emails from inboxes, and more.&nbsp;<\/p>\n<\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-d3-security-divided-tiles-content\"><div>\n<ul class=\"wp-block-list\">\n<li>The TTPs involved will also be mapped against D3\u2019s integrated MITRE ATT&amp;CK dashboard.&nbsp;<\/li>\n\n\n\n<li>When the response is complete, the D3 playbook will update the incident in the Stellar Cyber platform, where the user can close the incident or carry out additional actions.<\/li>\n\n\n\n<li>Users can confidently respond to every level of threat with minimal screen-switching, manual tasks, or time spent on false positives.<\/li>\n<\/ul>\n<\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-d3-security-divided-tiles-item\"><div>\n<div class=\"wp-block-d3-security-divided-tiles-content\"><div>\n<div class=\"wp-block-group is-layout-flow wp-container-core-group-is-layout-19eabfb7 wp-block-group-is-layout-flow\">\n<div class=\"wp-block-d3-security-icon color-violet size-60 has-mask-color\" style=\"--mask-color:var(--wp--preset--color--violet);--mask-hex:#C162FF;--mask-image:url('https:\/\/d3security.com\/wp-content\/uploads\/2024\/07\/icon-post-type-blog.svg');--size:60px\"><div class=\"icon\"><\/div><\/div>\n\n\n\n<div class=\"wp-block-group is-layout-flow wp-container-core-group-is-layout-e3d1c41b wp-block-group-is-layout-flow\">\n<p class=\"has-text-align-left is-style-kicker has-small-font-size\"><strong>Use Case 2<\/strong><\/p>\n\n\n\n<h5 class=\"wp-block-heading has-text-align-left\"><strong><strong>Actionable Intelligence<\/strong><\/strong><\/h5>\n<\/div>\n\n\n\n<p class=\"has-lavender-color has-text-color has-link-color has-large-font-size wp-elements-334ee38d0c5d4e423d149e27a4a615d9\">Without automation, security teams struggle to find the time to investigate every piece of threat intelligence to determine risk and take the appropriate action. When threat intelligence is ingested into Morpheus, the tool can parse the IOCs from the report or feed and correlate them against Stellar Cyber\u2019s event space to find out if the threat is present in the environment. The Morpheus playbook then runs a search query via Stellar Cyber\u2019s API to find any instances of IP addresses, processes, and other artifacts that are implicated in the threat intelligence.<\/p>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-d3-security-divided-tiles-content\"><div>\n<ul class=\"wp-block-list\">\n<li>If anything is found, the information is returned back to D3.&nbsp;<\/li>\n\n\n\n<li>The user can then review the evidence and choose to run a playbook to further investigate the extent of the threat and remediate it.<\/li>\n\n\n\n<li>By building an automated, repeatable workflow for checking threat intelligence against Stellar Cyber\u2019s rich database of events, joint users can act on all incoming intel without bogging down their team in additional tasks.<\/li>\n<\/ul>\n<\/div><\/div>\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignfull has-black-color has-white-background-color has-text-color has-background has-link-color wp-elements-5e662129ae416d95cac5459957e9a311 has-global-padding is-layout-constrained wp-container-core-group-is-layout-99ca6acb wp-block-group-is-layout-constrained\" style=\"padding-top:0;padding-bottom:var(--wp--preset--spacing--70)\">\n<div class=\"wp-block-d3-security-section-heading alignfull color-lavender is-layout-\" style=\"--content-size:;--color:var(--wp--preset--color--lavender);--hex:#DEE2FF\"><div class=\"section-header-separator alignfull\"><\/div><div class=\"inner-blocks is-layout-flow wp-block-d3-security-section-heading-is-layout-flow\">\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-container-core-group-is-layout-e4eaaeb1 wp-block-group-is-layout-constrained\">\n<h2 class=\"wp-block-heading has-text-align-center\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-grape-color\">Why<\/mark> Morpheus?<\/h2>\n\n\n\n<p class=\"has-text-align-center\">Joint users of Stellar Cyber and D3 Morpheus don\u2019t just get integrated incident response and a solution for AI-driven threat intelligence; they also get the countless other features that make Morpheus the leading independent SOAR solution, including:<\/p>\n<\/div>\n<\/div><div class=\"connecting-lines\"><div><\/div><div><\/div><div><\/div><div><\/div><div><\/div><div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-group alignwide is-layout-flow wp-block-group-is-layout-flow\">\n<div class=\"wp-block-d3-security-feature-columns border-amethyst border-dark-lavender highlight-grape has-4-per-row has-highlight-color\" style=\"--border-color:var(--wp--preset--color--dark-lavender);--border-hex:#B6B8CF;--highlight-color:var(--wp--preset--color--grape);--higlight-hex:#8669C4;--per-row:4\"><div class=\"inner-blocks block-list__layout\">\n<div class=\"wp-block-d3-security-feature-columns-item\"><div><div class=\"inner-blocks\">\n<div class=\"wp-block-d3-security-icon color-grape size-30 has-mask-color\" style=\"--mask-color:var(--wp--preset--color--grape);--mask-hex:#8669C4;--mask-image:url('https:\/\/d3security.com\/wp-content\/uploads\/2024\/07\/icon-connect.svg');--size:30px\"><div class=\"icon\"><\/div><\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-grape-color\">Expert-built<\/mark><\/strong> codeless integrations across the stack<\/p>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-d3-security-feature-columns-item\"><div><div class=\"inner-blocks\">\n<div class=\"wp-block-d3-security-icon color-grape size-30 has-mask-color\" style=\"--mask-color:var(--wp--preset--color--grape);--mask-hex:#8669C4;--mask-image:url('https:\/\/d3security.com\/wp-content\/uploads\/2024\/07\/icon-power-1.svg');--size:30px\"><div class=\"icon\"><\/div><\/div>\n\n\n\n<p class=\"has-large-font-size\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-grape-color\"><strong>Tier 1\u20133 automation<\/strong><\/mark>, based on deep research into the capabilities of common tools<\/p>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-d3-security-feature-columns-item\"><div><div class=\"inner-blocks\">\n<div class=\"wp-block-d3-security-icon color-grape size-30 has-mask-color\" style=\"--mask-color:var(--wp--preset--color--grape);--mask-hex:#8669C4;--mask-image:url('https:\/\/d3security.com\/wp-content\/uploads\/2024\/07\/icon-warning.svg');--size:30px\"><div class=\"icon\"><\/div><\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-grape-color\">The Hyperpipe<\/mark><\/strong>, which reduces alert volume by up to 98%<\/p>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-d3-security-feature-columns-item\"><div><div class=\"inner-blocks\">\n<div class=\"wp-block-d3-security-icon color-grape size-30 has-mask-color\" style=\"--mask-color:var(--wp--preset--color--grape);--mask-hex:#8669C4;--mask-image:url('https:\/\/d3security.com\/wp-content\/uploads\/2024\/07\/icon-branch-three-way.svg');--size:30px\"><div class=\"icon\"><\/div><\/div>\n\n\n\n<p class=\"has-large-font-size\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-grape-color\">Cross-dimension correlation<\/mark><\/strong>, which acts across tools, timeframes, TTPs, and artifacts<\/p>\n<\/div><\/div><\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignfull has-global-padding is-layout-constrained wp-container-core-group-is-layout-0d72ef2b wp-block-group-is-layout-constrained\" style=\"margin-top:0;margin-bottom:0\">\n<div class=\"wp-block-d3-security-section-heading is-style-default alignfull color-midnight is-layout-\" style=\"--content-size:;--color:var(--wp--preset--color--midnight);--hex:#2D2147\"><div class=\"section-header-separator alignfull\"><\/div><div class=\"inner-blocks is-layout-flow wp-block-d3-security-section-heading-is-layout-flow\">\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-container-core-group-is-layout-e515699c wp-block-group-is-layout-constrained\">\n<h2 class=\"wp-block-heading has-text-align-center\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-grape-color\">Stellar Cyber<\/mark> Integration: Summary<\/h2>\n<\/div>\n<\/div><div class=\"connecting-lines\"><div><\/div><div><\/div><div><\/div><div><\/div><div><\/div><div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-group alignwide is-layout-flow wp-container-core-group-is-layout-b4c00706 wp-block-group-is-layout-flow\">\n<div class=\"wp-block-d3-security-comparison-table\"><div><div class=\"comparison-table-heading\"><div><div class=\"column-heading\">Key Details<\/div><\/div><div><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/d3security.com\/wp-content\/themes\/d3-security\/assets\/images\/d3-logo-purple.svg\" height=\"24\" width=\"80\" style=\"aspect-ratio:80 \/ 24\"\/><\/div><\/div><div class=\"block-list__layout\">\n<div class=\"wp-block-d3-security-comparison-table-row\"><div><div class=\"row-label\">Integration certified by partner<\/div><\/div><div><div class=\"checked\"><\/div><\/div><div><div class=\"unchecked\"><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-d3-security-comparison-table-row\"><div><div class=\"row-label\">Developed and maintained by D3<\/div><\/div><div><div class=\"checked\"><\/div><\/div><div><div class=\"unchecked\"><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-d3-security-comparison-table-row\"><div><div class=\"row-label\">Drag integration into visual playbooks<\/div><\/div><div><div class=\"checked\"><\/div><\/div><div><div class=\"unchecked\"><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-d3-security-comparison-table-row\"><div><div class=\"row-label\">Test integration from playbook<\/div><\/div><div><div class=\"checked\"><\/div><\/div><div><div class=\"unchecked\"><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-d3-security-comparison-table-row\"><div><div class=\"row-label\">Bi-directional data sync<\/div><\/div><div><div class=\"checked\"><\/div><\/div><div><div class=\"unchecked\"><\/div><\/div><\/div>\n<\/div><div class=\"connecting-lines\"><div><\/div><div><\/div><div><\/div><\/div><\/div><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignfull has-black-purple-gradient-background has-background is-layout-flow wp-block-group-is-layout-flow\" style=\"margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--70);padding-bottom:0\">\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-container-core-group-is-layout-346627ba wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-container-core-group-is-layout-bdbfdc43 wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-container-core-group-is-layout-b821fca1 wp-block-group-is-layout-constrained\">\n<h2 class=\"wp-block-heading has-text-align-center\">Integrations Done the <mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-grape-color\">Right<\/mark> Way<\/h2>\n<\/div>\n\n\n\n<p class=\"has-text-align-center has-x-large-font-size\">An unlimited number of pre-built integrations, expertly maintained by the largest technical team in security automation. Thoroughly researched, tested and built\u2014and delivered for free. Always.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-a89b3969 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/d3security.com\/integrations\/\">See All Integrations<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-d3-security-integrations-grid is-style-dark alignwide\"><div x-data=\"wp_block_d3_security_integrations_grid\"><div class=\"center-logo\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/d3security.com\/wp-content\/themes\/d3-security\/assets\/images\/d3-logomark.svg\" height=\"64\" width=\"64\"\/><\/div><div class=\"wp-block-d3-security-integrations-grid-inner-blocks\">\n<div class=\"wp-block-d3-security-integrations-grid-item color-light-purple\" style=\"--color:var(--wp--preset--color--light-purple);--hex:#B037FF\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/d3security.com\/wp-content\/themes\/d3-security\/assets\/images\/logo-integration-fortinet-gray.svg\" height=\"40\" width=\"40\" class=\"inactive-logo\"\/><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/d3security.com\/wp-content\/themes\/d3-security\/assets\/images\/logo-integration-fortinet.svg\" height=\"40\" width=\"40\" class=\"active-logo\"\/><div class=\"connecting-line\"><\/div><\/div>\n\n\n\n<div class=\"wp-block-d3-security-integrations-grid-item color-light-purple\" style=\"--color:var(--wp--preset--color--light-purple);--hex:#B037FF\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/d3security.com\/wp-content\/themes\/d3-security\/assets\/images\/logo-integration-sn-gray.svg\" height=\"40\" width=\"40\" class=\"inactive-logo\"\/><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/d3security.com\/wp-content\/themes\/d3-security\/assets\/images\/logo-integration-sn.svg\" height=\"40\" width=\"40\" class=\"active-logo\"\/><div class=\"connecting-line\"><\/div><\/div>\n\n\n\n<div class=\"wp-block-d3-security-integrations-grid-item color-light-purple\" style=\"--color:var(--wp--preset--color--light-purple);--hex:#B037FF\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/d3security.com\/wp-content\/themes\/d3-security\/assets\/images\/logo-integration-symantec-gray.svg\" height=\"40\" width=\"40\" class=\"inactive-logo\"\/><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/d3security.com\/wp-content\/themes\/d3-security\/assets\/images\/logo-integration-symantec.svg\" height=\"40\" width=\"40\" class=\"active-logo\"\/><div class=\"connecting-line\"><\/div><\/div>\n\n\n\n<div class=\"wp-block-d3-security-integrations-grid-item color-light-purple\" style=\"--color:var(--wp--preset--color--light-purple);--hex:#B037FF\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/d3security.com\/wp-content\/themes\/d3-security\/assets\/images\/logo-integration-r7-gray.svg\" height=\"40\" width=\"40\" class=\"inactive-logo\"\/><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/d3security.com\/wp-content\/themes\/d3-security\/assets\/images\/logo-integration-r7.svg\" height=\"40\" width=\"40\" class=\"active-logo\"\/><div class=\"connecting-line\"><\/div><\/div>\n\n\n\n<div class=\"wp-block-d3-security-integrations-grid-item color-light-purple\" style=\"--color:var(--wp--preset--color--light-purple);--hex:#B037FF\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/d3security.com\/wp-content\/themes\/d3-security\/assets\/images\/logo-integration-ibm-security-gray.svg\" height=\"40\" width=\"40\" class=\"inactive-logo\"\/><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/d3security.com\/wp-content\/themes\/d3-security\/assets\/images\/logo-integration-ibm-security.svg\" height=\"40\" width=\"40\" class=\"active-logo\"\/><div class=\"connecting-line\"><\/div><\/div>\n\n\n\n<div class=\"wp-block-d3-security-integrations-grid-item color-light-purple\" style=\"--color:var(--wp--preset--color--light-purple);--hex:#B037FF\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/d3security.com\/wp-content\/themes\/d3-security\/assets\/images\/logo-integration-atlassian-gray.svg\" height=\"40\" width=\"40\" class=\"inactive-logo\"\/><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/d3security.com\/wp-content\/themes\/d3-security\/assets\/images\/logo-integration-atlassian.svg\" height=\"40\" width=\"40\" class=\"active-logo\"\/><div class=\"connecting-line\"><\/div><\/div>\n\n\n\n<div class=\"wp-block-d3-security-integrations-grid-item color-custom\" style=\"--color:var(--wp--preset--color--custom);--hex:#02b3ff\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/d3security.com\/wp-content\/themes\/d3-security\/assets\/images\/logo-integration-okta-gray.svg\" height=\"40\" width=\"40\" class=\"inactive-logo\"\/><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/d3security.com\/wp-content\/themes\/d3-security\/assets\/images\/logo-integration-okta.svg\" height=\"40\" width=\"40\" class=\"active-logo\"\/><div class=\"connecting-line\"><\/div><\/div>\n\n\n\n<div class=\"wp-block-d3-security-integrations-grid-item color-custom\" style=\"--color:var(--wp--preset--color--custom);--hex:#6600FF\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/d3security.com\/wp-content\/themes\/d3-security\/assets\/images\/logo-integration-s1-gray.svg\" height=\"40\" width=\"40\" class=\"inactive-logo\"\/><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/d3security.com\/wp-content\/themes\/d3-security\/assets\/images\/logo-integration-s1.svg\" height=\"40\" width=\"40\" class=\"active-logo\"\/><div class=\"connecting-line\"><\/div><\/div>\n\n\n\n<div class=\"wp-block-d3-security-integrations-grid-item color-custom\" style=\"--color:var(--wp--preset--color--custom);--hex:#66dea6\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/d3security.com\/wp-content\/themes\/d3-security\/assets\/images\/logo-integration-elastic-gray.svg\" height=\"40\" width=\"40\" class=\"inactive-logo\"\/><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/d3security.com\/wp-content\/themes\/d3-security\/assets\/images\/logo-integration-elastic.svg\" height=\"40\" width=\"40\" class=\"active-logo\"\/><div class=\"connecting-line\"><\/div><\/div>\n\n\n\n<div class=\"wp-block-d3-security-integrations-grid-item color-custom\" style=\"--color:var(--wp--preset--color--custom);--hex:#ed1c24\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/d3security.com\/wp-content\/themes\/d3-security\/assets\/images\/logo-integration-crowdstrike-gray.svg\" height=\"40\" width=\"40\" class=\"inactive-logo\"\/><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/d3security.com\/wp-content\/themes\/d3-security\/assets\/images\/logo-integration-crowdstrike.svg\" height=\"40\" width=\"40\" class=\"active-logo\"\/><div class=\"connecting-line\"><\/div><\/div>\n\n\n\n<div class=\"wp-block-d3-security-integrations-grid-item color-custom\" style=\"--color:var(--wp--preset--color--custom);--hex:#ff2800\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/d3security.com\/wp-content\/themes\/d3-security\/assets\/images\/logo-integration-pan-gray.svg\" height=\"40\" width=\"40\" class=\"inactive-logo\"\/><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/d3security.com\/wp-content\/themes\/d3-security\/assets\/images\/logo-integration-pan.svg\" height=\"40\" width=\"40\" class=\"active-logo\"\/><div class=\"connecting-line\"><\/div><\/div>\n\n\n\n<div class=\"wp-block-d3-security-integrations-grid-item color-custom\" style=\"--color:var(--wp--preset--color--custom);--hex:#ff9900\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/d3security.com\/wp-content\/themes\/d3-security\/assets\/images\/logo-integration-aws-gray.svg\" height=\"40\" width=\"40\" class=\"inactive-logo\"\/><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/d3security.com\/wp-content\/themes\/d3-security\/assets\/images\/logo-integration-aws.svg\" height=\"40\" width=\"40\" class=\"active-logo\"\/><div class=\"connecting-line\"><\/div><\/div>\n\n\n\n<div class=\"wp-block-d3-security-integrations-grid-item color-light-purple\" style=\"--color:var(--wp--preset--color--light-purple);--hex:#B037FF\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/d3security.com\/wp-content\/themes\/d3-security\/assets\/images\/logo-integration-zscaler-gray.svg\" height=\"40\" width=\"40\" class=\"inactive-logo\"\/><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/d3security.com\/wp-content\/themes\/d3-security\/assets\/images\/logo-integration-zscaler.svg\" height=\"40\" width=\"40\" class=\"active-logo\"\/><div class=\"connecting-line\"><\/div><\/div>\n\n\n\n<div class=\"wp-block-d3-security-integrations-grid-item color-light-purple\" style=\"--color:var(--wp--preset--color--light-purple);--hex:#B037FF\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/d3security.com\/wp-content\/themes\/d3-security\/assets\/images\/logo-integration-rf-gray.svg\" height=\"40\" width=\"40\" class=\"inactive-logo\"\/><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/d3security.com\/wp-content\/themes\/d3-security\/assets\/images\/logo-integration-rf.svg\" height=\"40\" width=\"40\" class=\"active-logo\"\/><div class=\"connecting-line\"><\/div><\/div>\n\n\n\n<div class=\"wp-block-d3-security-integrations-grid-item color-light-purple\" style=\"--color:var(--wp--preset--color--light-purple);--hex:#B037FF\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/d3security.com\/wp-content\/themes\/d3-security\/assets\/images\/logo-integration-chronicle-gray.svg\" height=\"40\" width=\"40\" class=\"inactive-logo\"\/><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/d3security.com\/wp-content\/themes\/d3-security\/assets\/images\/logo-integration-chronicle.svg\" height=\"40\" width=\"40\" class=\"active-logo\"\/><div class=\"connecting-line\"><\/div><\/div>\n\n\n\n<div class=\"wp-block-d3-security-integrations-grid-item color-light-purple\" style=\"--color:var(--wp--preset--color--light-purple);--hex:#B037FF\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/d3security.com\/wp-content\/themes\/d3-security\/assets\/images\/logo-integration-trellix-gray.svg\" height=\"40\" width=\"40\" class=\"inactive-logo\"\/><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/d3security.com\/wp-content\/themes\/d3-security\/assets\/images\/logo-integration-trellix.svg\" height=\"40\" width=\"40\" class=\"active-logo\"\/><div class=\"connecting-line\"><\/div><\/div>\n\n\n\n<div class=\"wp-block-d3-security-integrations-grid-item color-light-purple\" style=\"--color:var(--wp--preset--color--light-purple);--hex:#B037FF\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/d3security.com\/wp-content\/themes\/d3-security\/assets\/images\/logo-integration-checkpoint-gray.svg\" height=\"40\" width=\"40\" class=\"inactive-logo\"\/><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/d3security.com\/wp-content\/themes\/d3-security\/assets\/images\/logo-integration-checkpoint.svg\" height=\"40\" width=\"40\" class=\"active-logo\"\/><div class=\"connecting-line\"><\/div><\/div>\n\n\n\n<div class=\"wp-block-d3-security-integrations-grid-item color-light-purple\" style=\"--color:var(--wp--preset--color--light-purple);--hex:#B037FF\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/d3security.com\/wp-content\/themes\/d3-security\/assets\/images\/logo-integration-logrhythm-gray.svg\" height=\"40\" width=\"40\" class=\"inactive-logo\"\/><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/d3security.com\/wp-content\/themes\/d3-security\/assets\/images\/logo-integration-logrhythm.svg\" height=\"40\" width=\"40\" class=\"active-logo\"\/><div class=\"connecting-line\"><\/div><\/div>\n<\/div><div class=\"connecting-lines\"><div><\/div><div><\/div><div><\/div><div><\/div><div><\/div><div><\/div><div><\/div><div><\/div><div><\/div><div><\/div><div><\/div><div><\/div><\/div><\/div><\/div>\n<\/div>\n<\/div>\n","protected":false},"author":22,"featured_media":44586,"menu_order":0,"template":"single-d3-integration","partner_type":[270],"class_list":["post-35324","d3-integration","type-d3-integration","status-publish","has-post-thumbnail","hentry","partner_type-xdr"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Stellar Cyber + Morpheus AI: Integration Guide &amp; Benefits | D3 Security<\/title>\n<meta name=\"description\" content=\"MSSPs and internal security teams use D3 and Stellar Cyber to create automated workflows for alert detection, analysis, and response.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/d3security.com\/integrations\/stellar-cyber\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Stellar Cyber + Morpheus AI: Integration Guide &amp; Benefits | D3 Security\" \/>\n<meta property=\"og:description\" content=\"MSSPs and internal security teams use D3 and Stellar Cyber to create automated workflows for alert detection, analysis, and response.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/d3security.com\/integrations\/stellar-cyber\/\" \/>\n<meta property=\"og:site_name\" content=\"D3 Security\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/D3-Security-781229088587978\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-27T17:11:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/d3security.com\/wp-content\/uploads\/2021\/05\/stellar-cyber-logo.png\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"250\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@d3security\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/d3security.com\/integrations\/stellar-cyber\/\",\"url\":\"https:\/\/d3security.com\/integrations\/stellar-cyber\/\",\"name\":\"Stellar Cyber + Morpheus AI: Integration Guide & Benefits | D3 Security\",\"isPartOf\":{\"@id\":\"https:\/\/d3security.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/d3security.com\/integrations\/stellar-cyber\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/d3security.com\/integrations\/stellar-cyber\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/d3security.com\/wp-content\/uploads\/2021\/05\/stellar-cyber-logo.png\",\"datePublished\":\"2021-05-07T07:18:07+00:00\",\"dateModified\":\"2025-03-27T17:11:06+00:00\",\"description\":\"MSSPs and internal security teams use D3 and Stellar Cyber to create automated workflows for alert detection, analysis, and response.\",\"breadcrumb\":{\"@id\":\"https:\/\/d3security.com\/integrations\/stellar-cyber\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/d3security.com\/integrations\/stellar-cyber\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/d3security.com\/integrations\/stellar-cyber\/#primaryimage\",\"url\":\"https:\/\/d3security.com\/wp-content\/uploads\/2021\/05\/stellar-cyber-logo.png\",\"contentUrl\":\"https:\/\/d3security.com\/wp-content\/uploads\/2021\/05\/stellar-cyber-logo.png\",\"width\":500,\"height\":250,\"caption\":\"Stellar Cyber logo\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/d3security.com\/integrations\/stellar-cyber\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/d3security.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Integrations\",\"item\":\"https:\/\/d3security.com\/integrations\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Stellar Cyber\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/d3security.com\/#website\",\"url\":\"https:\/\/d3security.com\/\",\"name\":\"D3 Security\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/d3security.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/d3security.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/d3security.com\/#organization\",\"name\":\"D3 Security\",\"url\":\"https:\/\/d3security.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/d3security.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/d3security.com\/wp-content\/uploads\/2024\/07\/D3_square.png\",\"contentUrl\":\"https:\/\/d3security.com\/wp-content\/uploads\/2024\/07\/D3_square.png\",\"width\":800,\"height\":800,\"caption\":\"D3 Security\"},\"image\":{\"@id\":\"https:\/\/d3security.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/D3-Security-781229088587978\/\",\"https:\/\/x.com\/d3security\",\"https:\/\/www.linkedin.com\/company\/d3-security-management-systems\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Stellar Cyber + Morpheus AI: Integration Guide & Benefits | D3 Security","description":"MSSPs and internal security teams use D3 and Stellar Cyber to create automated workflows for alert detection, analysis, and response.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/d3security.com\/integrations\/stellar-cyber\/","og_locale":"en_US","og_type":"article","og_title":"Stellar Cyber + Morpheus AI: Integration Guide & Benefits | D3 Security","og_description":"MSSPs and internal security teams use D3 and Stellar Cyber to create automated workflows for alert detection, analysis, and response.","og_url":"https:\/\/d3security.com\/integrations\/stellar-cyber\/","og_site_name":"D3 Security","article_publisher":"https:\/\/www.facebook.com\/D3-Security-781229088587978\/","article_modified_time":"2025-03-27T17:11:06+00:00","og_image":[{"width":500,"height":250,"url":"https:\/\/d3security.com\/wp-content\/uploads\/2021\/05\/stellar-cyber-logo.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@d3security","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/d3security.com\/integrations\/stellar-cyber\/","url":"https:\/\/d3security.com\/integrations\/stellar-cyber\/","name":"Stellar Cyber + Morpheus AI: Integration Guide & Benefits | D3 Security","isPartOf":{"@id":"https:\/\/d3security.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/d3security.com\/integrations\/stellar-cyber\/#primaryimage"},"image":{"@id":"https:\/\/d3security.com\/integrations\/stellar-cyber\/#primaryimage"},"thumbnailUrl":"https:\/\/d3security.com\/wp-content\/uploads\/2021\/05\/stellar-cyber-logo.png","datePublished":"2021-05-07T07:18:07+00:00","dateModified":"2025-03-27T17:11:06+00:00","description":"MSSPs and internal security teams use D3 and Stellar Cyber to create automated workflows for alert detection, analysis, and response.","breadcrumb":{"@id":"https:\/\/d3security.com\/integrations\/stellar-cyber\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/d3security.com\/integrations\/stellar-cyber\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/d3security.com\/integrations\/stellar-cyber\/#primaryimage","url":"https:\/\/d3security.com\/wp-content\/uploads\/2021\/05\/stellar-cyber-logo.png","contentUrl":"https:\/\/d3security.com\/wp-content\/uploads\/2021\/05\/stellar-cyber-logo.png","width":500,"height":250,"caption":"Stellar Cyber logo"},{"@type":"BreadcrumbList","@id":"https:\/\/d3security.com\/integrations\/stellar-cyber\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/d3security.com\/"},{"@type":"ListItem","position":2,"name":"Integrations","item":"https:\/\/d3security.com\/integrations\/"},{"@type":"ListItem","position":3,"name":"Stellar Cyber"}]},{"@type":"WebSite","@id":"https:\/\/d3security.com\/#website","url":"https:\/\/d3security.com\/","name":"D3 Security","description":"","publisher":{"@id":"https:\/\/d3security.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/d3security.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/d3security.com\/#organization","name":"D3 Security","url":"https:\/\/d3security.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/d3security.com\/#\/schema\/logo\/image\/","url":"https:\/\/d3security.com\/wp-content\/uploads\/2024\/07\/D3_square.png","contentUrl":"https:\/\/d3security.com\/wp-content\/uploads\/2024\/07\/D3_square.png","width":800,"height":800,"caption":"D3 Security"},"image":{"@id":"https:\/\/d3security.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/D3-Security-781229088587978\/","https:\/\/x.com\/d3security","https:\/\/www.linkedin.com\/company\/d3-security-management-systems"]}]}},"_links":{"self":[{"href":"https:\/\/d3security.com\/wp-json\/wp\/v2\/d3-integration\/35324","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/d3security.com\/wp-json\/wp\/v2\/d3-integration"}],"about":[{"href":"https:\/\/d3security.com\/wp-json\/wp\/v2\/types\/d3-integration"}],"author":[{"embeddable":true,"href":"https:\/\/d3security.com\/wp-json\/wp\/v2\/users\/22"}],"version-history":[{"count":0,"href":"https:\/\/d3security.com\/wp-json\/wp\/v2\/d3-integration\/35324\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/d3security.com\/wp-json\/wp\/v2\/media\/44586"}],"wp:attachment":[{"href":"https:\/\/d3security.com\/wp-json\/wp\/v2\/media?parent=35324"}],"wp:term":[{"taxonomy":"partner_type","embeddable":true,"href":"https:\/\/d3security.com\/wp-json\/wp\/v2\/partner_type?post=35324"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}