Integrations
Connect VigilPrism to your existing tools for automated ticket creation, notifications, and workflow integration.
Available Integrations
Jira
AvailableCreate Jira tickets directly from security findings. Supports Jira Cloud and Jira Server/Data Center.
Setup Guide →ServiceNow
AvailableCreate incidents and change requests in ServiceNow. Supports bidirectional status sync.
Setup Guide →Email Notifications
Coming SoonSend email alerts for critical findings, compliance violations, and scheduled reports.
Webhooks
Coming SoonSend events to any HTTP endpoint for custom integrations with Slack, Teams, or your own systems.
Jira Integration
Prerequisites
- •Jira Cloud instance or Jira Server/Data Center 8.0+
- •Jira account with permission to create issues
- •API token (Jira Cloud) or personal access token (Server/DC)
- •VigilPrism Professional or Enterprise license
Step 1: Generate Jira API Token
For Jira Cloud:
- Go to
https://id.atlassian.com/manage-profile/security/api-tokens - Click "Create API token"
- Enter a label (e.g., "VigilPrism Integration")
- Copy the generated token (you won't see it again)
For Jira Server/Data Center:
- Go to Profile > Personal Access Tokens
- Click "Create token"
- Set token name and expiry
- Copy the generated token
Step 2: Configure in VigilPrism
- Navigate to Settings > Integrations
- Click "Add Integration" and select Jira
- Enter your connection details:Instance URL:
https://yourcompany.atlassian.netEmail:your.email@company.comAPI Token:••••••••••••••••Default Project:SEC - Click "Test Connection" to verify
- Save the integration
Step 3: Configure Field Mapping (Optional)
Map VigilPrism fields to your Jira custom fields for richer ticket data.
| VigilPrism Field | Default Jira Field | Customizable |
|---|---|---|
| Finding Title | Summary | No |
| Description + Remediation | Description | No |
| Severity | Priority | Yes |
| CVE ID | Labels | Yes |
| System Name | Labels | Yes |
Creating Tickets
Once configured, you can create Jira tickets from any finding:
- Navigate to a vulnerability or audit finding
- Click the "Create Ticket" button
- Select the Jira project and issue type
- Review and customize the ticket details
- Click "Create" to push to Jira
Tip: Use bulk operations to create tickets for multiple findings at once from the Vulnerabilities or Audit Results page.
ServiceNow Integration
Prerequisites
- •ServiceNow instance (any supported version)
- •ServiceNow account with incident/change creation permissions
- •OAuth credentials or Basic Auth credentials
- •VigilPrism Professional or Enterprise license
Step 1: ServiceNow Configuration
Option A: Basic Authentication
- Create a dedicated service account for VigilPrism
- Assign the itil role for incident creation
- Note the username and password
Option B: OAuth 2.0 (Recommended)
- Navigate to System OAuth > Application Registry
- Create a new OAuth API endpoint for external clients
- Configure redirect URI (if using authorization code flow)
- Note the Client ID and Client Secret
Step 2: Configure in VigilPrism
- Navigate to Settings > Integrations
- Click "Add Integration" and select ServiceNow
- Enter your connection details:Instance URL:
https://yourcompany.service-now.comAuth Type:Basic / OAuth 2.0Username:vigilprism_serviceDefault Table:incident - Click "Test Connection" to verify
- Save the integration
Supported Tables
VigilPrism can create records in the following ServiceNow tables:
Incident
For security findings requiring immediate attention
Change Request
For remediation tasks requiring change management
Problem
For recurring issues or root cause analysis
Security Incident
For organizations using ServiceNow SecOps
Bidirectional Status Sync
When enabled, VigilPrism automatically syncs status changes between platforms:
| ServiceNow State | → | VigilPrism Status |
|---|---|---|
| New | → | Open |
| In Progress | → | In Progress |
| Resolved | → | Resolved |
| Closed | → | Resolved |
Note: Bidirectional sync requires webhook configuration in ServiceNow. See the advanced setup guide for details.
Custom Integrations via API
Build your own integrations using the VigilPrism REST API. Access findings, trigger audits, and manage your fleet programmatically.
Example: Fetch Findings
# Get all critical vulnerabilities
curl -X GET "https://your-server:8000/api/v1/vulnerabilities?severity=critical" \
-H "Authorization: Bearer YOUR_API_TOKEN" \
-H "Content-Type: application/json"
# Response
{
"items": [
{
"id": "vuln-001",
"cve_id": "CVE-2024-1234",
"severity": "critical",
"cvss_score": 9.8,
"system_id": "sys-abc123",
"status": "open"
}
],
"total": 1
}