GNAT's Not A TIP — Core Platform Deep Dive
Ingest · Normalize · Investigate · Export
Every connector follows the same interface contract. Add a source once. Schema changes upstream are handled at the connector layer — your workflows see consistent STIX output regardless of what the vendor changes.
CrowdStrike Falcon · Recorded Future · Mandiant · MISP · OpenCTI · Anomali ThreatStream · VirusTotal · AlienVault OTX · Microsoft Defender TI · ThreatConnect · Cisco Talos · MITRE ATT&CK · Abuse.ch · AbuseIPDB · Intel 471 · Flashpoint · Group-IB · ZeroFox · SOCRadar · Pulsedive · +4 more
Splunk Enterprise · Microsoft Sentinel · Elastic SIEM · IBM QRadar · Google Chronicle · Wazuh · LogRhythm · Graylog · OSSIM · Security Onion · Datadog SIEM · Cribl Stream
SentinelOne · CrowdStrike (via TI) · VMware Carbon Black · Trellix XDR · Sophos Central · Tanium · Trend Micro Vision One · Fortinet FortiEDR · FortiSIEM · Shodan · GreyNoise · CISA KEV · Armis · Axonius · Claroty · Stellar Cyber · Netskope · +3 more
Palo Alto XSOAR · TheHive · GreyMatter · FortiSOAR · ServiceNow ITSM · ServiceNow SecOps · Atlassian Jira
Zeek · Suricata IDS/IPS · Snort · Vectra AI · ExtraHop Reveal(x) · Darktrace · Cisco Umbrella · Nozomi Networks · Dragos Platform
Wiz · AWS Security Hub · Censys · Shodan · Palo Alto Prisma Cloud · Cortex Xpanse · Orca Security · CyCognito · SecurityTrails · DomainTools Iris · RiskRecon · BitSight · UpGuard · JupiterOne · runZero · Silent Push
Tenable One · Rapid7 InsightVM · Qualys VMDR · Greenbone/OpenVAS · Nucleus Security · DefectDojo · OSV.dev · VulnCheck
Okta · Microsoft Entra ID · Ping Identity · Silverfort · Semperis DSP
ANY.RUN · Joe Sandbox · Hybrid Analysis · VMRay · Intezer · Cuckoo · MDR (Huntress, Arctic Wolf, Red Canary) · Email Security · Insider Risk · DFIR · BAS · DevSecOps
When everything GNAT produces is STIX 2.1, your workflows aren't tied to GNAT. If you change tools, your structured intelligence output doesn't disappear with your old platform.
The investigation graph is an active workspace — you build the picture as the investigation progresses. It's not a static visualization of pre-ingested data.
Machine-readable, vendor-neutral. Share with any STIX-compatible platform, archive for recall, or feed downstream tools automatically.
Human-readable reports generated from investigation graph data. Consistent format across every investigation, not rebuilt from scratch each time.
Push case data to ticketing, SOAR, or case management. The investigation record doesn't stay locked inside the platform.
When your investigation workflow is a repeatable template backed by a vendor-neutral standard, it survives vendor changes, team changes, and tool changes. That's the investment you're making.