Native Integration with SaaS Alerts / Kaseya SIEM for IoC Telemetry


We’d like INKY to provide native telemetry integration with SaaS Alerts and Kaseya SIEM to forward actionable Indicators of Compromise.

RocketCyber previously integrated with Graphus, allowing phishing telemetry to feed directly into the SOC for correlation and response. That level of ecosystem alignment should exist with INKY.

Currently, INKY threat intelligence remains siloed in the console. For MSPs standardising on the Kaseya stack, this limits SOC visibility and cross-platform correlation.

Requested capability:

• Real-time event forwarding via API/webhook
• Structured IoC data including:
– Sender domain / envelope-from
– URLs and attachment hashes
– Threat classification and confidence
– User interaction signals where available
• Direct ingestion into:
– SaaS Alerts
– Kaseya SIEM

Why this should be prioritised:

• Restores ecosystem parity with prior Graphus + RocketCyber integration
• Strengthens Kaseya-stack alignment
• Enables SOC correlation and automated response
• Increases MSP platform stickiness

This positions INKY not just as email filtering, but as a SOC-grade telemetry source within the Kaseya ecosystem.

Please authenticate to join the conversation.

Upvoters
Status

In Review

Board
📧

Email Security

Tags

Integrations

Date

26 days ago

Author

Imraan Sathar

Subscribe to post

Get notified by email when there are changes.