Data Theorem Integrations
Data Theorem provides several kinds of integrations, as well as APIs for creating your own integrations.
The following sections are organized by what you may be trying to accomplish by integrating with one of Data Theorem’s
APIs.
However, if you are going to build an integration with one of our APIs, read API Conventions
first. It explains the conventions that Data Theorem follows for all of our APIs, as well as how to authenticate to our
APIs.
API Security Integrations
- The API Security Results API (beta) provides access to the API, Cloud, and
Web assets discovered by API Discover, as well as their Policy Violations from API Inspect. Note: This API is still
considered to be in Beta, and it may change without notice.
- API/Cloud/Web Security Webhooks (beta) Sends webhooks to external services triggered
by API/Cloud/Web Security events like Policy Violations. Note: Webhooks are still considered to be in Beta and may change without
notice.
Mobile Security Integrations
Providing Data Theorem With Pre-production Builds of your Mobile Apps
Data Theorem automatically scans builds of your apps in the app stores. However, to use Data Theorem’s Mobile Security
offering to its full effectiveness, you need to send pre-production builds, along with supplementary information like
credentials, to Data Theorem for analysis.
See the Mobile Security DevOps API section for more information on how to send
builds of your Mobile apps to Data Theorem.
Working With Your Mobile Apps’ Security Issues
- Mobile Security issues can be automatically pushed to Jira. See the Jira
Integration page for more details.
- The Mobile Security Results API, which provides access to the list of all mobile apps
registered within your Data Theorem account and the list of security issues found during the scans.
- Data Theorem’s Mobile Security API client library provides a reference client for accessing the Mobile Security
Results API:
https://bitbucket.org/datatheorem/dt-api-client
Examining Potential “Clone” Apps in unofficial App Stores
- The Mobile Security: Phishing API (beta) provides access to the list of
mobile apps discovered by Mobile Phishing in various unofficial app stores, along with Data Theorem’s analysis of the
potential threat those apps may pose to your organization.
Programmatic User Management in Data Theorem’s Portal
- The Management API provides access to data related to users registered with your Data
Theorem account.