Are you a developer looking to seamlessly integrate the functionality of Guardian360 Lighthouse with your own systems, platforms, and applications? Then use our API, which makes all the functionality available via the web interface also accessible through API endpoints. This includes managing organizations, contacts, and contracts, as well as managing scan objects and retrieving compliance insights, scan results, and detected criminals in your network. Our probes provide advanced scanning within networks, behind the firewall. With our API, you can add and monitor probes. Issue management through the API allows you to retrieve, accept, release, or review vulnerabilities. It is also possible to automatically add an issue to a rescan queue.
The API provides access to full compliance information, including deviations from guidelines and standards such as ISO 27001, NIS2, NEN7510, OWASP, and GDPR/AVG.
It’s good to know that you can provide your own references to objects in our system, such as IDs for organizations, people, assets, and ticket numbers. Do you want to test or adjust your code? This can be done directly in Guardian360 Lighthouse based on the response from our platform.
Integrations
Guardian360 Lighthouse also integrates with solutions from other parties. For instance, results from Lighthouse are displayed in the Cyber Alarm dashboard of Secure Me2. Additionally, the automatic report available through our connections with the Dutch Forensic Incident Response integrates seamlessly via our API. Together with students from Utrecht University, we have developed an InfoSec Agent, and insights from this agent are shown in our Lighthouse dashboard..
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.