Integrations

Connect your existing devices to Asimov using widely supported protocols & APIs to automatically ingest & visualize data.

Get Asimov Today

See our platform in action

Devices

Asimov integrates with a wide range of devices using gRPC, HTTP APIs, and ROS, as well as providing enhanced support for Modbus and OPC-UA

NATIVE SUPPORT FOR ROS

Use the native ROS integration to obtain easy access to standard and custom ROS topics.

FILESYSTEM INTEGRATION

Configure the ingestion of file and directory contents from the device.

Deployments

COMPATIBLE WITH DOCKER, SNAP, ANY LINUX FLAVOUR AND MORE

Asimov can be easily deployed trough common methodologies such as a debian package or a docker image

Data

Export the Data you Need to the Right Tools

GOOGLE SHEETS

Export data and annotations to Google Sheets for deeper analysis.

EXPORT TO OBJECTSTORES

Asimov can serve as your data pipeline. Easily export your fleet data from Asimov into an object store, such as AWS S3, for custom access to internal applications, such as machine learning.
 

SECURITY DATA TO SIEM

Asimov audit trails integrates well with various SIEM systems. This enables traditional security teams to audit the robotic fleet with tools they are used to operate with.

Alerts & Events

Receive alerts directly in PagerDuty or Slack or Integrate With Your own Webhook.

PAGERDUTY

Utilize PagerDuty’s on-call and incident management tools by setting up alerts and scheduling so that your teams are ready to act quickly.

SLACK

Event notifications can be sent directly to Slack for a faster response from teams.

WEBHOOKS

Integrate events with any external system that accepts webhooks. Allow arbitrary endpoints to subscribe to real-time events from Asimov. Invoke targeted behavior on these endpoints by configuring them accordingly.
 

REST API

Asimov’s REST API lets you automate workflows and integrate with external systems. Use the API to:

  • Set up, configure, reconfigure, and deploy Asimov’s components to secure your devices, robots, and hosts against vulnerabilities, malware, and compliance violations.
  • Extract the security data that Asimov has collected about your environment and send it to your monitoring, alerting, and reporting systems.