Unlock the full potential of your data
One click integrations across your entire security ecosystem.
Collect logs from Check Point products. Check Point is a provider of hardware and software products for IT security, including network and endpoint security.
Collect logs from various Zscaler products. Zscaler is a cloud-based cybersecurity platform offering secure internet access and protection against online threats for organizations.
Collect logs from Cloudflare products. Cloudflare provides a content delivery network (CDN), cybersecurity, WAF, and other services.
Collect security events from Akamai products. Akamai specializes in content delivery network (CDN) solutions, cloud, and cybersecurity software.
Collect logs from various F5 products. F5 specializes in application delivery, firewall, and network security solutions.
Collect logs and data from Netskope via Cloud Log Shipper. Netskope is a security platform offering private access, networking, and cloud security solutions.
Track network activity from Suricata, including EVE output, alerts, metadata, and more. Suricata is an open-source intrusion detection system (IDS) and intrusion prevention system (IPS).
Analyze Zeek network traffic logs, with support for over forty Zeek logs. Zeek is an open-source network traffic analyzer and intrusion detection system.
Palo Alto Networks
Palo Alto Networks offers an enterprise cybersecurity platform that provides firewalls, threat detection and prevention tools, cloud security, network security, and more.
Collect logs from various Cisco services. Cisco offers an industry-leading portfolio of networking, security, collaboration, and other products.