Collect logs from Check Point products. Check Point is a provider of hardware and software products for IT security, including network and endpoint security.
Palo Alto Networks
Palo Alto Networks offers an enterprise cybersecurity platform that provides firewalls, threat detection and prevention tools, cloud security, network security, and more.
Collect logs from various Zscaler products. Zscaler is a cloud-based cybersecurity platform offering secure internet access and protection against online threats for organizations.
Collect logs from various F5 products. F5 specializes in application delivery, firewall, and network security solutions.