Integrations

Unlock your security data

All data at your fingertips. Instantly connect your tools and streamline your security data operations to experience full control and extract maximum data value.
Integrations

Unlock your security data

All data at your fingertips. Instantly connect your tools and streamline your security data operations to experience full control and extract maximum data value.
Integrations

Unlock your security data

All data at your fingertips. Instantly connect your tools and streamline your security data operations to experience full control and extract maximum data value.

Amazon MSK

Publish and subscribe to Amazon's managed Kafka service.

Amazon S3

Store, retrieve, and manage data objects in a scalable and durable cloud storage service.

Amazon Security Lake

Send OCSF events to Amazon Security Lake.

Amazon SQS

Send, receive, and manage messages between distributed applications.

AMQP

Send and receive messages between systems using a standardized, protocol-based approach.

Azure Blog Storage

Store, retrieve, and manage unstructured data at scale.

Azure Log Analytics

Collect, query, and analyze log and telemetry data from various sources.

Elasticsearch

Index, search, and analyze data in a distributed and scalable manner.

Email

Send pipeline contents as email via SMTP.

File

Read from and write to files.

Fluent Bit

Collect, process, and forward logs and metrics from various sources to many sinks.

FTP

Transfer files between a client and a server using a reliable, connection-based protocol.

Google Cloud Pub/Sub

Send, receive, and process messages between decoupled applications and services.

Google Cloud Storage

Store, retrieve, and manage data objects across a scalable, cloud-based environment.

Graylog

Collect, index, and analyze log data for monitoring and troubleshooting.

HTTP

Transfer and receive data between clients and servers using a request-response protocol.

Kafka

Publish, subscribe, store, and process streams of records in a distributed messaging system.

Microsoft Defender

Detect, prevent, and respond to security threats across endpoints and networks.

Microsoft Windows Event Logs

Collect Windows Event Logs.

Network Interface Card

Acquire packets from the network and process them with pipelines.

OpenSearch

Search, analyze, and visualize data with a distributed, open-source platform.

Snowflake

Store, analyze, and share structured and semi-structured data with a cloud-based warehouse.

Splunk

Collect, index, and analyze machine-generated data for monitoring, searching, and troubleshooting.

Suricata

Detect, log, and analyze network traffic for intrusion detection, prevention, and monitoring.

TCP

Establish, maintain, and terminate reliable, connection-oriented communication over IP networks.

UDP

Send and receive lightweight, connectionless datagrams over IP networks.

Velociraptor

Collect, monitor, and analyze endpoint data for digital forensics and incident response.

Zeek

Inspect, log, and analyze network traffic for security and operational insights.

ZeroMQ

Send, receive, and route messages asynchronously over various transport protocols.

Zscaler

Secure, inspect, and manage internet traffic to enforce policies and protect users.