Compatible Tools

Don’t see your security tool? We’re constantly integrating with new security solutions. If you don’t find your security tool on the list, don’t worry, as long as it produces alerts in machine-readable format, we’ll be able to integrate with it.

Contact Us Download compatible device list

CLOUD BASED DEVICES

  • AWS Logo

    AWS GuardDuty

    Amazon GuardDuty offers continuous monitoring of your AWS accounts and workloads to protect against malicious or unauthorized activities.

  • Fortniet Logo

    Fortinet FortiAnalyzer

    Fortinet FortinAnalyzer is an integrated security architecture with analytics and automation capabilities can address and dramatically improve visibility and automation.

  • Windows Defender Logo

    Azure Defender for Servers

    Safeguard Windows servers and clients with Microsoft Defender for Endpoint (servers) and protect Linux servers with behavioural analytics.

  • Azure Active Directory Identity Protection Logo

    Azure Active Directory Identity Protection

    Identity Protection is a tool that allows organizations to automate the detection and remediation of identity-based risks and export risk detection data to third-party utilities for further analysis.

  • Microsoft Cloud App Security logo

    Microsoft Cloud App Security

    Microsoft Cloud App Security is a comprehensive cross-SaaS solution bringing deep visibility, strong data controls, and enhanced threat protection to your cloud apps.

  • Windows Defender Logo

    Microsoft Defender Advanced Threat Protection

    Microsoft Defender for Identity helps protect your organization’s identities from multiple types of advanced targeted cyberattacks.

  • Office 365 Cloud App Security Logo

    Office 365 Cloud App Security

    Office 365 Cloud App Security includes threat detection based on user activity logs, discovery of Shadow IT for apps, control app permissions to Office 365, and apply access and session controls.

  • Azure Information Protection Logo

    Azure Information Protection

    Azure Information Protection (AIP) is a cloud-based solution that enables organizations to classify and protect documents and emails by applying labels.

  • Azure Sentinel Logo

    Azure Sentinel

    Azure Sentinel provides intelligent security analytics across your enterprise. The data for this analysis is stored in an Azure Monitor Log Analytics workspace.

  • Windows Defender Logo

    Microsoft Defender for Identity

    Microsoft Defender for Identity helps protect your organization’s identities from multiple types of advanced targeted cyberattacks.

FIREWALL IPS/IDS

  • Sonicwall Logo

    Sonicwall

    Complete Security Portfolio SonicWall deliver one of the most comprehensive selection of SME security products in the market.

  • Palo Alto Logo

    Palo Alto / PanOS

    PAN-OS® is the software that runs all Palo Alto Networks® next-generation firewalls.

  • Sophos Firewall Logo

    Sophos Firewall

    XG Firewall provides an elegant and effective web-based management console that offers quick access to all the features you need.

  • Fortniet Logo

    Fortinet Fortigate

    FortiGate NGFWs enable security-driven networking and consolidate industry-leading security capabilities.

  • Cicso Firepower Logo

    Cisco Firepower

    This is your administrative nerve center for managing critical Cisco network security solutions. It provides complete and unified management over firewalls

ENDPOINT PROTECTION

  • Malwarebytes Logo

    Malwarebytes

    Malwarebytes protects you against malware, ransomware, malicious websites, and other advanced online threats that have made traditional antivirus obsolete.

  • Sophos Logo

    Sophos

    Sophos Endpoint is an endpoint protection product that combines antimalware, web and application control, device control and much more.

  • Trend Micro Logo Compatible

    Trend Micro

    Trend Micro Deep Discovery is an advanced threat protection platform that enables you to detect, analyze, and respond to today’s stealthy, targeted attacks.

COMING SOON

  • Thinkst Canary Logo

    Thinkst Canary

    Most companies discover they’ve been breached way too late. Thinkst Canary fixes this: just 3 minutes of setup, no ongoing overhead, nearly 0 false positives, and you can detect attackers long before they dig in.

  • Proofpoint logo

    Proofpoint

    Proofpoint provides software as a service and products for inbound email security, outbound data loss prevention, social media, mobile devices, digital risk, email encryption, electronic discovery, and email archiving.