View a partial list of the supported vendors and products for third-party log ingestion.
Logs from any product that can send logs in Syslog format (including CEF and LEEF
formats) can be ingested into
TrendAI Vision One™ via collectors connected to log repositories in Third-Party Log Collection. To ingest log data from products that do not support Syslog format or do not have
dedicated connectors or integrations in TrendAI Vision One™, you must first convert the logs to Syslog format before forwarding the data to TrendAI Vision One™.
NoteTrendAI Vision One™ also provides dedicated connectors to ingest log data from the following cloud products:
For more products with dedicated connectors in TrendAI Vision One™, including products that receive outbound data from TrendAI Vision One™, see Third-Party Integrations.
|
The following table is a list of the supported vendors and products in Third-Party
Log Collection. TrendAI™ does not guarantee the accuracy of third-party vendor or product names.
|
Vendor
|
Product
|
||
|
1Password
|
|
||
|
A10 Networks
|
|
||
|
Abnormal AI
|
|
||
|
Absolute Software
|
|
||
|
Acalvio
|
|
||
|
Active Countermeasures
|
|
||
|
Adtran
|
|
||
|
Agiloft
|
|
||
|
AIDE
|
|
||
|
Airbyte
|
|
||
|
Airlock Digital
|
|
||
|
Akamai
|
|
||
|
Akeyless
|
|
||
|
Alcatel-Lucent Enterprise
|
|
||
|
AlgoSec
|
|
||
|
AlphaSOC
|
|
||
|
AMD
|
|
||
|
Anomali
|
|
||
|
Ansible
|
|
||
|
Apache Software Foundation
|
|
||
|
APC
|
|
||
|
Appian
|
|
||
|
Apple
|
|
||
|
AppOmni
|
|
||
|
Aqua Security Software
|
|
||
|
Archer
|
|
||
|
Arista
|
|
||
|
Armis
|
|
||
|
Array Networks
|
|
||
|
Asimily
|
|
||
|
Asset Panda
|
|
||
|
Atlassian
|
|
||
|
Authentik
|
|
||
|
Automation Anywwhere
|
|
||
|
Avatier
|
|
||
|
Avaya LLC
|
|
||
|
AWS
|
|
||
|
Azion
|
|
||
|
Barracuda
|
|
||
|
BeyondTrust
|
|
||
|
Big Switch Networks
|
|
||
|
Bindplane
|
|
||
|
Bitdefender
|
|
||
|
Bitwarden
|
|
||
|
BlackBerry
|
|
||
|
Bluecat
|
|
||
|
BMC
|
|
||
|
Box
|
|
||
|
Broadcom
|
|
||
|
Cambium Networks
|
|
||
|
Candescent
|
|
||
|
Cato Networks
|
|
||
|
CD Foundation
|
|
||
|
Censys
|
|
||
|
Centripetal Networks
|
|
||
|
Cequence Security
|
|
||
|
Check Point
|
|
||
|
CheckPointHarmony Email & Collaboration
|
|
||
|
Ciena
|
|
||
|
Cimcor
|
|
||
|
Circle Internet Services
|
|
||
|
CIS
|
|
||
|
Cisco
|
|
||
|
Cisco Duo
|
|
||
|
Citrix
|
|
||
|
Claroty
|
|
||
|
Cloudflare
|
|
||
|
Cloudian
|
|
||
|
CloudM
|
|
||
|
Cofense
|
|
||
|
Cohesity
|
|
||
|
Colinet Trotta
|
|
||
|
Comforte
|
|
||
|
CommVault
|
|
||
|
Comodo
|
|
||
|
Corelight
|
|
||
|
Cribl
|
|
||
|
CrowdStrike
|
|
||
|
CrushFTP
|
|
||
|
Cyber 2.0
|
|
||
|
CyberArk
|
|
||
|
Cybereason
|
|
||
|
Cynet
|
|
||
|
Cyolo
|
|
||
|
Darktrace
|
|
||
|
Databricks
|
|
||
|
Datadog
|
|
||
|
Dataminr
|
|
||
|
Datto
|
|
||
|
Deep Instinct
|
|
||
|
DEFUNCT/DISBANDED
|
|
||
|
Delinea
|
|
||
|
Dell
|
|
||
|
Department of Health and Human Services
|
|
||
|
Digi International
|
|
||
|
DigiCert
|
|
||
|
Digital Arts
|
|
||
|
DMP
|
|
||
|
DNSFilter
|
|
||
|
DomainTools
|
|
||
|
Dope.security
|
|
||
|
Druva
|
|
||
|
Edgio
|
|
||
|
EfficientIP
|
|
||
|
Elastic
|
|
||
|
Emerson Electric Co.
|
|
||
|
Entrust
|
|
||
|
Epic Systems
|
|
||
|
Ergon Informatik
|
|
||
|
ESET
|
|
||
|
ExtraHop Networks
|
|
||
|
Extreme Networks
|
|
||
|
F5
|
|
||
|
Fastly
|
|
||
|
FAstly
|
|
||
|
Fidelis
|
|
||
|
Fidelis Security
|
|
||
|
FileZilla
|
|
||
|
Fingerprint
|
|
||
|
Fivetran
|
|
||
|
Fluentd Project
|
|
||
|
Forcepoint
|
|
||
|
Forescout
|
|
||
|
ForgeRock
|
|
||
|
Forgerock
|
|
||
|
Fortinet
|
|
||
|
Fortra
|
|
||
|
GitGuardian
|
|
||
|
GitHub
|
|
||
|
GitLab
|
|
||
|
GMV
|
|
||
|
Google
|
|
||
|
Gresham
|
|
||
|
H3C
|
|
||
|
Hackerone
|
|
||
|
Halcyon
|
|
||
|
HAProxy Technologies
|
|
||
|
Harness
|
|
||
|
HashiCorp
|
|
||
|
HC Networks
|
|
||
|
HCL Software
|
|
||
|
HID
|
|
||
|
Hillstone Networks
|
|
||
|
Hitachi Solutions
|
|
||
|
HPE
|
|
||
|
HPE Aruba Networks
|
|
||
|
HPE Juniper
|
|
||
|
Huawei
|
|
||
|
HYPR
|
|
||
|
IBM
|
|
||
|
iboss
|
|
||
|
Illumio
|
|
||
|
Infoblox
|
|
||
|
InfoExpress
|
|
||
|
Infor
|
|
||
|
Intel
|
|
||
|
Intel 471
|
|
||
|
Internet Systems Consortium
|
|
||
|
InterSystems
|
|
||
|
ION
|
|
||
|
IONIX
|
|
||
|
ISC
|
|
||
|
Island
|
|
||
|
Jamf
|
|
||
|
Jfrog
|
|
||
|
JumpCloud
|
|
||
|
Kaspersky
|
|
||
|
Kea
|
|
||
|
Keeper Security
|
|
||
|
Kemp
|
|
||
|
KerioControl
|
|
||
|
Keycloak
|
|
||
|
Kiewrowks
|
|
||
|
Kisi
|
|
||
|
Kiteworks
|
|
||
|
KnowBe4
|
|
||
|
Kolide
|
|
||
|
Kong
|
|
||
|
Kubernetes
|
|
||
|
Kyriba
|
|
||
|
Lacework
|
|
||
|
LastPass
|
|
||
|
Layer7 SiteMinder
|
|
||
|
LenelS2
|
|
||
|
LexisNexis Risk Solutions
|
|
||
|
LimaCharlie
|
|
||
|
Linkshadow
|
|
||
|
Linux Auditing System (AuditD)
|
|
||
|
Linux DHCP
|
|
||
|
Linux Sysmon
|
|
||
|
Linux System
|
|
||
|
LogicMonitor
|
|
||
|
LogonBox
|
|
||
|
Looker
|
|
||
|
Lookout
|
|
||
|
Lucid
|
|
||
|
macOS Endpoint Security
|
|
||
|
Malwarebytes
|
|
||
|
ManageEngine
|
|
||
|
Mandiant
|
|
||
|
Maria
|
|
||
|
Mattermost
|
|
||
|
McAfee
|
|
||
|
Medigate IoT
|
|
||
|
Men&Mice
|
|
||
|
Menlo Security
|
|
||
|
Metabase
|
|
||
|
Micro Focus
|
|
||
|
Microsoft
|
|
||
|
MicroStrategy
|
|
||
|
Mikrotik
|
|
||
|
Mimecast
|
|
||
|
MISP Threat Intelligence
|
|
||
|
Mobileiron
|
|
||
|
Mongo
|
|
||
|
Motorola Solutions
|
|
||
|
MySQL
|
|
||
|
Nagios
|
|
||
|
Nasuni
|
|
||
|
Neo4j
|
|
||
|
Neosec
|
|
||
|
Net Suite
|
|
||
|
NetApp
|
|
||
|
Netapp
|
|
||
|
NetDocuments Solutions
|
|
||
|
Netfilter IPtables
|
|
||
|
NetIQ
|
|
||
|
Netscout
|
|
||
|
Netskope
|
|
||
|
Network Box
|
|
||
|
Netwrix
|
|
||
|
NGINX
|
|
||
|
Niels Provos
|
|
||
|
Nokia
|
|
||
|
Noname API Security
|
|
||
|
Nozomi Networks
|
|
||
|
Ntopng
|
|
||
|
Nucleus
|
|
||
|
Nutanix Prism
|
|
||
|
NVIDIA
|
|
||
|
NXLog Manager
|
|
||
|
Nyansa Events
|
|
||
|
Okta
|
|
||
|
Onapsis
|
|
||
|
One Identity
|
|
||
|
OneLogin
|
|
||
|
Onfido
|
|
||
|
Oort Security Tool
|
|
||
|
Open Cybersecurity Schema Framework (OCSF)
|
|
||
|
Open LDAP
|
|
||
|
Open Policy Agent
|
|
||
|
OpenAI
|
|
||
|
OpenCanary
|
|
||
|
Opengear
|
|
||
|
Openpath
|
|
||
|
OpenSSH
|
|
||
|
OpenTelemetry Netflow Receiver
|
|
||
|
OpenText
|
|
||
|
OpenVPN
|
|
||
|
Opnsense
|
|
||
|
Ops Genie
|
|
||
|
Opswat Metadefender
|
|
||
|
Oracle
|
|
||
|
Orca
|
|
||
|
Ordr
|
|
||
|
OSQuery
|
|
||
|
OSSEC
|
|
||
|
Palantir
|
|
||
|
Palo Alto Networks
|
|
||
|
PAN Autofocus
|
|
||
|
Passive DNS
|
|
||
|
Passwordstate
|
|
||
|
Peplink
|
|
||
|
PerimeterX
|
|
||
|
pfSense
|
|
||
|
Pharos
|
|
||
|
Phishlabs
|
|
||
|
Ping Identity
|
|
||
|
Pivotal
|
|
||
|
Planetcast
|
|
||
|
Portnox
|
|
||
|
PostFix Mail
|
|
||
|
PostgreSQL
|
|
||
|
Precisely
|
|
||
|
Preempt
|
|
||
|
Privacy-I
|
|
||
|
ProFTPD
|
|
||
|
Progress Software
|
|
||
|
Proofpoint
|
|
||
|
ProofPoint
|
|
||
|
Pulse Secure
|
|
||
|
Pure Storage
|
|
||
|
QNAP Systems
|
|
||
|
Qualys
|
|
||
|
Quest
|
|
||
|
Qumulo FS
|
|
||
|
Radware
|
|
||
|
Rapid7
|
|
||
|
Recorded Future
|
|
||
|
Recordia
|
|
||
|
Red Canary
|
|
||
|
Red Hat
|
|
||
|
Reliaquest
|
|
||
|
Reliquest
|
|
||
|
Remediant
|
|
||
|
ReviveSec
|
|
||
|
RH-ISAC
|
|
||
|
Ribbon Analytics Platform
|
|
||
|
Rippling Activity Logs
|
|
||
|
Riverbed Steelhead
|
|
||
|
RSA
|
|
||
|
Rubrik
|
|
||
|
Ruckus Networks
|
|
||
|
SailPoint
|
|
||
|
Saiwall VPN
|
|
||
|
Salesforce
|
|
||
|
Samba SMBD
|
|
||
|
Sangfor
|
|
||
|
SAP
|
|
||
|
Saviynt Enterprise Identity Cloud
|
|
||
|
SecureAuth
|
|
||
|
SecureLink
|
|
||
|
Semperis DSP
|
|
||
|
Sendmail
|
|
||
|
SentinelOne
|
|
||
|
Sentry
|
|
||
|
SEPPmail Secure Email
|
|
||
|
Seqrite Endpoint Security (EPS)
|
|
||
|
ServiceNow
|
|
||
|
Shibboleth
|
|
||
|
Shrubbery TACACS+
|
|
||
|
Sierra Wireless
|
|
||
|
Signal Sciences
|
|
||
|
Silverfort
|
|
||
|
SiteMinder
|
|
||
|
Skybox Security
|
|
||
|
Skyhigh Security
|
|
||
|
Slack
|
|
||
|
Smartsheet
|
|
||
|
Snare Solutions
|
|
||
|
Snipe-IT
|
|
||
|
Snoopy Logger
|
|
||
|
Snort
|
|
||
|
Snowflake
|
|
||
|
Snyk
|
|
||
|
Solaris system
|
|
||
|
Solarwinds
|
|
||
|
SonicWall
|
|
||
|
Sonrai
|
|
||
|
Sophos
|
|
||
|
SOTI
|
|
||
|
Sourcefire
|
|
||
|
Splunk
|
|
||
|
Spur
|
|
||
|
SpyCloud
|
|
||
|
Squid
|
|
||
|
StackHawk
|
|
||
|
StackSpot
|
|
||
|
Stealthbits
|
|
||
|
STIX Threat Intelligence
|
|
||
|
Stormshield
|
|
||
|
strongSwan
|
|
||
|
Sublime Security
|
|
||
|
Suricata
|
|
||
|
Swift
|
|
||
|
Swimlane
|
|
||
|
Symantec
|
|
||
|
Synology
|
|
||
|
Sysdig
|
|
||
|
Systemd
|
|
||
|
Tableau
|
|
||
|
TACACS Plus
|
|
||
|
Tailscale
|
|
||
|
Talon
|
|
||
|
Tanium
|
|
||
|
TCPWave
|
|
||
|
Team Cymru
|
|
||
|
TeamViewer
|
|
||
|
Teleport
|
|
||
|
Tenable
|
|
||
|
Teradata
|
|
||
|
Tetragon
|
|
||
|
Thales
|
|
||
|
The Linux Foundation
|
|
||
|
Thinkst Canary
|
|
||
|
ThreatConnect
|
|
||
|
ThreatLocker
|
|
||
|
ThreatX WAF
|
|
||
|
Thycotic
|
|
||
|
Tines
|
|
||
|
TINTRI
|
|
||
|
Trellix
|
|
||
|
Tripwire
|
|
||
|
Trustwave
|
|
||
|
Twingate
|
|
||
|
TXOne Networks
|
|
||
|
UberAgent
|
|
||
|
Ubika
|
|
||
|
Ubiquiti
|
|
||
|
UKG
|
|
||
|
Unbound DNS
|
|
||
|
Unifi AP
|
|
||
|
Unix system
|
|
||
|
UpGuard
|
|
||
|
Upstream Security
|
|
||
|
Uptycs
|
|
||
|
UPX
|
|
||
|
UrlScan.io
|
|
||
|
VanDyke
|
|
||
|
Varonis
|
|
||
|
Vectra
|
|
||
|
Veeam
|
|
||
|
Velo Technologies
|
|
||
|
Venafi
|
|
||
|
Verba
|
|
||
|
Vercel
|
|
||
|
Veridium
|
|
||
|
Veritas Technologies
|
|
||
|
Versa Networks
|
|
||
|
Virtru
|
|
||
|
VMware
|
|
||
|
Voltage
|
|
||
|
Vsftpd
|
|
||
|
VyOS
|
|
||
|
WALLIX Bastion
|
|
||
|
WatchGuard
|
|
||
|
Wazuh
|
|
||
|
WeKan
|
|
||
|
Windchill
|
|
||
|
Winscp
|
|
||
|
wiz.io
|
|
||
|
WordPress
|
|
||
|
Workday
|
|
||
|
WP Engine
|
|
||
|
Xiting
|
|
||
|
YAMAHA
|
|
||
|
Yubico
|
|
||
|
Zeek
|
|
||
|
Zendesk
|
|
||
|
Zero Networks
|
|
||
|
ZeroFox Platform
|
|
||
|
Zimperium
|
|
||
|
Zix
|
|
||
|
Zoom
|
|
||
|
Zscaler
|
|
||
|
Zyxel
|
|
