Anzeigen einer Liste der unterstützten Produkte für die Protokollaufnahme von Drittanbietern.
Protokolle von jedem Produkt, das Protokolle im Syslog-Format senden kann (einschließlich
CEF- und LEEF-Formate), können über Sammler, die mit Protokollspeichern in der Drittanbieter-Protokollsammlung
verbunden sind, in Trend Vision One™ aufgenommen werden. Trend Vision One bietet auch spezielle Konnektoren, um Protokolldaten von den folgenden Cloud-Produkten
zu erfassen:
-
Microsoft Defender für Endpunkt
-
AWS CloudTrail
-
AWS VPC-Flussprotokolle
-
AWS WAF
-
Amazon Route53 Resolver-Abfrageprotokolle
-
AWS EKS Prüfprotokolle
-
AWS Security Hub
-
Azure Aktivitätsprotokolle
-
Microsoft Entra ID
Um Protokolldaten von Produkten zu erfassen, die das Syslog-Format nicht unterstützen
oder keine dedizierten Konnektoren oder Integrationen in Trend Vision One haben, müssen Sie die Protokolle zuerst in das Syslog-Format konvertieren, bevor
Sie die Daten an Trend Vision One weiterleiten.
Die folgenden Anbieter, Produkte und Protokolltypen sind auswählbar, wenn ein Sammler
für ein Protokoll-Repository in der Drittanbieter-Protokollsammlung konfiguriert wird.
|
Händler
|
Produkt
|
||
|
1Password
|
|
||
|
A10 Netzwerke
|
|
||
|
Ungewöhnliche KI
|
|
||
|
Absolute Software Corporation
|
|
||
|
Acalvio Technologies, Inc.
|
|
||
|
Active Countermeasures, Inc.
|
|
||
|
ADTRAN Holdings, Inc.
|
|
||
|
Advanced Micro Devices, Inc. (AMD)
|
|
||
|
Agiloft, Inc.
|
|
||
|
Airlock Digital Pty Ltd
|
|
||
|
Akamai Technologies, Inc.
|
|
||
|
Akeyless.io Ltd.
|
|
||
|
Alcatel-Lucent Enterprise
|
|
||
|
AlgoSec, Inc.
|
|
||
|
AlphaSOC, Inc.
|
|
||
|
Amazon Web-Services, Inc.
|
|
||
|
Anomali Inc.
|
|
||
|
Apache Software Foundation
|
|
||
|
Appian Corporation
|
|
||
|
Apple Inc.
|
|
||
|
AppOmni Inc.
|
|
||
|
Software Ltd für Aqua Security
|
|
||
|
Archer Technologies LLC
|
|
||
|
Arctic Wolf Networks Inc.
|
|
||
|
Arista Networks, Inc.
|
|
||
|
Armis, Inc.
|
|
||
|
Array Networks, Inc.
|
|
||
|
Asimily Inc.
|
Asimily
|
||
|
Asset Panda LLC
|
|
||
|
Atlassian Corporation Plc
|
|
||
|
Automation Anywhere, Inc.
|
|
||
|
Avatier Corporation
|
|
||
|
Avaya LLC
|
|
||
|
Azion Corporation
|
|
||
|
Barracuda Networks, Inc.
|
|
||
|
BeyondTrust Software, Inc.
|
|
||
|
Bindplane, Inc.
|
|
||
|
Bitwarden, Inc.
|
|
||
|
BlueCat Networks, Inc.
|
|
||
|
BMC Software, Inc.
|
|
||
|
Box, Inc.
|
|
||
|
Broadcom Inc.
|
|
||
|
Cambium Networks Corporation
|
|
||
|
Cato Networks Ltd.
|
|
||
|
CD-Stiftung
|
|
||
|
Censys, Inc.
|
|
||
|
Center for Internet Security, Inc. (CIS)
|
|
||
|
Centripetal Networks, Inc.
|
|
||
|
Cequence Security, Inc.
|
|
||
|
Check Point Software Technologies Ltd.
|
|
||
|
Ciena Corporation
|
|
||
|
Cimcor, Inc.
|
|
||
|
CircleCI, Inc.
|
|
||
|
Cisco Systems, Inc.
|
|
||
|
Cisco Talos
|
|
||
|
Citrix Systems, Inc.
|
|
||
|
Claroty, Inc.
|
|
||
|
Cloud Native Computing Foundation
|
|
||
|
Cloudflare, Inc.
|
|
||
|
Cloudian
|
|
||
|
CloudM
|
|
||
|
CloudPassage, Inc.
|
|
||
|
Cofense, Inc.
|
|
||
|
Cohesity, Inc.
|
|
||
|
Colinet Trotta S.A.
|
|
||
|
comforte AG
|
|
||
|
Commvault Systems, Inc.
|
|
||
|
Corelight, Inc.
|
|
||
|
Cribl
|
|
||
|
CrowdStrike Holdings, Inc.
|
|
||
|
CrushFTP, LLC
|
|
||
|
Cyber 2.0
|
|
||
|
CyberArk Software Ltd.
|
|
||
|
Cybereason
|
|
||
|
Cynet
|
|
||
|
Cyolo Ltd.
|
|
||
|
Darktrace Holdings Ltd
|
|
||
|
Datadog, Inc.
|
|
||
|
Dataminr
|
|
||
|
Datto, Inc.
|
|
||
|
Deep Instinct
|
|
||
|
Delinea Inc.
|
|
||
|
Dell Technologies Inc.
|
|
||
|
Ministerium für Gesundheit und Soziale Dienste
|
|
||
|
Digi International
|
|
||
|
DigiCert Inc.
|
|
||
|
Digital Kultur GmbH
|
|
||
|
Digitale Überwachungsprodukte
|
|
||
|
DNSFilter, Inc.
|
|
||
|
DomainTools
|
|
||
|
dope.security
|
|
||
|
Druva Inc.
|
|
||
|
Edgio
|
|
||
|
EfficientIP
|
|
||
|
Elastisch
|
|
||
|
Emerson Electric Co.
|
|
||
|
Entrust Corp.
|
|
||
|
Epic Systems Corporation
|
|
||
|
Ergon Informatik AG
|
|
||
|
ESET
|
|
||
|
ExtraHop Netzwerke
|
|
||
|
Extreme Networks, Inc.
|
|
||
|
F5, Inc.
|
|
||
|
Fastly, Inc.
|
|
||
|
Fidelis Sicherheit
|
|
||
|
FileZilla
|
|
||
|
FingerprintJS, Inc.
|
|
||
|
Fivetran
|
|
||
|
Forcepoint
|
|
||
|
Forescout
|
|
||
|
Fortinet, Inc.
|
|
||
|
Fortra LLC
|
|
||
|
GFI Software
|
|
||
|
GitGuardian
|
|
||
|
GitHub, Inc.
|
|
||
|
GitLab Inc.
|
|
||
|
GMV
|
|
||
|
Google
|
|
||
|
Google Cloud
|
|
||
|
Google Open Source
|
|
||
|
Google Workspace
|
|
||
|
Gresham Technologies
|
|
||
|
H3C
|
|
||
|
HackerOne
|
|
||
|
Halcyon
|
|
||
|
Hannes von Haugwitz
|
|
||
|
HAProxy-Technologien
|
|
||
|
Harness
|
|
||
|
HashiCorp
|
|
||
|
HC Networks Co., Ltd.
|
|
||
|
HCL Software
|
|
||
|
HID Global
|
|
||
|
Hillstone Networks
|
|
||
|
Hitachi Vantara
|
|
||
|
Honeywell International Inc.
|
|
||
|
Hewlett Packard Enterprise
|
|
||
|
HPE Aruba Netzwerk
|
|
||
|
HPE Juniper Netzwerke
|
|
||
|
Huawei Technologies Co., Ltd.
|
|
||
|
HYPR
|
|
||
|
IBM
|
|
||
|
iboss
|
|
||
|
Illumio
|
|
||
|
Infoblox, Inc.
|
|
||
|
InfoExpress, Inc.
|
|
||
|
Ingrian Networks, Inc.
|
|
||
|
Intel
|
|
||
|
Intel 471
|
|
||
|
Internet Systems Consortium, Inc.
|
|
||
|
InterSystems
|
|
||
|
ION Gruppe
|
|
||
|
IONIX
|
|
||
|
Insel
|
|
||
|
Jadaptive
|
|
||
|
Jamf
|
|
||
|
Jfrog
|
|
||
|
JumpCloud
|
|
||
|
Kaspersky
|
|
||
|
Keeper Security
|
|
||
|
Kemp Technologies
|
|
||
|
Kisi
|
|
||
|
Kiteworks, Inc.
|
|
||
|
KnowBe4
|
|
||
|
Kong
|
|
||
|
Kyriba
|
|
||
|
LastPass
|
|
||
|
LexisNexis Risk Solutions
|
|
||
|
LimaCharlie
|
|
||
|
Linkshadow
|
|
||
|
Linux Stiftung
|
|
||
|
Lookout, Inc.
|
|
||
|
Lucid Software Inc.
|
|
||
|
Malwarebytes
|
|
||
|
Mandiant, Inc. (Google)
|
|
||
|
MariaDB Corporation
|
|
||
|
Mattermost, Inc
|
|
||
|
Microsoft
|
|
||
|
Mimecast Limited
|
|
||
|
Motorola Solutions, Inc.
|
|
||
|
NCR Corporation
|
|
||
|
Netwrix Corporation
|
|
||
|
Niels Provos
|
|
||
|
Okta, Inc.
|
|
||
|
Open Identity Platform Community
|
|
||
|
Open Text Corporation
|
|
||
|
Paessler
|
|
||
|
Palo Alto Networks, Inc.
|
|
||
|
Ping Identity Corporation
|
|
||
|
Planetcast Media Services Limited
|
|
||
|
Progress Software
|
|
||
|
Proofpoint, Inc.
|
|
||
|
Red Hat, Inc.
|
|
||
|
ReliaQuest
|
|
||
|
S.C. Bitdefender S.R.L.
|
|
||
|
SentinelOne, Inc.
|
|
||
|
Thales Gruppe
|
|
||
|
Trellix
|
|
||
|
Xcitium
|
|
||
|
Zoho Corporation
|
|
