View a partial list of the supported vendors and products for third-party log ingestion.
Logs from any product that can send logs in Syslog format (including CEF and LEEF
formats) can be ingested into
Trend Vision One™ via collectors connected to log repositories in Third-Party Log Collection. To ingest log data from products that do not support Syslog format or do not have
dedicated connectors or integrations in Trend Vision One, you must first convert the logs to Syslog format before forwarding the data to Trend Vision One.
NoteTrend Vision One also provides dedicated connectors to ingest log data from the following cloud products:
For more products with dedicated connectors in Trend Vision One, including products that receive outbound data from Trend Vision One, see Third-Party Integrations.
|
The following table provides a partial list of the supported vendors and products
in Third-Party Log Collection:
|
Vendor
|
Product
|
||
|
1Password
|
|
||
|
A10 Networks
|
|
||
|
Abnormal AI
|
|
||
|
Absolute Software Corporation
|
|
||
|
Acalvio Technologies, Inc.
|
|
||
|
Active Countermeasures, Inc.
|
|
||
|
ADTRAN Holdings, Inc.
|
|
||
|
Advanced Micro Devices, Inc. (AMD)
|
|
||
|
Agiloft, Inc.
|
|
||
|
Airlock Digital Pty Ltd
|
|
||
|
Akamai Technologies, Inc.
|
|
||
|
Akeyless.io Ltd.
|
|
||
|
Alcatel-Lucent Enterprise
|
|
||
|
AlgoSec, Inc.
|
|
||
|
AlphaSOC, Inc.
|
|
||
|
Amazon Web Services, Inc.
|
|
||
|
Anomali Inc.
|
|
||
|
Apache Software Foundation
|
|
||
|
Appian Corporation
|
|
||
|
Apple Inc.
|
|
||
|
AppOmni Inc.
|
|
||
|
Aqua Security Software Ltd
|
|
||
|
Archer Technologies LLC
|
|
||
|
Arctic Wolf Networks Inc.
|
|
||
|
Arista Networks, Inc.
|
|
||
|
Armis, Inc.
|
|
||
|
Array Networks, Inc.
|
|
||
|
Asimily Inc.
|
Asimily
|
||
|
Asset Panda LLC
|
|
||
|
Atlassian Corporation Plc
|
|
||
|
Automation Anywhere, Inc.
|
|
||
|
Avatier Corporation
|
|
||
|
Avaya LLC
|
|
||
|
Azion Corporation
|
|
||
|
Barracuda Networks, Inc.
|
|
||
|
BeyondTrust Software, Inc.
|
|
||
|
Bindplane, Inc.
|
|
||
|
Bitwarden, Inc.
|
|
||
|
BlueCat Networks, Inc.
|
|
||
|
BMC Software, Inc.
|
|
||
|
Box, Inc.
|
|
||
|
Broadcom Inc.
|
|
||
|
Cambium Networks Corporation
|
|
||
|
Cato Networks Ltd.
|
|
||
|
CD Foundation
|
|
||
|
Censys, Inc.
|
|
||
|
Center for Internet Security, Inc. (CIS)
|
|
||
|
Centripetal Networks, Inc.
|
|
||
|
Cequence Security, Inc.
|
|
||
|
Check Point Software Technologies Ltd.
|
|
||
|
Ciena Corporation
|
|
||
|
Cimcor, Inc.
|
|
||
|
CircleCI, Inc.
|
|
||
|
Cisco Systems, Inc.
|
|
||
|
Cisco Talos
|
|
||
|
Citrix Systems, Inc.
|
|
||
|
Claroty, Inc.
|
|
||
|
Cloud Native Computing Foundation
|
|
||
|
Cloudflare, Inc.
|
|
||
|
Cloudian
|
|
||
|
CloudM
|
|
||
|
CloudPassage, Inc.
|
|
||
|
Cofense, Inc.
|
|
||
|
Cohesity, Inc.
|
|
||
|
Colinet Trotta S.A.
|
|
||
|
comforte AG
|
|
||
|
Commvault Systems, Inc.
|
|
||
|
Corelight, Inc.
|
|
||
|
Cribl
|
|
||
|
CrowdStrike Holdings, Inc.
|
|
||
|
CrushFTP, LLC
|
|
||
|
Cyber 2.0
|
|
||
|
CyberArk Software Ltd.
|
|
||
|
Cybereason
|
|
||
|
Cynet
|
|
||
|
Cyolo Ltd.
|
|
||
|
Darktrace Holdings Ltd
|
|
||
|
Datadog, Inc.
|
|
||
|
Dataminr
|
|
||
|
Datto, Inc.
|
|
||
|
Deep Instinct
|
|
||
|
Delinea Inc.
|
|
||
|
Dell Technologies Inc.
|
|
||
|
Department of Health and Human Services
|
|
||
|
Digi International
|
|
||
|
DigiCert Inc.
|
|
||
|
Digital Arts Inc.
|
|
||
|
Digital Monitoring Products
|
|
||
|
DNSFilter, Inc.
|
|
||
|
DomainTools
|
|
||
|
dope.security
|
|
||
|
Druva Inc.
|
|
||
|
Edgio
|
|
||
|
EfficientIP
|
|
||
|
Elastic
|
|
||
|
Emerson Electric Co.
|
|
||
|
Entrust Corp.
|
|
||
|
Epic Systems Corporation
|
|
||
|
Ergon Informatik AG
|
|
||
|
ESET
|
|
||
|
ExtraHop Networks
|
|
||
|
Extreme Networks, Inc.
|
|
||
|
F5, Inc.
|
|
||
|
Fastly, Inc.
|
|
||
|
Fidelis Security
|
|
||
|
FileZilla
|
|
||
|
FingerprintJS, Inc.
|
|
||
|
Fivetran
|
|
||
|
Forcepoint
|
|
||
|
Forescout
|
|
||
|
Fortinet, Inc.
|
|
||
|
Fortra LLC
|
|
||
|
GFI Software
|
|
||
|
GitGuardian
|
|
||
|
GitHub, Inc.
|
|
||
|
GitLab Inc.
|
|
||
|
GMV
|
|
||
|
Google
|
|
||
|
Google Cloud
|
|
||
|
Google Open Source
|
|
||
|
Google Workspace
|
|
||
|
Gresham Technologies
|
|
||
|
H3C
|
|
||
|
HackerOne
|
|
||
|
Halcyon
|
|
||
|
Hannes von Haugwitz
|
|
||
|
HAProxy Technologies
|
|
||
|
Harness
|
|
||
|
HashiCorp
|
|
||
|
HC Networks Co., Ltd.
|
|
||
|
HCL Software
|
|
||
|
HID Global
|
|
||
|
Hillstone Networks
|
|
||
|
Hitachi Vantara
|
|
||
|
Honeywell International Inc.
|
|
||
|
Hewlett Packard Enterprise
|
|
||
|
HPE Aruba Networking
|
|
||
|
HPE Juniper Networking
|
|
||
|
Huawei Technologies Co., Ltd.
|
|
||
|
HYPR
|
|
||
|
IBM
|
|
||
|
iboss
|
|
||
|
Illumio
|
|
||
|
Infoblox, Inc.
|
|
||
|
InfoExpress, Inc.
|
|
||
|
Ingrian Networks, Inc.
|
|
||
|
Intel
|
|
||
|
Intel 471
|
|
||
|
Internet Systems Consortium, Inc.
|
|
||
|
InterSystems
|
|
||
|
ION Group
|
|
||
|
IONIX
|
|
||
|
Island
|
|
||
|
Jadaptive
|
|
||
|
Jamf
|
|
||
|
Jfrog
|
|
||
|
JumpCloud
|
|
||
|
Kaspersky
|
|
||
|
Keeper Security
|
|
||
|
Kemp Technologies
|
|
||
|
Kisi
|
|
||
|
Kiteworks, Inc.
|
|
||
|
KnowBe4
|
|
||
|
Kong
|
|
||
|
Kyriba
|
|
||
|
LastPass
|
|
||
|
LexisNexis Risk Solutions
|
|
||
|
LimaCharlie
|
|
||
|
Linkshadow
|
|
||
|
Linux Foundation
|
|
||
|
Lookout, Inc.
|
|
||
|
Lucid Software Inc.
|
|
||
|
Malwarebytes
|
|
||
|
Mandiant, Inc. (Google)
|
|
||
|
MariaDB Corporation
|
|
||
|
Mattermost, Inc
|
|
||
|
Microsoft
|
|
||
|
Mimecast Limited
|
|
||
|
Motorola Solutions, Inc.
|
|
||
|
NCR Corporation
|
|
||
|
Netwrix Corporation
|
|
||
|
Niels Provos
|
|
||
|
Okta, Inc.
|
|
||
|
Open Identity Platform Community
|
|
||
|
Open Text Corporation
|
|
||
|
Paessler
|
|
||
|
Palo Alto Networks, Inc.
|
|
||
|
Ping Identity Corporation
|
|
||
|
Planetcast Media Services Limited
|
|
||
|
Progress Software
|
|
||
|
Proofpoint, Inc.
|
|
||
|
Red Hat, Inc.
|
|
||
|
ReliaQuest
|
|
||
|
S.C. Bitdefender S.R.L.
|
|
||
|
SentinelOne, Inc.
|
|
||
|
Thales Group
|
|
||
|
Trellix
|
|
||
|
Xcitium
|
|
||
|
Zoho Corporation
|
|
