Find the products supported by Trend Vision One for third-party log ingestion.
Logs from any product that can send logs in syslog format (including CEF and LEEF
formats) can be ingested into Trend Vision One via collectors connected to log repositories
in Third-Party Log Collection. Trend Vision One also provides dedicated connectors
to ingest log data from the following cloud products:
-
Microsoft Defender for Endpoint
-
AWS CloudTrail
-
AWS VPC Flow Logs
-
AWS WAF
-
Amazon Route53 Resolver Query Logs
-
AWS EKS Audit Logs
-
AWS Security Hub
-
Azure Activity logs
-
Microsoft Entra ID
The following vendors, products, and log types are selectable when configuring a collector
for a log repository in Third-Party Log Collection.
Vendor
|
Product
|
1Password
|
|
A10 Networks
|
|
Abnormal AI
|
|
Absolute Software Corporation
|
|
Acalvio Technologies, Inc.
|
|
Active Countermeasures, Inc.
|
|
ADTRAN Holdings, Inc.
|
|
Advanced Micro Devices, Inc. (AMD)
|
|
Agiloft, Inc.
|
|
Airlock Digital Pty Ltd
|
|
Akamai Technologies, Inc.
|
|
Akeyless.io Ltd.
|
|
Alcatel-Lucent Enterprise
|
|
AlgoSec, Inc.
|
|
AlphaSOC, Inc.
|
|
Amazon Web Services, Inc.
|
|
Anomali Inc.
|
|
Apache Software Foundation
|
|
Appian Corporation
|
|
Apple Inc.
|
|
AppOmni Inc.
|
|
Aqua Security Software Ltd
|
|
Archer Technologies LLC
|
|
Arctic Wolf Networks Inc.
|
|
Arista Networks, Inc.
|
|
Armis, Inc.
|
|
Array Networks, Inc.
|
|
Asimily Inc.
|
Asimily
|
Asset Panda LLC
|
|
Atlassian Corporation Plc
|
|
Automation Anywhere, Inc.
|
|
Avatier Corporation
|
|
Avaya LLC
|
|
Azion Corporation
|
|
Barracuda Networks, Inc.
|
|
BeyondTrust Software, Inc.
|
|
Bindplane, Inc.
|
|
Bitwarden, Inc.
|
|
BlueCat Networks, Inc.
|
|
BMC Software, Inc.
|
|
Box, Inc.
|
|
Broadcom Inc.
|
|
Cambium Networks Corporation
|
|
Cato Networks Ltd.
|
|
CD Foundation
|
|
Censys, Inc.
|
|
Center for Internet Security, Inc. (CIS)
|
|
Centripetal Networks, Inc.
|
|
Cequence Security, Inc.
|
|
Check Point Software Technologies Ltd.
|
|
Ciena Corporation
|
|
Cimcor, Inc.
|
|
CircleCI, Inc.
|
|
Cisco Systems, Inc.
|
|
Cisco Talos
|
|
Citrix Systems, Inc.
|
|
Claroty, Inc.
|
|
Cloud Native Computing Foundation
|
|
Cloudflare, Inc.
|
|
Cloudian
|
|
CloudM
|
|
CloudPassage, Inc.
|
|
Cofense, Inc.
|
|
Cohesity, Inc.
|
|
Colinet Trotta S.A.
|
|
comforte AG
|
|
Commvault Systems, Inc.
|
|
Corelight, Inc.
|
|
Cribl
|
|
CrowdStrike Holdings, Inc.
|
|
CrushFTP, LLC
|
|
Cyber 2.0
|
|
CyberArk Software Ltd.
|
|
Cybereason
|
|
Cynet
|
|
Cyolo Ltd.
|
|
Darktrace Holdings Ltd
|
|
Datadog, Inc.
|
|
Dataminr
|
|
Datto, Inc.
|
|
Deep Instinct
|
|
Delinea Inc.
|
|
Dell Technologies Inc.
|
|
Department of Health and Human Services
|
|
Digi International
|
|
DigiCert Inc.
|
|
Digital Arts Inc.
|
|
Digital Monitoring Products
|
|
DNSFilter, Inc.
|
|
DomainTools
|
|
dope.security
|
|
Druva Inc.
|
|
Edgio
|
|
EfficientIP
|
|
Elastic
|
|
Emerson Electric Co.
|
|
Entrust Corp.
|
|
Epic Systems Corporation
|
|
Ergon Informatik AG
|
|
ESET
|
|
ExtraHop Networks
|
|
Extreme Networks, Inc.
|
|
F5, Inc.
|
|
Fastly, Inc.
|
|
Fidelis Security
|
|
FileZilla
|
|
FingerprintJS, Inc.
|
|
Fivetran
|
|
Forcepoint
|
|
Forescout
|
|
Fortinet, Inc.
|
|
Fortra LLC
|
|
GFI Software
|
|
GitGuardian
|
|
GitHub, Inc.
|
|
GitLab Inc.
|
|
GMV
|
|
Google
|
|
Google Cloud
|
|
Google Open Source
|
|
Google Workspace
|
|
Gresham Technologies
|
|
H3C
|
|
HackerOne
|
|
Halcyon
|
|
Hannes von Haugwitz
|
|
HAProxy Technologies
|
|
Harness
|
|
HashiCorp
|
|
HC Networks Co., Ltd.
|
|
HCL Software
|
|
HID Global
|
|
Hillstone Networks
|
|
Hitachi Vantara
|
|
Honeywell International Inc.
|
|
Hewlett Packard Enterprise
|
|
HPE Aruba Networking
|
|
HPE Juniper Networking
|
|
Huawei Technologies Co., Ltd.
|
|
HYPR
|
|
IBM
|
|
iboss
|
|
Illumio
|
|
Infoblox, Inc.
|
|
InfoExpress, Inc.
|
|
Ingrian Networks, Inc.
|
|
Intel
|
|
Intel 471
|
|
Internet Systems Consortium, Inc.
|
|
InterSystems
|
|
ION Group
|
|
IONIX
|
|
Island
|
|
Jadaptive
|
|
Jamf
|
|
Jfrog
|
|
JumpCloud
|
|
Kaspersky
|
|
Keeper Security
|
|
Kemp Technologies
|
|
Kisi
|
|
Kiteworks, Inc.
|
|
KnowBe4
|
|
Kong
|
|
Kyriba
|
|
LastPass
|
|
LexisNexis Risk Solutions
|
|
LimaCharlie
|
|
Linkshadow
|
|
Linux Foundation
|
|
Lookout, Inc.
|
|
Lucid Software Inc.
|
|
Malwarebytes
|
|
Mandiant, Inc. (Google)
|
|
MariaDB Corporation
|
|
Mattermost, Inc
|
|
Microsoft
|
|
Mimecast Limited
|
|
Motorola Solutions, Inc.
|
|
NCR Corporation
|
|
Netwrix Corporation
|
|
Niels Provos
|
|
Okta, Inc.
|
|
Open Identity Platform Community
|
|
Open Text Corporation
|
|
Paessler
|
|
Palo Alto Networks, Inc.
|
|
Ping Identity Corporation
|
|
Planetcast Media Services Limited
|
|
Progress Software
|
|
Proofpoint, Inc.
|
|
Red Hat, Inc.
|
|
ReliaQuest
|
|
S.C. Bitdefender S.R.L.
|
|
SentinelOne, Inc.
|
|
Thales Group
|
|
Trellix
|
|
Xcitium
|
|
Zoho Corporation
|
|