- ALL
- Cloud Security & Infrastructure
- Email Security
- Endpoint & EDR
- Identity & Access Management
- Network Security
- Threat Intelligence
- Workflow & Response
- Other
HUNTERS INTEGRATIONS
- CATEGORIES
- ALL
- Cloud Security & Infrastructure
- Email Security
- Endpoint & EDR
- Identity & Access Management
- Network Security
- Threat Intelligence
- Workflow & Response
- Other
1Password
Abnormal Security
abuse.ch
Acalvio Technologies
Agari Phishing Defense
Alert Logic WSM
Alibaba Cloud
AlienVault OTX
Anomali Intelligence
Apache2
Appgate
Aqua
Arbor Networks
Area 1
Armis
Armorblox
Astrix Security
Astrix Security Logs provide visibility into third-party integrations and service accounts connected to SaaS platforms. These logs help detect risky access patterns, excessive permissions, and potential supply chain abuse across cloud environments.
Atlassian
Auth0
Aviatrix
AWS
Axis Security
Barracuda
Beyond Trust
Bind DNS
Blackberry Cylance
Box
Breez Security
Bricata
Broadcom Secure Access Cloud (Luminate)
Cato Networks
Check Point
Cisco AnyConnect NVM
Cisco Firewall
Cisco Identity Services Engine
Cisco Meraki
Cisco Secure Endpoint (AMP)
Cisco Umbrella
Citrix Netscaler
Claroty
Cloudflare
CloudSEK
Code42
Cofense
Corelight Suricata Alerts
Cortex XDR (PAN)
Integrating PAN Cortex XDR into Hunters allows the collection and ingestion of key data types into the data lake. Furthermore, alerts will be created over the logs, auto-investigated, and correlated to other related signals.
CrowdStrike
CyberArk
Cybereason
Cyberhaven
Cyera
Cyren
DarkTrace
Databricks
Duo
Edgescan
F5 VPN
FireEye EX
FireEye NX
FortiEDR
Fortinet Firewall
GitHub
GitLab
GitLab is a web-based DevOps lifecycle tool that provides a Git repository manager offering wiki, issue-tracking, and CI/CD pipeline features, using an open-source license. It enables collaborative software development and version control, allowing teams to manage projects from planning and source code management to monitoring and security.
Google Cloud Platform
Google Workspace
Harness IO
HPE Aruba Networking
iboss
Illusive Networks
Imperva
InfoBlox
Ironscales
Island
Jamf
Jira
Jumpcloud
Juniper Firewall
Keeper
Keycloak
Kiteworks
Kubernetes
Lacework
Lansweeper
LastPass
Linux Auditd
Lookout
Lumos
Malwarebytes
ManageEngine ADAudit Plus
McAfee MVISION Cloud
Microsoft Azure
Microsoft Defender for Endpoint
Microsoft Exchange
Microsoft Graph API
Microsoft InTune
Mikrotik
Mimecast
MOVEit
Mulesoft
NetIQ
Netography
Netskope
NGINX
NoName Security
Normalyze
Nozomi Networks
Office365
Okta
Onapsis
OneLogin
OpenCTI
Openstack
OpenVPN
Orca
OSQuery
Palo Alto Networks Firewall
PerceptionPoint
PerimeterX Bot Defender
pfSense
PingID
Prisma Cloud
ProofPoint
ProtectWise
PulseSecure
Qualys
RH-ISAC
SailPoint
Salesforce
Salt Security
Integrating your Salt Security logs into the Hunters ecosystem will allow getting alerts from Salt Security into your Hunters portal, as well as investigating threat scenarios over it and getting related Hunters' detections for your tenant.
SAP
Sempris
SentinelOne
Seraphic Security
Signal Sciences
Silverfort
SilverPeak
Skyhigh Security
Slack
Snowflake
In the process of integrating the logs into hunters, the data is fetched using API, normalized into schemas and streamed to Hunters' Data Lake. The Ingestion allows the exploration of this source for overseeing users' usages in the Snowflake warehouse.
Solarwinds Orion
SonicWall
Sophos Central
Splunk Intelligence Management (TruStar)
Squid Proxy
STIX-TAXII
Stormshield
StrongDM
SURF Security
Symantec
Sysdig
Teleport
Tenable.io
Thinkst Canary
ThreatX
Thycotic
Tines
Trend Micro
Twingate
Twingate is a Zero Trust Network Access (ZTNA) platform that replaces traditional VPNs with a secure, modern approach to remote access. It provides identity-aware, least-privilege connectivity to internal apps and resources without exposing them to the public internet. With strong policy controls and visibility, Twingate helps organizations reduce attack surface and enforce Zero Trust principles across their workforce.
Upwind Security
Vectra
Very Good Security
Vicarius
VirusTotal
VMware Carbon Black
VMWare ESXi
VMware Workspace ONE
Watchguard Firebox
Wazuh
Windows Firewall Logs
Wiz
Workday
Zeek Logs
ZeroFox
Zoom
Zscaler
MISSING ANY INTEGRATIONS?