View a partial list of the supported vendors and products for third-party log ingestion.
Logs from any product that can send logs in Syslog format (including CEF and LEEF
formats) can be ingested into
TrendAI Vision One™ via collectors connected to log repositories in Third-Party Log Collection. To ingest log data from products that do not support Syslog format or do not have
dedicated connectors or integrations in TrendAI Vision One™, you must first convert the logs to Syslog format before forwarding the data to TrendAI Vision One™.
NoteTrendAI Vision One™ also provides dedicated connectors to ingest log data from the following cloud products:
For more products with dedicated connectors in TrendAI Vision One™, including products that receive outbound data from TrendAI Vision One™, see Third-Party Integrations.
|
The following table provides a partial list of the supported vendors and products
in Third-Party Log Collection:
|
Vendor
|
Product
|
||
|
1Password
|
|
||
|
A10 Networks
|
|
||
|
Abnormal AI
|
|
||
|
Absolute Software Corporation
|
|
||
|
Acalvio Technologies, Inc.
|
|
||
|
Active Countermeasures, Inc.
|
|
||
|
ADTRAN Holdings, Inc.
|
|
||
|
Advanced Micro Devices, Inc. (AMD)
|
|
||
|
Agiloft, Inc.
|
|
||
|
Airlock Digital Pty Ltd
|
|
||
|
Akamai Technologies, Inc.
|
|
||
|
Akeyless.io Ltd.
|
|
||
|
Alcatel-Lucent Enterprise
|
|
||
|
AlgoSec, Inc.
|
|
||
|
AlphaSOC, Inc.
|
|
||
|
Amazon Web Services, Inc.
|
|
||
|
Anomali Inc.
|
|
||
|
Apache Software Foundation
|
|
||
|
Appian Corporation
|
|
||
|
Apple Inc.
|
|
||
|
AppOmni Inc.
|
|
||
|
Aqua Security Software Ltd
|
|
||
|
Archer Technologies LLC
|
|
||
|
Arctic Wolf Networks Inc.
|
|
||
|
Arista Networks, Inc.
|
|
||
|
Armis, Inc.
|
|
||
|
Array Networks, Inc.
|
|
||
|
Asimily Inc.
|
Asimily
|
||
|
Asset Panda LLC
|
|
||
|
Atlassian Corporation Plc
|
|
||
|
Automation Anywhere, Inc.
|
|
||
|
Avatier Corporation
|
|
||
|
Avaya LLC
|
|
||
|
Azion Corporation
|
|
||
|
Barracuda Networks, Inc.
|
|
||
|
BeyondTrust Software, Inc.
|
|
||
|
Bindplane, Inc.
|
|
||
|
Bitwarden, Inc.
|
|
||
|
BlueCat Networks, Inc.
|
|
||
|
BMC Software, Inc.
|
|
||
|
Box, Inc.
|
|
||
|
Broadcom Inc.
|
|
||
|
Cambium Networks Corporation
|
|
||
|
Cato Networks Ltd.
|
|
||
|
CD Foundation
|
|
||
|
Censys, Inc.
|
|
||
|
Center for Internet Security, Inc. (CIS)
|
|
||
|
Centripetal Networks, Inc.
|
|
||
|
Cequence Security, Inc.
|
|
||
|
Check Point Software Technologies Ltd.
|
|
||
|
Ciena Corporation
|
|
||
|
Cimcor, Inc.
|
|
||
|
CircleCI, Inc.
|
|
||
|
Cisco Systems, Inc.
|
|
||
|
Cisco Talos
|
|
||
|
Citrix Systems, Inc.
|
|
||
|
Claroty, Inc.
|
|
||
|
Cloud Native Computing Foundation
|
|
||
|
Cloudflare, Inc.
|
|
||
|
Cloudian
|
|
||
|
CloudM
|
|
||
|
CloudPassage, Inc.
|
|
||
|
Cofense, Inc.
|
|
||
|
Cohesity, Inc.
|
|
||
|
Colinet Trotta S.A.
|
|
||
|
comforte AG
|
|
||
|
Commvault Systems, Inc.
|
|
||
|
Corelight, Inc.
|
|
||
|
Cribl
|
|
||
|
CrowdStrike Holdings, Inc.
|
|
||
|
CrushFTP, LLC
|
|
||
|
Cyber 2.0
|
|
||
|
CyberArk Software Ltd.
|
|
||
|
Cybereason
|
|
||
|
Cynet
|
|
||
|
Cyolo Ltd.
|
|
||
|
Darktrace Holdings Ltd
|
|
||
|
Datadog, Inc.
|
|
||
|
Dataminr
|
|
||
|
Datto, Inc.
|
|
||
|
Deep Instinct
|
|
||
|
Delinea Inc.
|
|
||
|
Dell Technologies Inc.
|
|
||
|
Department of Health and Human Services
|
|
||
|
Digi International
|
|
||
|
DigiCert Inc.
|
|
||
|
Digital Arts Inc.
|
|
||
|
Digital Monitoring Products
|
|
||
|
DNSFilter, Inc.
|
|
||
|
DomainTools
|
|
||
|
dope.security
|
|
||
|
Druva Inc.
|
|
||
|
Edgio
|
|
||
|
EfficientIP
|
|
||
|
Elastic
|
|
||
|
Emerson Electric Co.
|
|
||
|
Entrust Corp.
|
|
||
|
Epic Systems Corporation
|
|
||
|
Ergon Informatik AG
|
|
||
|
ESET
|
|
||
|
ExtraHop Networks
|
|
||
|
Extreme Networks, Inc.
|
|
||
|
F5, Inc.
|
|
||
|
Fastly, Inc.
|
|
||
|
Fidelis Security
|
|
||
|
FileZilla
|
|
||
|
FingerprintJS, Inc.
|
|
||
|
Fivetran
|
|
||
|
Forcepoint
|
|
||
|
Forescout
|
|
||
|
Fortinet, Inc.
|
|
||
|
Fortra LLC
|
|
||
|
GFI Software
|
|
||
|
GitGuardian
|
|
||
|
GitHub, Inc.
|
|
||
|
GitLab Inc.
|
|
||
|
GMV
|
|
||
|
Google
|
|
||
|
Google Cloud
|
|
||
|
Google Open Source
|
|
||
|
Google Workspace
|
|
||
|
Gresham Technologies
|
|
||
|
H3C
|
|
||
|
HackerOne
|
|
||
|
Halcyon
|
|
||
|
Hannes von Haugwitz
|
|
||
|
HAProxy Technologies
|
|
||
|
Harness
|
|
||
|
HashiCorp
|
|
||
|
HC Networks Co., Ltd.
|
|
||
|
HCL Software
|
|
||
|
HID Global
|
|
||
|
Hillstone Networks
|
|
||
|
Hitachi Vantara
|
|
||
|
Honeywell International Inc.
|
|
||
|
Hewlett Packard Enterprise
|
|
||
|
HPE Aruba Networking
|
|
||
|
HPE Juniper Networking
|
|
||
|
Huawei Technologies Co., Ltd.
|
|
||
|
HYPR
|
|
||
|
IBM
|
|
||
|
iboss
|
|
||
|
Illumio
|
|
||
|
Infoblox, Inc.
|
|
||
|
InfoExpress, Inc.
|
|
||
|
Ingrian Networks, Inc.
|
|
||
|
Intel
|
|
||
|
Intel 471
|
|
||
|
Internet Systems Consortium, Inc.
|
|
||
|
InterSystems
|
|
||
|
ION Group
|
|
||
|
IONIX
|
|
||
|
Island
|
|
||
|
Jadaptive
|
|
||
|
Jamf
|
|
||
|
Jfrog
|
|
||
|
JumpCloud
|
|
||
|
Kaspersky
|
|
||
|
Keeper Security
|
|
||
|
Kemp Technologies
|
|
||
|
Kisi
|
|
||
|
Kiteworks, Inc.
|
|
||
|
KnowBe4
|
|
||
|
Kong
|
|
||
|
Kyriba
|
|
||
|
LastPass
|
|
||
|
LexisNexis Risk Solutions
|
|
||
|
LimaCharlie
|
|
||
|
Linkshadow
|
|
||
|
Linux Foundation
|
|
||
|
Lookout, Inc.
|
|
||
|
Lucid Software Inc.
|
|
||
|
Malwarebytes
|
|
||
|
Mandiant, Inc. (Google)
|
|
||
|
MariaDB Corporation
|
|
||
|
Mattermost, Inc
|
|
||
|
Microsoft
|
|
||
|
Mimecast Limited
|
|
||
|
Motorola Solutions, Inc.
|
|
||
|
NCR Corporation
|
|
||
|
Netwrix Corporation
|
|
||
|
Niels Provos
|
|
||
|
Okta, Inc.
|
|
||
|
Open Identity Platform Community
|
|
||
|
Open Text Corporation
|
|
||
|
Paessler
|
|
||
|
Palo Alto Networks, Inc.
|
|
||
|
Ping Identity Corporation
|
|
||
|
Planetcast Media Services Limited
|
|
||
|
Progress Software
|
|
||
|
Proofpoint, Inc.
|
|
||
|
Red Hat, Inc.
|
|
||
|
ReliaQuest
|
|
||
|
S.C. Bitdefender S.R.L.
|
|
||
|
SentinelOne, Inc.
|
|
||
|
Thales Group
|
|
||
|
Trellix
|
|
||
|
Xcitium
|
|
||
|
Zoho Corporation
|
|
