Overview
  • 18 Nov 2024
  • 2 Minutes to read
  • Contributors
  • Dark
    Light

Overview

  • Dark
    Light

Article summary

Data Sources refer to the origin or location from which data is collected, stored, or retrieved for analysis, reporting or processing. These sources can be diverse and may include various types of data such as structured data, unstructured text, etc. Data Sources are external systems that provide specific sets of data, and DataBee integrates these sources to create a unified environment for analysis and decision-making.

In the realm of cyber security, data sources might include various services such as CrowdStrike, Abnormal Security, Palo Alto Networks and many more listed below. These platforms generate valuable information about endpoint security, vulnerability management, identity and access management, email threats, etc. DataBee’s integration with these sources enables you to access, combine, and analyze data from multiple services within a centralized platform, enhancing the efficiency and effectiveness of data-driven processes.

Supported Data Sources

1Password

Abnormal Email Security

ADManager Plus

Akamai WAF

Alicloud

Anomali ThreatStream

Ansible Tower

Apache HTTP Server

Aqua CSPM

Aqua Workload Protection

Armis

Atlassian Confluence Audit

AttackIQ

Auth0

Amazon CloudFront

AWS CloudTrail

AWS ELB

Amazon GuardDuty Findings

Amazon Macie

Amazon Route 53

AWS Security Hub

Amazon VPC

AWS WAF

Azure Activity

Azure AD

Azure AD Sign-in

Azure Audit

Azure Front Door

Azure Functions

Azure Managed SQL

Azure VDI

Azure WAF

Barracuda Email Gateway Defense

BETTER Mobile Threat Defense

BeyondTrust Password Safe

BeyondTrust Privileged Remote Access

Bitsight

Blackberry CylancePROTECT

BluVector

BMC Helix ITSM/BMC Remedy ITSM

Box

Carbon Black

Check Point Firewall

Cisco Armorblox

Cisco ASA

Cisco Cloudlock

Cisco Duo

Cisco Email Security

Cisco Firepower

Cisco ISE

Cisco Meraki

Cisco Secure Endpoint

Cisco Umbrella

Citrix ADC

Citrix WAF

Claroty CTD

Cloud Foundry

Cloudflare Access

Cloudflare WAF

Cofense Intelligence

Cofense Triage

Cohesity

Contrast Security

Cosmos Continuous Penetration Testing

CrowdStrike

CyberArk EPM

CyberArk Identity

CyberArk Privilege Cloud

CyberArk Privileged Access Manager

CyberArk Vault

Cybereason

Cynet

Darktrace

Dataminr

Discovery Public Dependabot

Dynatrace Attacks

Entrust

ExtraHop Reveal(X) 360

F5 Big-IP ASM

F5 BigIP LTM

F5 Network Firewall

F5 SSL VPN

Fastly

FireEye EDR

FireMon Asset

Forcepoint DLP

Forcepoint Web Security

ForgeRock Identity Cloud

Fortify by OpenText

Fortinet Firewall

Fortinet UTM Device

GitGuardian

GitHub Dependabot

GitHub Enterprise Cloud Audit

Google Cloud Identity

Google Security Command Center

GreyNoise

HashiCorp Vault

HCL App Scan

HCL BigFix

HPE Aruba Networking

IBM Guardium Security

Illumio Core

Imperva SecureSphere

Infoblox BloxOne Threat Defense

Infoblox DDI

Informatica

ISC BIND

Jamf Device Manager

Jamf Protect

JFrog Platform

Jira

JumpCloud

Juniper SRX

Kandji MDM

Kiteworks

KnowBe4

Lacework

Lansweeper

Linux

Log Analytics Azure Activity

Log Analytics XDR

LogicMonitor Config Manager

Microsoft Defender for Cloud

Microsoft Defender for Cloud Apps

Microsoft Defender for Endpoint

Microsoft Defender for Endpoint Software Inventory

Microsoft Defender for Identity/Azure ATP

Microsoft Defender for Office 365

Microsoft Defender for Office365 Audits

Microsoft Entra

Microsoft Entra MFA/Microsoft Graph API

Microsoft Intune

Microsoft SCCM

Microsoft Sentinel

Microsoft Sysmon

Microsoft XDR

Mimecast Audit and Authentication

Mimecast SIEM

Netskope

NetWitness

Netwrix Auditor

Okta SSO

OneLogin

OneTrust

Open VPN Server

Oracle Identity Governance

Orca Security

Osirium Privileged Access Management

Palo Alto Cortex XDR

Palo Alto Networks Firewall

Palo Alto Networks Prisma Cloud

Pfsense

Picus Security

PingFederate

PingOne

Pleasant Password Server

PostgreSQL Events

Progress Chef

Proofpoint On Demand

Proofpoint Security Awareness Training

Proofpoint TAP

Qualys EDR

Qualys Vulnerability Management

Rapid7 InsightVM

Rapid7 Nexpose Vulnerability Scanner

RSA SecureID Authentication Manager

SailPoint IdentityIQ

SailPoint IdentityNow

Salesforce

SAP SuccessFactors

Saviynt Enterprise Security

Securonix

Sentinel One

ServiceNow CMDB

ServiceNow Policy Exception

ServiceNow Tickets

ServiceNow Vulnerability

Slack

SNORT

Snyk Application Security

SolarWinds Orion

SonarCloud

SonicWall Firewall

Sonrai Security

Sophos Intercept X

Squid Proxy

Symantec Bluecoat Proxysg

Symantec DLP

Symantec Endpoint Protection

Sysdig

Tangoe Wireless

Tanium Endpoint Protection

Tenable Security Center

Tenable Vulnerability Management

Terraform

Thinkst Canary

ThreatX WAF

Thycotic Secret Server

Trellix ePO

Trend Micro Cloud One

Trend Micro Deep Security

Trend Micro Vision One

UpGuard

VMware vCenter

Vectra Detect

Vectra XDR

Veracode

VMWare ESXi

VMWare UAG

Windows DNS Logs

Windows Security Events

WithSecure Elements

Wiz

Workday

Zeek Connection

Zeek DHCP

Zeek DNS

Zeek Files

Zeek FTP

Zeek HTTP

Zeek Notice

Zeek RDP

Zeek SMB

Zeek SMTP

Zeek Weird

Zeek SSL

Zendesk

ZeroFox

Zimperium MTD

Zscaler Client Connector

Zscaler Internet Access

Zscaler Private Access


Was this article helpful?

What's Next
Changing your password will log you out immediately. Use the new password to log back in.
First name must have atleast 2 characters. Numbers and special characters are not allowed.
Last name must have atleast 1 characters. Numbers and special characters are not allowed.
Enter a valid email
Enter a valid password
Your profile has been successfully updated.
ESC

Eddy AI, facilitating knowledge discovery through conversational intelligence