Did you find this summary helpful?
Thank you for your feedback
Data Sources refer to the origin or location from which data is collected, stored, or retrieved for analysis, reporting or processing. These sources can be diverse and may include various types of data such as structured data, unstructured text, etc. Data Sources are external systems that provide specific sets of data, and DataBee integrates these sources to create a unified environment for analysis and decision-making.
In the realm of cyber security, data sources might include various services such as CrowdStrike, Abnormal Security, Palo Alto Networks and many more listed below. These platforms generate valuable information about endpoint security, vulnerability management, identity and access management, email threats, etc. DataBee’s integration with these sources enables you to access, combine, and analyze data from multiple services within a centralized platform, enhancing the efficiency and effectiveness of data-driven processes.
Supported Data Sources 1Password
Abnormal Email Security
ADManager Plus
Akamai WAF
Alicloud
Anomali ThreatStream
Ansible Tower
Apache HTTP Server
Aqua CSPM
Aqua Workload Protection
Armis
Atlassian Confluence Audit
AttackIQ
Auth0
Amazon CloudFront
AWS CloudTrail
AWS ELB
Amazon GuardDuty Findings
Amazon Macie
Amazon Route 53
AWS Security Hub
Amazon VPC
AWS WAF
Azure Activity
Azure AD
Azure AD Sign-in
Azure Audit
Azure Front Door
Azure Functions
Azure Managed SQL
Azure VDI
Azure WAF
Barracuda Email Gateway Defense
BETTER Mobile Threat Defense
BeyondTrust Password Safe
BeyondTrust Privileged Remote Access
Bitsight
Blackberry CylancePROTECT
BluVector
BMC Helix ITSM/BMC Remedy ITSM
Box
Carbon Black
Check Point Firewall
Cisco Armorblox
Cisco ASA
Cisco Cloudlock
Cisco Duo
Cisco Email Security
Cisco Firepower
Cisco ISE
Cisco Meraki
Cisco Secure Endpoint
Cisco Umbrella
Citrix ADC
Citrix WAF
Claroty CTD
Cloud Foundry
Cloudflare Access
Cloudflare WAF
Cofense Intelligence
Cofense Triage
Cohesity
Contrast Security
Cosmos Continuous Penetration Testing
CrowdStrike
CyberArk EPM
CyberArk Identity
CyberArk Privilege Cloud
CyberArk Privileged Access Manager
CyberArk Vault
Cybereason
Cynet
Darktrace
Dataminr
Discovery Public Dependabot
Dynatrace Attacks
Entrust
ExtraHop Reveal(X) 360
F5 Big-IP ASM
F5 BigIP LTM
F5 Network Firewall
F5 SSL VPN
Fastly
FireEye EDR
FireMon Asset
Forcepoint DLP
Forcepoint Web Security
ForgeRock Identity Cloud
Fortify by OpenText
Fortinet Firewall
Fortinet UTM Device
GitGuardian
GitHub Dependabot
GitHub Enterprise Cloud Audit
Google Cloud Identity
Google Security Command Center
GreyNoise
HashiCorp Vault
HCL App Scan
HCL BigFix
HPE Aruba Networking
IBM Guardium Security
Illumio Core
Imperva SecureSphere
Infoblox BloxOne Threat Defense
Infoblox DDI
Informatica
ISC BIND
Jamf Device Manager
Jamf Protect
JFrog Platform
Jira
JumpCloud
Juniper SRX
Kandji MDM
Kiteworks
KnowBe4
Lacework
Lansweeper
Linux
Log Analytics Azure Activity
Log Analytics XDR
LogicMonitor Config Manager
Microsoft Defender for Cloud
Microsoft Defender for Cloud Apps
Microsoft Defender for Endpoint
Microsoft Defender for Endpoint Software Inventory
Microsoft Defender for Identity/Azure ATP
Microsoft Defender for Office 365
Microsoft Defender for Office365 Audits
Microsoft Entra
Microsoft Entra MFA/Microsoft Graph API
Microsoft Intune
Microsoft SCCM
Microsoft Sentinel
Microsoft Sysmon
Microsoft XDR
Mimecast Audit and Authentication
Mimecast SIEM
Netskope
NetWitness
Netwrix Auditor
Okta SSO
OneLogin
OneTrust
Open VPN Server
Oracle Identity Governance
Orca Security
Osirium Privileged Access Management
Palo Alto Cortex XDR
Palo Alto Networks Firewall
Palo Alto Networks Prisma Cloud
Pfsense
Picus Security
PingFederate
PingOne
Pleasant Password Server
PostgreSQL Events
Progress Chef
Proofpoint On Demand
Proofpoint Security Awareness Training
Proofpoint TAP
Qualys EDR
Qualys Vulnerability Management
Rapid7 InsightVM
Rapid7 Nexpose Vulnerability Scanner
RSA SecureID Authentication Manager
SailPoint IdentityIQ
SailPoint IdentityNow
Salesforce
SAP SuccessFactors
Saviynt Enterprise Security
Securonix
Sentinel One
ServiceNow CMDB
ServiceNow Policy Exception
ServiceNow Tickets
ServiceNow Vulnerability
Slack
SNORT
Snyk Application Security
SolarWinds Orion
SonarCloud
SonicWall Firewall
Sonrai Security
Sophos Intercept X
Squid Proxy
Symantec Bluecoat Proxysg
Symantec DLP
Symantec Endpoint Protection
Sysdig
Tangoe Wireless
Tanium Endpoint Protection
Tenable Security Center
Tenable Vulnerability Management
Terraform
Thinkst Canary
ThreatX WAF
Thycotic Secret Server
Trellix ePO
Trend Micro Cloud One
Trend Micro Deep Security
Trend Micro Vision One
UpGuard
VMware vCenter
Vectra Detect
Vectra XDR
Veracode
VMWare ESXi
VMWare UAG
Windows DNS Logs
Windows Security Events
WithSecure Elements
Wiz
Workday
Zeek Connection
Zeek DHCP
Zeek DNS
Zeek Files
Zeek FTP
Zeek HTTP
Zeek Notice
Zeek RDP
Zeek SMB
Zeek SMTP
Zeek Weird
Zeek SSL
Zendesk
ZeroFox
Zimperium MTD
Zscaler Client Connector
Zscaler Internet Access
Zscaler Private Access
Was this article helpful?
Yes No
Thank you for your feedback! Our team will get back to you