![](https://framerusercontent.com/images/byKKDPd2xJYRXNdKElP2UFHCA.png)
![](https://framerusercontent.com/images/byKKDPd2xJYRXNdKElP2UFHCA.png)
![](https://framerusercontent.com/images/byKKDPd2xJYRXNdKElP2UFHCA.png)
![](https://framerusercontent.com/images/byKKDPd2xJYRXNdKElP2UFHCA.png)
Request a demo
Request a demo
Do More With Your Data
Analyze your data, triage alerts, and remediate incidents using the tools your teams love.
Nginx Access Log Monitoring
Monitor Nginx access logs and gain complete visibility into web server activity.
![](https://framerusercontent.com/images/z1m89qZAtyHPdbWENp26oLASt8.png)
Osquery Log Monitoring
Gain complete visibility into your operating system activity.
![](https://framerusercontent.com/images/mVnLgLBBlhMNwNwIzT4jYyk74.png)
Jira
Send Panther alerts to Jira and analyze the issue
![](https://framerusercontent.com/images/WEjWs6dGpY3Io52Sq2xmlCOkxw.png)
Slack
Send Panther alerts to a designated Slack channel.
![](https://framerusercontent.com/images/ywESZGBneMQPvkM9Pg8rOcMaMzM.png)
GitHub
Send Panther alerts to GitHub and analyze the issue
![](https://framerusercontent.com/images/qjtpjDeXwpxRkHjeCq4f4PeSwY.png)
SQS
Send programmatic notifications to emails with Panther via SQS
![](https://framerusercontent.com/images/5Uj5nnLJp5R2ynjvytVS6asds.png)
Microsoft Teams
Send Panther alerts to a designated Microsoft Teams channel
![](https://framerusercontent.com/images/kbInF88SemrYcqeqkNdY2F7vG4.png)
Asana
Send Panther alerts to Asana and analyze the issue.
![](https://framerusercontent.com/images/5lNP39u5VegjYsWMZsVMU1oItA.png)
OpsGenie
Send Panther alerts to OpsGenie and begin an investigation.
![](https://framerusercontent.com/images/g5RZB7rHvGLWdNTpKsNECglJAb8.png)
PagerDuty
Send Panther alerts to PagerDuty and begin an investigation
![](https://framerusercontent.com/images/B1nQcDgpINVFG57M37bXbg9Y.png)
SNS
Send programmatic alerts to emails with Panther via SNS
![](https://framerusercontent.com/images/Qfimh05me73Hc3wfrxRosRSE.png)
GCP Log Monitoring
Gain complete visibility into activity across your cloud service.
![](https://framerusercontent.com/images/XA41psbo4iWhG46bqaAFwJoOH4.png)
Syslog Log Monitoring
Monitor machine and network activity for suspicious behavior.
![](https://framerusercontent.com/images/QAmndqhR7YsLxJtcg2nDvrLXoY.png)
Fluentd Log Monitoring
Inspect application activity for any signs of suspicious behavior.
![](https://framerusercontent.com/images/DJfU8rdfnHmhBL0gjRU6LvJGA.png)
OSSEC Log Monitoring
Monitor OSSEC logs to gain complete security visibility into host activity.
![](https://framerusercontent.com/images/G8SHTH7wb3xSK3BK7Lj1YJDkI.png)
Zeek Log Monitoring
Inspect network traffic and DNS protocols for suspicious activity.
![](https://framerusercontent.com/images/dMqRHiv9InE2RijzXgMi5DQj4.png)
Cisco Umbrella Log Monitoring
Identify any suspicious or malicious domain addresses or DNS requests.
![](https://framerusercontent.com/images/W2RwnGt6zvx42pJX8aYhHwRekY.png)
Juniper Log Monitoring
Monitor network traffic for attack attempts or probes.
![](https://framerusercontent.com/images/VH9n68q3xh90Kps5zkQj6dq5HBk.png)
Suricata Log Monitoring
Identify any suspicious traffic or domain activity.
![](https://framerusercontent.com/images/vup0VHWXXunLAuDQaoH0qxqCCVc.png)
Lacework Log Monitoring
Gain complete visibility into your cloud and container environments.
![](https://framerusercontent.com/images/RIpFGxjBmtbZ0Y1fhQRYoGDseSw.png)
Teleport Log Monitoring
Inspect all SSH access activity for signs of suspicious behavior.
![](https://framerusercontent.com/images/KPqWIikhWyl2DV96hMpymZ8untY.png)
Apache Log Monitoring
Inspect all web activity for signs of suspicious behavior.
![](https://framerusercontent.com/images/UebD3B9vqyP8KGUhqy9p9gk6c.png)
GitLab Log Monitoring
Identify any suspicious behavior within your GitLab environment.
![](https://framerusercontent.com/images/YTPtLWlpZ3OaSvGLgvHQ0TzyPI.png)
Okta Log Monitoring
Monitor Okta logs to gain complete visibility into your IdP activity.
![](https://framerusercontent.com/images/cYLU2C2oqfXAImpSpAAonyMMPQc.png)
OneLogin Log Monitoring
Monitor your IdP for suspicious activity.
![](https://framerusercontent.com/images/gpllJsI8kGJK9apnE0O8eLmA8.png)
Google Workspace (G Suite) Log Monitoring
Identify any suspicious activity within your Google Workspace applications.
![](https://framerusercontent.com/images/KgiUv2zlj8aA2GFWNJLGBUcfOrw.png)
Box Log Monitoring
Gain complete visibility into your organization’s content management and file sharing.
![](https://framerusercontent.com/images/DI87C7nIo3iy2d30VyUm3OCtz4.png)
Snowflake
Build a robust security data lake in Snowflake.
![](https://framerusercontent.com/images/qIehrhX9QOUwdmHhR0F6eHs1tk.png)
AWS CloudTrail Log Analyzer
Track account changes in real-time and detect suspicious activity
![](https://framerusercontent.com/images/PGFA0nid9UbvngIpqs1XogGt7k.png)
S3 Buckets
Detect and alert on unauthorized access to your S3 buckets.
![](https://framerusercontent.com/images/uu13UW5hAyXWW2W9auegULTYLe0.png)
EC2 VPC
Capture traffic activity and monitor actual network traffic flows.
![](https://framerusercontent.com/images/72lF68oIgopYDEvgEpB22r6rTo.png)
GuardDuty
Track real-time changes to your AWS GuardDuty
![](https://framerusercontent.com/images/Q3IRwNCT5MbAc6zikWkhwOKwNOY.png)
Lambda
Track real-time changes to your AWS Lambda
![](https://framerusercontent.com/images/fUQdCjioCMIhmPyiKSgjAKiRR6w.png)
WAF Web ACL
Track real-time changes to your WAF ACLs
![](https://framerusercontent.com/images/rTdgLetsiKJXw0rgnaWLlxzdhOA.png)
ALB
Audit changes to AWS Application Load Balancer
![](https://framerusercontent.com/images/ycQcd4c5BunScYAP3eQTtEJlrA.png)
ACM Certificate
Audit changes to AWS Certificate manager
![](https://framerusercontent.com/images/hZztpx21JipZjRZ6sB7kBycA8Vo.png)
Redshift Cluster
Audit changes to AWS Redshift Clusters
![](https://framerusercontent.com/images/COJXkIGw5TBbVUic6Pmzjv6iAvk.png)
DynamoDB Table
Continuously monitor AWS DynamoDB tables for compliance
![](https://framerusercontent.com/images/OmVEwiT9ZJGEuL3m9clqrSxyBjc.png)
Config Recorder
Audit changes to AWS Config Recorder
![](https://framerusercontent.com/images/lBKrGF7nlqsusyztIjau9gkAM.png)
CloudWatch Log group
Track real-time changes to AWS CloudWatch Log group
![](https://framerusercontent.com/images/3PlA9BJyR8rKSbSF6pgs6yj5Y.png)
CloudFormation Stack
Track real-time changes to AWS CloudFormation stacks
![](https://framerusercontent.com/images/0dHKxYL8nUqraImQR9JqNCug.png)
RDS Instance
Get alerted in real-time when a RDS change occurs.
![](https://framerusercontent.com/images/Ekg9BJkeDxKJ9ZK2h2kPqG3CW7w.png)
Password Policy
Monitor password policies for your AWS account
![](https://framerusercontent.com/images/kyTZQXdxqwQVvwbl0sMyKdZLdm0.png)
IAM
Track real-time changes to IAM User, Group, Role, and Policy
![](https://framerusercontent.com/images/Q7OToIqpqDrEm1gspdATZixtBI.png)
KMS Key
Follow the highest standards of cryptographic practices.
![](https://framerusercontent.com/images/mi56pgvUatfB60fVGMEnt65mjfM.png)
ECS Cluster
Gain visibility into specific ECS environments in real-time.
![](https://framerusercontent.com/images/0sUpwo1nS5vOnoGvMrYsR5G4s.png)
EC2 Instance
Track real-time changes to your EC2 Instance
![](https://framerusercontent.com/images/YTWOZbuIQw4JMohZffkhWEy1Q4.png)
EC2 AMI
Monitor which AWS accounts can use AMI to launch instances
![](https://framerusercontent.com/images/HzAmmsnFh89Tnp178zruMvcPQ.png)
EC2 Volume
Continuously audit your EC2 Volume configurations
![](https://framerusercontent.com/images/TwFiXdGly2cwhznZIdwBaeyZZuY.png)
EC2 Network ACL
Audit changes to AWS Network ACL
![](https://framerusercontent.com/images/vRQWQQgkVmPCy99omrfUxR3a4.png)
EC2 Security Group
Audit changes to the security group in your EC2 instances.
![](https://framerusercontent.com/images/3ufhyQdc30Sg4SGbbNR4g20Lls.png)
CrowdStrike Log Monitoring
Gain complete visibility into your managed endpoints.
![](https://framerusercontent.com/images/2mDp9UDZMwZZRLINakDvjdtCZs.png)
Fastly Log Monitoring
Monitor network traffic for signs of suspicious behavior.
![](https://framerusercontent.com/images/WEjWs6dGpY3Io52Sq2xmlCOkxw.png)
Slack Log Monitoring
Monitor your team’s communication platform for suspicious activity.
![](https://framerusercontent.com/images/drc8w7ARmOwmsZoWeeaQ2zjZlfU.png)
Cloudflare Log Monitoring
Inspect network traffic for signs of suspicious behavior.
![](https://framerusercontent.com/images/tuJabVhvFi7p04HOh4CDPWaz43o.png)
Custom Webhooks
Send alert data to third-party applications
![](https://framerusercontent.com/images/3XYgC9vF0D8T64DBDgeiNSiAEiQ.png)
Sophos Log Monitoring
Monitor endpoint policy violations and data loss prevention events.
![](https://framerusercontent.com/images/K2tLL43v64v37Fy3M4RjuyDDXkI.png)
Tines
Send Panther alerts to Tines and initiate a workflow
![](https://framerusercontent.com/images/ARXXOC9QKVJxYIsdLldhk5NAo.png)
Duo Security Log Monitoring
Monitor your access management tools for suspicious activity.
Salesforce Log Monitoring
Monitor your sales operations data for suspicious activity.
![](https://framerusercontent.com/images/ywESZGBneMQPvkM9Pg8rOcMaMzM.png)
GitHub Log Monitoring
Identify any vulnerabilities within your GitHub repositories.
![](https://framerusercontent.com/images/hHGznRKmwt7NCEuLOchYc3oSi48.png)
Microsoft 365 Log Monitoring
Monitor your team’s communication and collaboration tools for suspicious activity.
![](https://framerusercontent.com/images/zGRzU7gYUA391tlUW06hwwTMAGE.png)
1Password Log Monitoring
Monitor your password management platform for suspicious activity.
![](https://framerusercontent.com/images/JkVnJHmT4wAYm1LpvO2b5HOdMc.png)
Zoom Log Monitoring
Monitor abnormal user activity within your Zoom account.
![](https://framerusercontent.com/images/KbbAVLCCzRQXOqOYs7LRbjQX0E.png)
Atlassian Log Monitoring
Monitor Atlassian audit logs to identify suspicious activity in real-time.
![](https://framerusercontent.com/images/kbInF88SemrYcqeqkNdY2F7vG4.png)
Asana Log Monitoring
Monitor Asana audit logs to identify suspicious activity in real-time.
![](https://framerusercontent.com/images/sWG5jWE5JX0OQe4i5YpABmg.png)
Zendesk Log Monitoring
Monitor unusual activity within your Zendesk account.
![](https://framerusercontent.com/images/4YvT39Wgca4K7khLjRxvOXBPzE.png)
Snyk Log Monitoring
Monitor for any changes within your Snyk Organization.
![](https://framerusercontent.com/images/rHgPLTmI07kQYdqBQ8JBwV7M0ks.png)
GreyNoise Intelligence
Enrich threat intelligence data and reduce false-positive alerts
![](https://framerusercontent.com/images/lCfkIlTaWbUhnXF9sbonfSQVI.png)
Dropbox Log Monitoring
Identify any suspicious file-sharing activity within your organization.
![](https://framerusercontent.com/images/U968SKqpb1N9bjLeaxqIj9gTPA.png)
Jamf Pro Log Monitoring
Monitor Jamf Pro login events for suspicious activity.
![](https://framerusercontent.com/images/yNAmiiPs56tbffDwYPj7Ub82cGw.png)
Microsoft Graph Log Monitoring
Monitor security alerts across Microsoft products, services, and partners.
![](https://framerusercontent.com/images/s3SKoiWzex543JtReGGUHs5Z7aY.png)
MongoDB Atlas Log Monitoring
Monitor events within your MongoDB Atlas organization or project.
![](https://framerusercontent.com/images/j6yXBhVBwIu8Y9Z6LbpbBTZR7DY.png)
SentinelOne Log Monitoring
Monitor your endpoint data, network activity, and DNS requests.
![](https://framerusercontent.com/images/GxPUIMAPikRPRcMkoMQDbnBU.png)
Sysdig Log Monitoring
Gain complete visibility into Sysdig platform activity.
![](https://framerusercontent.com/images/3cY4Bra7JVUaVH4jpxsO8ecjl8.png)
Bitwarden Log Monitoring
Identify any abnormal user activity in your organization's Bitwarden account.
![](https://framerusercontent.com/images/K2tLL43v64v37Fy3M4RjuyDDXkI.png)
Tines Log Monitoring
Monitor any changes within your Tines tenant.
![](https://framerusercontent.com/images/rTdgLetsiKJXw0rgnaWLlxzdhOA.png)
AWS ALB Log Monitoring
Monitor requests sent to your load balancer for suspicious activity.
![](https://framerusercontent.com/images/gSNLqAeOZGaUCFx3FJZMDvglOY.png)
AWS Aurora Log Monitoring
Monitor and detect any suspicious database events.
![](https://framerusercontent.com/images/pmhGWsPeldveYhWm1TxlTDg37s.png)
AWS CloudTrail Log Monitoring
Identify any suspicious activity within your AWS infrastructure.
![](https://framerusercontent.com/images/lBKrGF7nlqsusyztIjau9gkAM.png)
AWS CloudWatch Log Monitoring
Monitor any resource changes within your AWS environment.
![](https://framerusercontent.com/images/OmVEwiT9ZJGEuL3m9clqrSxyBjc.png)
AWS Config Log Monitoring
Monitor the configuration of your AWS resources.
![](https://framerusercontent.com/images/IefIJGd26Z3nohZakggr2w2i3wU.png)
AWS EKS Log Monitoring
Monitor your Kubernetes environment for suspicious activity.
![](https://framerusercontent.com/images/72lF68oIgopYDEvgEpB22r6rTo.png)
AWS GuardDuty Log Monitoring
Monitor your AWS environment for malicious activity and unauthorized behavior.
![](https://framerusercontent.com/images/PGFA0nid9UbvngIpqs1XogGt7k.png)
AWS S3 Log Monitoring
Monitor all requests made to AWS S3 buckets.
![](https://framerusercontent.com/images/rowPnQTd0FzlwcxWrIcxR1QGMc.png)
AWS Transit Gateway Flow Log Monitoring
Monitor the IP traffic flowing through your transit gateway.
![](https://framerusercontent.com/images/uu13UW5hAyXWW2W9auegULTYLe0.png)
AWS VPC Log Monitoring
Monitor the IP traffic going to and from network interfaces in your VPC.
![](https://framerusercontent.com/images/fUQdCjioCMIhmPyiKSgjAKiRR6w.png)
AWS WAF Log Monitoring
Investigate traffic that is analyzed by your web Access Control Lists (ACLs).
![](https://framerusercontent.com/images/M5yavhoj9PWPf9R84w9ZUd6I.png)
Auth0 Log Monitoring
Monitor user authentication and authorization activities in Auth0.
![](https://framerusercontent.com/images/n32jSw4RvBIsj9yD2o6YSlq5LQ.png)
Tailscale Log Monitoring
Monitor your team’s Tailscale network.
![](https://framerusercontent.com/images/YyNIKhHkWYAYcgkT9pvgiEui6rQ.png)
Heroku Log Monitoring
Monitor your Heroku applications, infrastructure, and admin actions.
![](https://framerusercontent.com/images/sWi1VPaQAaxowYi14zhEXtE4qU.png)
Windows Event Log Monitoring
Monitor application, system, and security notifications from Windows machines.
![](https://framerusercontent.com/images/1w43etPw6Q3YwqCUZHve4MfJw.png)
Netskope Log Monitoring
Identify any suspicious cloud-based app or service activity.
![](https://framerusercontent.com/images/XA41psbo4iWhG46bqaAFwJoOH4.png)
Auditd Log Monitoring
Monitor system-level activities in your Linux environment.
![](https://framerusercontent.com/images/uD5Fu4E30s9oPrjr1UNx9ysDRU.png)
Docker Event Log Monitoring
Gain complete visibility into your Docker system events.
![](https://framerusercontent.com/images/oiGP0bJv6oV3GnouUMJdvTCU8.png)
Azure Log Monitoring
Continuously monitor your Azure account.
![](https://framerusercontent.com/images/eGQqiBVM61wWWGyMnYFkvURBIy0.png)
Carbon Black Log Monitoring
Monitor endpoint activity for suspicious behavior.
![](https://framerusercontent.com/images/5KoGbf35xnKxu64P1DgV65TBN9Y.png)
Envoy Access Log Monitoring
Monitor network activity for suspicious behavior.
![](https://framerusercontent.com/images/43CXqgUv857INcXgRC9yUD2TqY.png)
Tenable Vulnerability Scan Monitoring
Gain complete visibility into your network assets.
![](https://framerusercontent.com/images/eIDifEepcllMTSnFfdMm68QyzI.png)
Notion Log Monitoring
Continuously monitor your Notion workspace.
![](https://framerusercontent.com/images/48vq18PLWyF28PM4ymgwtlpM.png)
AWS Security Hub Monitoring
Correlate AWS Security Hub findings.
![](https://framerusercontent.com/images/1BO6EAxRk4Kn4LjxoS6qgWacrI4.jpg)
IPInfo
Enrich detections and reduce false-positive alerts
![](https://framerusercontent.com/images/j1oJmlD0JAIBeraoD2Kgeqg2uAk.png)
Splunk
Send Panther alerts to Splunk
![](https://framerusercontent.com/images/3IpkQ4bP0cBOhXvwsilRMFMOhnU.png)
Discord
Route Panther alerts to a Discord channel
Incident.io
Forward Panther alerts to your incident management platform
![](https://framerusercontent.com/images/KhShk5mbp3qC790SJhWvfNJfAs0.png)
Push Security SIEM Integration
Defend against identity attacks.
![](https://framerusercontent.com/images/cmlZOQVlb4XIt9flhAxBwijw.png)
Blink Ops
Deliver Panther alerts to your automation platform
![](https://framerusercontent.com/images/Yy79KrII0Q9OuJnC5WhVfy2cZs.png)
AppOmni SIEM Integration
Monitor your Software as a Service security posture.
![](https://framerusercontent.com/images/eydkifnEArWq3s5AoaAxsd6TkBI.png)
Sublime Security SIEM Integration
Monitor email threats.
![](https://framerusercontent.com/images/dnJYM6e4yyF2bHUwER8jxLsBds.png)
Torq
Trigger automated workflows from your alerts
Custom Lookup Tables
Enrich log data from custom sources.
Anomali ThreatStream API SIEM Integration
Correlate log data with threat intelligence.
Material Security SIEM Integration
Monitor threats in Google Workspace and M365.
Zscaler Log Monitoring
Monitor application, network, and device access.
Wiz Log Monitoring
Protect your cloud security controls.
![](https://framerusercontent.com/images/XG3XtLCOMssi3VWh10rSAd3oDw.png)
Thinkst Canary Log Monitoring
Detect lateral movement in your environment.
![](https://framerusercontent.com/images/enHtDuLNkVEQZwGr9VPDd6Sj98.png)
Proofpoint Log Monitoring
Detect email attacks.
AWS CloudFront Log Monitoring
Analyze CDN traffic for signs of unusual behavior.
![](https://framerusercontent.com/images/dyRU3hrM94T9QtrxAP80vbp69g.png)
Amazon Security Lake & OSCF Log Monitoring
Inspect your OSCF data for signs of unusual behavior.
Tracebit Log Monitoring
Monitor activity on Tracebit security canaries across your organization
Mindflow
Automate incident response from your alerts
Load More
Nginx Access Log Monitoring
Monitor Nginx access logs and gain complete visibility into web server activity.
![](https://framerusercontent.com/images/z1m89qZAtyHPdbWENp26oLASt8.png)
Osquery Log Monitoring
Gain complete visibility into your operating system activity.
![](https://framerusercontent.com/images/mVnLgLBBlhMNwNwIzT4jYyk74.png)
Jira
Send Panther alerts to Jira and analyze the issue
![](https://framerusercontent.com/images/WEjWs6dGpY3Io52Sq2xmlCOkxw.png)
Slack
Send Panther alerts to a designated Slack channel.
![](https://framerusercontent.com/images/ywESZGBneMQPvkM9Pg8rOcMaMzM.png)
GitHub
Send Panther alerts to GitHub and analyze the issue
![](https://framerusercontent.com/images/qjtpjDeXwpxRkHjeCq4f4PeSwY.png)
SQS
Send programmatic notifications to emails with Panther via SQS
![](https://framerusercontent.com/images/5Uj5nnLJp5R2ynjvytVS6asds.png)
Microsoft Teams
Send Panther alerts to a designated Microsoft Teams channel
![](https://framerusercontent.com/images/kbInF88SemrYcqeqkNdY2F7vG4.png)
Asana
Send Panther alerts to Asana and analyze the issue.
![](https://framerusercontent.com/images/5lNP39u5VegjYsWMZsVMU1oItA.png)
OpsGenie
Send Panther alerts to OpsGenie and begin an investigation.
![](https://framerusercontent.com/images/g5RZB7rHvGLWdNTpKsNECglJAb8.png)
PagerDuty
Send Panther alerts to PagerDuty and begin an investigation
![](https://framerusercontent.com/images/B1nQcDgpINVFG57M37bXbg9Y.png)
SNS
Send programmatic alerts to emails with Panther via SNS
![](https://framerusercontent.com/images/Qfimh05me73Hc3wfrxRosRSE.png)
GCP Log Monitoring
Gain complete visibility into activity across your cloud service.
![](https://framerusercontent.com/images/XA41psbo4iWhG46bqaAFwJoOH4.png)
Syslog Log Monitoring
Monitor machine and network activity for suspicious behavior.
![](https://framerusercontent.com/images/QAmndqhR7YsLxJtcg2nDvrLXoY.png)
Fluentd Log Monitoring
Inspect application activity for any signs of suspicious behavior.
![](https://framerusercontent.com/images/DJfU8rdfnHmhBL0gjRU6LvJGA.png)
OSSEC Log Monitoring
Monitor OSSEC logs to gain complete security visibility into host activity.
![](https://framerusercontent.com/images/G8SHTH7wb3xSK3BK7Lj1YJDkI.png)
Zeek Log Monitoring
Inspect network traffic and DNS protocols for suspicious activity.
![](https://framerusercontent.com/images/dMqRHiv9InE2RijzXgMi5DQj4.png)
Cisco Umbrella Log Monitoring
Identify any suspicious or malicious domain addresses or DNS requests.
![](https://framerusercontent.com/images/W2RwnGt6zvx42pJX8aYhHwRekY.png)
Juniper Log Monitoring
Monitor network traffic for attack attempts or probes.
![](https://framerusercontent.com/images/VH9n68q3xh90Kps5zkQj6dq5HBk.png)
Suricata Log Monitoring
Identify any suspicious traffic or domain activity.
![](https://framerusercontent.com/images/vup0VHWXXunLAuDQaoH0qxqCCVc.png)
Lacework Log Monitoring
Gain complete visibility into your cloud and container environments.
![](https://framerusercontent.com/images/RIpFGxjBmtbZ0Y1fhQRYoGDseSw.png)
Teleport Log Monitoring
Inspect all SSH access activity for signs of suspicious behavior.
![](https://framerusercontent.com/images/KPqWIikhWyl2DV96hMpymZ8untY.png)
Apache Log Monitoring
Inspect all web activity for signs of suspicious behavior.
![](https://framerusercontent.com/images/UebD3B9vqyP8KGUhqy9p9gk6c.png)
GitLab Log Monitoring
Identify any suspicious behavior within your GitLab environment.
![](https://framerusercontent.com/images/YTPtLWlpZ3OaSvGLgvHQ0TzyPI.png)
Okta Log Monitoring
Monitor Okta logs to gain complete visibility into your IdP activity.
![](https://framerusercontent.com/images/cYLU2C2oqfXAImpSpAAonyMMPQc.png)
OneLogin Log Monitoring
Monitor your IdP for suspicious activity.
![](https://framerusercontent.com/images/gpllJsI8kGJK9apnE0O8eLmA8.png)
Google Workspace (G Suite) Log Monitoring
Identify any suspicious activity within your Google Workspace applications.
![](https://framerusercontent.com/images/KgiUv2zlj8aA2GFWNJLGBUcfOrw.png)
Box Log Monitoring
Gain complete visibility into your organization’s content management and file sharing.
![](https://framerusercontent.com/images/DI87C7nIo3iy2d30VyUm3OCtz4.png)
Snowflake
Build a robust security data lake in Snowflake.
![](https://framerusercontent.com/images/qIehrhX9QOUwdmHhR0F6eHs1tk.png)
AWS CloudTrail Log Analyzer
Track account changes in real-time and detect suspicious activity
![](https://framerusercontent.com/images/PGFA0nid9UbvngIpqs1XogGt7k.png)
S3 Buckets
Detect and alert on unauthorized access to your S3 buckets.
![](https://framerusercontent.com/images/uu13UW5hAyXWW2W9auegULTYLe0.png)
EC2 VPC
Capture traffic activity and monitor actual network traffic flows.
![](https://framerusercontent.com/images/72lF68oIgopYDEvgEpB22r6rTo.png)
GuardDuty
Track real-time changes to your AWS GuardDuty
![](https://framerusercontent.com/images/Q3IRwNCT5MbAc6zikWkhwOKwNOY.png)
Lambda
Track real-time changes to your AWS Lambda
![](https://framerusercontent.com/images/fUQdCjioCMIhmPyiKSgjAKiRR6w.png)
WAF Web ACL
Track real-time changes to your WAF ACLs
![](https://framerusercontent.com/images/rTdgLetsiKJXw0rgnaWLlxzdhOA.png)
ALB
Audit changes to AWS Application Load Balancer
![](https://framerusercontent.com/images/ycQcd4c5BunScYAP3eQTtEJlrA.png)
ACM Certificate
Audit changes to AWS Certificate manager
![](https://framerusercontent.com/images/hZztpx21JipZjRZ6sB7kBycA8Vo.png)
Redshift Cluster
Audit changes to AWS Redshift Clusters
![](https://framerusercontent.com/images/COJXkIGw5TBbVUic6Pmzjv6iAvk.png)
DynamoDB Table
Continuously monitor AWS DynamoDB tables for compliance
![](https://framerusercontent.com/images/OmVEwiT9ZJGEuL3m9clqrSxyBjc.png)
Config Recorder
Audit changes to AWS Config Recorder
![](https://framerusercontent.com/images/lBKrGF7nlqsusyztIjau9gkAM.png)
CloudWatch Log group
Track real-time changes to AWS CloudWatch Log group
![](https://framerusercontent.com/images/3PlA9BJyR8rKSbSF6pgs6yj5Y.png)
CloudFormation Stack
Track real-time changes to AWS CloudFormation stacks
![](https://framerusercontent.com/images/0dHKxYL8nUqraImQR9JqNCug.png)
RDS Instance
Get alerted in real-time when a RDS change occurs.
![](https://framerusercontent.com/images/Ekg9BJkeDxKJ9ZK2h2kPqG3CW7w.png)
Password Policy
Monitor password policies for your AWS account
![](https://framerusercontent.com/images/kyTZQXdxqwQVvwbl0sMyKdZLdm0.png)
IAM
Track real-time changes to IAM User, Group, Role, and Policy
![](https://framerusercontent.com/images/Q7OToIqpqDrEm1gspdATZixtBI.png)
KMS Key
Follow the highest standards of cryptographic practices.
![](https://framerusercontent.com/images/mi56pgvUatfB60fVGMEnt65mjfM.png)
ECS Cluster
Gain visibility into specific ECS environments in real-time.
![](https://framerusercontent.com/images/0sUpwo1nS5vOnoGvMrYsR5G4s.png)
EC2 Instance
Track real-time changes to your EC2 Instance
![](https://framerusercontent.com/images/YTWOZbuIQw4JMohZffkhWEy1Q4.png)
EC2 AMI
Monitor which AWS accounts can use AMI to launch instances
![](https://framerusercontent.com/images/HzAmmsnFh89Tnp178zruMvcPQ.png)
EC2 Volume
Continuously audit your EC2 Volume configurations
![](https://framerusercontent.com/images/TwFiXdGly2cwhznZIdwBaeyZZuY.png)
EC2 Network ACL
Audit changes to AWS Network ACL
![](https://framerusercontent.com/images/vRQWQQgkVmPCy99omrfUxR3a4.png)
EC2 Security Group
Audit changes to the security group in your EC2 instances.
![](https://framerusercontent.com/images/3ufhyQdc30Sg4SGbbNR4g20Lls.png)
CrowdStrike Log Monitoring
Gain complete visibility into your managed endpoints.
![](https://framerusercontent.com/images/2mDp9UDZMwZZRLINakDvjdtCZs.png)
Fastly Log Monitoring
Monitor network traffic for signs of suspicious behavior.
![](https://framerusercontent.com/images/WEjWs6dGpY3Io52Sq2xmlCOkxw.png)
Slack Log Monitoring
Monitor your team’s communication platform for suspicious activity.
![](https://framerusercontent.com/images/drc8w7ARmOwmsZoWeeaQ2zjZlfU.png)
Cloudflare Log Monitoring
Inspect network traffic for signs of suspicious behavior.
![](https://framerusercontent.com/images/tuJabVhvFi7p04HOh4CDPWaz43o.png)
Custom Webhooks
Send alert data to third-party applications
![](https://framerusercontent.com/images/3XYgC9vF0D8T64DBDgeiNSiAEiQ.png)
Sophos Log Monitoring
Monitor endpoint policy violations and data loss prevention events.
![](https://framerusercontent.com/images/K2tLL43v64v37Fy3M4RjuyDDXkI.png)
Tines
Send Panther alerts to Tines and initiate a workflow
![](https://framerusercontent.com/images/ARXXOC9QKVJxYIsdLldhk5NAo.png)
Duo Security Log Monitoring
Monitor your access management tools for suspicious activity.
Salesforce Log Monitoring
Monitor your sales operations data for suspicious activity.
![](https://framerusercontent.com/images/ywESZGBneMQPvkM9Pg8rOcMaMzM.png)
GitHub Log Monitoring
Identify any vulnerabilities within your GitHub repositories.
![](https://framerusercontent.com/images/hHGznRKmwt7NCEuLOchYc3oSi48.png)
Microsoft 365 Log Monitoring
Monitor your team’s communication and collaboration tools for suspicious activity.
![](https://framerusercontent.com/images/zGRzU7gYUA391tlUW06hwwTMAGE.png)
1Password Log Monitoring
Monitor your password management platform for suspicious activity.
![](https://framerusercontent.com/images/JkVnJHmT4wAYm1LpvO2b5HOdMc.png)
Zoom Log Monitoring
Monitor abnormal user activity within your Zoom account.
![](https://framerusercontent.com/images/KbbAVLCCzRQXOqOYs7LRbjQX0E.png)
Atlassian Log Monitoring
Monitor Atlassian audit logs to identify suspicious activity in real-time.
![](https://framerusercontent.com/images/kbInF88SemrYcqeqkNdY2F7vG4.png)
Asana Log Monitoring
Monitor Asana audit logs to identify suspicious activity in real-time.
![](https://framerusercontent.com/images/sWG5jWE5JX0OQe4i5YpABmg.png)
Zendesk Log Monitoring
Monitor unusual activity within your Zendesk account.
![](https://framerusercontent.com/images/4YvT39Wgca4K7khLjRxvOXBPzE.png)
Snyk Log Monitoring
Monitor for any changes within your Snyk Organization.
![](https://framerusercontent.com/images/rHgPLTmI07kQYdqBQ8JBwV7M0ks.png)
GreyNoise Intelligence
Enrich threat intelligence data and reduce false-positive alerts
![](https://framerusercontent.com/images/lCfkIlTaWbUhnXF9sbonfSQVI.png)
Dropbox Log Monitoring
Identify any suspicious file-sharing activity within your organization.
![](https://framerusercontent.com/images/U968SKqpb1N9bjLeaxqIj9gTPA.png)
Jamf Pro Log Monitoring
Monitor Jamf Pro login events for suspicious activity.
![](https://framerusercontent.com/images/yNAmiiPs56tbffDwYPj7Ub82cGw.png)
Microsoft Graph Log Monitoring
Monitor security alerts across Microsoft products, services, and partners.
![](https://framerusercontent.com/images/s3SKoiWzex543JtReGGUHs5Z7aY.png)
MongoDB Atlas Log Monitoring
Monitor events within your MongoDB Atlas organization or project.
![](https://framerusercontent.com/images/j6yXBhVBwIu8Y9Z6LbpbBTZR7DY.png)
SentinelOne Log Monitoring
Monitor your endpoint data, network activity, and DNS requests.
![](https://framerusercontent.com/images/GxPUIMAPikRPRcMkoMQDbnBU.png)
Sysdig Log Monitoring
Gain complete visibility into Sysdig platform activity.
![](https://framerusercontent.com/images/3cY4Bra7JVUaVH4jpxsO8ecjl8.png)
Bitwarden Log Monitoring
Identify any abnormal user activity in your organization's Bitwarden account.
![](https://framerusercontent.com/images/K2tLL43v64v37Fy3M4RjuyDDXkI.png)
Tines Log Monitoring
Monitor any changes within your Tines tenant.
![](https://framerusercontent.com/images/rTdgLetsiKJXw0rgnaWLlxzdhOA.png)
AWS ALB Log Monitoring
Monitor requests sent to your load balancer for suspicious activity.
![](https://framerusercontent.com/images/gSNLqAeOZGaUCFx3FJZMDvglOY.png)
AWS Aurora Log Monitoring
Monitor and detect any suspicious database events.
![](https://framerusercontent.com/images/pmhGWsPeldveYhWm1TxlTDg37s.png)
AWS CloudTrail Log Monitoring
Identify any suspicious activity within your AWS infrastructure.
![](https://framerusercontent.com/images/lBKrGF7nlqsusyztIjau9gkAM.png)
AWS CloudWatch Log Monitoring
Monitor any resource changes within your AWS environment.
![](https://framerusercontent.com/images/OmVEwiT9ZJGEuL3m9clqrSxyBjc.png)
AWS Config Log Monitoring
Monitor the configuration of your AWS resources.
![](https://framerusercontent.com/images/IefIJGd26Z3nohZakggr2w2i3wU.png)
AWS EKS Log Monitoring
Monitor your Kubernetes environment for suspicious activity.
![](https://framerusercontent.com/images/72lF68oIgopYDEvgEpB22r6rTo.png)
AWS GuardDuty Log Monitoring
Monitor your AWS environment for malicious activity and unauthorized behavior.
![](https://framerusercontent.com/images/PGFA0nid9UbvngIpqs1XogGt7k.png)
AWS S3 Log Monitoring
Monitor all requests made to AWS S3 buckets.
![](https://framerusercontent.com/images/rowPnQTd0FzlwcxWrIcxR1QGMc.png)
AWS Transit Gateway Flow Log Monitoring
Monitor the IP traffic flowing through your transit gateway.
![](https://framerusercontent.com/images/uu13UW5hAyXWW2W9auegULTYLe0.png)
AWS VPC Log Monitoring
Monitor the IP traffic going to and from network interfaces in your VPC.
![](https://framerusercontent.com/images/fUQdCjioCMIhmPyiKSgjAKiRR6w.png)
AWS WAF Log Monitoring
Investigate traffic that is analyzed by your web Access Control Lists (ACLs).
![](https://framerusercontent.com/images/M5yavhoj9PWPf9R84w9ZUd6I.png)
Auth0 Log Monitoring
Monitor user authentication and authorization activities in Auth0.
![](https://framerusercontent.com/images/n32jSw4RvBIsj9yD2o6YSlq5LQ.png)
Tailscale Log Monitoring
Monitor your team’s Tailscale network.
![](https://framerusercontent.com/images/YyNIKhHkWYAYcgkT9pvgiEui6rQ.png)
Heroku Log Monitoring
Monitor your Heroku applications, infrastructure, and admin actions.
![](https://framerusercontent.com/images/sWi1VPaQAaxowYi14zhEXtE4qU.png)
Windows Event Log Monitoring
Monitor application, system, and security notifications from Windows machines.
![](https://framerusercontent.com/images/1w43etPw6Q3YwqCUZHve4MfJw.png)
Netskope Log Monitoring
Identify any suspicious cloud-based app or service activity.
![](https://framerusercontent.com/images/XA41psbo4iWhG46bqaAFwJoOH4.png)
Auditd Log Monitoring
Monitor system-level activities in your Linux environment.
![](https://framerusercontent.com/images/uD5Fu4E30s9oPrjr1UNx9ysDRU.png)
Docker Event Log Monitoring
Gain complete visibility into your Docker system events.
![](https://framerusercontent.com/images/oiGP0bJv6oV3GnouUMJdvTCU8.png)
Azure Log Monitoring
Continuously monitor your Azure account.
![](https://framerusercontent.com/images/eGQqiBVM61wWWGyMnYFkvURBIy0.png)
Carbon Black Log Monitoring
Monitor endpoint activity for suspicious behavior.
![](https://framerusercontent.com/images/5KoGbf35xnKxu64P1DgV65TBN9Y.png)
Envoy Access Log Monitoring
Monitor network activity for suspicious behavior.
![](https://framerusercontent.com/images/43CXqgUv857INcXgRC9yUD2TqY.png)
Tenable Vulnerability Scan Monitoring
Gain complete visibility into your network assets.
![](https://framerusercontent.com/images/eIDifEepcllMTSnFfdMm68QyzI.png)
Notion Log Monitoring
Continuously monitor your Notion workspace.
![](https://framerusercontent.com/images/48vq18PLWyF28PM4ymgwtlpM.png)
AWS Security Hub Monitoring
Correlate AWS Security Hub findings.
![](https://framerusercontent.com/images/1BO6EAxRk4Kn4LjxoS6qgWacrI4.jpg)
IPInfo
Enrich detections and reduce false-positive alerts
![](https://framerusercontent.com/images/j1oJmlD0JAIBeraoD2Kgeqg2uAk.png)
Splunk
Send Panther alerts to Splunk
![](https://framerusercontent.com/images/3IpkQ4bP0cBOhXvwsilRMFMOhnU.png)
Discord
Route Panther alerts to a Discord channel
Incident.io
Forward Panther alerts to your incident management platform
![](https://framerusercontent.com/images/KhShk5mbp3qC790SJhWvfNJfAs0.png)
Push Security SIEM Integration
Defend against identity attacks.
![](https://framerusercontent.com/images/cmlZOQVlb4XIt9flhAxBwijw.png)
Blink Ops
Deliver Panther alerts to your automation platform
![](https://framerusercontent.com/images/Yy79KrII0Q9OuJnC5WhVfy2cZs.png)
AppOmni SIEM Integration
Monitor your Software as a Service security posture.
![](https://framerusercontent.com/images/eydkifnEArWq3s5AoaAxsd6TkBI.png)
Sublime Security SIEM Integration
Monitor email threats.
![](https://framerusercontent.com/images/dnJYM6e4yyF2bHUwER8jxLsBds.png)
Torq
Trigger automated workflows from your alerts
Custom Lookup Tables
Enrich log data from custom sources.
Anomali ThreatStream API SIEM Integration
Correlate log data with threat intelligence.
Material Security SIEM Integration
Monitor threats in Google Workspace and M365.
Zscaler Log Monitoring
Monitor application, network, and device access.
Wiz Log Monitoring
Protect your cloud security controls.
![](https://framerusercontent.com/images/XG3XtLCOMssi3VWh10rSAd3oDw.png)
Thinkst Canary Log Monitoring
Detect lateral movement in your environment.
![](https://framerusercontent.com/images/enHtDuLNkVEQZwGr9VPDd6Sj98.png)
Proofpoint Log Monitoring
Detect email attacks.
AWS CloudFront Log Monitoring
Analyze CDN traffic for signs of unusual behavior.
![](https://framerusercontent.com/images/dyRU3hrM94T9QtrxAP80vbp69g.png)
Amazon Security Lake & OSCF Log Monitoring
Inspect your OSCF data for signs of unusual behavior.
Tracebit Log Monitoring
Monitor activity on Tracebit security canaries across your organization
Mindflow
Automate incident response from your alerts
Load More
Nginx Access Log Monitoring
Monitor Nginx access logs and gain complete visibility into web server activity.
![](https://framerusercontent.com/images/z1m89qZAtyHPdbWENp26oLASt8.png)
Osquery Log Monitoring
Gain complete visibility into your operating system activity.
![](https://framerusercontent.com/images/mVnLgLBBlhMNwNwIzT4jYyk74.png)
Jira
Send Panther alerts to Jira and analyze the issue
![](https://framerusercontent.com/images/WEjWs6dGpY3Io52Sq2xmlCOkxw.png)
Slack
Send Panther alerts to a designated Slack channel.
![](https://framerusercontent.com/images/ywESZGBneMQPvkM9Pg8rOcMaMzM.png)
GitHub
Send Panther alerts to GitHub and analyze the issue
![](https://framerusercontent.com/images/qjtpjDeXwpxRkHjeCq4f4PeSwY.png)
SQS
Send programmatic notifications to emails with Panther via SQS
![](https://framerusercontent.com/images/5Uj5nnLJp5R2ynjvytVS6asds.png)
Microsoft Teams
Send Panther alerts to a designated Microsoft Teams channel
![](https://framerusercontent.com/images/kbInF88SemrYcqeqkNdY2F7vG4.png)
Asana
Send Panther alerts to Asana and analyze the issue.
![](https://framerusercontent.com/images/5lNP39u5VegjYsWMZsVMU1oItA.png)
OpsGenie
Send Panther alerts to OpsGenie and begin an investigation.
![](https://framerusercontent.com/images/g5RZB7rHvGLWdNTpKsNECglJAb8.png)
PagerDuty
Send Panther alerts to PagerDuty and begin an investigation
![](https://framerusercontent.com/images/B1nQcDgpINVFG57M37bXbg9Y.png)
SNS
Send programmatic alerts to emails with Panther via SNS
![](https://framerusercontent.com/images/Qfimh05me73Hc3wfrxRosRSE.png)
GCP Log Monitoring
Gain complete visibility into activity across your cloud service.
![](https://framerusercontent.com/images/XA41psbo4iWhG46bqaAFwJoOH4.png)
Syslog Log Monitoring
Monitor machine and network activity for suspicious behavior.
![](https://framerusercontent.com/images/QAmndqhR7YsLxJtcg2nDvrLXoY.png)
Fluentd Log Monitoring
Inspect application activity for any signs of suspicious behavior.
![](https://framerusercontent.com/images/DJfU8rdfnHmhBL0gjRU6LvJGA.png)
OSSEC Log Monitoring
Monitor OSSEC logs to gain complete security visibility into host activity.
![](https://framerusercontent.com/images/G8SHTH7wb3xSK3BK7Lj1YJDkI.png)
Zeek Log Monitoring
Inspect network traffic and DNS protocols for suspicious activity.
![](https://framerusercontent.com/images/dMqRHiv9InE2RijzXgMi5DQj4.png)
Cisco Umbrella Log Monitoring
Identify any suspicious or malicious domain addresses or DNS requests.
![](https://framerusercontent.com/images/W2RwnGt6zvx42pJX8aYhHwRekY.png)
Juniper Log Monitoring
Monitor network traffic for attack attempts or probes.
![](https://framerusercontent.com/images/VH9n68q3xh90Kps5zkQj6dq5HBk.png)
Suricata Log Monitoring
Identify any suspicious traffic or domain activity.
![](https://framerusercontent.com/images/vup0VHWXXunLAuDQaoH0qxqCCVc.png)
Lacework Log Monitoring
Gain complete visibility into your cloud and container environments.
![](https://framerusercontent.com/images/RIpFGxjBmtbZ0Y1fhQRYoGDseSw.png)
Teleport Log Monitoring
Inspect all SSH access activity for signs of suspicious behavior.
![](https://framerusercontent.com/images/KPqWIikhWyl2DV96hMpymZ8untY.png)
Apache Log Monitoring
Inspect all web activity for signs of suspicious behavior.
![](https://framerusercontent.com/images/UebD3B9vqyP8KGUhqy9p9gk6c.png)
GitLab Log Monitoring
Identify any suspicious behavior within your GitLab environment.
![](https://framerusercontent.com/images/YTPtLWlpZ3OaSvGLgvHQ0TzyPI.png)
Okta Log Monitoring
Monitor Okta logs to gain complete visibility into your IdP activity.
![](https://framerusercontent.com/images/cYLU2C2oqfXAImpSpAAonyMMPQc.png)
OneLogin Log Monitoring
Monitor your IdP for suspicious activity.
![](https://framerusercontent.com/images/gpllJsI8kGJK9apnE0O8eLmA8.png)
Google Workspace (G Suite) Log Monitoring
Identify any suspicious activity within your Google Workspace applications.
![](https://framerusercontent.com/images/KgiUv2zlj8aA2GFWNJLGBUcfOrw.png)
Box Log Monitoring
Gain complete visibility into your organization’s content management and file sharing.
![](https://framerusercontent.com/images/DI87C7nIo3iy2d30VyUm3OCtz4.png)
Snowflake
Build a robust security data lake in Snowflake.
![](https://framerusercontent.com/images/qIehrhX9QOUwdmHhR0F6eHs1tk.png)
AWS CloudTrail Log Analyzer
Track account changes in real-time and detect suspicious activity
![](https://framerusercontent.com/images/PGFA0nid9UbvngIpqs1XogGt7k.png)
S3 Buckets
Detect and alert on unauthorized access to your S3 buckets.
![](https://framerusercontent.com/images/uu13UW5hAyXWW2W9auegULTYLe0.png)
EC2 VPC
Capture traffic activity and monitor actual network traffic flows.
![](https://framerusercontent.com/images/72lF68oIgopYDEvgEpB22r6rTo.png)
GuardDuty
Track real-time changes to your AWS GuardDuty
![](https://framerusercontent.com/images/Q3IRwNCT5MbAc6zikWkhwOKwNOY.png)
Lambda
Track real-time changes to your AWS Lambda
![](https://framerusercontent.com/images/fUQdCjioCMIhmPyiKSgjAKiRR6w.png)
WAF Web ACL
Track real-time changes to your WAF ACLs
![](https://framerusercontent.com/images/rTdgLetsiKJXw0rgnaWLlxzdhOA.png)
ALB
Audit changes to AWS Application Load Balancer
![](https://framerusercontent.com/images/ycQcd4c5BunScYAP3eQTtEJlrA.png)
ACM Certificate
Audit changes to AWS Certificate manager
![](https://framerusercontent.com/images/hZztpx21JipZjRZ6sB7kBycA8Vo.png)
Redshift Cluster
Audit changes to AWS Redshift Clusters
![](https://framerusercontent.com/images/COJXkIGw5TBbVUic6Pmzjv6iAvk.png)
DynamoDB Table
Continuously monitor AWS DynamoDB tables for compliance
![](https://framerusercontent.com/images/OmVEwiT9ZJGEuL3m9clqrSxyBjc.png)
Config Recorder
Audit changes to AWS Config Recorder
![](https://framerusercontent.com/images/lBKrGF7nlqsusyztIjau9gkAM.png)
CloudWatch Log group
Track real-time changes to AWS CloudWatch Log group
![](https://framerusercontent.com/images/3PlA9BJyR8rKSbSF6pgs6yj5Y.png)
CloudFormation Stack
Track real-time changes to AWS CloudFormation stacks
![](https://framerusercontent.com/images/0dHKxYL8nUqraImQR9JqNCug.png)
RDS Instance
Get alerted in real-time when a RDS change occurs.
![](https://framerusercontent.com/images/Ekg9BJkeDxKJ9ZK2h2kPqG3CW7w.png)
Password Policy
Monitor password policies for your AWS account
![](https://framerusercontent.com/images/kyTZQXdxqwQVvwbl0sMyKdZLdm0.png)
IAM
Track real-time changes to IAM User, Group, Role, and Policy
![](https://framerusercontent.com/images/Q7OToIqpqDrEm1gspdATZixtBI.png)
KMS Key
Follow the highest standards of cryptographic practices.
![](https://framerusercontent.com/images/mi56pgvUatfB60fVGMEnt65mjfM.png)
ECS Cluster
Gain visibility into specific ECS environments in real-time.
![](https://framerusercontent.com/images/0sUpwo1nS5vOnoGvMrYsR5G4s.png)
EC2 Instance
Track real-time changes to your EC2 Instance
![](https://framerusercontent.com/images/YTWOZbuIQw4JMohZffkhWEy1Q4.png)
EC2 AMI
Monitor which AWS accounts can use AMI to launch instances
![](https://framerusercontent.com/images/HzAmmsnFh89Tnp178zruMvcPQ.png)
EC2 Volume
Continuously audit your EC2 Volume configurations
![](https://framerusercontent.com/images/TwFiXdGly2cwhznZIdwBaeyZZuY.png)
EC2 Network ACL
Audit changes to AWS Network ACL
![](https://framerusercontent.com/images/vRQWQQgkVmPCy99omrfUxR3a4.png)
EC2 Security Group
Audit changes to the security group in your EC2 instances.
![](https://framerusercontent.com/images/3ufhyQdc30Sg4SGbbNR4g20Lls.png)
CrowdStrike Log Monitoring
Gain complete visibility into your managed endpoints.
![](https://framerusercontent.com/images/2mDp9UDZMwZZRLINakDvjdtCZs.png)
Fastly Log Monitoring
Monitor network traffic for signs of suspicious behavior.
![](https://framerusercontent.com/images/WEjWs6dGpY3Io52Sq2xmlCOkxw.png)
Slack Log Monitoring
Monitor your team’s communication platform for suspicious activity.
![](https://framerusercontent.com/images/drc8w7ARmOwmsZoWeeaQ2zjZlfU.png)
Cloudflare Log Monitoring
Inspect network traffic for signs of suspicious behavior.
![](https://framerusercontent.com/images/tuJabVhvFi7p04HOh4CDPWaz43o.png)
Custom Webhooks
Send alert data to third-party applications
![](https://framerusercontent.com/images/3XYgC9vF0D8T64DBDgeiNSiAEiQ.png)
Sophos Log Monitoring
Monitor endpoint policy violations and data loss prevention events.
![](https://framerusercontent.com/images/K2tLL43v64v37Fy3M4RjuyDDXkI.png)
Tines
Send Panther alerts to Tines and initiate a workflow
![](https://framerusercontent.com/images/ARXXOC9QKVJxYIsdLldhk5NAo.png)
Duo Security Log Monitoring
Monitor your access management tools for suspicious activity.
Salesforce Log Monitoring
Monitor your sales operations data for suspicious activity.
![](https://framerusercontent.com/images/ywESZGBneMQPvkM9Pg8rOcMaMzM.png)
GitHub Log Monitoring
Identify any vulnerabilities within your GitHub repositories.
![](https://framerusercontent.com/images/hHGznRKmwt7NCEuLOchYc3oSi48.png)
Microsoft 365 Log Monitoring
Monitor your team’s communication and collaboration tools for suspicious activity.
![](https://framerusercontent.com/images/zGRzU7gYUA391tlUW06hwwTMAGE.png)
1Password Log Monitoring
Monitor your password management platform for suspicious activity.
![](https://framerusercontent.com/images/JkVnJHmT4wAYm1LpvO2b5HOdMc.png)
Zoom Log Monitoring
Monitor abnormal user activity within your Zoom account.
![](https://framerusercontent.com/images/KbbAVLCCzRQXOqOYs7LRbjQX0E.png)
Atlassian Log Monitoring
Monitor Atlassian audit logs to identify suspicious activity in real-time.
![](https://framerusercontent.com/images/kbInF88SemrYcqeqkNdY2F7vG4.png)
Asana Log Monitoring
Monitor Asana audit logs to identify suspicious activity in real-time.
![](https://framerusercontent.com/images/sWG5jWE5JX0OQe4i5YpABmg.png)
Zendesk Log Monitoring
Monitor unusual activity within your Zendesk account.
![](https://framerusercontent.com/images/4YvT39Wgca4K7khLjRxvOXBPzE.png)
Snyk Log Monitoring
Monitor for any changes within your Snyk Organization.
![](https://framerusercontent.com/images/rHgPLTmI07kQYdqBQ8JBwV7M0ks.png)
GreyNoise Intelligence
Enrich threat intelligence data and reduce false-positive alerts
![](https://framerusercontent.com/images/lCfkIlTaWbUhnXF9sbonfSQVI.png)
Dropbox Log Monitoring
Identify any suspicious file-sharing activity within your organization.
![](https://framerusercontent.com/images/U968SKqpb1N9bjLeaxqIj9gTPA.png)
Jamf Pro Log Monitoring
Monitor Jamf Pro login events for suspicious activity.
![](https://framerusercontent.com/images/yNAmiiPs56tbffDwYPj7Ub82cGw.png)
Microsoft Graph Log Monitoring
Monitor security alerts across Microsoft products, services, and partners.
![](https://framerusercontent.com/images/s3SKoiWzex543JtReGGUHs5Z7aY.png)
MongoDB Atlas Log Monitoring
Monitor events within your MongoDB Atlas organization or project.
![](https://framerusercontent.com/images/j6yXBhVBwIu8Y9Z6LbpbBTZR7DY.png)
SentinelOne Log Monitoring
Monitor your endpoint data, network activity, and DNS requests.
![](https://framerusercontent.com/images/GxPUIMAPikRPRcMkoMQDbnBU.png)
Sysdig Log Monitoring
Gain complete visibility into Sysdig platform activity.
![](https://framerusercontent.com/images/3cY4Bra7JVUaVH4jpxsO8ecjl8.png)
Bitwarden Log Monitoring
Identify any abnormal user activity in your organization's Bitwarden account.
![](https://framerusercontent.com/images/K2tLL43v64v37Fy3M4RjuyDDXkI.png)
Tines Log Monitoring
Monitor any changes within your Tines tenant.
![](https://framerusercontent.com/images/rTdgLetsiKJXw0rgnaWLlxzdhOA.png)
AWS ALB Log Monitoring
Monitor requests sent to your load balancer for suspicious activity.
![](https://framerusercontent.com/images/gSNLqAeOZGaUCFx3FJZMDvglOY.png)
AWS Aurora Log Monitoring
Monitor and detect any suspicious database events.
![](https://framerusercontent.com/images/pmhGWsPeldveYhWm1TxlTDg37s.png)
AWS CloudTrail Log Monitoring
Identify any suspicious activity within your AWS infrastructure.
![](https://framerusercontent.com/images/lBKrGF7nlqsusyztIjau9gkAM.png)
AWS CloudWatch Log Monitoring
Monitor any resource changes within your AWS environment.
![](https://framerusercontent.com/images/OmVEwiT9ZJGEuL3m9clqrSxyBjc.png)
AWS Config Log Monitoring
Monitor the configuration of your AWS resources.
![](https://framerusercontent.com/images/IefIJGd26Z3nohZakggr2w2i3wU.png)
AWS EKS Log Monitoring
Monitor your Kubernetes environment for suspicious activity.
![](https://framerusercontent.com/images/72lF68oIgopYDEvgEpB22r6rTo.png)
AWS GuardDuty Log Monitoring
Monitor your AWS environment for malicious activity and unauthorized behavior.
![](https://framerusercontent.com/images/PGFA0nid9UbvngIpqs1XogGt7k.png)
AWS S3 Log Monitoring
Monitor all requests made to AWS S3 buckets.
![](https://framerusercontent.com/images/rowPnQTd0FzlwcxWrIcxR1QGMc.png)
AWS Transit Gateway Flow Log Monitoring
Monitor the IP traffic flowing through your transit gateway.
![](https://framerusercontent.com/images/uu13UW5hAyXWW2W9auegULTYLe0.png)
AWS VPC Log Monitoring
Monitor the IP traffic going to and from network interfaces in your VPC.
![](https://framerusercontent.com/images/fUQdCjioCMIhmPyiKSgjAKiRR6w.png)
AWS WAF Log Monitoring
Investigate traffic that is analyzed by your web Access Control Lists (ACLs).
![](https://framerusercontent.com/images/M5yavhoj9PWPf9R84w9ZUd6I.png)
Auth0 Log Monitoring
Monitor user authentication and authorization activities in Auth0.
![](https://framerusercontent.com/images/n32jSw4RvBIsj9yD2o6YSlq5LQ.png)
Tailscale Log Monitoring
Monitor your team’s Tailscale network.
![](https://framerusercontent.com/images/YyNIKhHkWYAYcgkT9pvgiEui6rQ.png)
Heroku Log Monitoring
Monitor your Heroku applications, infrastructure, and admin actions.
![](https://framerusercontent.com/images/sWi1VPaQAaxowYi14zhEXtE4qU.png)
Windows Event Log Monitoring
Monitor application, system, and security notifications from Windows machines.
![](https://framerusercontent.com/images/1w43etPw6Q3YwqCUZHve4MfJw.png)
Netskope Log Monitoring
Identify any suspicious cloud-based app or service activity.
![](https://framerusercontent.com/images/XA41psbo4iWhG46bqaAFwJoOH4.png)
Auditd Log Monitoring
Monitor system-level activities in your Linux environment.
![](https://framerusercontent.com/images/uD5Fu4E30s9oPrjr1UNx9ysDRU.png)
Docker Event Log Monitoring
Gain complete visibility into your Docker system events.
![](https://framerusercontent.com/images/oiGP0bJv6oV3GnouUMJdvTCU8.png)
Azure Log Monitoring
Continuously monitor your Azure account.
![](https://framerusercontent.com/images/eGQqiBVM61wWWGyMnYFkvURBIy0.png)
Carbon Black Log Monitoring
Monitor endpoint activity for suspicious behavior.
![](https://framerusercontent.com/images/5KoGbf35xnKxu64P1DgV65TBN9Y.png)
Envoy Access Log Monitoring
Monitor network activity for suspicious behavior.
![](https://framerusercontent.com/images/43CXqgUv857INcXgRC9yUD2TqY.png)
Tenable Vulnerability Scan Monitoring
Gain complete visibility into your network assets.
![](https://framerusercontent.com/images/eIDifEepcllMTSnFfdMm68QyzI.png)
Notion Log Monitoring
Continuously monitor your Notion workspace.
![](https://framerusercontent.com/images/48vq18PLWyF28PM4ymgwtlpM.png)
AWS Security Hub Monitoring
Correlate AWS Security Hub findings.
![](https://framerusercontent.com/images/1BO6EAxRk4Kn4LjxoS6qgWacrI4.jpg)
IPInfo
Enrich detections and reduce false-positive alerts
![](https://framerusercontent.com/images/j1oJmlD0JAIBeraoD2Kgeqg2uAk.png)
Splunk
Send Panther alerts to Splunk
![](https://framerusercontent.com/images/3IpkQ4bP0cBOhXvwsilRMFMOhnU.png)
Discord
Route Panther alerts to a Discord channel
Incident.io
Forward Panther alerts to your incident management platform
![](https://framerusercontent.com/images/KhShk5mbp3qC790SJhWvfNJfAs0.png)
Push Security SIEM Integration
Defend against identity attacks.
![](https://framerusercontent.com/images/cmlZOQVlb4XIt9flhAxBwijw.png)
Blink Ops
Deliver Panther alerts to your automation platform
![](https://framerusercontent.com/images/Yy79KrII0Q9OuJnC5WhVfy2cZs.png)
AppOmni SIEM Integration
Monitor your Software as a Service security posture.
![](https://framerusercontent.com/images/eydkifnEArWq3s5AoaAxsd6TkBI.png)
Sublime Security SIEM Integration
Monitor email threats.
![](https://framerusercontent.com/images/dnJYM6e4yyF2bHUwER8jxLsBds.png)
Torq
Trigger automated workflows from your alerts
Custom Lookup Tables
Enrich log data from custom sources.
Anomali ThreatStream API SIEM Integration
Correlate log data with threat intelligence.
Material Security SIEM Integration
Monitor threats in Google Workspace and M365.
Zscaler Log Monitoring
Monitor application, network, and device access.
Wiz Log Monitoring
Protect your cloud security controls.
![](https://framerusercontent.com/images/XG3XtLCOMssi3VWh10rSAd3oDw.png)
Thinkst Canary Log Monitoring
Detect lateral movement in your environment.
![](https://framerusercontent.com/images/enHtDuLNkVEQZwGr9VPDd6Sj98.png)
Proofpoint Log Monitoring
Detect email attacks.
AWS CloudFront Log Monitoring
Analyze CDN traffic for signs of unusual behavior.
![](https://framerusercontent.com/images/dyRU3hrM94T9QtrxAP80vbp69g.png)
Amazon Security Lake & OSCF Log Monitoring
Inspect your OSCF data for signs of unusual behavior.
Tracebit Log Monitoring
Monitor activity on Tracebit security canaries across your organization
Mindflow
Automate incident response from your alerts
Load More
Product
Resources
Case Studies
Blog
Podcasts
Webinars
Solution Briefs
Events
Workshops
Support
Documentation
Knowledge Base
Release Notes
Status
Community
Company
About Us
Careers
Partners
News
Trust
Product
Resources
Case Studies
Blog
Podcasts
Webinars
Solution Briefs
Events
Workshops
Support
Documentation
Knowledge Base
Release Notes
Status
Community
Company
About Us
Careers
Partners
News
Trust