DATASHEET Exabeam Platform Integrations
DATASHEET Exabeam Platform Integrations
Exabeam Platform
Integrations
Inbound Data Sources for Log Ingestion and
Service Integrations for Incident Response
The ability to quickly detect, investigate, and respond to Collectors for the Cloud and
modern threats is dependent on the quality and quantity
of log data from IT and security tools. With more than 640
On-premises
different product integrations across 330 different vendors, Collectors are pre-built connectors that enable security
Exabeam works extensively with third-party vendors to teams to easily collect logs from popular cloud services
provide a holistic view of activity across users and devices such as AWS, GitHub, Google, Microsoft, Salesforce,
whether on-premises or in the cloud. and others. The Exabeam Security Operations Platform
provides extensive data collection capabilities and
Extensive Data Sources coverage. The platform provides collection from 200+
on-premises products and supports 34 cloud-delivered
Exabeam ingests data from a variety of IT and security
security products, 11 SaaS productivity applications, and
products to provide security analysts with the full
21 cloud infrastructure products.
scope of events. Exabeam Security Log Management,
Exabeam SIEM, and Exabeam Fusion ingest logs from
various sources, including VPN, endpoint, network, web,
Behavioral Analytics Extended to
database, CASB, and cloud solutions. After ingesting the the Cloud
raw logs, Exabeam then parses and enriches them with For most security information and event management
contextual information to provide security analysts with (SIEM) products, user and entity behavior analytics (UEBA)
the information they need to detect and and automation is an afterthought. By combining insights
investigate incidents. from multiple different sources, security operations get a
deeper understanding of normal activity so they can better
detect anomalies that often go undetected. By collecting
log data from SaaS productivity applications and cloud
infrastructure products, security teams can extend any
compliance-based security requirements to the cloud.
exabeam.com | 01
Exabeam Platform Integrations
Exabeam Data Sheet
exabeam.com | 02
Exabeam Platform Integrations
Exabeam Data Sheet
exabeam.com | 03
Exabeam Platform Integrations
Exabeam Data Sheet
Firewalls (WAF, Ť Airlock Security Access Hub Ť Huawei Unified Security Gateway
SWG, Proxy) Ť AWS WAF Ť Imperva Incapsula
Ť Barracuda Cloudgen Firewall Ť Imperva SecureSphere
Ť Barracuda WAF Ť IPTables
Ť Check Point NGFW Ť IPTables FW
Ť Cisco Adaptive Security Appliance Ť Juniper SRX Series
Ť Cisco Cloud Web Security Ť Magento WAF
Ť Cisco Firepower Ť McAfee Web Gateway
Ť Cisco Meraki MX appliance Ť Netscaler WAF
Ť Cisco PIX Ť NSX FW
Ť Cisco Umbrella Ť Palo Alto NGFW
Ť Citrix Web App Firewall Ť pfSense
Ť Cloudflare WAF Ť SIGSCI
Ť F5 Advanced Firewall Manager Ť Sonicwall
Ť F5 Advanced Web Application Firewall Ť Sophos XG Firewall
Ť Forcepoint Next-Gen Firewall Ť Squid
Ť FortiGate Ť Symantec Web Security Service
Ť Fortinet Enterprise Firewall Ť Trend Micro InterScan Web Security
Ť Fortinet FortiWeb Ť Web Gateway
Ť Fortinet UTM Ť Websense Security Gateway
Ť Huawei Enterprise Network Firewall Ť Zscaler Internet Access
Network Security Ť Aruba ClearPass Policy Manager Ť IBM Proventia Network IPS
(NDR, IPS, IDS) Ť Aruba Wireless controller Ť Juniper Networks
Ť Attivo BOTsink Ť LanScope Cat
Ť Check Point Threat Emulation Ť OSSEC
Ť Cisco ISE Ť Panorama
Ť Cisco Netflow Ť Pensando
Ť Cisco NPE Ť Reveal
Ť Cisco Secure Cloud Analytics Ť Ruckus
Ť Cisco Secure Network Analytics Ť ServiceNow
Ť Cisco SourceFire Ť SiteSpect
Ť Deep Discovery Inspector Ť Targeted Attack Platform
Ť F5 Ť Vectra Cognito Stream
Ť F5 BIG-IP Ť ViaScope IPScan
Ť Forescout CounterACT Ť VMware NSX
Ť F-Secure Policy Manager Ť Zeek
Ť HPE Comware
exabeam.com | 04
Exabeam Platform Integrations
Exabeam Data Sheet
exabeam.com | 05
Exabeam Platform Integrations
Exabeam Data Sheet
exabeam.com | 06
Exabeam Platform Integrations
Exabeam Data Sheet
exabeam.com | 07
Exabeam Platform Integrations
Exabeam Data Sheet
Carbon Black Ť Ban Hash from Endpoint Delete File Ť Isolate (Contain) CarbonBlack Response
Response Ť Get Device Info Host Kill Process
Ť Get File Ť List alerts
Ť Get Triage Data Ť Unblock Hash
Ť Hunt File Ť Undo Host Isolation
exabeam.com | 08
Exabeam Platform Integrations
Exabeam Data Sheet
exabeam.com | 10
Exabeam Platform Integrations
Exabeam Data Sheet
Windows Remote Ť Get Endpoint Installed Applications Ť Get Recently Opened Files
Management Ť Get Endpoint Process List Ť Get Recently Run Applications
Ť Get Event Logs Ť Get Removable Device Information
Ť Get File Ť Get Triage Data
exabeam.com | 11
Exabeam Platform Integrations
Exabeam Data Sheet
exabeam.com | 12
Exabeam Platform Integrations
Exabeam Data Sheet
SIEM
IBM QRadar Ť Add Asset to Reference Set Ť Search for network connections
Ť Get Values From Lookup Table Ť Search for users who visited a URL
Ť QRadar Query
exabeam.com | 13
Exabeam Platform Integrations
Exabeam Data Sheet
exabeam.com | 14
Exabeam Platform Integrations
Exabeam Data Sheet
exabeam.com | 15
Exabeam Platform Integrations
Exabeam Data Sheet
exabeam.com | 16
Exabeam Platform Integrations
Exabeam Data Sheet
Utilities/Other
exabeam.com | 17
Exabeam Platform Integrations
Exabeam Data Sheet
Vulnerability Management
exabeam.com | 18
Exabeam Platform Integrations
Exabeam Data Sheet
Exabeam, the Exabeam logo, New-Scale SIEM, Detect. Defend. Defeat., Exabeam Fusion, Smart Timelines,
Security Operations Platform, and XDR Alliance are service marks, trademarks, or registered marks of Exabeam,
Inc. in the United States and/or other countries. All other brand names, product names, or trademarks belong to
their respective owners. © 2023 Exabeam, Inc. All rights reserved.
About Exabeam
Exabeam is a global cybersecurity leader that created New-Scale SIEM™
for advancing security operations. We help organizations detect threats,
defend against cyberattacks, and defeat adversaries. The powerful
combination of our cloud-scale security log management, behavioral
analytics, and automated investigation experience results in an Learn how at
unprecedented advantage over insider threats, nation states, and other Exabeam.com
cyber criminals. We understand normal behavior, even as normal keeps
changing — giving security operations teams a holistic view of incidents
for faster, more complete response.
Exabeam-Data-Sheet-Platform-Integrations-Inbound-and-Response-08|08/30/23 exabeam.com | 19