Filter by:

Amazon AWS
For 13 years, Amazon Web Services has been the world’s most comprehensive and broadly adopted cloud platform.
Learn More
Amazon AWS
SOAR, Log Source
For 13 years, Amazon Web Services has been the world’s most comprehensive and broadly adopted cloud platform. AWS offers over 175 fully featured services for compute, storage, databases, networking, analytics, robotics, machine learning and artificial intelligence (AI), Internet of Things (IoT), mobile, security, hybrid, virtual and augmented reality (VR and AR), media, and application development, deployment, and management from 69 Availability Zones (AZs) within 22 geographic regions, with announced plans for 13 more Availability Zones and four more AWS Regions in Indonesia, Italy, South Africa, and Spain. Millions of customers—including the fastest-growing startups, largest enterprises, and leading government agencies—trust AWS to power their infrastructure, become more agile, and lower costs.
Useful Resources: Exabeam & Amazon S3 Solution Brief
Learn More
Cisco
Cisco (NASDAQ:CSCO) is the worldwide technology leader that has been making the Internet work since 1984.
Learn More
Cisco
Log Source
Endpoint Security (EPP/EDR)
Cisco (NASDAQ:CSCO) is the worldwide technology leader that has been making the Internet work since 1984. Our people, products, and partners help society securely connect and seize tomorrow’s digital opportunity today. Discover more at newsroom.cisco.com and follow us on Twitter at @Cisco.
Useful Resources: Exabeam and Cisco Security Solution BriefWebinar: Cisco and Exabeam: A Cloud-Based Approach for Insider Threat Management
Learn More

Code42
Log Source
Endpoint Security (EPP/EDR)
Code42 is the leader in insider threat detection, investigation and response. Native to the cloud, Code42 rapidly detects data loss, leak, theft and sabotage as well as speeds incident response – all without lengthy deployments, complex policy management or blocking employee productivity. With Code42, security professionals can protect corporate data and reduce insider risk while fostering an open and collaborative culture for employees.
Learn More
Cribl
Cribl makes open observability a reality for today’s tech professionals. The Cribl product suite defies data gravity with radical levels of choice and control. Wherever the data comes from, wherever it needs to go, Cribl delivers the freedom and flexibility to make choices, not compromises.
Learn More
CrowdStrike
While endpoint protection tools can provide essential information about your security posture, they can’t always tell you if an endpoint’s behavior is suspicious or not. By integrating CrowdStrike with Exabeam, security teams can leverage user baselines to detect anomalies that may indicate an active threat.
Learn More
CyberArk
If an attacker gains access to a privileged account, they can potentially disrupt an organization’s IT environment, steal sensitive data, or damage critical systems. By integrating CyberArk with Exabeam, security teams can leverage behavior analytics to better monitor privileged access and applications activity.
Learn More
Google Cloud is widely recognized as a global leader in delivering a secure, open, intelligent, and transformative enterprise cloud platform.
Learn More
Mimecast
Email is one of the most common vectors for cyber attacks. By integrating Mimecast with Exabeam, security teams can leverage advanced threat detection, investigation, and response to augment their ability to identify and defend against email-based attacks.
Learn More
Netskope
Cloud access security broker solutions are essential for detecting risks to an organization’s cloud platform, such as compromised credentials and insider threats. By integrating Netskope with Exabeam, security teams can monitor cloud-access events to identify unusual activity.
Learn More
Okta
Okta is the leading independent provider of identity for the enterprise. The Okta Identity Cloud enables organizations to securely connect the right people to the right technologies at the right time.
Learn More
Okta
SOAR, Log Source
Authentication and Access Management
Okta is the leading independent provider of identity for the enterprise. The Okta Identity Cloud enables organizations to securely connect the right people to the right technologies at the right time. With over 6,500 pre-built integrations to applications and infrastructure providers, Okta customers can easily and securely use the best technologies for their business. Over 7,400 organizations, including 20th Century Fox, JetBlue, Nordstrom, Slack, Teach for America and Twilio, trust Okta to help protect the identities of their workforces and customers.
Useful ResourcesExabeam & Okta Solution Brief
Video: Monitoring, automated orchestration and automation with Okta, Netskope and Exabeam
Learn More
Palo Alto Networks
Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate.
Learn More
Palo Alto Networks
Log Source, SOAR
Web Security and Monitoring; Data Loss Prevention (DLP); Privileged Access Management (PAM); Firewalls; Cloud Security and Infrastructure; Network Access, Analysis and Monitoring; VPN/ Zero Trust Network Access; Threat Intelligence Platform; Network Access, Analysis and Monitoring;
Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate. Their mission is to be the cybersecurity partner of choice, protecting our digital way of life. They help address the world’s greatest security challenges with continuous innovation that seizes the latest breakthroughs in artificial intelligence, analytics, automation, and orchestration. By delivering an integrated platform and empowering a growing ecosystem of partners, they are at the forefront of protecting tens of thousands of organizations across clouds, networks, and mobile devices. Their vision is a world where each day is safer and more secure than the one before.
Learn More
RecordedFuture
Recorded Future delivers security intelligence to amplify the effectiveness of security and IT teams in reducing exposure by uncovering unknown threats and informing better, faster decisions.
Learn More
RecordedFuture
SOAR
Threat Intelligence Platform
Recorded Future delivers security intelligence to amplify the effectiveness of security and IT teams in reducing exposure by uncovering unknown threats and informing better, faster decisions. Working to provide a singular view of digital, brand, and third party risk, the Recorded Future platform provides proactive and predictive intelligence, analyzing data from open, proprietary, and aggregated customer-provided sources. Recorded Future arms threat analysts, vulnerability management teams, security operations centers, and incident responders with context-rich, actionable intelligence in real time that’s ready for integration across the security ecosystem.
Learn More
Sailpoint
SailPoint, the leader in enterprise identity governance, brings the Power of Identity to customers around the world.
Learn More
Sailpoint
Log Source
Authentication and Access Management
SailPoint, the leader in enterprise identity governance, brings the Power of Identity to customers around the world. Leveraging artificial intelligence and machine learning, SailPoint’s predictive identity governance platform delivers adaptive security and continuous compliance while dramatically improving operational efficiency. With SailPoint, organizations of all sizes can embrace innovation, expand their workforce globally and evolve their business, securely and confidently. As both an industry pioneer and market leader in identity governance, SailPoint helps protect some of the world’s most prominent companies in a wide range of industries, including: 9 of the top 15 banks, 4 of the top 6 healthcare insurance and managed care providers, 9 of the top 15 property and casualty insurance providers, 5 of the top 13 pharmaceutical companies, and 11 of the largest 15 federal agencies.
Learn More
SentinelOne
As the attack surface continues to expand, organizations need more capabilities, less complexity, and fewer agents if they want to keep up with known and unknown threats. By integrating SentinelOne with Exabeam, security teams can integrate behavior analytics to gain unified visibility across the entire technology ecosystem for increased enforcement at every control point.
Learn More

VMWare
Log Source
Endpoint Security (EPP/EDR); Authentication and Access Management
VMware software powers the world’s complex digital infrastructure. The company’s cloud, networking and security, and digital workspace offerings provide a dynamic and efficient digital foundation to customers globally, aided by an extensive ecosystem of partners. Headquartered in Palo Alto, California, VMware is committed to being a force for good, from its breakthrough innovations to its global impact.
Learn More
Zscaler
Zscaler enables the world’s leading organizations to securely transform their networks and applications for a mobile and cloud-first world.
Learn More
Zscaler
Log Source, SOAR
Data Loss Prevention (DLP); Network Access, Analysis and Monitoring; Web Security and Monitoring; Cloud Security and Infrastructure
Zscaler enables the world’s leading organizations to securely transform their networks and applications for a mobile and cloud-first world. Its flagship services, Zscaler Internet Access™ and Zscaler Private Access™, create fast, secure connections between users and applications, regardless of device, location, or network. Zscaler services are 100 percent cloud-delivered and offer the simplicity, enhanced security and improved user experience that traditional appliances are unable to match. Used in more than 185 countries, Zscaler operates a multi-tenant distributed cloud security platform, protecting thousands of customers from cyberattacks and data loss.
Learn More