Filter by:

Amazon AWS
For 13 years, Amazon Web Services has been the world’s most comprehensive and broadly adopted cloud platform.
Learn More
Amazon AWS
Log Source, SOAR
For 13 years, Amazon Web Services has been the world’s most comprehensive and broadly adopted cloud platform. AWS offers over 175 fully featured services for compute, storage, databases, networking, analytics, robotics, machine learning and artificial intelligence (AI), Internet of Things (IoT), mobile, security, hybrid, virtual and augmented reality (VR and AR), media, and application development, deployment, and management from 69 Availability Zones (AZs) within 22 geographic regions, with announced plans for 13 more Availability Zones and four more AWS Regions in Indonesia, Italy, South Africa, and Spain. Millions of customers—including the fastest-growing startups, largest enterprises, and leading government agencies—trust AWS to power their infrastructure, become more agile, and lower costs.
Useful Resources: Exabeam & Amazon S3 Solution Brief
Learn More
Armis
Armis®️ is the leading agentless, enterprise-class device security platform, designed to protect organizations from cyberthreats created by the onslaught of unmanaged and IoT devices.
Learn More
Armis
Log Source
Armis®️ is the leading agentless, enterprise-class device security platform, designed to protect organizations from cyberthreats created by the onslaught of unmanaged and IoT devices. Fortune 1000 companies trust our real-time and continuous protection to see and control all managed, unmanaged, un-agentable and IoT devices – from traditional devices like laptops and smartphones to new smart devices like smart TVs, webcams, printers, HVAC systems, industrial control systems and PLCs, medical devices and more. Armis provides passive and unparalleled asset inventory, risk management, and detection & response. Core to our platform is the Armis Device Knowledgebase. It is the world’s largest cloud-based, crowd-source device behavior knowledgebase tracking 230 millions devices, and growing. Armis tracks device behavior, connections, and history, letting us compare real-time device behavior to “known-good” baseline, identifying policy violations, misconfigurations, or abnormal behavior. When a device acts suspiciously or maliciously, Armis can disconnect or quarantine the device.
Useful Resources: Exabeam & Armis
Learn More
Bitglass
Bitglass’ Total Cloud Security Platform is the only secure access service edge offering that combines a Gartner-MQ-Leading cloud access security broker, the world’s only on-device secure web gateway, and zero trust network access to secure any interaction.
Learn More
Bitglass
Log Source
Bitglass’ Total Cloud Security Platform is the only secure access service edge offering that combines a Gartner-MQ-Leading cloud access security broker, the world’s only on-device secure web gateway, and zero trust network access to secure any interaction. Its Polyscale Architecture boasts an industry-leading uptime of 99.99% and delivers unrivaled performance and real-time scalability to any location in the world. Based in Silicon Valley with offices worldwide, the company is backed by Tier 1 investors and was founded in 2013 by a team of industry veterans with a proven track record of innovation and execution.
Learn More
CarbonBlack
Carbon Black leads a new era of endpoint security by enabling organizations to disrupt advanced attacks, deploy the best prevention strategies for their business, and leverage the expertise of 10,000 professionals from IR firms, MSSPs and enterprises to shift the balance of power back to security teams.
Learn More
CarbonBlack
Log Source, SOAR
Endpoint Security (EPP/EDR)
Carbon Black leads a new era of endpoint security by enabling organizations to disrupt advanced attacks, deploy the best prevention strategies for their business, and leverage the expertise of 10,000 professionals from IR firms, MSSPs and enterprises to shift the balance of power back to security teams. Only Carbon Black continuously records and centrally retains all endpoint activity, making it easy to track an attacker’s every action, instantly scope every incident, unravel entire attacks and determine root causes. Carbon Black also offers a range of prevention options so organizations can match their endpoint defense to their business needs. Carbon Black has been named #1 in endpoint protection, incident response, and market share. Forward-thinking companies choose Carbon Black to arm their endpoints, enabling security teams to: Disrupt. Defend. Unite.
Learn More
Cisco
Cisco (NASDAQ:CSCO) is the worldwide technology leader that has been making the Internet work since 1984.
Learn More
Cisco
Log Source
Endpoint Security (EPP/EDR)
Cisco (NASDAQ:CSCO) is the worldwide technology leader that has been making the Internet work since 1984. Our people, products, and partners help society securely connect and seize tomorrow’s digital opportunity today. Discover more at newsroom.cisco.com and follow us on Twitter at @Cisco.
Useful Resources: Exabeam and Cisco Security Solution BriefWebinar: Cisco and Exabeam: A Cloud-Based Approach for Insider Threat Management
Learn More

Code42
Log Source
Endpoint Security (EPP/EDR)
Code42 is the leader in insider threat detection, investigation and response. Native to the cloud, Code42 rapidly detects data loss, leak, theft and sabotage as well as speeds incident response – all without lengthy deployments, complex policy management or blocking employee productivity. With Code42, security professionals can protect corporate data and reduce insider risk while fostering an open and collaborative culture for employees.
Learn More
Corelight
Corelight makes powerful network traffic analysis (NTA) solutions that transform network traffic into rich logs, extracted files, and security insights for more effective incident response, threat hunting, and forensics.
Learn More
Corelight
Log Source
Web Security and Monitoring; Network Access, Analysis and Monitoring
Corelight makes powerful network traffic analysis (NTA) solutions that transform network traffic into rich logs, extracted files, and security insights for more effective incident response, threat hunting, and forensics. Corelight Sensors run on Zeek (formerly called “Bro”), the open-source network security monitoring tool used by thousands of organizations. Corelight Sensors simplify Zeek deployment and expand its performance and capabilities. Corelight’s global customers include Fortune 500 companies, major government agencies, and large research universities. Corelight is based in San Francisco, Calif.
Useful Resources: Video: Finding Network Threats with Exabeam UEBA & Corelight Zeek
Learn More
CrowdStrike
While endpoint protection tools can provide essential information about your security posture, they can’t always tell you if an endpoint’s behavior is suspicious or not. By integrating CrowdStrike with Exabeam, security teams can leverage user baselines to detect anomalies that may indicate an active threat.
Learn More
CyberArk
If an attacker gains access to a privileged account, they can potentially disrupt an organization’s IT environment, steal sensitive data, or damage critical systems. By integrating CyberArk with Exabeam, security teams can leverage behavior analytics to better monitor privileged access and applications activity.
Learn More

Fireeye
Log Source, SOAR
Email Security and Management; Endpoint Security (EPP/EDR); Network Access, Analysis and Monitoring; Forensics and Malware Analysis
FireEye is the intelligence-led security company. Working as a seamless, scalable extension of customer security operations, FireEye offers a single platform that blends innovative security technologies, nation-state grade threat intelligence, and world-renowned Mandiant® consulting. With this approach, FireEye eliminates the complexity and burden of cybersecurity for organizations struggling to prepare for, prevent, and respond to cyber attacks. FireEye has over 8,500 customers across 103 countries, including more than 50 percent of the Forbes Global 2000.
Learn More
Forcepoint
Forcepoint is the global human-centric cybersecurity company transforming the digital enterprise by continuously adapting security response to the dynamic risk posed by the behavior of individual users and machines.
Learn More
Forcepoint
Log Source
Data Loss Prevention (DLP); Cloud Access Security Broker (CASB); Web Security and Monitoring
Forcepoint is the global human-centric cybersecurity company transforming the digital enterprise by continuously adapting security response to the dynamic risk posed by the behavior of individual users and machines. Forcepoint solutions deliver risk-adaptive protection to continuously ensure trusted use of data and systems. Based in Austin, Texas, Forcepoint protects users and data for thousands of enterprise and government customers in more than 150 countries.
Learn More
Gigamon
Gigamon is the first company to deliver complete network visibility and analytics on all information-in-motion, from raw packets to apps, across physical, virtual and cloud infrastructure.
Learn More
Gigamon
Log Source
Gigamon is the first company to deliver complete network visibility and analytics on all information-in-motion, from raw packets to apps, across physical, virtual and cloud infrastructure. They aggregate, transform and analyze network traffic to solve for critical performance and security needs, including rapid threat detection and response, freeing your organization to drive digital innovation. Gigamon has been awarded over 75 technology patents and enjoys industry-leading customer satisfaction with more than 3,000 organizations, including over 80 percent of the Fortune 100. Headquartered in Silicon Valley, Gigamon operates globally.
Learn More
Google Cloud is widely recognized as a global leader in delivering a secure, open, intelligent, and transformative enterprise cloud platform.
Learn More
Lastline
Lastline’s Network Detection and Response platform delivers the visibility security professionals need to detect and contain sophisticated cyberthreats before they disrupt your business.
Learn More
Lastline
Log Source
Network Access, Analysis and Monitoring
Lastline’s Network Detection and Response platform delivers the visibility security professionals need to detect and contain sophisticated cyberthreats before they disrupt your business. They offer the industry’s most accurate detection of threats entering and operating within your network, both on premises and in the cloud. The company’s software protects network, email, cloud, and web infrastructures, minimizing the risk of a damaging and costly breach that results in the loss of data, customers, and reputation. Headquartered in San Mateo, California with offices throughout North America, Europe, and Asia, Lastline’s technology is used by Global 5000 enterprises, is offered directly and through resellers and security service providers, and is integrated into leading third-party security technologies worldwide.
Learn More
Mimecast
Email is one of the most common vectors for cyber attacks. By integrating Mimecast with Exabeam, security teams can leverage advanced threat detection, investigation, and response to augment their ability to identify and defend against email-based attacks.
Learn More
Netflow Logic
Since its founding in 2011, NetFlow Logic has become a leader in streaming big data analytics, and in network behavior anomaly detection technology.
Learn More
Netflow Logic
Log Source
Since its founding in 2011, NetFlow Logic has become a leader in streaming big data analytics, and in network behavior anomaly detection technology. Its core product – NetFlow Optimizer – is a powerful real-time processing engine for all types of flow data and serves as the basis of exceptional solutions for various organizations that run large virtualized datacenters.
Powered by both patented and patent pending technology, NetFlow Logic solutions are currently used by more enterprise customers worldwide, including commercial and government users and educational institutions.
Learn More
Netskope
Cloud access security broker solutions are essential for detecting risks to an organization’s cloud platform, such as compromised credentials and insider threats. By integrating Netskope with Exabeam, security teams can monitor cloud-access events to identify unusual activity.
Learn More
Okta
Okta is the leading independent provider of identity for the enterprise. The Okta Identity Cloud enables organizations to securely connect the right people to the right technologies at the right time.
Learn More
Okta
SOAR, Log Source
Authentication and Access Management
Okta is the leading independent provider of identity for the enterprise. The Okta Identity Cloud enables organizations to securely connect the right people to the right technologies at the right time. With over 6,500 pre-built integrations to applications and infrastructure providers, Okta customers can easily and securely use the best technologies for their business. Over 7,400 organizations, including 20th Century Fox, JetBlue, Nordstrom, Slack, Teach for America and Twilio, trust Okta to help protect the identities of their workforces and customers.
Useful ResourcesExabeam & Okta Solution Brief
Video: Monitoring, automated orchestration and automation with Okta, Netskope and Exabeam
Learn More

Onapsis
Log Source
Business Applications Security
Onapsis protects the applications that run the global economy. Only Onapsis delivers a next-generation business application platform that provides the actionable insight, change assurance, automated governance and continuous monitoring capabilities required by cross-functional teams to discover risk, optimize workflows, control change and automate reporting. Onapsis’s holistic approach empowers enterprise organizations to embrace and accelerate SAP and Oracle E-Business Suite modernization, cloud and mobility initiatives, while keeping their ERP, CRM, PLM, HCM, SCM, BI and cloud-based business-critical applications protected and compliant.
Learn More
OneLogin
OneLogin, the leader in Identity and Access Management, connects people with technology through a simple and secure login, empowering organizations to access the world™.
Learn More
OneLogin
Log Source
Authentication and Access Management
OneLogin, the leader in Identity and Access Management, connects people with technology through a simple and secure login, empowering organizations to access the world™. The OneLogin Unified Access Management (UAM) platform is the key to unlocking the apps, devices and data that drive productivity and facilitate collaboration. OneLogin serves businesses and partners across a multitude of industries, with over 2,500 customers worldwide.
Learn More
Palo Alto Networks
Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate.
Learn More
Palo Alto Networks
SOAR, Log Source
Web Security and Monitoring; Data Loss Prevention (DLP); Privileged Access Management (PAM); Firewalls; Cloud Security and Infrastructure; Network Access, Analysis and Monitoring; VPN/ Zero Trust Network Access; Threat Intelligence Platform; Network Access, Analysis and Monitoring;
Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate. Their mission is to be the cybersecurity partner of choice, protecting our digital way of life. They help address the world’s greatest security challenges with continuous innovation that seizes the latest breakthroughs in artificial intelligence, analytics, automation, and orchestration. By delivering an integrated platform and empowering a growing ecosystem of partners, they are at the forefront of protecting tens of thousands of organizations across clouds, networks, and mobile devices. Their vision is a world where each day is safer and more secure than the one before.
Learn More
RecordedFuture
Recorded Future delivers security intelligence to amplify the effectiveness of security and IT teams in reducing exposure by uncovering unknown threats and informing better, faster decisions.
Learn More
RecordedFuture
SOAR
Threat Intelligence Platform
Recorded Future delivers security intelligence to amplify the effectiveness of security and IT teams in reducing exposure by uncovering unknown threats and informing better, faster decisions. Working to provide a singular view of digital, brand, and third party risk, the Recorded Future platform provides proactive and predictive intelligence, analyzing data from open, proprietary, and aggregated customer-provided sources. Recorded Future arms threat analysts, vulnerability management teams, security operations centers, and incident responders with context-rich, actionable intelligence in real time that’s ready for integration across the security ecosystem.
Learn More
Sailpoint
SailPoint, the leader in enterprise identity governance, brings the Power of Identity to customers around the world.
Learn More
Sailpoint
Log Source
Authentication and Access Management
SailPoint, the leader in enterprise identity governance, brings the Power of Identity to customers around the world. Leveraging artificial intelligence and machine learning, SailPoint’s predictive identity governance platform delivers adaptive security and continuous compliance while dramatically improving operational efficiency. With SailPoint, organizations of all sizes can embrace innovation, expand their workforce globally and evolve their business, securely and confidently. As both an industry pioneer and market leader in identity governance, SailPoint helps protect some of the world’s most prominent companies in a wide range of industries, including: 9 of the top 15 banks, 4 of the top 6 healthcare insurance and managed care providers, 9 of the top 15 property and casualty insurance providers, 5 of the top 13 pharmaceutical companies, and 11 of the largest 15 federal agencies.
Learn More
SentinelOne
As the attack surface continues to expand, organizations need more capabilities, less complexity, and fewer agents if they want to keep up with known and unknown threats. By integrating SentinelOne with Exabeam, security teams can integrate behavior analytics to gain unified visibility across the entire technology ecosystem for increased enforcement at every control point.
Learn More

VMWare
Log Source
Endpoint Security (EPP/EDR); Authentication and Access Management
VMware software powers the world’s complex digital infrastructure. The company’s cloud, networking and security, and digital workspace offerings provide a dynamic and efficient digital foundation to customers globally, aided by an extensive ecosystem of partners. Headquartered in Palo Alto, California, VMware is committed to being a force for good, from its breakthrough innovations to its global impact.
Learn More
Zscaler
Zscaler enables the world’s leading organizations to securely transform their networks and applications for a mobile and cloud-first world.
Learn More
Zscaler
Log Source, SOAR
Data Loss Prevention (DLP); Network Access, Analysis and Monitoring; Web Security and Monitoring; Cloud Security and Infrastructure
Zscaler enables the world’s leading organizations to securely transform their networks and applications for a mobile and cloud-first world. Its flagship services, Zscaler Internet Access™ and Zscaler Private Access™, create fast, secure connections between users and applications, regardless of device, location, or network. Zscaler services are 100 percent cloud-delivered and offer the simplicity, enhanced security and improved user experience that traditional appliances are unable to match. Used in more than 185 countries, Zscaler operates a multi-tenant distributed cloud security platform, protecting thousands of customers from cyberattacks and data loss.
Learn More