Absolutely! You can find all the current log sources with pre-built parsers at here, conveniently organized by vendor for easy reference.
product integrations
risk-aligned use cases
unique vendor sources
threat feeds on IoCs
OPEN PLATFORM DRIVES VISIBILITY
Exabeam platform integrations
Exabeam ingests data from IT and security products to provide the full scope of events. Combining insights from hundreds of on-premises, cloud, and context sources, including commercial threat intelligence feeds, allows teams to highlight events and machine learning-sourced anomalies that often go undetected.
- Over 350 vendors covering 680 security tools
- Local site and cloud collection options
- Over 9,500 pre-built log parsers

EASY TO GET STARTED WITH EXABEAM
Exabeam Common Information Model (CIM)
The CIM defines the structure of security events for Exabeam. This hierarchical framework is used throughout the TDIR workflow. The Exabeam model is shared openly with technology partners to support broader and tighter integrations.
- Build a new log parser in minutes
- Quickly and easily build new correlations
- Use Threat Intelligence Service to add indicators of compromise detection

DATA INGESTION MAPPED TO OUTCOMES
Fast and easy data onboarding
Data ingested into the Exabeam platform is immediately prepared for machine learning (ML) anomaly and correlation rule detection and reporting. The Outcomes Navigator app helps improve your security posture with diagnostics that map data ingestion to use cases and MITRE ATT&CK® coverage, offering suggestions for improvement.
- Onboard a new data source in minutes
- Test and monitor parsing quality in real time
- Align with use case outcomes

How It Works


How can we help? Talk to an expert.
Contact UsFrequently Asked Questions
Can I view the existing data sources configured?
How often are new updates and features released?
Exabeam operates on a monthly release cycle, using our cloud-native architecture to regularly introduce new features and updates. We collaborate with select customers and partners through early release programs to test and refine new features based on continuous feedback.
How can I request a new integration or data source for Exabeam?
Visit the Exabeam Community and follow the instructions for opening support tickets and submitting feature requests. The self-service function simplifies the process, allowing users to report issues, request new collectors, or suggest integrations.
Can I keep my current SIEM and use Exabeam as augmentation?
Absolutely. Many customers integrate data feeds from various SIEMs like Splunk, Microsoft Sentinel, IBM Qradar, OpenText ArcSight, McAfee Nitro, Sumo Logic, and Google Cloud Pub/Sub. Exabeam offers fast integration and value, enhancing your existing SIEM with UEBA and efficient workflows, without the need for extensive team re-training.
Does Exabeam provide diagnostics and health checks for data integrations?
Yes, through Service Health and Consumption. This dashboard enables customers to monitor data ingestion volume by data source over time and receive alerts for abnormal data volumes, such as broken links. The Live Tail feature within the Log Stream application also displays current event flows.

“We are excited to offer our customers using the Microsoft Defender Suite as well as Microsoft Sentinel the ability to use the Exabeam Cloud Collector to incorporate Exabeam’s market-leading TDIR workflows and analytics. This integration provides us with a seamless integration and augmentation of Exabeam on top of Microsoft Sentinel.”
See Exabeam in Action
Request more information or request a demo of the industry’s most powerful platforms for threat detection, investigation, and response (TDIR).
Learn more:
- If self-hosted or cloud-native SIEM is right for you
- How to ingest and monitor data at cloud scale
- Why seeing abnormal user and device behavior is critical
- How to automatically score and profile user activity
- See the complete picture using incident timelines
- Why playbooks help make the next right decision
- Support compliance mandates
Award-Winning Leaders in Security