• Product
    • Overview
    • Product Tour
    • Panther for AWS
    • Panther for Snowflake
    • Panther vs SIEM
    • Detection Coverage
  • Integrations
  • Learn
    • Blog
    • Webinars
    • Workshops
    • Podcasts
    • Customer Stories
    • Events
  • Support
    • Documentation
    • Community
    • Knowledge Base
    • Release Notes
    • Status
  • Company
    • About Us
    • Trust
    • Careers
    • Partners
    • News
Request a Demo Start Trial
Panther
  • Product
    • Overview
    • Product Tour
    • Panther for AWS
    • Panther for Snowflake
    • Panther vs SIEM
    • Detection Coverage
  • Integrations
  • Learn
    • Blog
    • Webinars
    • Workshops
    • Podcasts
    • Customer Stories
    • Events
  • Support
    • Documentation
    • Community
    • Knowledge Base
    • Release Notes
    • Status
  • Company
    • About Us
    • Trust
    • Careers
    • Partners
    • News
Request a Demo Start Trial

Logs

View All Integrations

1Password

Monitor your password management platform for suspicious activity.

Apache

Inspect all web activity for signs of suspicious behavior.

Asana

Monitor Asana audit logs to identify suspicious activity in real-time.

Atlassian

Monitor Atlassian audit logs to identify suspicious activity in real-time.

Bitwarden

Identify any abnormal user activity in your organization's Bitwarden account.

Box

Gain complete visibility into your organization’s content management and file sharing.

Cisco Umbrella

Identify any suspicious or malicious domain addresses or DNS requests.

Cloudflare

Inspect network traffic for signs of suspicious behavior.

CrowdStrike

Gain complete visibility into your managed endpoints.

Dropbox

Identify any suspicious file-sharing activity within your organization.

Duo

Monitor your access management tools for suspicious activity.

Fastly

Monitor network traffic for signs of suspicious behavior.

Fluentd

Inspect application activity for any signs of suspicious behavior.

GCP

Gain complete visibility into activity across your cloud service.

GitHub

Identify any vulnerabilities within your GitHub repositories.

GitLab

Identify any suspicious behavior within your GitLab environment.

Google Workspace

Identify any suspicious activity within your Google Workspace applications.

Jamf Pro

Monitor Jamf Pro login events for suspicious activity.

Juniper

Monitor network traffic for attack attempts or probes.

Lacework

Gain complete visibility into your cloud and container environments.

Microsoft 365

Monitor your team’s communication and collaboration tools for suspicious activity.

Microsoft Graph

Monitor security alerts across Microsoft products, services, and partners.

MongoDB Atlas

Monitor events within your MongoDB Atlas organization or project.

Nginx

Monitor Nginx access logs and gain complete visibility into web server activity.

Okta

Monitor Okta logs to gain complete visibility into your IdP activity.

OneLogin

Monitor your IdP for suspicious activity.

Osquery

Gain complete visibility into your operating system activity.

OSSEC

Monitor OSSEC logs to gain complete security visibility into host activity.

Salesforce

Monitor your sales operations data for suspicious activity.

SentinelOne

Monitor your endpoint data, network activity, and DNS requests.

Slack

Monitor your team’s communication platform for suspicious activity.

Snyk

Monitor for any changes within your Snyk Organization.

Sophos

Monitor endpoint policy violations and data loss prevention events.

Suricata

Identify any suspicious traffic or domain activity.

Sysdig

Gain complete visibility into Sysdig platform activity.

Syslog

Monitor machine and network activity for suspicious behavior.

Teleport

Inspect all SSH access activity for signs of suspicious behavior.

Tines

Monitor any changes within your Tines tenant.

Zeek

Inspect network traffic and DNS protocols for suspicious activity.

Zendesk

Monitor unusual activity within your Zendesk account.

Zoom

Monitor abnormal user activity within your Zoom account.

Detect Any Breach, Anywhere

Start detecting suspicious activity in real-time, transform raw logs into a robust security data lake, and build a world-class security program with Panther.

Try Panther

Panther
AICPA SOC - SOC for Service OrganizationsPCI-DSS Compliant

Product

  • Integrations
  • Platform
  • Panther for AWS
  • Panther for Snowflake
  • Panther vs SIEM

Customer Resources

  • Documentation
  • Release Notes
  • Status
  • Community
  • Knowledge Base

Learn

  • Blog
  • Podcasts
  • Solution Briefs
  • Webinars
  • Events
  • Case Studies
  • Workshops

Company

  • About us
  • Careers
  • Meet the Team
  • News
  • Partners
  • Trust
Request a Demo

  • Terms
  • Privacy
  • Sitemap

Copyright ©2023 Panther Labs Inc.
All Rights Reserved.

Manage your privacy

By continuing to use this website you consent to our use of cookies.

Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
Manage options
{title} {title} {title}