Panther x Databricks: A new kind of SOC is here. Learn More

close

Panther x Databricks: A new kind of SOC is here. Learn More

close

Panther x Databricks: A new kind of SOC is here. Learn More

close

Integrate your stack

All your security data and workflows, connected.

Featured Integrations

All Integrations

Log Sources

Cloud

Network

Host

Application

Alert Destinations

Enrichment

Data Lake

Cloud Resources

Orca Security Log Monitoring

Log Sources

Mindflow

Automate incident response from your alerts

Alert Destinations

Tracebit Log Monitoring

Monitor activity on Tracebit security canaries across your organization

Log Sources

Amazon Security Lake & OSCF Log Monitoring

Inspect your OSCF data for signs of unusual behavior.

Log Sources

Proofpoint Log Monitoring

Detect email attacks.

Log Sources

AWS CloudFront Log Monitoring

Analyze CDN traffic for signs of unusual behavior.

Log Sources

Thinkst Canary Log Monitoring

Detect lateral movement in your environment.

Log Sources

Wiz Log Monitoring

Protect your cloud security controls.

Log Sources

Zscaler Log Monitoring

Monitor application, network, and device access.

Log Sources

Material Security SIEM Integration

Monitor threats in Google Workspace and M365.

Log Sources

Custom Lookup Tables

Enrich log data from custom sources.

Enrichment

Anomali ThreatStream API SIEM Integration

Correlate log data with threat intelligence.

Enrichment

Torq

Trigger automated workflows from your alerts

Alert Destinations

Sublime Security SIEM Integration

Monitor email threats.

Log Sources

Push Security SIEM Integration

Defend against identity attacks.

Log Sources

Blink Ops

Deliver Panther alerts to your automation platform

Alert Destinations

AppOmni SIEM Integration

Monitor your Software as a Service security posture.

Log Sources

Incident.io

Forward Panther alerts to your incident management platform

Alert Destinations

Discord

Route Panther alerts to a Discord channel

Alert Destinations

IPInfo

Enrich detections and reduce false-positive alerts

Enrichment

Splunk

Send Panther alerts to Splunk

Alert Destinations

AWS Security Hub Monitoring

Correlate AWS Security Hub findings.

Log Sources

Notion Log Monitoring

Continuously monitor your Notion workspace.

Log Sources

Tenable Vulnerability Scan Monitoring

Gain complete visibility into your network assets.

Log Sources

Envoy Access Log Monitoring

Monitor network activity for suspicious behavior.

Log Sources

Carbon Black Log Monitoring

Monitor endpoint activity for suspicious behavior.

Log Sources

Azure Log Monitoring

Continuously monitor your Azure account.

Log Sources

Docker Event Log Monitoring

Gain complete visibility into your Docker system events.

Log Sources

Netskope Log Monitoring

Identify any suspicious cloud-based app or service activity.

Log Sources

Auditd Log Monitoring

Monitor system-level activities in your Linux environment.

Log Sources

Heroku Log Monitoring

Monitor your Heroku applications, infrastructure, and admin actions.

Log Sources

Windows Event Log Monitoring

Monitor application, system, and security notifications from Windows machines.

Log Sources

Tailscale Log Monitoring

Monitor your team’s Tailscale network.

Log Sources

Auth0 Log Monitoring

Monitor user authentication and authorization activities in Auth0.

Log Sources

AWS ALB Log Monitoring

Monitor requests sent to your load balancer for suspicious activity.

Log Sources

AWS Aurora Log Monitoring

Monitor and detect any suspicious database events.

Log Sources

AWS CloudTrail Log Monitoring

Identify any suspicious activity within your AWS infrastructure.

Log Sources

AWS CloudWatch Log Monitoring

Monitor any resource changes within your AWS environment.

Log Sources

AWS Config Log Monitoring

Monitor the configuration of your AWS resources.

Log Sources

AWS EKS Log Monitoring

Monitor your Kubernetes environment for suspicious activity.

Log Sources

AWS GuardDuty Log Monitoring

Monitor your AWS environment for malicious activity and unauthorized behavior.

Log Sources

AWS S3 Log Monitoring

Monitor all requests made to AWS S3 buckets.

Log Sources

AWS Transit Gateway Flow Log Monitoring

Monitor the IP traffic flowing through your transit gateway.

Log Sources

AWS VPC Log Monitoring

Monitor the IP traffic going to and from network interfaces in your VPC.

Log Sources

AWS WAF Log Monitoring

Investigate traffic that is analyzed by your web Access Control Lists (ACLs).

Log Sources

Tines Log Monitoring

Monitor any changes within your Tines tenant.

Log Sources

Bitwarden Log Monitoring

Identify any abnormal user activity in your organization's Bitwarden account.

Log Sources

Sysdig Log Monitoring

Gain complete visibility into Sysdig platform activity.

Log Sources

SentinelOne Log Monitoring

Monitor your endpoint data, network activity, and DNS requests.

Log Sources

MongoDB Atlas Log Monitoring

Monitor events within your MongoDB Atlas organization or project.

Log Sources

Microsoft Graph Log Monitoring

Monitor security alerts across Microsoft products, services, and partners.

Log Sources

Jamf Pro Log Monitoring

Monitor Jamf Pro login events for suspicious activity.

Log Sources

Dropbox Log Monitoring

Identify any suspicious file-sharing activity within your organization.

Log Sources

Snyk Log Monitoring

Monitor for any changes within your Snyk Organization.

Log Sources

Zendesk Log Monitoring

Monitor unusual activity within your Zendesk account.

Log Sources

Asana Log Monitoring

Monitor Asana audit logs to identify suspicious activity in real-time.

Log Sources

Atlassian Log Monitoring

Monitor Atlassian audit logs to identify suspicious activity in real-time.

Log Sources

1Password Log Monitoring

Monitor your password management platform for suspicious activity.

Log Sources

Zoom Log Monitoring

Monitor abnormal user activity within your Zoom account.

Log Sources

Salesforce Log Monitoring

Monitor your sales operations data for suspicious activity.

Log Sources

GitHub Log Monitoring

Identify any vulnerabilities within your GitHub repositories.

Log Sources

Microsoft 365 Log Monitoring

Monitor your team’s communication and collaboration tools for suspicious activity.

Log Sources

Slack Log Monitoring

Monitor your team’s communication platform for suspicious activity.

Log Sources

Tines

Send Panther alerts to Tines and initiate a workflow

Alert Destinations

Duo Security Log Monitoring

Monitor your access management tools for suspicious activity.

Log Sources

Sophos Log Monitoring

Monitor endpoint policy violations and data loss prevention events.

Log Sources

Custom Webhooks

Send alert data to third-party applications

Alert Destinations

Fastly Log Monitoring

Monitor network traffic for signs of suspicious behavior.

Log Sources

Cloudflare Log Monitoring

Inspect network traffic for signs of suspicious behavior.

Log Sources

CrowdStrike Log Monitoring

Gain complete visibility into your managed endpoints.

Log Sources

EC2 Instance

Track real-time changes to your EC2 Instance

Cloud Resources

EC2 AMI

Monitor which AWS accounts can use AMI to launch instances

Cloud Resources

EC2 Volume

Continuously audit your EC2 Volume configurations

Cloud Resources

EC2 Network ACL

Audit changes to AWS Network ACL

Cloud Resources

EC2 Security Group

Audit changes to the security group in your EC2 instances.

Cloud Resources

PagerDuty

Send Panther alerts to PagerDuty and begin an investigation

Alert Destinations

SNS

Send programmatic alerts to emails with Panther via SNS

Alert Destinations

GCP Log Monitoring

Gain complete visibility into activity across your cloud service.

Log Sources

Syslog Log Monitoring

Monitor machine and network activity for suspicious behavior.

Log Sources

Fluentd Log Monitoring

Inspect application activity for any signs of suspicious behavior.

Log Sources

Zeek Log Monitoring

Inspect network traffic and DNS protocols for suspicious activity.

Log Sources

Cisco Umbrella Log Monitoring

Identify any suspicious or malicious domain addresses or DNS requests.

Log Sources

Juniper Log Monitoring

Monitor network traffic for attack attempts or probes.

Log Sources

Suricata Log Monitoring

Identify any suspicious traffic or domain activity.

Log Sources

Lacework Log Monitoring

Gain complete visibility into your cloud and container environments.

Log Sources

Teleport Log Monitoring

Inspect all SSH access activity for signs of suspicious behavior.

Log Sources

Apache Log Monitoring

Inspect all web activity for signs of suspicious behavior.

Log Sources

GitLab Log Monitoring

Identify any suspicious behavior within your GitLab environment.

Log Sources

Okta Log Monitoring

Monitor Okta logs to gain complete visibility into your IdP activity.

Log Sources

OneLogin Log Monitoring

Monitor your IdP for suspicious activity.

Log Sources

Google Workspace (G Suite) Log Monitoring

Identify any suspicious activity within your Google Workspace applications.

Log Sources

Box Log Monitoring

Gain complete visibility into your organization’s content management and file sharing.

Log Sources

Snowflake

Build a robust security data lake in Snowflake.

Data Lake

AWS CloudTrail Log Analyzer

Track account changes in real-time and detect suspicious activity

Cloud Resources

S3 Buckets

Detect and alert on unauthorized access to your S3 buckets.

Cloud Resources

EC2 VPC

Capture traffic activity and monitor actual network traffic flows.

Cloud Resources

GuardDuty

Track real-time changes to your AWS GuardDuty

Cloud Resources

Lambda

Track real-time changes to your AWS Lambda

Cloud Resources

WAF Web ACL

Track real-time changes to your WAF ACLs

Cloud Resources

ALB

Audit changes to AWS Application Load Balancer

Cloud Resources

ACM Certificate

Audit changes to AWS Certificate manager

Cloud Resources

Redshift Cluster

Audit changes to AWS Redshift Clusters

Cloud Resources

DynamoDB Table

Continuously monitor AWS DynamoDB tables for compliance

Cloud Resources

Config Recorder

Audit changes to AWS Config Recorder

Cloud Resources

CloudWatch Log group

Track real-time changes to AWS CloudWatch Log group

Cloud Resources

CloudFormation Stack

Track real-time changes to AWS CloudFormation stacks

Cloud Resources

RDS Instance

Get alerted in real-time when a RDS change occurs.

Cloud Resources

Password Policy

Monitor password policies for your AWS account

Cloud Resources

IAM

Track real-time changes to IAM User, Group, Role, and Policy

Cloud Resources

KMS Key

Follow the highest standards of cryptographic practices.

Cloud Resources

ECS Cluster

Gain visibility into specific ECS environments in real-time.

Cloud Resources

OSSEC Log Monitoring

Monitor OSSEC logs to gain complete security visibility into host activity.

Log Sources

Asana

Send Panther alerts to Asana and analyze the issue.

Alert Destinations

OpsGenie

Send Panther alerts to OpsGenie and begin an investigation.

Alert Destinations

Jira

Send Panther alerts to Jira and analyze the issue

Alert Destinations

Slack

Send Panther alerts to a designated Slack channel.

Alert Destinations

GitHub

Send Panther alerts to GitHub and analyze the issue

Alert Destinations

SQS

Send programmatic notifications to emails with Panther via SQS

Alert Destinations

Microsoft Teams

Send Panther alerts to a designated Microsoft Teams channel

Alert Destinations

Nginx Access Log Monitoring

Monitor Nginx access logs and gain complete visibility into web server activity.

Log Sources

Osquery Log Monitoring

Gain complete visibility into your operating system activity.

Log Sources

All Integrations

Log Sources

Cloud

Network

Host

Application

Alert Destinations

Enrichment

Data Lake

Cloud Resources

Orca Security Log Monitoring

Log Sources

Mindflow

Automate incident response from your alerts

Alert Destinations

Tracebit Log Monitoring

Monitor activity on Tracebit security canaries across your organization

Log Sources

Amazon Security Lake & OSCF Log Monitoring

Inspect your OSCF data for signs of unusual behavior.

Log Sources

Proofpoint Log Monitoring

Detect email attacks.

Log Sources

AWS CloudFront Log Monitoring

Analyze CDN traffic for signs of unusual behavior.

Log Sources

Thinkst Canary Log Monitoring

Detect lateral movement in your environment.

Log Sources

Wiz Log Monitoring

Protect your cloud security controls.

Log Sources

Zscaler Log Monitoring

Monitor application, network, and device access.

Log Sources

Material Security SIEM Integration

Monitor threats in Google Workspace and M365.

Log Sources

Custom Lookup Tables

Enrich log data from custom sources.

Enrichment

Anomali ThreatStream API SIEM Integration

Correlate log data with threat intelligence.

Enrichment

Torq

Trigger automated workflows from your alerts

Alert Destinations

Sublime Security SIEM Integration

Monitor email threats.

Log Sources

Push Security SIEM Integration

Defend against identity attacks.

Log Sources

Blink Ops

Deliver Panther alerts to your automation platform

Alert Destinations

AppOmni SIEM Integration

Monitor your Software as a Service security posture.

Log Sources

Incident.io

Forward Panther alerts to your incident management platform

Alert Destinations

Discord

Route Panther alerts to a Discord channel

Alert Destinations

IPInfo

Enrich detections and reduce false-positive alerts

Enrichment

Splunk

Send Panther alerts to Splunk

Alert Destinations

AWS Security Hub Monitoring

Correlate AWS Security Hub findings.

Log Sources

Notion Log Monitoring

Continuously monitor your Notion workspace.

Log Sources

Tenable Vulnerability Scan Monitoring

Gain complete visibility into your network assets.

Log Sources

Envoy Access Log Monitoring

Monitor network activity for suspicious behavior.

Log Sources

Carbon Black Log Monitoring

Monitor endpoint activity for suspicious behavior.

Log Sources

Azure Log Monitoring

Continuously monitor your Azure account.

Log Sources

Docker Event Log Monitoring

Gain complete visibility into your Docker system events.

Log Sources

Netskope Log Monitoring

Identify any suspicious cloud-based app or service activity.

Log Sources

Auditd Log Monitoring

Monitor system-level activities in your Linux environment.

Log Sources

Heroku Log Monitoring

Monitor your Heroku applications, infrastructure, and admin actions.

Log Sources

Windows Event Log Monitoring

Monitor application, system, and security notifications from Windows machines.

Log Sources

Tailscale Log Monitoring

Monitor your team’s Tailscale network.

Log Sources

Auth0 Log Monitoring

Monitor user authentication and authorization activities in Auth0.

Log Sources

AWS ALB Log Monitoring

Monitor requests sent to your load balancer for suspicious activity.

Log Sources

AWS Aurora Log Monitoring

Monitor and detect any suspicious database events.

Log Sources

AWS CloudTrail Log Monitoring

Identify any suspicious activity within your AWS infrastructure.

Log Sources

AWS CloudWatch Log Monitoring

Monitor any resource changes within your AWS environment.

Log Sources

AWS Config Log Monitoring

Monitor the configuration of your AWS resources.

Log Sources

AWS EKS Log Monitoring

Monitor your Kubernetes environment for suspicious activity.

Log Sources

AWS GuardDuty Log Monitoring

Monitor your AWS environment for malicious activity and unauthorized behavior.

Log Sources

AWS S3 Log Monitoring

Monitor all requests made to AWS S3 buckets.

Log Sources

AWS Transit Gateway Flow Log Monitoring

Monitor the IP traffic flowing through your transit gateway.

Log Sources

AWS VPC Log Monitoring

Monitor the IP traffic going to and from network interfaces in your VPC.

Log Sources

AWS WAF Log Monitoring

Investigate traffic that is analyzed by your web Access Control Lists (ACLs).

Log Sources

Tines Log Monitoring

Monitor any changes within your Tines tenant.

Log Sources

Bitwarden Log Monitoring

Identify any abnormal user activity in your organization's Bitwarden account.

Log Sources

Sysdig Log Monitoring

Gain complete visibility into Sysdig platform activity.

Log Sources

SentinelOne Log Monitoring

Monitor your endpoint data, network activity, and DNS requests.

Log Sources

MongoDB Atlas Log Monitoring

Monitor events within your MongoDB Atlas organization or project.

Log Sources

Microsoft Graph Log Monitoring

Monitor security alerts across Microsoft products, services, and partners.

Log Sources

Jamf Pro Log Monitoring

Monitor Jamf Pro login events for suspicious activity.

Log Sources

Dropbox Log Monitoring

Identify any suspicious file-sharing activity within your organization.

Log Sources

Snyk Log Monitoring

Monitor for any changes within your Snyk Organization.

Log Sources

Zendesk Log Monitoring

Monitor unusual activity within your Zendesk account.

Log Sources

Asana Log Monitoring

Monitor Asana audit logs to identify suspicious activity in real-time.

Log Sources

Atlassian Log Monitoring

Monitor Atlassian audit logs to identify suspicious activity in real-time.

Log Sources

1Password Log Monitoring

Monitor your password management platform for suspicious activity.

Log Sources

Zoom Log Monitoring

Monitor abnormal user activity within your Zoom account.

Log Sources

Salesforce Log Monitoring

Monitor your sales operations data for suspicious activity.

Log Sources

GitHub Log Monitoring

Identify any vulnerabilities within your GitHub repositories.

Log Sources

Microsoft 365 Log Monitoring

Monitor your team’s communication and collaboration tools for suspicious activity.

Log Sources

Slack Log Monitoring

Monitor your team’s communication platform for suspicious activity.

Log Sources

Tines

Send Panther alerts to Tines and initiate a workflow

Alert Destinations

Duo Security Log Monitoring

Monitor your access management tools for suspicious activity.

Log Sources

Sophos Log Monitoring

Monitor endpoint policy violations and data loss prevention events.

Log Sources

Custom Webhooks

Send alert data to third-party applications

Alert Destinations

Fastly Log Monitoring

Monitor network traffic for signs of suspicious behavior.

Log Sources

Cloudflare Log Monitoring

Inspect network traffic for signs of suspicious behavior.

Log Sources

CrowdStrike Log Monitoring

Gain complete visibility into your managed endpoints.

Log Sources

EC2 Instance

Track real-time changes to your EC2 Instance

Cloud Resources

EC2 AMI

Monitor which AWS accounts can use AMI to launch instances

Cloud Resources

EC2 Volume

Continuously audit your EC2 Volume configurations

Cloud Resources

EC2 Network ACL

Audit changes to AWS Network ACL

Cloud Resources

EC2 Security Group

Audit changes to the security group in your EC2 instances.

Cloud Resources

PagerDuty

Send Panther alerts to PagerDuty and begin an investigation

Alert Destinations

SNS

Send programmatic alerts to emails with Panther via SNS

Alert Destinations

GCP Log Monitoring

Gain complete visibility into activity across your cloud service.

Log Sources

Syslog Log Monitoring

Monitor machine and network activity for suspicious behavior.

Log Sources

Fluentd Log Monitoring

Inspect application activity for any signs of suspicious behavior.

Log Sources

Zeek Log Monitoring

Inspect network traffic and DNS protocols for suspicious activity.

Log Sources

Cisco Umbrella Log Monitoring

Identify any suspicious or malicious domain addresses or DNS requests.

Log Sources

Juniper Log Monitoring

Monitor network traffic for attack attempts or probes.

Log Sources

Suricata Log Monitoring

Identify any suspicious traffic or domain activity.

Log Sources

Lacework Log Monitoring

Gain complete visibility into your cloud and container environments.

Log Sources

Teleport Log Monitoring

Inspect all SSH access activity for signs of suspicious behavior.

Log Sources

Apache Log Monitoring

Inspect all web activity for signs of suspicious behavior.

Log Sources

GitLab Log Monitoring

Identify any suspicious behavior within your GitLab environment.

Log Sources

Okta Log Monitoring

Monitor Okta logs to gain complete visibility into your IdP activity.

Log Sources

OneLogin Log Monitoring

Monitor your IdP for suspicious activity.

Log Sources

Google Workspace (G Suite) Log Monitoring

Identify any suspicious activity within your Google Workspace applications.

Log Sources

Box Log Monitoring

Gain complete visibility into your organization’s content management and file sharing.

Log Sources

Snowflake

Build a robust security data lake in Snowflake.

Data Lake

AWS CloudTrail Log Analyzer

Track account changes in real-time and detect suspicious activity

Cloud Resources

S3 Buckets

Detect and alert on unauthorized access to your S3 buckets.

Cloud Resources

EC2 VPC

Capture traffic activity and monitor actual network traffic flows.

Cloud Resources

GuardDuty

Track real-time changes to your AWS GuardDuty

Cloud Resources

Lambda

Track real-time changes to your AWS Lambda

Cloud Resources

WAF Web ACL

Track real-time changes to your WAF ACLs

Cloud Resources

ALB

Audit changes to AWS Application Load Balancer

Cloud Resources

ACM Certificate

Audit changes to AWS Certificate manager

Cloud Resources

Redshift Cluster

Audit changes to AWS Redshift Clusters

Cloud Resources

DynamoDB Table

Continuously monitor AWS DynamoDB tables for compliance

Cloud Resources

Config Recorder

Audit changes to AWS Config Recorder

Cloud Resources

CloudWatch Log group

Track real-time changes to AWS CloudWatch Log group

Cloud Resources

CloudFormation Stack

Track real-time changes to AWS CloudFormation stacks

Cloud Resources

RDS Instance

Get alerted in real-time when a RDS change occurs.

Cloud Resources

Password Policy

Monitor password policies for your AWS account

Cloud Resources

IAM

Track real-time changes to IAM User, Group, Role, and Policy

Cloud Resources

KMS Key

Follow the highest standards of cryptographic practices.

Cloud Resources

ECS Cluster

Gain visibility into specific ECS environments in real-time.

Cloud Resources

OSSEC Log Monitoring

Monitor OSSEC logs to gain complete security visibility into host activity.

Log Sources

Asana

Send Panther alerts to Asana and analyze the issue.

Alert Destinations

OpsGenie

Send Panther alerts to OpsGenie and begin an investigation.

Alert Destinations

Jira

Send Panther alerts to Jira and analyze the issue

Alert Destinations

Slack

Send Panther alerts to a designated Slack channel.

Alert Destinations

GitHub

Send Panther alerts to GitHub and analyze the issue

Alert Destinations

SQS

Send programmatic notifications to emails with Panther via SQS

Alert Destinations

Microsoft Teams

Send Panther alerts to a designated Microsoft Teams channel

Alert Destinations

Nginx Access Log Monitoring

Monitor Nginx access logs and gain complete visibility into web server activity.

Log Sources

Osquery Log Monitoring

Gain complete visibility into your operating system activity.

Log Sources

All Integrations

Log Sources

Cloud

Network

Host

Application

Alert Destinations

Enrichment

Data Lake

Cloud Resources

Orca Security Log Monitoring

Log Sources

Mindflow

Automate incident response from your alerts

Alert Destinations

Tracebit Log Monitoring

Monitor activity on Tracebit security canaries across your organization

Log Sources

Amazon Security Lake & OSCF Log Monitoring

Inspect your OSCF data for signs of unusual behavior.

Log Sources

Proofpoint Log Monitoring

Detect email attacks.

Log Sources

AWS CloudFront Log Monitoring

Analyze CDN traffic for signs of unusual behavior.

Log Sources

Thinkst Canary Log Monitoring

Detect lateral movement in your environment.

Log Sources

Wiz Log Monitoring

Protect your cloud security controls.

Log Sources

Zscaler Log Monitoring

Monitor application, network, and device access.

Log Sources

Material Security SIEM Integration

Monitor threats in Google Workspace and M365.

Log Sources

Custom Lookup Tables

Enrich log data from custom sources.

Enrichment

Anomali ThreatStream API SIEM Integration

Correlate log data with threat intelligence.

Enrichment

Torq

Trigger automated workflows from your alerts

Alert Destinations

Sublime Security SIEM Integration

Monitor email threats.

Log Sources

Push Security SIEM Integration

Defend against identity attacks.

Log Sources

Blink Ops

Deliver Panther alerts to your automation platform

Alert Destinations

AppOmni SIEM Integration

Monitor your Software as a Service security posture.

Log Sources

Incident.io

Forward Panther alerts to your incident management platform

Alert Destinations

Discord

Route Panther alerts to a Discord channel

Alert Destinations

IPInfo

Enrich detections and reduce false-positive alerts

Enrichment

Splunk

Send Panther alerts to Splunk

Alert Destinations

AWS Security Hub Monitoring

Correlate AWS Security Hub findings.

Log Sources

Notion Log Monitoring

Continuously monitor your Notion workspace.

Log Sources

Tenable Vulnerability Scan Monitoring

Gain complete visibility into your network assets.

Log Sources

Envoy Access Log Monitoring

Monitor network activity for suspicious behavior.

Log Sources

Carbon Black Log Monitoring

Monitor endpoint activity for suspicious behavior.

Log Sources

Azure Log Monitoring

Continuously monitor your Azure account.

Log Sources

Docker Event Log Monitoring

Gain complete visibility into your Docker system events.

Log Sources

Netskope Log Monitoring

Identify any suspicious cloud-based app or service activity.

Log Sources

Auditd Log Monitoring

Monitor system-level activities in your Linux environment.

Log Sources

Heroku Log Monitoring

Monitor your Heroku applications, infrastructure, and admin actions.

Log Sources

Windows Event Log Monitoring

Monitor application, system, and security notifications from Windows machines.

Log Sources

Tailscale Log Monitoring

Monitor your team’s Tailscale network.

Log Sources

Auth0 Log Monitoring

Monitor user authentication and authorization activities in Auth0.

Log Sources

AWS ALB Log Monitoring

Monitor requests sent to your load balancer for suspicious activity.

Log Sources

AWS Aurora Log Monitoring

Monitor and detect any suspicious database events.

Log Sources

AWS CloudTrail Log Monitoring

Identify any suspicious activity within your AWS infrastructure.

Log Sources

AWS CloudWatch Log Monitoring

Monitor any resource changes within your AWS environment.

Log Sources

AWS Config Log Monitoring

Monitor the configuration of your AWS resources.

Log Sources

AWS EKS Log Monitoring

Monitor your Kubernetes environment for suspicious activity.

Log Sources

AWS GuardDuty Log Monitoring

Monitor your AWS environment for malicious activity and unauthorized behavior.

Log Sources

AWS S3 Log Monitoring

Monitor all requests made to AWS S3 buckets.

Log Sources

AWS Transit Gateway Flow Log Monitoring

Monitor the IP traffic flowing through your transit gateway.

Log Sources

AWS VPC Log Monitoring

Monitor the IP traffic going to and from network interfaces in your VPC.

Log Sources

AWS WAF Log Monitoring

Investigate traffic that is analyzed by your web Access Control Lists (ACLs).

Log Sources

Tines Log Monitoring

Monitor any changes within your Tines tenant.

Log Sources

Bitwarden Log Monitoring

Identify any abnormal user activity in your organization's Bitwarden account.

Log Sources

Sysdig Log Monitoring

Gain complete visibility into Sysdig platform activity.

Log Sources

SentinelOne Log Monitoring

Monitor your endpoint data, network activity, and DNS requests.

Log Sources

MongoDB Atlas Log Monitoring

Monitor events within your MongoDB Atlas organization or project.

Log Sources

Microsoft Graph Log Monitoring

Monitor security alerts across Microsoft products, services, and partners.

Log Sources

Jamf Pro Log Monitoring

Monitor Jamf Pro login events for suspicious activity.

Log Sources

Dropbox Log Monitoring

Identify any suspicious file-sharing activity within your organization.

Log Sources

Snyk Log Monitoring

Monitor for any changes within your Snyk Organization.

Log Sources

Zendesk Log Monitoring

Monitor unusual activity within your Zendesk account.

Log Sources

Asana Log Monitoring

Monitor Asana audit logs to identify suspicious activity in real-time.

Log Sources

Atlassian Log Monitoring

Monitor Atlassian audit logs to identify suspicious activity in real-time.

Log Sources

1Password Log Monitoring

Monitor your password management platform for suspicious activity.

Log Sources

Zoom Log Monitoring

Monitor abnormal user activity within your Zoom account.

Log Sources

Salesforce Log Monitoring

Monitor your sales operations data for suspicious activity.

Log Sources

GitHub Log Monitoring

Identify any vulnerabilities within your GitHub repositories.

Log Sources

Microsoft 365 Log Monitoring

Monitor your team’s communication and collaboration tools for suspicious activity.

Log Sources

Slack Log Monitoring

Monitor your team’s communication platform for suspicious activity.

Log Sources

Tines

Send Panther alerts to Tines and initiate a workflow

Alert Destinations

Duo Security Log Monitoring

Monitor your access management tools for suspicious activity.

Log Sources

Sophos Log Monitoring

Monitor endpoint policy violations and data loss prevention events.

Log Sources

Custom Webhooks

Send alert data to third-party applications

Alert Destinations

Fastly Log Monitoring

Monitor network traffic for signs of suspicious behavior.

Log Sources

Cloudflare Log Monitoring

Inspect network traffic for signs of suspicious behavior.

Log Sources

CrowdStrike Log Monitoring

Gain complete visibility into your managed endpoints.

Log Sources

EC2 Instance

Track real-time changes to your EC2 Instance

Cloud Resources

EC2 AMI

Monitor which AWS accounts can use AMI to launch instances

Cloud Resources

EC2 Volume

Continuously audit your EC2 Volume configurations

Cloud Resources

EC2 Network ACL

Audit changes to AWS Network ACL

Cloud Resources

EC2 Security Group

Audit changes to the security group in your EC2 instances.

Cloud Resources

PagerDuty

Send Panther alerts to PagerDuty and begin an investigation

Alert Destinations

SNS

Send programmatic alerts to emails with Panther via SNS

Alert Destinations

GCP Log Monitoring

Gain complete visibility into activity across your cloud service.

Log Sources

Syslog Log Monitoring

Monitor machine and network activity for suspicious behavior.

Log Sources

Fluentd Log Monitoring

Inspect application activity for any signs of suspicious behavior.

Log Sources

Zeek Log Monitoring

Inspect network traffic and DNS protocols for suspicious activity.

Log Sources

Cisco Umbrella Log Monitoring

Identify any suspicious or malicious domain addresses or DNS requests.

Log Sources

Juniper Log Monitoring

Monitor network traffic for attack attempts or probes.

Log Sources

Suricata Log Monitoring

Identify any suspicious traffic or domain activity.

Log Sources

Lacework Log Monitoring

Gain complete visibility into your cloud and container environments.

Log Sources

Teleport Log Monitoring

Inspect all SSH access activity for signs of suspicious behavior.

Log Sources

Apache Log Monitoring

Inspect all web activity for signs of suspicious behavior.

Log Sources

GitLab Log Monitoring

Identify any suspicious behavior within your GitLab environment.

Log Sources

Okta Log Monitoring

Monitor Okta logs to gain complete visibility into your IdP activity.

Log Sources

OneLogin Log Monitoring

Monitor your IdP for suspicious activity.

Log Sources

Google Workspace (G Suite) Log Monitoring

Identify any suspicious activity within your Google Workspace applications.

Log Sources

Box Log Monitoring

Gain complete visibility into your organization’s content management and file sharing.

Log Sources

Snowflake

Build a robust security data lake in Snowflake.

Data Lake

AWS CloudTrail Log Analyzer

Track account changes in real-time and detect suspicious activity

Cloud Resources

S3 Buckets

Detect and alert on unauthorized access to your S3 buckets.

Cloud Resources

EC2 VPC

Capture traffic activity and monitor actual network traffic flows.

Cloud Resources

GuardDuty

Track real-time changes to your AWS GuardDuty

Cloud Resources

Lambda

Track real-time changes to your AWS Lambda

Cloud Resources

WAF Web ACL

Track real-time changes to your WAF ACLs

Cloud Resources

ALB

Audit changes to AWS Application Load Balancer

Cloud Resources

ACM Certificate

Audit changes to AWS Certificate manager

Cloud Resources

Redshift Cluster

Audit changes to AWS Redshift Clusters

Cloud Resources

DynamoDB Table

Continuously monitor AWS DynamoDB tables for compliance

Cloud Resources

Config Recorder

Audit changes to AWS Config Recorder

Cloud Resources

CloudWatch Log group

Track real-time changes to AWS CloudWatch Log group

Cloud Resources

CloudFormation Stack

Track real-time changes to AWS CloudFormation stacks

Cloud Resources

RDS Instance

Get alerted in real-time when a RDS change occurs.

Cloud Resources

Password Policy

Monitor password policies for your AWS account

Cloud Resources

IAM

Track real-time changes to IAM User, Group, Role, and Policy

Cloud Resources

KMS Key

Follow the highest standards of cryptographic practices.

Cloud Resources

ECS Cluster

Gain visibility into specific ECS environments in real-time.

Cloud Resources

OSSEC Log Monitoring

Monitor OSSEC logs to gain complete security visibility into host activity.

Log Sources

Asana

Send Panther alerts to Asana and analyze the issue.

Alert Destinations

OpsGenie

Send Panther alerts to OpsGenie and begin an investigation.

Alert Destinations

Jira

Send Panther alerts to Jira and analyze the issue

Alert Destinations

Slack

Send Panther alerts to a designated Slack channel.

Alert Destinations

GitHub

Send Panther alerts to GitHub and analyze the issue

Alert Destinations

SQS

Send programmatic notifications to emails with Panther via SQS

Alert Destinations

Microsoft Teams

Send Panther alerts to a designated Microsoft Teams channel

Alert Destinations

Nginx Access Log Monitoring

Monitor Nginx access logs and gain complete visibility into web server activity.

Log Sources

Osquery Log Monitoring

Gain complete visibility into your operating system activity.

Log Sources

All Integrations

Log Sources

Cloud

Network

Host

Application

Alert Destinations

Enrichment

Data Lake

Cloud Resources

Orca Security Log Monitoring

Log Sources

Mindflow

Automate incident response from your alerts

Alert Destinations

Tracebit Log Monitoring

Monitor activity on Tracebit security canaries across your organization

Log Sources

Amazon Security Lake & OSCF Log Monitoring

Inspect your OSCF data for signs of unusual behavior.

Log Sources

Proofpoint Log Monitoring

Detect email attacks.

Log Sources

AWS CloudFront Log Monitoring

Analyze CDN traffic for signs of unusual behavior.

Log Sources

Thinkst Canary Log Monitoring

Detect lateral movement in your environment.

Log Sources

Wiz Log Monitoring

Protect your cloud security controls.

Log Sources

Zscaler Log Monitoring

Monitor application, network, and device access.

Log Sources

Material Security SIEM Integration

Monitor threats in Google Workspace and M365.

Log Sources

Custom Lookup Tables

Enrich log data from custom sources.

Enrichment

Anomali ThreatStream API SIEM Integration

Correlate log data with threat intelligence.

Enrichment

Torq

Trigger automated workflows from your alerts

Alert Destinations

Sublime Security SIEM Integration

Monitor email threats.

Log Sources

Push Security SIEM Integration

Defend against identity attacks.

Log Sources

Blink Ops

Deliver Panther alerts to your automation platform

Alert Destinations

AppOmni SIEM Integration

Monitor your Software as a Service security posture.

Log Sources

Incident.io

Forward Panther alerts to your incident management platform

Alert Destinations

Discord

Route Panther alerts to a Discord channel

Alert Destinations

IPInfo

Enrich detections and reduce false-positive alerts

Enrichment

Splunk

Send Panther alerts to Splunk

Alert Destinations

AWS Security Hub Monitoring

Correlate AWS Security Hub findings.

Log Sources

Notion Log Monitoring

Continuously monitor your Notion workspace.

Log Sources

Tenable Vulnerability Scan Monitoring

Gain complete visibility into your network assets.

Log Sources

Envoy Access Log Monitoring

Monitor network activity for suspicious behavior.

Log Sources

Carbon Black Log Monitoring

Monitor endpoint activity for suspicious behavior.

Log Sources

Azure Log Monitoring

Continuously monitor your Azure account.

Log Sources

Docker Event Log Monitoring

Gain complete visibility into your Docker system events.

Log Sources

Netskope Log Monitoring

Identify any suspicious cloud-based app or service activity.

Log Sources

Auditd Log Monitoring

Monitor system-level activities in your Linux environment.

Log Sources

Heroku Log Monitoring

Monitor your Heroku applications, infrastructure, and admin actions.

Log Sources

Windows Event Log Monitoring

Monitor application, system, and security notifications from Windows machines.

Log Sources

Tailscale Log Monitoring

Monitor your team’s Tailscale network.

Log Sources

Auth0 Log Monitoring

Monitor user authentication and authorization activities in Auth0.

Log Sources

AWS ALB Log Monitoring

Monitor requests sent to your load balancer for suspicious activity.

Log Sources

AWS Aurora Log Monitoring

Monitor and detect any suspicious database events.

Log Sources

AWS CloudTrail Log Monitoring

Identify any suspicious activity within your AWS infrastructure.

Log Sources

AWS CloudWatch Log Monitoring

Monitor any resource changes within your AWS environment.

Log Sources

AWS Config Log Monitoring

Monitor the configuration of your AWS resources.

Log Sources

AWS EKS Log Monitoring

Monitor your Kubernetes environment for suspicious activity.

Log Sources

AWS GuardDuty Log Monitoring

Monitor your AWS environment for malicious activity and unauthorized behavior.

Log Sources

AWS S3 Log Monitoring

Monitor all requests made to AWS S3 buckets.

Log Sources

AWS Transit Gateway Flow Log Monitoring

Monitor the IP traffic flowing through your transit gateway.

Log Sources

AWS VPC Log Monitoring

Monitor the IP traffic going to and from network interfaces in your VPC.

Log Sources

AWS WAF Log Monitoring

Investigate traffic that is analyzed by your web Access Control Lists (ACLs).

Log Sources

Tines Log Monitoring

Monitor any changes within your Tines tenant.

Log Sources

Bitwarden Log Monitoring

Identify any abnormal user activity in your organization's Bitwarden account.

Log Sources

Sysdig Log Monitoring

Gain complete visibility into Sysdig platform activity.

Log Sources

SentinelOne Log Monitoring

Monitor your endpoint data, network activity, and DNS requests.

Log Sources

MongoDB Atlas Log Monitoring

Monitor events within your MongoDB Atlas organization or project.

Log Sources

Microsoft Graph Log Monitoring

Monitor security alerts across Microsoft products, services, and partners.

Log Sources

Jamf Pro Log Monitoring

Monitor Jamf Pro login events for suspicious activity.

Log Sources

Dropbox Log Monitoring

Identify any suspicious file-sharing activity within your organization.

Log Sources

Snyk Log Monitoring

Monitor for any changes within your Snyk Organization.

Log Sources

Zendesk Log Monitoring

Monitor unusual activity within your Zendesk account.

Log Sources

Asana Log Monitoring

Monitor Asana audit logs to identify suspicious activity in real-time.

Log Sources

Atlassian Log Monitoring

Monitor Atlassian audit logs to identify suspicious activity in real-time.

Log Sources

1Password Log Monitoring

Monitor your password management platform for suspicious activity.

Log Sources

Zoom Log Monitoring

Monitor abnormal user activity within your Zoom account.

Log Sources

Salesforce Log Monitoring

Monitor your sales operations data for suspicious activity.

Log Sources

GitHub Log Monitoring

Identify any vulnerabilities within your GitHub repositories.

Log Sources

Microsoft 365 Log Monitoring

Monitor your team’s communication and collaboration tools for suspicious activity.

Log Sources

Slack Log Monitoring

Monitor your team’s communication platform for suspicious activity.

Log Sources

Tines

Send Panther alerts to Tines and initiate a workflow

Alert Destinations

Duo Security Log Monitoring

Monitor your access management tools for suspicious activity.

Log Sources

Sophos Log Monitoring

Monitor endpoint policy violations and data loss prevention events.

Log Sources

Custom Webhooks

Send alert data to third-party applications

Alert Destinations

Fastly Log Monitoring

Monitor network traffic for signs of suspicious behavior.

Log Sources

Cloudflare Log Monitoring

Inspect network traffic for signs of suspicious behavior.

Log Sources

CrowdStrike Log Monitoring

Gain complete visibility into your managed endpoints.

Log Sources

EC2 Instance

Track real-time changes to your EC2 Instance

Cloud Resources

EC2 AMI

Monitor which AWS accounts can use AMI to launch instances

Cloud Resources

EC2 Volume

Continuously audit your EC2 Volume configurations

Cloud Resources

EC2 Network ACL

Audit changes to AWS Network ACL

Cloud Resources

EC2 Security Group

Audit changes to the security group in your EC2 instances.

Cloud Resources

PagerDuty

Send Panther alerts to PagerDuty and begin an investigation

Alert Destinations

SNS

Send programmatic alerts to emails with Panther via SNS

Alert Destinations

GCP Log Monitoring

Gain complete visibility into activity across your cloud service.

Log Sources

Syslog Log Monitoring

Monitor machine and network activity for suspicious behavior.

Log Sources

Fluentd Log Monitoring

Inspect application activity for any signs of suspicious behavior.

Log Sources

Zeek Log Monitoring

Inspect network traffic and DNS protocols for suspicious activity.

Log Sources

Cisco Umbrella Log Monitoring

Identify any suspicious or malicious domain addresses or DNS requests.

Log Sources

Juniper Log Monitoring

Monitor network traffic for attack attempts or probes.

Log Sources

Suricata Log Monitoring

Identify any suspicious traffic or domain activity.

Log Sources

Lacework Log Monitoring

Gain complete visibility into your cloud and container environments.

Log Sources

Teleport Log Monitoring

Inspect all SSH access activity for signs of suspicious behavior.

Log Sources

Apache Log Monitoring

Inspect all web activity for signs of suspicious behavior.

Log Sources

GitLab Log Monitoring

Identify any suspicious behavior within your GitLab environment.

Log Sources

Okta Log Monitoring

Monitor Okta logs to gain complete visibility into your IdP activity.

Log Sources

OneLogin Log Monitoring

Monitor your IdP for suspicious activity.

Log Sources

Google Workspace (G Suite) Log Monitoring

Identify any suspicious activity within your Google Workspace applications.

Log Sources

Box Log Monitoring

Gain complete visibility into your organization’s content management and file sharing.

Log Sources

Snowflake

Build a robust security data lake in Snowflake.

Data Lake

AWS CloudTrail Log Analyzer

Track account changes in real-time and detect suspicious activity

Cloud Resources

S3 Buckets

Detect and alert on unauthorized access to your S3 buckets.

Cloud Resources

EC2 VPC

Capture traffic activity and monitor actual network traffic flows.

Cloud Resources

GuardDuty

Track real-time changes to your AWS GuardDuty

Cloud Resources

Lambda

Track real-time changes to your AWS Lambda

Cloud Resources

WAF Web ACL

Track real-time changes to your WAF ACLs

Cloud Resources

ALB

Audit changes to AWS Application Load Balancer

Cloud Resources

ACM Certificate

Audit changes to AWS Certificate manager

Cloud Resources

Redshift Cluster

Audit changes to AWS Redshift Clusters

Cloud Resources

DynamoDB Table

Continuously monitor AWS DynamoDB tables for compliance

Cloud Resources

Config Recorder

Audit changes to AWS Config Recorder

Cloud Resources

CloudWatch Log group

Track real-time changes to AWS CloudWatch Log group

Cloud Resources

CloudFormation Stack

Track real-time changes to AWS CloudFormation stacks

Cloud Resources

RDS Instance

Get alerted in real-time when a RDS change occurs.

Cloud Resources

Password Policy

Monitor password policies for your AWS account

Cloud Resources

IAM

Track real-time changes to IAM User, Group, Role, and Policy

Cloud Resources

KMS Key

Follow the highest standards of cryptographic practices.

Cloud Resources

ECS Cluster

Gain visibility into specific ECS environments in real-time.

Cloud Resources

OSSEC Log Monitoring

Monitor OSSEC logs to gain complete security visibility into host activity.

Log Sources

Asana

Send Panther alerts to Asana and analyze the issue.

Alert Destinations

OpsGenie

Send Panther alerts to OpsGenie and begin an investigation.

Alert Destinations

Jira

Send Panther alerts to Jira and analyze the issue

Alert Destinations

Slack

Send Panther alerts to a designated Slack channel.

Alert Destinations

GitHub

Send Panther alerts to GitHub and analyze the issue

Alert Destinations

SQS

Send programmatic notifications to emails with Panther via SQS

Alert Destinations

Microsoft Teams

Send Panther alerts to a designated Microsoft Teams channel

Alert Destinations

Nginx Access Log Monitoring

Monitor Nginx access logs and gain complete visibility into web server activity.

Log Sources

Osquery Log Monitoring

Gain complete visibility into your operating system activity.

Log Sources

Ready for less noise
and more control?

See Panther in action. Book a demo today.

Get product updates, webinars, and news

By submitting this form, you acknowledge and agree that Panther will process your personal information in accordance with the Privacy Policy.

Product
Resources
Support
Company