Panther x Databricks: A new kind of SOC is here. Learn More
close
Panther x Databricks: A new kind of SOC is here. Learn More
close
Panther x Databricks: A new kind of SOC is here. Learn More
close
Integrate your stack
All your security data and workflows, connected.
Featured Integrations
All Integrations
Log Sources
Cloud
Network
Host
Application
Alert Destinations
Enrichment
Data Lake
Cloud Resources
Orca Security Log Monitoring
Log Sources
Mindflow
Automate incident response from your alerts
Alert Destinations
Tracebit Log Monitoring
Monitor activity on Tracebit security canaries across your organization
Log Sources

Amazon Security Lake & OSCF Log Monitoring
Inspect your OSCF data for signs of unusual behavior.
Log Sources

Proofpoint Log Monitoring
Detect email attacks.
Log Sources
AWS CloudFront Log Monitoring
Analyze CDN traffic for signs of unusual behavior.
Log Sources

Thinkst Canary Log Monitoring
Detect lateral movement in your environment.
Log Sources
Wiz Log Monitoring
Protect your cloud security controls.
Log Sources
Zscaler Log Monitoring
Monitor application, network, and device access.
Log Sources
Material Security SIEM Integration
Monitor threats in Google Workspace and M365.
Log Sources
Custom Lookup Tables
Enrich log data from custom sources.
Enrichment
Anomali ThreatStream API SIEM Integration
Correlate log data with threat intelligence.
Enrichment

Torq
Trigger automated workflows from your alerts
Alert Destinations

Sublime Security SIEM Integration
Monitor email threats.
Log Sources

Push Security SIEM Integration
Defend against identity attacks.
Log Sources

Blink Ops
Deliver Panther alerts to your automation platform
Alert Destinations

AppOmni SIEM Integration
Monitor your Software as a Service security posture.
Log Sources
Incident.io
Forward Panther alerts to your incident management platform
Alert Destinations

Discord
Route Panther alerts to a Discord channel
Alert Destinations

IPInfo
Enrich detections and reduce false-positive alerts
Enrichment

Splunk
Send Panther alerts to Splunk
Alert Destinations

AWS Security Hub Monitoring
Correlate AWS Security Hub findings.
Log Sources

Notion Log Monitoring
Continuously monitor your Notion workspace.
Log Sources

Tenable Vulnerability Scan Monitoring
Gain complete visibility into your network assets.
Log Sources

Envoy Access Log Monitoring
Monitor network activity for suspicious behavior.
Log Sources

Carbon Black Log Monitoring
Monitor endpoint activity for suspicious behavior.
Log Sources

Azure Log Monitoring
Continuously monitor your Azure account.
Log Sources

Docker Event Log Monitoring
Gain complete visibility into your Docker system events.
Log Sources

Netskope Log Monitoring
Identify any suspicious cloud-based app or service activity.
Log Sources

Auditd Log Monitoring
Monitor system-level activities in your Linux environment.
Log Sources

Heroku Log Monitoring
Monitor your Heroku applications, infrastructure, and admin actions.
Log Sources

Windows Event Log Monitoring
Monitor application, system, and security notifications from Windows machines.
Log Sources

Tailscale Log Monitoring
Monitor your team’s Tailscale network.
Log Sources

Auth0 Log Monitoring
Monitor user authentication and authorization activities in Auth0.
Log Sources

AWS ALB Log Monitoring
Monitor requests sent to your load balancer for suspicious activity.
Log Sources

AWS Aurora Log Monitoring
Monitor and detect any suspicious database events.
Log Sources

AWS CloudTrail Log Monitoring
Identify any suspicious activity within your AWS infrastructure.
Log Sources

AWS CloudWatch Log Monitoring
Monitor any resource changes within your AWS environment.
Log Sources

AWS Config Log Monitoring
Monitor the configuration of your AWS resources.
Log Sources

AWS EKS Log Monitoring
Monitor your Kubernetes environment for suspicious activity.
Log Sources

AWS GuardDuty Log Monitoring
Monitor your AWS environment for malicious activity and unauthorized behavior.
Log Sources

AWS S3 Log Monitoring
Monitor all requests made to AWS S3 buckets.
Log Sources

AWS Transit Gateway Flow Log Monitoring
Monitor the IP traffic flowing through your transit gateway.
Log Sources

AWS VPC Log Monitoring
Monitor the IP traffic going to and from network interfaces in your VPC.
Log Sources

AWS WAF Log Monitoring
Investigate traffic that is analyzed by your web Access Control Lists (ACLs).
Log Sources

Tines Log Monitoring
Monitor any changes within your Tines tenant.
Log Sources

Bitwarden Log Monitoring
Identify any abnormal user activity in your organization's Bitwarden account.
Log Sources

Sysdig Log Monitoring
Gain complete visibility into Sysdig platform activity.
Log Sources

SentinelOne Log Monitoring
Monitor your endpoint data, network activity, and DNS requests.
Log Sources

MongoDB Atlas Log Monitoring
Monitor events within your MongoDB Atlas organization or project.
Log Sources

Microsoft Graph Log Monitoring
Monitor security alerts across Microsoft products, services, and partners.
Log Sources

Jamf Pro Log Monitoring
Monitor Jamf Pro login events for suspicious activity.
Log Sources

Dropbox Log Monitoring
Identify any suspicious file-sharing activity within your organization.
Log Sources

Snyk Log Monitoring
Monitor for any changes within your Snyk Organization.
Log Sources

Zendesk Log Monitoring
Monitor unusual activity within your Zendesk account.
Log Sources

Asana Log Monitoring
Monitor Asana audit logs to identify suspicious activity in real-time.
Log Sources

Atlassian Log Monitoring
Monitor Atlassian audit logs to identify suspicious activity in real-time.
Log Sources

1Password Log Monitoring
Monitor your password management platform for suspicious activity.
Log Sources

Zoom Log Monitoring
Monitor abnormal user activity within your Zoom account.
Log Sources
Salesforce Log Monitoring
Monitor your sales operations data for suspicious activity.
Log Sources

GitHub Log Monitoring
Identify any vulnerabilities within your GitHub repositories.
Log Sources

Microsoft 365 Log Monitoring
Monitor your team’s communication and collaboration tools for suspicious activity.
Log Sources

Slack Log Monitoring
Monitor your team’s communication platform for suspicious activity.
Log Sources

Tines
Send Panther alerts to Tines and initiate a workflow
Alert Destinations

Duo Security Log Monitoring
Monitor your access management tools for suspicious activity.
Log Sources

Sophos Log Monitoring
Monitor endpoint policy violations and data loss prevention events.
Log Sources

Custom Webhooks
Send alert data to third-party applications
Alert Destinations

Fastly Log Monitoring
Monitor network traffic for signs of suspicious behavior.
Log Sources

Cloudflare Log Monitoring
Inspect network traffic for signs of suspicious behavior.
Log Sources

CrowdStrike Log Monitoring
Gain complete visibility into your managed endpoints.
Log Sources

EC2 Instance
Track real-time changes to your EC2 Instance
Cloud Resources

EC2 AMI
Monitor which AWS accounts can use AMI to launch instances
Cloud Resources

EC2 Volume
Continuously audit your EC2 Volume configurations
Cloud Resources

EC2 Network ACL
Audit changes to AWS Network ACL
Cloud Resources

EC2 Security Group
Audit changes to the security group in your EC2 instances.
Cloud Resources

PagerDuty
Send Panther alerts to PagerDuty and begin an investigation
Alert Destinations

SNS
Send programmatic alerts to emails with Panther via SNS
Alert Destinations

GCP Log Monitoring
Gain complete visibility into activity across your cloud service.
Log Sources

Syslog Log Monitoring
Monitor machine and network activity for suspicious behavior.
Log Sources

Fluentd Log Monitoring
Inspect application activity for any signs of suspicious behavior.
Log Sources

Zeek Log Monitoring
Inspect network traffic and DNS protocols for suspicious activity.
Log Sources

Cisco Umbrella Log Monitoring
Identify any suspicious or malicious domain addresses or DNS requests.
Log Sources

Juniper Log Monitoring
Monitor network traffic for attack attempts or probes.
Log Sources

Suricata Log Monitoring
Identify any suspicious traffic or domain activity.
Log Sources

Lacework Log Monitoring
Gain complete visibility into your cloud and container environments.
Log Sources

Teleport Log Monitoring
Inspect all SSH access activity for signs of suspicious behavior.
Log Sources

Apache Log Monitoring
Inspect all web activity for signs of suspicious behavior.
Log Sources

GitLab Log Monitoring
Identify any suspicious behavior within your GitLab environment.
Log Sources

Okta Log Monitoring
Monitor Okta logs to gain complete visibility into your IdP activity.
Log Sources

OneLogin Log Monitoring
Monitor your IdP for suspicious activity.
Log Sources

Google Workspace (G Suite) Log Monitoring
Identify any suspicious activity within your Google Workspace applications.
Log Sources

Box Log Monitoring
Gain complete visibility into your organization’s content management and file sharing.
Log Sources

Snowflake
Build a robust security data lake in Snowflake.
Data Lake

AWS CloudTrail Log Analyzer
Track account changes in real-time and detect suspicious activity
Cloud Resources

S3 Buckets
Detect and alert on unauthorized access to your S3 buckets.
Cloud Resources

EC2 VPC
Capture traffic activity and monitor actual network traffic flows.
Cloud Resources

GuardDuty
Track real-time changes to your AWS GuardDuty
Cloud Resources

Lambda
Track real-time changes to your AWS Lambda
Cloud Resources

WAF Web ACL
Track real-time changes to your WAF ACLs
Cloud Resources

ALB
Audit changes to AWS Application Load Balancer
Cloud Resources

ACM Certificate
Audit changes to AWS Certificate manager
Cloud Resources

Redshift Cluster
Audit changes to AWS Redshift Clusters
Cloud Resources

DynamoDB Table
Continuously monitor AWS DynamoDB tables for compliance
Cloud Resources

Config Recorder
Audit changes to AWS Config Recorder
Cloud Resources

CloudWatch Log group
Track real-time changes to AWS CloudWatch Log group
Cloud Resources

CloudFormation Stack
Track real-time changes to AWS CloudFormation stacks
Cloud Resources

RDS Instance
Get alerted in real-time when a RDS change occurs.
Cloud Resources

Password Policy
Monitor password policies for your AWS account
Cloud Resources

IAM
Track real-time changes to IAM User, Group, Role, and Policy
Cloud Resources

KMS Key
Follow the highest standards of cryptographic practices.
Cloud Resources

ECS Cluster
Gain visibility into specific ECS environments in real-time.
Cloud Resources

OSSEC Log Monitoring
Monitor OSSEC logs to gain complete security visibility into host activity.
Log Sources

Asana
Send Panther alerts to Asana and analyze the issue.
Alert Destinations

OpsGenie
Send Panther alerts to OpsGenie and begin an investigation.
Alert Destinations

Jira
Send Panther alerts to Jira and analyze the issue
Alert Destinations

Slack
Send Panther alerts to a designated Slack channel.
Alert Destinations

GitHub
Send Panther alerts to GitHub and analyze the issue
Alert Destinations

SQS
Send programmatic notifications to emails with Panther via SQS
Alert Destinations

Microsoft Teams
Send Panther alerts to a designated Microsoft Teams channel
Alert Destinations
Nginx Access Log Monitoring
Monitor Nginx access logs and gain complete visibility into web server activity.
Log Sources

Osquery Log Monitoring
Gain complete visibility into your operating system activity.
Log Sources
All Integrations
Log Sources
Cloud
Network
Host
Application
Alert Destinations
Enrichment
Data Lake
Cloud Resources
Orca Security Log Monitoring
Log Sources
Mindflow
Automate incident response from your alerts
Alert Destinations
Tracebit Log Monitoring
Monitor activity on Tracebit security canaries across your organization
Log Sources

Amazon Security Lake & OSCF Log Monitoring
Inspect your OSCF data for signs of unusual behavior.
Log Sources

Proofpoint Log Monitoring
Detect email attacks.
Log Sources
AWS CloudFront Log Monitoring
Analyze CDN traffic for signs of unusual behavior.
Log Sources

Thinkst Canary Log Monitoring
Detect lateral movement in your environment.
Log Sources
Wiz Log Monitoring
Protect your cloud security controls.
Log Sources
Zscaler Log Monitoring
Monitor application, network, and device access.
Log Sources
Material Security SIEM Integration
Monitor threats in Google Workspace and M365.
Log Sources
Custom Lookup Tables
Enrich log data from custom sources.
Enrichment
Anomali ThreatStream API SIEM Integration
Correlate log data with threat intelligence.
Enrichment

Torq
Trigger automated workflows from your alerts
Alert Destinations

Sublime Security SIEM Integration
Monitor email threats.
Log Sources

Push Security SIEM Integration
Defend against identity attacks.
Log Sources

Blink Ops
Deliver Panther alerts to your automation platform
Alert Destinations

AppOmni SIEM Integration
Monitor your Software as a Service security posture.
Log Sources
Incident.io
Forward Panther alerts to your incident management platform
Alert Destinations

Discord
Route Panther alerts to a Discord channel
Alert Destinations

IPInfo
Enrich detections and reduce false-positive alerts
Enrichment

Splunk
Send Panther alerts to Splunk
Alert Destinations

AWS Security Hub Monitoring
Correlate AWS Security Hub findings.
Log Sources

Notion Log Monitoring
Continuously monitor your Notion workspace.
Log Sources

Tenable Vulnerability Scan Monitoring
Gain complete visibility into your network assets.
Log Sources

Envoy Access Log Monitoring
Monitor network activity for suspicious behavior.
Log Sources

Carbon Black Log Monitoring
Monitor endpoint activity for suspicious behavior.
Log Sources

Azure Log Monitoring
Continuously monitor your Azure account.
Log Sources

Docker Event Log Monitoring
Gain complete visibility into your Docker system events.
Log Sources

Netskope Log Monitoring
Identify any suspicious cloud-based app or service activity.
Log Sources

Auditd Log Monitoring
Monitor system-level activities in your Linux environment.
Log Sources

Heroku Log Monitoring
Monitor your Heroku applications, infrastructure, and admin actions.
Log Sources

Windows Event Log Monitoring
Monitor application, system, and security notifications from Windows machines.
Log Sources

Tailscale Log Monitoring
Monitor your team’s Tailscale network.
Log Sources

Auth0 Log Monitoring
Monitor user authentication and authorization activities in Auth0.
Log Sources

AWS ALB Log Monitoring
Monitor requests sent to your load balancer for suspicious activity.
Log Sources

AWS Aurora Log Monitoring
Monitor and detect any suspicious database events.
Log Sources

AWS CloudTrail Log Monitoring
Identify any suspicious activity within your AWS infrastructure.
Log Sources

AWS CloudWatch Log Monitoring
Monitor any resource changes within your AWS environment.
Log Sources

AWS Config Log Monitoring
Monitor the configuration of your AWS resources.
Log Sources

AWS EKS Log Monitoring
Monitor your Kubernetes environment for suspicious activity.
Log Sources

AWS GuardDuty Log Monitoring
Monitor your AWS environment for malicious activity and unauthorized behavior.
Log Sources

AWS S3 Log Monitoring
Monitor all requests made to AWS S3 buckets.
Log Sources

AWS Transit Gateway Flow Log Monitoring
Monitor the IP traffic flowing through your transit gateway.
Log Sources

AWS VPC Log Monitoring
Monitor the IP traffic going to and from network interfaces in your VPC.
Log Sources

AWS WAF Log Monitoring
Investigate traffic that is analyzed by your web Access Control Lists (ACLs).
Log Sources

Tines Log Monitoring
Monitor any changes within your Tines tenant.
Log Sources

Bitwarden Log Monitoring
Identify any abnormal user activity in your organization's Bitwarden account.
Log Sources

Sysdig Log Monitoring
Gain complete visibility into Sysdig platform activity.
Log Sources

SentinelOne Log Monitoring
Monitor your endpoint data, network activity, and DNS requests.
Log Sources

MongoDB Atlas Log Monitoring
Monitor events within your MongoDB Atlas organization or project.
Log Sources

Microsoft Graph Log Monitoring
Monitor security alerts across Microsoft products, services, and partners.
Log Sources

Jamf Pro Log Monitoring
Monitor Jamf Pro login events for suspicious activity.
Log Sources

Dropbox Log Monitoring
Identify any suspicious file-sharing activity within your organization.
Log Sources

Snyk Log Monitoring
Monitor for any changes within your Snyk Organization.
Log Sources

Zendesk Log Monitoring
Monitor unusual activity within your Zendesk account.
Log Sources

Asana Log Monitoring
Monitor Asana audit logs to identify suspicious activity in real-time.
Log Sources

Atlassian Log Monitoring
Monitor Atlassian audit logs to identify suspicious activity in real-time.
Log Sources

1Password Log Monitoring
Monitor your password management platform for suspicious activity.
Log Sources

Zoom Log Monitoring
Monitor abnormal user activity within your Zoom account.
Log Sources
Salesforce Log Monitoring
Monitor your sales operations data for suspicious activity.
Log Sources

GitHub Log Monitoring
Identify any vulnerabilities within your GitHub repositories.
Log Sources

Microsoft 365 Log Monitoring
Monitor your team’s communication and collaboration tools for suspicious activity.
Log Sources

Slack Log Monitoring
Monitor your team’s communication platform for suspicious activity.
Log Sources

Tines
Send Panther alerts to Tines and initiate a workflow
Alert Destinations

Duo Security Log Monitoring
Monitor your access management tools for suspicious activity.
Log Sources

Sophos Log Monitoring
Monitor endpoint policy violations and data loss prevention events.
Log Sources

Custom Webhooks
Send alert data to third-party applications
Alert Destinations

Fastly Log Monitoring
Monitor network traffic for signs of suspicious behavior.
Log Sources

Cloudflare Log Monitoring
Inspect network traffic for signs of suspicious behavior.
Log Sources

CrowdStrike Log Monitoring
Gain complete visibility into your managed endpoints.
Log Sources

EC2 Instance
Track real-time changes to your EC2 Instance
Cloud Resources

EC2 AMI
Monitor which AWS accounts can use AMI to launch instances
Cloud Resources

EC2 Volume
Continuously audit your EC2 Volume configurations
Cloud Resources

EC2 Network ACL
Audit changes to AWS Network ACL
Cloud Resources

EC2 Security Group
Audit changes to the security group in your EC2 instances.
Cloud Resources

PagerDuty
Send Panther alerts to PagerDuty and begin an investigation
Alert Destinations

SNS
Send programmatic alerts to emails with Panther via SNS
Alert Destinations

GCP Log Monitoring
Gain complete visibility into activity across your cloud service.
Log Sources

Syslog Log Monitoring
Monitor machine and network activity for suspicious behavior.
Log Sources

Fluentd Log Monitoring
Inspect application activity for any signs of suspicious behavior.
Log Sources

Zeek Log Monitoring
Inspect network traffic and DNS protocols for suspicious activity.
Log Sources

Cisco Umbrella Log Monitoring
Identify any suspicious or malicious domain addresses or DNS requests.
Log Sources

Juniper Log Monitoring
Monitor network traffic for attack attempts or probes.
Log Sources

Suricata Log Monitoring
Identify any suspicious traffic or domain activity.
Log Sources

Lacework Log Monitoring
Gain complete visibility into your cloud and container environments.
Log Sources

Teleport Log Monitoring
Inspect all SSH access activity for signs of suspicious behavior.
Log Sources

Apache Log Monitoring
Inspect all web activity for signs of suspicious behavior.
Log Sources

GitLab Log Monitoring
Identify any suspicious behavior within your GitLab environment.
Log Sources

Okta Log Monitoring
Monitor Okta logs to gain complete visibility into your IdP activity.
Log Sources

OneLogin Log Monitoring
Monitor your IdP for suspicious activity.
Log Sources

Google Workspace (G Suite) Log Monitoring
Identify any suspicious activity within your Google Workspace applications.
Log Sources

Box Log Monitoring
Gain complete visibility into your organization’s content management and file sharing.
Log Sources

Snowflake
Build a robust security data lake in Snowflake.
Data Lake

AWS CloudTrail Log Analyzer
Track account changes in real-time and detect suspicious activity
Cloud Resources

S3 Buckets
Detect and alert on unauthorized access to your S3 buckets.
Cloud Resources

EC2 VPC
Capture traffic activity and monitor actual network traffic flows.
Cloud Resources

GuardDuty
Track real-time changes to your AWS GuardDuty
Cloud Resources

Lambda
Track real-time changes to your AWS Lambda
Cloud Resources

WAF Web ACL
Track real-time changes to your WAF ACLs
Cloud Resources

ALB
Audit changes to AWS Application Load Balancer
Cloud Resources

ACM Certificate
Audit changes to AWS Certificate manager
Cloud Resources

Redshift Cluster
Audit changes to AWS Redshift Clusters
Cloud Resources

DynamoDB Table
Continuously monitor AWS DynamoDB tables for compliance
Cloud Resources

Config Recorder
Audit changes to AWS Config Recorder
Cloud Resources

CloudWatch Log group
Track real-time changes to AWS CloudWatch Log group
Cloud Resources

CloudFormation Stack
Track real-time changes to AWS CloudFormation stacks
Cloud Resources

RDS Instance
Get alerted in real-time when a RDS change occurs.
Cloud Resources

Password Policy
Monitor password policies for your AWS account
Cloud Resources

IAM
Track real-time changes to IAM User, Group, Role, and Policy
Cloud Resources

KMS Key
Follow the highest standards of cryptographic practices.
Cloud Resources

ECS Cluster
Gain visibility into specific ECS environments in real-time.
Cloud Resources

OSSEC Log Monitoring
Monitor OSSEC logs to gain complete security visibility into host activity.
Log Sources

Asana
Send Panther alerts to Asana and analyze the issue.
Alert Destinations

OpsGenie
Send Panther alerts to OpsGenie and begin an investigation.
Alert Destinations

Jira
Send Panther alerts to Jira and analyze the issue
Alert Destinations

Slack
Send Panther alerts to a designated Slack channel.
Alert Destinations

GitHub
Send Panther alerts to GitHub and analyze the issue
Alert Destinations

SQS
Send programmatic notifications to emails with Panther via SQS
Alert Destinations

Microsoft Teams
Send Panther alerts to a designated Microsoft Teams channel
Alert Destinations
Nginx Access Log Monitoring
Monitor Nginx access logs and gain complete visibility into web server activity.
Log Sources

Osquery Log Monitoring
Gain complete visibility into your operating system activity.
Log Sources
All Integrations
Log Sources
Cloud
Network
Host
Application
Alert Destinations
Enrichment
Data Lake
Cloud Resources
Orca Security Log Monitoring
Log Sources
Mindflow
Automate incident response from your alerts
Alert Destinations
Tracebit Log Monitoring
Monitor activity on Tracebit security canaries across your organization
Log Sources

Amazon Security Lake & OSCF Log Monitoring
Inspect your OSCF data for signs of unusual behavior.
Log Sources

Proofpoint Log Monitoring
Detect email attacks.
Log Sources
AWS CloudFront Log Monitoring
Analyze CDN traffic for signs of unusual behavior.
Log Sources

Thinkst Canary Log Monitoring
Detect lateral movement in your environment.
Log Sources
Wiz Log Monitoring
Protect your cloud security controls.
Log Sources
Zscaler Log Monitoring
Monitor application, network, and device access.
Log Sources
Material Security SIEM Integration
Monitor threats in Google Workspace and M365.
Log Sources
Custom Lookup Tables
Enrich log data from custom sources.
Enrichment
Anomali ThreatStream API SIEM Integration
Correlate log data with threat intelligence.
Enrichment

Torq
Trigger automated workflows from your alerts
Alert Destinations

Sublime Security SIEM Integration
Monitor email threats.
Log Sources

Push Security SIEM Integration
Defend against identity attacks.
Log Sources

Blink Ops
Deliver Panther alerts to your automation platform
Alert Destinations

AppOmni SIEM Integration
Monitor your Software as a Service security posture.
Log Sources
Incident.io
Forward Panther alerts to your incident management platform
Alert Destinations

Discord
Route Panther alerts to a Discord channel
Alert Destinations

IPInfo
Enrich detections and reduce false-positive alerts
Enrichment

Splunk
Send Panther alerts to Splunk
Alert Destinations

AWS Security Hub Monitoring
Correlate AWS Security Hub findings.
Log Sources

Notion Log Monitoring
Continuously monitor your Notion workspace.
Log Sources

Tenable Vulnerability Scan Monitoring
Gain complete visibility into your network assets.
Log Sources

Envoy Access Log Monitoring
Monitor network activity for suspicious behavior.
Log Sources

Carbon Black Log Monitoring
Monitor endpoint activity for suspicious behavior.
Log Sources

Azure Log Monitoring
Continuously monitor your Azure account.
Log Sources

Docker Event Log Monitoring
Gain complete visibility into your Docker system events.
Log Sources

Netskope Log Monitoring
Identify any suspicious cloud-based app or service activity.
Log Sources

Auditd Log Monitoring
Monitor system-level activities in your Linux environment.
Log Sources

Heroku Log Monitoring
Monitor your Heroku applications, infrastructure, and admin actions.
Log Sources

Windows Event Log Monitoring
Monitor application, system, and security notifications from Windows machines.
Log Sources

Tailscale Log Monitoring
Monitor your team’s Tailscale network.
Log Sources

Auth0 Log Monitoring
Monitor user authentication and authorization activities in Auth0.
Log Sources

AWS ALB Log Monitoring
Monitor requests sent to your load balancer for suspicious activity.
Log Sources

AWS Aurora Log Monitoring
Monitor and detect any suspicious database events.
Log Sources

AWS CloudTrail Log Monitoring
Identify any suspicious activity within your AWS infrastructure.
Log Sources

AWS CloudWatch Log Monitoring
Monitor any resource changes within your AWS environment.
Log Sources

AWS Config Log Monitoring
Monitor the configuration of your AWS resources.
Log Sources

AWS EKS Log Monitoring
Monitor your Kubernetes environment for suspicious activity.
Log Sources

AWS GuardDuty Log Monitoring
Monitor your AWS environment for malicious activity and unauthorized behavior.
Log Sources

AWS S3 Log Monitoring
Monitor all requests made to AWS S3 buckets.
Log Sources

AWS Transit Gateway Flow Log Monitoring
Monitor the IP traffic flowing through your transit gateway.
Log Sources

AWS VPC Log Monitoring
Monitor the IP traffic going to and from network interfaces in your VPC.
Log Sources

AWS WAF Log Monitoring
Investigate traffic that is analyzed by your web Access Control Lists (ACLs).
Log Sources

Tines Log Monitoring
Monitor any changes within your Tines tenant.
Log Sources

Bitwarden Log Monitoring
Identify any abnormal user activity in your organization's Bitwarden account.
Log Sources

Sysdig Log Monitoring
Gain complete visibility into Sysdig platform activity.
Log Sources

SentinelOne Log Monitoring
Monitor your endpoint data, network activity, and DNS requests.
Log Sources

MongoDB Atlas Log Monitoring
Monitor events within your MongoDB Atlas organization or project.
Log Sources

Microsoft Graph Log Monitoring
Monitor security alerts across Microsoft products, services, and partners.
Log Sources

Jamf Pro Log Monitoring
Monitor Jamf Pro login events for suspicious activity.
Log Sources

Dropbox Log Monitoring
Identify any suspicious file-sharing activity within your organization.
Log Sources

Snyk Log Monitoring
Monitor for any changes within your Snyk Organization.
Log Sources

Zendesk Log Monitoring
Monitor unusual activity within your Zendesk account.
Log Sources

Asana Log Monitoring
Monitor Asana audit logs to identify suspicious activity in real-time.
Log Sources

Atlassian Log Monitoring
Monitor Atlassian audit logs to identify suspicious activity in real-time.
Log Sources

1Password Log Monitoring
Monitor your password management platform for suspicious activity.
Log Sources

Zoom Log Monitoring
Monitor abnormal user activity within your Zoom account.
Log Sources
Salesforce Log Monitoring
Monitor your sales operations data for suspicious activity.
Log Sources

GitHub Log Monitoring
Identify any vulnerabilities within your GitHub repositories.
Log Sources

Microsoft 365 Log Monitoring
Monitor your team’s communication and collaboration tools for suspicious activity.
Log Sources

Slack Log Monitoring
Monitor your team’s communication platform for suspicious activity.
Log Sources

Tines
Send Panther alerts to Tines and initiate a workflow
Alert Destinations

Duo Security Log Monitoring
Monitor your access management tools for suspicious activity.
Log Sources

Sophos Log Monitoring
Monitor endpoint policy violations and data loss prevention events.
Log Sources

Custom Webhooks
Send alert data to third-party applications
Alert Destinations

Fastly Log Monitoring
Monitor network traffic for signs of suspicious behavior.
Log Sources

Cloudflare Log Monitoring
Inspect network traffic for signs of suspicious behavior.
Log Sources

CrowdStrike Log Monitoring
Gain complete visibility into your managed endpoints.
Log Sources

EC2 Instance
Track real-time changes to your EC2 Instance
Cloud Resources

EC2 AMI
Monitor which AWS accounts can use AMI to launch instances
Cloud Resources

EC2 Volume
Continuously audit your EC2 Volume configurations
Cloud Resources

EC2 Network ACL
Audit changes to AWS Network ACL
Cloud Resources

EC2 Security Group
Audit changes to the security group in your EC2 instances.
Cloud Resources

PagerDuty
Send Panther alerts to PagerDuty and begin an investigation
Alert Destinations

SNS
Send programmatic alerts to emails with Panther via SNS
Alert Destinations

GCP Log Monitoring
Gain complete visibility into activity across your cloud service.
Log Sources

Syslog Log Monitoring
Monitor machine and network activity for suspicious behavior.
Log Sources

Fluentd Log Monitoring
Inspect application activity for any signs of suspicious behavior.
Log Sources

Zeek Log Monitoring
Inspect network traffic and DNS protocols for suspicious activity.
Log Sources

Cisco Umbrella Log Monitoring
Identify any suspicious or malicious domain addresses or DNS requests.
Log Sources

Juniper Log Monitoring
Monitor network traffic for attack attempts or probes.
Log Sources

Suricata Log Monitoring
Identify any suspicious traffic or domain activity.
Log Sources

Lacework Log Monitoring
Gain complete visibility into your cloud and container environments.
Log Sources

Teleport Log Monitoring
Inspect all SSH access activity for signs of suspicious behavior.
Log Sources

Apache Log Monitoring
Inspect all web activity for signs of suspicious behavior.
Log Sources

GitLab Log Monitoring
Identify any suspicious behavior within your GitLab environment.
Log Sources

Okta Log Monitoring
Monitor Okta logs to gain complete visibility into your IdP activity.
Log Sources

OneLogin Log Monitoring
Monitor your IdP for suspicious activity.
Log Sources

Google Workspace (G Suite) Log Monitoring
Identify any suspicious activity within your Google Workspace applications.
Log Sources

Box Log Monitoring
Gain complete visibility into your organization’s content management and file sharing.
Log Sources

Snowflake
Build a robust security data lake in Snowflake.
Data Lake

AWS CloudTrail Log Analyzer
Track account changes in real-time and detect suspicious activity
Cloud Resources

S3 Buckets
Detect and alert on unauthorized access to your S3 buckets.
Cloud Resources

EC2 VPC
Capture traffic activity and monitor actual network traffic flows.
Cloud Resources

GuardDuty
Track real-time changes to your AWS GuardDuty
Cloud Resources

Lambda
Track real-time changes to your AWS Lambda
Cloud Resources

WAF Web ACL
Track real-time changes to your WAF ACLs
Cloud Resources

ALB
Audit changes to AWS Application Load Balancer
Cloud Resources

ACM Certificate
Audit changes to AWS Certificate manager
Cloud Resources

Redshift Cluster
Audit changes to AWS Redshift Clusters
Cloud Resources

DynamoDB Table
Continuously monitor AWS DynamoDB tables for compliance
Cloud Resources

Config Recorder
Audit changes to AWS Config Recorder
Cloud Resources

CloudWatch Log group
Track real-time changes to AWS CloudWatch Log group
Cloud Resources

CloudFormation Stack
Track real-time changes to AWS CloudFormation stacks
Cloud Resources

RDS Instance
Get alerted in real-time when a RDS change occurs.
Cloud Resources

Password Policy
Monitor password policies for your AWS account
Cloud Resources

IAM
Track real-time changes to IAM User, Group, Role, and Policy
Cloud Resources

KMS Key
Follow the highest standards of cryptographic practices.
Cloud Resources

ECS Cluster
Gain visibility into specific ECS environments in real-time.
Cloud Resources

OSSEC Log Monitoring
Monitor OSSEC logs to gain complete security visibility into host activity.
Log Sources

Asana
Send Panther alerts to Asana and analyze the issue.
Alert Destinations

OpsGenie
Send Panther alerts to OpsGenie and begin an investigation.
Alert Destinations

Jira
Send Panther alerts to Jira and analyze the issue
Alert Destinations

Slack
Send Panther alerts to a designated Slack channel.
Alert Destinations

GitHub
Send Panther alerts to GitHub and analyze the issue
Alert Destinations

SQS
Send programmatic notifications to emails with Panther via SQS
Alert Destinations

Microsoft Teams
Send Panther alerts to a designated Microsoft Teams channel
Alert Destinations
Nginx Access Log Monitoring
Monitor Nginx access logs and gain complete visibility into web server activity.
Log Sources

Osquery Log Monitoring
Gain complete visibility into your operating system activity.
Log Sources
All Integrations
Log Sources
Cloud
Network
Host
Application
Alert Destinations
Enrichment
Data Lake
Cloud Resources
Orca Security Log Monitoring
Log Sources
Mindflow
Automate incident response from your alerts
Alert Destinations
Tracebit Log Monitoring
Monitor activity on Tracebit security canaries across your organization
Log Sources

Amazon Security Lake & OSCF Log Monitoring
Inspect your OSCF data for signs of unusual behavior.
Log Sources

Proofpoint Log Monitoring
Detect email attacks.
Log Sources
AWS CloudFront Log Monitoring
Analyze CDN traffic for signs of unusual behavior.
Log Sources

Thinkst Canary Log Monitoring
Detect lateral movement in your environment.
Log Sources
Wiz Log Monitoring
Protect your cloud security controls.
Log Sources
Zscaler Log Monitoring
Monitor application, network, and device access.
Log Sources
Material Security SIEM Integration
Monitor threats in Google Workspace and M365.
Log Sources
Custom Lookup Tables
Enrich log data from custom sources.
Enrichment
Anomali ThreatStream API SIEM Integration
Correlate log data with threat intelligence.
Enrichment

Torq
Trigger automated workflows from your alerts
Alert Destinations

Sublime Security SIEM Integration
Monitor email threats.
Log Sources

Push Security SIEM Integration
Defend against identity attacks.
Log Sources

Blink Ops
Deliver Panther alerts to your automation platform
Alert Destinations

AppOmni SIEM Integration
Monitor your Software as a Service security posture.
Log Sources
Incident.io
Forward Panther alerts to your incident management platform
Alert Destinations

Discord
Route Panther alerts to a Discord channel
Alert Destinations

IPInfo
Enrich detections and reduce false-positive alerts
Enrichment

Splunk
Send Panther alerts to Splunk
Alert Destinations

AWS Security Hub Monitoring
Correlate AWS Security Hub findings.
Log Sources

Notion Log Monitoring
Continuously monitor your Notion workspace.
Log Sources

Tenable Vulnerability Scan Monitoring
Gain complete visibility into your network assets.
Log Sources

Envoy Access Log Monitoring
Monitor network activity for suspicious behavior.
Log Sources

Carbon Black Log Monitoring
Monitor endpoint activity for suspicious behavior.
Log Sources

Azure Log Monitoring
Continuously monitor your Azure account.
Log Sources

Docker Event Log Monitoring
Gain complete visibility into your Docker system events.
Log Sources

Netskope Log Monitoring
Identify any suspicious cloud-based app or service activity.
Log Sources

Auditd Log Monitoring
Monitor system-level activities in your Linux environment.
Log Sources

Heroku Log Monitoring
Monitor your Heroku applications, infrastructure, and admin actions.
Log Sources

Windows Event Log Monitoring
Monitor application, system, and security notifications from Windows machines.
Log Sources

Tailscale Log Monitoring
Monitor your team’s Tailscale network.
Log Sources

Auth0 Log Monitoring
Monitor user authentication and authorization activities in Auth0.
Log Sources

AWS ALB Log Monitoring
Monitor requests sent to your load balancer for suspicious activity.
Log Sources

AWS Aurora Log Monitoring
Monitor and detect any suspicious database events.
Log Sources

AWS CloudTrail Log Monitoring
Identify any suspicious activity within your AWS infrastructure.
Log Sources

AWS CloudWatch Log Monitoring
Monitor any resource changes within your AWS environment.
Log Sources

AWS Config Log Monitoring
Monitor the configuration of your AWS resources.
Log Sources

AWS EKS Log Monitoring
Monitor your Kubernetes environment for suspicious activity.
Log Sources

AWS GuardDuty Log Monitoring
Monitor your AWS environment for malicious activity and unauthorized behavior.
Log Sources

AWS S3 Log Monitoring
Monitor all requests made to AWS S3 buckets.
Log Sources

AWS Transit Gateway Flow Log Monitoring
Monitor the IP traffic flowing through your transit gateway.
Log Sources

AWS VPC Log Monitoring
Monitor the IP traffic going to and from network interfaces in your VPC.
Log Sources

AWS WAF Log Monitoring
Investigate traffic that is analyzed by your web Access Control Lists (ACLs).
Log Sources

Tines Log Monitoring
Monitor any changes within your Tines tenant.
Log Sources

Bitwarden Log Monitoring
Identify any abnormal user activity in your organization's Bitwarden account.
Log Sources

Sysdig Log Monitoring
Gain complete visibility into Sysdig platform activity.
Log Sources

SentinelOne Log Monitoring
Monitor your endpoint data, network activity, and DNS requests.
Log Sources

MongoDB Atlas Log Monitoring
Monitor events within your MongoDB Atlas organization or project.
Log Sources

Microsoft Graph Log Monitoring
Monitor security alerts across Microsoft products, services, and partners.
Log Sources

Jamf Pro Log Monitoring
Monitor Jamf Pro login events for suspicious activity.
Log Sources

Dropbox Log Monitoring
Identify any suspicious file-sharing activity within your organization.
Log Sources

Snyk Log Monitoring
Monitor for any changes within your Snyk Organization.
Log Sources

Zendesk Log Monitoring
Monitor unusual activity within your Zendesk account.
Log Sources

Asana Log Monitoring
Monitor Asana audit logs to identify suspicious activity in real-time.
Log Sources

Atlassian Log Monitoring
Monitor Atlassian audit logs to identify suspicious activity in real-time.
Log Sources

1Password Log Monitoring
Monitor your password management platform for suspicious activity.
Log Sources

Zoom Log Monitoring
Monitor abnormal user activity within your Zoom account.
Log Sources
Salesforce Log Monitoring
Monitor your sales operations data for suspicious activity.
Log Sources

GitHub Log Monitoring
Identify any vulnerabilities within your GitHub repositories.
Log Sources

Microsoft 365 Log Monitoring
Monitor your team’s communication and collaboration tools for suspicious activity.
Log Sources

Slack Log Monitoring
Monitor your team’s communication platform for suspicious activity.
Log Sources

Tines
Send Panther alerts to Tines and initiate a workflow
Alert Destinations

Duo Security Log Monitoring
Monitor your access management tools for suspicious activity.
Log Sources

Sophos Log Monitoring
Monitor endpoint policy violations and data loss prevention events.
Log Sources

Custom Webhooks
Send alert data to third-party applications
Alert Destinations

Fastly Log Monitoring
Monitor network traffic for signs of suspicious behavior.
Log Sources

Cloudflare Log Monitoring
Inspect network traffic for signs of suspicious behavior.
Log Sources

CrowdStrike Log Monitoring
Gain complete visibility into your managed endpoints.
Log Sources

EC2 Instance
Track real-time changes to your EC2 Instance
Cloud Resources

EC2 AMI
Monitor which AWS accounts can use AMI to launch instances
Cloud Resources

EC2 Volume
Continuously audit your EC2 Volume configurations
Cloud Resources

EC2 Network ACL
Audit changes to AWS Network ACL
Cloud Resources

EC2 Security Group
Audit changes to the security group in your EC2 instances.
Cloud Resources

PagerDuty
Send Panther alerts to PagerDuty and begin an investigation
Alert Destinations

SNS
Send programmatic alerts to emails with Panther via SNS
Alert Destinations

GCP Log Monitoring
Gain complete visibility into activity across your cloud service.
Log Sources

Syslog Log Monitoring
Monitor machine and network activity for suspicious behavior.
Log Sources

Fluentd Log Monitoring
Inspect application activity for any signs of suspicious behavior.
Log Sources

Zeek Log Monitoring
Inspect network traffic and DNS protocols for suspicious activity.
Log Sources

Cisco Umbrella Log Monitoring
Identify any suspicious or malicious domain addresses or DNS requests.
Log Sources

Juniper Log Monitoring
Monitor network traffic for attack attempts or probes.
Log Sources

Suricata Log Monitoring
Identify any suspicious traffic or domain activity.
Log Sources

Lacework Log Monitoring
Gain complete visibility into your cloud and container environments.
Log Sources

Teleport Log Monitoring
Inspect all SSH access activity for signs of suspicious behavior.
Log Sources

Apache Log Monitoring
Inspect all web activity for signs of suspicious behavior.
Log Sources

GitLab Log Monitoring
Identify any suspicious behavior within your GitLab environment.
Log Sources

Okta Log Monitoring
Monitor Okta logs to gain complete visibility into your IdP activity.
Log Sources

OneLogin Log Monitoring
Monitor your IdP for suspicious activity.
Log Sources

Google Workspace (G Suite) Log Monitoring
Identify any suspicious activity within your Google Workspace applications.
Log Sources

Box Log Monitoring
Gain complete visibility into your organization’s content management and file sharing.
Log Sources

Snowflake
Build a robust security data lake in Snowflake.
Data Lake

AWS CloudTrail Log Analyzer
Track account changes in real-time and detect suspicious activity
Cloud Resources

S3 Buckets
Detect and alert on unauthorized access to your S3 buckets.
Cloud Resources

EC2 VPC
Capture traffic activity and monitor actual network traffic flows.
Cloud Resources

GuardDuty
Track real-time changes to your AWS GuardDuty
Cloud Resources

Lambda
Track real-time changes to your AWS Lambda
Cloud Resources

WAF Web ACL
Track real-time changes to your WAF ACLs
Cloud Resources

ALB
Audit changes to AWS Application Load Balancer
Cloud Resources

ACM Certificate
Audit changes to AWS Certificate manager
Cloud Resources

Redshift Cluster
Audit changes to AWS Redshift Clusters
Cloud Resources

DynamoDB Table
Continuously monitor AWS DynamoDB tables for compliance
Cloud Resources

Config Recorder
Audit changes to AWS Config Recorder
Cloud Resources

CloudWatch Log group
Track real-time changes to AWS CloudWatch Log group
Cloud Resources

CloudFormation Stack
Track real-time changes to AWS CloudFormation stacks
Cloud Resources

RDS Instance
Get alerted in real-time when a RDS change occurs.
Cloud Resources

Password Policy
Monitor password policies for your AWS account
Cloud Resources

IAM
Track real-time changes to IAM User, Group, Role, and Policy
Cloud Resources

KMS Key
Follow the highest standards of cryptographic practices.
Cloud Resources

ECS Cluster
Gain visibility into specific ECS environments in real-time.
Cloud Resources

OSSEC Log Monitoring
Monitor OSSEC logs to gain complete security visibility into host activity.
Log Sources

Asana
Send Panther alerts to Asana and analyze the issue.
Alert Destinations

OpsGenie
Send Panther alerts to OpsGenie and begin an investigation.
Alert Destinations

Jira
Send Panther alerts to Jira and analyze the issue
Alert Destinations

Slack
Send Panther alerts to a designated Slack channel.
Alert Destinations

GitHub
Send Panther alerts to GitHub and analyze the issue
Alert Destinations

SQS
Send programmatic notifications to emails with Panther via SQS
Alert Destinations

Microsoft Teams
Send Panther alerts to a designated Microsoft Teams channel
Alert Destinations
Nginx Access Log Monitoring
Monitor Nginx access logs and gain complete visibility into web server activity.
Log Sources

Osquery Log Monitoring
Gain complete visibility into your operating system activity.
Log Sources
Ready for less noise
and more control?
See Panther in action. Book a demo today.
Get product updates, webinars, and news
By submitting this form, you acknowledge and agree that Panther will process your personal information in accordance with the Privacy Policy.
Get product updates, webinars, and news
By submitting this form, you acknowledge and agree that Panther will process your personal information in accordance with the Privacy Policy.
Product
Resources
Support
Company
Get product updates, webinars, and news
By submitting this form, you acknowledge and agree that Panther will process your personal information in accordance with the Privacy Policy.