The Cato service generates rich and granular events, providing comprehensive visibility across network and security features. You can directly consume these events in the following ways:
-
Directly in the Cato Management Application (see Analyzing Events in Your Network)
-
A high-scale feed to Cloud Storage such as AWS S3 and Azure Blob Storage
-
Using the Cato API
In addition, Cato enables integrating with SIEM, observability, asset management, data collection, and other solutions as detailed in the SIEM Integration Guide for the Cato API. The list below presents vendor-supported integrations for Cato events. These vendors provide a readily available way to collect, analyze, and visualize Cato events using their platforms.
Vendor |
Vendor Documentation |
---|---|
|
|
|
|
|
Documentation > Reference > Supported log types and default parsers |
|
List of supported integrations on Hunters corporate website |
|
Custom Integrations - API > Cato Networks Custom Data Collection Integration |
|
|
|
|
|
|
|
Cloud-to-Cloud Integration Framework Sources > Cato Networks |
|
Zenoss ZenPack Catalog > Network> Cato Networks Integration ZenPack |
8 comments
Added Google Chronicle as a third-party SIEM vendor
Will you add Azure Sentinel in the future?
Thomas Capacci Yes - we are working on adding Azure Sentinel in the future.
Added Arctic Wolf, Axonius, and Zenoss as third-party SIEM vendors
Any future plans to add Crowdstrike Logscale direct integration?
Hi Joe,
Crowdstrike is a vendor with whom we'd be happy to work on an integration. If you have any contacts there you can put us in touch with, let us know.
Cheers,
Peter
I would like to see splunk enterprise added as well.
Hello Younggeol Yoon,
We are working on a more formal Splunk integration.
Regards,
Peter
Please sign in to leave a comment.