# Integrations

## 1Password

![1Password logo](/docs/axoflow/integration-logos/1password.svg)

Source

###  1Password 

Manages and secures user credentials, secrets, and vaults for individuals and organizations.

[Contact support](<https://axoflow.com/contact?contact_form_subject=support_request>)

## A10 Networks

![vThunder logo](/docs/axoflow/integration-logos/a10networks.svg)

Source

###  A10 Networks vThunder 

Delivers application load balancing, traffic management, and DDoS protection for enterprise networks.

[Contact support](<https://axoflow.com/contact?contact_form_subject=support_request>)

## Amazon

![AWS CloudTrail logo](/docs/axoflow/integration-logos/amazon.aws-cloudtrail.svg)

Source

###  Amazon AWS CloudTrail 

Tracks AWS account activity and API usage for auditing, governance, and compliance monitoring.

[Contact support](<https://axoflow.com/contact?contact_form_subject=support_request>)

![AWS CloudWatch logo](/docs/axoflow/integration-logos/amazon.aws-cloudwatch.svg)

Source

###  Amazon AWS CloudWatch 

Monitors AWS resources and applications by collecting metrics, logs, and setting alarms.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/amazon/cloudwatch/>)

![AWS S3 logo](/docs/axoflow/integration-logos/amazon.aws-s3.svg)

Destination

###  Amazon AWS S3 

Scalable cloud storage service for storing and retrieving any amount of data via object storage.

[Documentation](<https://axoflow.com/docs/axoflow/destinations/amazon/s3/>)

![AWS Security Lake logo](/docs/axoflow/integration-logos/amazon.aws-security-lake.svg)

Destination

###  Amazon AWS Security Lake 

Centralizes and normalizes security data from AWS and third-party sources for analytics and compliance.

[Contact support](<https://axoflow.com/contact?contact_form_subject=support_request>)

## Axoflow

![AxoRouter logo](/docs/axoflow/integration-logos/axoflow.svg)

###  Axoflow AxoRouter 

Manages and routes event flow through pipelines, including filtering, parsing, and transformations.

[Documentation](<https://axoflow.com/docs/axoflow/data-management/flow-management/flows/>)

![AxoStore logo](/docs/axoflow/integration-logos/axoflow.svg)

###  Axoflow AxoStore 

AxoStore is a lightweight, queryable, temporary storage option that stores data locally on the AxoRouter host. AxoConsole provides federated search for AxoStore.

[Documentation](<https://axoflow.com/docs/axoflow/destinations/axorouter-storage/>)

![AxoSyslog logo](/docs/axoflow/integration-logos/axoflow.axosyslog.svg)

###  Axoflow AxoSyslog 

High-performance, configurable syslog service for collecting, processing, and forwarding log data.

[Documentation](<https://axoflow.com/docs/axoflow/onboard-hosts/provisioning/axosyslog/>)

![Telemetry Controller logo](/docs/axoflow/integration-logos/axoflow.svg)

###  Axoflow Telemetry Controller 

Telemetry Controller collects, routes and forwards telemetry data (logs, metrics and traces) from Kubernetes clusters supporting multi-tenancy out of the box.

[Contact support](<https://axoflow.com/contact?contact_form_subject=support_request>)

## Box, Inc.

![Box logo](/docs/axoflow/integration-logos/box.svg)

Source

###  Box, Inc. Box 

Cloud-based content management and file sharing platform designed for secure collaboration and storage.

[Contact support](<https://axoflow.com/contact?contact_form_subject=support_request>)

## Broadcom

![Edge Secure Web Gateway \(Edge SWG\) logo](/docs/axoflow/integration-logos/broadcom.svg)

Source

###  Broadcom Edge Secure Web Gateway (Edge SWG) 

Secures web traffic through policy enforcement, SSL inspection, and real-time threat protection.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/broadcom/edge-swg/>)

![ESX logo](/docs/axoflow/integration-logos/broadcom.svg)

Source

###  Broadcom ESX 

The primary function of ESX is to partition a physical server into multiple virtual machines (VMs), allowing different operating systems to run simultaneously and improving hardware utilization.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/vmware/esx/>)

![NSX logo](/docs/axoflow/integration-logos/broadcom.svg)

Source

###  Broadcom NSX 

Provides network virtualization, micro-segmentation, and security for software-defined data centers.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/vmware/nsx/>)

![vCenter logo](/docs/axoflow/integration-logos/broadcom.svg)

Source

###  Broadcom vCenter 

vCenter is a centralized management platform that provides a single console for managing an entire VMware vSphere virtual infrastructure, including multiple ESXi hosts and virtual machines.

[Documentation](<https://techdocs.broadcom.com/us/en/vmware-cis/vsphere/vsphere/7-0/vcenter-and-host-management-7-0.html>)

## Check Point Software

![Anti-Bot logo](/docs/axoflow/integration-logos/checkpoint.svg)

Source

###  Check Point Software Anti-Bot 

Detects and blocks botnet communications and command-and-control traffic to prevent malware infections.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/checkpoint/anti-bot/>)

![Anti-Malware logo](/docs/axoflow/integration-logos/checkpoint.svg)

Source

###  Check Point Software Anti-Malware 

Protects endpoints from viruses, ransomware, and other malware using signature and behavior analysis.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/checkpoint/anti-malware/>)

![Anti-Phishing logo](/docs/axoflow/integration-logos/checkpoint.svg)

Source

###  Check Point Software Anti-Phishing 

Prevents phishing attacks by analyzing email content and links to block credential theft attempts.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/checkpoint/anti-phishing/>)

![Anti-Spam and Email Security logo](/docs/axoflow/integration-logos/checkpoint.svg)

Source

###  Check Point Software Anti-Spam and Email Security 

Blocks spam and malicious email content using reputation checks and email filtering techniques.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/checkpoint/antispam-emailsecurity/>)

![Quantum logo](/docs/axoflow/integration-logos/checkpoint.checkpoint-quantum.svg)

Source

###  Check Point Software Quantum 

Unified threat prevention platform delivering firewall, VPN, and intrusion prevention capabilities.

[Contact support](<https://axoflow.com/contact?contact_form_subject=support_request>)

![CPMI Client logo](/docs/axoflow/integration-logos/checkpoint.svg)

Source

###  Check Point Software CPMI Client 

Legacy Check Point management client used to interface with security policies and logs.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/checkpoint/cpmi-client/>)

![cpmidu_update_tool logo](/docs/axoflow/integration-logos/checkpoint.svg)

Source

###  Check Point Software cpmidu_update_tool 

Utility used to update configuration and database files for Check Point Multi-Domain environments.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/checkpoint/cpmidu-update-tool/>)

![Database Tool logo](/docs/axoflow/integration-logos/checkpoint.svg)

Source

###  Check Point Software Database Tool 

Command-line tool to extract, query, or update Check Point configuration and policy databases.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/checkpoint/database-tool/>)

![Endpoint Compliance logo](/docs/axoflow/integration-logos/checkpoint.svg)

Source

###  Check Point Software Endpoint Compliance 

Checks endpoint status and posture before granting network access, enforcing security policies.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/checkpoint/endpoint-compliance/>)

![Endpoint Management logo](/docs/axoflow/integration-logos/checkpoint.svg)

Source

###  Check Point Software Endpoint Management 

Centralized platform for managing endpoint protection, updates, and policy enforcement.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/checkpoint/endpoint-management/>)

![Next-Generation Firewall \(NGFW\) logo](/docs/axoflow/integration-logos/checkpoint.svg)

Source

###  Check Point Software Next-Generation Firewall (NGFW) 

Next-generation firewall providing intrusion prevention, application control, and threat protection.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/checkpoint/ngfw/>)

![Forensics logo](/docs/axoflow/integration-logos/checkpoint.svg)

Source

###  Check Point Software Forensics 

Analyzes security incidents on endpoints to uncover attack vectors and malicious activity.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/checkpoint/forensics/>)

![Generic Checkpoint Product logo](/docs/axoflow/integration-logos/checkpoint.svg)

Source

###  Check Point Software Generic Checkpoint Product 

Placeholder integration used for generic or unsupported Check Point log sources.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/checkpoint/generic/>)

![GO Password Reset logo](/docs/axoflow/integration-logos/checkpoint.svg)

Source

###  Check Point Software GO Password Reset 

Facilitates secure password reset processes for users across integrated environments.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/checkpoint/go-password-reset/>)

![HTTPS Inspection logo](/docs/axoflow/integration-logos/checkpoint.svg)

Source

###  Check Point Software HTTPS Inspection 

Decrypts and inspects HTTPS traffic to detect hidden threats within encrypted web sessions.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/checkpoint/https-inspection/>)

![Edge Secure Web Gateway \(Edge SWG\) logo](/docs/axoflow/integration-logos/checkpoint.svg)

Source

###  Check Point Software Edge Secure Web Gateway (Edge SWG) 

Provides configuration profiles for secure mobile access and web filtering on iOS devices.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/checkpoint/ios-profiles/>)

![IPS logo](/docs/axoflow/integration-logos/checkpoint.svg)

Source

###  Check Point Software IPS 

Detects and blocks known and unknown exploits, malware, and vulnerabilities in network traffic.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/checkpoint/ips/>)

![MDS Query Tool logo](/docs/axoflow/integration-logos/checkpoint.svg)

Source

###  Check Point Software MDS Query Tool 

CLI tool for querying multi-domain configurations and policies in Check Point environments.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/checkpoint/mds-query-tool/>)

![Media Encryption & Port Protection logo](/docs/axoflow/integration-logos/checkpoint.svg)

Source

###  Check Point Software Media Encryption & Port Protection 

Secures USB ports and encrypts removable media to protect sensitive data on endpoints.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/checkpoint/media-encryption-and-port-protection/>)

![Mobile Access logo](/docs/axoflow/integration-logos/checkpoint.svg)

Source

###  Check Point Software Mobile Access 

Enables secure remote access to corporate apps and data from mobile devices.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/checkpoint/mobile-access/>)

![QoS logo](/docs/axoflow/integration-logos/checkpoint.svg)

Source

###  Check Point Software QoS 

Implements bandwidth control and traffic prioritization policies for optimized network usage.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/checkpoint/qos/>)

![Query Database logo](/docs/axoflow/integration-logos/checkpoint.svg)

Source

###  Check Point Software Query Database 

Accesses and queries internal policy or object databases in Check Point systems.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/checkpoint/query-database/>)

![SmartConsole logo](/docs/axoflow/integration-logos/checkpoint.svg)

Source

###  Check Point Software SmartConsole 

Graphical interface for managing Check Point security policies, logs, and monitoring.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/checkpoint/smartconsole/>)

![SmartUpdate logo](/docs/axoflow/integration-logos/checkpoint.svg)

Source

###  Check Point Software SmartUpdate 

Tool for updating and managing licenses, software, and hotfixes in Check Point environments.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/checkpoint/smartupdate/>)

![Syslog Data logo](/docs/axoflow/integration-logos/checkpoint.svg)

Source

###  Check Point Software Syslog Data 

Enables export of Check Point logs via syslog to external monitoring and SIEM platforms.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/checkpoint/syslog/>)

![Threat Emulation and Anti-Exploit logo](/docs/axoflow/integration-logos/checkpoint.svg)

Source

###  Check Point Software Threat Emulation and Anti-Exploit 

Emulates files in a virtual environment to detect and block advanced persistent threats and exploits.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/checkpoint/threat-emulation/>)

![URL Filtering logo](/docs/axoflow/integration-logos/checkpoint.svg)

Source

###  Check Point Software URL Filtering 

Controls and logs web access based on URL categories and custom site rules to enforce policy.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/checkpoint/url-filtering/>)

![Web API logo](/docs/axoflow/integration-logos/checkpoint.svg)

Source

###  Check Point Software Web API 

Provides programmatic access to Check Point security management through RESTful API endpoints.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/checkpoint/web-api/>)

## Cisco

![Application Control Engine \(ACE\) logo](/docs/axoflow/integration-logos/cisco.svg)

Source

###  Cisco Application Control Engine (ACE) 

Provides application-aware load balancing, SSL offload, and traffic control for Cisco networks.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/cisco/ace/>)

![Access Control System \(ACS\) logo](/docs/axoflow/integration-logos/cisco.svg)

Source

###  Cisco Access Control System (ACS) 

Centralizes network access control with RADIUS and TACACS+ for authentication and authorization.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/cisco/acs/>)

![Adaptive Security Appliance \(ASA\) logo](/docs/axoflow/integration-logos/cisco.svg)

Source

###  Cisco Adaptive Security Appliance (ASA) 

Provides stateful firewall, VPN support, and advanced threat protection for secure network perimeters.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/cisco/asa/>)

![Cisco Catalyst logo](/docs/axoflow/integration-logos/cisco.svg)

Source

###  Cisco Catalyst 

Delivers enterprise-grade Ethernet switching with high performance, security, and scalable management.

[Contact support](<https://axoflow.com/contact?contact_form_subject=support_request>)

![Integrated Management Controller \(IMC\) logo](/docs/axoflow/integration-logos/cisco.svg)

Source

###  Cisco Integrated Management Controller (IMC) 

Provides out-of-band server management for Cisco UCS, enabling hardware monitoring and configuration.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/cisco/cimc/>)

![Digital Network Architecture \(DNA\) logo](/docs/axoflow/integration-logos/cisco.dna.svg)

Source

###  Cisco Digital Network Architecture (DNA) 

Provides software-defined networking, policy automation, and analytics for enterprise infrastructure.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/cisco/dna/>)

![Duo logo](/docs/axoflow/integration-logos/cisco.duo.svg)

Source

###  Cisco Duo 

Delivers two-factor authentication and secure access controls to protect users and applications.

[Contact support](<https://axoflow.com/contact?contact_form_subject=support_request>)

![Email Security Appliance \(ESA\) logo](/docs/axoflow/integration-logos/cisco.svg)

Source

###  Cisco Email Security Appliance (ESA) 

Protects email systems from spam, phishing, malware, and data loss with advanced threat filtering.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/cisco/esa/>)

![Firepower logo](/docs/axoflow/integration-logos/cisco.svg)

Source

###  Cisco Firepower 

Provides next-gen firewall features including intrusion prevention, app control, and malware protection.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/cisco/firepower/>)

![Firepower Threat Defence \(FTD\) logo](/docs/axoflow/integration-logos/cisco.svg)

Source

###  Cisco Firepower Threat Defence (FTD) 

Unifies firewall, VPN, and intrusion prevention into a single software for comprehensive threat defense.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/cisco/ftd/>)

![Firewall Services Module \(FWSM\) logo](/docs/axoflow/integration-logos/cisco.svg)

Source

###  Cisco Firewall Services Module (FWSM) 

Delivers multi-context, high-performance firewall services integrated into Cisco Catalyst switches.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/cisco/fwsm/>)

![Internetwork Operating System logo](/docs/axoflow/integration-logos/cisco.svg)

Source

###  Cisco Internetwork Operating System 

Network operating system for Cisco routers and switches, enabling routing, switching, and security.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/cisco/ios/>)

![Identity Services Engine \(ISE\) logo](/docs/axoflow/integration-logos/cisco.svg)

Source

###  Cisco Identity Services Engine (ISE) 

Manages network access control and enforces policies with user and device authentication capabilities.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/cisco/ise/>)

![Meraki MX logo](/docs/axoflow/integration-logos/cisco.svg)

Source

###  Cisco Meraki MX 

Cloud-managed network appliance offering firewall, VPN, SD-WAN, and security in a single platform.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/cisco/meraki/>)

![Secure Firewall logo](/docs/axoflow/integration-logos/cisco.svg)

Source

###  Cisco Secure Firewall 

Provides advanced threat protection and policy-based access control.

[Contact support](<https://axoflow.com/contact?contact_form_subject=support_request>)

![Private Internet eXchange \(PIX\) logo](/docs/axoflow/integration-logos/cisco.svg)

Source

###  Cisco Private Internet eXchange (PIX) 

Legacy firewall appliance delivering stateful inspection and secure network access control.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/cisco/pix/>)

![TelePresence Video Communication Server \(VCS\) logo](/docs/axoflow/integration-logos/cisco.svg)

Source

###  Cisco TelePresence Video Communication Server (VCS) 

Enables video conferencing control and call routing for Cisco TelePresence systems and endpoints.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/cisco/tvcs/>)

![Unified Communications Manager \(UCM\) logo](/docs/axoflow/integration-logos/cisco.svg)

Source

###  Cisco Unified Communications Manager (UCM) 

Delivers unified voice, video, messaging, and mobility services in enterprise IP telephony systems.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/cisco/ucm/>)

![HyperFlex \(HX, UCSH\) logo](/docs/axoflow/integration-logos/cisco.svg)

Source

###  Cisco HyperFlex (HX, UCSH) 

Infrastructure solution combining compute, storage, and networking in a single system.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/cisco/ucsh/>)

![Unified Computing System Manager \(UCSM\) logo](/docs/axoflow/integration-logos/cisco.svg)

Source

###  Cisco Unified Computing System Manager (UCSM) 

Centralized management platform for Cisco Unified Computing System (UCS) servers and resources.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/cisco/ucsm/>)

![Viptela logo](/docs/axoflow/integration-logos/cisco.viptela.svg)

Source

###  Cisco Viptela 

Software-defined WAN solution providing secure connectivity, centralized control, and traffic optimization.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/cisco/viptela/>)

![IOS XR logo](/docs/axoflow/integration-logos/cisco.svg)

Source

###  Cisco IOS XR 

High-performance, modular network operating system for carrier-grade routing and scalability.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/cisco/xr/>)

## Citrix

![NetScaler logo](/docs/axoflow/integration-logos/citrix.netscaler.svg)

Source

###  Citrix NetScaler 

Offers application delivery, load balancing, and security features for optimized app performance.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/citrix/netscaler/>)

## ClickHouse

![ClickHouse logo](/docs/axoflow/integration-logos/clickhouse.svg)

Destination

###  ClickHouse 

Columnar database optimized for real-time analytics on large datasets with high performance and scalability.

[Documentation](<https://axoflow.com/docs/axoflow/destinations/clickhouse/>)

## Coda

![Coda logo](/docs/axoflow/integration-logos/coda.svg)

Source

###  Coda 

All-in-one collaborative document platform combining text, spreadsheets, and integrations into a single workspace.

[Contact support](<https://axoflow.com/contact?contact_form_subject=support_request>)

## Confluent

![Confluent logo](/docs/axoflow/integration-logos/confluent.svg)

Destination

###  Confluent 

[Contact support](<https://axoflow.com/contact?contact_form_subject=support_request>)

## Corelight

![NDR Platform logo](/docs/axoflow/integration-logos/corelight.svg)

Source

###  Corelight NDR Platform 

Provides network detection and response by analyzing traffic for advanced threats and anomalous behavior.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/corelight/ndr-platform/>)

## CrowdStrike

![Falcon LogScale logo](/docs/axoflow/integration-logos/crowdstrike.svg)

Destination

###  CrowdStrike Falcon LogScale 

Cloud-native platform for endpoint detection, threat hunting, and security analytics at scale.

[Contact support](<https://axoflow.com/contact?contact_form_subject=support_request>)

![Falcon Platform logo](/docs/axoflow/integration-logos/crowdstrike.svg)

Source

###  CrowdStrike Falcon Platform 

CrowdStrike Falcon is a cloud-native, AI-powered cybersecurity platform designed to stop breaches by protecting endpoints, cloud workloads, identity, and data.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/crowdstrike/falcon/>)

## CyberArk

![Privileged Threat Analytics \(PTA\) logo](/docs/axoflow/integration-logos/cyberark.svg)

Source

###  CyberArk Privileged Threat Analytics (PTA) 

Analyzes privileged account behavior to detect threats and suspicious activity in real time.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/cyberark/pta/>)

![Vault logo](/docs/axoflow/integration-logos/cyberark.svg)

Source

###  CyberArk Vault 

Stores and manages privileged credentials, session recordings, and access control policies securely.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/cyberark/vault/>)

## Databricks

![Databricks logo](/docs/axoflow/integration-logos/databricks.svg)

Destination

###  Databricks 

Unified analytics platform for data engineering, machine learning, and collaborative data science workflows.

[Contact support](<https://axoflow.com/contact?contact_form_subject=support_request>)

## Datadog

![Datadog logo](/docs/axoflow/integration-logos/datadog.svg)

Destination

###  Datadog 

Observability platform that provides monitoring for infrastructure, applications, logs, and security events.

[Contact support](<https://axoflow.com/contact?contact_form_subject=support_request>)

## DELL

![SonicWall logo](/docs/axoflow/integration-logos/dell.sonicwall.svg)

Source

###  DELL SonicWall 

Delivers firewall, VPN, and deep packet inspection to protect networks from cyber threats and intrusions.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/dell/sonicwall/>)

## Dynatrace

![Dynatrace logo](/docs/axoflow/integration-logos/dynatrace.svg)

Destination

###  Dynatrace 

Unified Observability — Drive business transformation with contextual analytics, AI, and automation.

[Documentation](<https://axoflow.com/docs/axoflow/destinations/dynatrace/>)

## Elastic

![Elasticsearch logo](/docs/axoflow/integration-logos/elastic.elasticsearch.svg)

Destination

###  Elasticsearch 

Distributed search and analytics engine for real-time log analysis, observability, and data indexing.

[Documentation](<https://axoflow.com/docs/axoflow/destinations/elastic/elastic-cloud/>)

## F5 Networks

![BIG-IP logo](/docs/axoflow/integration-logos/f5.svg)

Source

###  F5 Networks BIG-IP 

Provides load balancing, traffic management, and application security for optimized service delivery.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/f5/bigip/>)

## Forcepoint

![Email Security logo](/docs/axoflow/integration-logos/forcepoint.svg)

Source

###  Forcepoint Email Security 

Protects email systems from spam, phishing, malware, and data exfiltration using advanced threat defense.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/forcepoint/mail/>)

![NGFW logo](/docs/axoflow/integration-logos/forcepoint.svg)

Source

###  Forcepoint NGFW 

Next-gen firewall with deep packet inspection, policy enforcement, and integrated intrusion prevention.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/forcepoint/firewall/>)

![Web Security logo](/docs/axoflow/integration-logos/forcepoint.svg)

Source

###  Forcepoint Web Security 

Provides web traffic filtering, malware protection, and data loss prevention for secure internet access.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/forcepoint/webprotect/>)

## Fortinet

![FortiGate logo](/docs/axoflow/integration-logos/fortinet.svg)

Source

###  Fortinet FortiGate 

Enterprise firewall platform offering threat protection, VPN, and traffic filtering for secure networking.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/fortinet/fortigate/>)

![FortiMail logo](/docs/axoflow/integration-logos/fortinet.svg)

Source

###  Fortinet FortiMail 

Secures inbound and outbound email with spam filtering, malware protection, and advanced threat detection.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/fortinet/fortimail/>)

![FortiProxy logo](/docs/axoflow/integration-logos/fortinet.svg)

Source

###  Fortinet FortiProxy 

Protects from internet threats like malware, phishing, and data loss by inspecting web traffic, filtering content, controlling applications, and enforcing security policies

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/fortinet/fortiproxy/>)

![FortiWeb logo](/docs/axoflow/integration-logos/fortinet.svg)

Source

###  Fortinet FortiWeb 

Web application firewall protecting websites from attacks like XSS, SQL injection, and bot threats.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/fortinet/fortiweb/>)

## Fortra

![Powertech SIEM Agent for IBM i logo](/docs/axoflow/integration-logos/fortra.svg)

Source

###  Fortra Powertech SIEM Agent for IBM i 

Monitors IBM i system activity and forwards security events for centralized analysis in SIEM platforms.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/fortra/powertech/>)

## Generic

![/dev/null logo](/docs/axoflow/integration-logos/generic.devnull.svg)

Destination

###  Generic /dev/null 

Blackhole destination for testing or discarding events without storing them.

[Documentation](<https://axoflow.com/docs/axoflow/destinations/generic/devnull/>)

![Syslog logo](/docs/axoflow/integration-logos/generic.syslog.svg)

Source, Destination

###  Generic Syslog 

Standard protocol for system logs. Our source automatically detects, parses, and classifies incoming syslog events without pre-configuration.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/syslog/>)

![Webhook logo](/docs/axoflow/integration-logos/generic.webhook.svg)

Source

###  Generic Webhook 

Receives data via HTTP POST requests for flexible event-driven integration.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/webhook/>)

## Google

![Google Workspace Admin logo](/docs/axoflow/integration-logos/google.svg)

Source

###  Google Workspace Admin 

Captures administrative events and configuration changes across the Google Workspace environment.

[Contact support](<https://axoflow.com/contact?contact_form_subject=support_request>)

![Google Workspace Alert logo](/docs/axoflow/integration-logos/google.svg)

Source

###  Google Workspace Alert 

Generates security and compliance alerts for suspicious user activity within Google Workspace services.

[Contact support](<https://axoflow.com/contact?contact_form_subject=support_request>)

![Pub/Sub logo](/docs/axoflow/integration-logos/google.svg)

Destination

###  Google Pub/Sub 

Asynchronous messaging service for ingesting and distributing event data between services and applications.

[Documentation](<https://axoflow.com/docs/axoflow/destinations/google/pubsub/>)

![SecOps logo](/docs/axoflow/integration-logos/google.svg)

Destination

###  Google SecOps 

A cloud service designed for enterprises to privately retain, analyze, and search the massive amounts of security and network telemetry they generate.

[Documentation](<https://axoflow.com/docs/axoflow/destinations/google/secops/>)

## Grafana

![Grafana Loki logo](/docs/axoflow/integration-logos/grafana.grafana-loki.svg)

Destination

###  Grafana Loki 

Scalable log aggregation system optimized for storing and querying logs by labels using Grafana.

[Contact support](<https://axoflow.com/contact?contact_form_subject=support_request>)

## HAProxy

![HAProxy logo](/docs/axoflow/integration-logos/haproxy.svg)

Source

###  HAProxy 

High-performance TCP/HTTP load balancer and reverse proxy for increasing reliability and scalability.

[Contact support](<https://axoflow.com/contact?contact_form_subject=support_request>)

## Hewlett Packard Enterprise

![Aruba Networks logo](/docs/axoflow/integration-logos/hpe.aruba.svg)

Source

###  Hewlett Packard Enterprise Aruba Networks 

Enterprise-grade networking gear for wireless, wired, and security management across distributed networks.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/hpe/aruba/>)

## Imperva

![Incapsula logo](/docs/axoflow/integration-logos/imperva.incapsula.svg)

Source

###  Imperva Incapsula 

Cloud-based WAF, DDoS protection, and bot mitigation service for securing web applications and APIs.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/imperva/incapsula/>)

![SecureSphere logo](/docs/axoflow/integration-logos/imperva.securesphere.svg)

Source

###  Imperva SecureSphere 

Provides on-prem web application, database, and file security with granular activity monitoring.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/imperva/securesphere/>)

## Infoblox

![NIOS logo](/docs/axoflow/integration-logos/infoblox.svg)

Source

###  Infoblox NIOS 

Delivers secure DNS, DHCP, and IPAM (DDI) services with centralized network control and automation.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/infoblox/nios/>)

## Ivanti

![Connect Secure logo](/docs/axoflow/integration-logos/ivanti.svg)

Source

###  Ivanti Connect Secure 

Provides dynamic IP address assignment and network configuration for DHCP-enabled devices.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/ivanti/connect-secure/>)

## Juniper Networks

![Junos OS logo](/docs/axoflow/integration-logos/juniper.junos.svg)

Source

###  Juniper Networks Junos OS 

Junos OS is the network operating system for Juniper physical and virtual networking and security products.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/juniper/junos/>)

## Kafka

![Apache Kafka logo](/docs/axoflow/integration-logos/kafka.svg)

Destination

###  Kafka Apache Kafka 

Distributed event streaming platform used for building real-time data pipelines and stream processing.

[Contact support](<https://axoflow.com/contact?contact_form_subject=support_request>)

## Kaspersky

![Endpoint Security logo](/docs/axoflow/integration-logos/kaspersky.svg)

Source

###  Kaspersky Endpoint Security 

Protects endpoints from malware, ransomware, and intrusions with antivirus, firewall, and threat detection.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/kaspersky/endpoint_security/>)

## Kubernetes

![Ingress NGINX Controller logo](/docs/axoflow/integration-logos/kubernetes.nginx.svg)

Source

###  Kubernetes Ingress NGINX Controller 

Ingress NGINX Controller

[Contact support](<https://axoflow.com/contact?contact_form_subject=support_request>)

![Telemetry Controller logo](/docs/axoflow/integration-logos/kubernetes.svg)

Source

###  Kubernetes Telemetry Controller 

Telemetry Controller

[Contact support](<https://axoflow.com/contact?contact_form_subject=support_request>)

## Microsoft

![Azure Blob Storage logo](/docs/axoflow/integration-logos/microsoft.azure-blob-storage.svg)

Destination

###  Microsoft Azure Blob Storage 

Cloud-based object storage optimized for unstructured data like backups, logs, and media files.

[Contact support](<https://axoflow.com/contact?contact_form_subject=support_request>)

![Azure Event Hubs logo](/docs/axoflow/integration-logos/microsoft.azure-event-hubs.svg)

Source

###  Microsoft Azure Event Hubs 

Big data streaming platform to ingest and process events.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/microsoft/azure-event-hubs/>)

![Azure Monitor logo](/docs/axoflow/integration-logos/microsoft.azure-monitor.svg)

Destination

###  Microsoft Azure Monitor 

Collects and analyzes telemetry from applications and infrastructure to monitor performance and usage.

[Documentation](<https://axoflow.com/docs/axoflow/destinations/microsoft/azure-monitor/>)

![Cloud App Security \(MCAS\) logo](/docs/axoflow/integration-logos/microsoft.svg)

Source

###  Microsoft Cloud App Security (MCAS) 

Monitors cloud app usage, detects anomalies, and enforces security policies across SaaS services.

[Documentation](<https://axoflow.com/docs/axoflow/destinations/microsoft/mcas/>)

![GitHub logo](/docs/axoflow/integration-logos/microsoft.github.svg)

Source

###  Microsoft GitHub 

Provides audit and event data for code repositories, development workflows, and security scans.

[Contact support](<https://axoflow.com/contact?contact_form_subject=support_request>)

![Office 365 logo](/docs/axoflow/integration-logos/microsoft.office365.svg)

Source

###  Microsoft Office 365 

Generates user activity and audit logs from Exchange, SharePoint, Teams, and other Office 365 services.

[Contact support](<https://axoflow.com/contact?contact_form_subject=support_request>)

![Sentinel logo](/docs/axoflow/integration-logos/microsoft.sentinel.svg)

Destination

###  Microsoft Sentinel 

Cloud-native SIEM and SOAR platform for collecting, analyzing, and responding to security threats.

[Documentation](<https://axoflow.com/docs/axoflow/destinations/microsoft/sentinel/>)

![Windows logo](/docs/axoflow/integration-logos/microsoft.svg)

Source

###  Microsoft Windows 

Event logs from core services like security, system, DNS, and DHCP for operational and forensic analysis.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/microsoft/windows/>)

![Windows Event Log logo](/docs/axoflow/integration-logos/microsoft.svg)

Source

###  Microsoft Windows Event Log 

Collects Windows Event Log data via OpenTelemetry Collector for centralized log analysis and monitoring.

[Documentation](<https://axoflow.com/docs/axoflow/edge-collection/windows-eventlog>)

![Windows Event Tracing logo](/docs/axoflow/integration-logos/microsoft.svg)

Source

###  Microsoft Windows Event Tracing 

Collects Windows Event Tracing data via OpenTelemetry Collector for centralized log analysis and monitoring.

[Documentation](<https://axoflow.com/docs/axoflow/edge-collection/windows-event-tracing>)

![Windows Events logo](/docs/axoflow/integration-logos/microsoft.svg)

Source

###  Microsoft Windows Events 

Collects Windows Event Log data via WEC for centralized log analysis and monitoring.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/wec/>)

## MikroTik

![RouterOS logo](/docs/axoflow/integration-logos/mikrotik.svg)

Source

###  MikroTik RouterOS 

Router operating system providing firewall, bandwidth management, routing, and hotspot functionality.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/mikrotik/routeros/>)

## NetFlow Logic

![Optimizer logo](/docs/axoflow/integration-logos/netflow.svg)

Source

###  NetFlow Logic Optimizer 

Aggregates and transforms flow data (NetFlow, IPFIX) into actionable security and performance insights.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/netflow/optimizer/>)

## Netgate

![pfSense logo](/docs/axoflow/integration-logos/netgate.pfsense.svg)

Source

###  Netgate pfSense 

Open-source firewall and router platform with VPN, traffic shaping, and intrusion detection capabilities.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/netgate/pfsense/>)

## Netmotion

![Netmotion logo](/docs/axoflow/integration-logos/netmotion.svg)

Source

###  Netmotion 

Provides secure, optimized remote access with performance monitoring for mobile and distributed workforces.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/netmotion/netmotion/>)

## NETSCOUT

![Arbor Edge Defense \(AED\) logo](/docs/axoflow/integration-logos/netscout.svg)

Source

###  NETSCOUT Arbor Edge Defense (AED) 

Edge-based DDoS protection and threat mitigation system to block attacks before they enter the network.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/netscout/arbor-edge-defense/>)

![Pravail \(APS\) logo](/docs/axoflow/integration-logos/netscout.svg)

Source

###  NETSCOUT Pravail (APS) 

Monitors and mitigates advanced persistent threats and malware with inline packet inspection.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/netscout/arbor-pravail/>)

## Generic UNIX/Linux host

Source

###  Generic UNIX/Linux host Generic Placeholder 

A generic placeholder for program classifications

[Contact support](<https://axoflow.com/contact?contact_form_subject=support_request>)

## Okta

![Auth0 logo](/docs/axoflow/integration-logos/okta.auth0.svg)

Source

###  Okta Auth0 

Identity-as-a-Service platform offering authentication and authorization for apps and APIs.

[Contact support](<https://axoflow.com/contact?contact_form_subject=support_request>)

## Omnissa

![Horizon logo](/docs/axoflow/integration-logos/omnissa.horizon.svg)

Source

###  Omnissa Horizon 

Horizon is a platform for managing and delivering virtual desktops and applications to end-users across a variety of devices and locations.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/omnissa/horizon/>)

## OpenObserve

![OpenObserve logo](/docs/axoflow/integration-logos/openobserve.svg)

Destination

###  OpenObserve 

High-performance log analytics platform supporting structured log ingestion, search, and visualization.

[Documentation](<https://axoflow.com/docs/axoflow/destinations/openobserve/>)

## OpenSearch

![OpenSearch logo](/docs/axoflow/integration-logos/opensearch.svg)

Destination

###  OpenSearch 

Open-source search and analytics suite for log ingestion, indexing, dashboards, and alerting.

[Contact support](<https://axoflow.com/contact?contact_form_subject=support_request>)

## OpenTelemetry

![File Collector logo](/docs/axoflow/integration-logos/opentelemetry.otel-file.svg)

Source

###  OpenTelemetry File Collector 

Collects observability data like traces, metrics, and logs from applications using the axoflow-otel-collector.

[Documentation](<https://axoflow.com/docs/axoflow/edge-collection/opentelemetry-file/>)

![Journald Collector logo](/docs/axoflow/integration-logos/opentelemetry.otel-journald.svg)

Source

###  OpenTelemetry Journald Collector 

Parses Journald events from systemd journal using the axoflow-otel-collector.

[Documentation](<https://axoflow.com/docs/axoflow/edge-collection/opentelemetry-journald/>)

![OpenTelemetry \(OTLP\) logo](/docs/axoflow/integration-logos/opentelemetry.svg)

Source

###  OpenTelemetry (OTLP) 

Collects observability data like traces, metrics, and logs from applications using the OTLP protocol.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/opentelemetry/>)

## OpenText

![ArcSight logo](/docs/axoflow/integration-logos/opentext.svg)

Source

###  OpenText ArcSight 

SIEM platform for collecting, correlating, and analyzing security event data across IT environments.

[Contact support](<https://axoflow.com/contact?contact_form_subject=support_request>)

![Self Service Password Reset \(SSPR\) logo](/docs/axoflow/integration-logos/opentext.svg)

Source

###  OpenText Self Service Password Reset (SSPR) 

Allows users to securely reset their own passwords without IT assistance, reducing helpdesk load.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/opentext/sspr/>)

## Palo Alto Networks

![Cortex XSIAM logo](/docs/axoflow/integration-logos/palo-alto-networks.cortex-xsiam.svg)

Destination

###  Palo Alto Networks Cortex XSIAM 

Extended Security Intelligence and Analytics Management (XSIAM) platform for advanced threat detection and response.

[Documentation](<https://axoflow.com/docs/axoflow/destinations/palo-alto-networks/xsiam/>)

![Cortex XSOAR logo](/docs/axoflow/integration-logos/palo-alto-networks.cortex-xsoar.svg)

Source

###  Palo Alto Networks Cortex XSOAR 

Security orchestration, automation, and response platform for threat detection and incident management.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/palo-alto/cortex/>)

![PAN-OS logo](/docs/axoflow/integration-logos/palo-alto-networks.svg)

Source

###  Palo Alto Networks PAN-OS 

Firewall operating system delivering network security features including traffic control and threat prevention.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/palo-alto/pan-os/>)

## Ping Identity

![PingAccess logo](/docs/axoflow/integration-logos/ping-identity.svg)

Source

###  Ping Identity PingAccess 

A centralized access security solution which provides secure access to applications and APIs down to the URL level

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/ping-identity/pingaccess/>)

## Progress

![Flowmon ADS logo](/docs/axoflow/integration-logos/progress.svg)

Source

###  Progress Flowmon ADS 

Detects network anomalies and threats through flow-based behavior analysis and machine learning.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/progress/flowmon-ads>)

## Riverbed

![SteelConnect logo](/docs/axoflow/integration-logos/riverbed.svg)

Source

###  Riverbed SteelConnect 

Software-defined WAN solution for centralized network management and secure cloud connectivity.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/riverbed/steelconnect>)

![SteelHead logo](/docs/axoflow/integration-logos/riverbed.svg)

Source

###  Riverbed SteelHead 

WAN optimization appliance that accelerates application performance and reduces bandwidth usage.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/riverbed/steelhead/>)

## RSA

![Authentication Manager logo](/docs/axoflow/integration-logos/rsa.svg)

Source

###  RSA Authentication Manager 

Manages two-factor authentication using RSA SecurID tokens for secure access to enterprise resources.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/rsa/authentication-manager>)

## SecureAuth

![Identity Platform logo](/docs/axoflow/integration-logos/secureauth.svg)

Source

###  SecureAuth Identity Platform 

Delivers identity and access management with adaptive authentication and single sign-on capabilities.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/secureauth/idp/>)

## Skyhigh Security

![Secure Web Gateway logo](/docs/axoflow/integration-logos/skyhigh.svg)

Source

###  Skyhigh Security Secure Web Gateway 

Inspects and filters web traffic to protect against malware, enforce policies, and prevent data loss.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/skyhigh/secure-web-gateway/>)

## Slack

![Slack logo](/docs/axoflow/integration-logos/slack.svg)

Source

###  Slack 

Collaboration platform that captures workspace messages, file uploads, and user activity for auditing.

[Contact support](<https://axoflow.com/contact?contact_form_subject=support_request>)

## Snowflake

![Snowflake logo](/docs/axoflow/integration-logos/snowflake.svg)

Destination

###  Snowflake 

Cloud data platform for storing, querying, and analyzing large-scale structured and semi-structured data.

[Contact support](<https://axoflow.com/contact?contact_form_subject=support_request>)

## Splunk

![Splunk logo](/docs/axoflow/integration-logos/splunk.svg)

Destination

###  Splunk 

Ingests, indexes, and visualizes data for monitoring, analysis, and alerting.

[Documentation](<https://axoflow.com/docs/axoflow/destinations/splunk/cloud/>)

![Splunk \(as source\) logo](/docs/axoflow/integration-logos/splunk.svg)

Source

###  Splunk (as source) 

Receive data from Splunk.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/splunk/>)

![Splunk Universal Forwarder logo](/docs/axoflow/integration-logos/splunk.svg)

###  Splunk Universal Forwarder 

Agent that collects and forwards logs from remote systems to a central Splunk instance.

[Contact support](<https://axoflow.com/contact?contact_form_subject=support_request>)

## Sumo Logic

![Sumo Logic logo](/docs/axoflow/integration-logos/sumologic.svg)

Destination

###  Sumo Logic 

Cloud-native platform for log management, metrics analysis, and security analytics.

[Documentation](<https://axoflow.com/docs/axoflow/destinations/sumo-logic/>)

## Superna

![Eyeglass logo](/docs/axoflow/integration-logos/superna.svg)

Source

###  Superna Eyeglass 

Manages and automates data protection, DR, and reporting for PowerScale environments.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/superna/eyeglass/>)

## Tanium

![Platform logo](/docs/axoflow/integration-logos/tanium.svg)

Source

###  Tanium Platform 

Endpoint management and security software that provides organizations with visibility and control across their IT environments.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/tanium/platform/>)

## Thales

![Vormetric Data Security Platform logo](/docs/axoflow/integration-logos/thales.svg)

Source

###  Thales Vormetric Data Security Platform 

Provides data encryption, key management, and access controls across cloud and on-premise environments.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/thales/vormetric/>)

## Trellix

![Central Management System \(CMS\) logo](/docs/axoflow/integration-logos/trellix.svg)

Source

###  Trellix Central Management System (CMS) 

Centralized policy and configuration management platform for Trellix security products.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/trellix/cms/>)

![ePolicy Orchestrator \(EPO\) logo](/docs/axoflow/integration-logos/trellix.svg)

Source

###  Trellix ePolicy Orchestrator (EPO) 

Manages endpoint security policies and threat responses across distributed environments.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/trellix/epo/>)

![Email Threat Prevention \(ETP\) logo](/docs/axoflow/integration-logos/trellix.svg)

Source

###  Trellix Email Threat Prevention (ETP) 

Analyzes and filters email traffic to block phishing, malware, and targeted email-based threats.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/trellix/etp/>)

![Generic logo](/docs/axoflow/integration-logos/trellix.svg)

Source

###  Trellix Generic 

[Contact support](<https://axoflow.com/contact?contact_form_subject=support_request>)

![Endpoint Security \(HX\) logo](/docs/axoflow/integration-logos/trellix.svg)

Source

###  Trellix Endpoint Security (HX) 

Detects and responds to advanced threats on endpoints using behavior-based analysis and threat intel.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/trellix/hx/>)

![MPS logo](/docs/axoflow/integration-logos/trellix.svg)

Source

###  Trellix MPS 

Appliance for detecting and blocking advanced threats through inline malware inspection.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/trellix/mps/>)

## Trend Micro

![Deep Security Agent logo](/docs/axoflow/integration-logos/trend-micro.svg)

Source

###  Trend Micro Deep Security Agent 

Provides anti-malware, intrusion prevention, and log inspection for cloud and on-prem servers.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/trend-micro/deep-security/>)

## Ubiquiti

![Unifi logo](/docs/axoflow/integration-logos/ubiquiti.unifi.svg)

Source

###  Ubiquiti Unifi 

Manages network devices including routers, switches, and access points with centralized control.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/ubiquiti/unifi/>)

## Varonis

![DatAdvantage logo](/docs/axoflow/integration-logos/varonis.svg)

Source

###  Varonis DatAdvantage 

Monitors data access and permissions to detect insider threats and automate compliance reporting.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/varonis/datadvantage/>)

## Vectra AI

![X-Series logo](/docs/axoflow/integration-logos/vectra.svg)

Source

###  Vectra AI X-Series 

Detects and investigates cyberattacks across cloud, data center, and enterprise networks using AI.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/vectra/x-series/>)

## VMware

![VMware ESXi logo](/docs/axoflow/integration-logos/vmware.svg)

Source

###  VMware ESXi 

Bare-metal hypervisor that enables server virtualization and resource allocation for virtual machines.

[Contact support](<https://axoflow.com/contact?contact_form_subject=support_request>)

![VMware vCenter logo](/docs/axoflow/integration-logos/vmware.svg)

Source

###  VMware vCenter 

Centralized management platform for VMware vSphere environments and virtual infrastructure control.

[Contact support](<https://axoflow.com/contact?contact_form_subject=support_request>)

## Wiz

![Wiz logo](/docs/axoflow/integration-logos/wiz.svg)

Source

###  Wiz 

Cloud security platform offering visibility into misconfigurations, vulnerabilities, and compliance risks.

[Contact support](<https://axoflow.com/contact?contact_form_subject=support_request>)

## Zscaler

![Zscaler Internet Access logo](/docs/axoflow/integration-logos/zscaler.svg)

Source

###  Zscaler Internet Access 

Cloud-based secure internet gateway that inspects traffic for threats and enforces policies.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/zscaler/zia/>)

![ZScaler Private Access logo](/docs/axoflow/integration-logos/zscaler.svg)

Source

###  Zscaler ZScaler Private Access 

Provides secure remote access to internal apps without exposing them to the public internet.

[Documentation](<https://axoflow.com/docs/axoflow/data-sources/appliances/zscaler/zpa/>)