SlideShare a Scribd company logo
1 of 8
Download to read offline
Flyer
Security
In addition to connectors developed and main­
tained by ArcSight, we test and certify the
fol­
lowing connector types through our tech­
nology alliances program (TAP):
■
■ Common event format (CEF) certified—
helps ensure event information is captured
properly in the CEF
■
■ Action certified—allows for control of
a vendor’s technology from within the
ArcSight console
■
■ Forwarding connector—allows for
events to be forwarded from ArcSight to
partner solution
■
■ Please refer to the index section for
listing by connector type
ArcSight Connector Supported
Platform for Installation
■
■ CentOS Linux 6.7, 6.8, 6.9, 7.2, 7.3 and
7.4 64-bit
■
■ Microsoft Windows Server 2008 SP1/SP2
64-bit
■
■ Microsoft Windows Server 2012 Standard
and 2012 R2 64-bit
■
■ Microsoft Windows Server 2016 Standard
64-bit
■
■ Oracle Solaris 10, 11 64-bit (SPARC)
■
■ Oracle Solaris 11, 64-bit (x86_64)
■
■ Red Hat Enterprise Linux (RHEL) 6.7, 6.8,
6.9, 7.2, 7.3, 7.4, and 7.5 64-bit
■
■ SUSE Linux 11, 12 Enterprise Server
64-bit
Anti-Virus/Anti-Spam
■
■ Endgame
■
■ F-Secure Anti-Virus
■
■ Intel (McAfee) VirusScan Enterprise via (ePO)
■
■ Kaspersky Anti-Virus
■
■ Sophos
■
■ Symantec Endpoint Protection Manager
(SEPM) Database
■
■ Symantec Mail Security for Microsoft
Exchange
■
■ Trend Micro (TM) OfficeScan (Control
Manager and TM Control Manager
Database DB)
Application Security
■
■ Bit9 + Carbon Black Security Platform
■
■ CA Layer 7 SecureSpan/CloudSpan
CloudControl Gateway
■
■ FairWarning
■
■ Intel (McAfee) Application Control
(Solidcore) via (ePO)
■
■ Intralinks VIA
■
■ RSA Web Threat Detection Clinical/
Healthcare applications
Applications
■
■ ERPScan Security Monitoring Suite for SAP
■
■ ESNC Security Suite-Enterprise Threat
Monitoring
■
■ IBM WebSphere
■
■ iT-CUBE agileSI SAP
■
■ Microsoft SharePoint Server Database
■
■ Oracle WebLogic Server
■
■ SAP Enterprise Resource Planning (ERP)
Cloud
■
■ Adallom Cloud Access Security Broker
■
■ AWS CloudTrail
■
■ AWS CloudWatch VPC Flow Logs
■
■ AWS Elastic Compute Cloud (EC2)
■
■ AWS GuardDuty
■
■ AWS Identity and Access Management
(IAM)
■
■ AWS S3 (Simple Cloud Storage Service)
■
■ Azure Event Hubs
■
■ Blue Coat (Elastica) CloudSOC
■
■ Box
■
■ CloudPassage Halo
■
■ Exabeam User Behavior Analytics
■
■ FlexConnector for REST (can support Box,
SFDC, Google Apps, and more)
■
■ Illumio Policy Compute Engine (PCE)
■
■ Microsoft Office 365
■
■ Palerra LORIC
■
■ vArmour Distributed Security System (DSS)
■
■ Zscaler Nanolog Streaming Service (NSS)
Content Security
■
■ Barracuda Web Application Firewall
(NetContinuum)
■
■ Gemalto (SafeNet) eSafe Gateway
■
■ Intel (McAfee) Email and Web Security
Appliance
ArcSight Connector Supported Products
The Micro Focus® ArcSight library of out-of-the-box connectors provides source-optimized collec­
tion for leading security commercial products. These products span the entire stack of event-gen­
erating source types, from network and security devices to databases and enterprise applications.
Flyer
ArcSight Connector Supported Products
2
■
■ Intel (McAfee) Web Gateway (Webwasher)
■
■ Proofpoint Enterprise Protection and
Enterprise Privacy
■
■ PureSight Content Filter
■
■ Trend Micro Control Manager
■
■ Trend Micro InterScan Messaging Security
(Control Manager)
■
■ Trend Micro OfficeScan Client/Server
(Control Manager)
■
■ Trend Micro ScanMail for Lotus Domino
(Control Manager)
Data Leak Prevention
■
■ Digital Guardian
■
■ Fidelis Cybersecurity XPSGTB Inspector
■
■ Intel (McAfee) Host Data Loss Prevention
(HDLP) via (ePO)
Data Security
■
■ Absolute Data and Device Security (DDS)
■
■ Atalla IPC
■
■ Atalla Network Security Processor (NSP)
■
■ Cisco Firepower Management Center
■
■ Cisco ISE
■
■ JBoss Security Auditing File
■
■ Thales Data Firewall (Vormetric)
■
■ Zettaset BDEncrypt
Database
■
■ Microsoft SQL Server
■
■ Oracle Audit DB
■
■ Oracle Audit Syslog
■
■ Oracle Audit Vault
■
■ Oracle Audit XML File
■
■ Oracle Unified Audit Trail DB
■
■ Sybase Adaptive Server Enterprise
Database Activity Monitoring (DAM)/
Database Security
■
■ IBM InfoSphere Guardium
■
■ Imperva SecureSphere
■
■ Intel (McAfee) Sentrigo Hedgehog
(Enterprise and vPatch)
■
■ Trustwave Application Security DbProtect
■
■ Varonis DatAdvantage
Firewall
■
■ Check Point FireWall-1 GX
■
■ Cisco PIX/ASA Firewall
■
■ Dell SonicWALL Firewall Syslog
■
■ Juniper Networks (Altor Networks Virtual
Firewall)
■
■ Juniper Networks Firewall and VPN
■
■ Juniper Networks Security Manager
(NetScreen)
■
■ Next-Generation Firewall (NGFW)
■
■ Trend Micro (TippingPoint)
IDM, IAM, and Identity Security
■
■ Balabit Shell Control Box
■
■ Bay Dynamics, Risk Fabric
■
■ BeyondTrust’s PowerBroker
■
■ CA SiteMinder Single Sign-On File
■
■ Cisco Secure Access Control Server (ACS)
■
■ CyberArk Privileged Account Security
Management (PSM) Suite
■
■ CyberArk Privileged Threat Analytics (PTA)
■
■ Dell Change Auditor DB (Quest)
■
■ Hexadite AIRS
■
■ IBM Security Access Manager
■
■ Juniper Steel-Belted Radius (SBR)
■
■ Lieberman Software Enterprise Random
Password Manager (ERPM)
■
■ Microsoft Active Directory
■
■ Microsoft Forefront
■
■ Microsoft Forefront Database
■
■ Microsoft Network Policy Server
■
■ Netwrix Auditor
■
■ Novell Nsure Audit
■
■ ObserveIT Enterprise
■
■ Oracle Sun ONE Directory Server
■
■ Proofpoint NetCitadel ThreatOptics
■
■ RSA Authentication Manager
■
■ RSA Aveksa
■
■ Securonix RTI—Risk and
Threat Intelligence
■
■ SpectorSoft Spector 360 Export Service
■
■ Swimlane
■
■ Thycotic Secret Server
■
■ VMware PacketMotion PacketSentry
IDS/IPS
■
■ Bro IDS
■
■ Bro IDS NG File
■
■ BroadWeb NetKeeper
■
■ Cisco IBM AIX Management Center
■
■ Cisco Secure IPS SDEE
■
■ Extreme Networks Dragon Export Tool
■
■ Extreme Networks Dragon IDS
■
■ IBM Site Protector DB
■
■ Intel (McAfee) Host Intrusion Prevention
■
■ LightCyber Magna
■
■ Management System (SMS)
■
■ NitroSecurity Syslog
■
■ Radware DefensePro
■
■ Snort
■
■ Systems (HIPS) via (ePO)
■
■ Trend Micro (TippingPoint) Security
Integrated Security
■
■ Cisco ASA 5500
■
■ Dell SonicWALL
■
■ Fortinet FortiGate
■
■ Palo Alto Networks PAN-OS
■
■ Trend Micro (TippingPoint) Next-Generation
Firewall (NGFW)
3
www.microfocus.com
IT Operations
■
■ Operations Manager (OM)
■
■ Operations Manager i (OMi)
Log Consolidation and Analysis
■
■ Dell InTrust database
■
■ Qualys QualysGuard
Mail Filtering
■
■ Cisco Email Security Appliance (formerly
IronPort)
■
■ Intel (McAfee) Email Gateway (Secure
Computing IronMail)
■
■ Intel (McAfee) Security for Microsoft
Exchange (MSME) via (ePO)
■
■ PhishMe Triage
■
■ Symantec Messaging Gateway
Mail Server
■
■ Microsoft Exchange
■
■ Microsoft Exchange PowerShell
■
■ Microsoft Forefront Protection 2010 for
Exchange Server
■
■ Microsoft Forefront Protection Server
Management Console Database
■
■ Sendmail
Mainframe
■
■ CA Top Secret
■
■ HelpSystems PowerTech Interact
■
■ IBM eServer iSeries Audit Journal File
■
■ IBM z/OS (RACF)
■
■ IBM z/OS System Display and Search
Facility (SDSF)
■
■ IBM z/OS System Log
■
■ Type80 SMA_RT for RACF
Malware Detection
■
■ AhnLab Malware Defense System (MDS)
■
■ CounterTack Active Defense (formerly
ManTech)
■
■ Damballa CSP
■
■ Damballa Failsafe
■
■ Fidelis Cybersecurity CIRT
■
■ FireEye Malware Protection System (MPS)
■
■ FireEye Mandiant Intelligent Response
■
■ Guidance EnCase
■
■ Lastline Enterprise Anti-Malware
Network Access Control
■
■ Aruba ClearPass
■
■ ForeScout CounterACT
■
■ Niara Security Intelligence
■
■ Portnox
Network Behavior Anomaly
■
■ Arbor Networks Peakflow
■
■ Cybersponse
■
■ IP Flow Information Export
■
■ Qosmos DeepFlow Probes
Network Forensics
■
■ Narus nSystem
■
■ ReversingLabs N1000 appliance
■
■ RSA NetWitness
Network Management
■
■ Cisco Wireless LAN Controller Syslog
■
■ Intel (McAfee) Network Security Manager
■
■ Lumeta Enterprise Situational Intelligence
(ESI)
■
■ Micro Focus Network Node Manager i
(NNMi) SNMP
Network Monitoring
■
■ ISC BIND
■
■ ISC DHCP
■
■ Microsoft Azure NSG flow
■
■ Microsoft DHCP
■
■ Microsoft DNS
■
■ Microsoft Operations Manager Database
■
■ Microsoft System Center Configuration
Manager (SCCM) Database
■
■ Microsoft System Center Operations
Manager (SCOM) Database
■
■ Microsoft WINS
■
■ Radware Inflight
■
■ Reservoir Labs R-Scope
Network Traffic Analysis
■
■ Blue Coat (Solera) DeepSee
■
■ Cisco NetFlow/Flexible NetFlow
■
■ Corvil Network Data Analytics
■
■ FireEye nPulse HammerHead
■
■ Gigamon NetFlow
■
■ InMon sFlow
■
■ Intel (McAfee) Rogue System Detection
via (ePO)
■
■ NetScout nGenius
■
■ QoSient Argus
■
■ Seculert Automated Attack
Detection Platform
■
■ Savvius Omni Distributed
Analysis Platform
■
■ TCPdump
■
■ Vectra Networks X-Series
Network Traffic Management
■
■ Cisco Catalyst Switches
Operating Systems
■
■ HP-UX Operating System
■
■ HP-UX Syslog
■
■ HPE NonStop servers (XYGATE Merged
Audit)
■
■ HPE OpenVMS
■
■ IBM AIX Operating System
■
■ Linux SUSE
■
■ Microsoft Windows Servers 2003/2008/
2008 R2/2012/2012 R2
Flyer
ArcSight Connector Supported Products
4
■
■ Microsoft Windows Vista 7, 8, and 10
■
■ Oracle Solaris
■
■ Red Hat Linux
■
■ SaberNet NTSyslog
■
■ Snare for Microsoft Windows
■
■ UNIX
Packet Capture
■
■ Ixia Net Tool Optimizer
Policy Management
■
■ Intel (McAfee) Policy Auditor via (ePO)
■
■ NetIQ Security Manager
Router
■
■ Cisco Routers
■
■ HPE H3C Comware Platform
■
■ Juniper Routers (Junos)
Security Management
■
■ IBM Security SiteProtector
■
■ Intel (McAfee) ePolicy Orchestrator (ePO)
■
■ Microsoft Audit Collection System ACS DB
■
■ PhishMe Intelligence
Security Orchestration and
Automated Response
■
■ ATAR Labs
Server
■
■ HPE ProLiant Gen8 Server with HPE iLO
Management Engine
Storage
■
■ Bloombase StoreSafe
■
■ EMC Celerra/VNXe Storage Systems
■
■ Hadoop DFS with CEF
■
■ HPE c7000 VCM syslog
■
■ NetApp filer (NAS)
Switch
■
■ Cisco NX-OS
■
■ Brocade BigIron (Foundry Networks)
■
■ HPE Networking syslog
Threat Management
■
■ VarySys PacketAlarm
Threat Intelligence
■
■ Anomali’s ThreatStream optic
■
■ Comilion Instance
■
■ FireEye (iSIGHT) ThreatScape API
■
■ LookingGlass ScoutVision
■
■ Recorded Future: Real-Time Threat
Intelligence
■
■ ThreatConnect Threat
Intelligence Platform
Virtualization
■
■ CounterTack Event Horizon
■
■ McAfee Management for Optimized Virtual
Environments (MOVE) via (ePO)
■
■ VMware ESX/VMware ESXi server
■
■ VMware Virtual Center
VPN
■
■ Check Point VPN-1
■
■ Cisco VPN Concentrator
■
■ Citrix NetScaler
■
■ Nortel Contivity VPN Switch
■
■ Pulse Secure Pulse Connect Secure
Vulnerability Assessment
■
■ Belden (Tripwire) IP360 Device Profiler
■
■ Belden (Tripwire) IP360 Threat Monitor
■
■ eEye REM Security Management Console
■
■ eEye Retina Network Security Scanner
■
■ FFRI FFR yarai
■
■ Intel (McAfee) Vulnerability Manager
(FoundScan)
■
■ Language (OVAL) standard
■
■ Nmap
■
■ Open Vulnerability and Assessment
■
■ Rapid7 Nexpose
■
■ SOC Prime Integration Framework
■
■ Squid Web Proxy Cache
■
■ SAINT Vulnerability Scanner
■
■ Tenable Nessus
■
■ Webroot BrightCloud
Web Cache
■
■ Blue Coat ProxySG series
■
■ Microsoft Internet Security and
Acceleration (ISA) Server
Web Filtering
■
■ Cisco IronPort Web Security Appliance
■
■ Forcepoint (Websense) Web Security Suite
■
■ McAfee SiteAdvisor Enterprise via ePO
Web Server
■
■ Apache
■
■ Microsoft Internet Information Services (IIS)
■
■ Oracle Sun ONE
Wireless
■
■ AirMagnet Enterprise
■
■ Cisco Mobility Services Engine
■
■ Cisco NetFlow/Flexible NetFlow
■
■ Cisco NX-OS
■
■ Mojo Networks AirTight
Management Console
■
■ Zebra AirDefense Guard
5
www.microfocus.com
ArcSight Index Listing of Connectors
Available Today
■
■ Apache
■
■ Arbor Networks TMS (Formerly TMS
Peakflow)
■
■ AWS CloudTrail
■
■ AWS CloudWatch VPC Flow Logs
■
■ AWS EC2
■
■ AWS GuardDuty
■
■ AWS IAM
■
■ AWS S3 (Simple Cloud Storage Service)
■
■ Azure Event Hubs
■
■ Barracuda Web Application Firewall
(NetContinuum)
■
■ Belden (Tripwire) IP360 Device Profiler
■
■ Belden (Tripwire) IP360 Threat Monitor
■
■ Blue Coat ProxySG series
■
■ Box
■
■ Bro IDS
■
■ Bro IDS NG File
■
■ BroadWeb NetKeeper
■
■ Brocade BigIron (Foundry Networks)
■
■ CA SiteMinder Single Sign-On File
■
■ CA Top Secret
■
■ CentOS
■
■ Check Point FireWall-1 GX
■
■ Check Point VPN-1
■
■ Cisco ASA
■
■ Cisco Catalyst Switches
■
■ Cisco CSS
■
■ Cisco Email Security Appliance (formerly
IronPort)
■
■ Cisco IronPort Web Security Appliance
■
■ Cisco ISE
■
■ Cisco PIX Firewall
■
■ Cisco Routers
■
■ Cisco Secure IPS SDEE
■
■ Cisco Wireless LAN Controller Syslog
■
■ Dell (Quest) Change Auditor DB
■
■ Dell (Quest) InTrust (fka AEM)
■
■ Dell SonicWALL Firewall Syslog
■
■ eEye Retina Network Security Scanner
■
■ EMC Celerra/VNXe Storage Systems
■
■ Extreme Networks Dragon Export Tool
■
■ Extreme Networks Dragon IDS
■
■ F-Secure Anti-Virus
■
■ FlexConnector for REST (can support Box,
SFDC, Google Apps, and more)
■
■ Forcepoint (Websense) Web Security Suite
■
■ Gemalto (SafeNet) eSafe Gateway
■
■ HPE Aruba WLAN Mobility Controller
■
■ HPE H3C Comware Platform
■
■ HPE Networking syslog
■
■ HPE OpenVMS
■
■ HP-UX Syslog
■
■ IBM AIX Operating System
■
■ IBM Domino Database
■
■ IBM Domino Web Server
■
■ IBM Security SiteProtector System
■
■ IBM Site Protector DB
■
■ IBM WebSphere
■
■ Intel (McAfee) Application Control
(Solidcore) via (ePO)
■
■ Intel (McAfee) Email Gateway (Secure
Computing IronMail)
■
■ Intel (McAfee) Firewall Enterprise
■
■ Intel (McAfee) Host Data Loss Prevention
(HDLP) via (ePO)
■
■ Intel (McAfee) Host Intrusion Prevention
Systems (HIPS) via (ePO)
■
■ Intel (McAfee) Network Security Manager
■
■ Intel (McAfee) Policy Auditor via (ePO)
■
■ Intel (McAfee) Rogue System Detection
via (ePO)
■
■ Intel (McAfee) Security for Microsoft
Exchange (MSME) via (ePO)
■
■ Intel (McAfee) VirusScan Enterprise
via (ePO)
■
■ Intel (McAfee) Vulnerability Manager
(FoundScan)
■
■ Intel (McAfee) Web Gateway (Webwasher)
■
■ IP Flow Information Export
■
■ ISC BIND
■
■ ISC DHCP
■
■ JBoss Security Auditing File
■
■ Juniper Networks Firewall and VPN
■
■ Juniper Networks Security Manager
(NetScreen)
■
■ Juniper Routers (Junos)
■
■ Juniper SBR
■
■ Kaspersky Anti-Virus
■
■ Linux SUSE
■
■ Lumension PatchLink Scanner DB
■
■ Microsoft ACS database
■
■ Microsoft Active Directory
■
■ Microsoft DHCP
■
■ Microsoft DNS
■
■ Microsoft Exchange
■
■ Microsoft Exchange PowerShell
■
■ Microsoft Forefront
■
■ Microsoft Forefront DB
■
■ Microsoft Forefront Protection 2010 for
Exchange Server
■
■ Microsoft Forefront Protection Server
Management Console DB
■
■ Microsoft ISA
■
■ Microsoft Network Policy Server (Windows
IAS/RADIUS)
■
■ Microsoft Office 365
■
■ Microsoft Operations Manager Database
■
■ Microsoft SCCM Database
Flyer
ArcSight Connector Supported Products
6
■
■ Microsoft SCOM Database
■
■ Microsoft SharePoint Server Database
■
■ Microsoft SQL Server
■
■ Microsoft Windows 7/8/2003/XP/2008
Server/Vista
■
■ Microsoft Windows Servers 2003/2008/
2008 R2/2012/2012 R2
■
■ Microsoft WINS
■
■ NAS
■
■ NetIQ Security Manager
■
■ Network Operations Management
■
■ NitroSecurity Syslog
■
■ Nmap
■
■ Nortel Contivity VPN Switch
■
■ Novell Nsure Audit
■
■ Oracle Audit DB
■
■ Oracle Audit Syslog
■
■ Oracle Audit Vault
■
■ Oracle Audit XML File
■
■ Oracle Solaris
■
■ Oracle Sun ONE
■
■ Oracle Sun ONE Directory Server
■
■ Oracle WebLogic Server
■
■ OVAL standard
■
■ Proofpoint Enterprise Protection and
Enterprise Privacy
■
■ Pulse secure Pulse Connect Secure
■
■ PureSight Content Filter
■
■ Qualys QualysGuard
■
■ Radware DefensePro
■
■ Rapid7 Nexpose
■
■ Red Hat Linux
■
■ RSA Authentication Manager
■
■ SaberNet NTSyslog
■
■ SAINT Vulnerability Scanner
■
■ SAP ERP
■
■ SEPM Database
■
■ Snare for Microsoft Windows
■
■ Snort
■
■ Sophos
■
■ Squid Web Proxy Cache
■
■ Sybase Adaptive Server Enterprise
■
■ Symantec Mail Security for Microsoft
Exchange
■
■ Symantec Messaging Gateway
■
■ TCPdump
■
■ Tenable Nessus
■
■ Trend Micro Control Manager
■
■ Trend Micro InterScan Messaging Security
(Control Manager)
■
■ Trend Micro OfficeScan Client/Server
(Control Manager)
■
■ Trend Micro ScanMail for Domino
(Control Manager)
■
■ Trend Micro (TippingPoint) Security
Management System (SMS)
■
■ UNIX
■
■ VarySys PacketAlarm
■
■ VMware ESX/ESXi Server
■
■ VMware Virtual Center
■
■ Zebra AirDefense Guard
Action-Certified Solutions
■
■ Aruba ClearPass
■
■ Cisco Firepower Management Center
■
■ Comilion Instance
■
■ CyberArk PSM Suite
■
■ Cybersponse
■
■ Digital Guardian
■
■ FireEye Mandiant Intelligent Response
■
■ FireEye Network Forensics Platform (PX)
■
■ ForeScout CounterACT
■
■ General Dynamics CIRT
■
■ Guidance EnCase
■
■ IBM Resilient Systems Incident Response
Platform
■
■ Ixia Net Tool Optimizer
■
■ Lastine Enterprise Anti-Malware Solution
■
■ Niara Security Intelligence
■
■ NIKSUN NetOmni
■
■ Proofpoint NetCitadel ThreatOptics
■
■ RSA Aveksa
■
■ Securonix Risk and Threat Intelligence RTI
■
■ Symantec Security Analytics (Solera
DeepSee)
■
■ vArmour Analytics Platform
Forwarding-Certified Solutions
■
■ ATAR Labs
■
■ Bay Dynamics Risk Fabric
■
■ DFLabs IncMan
■
■ Exabeam User Behavior Analytics
■
■ Hexadite AIRS
■
■ Niara Security Intelligence
■
■ Palerra LORIC
■
■ Savvius Omni Distributed Analysis Platform
■
■ Swimlane
ArcSight CEF Certified Solutions
■
■ ABAP-Experts SecurityBridge
■
■ Absolute Computrace
■
■ Absolute Data and Device Security (DDS)
■
■ Acalvio Technologies ShadowNet
■
■ AgileSI
■
■ AhnLab Malware Defense System (MDS)
■
■ AhnLabs MDS
■
■ Anomali’s ThreatStream OPTIC
■
■ Aqua Security
■
■ Aruba ClearPass
■
■ Arxan GuardIT
■
■ Atalla IPC
■
■ Atalla Network Security Processor (NSP)
■
■ ATAR Labs
7
www.microfocus.com
■
■ Attivo Networks
■
■ Avigilon Access Control Manager (ACM)
■
■ Ayehu eyeShare
■
■ Balabit Shell Control Box
■
■ Barracuda Networks NG Firewall
■
■ Belden (Tripwire Enterprise)
■
■ BeyondTrust’s PowerBroker
■
■ Bit9 + Carbon Black Security Platform
■
■ Bloombase StoreSafe
■
■ BMC (CorreLog) Syslog Defender
■
■ Bomgar Privileged Access Management
■
■ Bricata ProAccel
■
■ Brinqa Risk Analytics
■
■ Bromium Advanced Endpoint Security
■
■ CA Technologies SecureSpan/CloudSpan
CloudControl Gateway
■
■ CA Technologies Privileged Access
Management
■
■ Carbon Black Security Platform
■
■ Cilasoft QJRN/400
■
■ Cisco Firepower Management Center
■
■ CloudPassage
■
■ CloudPassage Halo
■
■ Comilion Instance
■
■ Core Security CSP
■
■ Core Security Failsafe
■
■ Corvil Network Data Analytics
■
■ CounterTack Active Defense (formerly
ManTech)
■
■ CounterTack Sentinel (Event Horizon)
■
■ CrowdStrike Falcon Host
■
■ CyberArk Privileged Account Security
Management (PSM) Suite
■
■ CyberArk Privileged Threat Analytics (PTA)
■
■ Cybersponse
■
■ D3 Security
■
■ Damballa CSP
■
■ Damballa Failsafe
■
■ DeepInstinct
■
■ Digital Guardian
■
■ E8 Security Behavioral Intelligence Platform
Application
■
■ EclecticIQ
■
■ Edge Technologies AppBoard and enPortal
■
■ Elastic
■
■ Endgame
■
■ Ergon Informatik
■
■ ERPScan Security Monitoring Suite for SAP
■
■ ESNC Security Suite-Enterprise Threat
Monitoring
■
■ F5 Big-IP Advanced Firewall Manager (AFM)
■
■ FairWarning
■
■ FFRI FFR yarai
■
■ Fidelis Cybersecurity XPS
■
■ FireEye CM Series
■
■ FireEye (iSIGHT) ThreatScape API
■
■ FireEye Malware Protection System (MPS)
■
■ FireEye Mandiant Intelligent Response
■
■ ForeScout CounterACT
■
■ Fortinet FortiGate
■
■ General Dynamics CIRT
■
■ Gigamon GigaVUE/GigaSECURE
■
■ GTB Technologies Inspector
■
■ Gurucul Analytics Platform
■
■ HelpSystems PowerTech Interact
■
■ Hexadite AIRS
■
■ HPE NonStop servers (XYGATE Merged
Audit) (XMA)
■
■ IBM InfoSphere Guardium
■
■ Illumio Policy Compute Engine (PCE)
■
■ Illusive Networks
■
■ Imperva SecureSphere
■
■ Indegy Industrial Cyber Security Platform
■
■ InQuest
■
■ Intel (McAfee) Email and Web Security
Appliance
■
■ Intel (McAfee) Sentrigo Hedgehog
(Enterprise and vPatch)
■
■ Intel (McAfee) StoneSoft StoneGate Firewall
■
■ Intralinks VIA
■
■ Ionic Security
■
■ iT-CUBE agileSI SAP
■
■ Ixia ThreatARMOR
■
■ Juniper Networks Altor Networks Virtual
Firewall
■
■ Lancope StealthWatch
■
■ Lastline Enterprise Anti-Malware Solution
■
■ Lieberman Software ERPM
■
■ LightCyber Magna Platform
■
■ LookingGlass Cyber Solutions ScoutVision
■
■ Lookout
■
■ Lumeta Enterprise Situational Intelligence
(ESI)
■
■ Lumeta IPsonar
■
■ Microsoft (Adallom) Cloud Access Security
Broker
■
■ Microsoft Azure NSG flow
■
■ Mojo Networks AirTight Management
Console
■
■ NetIQ Identity Manager
■
■ NetScout Systems nGenius Performance
Manager
■
■ Netwrix Auditor
■
■ Nexthink Engine
■
■ Niara Security Intelligence
■
■ NIKSUN NetDetector
■
■ ObserveIT Enterprise
■
■ Palerra LORIC
■
■ Palo Alto Networks PAN-OS
■
■ Penta Security WAPPLES
■
■ PhishMe Intelligence
■
■ PhishMe Triage
■
■ Portnox Network Security
■
■ Qosmos DeepFlow Probes
■
■ QualysGuard
■
■ Radware Inflight
■
■ Recorded Future Threat Intelligence
Platform
■
■ RedSeal Network and Vulnerability Advisor
■
■ Reservoir Labs R-Scope
■
■ Resolves Systems
■
■ ReversingLabs N1000 Appliance
■
■ RSA NetWitness
■
■ RSA Web Threat Detection
■
■ SailPoint IdentityIQ
■
■ Seculert Automated Attack Detection
Platform
■
■ Securonix Risk and Threat Intelligence (RTI)
■
■ SOC Prime Integration Framework
■
■ Symantec Blue Coat (Elastica) CloudSOC
■
■ Symantec System Recovery
■
■ Sysorex Zone Defense
■
■ TaaSera TaaS NetAnaylzer
■
■ ThreatConnect Threat Intelligence Platform
■
■ ThreatQuotient
■
■ Thycotic Secret Server
■
■ TrapX DeceptionGrid
■
■ TrendMicro
■
■ Trend Micro Deep Security
■
■ Trend Micro (TippingPoint) Next-Generation
Firewall (NGFW)
■
■ Trustwave Application Security DbProtect
■
■ Type80 SMA_RT
■
■ vArmour Analytics Platform
■
■ Varonis DatAdvantage
■
■ Vectra Networks X-Series
■
■ Veriato 360 (Spector 360)
■
■ Verodin Security Instrumentation Platform
■
■ Vormetric Data Security Manager
■
■ Votiro Cybersec Platform
■
■ Webroot BrightCloud
■
■ Zettaset BDEncrypt
■
■ Zscaler Nanolog Streaming Service (NSS)
361-000146-004  |  4AA5-3404  |  H  |  DS  |  03/19  |  © 2019 Micro Focus or one of its affiliates. Micro Focus and the Micro Focus logo, among others,
are trademarks or registered trademarks of Micro Focus or its subsidiaries or affiliated companies in the United Kingdom, United States and other
countries. All other marks are the property of their respective owners.
Contact us at:
www.microfocus.com
Like what you read? Share it.

More Related Content

Similar to Arcsight connector supported_products_flyer

Alabama CyberNow 2018: Cloud Hardening and Digital Forensics Readiness
Alabama CyberNow 2018: Cloud Hardening and Digital Forensics ReadinessAlabama CyberNow 2018: Cloud Hardening and Digital Forensics Readiness
Alabama CyberNow 2018: Cloud Hardening and Digital Forensics ReadinessToni de la Fuente
 
Enterprise Cloud Security
Enterprise Cloud SecurityEnterprise Cloud Security
Enterprise Cloud SecurityMongoDB
 
Azure 101: Shared responsibility in the Azure Cloud
Azure 101: Shared responsibility in the Azure CloudAzure 101: Shared responsibility in the Azure Cloud
Azure 101: Shared responsibility in the Azure CloudPaulo Renato
 
Shared Security Responsibility for the Azure Cloud
Shared Security Responsibility for the Azure CloudShared Security Responsibility for the Azure Cloud
Shared Security Responsibility for the Azure CloudAlert Logic
 
AWS re:Invent 2016: Life Without SSH: Immutable Infrastructure in Production ...
AWS re:Invent 2016: Life Without SSH: Immutable Infrastructure in Production ...AWS re:Invent 2016: Life Without SSH: Immutable Infrastructure in Production ...
AWS re:Invent 2016: Life Without SSH: Immutable Infrastructure in Production ...Amazon Web Services
 
AWS re:Invent 2016 Fast Forward
AWS re:Invent 2016 Fast ForwardAWS re:Invent 2016 Fast Forward
AWS re:Invent 2016 Fast ForwardShuen-Huei Guan
 
High Performance Object Storage in 30 Minutes with Supermicro and MinIO
High Performance Object Storage in 30 Minutes with Supermicro and MinIOHigh Performance Object Storage in 30 Minutes with Supermicro and MinIO
High Performance Object Storage in 30 Minutes with Supermicro and MinIORebekah Rodriguez
 
Turning off the lights - Going all in with the Public Cloud (Lumagate Nordic ...
Turning off the lights - Going all in with the Public Cloud (Lumagate Nordic ...Turning off the lights - Going all in with the Public Cloud (Lumagate Nordic ...
Turning off the lights - Going all in with the Public Cloud (Lumagate Nordic ...Morgan Simonsen
 
Mcas log collector deck
Mcas log collector deckMcas log collector deck
Mcas log collector deckMatt Soseman
 
Data center webinar_v2_1
Data center webinar_v2_1Data center webinar_v2_1
Data center webinar_v2_1Lancope, Inc.
 
Advanced Open IoT Platform for Prevention and Early Detection of Forest Fires
Advanced Open IoT Platform for Prevention and Early Detection of Forest FiresAdvanced Open IoT Platform for Prevention and Early Detection of Forest Fires
Advanced Open IoT Platform for Prevention and Early Detection of Forest FiresIvo Andreev
 
Network Security and Access Control within AWS
Network Security and Access Control within AWSNetwork Security and Access Control within AWS
Network Security and Access Control within AWSAmazon Web Services
 
HiPEAC Computing Systems Week 2022_Mario Porrmann presentation
HiPEAC Computing Systems Week 2022_Mario Porrmann presentationHiPEAC Computing Systems Week 2022_Mario Porrmann presentation
HiPEAC Computing Systems Week 2022_Mario Porrmann presentationVEDLIoT Project
 
Empower Your Security Practitioners with Elastic SIEM
Empower Your Security Practitioners with Elastic SIEMEmpower Your Security Practitioners with Elastic SIEM
Empower Your Security Practitioners with Elastic SIEMElasticsearch
 
Creating Data Fabric for #IOT with Apache Pulsar
Creating Data Fabric for #IOT with Apache PulsarCreating Data Fabric for #IOT with Apache Pulsar
Creating Data Fabric for #IOT with Apache PulsarKarthik Ramasamy
 
FIPS 140-2 Validations in a Secure Enclave
FIPS 140-2 Validations in a Secure EnclaveFIPS 140-2 Validations in a Secure Enclave
FIPS 140-2 Validations in a Secure EnclavewolfSSL
 

Similar to Arcsight connector supported_products_flyer (20)

Alabama CyberNow 2018: Cloud Hardening and Digital Forensics Readiness
Alabama CyberNow 2018: Cloud Hardening and Digital Forensics ReadinessAlabama CyberNow 2018: Cloud Hardening and Digital Forensics Readiness
Alabama CyberNow 2018: Cloud Hardening and Digital Forensics Readiness
 
Enterprise Cloud Security
Enterprise Cloud SecurityEnterprise Cloud Security
Enterprise Cloud Security
 
Azure 101: Shared responsibility in the Azure Cloud
Azure 101: Shared responsibility in the Azure CloudAzure 101: Shared responsibility in the Azure Cloud
Azure 101: Shared responsibility in the Azure Cloud
 
Shared Security Responsibility for the Azure Cloud
Shared Security Responsibility for the Azure CloudShared Security Responsibility for the Azure Cloud
Shared Security Responsibility for the Azure Cloud
 
Endpoint Security
Endpoint SecurityEndpoint Security
Endpoint Security
 
AWS re:Invent 2016: Life Without SSH: Immutable Infrastructure in Production ...
AWS re:Invent 2016: Life Without SSH: Immutable Infrastructure in Production ...AWS re:Invent 2016: Life Without SSH: Immutable Infrastructure in Production ...
AWS re:Invent 2016: Life Without SSH: Immutable Infrastructure in Production ...
 
AWS re:Invent 2016 Fast Forward
AWS re:Invent 2016 Fast ForwardAWS re:Invent 2016 Fast Forward
AWS re:Invent 2016 Fast Forward
 
High Performance Object Storage in 30 Minutes with Supermicro and MinIO
High Performance Object Storage in 30 Minutes with Supermicro and MinIOHigh Performance Object Storage in 30 Minutes with Supermicro and MinIO
High Performance Object Storage in 30 Minutes with Supermicro and MinIO
 
Turning off the lights - Going all in with the Public Cloud (Lumagate Nordic ...
Turning off the lights - Going all in with the Public Cloud (Lumagate Nordic ...Turning off the lights - Going all in with the Public Cloud (Lumagate Nordic ...
Turning off the lights - Going all in with the Public Cloud (Lumagate Nordic ...
 
Mcas log collector deck
Mcas log collector deckMcas log collector deck
Mcas log collector deck
 
Bbva bank on Open Stack
Bbva bank on Open StackBbva bank on Open Stack
Bbva bank on Open Stack
 
Data center webinar_v2_1
Data center webinar_v2_1Data center webinar_v2_1
Data center webinar_v2_1
 
Advanced Open IoT Platform for Prevention and Early Detection of Forest Fires
Advanced Open IoT Platform for Prevention and Early Detection of Forest FiresAdvanced Open IoT Platform for Prevention and Early Detection of Forest Fires
Advanced Open IoT Platform for Prevention and Early Detection of Forest Fires
 
Network Security and Access Control within AWS
Network Security and Access Control within AWSNetwork Security and Access Control within AWS
Network Security and Access Control within AWS
 
HiPEAC Computing Systems Week 2022_Mario Porrmann presentation
HiPEAC Computing Systems Week 2022_Mario Porrmann presentationHiPEAC Computing Systems Week 2022_Mario Porrmann presentation
HiPEAC Computing Systems Week 2022_Mario Porrmann presentation
 
Empower Your Security Practitioners with Elastic SIEM
Empower Your Security Practitioners with Elastic SIEMEmpower Your Security Practitioners with Elastic SIEM
Empower Your Security Practitioners with Elastic SIEM
 
CRYPTTECH PRODUCTS
CRYPTTECH PRODUCTSCRYPTTECH PRODUCTS
CRYPTTECH PRODUCTS
 
Creating Data Fabric for #IOT with Apache Pulsar
Creating Data Fabric for #IOT with Apache PulsarCreating Data Fabric for #IOT with Apache Pulsar
Creating Data Fabric for #IOT with Apache Pulsar
 
FIPS 140-2 Validations in a Secure Enclave
FIPS 140-2 Validations in a Secure EnclaveFIPS 140-2 Validations in a Secure Enclave
FIPS 140-2 Validations in a Secure Enclave
 
Azure 101
Azure 101Azure 101
Azure 101
 

More from Bloombase

a50009291enw - Letter.pdf
a50009291enw - Letter.pdfa50009291enw - Letter.pdf
a50009291enw - Letter.pdfBloombase
 
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...Bloombase
 
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...Bloombase
 
Post-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and MorpheusPost-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and MorpheusBloombase
 
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625Bloombase
 
HPE - Additional license authorizations
HPE - Additional license authorizationsHPE - Additional license authorizations
HPE - Additional license authorizationsBloombase
 
HPE - Enable Productivity and Security In Your NonStop Environment
HPE - Enable Productivity and Security In Your NonStop EnvironmentHPE - Enable Productivity and Security In Your NonStop Environment
HPE - Enable Productivity and Security In Your NonStop EnvironmentBloombase
 
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...Bloombase
 
4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enwBloombase
 
Bloombase store safe bloombase, inc. - oracle cloud marketplace
Bloombase store safe   bloombase, inc. - oracle cloud marketplaceBloombase store safe   bloombase, inc. - oracle cloud marketplace
Bloombase store safe bloombase, inc. - oracle cloud marketplaceBloombase
 
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...Bloombase
 
The connection forweb p12
The connection forweb p12The connection forweb p12
The connection forweb p12Bloombase
 
Eskm & bloombase integration data security oct 16
Eskm & bloombase integration   data security oct 16Eskm & bloombase integration   data security oct 16
Eskm & bloombase integration data security oct 16Bloombase
 
Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15Bloombase
 
4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enwBloombase
 
Bloombase store safe mf solution brief 2017 pdf
Bloombase store safe   mf solution brief 2017 pdfBloombase store safe   mf solution brief 2017 pdf
Bloombase store safe mf solution brief 2017 pdfBloombase
 
Bloombase store safe 1pager mf solution brief template 2017
Bloombase store safe   1pager mf solution brief template 2017Bloombase store safe   1pager mf solution brief template 2017
Bloombase store safe 1pager mf solution brief template 2017Bloombase
 
The connection beyond non stop encryption
The connection   beyond non stop encryptionThe connection   beyond non stop encryption
The connection beyond non stop encryptionBloombase
 
Blbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-enBlbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-enBloombase
 
Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2Bloombase
 

More from Bloombase (20)

a50009291enw - Letter.pdf
a50009291enw - Letter.pdfa50009291enw - Letter.pdf
a50009291enw - Letter.pdf
 
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
 
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
 
Post-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and MorpheusPost-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and Morpheus
 
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
 
HPE - Additional license authorizations
HPE - Additional license authorizationsHPE - Additional license authorizations
HPE - Additional license authorizations
 
HPE - Enable Productivity and Security In Your NonStop Environment
HPE - Enable Productivity and Security In Your NonStop EnvironmentHPE - Enable Productivity and Security In Your NonStop Environment
HPE - Enable Productivity and Security In Your NonStop Environment
 
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
 
4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enw
 
Bloombase store safe bloombase, inc. - oracle cloud marketplace
Bloombase store safe   bloombase, inc. - oracle cloud marketplaceBloombase store safe   bloombase, inc. - oracle cloud marketplace
Bloombase store safe bloombase, inc. - oracle cloud marketplace
 
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...
 
The connection forweb p12
The connection forweb p12The connection forweb p12
The connection forweb p12
 
Eskm & bloombase integration data security oct 16
Eskm & bloombase integration   data security oct 16Eskm & bloombase integration   data security oct 16
Eskm & bloombase integration data security oct 16
 
Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15
 
4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enw
 
Bloombase store safe mf solution brief 2017 pdf
Bloombase store safe   mf solution brief 2017 pdfBloombase store safe   mf solution brief 2017 pdf
Bloombase store safe mf solution brief 2017 pdf
 
Bloombase store safe 1pager mf solution brief template 2017
Bloombase store safe   1pager mf solution brief template 2017Bloombase store safe   1pager mf solution brief template 2017
Bloombase store safe 1pager mf solution brief template 2017
 
The connection beyond non stop encryption
The connection   beyond non stop encryptionThe connection   beyond non stop encryption
The connection beyond non stop encryption
 
Blbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-enBlbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-en
 
Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2
 

Recently uploaded

chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyFrank van der Linden
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfkalichargn70th171
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
What are the features of Vehicle Tracking System?
What are the features of Vehicle Tracking System?What are the features of Vehicle Tracking System?
What are the features of Vehicle Tracking System?Watsoo Telematics
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 

Recently uploaded (20)

chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The Ugly
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
What are the features of Vehicle Tracking System?
What are the features of Vehicle Tracking System?What are the features of Vehicle Tracking System?
What are the features of Vehicle Tracking System?
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 

Arcsight connector supported_products_flyer

  • 1. Flyer Security In addition to connectors developed and main­ tained by ArcSight, we test and certify the fol­ lowing connector types through our tech­ nology alliances program (TAP): ■ ■ Common event format (CEF) certified— helps ensure event information is captured properly in the CEF ■ ■ Action certified—allows for control of a vendor’s technology from within the ArcSight console ■ ■ Forwarding connector—allows for events to be forwarded from ArcSight to partner solution ■ ■ Please refer to the index section for listing by connector type ArcSight Connector Supported Platform for Installation ■ ■ CentOS Linux 6.7, 6.8, 6.9, 7.2, 7.3 and 7.4 64-bit ■ ■ Microsoft Windows Server 2008 SP1/SP2 64-bit ■ ■ Microsoft Windows Server 2012 Standard and 2012 R2 64-bit ■ ■ Microsoft Windows Server 2016 Standard 64-bit ■ ■ Oracle Solaris 10, 11 64-bit (SPARC) ■ ■ Oracle Solaris 11, 64-bit (x86_64) ■ ■ Red Hat Enterprise Linux (RHEL) 6.7, 6.8, 6.9, 7.2, 7.3, 7.4, and 7.5 64-bit ■ ■ SUSE Linux 11, 12 Enterprise Server 64-bit Anti-Virus/Anti-Spam ■ ■ Endgame ■ ■ F-Secure Anti-Virus ■ ■ Intel (McAfee) VirusScan Enterprise via (ePO) ■ ■ Kaspersky Anti-Virus ■ ■ Sophos ■ ■ Symantec Endpoint Protection Manager (SEPM) Database ■ ■ Symantec Mail Security for Microsoft Exchange ■ ■ Trend Micro (TM) OfficeScan (Control Manager and TM Control Manager Database DB) Application Security ■ ■ Bit9 + Carbon Black Security Platform ■ ■ CA Layer 7 SecureSpan/CloudSpan CloudControl Gateway ■ ■ FairWarning ■ ■ Intel (McAfee) Application Control (Solidcore) via (ePO) ■ ■ Intralinks VIA ■ ■ RSA Web Threat Detection Clinical/ Healthcare applications Applications ■ ■ ERPScan Security Monitoring Suite for SAP ■ ■ ESNC Security Suite-Enterprise Threat Monitoring ■ ■ IBM WebSphere ■ ■ iT-CUBE agileSI SAP ■ ■ Microsoft SharePoint Server Database ■ ■ Oracle WebLogic Server ■ ■ SAP Enterprise Resource Planning (ERP) Cloud ■ ■ Adallom Cloud Access Security Broker ■ ■ AWS CloudTrail ■ ■ AWS CloudWatch VPC Flow Logs ■ ■ AWS Elastic Compute Cloud (EC2) ■ ■ AWS GuardDuty ■ ■ AWS Identity and Access Management (IAM) ■ ■ AWS S3 (Simple Cloud Storage Service) ■ ■ Azure Event Hubs ■ ■ Blue Coat (Elastica) CloudSOC ■ ■ Box ■ ■ CloudPassage Halo ■ ■ Exabeam User Behavior Analytics ■ ■ FlexConnector for REST (can support Box, SFDC, Google Apps, and more) ■ ■ Illumio Policy Compute Engine (PCE) ■ ■ Microsoft Office 365 ■ ■ Palerra LORIC ■ ■ vArmour Distributed Security System (DSS) ■ ■ Zscaler Nanolog Streaming Service (NSS) Content Security ■ ■ Barracuda Web Application Firewall (NetContinuum) ■ ■ Gemalto (SafeNet) eSafe Gateway ■ ■ Intel (McAfee) Email and Web Security Appliance ArcSight Connector Supported Products The Micro Focus® ArcSight library of out-of-the-box connectors provides source-optimized collec­ tion for leading security commercial products. These products span the entire stack of event-gen­ erating source types, from network and security devices to databases and enterprise applications.
  • 2. Flyer ArcSight Connector Supported Products 2 ■ ■ Intel (McAfee) Web Gateway (Webwasher) ■ ■ Proofpoint Enterprise Protection and Enterprise Privacy ■ ■ PureSight Content Filter ■ ■ Trend Micro Control Manager ■ ■ Trend Micro InterScan Messaging Security (Control Manager) ■ ■ Trend Micro OfficeScan Client/Server (Control Manager) ■ ■ Trend Micro ScanMail for Lotus Domino (Control Manager) Data Leak Prevention ■ ■ Digital Guardian ■ ■ Fidelis Cybersecurity XPSGTB Inspector ■ ■ Intel (McAfee) Host Data Loss Prevention (HDLP) via (ePO) Data Security ■ ■ Absolute Data and Device Security (DDS) ■ ■ Atalla IPC ■ ■ Atalla Network Security Processor (NSP) ■ ■ Cisco Firepower Management Center ■ ■ Cisco ISE ■ ■ JBoss Security Auditing File ■ ■ Thales Data Firewall (Vormetric) ■ ■ Zettaset BDEncrypt Database ■ ■ Microsoft SQL Server ■ ■ Oracle Audit DB ■ ■ Oracle Audit Syslog ■ ■ Oracle Audit Vault ■ ■ Oracle Audit XML File ■ ■ Oracle Unified Audit Trail DB ■ ■ Sybase Adaptive Server Enterprise Database Activity Monitoring (DAM)/ Database Security ■ ■ IBM InfoSphere Guardium ■ ■ Imperva SecureSphere ■ ■ Intel (McAfee) Sentrigo Hedgehog (Enterprise and vPatch) ■ ■ Trustwave Application Security DbProtect ■ ■ Varonis DatAdvantage Firewall ■ ■ Check Point FireWall-1 GX ■ ■ Cisco PIX/ASA Firewall ■ ■ Dell SonicWALL Firewall Syslog ■ ■ Juniper Networks (Altor Networks Virtual Firewall) ■ ■ Juniper Networks Firewall and VPN ■ ■ Juniper Networks Security Manager (NetScreen) ■ ■ Next-Generation Firewall (NGFW) ■ ■ Trend Micro (TippingPoint) IDM, IAM, and Identity Security ■ ■ Balabit Shell Control Box ■ ■ Bay Dynamics, Risk Fabric ■ ■ BeyondTrust’s PowerBroker ■ ■ CA SiteMinder Single Sign-On File ■ ■ Cisco Secure Access Control Server (ACS) ■ ■ CyberArk Privileged Account Security Management (PSM) Suite ■ ■ CyberArk Privileged Threat Analytics (PTA) ■ ■ Dell Change Auditor DB (Quest) ■ ■ Hexadite AIRS ■ ■ IBM Security Access Manager ■ ■ Juniper Steel-Belted Radius (SBR) ■ ■ Lieberman Software Enterprise Random Password Manager (ERPM) ■ ■ Microsoft Active Directory ■ ■ Microsoft Forefront ■ ■ Microsoft Forefront Database ■ ■ Microsoft Network Policy Server ■ ■ Netwrix Auditor ■ ■ Novell Nsure Audit ■ ■ ObserveIT Enterprise ■ ■ Oracle Sun ONE Directory Server ■ ■ Proofpoint NetCitadel ThreatOptics ■ ■ RSA Authentication Manager ■ ■ RSA Aveksa ■ ■ Securonix RTI—Risk and Threat Intelligence ■ ■ SpectorSoft Spector 360 Export Service ■ ■ Swimlane ■ ■ Thycotic Secret Server ■ ■ VMware PacketMotion PacketSentry IDS/IPS ■ ■ Bro IDS ■ ■ Bro IDS NG File ■ ■ BroadWeb NetKeeper ■ ■ Cisco IBM AIX Management Center ■ ■ Cisco Secure IPS SDEE ■ ■ Extreme Networks Dragon Export Tool ■ ■ Extreme Networks Dragon IDS ■ ■ IBM Site Protector DB ■ ■ Intel (McAfee) Host Intrusion Prevention ■ ■ LightCyber Magna ■ ■ Management System (SMS) ■ ■ NitroSecurity Syslog ■ ■ Radware DefensePro ■ ■ Snort ■ ■ Systems (HIPS) via (ePO) ■ ■ Trend Micro (TippingPoint) Security Integrated Security ■ ■ Cisco ASA 5500 ■ ■ Dell SonicWALL ■ ■ Fortinet FortiGate ■ ■ Palo Alto Networks PAN-OS ■ ■ Trend Micro (TippingPoint) Next-Generation Firewall (NGFW)
  • 3. 3 www.microfocus.com IT Operations ■ ■ Operations Manager (OM) ■ ■ Operations Manager i (OMi) Log Consolidation and Analysis ■ ■ Dell InTrust database ■ ■ Qualys QualysGuard Mail Filtering ■ ■ Cisco Email Security Appliance (formerly IronPort) ■ ■ Intel (McAfee) Email Gateway (Secure Computing IronMail) ■ ■ Intel (McAfee) Security for Microsoft Exchange (MSME) via (ePO) ■ ■ PhishMe Triage ■ ■ Symantec Messaging Gateway Mail Server ■ ■ Microsoft Exchange ■ ■ Microsoft Exchange PowerShell ■ ■ Microsoft Forefront Protection 2010 for Exchange Server ■ ■ Microsoft Forefront Protection Server Management Console Database ■ ■ Sendmail Mainframe ■ ■ CA Top Secret ■ ■ HelpSystems PowerTech Interact ■ ■ IBM eServer iSeries Audit Journal File ■ ■ IBM z/OS (RACF) ■ ■ IBM z/OS System Display and Search Facility (SDSF) ■ ■ IBM z/OS System Log ■ ■ Type80 SMA_RT for RACF Malware Detection ■ ■ AhnLab Malware Defense System (MDS) ■ ■ CounterTack Active Defense (formerly ManTech) ■ ■ Damballa CSP ■ ■ Damballa Failsafe ■ ■ Fidelis Cybersecurity CIRT ■ ■ FireEye Malware Protection System (MPS) ■ ■ FireEye Mandiant Intelligent Response ■ ■ Guidance EnCase ■ ■ Lastline Enterprise Anti-Malware Network Access Control ■ ■ Aruba ClearPass ■ ■ ForeScout CounterACT ■ ■ Niara Security Intelligence ■ ■ Portnox Network Behavior Anomaly ■ ■ Arbor Networks Peakflow ■ ■ Cybersponse ■ ■ IP Flow Information Export ■ ■ Qosmos DeepFlow Probes Network Forensics ■ ■ Narus nSystem ■ ■ ReversingLabs N1000 appliance ■ ■ RSA NetWitness Network Management ■ ■ Cisco Wireless LAN Controller Syslog ■ ■ Intel (McAfee) Network Security Manager ■ ■ Lumeta Enterprise Situational Intelligence (ESI) ■ ■ Micro Focus Network Node Manager i (NNMi) SNMP Network Monitoring ■ ■ ISC BIND ■ ■ ISC DHCP ■ ■ Microsoft Azure NSG flow ■ ■ Microsoft DHCP ■ ■ Microsoft DNS ■ ■ Microsoft Operations Manager Database ■ ■ Microsoft System Center Configuration Manager (SCCM) Database ■ ■ Microsoft System Center Operations Manager (SCOM) Database ■ ■ Microsoft WINS ■ ■ Radware Inflight ■ ■ Reservoir Labs R-Scope Network Traffic Analysis ■ ■ Blue Coat (Solera) DeepSee ■ ■ Cisco NetFlow/Flexible NetFlow ■ ■ Corvil Network Data Analytics ■ ■ FireEye nPulse HammerHead ■ ■ Gigamon NetFlow ■ ■ InMon sFlow ■ ■ Intel (McAfee) Rogue System Detection via (ePO) ■ ■ NetScout nGenius ■ ■ QoSient Argus ■ ■ Seculert Automated Attack Detection Platform ■ ■ Savvius Omni Distributed Analysis Platform ■ ■ TCPdump ■ ■ Vectra Networks X-Series Network Traffic Management ■ ■ Cisco Catalyst Switches Operating Systems ■ ■ HP-UX Operating System ■ ■ HP-UX Syslog ■ ■ HPE NonStop servers (XYGATE Merged Audit) ■ ■ HPE OpenVMS ■ ■ IBM AIX Operating System ■ ■ Linux SUSE ■ ■ Microsoft Windows Servers 2003/2008/ 2008 R2/2012/2012 R2
  • 4. Flyer ArcSight Connector Supported Products 4 ■ ■ Microsoft Windows Vista 7, 8, and 10 ■ ■ Oracle Solaris ■ ■ Red Hat Linux ■ ■ SaberNet NTSyslog ■ ■ Snare for Microsoft Windows ■ ■ UNIX Packet Capture ■ ■ Ixia Net Tool Optimizer Policy Management ■ ■ Intel (McAfee) Policy Auditor via (ePO) ■ ■ NetIQ Security Manager Router ■ ■ Cisco Routers ■ ■ HPE H3C Comware Platform ■ ■ Juniper Routers (Junos) Security Management ■ ■ IBM Security SiteProtector ■ ■ Intel (McAfee) ePolicy Orchestrator (ePO) ■ ■ Microsoft Audit Collection System ACS DB ■ ■ PhishMe Intelligence Security Orchestration and Automated Response ■ ■ ATAR Labs Server ■ ■ HPE ProLiant Gen8 Server with HPE iLO Management Engine Storage ■ ■ Bloombase StoreSafe ■ ■ EMC Celerra/VNXe Storage Systems ■ ■ Hadoop DFS with CEF ■ ■ HPE c7000 VCM syslog ■ ■ NetApp filer (NAS) Switch ■ ■ Cisco NX-OS ■ ■ Brocade BigIron (Foundry Networks) ■ ■ HPE Networking syslog Threat Management ■ ■ VarySys PacketAlarm Threat Intelligence ■ ■ Anomali’s ThreatStream optic ■ ■ Comilion Instance ■ ■ FireEye (iSIGHT) ThreatScape API ■ ■ LookingGlass ScoutVision ■ ■ Recorded Future: Real-Time Threat Intelligence ■ ■ ThreatConnect Threat Intelligence Platform Virtualization ■ ■ CounterTack Event Horizon ■ ■ McAfee Management for Optimized Virtual Environments (MOVE) via (ePO) ■ ■ VMware ESX/VMware ESXi server ■ ■ VMware Virtual Center VPN ■ ■ Check Point VPN-1 ■ ■ Cisco VPN Concentrator ■ ■ Citrix NetScaler ■ ■ Nortel Contivity VPN Switch ■ ■ Pulse Secure Pulse Connect Secure Vulnerability Assessment ■ ■ Belden (Tripwire) IP360 Device Profiler ■ ■ Belden (Tripwire) IP360 Threat Monitor ■ ■ eEye REM Security Management Console ■ ■ eEye Retina Network Security Scanner ■ ■ FFRI FFR yarai ■ ■ Intel (McAfee) Vulnerability Manager (FoundScan) ■ ■ Language (OVAL) standard ■ ■ Nmap ■ ■ Open Vulnerability and Assessment ■ ■ Rapid7 Nexpose ■ ■ SOC Prime Integration Framework ■ ■ Squid Web Proxy Cache ■ ■ SAINT Vulnerability Scanner ■ ■ Tenable Nessus ■ ■ Webroot BrightCloud Web Cache ■ ■ Blue Coat ProxySG series ■ ■ Microsoft Internet Security and Acceleration (ISA) Server Web Filtering ■ ■ Cisco IronPort Web Security Appliance ■ ■ Forcepoint (Websense) Web Security Suite ■ ■ McAfee SiteAdvisor Enterprise via ePO Web Server ■ ■ Apache ■ ■ Microsoft Internet Information Services (IIS) ■ ■ Oracle Sun ONE Wireless ■ ■ AirMagnet Enterprise ■ ■ Cisco Mobility Services Engine ■ ■ Cisco NetFlow/Flexible NetFlow ■ ■ Cisco NX-OS ■ ■ Mojo Networks AirTight Management Console ■ ■ Zebra AirDefense Guard
  • 5. 5 www.microfocus.com ArcSight Index Listing of Connectors Available Today ■ ■ Apache ■ ■ Arbor Networks TMS (Formerly TMS Peakflow) ■ ■ AWS CloudTrail ■ ■ AWS CloudWatch VPC Flow Logs ■ ■ AWS EC2 ■ ■ AWS GuardDuty ■ ■ AWS IAM ■ ■ AWS S3 (Simple Cloud Storage Service) ■ ■ Azure Event Hubs ■ ■ Barracuda Web Application Firewall (NetContinuum) ■ ■ Belden (Tripwire) IP360 Device Profiler ■ ■ Belden (Tripwire) IP360 Threat Monitor ■ ■ Blue Coat ProxySG series ■ ■ Box ■ ■ Bro IDS ■ ■ Bro IDS NG File ■ ■ BroadWeb NetKeeper ■ ■ Brocade BigIron (Foundry Networks) ■ ■ CA SiteMinder Single Sign-On File ■ ■ CA Top Secret ■ ■ CentOS ■ ■ Check Point FireWall-1 GX ■ ■ Check Point VPN-1 ■ ■ Cisco ASA ■ ■ Cisco Catalyst Switches ■ ■ Cisco CSS ■ ■ Cisco Email Security Appliance (formerly IronPort) ■ ■ Cisco IronPort Web Security Appliance ■ ■ Cisco ISE ■ ■ Cisco PIX Firewall ■ ■ Cisco Routers ■ ■ Cisco Secure IPS SDEE ■ ■ Cisco Wireless LAN Controller Syslog ■ ■ Dell (Quest) Change Auditor DB ■ ■ Dell (Quest) InTrust (fka AEM) ■ ■ Dell SonicWALL Firewall Syslog ■ ■ eEye Retina Network Security Scanner ■ ■ EMC Celerra/VNXe Storage Systems ■ ■ Extreme Networks Dragon Export Tool ■ ■ Extreme Networks Dragon IDS ■ ■ F-Secure Anti-Virus ■ ■ FlexConnector for REST (can support Box, SFDC, Google Apps, and more) ■ ■ Forcepoint (Websense) Web Security Suite ■ ■ Gemalto (SafeNet) eSafe Gateway ■ ■ HPE Aruba WLAN Mobility Controller ■ ■ HPE H3C Comware Platform ■ ■ HPE Networking syslog ■ ■ HPE OpenVMS ■ ■ HP-UX Syslog ■ ■ IBM AIX Operating System ■ ■ IBM Domino Database ■ ■ IBM Domino Web Server ■ ■ IBM Security SiteProtector System ■ ■ IBM Site Protector DB ■ ■ IBM WebSphere ■ ■ Intel (McAfee) Application Control (Solidcore) via (ePO) ■ ■ Intel (McAfee) Email Gateway (Secure Computing IronMail) ■ ■ Intel (McAfee) Firewall Enterprise ■ ■ Intel (McAfee) Host Data Loss Prevention (HDLP) via (ePO) ■ ■ Intel (McAfee) Host Intrusion Prevention Systems (HIPS) via (ePO) ■ ■ Intel (McAfee) Network Security Manager ■ ■ Intel (McAfee) Policy Auditor via (ePO) ■ ■ Intel (McAfee) Rogue System Detection via (ePO) ■ ■ Intel (McAfee) Security for Microsoft Exchange (MSME) via (ePO) ■ ■ Intel (McAfee) VirusScan Enterprise via (ePO) ■ ■ Intel (McAfee) Vulnerability Manager (FoundScan) ■ ■ Intel (McAfee) Web Gateway (Webwasher) ■ ■ IP Flow Information Export ■ ■ ISC BIND ■ ■ ISC DHCP ■ ■ JBoss Security Auditing File ■ ■ Juniper Networks Firewall and VPN ■ ■ Juniper Networks Security Manager (NetScreen) ■ ■ Juniper Routers (Junos) ■ ■ Juniper SBR ■ ■ Kaspersky Anti-Virus ■ ■ Linux SUSE ■ ■ Lumension PatchLink Scanner DB ■ ■ Microsoft ACS database ■ ■ Microsoft Active Directory ■ ■ Microsoft DHCP ■ ■ Microsoft DNS ■ ■ Microsoft Exchange ■ ■ Microsoft Exchange PowerShell ■ ■ Microsoft Forefront ■ ■ Microsoft Forefront DB ■ ■ Microsoft Forefront Protection 2010 for Exchange Server ■ ■ Microsoft Forefront Protection Server Management Console DB ■ ■ Microsoft ISA ■ ■ Microsoft Network Policy Server (Windows IAS/RADIUS) ■ ■ Microsoft Office 365 ■ ■ Microsoft Operations Manager Database ■ ■ Microsoft SCCM Database
  • 6. Flyer ArcSight Connector Supported Products 6 ■ ■ Microsoft SCOM Database ■ ■ Microsoft SharePoint Server Database ■ ■ Microsoft SQL Server ■ ■ Microsoft Windows 7/8/2003/XP/2008 Server/Vista ■ ■ Microsoft Windows Servers 2003/2008/ 2008 R2/2012/2012 R2 ■ ■ Microsoft WINS ■ ■ NAS ■ ■ NetIQ Security Manager ■ ■ Network Operations Management ■ ■ NitroSecurity Syslog ■ ■ Nmap ■ ■ Nortel Contivity VPN Switch ■ ■ Novell Nsure Audit ■ ■ Oracle Audit DB ■ ■ Oracle Audit Syslog ■ ■ Oracle Audit Vault ■ ■ Oracle Audit XML File ■ ■ Oracle Solaris ■ ■ Oracle Sun ONE ■ ■ Oracle Sun ONE Directory Server ■ ■ Oracle WebLogic Server ■ ■ OVAL standard ■ ■ Proofpoint Enterprise Protection and Enterprise Privacy ■ ■ Pulse secure Pulse Connect Secure ■ ■ PureSight Content Filter ■ ■ Qualys QualysGuard ■ ■ Radware DefensePro ■ ■ Rapid7 Nexpose ■ ■ Red Hat Linux ■ ■ RSA Authentication Manager ■ ■ SaberNet NTSyslog ■ ■ SAINT Vulnerability Scanner ■ ■ SAP ERP ■ ■ SEPM Database ■ ■ Snare for Microsoft Windows ■ ■ Snort ■ ■ Sophos ■ ■ Squid Web Proxy Cache ■ ■ Sybase Adaptive Server Enterprise ■ ■ Symantec Mail Security for Microsoft Exchange ■ ■ Symantec Messaging Gateway ■ ■ TCPdump ■ ■ Tenable Nessus ■ ■ Trend Micro Control Manager ■ ■ Trend Micro InterScan Messaging Security (Control Manager) ■ ■ Trend Micro OfficeScan Client/Server (Control Manager) ■ ■ Trend Micro ScanMail for Domino (Control Manager) ■ ■ Trend Micro (TippingPoint) Security Management System (SMS) ■ ■ UNIX ■ ■ VarySys PacketAlarm ■ ■ VMware ESX/ESXi Server ■ ■ VMware Virtual Center ■ ■ Zebra AirDefense Guard Action-Certified Solutions ■ ■ Aruba ClearPass ■ ■ Cisco Firepower Management Center ■ ■ Comilion Instance ■ ■ CyberArk PSM Suite ■ ■ Cybersponse ■ ■ Digital Guardian ■ ■ FireEye Mandiant Intelligent Response ■ ■ FireEye Network Forensics Platform (PX) ■ ■ ForeScout CounterACT ■ ■ General Dynamics CIRT ■ ■ Guidance EnCase ■ ■ IBM Resilient Systems Incident Response Platform ■ ■ Ixia Net Tool Optimizer ■ ■ Lastine Enterprise Anti-Malware Solution ■ ■ Niara Security Intelligence ■ ■ NIKSUN NetOmni ■ ■ Proofpoint NetCitadel ThreatOptics ■ ■ RSA Aveksa ■ ■ Securonix Risk and Threat Intelligence RTI ■ ■ Symantec Security Analytics (Solera DeepSee) ■ ■ vArmour Analytics Platform Forwarding-Certified Solutions ■ ■ ATAR Labs ■ ■ Bay Dynamics Risk Fabric ■ ■ DFLabs IncMan ■ ■ Exabeam User Behavior Analytics ■ ■ Hexadite AIRS ■ ■ Niara Security Intelligence ■ ■ Palerra LORIC ■ ■ Savvius Omni Distributed Analysis Platform ■ ■ Swimlane ArcSight CEF Certified Solutions ■ ■ ABAP-Experts SecurityBridge ■ ■ Absolute Computrace ■ ■ Absolute Data and Device Security (DDS) ■ ■ Acalvio Technologies ShadowNet ■ ■ AgileSI ■ ■ AhnLab Malware Defense System (MDS) ■ ■ AhnLabs MDS ■ ■ Anomali’s ThreatStream OPTIC ■ ■ Aqua Security ■ ■ Aruba ClearPass ■ ■ Arxan GuardIT ■ ■ Atalla IPC ■ ■ Atalla Network Security Processor (NSP) ■ ■ ATAR Labs
  • 7. 7 www.microfocus.com ■ ■ Attivo Networks ■ ■ Avigilon Access Control Manager (ACM) ■ ■ Ayehu eyeShare ■ ■ Balabit Shell Control Box ■ ■ Barracuda Networks NG Firewall ■ ■ Belden (Tripwire Enterprise) ■ ■ BeyondTrust’s PowerBroker ■ ■ Bit9 + Carbon Black Security Platform ■ ■ Bloombase StoreSafe ■ ■ BMC (CorreLog) Syslog Defender ■ ■ Bomgar Privileged Access Management ■ ■ Bricata ProAccel ■ ■ Brinqa Risk Analytics ■ ■ Bromium Advanced Endpoint Security ■ ■ CA Technologies SecureSpan/CloudSpan CloudControl Gateway ■ ■ CA Technologies Privileged Access Management ■ ■ Carbon Black Security Platform ■ ■ Cilasoft QJRN/400 ■ ■ Cisco Firepower Management Center ■ ■ CloudPassage ■ ■ CloudPassage Halo ■ ■ Comilion Instance ■ ■ Core Security CSP ■ ■ Core Security Failsafe ■ ■ Corvil Network Data Analytics ■ ■ CounterTack Active Defense (formerly ManTech) ■ ■ CounterTack Sentinel (Event Horizon) ■ ■ CrowdStrike Falcon Host ■ ■ CyberArk Privileged Account Security Management (PSM) Suite ■ ■ CyberArk Privileged Threat Analytics (PTA) ■ ■ Cybersponse ■ ■ D3 Security ■ ■ Damballa CSP ■ ■ Damballa Failsafe ■ ■ DeepInstinct ■ ■ Digital Guardian ■ ■ E8 Security Behavioral Intelligence Platform Application ■ ■ EclecticIQ ■ ■ Edge Technologies AppBoard and enPortal ■ ■ Elastic ■ ■ Endgame ■ ■ Ergon Informatik ■ ■ ERPScan Security Monitoring Suite for SAP ■ ■ ESNC Security Suite-Enterprise Threat Monitoring ■ ■ F5 Big-IP Advanced Firewall Manager (AFM) ■ ■ FairWarning ■ ■ FFRI FFR yarai ■ ■ Fidelis Cybersecurity XPS ■ ■ FireEye CM Series ■ ■ FireEye (iSIGHT) ThreatScape API ■ ■ FireEye Malware Protection System (MPS) ■ ■ FireEye Mandiant Intelligent Response ■ ■ ForeScout CounterACT ■ ■ Fortinet FortiGate ■ ■ General Dynamics CIRT ■ ■ Gigamon GigaVUE/GigaSECURE ■ ■ GTB Technologies Inspector ■ ■ Gurucul Analytics Platform ■ ■ HelpSystems PowerTech Interact ■ ■ Hexadite AIRS ■ ■ HPE NonStop servers (XYGATE Merged Audit) (XMA) ■ ■ IBM InfoSphere Guardium ■ ■ Illumio Policy Compute Engine (PCE) ■ ■ Illusive Networks ■ ■ Imperva SecureSphere ■ ■ Indegy Industrial Cyber Security Platform ■ ■ InQuest ■ ■ Intel (McAfee) Email and Web Security Appliance ■ ■ Intel (McAfee) Sentrigo Hedgehog (Enterprise and vPatch) ■ ■ Intel (McAfee) StoneSoft StoneGate Firewall ■ ■ Intralinks VIA ■ ■ Ionic Security ■ ■ iT-CUBE agileSI SAP ■ ■ Ixia ThreatARMOR ■ ■ Juniper Networks Altor Networks Virtual Firewall ■ ■ Lancope StealthWatch ■ ■ Lastline Enterprise Anti-Malware Solution ■ ■ Lieberman Software ERPM ■ ■ LightCyber Magna Platform ■ ■ LookingGlass Cyber Solutions ScoutVision ■ ■ Lookout ■ ■ Lumeta Enterprise Situational Intelligence (ESI) ■ ■ Lumeta IPsonar ■ ■ Microsoft (Adallom) Cloud Access Security Broker ■ ■ Microsoft Azure NSG flow ■ ■ Mojo Networks AirTight Management Console ■ ■ NetIQ Identity Manager ■ ■ NetScout Systems nGenius Performance Manager ■ ■ Netwrix Auditor ■ ■ Nexthink Engine ■ ■ Niara Security Intelligence ■ ■ NIKSUN NetDetector ■ ■ ObserveIT Enterprise ■ ■ Palerra LORIC ■ ■ Palo Alto Networks PAN-OS
  • 8. ■ ■ Penta Security WAPPLES ■ ■ PhishMe Intelligence ■ ■ PhishMe Triage ■ ■ Portnox Network Security ■ ■ Qosmos DeepFlow Probes ■ ■ QualysGuard ■ ■ Radware Inflight ■ ■ Recorded Future Threat Intelligence Platform ■ ■ RedSeal Network and Vulnerability Advisor ■ ■ Reservoir Labs R-Scope ■ ■ Resolves Systems ■ ■ ReversingLabs N1000 Appliance ■ ■ RSA NetWitness ■ ■ RSA Web Threat Detection ■ ■ SailPoint IdentityIQ ■ ■ Seculert Automated Attack Detection Platform ■ ■ Securonix Risk and Threat Intelligence (RTI) ■ ■ SOC Prime Integration Framework ■ ■ Symantec Blue Coat (Elastica) CloudSOC ■ ■ Symantec System Recovery ■ ■ Sysorex Zone Defense ■ ■ TaaSera TaaS NetAnaylzer ■ ■ ThreatConnect Threat Intelligence Platform ■ ■ ThreatQuotient ■ ■ Thycotic Secret Server ■ ■ TrapX DeceptionGrid ■ ■ TrendMicro ■ ■ Trend Micro Deep Security ■ ■ Trend Micro (TippingPoint) Next-Generation Firewall (NGFW) ■ ■ Trustwave Application Security DbProtect ■ ■ Type80 SMA_RT ■ ■ vArmour Analytics Platform ■ ■ Varonis DatAdvantage ■ ■ Vectra Networks X-Series ■ ■ Veriato 360 (Spector 360) ■ ■ Verodin Security Instrumentation Platform ■ ■ Vormetric Data Security Manager ■ ■ Votiro Cybersec Platform ■ ■ Webroot BrightCloud ■ ■ Zettaset BDEncrypt ■ ■ Zscaler Nanolog Streaming Service (NSS) 361-000146-004  |  4AA5-3404  |  H  |  DS  |  03/19  |  © 2019 Micro Focus or one of its affiliates. Micro Focus and the Micro Focus logo, among others, are trademarks or registered trademarks of Micro Focus or its subsidiaries or affiliated companies in the United Kingdom, United States and other countries. All other marks are the property of their respective owners. Contact us at: www.microfocus.com Like what you read? Share it.