Supported Security Products
Vendor | Product | Critical Security Controls | Guide | |
---|---|---|---|---|
![]() |
AT&T | AT&T Arris Gateway | 9 ,12 | |
![]() |
Actifio | Actifio | 1 ,2 ,3 ,5 ,11 | |
![]() |
Akamai | Akamai SIEM Integration | 12 | |
![]() |
Amazon Web Services | CloudWatch | Guide | |
![]() |
Amazon Web Services | Cloudtrail | ||
![]() |
Amazon Web Services | Guard Duty | 9 ,12 | |
![]() |
Amazon Web Services | AWS VPC Security | 9 ,12 | |
![]() |
Amazon Web Services | AWS Instance Backup | 10 | |
![]() |
Apache | Apache Web Server | ||
![]() |
Apache | Apache Tomcat | ||
![]() |
AudioCodes | Mediant Media Gateway | 9 ,12 | |
![]() |
Automox | Automox | 1 ,3 ,8 | |
![]() |
BRO IDS | BRO IDS | ||
![]() |
Barracuda | Barracuda WAF | 12 | |
![]() |
Barracuda | Barracuda CloudGen Firewall | 9 ,12 | |
![]() |
Barracuda | Barracuda ESS | 7 | |
![]() |
Beyond Trust | Beyond Trust | 4 ,16 | |
![]() |
Carbon Black | Carbon Black Protect/Defend | 1 ,8 | |
![]() |
Centrify | Centrify | 4 ,16 | |
![]() |
Check Point | Check Point FW | 9 ,12 | Guide |
![]() |
Cisco | Stealthwatch | 8 | Guide |
![]() |
Cisco | Advanced Malware Protection (AMP) | 1 ,8 ,3 | Guide |
![]() |
Cisco | Firepower | 9 ,12 | Guide |
![]() |
Cisco | ASA Firewall | 9 ,12 | Guide |
![]() |
Cisco | Meraki | 9 ,12 ,15 | Guide |
![]() |
Cisco | Cisco Ironport | 7 | |
![]() |
Cisco | Umbrella | 1 ,7 | Guide |
![]() |
Cisco | Cisco Threat Response | 1 ,8 | Guide |
![]() |
Cisco | Cisco Wireless | 15 | |
![]() |
Cisco | Cisco ISE | 1 ,4 ,9 ,14 | |
![]() |
Cisco | Cisco Network Operating System | 11 | |
![]() |
Cisco | Web Security Appliance (WSA) | 1 ,8 | |
![]() |
Cisco | Access Control Server (ACS) | 1 ,4 ,6 ,9 ,11 ,14 | |
![]() |
Cisco | Cisco Meraki Firewall | 9 ,12 | |
![]() |
Cisco | PIX Firewall | 9 ,12 | |
![]() |
Citrix | Netscaler | 9 ,12 | |
![]() |
CrowdStrike | Falcon | 1 ,2 ,8 ,3 | Guide |
![]() |
Cubro | Cubro Network Visibility | Joint Solution Brief | |
![]() |
CyberArk | CyberArk EPM | 4 | Guide |
![]() |
CyberArk | CyberArk Vault | 4 | Guide |
![]() |
Cybereason | Cybereason | 1 ,8 | |
![]() |
Cylance | CylancePROTECT | 1 ,8 | Guide |
![]() |
Datto | Datto RMM | 1 ,8 | |
![]() |
Deep Instinct | Advanced Endpoint Security | 1 ,8 | |
![]() |
ESET | ESET Antivirus | 1 ,8 | |
![]() |
Ericsson | Security Manager | 1 ,8 | |
![]() |
F5 | ASM | 7 ,9 ,12 | Guide |
![]() |
FireEye | FireEye Email Security (EX Series) | 7 | |
![]() |
FireEye | FireEye Network Security (NX Series) | 1 ,8 | |
![]() |
FireEye | FireEye Endpoint Security (HX Series) | 1 ,8 | Guide |
![]() |
FireEye | FireEye Malware Analysis (AX Series) | 1 ,8 | |
![]() |
FireEye | FireEye File Protect (FX Series) | 13 | |
![]() |
FireEye | FireEye Central Management (CM Series) | 1 ,8 | |
![]() |
Fortinet | Fortigate | 9 ,12 | |
![]() |
Fortinet | Fortimail | 9 ,12 | |
![]() |
Gigamon | Gigamon GigaVUE | ||
![]() |
Gin | Gin Access Log | ||
![]() |
HAProxy | HAProxy Load Balancer | ||
![]() |
HPE | HPE Nimble | 13 | |
![]() |
HPE | HPE EFS | 13 | |
![]() |
IBM | QRadar | 6 ,16 | Guide |
![]() |
IBM | IBM i Powertech SIEM Agent | 4 ,5 ,14 | |
![]() |
Imperva | SecureSphere | 13 | |
![]() |
InfoBlox | InfoBlox | 1 ,7 | |
![]() |
Infocyte | Infocyte Hunt | 1 ,8 | |
![]() |
JavaMelody Project | JavaMelody | ||
![]() |
Juniper | Juniper FW | 9 ,12 | |
![]() |
Linux | NameD | ||
![]() |
Linux | SSHD | ||
![]() |
Linux | fail2ban | 4 | |
![]() |
Linux | Auditd Logs | 4 ,5 ,14 | |
![]() |
Linux | Linux PAM | 4 | |
![]() |
Malwarebytes | Malwarebytes Anti-Malware | 1 ,8 | |
![]() |
ManageEngine | ManageEngine ADManager | 4 ,14 ,16 | |
![]() |
McAfee | McAfee Web Gateway | 9 ,12 | |
![]() |
McAfee | McAfee ePolicy Orchestrator | 1 ,8 | Guide |
![]() |
McAfee | McAfee Network Security | 9 ,12 | |
![]() |
McAfee | McAfee Endpoint Security | 1 ,8 | |
![]() |
Microsoft | Windows Logs | 4 ,5 ,14 | Guide |
![]() |
Microsoft | Windows Active Directory | 4 ,5 ,14 | Guide |
![]() |
Microsoft | Advanced Threat Analytics | 1 ,8 | |
![]() |
Microsoft | DHCP | ||
![]() |
Microsoft | Azure Security | 2 ,4 ,5 ,9 ,13 ,14 ,16 | Guide |
![]() |
Microsoft | Graph | 2 ,4 ,5 ,9 ,13 ,14 ,16 | Guide |
![]() |
Mimecast | Mimecast | 7 | |
![]() |
Mist | Mist Wireless | 15 | Guide |
![]() |
Mojo | Mojo Wireless | 15 | |
![]() |
Multiple | NetFlow v5, v7, v9 | Guide | |
![]() |
Multiple | IPFIX | ||
![]() |
Multiple | Common Event Format (CEF) | ||
![]() |
Multiple | Log Event Extended Format (LEEF) | ||
![]() |
NXLog | NXLog | ||
![]() |
Netscout | Netscout | ||
![]() |
Netwrix | Stealthbits | 4 ,13 ,16 | |
![]() |
Nokia | NetGuard | 9 ,12 | |
![]() |
Noname Security | Noname Security | ||
![]() |
OPNSense | OPNsense Firewall | 9 ,12 | |
![]() |
OSSEC | OSSEC | 1 ,8 | |
![]() |
Okta | Okta | 4 ,16 | |
![]() |
OpenVPN | OpenVPN | 9 ,12 | |
![]() |
POSTFIX | POSTFIX | ||
![]() |
Paessler | PRTG Network Monitor | 1 ,6 | |
![]() |
Palo Alto Networks | Palo Alto Networks NGFW | 9 ,12 | Guide |
![]() |
Palo Alto Networks | Cortex XDR | 1 ,2 ,8 | Guide |
![]() |
ProofPoint | ProofPoint Protect | 7 | |
![]() |
ProofPoint | ProofPoint CASB | 7 | |
![]() |
Pulse | Pulse Secure | 4 ,16 | |
![]() |
Qualys | Qualys VA | 1 ,2 ,3 ,5 ,11 | Guide |
![]() |
Radware | Radware Appwall | 12 | |
![]() |
Roqos | Roqos Core | 9 ,12 | |
![]() |
SSSD Project | System Security Services Daemon (sssd) | 4 | |
![]() |
SecureCircle | SecureCircle | 5 ,13 ,14 | |
![]() |
Secureworks | Taegis VDR | 1 ,8 | |
![]() |
Security Onion Solutions, LLC | Security Onion | 1 ,6 ,16 ,19 | |
![]() |
Senhasegura | Senhasegura PAM | 4 | |
![]() |
SentinelOne | SentinelOne | 1 ,8 | |
![]() |
Shibboleth | Shibboleth IDP | 4 ,16 | |
![]() |
Solarwinds | N-Central | 1 ,8 | |
![]() |
SonicWall | SonicWall Firewall | 9 ,12 | Guide |
![]() |
Sophos | Sophos Central | 1 ,8 | |
![]() |
Suricata | Suricata IDS | ||
![]() |
Symantec | Symantec Endpoint Protection | 1 ,8 | Guide |
![]() |
Symantec | Symantec Data Loss Prevention | 13 | |
![]() |
Symantec | ProxySG | 1 ,7 | |
![]() |
Tanium | Tanium | 1 ,8 | |
![]() |
Taxii | STIX/TAXII | Guide | |
![]() |
Tenable | Tenable Vulnerability Management | 1 ,2 ,3 ,5 ,11 | Guide |
![]() |
Threatmetrix | Threatmetrix | ||
![]() |
Thycotic | Secret Server | 4 ,16 | Guide |
![]() |
Tippingpoint | Tippingpoint IPS | 9 ,12 | |
![]() |
Titan | SpamTitan | 7 | |
![]() |
TrapX | TrapX | ||
![]() |
Trend Micro | Trend Deep Security | 1 ,8 | |
![]() |
Tufin | Tufin SecureTrack | 9 ,11 | |
![]() |
Ubiquity | Unify Security Gateway | 9 ,12 | |
![]() |
VMWare | VMWare VCenter | 2 | |
![]() |
VMWare | VMWare NSX Firewall | 9 ,12 | |
![]() |
Varonis | DatAdvantage | 13 | |
![]() |
Vectra Networks | Cognito | 8 | |
![]() |
VyOS | VyOS | 9 ,12 | |
![]() |
Wazuh | Wazuh | 1 ,8 | Guide |
![]() |
Websense | Websense | 7 ,9 ,12 | |
![]() |
WitFoo | Precinct | 1 ,6 ,16 ,19 | |
![]() |
WitFoo | WitFoo IOC Feed | ||
![]() |
Zix | Zix Email | 7 | |
![]() |
carson_saint | Carson & Saint | 1 ,2 ,3 ,5 ,11 | |
![]() |
linux | Uncomplicated Firewall (UFW) | 9 ,12 | |
![]() |
linux | Kernel | 5 ,6 | |
![]() |
linux | Netfilter ulogd | 9 ,12 | |
![]() |
pfSense | pfSense Firewall | 9 ,12 | Guide |
![]() |
Zscaler | Zscaler NSS | 7 ,9 ,12 | Guide |