We use the data sent by your third-party security source to monitor your security posture and alert you to any potentially threatening events that have been observed.
- From your Red Canary homepage, click Integrations.
- From the Integrations section, locate and then click the third-party security source you want to integrate with Red Canary.
Note: If you do not see your security product listed, click See all integrations.
- In the search bar, type and then select your third-party security source.
- Continue onto the next step by configuring your third-party security source in Red Canary.
Note: Your third-party security source may require that you contact Red Canary to configure.
Below the Integrations section there is an integration table.
|The Display Name shows the name of the product as it is displayed.
|The Product Name provides the name of the Product.
|The Ingest Type column displays how the data is ingested, for example, Streaming, Syslog, or API Poll.
|The Data Is column describes the current status of your ingested data. This gives you better insight into what Red Canary does with your data after ingestion.
|Telemetry (1wk) ↑ displays the telemetry volume from the last seven days for this integration.
|Alerts (1wk) displays the number of alerts from the last seven days.
|The Status displays either Active or Inactive.
For more information about Integrations, check out the Integrations section in the Red Canary Help Center.