Showing page 651 of 660 of 1750 results.

Partner
Security Validation, Return events generated by the security technology that match Mandiant Security Validation actions
Partner
Security Validation, Return events generated by the security technology that match Mandiant Security Validation actions
Partner
Automated Defense, Data can be forwarded in CEF, LEEF syslog, Piple delimited with Syslog header format.
Partner
Automated Defense, Data can be forwarded in Syslog format.
Partner
Attack Surface Management, Kenna Security KDI JSON exports are available from Attack Surface Management.
Partner
Security Validation, Return events generated by the security technology that match Mandiant Security Validation actions
Partner
Security Validation, Return events generated security technologies that write events to the SIEM and that match Mandiant Security Validation actions
Partner
Security Validation, Return events generated security technologies that write events to the SIEM and that match Mandiant Security Validation actions
Partner
Security Validation, Return events generated security technologies that write events to the SIEM and that match Mandiant Security Validation actions
Partner
Security Validation, Return threat actor intelligence, Attack Surface Management, Attack Surface Management uses the Mandiant Threat Intelligence API to ernich external assets and pull in confidence and risk rating, CVE vulnerability reports and more.