What Integrates with Zeek?
Find out what Zeek integrations exist in 2026. Learn what software and services currently integrate with Zeek, and sort them by reviews, cost, features, and more. Below is a list of products that Zeek currently integrates with:
-
1
Observe
Observe
$0.35 Per GiBApplication Performance Management Get complete visibility into the health and performance of applications. Detect and resolve performance issues no matter where they occur in the entire stack. No sampling. No blindspots. Log Analytics Search and analyze event data across your applications, infrastructure, security, or business without worrying about indexing, data tiers, retention policies, or cost. Keep all log data always hot. Infrastructure Monitoring Capture metrics across your infrastructure – cloud, Kubernetes, serverless, applications or from over 400 pre-built integrations. Visualize the entire stack and troubleshoot performance issues in real-time. O11y AI Investigate and resolve incidents faster with O11y Investigator. Use natural language to explore observability data with O11y Copilot, generate Regular Expressions effortlessly with O11y Regex, and obtain precise answers with O11y GPT. Observe for Snowflake Comprehensive observability into Snowflake workloads. Optimize performance and resource utilization. Deliver secure and compliant operations. -
2
Elastic Observability
Elastic
$16 per monthLeverage the most extensively utilized observability platform, founded on the reliable Elastic Stack (commonly referred to as the ELK Stack), to integrate disparate data sources, providing cohesive visibility and actionable insights. To truly monitor and extract insights from your distributed systems, it is essential to consolidate all your observability data within a single framework. Eliminate data silos by merging application, infrastructure, and user information into a holistic solution that facilitates comprehensive observability and alerting. By integrating limitless telemetry data collection with search-driven problem-solving capabilities, you can achieve superior operational and business outcomes. Unify your data silos by assimilating all telemetry data, including metrics, logs, and traces, from any source into a platform that is open, extensible, and scalable. Enhance the speed of problem resolution through automatic anomaly detection that leverages machine learning and sophisticated data analytics, ensuring you stay ahead in today's fast-paced environment. This integrated approach not only streamlines processes but also empowers teams to make informed decisions swiftly. -
3
Dropzone AI
Dropzone AI
$36,000/year Dropzone AI emulates the methods used by top-tier analysts to conduct thorough investigations for every alert without human intervention. This dedicated AI agent handles complete investigations autonomously, ensuring that all alerts are addressed comprehensively. Designed to mirror the investigative strategies employed by leading SOC analysts, its output is not only quick but also detailed and precise. Users have the added benefit of engaging with its chatbot for more in-depth discussions. The cybersecurity reasoning framework of Dropzone, uniquely developed using cutting-edge technology, executes a meticulous investigation for each alert. Its foundational training, contextual awareness of organizational specifics, and built-in safeguards contribute to its impressive accuracy. Ultimately, Dropzone produces a comprehensive report that includes a conclusion, an executive summary, and detailed insights presented in clear language. Moreover, the chatbot feature enhances user engagement by allowing for on-the-fly questions and clarifications. -
4
Security Onion
Security Onion
FreeSecurity Onion serves as a robust open-source platform dedicated to intrusion detection, network security monitoring, and log management. Equipped with a suite of effective tools, it empowers security experts to identify and address potential threats within an organization's network. By integrating various technologies such as Suricata, Zeek, and the Elastic Stack, Security Onion enables the collection, analysis, and real-time visualization of security data. Its user-friendly interface simplifies the management and examination of network traffic, security alerts, and system logs. Additionally, it features integrated tools for threat hunting, alert triage, and forensic analysis, which aid users in swiftly recognizing possible security incidents. Tailored for scalability, Security Onion is effective for a diverse range of environments, accommodating both small businesses and large enterprises alike. With its ongoing updates and community support, users can continuously enhance their security posture and adapt to evolving threats. -
5
Malcolm
Malcolm
FreeMalcolm serves as an open-source platform for security monitoring, aimed at assisting security experts in the collection, processing, and analysis of network data to facilitate threat detection and incident response. By integrating a suite of robust tools, it enables users to capture and visualize network traffic, log information, and security alerts effectively. The platform features a user-friendly interface that simplifies the investigation of potential threats, granting security analysts detailed insights into network activities. Scalability is a key aspect of Malcolm, as it offers versatile deployment options suitable for a range of environments, from small businesses to large corporations. Additionally, its modular architecture allows users to tailor the platform according to their unique security needs, while seamless integration with other observability tools enhances overall monitoring capabilities. Although Malcolm excels in general network traffic analysis, its developers recognize a specific demand within the community for tools that deliver insights into protocols employed in industrial control systems (ICS), thereby addressing a critical niche in security monitoring. This focus on ICS enhances the platform’s relevance in sectors where such systems are vital for operational integrity and safety. -
6
cPacket
cPacket Networks
cVu-V - $21,000/year cPacket provides network-aware application performance for distributed hybrid-IT environments and security assurance. Our single-pane of-glass analytics enable machine learning-based AIOps. cPacket allows you to manage, secure, and future-proof your network, enabling digital transformation. This industry's most comprehensive, yet simple network visibility stack offers all you need to manage your hybrid network across branch and data center, as well as the cloud. -
7
NXLog
NXLog
Achieve unparalleled security observability by leveraging insightful data from your logs. Enhance the visibility of your infrastructure while bolstering threat prevention through a flexible, multi-platform solution. With compatibility spanning over 100 operating system versions and more than 120 customizable modules, you can obtain extensive insights and strengthen your overall security posture. Significantly lower the expenses associated with your SIEM solution by effectively minimizing noisy and redundant log data. By filtering events, truncating unnecessary fields, and eliminating duplicates, you can substantially improve the quality of your logs. Unify the collection and aggregation of logs from all systems within your organization using a single, comprehensive tool. This approach simplifies the management of security-related events and accelerates both detection and response times. Additionally, empower your organization to fulfill compliance obligations by centralizing specific logs within a SIEM while archiving others for long-term retention. The NXLog Platform serves as an on-premises solution designed for streamlined log management, offering versatile processing capabilities to meet diverse needs. This powerful tool not only enhances security efficiency but also provides a streamlined approach to managing extensive log data. -
8
Cybraics
Cybraics
Eliminate the need to constantly monitor alerts and proactively avert incidents before they occur with the premier XDR platform that transforms how threats are detected, logs are managed, and responses are coordinated. Bridge existing gaps and empower your team with our top-tier, integrated XDR solution that not only ensures compliance but also streamlines security operations. Cybraics nLighten™ stands out as more than just a standard security tool; it emerged from advanced AI and machine learning initiatives conducted alongside the U.S. Department of Defense, serving as a key resource for extracting actionable insights from the dispersed and isolated data, logs, and alerts generated by various security tools within your infrastructure. With Cybraics, achieving robust threat detection is accessible and doesn’t have to strain your budget. Equipped with Adaptive Analytic Detection (AAD) and Persistent Behavior Tracing (PBT), this platform enhances the effectiveness of your security team by automating 96% of actionable case creation while significantly cutting false positives by 95%. Consequently, the time required for detection and response is dramatically reduced from months to mere minutes, allowing your organization to respond swiftly to potential threats. This innovative approach not only strengthens your security posture but also optimizes resource allocation across your team. -
9
LimaCharlie
LimaCharlie
If you are in search of endpoint protection, an observability framework, detection and response protocols, or various essential security features, LimaCharlie’s SecOps Cloud Platform empowers you to create a security program that is both adaptable and scalable, keeping pace with the rapidly changing tactics of threat actors. This platform delivers extensive enterprise defense by integrating vital cybersecurity functions while addressing integration issues and closing security loopholes, thereby enhancing protection against contemporary threats. Additionally, the SecOps Cloud Platform provides a cohesive environment that allows for the effortless development of tailored solutions. Equipped with open APIs, centralized data monitoring, and automated detection and response capabilities, this platform signifies a much-needed shift towards modern cybersecurity practices. By leveraging such advanced tools, organizations can significantly enhance their security postures and better safeguard their assets. -
10
Wraith
NetCentrics
The swift adoption of cloud technology, combined with the intricacies of multi-cloud setups and isolated security teams, results in a significant visibility deficit for numerous organizations. Wraith effectively tackles this issue by delivering exceptional visibility and threat-hunting functionalities that span on-premise, hybrid, and multi-cloud infrastructures. With the incorporation of AI-driven anomaly detection, Wraith becomes an indispensable resource for identifying and mitigating concealed threats, thereby safeguarding cloud environments. Additionally, Wraith offers extensive visibility across various terrains, enabling security teams to oversee assets and activities across multiple Cloud Service Providers (CSPs) using a single toolset. This capability not only fosters a cohesive security framework but also accelerates threat response times in the face of diverse and intricate cloud ecosystems, making it a vital component for modern cybersecurity strategies. Ultimately, organizations can enhance their security measures and respond more effectively to emerging threats. -
11
The Collective Defense Platform from IronNet utilizes sophisticated AI-powered Network Detection and Response (NDR) technology to identify and prioritize unusual activities within the specific environments of individual enterprises. By examining threat identifications across its community, the platform uncovers widespread attack trends and offers anonymized intelligence to all members in real-time, equipping them with early warnings of potential threats. This collaborative effort allows companies and organizations from various sectors to enhance their defense strategies collectively, enabling them to recognize and combat similar threats more effectively. When entities join forces to detect, exchange intelligence, and counter threats in real-time, they establish a united defense network. Learn how IronNet's Collective Defense platform, which is underpinned by the IronDome and IronDefense solutions, empowers organizations to fully embrace and benefit from this collaborative defense mechanism. By fostering a sense of community and shared responsibility, the platform ultimately strengthens the overall security landscape for all participants.
-
12
Onum
Onum
Onum serves as a real-time data intelligence platform designed to equip security and IT teams with the ability to extract actionable insights from in-stream data, thereby enhancing both decision-making speed and operational effectiveness. By analyzing data at its origin, Onum allows for decision-making in mere milliseconds rather than taking minutes, which streamlines intricate workflows and cuts down on expenses. It includes robust data reduction functionalities that smartly filter and condense data at the source, guaranteeing that only essential information is sent to analytics platforms, thus lowering storage needs and related costs. Additionally, Onum features data enrichment capabilities that convert raw data into useful intelligence by providing context and correlations in real time. The platform also facilitates seamless data pipeline management through effective data routing, ensuring that the appropriate data is dispatched to the correct destinations almost instantly, and it accommodates a variety of data sources and destinations. This comprehensive approach not only enhances operational agility but also empowers teams to make informed decisions swiftly. -
13
Tenzir
Tenzir
Tenzir is a specialized data pipeline engine tailored for security teams, streamlining the processes of collecting, transforming, enriching, and routing security data throughout its entire lifecycle. It allows users to efficiently aggregate information from multiple sources, convert unstructured data into structured formats, and adjust it as necessary. By optimizing data volume and lowering costs, Tenzir also supports alignment with standardized schemas such as OCSF, ASIM, and ECS. Additionally, it guarantees compliance through features like data anonymization and enhances data by incorporating context from threats, assets, and vulnerabilities. With capabilities for real-time detection, it stores data in an efficient Parquet format within object storage systems. Users are empowered to quickly search for and retrieve essential data, as well as to reactivate dormant data into operational status. The design of Tenzir emphasizes flexibility, enabling deployment as code and seamless integration into pre-existing workflows, ultimately seeking to cut SIEM expenses while providing comprehensive control over data management. This approach not only enhances the effectiveness of security operations but also fosters a more streamlined workflow for teams dealing with complex security data.
- Previous
- You're on page 1
- Next