What Integrates with Palo Alto Networks DNS Security Service?
Find out what Palo Alto Networks DNS Security Service integrations exist in 2025. Learn what software and services currently integrate with Palo Alto Networks DNS Security Service, and sort them by reviews, cost, features, and more. Below is a list of products that Palo Alto Networks DNS Security Service currently integrates with:
-
1
Pliant
Pliant.io
12 RatingsPliant's solution to IT Process Automation streamlines, secures, and simplifies the way teams build and deploy automation. Pliant will reduce human error, ensure compliance and increase your efficiency. Pliant allows you to integrate existing automation and create new automation using single-pane orchestration. You can ensure compliance with consistent, practical, built-in governance. Pliant has abstracted thousands from vendor APIs to create intelligent actions blocks that allow users to drag-and drop blocks rather than writing lines of code. Citizen developers can create consistent and meaningful automation across platforms and services in minutes. This allows them to maximize the value of the entire technology stack from one platform. We can add APIs in as little as 15 business days. This is an industry-leading timeframe. -
2
DNSSense
DNSSense
$1000DNSEye detects malicious network traffic and reports if this traffic can be blocked using your other security devices. DNS is used in all protocols, including HTTP, HTTPS and IoT. DNS traffic provides information on your entire network, irrespective of the network protocol. DLP products cannot detect data exfiltration attacks using DNS tunnelling. DNS log analysis is required for an effective solution. 80% of malware domains do not currently have an IP address. Only the DNS log can detect malware requests without an IP address. DNSservers generate a large number of difficult-to-understand logs. DNSEye allows for the collection, enrichment and AI-based classifying of DNS logs. Its advanced SIEM integration saves time and EPS because it transfers only the data needed by SOC teams to SIEM. DNSEye collects logs from a variety of DNS servers, including many different brands and models. This can be done without requiring any changes to your network structure. -
3
Corelight
Corelight
Corelight gives you the power of Zeek with no Linux issues, NIC problems or packet loss. The deployment process takes only minutes and not months. Your top people should be troubleshooting and not threat hunting. Open source is the best platform to protect and understand your network. Open source will give you full access to your metadata, and allow you to customize and expand your capabilities. This is all in the company of a vibrant community. We have assembled the best team of Zeek contributors and experts, and have built a world-class support staff that delights customers with their unmatched knowledge and quick response times. Corelight Dynamic health Check is proactive, secure, and automated. This allows Corelight to send performance telemetry back at Corelight to monitor for abnormal performance metrics or disk failures that could indicate a problem. -
4
BlueCat Gateway
BlueCat
End users can access self-service capabilities, making IT more accessible throughout the enterprise. Access an automation library that simplifies complex tasks and integrates with third-party solutions to increase the value of existing solutions. Automate the setup and teardown of cloud and on-premises resources. IT can respond quicker to requests. Increase visibility from the data centre to the cloud by continuous synchronization and discovery of cloud-based IP addresses and DNS-resources. Automating the reconciliation between DNS records and IP addresses reduces time and speeds up investigations. With centralized management and integration to native DNS and IP configuration services within public clouds, you can accelerate application delivery and eliminate outages. Flexible control over DNS failover manual or automatic allows you to align custom network emergency plans. -
5
Cortex Data Lake
Cortex
Palo Alto Networks solutions can be enabled by integrating security data from your enterprise. Rapidly simplify security operations by integrating, transforming, and collecting your enterprise's security information. Access to rich data at cloud native scale enables AI and machine learning. Using trillions of multi-source artifacts, you can significantly improve detection accuracy. Cortex XDR™, the industry's leading prevention, detection, response platform, runs on fully integrated network, endpoint, and cloud data. Prisma™, Access protects applications, remote networks, and mobile users in a consistent way, no matter where they are. All users can access all applications via a cloud-delivered architecture, regardless of whether they are at headquarters, branch offices, or on the road. Combining Panorama™, Cortex™, and Data Lake management creates an affordable, cloud-based log solution for Palo Alto Networks Next-Generation Firewalls. Cloud scale, zero hardware, available anywhere. -
6
Notus
Notus
Notus integrates a wide range data sources to provide continuous, unified visibility of assets, enabling actionable insight for critical remediation. Identify all devices and software configurations using existing tools. Prioritize the most critical vulnerabilities. Stay up-to-date on changes and new threats. Discover vulnerabilities and misconfigurations. Assure that security is considered throughout the lifecycles of assets and software. Track software usage to prevent violations and optimize costs. continuous. Assigning tasks to the relevant teams will streamline issue resolution. Manual cybersecurity asset inventories are labor-intensive and often performed 12 times a year. You will not achieve a consolidated, up-to date view of your entire environment despite this effort. Notus makes it easy to manage cybersecurity asset inventories.
- Previous
- You're on page 1
- Next