What Integrates with Palo Alto Networks DNS Security Service?

Find out what Palo Alto Networks DNS Security Service integrations exist in 2026. Learn what software and services currently integrate with Palo Alto Networks DNS Security Service, and sort them by reviews, cost, features, and more. Below is a list of products that Palo Alto Networks DNS Security Service currently integrates with:

  • 1
    Graylog Reviews

    Graylog

    Graylog

    $1250/month
    411 Ratings
    See Software
    Learn More
    Graylog is the AI-powered SIEM and log management platform built to help security and IT operations teams work faster, stay focused, and stay in control. It brings together all your event data in one place so teams can detect real threats quickly, investigate efficiently, and manage data costs predictably—without compromise. Graylog’s explainable AI turns noise into clarity, highlighting what matters most and guiding analysts through consistent, confident response steps. Its open, flexible architecture adapts to any environment, empowering organizations to scale and evolve without being locked into rigid systems or unpredictable pricing. With Graylog Security, Enterprise, API Security, and Open, more than 60,000 organizations worldwide rely on Graylog to deliver faster insight, simpler operations, and a smarter path to SIEM without compromise.
  • 2
    Pliant Reviews
    Top Pick
    Pliant offers a robust solution for IT Process Automation that simplifies, enhances, and secures the way teams create and implement automation. By minimizing human errors, ensuring compliance, and boosting overall efficiency, Pliant serves as an invaluable resource. Users can easily incorporate existing automation or develop new workflows through a unified orchestration interface. The platform provides reliable governance that maintains compliance through practical, built-in features. By abstracting thousands of vendor APIs, Pliant creates intelligent action blocks that empower users to simply drag and drop, eliminating the need for repetitive coding. Citizen developers can seamlessly construct effective and uniform automation across various platforms, services, and applications within minutes, thereby maximizing the value of their entire technology ecosystem from a single interface. Furthermore, with the capability to integrate new APIs in just 15 business days, Pliant ensures that any non-standard requirements will be addressed in a leading timeframe, keeping your automation capabilities up to date. This efficiency allows teams to remain agile and responsive in a rapidly changing technological landscape.
  • 3
    DNSSense Reviews
    DNSEye detects malicious network traffic and reports if this traffic can be blocked using your other security devices. DNS is used in all protocols, including HTTP, HTTPS and IoT. DNS traffic provides information on your entire network, irrespective of the network protocol. DLP products cannot detect data exfiltration attacks using DNS tunnelling. DNS log analysis is required for an effective solution. 80% of malware domains do not currently have an IP address. Only the DNS log can detect malware requests without an IP address. DNSservers generate a large number of difficult-to-understand logs. DNSEye allows for the collection, enrichment and AI-based classifying of DNS logs. Its advanced SIEM integration saves time and EPS because it transfers only the data needed by SOC teams to SIEM. DNSEye collects logs from a variety of DNS servers, including many different brands and models. This can be done without requiring any changes to your network structure.
  • 4
    BlueCat Gateway Reviews
    BlueCat Gateway provides a flexible automation layer that unifies DNS operations and integrates seamlessly with the broader Integrity platform. Its Python-based framework gives NetOps, CloudOps, and DevOps teams the freedom to automate everything from routine provisioning to highly complex workflows. Gateway connects easily to platforms like ServiceNow, enabling compliant self-service IP provisioning based on predefined logic and organizational policies. Through Terraform integration and a broad catalog of applications, teams can deeply customize their environments without being locked into proprietary tools. The platform’s intuitive UI allows authorized users to build, edit, and reuse automation workflows quickly, accelerating iteration while reducing operational overhead. Gateway enhances visibility by synchronizing cloud-based resources and providing detailed logs, reports, and health metrics. Its adaptive ecosystem—including open-source scripts from the BlueCat Labs GitHub—gives organizations endless customization potential. Altogether, Gateway empowers IT teams to automate faster, operate more efficiently, and deliver consistent network services across distributed environments.
  • 5
    Notus Reviews
    Notus connects with various data sources to provide ongoing, cohesive asset visibility, which allows for actionable insights that are essential for effective remediation. It identifies all devices, software, and configurations using existing tools, prioritizing the most critical vulnerabilities first. Staying updated on changes and new threats is crucial as it helps in uncovering vulnerabilities and misconfigurations. Additionally, it ensures that security considerations are integrated throughout the lifecycle of assets and software. Monitoring software usage is vital to prevent violations and manage costs efficiently. By streamlining the resolution of issues through task assignments to the appropriate teams, Notus simplifies the management of cybersecurity asset inventories. Traditional manual inventories can be arduous and are typically conducted around twelve times a year, yet they still fail to provide a current and comprehensive view of the entire environment. With Notus, however, managing these inventories becomes not only efficient but also instantaneous, leading to a more secure and well-managed asset landscape. This efficiency ultimately enhances the overall security posture of an organization.
  • 6
    Corelight Reviews
    Corelight offers the advantages of Zeek without the complications associated with Linux, network interface card issues, or the risk of packet loss. Setting it up is a matter of minutes rather than an extensive timeline, allowing your skilled personnel to focus on threat hunting instead of resolving technical glitches. This robust platform, rooted in open-source technology, provides you with full access to your metadata, enabling customization and extension of your capabilities, all while being part of an engaging community. We have assembled a top-tier team of Zeek specialists and contributors, supported by a world-class customer care team that consistently impresses clients with their exceptional expertise and quick response times. With the proactive and secure Corelight Dynamic Health Check feature activated, your Corelight Sensor transmits performance data back to Corelight, allowing for the early detection of potential issues like disk failures or unusual performance metrics. This ensures that your network remains secure and operationally efficient at all times. Ultimately, Corelight empowers organizations to safeguard their networks with confidence and efficiency.
  • 7
    Cortex Data Lake Reviews
    Streamline your organization’s security processes by gathering, modifying, and unifying security data to leverage Palo Alto Networks solutions effectively. By simplifying security operations through the integration of enterprise data, you can enable advanced AI and machine learning capabilities that thrive on extensive data available at cloud scale. Enhance detection precision with access to trillions of artifacts from multiple sources, ensuring comprehensive protection. Cortex XDR™ stands out as the sole platform in the industry that combines prevention, detection, and response capabilities using fully integrated data from endpoints, networks, and the cloud. Prisma™ Access ensures consistent protection for your applications, remote networks, and mobile users, regardless of their location. A cloud-based architecture seamlessly connects all users to applications, accommodating those at headquarters, branch offices, or on the move. Furthermore, the synergy of Cortex™ Data Lake and Panorama™ management provides a cost-effective, cloud-oriented logging solution for Palo Alto Networks Next-Generation Firewalls, with zero hardware requirements and global accessibility. This holistic approach not only bolsters security measures but also facilitates operational efficiency across diverse environments.
  • Previous
  • You're on page 1
  • Next