What's Needed to Use Dropzone

To get started with Dropzone, you'll need at minimum one Alert Source and one Data Source. This gives Dropzone alerts to investigate and the contextual information needed to perform thorough analysis.

Alert Sources

We recommend starting with your primary security monitoring platform, typically your:

  • SIEM, for example:

    • Splunk

    • Microsoft Sentinel

    • Panther

  • Cloud-native security services, for example:

    • AWS GuardDuty

    • Microsoft Defender

    • Google Cloud Security Command Center

These serve as your “single pane of glass” for security events and provide the most comprehensive alert coverage.

Dropzone also integrates with additional alert-producing tools, including:

  • EDR platforms, such as:

    • CrowdStrike

    • SentinelOne

    • Palo Alto Cortex XDR

  • Email security tools

  • Identity platforms, such as:

    • Okta

    • Microsoft 365

    • Google Workspace

  • And many other security tools

Data Sources

For Data Sources, the more you enable, the more powerful Dropzone becomes. Think of it like giving a SOC analyst access to more institutional knowledge—each additional data source enhances the platform’s ability to provide context, correlate information, and make informed decisions.

Dropzone supports 100+ integrations across technologies such as:

  • Threat intelligence, for example:

    • CrowdStrike Falcon Intelligence

    • VirusTotal

    • Hybrid Analysis

    • GreyNoise

    • PhishTank

    • And more

  • Corporate systems, for example:

    • Microsoft Entra ID

    • Google Workspace

    • Active Directory

    • Jira

    • ServiceNow

  • Cloud platforms, for example:

    • AWS

    • Azure

    • Google Cloud

The platform intelligently determines which data sources are relevant for each investigation, so you can confidently enable as many as possible without worrying about information overload.

Check out all of our integrations here.

Last updated

Was this helpful?