Pipe Device DNA into the tools you already run. Two surfaces, same data.
Two integration surfaces: syslog for the push (events into your SIEM as they happen) and REST API for the pull (inventory, drift history, compliance evidence, SOAR actions). Pick whichever fits the pipeline you've already built; the data shape is identical across both. Nothing on this page requires you to use our dashboard.
What we don't ship: webhooks, STIX/TAXII feeds. If a vendor in your evaluation queue is matching CybrIQ on functionality but pitching those, that's a different product.
Output channels
1. Syslog (RFC 5424)
Push · UDP/TCP/TLSStandard CEF or LEEF formatting, configurable per receiver. UDP for low-volume sites, TCP+TLS for production deployments.
<134>1 2026-05-10T17:08:12Z ese-bldg-3 cybriq 4231 device-substituted [event@29051 port="sw-bldg-3-fl-2/port-47" previous_dna="dna:7a4f-1c91" current_dna="dna:5b8e-2a4f" similarity="0.31" mitre="T1200,T1556" controls="PCI-4.0/12.5.1"] Substituted device on port-47, site NYC-HQ. Severity high.
2. REST API (pull)
Pull · bearer-token authFor tools that prefer to poll, plus the SOAR-action endpoints (acknowledge, suppress, NAC quarantine). GET endpoints for inventory, events, devices, drift, and compliance evidence. Cursor-paginated.
GET /api/v1/events?since=2026-05-10T00:00:00Z&type=device-substituted Authorization: Bearer <token> { "events": [ ... ], "next_cursor": "eyJ0Ijox..." }
Full endpoint reference and authentication detail on the Syslog & API page.
Tool-specific patterns
For the platforms most security engineers we talk to are already running.
Splunk Enterprise / Splunk Cloud
Channel: Syslog over TCP+TLS into an HEC-compatible receiver. Pull via the REST API also supported for batch ingest.
Sourcetype: cybriq:event · Index: dedicated cybriq index recommended.
Sample SPL:
index=cybriq event=device-substituted similarity<0.5 | join port [search index=ticketing change_window="open" device_id="*"] | where NOT match | stats count by site, port, current_vendor_hint
Correlation rule template surfaces substitutions that don't match an open change ticket.
Microsoft Sentinel
Channel: Syslog into the Azure Monitor Agent (CEF format), or REST-pull via a Logic App into an Azure Monitor Custom Log.
Sample KQL:
CybrIQEvent_CL | where event_s == "device-substituted" and similarity_d < 0.5 | extend mitre_techniques = parse_json(mitre_s) | project TimeGenerated, site_s, port_s, previous_vendor_hint_s, current_vendor_hint_s, similarity_d
Pre-built analytic rule template available; ARM bicep on request.
Google Chronicle / SecOps
Channel: Syslog over TCP+TLS to Chronicle's ingestion endpoint, mapped to the UDM event model.
CybrIQ ships a normalized UDM parser that maps Device DNA events to EVENT_TYPE_GENERIC_EVENT with principal.asset.attribute.labels carrying the DNA hash and MITRE technique IDs. Sample UDM payload and parser available on request.
Elastic SIEM
Channel: Filebeat reading from the syslog stream, into the Elasticsearch ingest pipeline.
Ingest pipeline template maps to ECS (Elastic Common Schema). event.category = network; event.module = cybriq; threat.technique.id = MITRE IDs. Sample pipeline + dashboard JSON in our public Git repo.
IBM QRadar
Channel: Syslog over TCP+TLS into the QRadar event-collector. CybrIQ ships a DSM-friendly parser; events land as a custom Log Source Type.
ServiceNow ITSM & SecOps
Pattern: ServiceNow polls the CybrIQ REST API at the configured cadence (typically every 5 minutes) and creates a Security Incident for each new high-severity event. Category Hardware Integrity; priority derived from MITRE technique severity; full event payload attached.
Auto-resolve rules suppress when the related Change Request is approved within the lookback window.
CrowdStrike Falcon
Pattern: A small connector polls the CybrIQ REST API and pushes the device's confirmed identity (Device DNA + vendor + port) into Falcon as an external indicator via the Threat Intel API. When Falcon sees a host matching the indicator, the analyst gets the switch-derived context without leaving the Falcon console.
Useful for: validating that an EDR-detected host is the device you think it is (no swap attack pending), or escalating an EDR alert when the Device DNA is also anomalous.
SentinelOne Singularity
Pattern: Same shape as the CrowdStrike pattern, REST API poll, push the resolved identity into SentinelOne as an asset-record annotation. CybrIQ also publishes to SentinelOne's Threat Intelligence module for the high-severity event types (substitution, NDAA, unauthorized switch).
Cisco ISE (or other NAC)
Pattern: Two-way. CybrIQ consumes ISE's 802.1X session log to enrich Device DNA records with authenticated-user-and-VLAN context. ISE consumes CybrIQ events via syslog and can trigger quarantine policy on device-substituted or port-topology-changed using the SOAR-action endpoint in the API reference.
Net result: a device that swaps under a stable session gets isolated before lateral movement starts. The loop is sub-minute.
Reference architecture
The platform sits to the side of your security data pipeline, not in line with it. The External Scan Engine (ESE) polls switches in read-only mode; the control plane fans events out as syslog and exposes the inventory through a REST API. If everything we ship disappeared tomorrow, your other tools would keep running; they'd just stop receiving switch-derived events.
The integrations on the rest of this page are all variations of the right-hand side of the diagram. Pick the consumer that fits your existing pipeline; the left half stays the same.
Want a working integration with your specific stack?
30-day pilot. We ship the ESE, wire the integration into your SIEM/SOAR/ITSM/EDR of choice, and demonstrate end-to-end on one of your sites. No fee.
Book a working session