Docs
Guides & resources.

Short reads on tools you will find on Secure Pilot—what they are for, who they fit, and how to take the next step with our team.

Splunk logo

Guide · Splunk

From logs to insights: Splunk for modern SOCs

Enterprise SIEM and observability for security monitoring, search, and analytics at scale.

Read guide
Okta logo

Guide · Okta

Identity-first access with Okta

Identity and access management with SSO, MFA, and lifecycle automation.

Read guide
IBM QRadar logo

Guide · IBM QRadar

SIEM monitoring with IBM QRadar

Centralized event and flow correlation for SOC monitoring, threat hunting, and compliance reporting.

Read guide
Checkmarx logo

Guide · Checkmarx

Shift-left AppSec with Checkmarx

Enterprise SAST, SCA, IaC, API, secrets, and ASPM capabilities integrated into developer pipelines.

Read guide
Burp Suite logo

Guide · Burp Suite

Web application testing with Burp Suite

Intercept, inspect, replay, and test HTTP/HTTPS traffic for web application vulnerabilities.

Read guide
Fortinet FortiGate logo

Guide · Fortinet FortiGate

Network protection with FortiGate NGFW

Next-generation firewall, VPN, IPS, antivirus, web filtering, SD-WAN, and traffic monitoring in one platform.

Read guide
Wiz logo

Guide · Wiz

Agentless cloud security with Wiz

Agentless cloud security for visibility, misconfiguration detection, and risk prioritization.

Read guide
Microsoft Defender logo

Guide · Microsoft Defender

Enterprise EDR with Microsoft Defender

Enterprise EDR with automated investigation, hunting, and Microsoft 365 integration.

Read guide
CrowdStrike Falcon cover

Guide · CrowdStrike

Cloud-native EDR with CrowdStrike Falcon

Endpoint detection and response with a lightweight sensor and cloud-scale analytics.

Read guide
SentinelOne cover

Guide · SentinelOne

Autonomous endpoint security with SentinelOne

AI-driven EPP/EDR with automated incident response in a single endpoint agent.

Read guide
Microsoft Entra ID cover

Guide · Microsoft Entra ID

Identity access with Microsoft Entra ID

IAM with SSO, MFA, conditional access, and modern authentication protocols.

Read guide
Microsoft Purview cover

Guide · Microsoft Purview

Data governance and DLP with Microsoft Purview

Discover and classify sensitive data, then enforce protection policies across Microsoft 365 and endpoints.

Read guide
Cortex XDR cover

Guide · Cortex XDR

Correlated detection and response with Cortex XDR

XDR that correlates endpoint, network, and cloud telemetry into high-signal incidents.

Read guide
Forcepoint DLP cover

Guide · Forcepoint DLP

Prevent data leaks with Forcepoint DLP

Data loss prevention across endpoints, network, email, and cloud apps using policy-based controls.

Read guide
Palo Alto Networks cover

Guide · Palo Alto Networks

Security platform overview: Palo Alto Networks

How Palo Alto Networks combines NGFW, cloud security, and automation to reduce risk across environments.

Read guide