Product / Collect & Enrich

Build Your Security Data Lake in Hours

Connect dozens of log sources with zero custom code. Transform and enrich your data during ingestion. Store everything in your own S3 buckets with complete data ownership.

30+

Pre-built integrations

< 5 min

Average setup time per source

~$0.02 / GB

S3 storage cost per month

100%

Data ownership & control

How Scanner Collect Works

Step 1:

Connect your log sources

Choose from 30+ pre-built integrations covering SaaS applications, cloud platforms, and security tools. No scripts to write, no agents to  deploy, no API tokens to manage manually.

Docs: Scanner Collect
link_out
Step 2:

Logs delivered to your S3

All logs are written directly to your S3 buckets as gzipped JSON files. You maintain complete data custody - your data never leaves your AWS account.

Step 3:

Transform your logs

Parse and normalize logs during ingestion using VRL (Vector Remap Language). Extract fields, handle timestamps, and structure unstructured data - all before indexing.

Docs: Data Transformations
link_out
Step 4:

Enrich with context

Add organizational and threat intelligence context during ingestion. All enrichment happens at indexing time, making the context immediately searchable for investigations and detections.

Docs: Lookup Table Enrichment
link_out
Step 5:

Indexed & immediately searchable

Scanner builds compact index files alongside your logs, enabling full-text search across petabytes in seconds. Original logs stay untouched in S3. Index files use ~15% of storage overhead and remain in your buckets.

Docs: How Scanner Works
link_out

Data lake architecture

Your logs stay in your S3 buckets. Scanner adds lightweight indexes for instant search. No data leaves your environment.

Pre-built integrations

Connect your entire security stack in an afternoon. More sources added regularly based on customer demand.

1Password
Auth0
AWS CloudTrail
Azure
Google Cloud
GitHub
Okta
Snowflake
Wiz

Scanner Collect vs. building it yourself

Compare Scanner to custom log pipelines and traditional SIEMs.

Capability
Time to First Data
Data Ownership
Storage Cost
Maintenance Overhead
Transformation Engine
Threat Intelligence
Long-term Retention
Vendor Lock-in
Scanner Collect
completed
5 minutes
completed
Your S3 buckets
completed
S3 rates (~$0.02 / GB / mo)
completed
Zero (fully managed)
completed
Time to First Data
completed
VRL with preview UI
completed
Unlimited in S3
completed
None (standard s3)
Custom Scripts
close
Days / weeks of dev
completed
Your infrastructure
completed
S3 rates
close
High (on-call, updates)
close
Custom code
close
Build yourself
completed
Unlimited in S3
completed
None
Traditional SIEM
completed
Hours
close
Vendor storage
close
$100-300 / GB / mo
completed
Low (managed)
Limited build-in
completed
Premium add-on
close
Expensive / limited
close
High (proprietary)

FAQ

Start Building your Security Data Lake

 See how Scanner Collect can help you consolidate all  your security logs, transform them with rich context, and make them  instantly searchable - all in an afternoon.

Book a Demo