Collect logs and alerts from security devices such as firewalls, IDS-IPS, endpoint protection systems, and cloud security services