// artifact family

ztna / sase platform expansion forensics

10 browser-only forensics tools in this catalog group — browse by artifact family when you know the kind of evidence you are working with, not the investigation pattern.

tools
10
catalog slugs
10
processing
local · in browser

tools in this family

ordered as in the forensics catalog. every tool runs locally — no upload, no account.

  1. cato sase audit log forensic analyzerdrop cato sase audit export · parse user + app + action · runs locally
  2. twingate access log forensic analyzerdrop twingate access export · parse resource + user + network · runs locally
  3. appgate sdp audit log forensic analyzerdrop appgate sdp audit export · parse session + entitlement + user · runs locally
  4. perimeter81 zero trust log forensic analyzerdrop perimeter 81 export · parse gateway + user + destination · runs locally
  5. forcepoint one sase log forensic analyzerdrop forcepoint one export · parse policy + user + url · runs locally
  6. ztna impossible travel access detectordrop ztna session export · detect impossible travel access patterns · runs locally
  7. ztna device posture bypass detectordrop ztna posture export · detect device posture bypass attempts · runs locally
  8. ztna privileged app access detectordrop ztna app export · detect privileged application access bursts · runs locally
  9. multi ztna session timeline correlatordrop 2+ ztna exports · unified zero-trust session timeline graph · runs locally
  10. cross ztna identity access correlatordrop ztna + iam exports · correlate app access to identity account · runs locally
ready