Stream Red Sift telemetry to Sentinel, Splunk, and more with Event Hub

Event Hub is a new capability that streams real-time, structured security events from Red Sift products into the platforms security teams already use: SIEMs, SOARs, XDRs, ticketing tools, messaging platforms, and cloud storage.

It enables faster, more consistent response by pushing telemetry directly into the workflows where detection, triage, and remediation already happen. Whether it’s an unauthorized IP flagged in a DMARC report, a suspicious lookalike domain, or an unexpected certificate issue, Event Hub ensures Red Sift signals are delivered the moment they occur without a UI login, polling, or delays.

Push-based delivery, structured for seamless integration

Event Hub uses a push-based architecture to stream events as they’re generated. Once configured, it delivers telemetry directly to your chosen destinations.

Event structures/schemas are based on Open Cybersecurity Schema Framework (OCSF), providing a consistent format across Red Sift products, including OnDMARC, Brand Trust, and Certificates. This standardization reduces integration effort, simplifies automation, and supports interoperability across modern security ecosystems.

Supporting audit visibility from day one

The first release of Event Hub focuses on audit logs—streaming user and account activity from Red Sift products into your existing security and compliance tools. These events include actions such as user logins, domain additions, and configuration changes, along with associated metadata like IP addresses.

This visibility helps teams answer key questions such as:

  • Who accessed the account and from where?
  • Was that login consistent with expected behavior?
  • When did a configuration change occur, and who made it?

Whether you’re monitoring for unusual activity, maintaining an audit trail for compliance, or storing logs for future investigations, Event Hub ensures these events are available in real time, without needing to manually extract data from the Red Sift UI.

Sometimes, seeing is believing. Check out our VP of Customer Engineering, Billy McDiarmid, walk through the setup of Event Hub and how audit events are displayed in your chosen platforms.

What systems can Event Hub stream to?

At launch, audit logs can be streamed to Splunk, Microsoft Sentinel, Slack, Amazon S3, and ServiceNow, with custom webhooks also supported.

  • In Microsoft Sentinel, Red Sift telemetry becomes part of your centralized security analytics, helping correlate account activity with other identity, device, and cloud signals.
  • In Splunk, audit logs can be stored, queried, and visualized alongside other infrastructure and application events supporting investigations and compliance reporting.

What’s coming next: expanded signals and integrations

While audit logs are available today, Event Hub is built for more. Future releases will add support for real-time detection events, for example:

  • When OnDMARC detects an unauthorized sending source, a SOAR playbook can trigger automated remediation using the Red Sift API
  • Brand Trust alerts can be routed to XDR platforms for correlation and investigation
  • Certificate telemetry can be logged to a SIEM for early warning of misconfigurations or expiring assets
  • MSSPs can centralize multi-tenant logs into a shared security data lake

Additionally, upcoming integrations include:

  • Cisco XDR
  • Email

Now available for Red Sift customers

To enable Event Hub in your environment or learn more, contact your Red Sift account team.

PUBLISHED BY

Francesca Rünger-Field

1 Jul. 2025

SHARE ARTICLE:

Categories

Recent Posts

VIEW ALL
BEC

What is email spoofing and how can you prevent it?

Faisal Misle

Executive summary: Email spoofing is a growing cyber threat where attackers forge the sender’s address to impersonate trusted sources, enabling phishing, business email compromise, and financial fraud. Because legacy email protocols like SMTP lack strong authentication, spoofing can bypass traditional filters. Organizations can mitigate this risk by implementing robust email authentication measures, especially DMARC.…

Read more
Email

What is social engineering and how can you prevent it?

Jack Lilley

Executive summary: Email phishing has evolved and criminals now use social engineering to impersonate executives, suppliers, and even government agencies, persuading recipients to approve payments or disclose credentials. Because human judgment sits at the heart of these attacks, technical controls that eliminate spoofed messages before they reach the inbox are essential. DMARC provides that…

Read more
Cybersecurity

Attackers are abusing Microsoft 365: Here’s how to stay protected

Jack Lilley

Executive summary: Varonis has surfaced an active phishing campaign that spoofs internal users by abusing Microsoft 365’s Direct Send feature. Because Direct Send doesn’t require authentication and is treated as “internal,” these messages often bypass the checks you rely on for outside mail. Microsoft now offers an opt-in switch, RejectDirectSend, to block the pathway,…

Read more
BEC

SVGs with JavaScript are bypassing traditional email security: Learn how to stay…

Jack Lilley

Executive summary: Hackers are hiding JavaScript inside SVG attachments that pass as harmless images, and slipping past Secure Email Gateways (SEGs). To stay secure, organizations need to enforce a DMARC policy of p=reject, easily implemented with Red Sift OnDMARC, to stop compromised SVGs before they reach the end user. Key takeaways: Scalable Vector Graphics…

Read more