Best Cybersecurity Software for Splunk Cloud Platform

Find and compare the best Cybersecurity software for Splunk Cloud Platform in 2024

Use the comparison tool below to compare the top Cybersecurity software for Splunk Cloud Platform on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Kroll Cyber Risk Reviews
    See Software
    Learn More
    Tackle every facet of today and tomorrow’s threat landscape with guidance from Kroll’s Cyber Risk experts. Enriched by frontline threat intel from 3000+ incident response cases every year, Kroll’s protection, detection, and response solutions immediately mature your cyber posture.
  • 2
    Keeper Security Reviews
    Top Pick

    Keeper Security

    Keeper Security

    $2.00 per user, per month
    1,542 Ratings
    See Software
    Learn More
    Password security is the foundation of cybersecurity. Keeper's powerful password security platform will protect your business from cyberthreats and data breaches related to passwords. Research shows that 81% of data breaches can be attributed to weak passwords. Password security platforms are an affordable and easy way for companies to address the root cause of most data breaches. Your business can significantly reduce the risk of data breaches by implementing Keeper. Keeper creates strong passwords for all websites and apps, then secures them on all devices. Each employee receives a private vault to store and manage their passwords, credentials and files, as well as private client data. Employees will save time and frustration by not having to remember, reset, reuse, or remember passwords. Industry compliance is achieved through strict and customizable role-based access controls. This includes 2FA, usage auditing, and event reporting.
  • 3
    IPQualityScore Reviews

    IPQualityScore

    IPQualityScore

    $49.99 per month
    2 Ratings
    IPQualityScore's suite fraud prevention tools automate quality controls to prevent bots and fake accounts, fraudsters chargebacks & malicious users, without interfering with the user experience. With industry-leading IP reputation data and user validation, you can detect bad actors and block cyber threats. For smoother operations and less headaches, proactive Prevent Fraud™.
  • 4
    ControlMap Reviews
    Take control of SOC2, ISO-27001, NIST, CSA STAR, or other Infosec certifications with a simple, easy-to-use, fully automated platform. ControlMap's smart mapping saves you hundreds of hours responding and assessing data requests. It automatically and continuously associates RISKS CONTROLS, POLICIES, AND PROCEDURES so that you don't have the task of responding to each request. ControlMap's integration with other ticketing systems like Jira makes it easier to use. Our Jira Marketplace App, Jira integration collects evidence, raises alerts, or simply creates tasks in other systems. You can eliminate any last-minute surprises. We have created a product that modern teams can use. Start with a free trial, or contact us to learn more.
  • 5
    GitGuardian Reviews
    Top Pick
    GitGuardian is a global cybersecurity startup focusing on code security solutions for the DevOps generation. A leader in the market of secrets detection and remediation, its solutions are already used by hundred thousands developers in all industries. GitGuardian helps developers, cloud operation, security and compliance professionals secure software development, define and enforce policies consistently and globally across all their systems. GitGuardian solutions monitor public and private repositories in real-time, detect secrets and alert to allow investigation and quick remediation.
  • 6
    ThreatLocker Reviews
    Top Pick
    For IT professionals to stop ransomware, you need to do more than look for threats. ThreatLocker helps you reduce your surface areas of attack with policy-driven endpoint security and change the paradigm from only blocking known threats, to blocking everything that is not explicitly allowed. Combined with Ringfencing and additional controls, you enhance your Zero Trust protection and block attacks that live off the land. Discover today the ThreatLocker suite of Zero Trust endpoint security solutions: Allowlisting, Ringfencing, Elevation Control, Storage Control, Network Access Control, Unified Audit, ThreatLocker Ops, Community, Configuration Manager and Health Center. 
  • 7
    Malwarebytes Reviews
    Top Pick

    Malwarebytes

    Malwarebytes

    $47.22 per user per year
    12 Ratings
    Cyberthreats are eradicated Restores confidence. Traditional antivirus is no longer sufficient. Malwarebytes eliminates all new threats before other antivirus systems even know they exist. Malwarebytes blocks viruses, malware, malicious sites, ransomware, hackers, and other threats that traditional antivirus can't stop. Organizations of all sizes use our cutting-edge protection and response strategies. Traditional antivirus is slow to respond to new threats. It's also "dumb". We use layers like anomaly detection (an artificial intelligence type), behavior matching, application hardening, and behavior matching to destroy malware that has never been seen before. It's not like traditional antivirus.
  • 8
    Axonius Reviews
    Axonius gives IT and security teams the confidence to control complexity by providing a system of record for all digital infrastructure. With a comprehensive understanding of all assets including devices, identities, software, SaaS applications, vulnerabilities, security controls, and the context between them, customers are able to mitigate threats, navigate risk, decrease incident response time, automate action, and inform business-level strategy — all while eliminating manual, repetitive tasks.
  • 9
    CyCognito Reviews

    CyCognito

    CyCognito

    $11/asset/month
    Using nation-state-grade technology, uncover all security holes in your organization. CyCognito's Global Bot Network uses an attacker-like reconnaissance technique to scan, discover, and fingerprint billions digital assets around the globe. No configuration or input required. Discover the unknown. The Discovery Engine uses graph data modelling to map your entire attack surface. The Discovery Engine gives you a clear view on every asset an attacker could reach, their relationship to your business, and what they are. The CyCognito risk-detection algorithms allow the attack simulator to identify risks per asset and find potential attack vectors. It does not affect business operations and doesn't require configuration or whitelisting. CyCognito scores each threat based on its attractiveness to attackers, and the impact on the business. This dramatically reduces the number of attack vectors organizations may be exposed to to just a few.
  • 10
    SOC Prime Platform Reviews
    SOC Prime equips security teams with the largest and most robust platform for collective cyber defense that cultivates collaboration from a global cybersecurity community and curates the most up-to-date Sigma rules compatible with over 28 SIEM, EDR, and XDR platforms. Backed by a zero-trust approach and cutting-edge technology powered by Sigma and MITRE ATT&CK®️, SOC Prime enables smart data orchestration, cost-efficient threat hunting, and dynamic attack surface visibility to maximize the ROI of SIEM, EDR, XDR & Data Lake solutions while boosting detection engineering efficiency. SOC Prime’s innovation is recognized by independent research companies, credited by the leading SIEM, XDR & MDR vendors, and trusted by 8,000+ organizations from 155 countries, including 42% of Fortune 100, 21% of Forbes Global 2000, 90+ public sector institutions, and 300+ MSSP and MDR providers. SOC Prime is backed by DNX Ventures, Streamlined Ventures, and Rembrandt Venture Partners, having received $11.5M in funding in October 2021. Driven by its advanced cybersecurity solutions, Threat Detection Marketplace, Uncoder AI, and Attack Detective, SOC Prime enables organizations to risk-optimize their cybersecurity posture.
  • 11
    ShadowKat Reviews
    ShadowKat is an attack external surface management software designed to help cybersecurity managers maintain a stronger compliance lifecycle, continually monitor security risks, and identify various organizations assets such as webpages, networks, ASN’s, IP Addresses, open ports and more. ShadowKat helps security managers reduce the time vulnerabilities exist and reduce the size of their organization’s internet facing attack surface. Key features of ShadowKat include change monitoring, risk-based alerts, reduce vulnerabilities, and manage compliance requirements.
  • 12
    VaultCore Reviews

    VaultCore

    Fornetix

    $1,118 per year
    VaultCore™ is a next-generation, highly scalable enterprise key management solution from Fornetix®. It integrates seamlessly with existing platforms, automates policy, and empowers administrators with a centralized, organized control that can be easily applied across all environments. Request a demo to experience VaultCore's products: - Quick, seamless integration with existing technology - Separation Of Duties (a best practice). - Powerful automation allows for centralized control of policy - Increased security of data in motion, at rest, and in use - Significant reduction in the costs associated with data breaches -- lost businesses, recovery time, reputational damage - Simplified compliance, regulatory enforcement - Scalable to more than 100 million keys (more that enough to meet any industry or government's requirements) - Reporting capabilities to meet compliance requirements - Ease in Use
  • 13
    Armis Reviews

    Armis

    Armis Security

    Armis, the leading asset visibility and security company, provides a unified asset intelligence platform designed to address the new extended attack surface that connected assets create. Fortune 100 companies trust our real-time and continuous protection to see with full context all managed, unmanaged assets across IT, cloud, IoT devices, IoMT, OT, ICS, and 5G. Armis provides passive cyber asset management, risk management, and automated enforcement. Armis is a privately held company and headquartered in California.
  • 14
    Barracuda WAF-as-a-Service Reviews
    It can take many hours to configure traditional web application firewalls. Barracuda WAF as-a-Service, a cloud-delivered application security solution, is a better choice. Deploy it, configure it, and put it into full production--protecting all your apps from all the threats--in just minutes.
  • 15
    Infocyte Reviews
    Security teams can use the Infocyte Managed Response Platform to detect and respond to cyber threats and vulnerabilities within their network. This platform is available for physical, virtual and serverless assets. Our MDR platform offers asset and application discovery, automated threats hunting, and incident response capabilities on-demand. These proactive cyber security measures help organizations reduce attacker dwell time, reduce overall risk, maintain compliance, and streamline security operations.
  • 16
    Tenable Cloud Security Reviews
    The cloud security platform that is actionable. Reduce risk by quickly exposing and closing security gaps caused by misconfigurations. CNAPP solutions replace a patchwork product that can cause more problems than it solves, such as false positives or excessive alerts. These products are often only partially covered and create friction and overhead with the products that they're meant to work with. CNAPPs are the best way to monitor cloud native applications. They allow businesses to monitor cloud infrastructure and application security as a group, rather than monitoring each one individually.
  • 17
    Stream Security Reviews

    Stream Security

    Stream Security

    $8,000 per year
    Stay ahead of threat actors and exposure risks with real-time detection and automated threat investigation of all postures and activities. Track all changes and detect toxic exposures and combinations before attackers. AI can be used to address and fix problems using your preferred methods. Use any of your favorite SOAR tools or our code snippets to respond in real-time. Focus on the risks that can be exploited. Harden and prevent external movement & exposure risks. Detect toxic postures and vulnerabilities. Detect gaps in segmentation intentions and implement zero-trust. Answer any cloud question quickly with context. Maintain compliance and prevent deviations from taking root. We integrate with existing investments. We can provide more information about our security policies, and we can work with your security team to meet any specific requirements that your organization may have.
  • 18
    Flowmon Reviews

    Flowmon

    Progress Software

    Real-time network anomalies can be addressed and made decisions. Flowmon's actionable information is available in cloud, hybrid, and on-premise environments. Flowmon's network Intelligence integrates SecOps and NetOps into a single solution. It is capable of automated traffic monitoring, threat detection, and provides a solid foundation for informed decision-making. Its intuitive interface makes it easy for IT professionals to quickly understand incidents and anomalies, their context, impact, magnitude and, most importantly, their root cause.
  • 19
    Netacea Bot Management Reviews
    Netacea is a pioneering server-side detection and mitigation approach that helps us understand bot behavior better than anyone else. Our technology is easy to implement and supports many integrations. This provides comprehensive protection against malicious bots across your website, mobile app, and APIs without compromising your website infrastructure, reliance upon hardware, or disruptive code changes. Our team of experts and revolutionary machine-learning powered Intent Analytics™, engine help us quickly distinguish between bots and humans. This allows us to prioritize genuine users. Netacea works in close collaboration with your security functions, from implementation to providing accurate detection and equipping you with actionable threat information.
  • 20
    Sonrai Security Reviews
    Identity and Data Protection for AWS and Azure, Google Cloud, and Kubernetes. Sonrai's cloud security platform offers a complete risk model that includes activity and movement across cloud accounts and cloud providers. Discover all data and identity relationships between administrators, roles and compute instances. Our critical resource monitor monitors your critical data stored in object stores (e.g. AWS S3, Azure Blob), and database services (e.g. CosmosDB, Dynamo DB, RDS). Privacy and compliance controls are maintained across multiple cloud providers and third-party data stores. All resolutions are coordinated with the relevant DevSecOps groups.
  • 21
    Trend Cloud One Reviews
    Cloud security made simple with the Trend Cloud One platform. Save time and gain visibility. Automated deployments and discovery lead to operational efficiency and accelerated, simplified compliance. Builder's choice. We offer a wide range of APIs and turn-key integrations that allow you to choose the cloud and platforms you want, and then deploy them the way you like. One tool with the breadth, depth and innovation needed to meet and manage cloud security needs now and in the future. Cloud-native security is able to deliver new functionality every week without affecting access or experience. It seamlessly complements and integrates existing AWS, Microsoft Azure™, VMware®, and Google Cloud™. Automate the discovery of public, virtual, and private cloud environments, while protecting the network layer. This allows for flexibility and simplicity when it comes to securing the cloud during the migration and expansion processes.
  • 22
    Smokescreen Reviews

    Smokescreen

    Smokescreen

    $7,750 per year
    Smokescreen, a deception technology and active defense company, provides a solution that covers your network with decoys that trap hackers. You'll learn how adversaries work and how decoys are placed all over your network to provide high-fidelity detections at every stage. It's simple to use and understand. We have you covered on the Perimeter and Cloud, internal network, endpoints and Active Directory. Launch your first deception campaign using ready-made decoys. Instead of wasting time configuring a new solution, focus on detecting threats and not on wasting man-hours. An interaction with an IllusionBLACK device is a sign of a breach. You know it's real when you receive an alert. Automated forensics and root cause analysis in just two clicks You can accomplish more with half the team in half the time. Integrations out-of-the box with SIEMs and Firewalls, EDRs. Proxy, threat feeds, SOAR and more.
  • 23
    R81.10 Reviews

    R81.10

    Check Point Software Technologies

    R81.10 is the industry’s most advanced threat prevention software. It delivers uncompromising simplicity and consolidation throughout the enterprise. R81.10 automates the prevention process and makes managing cyber security easier than ever. R81.10 allows enterprises to be at their best, whether it's deploying the latest security technologies and security to protect the company or crafting security policies. Based on traffic patterns, automatically allocate hardware and core resources. Provide greater security and performance. Check Point now offers a comprehensive security management architecture that can be used from the cloud. It is designed to manage security across all on-premise firewalls, networks and cloud, mobile, IoT, and cloud. A dynamic security compliance solution that monitors and enhances security in your Check Point environment will help you increase your security.
  • 24
    CnSight Reviews
    CnSight®, a lightweight, first-of-its-kind solution, is designed to help companies better understand their cybersecurity business and take meaningful steps to improve it. It uses automated metrics and allows them to be tied to organizational risk. You can easily see your organization's progress against set goals if you are a leader. As you make changes to people, processes and tools, you can baseline your organization and track effectiveness over time. As your program matures, you can use security performance data as a baseline to inform your strategy. Communicate cybersecurity posture effectively to the CIO/board.
  • 25
    ShadowPlex Reviews

    ShadowPlex

    Acalvio Technologies

    Active defense solutions based upon advanced deception are becoming more popular because they are low risk to deploy and do not have the false-positive issues that other approaches can cause. Acalvio’s ShadowPlex has been designed to set a standard for APT mitigation, ransomware mitigation, and malware prevention. ShadowPlex centralizes this process. Decoys, or fake hosts (or "honeypots") are hosted in one area and then strategically "projected", across the enterprise network where they appear as local assets. We can also change the complexity of the decoy in real-time to respond to an attacker's engagement. ShadowPlex's unique resource-efficient method allows it to deliver high-scale decoy realism and depth. ShadowPlex automates, simplifies, and streamlines the configuration and deployment deception objects. The system generates and places deception objects by combining pre-defined playbooks and an AI-based recommendation algorithm.
  • Previous
  • You're on page 1
  • 2
  • Next