Business Software for Splunk Enterprise

Top Software that integrates with Splunk Enterprise

  • 1
    DomainTools Reviews
    Link indicators from your network to almost all active IP addresses and domains across the Internet. Discover how this information can enhance risk evaluations, assist in identifying attackers, support online fraud probes, and trace cyber activities back to their infrastructure. Acquire crucial insights that empower you to accurately assess the threat levels faced by your organization. DomainTools Iris offers a unique threat intelligence and investigative platform, merging high-quality domain and DNS intelligence with a user-friendly web interface, ensuring ease of use for professionals. This powerful tool is essential for organizations aiming to bolster their cybersecurity measures effectively.
  • 2
    Bugsnag Reviews

    Bugsnag

    Bugsnag

    $59 per month
    1 Rating
    Bugsnag provides comprehensive monitoring of application stability, empowering teams to make informed choices about whether to prioritize the development of new features or to address existing bugs. As a robust full-stack stability monitoring solution tailored for mobile applications, it offers advanced diagnostics that enable you to replicate any error effectively. With a user-friendly interface, you can manage all your applications seamlessly from a single dashboard. Bugsnag serves as a crucial metric for assessing app health, facilitating communication between product and engineering teams. Not every bug requires immediate attention, allowing you to concentrate on those that significantly impact your business. Its extensible libraries come with well-considered defaults and a plethora of customization options. Additionally, the team comprises subject matter experts who are genuinely invested in minimizing errors and ensuring the overall health of your applications, making Bugsnag an invaluable asset for developers.
  • 3
    ControlMap Reviews
    Take control of SOC2, ISO-27001, NIST, CSA STAR, or other Infosec certifications with a simple, easy-to-use, fully automated platform. ControlMap's smart mapping saves you hundreds of hours responding and assessing data requests. It automatically and continuously associates RISKS CONTROLS, POLICIES, AND PROCEDURES so that you don't have the task of responding to each request. ControlMap's integration with other ticketing systems like Jira makes it easier to use. Our Jira Marketplace App, Jira integration collects evidence, raises alerts, or simply creates tasks in other systems. You can eliminate any last-minute surprises. We have created a product that modern teams can use. Start with a free trial, or contact us to learn more.
  • 4
    CPTRAX for Windows Reviews
    Server File Activity Tracking – Audit who is creating, accessing and moving your files and folders. Track file permission changes. Alerts in real-time about critical file activity Malicious activity containment (Ransomware and mass file deletions, etc. Automatically stop threats to your Windows servers by calling PowerShell scripts so you can determine exactly what you want to have happen for each type of alert/threat. Examples of containment: Disable the user causing the threat Block the remote IP causing the threat Workstation File Activity Tracking: Audit who copies files to USB or other removable media. Track who uploads files via FTP or a browser. Block files being created on USB/removable devices. Notifications by email when a removable device connects. Active Directory Auditing – Keep audit logs and receive real-time alerts about important Active Directory changes, without having to deal with SACLs or Windows Event Logs. Server Authentication Auditing: Track authentications into Citrix sessions and Windows Servers. All failed logon attempts are reviewed. Workstation Logon/Logoff Tracking: Get visibility on logons/logoffs at workstations, including locks, unlocks and password changes.
  • 5
    Netreo Reviews

    Netreo

    Netreo

    $5/resource/mo
    1 Rating
    Netreo is the best full-stack IT infrastructure management and observation platform. Netreo is a single source for truth for proactive performance monitoring and availability monitoring of large enterprise networks, infrastructure, and applications. Our solution is used by: IT executives should have full visibility of the business service, right down to the infrastructure and network that supports them. IT Engineering departments are used as a decision support system to plan and architect modern solutions. IT Operations teams can have real-time visibility into what is going wrong in their environment, which bottlenecks exist, and who it is affecting. All of these insights are available for systems and vendor mix in large heterogeneous environments that are constantly changing. We have a growing list of vendors that we support (over 350 integrations), including network vendors, storage, virtualization, and servers.
  • 6
    Squadcast Reviews
    Squadcast is a tool for incident management that was specifically designed for SRE. Squadcast Actions can help you create a culture of blamelessness by reducing the need to have physical war rooms.
  • 7
    IP2Location Reviews
    IP2Location is a leading IP geolocation service provider since 2002. It translates IP address to identify country, region, city, latitude & longitude, ZIP code, time zone, connection speed, ISP, domain name, IDD country code, area code, weather station data, mobile network codes (MNC), mobile country codes (MCC), mobile carrier, elevation, usage type, address type, advertising category, VPN and residential proxies. IP2Location has been used by thousands of developers to enrich their applications and web sites. It is available as database, API and bulk services. Please visit our web site for more information.
  • 8
    Silent Push Reviews
    Silent Push reveals adversary infrastructure, campaigns, and security problems by searching across the most timely, accurate and complete Threat Intelligence dataset available. Defenders can focus on stopping threats before they cause a problem and significantly improve their security operations across the entire attack chain whilst simultaneously reducing operational complexity. The Silent Push platform exposes Indicators of Future Attack (IOFA) by applying unique behavioral fingerprints to attacker activity and searching our dataset. Security teams can identify new impending attacks, rather than relying upon out-of-date IOCs delivered by legacy threat intelligence. Organizations are better protected by understanding emerging developing threats before launch, proactively solving problems within infrastructure, and gaining timely and tailored threat intelligence with IoFA, that allows organizations to stay one step ahead of advanced attackers.
  • 9
    n8n Reviews

    n8n

    n8n

    $20 per month
    1 Rating
    Create intricate automations at lightning speed, eliminating the hassle of dealing with APIs. The tedious hours spent navigating through a tangled web of scripts are now behind you. Utilize JavaScript for enhanced flexibility while relying on the intuitive UI for everything else. n8n empowers you to establish adaptable workflows that prioritize comprehensive data integration. Additionally, with shareable templates and an easy-to-navigate interface, team members with less technical expertise can also contribute and collaborate effectively. Unlike many other tools, complexity won’t hinder your creativity, allowing you to construct anything your imagination conjures—without worrying about expenses. Effortlessly connect APIs using no-code solutions for simple task automation, or delve into vanilla JavaScript for sophisticated data manipulation. You can set up multiple triggers, branch out, merge workflows, and even pause processes to await external events. Seamlessly interact with any API or service through custom HTTP requests, and safeguard live workflows by maintaining distinct development and production environments with separate authentication credentials. Embrace the freedom to innovate without limits.
  • 10
    threatYeti by alphaMountain Reviews
    With threatYeti, alphaMountain turns security professionals, as well as hobbyists, into senior IP threat analysts. The platform is browser-based and renders real-time threats verdicts for any URL, domain, or IP address on the internet. With threatYeti the risk posed to a domain can be rated instantly, with a color-coded scale from 1.00 (low) to 10.00. ThreatYeti protects cyber threat analysts, as well as their networks, from risky websites. The no-click categorization of threatYeti places sites into one or more of 83 categories, so analysts don't need to visit the site and risk downloading malware or encountering objectionable content. ThreatYeti displays related hosts, threat-factors, passive DNS certificates, redirect chains, and more to give analysts a complete picture of any host. The result is a faster, safer investigation that allows organizations to take definitive action on domain and IP threat.
  • 11
    OneLogin Reviews
    Protect essential organizational data and enhance employee efficiency with OneLogin, a reliable identity and access management (IAM) platform tailored for contemporary businesses. This solution is crafted to bolster security within enterprises while streamlining login processes, making it an ideal choice for organizations aiming to implement security measures effortlessly. OneLogin boasts a variety of highly-rated functionalities, including single sign-on (SSO), a centralized directory, user provisioning, adaptive authentication, mobile identity management, compliance reporting, and additional features. By leveraging these tools, companies can ensure both security and ease of access for their users. As organizations continue to navigate the complexities of digital security, OneLogin stands out as a comprehensive solution to meet these evolving needs.
  • 12
    Sentry Reviews

    Sentry

    Sentry

    $26 per month
    1 Rating
    Developers can track errors and monitor performance to see what is important, find faster solutions, and continuously learn about their applications, from the frontend to backend. Sentry's performance monitoring can help you trace performance issues down to slow database queries and poorly performing api calls. Sentry's application performance monitoring is enhanced by stack traces. Identify performance issues quickly before they cause downtime. To see the entire distributed trace from end to end, you can identify the API call that is not performing well and highlight any errors. Breadcrumbs help you make application development easier by showing you the events that led to the error.
  • 13
    Cequence Security Reviews
    Protect your APIs by analyzing and protecting them with passive, inline, or API-based integration with any network component, such as an API gateway, proxy or CDN. Predefined policies that are fine-tuned based on threat patterns, which have been used to protect billions of API transactions every day, provide unmatched protection. An API-based architecture and rich user interface allow integration with threat intelligence feeds and other security components. Patented ML based analysis eliminates JavaScript integration pen-alties like slow page loads, extended development cycles, and forced mobile-app upgrade. ML-based analysis generates a unique Behavioral Footprint to identify malicious intent and continuously tracks attackers as they retool.
  • 14
    HaloITSM Reviews

    HaloITSM

    Halo Service Solutions

    $49 per user per month
    1 Rating
    A single, all-inclusive cloud platform that is ITIL-aligned will empower your IT team. Transform old ways of working into modern, intuitive workflows that empower employees and customers to provide excellent service. Standardize your processes and get valuable analytics to align IT with business needs. You can centralize your workflows and create one space for your ITSM software. HaloITSM combines ITIL best-practices and a flexible approach to ensure that you can improve service management while maintaining a great user experience. HaloITSM is trusted by customers in many sectors worldwide. Check out our case studies to see how they transformed their daily processes.
  • 15
    Portnox Security Reviews
    Portnox is a Network Access Control (NAC) software vendor. NAC sits within the larger field of cybersecurity, and more specifically network security. It is a technology that enables organizations to enact its own unique policy for how and when endpoints (desktops, laptops, smartphones, etc.) can connect to their corporate networks. NAC is designed to allow IT security teams to gain visibility of each device trying to access its network, and specifically the type of device and access layer being used (i.e. wifi, wired ports, or VPN).
  • 16
    Intezer AI SOC Reviews
    Intezer AI SOC combines multiple AI models, both proprietary and commercial, with deterministic, forensic methods such as endpoint analysis, reverse engineering, network artifact forensics, sandboxing, static analysis and more. Together, this approach mirrors the triage process that expert, human analysts follow, maintaining high accuracy at unmatched speed and scale. Our native integrations are built for the depth and rigor of the triage and forensic investigation process, providing robust, full-featured connections between tools. This allows Intezer to ingest alerts from all major sources within seconds, gather richer evidence, and deliver deeper context in every analysis. Remediation actions can be easily automated with explicit human approval. You get: - Accurate, fast triage, available 24/7/365: Regardless of alert volume, Intezer delivers consistent, objective triage free from human error or subjective judgment. - Forensics built-in: Intezer AI SOC incorporates advanced forensic capabilities, from automated evidence collection via EDR/SIEM/IDP to memory analysis, reverse engineering, network artifact forensics, and sandboxing. - Humans in the loop: Intezer maintains true human-in-the-loop oversight with transparent triage logic, clear explanations, and the ability for analysts to review or override escalated alerts. - Scalable with predictable pricing: By combining deterministic analysis with efficient AI models, most alerts are triaged without requiring resource-intensive, expensive LLM processing.
  • 17
    Varonis Data Security Platform Reviews
    Discover the ultimate solution for identifying, tracking, and safeguarding sensitive information on a large scale. This comprehensive data security platform is designed to swiftly mitigate risks, identify unusual activities, and ensure compliance without hindering your operations. Combining a robust platform, a dedicated team, and a strategic plan, it equips you with a competitive edge. Through the integration of classification, access governance, and behavioral analytics, it effectively secures your data, neutralizes threats, and simplifies compliance processes. Our tried-and-true methodology draws from countless successful implementations to help you monitor, protect, and manage your data efficiently. A team of expert security professionals continuously develops sophisticated threat models, revises policies, and supports incident management, enabling you to concentrate on your key objectives while they handle the complexities of data security. This collaborative approach not only enhances your security posture but also fosters a culture of proactive risk management.
  • 18
    CYREBRO Reviews
    CYREBRO is a true 24/7/365 Managed Detection and Response (MDR) solution, delivered through its cloud-based SOC Platform. CYREBRO rapidly detects, analyzes, investigates and responds to cyber threats. CYREBRO is a turnkey solution that uses a proprietary detection engine for threat detection and orchestration, SOAR for automations, correlations and investigations, SOC Platform for real-time investigation data and visibility, and top tier analyst and incident response teams. CYREBRO easily connects to hundreds of different tools and systems, delivering time to value within mere hours. With 1,500+ proprietary detection algorithms constantly optimized, CYREBRO constantly monitors companies of all sizes facing different types of risks and attacks, shortening mean time to respond (MTTR).
  • 19
    Cloud Foundry Reviews
    Cloud Foundry simplifies and accelerates the processes of building, testing, deploying, and scaling applications while offering a variety of cloud options, developer frameworks, and application services. As an open-source initiative, it can be accessed through numerous private cloud distributions as well as public cloud services. Featuring a container-based architecture, Cloud Foundry supports applications written in multiple programming languages. You can deploy applications to Cloud Foundry with your current tools and without needing to alter the code. Additionally, CF BOSH allows you to create, deploy, and manage high-availability Kubernetes clusters across any cloud environment. By separating applications from the underlying infrastructure, users have the flexibility to determine the optimal hosting solutions for their workloads—be it on-premises, public clouds, or managed infrastructures—and can relocate these workloads swiftly, typically within minutes, without any modifications to the applications themselves. This level of flexibility enables businesses to adapt quickly to changing needs and optimize resource usage effectively.
  • 20
    AppsWatch by Automai Reviews

    AppsWatch by Automai

    Automai Corporation

    $2000.00/one-time
    AppsWatch provides ongoing surveillance of essential business operations across various applications without the need for plug-ins or additional components. Automai's robots interact with the applications through the graphical user interface, identifying and reporting potential problems before they impact users. Script creation for the bots is straightforward, requiring no coding; users simply click through and record the desired processes. The platform features well-structured displays for service level agreement (SLA) reports, troubleshooting, alert notifications, and graphical data representations. Additionally, AppsWatch is an integral component of Automai's Robotic Automation Platform, which combines monitoring, testing, and robotic process automation to enhance business efficiency. This comprehensive approach ensures that organizations can maintain optimal performance and swiftly address any operational challenges.
  • 21
    AppLoader by Automai Reviews

    AppLoader by Automai

    Automai Corporation

    $2500.00/one-time
    AppLoader is a versatile solution for software quality assurance and load testing, allowing users to evaluate processes across various application types, including fat clients, thin clients, and web applications. It simplifies the testing process by enabling users to quickly create straightforward scenarios to start testing their applications immediately. Utilizing Automai's renowned robotic technology, AppLoader can simulate the actions of thousands of end users, facilitating comprehensive performance evaluations. Additionally, it offers error screenshots to aid in troubleshooting and enhance communication among team members, ensuring a smooth testing experience. This robust tool is essential for teams looking to optimize their application performance and reliability.
  • 22
    Artica Proxy Reviews

    Artica Proxy

    Artica Tech

    €100
    Artica Tech is a powerful, yet simple-to-use solution that is often reserved for large multinational companies. Artica Proxy is available at a low starting price of 99 EUR and has more than 62 000 servers. Artica Proxy is an entire system that provides a complete appliance. We recommend not using an existing production server with Artica. Artica Proxy CDROM ISO is one of the options to obtain Artica. Community or Enterprise Artica is "Open Source software", which means that you can display source code under the GPL3 license. Artica Proxy, documentation, and screenshots Copyright (C), 2014 Artica Tech SARL.
  • 23
    Teramind Reviews

    Teramind

    Teramind

    $12/month/user
    Teramind provides a user-centric security approach to monitoring your employees’ digital behavior. Our software streamlines employee data collection in order to identify suspicious activity, improve employee productivity, detect possible threats, monitor employee efficiency, and ensure industry compliance. We help reduce security incidents using highly customizable Smart Rules that can alert, block or lockout users when rule violations are detected, to keep your business running securely and efficiently. Our live and recorded screen monitoring lets you see user actions as they’re happening or after they’ve occurred with video-quality session recordings that can be used to review a security or compliance event, or to analyze productivity behaviors. Teramind can be installed in minutes and can be deployed either without employees knowing or with full transparency and employee control to maintain trust.
  • 24
    Dotcom-Monitor Reviews

    Dotcom-Monitor

    Dotcom-Monitor

    $19.99/month
    Website monitoring and performance testing solutions. You can quickly identify performance issues by using powerful monitoring features like real-time dashboards, performance reporting options, or nearly 30 global monitoring networks. The EveryStep Web Recorder allows you to quickly and easily record scripts that can be used to monitor interactive websites, web application elements, and user scenarios. Dotcom-Monitor makes sure that even the most complex websites, web apps, and web services are up to date and perform as intended.
  • 25
    EmailSuccess Reviews

    EmailSuccess

    DIENNEA SRL

    $0 - $4000
    EmailSuccess provides high volume email sending with enterprise-level SMTP Servers. EmailSuccess can be used as a Mail Transfer Agent (MTA) for all sizes of senders: ESPs and Marketing Automation Companies. High Performance EmailSuccess, an MTA, is designed to deliver large volumes of email. It gives the business full control over the Speed, Latency and Deliverability parameters. Deliverability Clients must be able to deliver their messages quickly. You must ensure that your email is not blocked by spam filters and lands in your inbox. Advanced Sending Intelligence Optimized delivery through automatic and real-time tuning of email delivery parameters; platform tuning is made easy.
MongoDB Logo MongoDB