Business Software for Splunk Enterprise

Top Software that integrates with Splunk Enterprise

  • 1
    Detectify Reviews

    Detectify

    Detectify

    $89 per month
    Detectify sets the standard for External Attack Surface Management (EASM), providing 99.7% accurate vulnerability assessments. ProdSec and AppSec teams trust Detectify to expose exactly how attackers will exploit their Internet-facing applications. Our scanners are built with security findings from 400+ ethical hackers. Their submissions go far beyond the CVE libraries, which are not sufficient to test modern application security.
  • 2
    IRI DarkShield Reviews

    IRI DarkShield

    IRI, The CoSort Company

    $5000
    IRI DarkShield uses several search techniques to find, and multiple data masking functions to de-identify, sensitive data in semi- and unstructured data sources enterprise-wide. You can use the search results to provide, remove, or fix PII simultaneously or separately to comply with GDPR data portability and erasure provisions. DarkShield jobs are configured, logged, and run from IRI Workbench or a restful RPC (web services) API to encrypt, redact, blur, etc., the PII it discovers in: * NoSQL & RDBs * PDFs * Parquet * JSON, XML & CSV * Excel & Word * BMP, DICOM, GIF, JPG & TIFF using pattern or dictionary matches, fuzzy search, named entity recognition, path filters, or image area bounding boxes. DarkShield search data can display in its own interactive dashboard, or in SIEM software analytic and visualization platforms like Datadog or Splunk ES. A Splunk Adaptive Response Framework or Phantom Playbook can also act on it. IRI DarkShield is a breakthrough in unstructured data hiding technology, speed, usability and affordability. DarkShield consolidates, multi-threads, the search, extraction and remediation of PII in multiple formats and folders on your network and in the cloud, on Windows, Linux, and macOS.
  • 3
    IRI RowGen Reviews

    IRI RowGen

    IRI, The CoSort Company

    $8000 on first hostname
    IRI RowGen generates rows ... billions of rows of safe, intelligent test data in database, flat-file, and formatted report targets ... using metadata, not data. RowGen synthesizes and populates accurate, relational test data with the same characteristics of production data. RowGen uses the metadata you already have (or create on the fly) to randomly generate structurally and referentially correct test data, and/or randomly select data from real sets. RowGen lets you customize data formats, volumes, ranges, distributions, and other properties on the fly or with re-usable rules that support major goals like application testing and subsetting. RowGen uses the IRI CoSort engine to deliver the fastest generation, transformation, and bulk-load movement of big test data on the market. RowGen was designed by data modeling, integration, and processing experts to save time and energy in the creation of perfect, compliant test sets in production and custom formats. With RowGen, you can produce and provision safe, smart, synthetic test data for: DevOps, DB, DV, and DW prototypes, demonstrations, application stress-testing, and benchmarking -- all without needing production data.
  • 4
    Omega Core Audit Reviews
    Your Oracle database is often the most valuable informational asset of your company. It contains data on customers, partners and financial transactions. Even small and medium-sized companies now have millions of these records. Database security is now a top concern for companies that must comply with stricter information security controls and practices. Omega Core Audit, a software-only security and compliance tool, is out-of-box and can be used to address compliance issues. It provides access control, continuous audit monitoring, real-time protection, and access control. This allows for duty separation, control over privileged accounts, and meets compliance requirements. Splunk SIEM and GrayLog SIEM support is included.
  • 5
    Easyflow Reviews

    Easyflow

    Easyflow

    $9 per month
    Seamlessly connect applications, analyze data, and design automated processes along with impactful KPI dashboards tailored to your specifications. This user-friendly drag-and-drop platform requires no coding expertise! Begin tackling prevalent integration hurdles effectively. You can effortlessly construct your automation workflows on a unified screen, linking numerous apps without the need to write any code. Whether you want to set up straightforward one-to-one automations or intricate multi-app workflows, it can all be accomplished in just minutes. Manage and structure your data flow with advanced features like conditional logic, time delays, data formatting, filtering, function expressions, and much more. Experience the speed of building automations and integrations, utilizing a drag-and-drop interface that eliminates coding barriers. Create straightforward, multi-step, or advanced workflows, including conditional branches, parallel processes, and loops. This empowers every member of your organization to swiftly make informed, data-driven decisions that promote strategic initiatives. Plus, you have access to an extensive variety of chart types, such as line, bar, pie, area, and gauge charts, among others, to visualize your data effectively. With such flexibility, your ability to derive insights and present them dynamically becomes limitless.
  • 6
    Workato Reviews

    Workato

    Workato

    $10,000 per feature per year
    Workato is the operating platform for today's fast-moving businesses. It is the only AI-based middleware platform that allows both IT and business to integrate their apps and automate complex business workflows. Our mission is to help companies automate and integrate their apps and business processes at least 10x faster than traditional tools, and at a tenth the cost of traditional tools. Integration is a mission critical, neutral technology that can be used in heterogeneous IT environments. We are the only technology vendor that is supported by all three of the leading SaaS vendors: Salesforce. Workday. And ServiceNow. We are trusted by the world's most recognizable brands and the fastest-growing innovators. Customers consider us to be one of the best companies to do business.
  • 7
    Veriato Workforce Behavior Analytics Reviews
    One platform allows you to monitor productivity, conduct investigations, and protect yourself against insider risks. Our powerful workforce analytics will give you visibility into the activity of your remote or hybrid employees. Veriato's workforce behavior analytics go far beyond passive monitoring. They analyze productivity, monitor insider risks and much more. Easy-to-use, powerful tools to keep your office, hybrid, and remote teams productive. Veriato’s AI-powered algorithms analyze user behavior patterns, and alert you to any suspicious or abnormal activity. Assign productivity scores for websites, programs and applications. Choose between three types: Continuous, Keyword Triggered, and Activity Triggered. Track local, removable and cloud storage as well as printing operations. Files can be viewed when they are created, modified, deleted or renamed.
  • 8
    Saint Security Suite Reviews

    Saint Security Suite

    Carson & SAINT

    $1500.00/year/user
    This integrated solution can perform active, passive, and agent-based assessments. It also allows for flexibility in evaluating risk according to each business. SAINT's remarkable, flexible, and scalable scanning capabilities make it stand out from other solutions in this market. SAINT has partnered up with AWS to allow its customers to benefit from AWS's efficient scanning. SAINT also offers Windows scanning agents for subscribers. Security teams can easily schedule scans, configure them with a lot of flexibility, and fine-tune their settings with advanced options.
  • 9
    TrapStation Reviews

    TrapStation

    Augur Systems, Inc

    TrapStation logs and forwards SNMP SNMP traps, often to distributed management systems. You can route traps selectively, translate any SNMP version and filter, correlate, apply thresholds and modify varbinds. You can then view graphs, search logs and replay traps. TrapStation is a modern design that draws on decades of event-handling expertise. TrapStation was created to replace legacy apps like TrapEXPLODER and TrapBlaster. You can use TrapStation to access SNMP v3 encryption/security and trap modification, log search/replay and a browser interface. We hope TrapStation is a compelling alternative for unsupported scripts or in-house developers. TrapStation maps incomingtraps to your rule trees nodes. Each node has a filter that tests traps and allows you to log and forward match traps. The complexity of individual rule nodes is reduced by the formation of nested tiers, which are more specific. Nesting ensures that a partially matched trap is placed in a fail-safe rule Node.
  • 10
    Empirix Reviews

    Empirix

    Empirix

    $30/Month Transactions
    Empirix, a global provider of service automation automation that protects brand quality, is an Empirix solution provider. Cloud-native, flexible, open, and cloud-native by design best in class network visibility software and test automation software. Empirix is a trusted name in the field of service providers, equipment manufacturers, and enterprises around the globe. The most reliable and thorough vendor of IP communications services quality in the market They readily accepted Empirix results for solving inter-vendor issues.
  • 11
    Barracuda WAF-as-a-Service Reviews
    Setting up conventional web application firewalls can require days of intensive work. However, Barracuda WAF-as-a-Service, a comprehensive and cloud-based application security solution, transforms this experience. You can deploy it quickly, adjust its settings, and have it fully operational—safeguarding all your applications from various threats—in a matter of minutes. This efficiency not only saves time but also ensures robust protection for your assets.
  • 12
    CyCognito Reviews

    CyCognito

    CyCognito

    $11/asset/month
    Using nation-state-grade technology, uncover all security holes in your organization. CyCognito's Global Bot Network uses an attacker-like reconnaissance technique to scan, discover, and fingerprint billions digital assets around the globe. No configuration or input required. Discover the unknown. The Discovery Engine uses graph data modelling to map your entire attack surface. The Discovery Engine gives you a clear view on every asset an attacker could reach, their relationship to your business, and what they are. The CyCognito risk-detection algorithms allow the attack simulator to identify risks per asset and find potential attack vectors. It does not affect business operations and doesn't require configuration or whitelisting. CyCognito scores each threat based on its attractiveness to attackers, and the impact on the business. This dramatically reduces the number of attack vectors organizations may be exposed to to just a few.
  • 13
    SOC Prime Platform Reviews
    SOC Prime equips security teams with the largest and most robust platform for collective cyber defense that cultivates collaboration from a global cybersecurity community and curates the most up-to-date Sigma rules compatible with over 28 SIEM, EDR, and XDR platforms. Backed by a zero-trust approach and cutting-edge technology powered by Sigma and MITRE ATT&CK®️, SOC Prime enables smart data orchestration, cost-efficient threat hunting, and dynamic attack surface visibility to maximize the ROI of SIEM, EDR, XDR & Data Lake solutions while boosting detection engineering efficiency. SOC Prime’s innovation is recognized by independent research companies, credited by the leading SIEM, XDR & MDR vendors, and trusted by 8,000+ organizations from 155 countries, including 42% of Fortune 100, 21% of Forbes Global 2000, 90+ public sector institutions, and 300+ MSSP and MDR providers. SOC Prime is backed by DNX Ventures, Streamlined Ventures, and Rembrandt Venture Partners, having received $11.5M in funding in October 2021. Driven by its advanced cybersecurity solutions, Threat Detection Marketplace, Uncoder AI, and Attack Detective, SOC Prime enables organizations to risk-optimize their cybersecurity posture.
  • 14
    Alexa Smart Properties Reviews

    Alexa Smart Properties

    Amazon

    $7 per month device
    Amazon's Alexa Smart Properties enables properties in various sectors to enhance their services with Alexa-powered voice experiences. Designed for large-scale deployment, the platform offers specialized features for senior living, hospitality, and healthcare, allowing users to control their environment with ease. By simplifying management and providing powerful analytics, Alexa Smart Properties helps streamline operations, boost efficiency, and elevate user experiences. It provides secure and customizable integrations that help properties stay innovative while delivering exceptional service to guests and residents.
  • 15
    ShadowKat Reviews
    ShadowKat is an attack external surface management software designed to help cybersecurity managers maintain a stronger compliance lifecycle, continually monitor security risks, and identify various organizations assets such as webpages, networks, ASN’s, IP Addresses, open ports and more. ShadowKat helps security managers reduce the time vulnerabilities exist and reduce the size of their organization’s internet facing attack surface. Key features of ShadowKat include change monitoring, risk-based alerts, reduce vulnerabilities, and manage compliance requirements.
  • 16
    VaultCore Reviews

    VaultCore

    Fornetix

    $1,118 per year
    VaultCore™ is a next-generation, highly scalable enterprise key management solution from Fornetix®. It integrates seamlessly with existing platforms, automates policy, and empowers administrators with a centralized, organized control that can be easily applied across all environments. Request a demo to experience VaultCore's products: - Quick, seamless integration with existing technology - Separation Of Duties (a best practice). - Powerful automation allows for centralized control of policy - Increased security of data in motion, at rest, and in use - Significant reduction in the costs associated with data breaches -- lost businesses, recovery time, reputational damage - Simplified compliance, regulatory enforcement - Scalable to more than 100 million keys (more that enough to meet any industry or government's requirements) - Reporting capabilities to meet compliance requirements - Ease in Use
  • 17
    Prophaze WAF Reviews

    Prophaze WAF

    Prophaze Technologies

    $299 per month
    Prophaze Cloud WAF serves as a safeguard for businesses against cybercriminals aiming to infiltrate and compromise information from Web Applications, Mobile App Gateways, or APIs. In contrast to conventional firewalls, Prophaze WAF focuses specifically on defending web and mobile APIs through its innovative Adaptive Profiling and machine learning algorithms based on user behavior. This solution is designed to operate seamlessly on the Kubernetes Platform, ensuring that clients' Kubernetes clusters and cloud infrastructures are protected from a range of potential attack vectors. Ultimately, Prophaze Cloud WAF enhances the overall security posture of organizations while adapting to emerging threats.
  • 18
    Microsoft Defender for IoT Reviews

    Microsoft Defender for IoT

    Microsoft

    $0.001 per device per month
    Continuous asset discovery, vulnerability management, threat detection, and continuous asset discovery for your Internet of Things and operational technology devices (OT). Ensure IoT/OT innovation by accelerating IoT/OT innovation through comprehensive security across all IoT/OT devices. Microsoft Defender for IoT is an agentless, network-layer security solution that can be quickly deployed by end-user organizations. It works with diverse industrial equipment and integrates with Microsoft Sentinel and other SOC tools. You can deploy on-premises and in Azure-connected environments. Microsoft Defender for IoT is a lightweight agent that embeds device-layer security in new IoT/OT initiatives. Passive, agentless network monitoring allows you to get a complete inventory and analysis of all your IoT/OT assets. This is done without any impact on the IoT/OT networks. Analyze a variety of industrial protocols to identify the device details, including manufacturer, type, firmware level, IP or Media Access Control address.
  • 19
    IRI FieldShield Reviews

    IRI FieldShield

    IRI, The CoSort Company

    IRI FieldShield® is a powerful and affordable data discovery and de-identification package for masking PII, PHI, PAN and other sensitive data in structured and semi-structured sources. Front-ended in a free Eclipse-based design environment, FieldShield jobs classify, profile, scan, and de-identify data at rest (static masking). Use the FieldShield SDK or proxy-based application to secure data in motion (dynamic data masking). The usual method for masking RDB and other flat files (CSV, Excel, LDIF, COBOL, etc.) is to classify it centrally, search for it globally, and automatically mask it in a consistent way using encryption, pseudonymization, redaction or other functions to preserve realism and referential integrity in production or test environments. Use FieldShield to make test data, nullify breaches, or comply with GDPR. HIPAA. PCI, PDPA, PCI-DSS and other laws. Audit through machine- and human-readable search reports, job logs and re-ID risks scores. Optionally mask data when you map it; FieldShield functions can also run in IRI Voracity ETL and federation, migration, replication, subsetting, and analytic jobs. To mask DB clones run FieldShield in Windocks, Actifio or Commvault. Call it from CI/CD pipelines and apps.
  • 20
    NeuVector Reviews

    NeuVector

    SUSE

    1200/node/yr
    NeuVector provides complete security for the entire CI/CD process. We provide vulnerability management and attack blocking in all production with our patented container firewall. NeuVector provides PCI-ready container security. You can meet your requirements in less time and with less effort. NeuVector protects IP and data in public and private cloud environments. Continuously scan the container throughout its lifecycle. Security roadblocks should be removed. Incorporate security policies from the beginning. Comprehensive vulnerability management to determine your risk profile. The only patentable container firewall provides immediate protection against known and unknown threats for zero days. NeuVector is essential for PCI and other mandates. It creates a virtual firewall to protect personal and private information on your network. NeuVector is a kubernetes-native container security platform which provides complete container security.
  • 21
    IRI DMaaS Reviews

    IRI DMaaS

    IRI, The CoSort Company

    $1000 per day
    IRI Data Masking as a Service is a professional services engagement to secure PII. Step 1: IRI agrees under NDA terms to classify, analyze, and report on the sensitive, at-risk data in your sources. We will discuss an initial cost estimate then hone it with you during data discovery. Step 2: Transfer the unprotected data to a secure on-premise or cloud-based staging area or provide remote, supervised access to IRI to the data sources(s) at issue. We'll use the tools in the award-winning IRI Data Protector suite to mask that data according to your business rules, on an ad hoc or recurring basis. Step 3: Our experts can also move newly-masked data to incremental replicas in production or to lower non-production environments. From either, the data is now safe for analytic initiatives, development, testing, or training. Tell us if you need additional services, like re-ID risk scoring (expert determination) of the de-identified data. This approach provides the benefits of proven data masking solution technology and services without the need to learn and customize new software from scratch. If you do want to use the software in-house, you will have everything pre-configured for easier long-term self-use and modification.
  • 22
    KonnectzIT Reviews

    KonnectzIT

    KonnectzIT

    $10 per month
    Select the approved applications from our integration library and utilize the flow builder to set up the necessary actions and fields to initiate the synchronization process. Once this is done, the communication between your applications and KonnectzIT will commence, and the platform will manage everything from that point onward. Are you feeling overwhelmed by routine tasks that, while straightforward, consume excessive amounts of your valuable time? Are you unable to focus on more significant projects because you're bogged down by these mundane responsibilities? If you're in search of a simple yet powerful solution to reclaim your time, resources, and energy, look no further. Employ our user-friendly drag-and-drop visual builder to effortlessly link applications and synchronize data between them. Depending on the extent of your automation needs, this can save you numerous hours each day. The more extensive your connections, the more time you can free up on a daily basis. Easily and efficiently automate limitless tasks with our visual connect builder, regardless of the complexity of your workflow. Our builder not only simplifies the process of connecting applications but also allows you to clearly visualize the automation setup while you're configuring the tasks, ensuring a seamless experience.
  • 23
    ScanFactory Reviews
    ScanFactory provides real-time security monitoring of all external assets. It uses 15+ of the most trusted security tools and a large database of exploits to scan the entire network infrastructure. Its vulnerability scanner stealthily maps your entire external attack surface and is extended with top-rated premium plugins, custom wordslists, and a plethora vulnerability signatures. Its dashboard allows you to review all vulnerabilities that have been sorted by CVSS. The dashboard also contains enough information to reproduce, understand, and remediate the issue. It can also export alerts to Jira and TeamCity, Slack, and WhatsApp.
  • 24
    Clockspring Reviews

    Clockspring

    Clockspring

    $300/mo
    Clockspring is the perfect balance between low-code automation tools and custom development. Traditional integration options can be slow, fragile, and expensive, but Clockspring delivers the same flexibility you get with custom programming without the need to write any code. Our user-friendly platform enables users to connect, analyze, and automate their data, helping organizations streamline their data management, gain valuable insights, and automate routine tasks. With the ability to connect any API, database, COTS product, or even your existing custom applications, you can merge your on-prem, hybrid, and cloud tech stack into a single combined system instead of a series of data silos. Clockspring can do about 95% of what a programmer can do 10% of the time, making it a cost-effective and efficient solution for organizations of all sizes. Clockspring is also resilient in spite of outages and immediately resumes when the outage is resolved, without losing any data.
  • 25
    BIMA Reviews

    BIMA

    Peris.ai

    $168
    BIMA by Peris.ai is an all-encompassing Security-as-a-Service platform, incorporating advanced functionalities of EDR, NDR, XDR, and SIEM into a single, powerful solution. This integration ensures proactive detection of threats across all network points, endpoints and devices. It also uses AI-driven analytics in order to predict and mitigate possible breaches before they escalate. BIMA offers organizations streamlined incident response and enhanced security intelligence. This provides a formidable defense to the most sophisticated cyber-threats.
MongoDB Logo MongoDB