What Integrates with Cloudflare?

Find out what Cloudflare integrations exist in 2024. Learn what software and services currently integrate with Cloudflare, and sort them by reviews, cost, features, and more. Below is a list of products that Cloudflare currently integrates with:

  • 1
    Bitcoin IRA Reviews
    Your IRA can allow you to invest in cryptocurrency. Bitcoin IRA is the first, largest, and most secure cryptocurrency IRA platform. It has thousands of clients. Our proprietary platform allows you to trade crypto anywhere and anytime. This makes it easy to take action when the market moves. BitGo Trust and Lloyd's of London are the world's leading insurance provider and specialist in insurance and reinsurance. Assets can be insured up to $100 million. The tax-breaks are one of the greatest benefits of investing in your IRA. Maximize your retirement growth with a tax-free IRA. Our unique dashboard features include live price tracking, portfolio performance, education, and many other features. Our partner BitGo stores your digital assets. BitGo Inc. is the largest Bitcoin transaction processor in the world, processing more than 20% of all global transactions and more than 15 Billion transactions per month across all cryptocurrencies.
  • 2
    AddToAny Reviews
    You can share to any service or add a custom service. AddToAny connects people to the right place to save or share your content, in any app or on the internet. Universal menus respond instantly to taps, clicks and multiple inputs and device orientations. Sharing on mobile allows you to choose between a mobile app or a mobile site. AddToAny icons can be viewed on any device with Scalable Vector Graphics. They load quickly, are mathematically accurate, scale to any size and look stunning on high-PPI screens like Retina or Retina HD displays. AddToAny's lightweight code is compliant with best practices and optimized to load quickly from all over the globe. AddToAny's core features include accessibility, cross-browser compatibility and graceful fallbacks. AddToAny works. There is no registration required and no need to create user accounts. Official counts are available alongside your share buttons. AddToAny counters of the same design show numbers directly from major services.
  • 3
    AddThis Reviews
    Engage your customers and turn your visitors into customers. Get free tools trusted by 15,000,000 sites to grow your website. AddThis is well-known for its simple share buttons. We also offer a complete suite of website tools, including link promotion, list builder, and recommended posts. All this is all free! This is the easiest way to share your content online. Make a compelling call to action to drive people to any page that you wish to promote. Connect your email backend to collect email addresses in no time. Engage readers by sharing your most popular content that is relevant to their interests. Compatible with most popular CMS apps, including WordPress and Google AMP. AddThis ecommerce tools can reduce shopping cart abandonment, increase sales, and capture leads. Segment your audience by new vs. returned devices, geo, and social sources to drive engagement.
  • 4
    Eclypsium Reviews
    Eclypsium®, which protects enterprise devices at the hardware and fundamental firmware layers, ensures their health and integrity. This is something that traditional security cannot protect. Eclypsium adds a layer of security to protect the vital servers, networking gear, laptops, and computers at the heart of every company. Eclypsium provides security for the hardware and firmware, as opposed to traditional security that protects only the software layers of a device. Eclypsium detects and corrects low-level vulnerabilities and threats to traditional security, from the device's initial boot process to its most fundamental code. High-fidelity views of all enterprise devices, including servers, networking gear and laptops, are available. Automatically identify vulnerabilities and threats in every hardware and firmware component of each device. You can access devices on-premises and remotely, including remote work and BYOD.
  • 5
    Znode Reviews
    Znode is an enterprise-level, B2B ecommerce platform that enables sustainable growth. It offers a rich set if features to manage content, product information, and multi-store functionality. The platform is completely unmanaged and has over 600 APIs. This allows for greater extensibility, simpler integrations, and consistent functional updates. Znode's API first architecture allows for flexible data structures that allow a catalog to be applied to a single channel or shared across multiple channels. It also allows stores to have multiple catalogues. Znode's flexibility includes complex pricing and multiwarehouse shipping that can either be applied at the catalog or channel level. Znode allows you to create a B2C website, a B2B site with account-based pricing, or a B2B2X store from one platform. One single platform, more commerce.
  • 6
    Cysiv Reviews
    Cysiv's next generation, co-managed SIEM addresses all the problems and limitations associated with traditional SIEMs as well as other products used in a SOC. Our cloud-native platform automates key processes and improves effectiveness in threat detection, hunting and investigation, as well as response. Cysiv Command combines the essential technologies needed for a modern SOC into a unified cloud-native platform. It is the foundation of SOC-as a-Service. Most telemetry can either be pulled from APIs, or sent securely over the internet to Cysiv Command. Cysiv Connector is an encrypted conduit that allows you to send all required telemetry from your environment, such as logs, over Syslog UDP. Cysiv's threat engine uses a combination of signatures, threat intelligence and user behavior to automatically detect potential threats. Analysts can focus on the most important detections.
  • 7
    Rackspace Reviews
    Customers can now benefit from enhanced full-lifecycle cloud native programming capabilities that will allow them to build modern applications for tomorrow. With applications designed for tomorrow, unlock the full potential of cloud computing today. Traditional cloud adoption strategies focused on application migration and infrastructure, but did not pay enough attention to the code underneath. While the cloud has always offered the benefits of scale and elasticity, it cannot unleash its full potential unless the code in your applications is updated. Modern applications built with cloud native technology and modern architectures allow you to tap the full potential of cloud computing. This will increase agility and help you accelerate innovation. You can create self-healing, autoscaling applications that are free from the limitations of servers. Serverless architectures provide the best efficiency and cost savings of the cloud, while allowing almost all infrastructure and software management to be done on the platform.
  • 8
    Codero Reviews
    High-performance, reliable infrastructure tailored to your business and operational requirements. We will design the best solution for you. Our engineers will create a future-proof solution to support your business growth. Our experts will ensure seamless migration with clear communication, a detailed strategy and minimal disruption to your business services. Optimized network optimization solutions for maximum efficiency, reliability, and functionality. Protect your data and infrastructure with cutting-edge protection from cyber threats and Internet bad guys. Disaster recovery and backup solutions for protecting your data and keeping your business running. Codero Private Cloud offers better performance, privacy, control, and management. Refer or resell. Codero helps you extend your brand. Our team of experts will get to know you and your company's operational needs, goals, as well as the type of work you'll be doing.
  • 9
    Assetnote Reviews
    Assetnote's industry-leading Attack Surface Management Platform gives you continuous insight and control over your evolving exposure to external attacks. Assetnote automatically maps all your external assets and monitors for security issues and changes to prevent serious breaches. Modern infrastructure and development practices are rapidly changing and fast-paced. Attackers have changed, so have you. Assetnote is always up-to-date. Assetnote is your best friend. Assetnote will help you increase your asset awareness. Assetnote continuously monitors your external attack surface to help you quickly identify and resolve high-impact security issues. Assetnote performs continuous security analysis and discovery, allowing you to quickly identify issues in in-development and ephemeral assets before the attackers do.
  • 10
    HedgeDoc Reviews
    HedgeDoc, formerly CodiMD, is an open-source web-based, self-hosted collaborative markdown editor. It allows you to collaborate on graphs, notes, and presentations in real time. You just need to share your note-link with your coworkers, and they'll be ready to go. It's easy to install HedgeDoc on your server! We offer a ready-to-use bundle and a docker file. Our installation guide provides more information. The HedgeDoc source code can be found on GitHub and is licensed under AGPL 3.0. Everything is open-source and free as free speech. It is open source and free as in free speech. We are always open to suggestions, improvements, and discussions. You can join our Matrix chat room or open a Discourse topic.
  • 11
    TMDHosting Reviews

    TMDHosting

    TMDHosting

    $2.95 per month
    We use cutting-edge cloud and computing technologies that we understand to increase your website's speed by up to 30%. Enjoy our super-fast services that are available in 7 different locations around world! We are committed to protecting your website's security. Our all-SSD web hosting services are super fast and provide regular updates, maintenance, traffic and contents monitoring, as well as daily backups. Your WordPress website's loading time is critical! Our team has combined 3 layers (APC, OPCache and Varnish) with premium Solid-State Drives hardware to provide up to 16 times faster loading speeds for your WordPress website. The web-based firewall is updated daily by our senior system administrators. The Web-Based Firewall powered only by BitNinja is an extra layer of security that protects your WordPress website from online threats. It is updated daily by senior system administrators.
  • 12
    Amion Reviews
    Plan time off, create schedules and trade shifts. Page staff. Residents, attendings, and other medical professionals. Standardize an entire hospital into one on-call list with paging and last-minute updates. Imagine scheduling as fun! The schedule would populate your facility's on call list automatically, and page operators, colleagues, and support staff would always reach the right provider. AMiON adds color to scheduling. It makes scheduling fun! It makes it easy to create and adjust schedules using templates, patterns, staffing rules and an auto-scheduler. Just a few clicks and schedules are posted at Amion.com. Staff can view assignments, send pages or secure messages, sync work calendars to personal calendars and submit special requests. They can also swap shifts online. Staff at Switchboard can make last-minute changes in order to keep schedules current. When a work-related message arrives, the AMiON mobile app buzzes discreetly in your pocket.
  • 13
    Cloudflare Waiting Room Reviews
    Sudden increases can cause infrastructure and applications to become overwhelmed, which can lead to slow performance and complete disruption of your online presence. Cloudflare Waiting Room allows organizations routing excess users to a custom-branded wait room. This helps preserve customer experience and protect origin server from being overwhelmed by requests. You can ensure that your online transactions do not suffer from slow application performance or downtime during peak traffic hours. Your brand's waiting room is an extension of your brand. It ensures that users have a seamless online experience, even while they wait. Reduce costs associated with purchasing additional bandwidth and maintaining servers to handle peak traffic. Waiting Room reduces wait times by dynamically managing traffic. A new user is allowed in as soon as an existing user leaves the application or their cookie expires. You can set activation thresholds based upon the incoming traffic or total active users.
  • 14
    Cloudflare Tunnel Reviews
    Developers and IT spend a lot of time locking down an application from the moment it is deployed. This includes configuring ACLs, rotating IP address, and using clunky solutions such as GRE tunnels. Cloudflare Tunnel is a safer and simpler way to protect web servers and applications from direct attacks. Cloudflare Tunnel will ensure your server is secure no matter where it is running: public cloud or private cloud, Kubernetes cluster or even a Mac mini underneath your TV. Cloudflare Tunnel, a tunneling software, allows you to quickly secure and encrypt traffic to any infrastructure. This allows you to hide your web server IP addresses and block direct attacks so you can get back to delivering great apps. The Tunnel daemon creates a tunnel between your origin web server, Cloudflare's nearest Data Center. This is done without opening any public ports.
  • 15
    Chronicle SOAR Reviews
    Playbooks can be used to speed up time-to-value, and allow for easy scaling as you grow. You can address common problems like ransomware and phishing with ready-to-use use cases that include playbooks, simulated alarms, and tutorials. Drag and drop is all it takes to create playbooks that organize hundreds of the tools that you rely upon. Automate repetitive tasks to help you respond faster and make more time for high-value work. Optimize, troubleshoot and iterate playbooks using lifecycle management capabilities such as run analytics, reusable blocks, version control, rollback, and run analytics. Integrate threat intelligence at each step and visualize the most relevant contextual data for each threat, including who did what and when, and the relationships between all entities attached to an event or product. The patent-pending technology automatically groups related alerts into one threat-centric case. This allows a single analyst the ability to efficiently investigate and respond.
  • 16
    Entitle Reviews
    Entitle blends a security-first approach in provisioning and governance with a commitment for business enablement for all employees, from R&D and Sales to H&R to finance. To speed up provisioning, security policies can be automatically updated to reflect changes in infrastructure and employee requirements. Permissions can be granted to specific resources such as Google Drive folders and database tables, Git repositories, or other resources. Protect privileged roles and resources by only granting access when necessary, and removing them when they are not. For authorizations you can trust, give access requests to peers, managers, resource owners, and managers. DevOps and IT can save significant time and resources by using automated access requests and zero touch provisioning. For a seamless approval process, users can request access via Slack or Teams, Jira or email. To keep up with organizational changes, grant bulk permissions to speed onboarding and offboarding.
  • 17
    SeeMetrics Reviews
    A cybersecurity performance management platform is now available for security leaders, allowing them to track, monitor, and improve their operations. You can now see the performance of your security program in one place. To understand how your stack is performing, and how you can improve it, look at one central location. Stop chasing and consolidating data. Data, not intuition, should be used to plan, decide and invest. You can make better decisions about corporate security with the help of actionable information about people, products and budget. Identify cyber resilience and performance gaps based on real-time threats and cross-product insights. You can easily share and communicate dynamic metrics with non-technical audiences. SeeMetrics' platform is agentless and integrates with your existing tools, so you can generate insights in minutes.
  • 18
    Mandiant Digital Risk Protection Reviews
    Learn what a digital protection solution is, how it can help prepare you by identifying who is targeting you and what they are after. Mandiant offers a comprehensive digital risk protection solution, either as a standalone self-managed SaaS product or as a comprehensive service. Both options provide security professionals with visibility outside their organization and the ability to identify high risk attack vectors, malicious orchestration on the dark and deep web, and attack campaign on the open web. Mandiant’s digital risk solution provides contextual information about threat actors, their tactics, techniques and procedures, to create a more secure cyber-threat profile. Map your attack surface, and monitor deep and dark web activities to gain visibility into the risk factors that impact the extended enterprise and supply chains. Identify unknown or unmanaged internet-facing assets that are vulnerable before threat actors do.
  • 19
    Entri Reviews
    Your user enters the desired domain. You can also pass the domain to Entri directly via our JS SDK. Do not make your users guess. After the DNS provider has been detected, the user logs on with their credentials. No need to copy and paste complex records or read cumbersome documentation. Entri's modal window can be configured to accept your desired DNS settings. Entri will then apply these settings to your end users. Entri offers a seamless experience for users to log in with their DNS provider. You can customize the modal so that it matches the look and feel your brand. Use robust webhooks for your backend to be notified about the status of domains. You can see the DNS records that have been propagated and the domain of the user.
  • 20
    pgEdge Reviews
    Easy deployment of a high-availability solution for disaster recovery, failover within and between cloud regions with zero downtime during maintenance. Multiple master databases distributed across multiple locations can improve performance and availability. Keep local data local, and control which tables will be globally replicated and which will remain local. Support higher throughput if workloads threaten to exceed the available compute capacity. pgEdge platform is available on-premises, or through self-managed cloud provider accounts. Supports a wide range of OS and hardware combinations. Enterprise-class support available. Edge Platform nodes that are self-hosted can be used as part of a Postgres cluster in pgEdge cloud.
  • 21
    Blink Reviews

    Blink

    Blink Ops

    Blink is a powerful ROI multiplier for business leaders and security teams who want to quickly and easily secure many different use cases. Get complete visibility and coverage across your organization's security stack. Automated flows can reduce false positives and noise in alerts. Scan for threats and vulnerabilities and identify them proactively. Automated workflows can be created to add context, streamline communication, and reduce the MTTR. Automate your workflows with no-code and generative AI to take action on alerts, and improve the security posture of your cloud. Keep your applications secure by allowing developers to access their applications, streamlining approvals processes, and shifting left the requests for access. Monitor your application continuously for SOC2, ISO or GDPR compliance checks, and enforce controls.
  • 22
    Canopy Reviews
    Canopy allows your development team save a lot of time, streamline operations and deliver experiences quickly. Connect securely to the best SaaS platforms, spreadsheets, csv files, and relational databases. Create new connectors for any data set, including internal data, niche and long-tail SaaS platform, and complex integrations, in minutes. Prepare your data to be the perfect format for every experience or action. Deliver data using your curated API, with the right communication strategy and caching strategy to ensure optimal performance. Real-time insights, controls, and actions allow you to quickly view, manage, or troubleshoot anything that is important to you. Engineered for enterprise demands, with unmatched security and compliance, scalability and speed.
  • 23
    Docu Dig Reviews
    Docu Dig provides easy and secure content searching and insights into your documents. Docu Dig can help you improve your organization's document insight with a customized solution. Securely unlock the potential of your documents with AI-powered smart searches and insights. Docu Dig uses the latest AI technology to enhance document insights retrieval securely, improving team productivity and access to information. Your data security is of paramount importance to Docu Dig. We use advanced encryption technology to protect your documents, both in transit and at rest. This ensures that they are always secure. We offer private, sandboxed AI in the cloud, or on-premises servers for highly sensitive data. This ensures that your data will never leave your premises. Our AI is able to provide accurate insights from documents, unlike traditional methods which rely on exact keyword matching.
  • 24
    PerimeterX Bot Defender Reviews
    PerimeterX Bot Defender, a behavior-based bot management system, protects your websites, mobile apps, and APIs against automated attacks. It safeguards your online revenue, reduces the risk of data breaches, and improves operational efficiency. Automated bots can generate more than 50% of your website's traffic. Malicious bots could take over your users' accounts and abuse your payment pages. They can also hoard inventory, steal pricing and content, or even steal your content. Bots can not only be a security risk, but they can also affect your competitive edge and skew web analytics, which can lead to revenue loss and higher customer service costs. Bot Defender combines intelligent fingerprinting and behavioral signals with predictive analysis to detect bots in your web and mobile apps and API endpoints. Bot Defender is industry-leading in accuracy and provides a safe customer journey.
  • 25
    Haylix Reviews
    Our process is designed for monitoring, building and monitoring cloud environments to ensure their peak performance. We can help you create a secure and optimal environment for your cloud platform. We will work with you to create a roadmap for our engagement. This includes migrating services to the cloud or optimisation and remediation services for existing cloud environments. Once the roadmap is finalised, we will either fix your current cloud environment or create a secure and optimised environment according to industry best practices. Your platform and application will be moved to a secure cloud environment. We will transform your application using DevOps automation, modernisation microservices, and transform it.
  • 26
    Vectrix Reviews
    One-click security scans of cloud and SaaS apps. You can protect your tools by identifying issues such as file leaks, misconfigurations and suspicious activity. Connect your tools to get instant insight into internal files and sensitive information shared, accessed, configured, and configured across all your apps. A dashboard that displays user access allows you to manage permissions and enforce security best practice in just a few mouse clicks. You can easily detect and fix security issues before they occur by preventing them from happening. You run the risk that someone else has access to your SaaS tools. Vectrix scans make it simple to review user access, permissions, manage onboardings or offboardings, export user accessibility reports, and so much more.
  • 27
    Stackreaction Reviews
    How to build a marketplace, online school, or membership site? You will find tools, integrations, workflows, and guides to help you jumpstart your idea. Browse tools and apps, compare features, and leave feedback. Automating routine tasks? All integrations from Zapier and Integromat, Automateio, and other automation platforms are available in one place. Compare features and prices. Find tutorials and guides from vendors and the community. Contribute your knowledge. Make use of the nocode community's openness. Create your profile, grab your favorite tools, and share your stack.
  • 28
    Suffescom Solutions Reviews

    Suffescom Solutions

    Suffescom Solutions

    Launch a platform that allows users to earn, transfer and monitor virtual currency. Our crypto wallet development services will help you create a payment integration solution that is highly scalable and stable, while also providing world-class security. We are a leading cryptocurrency application development company and we build ultra-secure cryptocurrency Wallets for you. Suffescom blockchain experts can help you understand how to benefit from our crypto wallet development services. Our white-label cryptocurrency wallet services allow you to explore blockchain technology at an affordable price. With complete software access, quick-to-launch projects are delivered quickly. We use the latest technology to create a product which maintains secure transactions with no possibility of compromise.