What Integrates with Splunk Cloud Platform?

Find out what Splunk Cloud Platform integrations exist in 2024. Learn what software and services currently integrate with Splunk Cloud Platform, and sort them by reviews, cost, features, and more. Below is a list of products that Splunk Cloud Platform currently integrates with:

  • 1
    Device42 Reviews
    Top Pick

    Device42

    Device42, A Freshworks Company

    $1499.00/year
    163 Ratings
    See Software
    Learn More
    Device42 is a robust and comprehensive data center and network management software designed by IT engineers to help them discover, document and manage Data Centers and overall IT. Device42 provides actionable insight into enterprise infrastructures. It clearly identifies hardware, software, services, and network interdependencies. It also features powerful visualizations and an easy-to-use user interface, webhooks and APIs. Device42 can help you plan for network changes and reduce MTTR in case of an unexpected outage. It provides everything you need for maintenance, audits and warranty, license certificate, warranty and lifecycle management, passwords/secrets and inventory, asset tracking and budgeting, building rooms and rack layouts... Device42 can integrate with your favorite IT management tools. This includes integration with SIEM, CM and ITSM; data mapping; and many more! As part of the Freshworks family, we are committed to, and you should expect us to provide even better solutions and continued support for our global customers and partners, just as we always have.
  • 2
    Kroll Cyber Risk Reviews
    See Software
    Learn More
    We are the #1 incident response provider in the world. We protect, detect, and respond to cyberattacks by combining complete response capabilities and frontline threat information from over 3000 incidents per year with end-to-end expertise. Contact us immediately via our 24-hour cyber incident hotlines. Kroll's Cyber Risk specialists can help you tackle the threats of today and tomorrow. Kroll's protection solutions, detection and response are enriched with frontline threat intelligence from 3000+ incident cases each year. It is important to take proactive measures to protect your organization, as the attack surface is constantly increasing in scope and complexity. Enter Kroll's Threat Lifecycle Management. Our end-to-end solutions for cyber risk help uncover vulnerabilities, validate the effectiveness your defenses, update controls, fine-tune detectors and confidently respond any threat.
  • 3
    RunMyJobs by Redwood Reviews
    Top Pick
    See Software
    Learn More
    RunMyJobs by Redwood is the most awarded SAP-certified SaaS workload automation platform allowing enterprises to achieve end-to-end IT process automation and unify complex across any application, system or environment without limits and with high availability as you scale. We're the #1 job scheduling choice for SAP customers with seamless integration to S/4HANA, BTP, RISE, ECC and more while maintaining a clean core. Empower teams with seamless integration with any present and future tech stack, a low-code editor and a rich library of templates. Monitor processes in real-time with predictive SLA management and get proactive notifications via email or SMS on performance issues or delays in all your processes. Redwood team provides 24/7/365 day global support with the industry’s strongest SLAs and 15-minute response times and a proven approach to migration that secures continuous operations, including team training, on-demand learning and more.
  • 4
    Keeper Security Reviews
    Top Pick

    Keeper Security

    Keeper Security

    $2.00 per user, per month
    1,542 Ratings
    See Software
    Learn More
    Password security is the foundation of cybersecurity. Keeper's powerful password security platform will protect your business from cyberthreats and data breaches related to passwords. Research shows that 81% of data breaches can be attributed to weak passwords. Password security platforms are an affordable and easy way for companies to address the root cause of most data breaches. Your business can significantly reduce the risk of data breaches by implementing Keeper. Keeper creates strong passwords for all websites and apps, then secures them on all devices. Each employee receives a private vault to store and manage their passwords, credentials and files, as well as private client data. Employees will save time and frustration by not having to remember, reset, reuse, or remember passwords. Industry compliance is achieved through strict and customizable role-based access controls. This includes 2FA, usage auditing, and event reporting.
  • 5
    Dropbox Reviews
    Top Pick

    Dropbox

    Dropbox

    $12.50 per month per user
    32,483 Ratings
    See Software
    Learn More
    Dropbox Business is more than secure file storage. It's a smart workspace that brings together teams, tools, content, and other resources. You can create, store, and share cloud content using Google Docs, Sheets and Slides, Microsoft Office files and Dropbox Paper. Dropbox Spaces allows you to combine cloud content and files, so your PowerPoints can live alongside your Trello boards, Google Docs, and other tools. Access your team's work easily from any computer, mobile device or web browser. Connect tools such as Zoom and Slack to keep your team's files and conversations in one place. Intelligently suggested folders and files keep your team one step ahead. They will have the content they need when they need it. Dropbox offers a secure, distributed infrastructure with admin tools to control and visibility. Keep your company's data safe with Dropbox.
  • 6
    IPQualityScore Reviews

    IPQualityScore

    IPQualityScore

    $49.99 per month
    2 Ratings
    IPQualityScore's suite fraud prevention tools automate quality controls to prevent bots and fake accounts, fraudsters chargebacks & malicious users, without interfering with the user experience. With industry-leading IP reputation data and user validation, you can detect bad actors and block cyber threats. For smoother operations and less headaches, proactive Prevent Fraud™.
  • 7
    DomainTools Reviews
    Connect indicators from your network to nearly every active domain or IP address on the Internet. This data can be used to inform risk assessments, profile attackers, guide online fraudulent investigations, and map cyber activity to the attacker infrastructure. Get the information you need to make an informed decision about the threat level to your organization. DomainTools Iris, a proprietary threat intelligence platform and investigation platform, combines enterprise-grade domain-based and DNS-based intelligence with a simple web interface.
  • 8
    FortiGate IPS Reviews
    Comprehensive threat protection with an intrusion prevention system. An intrusion prevention (IPS) system is an essential component of any network's core security capabilities. It protects against known threats as well as zero-day attacks, including malware and other vulnerabilities. Many solutions can be deployed inline as a bump in a wire and perform deep packet inspections of traffic at wire speed. This requires high throughput, low latency, and high throughput. FortiGate, an industry-recognized platform for delivering this technology to Fortinet, is the channel through which it is delivered. FortiGate security processors offer unparalleled high performance. FortiGuard Labs provides industry-leading threat intelligence. This creates a proven record in protecting against known and zero-day threats. FortiGate IPS is a key component in the Fortinet Security Fabric. It protects the entire infrastructure without compromising performance.
  • 9
    ControlMap Reviews
    Take control of SOC2, ISO-27001, NIST, CSA STAR, or other Infosec certifications with a simple, easy-to-use, fully automated platform. ControlMap's smart mapping saves you hundreds of hours responding and assessing data requests. It automatically and continuously associates RISKS CONTROLS, POLICIES, AND PROCEDURES so that you don't have the task of responding to each request. ControlMap's integration with other ticketing systems like Jira makes it easier to use. Our Jira Marketplace App, Jira integration collects evidence, raises alerts, or simply creates tasks in other systems. You can eliminate any last-minute surprises. We have created a product that modern teams can use. Start with a free trial, or contact us to learn more.
  • 10
    Squadcast Reviews
    Squadcast is a tool for incident management that was specifically designed for SRE. Squadcast Actions can help you create a culture of blamelessness by reducing the need to have physical war rooms.
  • 11
    Zulip Reviews

    Zulip

    Zulip

    $6.67 per user per month
    1 Rating
    Chat for distributed teams. Zulip combines real-time chat and email threading to provide instant messaging. Zulip allows you to keep up with important conversations and ignore the rest. Zulip is powered by Electron, React Native and has modern apps for every platform. Zulip is 100% open-source software, developed by hundreds of developers from around the globe. Zulip has 120,000 words worth of documentation, a high-quality code base, and a friendly community that makes it easy to modify or extend the software. Zulip has a much larger and more active developer community than modern open-source group chat solutions like Mattermost and Rocket.Chat. Zulip supports more than 90 native integrations. Hubot, Zapier, IFTTT and IFTTT offer hundreds more integrations. You can also create your own integrations using Zulip's powerful API.
  • 12
    HaloITSM Reviews

    HaloITSM

    Halo Service Solutions

    $49 per user per month
    1 Rating
    A single, all-inclusive cloud platform that is ITIL-aligned will empower your IT team. Transform old ways of working into modern, intuitive workflows that empower employees and customers to provide excellent service. Standardize your processes and get valuable analytics to align IT with business needs. You can centralize your workflows and create one space for your ITSM software. HaloITSM combines ITIL best-practices and a flexible approach to ensure that you can improve service management while maintaining a great user experience. HaloITSM is trusted by customers in many sectors worldwide. Check out our case studies to see how they transformed their daily processes.
  • 13
    Nucleus Reviews

    Nucleus

    Nucleus

    $10 per user per year
    1 Rating
    Nucleus is changing the definition of vulnerability management software. It is now the single source of all assets, vulnerabilities and associated data. By unifying people, processes, technology, and vulnerability management, Nucleus unlocks the value that you are not getting from existing tools. Nucleus gives you unrivalled visibility into your program, and a suite that offers functionality that cannot be duplicated in any other manner. Nucleus is the only tool that unifies security and development operations. It unlocks the value that you are not getting from your existing tools and sets you on the path of unifying people, processes, technology, and people involved in addressing vulnerabilities or code weaknesses. Nucleus offers unrivaled pipeline integration, tracking and triage capabilities, as well as a suite of functional tools.
  • 14
    Barracuda Cloud Archiving Service Reviews
    Barracuda Cloud Archiving Service offers secure cloud-based archive that allows organizations to comply with strict compliance requirements and respond to e-discovery requests quickly and efficiently. It can be used with services such Office 365 or G Suite and uses the Barracuda cloud to store data for as long a time as necessary without risk of amendments or deletions. Access to all messages sent and received from any device increases end user productivity. Barracuda Cloud Archiving Service is compatible with Office 365, Exchange and other email services. This allows for a complete cloud-based archive without the need for additional software or hardware from customers. End users can retrieve and restore any message sent or received from the mail server using a multi-functional add in for Outlook, Android and iOS mobile apps, as well as a dedicated web interface.
  • 15
    SIRP Reviews
    SIRP is a SOAR platform that is risk-based and non-code. It connects all security teams to achieve consistent strong outcomes through a single platform. SIRP empowers Security Operations Centers, Incident Response (IR), Threat Intelligence (VM) and Security Operations Centers (SOCs). It integrates security tools, powerful automation, and orchestration tools to enable these teams. SIRP is a NO-code SOAR platform that includes a security scoring engine. The engine calculates risk scores specific to your organization based on every alert, vulnerability, and incident. Security teams can map risks to individual assets and prioritize their response at scale with this granular approach. SIRP saves security teams thousands of hours every year by making all security functions and tools available at a push of a button. SIRP's intuitive drag and drop playbook building module makes it easy to design and enforce best practices security processes.
  • 16
    F5 Distributed Cloud WAF Reviews
    Our SaaS-delivered WAF can mitigate web app attacks and vulnerabilities by providing comprehensive security controls, uniform policy, and observability. It is quick to deploy and manage and scales across any environment. Simplify app protection by integrating core security functionality into the development process. This is done with centralized orchestration and oversight. F5 Distributed Cloud Waf reduces the complexity and burden of consistently securing applications across clouds, on premises, and edge locations. SecOps and DevOps can work together to deliver the programmability and oversight that SecOps demands, enabling faster and more secure application release cycles. Improve visibility and insight into all security events, including WAF signatures, DoS events and automated and persistent threats. Also, all other client interactions, app performance and intuitive drill-down capabilities.
  • 17
    EV Service Manager Reviews
    IT has the opportunity to support digitalization across the enterprise and an integrated cloud-based IT Service Management software tool is crucial to success. In contrast to the old, complex, or simple-but-not-sophisticated service desk solutions, EV Service Manager is a versatile, powerful, and easy way to manage service delivery for your organization. Our Service Manager platform is designed to meet even the most complex needs, while bringing new levels of simplicity, agility and mobility to cloud-based IT Service Management software. Service Manager's robust automated engine includes support for the ITIL lifecycle and PinkVerified processes. Our smart and adaptable interface allows you to integrate dashboards, portals, and third-party apps to provide a user experience with access to everything that is important.
  • 18
    TCPWave Reviews
    DDI automation is a tool that enables service providers and enterprises to quickly roll out services, avoid outages, and simplify the transition to the cloud. Scalable DDI architecture that can meet automation, surge, and cloud needs. Enterprises can scale the architecture vertically or horizontally with superior performance and lower TCO. Our superior fault prevention solution will protect your mission-critical networks from ransomware, phishing attacks, botnet attacks and malware. TCPWave provides security and speed to meet market demands for secure networks. TCPWave is a bit different than the standard IPAM software. This makes it highly adaptable and scalable. Retrofitting two-decade-old legacy solutions to today's DevOps or CloudOps needs is not a wise choice. The TCPWave DDI, a superior 1500+ REST API-based TCPWave DDI, is made for today's enterprises.
  • 19
    CyberArk Privileged Access Manager Reviews
    Protect your business from malicious use of privileged credentials and accounts - this is a common route to stealing valuable assets. CyberArk's PAM as a Service solution uses the most advanced automation technologies to protect your company as it grows. Attackers are always looking for ways in. To minimize risk, manage privileged access. Protect credential exposure and prevent critical assets from falling into the wrong hand. Maintain compliance with key events recorded and tamper-resistant auditors. Privileged Access Manager integrates easily with a variety of platforms, applications, and automation tools.
  • 20
    GitGuardian Reviews
    Top Pick
    GitGuardian is a global cybersecurity startup focusing on code security solutions for the DevOps generation. A leader in the market of secrets detection and remediation, its solutions are already used by hundred thousands developers in all industries. GitGuardian helps developers, cloud operation, security and compliance professionals secure software development, define and enforce policies consistently and globally across all their systems. GitGuardian solutions monitor public and private repositories in real-time, detect secrets and alert to allow investigation and quick remediation.
  • 21
    ThreatLocker Reviews
    Top Pick
    For IT professionals to stop ransomware, you need to do more than look for threats. ThreatLocker helps you reduce your surface areas of attack with policy-driven endpoint security and change the paradigm from only blocking known threats, to blocking everything that is not explicitly allowed. Combined with Ringfencing and additional controls, you enhance your Zero Trust protection and block attacks that live off the land. Discover today the ThreatLocker suite of Zero Trust endpoint security solutions: Allowlisting, Ringfencing, Elevation Control, Storage Control, Network Access Control, Unified Audit, ThreatLocker Ops, Community, Configuration Manager and Health Center. 
  • 22
    Datadog Reviews
    Top Pick

    Datadog

    Datadog

    $15.00/host/month
    7 Ratings
    Datadog is the cloud-age monitoring, security, and analytics platform for developers, IT operation teams, security engineers, and business users. Our SaaS platform integrates monitoring of infrastructure, application performance monitoring, and log management to provide unified and real-time monitoring of all our customers' technology stacks. Datadog is used by companies of all sizes and in many industries to enable digital transformation, cloud migration, collaboration among development, operations and security teams, accelerate time-to-market for applications, reduce the time it takes to solve problems, secure applications and infrastructure and understand user behavior to track key business metrics.
  • 23
    Microsoft Entra ID Reviews
    Microsoft Entra ID, formerly known as Azure Active Directory, is a comprehensive cloud-based identity and access management solution that combines core directory service, application access management and advanced identity protection. Cloud identity and access management solutions connect employees, customers and partners with their apps, devices and data. Protect data and resources with adaptive access policies and strong authentication without compromising the user experience. Provide a quick, easy sign-in across your multicloud environment in order to keep your users productive and reduce time spent managing passwords. Manage all your identities, and access to your applications, in one central location, whether in the cloud, or on-premises. This will improve visibility and control.
  • 24
    LoginRadius Reviews
    LoginRadius allows businesses to provide a pleasant customer experience without compromising security. Companies can use our customer identity platform to offer a simplified login process, protect digital accounts, and comply with data privacy regulations. LoginRadius has over 3,000 users and 700 million monthly visitors worldwide. Registration services, adaptive security, integrations with third-party apps, and customer insights are some of the key platform features. Gartner, KuppingerCole and Computer Weekly have named the company an industry leader in customer identification and access management (CIAM). Microsoft is a major technology investor and partner. LoginRadius has its headquarters in Vancouver, Canada. There are additional offices in Toronto, USA and Australia. LoginRadius Services: API Authentication OAuth Data Management Secure Login One Sign On SAML SSO Sign up for social media Two Factor Authentication
  • 25
    PagerDuty Reviews
    Top Pick
    PagerDuty, Inc. (NYSE PD) is a leader for digital operations management. Organizations of all sizes rely on PagerDuty to deliver the best digital experience to their customers in an ever-on world. PagerDuty is used by teams to quickly identify and solve problems and to bring together the right people to prevent future ones. PagerDuty's 350+ integrations include Slack, Zoom and ServiceNow as well as Microsoft Teams, Salesforce and AWS. This allows teams to centralize their technology stack and get a holistic view on their operations. It also optimizes processes within their toolkits.
  • 26
    Zoom Team Chat Reviews
    Top Pick
    You can connect your teams and improve communication. Zoom Team Chat is included with your Zoom license. Zoom Team Chat helps your teams stay connected. Chat and video meetings can streamline your teams. Enterprise chat and instant video meetings make collaboration between teams and other participants easier. Modern and efficient team communication is possible. You can create a virtual workspace that allows all the people involved in every project to collaborate. You can organize your communications chaos. You can save time by quickly finding messages and content related to your conversations or projects. You can start a meeting with any channel, either group or 1:1. Zoom meetings can scale up to 1,000 participants with clear video, audio, and screen sharing. Communicate in private or public channels that are organized by topics, teams, or projects. You can share files, emojis and screenshots. You can quickly find contacts, messages, files, and other information. Calendar integrations sync presence and status.
  • 27
    Malwarebytes Reviews
    Top Pick

    Malwarebytes

    Malwarebytes

    $47.22 per user per year
    12 Ratings
    Cyberthreats are eradicated Restores confidence. Traditional antivirus is no longer sufficient. Malwarebytes eliminates all new threats before other antivirus systems even know they exist. Malwarebytes blocks viruses, malware, malicious sites, ransomware, hackers, and other threats that traditional antivirus can't stop. Organizations of all sizes use our cutting-edge protection and response strategies. Traditional antivirus is slow to respond to new threats. It's also "dumb". We use layers like anomaly detection (an artificial intelligence type), behavior matching, application hardening, and behavior matching to destroy malware that has never been seen before. It's not like traditional antivirus.
  • 28
    BeyondTrust Remote Support Reviews
    Leading enterprises have found the #1 solution to securely access and support any device, anywhere in the globe. All in One Secure Remote Support Solution. BeyondTrust Remote Support (formerly Bomgar) allows you to support Windows, Mac OS, Linux, iOS and Android as well as peripherals using one secure tool. More devices, more platforms, more people, more locations. End-users and customers can get reliable, instant remote support from anywhere in the world. Focus on the problem, not the connection, and you can accomplish more. With seamless, high-quality remote assistance for all end-users, you can improve service levels and customer satisfaction. You can provide enterprise-grade, scalable support that keeps your business afloat, no matter if you're fixing a Linux server over the ocean or an iPhone in the middle of town.
  • 29
    Tableau Reviews
    Top Pick
    Tableau, a comprehensive business intelligence (BI/analytics) solution, allows you to generate, analyze, and interpret business data. Tableau allows users to gather data from many sources, including spreadsheets, SQL databases and Salesforce. Tableau offers real-time visual analytics as well as an interactive dashboard that allows users to slice and dice data to make relevant insights and find new opportunities. Tableau allows users to customize the platform for different industry verticals such as communication, banking, and more.
  • 30
    Chef Reviews
    Chef transforms infrastructure into code. Chef automates how you build, deploy and manage your infrastructure. Your infrastructure can be as easily modified, tested, and repeated as application code. Chef Infrastructure Management automates infrastructure management automation to ensure configurations are consistently applied in all environments. Chef Compliance makes it easy for the enterprise to enforce and maintain compliance. Chef App Delivery enables you to deliver consistent, high-quality application results at scale. Chef Desktop allows IT teams automate the deployment, management and ongoing compliance for IT resources.
  • 31
    Alibaba Cloud Reviews
    Alibaba Cloud is a business unit of Alibaba Group (NYSE : BABA). It provides a complete suite of cloud computing services that can be used to power both international customers' online businesses as well as Alibaba Group's own ecommerce ecosystem. In January 2017, Alibaba Cloud was made the official Cloud Services Partner by the International Olympic Committee. We are constantly working towards our vision to make it easier to do business with anyone, anywhere in the world, by leveraging and improving the latest cloud technology. Alibaba Cloud offers cloud computing services to large and small businesses, individuals, and the public sector in more than 200 countries and regions.
  • 32
    AlertOps Reviews

    AlertOps

    AlertOps

    $0.00/month/user
    AlertOps is an industry-leading Incident Response Automation and Alert Management Platform. A SaaS-based software solution, collaboration and automation hub that enables an organization to dramatically improve the issue notification, escalation, and time to resolution process. As incidents occur that impact business-critical processes and revenue streams, the platform alerts the right people at the right time and with the right data to enable rapid incident resolution. As organizations evaluate solutions to improve and transform critical incident response -- to support ever-increasing customer and business requirements -- the AlertOps platform is uniquely suited with category-leading features to enable better and seamless customer experiences while helping drive improved operational efficiency and boosting business results. Discover why, many of the world’s largest companies leverage AlertOps to respond more rapidly, outmaneuver their competitors and win when moments matter.
  • 33
    Teramind Reviews

    Teramind

    Teramind

    $12/month/user
    Teramind provides a user-centric security approach to monitoring your employees’ digital behavior. Our software streamlines employee data collection in order to identify suspicious activity, improve employee productivity, detect possible threats, monitor employee efficiency, and ensure industry compliance. We help reduce security incidents using highly customizable Smart Rules that can alert, block or lockout users when rule violations are detected, to keep your business running securely and efficiently. Our live and recorded screen monitoring lets you see user actions as they’re happening or after they’ve occurred with video-quality session recordings that can be used to review a security or compliance event, or to analyze productivity behaviors. Teramind can be installed in minutes and can be deployed either without employees knowing or with full transparency and employee control to maintain trust.
  • 34
    Dotcom-Monitor Reviews

    Dotcom-Monitor

    Dotcom-Monitor

    $19.99/month
    Website monitoring and performance testing solutions. You can quickly identify performance issues by using powerful monitoring features like real-time dashboards, performance reporting options, or nearly 30 global monitoring networks. The EveryStep Web Recorder allows you to quickly and easily record scripts that can be used to monitor interactive websites, web application elements, and user scenarios. Dotcom-Monitor makes sure that even the most complex websites, web apps, and web services are up to date and perform as intended.
  • 35
    Litmus Edge Reviews

    Litmus Edge

    Litmus

    15000/5k data points/site
    A hardware agnostic, Industrial Data Platform that allows manufacturing companies to do more with their data. Litmus Edge creates a data layer that makes IIoT more accessible on the factory floor and across the enterprise so you can focus on what matters most for your business. With Litmus Edge Manager, you also get a centralized management and orchestration layer for device, data, application and ML model management at any scale across plants and geographies. Now try our product for free. 15 days of free trial to check all the features, free access to our documentation, how to guides, along with access to our experts. Wanted a fully loaded hosted instance for a starter node? Just let us know.
  • 36
    Edge Delta Reviews

    Edge Delta

    Edge Delta

    $0.20 per GB
    Edge Delta is a new way to do observability. We are the only provider that processes your data as it's created and gives DevOps, platform engineers and SRE teams the freedom to route it anywhere. As a result, customers can make observability costs predictable, surface the most useful insights, and shape your data however they need. Our primary differentiator is our distributed architecture. We are the only observability provider that pushes data processing upstream to the infrastructure level, enabling users to process their logs and metrics as soon as they’re created at the source. Data processing includes: * Shaping, enriching, and filtering data * Creating log analytics * Distilling metrics libraries into the most useful data * Detecting anomalies and triggering alerts We combine our distributed approach with a column-oriented backend to help users store and analyze massive data volumes without impacting performance or cost. By using Edge Delta, customers can reduce observability costs without sacrificing visibility. Additionally, they can surface insights and trigger alerts before data leaves their environment.
  • 37
    Validato Reviews

    Validato

    Validato

    $10,000/year
    Validato is a continuous security verification platform that uses safe in production Breach and Attack Simulations. This simulates offensive cyber attacks to validate security control configurations.
  • 38
    Contrast Security Reviews
    Modern software development must be as fast as the business. The modern AppSec toolbox lacks integration, which creates complexity that slows down software development life cycles. Contrast reduces the complexity that hinders today's development teams. Legacy AppSec uses a single-size-fits all approach to vulnerability detection and remediation that is inefficient, costly, and expensive. Contrast automatically applies the most efficient analysis and remediation technique, greatly improving efficiency and effectiveness. Separate AppSec tools can create silos that hinder the collection of actionable intelligence across an application attack surface. Contrast provides centralized observability, which is crucial for managing risks and capitalizing upon operational efficiencies. This is both for security and development teams. Contrast Scan is a pipeline native product that delivers the speed, accuracy and integration required for modern software development.
  • 39
    Panoptica Reviews
    Panoptica makes it easy for you to secure containers, APIs and serverless functions and manage your software bills of material. It analyzes both internal and external APIs, assigns risk scores, and then reports back to you. Your policies determine which API calls the gateway allows or disables. Cloud-native architectures enable teams to develop and deploy software faster, keeping up with today's market. However, this speed comes at a cost: security. Panoptica fills these gaps by integrating automated policy-based security and visibility at every stage of the software-development process. The number of attack points has increased significantly with the decentralized cloud-native architectures. Changes in the computing landscape have also increased the risk of security breaches. Here are some reasons why comprehensive security is so important. A platform that protects all aspects of an application's lifecycle, from development to runtime, is essential.
  • 40
    DNSSense Reviews
    DNSEye detects malicious network traffic and reports if this traffic can be blocked using your other security devices. DNS is used in all protocols, including HTTP, HTTPS and IoT. DNS traffic provides information on your entire network, irrespective of the network protocol. DLP products cannot detect data exfiltration attacks using DNS tunnelling. DNS log analysis is required for an effective solution. 80% of malware domains do not currently have an IP address. Only the DNS log can detect malware requests without an IP address. DNSservers generate a large number of difficult-to-understand logs. DNSEye allows for the collection, enrichment and AI-based classifying of DNS logs. Its advanced SIEM integration saves time and EPS because it transfers only the data needed by SOC teams to SIEM. DNSEye collects logs from a variety of DNS servers, including many different brands and models. This can be done without requiring any changes to your network structure.
  • 41
    HaloCRM Reviews

    HaloCRM

    HaloCRM

    £59 per user per month
    HaloCRM, an omnichannel customer service solution, is designed for teams that want to improve their efficiency when dealing with customer inquiries. HaloCRM provides a platform that allows teams who interact with customers to manage conversations in any channel. The platform will ingest conversations from Twitter and Facebook, Facebook Messenger and other channels such as SMS, email, chat, phone, and more. This eliminates the possibility of missing inquiries and improves customer satisfaction by opening up more channels of communication. HaloCRM allows you to provide support anywhere. You can keep customers happy by using email, text, voice, chat and more. Big customer service team? Many complex processes? HaloCRM is able to handle all of your complex processes with its powerful workflows that are ready-to-use and drag-and drop configuration. HaloCRM makes it easier to prioritize customers and respond with one unified help desk, complete with built-in customer context to facilitate better conversation tracking.
  • 42
    ManageEngine AlarmsOne Reviews

    ManageEngine AlarmsOne

    ManageEngine

    $15.00/month/user
    AlarmsOne from ManageEngine allows users to manage all alerts from their IT management tools. AlarmsOne integrates easily with many on-premise or SaaS-based IT infrastructure monitor systems. AlarmsOne allows users to centralize their IT alarms. Users can create an account and install Alarm Poller on the server. AlarmsOne offers real-time alerts, multi-channel notifications, and quick responses.
  • 43
    Workato Reviews

    Workato

    Workato

    $10,000 per feature per year
    Workato is the operating platform for today's fast-moving businesses. It is the only AI-based middleware platform that allows both IT and business to integrate their apps and automate complex business workflows. Our mission is to help companies automate and integrate their apps and business processes at least 10x faster than traditional tools, and at a tenth the cost of traditional tools. Integration is a mission critical, neutral technology that can be used in heterogeneous IT environments. We are the only technology vendor that is supported by all three of the leading SaaS vendors: Salesforce. Workday. And ServiceNow. We are trusted by the world's most recognizable brands and the fastest-growing innovators. Customers consider us to be one of the best companies to do business.
  • 44
    Datameer Reviews
    Datameer is your go-to data tool for exploring, preparing, visualizing, and cataloging Snowflake insights. From exploring raw datasets to driving business decisions – an all-in-one tool.
  • 45
    Axonius Reviews
    Axonius gives IT and security teams the confidence to control complexity by providing a system of record for all digital infrastructure. With a comprehensive understanding of all assets including devices, identities, software, SaaS applications, vulnerabilities, security controls, and the context between them, customers are able to mitigate threats, navigate risk, decrease incident response time, automate action, and inform business-level strategy — all while eliminating manual, repetitive tasks.
  • 46
    IBM StreamSets Reviews

    IBM StreamSets

    IBM

    $1000 per month
    IBM® StreamSets allows users to create and maintain smart streaming data pipelines using an intuitive graphical user interface. This facilitates seamless data integration in hybrid and multicloud environments. IBM StreamSets is used by leading global companies to support millions data pipelines, for modern analytics and intelligent applications. Reduce data staleness, and enable real-time information at scale. Handle millions of records across thousands of pipelines in seconds. Drag-and-drop processors that automatically detect and adapt to data drift will protect your data pipelines against unexpected changes and shifts. Create streaming pipelines for ingesting structured, semistructured, or unstructured data to deliver it to multiple destinations.
  • 47
    CyCognito Reviews

    CyCognito

    CyCognito

    $11/asset/month
    Using nation-state-grade technology, uncover all security holes in your organization. CyCognito's Global Bot Network uses an attacker-like reconnaissance technique to scan, discover, and fingerprint billions digital assets around the globe. No configuration or input required. Discover the unknown. The Discovery Engine uses graph data modelling to map your entire attack surface. The Discovery Engine gives you a clear view on every asset an attacker could reach, their relationship to your business, and what they are. The CyCognito risk-detection algorithms allow the attack simulator to identify risks per asset and find potential attack vectors. It does not affect business operations and doesn't require configuration or whitelisting. CyCognito scores each threat based on its attractiveness to attackers, and the impact on the business. This dramatically reduces the number of attack vectors organizations may be exposed to to just a few.
  • 48
    SOC Prime Platform Reviews
    SOC Prime equips security teams with the largest and most robust platform for collective cyber defense that cultivates collaboration from a global cybersecurity community and curates the most up-to-date Sigma rules compatible with over 28 SIEM, EDR, and XDR platforms. Backed by a zero-trust approach and cutting-edge technology powered by Sigma and MITRE ATT&CK®️, SOC Prime enables smart data orchestration, cost-efficient threat hunting, and dynamic attack surface visibility to maximize the ROI of SIEM, EDR, XDR & Data Lake solutions while boosting detection engineering efficiency. SOC Prime’s innovation is recognized by independent research companies, credited by the leading SIEM, XDR & MDR vendors, and trusted by 8,000+ organizations from 155 countries, including 42% of Fortune 100, 21% of Forbes Global 2000, 90+ public sector institutions, and 300+ MSSP and MDR providers. SOC Prime is backed by DNX Ventures, Streamlined Ventures, and Rembrandt Venture Partners, having received $11.5M in funding in October 2021. Driven by its advanced cybersecurity solutions, Threat Detection Marketplace, Uncoder AI, and Attack Detective, SOC Prime enables organizations to risk-optimize their cybersecurity posture.
  • 49
    ShadowKat Reviews
    ShadowKat is an attack external surface management software designed to help cybersecurity managers maintain a stronger compliance lifecycle, continually monitor security risks, and identify various organizations assets such as webpages, networks, ASN’s, IP Addresses, open ports and more. ShadowKat helps security managers reduce the time vulnerabilities exist and reduce the size of their organization’s internet facing attack surface. Key features of ShadowKat include change monitoring, risk-based alerts, reduce vulnerabilities, and manage compliance requirements.
  • 50
    VaultCore Reviews

    VaultCore

    Fornetix

    $1,118 per year
    VaultCore™ is a next-generation, highly scalable enterprise key management solution from Fornetix®. It integrates seamlessly with existing platforms, automates policy, and empowers administrators with a centralized, organized control that can be easily applied across all environments. Request a demo to experience VaultCore's products: - Quick, seamless integration with existing technology - Separation Of Duties (a best practice). - Powerful automation allows for centralized control of policy - Increased security of data in motion, at rest, and in use - Significant reduction in the costs associated with data breaches -- lost businesses, recovery time, reputational damage - Simplified compliance, regulatory enforcement - Scalable to more than 100 million keys (more that enough to meet any industry or government's requirements) - Reporting capabilities to meet compliance requirements - Ease in Use
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next