What Integrates with Splunk Enterprise?
Find out what Splunk Enterprise integrations exist in 2024. Learn what software and services currently integrate with Splunk Enterprise, and sort them by reviews, cost, features, and more. Below is a list of products that Splunk Enterprise currently integrates with:
-
1
Google Cloud Platform
Google
Free ($300 in free credits) 55,132 RatingsGoogle Cloud is an online service that lets you create everything from simple websites to complex apps for businesses of any size. Customers who are new to the system will receive $300 in credits for testing, deploying, and running workloads. Customers can use up to 25+ products free of charge. Use Google's core data analytics and machine learning. All enterprises can use it. It is secure and fully featured. Use big data to build better products and find answers faster. You can grow from prototypes to production and even to planet-scale without worrying about reliability, capacity or performance. Virtual machines with proven performance/price advantages, to a fully-managed app development platform. High performance, scalable, resilient object storage and databases. Google's private fibre network offers the latest software-defined networking solutions. Fully managed data warehousing and data exploration, Hadoop/Spark and messaging. -
2
Device42 is a robust and comprehensive data center and network management software designed by IT engineers to help them discover, document and manage Data Centers and overall IT. Device42 provides actionable insight into enterprise infrastructures. It clearly identifies hardware, software, services, and network interdependencies. It also features powerful visualizations and an easy-to-use user interface, webhooks and APIs. Device42 can help you plan for network changes and reduce MTTR in case of an unexpected outage. It provides everything you need for maintenance, audits and warranty, license certificate, warranty and lifecycle management, passwords/secrets and inventory, asset tracking and budgeting, building rooms and rack layouts... Device42 can integrate with your favorite IT management tools. This includes integration with SIEM, CM and ITSM; data mapping; and many more! As part of the Freshworks family, we are committed to, and you should expect us to provide even better solutions and continued support for our global customers and partners, just as we always have.
-
3
Kroll Cyber Risk
Kroll
64 RatingsWe are the #1 incident response provider in the world. We protect, detect, and respond to cyberattacks by combining complete response capabilities and frontline threat information from over 3000 incidents per year with end-to-end expertise. Contact us immediately via our 24-hour cyber incident hotlines. Kroll's Cyber Risk specialists can help you tackle the threats of today and tomorrow. Kroll's protection solutions, detection and response are enriched with frontline threat intelligence from 3000+ incident cases each year. It is important to take proactive measures to protect your organization, as the attack surface is constantly increasing in scope and complexity. Enter Kroll's Threat Lifecycle Management. Our end-to-end solutions for cyber risk help uncover vulnerabilities, validate the effectiveness your defenses, update controls, fine-tune detectors and confidently respond any threat. -
4
Techniche
$5000 for 200 devices 33 RatingsStatseeker is a powerful network performance monitor solution. It's fast, scalable, and cost-effective. Statseeker requires only one server or virtual machine to be up and running in minutes. It can also discover your entire network in under an hour without any significant impact on your bandwidth availability. It can monitor networks of all sizes, polling upto one million interfaces every sixty second, and collecting network data like SNMP, ping, NetFlow (sFlow, and J-Flow), sylog and trap messages, SDN configuration, and health metrics. Statseeker performance data are never averaged or rolled up. This eliminates the guesswork when it comes to identifying over- and underestimated infrastructure, root cause analysis, capacity planning, and other tasks. Statseeker's complete data retention means the in-built analytic engine can accurately detect anomalies in performance and forecast network behaviour months in advance. This allows network admins to plan and perform cost-effective, preventative maintenance, instead of fire-fighting problems as they occur. Statseeker's dashboards and out-of-the box reports allow you to troubleshoot and fix problems in your network before users are aware. -
5
Vivantio has been recognized as one of the best customer service management software platforms on the market. We provide a SaaS service management product that serves multiple customer service areas including customer support ticketing, help desk, service desk, IT service management, asset management, and enterprise service management, all backed by proven industry frameworks, such as ITIL. Vivantio provides flexible licensing options to meet the business requirements of the world's fastest growing organizations.
-
6
Hyperproof
Hyperproof
211 RatingsHyperproof automates repetitive compliance operations so your team can concentrate on the bigger issues. Hyperproof also has powerful collaboration features that make it simple for your team to coordinate their efforts, gather evidence, and work directly alongside auditors from one interface. There is no more uncertainty in audit preparation or compliance management. Hyperproof gives you a complete view of your compliance programs, including progress tracking, program monitoring, and risk management. -
7
Access and access management today have become more complex and frustrating. strongDM redesigns access around the people who need it, making it incredibly simple and usable while ensuring total security and compliance. We call it People-First Access. End users enjoy fast, intuitive, and auditable access to the resources they need. Administrators gain precise controls, eliminating unauthorized and excessive access permissions. IT, Security, DevOps, and Compliance teams can easily answer who did what, where, and when with comprehensive audit logs. It seamlessly and securely integrates with every environment and protocol your team needs, with responsive 24/7 support.
-
8
SaaS for server monitoring and uptime monitoring Stop using multiple monitoring apps for server monitoring and uptime monitoring. Get Xitoring and monitor many servers in a matter of minutes with one command on the CLI. Everything will be automatically configured! Xitoring, a new monitoring platform (SaaS), for servers, is an innovative platform. Our agent (Xitogent), brings data from your server to ensure that your server is running smoothly. This will prevent downtime and performance issues and increase customer satisfaction. Our global probing nodes monitor your servers constantly and notify you if there is a problem. We are constantly improving our software and adding amazing features to it in the future. Inaugurated in 2021 to revolutionize the Server Monitoring industry.
- 9
-
10
Securden Password Vault
Securden
2 RatingsSecurden Password Vault is an enterprise-grade password management solution that allows you to securely store, organize, share, manage, and keep track of all human and machine identities. With a sleek access management system, Securden lets your IT teams share administrator credentials and effectively automate the management of privileged accounts in your organization. Securden seamlessly integrates with industry solutions like SIEM, SAML-based SSO, AD, and Azure AD among others to provide a smooth deployment in any organization. With Securden, organizations can rest easy as all their sensitive data is protected with strong encryption methods and supported by a robust high availability setup. Securden offers drilled-down granular access controls that allow users to grant access to accounts without revealing the underlying credentials in a just-in-time fashion. Securden Password Vault can be deployed both on-premise for self-hosting and on the cloud (SaaS). -
11
IPQualityScore
IPQualityScore
$49.99 per month 2 RatingsIPQualityScore's suite fraud prevention tools automate quality controls to prevent bots and fake accounts, fraudsters chargebacks & malicious users, without interfering with the user experience. With industry-leading IP reputation data and user validation, you can detect bad actors and block cyber threats. For smoother operations and less headaches, proactive Prevent Fraud™. -
12
Welcome to data security for remote and collaborative enterprises. Validate the proper use of sanctioned collaboration software, such as OneDrive and Slack. Shadow IT applications can be used to identify gaps in corporate training or tools. Get visibility into file activity outside of your network, such as cloud sync and web uploads. Remote employees can be quickly detected, investigated and responded to data exfiltration. You can receive activity alerts based upon file type, size, or count. To speed up investigation and response, access detailed user activity profiles.
-
13
DomainTools
DomainTools
2 RatingsConnect indicators from your network to nearly every active domain or IP address on the Internet. This data can be used to inform risk assessments, profile attackers, guide online fraudulent investigations, and map cyber activity to the attacker infrastructure. Get the information you need to make an informed decision about the threat level to your organization. DomainTools Iris, a proprietary threat intelligence platform and investigation platform, combines enterprise-grade domain-based and DNS-based intelligence with a simple web interface. -
14
ControlMap
ControlMap
$0 1 RatingTake control of SOC2, ISO-27001, NIST, CSA STAR, or other Infosec certifications with a simple, easy-to-use, fully automated platform. ControlMap's smart mapping saves you hundreds of hours responding and assessing data requests. It automatically and continuously associates RISKS CONTROLS, POLICIES, AND PROCEDURES so that you don't have the task of responding to each request. ControlMap's integration with other ticketing systems like Jira makes it easier to use. Our Jira Marketplace App, Jira integration collects evidence, raises alerts, or simply creates tasks in other systems. You can eliminate any last-minute surprises. We have created a product that modern teams can use. Start with a free trial, or contact us to learn more. -
15
CPTRAX for Windows
Visual Click Software
1 RatingServer File Activity Tracking – Audit who is creating, accessing and moving your files and folders. Track file permission changes. Alerts in real-time about critical file activity Malicious activity containment (Ransomware and mass file deletions, etc. Automatically stop threats to your Windows servers by calling PowerShell scripts so you can determine exactly what you want to have happen for each type of alert/threat. Examples of containment: Disable the user causing the threat Block the remote IP causing the threat Workstation File Activity Tracking: Audit who copies files to USB or other removable media. Track who uploads files via FTP or a browser. Block files being created on USB/removable devices. Notifications by email when a removable device connects. Active Directory Auditing – Keep audit logs and receive real-time alerts about important Active Directory changes, without having to deal with SACLs or Windows Event Logs. Server Authentication Auditing: Track authentications into Citrix sessions and Windows Servers. All failed logon attempts are reviewed. Workstation Logon/Logoff Tracking: Get visibility on logons/logoffs at workstations, including locks, unlocks and password changes. - 16
-
17
IP2Location is a leading IP geolocation service provider since 2002. It translates IP address to identify country, region, city, latitude & longitude, ZIP code, time zone, connection speed, ISP, domain name, IDD country code, area code, weather station data, mobile network codes (MNC), mobile country codes (MCC), mobile carrier, elevation, usage type, address type, advertising category, VPN and residential proxies. IP2Location has been used by thousands of developers to enrich their applications and web sites. It is available as database, API and bulk services. Please visit our web site for more information.
-
18
Silent Push reveals adversary infrastructure, campaigns, and security problems by searching across the most timely, accurate and complete Threat Intelligence dataset available. Defenders can focus on stopping threats before they cause a problem and significantly improve their security operations across the entire attack chain whilst simultaneously reducing operational complexity. The Silent Push platform exposes Indicators of Future Attack (IOFA) by applying unique behavioral fingerprints to attacker activity and searching our dataset. Security teams can identify new impending attacks, rather than relying upon out-of-date IOCs delivered by legacy threat intelligence. Organizations are better protected by understanding emerging developing threats before launch, proactively solving problems within infrastructure, and gaining timely and tailored threat intelligence with IoFA, that allows organizations to stay one step ahead of advanced attackers.
-
19
OneLogin, a trusted identity management (IAM), solution for modern enterprises, helps you secure company information and empower your employees. OneLogin is a great solution for companies that want to simplify business logins and strengthen enterprise security. OneLogin features include single sign-on (SS), user provisioning, unified directory, user provisioning and adaptive authentication. Compliance reporting is also available.
-
20
Netreo is the best full-stack IT infrastructure management and observation platform. Netreo is a single source for truth for proactive performance monitoring and availability monitoring of large enterprise networks, infrastructure, and applications. Our solution is used by: IT executives should have full visibility of the business service, right down to the infrastructure and network that supports them. IT Engineering departments are used as a decision support system to plan and architect modern solutions. IT Operations teams can have real-time visibility into what is going wrong in their environment, which bottlenecks exist, and who it is affecting. All of these insights are available for systems and vendor mix in large heterogeneous environments that are constantly changing. We have a growing list of vendors that we support (over 350 integrations), including network vendors, storage, virtualization, and servers.
-
21
Perimeter 81
Perimeter 81
$8 per user per month 1 RatingPerimeter 81, a SaaS-based solution that provides customized networking and the highest level of cloud security, is revolutionizing how organizations use network security. Perimeter 81 simplifies secure network, cloud, and application access for modern and distributed workforce with an integrated solution that gives companies of all sizes the ability to be securely mobile and cloud-confident. Perimeter 81's cloud-based, user-centric Secure Network as a service is not like hardware-based firewalls and VPN technology. It uses the Zero Trust and Software Defined Perimeter security models. It offers greater network visibility, seamless integration with all major cloud providers, and seamless onboarding. -
22
Cequence Security
Cequence Security
1 RatingProtect your APIs by analyzing and protecting them with passive, inline, or API-based integration with any network component, such as an API gateway, proxy or CDN. Predefined policies that are fine-tuned based on threat patterns, which have been used to protect billions of API transactions every day, provide unmatched protection. An API-based architecture and rich user interface allow integration with threat intelligence feeds and other security components. Patented ML based analysis eliminates JavaScript integration pen-alties like slow page loads, extended development cycles, and forced mobile-app upgrade. ML-based analysis generates a unique Behavioral Footprint to identify malicious intent and continuously tracks attackers as they retool. -
23
A single, all-inclusive cloud platform that is ITIL-aligned will empower your IT team. Transform old ways of working into modern, intuitive workflows that empower employees and customers to provide excellent service. Standardize your processes and get valuable analytics to align IT with business needs. You can centralize your workflows and create one space for your ITSM software. HaloITSM combines ITIL best-practices and a flexible approach to ensure that you can improve service management while maintaining a great user experience. HaloITSM is trusted by customers in many sectors worldwide. Check out our case studies to see how they transformed their daily processes.
-
24
Portnox Security
Portnox Security
1 RatingPortnox is a Network Access Control (NAC) software vendor. NAC sits within the larger field of cybersecurity, and more specifically network security. It is a technology that enables organizations to enact its own unique policy for how and when endpoints (desktops, laptops, smartphones, etc.) can connect to their corporate networks. NAC is designed to allow IT security teams to gain visibility of each device trying to access its network, and specifically the type of device and access layer being used (i.e. wifi, wired ports, or VPN). -
25
threatYeti by alphaMountain
alphaMountain AI
$0 1 RatingWith threatYeti, alphaMountain turns security professionals, as well as hobbyists, into senior IP threat analysts. The platform is browser-based and renders real-time threats verdicts for any URL, domain, or IP address on the internet. With threatYeti the risk posed to a domain can be rated instantly, with a color-coded scale from 1.00 (low) to 10.00. ThreatYeti protects cyber threat analysts, as well as their networks, from risky websites. The no-click categorization of threatYeti places sites into one or more of 83 categories, so analysts don't need to visit the site and risk downloading malware or encountering objectionable content. ThreatYeti displays related hosts, threat-factors, passive DNS certificates, redirect chains, and more to give analysts a complete picture of any host. The result is a faster, safer investigation that allows organizations to take definitive action on domain and IP threat. -
26
CYREBRO is a true 24/7/365 Managed Detection and Response (MDR) solution, delivered through its cloud-based SOC Platform. CYREBRO rapidly detects, analyzes, investigates and responds to cyber threats. CYREBRO is a turnkey solution that uses a proprietary detection engine for threat detection and orchestration, SOAR for automations, correlations and investigations, SOC Platform for real-time investigation data and visibility, and top tier analyst and incident response teams. CYREBRO easily connects to hundreds of different tools and systems, delivering time to value within mere hours. With 1,500+ proprietary detection algorithms constantly optimized, CYREBRO constantly monitors companies of all sizes facing different types of risks and attacks, shortening mean time to respond (MTTR).
-
27
Cloud Foundry
Cloud Foundry
1 RatingCloud Foundry makes it easier to build, test and deploy applications faster. It offers a variety of cloud, developer frameworks and application services. It is open-source and available through a variety private cloud distributions as well as public cloud instances. Cloud Foundry uses a container-based architecture to run apps in any programming language. You can deploy apps to CF with your existing tools and without any modifications to the code. With CF BOSH, you can instantly deploy, manage, and manage Kubernetes clusters that are high-availability. You can decouple applications from infrastructure to make individual decisions about where to host workloads. This allows you to move workloads as needed in minutes with no changes to your app. -
28
The most powerful way to monitor and protect sensitive data at large scale. The all-in-one data security solution that doesn't slow down will help you reduce risk and detect abnormal behavior. You get a platform, a team, an approach, and a plan that gives you every advantage. Classification, access governance, and behavioral analytics all work together to secure data, prevent threats, and ease the burden of compliance. Our proven method to monitor, protect and manage your data is backed by thousands of successful rollouts. Hundreds of security professionals are able to create advanced threat models, update policies, and assist in incidents, allowing you to concentrate on other priorities.
-
29
GitGuardian
GitGuardian
$0 32 RatingsGitGuardian is a global cybersecurity startup focusing on code security solutions for the DevOps generation. A leader in the market of secrets detection and remediation, its solutions are already used by hundred thousands developers in all industries. GitGuardian helps developers, cloud operation, security and compliance professionals secure software development, define and enforce policies consistently and globally across all their systems. GitGuardian solutions monitor public and private repositories in real-time, detect secrets and alert to allow investigation and quick remediation. -
30
ThreatLocker
ThreatLocker
12 RatingsFor IT professionals to stop ransomware, you need to do more than look for threats. ThreatLocker helps you reduce your surface areas of attack with policy-driven endpoint security and change the paradigm from only blocking known threats, to blocking everything that is not explicitly allowed. Combined with Ringfencing and additional controls, you enhance your Zero Trust protection and block attacks that live off the land. Discover today the ThreatLocker suite of Zero Trust endpoint security solutions: Allowlisting, Ringfencing, Elevation Control, Storage Control, Network Access Control, Unified Audit, ThreatLocker Ops, Community, Configuration Manager and Health Center. -
31
Microsoft Excel
Microsoft
$8.25 per user per month 11 RatingsExcel recognizes your patterns and organizes your data to save time. Excel allows you to create spreadsheets quickly using templates or your own. You can also use modern formulas for calculations. You can present your data in new charts and graphs with sparklines, formatting, tables and tables. With just one click, you can easily create forecasts that predict trends. You can share your workbook with others, and you always have the most current version. This will help you get more work done. Office 365 allows you to work in Excel files from your mobile device, desktop, or web browser. Excel now allows you to add data directly from a photograph. The Excel app allows you to take a photo of a printed table on your Android/iPhone device and convert it into an editable Excel table. This new image recognition function eliminates the need for you to manually enter hardcopy data. -
32
Amazon Elastic Container Service (Amazon ECS), is a fully managed container orchestration and management service. ECS is used by customers such as Duolingo and Samsung, GE and Cook Pad to run their most sensitive and critical mission-critical applications. It offers security, reliability and scalability. ECS is a great way to run containers for a variety of reasons. AWS Fargate is serverless compute for containers. You can also run ECS clusters with Fargate. Fargate eliminates the need for provisioning and managing servers. It allows you to specify and pay per application for resources and improves security by application isolation by design. ECS is also used extensively in Amazon to power services like Amazon SageMaker and AWS Batch. It is also used by Amazon.com's recommendation engines. ECS is extensively tested for reliability, security, and availability.
-
33
One platform, infinite ways for you to connect with your customers and employees. Any app can be made authable. Okta can help you create secure and delightful experiences quickly. Okta's Customer ID products can be combined to create the stack you need. This will provide security, scalability and reliability. Protect and empower your employees, contractors, partners. Okta's workforce identification solutions will protect your employees no matter where they are. You will have the tools you need to automate cloud journeys and support hybrid environments. Okta is trusted by companies around the globe to protect their workforce identities.
-
34
Zoom Team Chat
Zoom Communications
8 RatingsYou can connect your teams and improve communication. Zoom Team Chat is included with your Zoom license. Zoom Team Chat helps your teams stay connected. Chat and video meetings can streamline your teams. Enterprise chat and instant video meetings make collaboration between teams and other participants easier. Modern and efficient team communication is possible. You can create a virtual workspace that allows all the people involved in every project to collaborate. You can organize your communications chaos. You can save time by quickly finding messages and content related to your conversations or projects. You can start a meeting with any channel, either group or 1:1. Zoom meetings can scale up to 1,000 participants with clear video, audio, and screen sharing. Communicate in private or public channels that are organized by topics, teams, or projects. You can share files, emojis and screenshots. You can quickly find contacts, messages, files, and other information. Calendar integrations sync presence and status. -
35
BlueJeans
Verizon
37 RatingsSecure Video Conferencing can empower remote workers. Secure video conferencing platform that will make you more productive. BlueJeans Meetings transforms video conferencing by combining the best audio and video performance in the industry with amazing productivity features and a comprehensive security toolkit. This will give you a distinct competitive advantage whenever you join a meeting. You can make any conference room or huddle area a one-touch meeting space that is easy to set up, use, and centrally manage. BlueJeans has a mission to make traditional meeting rooms modern workplaces. We offer a variety of room solutions that will meet your needs, both today and in the future. Live interactive events, town halls, and webcasts can be hosted and managed by BlueJeans Events. BlueJeans Events adds a new level of interactivity and fun to all-hands meetings. You can engage up to 50,000 people. -
36
The cloud is your opportunity to harness the power of the internet. Unified data protection and management empower your business. SaaS data protection service to protect and manage enterprise backups across all data centers, cloud, and endpoint workloads. Druva Cloud Platform, which is delivered as-a-service on AWS, is infinitely scalable and can be customized to meet your business's needs. Druva's SaaS-based data protection platform can help you eliminate the complexity and cost of solutions that aren’t designed for the cloud. You can save time and money while still getting a data protection solution that is secure, scalable, and always available. As-a-service means that you can forget about on-premises infrastructure, hardware refresh cycles, and time-consuming software maintenance. Cloud-based subscriptions can be upgraded instantly without affecting your backup settings. There is no need to purchase or install new software or appliances.
-
37
Tableau, a comprehensive business intelligence (BI/analytics) solution, allows you to generate, analyze, and interpret business data. Tableau allows users to gather data from many sources, including spreadsheets, SQL databases and Salesforce. Tableau offers real-time visual analytics as well as an interactive dashboard that allows users to slice and dice data to make relevant insights and find new opportunities. Tableau allows users to customize the platform for different industry verticals such as communication, banking, and more.
-
38
Bugsnag monitors your application stability, allowing you to make data-driven decisions about whether you should be building new features or fixing bugs. We provide a full-stack stability monitoring solution that offers best-in-class functionality to mobile applications. Rich diagnostics that help you reproduce any error. All your apps can be accessed from one dashboard. It's a simple, thoughtful user experience. The most important metric for app health -- the common language between product and engineering teams. Not all bugs are worth fixing. You should only fix the ones that are important to your business. You have many customization options and extensive libraries with opinionated defaults. Experts who care deeply about the health and error reduction of your apps.
-
39
Artica Proxy
Artica Tech
€100Artica Tech is a powerful, yet simple-to-use solution that is often reserved for large multinational companies. Artica Proxy is available at a low starting price of 99 EUR and has more than 62 000 servers. Artica Proxy is an entire system that provides a complete appliance. We recommend not using an existing production server with Artica. Artica Proxy CDROM ISO is one of the options to obtain Artica. Community or Enterprise Artica is "Open Source software", which means that you can display source code under the GPL3 license. Artica Proxy, documentation, and screenshots Copyright (C), 2014 Artica Tech SARL. -
40
Teramind
Teramind
$12/month/ user Teramind provides a user-centric security approach to monitoring your employees’ digital behavior. Our software streamlines employee data collection in order to identify suspicious activity, improve employee productivity, detect possible threats, monitor employee efficiency, and ensure industry compliance. We help reduce security incidents using highly customizable Smart Rules that can alert, block or lockout users when rule violations are detected, to keep your business running securely and efficiently. Our live and recorded screen monitoring lets you see user actions as they’re happening or after they’ve occurred with video-quality session recordings that can be used to review a security or compliance event, or to analyze productivity behaviors. Teramind can be installed in minutes and can be deployed either without employees knowing or with full transparency and employee control to maintain trust. -
41
Dotcom-Monitor
Dotcom-Monitor
$19.99/month Website monitoring and performance testing solutions. You can quickly identify performance issues by using powerful monitoring features like real-time dashboards, performance reporting options, or nearly 30 global monitoring networks. The EveryStep Web Recorder allows you to quickly and easily record scripts that can be used to monitor interactive websites, web application elements, and user scenarios. Dotcom-Monitor makes sure that even the most complex websites, web apps, and web services are up to date and perform as intended. -
42
EmailSuccess
DIENNEA SRL
$0 - $4000EmailSuccess provides high volume email sending with enterprise-level SMTP Servers. EmailSuccess can be used as a Mail Transfer Agent (MTA) for all sizes of senders: ESPs and Marketing Automation Companies. High Performance EmailSuccess, an MTA, is designed to deliver large volumes of email. It gives the business full control over the Speed, Latency and Deliverability parameters. Deliverability Clients must be able to deliver their messages quickly. You must ensure that your email is not blocked by spam filters and lands in your inbox. Advanced Sending Intelligence Optimized delivery through automatic and real-time tuning of email delivery parameters; platform tuning is made easy. -
43
Detectify
Detectify
$89 per monthDetectify sets the standard for External Attack Surface Management (EASM), providing 99.7% accurate vulnerability assessments. ProdSec and AppSec teams trust Detectify to expose exactly how attackers will exploit their Internet-facing applications. Our scanners are built with security findings from 400+ ethical hackers. Their submissions go far beyond the CVE libraries, which are not sufficient to test modern application security. -
44
IRI FieldShield
IRI, The CoSort Company
Varies by component/scope IRI FieldShield® is a powerful and affordable data discovery and de-identification package for masking PII, PHI, PAN and other sensitive data in structured and semi-structured sources. Front-ended in a free Eclipse-based design environment, FieldShield jobs classify, profile, scan, and de-identify data at rest (static masking). Use the FieldShield SDK or proxy-based application to secure data in motion (dynamic data masking). The usual method for masking RDB and other flat files (CSV, Excel, LDIF, COBOL, etc.) is to classify it centrally, search for it globally, and automatically mask it in a consistent way using encryption, pseudonymization, redaction or other functions to preserve realism and referential integrity in production or test environments. Use FieldShield to make test data, nullify breaches, or comply with GDPR. HIPAA. PCI, PDPA, PCI-DSS and other laws. Audit through machine- and human-readable search reports, job logs and re-ID risks scores. Optionally mask data when you map it; FieldShield functions can also run in IRI Voracity ETL and federation, migration, replication, subsetting, and analytic jobs. To mask DB clones run FieldShield in Windocks, Actifio or Commvault. Call it from CI/CD pipelines and apps. -
45
IRI DarkShield
IRI, The CoSort Company
5000IRI DarkShield uses several search techniques to find, and multiple data masking functions to de-identify, sensitive data in semi- and unstructured data sources enterprise-wide. You can use the search results to provide, remove, or fix PII simultaneously or separately to comply with GDPR data portability and erasure provisions. DarkShield jobs are configured, logged, and run from IRI Workbench or a restful RPC (web services) API to encrypt, redact, blur, etc., the PII it discovers in: * NoSQL & RDBs * PDFs * Parquet * JSON, XML & CSV * Excel & Word * BMP, DICOM, GIF, JPG & TIFF using pattern or dictionary matches, fuzzy search, named entity recognition, path filters, or image area bounding boxes. DarkShield search data can display in its own interactive dashboard, or in SIEM software analytic and visualization platforms like Datadog or Splunk ES. A Splunk Adaptive Response Framework or Phantom Playbook can also act on it. IRI DarkShield is a breakthrough in unstructured data hiding technology, speed, usability and affordability. DarkShield consolidates, multi-threads, the search, extraction and remediation of PII in multiple formats and folders on your network and in the cloud, on Windows, Linux, and macOS. -
46
IRI RowGen
IRI, The CoSort Company
8000 on first hostnameIRI RowGen generates rows ... billions of rows of safe, intelligent test data in database, flat-file, and formatted report targets ... using metadata, not data. RowGen synthesizes and populates accurate, relational test data with the same characteristics of production data. RowGen uses the metadata you already have (or create on the fly) to randomly generate structurally and referentially correct test data, and/or randomly select data from real sets. RowGen lets you customize data formats, volumes, ranges, distributions, and other properties on the fly or with re-usable rules that support major goals like application testing and subsetting. RowGen uses the IRI CoSort engine to deliver the fastest generation, transformation, and bulk-load movement of big test data on the market. RowGen was designed by data modeling, integration, and processing experts to save time and energy in the creation of perfect, compliant test sets in production and custom formats. With RowGen, you can produce and provision safe, smart, synthetic test data for: DevOps, DB, DV, and DW prototypes, demonstrations, application stress-testing, and benchmarking -- all without needing production data. -
47
Reflectiz
Reflectiz
$5000/year Reflectiz solution monitors and detects all 1st, 3rd, and 4th-party app vulnerabilities in your online ecosystem, enabling complete visibility over your threat surface. It then effectively prioritizes and remediates risks and compliance issues. The Reflectiz solution is executed remotely with no installation required -
48
Omega Core Audit
DATAPLUS
$1499 USDYour Oracle database is often the most valuable informational asset of your company. It contains data on customers, partners and financial transactions. Even small and medium-sized companies now have millions of these records. Database security is now a top concern for companies that must comply with stricter information security controls and practices. Omega Core Audit, a software-only security and compliance tool, is out-of-box and can be used to address compliance issues. It provides access control, continuous audit monitoring, real-time protection, and access control. This allows for duty separation, control over privileged accounts, and meets compliance requirements. Splunk SIEM and GrayLog SIEM support is included. -
49
AppsWatch by Automai
Automai Corporation
$2000.00/one-time AppsWatch monitors all of your business processes on any application. It does not require you to install any plug-ins or other components. Automai's robots can access the apps via the GUI and report any problems before the users are affected. To create the scripts the bots use, no programming is required. Just click through and take a recording of the process. AppsWatch provides organized views for SLA reports and troubleshooting. AppsWatch is part Automai's Robotic Automation Platform, which integrates monitoring, testing, and RPA for businesses. -
50
AppLoader by Automai
Automai Corporation
$2500.00/one-time AppLoader is a software quality assurance and load-testing solution that allows users to test all types of applications, including web applications, fat clients, thin clients, and web apps. AppLoader allows users to quickly create simple scenarios and start testing their applications. AppLoader utilizes Automai's robotic technology to simulate thousands of end users to perform performance testing. For troubleshooting and communication, error screenshots are available.