Compare the Top Anomaly Detection Software that integrates with GitHub as of October 2025

This a list of Anomaly Detection software that integrates with GitHub. Use the filters on the left to add additional filters for products that have integrations with GitHub. View the products that work with GitHub in the table below.

What is Anomaly Detection Software for GitHub?

Anomaly detection software identifies unusual patterns, behaviors, or outliers in datasets that deviate from expected norms. It uses statistical, machine learning, and AI techniques to automatically detect anomalies in real time or through batch analysis. This software is widely used in cybersecurity, fraud detection, predictive maintenance, and quality control. By flagging anomalies, it enables early intervention, reduces risks, and enhances operational efficiency. Advanced versions offer customizable thresholds, real-time alerts, and integration with analytics dashboards for deeper insights. Compare and read user reviews of the best Anomaly Detection software for GitHub currently available using the table below. This list is updated regularly.

  • 1
    Dataiku

    Dataiku

    Dataiku

    Dataiku is an advanced data science and machine learning platform designed to enable teams to build, deploy, and manage AI and analytics projects at scale. It empowers users, from data scientists to business analysts, to collaboratively create data pipelines, develop machine learning models, and prepare data using both visual and coding interfaces. Dataiku supports the entire AI lifecycle, offering tools for data preparation, model training, deployment, and monitoring. The platform also includes integrations for advanced capabilities like generative AI, helping organizations innovate and deploy AI solutions across industries.
  • 2
    Xygeni

    Xygeni

    Xygeni Security

    Secure your Software Development and Delivery! Xygeni specializes in Application Security Posture Management (ASPM), using deep contextual insights to effectively prioritize and manage security risks while minimizing noise and overwhelming alerts. Our innovative technologies automatically detect malicious code in real-time upon new and updated components publication, immediately notifying customers and quarantining affected components to prevent potential breaches. With extensive coverage spanning the entire Software Supply Chain—including Open Source components, CI/CD processes and infrastructure, Anomaly detection, Secret leakage, Infrastructure as Code (IaC), and Container security—Xygeni ensures robust protection for your software applications. Trust Xygeni Security to protect your operations and empower your team to build and deliver with integrity and security.
  • 3
    Elastic Observability
    Rely on the most widely deployed observability platform available, built on the proven Elastic Stack (also known as the ELK Stack) to converge silos, delivering unified visibility and actionable insights. To effectively monitor and gain insights across your distributed systems, you need to have all your observability data in one stack. Break down silos by bringing together the application, infrastructure, and user data into a unified solution for end-to-end observability and alerting. Combine limitless telemetry data collection and search-powered problem resolution in a unified solution for optimal operational and business results. Converge data silos by ingesting all your telemetry data (metrics, logs, and traces) from any source in an open, extensible, and scalable platform. Accelerate problem resolution with automatic anomaly detection powered by machine learning and rich data analytics.
    Starting Price: $16 per month
  • 4
    InsightFinder

    InsightFinder

    InsightFinder

    InsightFinder Unified Intelligence Engine (UIE) platform provides human-centered AI solutions for identifying incident root causes, and predicting and preventing production incidents. Powered by patented self-tuning unsupervised machine learning, InsightFinder continuously learns from metric time series, logs, traces, and triage threads from SREs and DevOps Engineers to bubble up root causes and predict incidents from the source. Companies of all sizes have embraced the platform and seen that business-impacting incidents can be predicted hours ahead with clearly pinpointed root causes. Survey a comprehensive overview of your IT Ops ecosystem, including patterns, trends, and team activities. Also view calculations that demonstrate overall downtime savings, cost of labor savings, and number of incidents resolved.
    Starting Price: $2.5 per core per month
  • 5
    DoiT

    DoiT

    DoiT

    DoiT is a global technology company that delivers a comprehensive cloud operations platform powered by proactive, industry-defining expertise so you can increase your operating margins and fuel innovation. DoiT Cloud Intelligence is the only context-aware multicloud intelligence platform that enables you to optimize, scale, and innovate. You turn insights into actions hand-in-hand with our cloud architects to make their cloud performant, reliable, and secure. An award-winning strategic partner of AWS, Google Cloud, and Microsoft Azure, we bring specializations in Kubernetes, GenAI, CloudOps, and more, to help more than 4,000 customers worldwide leverage the cloud to drive business growth and innovation.
    Starting Price: $0
  • 6
    Quindar

    Quindar

    Quindar

    Monitor, control, and automate spacecraft operations. Operate multiple missions, diverse satellites, 
and various payloads within a unified interface. Control multiple satellite types in a single interface allowing for legacy fleet migration and next-gen payload support. Track spacecraft, reserve contacts, automate tasking, and intelligently respond to ground and space incidents with Quindar Mission Management. Harness the power of advanced analytics and machine learning to turn data into actionable intelligence. Make decisions faster via predictive maintenance, trend analysis, and anomaly detection. Leveraging data-driven insights that propel your mission forward. Built to integrate seamlessly with your existing systems and third-party applications. As your needs evolve, your operations can too without the constraint of vendor lock-in. Analyze flight paths and commands across most C2 systems.
  • Previous
  • You're on page 1
  • Next