Splunk Cloud PlatformCisco
|
||||||
Related Products
|
||||||
About
IBM Cloud® Code Engine is a fully managed, serverless platform. Bring your container images, batch jobs, or source code and let IBM Cloud Code Engine manage and secure the underlying infrastructure for you. There is no need to size, deploy, or scale container clusters yourself. And no networking skills are required either. IBM Cloud Code Engine will deploy, manage and autoscale it for you. No cluster administration, sizing, or over-provisioning worries. You pay only for what you actually use. Build great apps in the language of your choice, then deploy them in seconds on a serverless platform. No infrastructure management is needed. Cluster sizing, scaling and networking covered. Your apps are automatically secured with TLS and isolated from other workloads. Deploy and more securely integrate web apps, containers, batch jobs, and functions.
|
About
Turn data into answers with Splunk deployed and managed securely, reliably and scalably as a service. With your IT backend managed by our Splunk experts, you can focus on acting on your data. Splunk-provisioned and managed infrastructure delivers a turnkey, cloud-based data analytics solution. Go live in as little as two days. Managed software upgrades ensure you always have the latest functionality. Tap into the value of your data in days with fewer requirements to turn data into action. Splunk Cloud meets the FedRAMP security standards, and helps U.S. federal agencies and their partners drive confident decisions and decisive actions at mission speeds. Drive productivity and contextual insights with Splunk’s mobile apps, augmented reality and natural language capabilities. Extend the utility of your Splunk solutions to any location with a simple phrase or the tap of a finger. From infrastructure management to data compliance, Splunk Cloud is built to scale.
|
|||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
|||||
Audience
Companies searching for a container management platform to run their container, application code or batch jobs
|
Audience
Companies of all sizes
|
|||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||||
API
Offers API
|
API
Offers API
|
|||||
Screenshots and Videos |
Screenshots and Videos |
|||||
Pricing
$.5 per 1 million HTTP request
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
|||||
Reviews/
|
Reviews/
|
|||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||||
Company InformationIBM
Founded: 1911
United States
www.ibm.com/cloud/code-engine
|
Company InformationCisco
Founded: 1984
United States
www.splunk.com/en_us/products/splunk-cloud-platform.html
|
|||||
Alternatives |
Alternatives |
|||||
|
|
||||||
|
|
|
|||||
|
|
||||||
|
|
||||||
Categories |
Categories |
|||||
Application Performance Monitoring (APM) Features
Baseline Manager
Diagnostic Tools
Full Transaction Diagnostics
Performance Control
Resource Management
Root-Cause Diagnosis
Server Performance
Trace Individual Transactions
Artificial Intelligence Features
Chatbot
For eCommerce
For Healthcare
For Sales
Image Recognition
Machine Learning
Multi-Language
Natural Language Processing
Predictive Analytics
Process/Workflow Automation
Rules-Based Automation
Virtual Personal Assistant (VPA)
Cloud Management Features
Access Control
Billing & Provisioning
Capacity Analytics
Cost Management
Demand Monitoring
Multi-Cloud Management
Performance Analytics
SLA Management
Supply Monitoring
Workflow Approval
Cloud Security Features
Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management
Cybersecurity Features
AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting
Data Visualization Features
Analytics
Content Management
Dashboard Creation
Filtered Views
OLAP
Relational Display
Simulation Models
Visual Discovery
IT Management Features
Capacity Monitoring
Compliance Management
Event Logs
Hardware Inventory
IT Budgeting
License Management
Patch Management
Remote Access
Scheduling
Software Inventory
User Activity Monitoring
IT Service Features
Contract Management
Incident Management
IT Asset Management
Knowledge Management
Release Management
Self Service Portal
Service Catalog
Service Reporting
Ticket Management
Incident Management Features
Audit Trail
Corrective Actions (CAPA)
Disaster Recovery
Incident Reporting
IT Incident Management
OSHA Compliance
Root-Cause Diagnosis
Safety Management
Task Management
Ticket Management
Log Management Features
Archiving
Audit Trails
Compliance Reporting
Consolidation
Data Visualization
Event Logs
Network Logs
Remediation
Syslogs
Thresholds
Web Logs
Machine Learning Features
Deep Learning
ML Algorithm Library
Model Training
Natural Language Processing (NLP)
Predictive Modeling
Statistical / Mathematical Tools
Templates
Visualization
Network Monitoring Features
Bandwidth Monitoring
Baseline Manager
Diagnostic Tools
Internet Usage Monitoring
IP Address Monitoring
Real Time Analytics
Resource Management
Server Monitoring
SLA Monitoring
Uptime Monitoring
Web Traffic Reporting
Network Security Features
Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning
Network Troubleshooting Features
Alerts / Escalation
Bandwidth Troubleshooting
Change Management
Configuration Management
Connectivity Management
Data Visualization
Historical Audit
Mobile Network Troubleshooting
Network Analysis
Network Monitoring
Predictive Analytics Features
AI / Machine Learning
Benchmarking
Data Blending
Data Mining
Demand Forecasting
For Education
For Healthcare
Modeling & Simulation
Sentiment Analysis
SIEM Features
Application Security
Behavioral Analytics
Compliance Reporting
Endpoint Management
File Integrity Monitoring
Forensic Analysis
Log Management
Network Monitoring
Real Time Monitoring
Threat Intelligence
User Activity Monitoring
Server Management Features
CPU Monitoring
Credential Management
Database Servers
Email Monitoring
Event Logs
History Tracking
Patch Management
Scheduling
User Activity Monitoring
Virtual Machine Monitoring
|
||||||
Integrations
Arista NDR
Assetnote
CognitiveScale Cortex AI
Criminal IP ASM
DBxtra
Hyperledger Iroha
LoginRadius
Netwrix Threat Prevention
Pavilion HyperOS
Polarity
|
Integrations
Arista NDR
Assetnote
CognitiveScale Cortex AI
Criminal IP ASM
DBxtra
Hyperledger Iroha
LoginRadius
Netwrix Threat Prevention
Pavilion HyperOS
Polarity
|
|||||
|
|
|