Business Software for Recorded Future

Top Software that integrates with Recorded Future as of May 2026

Compare business software, products, and services to find the best solution for your business or organization. Use the filters on the left to drill down by category, pricing, features, organization size, organization type, region, user reviews, integrations, and more. View and sort the products and solutions that match your needs in the results below.

  • 1
    Graylog

    Graylog

    Graylog

    Graylog is the AI-powered SIEM and log management platform built for security and IT operations. The platform centralizes and analyzes event data from across complex environments to help teams detect threats faster, investigate smarter, and control data costs—without compromise. Graylog combines scalable log management with explainable AI that summarizes dashboards, prioritizes real risks, and automates investigation workflows—while keeping analysts in control. With products including Graylog Security, Enterprise, API Security, and Open, Graylog serves more than 60,000 organizations across 180 countries. Headquartered in Houston with roots in open source, Graylog continues to redefine how modern teams achieve clarity, context, and control across their environments.
    Starting Price: $1250/month
    View Software
    Visit Website
  • 2
    Captain Compliance

    Captain Compliance

    Captain Compliance

    Captain Compliance is an all-in-one privacy management platform designed to simplify compliance with global data protection laws and new AI regulatory requirements. Our leading Consent Management Platform (CMP) allows businesses to effortlessly manage user consent and create customizable cookie banners. Our advanced Cookie Scanner automatically identifies and categorizes cookies on your website, ensuring ongoing compliance with a dynamic cookie policy. Our DSAR Portal streamlines data subject requests, while our AI Compliance tool monitors and adapts your practices based on evolving regulations and we even offer a virtual DPO and CPO if you need data privacy guidance. Additionally, our Hosted Privacy Policy generator automatically updates your privacy notices in real-time, keeping your policies aligned with the latest legal requirements. Captain Compliance provides the tools you need to protect user data and maintain regulatory compliance with ease at an affordable fee.
    Leader badge
    Starting Price: $40 per month
    Partner badge
    View Software
    Visit Website
  • 3
    Slack

    Slack

    Salesforce

    Slack is a cloud-based project collaboration and team interaction software solution specially designed to seamlessly facilitate communication across organizations. Featuring powerful tools and services integrated into a single platform, Slack provides private channels to promote interaction within smaller teams, direct channels to help send messages directly to colleagues, and public channels that enables members across organizations to start conversations. Available on Mac, Windows, Android, and iOS apps, Slack offers a plethora of features that include chat, file sharing, collaborative workspace, real-time notifications, two-way audio and video, screen sharing, document imaging, activity tracking and logging, and more.
    Leader badge
    Starting Price: $6.67 per user per month
  • 4
    Amazon Web Services (AWS)
    Amazon Web Services (AWS) is the world’s most comprehensive cloud platform, trusted by millions of customers across industries. From startups to global enterprises and government agencies, AWS provides on-demand solutions for compute, storage, networking, AI, analytics, and more. The platform empowers organizations to innovate faster, reduce costs, and scale globally with unmatched flexibility and reliability. With services like Amazon EC2 for compute, Amazon S3 for storage, SageMaker for AI/ML, and CloudFront for content delivery, AWS covers nearly every business and technical need. Its global infrastructure spans 120 availability zones across 38 regions, ensuring resilience, compliance, and security. Backed by the largest community of customers, partners, and developers, AWS continues to lead the cloud industry in innovation and operational expertise.
  • 5
    Kaspersky Anti-Virus
    Blocks the latest viruses, ransomware, spyware, cryptolockers & more – and helps stop cryptocurrency mining malware damaging your PC’s performance. Delivers real-time antivirus protection. Blocks ransomware, cryptolockers & more. Prevents cryptomining malware infections. Lets your PC perform as it’s designed to.
    Leader badge
    Starting Price: $29.99 per year
  • 6
    Microsoft Azure
    Microsoft's Azure is a cloud computing platform that allows for rapid and secure application development, testing and management. Azure. Invent with purpose. Turn ideas into solutions with more than 100 services to build, deploy, and manage applications—in the cloud, on-premises, and at the edge—using the tools and frameworks of your choice. Continuous innovation from Microsoft supports your development today, and your product visions for tomorrow. With a commitment to open source, and support for all languages and frameworks, build how you want, and deploy where you want to. On-premises, in the cloud, and at the edge—we’ll meet you where you are. Integrate and manage your environments with services designed for hybrid cloud. Get security from the ground up, backed by a team of experts, and proactive compliance trusted by enterprises, governments, and startups. The cloud you can trust, with the numbers to prove it.
  • 7
    Facebook
    Facebook is the world's largest social network. We build technologies that help people connect with friends and family, find communities, and grow businesses. From fundraising to offering life-saving help in a Facebook post or signing up to donate blood, we’re inspired by the ways people show up for each other in times of need. The Facebook app helps you connect with friends, family and communities of people who share your interests. Connecting with your friends and family as well as discovering new ones is easy with features like Groups, Watch and Marketplace.
    Leader badge
    Starting Price: Free
  • 8
    SentinelOne Singularity
    One intelligent platform. Unprecedented speed. Infinite scale. Singularity™ enables unfettered visibility, industry-leading detection, and autonomous response. Discover the power of AI-powered, enterprise-wide cybersecurity. The world’s leading enterprises use the Singularity platform to prevent, detect, and respond to cyber attacks at machine-speed, greater scale, and higher accuracy across endpoint, cloud, and identity. SentinelOne delivers cutting-edge security with this platform by offering protection against malware, exploits, and scripts. SentinelOne cloud-based platform has been perfected to be innovative compliant with security industry standards, and high-performance whether the work environment is Windows, Mac or Linux. Thanks to constant updating, threat hunting, and behavior AI, the platform is ready for any threat.
    Starting Price: $45 per user per year
  • 9
    IBM QRadar SIEM
    Market-leading SIEM built to outpace the adversary with speed, scale and accuracy As digital threats loom large and cyber adversaries grow increasingly sophisticated, the roles of SOC analysts are more critical than ever. Going beyond threat detection and response, QRadar SIEM enables security teams face today’s threats proactively with advanced AI, powerful threat intelligence, and access to cutting-edge content to maximize analyst potential. Whether you need cloud-native architecture built for hybrid scale and speed or a solution to complement your on-premises infrastructure, IBM can provide you with a SIEM to meet your needs. Experience the power of IBM enterprise-grade AI designed to amplify the efficiency and expertise of every security team. With QRadar SIEM, analysts can reduce repetitive manual tasks like case creation and risk prioritization to focus on critical investigation and remediation efforts.
  • 10
    Zscaler

    Zscaler

    Zscaler

    Zscaler, creator of the Zero Trust Exchange platform, uses the largest security cloud on the planet to make doing business and navigating change a simpler, faster, and more productive experience. The Zscaler Zero Trust Exchange enables fast, secure connections and allows your employees to work from anywhere using the internet as the corporate network. Based on the zero trust principle of least-privileged access, it provides comprehensive security using context-based identity and policy enforcement. The Zero Trust Exchange operates across 150 data centers worldwide, ensuring that the service is close to your users, co-located with the cloud providers and applications they are accessing, such as Microsoft 365 and AWS. It guarantees the shortest path between your users and their destinations, providing comprehensive security and an amazing user experience. Use our free service, Internet Threat Exposure Analysis. It’s fast, safe, and confidential.
  • 11
    Sumo Logic

    Sumo Logic

    Sumo Logic

    Sumo Logic, Inc. helps make the digital world secure, fast, and reliable by unifying critical security and operational data through its Intelligent Operations Platform. Built to address the increasing complexity of modern cybersecurity and cloud operations challenges, we empower digital teams to move from reaction to readiness—combining agentic AI-powered SIEM and log analytics into a single platform to detect, investigate, and resolve modern challenges. Customers around the world rely on Sumo Logic for trusted insights to protect against security threats, ensure reliability, and gain powerful insights into their digital environments. Sumo Logic Cloud SIEM helps your team detect, investigate, and respond to threats with faster behavioral analytics and automation—powered by real-time data and logs-first intelligence. Sumo Logic UEBA baselines user and entity behavior in minutes—training models on historical data to reduce false positives and surface high-risk anomalies.
    Starting Price: $270.00 per month
  • 12
    DomainTools

    DomainTools

    DomainTools

    Connect indicators from your network with nearly every active domain and IP address on the Internet. Learn how this data can inform risk assessments, help profile attackers, guide online fraud investigations, and map cyber activity to attacker infrastructure. Gain insight that is necessary to make the right decision about the risk level of threats to your organization. DomainTools Iris is a proprietary threat intelligence and investigation platform that combines enterprise-grade domain and DNS-based intelligence with an intuitive web interface.
  • 13
    Palo Alto Networks Next-Generation Firewalls
    Palo Alto Networks offers ML-powered Next-Generation Firewalls (NGFW) that use inline deep learning to detect and stop the most evasive and unknown zero-day threats. These firewalls provide zero-delay signature updates, ensuring threats are blocked within seconds across the network. The platform delivers detailed visibility into IoT and connected devices, profiling them accurately to prevent unmanaged access. With AI-driven operations, it maximizes security effectiveness while minimizing downtime and resource costs. Recognized as a leader by industry analysts like Forrester, Palo Alto Networks’ NGFWs protect organizations of all sizes and complexities. They support a wide range of deployment environments including branch offices, data centers, public cloud, and 5G networks under a unified security architecture.
  • 14
    Symantec Advanced Threat Protection
    Uncover the stealthiest threats that would otherwise evade detection by using global intelligence from one of the world’s largest cyber intelligence networks combined with local customer context. Aggregate intelligence across multiple control points to identify and prioritize those systems that remain compromised and require immediate remediation. Contain and remediate all the instances of a threat with a single click of a button. Provides in-depth threat visibility across IT environments in one place, without requiring any manual searching. Instant search for Indicators-of-Compromise and visualize all related events of an attack, e.g. all files used in an attack, email addresses and malicious IP addresses involved. Click once to remediate any attack artifact everywhere – across Symantec-protected endpoint, network and email. Quickly isolate any compromised system from the enterprise network.
  • 15
    Bitdefender Antivirus Plus
    Choose a lightweight antivirus that offers essential protection for your computer or device. You get the most innovative technologies that predict, prevent, detect and remediate even the latest cyber-threats, anywhere in the world. Bitdefender Antivirus Plus packs the next-gen cybersecurity that won the “Product of the Year” award from AV-Comparatives. It protects computers against all online threats, and includes privacy tools such as Bitdefender VPN and Bitdefender Safepay. Bitdefender's unbeatable multi-layered protection keeps your devices safe from all new and existing threats. Bitdefender Antivirus Plus reacts instantly to e-threats with no compromise to your system’s performance. Bitdefender Antivirus Plus takes care of your online privacy and personal information. Compare our award-winning products and get the best real-world protection, so you can keep doing the things that matter while we handle security.
    Starting Price: $17.38 first year
  • 16
    Nucleus

    Nucleus

    Nucleus

    Nucleus is redefining the vulnerability management software category as the single source of record for all assets, vulnerabilities, and associated data. We unlock the value you’re not getting from existing tools and place you squarely on the path to program maturity by unifying the people, processes, and technology involved in vulnerability management. With Nucleus, you receive unmatched visibility into your program and a suite of tools with functionality that simply can’t be replicated in any other way. Nucleus is the single shift-left tool that unifies development and security operations. It unlocks the value you’re not getting out of your existing tools and puts you on the path to unifying the people, processes, and technology involved in addressing vulnerabilities and code weaknesses. With Nucleus, you’ll get unmatched pipeline integration, tracking, triage, automation and reporting capabilities and a suite of tools with functionality.
    Starting Price: $10 per user per year
  • 17
    ServiceNow

    ServiceNow

    ServiceNow

    Digitize your workflows - they'll love you for it. Your company can be more productive and your people more engaged. ServiceNow makes work, work better for people. Transform old, manual ways of working into modern digital workflows, so employees and customers get what they need, when they need it—fast, simple, easy. ServiceNow delivers digital workflows that create great experiences and unlock productivity for employees and the enterprise. We simplify the complexity of work on a single, enterprise cloud platform. The Now Platform: The intelligent and intuitive cloud platform for work. Choose from our workflows or build your own apps. Built on the Now Platform, our product portfolio delivers the  IT,  Employee, and  Customer Workflows that matter with enterprise solutions to help drive every part of your digital transformation. Create the great experiences you want and unlock the productivity you need, now with native mobile capabilities for everyday work across the enterprise.
    Starting Price: $100 per month
  • 18
    OneTrust Privacy Automation
    Go beyond compliance and build trust through transparency, choice, and control. People demand greater control of their data, unlocking an opportunity for organizations to use these moments to build trust and deliver more valuable experiences. We provide privacy and data governance automation to help organizations better understand their data across the business, meet regulatory requirements, and operationalize risk mitigation to provide transparency and choice to individuals. Achieve data privacy compliance faster and build trust in your organization. Our platform helps break down silos across processes, workflows, and teams to operationalize regulatory compliance and enable trusted data use. Build proactive privacy programs rooted in global best practices, not reactive to individual regulations. Gain visibility into unknown risks to drive mitigation and risk-based decision making. Respect individual choice and embed privacy and security by default into the data lifecycle.
  • 19
    Splunk Cloud Platform
    Turn data into answers with Splunk deployed and managed securely, reliably and scalably as a service. With your IT backend managed by our Splunk experts, you can focus on acting on your data. Splunk-provisioned and managed infrastructure delivers a turnkey, cloud-based data analytics solution. Go live in as little as two days. Managed software upgrades ensure you always have the latest functionality. Tap into the value of your data in days with fewer requirements to turn data into action. Splunk Cloud meets the FedRAMP security standards, and helps U.S. federal agencies and their partners drive confident decisions and decisive actions at mission speeds. Drive productivity and contextual insights with Splunk’s mobile apps, augmented reality and natural language capabilities. Extend the utility of your Splunk solutions to any location with a simple phrase or the tap of a finger. From infrastructure management to data compliance, Splunk Cloud is built to scale.
  • 20
    LogPoint

    LogPoint

    LogPoint

    Get a simple and fast security analytics implementation, along with a user-friendly interface that can be integrated with an entire IT infrastructure with LogPoint. LogPoint’s modern SIEM with UEBA provides advanced analytics and ML-driven automation capabilities that enable their customers to securely build-, manage, and effectively transform their businesses.They have a flat licensing model, based on nodes rather than data volume. This helps to reduce the cost of deploying a SIEM solution on-premise, in the cloud or even as an MSSP. The solution integrates easily with all devices in your network, giving a holistic and correlated overview of events in your IT infrastructure. LogPoint’s Modern SIEM solution translates all data into one common language, making it possible to compare events across all systems. Having a common language makes it both very easy and efficient to search, analyze and report on data.
  • 21
    Carbon Black EDR
    Carbon Black Endpoint Detection and Response (EDR) by Broadcom offers a comprehensive solution for detecting, investigating, and responding to cybersecurity threats on endpoints. It utilizes advanced behavioral analysis and machine learning to identify suspicious activities in real time, providing security teams with actionable insights to prevent data breaches and mitigate risks. With its cloud-based architecture, Carbon Black EDR enables continuous monitoring, visibility into endpoint activity, and automated threat response. It’s designed to support organizations of all sizes by improving threat detection, reducing investigation time, and enhancing overall endpoint security.
  • 22
    Tanium

    Tanium

    Tanium

    Empowering the world’s largest organizations to manage and protect their mission-critical networks. Our data model can collect new, ad-hoc data on the fly in seconds, allowing customers, partners and Tanium to quickly develop capabilities on this extensible platform. Our patented architecture collects and distributes data to millions of endpoints in seconds, with zero infrastructure. Enable decision-making where data is generated: the endpoint itself. Our agent consumes minimal endpoint resources and bandwidth while fitting on the firmware of the smallest chips. Expand your capabilities without expanding Tanium’s footprint. We’ve found that the best way for customers to understand what we do is to show our platform in action. Orion Hindawi, Tanium’s co-founder and CEO, will guide you through a hands-on keyboard tour to show what Tanium does and the power of the platform. Track down every IT asset you own instantaneously.
  • 23
    Cisco Umbrella
    Cisco Umbrella's cloud-delivered security enables an immediate improvement in security and compliance posture. That's because DNS is at the heart of every internet connection request. Securing the DNS layer means blocking malicious domains, IP addresses, and cloud applications before a connection is ever established. More than 30,000 organizations depend upon Umbrella DNS to deliver a fast, safe, and reliable internet experience that is simple to deploy and easy to manage. A recent study by GigaOM ranked Cisco #1 in DNS-layer security, and our DNS security contributed to Miercom ranking Cisco #1 in the industry in its laboratory testing of SSE threat efficacy. When you are looking to build upon DNS-layer protection with additional user protection capabilities, including ZTNA, SWG, CASB, DLP, and more, see Cisco Secure Access. Cisco Secure Access features a single client, single manager, and single policy construct protection for multi-function internet access protection and integrated
  • 24
    NorthStar Navigator

    NorthStar Navigator

    NorthStar.io, Inc.

    NorthStar is redefining Risk-Based Vulnerability Management with simple, contextual vulnerability prioritization for easier remediation. Common challenges NorthStar addresses are listed below: • Prioritize issues that should be addressed first in order to make the best use of limited resources. • Address lingering exposures that could impact critical business services, applications, and data stores. • Bridge the visibility gap and discrepancies that exist between vulnerability assessment and patch management. • Track reduction in risk over time and validate the most important issues are being addressed first. • Deliver a complete view of their environment – all assets, vulnerabilities and exposures. • Eliminate manual processes and unnecessary spreadsheet work.
    Starting Price: $8 per device
  • 25
    Tines

    Tines

    Tines

    Tines provides the world's most security-conscious companies with no-code automation technology to power their business-critical processes. We believe automation works best when subject-matter experts, not distant developers, build it. Our drag-and-drop technology is intuitive but immensely powerful and flexible to give frontline staff everything they need to address repetitive manual processes. Tines allows users to gather internal or external events to trigger multi-step workflows. In line with our belief in approachable and powerful technology, Tines integrates with any technology that offers an API. This means customers aren’t limited to a fixed set of integrations, rather they are free to connect to any tool in their stack. This extends how they protect their business. With Tines, our customers are free from the burdensome, repetitive processes to focus on protecting their business from the next threat.
    Starting Price: $0/user/year
  • 26
    NopSec

    NopSec

    NopSec

    We help cyber defenders get a handle on the fragmented processes that make cyber exposure unmanageable. NopSec's end-to-end platform brings these processes together and provides cyber defenders with a means to then discover, prioritize, remediate, simulate, and report on cyber exposures. If you don’t know what's in your environment you can’t protect it. With today's global scale of digital business transformation, complete visiblity of your IT assets is essential to adaptive cyber risk management. Nopsec shows you the business impact of your IT assets on a continuous basis helping you prevent any potential blind spots of unmanaged risk and cyber exposures.
  • 27
    LevelBlue USM Anywhere
    Elevate your security with LevelBlue USM Anywhere, an advanced open XDR platform designed to scale with your evolving IT landscape and growing business needs. Combining sophisticated analytics, robust security orchestration, and automation, USM Anywhere offers built-in threat intelligence for quicker and more precise threat detection, as well as streamlined response coordination. Its flexibility is unmatched, with extensive integrations—referred to as BlueApps—that enhance its detection and orchestration across hundreds of third-party security and productivity tools. These integrations also enable you to trigger automated and orchestrated responses effortlessly. Begin your 14-day free trial now and discover how our platform simplifies cybersecurity.
  • 28
    LogRhythm SIEM
    We know your job isn’t easy. That’s why we combine log management, machine learning, SOAR, UEBA, and NDR to give you broad visibility across your environment so you can quickly uncover threats and minimize risk. But a mature SOC doesn’t just stop threats. With LogRhythm, you’ll easily baseline your security operations program and track your gains — so you can easily report your successes to your board. Defending your enterprise comes with great responsibility — that’s why we built our NextGen SIEM Platform with you in mind. With intuitive, high-performance analytics and a seamless incident response workflow, protecting your business just got easier. With the LogRhythm XDR Stack, your team has an integrated set of capabilities that deliver on the fundamental mission of your SOC — threat monitoring, threat hunting, threat investigation, and incident response — at a low total cost of ownership.
  • 29
    Rapid7 Incident Command
    Rapid7 Incident Command is an AI-powered next-generation SIEM designed to deliver unified visibility and faster threat response across modern attack surfaces. It brings together logs, telemetry, asset context, and threat intelligence into a single, actionable view across cloud, SaaS, endpoints, and hybrid environments. Incident Command uses AI-driven behavioral detections and alert triage to cut through noise and surface the threats that matter most. Every alert is enriched with exposure, vulnerability, asset risk, and third-party intelligence to guide decisive action. Built-in SOAR automation and guided AI response workflows help reduce dwell time and accelerate containment. The platform supports advanced investigations with natural language search, attack path reconstruction, and MITRE ATT&CK alignment. Rapid7 Incident Command enables security teams to scale their SOC with speed, clarity, and confidence.
  • 30
    Brinqa

    Brinqa

    Brinqa

    Present a complete and accurate picture of your IT and security ecosystem with Brinqa Cyber Risk Graph. Deliver actionable insights, intelligent tickets, and timely notifications to all your stakeholders. Protect every attack surface with solutions that evolve with your business. Build a stable, robust, and dynamic cybersecurity foundation that supports and enables true digital transformation. Experience the power of Brinqa Risk Platform with a free trial - discover unparalleled risk visibility and improved security posture within minutes. The Cyber Risk Graph is a real-time representation of an organization’s infrastructure and apps, delineation of interconnects between assets and to business services, and the knowledge source for organizational cyber risk.
  • Previous
  • You're on page 1
  • 2
  • 3
  • Next
MongoDB Logo MongoDB