Business Software for Splunk APM

Top Software that integrates with Splunk APM as of July 2025

Compare business software, products, and services to find the best solution for your business or organization. Use the filters on the left to drill down by category, pricing, features, organization size, organization type, region, user reviews, integrations, and more. View and sort the products and solutions that match your needs in the results below.

  • 1
    Hyperproof

    Hyperproof

    Hyperproof

    Hyperproof makes building out and managing your information security frameworks easy by automating repetitive compliance operation tasks so your team can focus on the bigger things. The Hyperproof solution also offers powerful collaboration features that make it easy for your team to coordinate efforts, collect evidence, and work directly with auditors in a single interface. Gone are the days of uncertainty around audit preparation and compliance management process. With Hyperproof you get a holistic view of your compliance programs with progress tracking, program health monitoring, and risk management.
    View Software
    Visit Website
  • 2
    Verosint

    Verosint

    Verosint

    Verosint's Threat Detection, Investigation and Response platform provides real-time, intelligent ITDR for both workforce and customer identities. -Fastest MTTD & MTTR: Detect and respond to Identity based threats faster than anyone else in the industry -Detect Advanced Threats: Spot session hijacking, credential stuffing, account takeovers and more -Investigate Efficiently: Our customers say investigating incidents has gone from days to minutes with our AI Insights, unparalleled visibility and intelligence -Remediate Quickly: Automatically resolve identity threats with our integrated remediation playbooks -Easy to Deploy: Deploys in 60 minutes or less
    Starting Price: $1/user/month
  • 3
    Innvikta

    Innvikta

    Innvikta Cybersecurity Solutions

    Innvikta is proud to introduce InSAT, a cutting-edge Security Awareness Training platform that redefines the way organizations prepare for cyber threats. With InSAT, we offer a comprehensive platform that combines advanced cyber attack simulations with a feature-rich Learning Management System (LMS) featuring an extensive library of engaging training content. Together, these elements create an unparalleled learning experience that empowers your team to become formidable guardians against cyberattacks. At the heart of InSAT lies its revolutionary cyber attack simulation, a powerful tool that enables you to assess and enhance your team's resilience to multiple attack vectors. Gone are the days of one-dimensional training – InSAT challenges your users with realistic scenarios, ensuring they are prepared to face the ever-evolving threat landscape.
    Starting Price: Free
  • 4
    F5 Distributed Cloud Platform
    The F5 Distributed Cloud Platform delivers improved functionality, advanced security controls, and more simplified operations than native services from cloud providers. A cloud-based platform that is purpose-built to support distributed applications across multi-cloud, on-premises, and edge environments. As applications evolve through microservices and increased dependencies on APIs, new highly distributed architectures are introducing greater complexities, costs, and increased risks. Multiple appliances, software, and connectivity services must be deployed and managed to deliver apps. Traditional CDNs and hub-spoke networks were not designed for immersive or large-scale SaaS apps. Services with different APIs, policies, and observability require investments in automation. Apps deployed across distributed environments are not equally protected. Difficult to align DevOps, NetOps, and SecOps across service provisioning and security using ticket-based workflows.
    Starting Price: $25 per month
  • 5
    IBM Instana
    IBM Instana is the gold standard of incident prevention with automated full-stack visibility, 1-second granularity and 3 seconds to notify. With today’s highly dynamic and complex cloud environments, the average cost of an hour of downtime can reach six figures and beyond. Traditional application performance monitoring (APM) tools simply aren’t fast enough to keep up or thorough enough to contextualize the issues identified. Also, they are typically limited to super users who must complete months of training to learn. IBM Instana Observability goes beyond traditional APM solutions by democratizing observability so anyone across DevOps, SRE, platform engineering, ITOps and development can get the data they want with the context they need. Instana Dynamic APM operates using the Instana agent architecture, which incorporates sensors—lightweight, automated programs tailored to monitor specific entities.
    Starting Price: $75 per month
  • 6
    Exoprise Service Watch
    Service Watch allows Digital Experience Monitoring (DEM) for apps, services, and the networks they rely on. Active and passive monitoring in one holistic solution provides IT with complete visibility and boosts employee productivity. Troubleshoot network performance, detect service provider outages, and capture real user experience for any application, anywhere.
    Starting Price: $100/month/sensor
  • 7
    AKIPS Network Monitor
    AKIPS Network Monitoring Software is a fully featured, fast and cost-effective network and infrastructure performance-monitoring tool. It delivers unmatched visibility across your network. AKIPS detects faults and performance issues. This empowers your business to maintain its operational state and minimise possible disruptions due to IT infrastructure failing or risk events occurring. AKIPS is a multi-award-winning company and prides itself on its innovative technology. Benefits: - Visibility of your entire network - A single product for ping, SNMP, syslog, traps, NetFlow, alerting and much more - Our single server scales to 1,000,000 interfaces and 500,000 flows per second - 60-second polling for every MIB object - 15-second ping for every device - SNMP v1/v2/v3 - Integration with third-party apps (Opsgenie, Pagerduty, ServiceNow, Slack, Splunk) - Flat-fee subscription (no extra costs)
  • 8
    Elastic Observability
    Rely on the most widely deployed observability platform available, built on the proven Elastic Stack (also known as the ELK Stack) to converge silos, delivering unified visibility and actionable insights. To effectively monitor and gain insights across your distributed systems, you need to have all your observability data in one stack. Break down silos by bringing together the application, infrastructure, and user data into a unified solution for end-to-end observability and alerting. Combine limitless telemetry data collection and search-powered problem resolution in a unified solution for optimal operational and business results. Converge data silos by ingesting all your telemetry data (metrics, logs, and traces) from any source in an open, extensible, and scalable platform. Accelerate problem resolution with automatic anomaly detection powered by machine learning and rich data analytics.
    Starting Price: $16 per month
  • 9
    Arc XP

    Arc XP

    Arc XP

    Arc XP lets you create and distribute content, drive commerce, and deliver powerful customer experiences, all on one cloud-based platform. By integrating content, commerce, and user experiences onto one platform, you can quickly build and continually optimize rich customer experiences. Built with technology from industry-leading partners, Arc XP provides an intelligent interface and robust technologically advanced backbone ready to meet your unique digital experience needs. Arc XP lets you create and distribute content, drive commerce, and deliver powerful customer experiences, all on one cloud-based platform. By integrating content, commerce, and user experiences onto one platform, you can quickly build and continually optimize rich customer experiences. From asset management to streaming events, and everything in between, your teams can create compelling content with an easy-to-use set of tools and workflow.
    Starting Price: Free
  • 10
    Aserto

    Aserto

    Aserto

    Aserto helps developers build secure applications. It makes it easy to add fine-grained, policy-based, real-time access control to your applications and APIs.
 Aserto handles all the heavy lifting required to achieve secure, scalable, high-performance access management. It offers blazing-fast authorization of a local library coupled with a centralized control plane for managing policies, user attributes, relationship data, and decision logs. And it comes with everything you need to implement RBAC or fine-grained authorization models, such as ABAC, and ReBAC. Take a look at our open-source projects: - Topaz.sh: a standalone authorizer you can deploy in your environment to add fine-grained access control to your applications. Topaz lets you combine OPA policies with Zanzibar’s data model for complete flexibility. - OpenPolicyContainers.com (OPCR) secures OPA policies across the lifecycle by adding the ability to tag, ver
    Starting Price: $0
  • 11
    Peaka

    Peaka

    Peaka

    Integrate all your data sources, relational and NoSQL databases, SaaS tools, and APIs. Query them as a single data source immediately. Process data wherever it is. Query, cache, and blend data from different sources. Use webhooks to ingest streaming data from Kafka, Segment, etc., into the Peaka BI Table. Replace nightly one-time batch ingestion with real-time data access. Treat every data source like a relational database. Convert any API to a table, and blend and join it with your other data sources. Use the familiar SQL to run queries in NoSQL databases. Retrieve data from both SQL and NoSQL databases utilizing the same skill set. Query and filter your consolidated data to form new data sets. Expose them with APIs to serve other apps and systems. Do not get bogged down in scripts and logs while setting up your data stack. Eliminate the burden of building, managing, and maintaining ETL pipelines.
    Starting Price: $1 per month
  • 12
    Activu

    Activu

    Activu

    Activu makes any information visible, collaborative, and proactive for people tasked with monitoring critical operations and incidents. Our customers automatically see, share, and respond to events in real-time, with context, to improve incident response, decision-making, and management. Activu software, systems, and services benefit the daily lives of billions of people around the world. Founded in 1983 as the first U.S.-based company to develop video wall technology, more than 1,000 control rooms and command centers depend on Activu. The most Intuitive, Flexible, Feature rich wall control on the market. Organize information easily based on specific user needs. Easily create Layouts and Templates based on user needs. Organize, place and even move information across multiple video walls. Organize information assets in easily accessible, searchable Spaces. Support for virtually any information source type.
  • 13
    SafeConsole

    SafeConsole

    DataLocker

    Central Management Server Software. Instantly gain complete and granular control over all of your encrypted USB flash drives and portable hard drives with the SafeConsole central management server software: Achieve compliance for USB storage usage, with full control and audit. Keep the productivity benefits of USB storage devices – without the risks of malware, data leaks and breaches. Available as an on-premises software or as a DataLocker hosted cloud service with worldwide locations. Enforce policies such as password rules, file-type restrictions or geographic boundaries. Reset passwords, switch devices into read-only mode, and even remotely wipe them in case of loss or theft. Monitor all your encrypted drives, including their location anywhere in the world. Integrate with Active Directory to track users, assigned devices and connected computers with ease. See which files are saved to or deleted from your encrypted drives at any given moment.
    Starting Price: $28 per device per year
  • 14
    Dragos Platform
    The Dragos Platform is the most trusted industrial control systems (ICS) cybersecurity technology–providing comprehensive visibility of your ICS/OT assets and the threats you face, with best-practice guidance to respond before a significant compromise. Built by practitioners for practitioners, the Dragos Platform ensures your cybersecurity team is armed with the most up-to-date defensive tools to combat industrial adversaries, codified by our experts on the front lines every day hunting, combatting, and responding to the world’s most advanced ICS threats. The Dragos Platform analyzes multiple data sources including protocols, network traffic, data historians, host logs, asset characterizations, and anomalies to provide unmatched visibility of your ICS/OT environment. The Dragos Platform rapidly pinpoints malicious behavior on your ICS/OT network, provides in-depth context of alerts, and reduces false positives for unparalleled threat detection.
    Starting Price: $10,000
  • 15
    cPacket

    cPacket

    cPacket Networks

    cPacket enables network-aware application performance and security assurance for the distributed hybrid-IT environment. Our single-pane-of-glass analytics power advanced machine learning-based AIOps. With cPacket, you can efficiently manage, secure and future-proof your network enabling digital transformation. The industry’s most complete, yet simple, network visibility stack provides all the components you need to manage your hybrid network across branch, data center and the cloud.
    Starting Price: cVu-V - $21,000/year
  • 16
    Y42

    Y42

    Datos-Intelligence GmbH

    Y42 is the first fully managed Modern DataOps Cloud. It is purpose-built to help companies easily design production-ready data pipelines on top of their Google BigQuery or Snowflake cloud data warehouse. Y42 provides native integration of best-of-breed open-source data tools, comprehensive data governance, and better collaboration for data teams. With Y42, organizations enjoy increased accessibility to data and can make data-driven decisions quickly and efficiently.
  • 17
    Imperva CDN
    Deploying your websites and applications around the globe can lead to more cyber attacks and fraud, unless you have effective security. The Imperva Content Delivery Network (CDN) brings content caching, load balancing, and failover built natively into a comprehensive Web Application and API Protection (WAAP) platform, so your applications are securely delivered across the globe. Let machine learning do the work for you. It efficiently caches your dynamically-generated pages, while ensuring content freshness. This significantly improves cache utilization and further reduces bandwidth usage. Take advantage of multiple content and networking optimization techniques to minimize page rendering time and improve user experience. Imperva’s global CDN uses advanced caching and optimization techniques to improve connection and response speeds while lowering bandwidth costs.
  • 18
    Imperva WAF
    Web application attacks prevent important transactions and steal sensitive data. Imperva Web Application Firewall (WAF) analyzes traffic to your applications to stop these attacks and ensure uninterrupted business operations. A noisy WAF forces you to choose between blocking legitimate traffic or manually containing attacks your WAF let through. Imperva Research Labs ensure accuracy to WAF customers as the threat landscape changes. Automatic policy creation and fast rule propagation empower your security teams to use third-party code without risk while working at the pace of DevOps. Imperva WAF is a key component of a comprehensive Web Application and API Protection (WAAP) stack that secures from edge to database, so the traffic you receive is only the traffic you want. We provide the best website protection in the industry – PCI-compliant, automated security that integrates analytics to go beyond OWASP Top 10 coverage, and reduces the risks created by third-party code.
  • 19
    Imperva DDoS Protection
    Imperva DDoS Protection secures all your assets at the edge for uninterrupted operation. Ensure business continuity with guaranteed uptime. When it comes to DDoS mitigation, the rule of thumb is: ‘moments to go down, hours to recover’. This is why, when defending against an attack, every second counts. Imperva gives you the peace of mind that attack traffic will be automatically blocked at the edge – without you having to scale up in bandwidth to pay for it. Imperva DDoS Protection for Websites is an always-on service that immediately mitigates any type or size of DDoS attack targeting web applications. Our DDoS protection for websites complements the Imperva cloud web application firewall (WAF), which blocks hacking attempts and attacks by malicious bots. A change to your DNS records ensures that all HTTP/S traffic to your domain(s) is routed through the Imperva network. Acting as a secure proxy, Imperva DDoS protection for websites masks your origin server IP.
  • 20
    Splunk User Behavior Analytics
    Securing against unknown threats through user and entity behavior analytics. Discover abnormalities and unknown threats that traditional security tools miss. Automate stitching of hundreds of anomalies into a single threat to simplify a security analyst’s life. Use deep investigative capabilities and powerful behavior baselines on any entity, anomaly or threat. Automate threat detection using machine learning so you can spend more time hunting with higher fidelity behavior-based alerts for quick review and resolution. Rapidly identify anomalous entities without human analysis. Rich set of anomaly types (65+) and threat classifications (25+) across users, accounts, devices and applications. Rapidly identify anomalous entities without human analysis. Rich set of anomaly types and threat classifications (25+) across users, accounts, devices and applications. Organizations gain maximum value to detect and resolve threats and anomalies via the power of human and machine-driven solutions.
  • 21
    Prosimo

    Prosimo

    Prosimo

    Applications are fragmented & distributed. The proliferation of infrastructure stacks across multi-cloud for users to access applications and to talk to each other creates complexity. The result is subpar application experience, increased operational cost, and fragmented security. Today's multi-cloud world requires a new Application eXperience Infrastructure stack—one that improves user application experience, provides secure access and optimizes cloud spend so that you can focus on business outcomes. The Prosimo Application eXperience Infrastructure (AXI) is a vertically integrated cloud-native infrastructure stack that sits in front of applications and delivers consistently faster, more secure application experiences cost-optimized. AXI gives cloud architects and operations teams a decision-oriented platform that is easy to use. Powered by data insights and machine learning models, the Prosimo AXI platform delivers better results in minutes.
  • 22
    BMC Helix Cloud Cost
    BMC Helix Cloud Cost. Optimize your cloud costs and control your budget. BMC Helix Cloud Cost optimizes multi-cloud resource costs, eliminating wasted spend and preventing budget over-runs. Gain insight into public and private cloud spend. Prevent budget over-runs with predictive analytics and automated alerts. Eliminate wasted spend with automated optimization recommendations and actions. Empower budget owners and stakeholders with self-service views. With so many cloud buyers, continuous cost optimization is essential. What cloud services have been purchased? How are they being used? Without routine analysis and continuous optimization of cloud resource usage, you are guaranteed to overspend. Terminate idle and unused resources. Right-size over-provisioned resources. Establish power schedules for candidate workloads. Effectively use reserved instances. Automate optimization actions.
  • 23
    BMC AMI Ops Automation for Capping
    BMC AMI Ops Automation for Capping. Automate workload capping to avoid risk and optimize costs. BMC AMI Ops Automation for Capping (formerly Intelligent Capping for zEnterprise) applies automated intelligence to manage business-critical MSU capacity settings to avoid operational risk, optimize costs, and meet the needs of digital demand. Automatically manage capping limits to prioritize workloads and optimize mainframe software license costs which can consume 30-50% of the IT budget. Dynamically automate defined capacity MSU settings to optimize your monthly software costs by 10% or more. Mitigate business risk by analyzing, simulating, and automatically managing changes to defined capacity settings based on workload profile. Align capacity to business demand by ensuring MSUs are allocated to highest priority workloads. Patented technology drives capping adjustments, ensuring the most business-critical services are unaffected.
  • 24
    Suricata

    Suricata

    Suricata

    The Suricata engine is capable of real time intrusion detection (IDS), inline intrusion prevention (IPS), network security monitoring (NSM) and offline pcap processing. Suricata inspects the network traffic using a powerful and extensive rules and signature language, and has powerful Lua scripting support for detection of complex threats. With standard input and output formats like YAML and JSON integrations with tools like existing SIEMs, Splunk, Logstash/Elasticsearch, Kibana, and other database become effortless. Suricata’s fast paced community driven development focuses on security, usability and efficiency. The Suricata project and code is owned and supported by the Open Information Security Foundation (OISF), a non-profit foundation committed to ensuring Suricata’s development and sustained success as an open source project.
  • 25
    ThreatSync

    ThreatSync

    WatchGuard

    From distributed enterprises with 10 branch offices to small and midsize businesses (SMBs) with employees working outside of the network, it can be a struggle to manage security consistently and cohesively across your organization. It is critical for SMBs and distributed enterprise organizations to not only have visibility into both their network and endpoint event data, but to be able to quickly and efficiently leverage actionable insight to remove threats. ThreatSync, a critical component of TDR, collects event data from the WatchGuard Firebox, Host Sensor and enterprise-grade threat intelligence feeds, analyzes this data using a proprietary algorithm, and assigns a comprehensive threat score and rank. This powerful correlation engine enables cloud-based threat prioritization to empower IT team to quickly and confidently respond to threats. Collects and correlates threat event data from the Firebox and Host Sensor.
  • 26
    Lyftrondata

    Lyftrondata

    Lyftrondata

    Whether you want to build a governed delta lake, data warehouse, or simply want to migrate from your traditional database to a modern cloud data warehouse, do it all with Lyftrondata. Simply create and manage all of your data workloads on one platform by automatically building your pipeline and warehouse. Analyze it instantly with ANSI SQL, BI/ML tools, and share it without worrying about writing any custom code. Boost the productivity of your data professionals and shorten your time to value. Define, categorize, and find all data sets in one place. Share these data sets with other experts with zero codings and drive data-driven insights. This data sharing ability is perfect for companies that want to store their data once, share it with other experts, and use it multiple times, now and in the future. Define dataset, apply SQL transformations or simply migrate your SQL data processing logic to any cloud data warehouse.
  • 27
    BMC Compuware Topaz Connect
    BMC Compuware Topaz Connect bridges the IT systems that manage mainframe applications with the modern tooling used to manage non-mainframe applications, eliminating siloes that can disrupt innovation. By connecting the mainframe to disparate platforms in the enterprise, companies can track processes for mainframe applications in the same manner as they do for other hardware and software platforms. Eliminates siloes created by lack of integrated tooling, enabling faster delivery of business value. Maximizes enterprise IT automation by reducing disparate manual processes. Leverages existing IT service management (ITSM) investments. Includes the mainframe in DevOps processes. Enhances process efficiencies. Enables mainframe-inexperienced programmers to manage mainframe code. Connect BMC Compuware ISPW and ITSM solutions such as BMC Helix and Tivoli. Communicate specifics of an ITSM code change to BMC Compuware ISPW.
  • 28
    BMC Middleware Management
    BMC middleware management software provides real-time monitoring and administration for messaging-oriented middleware environments including IBM® MQ, Integration Bus (IIB), App Connect Enterprise (ACE), Apache ActiveMQ, and DataPower and TIBCO Enterprise Message Service (EMS). Automate alerts and gain insight into a wide array of middleware technologies with a single, intuitive solution. MainView Middleware Monitor securely provides real-time monitoring and automatic notification of potential problems to ensure an optimally performing middleware layer. Analyze historical data to identify patterns, predict trends, and solve reoccurring problems. Maximize application availability and mitigate risk with proactive problem detection and automated resolutions. Improve productivity and efficiency for managing, administering, and troubleshooting with flexible dashboards for infrastructure and application views.
  • 29
    Wallarm API Security Platform
    Built by security practitioners for practitioners, Wallarm's API security platform provides robust protection for APIs, web apps, microservices, and serverless workloads in cloud-native, multi-cloud, Kubernetes, and on-premises environments. It delivers coverage against OWASP API Top-10 risks and advanced threats, ensuring visibility and rapid vulnerability remediation. The Wallarm platform is a best-in-class API security solution that supports multiple deployment options. Trusted by security teams globally, Wallarm's API security platform is the fastest, easiest, and most effective way to stop API attacks. Customers choose Wallarm to protect their applications and AI agents because the platform delivers a complete inventory of APIs, patented AI/ML-based abuse detection, real-time blocking, and an API SOC-as-a-service.
  • 30
    TruffleHog

    TruffleHog

    Truffle Security

    TruffleHog runs behind the scenes to scan your environment for secrets like private keys and credentials, so you can protect your data before a breach occurs. Secrets can be found anywhere, so TruffleHog scans more than just code repositories, including SaaS and internally hosted software. With support for custom integrations and new integrations added all the time, you can secure your secrets across your entire environment. TruffleHog is developed by a team entirely comprised of career security experts. Security is our passion and primary concern, and all features are developed with best practices in mind. TruffleHog enables you to track and manage secrets within our intuitive management interface, including links to exactly where secrets have been found. Authenticate with secure OAuth workflows for users and never worry about username and password breaches.
  • Previous
  • You're on page 1
  • 2
  • Next