Business Software for Splunk APM - Page 2

Top Software that integrates with Splunk APM as of July 2025 - Page 2

  • 1
    Gloo Mesh

    Gloo Mesh

    Solo.io

    Today's Kubernetes environments need help in scaling, securing and observing modern cloud-native applications. Gloo Mesh, based on the industry's leading Istio service mesh, simplifies multi-cloud and multi-cluster management of service mesh for containers and virtual machines. Gloo Mesh helps platform engineering teams to reduce costs, reduce risks, and improve application agility. Gloo Mesh is a modular component of Gloo Platform. The service mesh allows for application-aware network tasks to be managed independently from the application, adding observability, security, and reliability to distributed applications. By introducing the service mesh to your applications, you can: Simplify the application layer Provide more insights into your traffic Increase the security of your application
  • 2
    GTB Technologies DLP

    GTB Technologies DLP

    GTB Technologies

    Data Loss Prevention is defined as a system that performs real-time data classification on data at rest and in motion while automatically enforcing data security policies. Data in motion is data going to the cloud, internet, devices, or the printer. Our solution is the technology leader. Protecting on-premises, off-premises, and the cloud whether it be Mac, Linux, or Windows; our Data Loss Prevention security engine accurately detects structured & unstructured data at the binary level. GTB is the only Data Loss Prevention solution that accurately protects data when off the network. Discover, identify, classify, inventory, index, redact, re-mediate, index, control and protect your data including PII, PCI, PHI, IP, unstructured data, structured data, FERC, NERC, SOX, GLBA & more. Our patented and patent-pending, proprietary technology is able to prevent the syncing of sensitive data to unsanctioned or private clouds, while allowing its users to automatically identify “sync folders”.
  • 3
    Sandfly Security

    Sandfly Security

    Sandfly Security

    Trusted on critical infrastructure globally, Sandfly delivers agentless Linux security with no endpoint agents and no drama. Instant deployment without compromising stability or needing endpoint agents. Sandfly is an agentless, instantly deployable, and safe Linux security monitoring platform. Sandfly protects virtually any Linux system, from modern cloud deployments to decade-old devices, regardless of distribution or CPU architecture. Besides traditional Endpoint Detection and Response (EDR) capabilities, Sandfly also tracks SSH credentials, audits for weak passwords, detects unauthorized changes with drift detection, and allows custom modules to find new and emerging threats. We do all of this with the utmost safety, performance, and compatibility on Linux. And, we do it without loading agents on your endpoints. The widest coverage for Linux on the market. Sandfly protects most distributions and architectures such as AMD, Intel, Arm, MIPS, and POWER CPUs.
  • 4
    Alemba Service Manager
    Alemba Service Manager is a highly functional, ITIL-aligned IT Service Management tool with a specific focus on request fulfilment. Backed by 25 years of heritage, Alemba Service Manager enables users to respond quickly to business demands by dramatically reducing time to request fulfilment through automated workflowed integration. Alemba’s unique pricing model takes into account different levels of participation in your organization, offering an interface for every kind of user. With a strong consultancy background, unrivalled expertise in the Service Management market, and a strong focus on customer experience, Alemba is ideally positioned to deliver a successful, end-to-end Service Management project within your organization.
  • 5
    Interlink Software

    Interlink Software

    Interlink Software Solutions

    A single AIOps platform to transform IT operations. Powered by machine learning, Interlink’s AIOps platform brings service-centric visibility and actionable insights to dramatically improve your organization’s defences against damaging outages. Interlink’s unified AIOps platform; data-driven, purpose-built to visualize service availability, automate IT operations processes across your entire technology stack. Mature, highly scalable, security-hardened solutions, proven in some of the largest enterprises in the world. Best of breed approach, leverage the tools you love, avoid vendor lock-in. Low cost, predictable and transparent pricing, rapid time to value. With support that’s second to none, we build real partnerships with our customers - for long-term success. Supercharge your DevOps environment with a single-pane-of-glass service-centric approach to monitoring.
  • 6
    Proofpoint Digital Risk Protection
    Proofpoint Digital Risk Protection secures your brand and customers against digital security risks across web domains, social media, and the deep and dark web. It’s the only solution that gives you a holistic defense for all your digital engagement channels. Digital Risk Protection secures your company and customers from digital risks for your entire social media infrastructure. Our solution protects your social media presence from account takeovers, social media phishing scams, and malicious content. When you request a demo, you can map your social, mobile, and domain footprint to discover your brand-owned and fraudulent or unauthorized accounts. Protect your brand and customers from social media, web domain and dark web threats. Protect your domain investments from domain squatters, typo phishing campaigns and other infringing domains. Our digital protection solution applies artificial intelligence to uncover fraudulent domains that pose a risk to your brand and customers.
  • 7
    Assure Security
    Assure Compliance Monitoring is a bundle of Assure Security features. Together, they can quickly identify security and compliance issues by producing alerts and reports on IBM i system activity, database changes and views of Db2 data. The bundle includes two features which are also available separately. Assure Monitoring and Reporting seamlessly extracts insights from IBM i journal data and delivers alerts and reports on security incidents and compliance deviations. System and database monitoring capabilities are available separately or together. Or, choose to send data directly to your enterprise SIEM solution allowing IBM i security to be monitored with all other enterprise platforms. Assure Db2 Data Monitor is a unique, innovative solution that monitors views of highly confidential Db2 data and optionally blocks records from view. Assure Security delivers market-leading IBM i security capabilities that help your organization successfully comply with cybersecurity regulations.
  • 8
    DNSWatch

    DNSWatch

    WatchGuard

    WatchGuard DNSWatch is a Cloud-based service adding DNS-level filtering to detect and block potentially dangerous connections and protect networks and employees from damaging attacks. WatchGuard analysts triage any critical alerts, following up with an easy-to-understand accounting that includes detailed insights about the potential infection. When the attack uses phishing, and an employee clicks the link, DNSWatch automatically redirects them away from the malicious site and offers resources that reinforce phishing education. Hackers rely on DNS to execute attacks on unsuspecting victims, so careful examination of DNS requests is a great way to find and ultimately intercept attacks! DNSWatch brings DNS-level filtering into our Total Security Suite, providing an added layer of security to stop malware infections. Unwitting attempts to connect to known malicious DNS addresses by your users are automatically blocked, and the user is seamlessly redirected to a safe landing page.
  • 9
    GrowthSimple

    GrowthSimple

    GrowthSimple

    It is hard for any marketer to know exactly where a journey is headed. By delving into data to calculate trends and behavioral patterns, GrowthSimple can identify your most valuable customers, determine cross- and up-sell opportunities, predict lifetime customer value and more. The ability to gain insight into a customer’s future behaviors will ultimately enable marketers to begin a more informed strategy. It is hard for any marketer to know exactly where a journey is headed. By delving into data to calculate trends and behavioral patterns, GrowthSimple can identify your most valuable customers, determine cross- and up-sell opportunities, predict lifetime customer value and more. The ability to gain insight into a customer’s future behaviors will ultimately enable marketers to begin a more informed strategy. It is hard for any marketer to know exactly where a journey is headed.
  • 10
    smartocto

    smartocto

    smartocto

    Smartocto is a smart editorial analytics system that brings actionable data into the newsroom. Our mission is to optimise storytellers' output and make it more relevant, impactful and profitable. With crystal clear modular big screens, insightful historical reports, real-time A/B header and lead-in tests, and actionable notifications, we give them the power to go from data to action and optimise for online success, whether that's impact, engagement or conversion. We come from the newsroom ourselves, so our approach to data is different. Instead of pageviews, we show metrics on loyalty, engagement, impact and more, to help connect the dots between online publishers and their audience. We continue to develop innovative features every day, sometimes together with clients. Take a look at our website to see if smartocto could be interesting for you.
  • 11
    BlueCat Unified DDI
    Your business needs a network that can support strategic initiatives like multicloud management, SASE, SD-WAN, remote work, and beyond. That means you need core services optimized for collaboration between every team that touches the network—across NetOps, security, cloud, application development, and others. We provide DDI solutions that help your teams manage, secure, and build on your network faster and more effectively together.
  • 12
    Maltiverse

    Maltiverse

    Maltiverse

    Cyber Threat Intelligence made simple for all types of businesses and independent analysts of cybersecurity. Maltiverse Freemium online resource to access aggregated sets of indicators of compromise with full context and history. When you have a cyber security incident and you need context to respond - you can access the database and search for the content manually. You can also connect the customized set of new threats to your Security Systems like SIEM, SOAR, PROXY or Firewall: Ransomware, C&C centers, malicious IP and URLs, Phishing Attacks, Other feeds.
    Starting Price: $100 per month
  • 13
    Isovalent

    Isovalent

    Isovalent

    Isovalent Cilium Enterprise enables cloud-native networking, security, and observability. Your cloud-native infrastructure, powered by eBPF. Connect, secure, and observe cloud-native applications in multi-cluster, multi-cloud environments. A highly scalable CNI and a multi-cluster networking solution that offers high-performance load balancing, advanced network policy management, etc. Shifting security to a process behavior instead of packet header enabling. Open source is at the core of Isovalent. We think, innovate, and breathe open source and are fully committed to the principles and values of open source communities. Request a personalized live demo with an Isovalent Cilium Enterprise expert. Engage with the Isovalent sales team to assess an enterprise-grade deployment of Cilium. Step through our interactive labs in a sandbox environment. Advanced application monitoring. Runtime security, transparent encryption, compliance monitoring, and CI/CD & GitOps integration.
  • 14
    Cyera

    Cyera

    Cyera

    Automatically discover and classify your data, protect it from exposure, and maintain a resilient posture. Data is every business’s most crucial asset, requiring that it be the foundation of any security program. Cyera is a holistic data security platform that empowers security teams to manage and protect all of their company’s sensitive data. Cyera discovers, classifies, and protects data across IaaS, PaaS, and SaaS environments. Whether your sensitive data is in buckets, folders, or files, or managed in a self-managed database, managed database, or DBaaS environment, our solution has you covered. The most advanced data security solution is available on the market. Cyera allows security teams to apply security directly to their data, by overcoming the challenges inherent in traditional data security solutions. Choose a cloud account, tenant, or organization, and we'll automatically uncover the data you have, how it's managed, and how to remediate the security or compliance risks.