Business Software for Splunk Cloud Platform - Page 10

Top Software that integrates with Splunk Cloud Platform as of July 2025 - Page 10

  • 1
    Pavilion HyperOS
    Powering the most performant, dense, scalable, and flexible storage platform in the universe. Pavilion HyperParallel File System™ provides the ability to scale across an unlimited number of Pavilion HyperParallel Flash Arrays™, providing 1.2 TB/s read, and 900 GB/s write bandwidth with 200M IOPS at 25µs latency per rack. Uniquely capable of providing independent, linear scalability of both capacity and performance, the Pavilion HyperOS 3 now provides global namespace support for both NFS and S3, enabling unlimited, linear scale across an unlimited number of Pavilion HyperParallel Flash Array systems. Take advantage of the power of the Pavilion HyperParallel Flash Array to enjoy unrivaled levels of performance and availability. The Pavilion HyperOS includes patent-pending technology to ensure that your data is always available, with performant access that legacy arrays cannot match.
  • 2
    Wallaroo.AI

    Wallaroo.AI

    Wallaroo.AI

    Wallaroo facilitates the last-mile of your machine learning journey, getting ML into your production environment to impact the bottom line, with incredible speed and efficiency. Wallaroo is purpose-built from the ground up to be the easy way to deploy and manage ML in production, unlike Apache Spark, or heavy-weight containers. ML with up to 80% lower cost and easily scale to more data, more models, more complex models. Wallaroo is designed to enable data scientists to quickly and easily deploy their ML models against live data, whether to testing environments, staging, or prod. Wallaroo supports the largest set of machine learning training frameworks possible. You’re free to focus on developing and iterating on your models while letting the platform take care of deployment and inference at speed and scale.
  • 3
    Selector Analytics
    Selector’s software-as-a-service employs machine learning and NLP-driven, self-serve analytics to provide instant access to actionable insights and reduce MTTR by up to 90%. Selector Analytics uses artificial intelligence and machine learning to conduct three essential functions and provide actionable insights to network, cloud, and application operators. Selector Analytics collects any data (including configurations, alerts, metrics, events, and logs), from various heterogeneous data sources. For example, Selector Analytics may harvest data from router logs, device or network metrics, or device configurations. Once collected, Selector Analytics normalizes, filters, clusters, and correlates metrics, events, and alarms using pre-built workflows to draw actionable insights. Selector Analytics then uses machine learning-based data analytics to compare metrics and events and conduct automated anomaly detection.
  • 4
    VIOLIN Maestro OS
    Demanding enterprises worldwide depend on storage that can deliver results. The storage operating system for the next generation is here now with Maestro OS. Valuable enterprise data needs protection with enterprise data services. Meanwhile, the business requires any new storage to be cost-effective. Complex enterprise workloads demand performance that is more than a point solution. VIOLIN's Maestro OS delivers all of this and more. Synchronous replication, WAN-optimized replication, and consistency groups for replication. Snapshots (crash consistent), consistency groups for snapshots, transparent LUN mirroring, and backup app integration. Scale-up to 737.28 TB raw, online expansion of capacity, and online LUN expansion. Start now by connecting with our experts to assess your storage needs. See how the QV-Series works with a quick setup of an online test environment. Partner with the right team to start driving down your total cost of ownership.
  • 5
    InfiniBox

    InfiniBox

    Infinidat

    The InfiniBox® enterprise storage system delivers faster than all-flash performance, multi-petabyte capacity, and 100% availability for a broad range of mixed application workloads. Infinite zero-impact snapshots, dependable active/active, synchronous & asynchronous replication, and flexible, software-defined quality of service come standard, with guaranteed reliability and data security. With InfiniBox, enterprise IT organizations and managed service providers are able to exceed their service level objectives while radically lowering the cost and complexity of their storage operations. Infinidat customers routinely consolidate entire rows of legacy enterprise storage onto a single InfiniBox system, leading to 10:1 reductions in both floor tiles and network port costs. InfiniBox eliminates storage array and filer sprawl, allowing operations and capacity planning teams to leverage the economies of scale of unified data center-scale pools of storage.
  • 6
    Opsera

    Opsera

    Opsera

    You choose your tools, we take care of the rest. Put together the perfect CI/CD stack that fits your organization’s goals with zero vendor lock-in. ‍Eliminate manual scripts and stop building toolchain automation. Free your engineers to focus on your core business. Pipeline workflows follow a declarative model so you focus on what is required — not how it’s accomplished — including: software builds, security scans, unit testing, and deployments. With Blueprints, diagnose any failures from within Opsera using a console output of every step of your pipeline execution. Comprehensive software delivery analytics across your CI/CD process in a unified view — including Lead Time, Change Failure Rate, Deployment Frequency, and Time to Restore. ‍Contextualized logs for faster resolution and improved auditing and compliance.
  • 7
    CnSight

    CnSight

    CnSight

    CnSight® is a lightweight and first of its kind solution designed to help companies better understand and take meaningful steps to improve the health of their cybersecurity business through the use of automated metrics and the ability to tie them to organizational risk. As a leader in your organization, stay informed of the most important cybersecurity metrics and their impact to business risk, readily seeing performance against established goals. Baseline your organization and monitor effectiveness over time as you introduce changes to people, processes, and tools aimed at improving your security posture. Use security performance data to baseline and inform your strategy and roadmap as your program grows in maturity. Effectively communicate cybersecurity posture to the CIO and board.With quick install and setup, you can immediately see your blind spots across your asset inventory and security patching processes.
  • 8
    NVISIONx

    NVISIONx

    NVISIONx

    NVISIONx data risk Intelligence platform enables companies to gain control of their enterprise data to reduce data risks, compliance scopes, and storage costs. Data is growing out of control and getting worse every day. Business and security leaders are overwhelmed and can’t protect what they don’t know. More controls won’t fix the problem. Rich and unlimited analysis to support over 150 business use cases to empower data owners and cyber professionals to proactively manage their data from cradle to grave. First, categorize or group data that is redundant, outdated, or trivial (ROT) and see what data can be defensibly disposed of to reduce the classification scope (and storage costs). Then, contextually classify all remaining data using a number of easy-to-use data analytics techniques to enable the data owner to be their own data analyst! Data identified as useless and unwanted can then go through legal and records retention reviews.
  • 9
    BeyondTrust Cloud Privilege Broker
    Cloud Privilege Broker gives your team the tools to visualize and manage entitlements across the multi-cloud infrastructure. Cloud-agnostic, centralized dashboard with key metrics. Continuous discovery of users, roles, policies, and endpoints across all supported cloud platforms. Granular policy recommendations across IaaS and PaaS platforms from a single interface. BeyondTrust Cloud Privilege Broker (CPB) is an entitlements and permissions management solution that enables customers to visualize and manage cloud access risk in hybrid and multi-cloud environments, all from a single interface. Each cloud service provider has its own access management tools, but they only manage their own environments and do not scale to cover others. This leaves teams to swivel from console to console, attempting to manage permissions separately for each cloud provider, with different ways to apply policy from one platform to the next.
  • 10
    Enso

    Enso

    Enso Security

    Enso is transforming application security by empowering organizations to build, manage and scale their AppSec programs. Its Application Security Posture Management (ASPM) platform easily deploys into an organization’s environment to create an actionable, unified inventory of all application assets, their owners, security posture and associated risk. With Enso Security, AppSec teams gain the capacity to manage the tools, people and processes involved in application security, enabling them to build a simplified, agile and scalable application security program without interfering with development. Enso has been recognized with numerous awards including the 2022 Excellence Awards, Globee Awards, and Forbes Top 20 Cybersecurity Startups to Watch.
  • 11
    Symantec Network Forensics
    Get complete security visibility, advanced network traffic analysis, and real-time threat detection with enriched, full-packet capture. Symantec Security Analytics, the award-winning Network Traffic Analysis (NTA) and forensics solution is now available on a new hardware platform that offers much higher storage density, deployment flexibility, greater scalability, and cost savings. This new model separates the hardware purchase from the software purchase, enabling you to adopt new enterprise licensing that lets you choose how to deploy the solution: on-premises, as a virtual appliance, or in the cloud. With this latest hardware innovation, you can achieve the same performance and greater storage capacity in up to half the rack space footprint. Security teams can deploy anywhere in their organization and expand or contract their deployment as needed, without having to change licenses. Reduced cost and easier adoption.
  • 12
    DigDash

    DigDash

    DigDash

    Every day, your business generates countless data. Used correctly, this data is invaluable. Aggregated together, this strategic information opens up an ocean of opportunities. Expert in business intelligence, DigDash accompanies you through a reliable solution to simply exploit your data and increase your performance today. From design to deployment, from questions of use to development needs, DigDash is by your side for the long term, in a close relationship. In a desire for continuous improvement, flexibility is at the heart of our DNA. Our software stands out for its ease of use at all levels. The solution is recognized as one of the most powerful on the market. Whatever your operational vision, our tool adapts to your business specificities. Thanks to enlightened real-time visibility on all your activities, from marketing to finance, from sales to HR, your managers are able to make rational decisions at the right time.
  • 13
    Intel 471 TITAN
    Cybercriminals never sleep. You need round-the-clock threat intelligence to anticipate and track bad actors’ every move, and how they might attack your business. Our customers rely on TITAN, an intuitive intelligence SaaS platform built by intelligence and security professionals for intelligence and security professionals. It enables them to access structured information, dashboards, timely alerts, and intelligence reporting via the web portal or API integration. But TITAN doesn’t stop there. Use TITAN’s programmable RESTful API to power numerous connectors and integrations, integrating and operationalizing customized intelligence into your security operations. TITAN delivers structured technical and non-technical data and intelligence that is continually updated by our global team and automated processes. With structured data, less noise, and high-fidelity results, you can focus your team on the threats that matter most.
  • 14
    ArmorCode

    ArmorCode

    ArmorCode

    Centralize all AppSec findings (SAST, DAST, SCA, etc) and correlate with infrastructure and cloud security vulnerabilities to get a 360o view of you application security posture. Normalize, de-dup and correlate findings to improve risk mitigation efficiency and prioritize the findings that impact the business. A single source of truth for findings and remediations from across tools, teams and applications. AppSecOps is the process of identifying, prioritizing, remediating and preventing Security breaches, vulnerabilities and risks - fully integrated with existing DevSecOps workflows, teams and tools ‍‍ An AppSecOps platform enables security teams to scale their ability to successfully identify, remediate and prevent high-priority application level security, vulnerability, and compliance issues, as well as identify and eliminate coverage gaps.
  • 15
    LONI

    LONI

    LONI

    Take action instantly from anywhere. Real-time vendor-agnostic network management tool for your existing network, security, & cloud infrastructure with the power of true ZeroCode automation. Unified management, automation, intelligence, and operations for your security, cloud, network, and IOT infrastructure. Single source of truth for actionable data. Manage any device with an IP address. Automate any task in your IT infrastructure without writing a single line of code. Let infrastructure engineers focus on infrastructure and let LONI focus on code. Never restore a configuration or device from scratch again with our rollback feature. The power to leverage your smartphone, tablet, or smartwatch for the automation and management of your network, cloud, or IoT infrastructure. Instantly mitigate any cyber attack from your smartphone, tablet, or smartwatch. Automate and manage your security infrastructure with the power of mobile.
  • 16
    Procyon

    Procyon

    Procyon

    Get frictionless, secure access to cloud infrastructure. Get passwordless access to major cloud platforms and thousands of cloud resources. We work seamlessly with AWS, GCP, Azure, and other cloud-native tools. Stop overprivileged access with just-in-time access for developers. DevOps users can request access to cloud resources with ‘just enough privileges’ to get timebound access to resources. Eliminate productivity bottlenecks of a centralized administrator. Configure approval policies based on a variety of factors. View a catalog of granted and unaccessed resources. Stop credential sprawl and worrying about credential theft. Developers can get passwordless access to cloud resources using Trusted Platform Module (TPM) based technology. Discover potential vulnerabilities now with our free assessment tool and understand how Procyon can help solve the problem in a matter of hours. Leverage TPM to strongly identify users and devices.
  • 17
    Sentra

    Sentra

    Sentra

    Strengthen your cloud data security posture without slowing down your business. Sentra’s agentless solution is able to discover and scan cloud data stores to find sensitive data without any impact on performance. Sentra's data-centric approach is focused on securing your company's most valuable data. Automatically detect all managed and unmanaged cloud-native data stores. Sentra uses both existing and custom data recognition tools to identify sensitive cloud data. By leveraging data scanning technologies that are based on smart metadata clustering and data sampling, users can reduce cloud costs by three orders of magnitude compared to existing solutions. Sentra’s API-first and extensible classification easily integrates with your existing data catalogs and security tools. Assess the risk to your data stores by looking both at compliance requirements and your security posture. Sentra also integrates with your existing security tools, so you always have the full context.
  • 18
    VirtualArmour

    VirtualArmour

    VirtualArmour

    We’re here to help you navigate your cybersecurity journey. Since 2001, we’ve ensured a strong cybersecurity posture for every client through threat resolution and security recommendations in the pursuit of zero cyber risk. When people, processes, and technology work together, we can better protect our digital way of life. Resolve and remediate cybersecurity threats through full-cycle management. Actionable intelligence provides valuable insight for improving your cybersecurity posture. A single platform to unify your entire security stack. Detection, investigation, and resolution of your security alerts. Team of cybersecurity experts that bolster your existing security team or supplement light IT staff. Support and monitoring of your firewall and overall security. Prevention and visibility to protect you from a breach. Evaluation of your infrastructure for vulnerabilities and security gaps.
  • 19
    Revelstoke

    Revelstoke

    Revelstoke

    Rock your SOC with the first universal, low-code, high-speed security automation platform with case management built in. Revelstoke uses a single, universal data model that normalizes input and output data to allow for fast integration of any security product, and it’s future-proof. Our UI is based on the Kanban-style workflow. Grab a card, drag it into place, drop it where you want, and boom, the automation works. You can track and monitor case actions, timeline information, and workflow actions, all from the case management dashboard. IR is at your fingertips. Measure and report on the business impact of security automation, prove the value of the investment and show what your team is worth. Revelstoke radically simplifies security orchestration, automation, and response (SOAR), so security teams can work faster, smarter, and more effectively. With a low-code, drag-and-drop interface, dozens of built-in integrations, and incredible visibility into performance metrics.
  • 20
    OpsMx Enterprise for Spinnaker
    OES is highly available and scalable for increasing deployment workloads, and extensible to integrate with multiple SDLC tool chains. OES offers easy-to-define custom stages to parallely deploy into any number of targets and save time. Action such as rollback or roll forward or stopping of all the parallel deployments is easy and can be done with a click. Automate repeated activities in your SDLC process by the ability to create as many child pipelines and invoke them in the parent pipeline. OES is modular and can act as a central CD tool for many enterprises because it uses an API-based architecture. Developers across the team can easily integrate external services with Spinnaker services for deployment orchestration.
  • 21
    Google Digital Risk Protection
    Learn what a digital risk protection solution is and how it can help you be better prepared by understanding who is targeting you, what they’re after, and how they plan to compromise you. Google Digital Risk Protection delivers a broad digital risk protection solution either via stand-alone self-managed SaaS products or a comprehensive service. Both options give security professionals visibility outside their organization, the ability to identify high-risk attack vectors, malicious orchestration from the deep and dark web, and attack campaigns on the open web.  The Google Digital Risk Protection solution also provides contextual information on threat actors and their tactics, techniques, and procedures to provide a more secure cyber threat profile. Gain visibility into risk factors impacting the extended enterprise and supply chain by mapping your attack surface and monitoring deep and dark web activity.
  • 22
    ShadowPlex

    ShadowPlex

    Acalvio Technologies

    Organizations are turning to active defense solutions based on advanced deception because they are low-risk to deploy and avoid the false-positive issues of alternative approaches. Acalvio’s offering, ShadowPlex, has been architected to set a new standard for APT, ransomware, and malware mitigation, ShadowPlex centralizes the process. In the case of decoys (fake hosts or honeypots) they are hosted in a single area and then are strategically projected across the enterprise network, where they appear as realistic local assets. Furthermore, we change the complexity of a decoy on the fly in response to attacker engagement. This unique method of resource efficiency allows ShadowPlex to deliver both high-scale and depth of decoy realism. ShadowPlex automates and simplifies the configuration and deployment of deception objects. Combining pre-defined playbooks with an AI-based recommendation engine, the system self-generates and places the appropriate deception objects.
  • 23
    Blink

    Blink

    Blink Ops

    Blink is an ROI force multiplier for security teams and business leaders looking to quickly and easily secure a wide variety of use cases. Get full visibility and coverage of alerts across your organization and security stack. Utilize automated flows to reduce noise and false positives in alerts. Scan for attacks and proactively identify insider threats and vulnerabilities. Create automated workflows that add relevant context, streamline communications, and reduce MTTR. Take action on alerts and improve your cloud security posture with no-code automation and generative AI. Shift-left access requests, streamline approvals flows, and unblock developers while keeping your applications secure. Continuously monitor your application for SOC2, ISO, GDPR, or other compliance checks and enforce controls.
  • 24
    Pellonium

    Pellonium

    Pellonium

    Continuous cyber risk quantification, evaluation & business impact analysis based on what's actually happening in your organization. Prioritized tactics tailored to your environment & thresholds to reduce cyber risk exposure & increase security ROI. Automated compliance & controls management that leverage adaptable frameworks to significantly improve regulatory & internal oversight obligations. Shift from simply identifying what's wrong to why it actually matters & have data-driven confidence to ruthlessly protect investments & strategic goals. provides meaningful, actionable, and defensible insights to help security teams & executives answer the most urgent questions.
  • 25
    Admin By Request

    Admin By Request

    Admin By Request

    With rapid provisioning of Just-In-Time privilege elevation across your entire workforce. On-board and manage workstations and servers via a user-friendly portal. To reveal risky users and assets through thread and behavioral analytics to identify malicious software and prevent data breaches and malware attacks. By elevating applications - not users. Delegate privileges based on the user or groups to save time and monetary resources. Whether a developer in the IT department, a tech newbie in HR, or a third-party consultant needing to service one of your endpoints, there's a method of elevation appropriate for every user. All features come out-of-the-box with Admin By Request and can be tailored to the needs of individual users or groups.
  • 26
    SURF Security

    SURF Security

    SURF Security

    Create a security air gap, reduce your attack surface and isolate your business from internal and external exploits, while streamlining SaaS apps and accessing your data. Grants access based on the identity of the users and their devices to any SaaS or on-prem apps. Isolated work environment from device and web threats locally on the endpoint, by encrypting, sandboxing and rendering content. Enforcing enterprise browser security policies like DLP, web filtering, phishing protection, extension management and more. SURF brings Zero-Trust principles to the user via the browser, protecting everyone and everything in the enterprise regardless of role. By configuring only a few policies, IT and security teams can significantly reduce the attack surface. Discover the benefits of utilizing SURF from an Information technology perspective.
  • 27
    Longbow

    Longbow

    Longbow

    Longbow automates the analysis and correlation of issues from Application Security Testing (AST) tools, closing the gap between security teams and remediation teams and providing the best next actions to reduce the most risk with the least amount of investment. Longbow stands at the forefront of automatically analyzing and prioritizing security issues and remediation, from AST tools to VM, CNAPP tools, and more. Our product excels in identifying and addressing the root causes of security issues, offering tailored remediation solutions that can be immediately actioned. This capability is crucial in an industry inundated with disparate vendor ecosystems and a lack of clear direction for addressing security concerns. Our product is designed to empower security, application, and DevOps teams, enabling them to efficiently mitigate risks at scale. We seamlessly integrate, normalize, and unify cross-service contexts across all of your cloud security tools.
  • 28
    Mindflow

    Mindflow

    Mindflow

    Embrace hyper-automation at scale with intuitive no-code & AI-generated flows. Access every tool you need through the most extensive integration library ever provided. Pick the service you want from the Integrations library and automate your way. Onboard and build your first workflows in minutes. Use pre-built templates if you need them, help yourself with the AI assistant, or benefit from the Mindflow excellence center. Type your input in plain-language text and let Mindflow do the rest. Generate workflows adapted to your tech stack from any input. Create AI-generated workflows to help you address any use case and reduce the building time to the minimum. Mindflow redefines enterprise automation, offering an extensive catalog of integrations. Add any new tool to our platform within minutes, breaking the barriers of traditional integration. Connect and orchestrate your tech stack, no matter the tools you use.
  • 29
    Filigran

    Filigran

    Filigran

    Embrace a proactive approach with end-to-end cyber threat management, from anticipation to response. Tailored to elevate cybersecurity through comprehensive threat intelligence, advanced adversary simulation, and strategic cyber risk management solutions. Get a holistic view of your threat environment and improved decision-making for faster incident response. Organize your cyber threat intelligence knowledge to enhance and disseminate actionable insights. Access consolidated view of threat data from multiple sources. Transform raw data into actionable insights. Enhance sharing and actionable insights dissemination across teams and tools. Streamline incident response with powerful case management capabilities. Create dynamic attack scenarios, ensuring accurate, timely, and effective response during real-world incidents. Build both simple and intricate scenarios tailored to various industry needs. Improve team dynamics with instant feedback on responses.
  • 30
    BREVIAN

    BREVIAN

    BREVIAN

    AI agent that understands data from your ticketing systems, CRMs, knowledge bases and release notes, and assists your support teams to resolve tickets faster. Automate routing tickets to the right team based on ticket content. Go from reactive support to proactive support by detecting emerging issues earlier. Categorize tickets into common topics and trends, and improve knowledge bases to reduce ticket volume. BREVIAN AI agents have security and safety built-in, so you don’t need to integrate different products to be enterprise-ready. Implement consistent controls independent of your data and models. Business teams can even combine different agents to build an intelligent network across their enterprise data. Knowledge extraction for structured and unstructured data including images.