Business Software for Splunk Cloud Platform - Page 2

Top Software that integrates with Splunk Cloud Platform as of July 2025 - Page 2

  • 1
    EV Service Manager
    IT has an opportunity to support digital transformation across the enterprise, and an integrated cloud based IT Service Management (ITSM) software tool is paramount to success. In contrast to the old, complex, or simple-but-not-sophisticated service desk solutions, EV Service Manager is a versatile, powerful, and easy way to manage service delivery for your organization. Our Service Manager platform supports even the most complex requirements, while bringing a new level of simplicity, agility, and mobility required to make cloud based IT Service Management (ITSM) software easy to use and easy to deliver. Improve your IT maturity with Service Manager's robust automation engine that includes out-of-box support for the entire ITIL lifecycle, including PinkVerified processes. Our adaptable and smart interface includes the ability to integrate portals, dashboards, and 3rd party apps allowing you to deliver a user experience that provides access to everything important.
  • 2
    CyberArk Privileged Access Manager
    Keep your business safe by preventing the malicious use of privileged accounts and credentials – a common path to an organization’s most valuable assets. The CyberArk PAM as a Service solution leverages leading automation technologies to protect your business as it grows. Attackers never stop seeking ways in. Manage privileged access to minimize risk. Prevent credential exposure and keep critical assets from falling into the wrong hands. Maintain compliance with recorded key events and tamper-resistant audits. Privileged Access Manager easily integrates with a host of applications, platforms and automation tools.
  • 3
    ManageEngine AlarmsOne
    AlarmsOne from ManageEngine is an all-in-one alert management solution that allows users to manage alerts from all their IT management tools. AlarmsOne easily integrates with several on-premise and SaaS-based IT infrastructure monitoring systems. With AlarmsOne, users can centralize their IT alarms by creating an account and install the Alarm Poller on the server. AlarmsOne also features real-time alerts and multi-channel notifications for quick responses.
    Starting Price: $15.00/month/user
  • 4
    AlertOps

    AlertOps

    AlertOps

    AlertOps is software that enables an organization to take control of incidents and automate actions that reduce cost, protect revenue and improve the customer experience. AlertOps is a SaaS-based, Alerting & Real-Time Platform that helps ITOps, DevOps, SecOps, HybridOps, BusinessOps, IndustrialOps and Support teams respond to business-critical incidents better and faster.   With AlertOps you get: ✓ Total Flexibility, no compromises. ✓ End-to-end Workflow Automation. ✓ Full Stack Incident Visibility ✓ Expert Guidance, on-demand. Visit us at: alertops.com and schedule a personalized demo. We will be happy to discuss your use case and show you why, many of the world’s largest companies leverage AlertOps to respond more rapidly, outmaneuver their competitors and win when moments matter.
    Starting Price: $0.00/month/user
  • 5
    Teramind

    Teramind

    Teramind

    Teramind provides a user-centric security approach to monitoring your employees’ digital behavior. Our software streamlines employee data collection in order to identify suspicious activity, improve employee productivity, detect possible threats, monitor employee efficiency, and ensure industry compliance. We help reduce security incidents using highly customizable Smart Rules that can alert, block or lockout users when rule violations are detected, to keep your business running securely and efficiently. Our live & recorded screen monitoring lets you see user actions as they’re happening or after they’ve occurred with video-quality session recordings that can be used to review a security or compliance event, or to analyze productivity behaviors. Teramind can be installed in minutes and can be deployed either without employees knowing or with full transparency and employee control to maintain trust.
    Starting Price: $12/month/user
  • 6
    Dotcom-Monitor

    Dotcom-Monitor

    Dotcom-Monitor

    Website monitoring and performance testing solutions. Combined with powerful monitoring features such as real-time dashboards and performance reporting options, and nearly 30 global monitoring network locations, you can quickly identify where performance issues are occurring. Quickly and easily record custom scripts to monitor interactive websites and web application elements and user scenarios with the EveryStep Web Recorder. Dotcom-Monitor makes it easy to ensure performance, functionality, and uptime of the most complex websites, web applications, and web services.
    Starting Price: $19.99/month
  • 7
    Litmus Edge
    A hardware agnostic, Industrial Data Platform that allows manufacturing companies to do more with their data. Industrial data infrastructure can be complex – and legacy systems and daisy-chained solutions don’t make it any easier. Putting data to work at scale is an added challenge. Doing it securely is even harder. So, here's a full-stack platform to solve industrial connectivity, data collection and processing, edge analytics, application marketplace, data integration, and beyond. Now try our product for free. 15 days of free trial to check all the features, free access to our documentation, how to guides, along with access to our experts. Wanted a fully loaded hosted instance for a starter node? Just let us know.
    Starting Price: 15000/5k data points/site
  • 8
    Box Shield
    Shield lets you classify content your way, both manually and automatically. We're excited to announce our powerful, native capability that identifies PII and custom terms within files, and automatically classifies them based on your policies — helping you protect your data at scale. Placing controls close to your content helps prevent leaks in real time, while powering a frictionless end-user experience. Configure access policies within minutes to keep your data secure while letting people do their mission-critical work. Using machine learning, Shield brings you timely, accurate alerts on insider threats, account compromise, and malware attacks. Quickly evaluate alerts in Shield, or send them to your existing tools for further analysis. Shield works with the best-of-breed security tools you already have in place. Alerts containing more insights than ever before can be integrated with your SIEM and CASB for a unified view.
    Starting Price: $130 per month
  • 9
    Edge Delta

    Edge Delta

    Edge Delta

    Edge Delta is a new way to do observability that helps developers and operations teams monitor datasets and create telemetry pipelines. We process your log data as it's created and give you the freedom to route it anywhere. Our primary differentiator is our distributed architecture. We are the only observability provider that pushes data processing upstream to the infrastructure level, enabling users to process their logs and metrics as soon as they’re created at the source. We combine our distributed approach with a column-oriented backend to help users store and analyze massive data volumes without impacting performance or cost. By using Edge Delta, customers can reduce observability costs without sacrificing visibility. Additionally, they can surface insights and trigger alerts before data leaves their environment.
    Starting Price: $0.20 per GB
  • 10
    Validato

    Validato

    Validato

    Validato allows IT and Security teams to test the effectiveness of security controls by simulating adversarial behaviors based on known threat scenarios. Validato provides unbiased data and finding on how effective security controls are at detecting and protecting against exploitation of MITRE ATT&CK Techniques. If you are looking to implement a Threat-Informed Defense approach to cyber defense, then Validato is an excellent choice for you.
    Starting Price: $10,000/year
  • 11
    Contrast Security

    Contrast Security

    Contrast Security

    Modern software development must match the speed of the business. But the modern AppSec tool soup lacks integration and creates complexity that slows software development life cycles. Contrast simplifies the complexity that impedes today’s development teams. Legacy AppSec employs a one-size-fits-all vulnerability detection and remediation approach that is inefficient and costly. Contrast automatically applies the best analysis and remediation technique, dramatically improving efficiencies and efficacy. Separate AppSec tools create silos that obfuscate the gathering of actionable intelligence across the application attack surface. Contrast delivers centralized observability that is critical to managing risks and capitalizing on operational efficiencies, both for security and development teams. Contrast Scan is pipeline native and delivers the speed, accuracy, and integration demanded by modern software development.
    Starting Price: $0
  • 12
    Panoptica
    Panoptica makes it easy to secure your containers, APIs, and serverless functions, and manage software bills of materials. It analyzes internal and external APIs and assigns risk scores. Your policies govern which API calls the gateway permits or disables. New cloud-native architectures allow teams to develop and deploy software more quickly, keeping up with the pace of today’s market. But this speed can come with a cost—security. Panoptica closes the gaps by integrating automated, policy-based security and visibility into every stage of the software-development lifecycle. Decentralized cloud-native architectures have significantly increased the number of attack surfaces. At the same time, changes in the computing landscape have raised the risk of catastrophic security breaches. Here are some of the reasons why comprehensive security is more important than ever before. You need a platform that protects the entire application lifecycle—from development to runtime.
    Starting Price: $0
  • 13
    DNSSense

    DNSSense

    DNSSense

    DNSEye detects malicious traffic on your network and reports whether this traffic can be blocked by your other security devices. DNS is used by all protocols like HTTP, HTTPS, SMTP, and IoT. DNS traffic provides information about your entire network, regardless of its network protocol. With DNS tunnelling, data exfiltration attacks cannot be detected by DLP products. It requires DNS log analysis for an effective solution. 80% of malware domains currently do not have an IP address. Malware requests that do not have an IP address can only be detected in the DNS log. DNSservers generate a large number of difficult-to-understand logs. DNSEye enables the collection, enrichment, and AI-based classification of the DNS logs. With its advanced SIEM integration, it saves time and EPS by transferring to SIEM only the data that SOC teams need to see. DNSEye can collect logs from many different brands and models of DNS servers without the need for making any change in your network structure.
    Starting Price: $1000
  • 14
    HaloCRM

    HaloCRM

    HaloCRM

    HaloCRM is omnichannel customer service software, designed for teams looking to drive greater efficiency when handling customer inquiries. HaloCRM offers an intuitive platform for customer-facing teams to manage conversations from any channel. The platform will ingest customer conversations from Twitter, Facebook, Facebook Messenger, email, SMS, chat, phone calls, and more, eliminating the possibility of missed inquiries, and improving customer satisfaction by opening more channels of communication. HaloCRM lets you provide support anywhere, keeping customers happy and connected through email, text, chat, voice, and more. With powerful out-of-the-box workflows and easy drag-and-drop configuration, HaloCRM can handle it all. HaloCRM will make it easier to prioritize and respond to customers with one unified support desk, complete with customer context built-in to facilitate better conversation tracking.
    Starting Price: £59 per user per month
  • 15
    QSE

    QSE

    QSE Group

    QSE Group delivers quantum-resilient cybersecurity solutions designed to protect sensitive data from both current and future threats, including quantum computing. Using post-quantum cryptographic algorithms aligned with NIST standards, QSE secures data through encryption, key management, and secure communications. Built with an API-first design, it integrates easily into existing cloud, on-prem, or hybrid environments. Core features include secure entropy generation, zero trust policy enforcement, and compatibility with identity systems and SIEM tools. QSE also supports white-label deployment for SaaS vendors and MSPs. With real-time monitoring, compliance-ready reporting, and applications across finance, healthcare, legal, and government sectors, QSE enables future-proof protection without disrupting current infrastructure. It's a practical, scalable solution for organizations serious about long-term data security.
    Starting Price: $19.90/month
  • 16
    Workato

    Workato

    Workato

    Workato is the operating system for today’s fast-moving business. Recognized as a leader by both Gartner and Forrester, it is the only AI-based middleware platform that enables both business and IT to integrate their apps and automate complex business workflows with security and governance. Given the massive and growing fragmentation of data, apps, and business processes in enterprises today, our mission is to help companies integrate and automate at least 10 times faster than traditional tools and at a tenth of the cost of ownership. We believe Integration is a mission-critical, neutral technology for the dynamic and heterogeneous IT environments of today. We are the only technology vendor backed by all 3 of the top SaaS vendors: Salesforce, Workday, and ServiceNow. Trusted by world's top brands as well as its fastest-growing innovators, we are most appreciative of the fact that customers recognize us as being among the best companies to do business with.
    Starting Price: $10,000 per feature per year
  • 17
    7SIGNAL

    7SIGNAL

    7SIGNAL

    For organizations that rely on mission critical Wi-Fi to conduct business, 7SIGNAL is a cloud-based Wireless Network Monitoring (WNM) platform that continuously tests the wireless network for performance issues – maximizing network uptime, device connectivity and network ROI. Unlike other providers, who monitor the network from the inside-out at the infrastructure level, 7SIGNAL operates on the networks edge, monitoring the “air” and capturing the user experience on the client device. Modules Sapphire Eye is a state-of-the-art Wi-Fi sensor developed and patented by 7SIGNAL. Sapphire Eye hardware sensors are installed on-site and are uniquely designed to measure wireless network service quality remotely using cloud-based software. Mobile Eye is a Software as a Service (SaaS) application developed and patented by 7SIGNAL. Mobile Eye is installed on the end user’s wireless device and empowers organizations to continuously monitor the wireless network from the end point.
  • 18
    Datameer

    Datameer

    Datameer

    Datameer revolutionizes data transformation with a low-code approach, trusted by top global enterprises. Craft, transform, and publish data seamlessly with no code and SQL, simplifying complex data engineering tasks. Empower your data teams to make informed decisions confidently while saving costs and ensuring responsible self-service analytics. Speed up your analytics workflow by transforming datasets to answer ad-hoc questions and support operational dashboards. Empower everyone on your team with our SQL or Drag-and-Drop to transform your data in an intuitive and collaborative workspace. And best of all, everything happens in Snowflake. Datameer is designed and optimized for Snowflake to reduce data movement and increase platform adoption. Some of the problems Datameer solves: - Analytics is not accessible - Drowning in backlog - Long development
  • 19
    Axonius

    Axonius

    Axonius

    Axonius gives customers the confidence to control complexity by providing a system of record for all digital infrastructure. With a comprehensive understanding of all assets including devices, identities, software, SaaS applications, vulnerabilities, security controls, and the context between all assets, customers are able to mitigate threats, navigate risk, decrease incident response time, automate action, and inform business-level strategy — all while eliminating manual, repetitive tasks. Recognized as creators of the Cyber Asset Attack Surface Management (CAASM) category and innovators in SaaS Management Platform (SMP) and SaaS Security Posture Management (SSPM), Axonius is deployed in minutes and integrates with hundreds of data sources to provide a comprehensive asset inventory, uncover gaps, and automatically enforce policies and automate action.
  • 20
    Barracuda WAF-as-a-Service
    Configuring traditional web application firewalls can take days of effort. But Barracuda WAF-as-a-Service—a full-featured, cloud-delivered application security service—breaks the mold. Deploy it, configure it, and put it into full production—protecting all your apps from all the threats—in just minutes.
  • 21
    IBM StreamSets
    IBM® StreamSets enables users to create and manage smart streaming data pipelines through an intuitive graphical interface, facilitating seamless data integration across hybrid and multicloud environments. This is why leading global companies rely on IBM StreamSets to support millions of data pipelines for modern analytics, intelligent applications and hybrid integration. Decrease data staleness and enable real-time data at scale—handling millions of records of data, across thousands of pipelines within seconds. Insulate data pipelines from change and unexpected shifts with drag-and-drop, prebuilt processors designed to automatically identify and adapt to data drift. Create streaming pipelines to ingest structured, semistructured or unstructured data and deliver it to a wide range of destinations.
    Starting Price: $1000 per month
  • 22
    CyCognito

    CyCognito

    CyCognito

    Expose all the hidden security gaps in your organization using nation-state grade technology. CyCognito’s Global Bot Network uses attacker-like reconnaissance techniques to scan, discover and fingerprint billions of digital assets all over the world. No input or configuration needed. Uncover the unknown. The Discovery Engine uses graph data modeling to map your organization’s full attack surface. You get a clear view of every single asset an attacker could reach — what they are and how they relate to your business. Using CyCognito’s proprietary risk-detection methods, the attack simulator identifies risks per asset and discovers potential attack vectors. It doesn’t affect business operations and works without deployment, configuration or whitelisting. CyCognito scores each risk based its attractiveness to attackers and impact on the business, dramatically reducing the thousands of attack vectors organizations may have to those critical few dozen that need your focus
    Starting Price: $11/asset/month
  • 23
    SOC Prime Platform
    SOC Prime operates the world’s largest and most advanced platform for collective cyber defense that cultivates collaboration from a global cybersecurity community and curates the most up-to-date Sigma rules compatible with over 28 SIEM, EDR, and XDR platforms. SOC Prime’s innovation, backed by the vendor-agnostic and zero-trust cybersecurity approach, and cutting-edge technology leveraging Sigma language and MITRE ATT&CK® as core pillars are recognized by the independent research companies, credited by the leading SIEM, XDR & MDR vendors, and trusted by 8,000+ organizations from 155 countries, including 42% of Fortune 100, 21% of Forbes Global 2000, 90+ public sector institutions, and 300+ MSSP and MDR providers. Driven by its advanced cybersecurity solutions, Threat Detection Marketplace, Uncoder AI, and Attack Detective, SOC Prime enables organizations to risk-optimize their cybersecurity posture while improving the ROI of their SOC investments.
  • 24
    ShadowKat

    ShadowKat

    3wSecurity

    ShadowKat is a platform that helps organizations to manage their external attack surface. Benefits include: Internet facing asset management Expose cybersecurity risks Find problems before hackers do Automation of the security testing process Detect changes as they occur ShadowKat is an attack external surface management software designed to help cybersecurity managers maintain a stronger compliance lifecycle, continually monitor security risks, and identify various organizations assets such as webpages, networks, ASN’s, IP Addresses, open ports and more. ShadowKat helps security managers reduce the time vulnerabilities exist and reduce the size of their organization’s internet facing attack surface. Key features of ShadowKat include change monitoring, risk-based alerts, reduce vulnerabilities, and manage compliance requirements.
  • 25
    VaultCore

    VaultCore

    Fornetix

    Fornetix® delivers VaultCore™, a highly scalable, next-generation, patented enterprise key management solution built to fully enable encryption to protect your data by seamlessly integrating with existing platforms, automating policy, and empowering administrators with an organized, centralized control that is easily exercised across all environments. Request a demo and experience VaultCore's: - Rapid, seamless integration with existing technology - Separation of Duties (a best practice) - Centralized Control of policy through powerful automation - Strengthened security of data at rest, in motion and in use - Drastic reduction in costs associated with data breaches — lost business, recovery time, reputation damage - Simplified compliance and regulatory enforcement - Scalable to over 100 million keys (more than enough to meet any industry's or government's needs) - Reporting abilities to meet compliance needs - Ease of use
    Starting Price: $1,118 per year
  • 26
    Alibaba Cloud SSL Certificates Service
    Alibaba Cloud SSL Certificates Service allows customers to directly apply, purchase and manage SSL certificates on Alibaba Cloud. This service is offered in cooperation with qualified certificate authorities. From this platform, customers can select the expected certificate authority and its certificate products to enjoy full-site HTTPS security solutions. Manage digital certificates on a unified platform for optimal cost efficiency. Supports all mainstream Linux and Windows operating systems, Alibaba Cloud network, VPC, hybrid cloud, and conventional IDC environments. Implement full-site HTTPS at minimum cost with one single platform to manage a number of digital certificates that can be applied to multiple Alibaba Cloud services. View certificates used by various cloud businesses and manage your own certificate orders on a unified platform.
    Starting Price: $199 per year
  • 27
    Alibaba Cloud ARMS
    Build business monitoring capabilities with real-time response based on frontend monitoring, application monitoring, and custom business monitoring capabilities. Application Real-Time Monitoring Service (ARMS) is an end-to-end Alibaba Cloud monitoring service for Application Performance Management (APM). You can quickly develop real-time business monitoring capabilities using the frontend monitoring, application monitoring, and custom monitoring features provided by ARMS. Implements APM performance and anomaly monitoring in distributed applications, based on tracing information. Reflects user webpage browsing behavior in real time using dimensions such as geological regions, ISPs, and URLs. Allows you to create real-time monitoring alarms and dashboards based on your business needs. Integrates custom monitoring, frontend monitoring, and application monitoring into a centralized alarm and report platform.
    Starting Price: $145 per six months
  • 28
    IRONSCALES

    IRONSCALES

    IRONSCALES

    IRONSCALES Fights Phishing For You Our self-learning, AI-driven email security platform continuously detects and remediates advanced threats like BEC, credential harvesting, account takeover and more in your company’s mailboxes. FAST! Not All Email Security Solutions are Equal Defending against today’s advanced threats requires a new approach to email security. IRONSCALES’ best-in-class email security platform is powered by AI, enhanced by thousands of customer security teams and is built to detect and remove threats in the inbox. We offer a service that is fast to deploy, easy to operate and is unparalleled in the ability to stop all types of email threats, including advanced attacks like BEC, ATO and more.
    Starting Price: $4.50 per user per month
  • 29
    Alibaba Cloud Anti-Bot Service
    Anti-Bot Service provides comprehensive bot defense for Web applications, HTML5 websites, mobile apps, and APIs. It can effectively reduce the risks caused by specific vulnerabilities. You can use Anti-Bot Service in the following scenarios: flight seating occupancy, online scalping, user enumeration, and core API exploitation. Anti-Bot Service is a reverse proxy technology based SaaS solution that allows you to specify custom protection policies to identify and control malicious traffic. You can also view the protection status in the console. Provides comprehensive anti-bot protection that covers the Web, mobile apps, and APIs. Get protection with simple access configurations, no code change required on the server side. Provides large amounts of security threat information on the cloud and timely updates protection policies against attacks. Identifies and filters malicious traffic without affecting the user experience.
    Starting Price: $707.55 per month
  • 30
    BlueFletch

    BlueFletch

    BlueFletch

    Advanced enterprise-grade security tools for employee Android devices. BlueFletch's Enterprise Mobile Security (EMS) software helps organizations secure, support, and manage their enterprise mobile Android devices. Our Atlanta-based team of software engineers, project managers, UX designers, business analysts, and QA helps clients move fast and solve business problems through the use of mobile technology. We’ve learned a thing or two over the past 10+ years in enterprise mobility, successfully creating and deploying solutions for some of the world’s top companies. From concept to delivery, we know the best practices and constraints of custom app development and legacy migrations. We’ve even built products to fill the gaps where other management tools fall apart. We are reliable, responsive, agile, and can help execute against your roadmap faster and more cost effectively. Our team is here to help solve your unique mobility challenges and empower your workforce.
    Starting Price: $17 per device