Business Software for Splunk Cloud Platform - Page 6

Top Software that integrates with Splunk Cloud Platform as of July 2025 - Page 6

  • 1
    BMC Middleware Management
    BMC middleware management software provides real-time monitoring and administration for messaging-oriented middleware environments including IBM® MQ, Integration Bus (IIB), App Connect Enterprise (ACE), Apache ActiveMQ, and DataPower and TIBCO Enterprise Message Service (EMS). Automate alerts and gain insight into a wide array of middleware technologies with a single, intuitive solution. MainView Middleware Monitor securely provides real-time monitoring and automatic notification of potential problems to ensure an optimally performing middleware layer. Analyze historical data to identify patterns, predict trends, and solve reoccurring problems. Maximize application availability and mitigate risk with proactive problem detection and automated resolutions. Improve productivity and efficiency for managing, administering, and troubleshooting with flexible dashboards for infrastructure and application views.
  • 2
    Barracuda PST Enterprise
    PST files are often used by end-users as personal email archives. As a result, they are typically scattered widely across end-user devices and network storage, which makes them notoriously difficult to discover and manage consistently or effectively. Thanks to improvements to Microsoft Exchange and Office 365, your users no longer need to store data locally within PST files. However, legacy PST files still contain important data that you need to bring back under control. Barracuda PST Enterprise is designed specifically to help you address this challenge. You may have many terabytes of data stored in PST files located on end-user devices and on network servers. And these files are notoriously unreliable, since they are often corrupted and easily misplaced. The costs associated with storing, securing, and managing these large files, in terms of both system resources and IT administrative overhead, are significant.
  • 3
    ExoSense

    ExoSense

    Exosite

    Everything you need to get mission-critical insight into your high-value assets. ExoSense® is a ready-to-deploy condition monitoring application that provides operational insight into industrial assets, systems, and equipment. A simple configuration environment lets you customize branding, themes, user hierarchies, roles, and more without writing a line of code. Deploy the application in under an hour, connect ready-made devices in a day, and have a solution in customers’ hands within a week. No huge up-front costs, lengthy development times, or in-house DevOps team required, so IoT is more feasible and cost-efficient. ExoSense is built on Murano, an IoT platform that offers the security, scalability, and business-system integrations required for enterprise IoT solutions. Leverage ExoSense to monitor equipment status and performance, manage user and asset groups, build tailored insights and dashboards, and customize alerts and notifications.
    Starting Price: $200 per month
  • 4
    Sendmail

    Sendmail

    Proofpoint

    The sendmail Sentrion platform is specifically designed for large, complex environments, but we make a subset of that solution available as an open-source offering. Sentrion is not for everyone, but if you are using open source email for a large complex environment and need an enterprise platform that will enable your messaging roadmap for years to come (virtualization, consolidation, cloud migration, etc.). The Domain Keys Identified Mail (DKIM) Internet standard enables email senders to digitally sign their messages so that receivers can verify that those messages have not been forged. The DKIM sender authentication scheme allows the recipient of a message to confirm a message originated with the sender’s domain and that the message content has not been altered. A cryptography-based solution, DKIM provides businesses an industry-standard method for mitigating email fraud and protecting an organization’s brand and reputation at a relatively low implementation cost.
  • 5
    Data443 Global Privacy Manager
    We make it possible for retailers to champion their customers’ privacy rights while maintaining conversion and simplifying SAR processing. Make your privacy settings the new standard for user experience and customer service. Give your customers clear access to easy-to-understand settings. Give customers a one-stop location for all their privacy needs. Provide clear, accurate explanations of the data you collect and how it is used. Earn increased trust in return. All-or-nothing consent doesn’t benefit you or your customers. Allowing customers to opt-in or out of specific data collection gives them more control and improves your conversion rates. Provide an easy-to-understand report that allows customers to see what data you’ve collected, how it’s being used, and that it’s being protected properly. Enhance your customers’ privacy experience with rapid responses to Subject Access Requests (SARs) while simplifying processing for your team.
    Starting Price: $225 per month
  • 6
    IRI CellShield
    IRI CellShield® protects the sensitive information in your Microsoft Excel® spreadsheets, allowing you to comply with data privacy laws. Point-and-click to protect your columns with reversible and non-reversible masking functions. CellShield keeps your data secure, whether it's in one sheet or a million. Use multiple search methods to find and report on PII across the LAN, and protect it all at once. Classify and mask it in intuitive graphical dialogs. CellShield's core technology is built on the award-winning IRI FieldShield data masking product for databases and flat files. Data masked in one platform can be revealed in another. CellShield EE is the only full-featured, professional data discovery, masking, and auditing package for Excel 2010, 2013, 2016, and 2019 (plus Office 365) workbooks in your LAN. CellShield EE exceeds the security and scope of a single password by combining and automating all these extra capabilities.
    Starting Price: $35 one-time payment
  • 7
    Amazon Quantum Ledger Database (QLDB)
    Amazon QLDB is a fully managed ledger database that provides a transparent, immutable, and cryptographically verifiable transaction log ‎owned by a central trusted authority. Amazon QLDB can be used to track each and every application data change and maintains a complete and verifiable history of changes over time. Ledgers are typically used to record a history of economic and financial activity in an organization. Many organizations build applications with ledger-like functionality because they want to maintain an accurate history of their applications' data, for example, tracking the history of credits and debits in banking transactions, verifying the data lineage of an insurance claim, or tracing movement of an item in a supply chain network. Amazon QLDB is a new class of database that eliminates the need to engage in the complex development effort of building your own ledger-like applications.
    Starting Price: $0.03 per GB per month
  • 8
    Rapid7 InsightConnect
    InsightConnect is Rapid7’s security orchestration, automation and response (SOAR) solution, with which you can accelerate your time-intensive, highly manual incident response and vulnerability management processes. Connect teams across your IT and security systems with clear communication, collaboration, and integration. Streamline your manual, repetitive tasks with connect-and-go workflows, no code necessary. Supercharge your security operations with automation that drives efficiency, without sacrificing analyst control. Streamline and accelerate highly manual, time-intensive, processes 24 hours a day. With more than 300 plugins to connect your IT and security systems, and a library of customizable workflows, you’ll free up your security team to tackle bigger challenges, while still leveraging their expertise. Incident response can be time consuming. If you’re suffering from alert fatigue, you understand.
  • 9
    WatchTower Security Management App
    Monitor your network with Check Point’s WatchTower Security Management app and quickly mitigate security threats on the go with your mobile phone. The intuitive WatchTower Security Management App provides real-time monitoring of network events, alerts you when your network is at risk, enables you to quickly block security threats, and configure the security policy for multiple gateways. View the devices connected to your network and any potential security threats. Real-time notification of malicious attacks or unauthorized device connections. Quickly block malware-infected devices and view infection details for further investigation. Customize notifications for your top-priority security events. View all security events by category and drill down for further information. Configure the security settings for multiple gateways. Manage advanced security policy settings securely via web user interface.
  • 10
    Multi-Domain Security Management
    Multi-Domain Security Management delivers more security and control by segmenting security management into multiple virtual domains. Businesses of all sizes can easily create virtual domains based on geography, business unit or security function to strengthen security and simplify management. Enable granular and isolated role-based administration of a multi-tenant security management architecture. Single security management configuration for VPN, Firewall, IPS, and other protections. Create, view and control all network security management domains from a single console. Create and centrally manage multiple administrators in the multi-domain security management environments. Give administrators permission to manage specific domains or different aspects of the multi-domain system. Allow multiple administrators to work on different security management domains simultaneously.
  • 11
    Oracle Cloud Infrastructure Streaming
    Streaming service is a real-time, serverless, Apache Kafka-compatible event streaming platform for developers and data scientists. Streaming is tightly integrated with Oracle Cloud Infrastructure (OCI), Database, GoldenGate, and Integration Cloud. The service also provides out-of-the-box integrations for hundreds of third-party products across categories such as DevOps, databases, big data, and SaaS applications. Data engineers can easily set up and operate big data pipelines. Oracle handles all infrastructure and platform management for event streaming, including provisioning, scaling, and security patching. With the help of consumer groups, Streaming can provide state management for thousands of consumers. This helps developers easily build applications at scale.
  • 12
    Spherical Defense

    Spherical Defense

    Spherical Defense

    Spherical Defense is an API security solution that uses deep unsupervised learning to protect your APIs. Spherical Defense Express is deployed on AWS, takes just a minute to download and will be protecting your assets within two hours at the cost of $1 per hour. Once you have deployed your Spherical instance, it will immediately start listening for API traffic. It will stay in this mode for only as long as there is insufficient data to train the first security model. After receiving roughly 16,000 requests, it will move to the next stage. After sufficient data has been received, the system moves into training mode. This mode will result in a trained security model after roughly 6 hours, which will then be mounted for evaluation. As new data is received, the Spherical instance will train more models to account for natural changes in your API traffic over time. Once the first security model has been trained, it is mounted for evaluation.
    Starting Price: $1 per hour
  • 13
    CloudGuard AppSec

    CloudGuard AppSec

    Check Point Software Technologies

    Automate your application security and API protection with AppSec powered by contextual AI. Stop attacks against your web applications with a fully automated, cloud-native application security solution. Eliminate the need to manually tune rules and write exceptions every time you make an update to your web application or APIs. Modern applications demand modern security solutions. Protect your web applications and APIs, eliminate false positives and stop automated attacks against your business. CloudGuard uses contextual AI to prevent threats with absolute precision, without any human intervention as the application is updated. Protect web applications, and prevent OWASP Top 10 attacks. From implementation through runtime, CloudGuard AppSec automatically analyzes every user, transaction, and URL to create a risk score to stop attacks without creating false positives. In fact, 100% of CloudGuard customers maintain fewer than 5 rule exceptions per deployment.
  • 14
    Fabrix

    Fabrix

    Fabrix

    Fabrix has created a revolutionary way to visualize your IT operations by transforming enormous amounts of operational data into actionable information with visual alerts. The visualizations provide a panoramic field of view for IT operations. This allows your team to resolve, remediate and act fast. See events happen in real-time and solve issues before they impact your business. Fabrix’s visualization solution is centralized, allowing all business stakeholders to see a shared context of information and enabling effective communication. This further reduces the time it takes to resolve issues. Identify issues before they impact your business. Resolve issues in half the time it takes you today. Collaborate and communicate more efficiently. Maintain service levels to meet Key Performance Indicators (KPI) and reduce operational costs. Gain operational visibility and optimize manageability.
  • 15
    LOGIQ

    LOGIQ

    LOGIQ.AI

    LOGIQ.AI’s LogFlow provides centralized control of your observability data pipelines. As data streams arrive, they are automatically organized and optimized for your business teams and knowledge workers. XOps teams can centralize data flow management, gain data EPS control, and increase data quality and relevance. Built on any object store, LogFlow’s InstaStore enables infinite data retention and on-demand data replay to any target observability platform of your choice. Analyze operational metrics across applications and infrastructure and gain actionable insights that help you scale with confidence while maintaining high availability. Fuel business decisions and better user experiences by collecting, transforming, and analyzing behavioral data and usage patterns from business systems. Don’t let new attack techniques catch you off guard. Detect and analyze threat patterns from multiple sources and automate threat prevention and remediation.
  • 16
    Martello Vantage DX
    Managing Microsoft Teams and Microsoft Office 365 application performance requires deep insight into the real user experience as well as coordination between IT departments and service providers that each work with different tools with different objectives. IT teams often struggle to qualify and solve application performance or voice quality issues because available data from user feedback and traditional monitoring tools don’t provide substantial insight into the user experience. Martello Vantage DX™ gives IT teams complete end-to-end visibility of Microsoft 365 user experience to rapidly detect and resolve problems before they impact the user experience. Detect, alert and anticipate user experience challenges. Qualify and prioritize IT and third-party issues impacting Microsoft Teams and Microsoft Office 365. Ensure optimal Microsoft service productivity for your business lines.
  • 17
    Kion

    Kion

    Kion

    The only single-platform solution for setup and provisioning, financial management, and compliance. Kion offers the only single-platform approach to cloud enablement for AWS, Azure, and Google Cloud, transcending cloud management and cloud governance by offering all three pillars necessary for total cloud control. Provision accounts, get enterprise-wide visibility, and fully integrate the cloud with your tech stack to automate the full cloud lifecycle. Kion helps you start correctly from day 1 in the cloud by automating the provisioning of accounts with the proper controls around allowed services and budget. Prevent, detect, report, and remediate issues to comply with industry standards and business policies. Allocate and track spending, get real-time and forecasted data, identify savings opportunities, and enforce budgets. We deliver more than just the features to manage and govern your cloud.
  • 18
    BOSCO

    BOSCO

    BOSCO

    BOSCO™ uses your data combined with our game-changing AI to accurately predict where to spend your marketing budgets for maximum success. BOSCO™ combines your internal marketing data with extensive algorithmic modeling to create personalized reporting dashboards. Our easy-to-use interface provides a single source of truth and enables marketers to make better digital marketing spending decisions using data-driven insights. Using our unique BOSCO™ Index feature, we can rank your domain against the closest competitors in your category. The BOSCO Index™ is a measure of your online footprint and how effective you are with investment in organic and paid media channels. BOSCO™ is built on data from trusted third-party domains, collected from previous digital interactions. BOSCO™ isn’t dependent on your marketing budget, but on whether you’re reaching your online potential in paid and organic search. BOSCO™ identifies ten competitors within your market and scores them.
  • 19
    CorralData

    CorralData

    CorralData

    CorralData is a full-service, AI-powered platform that radically simplifies unifying and analyzing data across multiple sources. With CorralData, you can access human data experts and industry-leading AI tools to easily and cost-effectively drive remarkable, data-fueled results. No coding, SQL, or engineering resources required. Here’s how CorralData works. First, unify all of your data sources using our 450+ pre-built data connectors. Our U.S.-based support team will guide you along the way. Then, begin instantly and securely unlocking powerful data insights using natural language AI questions. Or work directly with a human data expert to surface the insight you need. The CorralData platform includes everything you need to start using data to drive results in one simple, monthly subscription—stunning data visualization tools, built-in chat, custom reporting, and access to human experts. Schedule a free demo today and see how simple and easy AI-powered data can be.
    Starting Price: $200/month
  • 20
    Autymate

    Autymate

    Autymate

    Our one-time, no-code integrations work with 200+ of the world’s biggest platforms. From HR and payroll to managing customers and vendors, you can connect everyone with everything without lifting a finger. We made our interface so intuitive that it looks like you are doing the automation within QuickBooks itself. Seamlessly integrate QuickBooks and your accounting systems, eliminating data entry and boosting your team's productivity. Make accounting effortless for your franchise business. Stay ahead of your competition and make your customers stay longer with a white-labeled accounting automation app. Connect your enterprise's most complex systems in one easy workflow and automate all the busy work in between. Seamlessly integrate QuickBooks and your accounting systems, eliminating data entry and boosting your team's productivity. Your accountants can do what they love doing and work on more meaningful tasks that have a more significant impact.
  • 21
    QOMPLX

    QOMPLX

    QOMPLX

    QOMPLX Identity Threat Detection and Response (ITDR) continuously validates to prevent network takeovers. QOMPLX ITDR uncovers existing Active Directory (AD) misconfigurations and detects attacks in real time. Identity security is essential to network operations. Verify identity in real-time. We verify everyone to prevent privilege escalation and lateral movement. We integrate with your current security stack and use it to augment our analytics resulting in comprehensive visibility. Understand the priority and severity of threats so resources can spend time where it matters most. Real-time detection and prevention stop attackers from bypassing security measures. From Active Directory (AD) security to red teaming and more, our experts are here to support your needs. QOMPLX enables clients to holistically manage and reduce cybersecurity risks. Our analysts will implement our SaaS solutions and monitor your environment.
  • 22
    VeriClouds

    VeriClouds

    VeriClouds

    VeriClouds CredVerify is the only service designed to detect, verify and remediate the use of weak or stolen credentials throughout the entire user lifecycle, from registration to authentication and password reset. It takes seconds to detect, offers immediate response, and has over 90% coverage. Rest assured you will be protected by the highest standards in security, and know that part of VeriClouds’ service policy is hard dedication in complying with key security points. Automates the detection of unauthorized login attempts and integrates with real-time policy enforcement measures. Significantly minimizes the threat from the number one cause of data breaches, a weak or stolen password. Reduces the likelihood of an account takeover or credential stuffing attack from being successful. CredVerify can be consumed as a service in the VeriClouds cloud, or it can be deployed in a customer’s cloud environment with just a few lines of code.
  • 23
    Infisical

    Infisical

    Infisical

    Compare secrets across environments and see what's different or missing. Set personal values for secrets – either during local development or for sensitive secrets. Easily inherit other secrets to establish a single source of truth. Automatically identify and prevent secret leaks to git using Infisical's continuous monitoring and pre-commit checks – support over 140 secret types.
    Starting Price: $6 per month
  • 24
    Code42 Incydr
    Incydr gives you the visibility, context and control needed to stop data leak and IP theft. Detect file exfiltration via web browsers, USB, cloud apps, email, file link sharing, Airdrop, and more. See how files are moved and shared across your entire organization, without the need for policies, proxies, or plugins. Incydr automatically identifies when files move outside your trusted environment, allowing you to easily detect when files are sent to personal accounts and unmanaged devices. Incydr prioritizes file activity based on 120+ contextual Incydr Risk Indicators (IRIs). This prioritization works on day 1 without any configuration. Incydr’s risk-scoring logic is use case-driven and transparent to administrators. Incydr uses Watchlists to programmatically protect data from employees who are most likely to leak or steal files, such as departing employees. Incydr delivers a complete range of technical and administrative response controls to support the full spectrum of insider events.
  • 25
    Proofpoint Insider Threat Management
    As the leading people-centric Insider Threat Management (ITM) solution, Proofpoint’s ITM protects against data loss and brand damage involving insiders acting maliciously, negligently, or unknowingly. Proofpoint correlates activity and data movement, empowering security teams to identify user risk, detect insider-led data breaches, and accelerate security incident response. 30% of data breaches are insider-driven, and the cost of these insider security threat incidents has doubled in the last three years. Proofpoint empowers security teams to reduce insider threat risk and frequency, accelerate insider threat response and increase the efficiency of their security operations. We’ve gathered all the resources for you, including reports, strategies, and more, to help you mitigate the risk of insider threats. Correlate user activity, data interaction, and user risk in unified explorations and visualized as timeline-based views.
  • 26
    Snow Commander
    Snow Commander is a powerful hybrid cloud management tool that leverages automation to deliver business agility, oversight, and efficiency. This tool enables IT to eliminate cumbersome, manual approval processes and provide end users with a quick, self-service way to access both public and private clouds that won’t slow down the most agile development teams. Increase agility and efficiency with streamlined hybrid cloud management. Snow Commander uses automation to provide end users with quick and easy access to both public and private cloud resources. The comprehensive self-service portal provides IT with the visibility needed to effectively govern resource usage, while self-service provisioning automation capabilities ensure that the most agile development teams don’t miss a beat. A feature-rich workload engine enables change orchestration with cost analytics, governance policy, and automation. It also boasts extensible functionality to empower process transformation.
  • 27
    Azure Spring Apps
    Azure Spring Apps is a fully managed service that helps Spring developers focus on code, not on infrastructure. Deploy any type of Spring app—including web apps, microservices, event-driven, serverless, and batch—without the need for Kubernetes. Take advantage of the Azure ecosystem while using your existing investments. Gain deep insights into application dependencies and operational telemetry using Azure monitor. Aggregate metrics for a topological view of how different services interact and see average performance and error rates. Easily identify the root cause of reliability issues and performance bottlenecks. Focus on what matters—your apps, business logic, and delivering value to your users. Deploy any type of Spring or Polyglot apps, either from source code or artifacts, with support for container creation and maintenance.
    Starting Price: $0.7136 per hour
  • 28
    Kroll Cyber Risk
    We are the world incident response leader. Merging complete response capabilities with frontline threat intelligence from over 3000 incidents handled per year and end-to-end expertise we protect, detect and respond against cyberattacks. For immediate assistance, contact us today. Tackle every facet of today and tomorrow’s threat landscape with guidance from Kroll’s Cyber Risk experts. Enriched by frontline threat intel from 3000+ incidents cases every year, our end-to-end cyber risk solutions help organizations uncover exposures, validate the effectiveness of their defenses, implement new or updated controls, fine-tune detections and confidently respond to any threat. Get access to a wide portfolio of preparedness, resilience, detection and response services with a Kroll Cyber Risk retainer. Get in touch for more info.
  • 29
    Holm Security

    Holm Security

    Holm Security

    Identify vulnerabilities across your entire attack surface, covering both your technical and human assets. All in one unified platform. One risk model. One workflow. Keep up with current threats and protect your entire infrastructure, including cloud, operational technology, and remote workforce. Our all-in-one platform offers unparalleled insight and visibility, covering all your assets across your organization’s technical assets, including local and public systems, computers, cloud infrastructure and services, networks, web applications, APIs, and human assets - your users. Gain complete visibility and actionable context on your most critical misconfigurations, so your teams can proactively and continuously improve your cloud security posture. Reduce risk to your organization by maintaining least-privilege access for cloud workloads, data, and applications.
  • 30
    ThreatAware

    ThreatAware

    ThreatAware

    Leveraging API feeds from your existing tools, validate your controls are correctly deployed and functioning across every cyber asset. Our clients come from all industries, from legal to finance, charities to retail. We are trusted by leading organizations to discover and protect their valuable cyber assets. Create a highly accurate device inventory by connecting to your existing systems via API. When issues arise the workflow automation engine can trigger actions via a webhook. ThreatAware provides clarity of the security control health of your cyber assets in a clear and simple design. Gain a macro view of your security control health regardless of how many controls you are monitoring. Generated from any field from a device, allows you to quickly group your cyber assets for monitoring and configuration purposes. When your monitoring systems accurately depicts your live environment, every alert is real.