Best IT Management Software for Splunk Cloud Platform - Page 3

Compare the Top IT Management Software that integrates with Splunk Cloud Platform as of October 2025 - Page 3

This a list of IT Management software that integrates with Splunk Cloud Platform. Use the filters on the left to add additional filters for products that have integrations with Splunk Cloud Platform. View the products that work with Splunk Cloud Platform in the table below.

  • 1
    FlashBlade//S

    FlashBlade//S

    Pure Storage

    Pure FlashBlade//S is the industry's most advanced all-flash storage solution for consolidating fast file and object storage. Modernize your storage with a unified unstructured storage platform that delivers a Modern Data Experience™. Tackle your most challenging modern data requirements. FlashBlade delivers cloud-like simplicity and agility with consistent high performance and control. FlashBlade can help you address the needs of modern applications and leverage modern data. FlashBlade//S delivers massive throughput and parallelism with consistent multidimensional performance for all data. Simply add blades to scale capacity and performance. It’s fast file and object storage that goes beyond traditional scale-out NAS. FlashBlade’s scale-out metadata architecture can handle tens of billions of files and objects with maximum performance and rich data services. Purity//FB supports cloud mobility with object replication and disaster recovery with file replication.
  • 2
    AWS Personal Health Dashboard
    AWS Personal Health Dashboard, technology and tools to monitor, manage, and optimize your AWS environment. AWS Personal Health Dashboard provides alerts and remediation guidance when AWS is experiencing events that may impact you. While the Service Health Dashboard displays the general status of AWS services, Personal Health Dashboard gives you a personalized view into the performance and availability of the AWS services underlying your AWS resources. The dashboard displays relevant and timely information to help you manage events in progress, and provides proactive notification to help you plan for scheduled activities. With Personal Health Dashboard, alerts are triggered by changes in the health of AWS resources, giving you event visibility, and guidance to help quickly diagnose and resolve issues. AWS Personal Health Dashboard gives you fine-grained access control so that you can setup permissions based on event metadata.
  • 3
    BMC Helix Cloud Cost
    BMC Helix Cloud Cost. Optimize your cloud costs and control your budget. BMC Helix Cloud Cost optimizes multi-cloud resource costs, eliminating wasted spend and preventing budget over-runs. Gain insight into public and private cloud spend. Prevent budget over-runs with predictive analytics and automated alerts. Eliminate wasted spend with automated optimization recommendations and actions. Empower budget owners and stakeholders with self-service views. With so many cloud buyers, continuous cost optimization is essential. What cloud services have been purchased? How are they being used? Without routine analysis and continuous optimization of cloud resource usage, you are guaranteed to overspend. Terminate idle and unused resources. Right-size over-provisioned resources. Establish power schedules for candidate workloads. Effectively use reserved instances. Automate optimization actions.
  • 4
    BMC AMI Ops Automation for Capping
    BMC AMI Ops Automation for Capping. Automate workload capping to avoid risk and optimize costs. BMC AMI Ops Automation for Capping (formerly Intelligent Capping for zEnterprise) applies automated intelligence to manage business-critical MSU capacity settings to avoid operational risk, optimize costs, and meet the needs of digital demand. Automatically manage capping limits to prioritize workloads and optimize mainframe software license costs which can consume 30-50% of the IT budget. Dynamically automate defined capacity MSU settings to optimize your monthly software costs by 10% or more. Mitigate business risk by analyzing, simulating, and automatically managing changes to defined capacity settings based on workload profile. Align capacity to business demand by ensuring MSUs are allocated to highest priority workloads. Patented technology drives capping adjustments, ensuring the most business-critical services are unaffected.
  • 5
    cloudtamer.io

    cloudtamer.io

    cloudtamer.io

    Control your cloud with the top software for automated cloud governance. Apply cloud rules (like, "deny creation of public objects") just once, and they'll apply automatically on new accounts. Plus, see all your policies right on your org chart. Comprehensive Cloud Boundaries. Self-Service Account Provision. Detailed Org Chart View. Get alerts or cut off spending when you hit your limit. Trim 30% off your total cloud bill. And create spend plans that match your real-life plan, across ALL your cloud providers. Use our compliance checks to auto-align with established standards like NIST and CIS or build your own from scratch. Then, fix issues automatically or on-demand in the dashboard. Start provisioning auto-governed accounts, running compliance checks, and getting financial control in the cloud today. If you aren't impressed, we'll eat our hat. We automate the provisioning of cloud accounts and dramatically reduce your set-up time.
  • 6
    AWS GovCloud
    Amazon's Regions designed to host sensitive data, regulated workloads, and address the most stringent U.S. government security and compliance requirements. AWS GovCloud (US) gives government customers and their partners the flexibility to architect secure cloud solutions that comply with the FedRAMP High baseline; the DOJ’s Criminal Justice Information Systems (CJIS) Security Policy; U.S. International Traffic in Arms Regulations (ITAR); Export Administration Regulations (EAR); Department of Defense (DoD) Cloud Computing Security Requirements Guide (SRG) for Impact Levels 2, 4 and 5; FIPS 140-2; IRS-1075; and other compliance regimes. AWS GovCloud (US-East) and (US-West) Regions are operated by employees who are U.S. citizens on U.S. soil. AWS GovCloud (US) is only accessible to U.S. entities and root account holders who pass a screening process. AWS GovCloud (US) Regions can help customers address compliance at every stage of their cloud journey.
    Starting Price: $0.02 per GB
  • 7
    Delinea Cloud Access Controller
    Gain granular control over web applications and web-based cloud management platforms. Delinea's Cloud Access Controller provides a comprehensive PAM solution that operates at cloud speed and is quick to deploy and secure access to any web application. With Cloud Access Controller, you can easily integrate your existing authentication solutions with any web application without having to write any additional code. Apply granular RBAC policies that enforce least privilege and zero trust initiatives, even to custom and legacy web applications. Specify what an individual employee is allowed to read or modify within any web application. Grant, manage and revoke access to cloud applications. Specify who gets access to what, at a granular level. Track usage of each and every cloud application. Clientless session recording without agents. Secure access to all web applications, including social media, custom, and legacy web applications.
  • 8
    Diamanti

    Diamanti

    Diamanti

    The prevailing assumption is that containers are ideal only for stateless applications. However, many organizations are seeing the value of containerizing databases for many of the same reasons that they containerize their web applications, the ability to release more frequently, the ease of moving from development to staging to production, and the portability to run the same workload on any infrastructure. In fact, databases have emerged as a top use case for container adoption in a recent Diamanti survey. Cloud Native infrastructure inherently enables stateful applications to take advantage of elasticity and flexibility. However, catastrophic events like hardware failures, power failures, natural disasters or other unexpected events can cause loss of data for an extended period of time. This makes recovery tricky for stateful applications. One of the important requirements for cloud native storage is to seamlessly recover from such catastrophic events.
  • 9
    Junos Traffic Vision

    Junos Traffic Vision

    Juniper Networks

    Junos Traffic Vision is a licensed traffic sampling application for MX Series 3D Universal Edge Routers. It provides details on network traffic flows that is useful for a wide variety of operations and planning activities. Junos Traffic Vision monitors packets as they are processed by the router, and captures details such as source and destination addresses, packet and byte count information. These details are aggregated and exported in a standards-based format for analysis and presentation by Juniper and third-party-based tools that support usage-based accounting, traffic profiling, traffic engineering, attack and intrusion detection, and SLA monitoring. Implemented inline and on service cards that provide high performance and scale, Junos Traffic Vision can be deployed in both active and passive configurations and can take place alongside lawful intercept filtering and port mirroring without impacting performance.
  • 10
    Mule ESB

    Mule ESB

    MuleSoft

    Mule, the runtime engine of Anypoint Platform, is a lightweight Java-based enterprise service bus (ESB) and integration platform that allows developers to connect applications together quickly and easily, enabling them to exchange data. It enables easy integration of existing systems, regardless of the different technologies that the applications use, including JMS, Web Services, JDBC, HTTP, and more. The ESB can be deployed anywhere, can integrate and orchestrate events in real time or in batch, and has universal connectivity. The key advantage of an ESB is that it allows different applications to communicate with each other by acting as a transit system for carrying data between applications within your enterprise or across the Internet. Expose and host reusable services, using the ESB as a lightweight service container. Shield services from message formats and protocols, separate business logic from messaging, and enable location-independent service calls.
  • 11
    Beats

    Beats

    Elastic

    Beats is a free and open platform for single-purpose data shippers. They send data from hundreds or thousands of machines and systems to Logstash or Elasticsearch. Beats are open source data shippers that you install as agents on your servers to send operational data to Elasticsearch. Elastic provides Beats for capturing data and event logs. Beats can send data directly to Elasticsearch or via Logstash, where you can further process and enhance the data, before visualizing it in Kibana. Want to get up and running quickly with infrastructure metrics monitoring and centralized log analytics? Try out the Metrics app and the Logs app in Kibana. For more details, see Analyze metrics and Monitor logs. Whether you’re collecting from security devices, cloud, containers, hosts, or OT, Filebeat helps you keep the simple things simple by offering a lightweight way to forward and centralize logs and files.
    Starting Price: $16 per month
  • 12
    BMC Compuware Topaz Connect
    BMC Compuware Topaz Connect bridges the IT systems that manage mainframe applications with the modern tooling used to manage non-mainframe applications, eliminating siloes that can disrupt innovation. By connecting the mainframe to disparate platforms in the enterprise, companies can track processes for mainframe applications in the same manner as they do for other hardware and software platforms. Eliminates siloes created by lack of integrated tooling, enabling faster delivery of business value. Maximizes enterprise IT automation by reducing disparate manual processes. Leverages existing IT service management (ITSM) investments. Includes the mainframe in DevOps processes. Enhances process efficiencies. Enables mainframe-inexperienced programmers to manage mainframe code. Connect BMC Compuware ISPW and ITSM solutions such as BMC Helix and Tivoli. Communicate specifics of an ITSM code change to BMC Compuware ISPW.
  • 13
    BMC Middleware Management
    BMC middleware management software provides real-time monitoring and administration for messaging-oriented middleware environments including IBM® MQ, Integration Bus (IIB), App Connect Enterprise (ACE), Apache ActiveMQ, and DataPower and TIBCO Enterprise Message Service (EMS). Automate alerts and gain insight into a wide array of middleware technologies with a single, intuitive solution. MainView Middleware Monitor securely provides real-time monitoring and automatic notification of potential problems to ensure an optimally performing middleware layer. Analyze historical data to identify patterns, predict trends, and solve reoccurring problems. Maximize application availability and mitigate risk with proactive problem detection and automated resolutions. Improve productivity and efficiency for managing, administering, and troubleshooting with flexible dashboards for infrastructure and application views.
  • 14
    Barracuda PST Enterprise
    PST files are often used by end-users as personal email archives. As a result, they are typically scattered widely across end-user devices and network storage, which makes them notoriously difficult to discover and manage consistently or effectively. Thanks to improvements to Microsoft Exchange and Office 365, your users no longer need to store data locally within PST files. However, legacy PST files still contain important data that you need to bring back under control. Barracuda PST Enterprise is designed specifically to help you address this challenge. You may have many terabytes of data stored in PST files located on end-user devices and on network servers. And these files are notoriously unreliable, since they are often corrupted and easily misplaced. The costs associated with storing, securing, and managing these large files, in terms of both system resources and IT administrative overhead, are significant.
  • 15
    ExoSense

    ExoSense

    Exosite

    Everything you need to get mission-critical insight into your high-value assets. ExoSense® is a ready-to-deploy condition monitoring application that provides operational insight into industrial assets, systems, and equipment. A simple configuration environment lets you customize branding, themes, user hierarchies, roles, and more without writing a line of code. Deploy the application in under an hour, connect ready-made devices in a day, and have a solution in customers’ hands within a week. No huge up-front costs, lengthy development times, or in-house DevOps team required, so IoT is more feasible and cost-efficient. ExoSense is built on Murano, an IoT platform that offers the security, scalability, and business-system integrations required for enterprise IoT solutions. Leverage ExoSense to monitor equipment status and performance, manage user and asset groups, build tailored insights and dashboards, and customize alerts and notifications.
    Starting Price: $200 per month
  • 16
    Sendmail

    Sendmail

    Proofpoint

    The sendmail Sentrion platform is specifically designed for large, complex environments, but we make a subset of that solution available as an open-source offering. Sentrion is not for everyone, but if you are using open source email for a large complex environment and need an enterprise platform that will enable your messaging roadmap for years to come (virtualization, consolidation, cloud migration, etc.). The Domain Keys Identified Mail (DKIM) Internet standard enables email senders to digitally sign their messages so that receivers can verify that those messages have not been forged. The DKIM sender authentication scheme allows the recipient of a message to confirm a message originated with the sender’s domain and that the message content has not been altered. A cryptography-based solution, DKIM provides businesses an industry-standard method for mitigating email fraud and protecting an organization’s brand and reputation at a relatively low implementation cost.
  • 17
    Fabrix

    Fabrix

    Fabrix

    Fabrix has created a revolutionary way to visualize your IT operations by transforming enormous amounts of operational data into actionable information with visual alerts. The visualizations provide a panoramic field of view for IT operations. This allows your team to resolve, remediate and act fast. See events happen in real-time and solve issues before they impact your business. Fabrix’s visualization solution is centralized, allowing all business stakeholders to see a shared context of information and enabling effective communication. This further reduces the time it takes to resolve issues. Identify issues before they impact your business. Resolve issues in half the time it takes you today. Collaborate and communicate more efficiently. Maintain service levels to meet Key Performance Indicators (KPI) and reduce operational costs. Gain operational visibility and optimize manageability.
  • 18
    LOGIQ

    LOGIQ

    LOGIQ.AI

    LOGIQ.AI’s LogFlow provides centralized control of your observability data pipelines. As data streams arrive, they are automatically organized and optimized for your business teams and knowledge workers. XOps teams can centralize data flow management, gain data EPS control, and increase data quality and relevance. Built on any object store, LogFlow’s InstaStore enables infinite data retention and on-demand data replay to any target observability platform of your choice. Analyze operational metrics across applications and infrastructure and gain actionable insights that help you scale with confidence while maintaining high availability. Fuel business decisions and better user experiences by collecting, transforming, and analyzing behavioral data and usage patterns from business systems. Don’t let new attack techniques catch you off guard. Detect and analyze threat patterns from multiple sources and automate threat prevention and remediation.
  • 19
    Martello Vantage DX
    Managing Microsoft Teams and Microsoft Office 365 application performance requires deep insight into the real user experience as well as coordination between IT departments and service providers that each work with different tools with different objectives. IT teams often struggle to qualify and solve application performance or voice quality issues because available data from user feedback and traditional monitoring tools don’t provide substantial insight into the user experience. Martello Vantage DX™ gives IT teams complete end-to-end visibility of Microsoft 365 user experience to rapidly detect and resolve problems before they impact the user experience. Detect, alert and anticipate user experience challenges. Qualify and prioritize IT and third-party issues impacting Microsoft Teams and Microsoft Office 365. Ensure optimal Microsoft service productivity for your business lines.
  • 20
    Kion

    Kion

    Kion

    The only single-platform solution for setup and provisioning, financial management, and compliance. Kion offers the only single-platform approach to cloud enablement for AWS, Azure, and Google Cloud, transcending cloud management and cloud governance by offering all three pillars necessary for total cloud control. Provision accounts, get enterprise-wide visibility, and fully integrate the cloud with your tech stack to automate the full cloud lifecycle. Kion helps you start correctly from day 1 in the cloud by automating the provisioning of accounts with the proper controls around allowed services and budget. Prevent, detect, report, and remediate issues to comply with industry standards and business policies. Allocate and track spending, get real-time and forecasted data, identify savings opportunities, and enforce budgets. We deliver more than just the features to manage and govern your cloud.
  • 21
    Snow Commander
    Snow Commander is a powerful hybrid cloud management tool that leverages automation to deliver business agility, oversight, and efficiency. This tool enables IT to eliminate cumbersome, manual approval processes and provide end users with a quick, self-service way to access both public and private clouds that won’t slow down the most agile development teams. Increase agility and efficiency with streamlined hybrid cloud management. Snow Commander uses automation to provide end users with quick and easy access to both public and private cloud resources. The comprehensive self-service portal provides IT with the visibility needed to effectively govern resource usage, while self-service provisioning automation capabilities ensure that the most agile development teams don’t miss a beat. A feature-rich workload engine enables change orchestration with cost analytics, governance policy, and automation. It also boasts extensible functionality to empower process transformation.
  • 22
    NXLog

    NXLog

    NXLog

    Achieve complete security observability with powerful insights from your log data. Improve your infrastructure visibility and enhance threat prevention with a versatile multi-platform tool. With support for over 100 operating system versions and more than 120 configurable modules, gain comprehensive insights and increased security. Cut the cost of your SIEM solution by reducing noisy and unnecessary log data. Filter events, truncate unused fields, and remove duplicates to increase the quality of your logs. Collect and aggregate logs from systems across the entire breadth of your organization with a single tool. Reduce complexity in managing security-related events and decrease detection and response times. Empower your organization to meet compliance requirements by centralizing some logs in an SIEM and archiving others in your long-term storage. NXLog Platform is an on-premises solution for centralized log management, with versatile processing.
  • 23
    Zirozen

    Zirozen

    Zirozen

    Zirozen is a unified autonomous endpoint management platform that delivers real‑time visibility and control across your entire IT environment to network equipment and cloud infrastructure, via an intuitive drag‑and‑drop dashboard. Its AI‑powered engine continuously scans for vulnerabilities, misconfigurations, missing patches, and unauthorized software, automatically prioritizing and remediating risks based on severity scores. Zirozen automates cross‑platform patch and configuration management with policy‑driven scheduling, continuous compliance auditing for standards like GDPR, HIPAA, and PCI‑DSS, software metering and license optimization, file integrity monitoring, application control, and malicious activity detection. Deep integrations eliminate tool sprawl by correlating security, asset, and inventory data in one console, while customizable alerts and centralized reporting enable proactive SecOps with reduced mean time to resolution.
  • 24
    Cherwell Software

    Cherwell Software

    Cherwell Software

    Cherwell Service Management is the modern choice for IT Service Management (ITSM). Affordable and easy to implement, the Cherwell platform provides IT teams the ability to implement, automate and modernize service and support processes to cater to the needs of a business--but minus the cost and complexity of legacy ITSM soltutions. Users can choose from subscription or perpetual pricing, on-premises or SaaS, Cherwell-hosted or public cloud infrastructure.
  • 25
    Data Virtuality

    Data Virtuality

    Data Virtuality

    Connect and centralize data. Transform your existing data landscape into a flexible data powerhouse. Data Virtuality is a data integration platform for instant data access, easy data centralization and data governance. Our Logical Data Warehouse solution combines data virtualization and materialization for the highest possible performance. Build your single source of data truth with a virtual layer on top of your existing data environment for high data quality, data governance, and fast time-to-market. Hosted in the cloud or on-premises. Data Virtuality has 3 modules: Pipes, Pipes Professional, and Logical Data Warehouse. Cut down your development time by up to 80%. Access any data in minutes and automate data workflows using SQL. Use Rapid BI Prototyping for significantly faster time-to-market. Ensure data quality for accurate, complete, and consistent data. Use metadata repositories to improve master data management.
  • 26
    AlertSite

    AlertSite

    SmartBear

    AlertSite is the 'Early Warning System' you can trust to monitor your websites, web apps, and APIs from all over the world and within your private networks. You shouldn't be burdened by the fear and the consequence of whether an alert is real or false. AlertSite monitors your UI and API layer for availability, performance, and functionality without the alert fatigue of other monitoring tools. Creating Web and API monitors in AlertSite is intuitive and effortless. Codelessly add new web monitors with DejaClick, our point-and-click web recorder, and API Monitors in just a few clicks using an API Endpoint URL or OpenAPI Specification file. Or, reuse test cases like Selenium Scripts or SoapUI tests to create new monitors. Don't let false alerts and erroneous data cloud your visibility into application health.
  • 27
    SysTrack

    SysTrack

    Lakeside Software

    Lakeside Software is a leader in digital experience monitoring. We develop software that provides the visibility IT teams need to design and support productive digital workplaces. Customers use our technology to perform workplace analytics, IT asset optimization, remote work management, and AIOps. Our product, SysTrack, is a digital experience monitoring solution that gathers and analyzes data on everything that may impact end-user experience and business productivity. For more information, visit www.lakesidesoftware.com.
  • 28
    Isora GRC

    Isora GRC

    SaltyCloud, PBC

    Streamline your IT Risk Assessments with Isora GRC. Leverage a lightweight, yet powerful surveying solution for conducting IT Risk Assessments. Launch self-assessment questionnaires for departments, people, facilities, devices, and applications. Leverage our library of preloaded questionnaires like NIST, HIPAA, GLBA, and more. Build or upload your custom questionnaires. Change question weights, allow partial credit, gate conditional questions, and add other question logic to simplify your questionnaires. Automatically rollup and score collected quantitative and qualitative survey data. Gain access to dynamic risk reports. Use the risk map to identify the highest-risk units or the trend graph to track risk scores year-over-year. Easily export the raw data to data analytics tools like Microsoft PowerBI using the RESTful API.
  • 29
    Flowmon

    Flowmon

    Progress Software

    Make informed decisions and deal with network anomalies in real time. Cloud, hybrid or on-premise, with Flowmon’s actionable intelligence you are in control. Flowmon’s network intelligence integrates NetOps and SecOps into one versatile solution. Capable of automated traffic monitoring and threat detection, it creates a strong foundation for informed decision-making without having to sift through volumes of information noise. Its intuitive interface allows IT professionals to quickly learn about incidents and anomalies, understand their context, impact, magnitude, and most importantly, their root cause.
  • 30
    SecureLink

    SecureLink

    SecureLink

    SecureLink is the leader in managing vendor privileged access and remote support for both highly regulated enterprise organizations and technology vendors. SecureLink serves more than 30,000 organizations worldwide. World-class companies across multiple industries including healthcare, financial services, legal, gaming, and retail rely on SecureLink’s secure, purpose-built platform. SecureLink is headquartered in Austin, Texas. Experience SecureLink's access management platforms for yourself. Fill out this form, and a SecureLink team member will reach out to you to set up a personalized demo so you can see our critical access management solutions in action. The implementation process which includes a dedicated project manager, server configuration, workflow consulting, and administrator training. A customized demo of the Enterprise Access, Customer Connect, Access Intelligence, or Privacy Monitor platform.