Best IT Management Software for Splunk Cloud Platform - Page 4

Compare the Top IT Management Software that integrates with Splunk Cloud Platform as of October 2025 - Page 4

This a list of IT Management software that integrates with Splunk Cloud Platform. Use the filters on the left to add additional filters for products that have integrations with Splunk Cloud Platform. View the products that work with Splunk Cloud Platform in the table below.

  • 1
    Sonrai Security

    Sonrai Security

    Sonraí Security

    Identity and Data Protection for AWS, Azure, Google Cloud, and Kubernetes. Sonrai’s public cloud security platform provides a complete risk model of all identity and data relationships, including activity and movement across cloud accounts, cloud providers, and 3rd party data stores. Uncover all identity and data relationships between administrators, roles, compute instances, serverless functions, and containers across multi-cloud accounts and 3rd-party data stores. Inside the platform, our critical resource monitor continuously monitors your critical data sitting inside object stores (e.g. AWS S3, Azure Blob) and database services (e.g. CosmosDB, Dynamo DB, RDS). Privacy and compliance controls are monitored across multiple cloud providers and 3rd party data stores. Resolutions are coordinated with relevant DevSecOps teams.
  • 2
    Ordr Platform
    Automatically identify, classify, and locate all network-connected devices and systems. Within a few hours of deployment—via network tap or SPAN—we passively discover high-fidelity information about every connected device including make, location, serial number, and application/port usage. This visibility is provided in real time for any new connected device and can be integrated with asset inventory solutions. Understand vulnerabilities, recalls, weak passwords or certificates associated with every device. Ordr also provides deep insight into device utilization so teams can ensure data-driven moves, adds, and changes as teams scale their capacity. These device insights are also critical to determine the longevity of certain devices, and allows teams to schedule maintenance tickets and support procurement decisions. We automatically group fleet devices, and monitor usage for tracking and comparison purposes. We also integrate with identity systems like Active Directory.
  • 3
    CloudMonitor
    CloudMonitor collects monitor metrics of Alibaba Cloud resources and custom metrics. The service can be used to detect the availability of your service and allows you to set alarms on specific metrics. CloudMonitor enables you to view and fully understand the usage of the cloud resources, and the status and health of your business, so that you can act promptly to ensure the availability of your application when an alarm is triggered. No coding is required. You can set up CloudMonitor and alarms through the wizard in a few steps. You can set alarms based on different scenarios, and send alarms using multiple methods. A comprehensive service that monitors the basic resources, application availability, and also custom business metrics. Allows you to manage cloud resources that are used in different applications by group.
  • 4
    Cortex Cloud

    Cortex Cloud

    Palo Alto Networks

    Cortex Cloud from Palo Alto Networks is a cutting-edge platform designed to provide real-time cloud security across the entire software delivery lifecycle. By combining Cloud Detection and Response (CDR) with advanced Cloud Native Application Protection Platform (CNAPP), Cortex Cloud offers unified visibility and proactive security for code, cloud, and SOC environments. It enables teams to prevent and respond to threats quickly with AI-driven risk prioritization, runtime protection, and automated remediation. With seamless integration across multicloud environments, Cortex Cloud ensures scalable and efficient protection for modern cloud-native applications.
  • 5
    Centreon

    Centreon

    Centreon

    Centreon is a global provider of business-aware IT monitoring for always-on operations and performance excellence. The company’s holistic, AIOps-ready platform is designed for today’s complex, distributed hybrid cloud infrastructures. Centreon monitors the complete IT Infrastructure from Cloud-to-Edge for a clear and comprehensive view. Centreon removes blind spots, monitoring all equipment, middleware and applications that are part of modern IT workflows, from on-premise legacy assets to private and public cloud environments, all the way to the edge of the network, where smart devices and customers combine to create business value. Centreon is constantly current, able to support the most dynamic environments. With auto-discovery capabilities it can keep track of Software-Defined Network (SDN) elements, AWS or Azure cloud assets, Wi-Fi access points or any other component of today’s agile IT infrastructure.
  • 6
    iSecurity SIEM / DAM Support
    iSecurity helps companies protect valuable information assets against insider threats, unauthorized external access and malicious, or inadvertent, changes to field-level data in business-critical applications by sending real-time alerts to specific recipients. Real-time Syslog alerts sent from all iSecurity modules are fully integrated with leading SIEM/DAM products such as IBM’s Tivoli, McAfee, RSA enVision, Q1Labs, GFI Solutions and have been tested with products such as ArcSight, HPOpenView, CA UniCenter and others. iSecurity supports Imperva SecureSphere DAM. Integration with SIEM products for forensic analysis of security-related events is an increasingly important requirement at companies worldwide; indeed, Raz-Lee’s iSecurity suite has supported Syslog-to-SIEM for numerous years. Proven integration with all SIEM products. Field-mode support for the 2 major standards – LEEF (IBM QRadar) and CEF (ArcSight). These standards are supported in many other SIEM products as well.
  • 7
    FortiManager
    The rapid influx of digital transformation (DX) technologies has made networks and network security much more complex and vulnerable. While malicious cyberattacks remain a serious problem, a recent Ponemon study shows that more than half of all breaches last year came from benign sources that could have been prevented. A security strategy that prioritizes automation-driven network operations can help. As part of the Fortinet Security Fabric, FortiManager supports network operations use cases for centralized management, best practices compliance, and workflow automation to provide better protection against breaches. Manage all your Fortinet devices in a single console central management system. FortiManager provides full visibility of your network, offering streamlined provisioning and innovative automation tools. FortiManager provides insight into network traffic and threats through a single-pane-of-glass and offers enterprise-class features and sophisticated security management.
  • 8
    VAST Data

    VAST Data

    VAST Data

    Unprecedented customer adoption establishes VAST among today's elite technology companies in just 2 short years. Leading organizations around the world use Universal Storage to eliminate storage tiering and unleash insights on vast reserves of data. Learn how you can easily and securely store all your data on exabyte-scale, affordable flash. We're simplifying data storage and redefining how organizations interact with data by breaking decades of tradeoffs. We look past the marginal gain and apply unconventional thinking in order to break decades of tradeoffs that have been imposed by legacy architectures. Our mission is to bring an end to decades of complexity and application bottlenecks. VAST combines a series of innovations to radically change the flash cost vs. capacity equation, democratizing the utility of flash for all data and all applications. The result: no more slow and failure-prone hard drives, no more complex storage tiers.
  • 9
    Airlock

    Airlock

    Airlock

    Airlock's Secure Access Hub protects applications, APIs and data from identity theft and the most common attacks on Web applications. Security meets convenience, Airlock offers your customers a customer journey without media breaks with single sign-on, social registration, comprehensive user self-services and consent management. Acting in line with the market means reacting quickly. The Airlock Secure Access Hub therefore provides all important security functions such as registration, authentication and self services. So you can concentrate all your IT resources on your business processes. The Airlock Secure Access Hub helps to meet all international compliance standards - from GDPR over PSD2, PCI-DSS, OWASP to MAS. The upstream enforcement point for access policies onto applications and services allows compliance with regulations without having to make adjustments in each individual application.
  • 10
    Sacumen Connector as a Service (CaaS)
    Security product companies have huge need to build connectors with third party applications. This need is driven by multiple factors such as Customer requirement, enhance product capabilities etc. Target systems can be present on cloud, on-premise, hybrid environment. Complexities are added in terms of the varied options offered by Target systems such as interfaces available to integrate (REST API, SOAP, SFTP, Message Queue, SNMP, SDKs etc.). Data types (JSON, Syslog, File system, XML, etc.). Authentication and authorization options (OAuth, API Token, Username/Password, OTP, MFA, SAML, etc.). Rate limit, pagination, latency, concurrency, and data volume. Security Product Companies end up writing customized, non-standardized Connectors for these Target systems. This leads not only to increased development and support cost but also less efficient Connectors in terms of performance, scalability and extensibility.
  • 11
    Rackspace

    Rackspace

    Rackspace

    Enhanced full-lifecycle cloud native development capabilities to help customers build modern applications for the future. Unlock the full potential of the cloud today with applications architected for tomorrow. Traditional approaches to cloud adoption focused on infrastructure and application migration, with very little attention to the underlying code. And while the cloud has always delivered the benefits of elasticity and scale, it can’t unleash its full potential until the code in your applications has been updated. Modern applications, built with cloud native technologies and modern architectures, allow you to access the full potential of the cloud, while increasing agility and helping you to accelerate innovation. Build self-healing, auto-scaling applications, unchained from the limitation of servers. Serverless architectures offer the highest efficiency and cost benefits of the cloud while pushing nearly all infrastructure and software management to the platform.
  • 12
    Reekoh

    Reekoh

    Reekoh

    Make your asset, operational and business data interoperable using one platform. We empower enterprises across all industry segments with capabilities to reduce complexity, remove barriers and accelerate time-to-value in their integrated solutions, uniquely bringing together Physical (IoT/IIoT/OT) and Application (IT) data. Securely manage OT, IoT, IIoT and business app data ingestion from across disparate and fragmented systems, protocols, networks and data formats. Enrich contextual data, manage metadata, perform transformation and utilsie data mapping to work with common data models and schemas. Integrate data to various endpoints for application and process logic, storage and data analysis, as well as physical and digital automation. Reekoh Accelerate™ is a hybrid integration platform that powerfully treats data from physical and digital assets as first class citizens. It provides a secure and agile toolset for device and data management, business workflow and automation.
  • 13
    Pavilion HyperOS
    Powering the most performant, dense, scalable, and flexible storage platform in the universe. Pavilion HyperParallel File System™ provides the ability to scale across an unlimited number of Pavilion HyperParallel Flash Arrays™, providing 1.2 TB/s read, and 900 GB/s write bandwidth with 200M IOPS at 25µs latency per rack. Uniquely capable of providing independent, linear scalability of both capacity and performance, the Pavilion HyperOS 3 now provides global namespace support for both NFS and S3, enabling unlimited, linear scale across an unlimited number of Pavilion HyperParallel Flash Array systems. Take advantage of the power of the Pavilion HyperParallel Flash Array to enjoy unrivaled levels of performance and availability. The Pavilion HyperOS includes patent-pending technology to ensure that your data is always available, with performant access that legacy arrays cannot match.
  • 14
    Opsera

    Opsera

    Opsera

    You choose your tools, we take care of the rest. Put together the perfect CI/CD stack that fits your organization’s goals with zero vendor lock-in. ‍Eliminate manual scripts and stop building toolchain automation. Free your engineers to focus on your core business. Pipeline workflows follow a declarative model so you focus on what is required — not how it’s accomplished — including: software builds, security scans, unit testing, and deployments. With Blueprints, diagnose any failures from within Opsera using a console output of every step of your pipeline execution. Comprehensive software delivery analytics across your CI/CD process in a unified view — including Lead Time, Change Failure Rate, Deployment Frequency, and Time to Restore. ‍Contextualized logs for faster resolution and improved auditing and compliance.
  • 15
    OpsMx Enterprise for Spinnaker
    OES is highly available and scalable for increasing deployment workloads, and extensible to integrate with multiple SDLC tool chains. OES offers easy-to-define custom stages to parallely deploy into any number of targets and save time. Action such as rollback or roll forward or stopping of all the parallel deployments is easy and can be done with a click. Automate repeated activities in your SDLC process by the ability to create as many child pipelines and invoke them in the parent pipeline. OES is modular and can act as a central CD tool for many enterprises because it uses an API-based architecture. Developers across the team can easily integrate external services with Spinnaker services for deployment orchestration.
  • 16
    Admin By Request

    Admin By Request

    Admin By Request

    With rapid provisioning of Just-In-Time privilege elevation across your entire workforce. On-board and manage workstations and servers via a user-friendly portal. To reveal risky users and assets through thread and behavioral analytics to identify malicious software and prevent data breaches and malware attacks. By elevating applications - not users. Delegate privileges based on the user or groups to save time and monetary resources. Whether a developer in the IT department, a tech newbie in HR, or a third-party consultant needing to service one of your endpoints, there's a method of elevation appropriate for every user. All features come out-of-the-box with Admin By Request and can be tailored to the needs of individual users or groups.
  • 17
    Mindflow

    Mindflow

    Mindflow

    Embrace hyper-automation at scale with intuitive no-code & AI-generated flows. Access every tool you need through the most extensive integration library ever provided. Pick the service you want from the Integrations library and automate your way. Onboard and build your first workflows in minutes. Use pre-built templates if you need them, help yourself with the AI assistant, or benefit from the Mindflow excellence center. Type your input in plain-language text and let Mindflow do the rest. Generate workflows adapted to your tech stack from any input. Create AI-generated workflows to help you address any use case and reduce the building time to the minimum. Mindflow redefines enterprise automation, offering an extensive catalog of integrations. Add any new tool to our platform within minutes, breaking the barriers of traditional integration. Connect and orchestrate your tech stack, no matter the tools you use.
  • 18
    Sepio

    Sepio

    Sepio

    Detect, accurately identify, and manage your asset risks based on existence, not behavior. Augmented by OSINT data sources and internal cyber research, Sepio provides up-to-date intelligence on known asset vulnerabilities, so you don’t have to chase them. Granular parameters allow you to create and customize multiple differentiated policies that govern your entire ecosystem of IT, OT, and IoT assets so you have flexibility when it comes to managing your risks. Automated policy enforcement ensures immediate and uniformly applied action saving you from manual intervention so you can respond to asset risks and threats faster. Integration with third-party tools allows for expanded policy actions. Complete visibility to all of your assets, whether connected as a peripheral or a network element. Mitigate risks from uncontrolled or spoofing assets. Easy to operate, requiring low maintenance and minimal human intervention.
  • 19
    F5 Distributed Cloud App Stack
    Deploy and orchestrate applications on a managed Kubernetes platform with centralized, SaaS-based management of distributed applications with a single pane of glass and rich observability. Simplify by managing deployments as one across on-prem, cloud, and edge locations. Achieve effortless management and scaling of applications across multiple k8s clusters (customer sites or F5 Distributed Cloud Regional Edge) with a single Kubernetes compatible API, unlocking the ease of multi-cluster management. Deploy, deliver, and secure applications to all locations as one ”virtual” location. Deploy, secure, and operate distributed applications with uniform production grade Kubernetes no matter the location, from private and public cloud to edge locations. Secure K8s Gateway with zero trust security all the way to the cluster with ingress services with WAAP, service policies management, network, and application firewall.
  • 20
    OTbase

    OTbase

    Langner

    OTbase is a productivity and collaboration tool for your journey towards secure and resilient OT networks. It enables users in cyber security and engineering roles to stay on top of hyper-complex OT networks with hundreds of thousands of devices. OTbase not just inventories your OT systems automatically, it also acts as a plattform to streamline, plan, and document your digital transformation journey. OTbase provides full transparency on all aspects of your OT networks, from minute configuration details to high level KPIs in a CISO dashboard. OTbase enables cyber security experts, control engineers, maintenance experts, plant planners, process engineers, and SOC analysts to get the information they need in an instant.
  • 21
    Observo AI

    Observo AI

    Observo AI

    ​Observo AI is an AI-native data pipeline platform designed to address the challenges of managing vast amounts of telemetry data in security and DevOps operations. By leveraging machine learning and agentic AI, Observo AI automates data optimization, enabling enterprises to process AI-generated data more efficiently, securely, and cost-effectively. It reduces data processing costs by over 50% and accelerates incident response times by more than 40%. Observo AI's features include intelligent data deduplication and compression, real-time anomaly detection, and dynamic data routing to appropriate storage or analysis tools. It also enriches data streams with contextual information to enhance threat detection accuracy while minimizing false positives. Observo AI offers a searchable cloud data lake for efficient data storage and retrieval.
  • 22
    Tenzir

    Tenzir

    Tenzir

    ​Tenzir is a data pipeline engine specifically designed for security teams, facilitating the collection, transformation, enrichment, and routing of security data throughout its lifecycle. It enables users to seamlessly gather data from various sources, parse unstructured data into structured formats, and transform it as needed. It optimizes data volume, reduces costs, and supports mapping to standardized schemas like OCSF, ASIM, and ECS. Tenzir ensures compliance through data anonymization features and enriches data by adding context from threats, assets, and vulnerabilities. It supports real-time detection and stores data efficiently in Parquet format within object storage systems. Users can rapidly search and materialize necessary data and reactivate at-rest data back into motion. Tension is built for flexibility, allowing deployment as code and integration into existing workflows, ultimately aiming to reduce SIEM costs and provide full control.
  • 23
    NVIDIA DGX Cloud Serverless Inference
    NVIDIA DGX Cloud Serverless Inference is a high-performance, serverless AI inference solution that accelerates AI innovation with auto-scaling, cost-efficient GPU utilization, multi-cloud flexibility, and seamless scalability. With NVIDIA DGX Cloud Serverless Inference, you can scale down to zero instances during periods of inactivity to optimize resource utilization and reduce costs. There's no extra cost for cold-boot start times, and the system is optimized to minimize them. NVIDIA DGX Cloud Serverless Inference is powered by NVIDIA Cloud Functions (NVCF), which offers robust observability features. It allows you to integrate your preferred monitoring tools, such as Splunk, for comprehensive insights into your AI workloads. NVCF offers flexible deployment options for NIM microservices while allowing you to bring your own containers, models, and Helm charts.
  • 24
    100x

    100x

    100x

    100X is an AI-powered platform designed to troubleshoot complex software systems by autonomously analyzing tickets, alerts, logs, metrics, traces, code, and knowledge to pinpoint problems and remediate issues. It operates through a multi-step process: connecting to your environment to build a comprehensive knowledge graph, automatically investigating every incoming alert or support ticket, dynamically querying telemetry and connecting signals across systems, isolating specific system issues with supporting evidence, suggesting proven fixes with relevant context, and learning from every resolution by capturing commands, fixes, and failure patterns discovered by your team. 100X integrates with tools like Datadog, Grafana, LaunchDarkly, Jenkins, Kafka, Redis, and Salesforce, and can be deployed within your cloud environment, ensuring data is accessed, processed, and stored entirely within your cloud boundary.
  • 25
    Synergy

    Synergy

    Unframe

    Synergy is an AI-native command center for enterprise IT operations that unifies siloed monitoring, ticketing, logging, and documentation into a single pane of glass. It continuously correlates signals across tools like Splunk, New Relic, Jira, ServiceNow, and Confluence to turn alert storms into clear, prioritized insights. Synergy’s Smart Incident Workflows automate routine tasks, suggest next steps, flag ownership gaps, and accelerate resolution to cut mean time to detection and repair. Its proactive monitoring detects risks before traditional alerts trigger, flags error spikes and missed escalations, recognizes emerging patterns, and answers investigative queries in natural language. Built-in root cause analysis traces incidents end-to-end across time, logs, metrics, tickets, and post-mortems, links to similar events for instant context, and generates concise summaries.
  • 26
    Aviatrix

    Aviatrix

    Aviatrix

    For enterprises struggling to secure cloud workloads, Aviatrix® offers a single solution for pervasive cloud security. Where current cybersecurity approaches focus on securing entry points to a trusted space, Aviatrix Cloud Native Security Fabric (CNSF) delivers runtime security and enforcement within the cloud application infrastructure itself – closing gaps between existing solutions and helping organizations regain visibility and control. Aviatrix ensures security, cloud, and networking teams are empowering developer velocity, AI, serverless, and what’s next.
  • 27
    Apica

    Apica

    Apica

    Apica is the observability cost optimization leader helping IT teams gain complete control over their telemetry data economics. Apica Ascent processes all observability data types including metrics, logs, traces, and events while optimizing observability costs by 40% compared to traditional approaches. Unlike solutions that lock users into proprietary formats, Ascent offers true flexibility with support for any data lake of choice, on-premises or cloud deployment options, and elimination of expensive tool sprawl through modular solutions. Built to handle high-cardinality data that overwhelms competitive solutions, Ascent includes the patented InstaStore™ optimized storage technology for maximum efficiency and advanced root cause analysis capabilities. Organizations choose us to make observability investments that reduce costs instead of spiraling them out of control.
  • 28
    Cribl AppScope
    AppScope is a new approach to black-box instrumentation delivering ubiquitous, unified telemetry from any Linux executable by simply prepending scope to the command. Talk to any customer using Application Performance Management, and they’ll tell you how much they love their solution, but they wish they could extend it to more of their applications. Most have 10% or fewer of their apps instrumented for APM, and are supplementing what they can with basic metrics. Where does this leave the other 80%? Enter AppScope. No language-specific instrumentation. No application developers required. AppScope is language agnostic and completely userland; works with any application; scales from the CLI to production. Send AppScope data to any existing monitoring tool, time series database, or log tool. AppScope allows SREs and Ops teams to interrogate running applications to discover how they work and their behavior in any deployment context, from on-prem to cloud to containers.
  • 29
    Snare

    Snare

    Prophecy International Holdings Ltd.

    Snare Central is a centralized log management solution that collects, processes, and stores log data from various sources across an organization’s network. It provides a secure and scalable platform for aggregating logs from systems, applications, and devices, allowing for efficient monitoring and analysis. With advanced filtering and reporting capabilities, Snare Central enables organizations to detect security threats, ensure compliance, and optimize operational performance. The platform supports integration with third-party tools for enhanced analytics and provides customizable dashboards for real-time insights. Snare Central is designed to meet the needs of security, compliance, and IT teams by providing a unified view of log data and supporting detailed investigations.