Best IT Security Software for Splunk User Behavior Analytics

Compare the Top IT Security Software that integrates with Splunk User Behavior Analytics as of August 2025

This a list of IT Security software that integrates with Splunk User Behavior Analytics. Use the filters on the left to add additional filters for products that have integrations with Splunk User Behavior Analytics. View the products that work with Splunk User Behavior Analytics in the table below.

What is IT Security Software for Splunk User Behavior Analytics?

IT security software is designed to protect information technology (IT) systems, networks, and data from cyber threats, such as malware, hacking, and unauthorized access. These tools provide various features such as antivirus protection, firewalls, encryption, intrusion detection and prevention systems, and vulnerability management to ensure the integrity, confidentiality, and availability of sensitive information. IT security software helps organizations detect, prevent, and respond to security incidents, mitigate risks, and ensure compliance with industry regulations. It is critical for businesses and individuals to safeguard against cyberattacks, data breaches, and other security vulnerabilities. Compare and read user reviews of the best IT Security software for Splunk User Behavior Analytics currently available using the table below. This list is updated regularly.

  • 1
    Google Cloud Platform
    Google Cloud Platform offers robust IT security tools to protect cloud workloads, including identity management, encryption, and threat detection. GCP’s multi-layered approach ensures that businesses can secure their infrastructure, data, and applications. With tools like Google Cloud Identity & Access Management (IAM) and Google Cloud Security Command Center, businesses can manage risks and compliance. New customers receive $300 in free credits to run, test, and deploy workloads, making it easier to evaluate the platform's IT security features at no upfront cost. GCP’s security tools include automated patch management, vulnerability scanning, and secure authentication, which help mitigate risks and reduce the threat surface. The platform is also designed to meet stringent compliance standards, ensuring that businesses can secure their cloud environments while adhering to industry regulations.
    Leader badge
    Starting Price: Free ($300 in free credits)
    View Software
    Visit Website
  • 2
    Cisco Secure Email Threat Defense
    Advanced protection to safeguard your inboxes. Email is still the No. 1 threat vector. Expand the scope of your defenses to detect dangerous threats and rapidly respond to and remediate new threats in real time. Identify the malicious techniques used in attacks targeting your organization. Understand the specific business risks and categorize threats to gain insight into the parts of your organization that are most vulnerable to attack. AI-driven threat detection uses multiple detection engines to simultaneously evaluate different portions of an incoming email. These verdict details help ensure accurate threat classification, identify business risk, and promote an appropriate response action. Threats come from numerous sources: phishing, business email compromise, malware, and ransomware. Defend against all of them with industry-leading threat intelligence that empowers you to act quickly.
  • 3
    Splunk Enterprise
    Go from data to business outcomes faster than ever before with Splunk. Splunk Enterprise makes it simple to collect, analyze and act upon the untapped value of the big data generated by your technology infrastructure, security systems and business applications—giving you the insights to drive operational performance and business results. Collect and index log and machine data from any source. Combine your machine data with data in your relational databases, data warehouses and Hadoop and NoSQL data stores. Multi-site clustering and automatic load balancing scale to support hundreds of terabytes of data per day, optimize response times and provide continuous availability. The Splunk platform makes it easy to customize Splunk Enterprise to meet the needs of any project. Developers can build custom Splunk applications or integrate Splunk data into other applications. Apps from Splunk, our partners and our community enhance and extend the power of the Splunk platform.
  • 4
    SAP Access Control
    Give employees the applications and services they need without exposing data and processes to unauthorized use. Streamline the process of managing and validating user access with governance software that automates user provisioning and helps you certify access to on-premise applications and data. You can also enforce governance by embedding preventative policy checks and monitoring emergency access. Identify and remediate access risk violations automatically across SAP and third-party systems. Embed compliance checks and mandatory risk mitigation into business processes. Enable users to submit self-service, workflow-driven access requests and approvals. Identify and remediate violations of segregation of duties and critical access accurately with embedded risk analysis. Automate user access assignments across SAP and third-party systems. Define and maintain compliance roles in business-friendly terms and language.
  • 5
    Splunk Cloud Platform
    Turn data into answers with Splunk deployed and managed securely, reliably and scalably as a service. With your IT backend managed by our Splunk experts, you can focus on acting on your data. Splunk-provisioned and managed infrastructure delivers a turnkey, cloud-based data analytics solution. Go live in as little as two days. Managed software upgrades ensure you always have the latest functionality. Tap into the value of your data in days with fewer requirements to turn data into action. Splunk Cloud meets the FedRAMP security standards, and helps U.S. federal agencies and their partners drive confident decisions and decisive actions at mission speeds. Drive productivity and contextual insights with Splunk’s mobile apps, augmented reality and natural language capabilities. Extend the utility of your Splunk solutions to any location with a simple phrase or the tap of a finger. From infrastructure management to data compliance, Splunk Cloud is built to scale.
  • 6
    Cisco ACI
    Achieve resource elasticity with automation through common policies for data center operations. Extend consistent policy management across multiple on-premises and cloud instances for security, governance, and compliance. Get business continuity, disaster recovery, and highly secure networking with a zero-trust security model. Transform Day 2 operations to a more proactive model and automate troubleshooting, root-cause analysis, and remediation. Optimizes performance, and single-click access facilitates automation and centralized management. Extend on-premises ACI networks into remote locations, bare-metal clouds, and colocation providers without hardware. Cisco's Multi-Site Orchestrator offers provisioning and health monitoring, and manages Cisco ACI networking policies, and more. This solution provides automated network connectivity, consistent policy management, and simplified operations for multicloud environments.
  • 7
    Splunk On-Call
    Empower teams by routing alerts to the right people for fast collaboration and issue resolution. Deliver the right alerts to the right people reducing time to acknowledge and resolve incidents. Complete ChatOps experience, integration with the tools you already have, incident timelines and reporting for blameless post-incident reviews. Engage people where they work. Mobile-first experiences leverage machine learning to make on-call accessible wherever you are. Splunk On-Call automates incident management, reducing alert fatigue and increasing uptime. Use Splunk On-Call to streamline your on-call schedules and escalation policies. From rotations to overrides, we automate all the essentials. Our software provides contextual alert information, suggestions driven from machine learning, and empowers collaboration to solve problems with speed and efficiency, all while capturing essential remediation data.
    Starting Price: $27.00/month/user
  • 8
    Cisco Cloudlock
    Cloud access security broker (CASB) to secure cloud users, data, and apps with ease. Cisco Cloudlock is the API-based cloud access security broker (CASB) that helps accelerate use of the cloud. By securing your identities, data, and apps, Cloudlock combats account compromises, breaches, and cloud app ecosystem risks. Our API-driven approach provides a simple and open way to enable healthy cloud adoption. Defend against compromised accounts and malicious insiders with our User and Entity Behavior Analytics (UEBA) which run against an aggregated set of cross-platform activities for better visibility and detection. Protect against exposures and a data security breach with highly-configurable data loss prevention engine with automated, policy-driven response actions. Cloudlock Apps Firewall discovers and controls malicious cloud apps connected to your corporate environment, and provides a crowd-sourced Community Trust Rating to identify individual app risk.
  • 9
    Splunk SOAR
    Splunk SOAR (Security Orchestration, Automation, and Response) is a powerful platform that enables organizations to streamline and automate their security operations. It integrates with various security tools and systems, allowing teams to automate repetitive tasks, orchestrate workflows, and respond to incidents faster. With Splunk SOAR, security teams can create playbooks that automate incident response processes, reducing the time to detect, investigate, and resolve security threats. The platform also offers advanced analytics, real-time threat intelligence, and collaboration tools to enhance decision-making and improve overall security posture. By automating routine tasks and enabling more efficient use of resources, Splunk SOAR helps organizations respond to threats with greater speed and accuracy, minimizing risks and enhancing cybersecurity resilience.
  • 10
    Booz Allen MDR

    Booz Allen MDR

    Booz Allen Hamilton

    Protect your network with complete visibility and layered detection. Our customized managed detection and response (MDR) service gives you advanced threat detection, investigation, and response delivered via out-of-band network sensors which provide full visibility to network communications. We focus on malicious activity happening inside and around your environment to protect you from known and unknown threats. Receive instant detection using full packet capture, blended detection tools, SSL decryption, and the advantages of Booz Allen’s Cyber Threat Intelligence service. Industry-leading threat analysts will investigate and contain your network’s security events, giving you more accurate and applicable intelligence. The Booz Allen team provides threat investigation services, contextual intelligence, reverse engineering, and the ability to write rules and custom signatures to stop attacks in real time.
  • 11
    Eviden MDR Service
    How to ensure your organization is permanently protected against cyber-threats? Cyber-attacks get more sophisticated and more aggressive every day. As a cybersecurity service provider, Eviden provides continuous protection in a rapidly changing world of threat. Eviden offers a full spectrum of advanced detection and response services around the clock and across the globe. We have developed the next generation SOC, Prescriptive Security Operation Center dedicated on preventing breaches from happening by leveraging big data and supercomputing capabilities and automating security responses. We provide CERT services, with threat intelligence, CSIRT Services and vulnerability management. Our Advanced Detection and Response services establish highly resilient security practices to counter Advanced Persistent Threats (APT), SOC Services and context-aware IAM. Get 24/7 threat monitoring, hunting, and full-service response.
  • 12
    Cisco Cyber Vision
    The deeper integration between IT, cloud and industrial control networks (ICS) is exposing your industrial operations to cyber threats. Cisco Cyber Vision has been specifically developed for OT and IT teams to work together to ensure production continuity, resilience and safety. You can now deploy Industrial Internet of Things (IIoT) technologies and capture the benefits of your industry digitization efforts. Kick-start your OT security project by building an accurate list of all your industrial assets, communication patterns and network topologies. Feed your SOC (security operations center) with OT context and leverage the time and money you have invested in IT cybersecurity to secure your OT network. Take OT security to the next level: Have detailed information to comply with regulations and enable effective collaboration between OT and IT experts.
  • 13
    Splunk Infrastructure Monitoring
    The only real-time, analytics-driven multicloud monitoring solution for all environments (formerly SignalFx). Monitor any environment on a massively scalable streaming architecture. Open, flexible data collection and rapid visualizations of services in seconds. Purpose built for ephemeral and dynamic cloud-native environments at any scale (e.g., Kubernetes, container, serverless). Detect, visualize and resolve issues as soon as they arise. Monitor infrastructure performance in real-time at cloud scale through predictive streaming analytics. Over 200 pre-built integrations for cloud services and out-of-the-box dashboards for rapid visualization of your entire stack. Autodiscover, breakdown, group, and explore clouds, services and systems. Quickly and easily understand how your infrastructure behaves across different services, availability zones, Kubernetes clusters and more.
  • 14
    Optiv Security Awareness Training
    No matter how advanced your security technology every organization has risk associated with its workforce. Human risk is difficult to quantify because stakeholders must consider every type of threat, malicious, negligent, and unwitting. Investing in a holistic program to educate and empower everyone who touches your network, inherently reduces the risk by increasing awareness and impacting culture. We customize our comprehensive security awareness training programs for your organization based on uncovered or perceived threats targeting your people. Meaningful, relevant, current training content establishes a solid foundation and threat emulation campaigns (phishing, USB drops) provide insight and create opportunities for risk mitigation.
  • 15
    Cisco Catalyst Center
    Optimize resources, reduce spending, and enhance your organization's digital agility with a powerful management system that uses AI to connect, secure, and automate network operations. Deploy networks faster with provisioning and configuration automation. Proactively scale your network using deep insights into capacity and performance. Improve time to resolution with AI diagnostics and remediation. Optimize Wi-Fi coverage and deliver services where they're needed with 3D visualization. Gain visibility into the user experience and improve hybrid work experience with application insights.
  • 16
    Cisco Adaptive Security Appliance (ASA)
    Cisco Adaptive Security Appliance (ASA) Software is the core operating system for the Cisco ASA Family. It delivers enterprise-class firewall capabilities for ASA devices in an array of form factors - standalone appliances, blades, and virtual appliances - for any distributed network environment. ASA Software also integrates with other critical security technologies to deliver comprehensive solutions that meet continuously evolving security needs.
  • 17
    Splunk Observability Cloud
    Splunk Observability Cloud is a comprehensive, real-time monitoring and observability platform designed to help organizations gain full visibility into their cloud-native environments, infrastructure, applications, and services. It combines metrics, logs, and traces into a unified solution, providing seamless end-to-end visibility across complex architectures. With its powerful analytics, AI-driven insights, and customizable dashboards, Splunk Observability Cloud helps teams quickly identify and resolve performance issues, reduce downtime, and improve system reliability. It supports a wide range of integrations and provides real-time, high-resolution data for proactive monitoring. This enables IT and DevOps teams to detect anomalies, optimize performance, and ensure the health and efficiency of their cloud and hybrid environments.
  • Previous
  • You're on page 1
  • Next