Best Network Management Software for Splunk Cloud Platform

Compare the Top Network Management Software that integrates with Splunk Cloud Platform as of December 2025

This a list of Network Management software that integrates with Splunk Cloud Platform. Use the filters on the left to add additional filters for products that have integrations with Splunk Cloud Platform. View the products that work with Splunk Cloud Platform in the table below.

What is Network Management Software for Splunk Cloud Platform?

Network management software is software used by organizations to monitor and control their computer networks. It collects data on network performance, identifies potential issues, and allows for remote management of devices. This software often includes features such as network mapping, traffic analysis, and security monitoring. It can be used to optimize network performance, troubleshoot problems, and reduce downtime. Many options are available on the market today from various vendors with varying levels of complexity and functionality. Compare and read user reviews of the best Network Management software for Splunk Cloud Platform currently available using the table below. This list is updated regularly.

  • 1
    Device42

    Device42

    Device42, A Freshworks Company

    With customers across 70+ countries, organizations of all sizes rely on Device42 as the most trusted, advanced, and complete full-stack agentless discovery and dependency mapping platform for Hybrid IT. With access to information that perfectly mirrors the reality of what is on the network, IT teams are able to run their operations more efficiently, solve problems faster, migrate and modernize with ease, and achieve compliance with flying colors. Device42 continuously discovers, maps, and optimizes infrastructure and applications across data centers and cloud, while intelligently grouping workloads by application affinities and other resource formats that provide a clear view of what is connected to the environment at any given time. As part of the Freshworks family, we are committed to, and you should expect us to provide even better solutions and continued support for our global customers and partners, just as we always have.
    Leader badge
    Starting Price: $1499.00/year
    View Software
    Visit Website
  • 2
    ThreatLocker

    ThreatLocker

    ThreatLocker

    The ThreatLocker suite of security tools are powerful and designed so that everyone from businesses to government agencies to academic institutions can directly control exactly what applications run on their networks. We envision a future in which all organizations can chart their own course free from the influence of cybercriminals and the damage their incursions cause, and our team of veteran cybersecurity professionals created ThreatLocker to make this vision a reality. The team at ThreatLocker has been developing cybersecurity tools for decades, including programs to enhance email and content security, and this is our most innovative and ambitious cybersecurity solution yet. We developed this unique cybersecurity system because we believe that organizations should have complete control of their networks and should not have to live in fear of the next malware attack. To learn more, visit ThreatLocker.com.
    Leader badge
    Partner badge
    View Software
    Visit Website
  • 3
    PagerDuty

    PagerDuty

    PagerDuty

    PagerDuty, Inc. (NYSE:PD) is a leader in digital operations management. In an always-on world, organizations of all sizes trust PagerDuty to help them deliver a perfect digital experience to their customers, every time. Teams use PagerDuty to identify issues and opportunities in real time and bring together the right people to fix problems faster and prevent them in the future. PagerDuty's ecosystem of over 350+ integrations, including Slack, Zoom, ServiceNow, AWS, Microsoft Teams, Salesforce, and more, enable teams to centralize their technology stack, get a holistic view of their operations, and optimize processes within their toolsets.
  • 4
    Datadog

    Datadog

    Datadog

    Datadog is the monitoring, security and analytics platform for developers, IT operations teams, security engineers and business users in the cloud age. Our SaaS platform integrates and automates infrastructure monitoring, application performance monitoring and log management to provide unified, real-time observability of our customers' entire technology stack. Datadog is used by organizations of all sizes and across a wide range of industries to enable digital transformation and cloud migration, drive collaboration among development, operations, security and business teams, accelerate time to market for applications, reduce time to problem resolution, secure applications and infrastructure, understand user behavior and track key business metrics.
    Leader badge
    Starting Price: $15.00/host/month
  • 5
    Dotcom-Monitor

    Dotcom-Monitor

    Dotcom-Monitor

    Website monitoring and performance testing solutions. Combined with powerful monitoring features such as real-time dashboards and performance reporting options, and nearly 30 global monitoring network locations, you can quickly identify where performance issues are occurring. Quickly and easily record custom scripts to monitor interactive websites and web application elements and user scenarios with the EveryStep Web Recorder. Dotcom-Monitor makes it easy to ensure performance, functionality, and uptime of the most complex websites, web applications, and web services.
    Starting Price: $19.99/month
  • 6
    Edge Delta

    Edge Delta

    Edge Delta

    Edge Delta is a new way to do observability that helps developers and operations teams monitor datasets and create telemetry pipelines. We process your log data as it's created and give you the freedom to route it anywhere. Our primary differentiator is our distributed architecture. We are the only observability provider that pushes data processing upstream to the infrastructure level, enabling users to process their logs and metrics as soon as they’re created at the source. We combine our distributed approach with a column-oriented backend to help users store and analyze massive data volumes without impacting performance or cost. By using Edge Delta, customers can reduce observability costs without sacrificing visibility. Additionally, they can surface insights and trigger alerts before data leaves their environment.
    Starting Price: $0.20 per GB
  • 7
    7SIGNAL

    7SIGNAL

    7SIGNAL

    For organizations that rely on mission critical Wi-Fi to conduct business, 7SIGNAL is a cloud-based Wireless Network Monitoring (WNM) platform that continuously tests the wireless network for performance issues – maximizing network uptime, device connectivity and network ROI. Unlike other providers, who monitor the network from the inside-out at the infrastructure level, 7SIGNAL operates on the networks edge, monitoring the “air” and capturing the user experience on the client device. Modules Sapphire Eye is a state-of-the-art Wi-Fi sensor developed and patented by 7SIGNAL. Sapphire Eye hardware sensors are installed on-site and are uniquely designed to measure wireless network service quality remotely using cloud-based software. Mobile Eye is a Software as a Service (SaaS) application developed and patented by 7SIGNAL. Mobile Eye is installed on the end user’s wireless device and empowers organizations to continuously monitor the wireless network from the end point.
  • 8
    Alibaba Cloud ARMS
    Build business monitoring capabilities with real-time response based on frontend monitoring, application monitoring, and custom business monitoring capabilities. Application Real-Time Monitoring Service (ARMS) is an end-to-end Alibaba Cloud monitoring service for Application Performance Management (APM). You can quickly develop real-time business monitoring capabilities using the frontend monitoring, application monitoring, and custom monitoring features provided by ARMS. Implements APM performance and anomaly monitoring in distributed applications, based on tracing information. Reflects user webpage browsing behavior in real time using dimensions such as geological regions, ISPs, and URLs. Allows you to create real-time monitoring alarms and dashboards based on your business needs. Integrates custom monitoring, frontend monitoring, and application monitoring into a centralized alarm and report platform.
    Starting Price: $145 per six months
  • 9
    Alibaba Cloud Anti-Bot Service
    Anti-Bot Service provides comprehensive bot defense for Web applications, HTML5 websites, mobile apps, and APIs. It can effectively reduce the risks caused by specific vulnerabilities. You can use Anti-Bot Service in the following scenarios: flight seating occupancy, online scalping, user enumeration, and core API exploitation. Anti-Bot Service is a reverse proxy technology based SaaS solution that allows you to specify custom protection policies to identify and control malicious traffic. You can also view the protection status in the console. Provides comprehensive anti-bot protection that covers the Web, mobile apps, and APIs. Get protection with simple access configurations, no code change required on the server side. Provides large amounts of security threat information on the cloud and timely updates protection policies against attacks. Identifies and filters malicious traffic without affecting the user experience.
    Starting Price: $707.55 per month
  • 10
    Cyble

    Cyble

    Cyble

    Cyble is a leading AI-native cybersecurity platform that delivers intelligence-driven defense to help organizations stay ahead of evolving cyber threats. Powered by its Gen 3 Agentic AI, Cyble offers autonomous threat detection, real-time incident response, and proactive defense mechanisms. The platform provides comprehensive capabilities including attack surface management, vulnerability management, brand protection, and dark web monitoring. Trusted by governments and enterprises worldwide, Cyble combines unmatched visibility with scalable technology to keep security teams ahead of adversaries. With advanced AI that can predict threats months in advance, Cyble helps reduce response times and minimize risks. The company also offers extensive research, threat intelligence reports, and personalized demos to support customer success.
  • 11
    Elastiflow

    Elastiflow

    Elastiflow

    The most complete network observability solution for use with modern data platforms, providing unprecedented insights at any scale. ElastiFlow allows organizations to achieve unprecedented levels of network performance, availability, and security. ElastiFlow provides granular information about network traffic flows, including source and destination IP addresses, ports, protocols, and the amount of data transmitted. This information allows network administrators to gain deep insights into the network's performance and identify potential issues. ElastiFlow is highly valuable for diagnosing and troubleshooting network issues such as congestion, high latency, or packet loss. By analyzing the network traffic, administrators can pinpoint the cause of the problem and take appropriate action to resolve it. By leveraging ElastiFlow, organizations can improve their security posture, detect and respond to threats more effectively, and maintain compliance with regulatory requirements.
    Starting Price: Free
  • 12
    SurePassID

    SurePassID

    SurePassID

    SurePassID is an advanced, deploy-anywhere multi-factor authentication platform built to secure both IT and OT (operational technology) environments, including critical infrastructure, legacy systems, on-premise, air-gapped, hybrid cloud, or fully cloud-based operations. It supports a wide variety of authentication methods; passwordless, phishing-resistant approaches like FIDO2/WebAuthn (with FIDO2 PIN, biometric, or push), as well as one-time passwords (OTP via OATH HOTP/TOTP), mobile push, SMS, voice, and traditional methods. SurePassID integrates with common operating systems, including domain and local logins, RDP/SSH remote access, and even legacy or embedded Windows systems often found in OT/ICS/SCADA environments, enabling offline 2FA when needed. It also supports securing VPNs, network devices, appliances, legacy applications, web apps (via SAML 2.0 or OIDC identity provider functionality), and network-device access protocols.
    Starting Price: $48 per year
  • 13
    Syteca

    Syteca

    Syteca

    Syteca — Transforming human risk into human assets! The Syteca platform is a comprehensive cybersecurity solution designed to meet the diverse needs of modern organizations. The platform features a customizable security toolkit enabling customers to employ granular privileged access management (PAM), advanced user activity monitoring (UAM), or a powerful combination of both. Syteca is specifically designed to secure organizations against threats caused by insiders. It provides full visibility and control over internal risks. We help leading companies to protect their sensitive data from numerous industries like Financial, Healthcare, Energy, Manufacturing, Telecommunication and IT, Education, Government, etc. Over 2,500 organizations across the world rely on Syteca! Key solutions and capabilities: - Insider threats management - Privileged Access Management - User activity monitoring - User and entity behavior
  • 14
    Splunk On-Call
    Empower teams by routing alerts to the right people for fast collaboration and issue resolution. Deliver the right alerts to the right people reducing time to acknowledge and resolve incidents. Complete ChatOps experience, integration with the tools you already have, incident timelines and reporting for blameless post-incident reviews. Engage people where they work. Mobile-first experiences leverage machine learning to make on-call accessible wherever you are. Splunk On-Call automates incident management, reducing alert fatigue and increasing uptime. Use Splunk On-Call to streamline your on-call schedules and escalation policies. From rotations to overrides, we automate all the essentials. Our software provides contextual alert information, suggestions driven from machine learning, and empowers collaboration to solve problems with speed and efficiency, all while capturing essential remediation data.
    Starting Price: $27.00/month/user
  • 15
    BigPanda

    BigPanda

    BigPanda

    Aggregate data from all observability, monitoring, change and topology tools. BigPanda’s Open Box Machine Learning will correlate the data into a small number of actionable insights so incidents are detected in real-time, as they form, before they escalate into outages. Accelerate incident and outage resolution by automatically identifying the probable root cause of problems. BigPanda identifies both root cause changes and infrastructure-related root causes. Resolve incidents and outages faster. BigPanda automates and streamlines the incident response lifecycle across incident triage, ticketing, notifications, and war room creation. Accelerate remediation by integrating BigPanda with enterprise runbook automation tools. Applications and cloud services are the lifeblood of every company. When there’s an outage, everyone is impacted. BigPanda cements AIOps market leadership with $190M in funding, $1.2B valuation.
  • 16
    Armis Centrix
    Armis Centrix™ is a comprehensive cyber exposure management platform that provides continuous, real-time visibility and protection across IT, OT, IoT, and IoMT environments. Powered by the Armis AI-driven Asset Intelligence Engine, it identifies every connected device, assesses cyber risk, and monitors vulnerabilities across an organization’s entire digital attack surface. The platform automates risk scoring, streamlines compliance reporting, and supports rapid incident response through deep asset intelligence. With capabilities that span asset management, OT/IoT security, medical device protection, and early warning threat detection, Armis Centrix™ enhances operational resilience for modern enterprises. VIPR Pro adds advanced prioritization and remediation to connect findings directly to actionable fixes. Designed as a cloud-native, frictionless platform, Armis Centrix™ empowers organizations to reduce exposure, strengthen security posture, and maintain continuity at scale.
  • 17
    Sensu

    Sensu

    Sensu

    Sensu is the future-proof solution for multi-cloud monitoring at scale. The Sensu monitoring event pipeline empowers businesses to automate their monitoring workflows and gain deep visibility into their multi-cloud environments. Companies like Sony, Box.com, and Activision rely on Sensu to help deliver value to their customers faster and more reliably. Founded in 2017, Sensu offers a comprehensive monitoring solution for enterprises, providing complete visibility across every system, every protocol, every time — from Kubernetes to bare metal. Built by operators, for operators, open source is at the heart of the Sensu product and company, with an active, thriving community of contributors.
    Starting Price: $600.00/month
  • 18
    WatchTower Security Management App
    Monitor your network with Check Point’s WatchTower Security Management app and quickly mitigate security threats on the go with your mobile phone. The intuitive WatchTower Security Management App provides real-time monitoring of network events, alerts you when your network is at risk, enables you to quickly block security threats, and configure the security policy for multiple gateways. View the devices connected to your network and any potential security threats. Real-time notification of malicious attacks or unauthorized device connections. Quickly block malware-infected devices and view infection details for further investigation. Customize notifications for your top-priority security events. View all security events by category and drill down for further information. Configure the security settings for multiple gateways. Manage advanced security policy settings securely via web user interface.
  • 19
    Martello Vantage DX
    Managing Microsoft Teams and Microsoft Office 365 application performance requires deep insight into the real user experience as well as coordination between IT departments and service providers that each work with different tools with different objectives. IT teams often struggle to qualify and solve application performance or voice quality issues because available data from user feedback and traditional monitoring tools don’t provide substantial insight into the user experience. Martello Vantage DX™ gives IT teams complete end-to-end visibility of Microsoft 365 user experience to rapidly detect and resolve problems before they impact the user experience. Detect, alert and anticipate user experience challenges. Qualify and prioritize IT and third-party issues impacting Microsoft Teams and Microsoft Office 365. Ensure optimal Microsoft service productivity for your business lines.
  • 20
    Flowmon

    Flowmon

    Progress Software

    Make informed decisions and deal with network anomalies in real time. Cloud, hybrid or on-premise, with Flowmon’s actionable intelligence you are in control. Flowmon’s network intelligence integrates NetOps and SecOps into one versatile solution. Capable of automated traffic monitoring and threat detection, it creates a strong foundation for informed decision-making without having to sift through volumes of information noise. Its intuitive interface allows IT professionals to quickly learn about incidents and anomalies, understand their context, impact, magnitude, and most importantly, their root cause.
  • 21
    Netacea Bot Management
    At Netacea we understand bot behaviour better than anyone else, thanks to a pioneering server-side approach to detection and mitigation. Our approach guarantees quick and easy implementation of our technology and enables us to support a wide range of integrations. This ensures comprehensive coverage against malicious bots across your website, mobile apps and APIs, without detriment to your website infrastructure, reliance on hardware or disruptive code changes. We quickly distinguish automated bots from humans to prioritize genuine users, with our team of experts and revolutionary, machine learning powered Intent Analytics™ engine at the heart of the solution. Netacea works hand-in-hand with your in-house security functions from implementation, through to providing accurate detection and empowering you with actionable threat intelligence.
  • 22
    CloudMonitor
    CloudMonitor collects monitor metrics of Alibaba Cloud resources and custom metrics. The service can be used to detect the availability of your service and allows you to set alarms on specific metrics. CloudMonitor enables you to view and fully understand the usage of the cloud resources, and the status and health of your business, so that you can act promptly to ensure the availability of your application when an alarm is triggered. No coding is required. You can set up CloudMonitor and alarms through the wizard in a few steps. You can set alarms based on different scenarios, and send alarms using multiple methods. A comprehensive service that monitors the basic resources, application availability, and also custom business metrics. Allows you to manage cloud resources that are used in different applications by group.
  • 23
    Centreon

    Centreon

    Centreon

    Centreon is a global provider of business-aware IT monitoring for always-on operations and performance excellence. The company’s holistic, AIOps-ready platform is designed for today’s complex, distributed hybrid cloud infrastructures. Centreon monitors the complete IT Infrastructure from Cloud-to-Edge for a clear and comprehensive view. Centreon removes blind spots, monitoring all equipment, middleware and applications that are part of modern IT workflows, from on-premise legacy assets to private and public cloud environments, all the way to the edge of the network, where smart devices and customers combine to create business value. Centreon is constantly current, able to support the most dynamic environments. With auto-discovery capabilities it can keep track of Software-Defined Network (SDN) elements, AWS or Azure cloud assets, Wi-Fi access points or any other component of today’s agile IT infrastructure.
  • 24
    FortiManager
    The rapid influx of digital transformation (DX) technologies has made networks and network security much more complex and vulnerable. While malicious cyberattacks remain a serious problem, a recent Ponemon study shows that more than half of all breaches last year came from benign sources that could have been prevented. A security strategy that prioritizes automation-driven network operations can help. As part of the Fortinet Security Fabric, FortiManager supports network operations use cases for centralized management, best practices compliance, and workflow automation to provide better protection against breaches. Manage all your Fortinet devices in a single console central management system. FortiManager provides full visibility of your network, offering streamlined provisioning and innovative automation tools. FortiManager provides insight into network traffic and threats through a single-pane-of-glass and offers enterprise-class features and sophisticated security management.
  • 25
    R81.10

    R81.10

    Check Point Software Technologies

    R81.10 is the industry’s most advanced threat prevention and security management software that delivers uncompromising simplicity and consolidation across the enterprise. Providing autonomous prevention, R81.10 aims to relieve the IT admins daily effort and make managing cyber security the simplest it’s ever been. Whether it is deploying the latest technologies and security to protect the organization or expertly crafting security policies, R81.10 enables enterprises to be their best. Automatically allocate hardware and core resources based on traffic characteristics. Provide higher levels of performance and security. Check Point offers, for the first time, an all-inclusive security management architecture delivered from the cloud designed to manage security across on-premise firewalls, networks, cloud, mobile, and IoT. Boost your security level across your entire Check Point environment with a dynamic security compliance solution that monitors your security infrastructure.
  • 26
    Selector Analytics
    Selector’s software-as-a-service employs machine learning and NLP-driven, self-serve analytics to provide instant access to actionable insights and reduce MTTR by up to 90%. Selector Analytics uses artificial intelligence and machine learning to conduct three essential functions and provide actionable insights to network, cloud, and application operators. Selector Analytics collects any data (including configurations, alerts, metrics, events, and logs), from various heterogeneous data sources. For example, Selector Analytics may harvest data from router logs, device or network metrics, or device configurations. Once collected, Selector Analytics normalizes, filters, clusters, and correlates metrics, events, and alarms using pre-built workflows to draw actionable insights. Selector Analytics then uses machine learning-based data analytics to compare metrics and events and conduct automated anomaly detection.
  • 27
    LONI

    LONI

    LONI

    Take action instantly from anywhere. Real-time vendor-agnostic network management tool for your existing network, security, & cloud infrastructure with the power of true ZeroCode automation. Unified management, automation, intelligence, and operations for your security, cloud, network, and IOT infrastructure. Single source of truth for actionable data. Manage any device with an IP address. Automate any task in your IT infrastructure without writing a single line of code. Let infrastructure engineers focus on infrastructure and let LONI focus on code. Never restore a configuration or device from scratch again with our rollback feature. The power to leverage your smartphone, tablet, or smartwatch for the automation and management of your network, cloud, or IoT infrastructure. Instantly mitigate any cyber attack from your smartphone, tablet, or smartwatch. Automate and manage your security infrastructure with the power of mobile.
  • 28
    Sepio

    Sepio

    Sepio

    Detect, accurately identify, and manage your asset risks based on existence, not behavior. Augmented by OSINT data sources and internal cyber research, Sepio provides up-to-date intelligence on known asset vulnerabilities, so you don’t have to chase them. Granular parameters allow you to create and customize multiple differentiated policies that govern your entire ecosystem of IT, OT, and IoT assets so you have flexibility when it comes to managing your risks. Automated policy enforcement ensures immediate and uniformly applied action saving you from manual intervention so you can respond to asset risks and threats faster. Integration with third-party tools allows for expanded policy actions. Complete visibility to all of your assets, whether connected as a peripheral or a network element. Mitigate risks from uncontrolled or spoofing assets. Easy to operate, requiring low maintenance and minimal human intervention.
  • 29
    OTbase

    OTbase

    Langner

    OTbase is a productivity and collaboration tool for your journey towards secure and resilient OT networks. It enables users in cyber security and engineering roles to stay on top of hyper-complex OT networks with hundreds of thousands of devices. OTbase not just inventories your OT systems automatically, it also acts as a plattform to streamline, plan, and document your digital transformation journey. OTbase provides full transparency on all aspects of your OT networks, from minute configuration details to high level KPIs in a CISO dashboard. OTbase enables cyber security experts, control engineers, maintenance experts, plant planners, process engineers, and SOC analysts to get the information they need in an instant.
  • 30
    Tenzir

    Tenzir

    Tenzir

    ​Tenzir is a data pipeline engine specifically designed for security teams, facilitating the collection, transformation, enrichment, and routing of security data throughout its lifecycle. It enables users to seamlessly gather data from various sources, parse unstructured data into structured formats, and transform it as needed. It optimizes data volume, reduces costs, and supports mapping to standardized schemas like OCSF, ASIM, and ECS. Tenzir ensures compliance through data anonymization features and enriches data by adding context from threats, assets, and vulnerabilities. It supports real-time detection and stores data efficiently in Parquet format within object storage systems. Users can rapidly search and materialize necessary data and reactivate at-rest data back into motion. Tension is built for flexibility, allowing deployment as code and integration into existing workflows, ultimately aiming to reduce SIEM costs and provide full control.
  • Previous
  • You're on page 1
  • 2
  • Next