8 Integrations with Deep Instinct

View a list of Deep Instinct integrations and software that integrates with Deep Instinct below. Compare the best Deep Instinct integrations as well as features, ratings, user reviews, and pricing of software that integrates with Deep Instinct. Here are the current Deep Instinct integrations in 2024:

  • 1
    Splunk Enterprise
    Go from data to business outcomes faster than ever before with Splunk. Splunk Enterprise makes it simple to collect, analyze and act upon the untapped value of the big data generated by your technology infrastructure, security systems and business applications—giving you the insights to drive operational performance and business results. Collect and index log and machine data from any source. Combine your machine data with data in your relational databases, data warehouses and Hadoop and NoSQL data stores. Multi-site clustering and automatic load balancing scale to support hundreds of terabytes of data per day, optimize response times and provide continuous availability. The Splunk platform makes it easy to customize Splunk Enterprise to meet the needs of any project. Developers can build custom Splunk applications or integrate Splunk data into other applications. Apps from Splunk, our partners and our community enhance and extend the power of the Splunk platform.
  • 2
    Axonius

    Axonius

    Axonius

    Axonius gives customers the confidence to control complexity by providing a system of record for all digital infrastructure. With a comprehensive understanding of all assets including devices, identities, software, SaaS applications, vulnerabilities, security controls, and the context between all assets, customers are able to mitigate threats, navigate risk, decrease incident response time, automate action, and inform business-level strategy — all while eliminating manual, repetitive tasks. Recognized as creators of the Cyber Asset Attack Surface Management (CAASM) category and innovators in SaaS Management Platform (SMP) and SaaS Security Posture Management (SSPM), Axonius is deployed in minutes and integrates with hundreds of data sources to provide a comprehensive asset inventory, uncover gaps, and automatically enforce policies and automate action.
  • 3
    Workspace ONE
    Simply and securely deliver and manage any app on any device with Workspace ONE, an intelligence-driven digital workspace platform. Workspace ONE integrates access control, application management and multi-platform endpoint management into a single platform and is available as a cloud service or on-premises deployment. Enables enterprises to maximize employee engagement and productivity by empowering employees with a personalized experience and Day One access to any app on any device. Embrace a single, cloud-native solution for unified endpoint management—for any device and any use case. Eliminate silos and manage every device and app type faster, with fewer point solutions and more capabilities. Secure devices, users, and data with conditional access, automated patching, and configuration policies to achieve a comprehensive Zero Trust security approach.
  • 4
    IBM Security QRadar SIEM
    Market-leading SIEM built to outpace the adversary with speed, scale and accuracy As digital threats loom large and cyber adversaries grow increasingly sophisticated, the roles of SOC analysts are more critical than ever. Going beyond threat detection and response, QRadar SIEM enables security teams face today’s threats proactively with advanced AI, powerful threat intelligence, and access to cutting-edge content to maximize analyst potential. Whether you need cloud-native architecture built for hybrid scale and speed or a solution to complement your on-premises infrastructure, IBM can provide you with a SIEM to meet your needs. Experience the power of IBM enterprise-grade AI designed to amplify the efficiency and expertise of every security team. With QRadar SIEM, analysts can reduce repetitive manual tasks like case creation and risk prioritization to focus on critical investigation and remediation efforts.
  • 5
    Cortex XDR

    Cortex XDR

    Palo Alto Networks

    Fewer alerts, end-to-end automation, smarter security operations. The industry’s most comprehensive product suite for security operations empowering enterprises with the best-in-class detection, investigation, automation and response capabilities. Cortex XDR™ is the industry’s only detection and response platform that runs on fully integrated endpoint, network, and cloud data. Manage alerts, standardize processes and automate actions of over 300 third-party products with Cortex XSOAR – the industry's leading security orchestration, automation and response platform. Collect, transform, and integrate your enterprise’s security data to enable Palo Alto Networks solutions. Make the world’s highest-fidelity threat intelligence with unrivaled context available to power up investigation, prevention and response.
  • 6
    OpenText Operations Bridge
    OpenText™ Operations Bridge is enterprise event and performance management software. With automated discovery, monitoring, and remediation, it fast-tracks your move to full-stack AIOps across multicloud and on-premises environments. Adopt AIOps capabilities faster with a SaaS platform that consolidates data across your toolsets, pinpoints service slowdowns, and uncovers solutions. Dynamically discover services and dependent resources in the cloud and on premises—regaining complete IT observability and resolving problems faster. Pick the deployment option that works best with your organization’s strategy—whether that be speed and flexibility or 100% control.
  • 7
    Amazon Keyspaces
    Amazon Keyspaces (for Apache Cassandra) is a scalable, highly available, and managed Apache Cassandra–compatible database service. With Amazon Keyspaces, you can run your Cassandra workloads on AWS using the same Cassandra application code and developer tools that you use today. You don’t have to provision, patch, or manage servers, and you don’t have to install, maintain, or operate software. Amazon Keyspaces is serverless, so you pay for only the resources you use and the service can automatically scale tables up and down in response to application traffic. You can build applications that serve thousands of requests per second with virtually unlimited throughput and storage. Amazon Keyspaces gives you the performance, elasticity, and enterprise features you need to operate business-critical Cassandra workloads at scale. Process data at high speeds for applications that require single-digit-millisecond latency, such as industrial equipment maintenance, trade monitoring, etc.
  • 8
    Citrix Hypervisor

    Citrix Hypervisor

    Citrix Systems

    Business needs can change fast, so you need virtualization management built to perform. Citrix Hypervisor makes it easy to maintain environments, all while powering your most robust workloads and securing virtual infrastructure from advanced threats. Optimized for Citrix Virtual Apps and Desktops, Citrix Hypervisor simplifies your operational management, ensuring a high definition user experience for intensive workloads. Citrix Hypervisor is free for our Citrix Virtual Apps and Desktops customers to further enhance your environment.
  • Previous
  • You're on page 1
  • Next