10 Integrations with ExtraHop
View a list of ExtraHop integrations and software that integrates with ExtraHop below. Compare the best ExtraHop integrations as well as features, ratings, user reviews, and pricing of software that integrates with ExtraHop. Here are the current ExtraHop integrations in 2024:
-
1
Pliant
Pliant.io
Pliant’s solution for IT Process Automation simplifies, streamlines, and secures how teams build and deploy automation. Reduce human error, ensure compliance, and elevate your efficiency, with Pliant. Ingest existing automation and write new automation with single-pane orchestration. Ensure compliance using consistent, practical built-in governance. Pliant has abstracted thousands of vendor APIs to create intelligent action blocks allowing users to drag-and-drop blocks, rather than writing and rewriting lines of code. From a single platform, citizen developers are able to build consistent and meaningful automation across platforms, services, and applications in minutes — maximizing value across the entire technology stack in one place. With our ability to add new APIs in 15 business days, anything that is not already out of the box will be in an industry leading timeframe. -
2
CYREBRO
CYREBRO
CYREBRO is a Managed Detection and Response (MDR) solution providing the core foundation and capabilities of a Security Operations Center delivered through its cloud-based, interactive SOC Platform. CYREBRO rapidly detects, analyzes, investigates and responds to cyber threats. CYREBRO MDR is a true 24/7/365 ML-backed solution that includes a proprietary detection engine for log ingestion, detection and orchestration, a SOAR for correlations, automations and investigations, SOC Platform for real-time investigation data and visibility, and top tier analyst and DFIR teams. Backed with 1,500+ proprietary detection algorithms that are constantly optimized, CYREBRO monitors companies facing different types of risks and attacks, shortening mean time to detect (MTTD). CYREBRO is vendor-neutral and easily connects to hundreds of different tools and systems, delivering TTV within mere hours. -
3
Axonius
Axonius
Axonius gives customers the confidence to control complexity by providing a system of record for all digital infrastructure. With a comprehensive understanding of all assets including devices, identities, software, SaaS applications, vulnerabilities, security controls, and the context between all assets, customers are able to mitigate threats, navigate risk, decrease incident response time, automate action, and inform business-level strategy — all while eliminating manual, repetitive tasks. Recognized as creators of the Cyber Asset Attack Surface Management (CAASM) category and innovators in SaaS Management Platform (SMP) and SaaS Security Posture Management (SSPM), Axonius is deployed in minutes and integrates with hundreds of data sources to provide a comprehensive asset inventory, uncover gaps, and automatically enforce policies and automate action. -
4
cPacket
cPacket Networks
cPacket enables network-aware application performance and security assurance for the distributed hybrid-IT environment. Our single-pane-of-glass analytics power advanced machine learning-based AIOps. With cPacket, you can efficiently manage, secure and future-proof your network enabling digital transformation. The industry’s most complete, yet simple, network visibility stack provides all the components you need to manage your hybrid network across branch, data center and the cloud.Starting Price: cVu-V - $21,000/year -
5
InsightFinder
InsightFinder
InsightFinder Unified Intelligence Engine (UIE) platform provides human-centered AI solutions for identifying incident root causes, and predicting and preventing production incidents. Powered by patented self-tuning unsupervised machine learning, InsightFinder continuously learns from metric time series, logs, traces, and triage threads from SREs and DevOps Engineers to bubble up root causes and predict incidents from the source. Companies of all sizes have embraced the platform and seen that business-impacting incidents can be predicted hours ahead with clearly pinpointed root causes. Survey a comprehensive overview of your IT Ops ecosystem, including patterns, trends, and team activities. Also view calculations that demonstrate overall downtime savings, cost of labor savings, and number of incidents resolved.Starting Price: $250 per month -
6
GigaSECURE
Gigamon
The GigaSECURE® Security Delivery Platform is a next-generation network packet broker focused on threat prevention, detection, prediction and containment. The right tools get the right traffic at the right time, every time. Enable network security tools to keep up with increasing network speed. Gain insight into network traffic. Optimize and deliver relevant data for tool consumption. Reduce tool sprawl and lower costs. Efficient prevention coupled with rapid detection and containment improves your overall security posture. Threats don't stand a chance. GigaSECURE enables security teams to obtain broad access to and control of network data, no matter where it resides. It can be customized to extract specific application sessions, metadata and decrypted traffic. In this architecture, security tools can operate inline or out-of-band at peak performance without compromising network resiliency or speed. -
7
Splunk SOAR
Splunk
Splunk SOAR (Security Orchestration, Automation, and Response) is a powerful platform that enables organizations to streamline and automate their security operations. It integrates with various security tools and systems, allowing teams to automate repetitive tasks, orchestrate workflows, and respond to incidents faster. With Splunk SOAR, security teams can create playbooks that automate incident response processes, reducing the time to detect, investigate, and resolve security threats. The platform also offers advanced analytics, real-time threat intelligence, and collaboration tools to enhance decision-making and improve overall security posture. By automating routine tasks and enabling more efficient use of resources, Splunk SOAR helps organizations respond to threats with greater speed and accuracy, minimizing risks and enhancing cybersecurity resilience. -
8
Optiv Managed XDR
Optiv
Attackers are stealthy, relentless and motivated, and might use the same tools you do. They hide in your environment and quickly expand access. We understand the cyber ecosystem because it’s where we live, it’s where we operate. Our MXDR solution’s secret sauce derives from that pedigree, tested processes, proven IP, best-of-breed technology, leveraged automation and providing top-shelf talent to manage it all. Let’s collaborate and develop a custom solution with comprehensive threat visibility, accelerated incident identification, investigation, triage and mitigation actions to protect your enterprise from attacks and threats. We’ll start with your existing investments in endpoint, network, cloud, email and OT/IoT tools. Our experts will get those on the same team, actual technology orchestration! Reduces the attack surface, detects threats faster and automates deep investigation through a continuous approach. -
9
Otava
Otava
Otava Gen3 Cloud makes cloud computing incredibly easy. Leveraging VMware Cloud Director, you can quickly add and configure resources in your environment and dream big. Consumption-based billing allows for full transparency of usage and volume at the detailed level. Which means you have easy access to the full set of interoperable VMware Cloud Infrastructure capabilities delivered as a service. It’s just another way Otava makes your cloud experience O’ so easy! Our passion for excellence fuels us to explore new solutions and bring them to life with our partners and clients. Through innovation and collaboration, we overcome every regulatory and security challenge and execute with fierce dedication. You can count on us to do what we say we’re going to do, because we won’t let anything stand in our way. Secure, compliant hybrid cloud computing for service providers, channel partners and enterprise clients. -
10
appNovi
appNovi
Connect your existing tools and consolidate your asset inventory. Gain an authoritative data source to empower your analyst and decrease escalations. Prioritize vulnerable assets based on network exposure and business impact. Understand the threat exposure of assets and alert on compliance drifts. Gain an authoritative source of data to understand your environment. Gain complete asset inventories, identify missing security agents, understand exposure, and prioritize vulnerabilities effectively. Maintain complete asset inventories using your existing tools. Prioritize risk based on network exposure and business impact. Gain total visibility of your environment and threat exposure. Streamline operations and reach outcomes faster by eliminating IT data uncertainty. Understand cardholder data protection, enhance vulnerability management processes, and identity where compensating controls are needed.
- Previous
- You're on page 1
- Next