371 Integrations with Splunk Cloud Platform
View a list of Splunk Cloud Platform integrations and software that integrates with Splunk Cloud Platform below. Compare the best Splunk Cloud Platform integrations as well as features, ratings, user reviews, and pricing of software that integrates with Splunk Cloud Platform. Here are the current Splunk Cloud Platform integrations in 2025:
-
1
Device42
Device42, A Freshworks Company
With customers across 70+ countries, organizations of all sizes rely on Device42 as the most trusted, advanced, and complete full-stack agentless discovery and dependency mapping platform for Hybrid IT. With access to information that perfectly mirrors the reality of what is on the network, IT teams are able to run their operations more efficiently, solve problems faster, migrate and modernize with ease, and achieve compliance with flying colors. Device42 continuously discovers, maps, and optimizes infrastructure and applications across data centers and cloud, while intelligently grouping workloads by application affinities and other resource formats that provide a clear view of what is connected to the environment at any given time. As part of the Freshworks family, we are committed to, and you should expect us to provide even better solutions and continued support for our global customers and partners, just as we always have.Starting Price: $1499.00/year -
2
Google Chrome Enterprise
Google
Chrome Enterprise is a suite of business offerings that includes Chrome browser, Chrome's cloud management tool Chrome Enterprise Core, and the advanced security capabilities in Chrome Enterprise Premium. Chrome offers a dedicated enterprise download bundle, giving admins access to additional resources and policy templates for managing Chrome across desktop environments in their organization. Chrome Enterprise Core provides admins with simple, centralized management from the cloud. It allows admins to manage their enterprise browser deployment across platforms all from the same place. Chrome Enterprise Premium enables secure access to applications and resources, and offers integrated threat and data protection in the browser. It adds an extra layer of security to safeguard your Chrome browser environment, including DLP, real-time URL and file scanning, and context aware access for SaaS and web apps.Starting Price: Free -
3
ThreatLocker
ThreatLocker
The ThreatLocker suite of security tools are powerful and designed so that everyone from businesses to government agencies to academic institutions can directly control exactly what applications run on their networks. We envision a future in which all organizations can chart their own course free from the influence of cybercriminals and the damage their incursions cause, and our team of veteran cybersecurity professionals created ThreatLocker to make this vision a reality. The team at ThreatLocker has been developing cybersecurity tools for decades, including programs to enhance email and content security, and this is our most innovative and ambitious cybersecurity solution yet. We developed this unique cybersecurity system because we believe that organizations should have complete control of their networks and should not have to live in fear of the next malware attack. To learn more, visit ThreatLocker.com. -
4
SOCRadar provides a unified, cloud-hosted platform designed to enrich your cyber threat intelligence by contextualizing it with data from your attack surface, digital footprint, dark web exposure, and supply chain. We help security teams see what attackers see by combining External Attack Surface Management, Cyber Threat Intelligence, and Digital Risk Protection into a single, easy-to-use solution. This enables your organization to discover hidden vulnerabilities, detect data leaks, and shut down threats like phishing and brand impersonation before they can harm your business. By combining these critical security functions, SOCRadar replaces the need for separate, disconnected tools. Our holistic approach offers a streamlined, modular experience, providing a complete, real-time view of your threat landscape to help you stay ahead of attackers.
-
5
CloudZero
CloudZero
CloudZero is the leader in proactive cloud cost efficiency. We enable engineers to build cost-efficient software without slowing down innovation. CloudZero's next-generation cloud cost optimization platform automates the collection, allocation, and analysis of cloud costs to uncover savings opportunities and improve unit economics. We are the only platform that enables companies to understand 100% of their operational cloud spend and take an engineering-led approach to optimizing that spend. CloudZero is used by industry leaders worldwide, such as Coinbase, Klaviyo, Miro, Nubank, and Rapid7. -
6
RunMyJobs by Redwood
RunMyJobs by Redwood
RunMyJobs by Redwood is the #1 and only enterprise workload automation solution that's SAP Endorsed, achieving premium certification and the highest SAP verification for outstanding customer value. With a guaranteed 99.95% uptime and 24/7 support, you can automate end-to-end processes in complex environments reliably, on-prem or in the cloud. SAP customers can keep a clean core and ensures no process disruptions during multiphase RISE migrations with seamless integration with S/4HANA, BTP, ECC and 1,000+ pre-built SAP templates and connectors. Enjoy unparalleled freedom to connect to unlimited servers, applications, and environments, from modern SaaS solutions to legacy systems. Build automations faster with a low-code, drag-and-drop visual editor and an extensive library of templates. Monitor every process from a single pane of glass with real-time visibility. Receive early warnings and configure alerts of potential issues to address them before they impact operations. -
7
Captain Compliance
Captain Compliance
Captain Compliance is an all-in-one privacy management platform designed to simplify compliance with global data protection laws and new AI regulatory requirements. Our leading Consent Management Platform (CMP) allows businesses to effortlessly manage user consent and create customizable cookie banners. Our advanced Cookie Scanner automatically identifies and categorizes cookies on your website, ensuring ongoing compliance with a dynamic cookie policy. Our DSAR Portal streamlines data subject requests, while our AI Compliance tool monitors and adapts your practices based on evolving regulations and we even offer a virtual DPO and CPO if you need data privacy guidance. Additionally, our Hosted Privacy Policy generator automatically updates your privacy notices in real-time, keeping your policies aligned with the latest legal requirements. Captain Compliance provides the tools you need to protect user data and maintain regulatory compliance with ease at an affordable fee.Starting Price: $40 per month -
8
Keeper Security
Keeper Security
Keeper Security is transforming the way people and organizations around the world secure their passwords and passkeys, secrets and confidential information. Keeper’s easy-to-use cybersecurity platform is built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Keeper’s solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance. Trusted by millions of individuals and thousands of organizations globally, Keeper is the leader for best-in-class password and passkey management, secrets management, privileged access, secure remote access and encrypted messaging. Protect what matters at KeeperSecurity.com.Starting Price: $2.00 per user, per month -
9
Dropbox
Dropbox
Dropbox Business is more than just secure file storage—it’s a smart workspace where teams, tools, and content come together. Create, store, and share cloud content from Google Docs, Sheets, and Slides, Microsoft Office files, and Dropbox Paper alongside traditional files in Dropbox. Dropbox Spaces brings your files and cloud content together, so that your PowerPoints can live next to your Google Docs, Trello boards, and whatever tools your team wants to use. Easily access your team’s work from your computer, mobile device, or any web browser. Keep your team’s files and the conversations about them in the same place by connecting tools like Slack and Zoom. Intelligently suggested files and folders keep your team one step ahead by giving everyone the content they need, when they need it. A secure, distributed infrastructure—plus admin tools for control and visibility—keep your company’s data safe on Dropbox.Starting Price: $12.50 per month per user -
10
PagerDuty
PagerDuty
PagerDuty, Inc. (NYSE:PD) is a leader in digital operations management. In an always-on world, organizations of all sizes trust PagerDuty to help them deliver a perfect digital experience to their customers, every time. Teams use PagerDuty to identify issues and opportunities in real time and bring together the right people to fix problems faster and prevent them in the future. PagerDuty's ecosystem of over 350+ integrations, including Slack, Zoom, ServiceNow, AWS, Microsoft Teams, Salesforce, and more, enable teams to centralize their technology stack, get a holistic view of their operations, and optimize processes within their toolsets. -
11
GitGuardian
GitGuardian
GitGuardian is an end-to-end NHI security platform that empowers software-driven organizations to enhance their Non-Human Identity (NHI) security and comply with industry standards. With attackers increasingly targeting NHIs, such as service accounts and applications, GitGuardian integrates Secrets Security and NHI Governance. This dual approach enables the detection of compromised secrets across your dev environments while also managing non human identities and their secrets lifecycle. The platform supports over 450+ types of secrets, offers public monitoring for leaked data, and deploys honeytokens for added defense. Trusted by over 600,000 developers, GitGuardian is the choice of leading organizations like Snowflake, ING, BASF and Bouygues Telecom for robust secrets protection.Starting Price: $0 -
12
Zoom Team Chat
Zoom Communications
Connect your teams and streamline communications. Included with your Zoom license is Zoom Team Chat. Helping your teams stay connected. Streamline your teams with chat and video meetings. Make collaboration easier between teams and external participants with enterprise chat and instant video meetings. Power modern and efficient team communication. Create a virtual workspace where all the right people for every project are ready to collaborate. Organize your communications chaos. Save time by quickly finding messages, content, and links related to your conversations and projects. Start a meeting with any 1:1 or group channel. Zoom meetings scale up to 1,000 people with clear video, audio and screen sharing. Communicate in public or private channels organized by projects, teams, or topics. Share files, emojis, screenshots, and more. Quickly find contacts, messages, and files, keeping knowledge and information at your fingertips. Calendar integrations sync status and presence. -
13
Datadog
Datadog
Datadog is the monitoring, security and analytics platform for developers, IT operations teams, security engineers and business users in the cloud age. Our SaaS platform integrates and automates infrastructure monitoring, application performance monitoring and log management to provide unified, real-time observability of our customers' entire technology stack. Datadog is used by organizations of all sizes and across a wide range of industries to enable digital transformation and cloud migration, drive collaboration among development, operations, security and business teams, accelerate time to market for applications, reduce time to problem resolution, secure applications and infrastructure, understand user behavior and track key business metrics.Starting Price: $15.00/host/month -
14
Tableau
Salesforce
Tableau, now enhanced with AI-powered capabilities and integrated with Salesforce, is an advanced analytics platform that helps businesses turn data into actionable insights. With Tableau Next, users can unlock the full potential of their data by accessing trusted AI-driven analytics. Whether deployed in the cloud, on-premises, or natively within Salesforce CRM, Tableau enables seamless data integration, powerful visualizations, and collaboration. The platform is designed to support organizations of all sizes in making data-driven decisions, while fostering a Data Culture through easy-to-use, intuitive tools for analysts, business leaders, IT leaders, and developers alike.Starting Price: $75/user/month -
15
Malwarebytes
Malwarebytes
Crushes cyberthreats. Restores confidence. Traditional antivirus simply doesn't cut it anymore. Malwarebytes crushes the latest threats before others even recognize they exist. We block viruses, malware, malicious websites, ransomware, and hackers that traditional antivirus isn't smart enough to stop. Our cutting-edge protection and response solutions are used by organizations of all sizes around the world. Traditional antivirus fails because it’s slow to react to new threats. And, well, because it’s “dumb.” We use layers of technology like anomaly detection (a cool sort of artificial intelligence), behavior matching, and application hardening to crush malware that hasn’t even been seen before. Alright, so not really like traditional antivirus. Premium protection and privacy for your home computers and devices. Enterprise-grade protection and remediation for organizations large and small.Starting Price: $47.22 per user per year -
16
Microsoft Entra ID
Microsoft
Microsoft Entra ID (formerly known as Azure Active Directory) is a comprehensive identity and access management cloud solution that combines core directory services, application access management, and advanced identity protection. Safeguard your organization with a cloud identity and access management solution that connects employees, customers, and partners to their apps, devices, and data. Protect access to resources and data using strong authentication and risk-based adaptive access policies without compromising user experience. Provide a fast, easy sign-in experience across your multicloud environment to keep your users productive, reduce time managing passwords, and increase productivity. Manage all your identities and access to all your applications in a central location, whether they’re in the cloud or on-premises, to improve visibility and control. -
17
LoginRadius
LoginRadius
LoginRadius empowers businesses to deliver a delightful customer experience without compromising security. Using our customer identity platform, companies can offer a streamlined login process while protecting digital accounts and complying with data privacy regulations. LoginRadius serves over 3,000 businesses with a monthly reach of 700 million users worldwide. Key platform features include registration services, adaptive security, integration with third-party applications, and customer insights. The company has been named an industry leader in customer identity and access management (CIAM) by Gartner, KuppingerCole, and Computer Weekly. Microsoft is a major technology partner and investor. LoginRadius is headquartered in Vancouver, Canada, with additional offices in Toronto, USA, United Kingdom, Australia, and India. LoginRadius Services: API Authentication OAuth Data Management Secure Login Single Sign On SAML SSO Social Sign On Two Factor Authentication -
18
BeyondTrust Remote Support
BeyondTrust
The #1 solution for leading enterprises to securely access and support any device or system, anywhere in the world. Support Everything with One Secure Remote Support Solution. With BeyondTrust Remote Support (formerly Bomgar), you can support Windows, Mac, Linux, iOS, Android, network devices, and peripherals with one, secure tool. More devices, more platforms, more people, more locations. Provide instant, reliable remote support to end-users and customers on or off your network. Get more done because you’re focused on fixing issues, not fixing the connection. Improve service levels and customer satisfaction with seamless, high-quality remote support for every end-user. Provide scalable, enterprise-grade support that keeps your business running, whether you’re fixing a Linux server across the ocean or an iPhone across town. -
19
IPQualityScore
IPQualityScore
IPQualityScore's suite of fraud prevention tools automate quality control to prevent bots, fake accounts, fraudsters, chargebacks, & malicious users without interrupting the user experience. Detect bad actors and block cyber threats with industry leading IP reputation data and user validation. Proactively Prevent Fraud™ for less headaches and smoother operations.Starting Price: $49.99 per month -
20
DomainTools
DomainTools
Connect indicators from your network with nearly every active domain and IP address on the Internet. Learn how this data can inform risk assessments, help profile attackers, guide online fraud investigations, and map cyber activity to attacker infrastructure. Gain insight that is necessary to make the right decision about the risk level of threats to your organization. DomainTools Iris is a proprietary threat intelligence and investigation platform that combines enterprise-grade domain and DNS-based intelligence with an intuitive web interface. -
21
FortiGate IPS
Fortinet
Comprehensive threat protection with a powerful intrusion prevention system. An intrusion prevention system (IPS) is a critical component of every network’s core security capabilities. It protects against known threats and zero-day attacks including malware and underlying vulnerabilities. Deployed inline as a bump in the wire, many solutions perform deep packet inspection of traffic at wire speed, requiring high throughput and low latency. Fortinet delivers this technology via the industry-validated and recognized FortiGate platform. FortiGate security processors provide unparalleled high performance, while FortiGuard Labs informs industry-leading threat intelligence, which creates a proven success in protecting from known and zero-day threats. As a key component of the Fortinet Security Fabric, FortiGate IPS secures the entire end-to-end infrastructure without compromising performance. -
22
ControlMap
ControlMap
Is cybersecurity compliance taking too much time and becoming an ever-growing challenge to manage? Do you need a cybersecurity audit done to win a deal? If yes, then you are at the right place. Controlmap helps companies of all sizes easily and quickly achieve SOC 2, ISO-27001, NIST, CSA STAR, or other Infosec certifications. ControlMap's cybersecurity compliance platform cuts manual grunt work by up to 80% by automating evidence collection, eliminating spreadsheets, and making manual follow-ups obsolete. With Risks, Controls, Policies, and Evidence continuously connected to the right people in your company in a single platform, you know you can sleep well. ControlMap continuously does the heavy lifting of compliance work for you, freeing you to do what your business needs. It follows up on scheduled tasks, automatically collects Evidence from the cloud, reminds employees to fulfill their compliance duties such as reading and acknowledging policies. To learn more, contact us.Starting Price: $0 -
23
Validato
Validato
Validato allows IT and Security teams to test the effectiveness of security controls by simulating adversarial behaviors based on known threat scenarios. Validato provides unbiased data and finding on how effective security controls are at detecting and protecting against exploitation of MITRE ATT&CK Techniques. If you are looking to implement a Threat-Informed Defense approach to cyber defense, then Validato is an excellent choice for you.Starting Price: $10,000/year -
24
Squadcast
Squadcast
Squadcast is an incident management tool that’s purpose-built for SRE. Create a blameless culture by reducing the need for physical war rooms, centralize SLO dashboards, unify internal and external SLIs and automate incident resolution and knowledge base creation with Squadcast Actions. Adopt world-class site reliability practices with a centralized SLO dashboard to view your system health. Anticipate incidents before they occur and respond proactively. The first step towards doing better incident management is adding enough context to incidents while they get detected. With Squadcast, discover everything you need, to take action and achieve best-in-class MTTD with highly configurable features like alert deduplication and tagging.Starting Price: Free -
25
Zulip
Zulip
Chat for distributed teams. Zulip combines the immediacy of real-time chat with an email threading model. With Zulip, you can catch up on important conversations while ignoring irrelevant ones. Zulip has modern apps for every major platform, powered by Electron and React Native. Zulip is 100% open source software, built by a vibrant community of hundreds of developers from all around the world. With 120,000 words of developer documentation, a high quality code base, and a welcoming community, it’s easy to extend or tweak Zulip. Zulip has a significantly larger and more active development community than other modern open source group chat solutions like Mattermost, Rocket.Chat, and matrix.org. Zulip has more than 90 native integrations. Several hundred more are available through Hubot, Zapier, and IFTTT. Or build your own integrations with Zulip’s powerful API.Starting Price: $6.67 per user per month -
26
Nucleus
Nucleus
Nucleus is redefining the vulnerability management software category as the single source of record for all assets, vulnerabilities, and associated data. We unlock the value you’re not getting from existing tools and place you squarely on the path to program maturity by unifying the people, processes, and technology involved in vulnerability management. With Nucleus, you receive unmatched visibility into your program and a suite of tools with functionality that simply can’t be replicated in any other way. Nucleus is the single shift-left tool that unifies development and security operations. It unlocks the value you’re not getting out of your existing tools and puts you on the path to unifying the people, processes, and technology involved in addressing vulnerabilities and code weaknesses. With Nucleus, you’ll get unmatched pipeline integration, tracking, triage, automation and reporting capabilities and a suite of tools with functionality.Starting Price: $10 per user per year -
27
Barracuda Cloud Archiving Service
Barracuda
The Barracuda Cloud Archiving Service provides secure cloud-based archiving, enabling organizations to meet demanding compliance requirements and address e-discovery requests easily and effectively. Ideal for use with services such as Office 365 and G Suite, it uses the Barracuda Cloud to store data for as long as needed without risk of amendment or deletion. End user productivity is increased due to accessibility to every message ever sent or received from any device. The Barracuda Cloud Archiving Service integrates with Office 365, Exchange, and other email services to provide a complete cloud-based archive with no additional customer hardware or software required. A multi-functional add-in for Outlook, mobile apps for iOS and Android, and a dedicated web interface enable end users to retrieve and restore any message ever sent or received, even if deleted from the mail server. -
28
HaloITSM
Halo Service Solutions
Empower your IT team with a single all-inclusive cloud platform, designed for ITIL-aligned service delivery. Transform legacy ways of working into modern intuitive workflows, empowering teams to deliver excellent service to customers and employees repeatedly. Standardize your processes and gain valuable analytics to align IT to the business needs in a single all-inclusive, unlimited ITSM software solution. Centralize your workflows, create a single space for your ITSM software. HaloITSM blends ITIL best-practices with a fresh, flexible approach so you can improve your service management whilst maintaining an outstanding user experience. Customers worldwide across numerous sectors rely on HaloITSM to drive their IT Service requirements. See how they have transformed their daily processes with our case studies.Starting Price: $49 per user per month -
29
Mitigate web app attacks and vulnerabilities with comprehensive security controls and uniform policy and observability via our SaaS-delivered WAF that’s quick to set up and deploy, and easy to manage and scale across any environment. Simplify app security by seamlessly integrating protections into the development process with core security functionality, centralized orchestration, and oversight. F5 Distributed Cloud WAF eases the burden and complexity of consistently securing apps across clouds, on-premises, and edge locations. Delivering the programmability that DevOps needs combined with the efficacy and oversight that SecOps mandates, enabling faster, more secure application delivery and release cycles. Quickly improve visibility and insight across all security events including WAF signatures hit, DoS events, automated and persistent threats, and all other client interactions along with app performance, including intuitive drill-down capabilities.
-
30
Zirozen
Zirozen
Zirozen is a unified autonomous endpoint management platform that delivers real‑time visibility and control across your entire IT environment to network equipment and cloud infrastructure, via an intuitive drag‑and‑drop dashboard. Its AI‑powered engine continuously scans for vulnerabilities, misconfigurations, missing patches, and unauthorized software, automatically prioritizing and remediating risks based on severity scores. Zirozen automates cross‑platform patch and configuration management with policy‑driven scheduling, continuous compliance auditing for standards like GDPR, HIPAA, and PCI‑DSS, software metering and license optimization, file integrity monitoring, application control, and malicious activity detection. Deep integrations eliminate tool sprawl by correlating security, asset, and inventory data in one console, while customizable alerts and centralized reporting enable proactive SecOps with reduced mean time to resolution. -
31
Chef
Progress Software
Chef turns infrastructure into code. With Chef, you can automate how you build, deploy, and manage your infrastructure. Your infrastructure becomes as versionable, testable, and repeatable as application code. Chef Infrastructure Management ensures configurations are applied consistently in every environment with infrastructure management automation. Chef Compliance makes it easy to maintain and enforce compliance across the enterprise. Deliver successful application outcomes consistently at scale with Chef App Delivery. Chef Desktop allows IT teams to automate the deployment, management, and ongoing compliance of IT resources. Ensure configurations are applied consistently in every environment. Powerful policy-based configuration management system software. Runbook automation to consistently define, package & deliver applications. IT automation & DevOps dashboards for operational visibility. -
32
Alibaba Cloud
Alibaba
As a business unit of Alibaba Group (NYSE: BABA), Alibaba Cloud provides a comprehensive suite of global cloud computing services to power both our international customers’ online businesses and Alibaba Group’s own e-commerce ecosystem. In January 2017, Alibaba Cloud became the official Cloud Services Partner of the International Olympic Committee. By harnessing, and improving on, the latest cloud technology and security systems, we tirelessly work towards our vision - to make it easier for you to do business anywhere, with anyone in the world. Alibaba Cloud provides cloud computing services for large and small businesses, individual developers, and the public sector in over 200 countries and regions. -
33
SIRP
SIRP
SIRP is a no-code risk-based SOAR platform that connects everything security teams need to ensure consistently strong outcomes into a single, intuitive platform. SIRP empowers Security Operations Centers (SOCs), Incident Response (IR) teams, Threat Intelligence teams, and Vulnerability Management (VM) teams through integration of security tools and powerful automation and orchestration tools. SIRP is a no-code SOAR platform with a built-in security scoring engine. The engine calculates real-world risk scores that are specific to your organization for every incident, alert, and vulnerability. This granular approach enables security teams to map risks to individual assets and prioritize response at scale. SIRP makes all security tools and functions available to security teams at the push of a button, saving thousands of hours each year. Design and enforce best practice security processes using SIRP’s intuitive drag-and-drop playbook building module. -
34
TCPWave
TCPWave
DDI automation to help enterprises and service providers for rapid roll out of services, avoid outages and simplified transition to cloud transformation journey. Scalable DDI architecture to meet surge, cloud and automation needs. Superior performance with better TCO ensures enterprises to scale the architecture horizontally and vertically. Defend ransomware, phishing, botnet attacks, malware and spyware from your mission critical networks, using our superior fault prevention solution and escape security breaches. TCPWave delivers speed and security to meet the market demands for secure networks. TCPWave is somewhat different from the usual IPAM software which makes it highly scalable and adaptable to changes. Retrofitting today's DevOps and CloudOps requirements into a two-decades-old legacy solution is not a prudent option. A superior 1500+ REST API based TCPWave DDI is designed for today's enterprises, out of the box. -
35
EV Service Manager
EasyVista
IT has an opportunity to support digital transformation across the enterprise, and an integrated cloud based IT Service Management (ITSM) software tool is paramount to success. In contrast to the old, complex, or simple-but-not-sophisticated service desk solutions, EV Service Manager is a versatile, powerful, and easy way to manage service delivery for your organization. Our Service Manager platform supports even the most complex requirements, while bringing a new level of simplicity, agility, and mobility required to make cloud based IT Service Management (ITSM) software easy to use and easy to deliver. Improve your IT maturity with Service Manager's robust automation engine that includes out-of-box support for the entire ITIL lifecycle, including PinkVerified processes. Our adaptable and smart interface includes the ability to integrate portals, dashboards, and 3rd party apps allowing you to deliver a user experience that provides access to everything important. -
36
CyberArk Privileged Access Manager
CyberArk
Keep your business safe by preventing the malicious use of privileged accounts and credentials – a common path to an organization’s most valuable assets. The CyberArk PAM as a Service solution leverages leading automation technologies to protect your business as it grows. Attackers never stop seeking ways in. Manage privileged access to minimize risk. Prevent credential exposure and keep critical assets from falling into the wrong hands. Maintain compliance with recorded key events and tamper-resistant audits. Privileged Access Manager easily integrates with a host of applications, platforms and automation tools. -
37
ManageEngine AlarmsOne
ManageEngine
AlarmsOne from ManageEngine is an all-in-one alert management solution that allows users to manage alerts from all their IT management tools. AlarmsOne easily integrates with several on-premise and SaaS-based IT infrastructure monitoring systems. With AlarmsOne, users can centralize their IT alarms by creating an account and install the Alarm Poller on the server. AlarmsOne also features real-time alerts and multi-channel notifications for quick responses.Starting Price: $15.00/month/user -
38
AlertOps
AlertOps
AlertOps is software that enables an organization to take control of incidents and automate actions that reduce cost, protect revenue and improve the customer experience. AlertOps is a SaaS-based, Alerting & Real-Time Platform that helps ITOps, DevOps, SecOps, HybridOps, BusinessOps, IndustrialOps and Support teams respond to business-critical incidents better and faster. With AlertOps you get: ✓ Total Flexibility, no compromises. ✓ End-to-end Workflow Automation. ✓ Full Stack Incident Visibility ✓ Expert Guidance, on-demand. Visit us at: alertops.com and schedule a personalized demo. We will be happy to discuss your use case and show you why, many of the world’s largest companies leverage AlertOps to respond more rapidly, outmaneuver their competitors and win when moments matter.Starting Price: $0.00/month/user -
39
Teramind
Teramind
Teramind provides a user-centric security approach to monitoring your employees’ digital behavior. Our software streamlines employee data collection in order to identify suspicious activity, improve employee productivity, detect possible threats, monitor employee efficiency, and ensure industry compliance. We help reduce security incidents using highly customizable Smart Rules that can alert, block or lockout users when rule violations are detected, to keep your business running securely and efficiently. Our live & recorded screen monitoring lets you see user actions as they’re happening or after they’ve occurred with video-quality session recordings that can be used to review a security or compliance event, or to analyze productivity behaviors. Teramind can be installed in minutes and can be deployed either without employees knowing or with full transparency and employee control to maintain trust.Starting Price: $12/month/user -
40
Dotcom-Monitor
Dotcom-Monitor
Website monitoring and performance testing solutions. Combined with powerful monitoring features such as real-time dashboards and performance reporting options, and nearly 30 global monitoring network locations, you can quickly identify where performance issues are occurring. Quickly and easily record custom scripts to monitor interactive websites and web application elements and user scenarios with the EveryStep Web Recorder. Dotcom-Monitor makes it easy to ensure performance, functionality, and uptime of the most complex websites, web applications, and web services.Starting Price: $19.99/month -
41
Litmus Edge
Litmus
Litmus Edge is a hardware‑agnostic industrial data platform deployed at the edge to connect to virtually any industrial asset. Using a large library of pre‑built drivers, it rapidly ingests data from PLCs, SCADA, MES, historians and sensors, then normalizes and contextualizes that data for analytics and control. The platform delivers real‑time KPIs and dashboards at the edge, supports running analytics and machine‑learning models close to the machines, and publishes ready‑to‑use data to cloud, big‑data and business applications. This gives manufacturers a scalable foundation for smart manufacturing and Industrial IoT programs. Designed for engineers modernizing OT systems: - 250+ drivers - MQTT/Kafka/REST ingestion - Data modeling + transformations - Edge ML/SLM runtime - Container support - Secure cloud connectors - Fleet managementStarting Price: 15000/5k data points/site -
42
Box Shield
Box
Shield lets you classify content your way, both manually and automatically. We're excited to announce our powerful, native capability that identifies PII and custom terms within files, and automatically classifies them based on your policies — helping you protect your data at scale. Placing controls close to your content helps prevent leaks in real time, while powering a frictionless end-user experience. Configure access policies within minutes to keep your data secure while letting people do their mission-critical work. Using machine learning, Shield brings you timely, accurate alerts on insider threats, account compromise, and malware attacks. Quickly evaluate alerts in Shield, or send them to your existing tools for further analysis. Shield works with the best-of-breed security tools you already have in place. Alerts containing more insights than ever before can be integrated with your SIEM and CASB for a unified view.Starting Price: $130 per month -
43
Edge Delta
Edge Delta
Edge Delta is a new way to do observability that helps developers and operations teams monitor datasets and create telemetry pipelines. We process your log data as it's created and give you the freedom to route it anywhere. Our primary differentiator is our distributed architecture. We are the only observability provider that pushes data processing upstream to the infrastructure level, enabling users to process their logs and metrics as soon as they’re created at the source. We combine our distributed approach with a column-oriented backend to help users store and analyze massive data volumes without impacting performance or cost. By using Edge Delta, customers can reduce observability costs without sacrificing visibility. Additionally, they can surface insights and trigger alerts before data leaves their environment.Starting Price: $0.20 per GB -
44
Contrast Security
Contrast Security
Modern software development must match the speed of the business. But the modern AppSec tool soup lacks integration and creates complexity that slows software development life cycles. Contrast simplifies the complexity that impedes today’s development teams. Legacy AppSec employs a one-size-fits-all vulnerability detection and remediation approach that is inefficient and costly. Contrast automatically applies the best analysis and remediation technique, dramatically improving efficiencies and efficacy. Separate AppSec tools create silos that obfuscate the gathering of actionable intelligence across the application attack surface. Contrast delivers centralized observability that is critical to managing risks and capitalizing on operational efficiencies, both for security and development teams. Contrast Scan is pipeline native and delivers the speed, accuracy, and integration demanded by modern software development.Starting Price: $0 -
45
Opsera
Opsera
You choose your tools, we take care of the rest. Put together the perfect CI/CD stack that fits your organization’s goals with zero vendor lock-in. Eliminate manual scripts and stop building toolchain automation. Free your engineers to focus on your core business. Pipeline workflows follow a declarative model so you focus on what is required — not how it’s accomplished — including: software builds, security scans, unit testing, and deployments. With Blueprints, diagnose any failures from within Opsera using a console output of every step of your pipeline execution. Comprehensive software delivery analytics across your CI/CD process in a unified view — including Lead Time, Change Failure Rate, Deployment Frequency, and Time to Restore. Contextualized logs for faster resolution and improved auditing and compliance.Starting Price: $3.60 per user , Min 300 devs -
46
Panoptica
Cisco
Panoptica makes it easy to secure your containers, APIs, and serverless functions, and manage software bills of materials. It analyzes internal and external APIs and assigns risk scores. Your policies govern which API calls the gateway permits or disables. New cloud-native architectures allow teams to develop and deploy software more quickly, keeping up with the pace of today’s market. But this speed can come with a cost—security. Panoptica closes the gaps by integrating automated, policy-based security and visibility into every stage of the software-development lifecycle. Decentralized cloud-native architectures have significantly increased the number of attack surfaces. At the same time, changes in the computing landscape have raised the risk of catastrophic security breaches. Here are some of the reasons why comprehensive security is more important than ever before. You need a platform that protects the entire application lifecycle—from development to runtime.Starting Price: $0 -
47
DNSSense
DNSSense
DNSEye detects malicious traffic on your network and reports whether this traffic can be blocked by your other security devices. DNS is used by all protocols like HTTP, HTTPS, SMTP, and IoT. DNS traffic provides information about your entire network, regardless of its network protocol. With DNS tunnelling, data exfiltration attacks cannot be detected by DLP products. It requires DNS log analysis for an effective solution. 80% of malware domains currently do not have an IP address. Malware requests that do not have an IP address can only be detected in the DNS log. DNSservers generate a large number of difficult-to-understand logs. DNSEye enables the collection, enrichment, and AI-based classification of the DNS logs. With its advanced SIEM integration, it saves time and EPS by transferring to SIEM only the data that SOC teams need to see. DNSEye can collect logs from many different brands and models of DNS servers without the need for making any change in your network structure.Starting Price: $1000 -
48
HaloCRM
HaloCRM
HaloCRM is omnichannel customer service software, designed for teams looking to drive greater efficiency when handling customer inquiries. HaloCRM offers an intuitive platform for customer-facing teams to manage conversations from any channel. The platform will ingest customer conversations from Twitter, Facebook, Facebook Messenger, email, SMS, chat, phone calls, and more, eliminating the possibility of missed inquiries, and improving customer satisfaction by opening more channels of communication. HaloCRM lets you provide support anywhere, keeping customers happy and connected through email, text, chat, voice, and more. With powerful out-of-the-box workflows and easy drag-and-drop configuration, HaloCRM can handle it all. HaloCRM will make it easier to prioritize and respond to customers with one unified support desk, complete with customer context built-in to facilitate better conversation tracking.Starting Price: £59 per user per month -
49
QSE
QSE Group
QSE Group delivers quantum-resilient cybersecurity solutions designed to protect sensitive data from both current and future threats, including quantum computing. Using post-quantum cryptographic algorithms aligned with NIST standards, QSE secures data through encryption, key management, and secure communications. Built with an API-first design, it integrates easily into existing cloud, on-prem, or hybrid environments. Core features include secure entropy generation, zero trust policy enforcement, and compatibility with identity systems and SIEM tools. QSE also supports white-label deployment for SaaS vendors and MSPs. With real-time monitoring, compliance-ready reporting, and applications across finance, healthcare, legal, and government sectors, QSE enables future-proof protection without disrupting current infrastructure. It's a practical, scalable solution for organizations serious about long-term data security.Starting Price: $19.90/month -
50
Workato
Workato
Workato is the operating system for today’s fast-moving business. Recognized as a leader by both Gartner and Forrester, it is the only AI-based middleware platform that enables both business and IT to integrate their apps and automate complex business workflows with security and governance. Given the massive and growing fragmentation of data, apps, and business processes in enterprises today, our mission is to help companies integrate and automate at least 10 times faster than traditional tools and at a tenth of the cost of ownership. We believe Integration is a mission-critical, neutral technology for the dynamic and heterogeneous IT environments of today. We are the only technology vendor backed by all 3 of the top SaaS vendors: Salesforce, Workday, and ServiceNow. Trusted by world's top brands as well as its fastest-growing innovators, we are most appreciative of the fact that customers recognize us as being among the best companies to do business with.Starting Price: $10,000 per feature per year