371 Integrations with Splunk Cloud Platform

View a list of Splunk Cloud Platform integrations and software that integrates with Splunk Cloud Platform below. Compare the best Splunk Cloud Platform integrations as well as features, ratings, user reviews, and pricing of software that integrates with Splunk Cloud Platform. Here are the current Splunk Cloud Platform integrations in 2025:

  • 1
    Harmony Mobile

    Harmony Mobile

    Check Point

    In the new normal, while employees are increasingly accessing corporate data from their smartphones, your business is exposed to breaches more than ever. Harmony Mobile delivers complete protection for your mobile workforce that is simple to deploy, manage and scale. Protecting corporate data across the mobile attack surface: apps, networks and OS. Scalable and easy-to-manage security for any type of mobile workforce. Quick user adoption with zero impact on user experience or privacy. Prevents malware from infiltrating employees’ devices by detecting and blocking the download of malicious apps in real-time. By extending Check Point’s industry-leading network security technologies to mobile devices, Harmony Mobile offers a broad range of network security capabilities. Ensures devices are not exposed to compromise with real-time risk assessments detecting attacks, vulnerabilities, configuration changes, and advanced rooting and jailbreaking.
  • 2
    Trellix Detection as a Service
    Detect threats at any point in your workflow. Inspect your cloud infrastructure and the business logic of the data in your cloud apps. Validate your files and content with the latest threat intelligence and multiple dynamic machine learning, AI, and correlation engines. Easily integrate across your trusted cloud services, web applications, and collaboration tools. Scan files, hashes, and URLs for potential malware in a live virtual environment without risking your internal assets. Incorporate Detection as a Service into your SOC workflows, SIEM analytics, data repositories, applications and much more. Determine the possibility of secondary or combinatory effects across multiple phases of the cyber-attack chain to discover never-before-seen exploits and malware. Submit MD5 hashes or local files with our easy-to-use Chrome plug-in that easily integrates into existing toolsets or workflows.
  • 3
    Automai Robotic Process Automation
    Automai provides Robotic Process Automation (RPA) to automate and manage even the most complicated front and back office tasks on any application(s). No scripting. Record your scenario, then edit or build on it with simple commands in the clear interface provided. Automai has the only RPA product that shares a platform with testing and monitoring components allowing scenarios to be built once and utilized in a variety of functions in the same enterprise. With Automai Robotic Process Automation (RPA), you CAN automate those repetitive tasks and processes. We’ve been using and improving our robotic automation technology for a long time, since it we started emulating human behavior for our automated testing solutions in 2000. And it’s the best out there. Our robotic automation intelligently copes with changing variables that human’s process in decision-making every day, learning what’s important to your business, and adapting so you can focus on bigger issues.
  • 4
    The Media Trust

    The Media Trust

    The Media Trust

    The Media Trust’s General Data Protection Regulation (GDPR) solution provides a broad and in-depth view into data tracking and collection activity in your complex, ever-changing digital environment. More than a policy list or cookie classification database, our GDPR solution continuously monitors your mobile apps and websites to identify all executing vendors and build a repository of authorized partners. Analysis of each partner’s domain exposes user-identifying actions. Real-time alerts notify you of partner-specific data privacy violations to facilitate quick correction without undermining your trusted partner relationships. The complex and dynamic nature of digital assets makes it easy to unknowingly run afoul of GDPR and be subject to numerous penalties, 4% annual turnover or €20M for each violation. With The Media Trust, you can go beyond generic tag and consent managers, checklists and data frameworks to create a digital asset governance program.
  • 5
    Mule ESB

    Mule ESB

    MuleSoft

    Mule, the runtime engine of Anypoint Platform, is a lightweight Java-based enterprise service bus (ESB) and integration platform that allows developers to connect applications together quickly and easily, enabling them to exchange data. It enables easy integration of existing systems, regardless of the different technologies that the applications use, including JMS, Web Services, JDBC, HTTP, and more. The ESB can be deployed anywhere, can integrate and orchestrate events in real time or in batch, and has universal connectivity. The key advantage of an ESB is that it allows different applications to communicate with each other by acting as a transit system for carrying data between applications within your enterprise or across the Internet. Expose and host reusable services, using the ESB as a lightweight service container. Shield services from message formats and protocols, separate business logic from messaging, and enable location-independent service calls.
  • 6
    Beats

    Beats

    Elastic

    Beats is a free and open platform for single-purpose data shippers. They send data from hundreds or thousands of machines and systems to Logstash or Elasticsearch. Beats are open source data shippers that you install as agents on your servers to send operational data to Elasticsearch. Elastic provides Beats for capturing data and event logs. Beats can send data directly to Elasticsearch or via Logstash, where you can further process and enhance the data, before visualizing it in Kibana. Want to get up and running quickly with infrastructure metrics monitoring and centralized log analytics? Try out the Metrics app and the Logs app in Kibana. For more details, see Analyze metrics and Monitor logs. Whether you’re collecting from security devices, cloud, containers, hosts, or OT, Filebeat helps you keep the simple things simple by offering a lightweight way to forward and centralize logs and files.
    Starting Price: $16 per month
  • 7
    BMC Compuware Topaz Connect
    BMC Compuware Topaz Connect bridges the IT systems that manage mainframe applications with the modern tooling used to manage non-mainframe applications, eliminating siloes that can disrupt innovation. By connecting the mainframe to disparate platforms in the enterprise, companies can track processes for mainframe applications in the same manner as they do for other hardware and software platforms. Eliminates siloes created by lack of integrated tooling, enabling faster delivery of business value. Maximizes enterprise IT automation by reducing disparate manual processes. Leverages existing IT service management (ITSM) investments. Includes the mainframe in DevOps processes. Enhances process efficiencies. Enables mainframe-inexperienced programmers to manage mainframe code. Connect BMC Compuware ISPW and ITSM solutions such as BMC Helix and Tivoli. Communicate specifics of an ITSM code change to BMC Compuware ISPW.
  • 8
    BMC Middleware Management
    BMC middleware management software provides real-time monitoring and administration for messaging-oriented middleware environments including IBM® MQ, Integration Bus (IIB), App Connect Enterprise (ACE), Apache ActiveMQ, and DataPower and TIBCO Enterprise Message Service (EMS). Automate alerts and gain insight into a wide array of middleware technologies with a single, intuitive solution. MainView Middleware Monitor securely provides real-time monitoring and automatic notification of potential problems to ensure an optimally performing middleware layer. Analyze historical data to identify patterns, predict trends, and solve reoccurring problems. Maximize application availability and mitigate risk with proactive problem detection and automated resolutions. Improve productivity and efficiency for managing, administering, and troubleshooting with flexible dashboards for infrastructure and application views.
  • 9
    Barracuda PST Enterprise
    PST files are often used by end-users as personal email archives. As a result, they are typically scattered widely across end-user devices and network storage, which makes them notoriously difficult to discover and manage consistently or effectively. Thanks to improvements to Microsoft Exchange and Office 365, your users no longer need to store data locally within PST files. However, legacy PST files still contain important data that you need to bring back under control. Barracuda PST Enterprise is designed specifically to help you address this challenge. You may have many terabytes of data stored in PST files located on end-user devices and on network servers. And these files are notoriously unreliable, since they are often corrupted and easily misplaced. The costs associated with storing, securing, and managing these large files, in terms of both system resources and IT administrative overhead, are significant.
  • 10
    ExoSense

    ExoSense

    Exosite

    Everything you need to get mission-critical insight into your high-value assets. ExoSense® is a ready-to-deploy condition monitoring application that provides operational insight into industrial assets, systems, and equipment. A simple configuration environment lets you customize branding, themes, user hierarchies, roles, and more without writing a line of code. Deploy the application in under an hour, connect ready-made devices in a day, and have a solution in customers’ hands within a week. No huge up-front costs, lengthy development times, or in-house DevOps team required, so IoT is more feasible and cost-efficient. ExoSense is built on Murano, an IoT platform that offers the security, scalability, and business-system integrations required for enterprise IoT solutions. Leverage ExoSense to monitor equipment status and performance, manage user and asset groups, build tailored insights and dashboards, and customize alerts and notifications.
    Starting Price: $200 per month
  • 11
    Sendmail

    Sendmail

    Proofpoint

    The sendmail Sentrion platform is specifically designed for large, complex environments, but we make a subset of that solution available as an open-source offering. Sentrion is not for everyone, but if you are using open source email for a large complex environment and need an enterprise platform that will enable your messaging roadmap for years to come (virtualization, consolidation, cloud migration, etc.). The Domain Keys Identified Mail (DKIM) Internet standard enables email senders to digitally sign their messages so that receivers can verify that those messages have not been forged. The DKIM sender authentication scheme allows the recipient of a message to confirm a message originated with the sender’s domain and that the message content has not been altered. A cryptography-based solution, DKIM provides businesses an industry-standard method for mitigating email fraud and protecting an organization’s brand and reputation at a relatively low implementation cost.
  • 12
    Data443 Global Privacy Manager
    We make it possible for retailers to champion their customers’ privacy rights while maintaining conversion and simplifying SAR processing. Make your privacy settings the new standard for user experience and customer service. Give your customers clear access to easy-to-understand settings. Give customers a one-stop location for all their privacy needs. Provide clear, accurate explanations of the data you collect and how it is used. Earn increased trust in return. All-or-nothing consent doesn’t benefit you or your customers. Allowing customers to opt-in or out of specific data collection gives them more control and improves your conversion rates. Provide an easy-to-understand report that allows customers to see what data you’ve collected, how it’s being used, and that it’s being protected properly. Enhance your customers’ privacy experience with rapid responses to Subject Access Requests (SARs) while simplifying processing for your team.
    Starting Price: $225 per month
  • 13
    IRI CellShield
    IRI CellShield® protects the sensitive information in your Microsoft Excel® spreadsheets, allowing you to comply with data privacy laws. Point-and-click to protect your columns with reversible and non-reversible masking functions. CellShield keeps your data secure, whether it's in one sheet or a million. Use multiple search methods to find and report on PII across the LAN, and protect it all at once. Classify and mask it in intuitive graphical dialogs. CellShield's core technology is built on the award-winning IRI FieldShield data masking product for databases and flat files. Data masked in one platform can be revealed in another. CellShield EE is the only full-featured, professional data discovery, masking, and auditing package for Excel 2010, 2013, 2016, and 2019 (plus Office 365) workbooks in your LAN. CellShield EE exceeds the security and scope of a single password by combining and automating all these extra capabilities.
    Starting Price: $35 one-time payment
  • 14
    Amazon Quantum Ledger Database (QLDB)
    Amazon QLDB is a fully managed ledger database that provides a transparent, immutable, and cryptographically verifiable transaction log ‎owned by a central trusted authority. Amazon QLDB can be used to track each and every application data change and maintains a complete and verifiable history of changes over time. Ledgers are typically used to record a history of economic and financial activity in an organization. Many organizations build applications with ledger-like functionality because they want to maintain an accurate history of their applications' data, for example, tracking the history of credits and debits in banking transactions, verifying the data lineage of an insurance claim, or tracing movement of an item in a supply chain network. Amazon QLDB is a new class of database that eliminates the need to engage in the complex development effort of building your own ledger-like applications.
    Starting Price: $0.03 per GB per month
  • 15
    WatchTower Security Management App
    Monitor your network with Check Point’s WatchTower Security Management app and quickly mitigate security threats on the go with your mobile phone. The intuitive WatchTower Security Management App provides real-time monitoring of network events, alerts you when your network is at risk, enables you to quickly block security threats, and configure the security policy for multiple gateways. View the devices connected to your network and any potential security threats. Real-time notification of malicious attacks or unauthorized device connections. Quickly block malware-infected devices and view infection details for further investigation. Customize notifications for your top-priority security events. View all security events by category and drill down for further information. Configure the security settings for multiple gateways. Manage advanced security policy settings securely via web user interface.
  • 16
    Multi-Domain Security Management
    Multi-Domain Security Management delivers more security and control by segmenting security management into multiple virtual domains. Businesses of all sizes can easily create virtual domains based on geography, business unit or security function to strengthen security and simplify management. Enable granular and isolated role-based administration of a multi-tenant security management architecture. Single security management configuration for VPN, Firewall, IPS, and other protections. Create, view and control all network security management domains from a single console. Create and centrally manage multiple administrators in the multi-domain security management environments. Give administrators permission to manage specific domains or different aspects of the multi-domain system. Allow multiple administrators to work on different security management domains simultaneously.
  • 17
    Oracle Cloud Infrastructure Streaming
    Streaming service is a real-time, serverless, Apache Kafka-compatible event streaming platform for developers and data scientists. Streaming is tightly integrated with Oracle Cloud Infrastructure (OCI), Database, GoldenGate, and Integration Cloud. The service also provides out-of-the-box integrations for hundreds of third-party products across categories such as DevOps, databases, big data, and SaaS applications. Data engineers can easily set up and operate big data pipelines. Oracle handles all infrastructure and platform management for event streaming, including provisioning, scaling, and security patching. With the help of consumer groups, Streaming can provide state management for thousands of consumers. This helps developers easily build applications at scale.
  • 18
    Spherical Defense

    Spherical Defense

    Spherical Defense

    Spherical Defense is an API security solution that uses deep unsupervised learning to protect your APIs. Spherical Defense Express is deployed on AWS, takes just a minute to download and will be protecting your assets within two hours at the cost of $1 per hour. Once you have deployed your Spherical instance, it will immediately start listening for API traffic. It will stay in this mode for only as long as there is insufficient data to train the first security model. After receiving roughly 16,000 requests, it will move to the next stage. After sufficient data has been received, the system moves into training mode. This mode will result in a trained security model after roughly 6 hours, which will then be mounted for evaluation. As new data is received, the Spherical instance will train more models to account for natural changes in your API traffic over time. Once the first security model has been trained, it is mounted for evaluation.
    Starting Price: $1 per hour
  • 19
    CloudGuard AppSec

    CloudGuard AppSec

    Check Point Software Technologies

    Automate your application security and API protection with AppSec powered by contextual AI. Stop attacks against your web applications with a fully automated, cloud-native application security solution. Eliminate the need to manually tune rules and write exceptions every time you make an update to your web application or APIs. Modern applications demand modern security solutions. Protect your web applications and APIs, eliminate false positives and stop automated attacks against your business. CloudGuard uses contextual AI to prevent threats with absolute precision, without any human intervention as the application is updated. Protect web applications, and prevent OWASP Top 10 attacks. From implementation through runtime, CloudGuard AppSec automatically analyzes every user, transaction, and URL to create a risk score to stop attacks without creating false positives. In fact, 100% of CloudGuard customers maintain fewer than 5 rule exceptions per deployment.
  • 20
    Fabrix

    Fabrix

    Fabrix

    Fabrix has created a revolutionary way to visualize your IT operations by transforming enormous amounts of operational data into actionable information with visual alerts. The visualizations provide a panoramic field of view for IT operations. This allows your team to resolve, remediate and act fast. See events happen in real-time and solve issues before they impact your business. Fabrix’s visualization solution is centralized, allowing all business stakeholders to see a shared context of information and enabling effective communication. This further reduces the time it takes to resolve issues. Identify issues before they impact your business. Resolve issues in half the time it takes you today. Collaborate and communicate more efficiently. Maintain service levels to meet Key Performance Indicators (KPI) and reduce operational costs. Gain operational visibility and optimize manageability.
  • 21
    LOGIQ

    LOGIQ

    LOGIQ.AI

    LOGIQ.AI’s LogFlow provides centralized control of your observability data pipelines. As data streams arrive, they are automatically organized and optimized for your business teams and knowledge workers. XOps teams can centralize data flow management, gain data EPS control, and increase data quality and relevance. Built on any object store, LogFlow’s InstaStore enables infinite data retention and on-demand data replay to any target observability platform of your choice. Analyze operational metrics across applications and infrastructure and gain actionable insights that help you scale with confidence while maintaining high availability. Fuel business decisions and better user experiences by collecting, transforming, and analyzing behavioral data and usage patterns from business systems. Don’t let new attack techniques catch you off guard. Detect and analyze threat patterns from multiple sources and automate threat prevention and remediation.
  • 22
    Martello Vantage DX
    Managing Microsoft Teams and Microsoft Office 365 application performance requires deep insight into the real user experience as well as coordination between IT departments and service providers that each work with different tools with different objectives. IT teams often struggle to qualify and solve application performance or voice quality issues because available data from user feedback and traditional monitoring tools don’t provide substantial insight into the user experience. Martello Vantage DX™ gives IT teams complete end-to-end visibility of Microsoft 365 user experience to rapidly detect and resolve problems before they impact the user experience. Detect, alert and anticipate user experience challenges. Qualify and prioritize IT and third-party issues impacting Microsoft Teams and Microsoft Office 365. Ensure optimal Microsoft service productivity for your business lines.
  • 23
    Kion

    Kion

    Kion

    The only single-platform solution for setup and provisioning, financial management, and compliance. Kion offers the only single-platform approach to cloud enablement for AWS, Azure, and Google Cloud, transcending cloud management and cloud governance by offering all three pillars necessary for total cloud control. Provision accounts, get enterprise-wide visibility, and fully integrate the cloud with your tech stack to automate the full cloud lifecycle. Kion helps you start correctly from day 1 in the cloud by automating the provisioning of accounts with the proper controls around allowed services and budget. Prevent, detect, report, and remediate issues to comply with industry standards and business policies. Allocate and track spending, get real-time and forecasted data, identify savings opportunities, and enforce budgets. We deliver more than just the features to manage and govern your cloud.
  • 24
    BOSCO

    BOSCO

    BOSCO

    BOSCO™ uses your data combined with our game-changing AI to accurately predict where to spend your marketing budgets for maximum success. BOSCO™ combines your internal marketing data with extensive algorithmic modeling to create personalized reporting dashboards. Our easy-to-use interface provides a single source of truth and enables marketers to make better digital marketing spending decisions using data-driven insights. Using our unique BOSCO™ Index feature, we can rank your domain against the closest competitors in your category. The BOSCO Index™ is a measure of your online footprint and how effective you are with investment in organic and paid media channels. BOSCO™ is built on data from trusted third-party domains, collected from previous digital interactions. BOSCO™ isn’t dependent on your marketing budget, but on whether you’re reaching your online potential in paid and organic search. BOSCO™ identifies ten competitors within your market and scores them.
  • 25
    CorralData

    CorralData

    CorralData

    CorralData is a full-service, AI-powered platform that radically simplifies unifying and analyzing data across multiple sources. With CorralData, you can access human data experts and industry-leading AI tools to easily and cost-effectively drive remarkable, data-fueled results. No coding, SQL, or engineering resources required. Here’s how CorralData works. First, unify all of your data sources using our 450+ pre-built data connectors. Our U.S.-based support team will guide you along the way. Then, begin instantly and securely unlocking powerful data insights using natural language AI questions. Or work directly with a human data expert to surface the insight you need. The CorralData platform includes everything you need to start using data to drive results in one simple, monthly subscription—stunning data visualization tools, built-in chat, custom reporting, and access to human experts. Schedule a free demo today and see how simple and easy AI-powered data can be.
    Starting Price: $200/month
  • 26
    Autymate

    Autymate

    Autymate

    Our one-time, no-code integrations work with 200+ of the world’s biggest platforms. From HR and payroll to managing customers and vendors, you can connect everyone with everything without lifting a finger. We made our interface so intuitive that it looks like you are doing the automation within QuickBooks itself. Seamlessly integrate QuickBooks and your accounting systems, eliminating data entry and boosting your team's productivity. Make accounting effortless for your franchise business. Stay ahead of your competition and make your customers stay longer with a white-labeled accounting automation app. Connect your enterprise's most complex systems in one easy workflow and automate all the busy work in between. Seamlessly integrate QuickBooks and your accounting systems, eliminating data entry and boosting your team's productivity. Your accountants can do what they love doing and work on more meaningful tasks that have a more significant impact.
  • 27
    QOMPLX

    QOMPLX

    QOMPLX

    QOMPLX Identity Threat Detection and Response (ITDR) continuously validates to prevent network takeovers. QOMPLX ITDR uncovers existing Active Directory (AD) misconfigurations and detects attacks in real time. Identity security is essential to network operations. Verify identity in real-time. We verify everyone to prevent privilege escalation and lateral movement. We integrate with your current security stack and use it to augment our analytics resulting in comprehensive visibility. Understand the priority and severity of threats so resources can spend time where it matters most. Real-time detection and prevention stop attackers from bypassing security measures. From Active Directory (AD) security to red teaming and more, our experts are here to support your needs. QOMPLX enables clients to holistically manage and reduce cybersecurity risks. Our analysts will implement our SaaS solutions and monitor your environment.
  • 28
    VeriClouds

    VeriClouds

    VeriClouds

    VeriClouds CredVerify is the only service designed to detect, verify and remediate the use of weak or stolen credentials throughout the entire user lifecycle, from registration to authentication and password reset. It takes seconds to detect, offers immediate response, and has over 90% coverage. Rest assured you will be protected by the highest standards in security, and know that part of VeriClouds’ service policy is hard dedication in complying with key security points. Automates the detection of unauthorized login attempts and integrates with real-time policy enforcement measures. Significantly minimizes the threat from the number one cause of data breaches, a weak or stolen password. Reduces the likelihood of an account takeover or credential stuffing attack from being successful. CredVerify can be consumed as a service in the VeriClouds cloud, or it can be deployed in a customer’s cloud environment with just a few lines of code.
  • 29
    Infisical

    Infisical

    Infisical

    Compare secrets across environments and see what's different or missing. Set personal values for secrets – either during local development or for sensitive secrets. Easily inherit other secrets to establish a single source of truth. Automatically identify and prevent secret leaks to git using Infisical's continuous monitoring and pre-commit checks – support over 140 secret types.
    Starting Price: $6 per month
  • 30
    Code42 Incydr
    Incydr gives you the visibility, context and control needed to stop data leak and IP theft. Detect file exfiltration via web browsers, USB, cloud apps, email, file link sharing, Airdrop, and more. See how files are moved and shared across your entire organization, without the need for policies, proxies, or plugins. Incydr automatically identifies when files move outside your trusted environment, allowing you to easily detect when files are sent to personal accounts and unmanaged devices. Incydr prioritizes file activity based on 120+ contextual Incydr Risk Indicators (IRIs). This prioritization works on day 1 without any configuration. Incydr’s risk-scoring logic is use case-driven and transparent to administrators. Incydr uses Watchlists to programmatically protect data from employees who are most likely to leak or steal files, such as departing employees. Incydr delivers a complete range of technical and administrative response controls to support the full spectrum of insider events.
  • 31
    Proofpoint Insider Threat Management
    As the leading people-centric Insider Threat Management (ITM) solution, Proofpoint’s ITM protects against data loss and brand damage involving insiders acting maliciously, negligently, or unknowingly. Proofpoint correlates activity and data movement, empowering security teams to identify user risk, detect insider-led data breaches, and accelerate security incident response. 30% of data breaches are insider-driven, and the cost of these insider security threat incidents has doubled in the last three years. Proofpoint empowers security teams to reduce insider threat risk and frequency, accelerate insider threat response and increase the efficiency of their security operations. We’ve gathered all the resources for you, including reports, strategies, and more, to help you mitigate the risk of insider threats. Correlate user activity, data interaction, and user risk in unified explorations and visualized as timeline-based views.
  • 32
    Snow Commander
    Snow Commander is a powerful hybrid cloud management tool that leverages automation to deliver business agility, oversight, and efficiency. This tool enables IT to eliminate cumbersome, manual approval processes and provide end users with a quick, self-service way to access both public and private clouds that won’t slow down the most agile development teams. Increase agility and efficiency with streamlined hybrid cloud management. Snow Commander uses automation to provide end users with quick and easy access to both public and private cloud resources. The comprehensive self-service portal provides IT with the visibility needed to effectively govern resource usage, while self-service provisioning automation capabilities ensure that the most agile development teams don’t miss a beat. A feature-rich workload engine enables change orchestration with cost analytics, governance policy, and automation. It also boasts extensible functionality to empower process transformation.
  • 33
    Azure Spring Apps
    Azure Spring Apps is a fully managed service that helps Spring developers focus on code, not on infrastructure. Deploy any type of Spring app—including web apps, microservices, event-driven, serverless, and batch—without the need for Kubernetes. Take advantage of the Azure ecosystem while using your existing investments. Gain deep insights into application dependencies and operational telemetry using Azure monitor. Aggregate metrics for a topological view of how different services interact and see average performance and error rates. Easily identify the root cause of reliability issues and performance bottlenecks. Focus on what matters—your apps, business logic, and delivering value to your users. Deploy any type of Spring or Polyglot apps, either from source code or artifacts, with support for container creation and maintenance.
    Starting Price: $0.7136 per hour
  • 34
    Kroll Cyber Risk
    We are the world incident response leader. Merging complete response capabilities with frontline threat intelligence from over 3000 incidents handled per year and end-to-end expertise we protect, detect and respond against cyberattacks. For immediate assistance, contact us today. Tackle every facet of today and tomorrow’s threat landscape with guidance from Kroll’s Cyber Risk experts. Enriched by frontline threat intel from 3000+ incidents cases every year, our end-to-end cyber risk solutions help organizations uncover exposures, validate the effectiveness of their defenses, implement new or updated controls, fine-tune detections and confidently respond to any threat. Get access to a wide portfolio of preparedness, resilience, detection and response services with a Kroll Cyber Risk retainer. Get in touch for more info.
  • 35
    Holm Security

    Holm Security

    Holm Security

    Identify vulnerabilities across your entire attack surface, covering both your technical and human assets. All in one unified platform. One risk model. One workflow. Keep up with current threats and protect your entire infrastructure, including cloud, operational technology, and remote workforce. Our all-in-one platform offers unparalleled insight and visibility, covering all your assets across your organization’s technical assets, including local and public systems, computers, cloud infrastructure and services, networks, web applications, APIs, and human assets - your users. Gain complete visibility and actionable context on your most critical misconfigurations, so your teams can proactively and continuously improve your cloud security posture. Reduce risk to your organization by maintaining least-privilege access for cloud workloads, data, and applications.
  • 36
    ThreatAware

    ThreatAware

    ThreatAware

    Leveraging API feeds from your existing tools, validate your controls are correctly deployed and functioning across every cyber asset. Our clients come from all industries, from legal to finance, charities to retail. We are trusted by leading organizations to discover and protect their valuable cyber assets. Create a highly accurate device inventory by connecting to your existing systems via API. When issues arise the workflow automation engine can trigger actions via a webhook. ThreatAware provides clarity of the security control health of your cyber assets in a clear and simple design. Gain a macro view of your security control health regardless of how many controls you are monitoring. Generated from any field from a device, allows you to quickly group your cyber assets for monitoring and configuration purposes. When your monitoring systems accurately depicts your live environment, every alert is real.
  • 37
    OverSOC

    OverSOC

    OverSOC

    rive your attack surface with a single source of truth. Gather and unify your IT & Cyber data to quickly discover your inventory gaps, prioritize your remediation actions, and accelerate your audits. Collect data from all the tools used by your IT and SecOps teams (via API), as well as data from your business teams (via flat files), and bring them together in a single, agent-free database. Automate the ingestion, standardization, and consolidation of your data in a common frame of reference. No more duplicate assets, no more copy-pasting into spreadsheets and manual dashboards. Maximize your data enrichment by integrating external data sources such as security bulletins from certified sources. Query your cyber data via the filter system and get accurate answers about the state of your information system. Use OverSOC's pre-recorded filters, based on specific customer needs, or create your own filters and save them to share with your collaborators.
  • 38
    NXLog

    NXLog

    NXLog

    Achieve complete security observability with powerful insights from your log data. Improve your infrastructure visibility and enhance threat prevention with a versatile multi-platform tool. With support for over 100 operating system versions and more than 120 configurable modules, gain comprehensive insights and increased security. Cut the cost of your SIEM solution by reducing noisy and unnecessary log data. Filter events, truncate unused fields, and remove duplicates to increase the quality of your logs. Collect and aggregate logs from systems across the entire breadth of your organization with a single tool. Reduce complexity in managing security-related events and decrease detection and response times. Empower your organization to meet compliance requirements by centralizing some logs in an SIEM and archiving others in your long-term storage. NXLog Platform is an on-premises solution for centralized log management, with versatile processing.
  • 39
    Splunk Attack Analyzer
    Automate threat analysis of suspected malware and credential phishing threats. Identify and extract associated forensics for accurate and timely detections. Automatic analysis of active threats for contextual insights to accelerate investigations and achieve rapid resolution. Splunk Attack Analyzer automatically performs the actions required to fully execute an attack chain, including clicking and following links, extracting attachments and embedded files, dealing with archives, and much more. The proprietary technology safely executes the intended threat, while providing analysts a consistent, comprehensive view showing the technical details of an attack. When paired together, Splunk Attack Analyzer and Splunk SOAR provide unique, world-class analysis and response capabilities, making the SOC more effective and efficient in responding to current and future threats. Leverage multiple layers of detection techniques across both credential phishing and malware.
  • 40
    Tenable CIEM
    In the public cloud, identities and entitlements are the greatest risk to your cloud infrastructure. Tenable CIEM, part of our unified CNAPP, isolates and eradicates those exposures. So you can achieve the least privilege at scale while powering cloud adoption. Discover your compute, identity, and data resources in your cloud and get contextualized visibility into how critical resources are accessed. Gain the context you need to focus on the priority risks caused by the toxic combination of misconfigurations, excessive entitlements, vulnerabilities, and sensitive data. Reduce cloud risk by closing priority exposures with top speed and surgical precision, even if you only have five minutes to spare. Secure your cloud from attackers exploiting identities, overly-permissive access, and excessive permissions. Exploited identities cause almost all data breaches. Bad actors target mismanaged IAM privileges to access your sensitive data.
  • 41
    Tenable Identity Exposure
    Unleash a new level of end-to-end protection from identity-based attacks. Collapse enterprise silos and unify identities across Active Directory and Entra ID. Evaluate your identities using risk scoring to locate the riskiest ones that require attention. Use step-by-step prioritization to rapidly close security gaps with the highest likelihood of identity-based exploits. Identities are the new perimeter, compromised identities are at the center of nearly every successful cyberattack. By exposing and closing the security gaps where identity-based exploits thrive, Tenable Identity Exposure strengthens your security posture and confidently prevents attacks before they occur. Tenable Identity Exposure continuously validates your Active Directory and Entra ID environments for weaknesses, misconfiguration, and activity that can lead to damaging attacks. Integrating deep identity context into the Tenable One exposure management platform can further help you see risky toxic combinations.
  • 42
    HoneyHive

    HoneyHive

    HoneyHive

    AI engineering doesn't have to be a black box. Get full visibility with tools for tracing, evaluation, prompt management, and more. HoneyHive is an AI observability and evaluation platform designed to assist teams in building reliable generative AI applications. It offers tools for evaluating, testing, and monitoring AI models, enabling engineers, product managers, and domain experts to collaborate effectively. Measure quality over large test suites to identify improvements and regressions with each iteration. Track usage, feedback, and quality at scale, facilitating the identification of issues and driving continuous improvements. HoneyHive supports integration with various model providers and frameworks, offering flexibility and scalability to meet diverse organizational needs. It is suitable for teams aiming to ensure the quality and performance of their AI agents, providing a unified platform for evaluation, monitoring, and prompt management.
  • 43
    AWS Marketplace
    AWS Marketplace is a curated digital catalog that enables customers to discover, purchase, deploy, and manage third-party software, data products, AI agents, and services directly within the AWS ecosystem. It provides access to thousands of listings across categories like security, machine learning, business applications, and DevOps tools. With flexible pricing models such as pay-as-you-go, annual subscriptions, and free trials, AWS Marketplace simplifies procurement and billing by integrating costs into a single AWS invoice. It also supports rapid deployment with pre-configured software that can be launched on AWS infrastructure. This streamlined approach allows businesses to accelerate innovation, reduce time-to-market, and maintain better control over software usage and costs.
  • 44
    Criminal IP ASM
    Criminal IP’s Attack Surface Management (ASM) is a threat-intelligence–driven platform that continuously discovers, inventories, and monitors every internet-connected asset associated with an organization, including shadow and forgotten resources, so teams see their true external footprint from an attacker’s perspective. The solution combines automated asset discovery with OSINT techniques, AI enrichment and advanced threat intelligence to surface exposed hosts, domains, cloud services, IoT endpoints and other Internet-facing vectors, capture evidence (screenshots and metadata), and correlate findings to known exploitability and attacker tradecraft. ASM prioritizes exposures by business context and risk, highlights vulnerable components and misconfigurations, and provides real-time alerts and dashboards to speed investigation and remediation.
    Starting Price: $89.08 per month
  • 45
    Cherwell Software

    Cherwell Software

    Cherwell Software

    Cherwell Service Management is the modern choice for IT Service Management (ITSM). Affordable and easy to implement, the Cherwell platform provides IT teams the ability to implement, automate and modernize service and support processes to cater to the needs of a business--but minus the cost and complexity of legacy ITSM soltutions. Users can choose from subscription or perpetual pricing, on-premises or SaaS, Cherwell-hosted or public cloud infrastructure.
  • 46
    CARTO

    CARTO

    CARTO

    The leading cloud native Location Intelligence platform. Whether it's optimizing billboard sites, balancing sales territories or designing supply chains - understanding & analyzing spatial data is critical to the future of your business. CARTO's Location Intelligence platform allows organizations to store, enrich, analyze & visualize their data to make spatially-aware decisions. 80% of data collected by businesses has a location component, but only 10% is used to drive decision-making. Organizations able to tap into spatially-driven analytics have a unique opportunity to gain an edge and deliver on business goals. Learn how your industry peers are using spatial data and analysis.
  • 47
    Data Virtuality

    Data Virtuality

    Data Virtuality

    Connect and centralize data. Transform your existing data landscape into a flexible data powerhouse. Data Virtuality is a data integration platform for instant data access, easy data centralization and data governance. Our Logical Data Warehouse solution combines data virtualization and materialization for the highest possible performance. Build your single source of data truth with a virtual layer on top of your existing data environment for high data quality, data governance, and fast time-to-market. Hosted in the cloud or on-premises. Data Virtuality has 3 modules: Pipes, Pipes Professional, and Logical Data Warehouse. Cut down your development time by up to 80%. Access any data in minutes and automate data workflows using SQL. Use Rapid BI Prototyping for significantly faster time-to-market. Ensure data quality for accurate, complete, and consistent data. Use metadata repositories to improve master data management.
  • 48
    AlertSite

    AlertSite

    SmartBear

    AlertSite is the 'Early Warning System' you can trust to monitor your websites, web apps, and APIs from all over the world and within your private networks. You shouldn't be burdened by the fear and the consequence of whether an alert is real or false. AlertSite monitors your UI and API layer for availability, performance, and functionality without the alert fatigue of other monitoring tools. Creating Web and API monitors in AlertSite is intuitive and effortless. Codelessly add new web monitors with DejaClick, our point-and-click web recorder, and API Monitors in just a few clicks using an API Endpoint URL or OpenAPI Specification file. Or, reuse test cases like Selenium Scripts or SoapUI tests to create new monitors. Don't let false alerts and erroneous data cloud your visibility into application health.
  • 49
    SysTrack

    SysTrack

    Lakeside Software

    Lakeside Software is a leader in digital experience monitoring. We develop software that provides the visibility IT teams need to design and support productive digital workplaces. Customers use our technology to perform workplace analytics, IT asset optimization, remote work management, and AIOps. Our product, SysTrack, is a digital experience monitoring solution that gathers and analyzes data on everything that may impact end-user experience and business productivity. For more information, visit www.lakesidesoftware.com.
  • 50
    Isora GRC

    Isora GRC

    SaltyCloud, PBC

    Streamline your IT Risk Assessments with Isora GRC. Leverage a lightweight, yet powerful surveying solution for conducting IT Risk Assessments. Launch self-assessment questionnaires for departments, people, facilities, devices, and applications. Leverage our library of preloaded questionnaires like NIST, HIPAA, GLBA, and more. Build or upload your custom questionnaires. Change question weights, allow partial credit, gate conditional questions, and add other question logic to simplify your questionnaires. Automatically rollup and score collected quantitative and qualitative survey data. Gain access to dynamic risk reports. Use the risk map to identify the highest-risk units or the trend graph to track risk scores year-over-year. Easily export the raw data to data analytics tools like Microsoft PowerBI using the RESTful API.