371 Integrations with Splunk Cloud Platform
View a list of Splunk Cloud Platform integrations and software that integrates with Splunk Cloud Platform below. Compare the best Splunk Cloud Platform integrations as well as features, ratings, user reviews, and pricing of software that integrates with Splunk Cloud Platform. Here are the current Splunk Cloud Platform integrations in 2025:
-
1
Claroty
Claroty
Powered by our Continuous Threat Detection (CTD) and Secure Remote Access (SRA) solutions, our platform provides a full range of industrial cybersecurity controls that integrate seamlessly with your existing infrastructure, scale effortlessly, and have the industry's lowest total cost of ownership (TCO). The comprehensive industrial cybersecurity controls our platform provides revolve around the REVEAL, PROTECT, DETECT, CONNECT framework. Our platform's features empower you to achieve effective industrial cybersecurity, regardless of where you are on your industrial cybersecurity journey. The Claroty Platform is deployed across multiple industries, each with unique operational and security needs. Effective industrial cybersecurity starts with knowing what needs to be secured. Our platform removes the barriers that limit industrial networks from securely connecting to what enables the rest of the business to operate and innovate with an acceptable level of risk. -
2
DatAnswers
Varonis
Easily respond to data subject access requests by surfacing personal information across cloud and on-prem files with fast and powerful search. Find any file with personal data in seconds with Varonis’ purpose-built search engine. We instantly surface and collect the information you need for DSARs, right to be forgotten, or e-discovery—all with super lean infrastructure. Our DSAR form uses sophisticated logic on the backend to ensure you get high-fidelity results, so you can avoid false positives (and fines). Keep a pulse on how much data you’ve indexed and any failed documents so that you always know the scope of your searches. Sensitive data creation doesn’t stop and privacy regulations are ever-evolving. Privacy automation can help you stay ahead. Easily see where you have overexposed PII with dynamic dashboards that highlight privacy issues. Reduce the risk of breaches and fines by monitoring for unauthorized access to sensitive information and restricting access to least privilege. -
3
Cribl AppScope
Cribl
AppScope is a new approach to black-box instrumentation delivering ubiquitous, unified telemetry from any Linux executable by simply prepending scope to the command. Talk to any customer using Application Performance Management, and they’ll tell you how much they love their solution, but they wish they could extend it to more of their applications. Most have 10% or fewer of their apps instrumented for APM, and are supplementing what they can with basic metrics. Where does this leave the other 80%? Enter AppScope. No language-specific instrumentation. No application developers required. AppScope is language agnostic and completely userland; works with any application; scales from the CLI to production. Send AppScope data to any existing monitoring tool, time series database, or log tool. AppScope allows SREs and Ops teams to interrogate running applications to discover how they work and their behavior in any deployment context, from on-prem to cloud to containers. -
4
Eclypsium
Eclypsium
Eclypsium® ensures the health and integrity of enterprise devices at the fundamental firmware and hardware layers that traditional security fails to protect. Eclypsium provides a new layer of security to defend the critical servers, networking gear, and laptops at the heart of every organization. Unlike traditional security that only protects the software layers of a device, Eclypsium brings security to the hardware and firmware. From the earliest boot process to the most fundamental code on a device, Eclypsium finds and fixes the low-level weaknesses and threats that attackers use to defeat traditional security. Get high-fidelity views into all enterprise devices including servers, networking gear, and laptops. Automatically find vulnerabilities and threats in all hardware and firmware components inside each device. See into devices both on-premises or deployed remotely including remote work and BYOD devices. -
5
Corelight
Corelight
Corelight brings you the power of Zeek without Linux issues, NIC problems, or packet loss. Deployment takes minutes, not months. After all, your top people should be threat hunting, not troubleshooting. The most capable platform for understanding and protecting your network is built on open source. You'll have open access to your metadata and the ability to customize and extend your capabilities — together with a vibrant community. We’ve built the leading team of Zeek experts and contributors, and have assembled a world-class support team that continually delights customers with their unparalleled knowledge and fast response times. Proactive, secure, and automatic—when you enable Corelight Dynamic Health Check your Corelight Sensor sends performance telemetry back to Corelight to proactively monitor for things like disk failures or abnormal performance metrics that could indicate a problem. -
6
Augment your cross-channel DLP with AI-powered classification. Proofpoint Intelligent Classification and Protection is an AI-powered approach to classifying your business-critical data. It recommends actions based on risk accelerating your enterprise DLP program. Our Intelligent Classification and Protection solution helps you understand your unstructured data in a fraction of the time required by legacy approaches. It categorizes a sample of your files using a pre-trained AI-model. And it does this across file repositories both in the cloud and on-premises. With our two-dimensional classification, you get the business context and confidentiality level you need to better protect your data in today’s hybrid world.
-
7
Datazoom
Datazoom
Improving the experience, efficiency, and profitability of streaming video requires data. Datazoom enables video publishers to better operate distributed architectures through centralizing, standardizing, and integrating data in real-time to create a more powerful data pipeline and improve observability, adaptability, and optimization solutions. Datazoom is a video data platform that continually gathers data from endpoints, like a CDN or a video player, through an ecosystem of collectors. Once the data is gathered, it is normalized using standardized data definitions. This data is then sent through available connectors to analytics platforms like Google BigQuery, Google Analytics, and Splunk and can be visualized in tools such as Looker and Superset. Datazoom is your key to a more effective and efficient data pipeline. Get the data you need in real-time. Don’t wait for your data when you need to resolve an issue immediately. -
8
ThreatStryker
Deepfence
Runtime attack analysis, threat assessment, and targeted protection for your infrastructure and applications. Stay ahead of attackers and neutralize zero-day attacks. Observe attack behavior. ThreatStryker observes, correlates, learns and acts to protect your applications and keep you one step ahead of attackers. Deepfence ThreatStryker discovers all running containers, processes, and online hosts, and presents a live and interactive color-coded view of the topology. It audits containers and hosts to detect vulnerable components and interrogates configuration to identify file system, process, and network-related misconfigurations. ThreatStryker assesses compliance using industry and community standard benchmarks. ThreatStryker performs deep inspection of network traffic, system, and application behavior, and accumulates suspicious events over time. Events are classified and correlated against known vulnerabilities and suspicious patterns of behavior. -
9
ThreatMapper
Deepfence
Open source, multi-cloud platform for scanning, mapping, and ranking vulnerabilities in running containers, images, hosts, and repositories. ThreatMapper discovers the threats to your applications in production, across clouds, Kubernetes, serverless, and more. What you cannot see, you cannot secure. ThreatMapper auto-discovers your production infrastructure. It identifies and interrogates cloud instances, Kubernetes nodes, and serverless resources, discovering the applications and containers and mapping their topology in real-time. Use ThreatMapper to discover and visualize the external and internal attack surface for your applications and infrastructure. Exploiting known vulnerabilities in common dependencies is one of the easiest ways for bad actors to gain a foothold within your infrastructure. ThreatMapper scans hosts, containers, and applications for known vulnerable dependencies, taking threat feeds from over 50 different sources. -
10
Balance Theory
Balance Theory
Knowledge sharing and collaboration approach result in onboarding new talent faster. Reduce time spent on knowledge management and asking & answering questions leveraging integrated cyber knowledge. Collaborate and align from day 0. An aligned and transparent delivery process to accelerate readiness. Identify and remediate single points of failure prior to employee attrition issues. Highly-available backup of your organization's cyber defense configurations and decisions. Share insights and align internal teams. Move faster with your own organizational collaboration network. Discover community-shared cyber content to reuse and enhance your own cyber programs. Collaborate live with content contributors within stories, through chat or live sessions. Stay in the know on content status, tasking and team commentary to keep your team informed. -
11
CognitiveScale Cortex AI
CognitiveScale
Developing AI solutions requires an engineering approach that is resilient, open and repeatable to ensure necessary quality and agility is achieved. Until today these efforts are missing the foundation to address these challenges amid a sea of point tools and fast changing models and data. Collaborative developer platform for automating development and control of AI applications across multiple personas. Derive hyper-detailed customer profiles from enterprise data to predict behaviors in real-time and at scale. Generate AI-powered models designed to continuously learn and achieve clearly defined business outcomes. Enables organizations to explain and prove compliance with applicable rules and regulations. CognitiveScale's Cortex AI Platform addresses enterprise AI use cases through modular platform offerings. Our customers consume and leverage its capabilities as microservices within their enterprise AI initiatives. -
12
Cyclops
Cyclops Security
Prioritizing risk is one of the biggest challenges in cyber security, our innovative solution creates a business context for your security operations, allowing you to validate the effectiveness of your security controls in the context of your unique business requirements. Cyclops integrates with your existing security tools using the CSMA approach to gather metadata on threats, vulnerabilities, cloud instances, SaaS apps, and more. It then enriches this data with context and insights by looking at the same entities in different products that are integrated. By providing this contextualized approach to risk validation, our cybersecurity mesh product helps you make intelligent decisions and focus on what really matters. -
13
Stamus Networks
Stamus Networks
Network-based threat detection and response solutions from Stamus Networks. Expose serious threats and unauthorized activity lurking in your network. We tap into the inherent power of network traffic to uncover critical threats to your organization. We offer the best possible asset-oriented visibility and automated detection to help practitioners cut through the clutter and focus on serious and imminent threats. Stamus Security Platform (SSP) is an open network detection and response solution built on a Suricata foundation that delivers actionable network visibility and powerful threat detection. Stamus Security Platform is trusted by some of the world’s most targeted organizations, including government CERTs, central banks, insurance providers, managed security service providers, financial service providers, multinational government institutions, broadcasters, travel and hospitality companies, and even a market-leading cybersecurity SaaS vendor. -
14
Canopy
Canopy
Enable your development team to save massive amounts of time, simplify operations, and deliver experiences fast with Canopy. Connect securely to best-of-breed SaaS platforms, relational databases, spreadsheets, and csv files. Build new connectors to any data set in minutes, including internal data, niche & long-tail SaaS platforms, and complex integrations. Prepare your data in the perfect format for any experience or action. Deliver data through your curated API with the right communication and caching strategy for optimal performance. Quickly view, manage, and troubleshoot everything you care about with real-time insights, actions, and controls. Engineered to exceed enterprise demands with unmatched security, compliance, scalability, and speed. -
15
Clutch
Clutch
Clutch is addressing the increasingly critical challenge of non-human identity security within modern enterprises. As digital infrastructures expand and become more complex, the management and security of non-human identities, ranging from API keys and secrets to tokens and service accounts, have emerged as a pivotal yet often neglected aspect of cybersecurity. Recognizing this gap, Clutch is developing an enterprise platform dedicated to the comprehensive protection and management of these identities. Our solution is designed to fortify the digital backbone of enterprises, ensuring a secure, resilient, and trustworthy environment for their operations. Ever expanding, outpacing human identities by a staggering ratio of 45 to 1. Holds critical privileges and extensive access, essential for mission-critical automated processes. Lacks inherent security controls such as MFA and conditional access policies. -
16
Conifers CognitiveSOC
Conifers
Conifers.ai's CognitiveSOC platform integrates with existing security operations center teams, tools, and portals to solve complex problems at scale with maximum accuracy and environmental awareness, acting as a force multiplier for your SOC. The platform uses adaptive learning, a deep understanding of institutional knowledge, and a telemetry pipeline to help SOC teams solve hard problems at scale. It seamlessly integrates with the ticketing systems and portals your SOC team already uses, so there's no need to alter workflows. The platform continuously ingests your institutional knowledge and shadows your analysts to fine-tune use cases. Using multi-tier coverage, complex incidents are analyzed, triaged, investigated, and resolved at scale, providing verdicts and contextual analysis based on your organization's policies and procedures, while keeping humans in the loop. -
17
AWS DevOps Agent
Amazon
AWS DevOps Agent is a software from Amazon Web Services (AWS) designed to act as an autonomous, always-on operations engineer that resolves and proactively prevents incidents across your infrastructure, applications, and deployments. It automatically learns your application resources and their relationships, including infrastructure, code repositories, deployment pipelines, observability tools, and telemetry, then uses that knowledge to correlate logs, metrics, traces, deployment data, and recent code changes. When an alert, error spike, or support ticket arises, DevOps Agent immediately begins automated investigation; it triages incidents 24/7, runs root-cause analysis, and proposes detailed mitigation plans which can be automatically routed through team workflows (e.g., via Slack, ServiceNow, PagerDuty) or directly create support cases with AWS. -
18
Metric Insights
Metric Insights
Engage users by bringing all your BI tools and data together into one easily searchable BI portal. Deliver the relevant content to the right person, at the right time, on the right device. Automatically identify anomalies in your data to ensure that the right people are informed of critical changes – nothing gets missed. Get insights on your data in any application, on any device. Metric Insights enables leading organizations to empower their business users with timely, relevant and actionable data. -
19
Snare
Prophecy International Holdings Ltd.
Snare Central is a centralized log management solution that collects, processes, and stores log data from various sources across an organization’s network. It provides a secure and scalable platform for aggregating logs from systems, applications, and devices, allowing for efficient monitoring and analysis. With advanced filtering and reporting capabilities, Snare Central enables organizations to detect security threats, ensure compliance, and optimize operational performance. The platform supports integration with third-party tools for enhanced analytics and provides customizable dashboards for real-time insights. Snare Central is designed to meet the needs of security, compliance, and IT teams by providing a unified view of log data and supporting detailed investigations. -
20
Swish.ai
Swish.ai
The first hyperautomation platform that works with any existing ITSM tool to uncover and act on insights in real time, accelerating ticket resolution time and reducing costs. Swish.ai hyperautomation platform mines, automates, and predicts the best course of action, and then routes to the best-matched agent. The Swish.ai platform evaluates your historical ITSM ticket data to create and inform dynamic AI models that capture insights about your unique environment, even as it evolves. Swish.ai’s patented solution goes beyond NLP to understand your company lingo. It improves the understanding of each underlying ticket issue and identifies the next best action accurately on the spot. Once tickets have been accurately classified, the platform evaluates additional real-time variables before assigning them to the best-matched agents. We also provide reference resources to ensure they have everything needed to resolve the ticket without re-routing or pausing it. -
21
Securonix UEBA
Securonix
Today, many attacks are specifically built to evade traditional signature-based defenses, such as file hash matching and malicious domain lists. They use low and slow tactics, such as dormant or time triggered malware, to infiltrate their targets. The market is flooded with security products that claim to use advanced analytics or machine learning for better detection and response. The truth is that all analytics are not created equal. Securonix UEBA leverages sophisticated machine learning and behavior analytics to analyze and correlate interactions between users, systems, applications, IP addresses, and data. Light, nimble, and quick to deploy, Securonix UEBA detects advanced insider threats, cyber threats, fraud, cloud data compromise, and non-compliance. Built-in automated response playbooks and customizable case management workflows allow your security team to respond to threats quickly, accurately, and efficiently.