3 Integrations with Splunk Light

View a list of Splunk Light integrations and software that integrates with Splunk Light below. Compare the best Splunk Light integrations as well as features, ratings, user reviews, and pricing of software that integrates with Splunk Light. Here are the current Splunk Light integrations in 2024:

  • 1
    Splunk App for Infrastructure
    Unify and correlate logs and metrics in one solution. Get comprehensive infrastructure monitoring, alerting and investigation with your Splunk Enterprise and Splunk IT Service Intelligence license. Find root causes faster with cross-tier correlations, streamlined workflows and advanced alerting. Pre-built and custom visualizations monitor performance in real time. Enrich infrastructure data with service context in Splunk IT Service Intelligence (ITSI) in just a few clicks. The Splunk App for Infrastructure (SAI) provides a curated, unified metrics and logs experience focused on infrastructure performance monitoring. Easily distribute metrics by defining, grouping and filtering entities. Perform root cause analysis faster with SAI’s custom triggered alerting at the group or entity level. Triage alerts more effectively by understanding which conditions triggered the alert, assessing the severity of the alert, and viewing all triggered alerts during the time to take action.
    Starting Price: $60 per year
  • 2
    Splunk User Behavior Analytics
    Securing against unknown threats through user and entity behavior analytics. Discover abnormalities and unknown threats that traditional security tools miss. Automate stitching of hundreds of anomalies into a single threat to simplify a security analyst’s life. Use deep investigative capabilities and powerful behavior baselines on any entity, anomaly or threat. Automate threat detection using machine learning so you can spend more time hunting with higher fidelity behavior-based alerts for quick review and resolution. Rapidly identify anomalous entities without human analysis. Rich set of anomaly types (65+) and threat classifications (25+) across users, accounts, devices and applications. Rapidly identify anomalous entities without human analysis. Rich set of anomaly types and threat classifications (25+) across users, accounts, devices and applications. Organizations gain maximum value to detect and resolve threats and anomalies via the power of human and machine-driven solutions.
  • 3
    Mimecast Threat Intelligence
    Staying current with the strategies cyber attackers use can be, let’s face it, overwhelming. Mimecast makes it easy to keep your finger on the pulse by giving you threat intelligence specific to your environment, letting you see how you’ve been targeted, what cyber threats have been blocked and why, how you compare with others, and what actions you can take to ensure protections are optimized. This threat intelligence data is used to enhance Mimecast’s Email Security 3.0 protections across all three zones – at your perimeter, inside your network & organization, and beyond your perimeter. And thanks to our flexible and growing library of APIs, it can also easily be integrated with third-party tools to make your IT team and entire security ecosystem smarter.
  • Previous
  • You're on page 1
  • Next