155 Integrations with Splunk Enterprise
View a list of Splunk Enterprise integrations and software that integrates with Splunk Enterprise below. Compare the best Splunk Enterprise integrations as well as features, ratings, user reviews, and pricing of software that integrates with Splunk Enterprise. Here are the current Splunk Enterprise integrations in 2025:
-
1
Google Cloud Platform
Google
Google Cloud is a cloud-based service that allows you to create anything from simple websites to complex applications for businesses of all sizes. New customers get $300 in free credits to run, test, and deploy workloads. All customers can use 25+ products for free, up to monthly usage limits. Use Google's core infrastructure, data analytics & machine learning. Secure and fully featured for all enterprises. Tap into big data to find answers faster and build better products. Grow from prototype to production to planet-scale, without having to think about capacity, reliability or performance. From virtual machines with proven price/performance advantages to a fully managed app development platform. Scalable, resilient, high performance object storage and databases for your applications. State-of-the-art software-defined networking products on Google’s private fiber network. Fully managed data warehousing, batch and stream processing, data exploration, Hadoop/Spark, and messaging.Starting Price: Free ($300 in free credits) -
2
Device42
Device42, A Freshworks Company
With customers across 70+ countries, organizations of all sizes rely on Device42 as the most trusted, advanced, and complete full-stack agentless discovery and dependency mapping platform for Hybrid IT. With access to information that perfectly mirrors the reality of what is on the network, IT teams are able to run their operations more efficiently, solve problems faster, migrate and modernize with ease, and achieve compliance with flying colors. Device42 continuously discovers, maps, and optimizes infrastructure and applications across data centers and cloud, while intelligently grouping workloads by application affinities and other resource formats that provide a clear view of what is connected to the environment at any given time. As part of the Freshworks family, we are committed to, and you should expect us to provide even better solutions and continued support for our global customers and partners, just as we always have.Starting Price: $1499.00/year -
3
Google Chrome Enterprise
Google
Chrome Enterprise is a suite of business offerings that includes Chrome browser, Chrome's cloud management tool Chrome Enterprise Core, and the advanced security capabilities in Chrome Enterprise Premium. Chrome offers an dedicated enterprise download bundle, giving admins access to additional resources and policy templates for managing Chrome across desktop environments in their organization. Chrome Enterprise Core provides admins with simple, centralized management from the cloud. It allows admins to manage their enterprise browser deployment across platforms all from the same place. Chrome Enterprise Premium enables secure access to applications and resources, and offers integrated threat and data protection in the browser. It adds an extra layer of security to safeguard your Chrome browser environment, including DLP, real-time URL and file scanning, and context aware access for SaaS and web apps.Starting Price: Free -
4
Statseeker
Techniche
Statseeker is a fully-featured network performance monitoring solution. It's highly scalable and delivers fast real-time performance data from a minimal server footprint. Statseeker can be up and running within minutes, and discovering your entire network in less than an hour, without any significant effect on your bandwidth availability. Statseeker monitors networks of any size, polling up to one million interfaces every 60 seconds, collecting network data such as SNMP, ping, NetFlow (sFlow and J-Flow), syslog and trap messages and API data, as well as SDN configuration and health metrics. Your network performance data is never averaged or rolled up. This removes the guesswork in identifying over- and underutilized infrastructure, conducting root cause analysis, or capacity planning. Statseeker's out-of-the-box dashboards and reports give you the contextual data needed to proactively monitor your network and fix problems before users are aware.Starting Price: $5000 for 200 devices -
5
ThreatLocker
ThreatLocker
The ThreatLocker suite of security tools are powerful and designed so that everyone from businesses to government agencies to academic institutions can directly control exactly what applications run on their networks. We envision a future in which all organizations can chart their own course free from the influence of cybercriminals and the damage their incursions cause, and our team of veteran cybersecurity professionals created ThreatLocker to make this vision a reality. The team at ThreatLocker has been developing cybersecurity tools for decades, including programs to enhance email and content security, and this is our most innovative and ambitious cybersecurity solution yet. We developed this unique cybersecurity system because we believe that organizations should have complete control of their networks and should not have to live in fear of the next malware attack. To learn more, visit ThreatLocker.com. -
6
Hyperproof
Hyperproof
Hyperproof makes building out and managing your information security frameworks easy by automating repetitive compliance operation tasks so your team can focus on the bigger things. The Hyperproof solution also offers powerful collaboration features that make it easy for your team to coordinate efforts, collect evidence, and work directly with auditors in a single interface. Gone are the days of uncertainty around audit preparation and compliance management process. With Hyperproof you get a holistic view of your compliance programs with progress tracking, program health monitoring, and risk management. -
7
StrongDM
StrongDM
StrongDM is a People-First Access platform that gives technical staff a direct route to the critical infrastructure they need to be their most productive. End users enjoy fast, intuitive, and auditable access to the resources they need, and administrators leverage simplified workflows to enhance security and compliance postures. - We open up a clear, direct path that gives individualized access to the right people and keeps everyone else out. - Total visibility into everything that’s ever happened in your stack. Security and Compliance teams can easily answer who did what, where, and when. - Admins have precise control over what each user has access to—without these controls ever getting in the way of productivity - IT, InfoSec, and Administrators have precise controls. Unauthorized access is eliminated because users never see resources they don’t have permission to use. -All past, present, and future infrastructure is supported - Responsive 24/7/365 customer support.Starting Price: $70/user/month -
8
Vivantio
Vivantio
Vivantio is a leading provider of service management software for both internal- and external-facing teams. Centralize your service operations across B2B Customer Support, IT, HR, Facilities, Finance, and Legal. By combining enterprise-level functionality with the flexibility of a modern cloud-based solution, Vivantio provides an intuitive, scalable, and fully configurable platform that empowers businesses to achieve service excellence. The platform scales to meet the complex business needs of large, multi-site organizations, especially during periods of high growth. Vivantio is a trusted partner offering cost-effective solutions through flexible licensing.Starting Price: $59.00/month/user -
9
HaloPSA
Halo Service Solutions
HaloPSA is a modern and intuitive Professional Services Automation (PSA) solution, designed for Service Providers. With HaloPSA’s cloud platform, manage your entire business, modernise your customer experience and automate your service. As an all-inclusive platform, take advantage of all the features including Billing, Project Management, Reporting, time tracking and much more. Furthermore, take advantage of over 50 integrations to centralise your systems. Overall, HaloPSA is trusted by 100,000+ teams from 50+ countries, including global organisations such as Atos, NEC and Gijima.Starting Price: $35 per user per month -
10
Xitoring
Xitoring
Stop using multiple apps for server uptime and performance monitoring. Get Xitoring , and start monitoring numerous servers and websites in minutes by running one CLI command. We’ll automatically configure everything! Xitoring is an innovative SaaS platform for server monitoring. Our agent, Xitogent , gathers data from your servers to ensure optimal performance and prevent downtime. By keeping your systems running smoothly, we help boost customer satisfaction. Our global probing nodes continuously monitor your servers. If any issues arise, we notify the right contact instantly. At Xitoring, we’re committed to improving our software and adding incredible features in the future. Introduced in 2021, Xitoring aims to revolutionize the server monitoring industry with automation for those tired of traditional methods.Starting Price: $4.99 OR Lifetime free -
11
HaloITSM
Halo Service Solutions
Empower your IT team with a single all-inclusive cloud platform, designed for ITIL-aligned service delivery. Transform legacy ways of working into modern intuitive workflows, empowering teams to deliver excellent service to customers and employees repeatedly. Standardize your processes and gain valuable analytics to align IT to the business needs in a single all-inclusive, unlimited ITSM software solution. Centralize your workflows, create a single space for your ITSM software. HaloITSM blends ITIL best-practices with a fresh, flexible approach so you can improve your service management whilst maintaining an outstanding user experience. Customers worldwide across numerous sectors rely on HaloITSM to drive their IT Service requirements. See how they have transformed their daily processes with our case studies.Starting Price: $49 per user per month -
12
Perimeter 81
Check Point Software Technologies
Perimeter 81 is transforming the world of secure network access and helping businesses of all industries and sizes smoothly transition to the cloud. Unlike hardware-based firewall and traditional VPN technology, Perimeter 81’s cloud-based and user-centric Secure Network as a Service utilizes the Zero Trust approach and SASE model framework to offer greater network visibility, seamless onboarding, and automatic integration with all the major cloud providers. Named a Gartner Cool Vendor, Perimeter 81 is considered by industry leaders to be winning the “SASE space race". Network security doesn’t have to be complicated – join Perimeter 81 on a mission to radically simplify the cybersecurity experience!Starting Price: $8 per user per month -
13
Amazon Elastic Container Service (Amazon ECS) is a fully managed container orchestration service. Customers such as Duolingo, Samsung, GE, and Cook Pad use ECS to run their most sensitive and mission-critical applications because of its security, reliability, and scalability. ECS is a great choice to run containers for several reasons. First, you can choose to run your ECS clusters using AWS Fargate, which is serverless compute for containers. Fargate removes the need to provision and manage servers, lets you specify and pay for resources per application, and improves security through application isolation by design. Second, ECS is used extensively within Amazon to power services such as Amazon SageMaker, AWS Batch, Amazon Lex, and Amazon.com’s recommendation engine, ensuring ECS is tested extensively for security, reliability, and availability.
-
14
GitGuardian
GitGuardian
GitGuardian is an end-to-end NHI security platform that empowers software-driven organizations to enhance their Non-Human Identity (NHI) security and comply with industry standards. With attackers increasingly targeting NHIs, such as service accounts and applications, GitGuardian integrates Secrets Security and NHI Governance. This dual approach enables the detection of compromised secrets across your dev environments while also managing non human identities and their secrets lifecycle. The platform supports over 450+ types of secrets, offers public monitoring for leaked data, and deploys honeytokens for added defense. Trusted by over 600,000 developers, GitGuardian is the choice of leading organizations like Snowflake, ING, BASF and Bouygues Telecom for robust secrets protection.Starting Price: $0 -
15
BlueJeans
Verizon
Empower Your Remote Workforce with Secure Video Conferencing. The secure video conferencing platform that makes you more productive. BlueJeans Meetings transforms your video conferencing experience by integrating the industry’s highest-fidelity audio and video performance with incredible productivity features and a comprehensive security toolkit to provide you with a distinct competitive advantage every time you join a meeting. Make any conference room or huddle space a one-touch meeting place that’s easy to deploy, simple to use and centrally managed. BlueJeans is on a mission to transform traditional meeting rooms into modern workplaces. We have a portfolio of room solutions to meet your needs today and in the future. Host and manage live interactive events, town halls and webcasts for large audiences around the world. BlueJeans Events brings a whole new level of interactivity to all-hands meetings, town halls and webcasts. Engage up to 50,000 attendees. -
16
Microsoft Excel
Microsoft
Excel learns your patterns, organizing your data to save you time. Easily create spreadsheets from templates or on your own and use modern formulas to perform calculations. New charts and graphs help you present your data in compelling ways, with formatting, sparklines, and tables to better understand your data. Easily create forecasts to predict trends with just a click. Share your workbook with others and always work on the latest version for real-time collaboration to help get work done faster. With Office 365, work within an Excel file from the mobile or desktop app, and the web. You now can add data to Excel directly from a photo. Using the Excel app, just take a picture of a printed data table on your Android or iPhone device and automatically convert the picture into a fully editable table in Excel. This new image recognition functionality eliminates the need to manually enter hardcopy data.Starting Price: $8.25 per user per month -
17
Zoom Team Chat
Zoom Communications
Connect your teams and streamline communications. Included with your Zoom license is Zoom Team Chat. Helping your teams stay connected. Streamline your teams with chat and video meetings. Make collaboration easier between teams and external participants with enterprise chat and instant video meetings. Power modern and efficient team communication. Create a virtual workspace where all the right people for every project are ready to collaborate. Organize your communications chaos. Save time by quickly finding messages, content, and links related to your conversations and projects. Start a meeting with any 1:1 or group channel. Zoom meetings scale up to 1,000 people with clear video, audio and screen sharing. Communicate in public or private channels organized by projects, teams, or topics. Share files, emojis, screenshots, and more. Quickly find contacts, messages, and files, keeping knowledge and information at your fingertips. Calendar integrations sync status and presence. -
18
Tableau
Salesforce
Tableau, now enhanced with AI-powered capabilities and integrated with Salesforce, is an advanced analytics platform that helps businesses turn data into actionable insights. With Tableau Next, users can unlock the full potential of their data by accessing trusted AI-driven analytics. Whether deployed in the cloud, on-premises, or natively within Salesforce CRM, Tableau enables seamless data integration, powerful visualizations, and collaboration. The platform is designed to support organizations of all sizes in making data-driven decisions, while fostering a Data Culture through easy-to-use, intuitive tools for analysts, business leaders, IT leaders, and developers alike.Starting Price: $75/user/month -
19
Okta
Okta
One platform, infinite ways to connect to your employees and customers. Build auth into any app. Create secure, delightful experiences quickly by offloading customer identity management to Okta. Get security, scalability, reliability, and flexibility by combining Okta’s Customer Identity products to build the stack you need. Protect and enable your employees, contractors, and partners. Secure your employees—wherever they are—with Okta’s workforce identity solutions. Get the tools to secure and automate cloud journeys, with full support for hybrid environments along the way. Companies around the world trust Okta with their workforce identity. -
20
Druva
Druva
Druva Data Security Cloud is a leading SaaS-first platform that delivers comprehensive data protection and rapid recovery across cloud, hybrid, and endpoint environments. It offers zero-trust security, AI-powered threat detection, and automated ransomware recovery to safeguard critical business data. Designed for modern enterprises, Druva enables scalable, cost-efficient backup and compliance with industry standards such as SOC2, HIPAA, and FedRAMP—all managed from a single secure cloud platform.Starting Price: $4 per user per month -
21
Securden Password Vault
Securden
Store, manage, and share passwords, files, SSH keys, and DevOps secrets among IT teams. Enforce password security best practices. Ensure compliance with industry standards using comprehensive audit trails. • Centralized repository for passwords, SSH keys, DevOps secrets, and sensitive files. • Enforce password security best practices like periodic password resets. • Generate and assign unique & strong passwords to IT assets. • Share resources with IT teams and collaborate seamlessly • Eliminate hard-coded credentials with API-based application password management. • Control ‘Who’ has access to ‘What’ with granular controls. • One-click remote access to IT assets through native apps & web-based sessions. • Track all privileged activities with comprehensive Audit trails. • Demonstrate compliance with industry standards using customized reports on privileged access. • Check for breached passwords through dark web monitoring. • Auto-fill credentials on websites. -
22
IPQualityScore
IPQualityScore
IPQualityScore's suite of fraud prevention tools automate quality control to prevent bots, fake accounts, fraudsters, chargebacks, & malicious users without interrupting the user experience. Detect bad actors and block cyber threats with industry leading IP reputation data and user validation. Proactively Prevent Fraud™ for less headaches and smoother operations.Starting Price: $49.99 per month -
23
Code42
Code42
Welcome to data security for the collaborative and remote enterprise. Validate proper use of sanctioned collaboration tools, such as Slack and OneDrive. Uncover Shadow IT applications that may indicate gaps in corporate tools or training. Gain visibility into off-network file activity, such as web uploads and cloud sync apps. Quickly detect, investigate and respond to data exfiltration by remote employees. Receive activity alerts based on file type, size or count. Access detailed user activity profiles to speed investigation and response. -
24
DomainTools
DomainTools
Connect indicators from your network with nearly every active domain and IP address on the Internet. Learn how this data can inform risk assessments, help profile attackers, guide online fraud investigations, and map cyber activity to attacker infrastructure. Gain insight that is necessary to make the right decision about the risk level of threats to your organization. DomainTools Iris is a proprietary threat intelligence and investigation platform that combines enterprise-grade domain and DNS-based intelligence with an intuitive web interface. -
25
Bugsnag
Bugsnag
Bugsnag monitors application stability so you can make data-driven decisions on whether you should be building new features, or fixing bugs. We are a full stack stability monitoring solution with best-in-class functionality for mobile applications. Rich, end-to-end diagnostics to help you reproduce every error. A simple and thoughtful user experience for all your apps in one dashboard. The definitive metric for app health — the common language for product and engineering teams. Not all bugs are worth fixing. Focus on the ones that matter to your business. Extensible libraries with opinionated defaults and countless customization options. Subject matter experts who care deeply about error reduction and the health of your apps.Starting Price: $59 per month -
26
ControlMap
ControlMap
Is cybersecurity compliance taking too much time and becoming an ever-growing challenge to manage? Do you need a cybersecurity audit done to win a deal? If yes, then you are at the right place. Controlmap helps companies of all sizes easily and quickly achieve SOC 2, ISO-27001, NIST, CSA STAR, or other Infosec certifications. ControlMap's cybersecurity compliance platform cuts manual grunt work by up to 80% by automating evidence collection, eliminating spreadsheets, and making manual follow-ups obsolete. With Risks, Controls, Policies, and Evidence continuously connected to the right people in your company in a single platform, you know you can sleep well. ControlMap continuously does the heavy lifting of compliance work for you, freeing you to do what your business needs. It follows up on scheduled tasks, automatically collects Evidence from the cloud, reminds employees to fulfill their compliance duties such as reading and acknowledging policies. To learn more, contact us.Starting Price: $0 -
27
CPTRAX for Windows
Visual Click Software
Server File Activity Tracking - Audit who is creating, accessing, moving, and deleting your files and folders. Track file permission changes. Real-time alerts about critical file activities. Malicious activity containment (Ransomware, mass file deletes, etc.) Workstation File Activity Tracking - Audit who is copying files to USB or other removable drives. Track who is uploading files from a browser or via FTP. Block files from being created on USB/removable device. Email alerts when a removable device is connected. Active Directory Auditing - Keep audit logs and get real-time alerts of important Active Directory changes without dealing with SACLs or Windows Event Logs. Server Authentication Auditing - Track authentications into Windows Servers and Citrix sessions. Review all failed logon attempts. Workstation Logon/Logoff Tracking - Get visibility on workstation logons/logoffs, including locks, unlocks and password changes. Review all failed logon attempts. -
28
Netreo
Netreo
Netreo is the most comprehensive full stack IT infrastructure management and observability platform. We provide a single source of truth for proactive performance and availability monitoring for large enterprise networks, infrastructure, applications and business services. Our solution is used by: - IT Executives to have full visibility from the business service right down into the infrastructure and network that supports it. - IT Engineering departments as a decision support system for capacity planning, and architecting modern solutions. - IT Operations teams for real time visibility into what is failing in their environment, what bottlenecks exist and who it is affecting. We provide all of these insights for systems and vendor mixes in large heterogeneous and constantly evolving environments. We have an extensive and growing list of supported vendors (over 350 integrations) including network vendors, servers, storage, virtualization, cloud platforms and others.Starting Price: $5/resource/mo -
29
Squadcast
Squadcast
Squadcast is an incident management tool that’s purpose-built for SRE. Create a blameless culture by reducing the need for physical war rooms, centralize SLO dashboards, unify internal and external SLIs and automate incident resolution and knowledge base creation with Squadcast Actions. Adopt world-class site reliability practices with a centralized SLO dashboard to view your system health. Anticipate incidents before they occur and respond proactively. The first step towards doing better incident management is adding enough context to incidents while they get detected. With Squadcast, discover everything you need, to take action and achieve best-in-class MTTD with highly configurable features like alert deduplication and tagging.Starting Price: Free -
30
IP2Location
IP2Location
IP2Location is a leading IP geolocation service provider since 2002. You can use IP2Location to identify country, region, city, latitude & longitude, ZIP code, time zone, connection speed, ISP, domain name, IDD country code, area code, weather station data, mobile network codes (MNC), mobile country codes (MCC), mobile carrier, elevation, usage type, address type, advertising category, VPN and residential proxies using IP address. It has been used by thousands of developers to enrich their applications and web sites. It is available as database, API and bulk services. Please visit our web site for more information.Starting Price: $99/year -
31
Silent Push
Silent Push
Silent Push reveals adversary infrastructure, campaigns, and security problems by searching across the most timely, accurate and complete Threat Intelligence dataset available. Defenders can focus on stopping threats before they cause a problem and significantly improve their security operations across the entire attack chain whilst simultaneously reducing operational complexity. The Silent Push platform exposes Indicators of Future Attack (IOFA) by applying unique behavioral fingerprints to attacker activity and searching our dataset. Security teams can identify new impending attacks, rather than relying upon out-of-date IOCs delivered by legacy threat intelligence. Our solutions include: Proactive Threat Hunting - Identify and track malicious infrastructure before it’s weaponized. Brand & Impersonation - Protect your brand from phishing, malvertisement, and spoofing attacks. IOFA Early Detection Feeds - Monitor global threat activity with proactive intelligence.Starting Price: $100/month -
32
n8n
n8n
Build complex automations 10x faster, without fighting APIs. Your days spent slogging through a spaghetti of scripts are over. Use JavaScript when you need flexibility and UI for everything else. n8n allows you to build flexible workflows focused on deep data integration. And with sharable templates and a user-friendly UI, the less technical people on your team can collaborate on them too. Unlike other tools, complexity is not a limitation. So you can build whatever you want — without stressing over budget. Connect APIs with no code to automate basic tasks. Or write vanilla Javascript when you need to manipulate complex data. You can implement multiple triggers. Branch and merge your workflows. And even pause flows to wait for external events. Interface easily with any API or service with custom HTTP requests. Avoid breaking live workflows by separating dev and prod environments with unique sets of auth data.Starting Price: $20 per month -
33
threatYeti by alphaMountain
alphaMountain AI
threatYeti by alphaMountain, turns security professionals and hobbyists alike into a senior IP threat intelligence analysts with a browser-based platform that renders real-time threat verdicts for any domain, URL, or IP on the internet. With threatYeti, the risk posed by a domain is rendered instantly with a color-coded rating from 1.00 (low risk) to 10.00 (high risk). threatYeti also protects cyber threat analysts and their networks from risky sites. threatYeti’s no-click categorization presents sites into at least one out of 89 categories so that analysts don’t have to visit them and risk encountering objectionable material or downloading malware. threatYeti also displays related hosts, threat factors, passive DNS, certificates, redirect chains and more, giving analysts the full picture of any host. The result is faster, safer investigations that enable organizations to take conclusive action on domain and IP threats.Starting Price: $0 -
34
OneLogin
OneLogin
Secure critical company information and empower employees with OneLogin, a trusted identity and access management (IAM) solution for the modern enterprise. Designed to strengthen enterprise security while simplifying business logins, OneLogin is an excellent solution for companies looking to enforce security policies with ease. OneLogin includes top-rated features such as single sign-on (SS), unified directory, user provisioning, adaptive authentication, mobile identitiy, compliance reporting, and more. -
35
Cequence Security
Cequence Security
Start analyzing and protecting your APIs with passive, inline or API-based integration with any existing network component – API gateway, proxy, CDN or ingress controller. Predefined policies, fine-tuned using threat patterns observed in protecting billions of API transactions per day delivers unmatched, out-of-the-box protection. A rich user interface and an open, API-based architecture enables integration with threat intelligence feeds, CI/CD framework tools, other security components, and SIEM/SOAR/XDR solutions. Patented ML-based analysis eliminates JavaScript and SDK integration pen-alties such as extended development cycles, slow page loads and forced mobile-app upgrades. ML-based analysis generates a unique Behavioral Fingerprint to determine malicious intent and continually tracks attackers as they retool. -
36
Portnox Security
Portnox Security
Portnox CLEAR is the only cloud-native network access control (NAC) solution that unifies essential network and endpoint security capabilities: device discovery, network authentication, access control, network hardware administration, risk mitigation and compliance enforcement. As a cloud service, Portnox CLEAR eliminates the need for on-going maintenance such as upgrades and patches and requires no on-site appliances. As such, the platform can be easily deployed, scaled and managed by lean, resource-constrained IT teams across any corporate network - no matter how complex. -
37
Varonis Data Security Platform
Varonis
The most powerful way to find, monitor, and protect sensitive data at scale. Rapidly reduce risk, detect abnormal behavior, and prove compliance with the all-in-one data security platform that won’t slow you down. A platform, a team, and a plan that give you every possible advantage. Classification, access governance and behavioral analytics combine to lock down data, stop threats, and take the pain out of compliance. We bring you a proven methodology to monitor, protect, and manage your data informed by thousands of successful rollouts. Hundreds of elite security pros build advanced threat models, update policies, and assist with incidents, freeing you to focus on other priorities. -
38
CYREBRO
CYREBRO
CYREBRO is a Managed Detection and Response (MDR) solution providing the core foundation and capabilities of a Security Operations Center delivered through its cloud-based, interactive SOC Platform. CYREBRO rapidly detects, analyzes, investigates and responds to cyber threats. CYREBRO MDR is a true 24/7/365 ML-backed solution that includes a proprietary detection engine for log ingestion, detection and orchestration, a SOAR for correlations, automations and investigations, SOC Platform for real-time investigation data and visibility, and top tier analyst and DFIR teams. Backed with 1,500+ proprietary detection algorithms that are constantly optimized, CYREBRO monitors companies facing different types of risks and attacks, shortening mean time to detect (MTTD). CYREBRO is vendor-neutral and easily connects to hundreds of different tools and systems, delivering TTV within mere hours. -
39
Cloud Foundry
Cloud Foundry
Cloud Foundry makes it faster and easier to build, test, deploy and scale applications, providing a choice of clouds, developer frameworks, and application services. It is an open source project and is available through a variety of private cloud distributions and public cloud instances. Cloud Foundry has a container-based architecture that runs apps in any programming language. Deploy apps to CF using your existing tools and with zero modification to the code. Instantiate, deploy, and manage high-availability Kubernetes clusters with CF BOSH on any cloud. By decoupling applications from infrastructure, you can make individual decisions about where to host workloads – on premise, in public clouds, or in managed infrastructures – and move those workloads as necessary in minutes, with no changes to the app. -
40
AppsWatch by Automai
Automai Corporation
AppsWatch continuously monitors your key business processes running on any applications without having to install any plug-in or other components. Automai's robots access the apps from the GUI and report any issues before users are affected. No coding is necessary to create the scripts that the bots use: just click through and record the process. AppsWatch offers organized views for SLA reports, troubleshooting, alerting controls, and graphs. AppsWatch is part of Automai's Robotic Automation Platform to integrate monitoring, testing and RPA for businesses.Starting Price: $2000.00/one-time -
41
AppLoader by Automai
Automai Corporation
AppLoader, a software quality assurance and load testing solution, enables users to test processes across all types of applications: fat client, thin client, or web application. AppLoader assists users to create simple scenarios and begin testing their applications right away. AppLoader uses Automai's signature robotic technology to emulate up to thousands of end users for performance testing. Error screenshots are provided for troubleshooting and communication between teams.Starting Price: $2500.00/one-time -
42
Artica Proxy
Artica Tech
Artica project began in 2004 and stemmed from ideas about how to improve the Open Source security solutions available at the time, which were difficult and often expensive to implement and maintain. Artica provides a Powerful user-friendly Web interface and it’s designed to allow every IT administrator, with or without Linux knowledges, to install and maintain network service, like Proxy service, Reverse-Proxy service, DNS service, DNS Filter service, Firewall service, IDS service, SMTP service and more. Today, with around 110.000 servers installed worldwide, Artica solutions are used from small to large enterprises and in Public Government ServicesStarting Price: €100 -
43
Teramind
Teramind
Teramind provides a user-centric security approach to monitoring your employees’ digital behavior. Our software streamlines employee data collection in order to identify suspicious activity, improve employee productivity, detect possible threats, monitor employee efficiency, and ensure industry compliance. We help reduce security incidents using highly customizable Smart Rules that can alert, block or lockout users when rule violations are detected, to keep your business running securely and efficiently. Our live & recorded screen monitoring lets you see user actions as they’re happening or after they’ve occurred with video-quality session recordings that can be used to review a security or compliance event, or to analyze productivity behaviors. Teramind can be installed in minutes and can be deployed either without employees knowing or with full transparency and employee control to maintain trust.Starting Price: $12/month/user -
44
Dotcom-Monitor
Dotcom-Monitor
Website monitoring and performance testing solutions. Combined with powerful monitoring features such as real-time dashboards and performance reporting options, and nearly 30 global monitoring network locations, you can quickly identify where performance issues are occurring. Quickly and easily record custom scripts to monitor interactive websites and web application elements and user scenarios with the EveryStep Web Recorder. Dotcom-Monitor makes it easy to ensure performance, functionality, and uptime of the most complex websites, web applications, and web services.Starting Price: $19.99/month -
45
EmailSuccess
DIENNEA SRL
EmailSuccess is an enterprise-level SMTP Server for high volume email sending. EmailSuccess is an MTA (Mail Transfer Agent) solution for senders of any size: ESPs and Marketing Automation Companies. High Performance EmailSuccess is an MTA designed to deliver high email volumes, giving the business full control over Speed, Latency, Reliability and Deliverability parameters. Deliverability Deliverability is key for the clients to reach their target easily. Ensure that the email has the best chance of avoiding spam filters and landing in the inbox. Advanced Sending Intelligence Optimized delivery by tuning email delivery parameters automatically and in real-time; making platform tuning ever so easy.Starting Price: $0 - $4000 -
46
Detectify
Detectify
Detectify sets the standard for External Attack Surface Management (EASM), providing 99.7% accurate vulnerability assessments. ProdSec and AppSec teams trust Detectify to expose exactly how attackers will exploit their Internet-facing applications. The Detectify platform automates continuous real-world, payload-based attacks crowdsourced through its global community of elite ethical hackers, exposing critical weaknesses before it’s too late. Detectify is available on the global market, except US-sanctioned countries. It is tech-agnostic, which means you can deploy the scanning engines as long as you are hosted in the cloud. Currently, Detectify is trusted by 1500+ security-conscious companies including popular app-makers King, Trello, Grammarly. No matter how much security knowledge you have, Detectify helps you stay on top of security and build safer web applications.Starting Price: $89 per month -
47
IRI DarkShield
IRI, The CoSort Company
IRI DarkShield is a powerful data masking tool that can (simultaneously) find and anonymize Personally Identifiable Information (PII) "hidden" in semi-structured and unstructured files and database columns / collections. DarkShield jobs are configured, logged, and run from IRI Workbench or a restful RPC (web services) API to encrypt, redact, blur, etc., the PII it finds in: * NoSQL & RDBs * PDFs * Parquet * JSON, XML & CSV * Excel & Word * BMP, DICOM, GIF, JPG & TIFF DarkShield is one of 3 data masking products in the IRI Data Protector Suite, and comes with IRI Voracity data management platform subscriptions. DarkShield bridges the gap between structured and unstructured data masking, allowing users to secure data in a consistent manner across disparate silos and formats by using the same masking functions as FieldShield and CellShield EE. DarkShield also handles data in RDBs and flat-files, too, but there are more capabilities that FieldShield offers for those sources.Starting Price: $5000 -
48
IRI RowGen
IRI, The CoSort Company
Stop relying on confidential production data. Masked data may not be realistic or robust enough either. IRI RowGen uses your metadata and business rules to make better test data. Persistent or virtual test sets improve DB/ETL prototypes and speed DevOps. Use the high quality, high volume database, file, report or DataVault targets you create and populate with RowGen's graphical job wizards in in the IRI Workbench IDE (built on Eclipse) to stress-test and future-proof new software and systems. RowGen lets you customize data formats, volumes, ranges, distributions, and other properties on the fly or with re-usable rules that support major goals like application testing and subsetting. RowGen uses the IRI CoSort engine to deliver the fastest generation, transformation, and bulk-load movement of big test data on the market. You can also leverage RowGen functionality in CI/CD pipelines like GitLab, cloned DBs via Windocks et al, and purpose-built TDM hubs from Cigniti or ValueLabs.Starting Price: $8000 on first hostname -
49
Reflectiz
Reflectiz
Reflectiz solution monitors and detects all 1st, 3rd, and 4th-party app vulnerabilities in your online ecosystem, enabling complete visibility over your threat surface. It then effectively prioritizes and remediates risks and compliance issues. The Reflectiz solution is executed remotely with no installation required Our proactive approach solution offers comprehensive scoping, complete inventory, security posture validation, supply chain analysis, security baseline, and more. Unlike antivirus-approach solutions that focus on merely fixing vulnerabilities, Reflectiz proactive approach continuously prevents security threats and privacy risks to provide a watertight security for today’s complex web environment.Starting Price: $5000/year -
50
Omega Core Audit
DATAPLUS
Your Oracle database is usually the company’s most valuable informational assets, containing data on customers, partners, transactions, financial and much more. With the advent of the information age, millions of such records are now owned by even medium and relatively small companies. Database security has become one of the top concerning priorities of the companies that need to comply with more internal and external regulatory compliance practices and standards, that require stronger information security controls. Omega Core Audit is an out-of-box, software-only security and compliance solution that addresses the above compliance issues by providing Access Control, Continuous Audit Monitoring and Real-Time Protection, thus enforcing duty separation, control of privileged accounts and meeting compliance requirements. With built-in support for Splunk SIEM and GrayLog SIEM.Starting Price: $1499 USD