List of Sandfly Security Integrations

This is a list of platforms and tools that integrate with Sandfly Security. This list is updated as of May 2026.

  • 1
    Leader badge
    Google Cloud Platform Reviews & Ratings

    Google Cloud Platform

    Google

    Empower your business with scalable, secure cloud solutions.
    More Information
    Company Website
    Company Website
    Google Cloud serves as an online platform where users can develop anything from basic websites to intricate business applications, catering to organizations of all sizes. New users are welcomed with a generous offer of $300 in credits, enabling them to experiment, deploy, and manage their workloads effectively, while also gaining access to over 25 products at no cost. Leveraging Google's foundational data analytics and machine learning capabilities, this service is accessible to all types of enterprises and emphasizes security and comprehensive features. By harnessing big data, businesses can enhance their products and accelerate their decision-making processes. The platform supports a seamless transition from initial prototypes to fully operational products, even scaling to accommodate global demands without concerns about reliability, capacity, or performance issues. With virtual machines that boast a strong performance-to-cost ratio and a fully-managed application development environment, users can also take advantage of high-performance, scalable, and resilient storage and database solutions. Furthermore, Google's private fiber network provides cutting-edge software-defined networking options, along with fully managed data warehousing, data exploration tools, and support for Hadoop/Spark as well as messaging services, making it an all-encompassing solution for modern digital needs.
  • 2
    Graylog Reviews & Ratings

    Graylog

    Graylog

    AI-Powered SIEM and Log Management Software for Lean Security & IT Operations Teams
    More Information
    Company Website
    Company Website
    Graylog is the AI-powered SIEM and log management platform built for teams that need clarity, speed, and control. It unifies event data from every corner of the environment so security and IT operations can detect threats sooner, investigate faster, and manage data costs predictably—without compromise. Graylog delivers explainable AI that highlights what matters, accelerates investigations, and guides consistent response—while keeping analysts firmly in control. Its open, extensible architecture integrates easily with the tools organizations already use. With Graylog Security, Enterprise, API Security, and Open, more than 60,000 organizations in 180 countries rely on Graylog to simplify detection, strengthen response, and cut through noise. Headquartered in Houston and rooted in open source, Graylog continues to help modern teams work smarter and stay ahead—on their terms.
  • 3
    Debian Reviews & Ratings

    Debian

    Debian

    Easily install a powerful operating system tailored for you.
    Debian is freely accessible online. This webpage outlines multiple techniques for installing the Stable version of Debian. If you have an interest in the Testing or Unstable versions, don't forget to visit our releases page for more information. Several vendors sell the distribution for a small fee, generally under US$5 plus shipping, so checking their sites for international shipping options is advisable. You can try out Debian by using a live version from a CD, DVD, or USB drive, which enables you to test the system without affecting your existing setup. When you are ready, you can start the installation using the intuitive Calamares Installer, available since Debian 10 Buster. Provided that the images match your size, language, and package requirements, this method could be quite effective. For further insights into this installation option, consider reviewing additional resources that can assist in your decision-making process. Careful consideration of your alternatives is crucial to identify the most suitable installation approach for your specific needs, ensuring that you have a positive experience with the Debian operating system.
  • 4
    Ubuntu Reviews & Ratings

    Ubuntu

    Ubuntu

    Unlock innovation with secure, versatile, and efficient open-source solutions.
    The open-source ecosystem offers enhanced security features, a broader selection of packages, and state-of-the-art tools, covering environments from cloud to edge. To protect your open-source applications, it is vital to maintain thorough patching practices that span from the kernel through libraries and applications, ensuring compliance with CVEs. Both governmental bodies and auditors have confirmed Ubuntu's compliance with essential standards such as FedRAMP, FISMA, and HITECH. Now is the perfect moment to rethink the possibilities that Linux and open-source technologies can provide. Many organizations collaborate with Canonical to lower the expenses tied to open-source operating systems. By automating various processes, including multi-cloud management, bare metal provisioning, edge clusters, and IoT devices, you can achieve greater efficiency. Ubuntu stands out as an ideal platform for diverse professionals, ranging from mobile app developers and engineering managers to video editors and financial analysts handling intricate models. Its adaptability, reliability, ongoing updates, and extensive libraries make it a preferred choice for development teams worldwide. With a strong community backing and a dedication to ongoing innovation, Ubuntu continues to be a top contender in the realm of open-source solutions, making it an attractive option for both new and experienced users. Additionally, its versatility and user-friendly interface facilitate a smooth transition for those new to open-source software.
  • 5
    Docker Reviews & Ratings

    Docker

    Docker

    Streamline development with portable, reliable containerized applications.
    Docker simplifies complex configuration tasks and is employed throughout the entire software development lifecycle, enabling rapid, straightforward, and portable application development on desktop and cloud environments. This comprehensive platform offers various features, including user interfaces, command-line utilities, application programming interfaces, and integrated security, which all work harmoniously to enhance the application delivery process. You can kickstart your programming projects by leveraging Docker images to create unique applications compatible with both Windows and Mac operating systems. With the capabilities of Docker Compose, constructing multi-container applications becomes a breeze. In addition, Docker seamlessly integrates with familiar tools in your development toolkit, such as Visual Studio Code, CircleCI, and GitHub, enhancing your workflow. You can easily package your applications into portable container images, guaranteeing consistent performance across diverse environments, whether on on-premises Kubernetes or cloud services like AWS ECS, Azure ACI, or Google GKE. Furthermore, Docker provides access to a rich repository of trusted assets, including official images and those from verified vendors, ensuring that your application development is both reliable and high-quality. Its adaptability and integration capabilities position Docker as an essential tool for developers striving to boost their productivity and streamline their processes, making it indispensable in modern software development. This ensures that developers can focus more on innovation and less on configuration management.
  • 6
    Leader badge
    Microsoft Azure Reviews & Ratings

    Microsoft Azure

    Microsoft

    Empower your ideas with agile, secure cloud solutions.
    Microsoft Azure is a dynamic cloud computing platform designed to streamline the development, testing, and management of applications with speed and security. By leveraging Azure, you can creatively turn your ideas into effective solutions, taking advantage of more than 100 services that support building, deploying, and managing applications across various environments such as the cloud, on-premises, or at the edge, all while using your preferred tools and frameworks. The ongoing innovations from Microsoft ensure that your current development requirements are met while also setting the stage for your future product goals. With a strong commitment to open-source values and support for all programming languages and frameworks, Azure grants you the flexibility to create and deploy in a manner that best fits your needs. Whether your infrastructure is on-premises, cloud-based, or edge-focused, Azure is equipped to evolve alongside your existing setup. It also provides specialized services for hybrid cloud frameworks, allowing for smooth integration and effective management. Security is a key pillar of Azure, underpinned by a skilled team and proactive compliance strategies that are trusted by a wide range of organizations, including enterprises, governments, and startups. With Azure, you gain a dependable cloud solution, supported by outstanding performance metrics that confirm its reliability. Furthermore, this platform not only addresses your immediate requirements but also prepares you for the future's dynamic challenges while fostering a culture of innovation and growth.
  • 7
    Leader badge
    Amazon Web Services (AWS) Reviews & Ratings

    Amazon Web Services (AWS)

    Amazon

    Empower your innovation journey with unmatched cloud solutions.
    Amazon Web Services (AWS) is a global leader in cloud computing, providing the broadest and deepest set of cloud capabilities on the market. From compute and storage to advanced analytics, AI, and agentic automation, AWS enables organizations to build, scale, and transform their businesses. Enterprises rely on AWS for secure, compliant infrastructure while startups leverage it to launch quickly and innovate without heavy upfront costs. The platform’s extensive service catalog includes solutions for machine learning (Amazon SageMaker), serverless computing (AWS Lambda), global content delivery (Amazon CloudFront), and managed databases (Amazon DynamoDB). With the launch of Amazon Q Developer and AWS Transform, AWS is also pioneering the next wave of agentic AI and modernization technologies. Its infrastructure spans 120 availability zones in 38 regions, with expansion plans into Saudi Arabia, Chile, and Europe’s Sovereign Cloud, guaranteeing unmatched global reach. Customers benefit from real-time scalability, security trusted by the world’s largest enterprises, and automation that streamlines complex operations. AWS is also home to the largest global partner network, marketplace, and developer community, making adoption easier and more collaborative. Training, certifications, and digital courses further support workforce upskilling in cloud and AI. Backed by years of operational expertise and constant innovation, AWS continues to redefine how the world builds and runs technology in the cloud era.
  • 8
    Arch Linux Reviews & Ratings

    Arch Linux

    Arch Linux

    Empower your computing experience with simplicity and control.
    Arch Linux is a community-oriented, x86-64 general-purpose GNU/Linux distribution that seeks to provide the latest stable software versions via a continuous rolling-release model. The default base system is purposefully minimalistic, enabling users to tailor their installations by selecting only the components they require. Emphasizing simplicity, Arch Linux refrains from unnecessary enhancements or modifications to its software offerings. It delivers applications in their original form as supplied by their developers, with minimal changes made specifically for the distribution. Any modifications are generally limited to essential backported bug fixes and do not include those not sanctioned by upstream sources. Configuration files are maintained as provided by upstream, with adjustments made solely for necessary distribution-specific reasons, such as altering system file paths. Importantly, Arch avoids automation features; for instance, it does not automatically activate services merely due to the installation of their respective packages, thus granting users total control over their system configurations. This methodology not only promotes flexibility but also encourages users to construct their systems in a manner that fits their unique requirements, fostering a personalized computing environment. Each decision within Arch Linux's framework reflects a commitment to user autonomy and simplicity.
  • 9
    IBM QRadar EDR Reviews & Ratings

    IBM QRadar EDR

    IBM

    Empower your security with real-time endpoint protection solutions.
    Protect your endpoints from cyber threats by detecting unusual activities in real-time and implementing effective remediation strategies. With tools like IBM® QRadar® and EDR, organizations can address both known and unknown endpoint risks through user-friendly intelligent automation that minimizes the need for human intervention. The inclusion of attack visualization storyboards enables rapid decision-making and efficient automated alert management. An intuitive interface, combined with continuously evolving AI capabilities, empowers security teams to maintain control while ensuring uninterrupted business operations. Given that the average organization oversees thousands of endpoints, which are often the most susceptible targets within any network, the increasing prevalence of automated cyber threats poses a significant challenge. Relying solely on conventional endpoint security methods leaves organizations vulnerable to attackers who exploit zero-day flaws and execute widespread ransomware campaigns. Therefore, adopting advanced security solutions is essential for staying ahead of these evolving threats.
  • 10
    Elasticsearch Reviews & Ratings

    Elasticsearch

    Elastic

    Transform your data into actionable insights with ease.
    Elastic is a prominent search technology firm that has created a suite known as the Elastic Stack, which includes Elasticsearch, Kibana, Beats, and Logstash. These software-as-a-service solutions enable users to leverage data for real-time analytics, security measures, search functionalities, and logging at scale. With a community of over 100,000 members spread across 45 nations, Elastic's products have been downloaded more than 400 million times since their launch. Currently, numerous organizations, including notable names like Cisco, eBay, Dell, Goldman Sachs, Groupon, HP, Microsoft, Netflix, Uber, Verizon, and Yelp, rely on Elastic Stack and Elastic Cloud to enhance their critical systems, driving significant revenue growth and reducing costs. Headquartered in both Amsterdam, The Netherlands, and Mountain View, California, Elastic employs a workforce of more than 1,000 individuals across more than 35 countries, contributing to its global impact in the tech industry. This extensive reach and adoption highlight Elastic's vital role in transforming how enterprises manage and utilize their data.
  • 11
    Akamai Cloud Reviews & Ratings

    Akamai Cloud

    Akamai

    Empowering innovation with fast, reliable, and scalable cloud solutions.
    Akamai Cloud is a globally distributed cloud computing ecosystem built to power the next generation of intelligent, low-latency, and scalable applications. Engineered for developers, enterprises, and AI innovators, it offers a comprehensive portfolio of solutions including Compute, GPU acceleration, Kubernetes orchestration, Managed Databases, and Object Storage. The platform’s NVIDIA GPU-powered instances make it ideal for demanding workloads such as AI inference, deep learning, video rendering, and real-time analytics. With flat pricing, transparent billing, and minimal egress fees, Akamai Cloud helps organizations significantly reduce total cloud costs while maintaining enterprise reliability. Its App Platform and Kubernetes Engine allow seamless deployment of containerized applications across global data centers for consistent performance. Businesses benefit from Akamai’s edge network, which brings computing closer to users, reducing latency and improving resiliency. Security and compliance are embedded at every layer with built-in firewall protection, DNS management, and private networking. The platform integrates effortlessly with open-source and multi-cloud environments, promoting flexibility and future-proofing infrastructure investments. Akamai Cloud also offers developer certifications, a rich documentation hub, and expert technical support, ensuring teams can build, test, and deploy without friction. Backed by decades of Akamai innovation, this platform delivers cloud infrastructure that’s faster, fairer, and built for global growth.
  • 12
    Raspberry Pi OS Reviews & Ratings

    Raspberry Pi OS

    Raspberry Pi Foundation

    Effortlessly install operating systems for your Raspberry Pi!
    Raspberry Pi Imager provides an efficient and user-friendly way to install Raspberry Pi OS and a selection of other operating systems onto a microSD card, preparing it for use with your Raspberry Pi device. To get a clear sense of the installation steps, take a look at our concise video tutorial that lasts just 45 seconds. Start by downloading and installing Raspberry Pi Imager on a computer that has an SD card reader. After that, insert the microSD card that you plan to use for your Raspberry Pi into the reader and open Raspberry Pi Imager. Users have the opportunity to choose from a wide range of operating systems offered by both Raspberry Pi and various external sources, making it easy to download and install them as necessary. This utility simplifies the entire setup process, thereby improving your overall experience with Raspberry Pi. By utilizing Raspberry Pi Imager, even beginners can seamlessly transition into the world of Raspberry Pi without any complications.
  • 13
    Rocky Linux Reviews & Ratings

    Rocky Linux

    Ctrl IQ, Inc.

    Empowering innovation with reliable, scalable software infrastructure solutions.
    CIQ enables individuals to achieve remarkable feats by delivering cutting-edge and reliable software infrastructure solutions tailored for various computing requirements. Their offerings span from foundational operating systems to containers, orchestration, provisioning, computing, and cloud applications, ensuring robust support for every layer of the technology stack. By focusing on stability, scalability, and security, CIQ crafts production environments that benefit both customers and the broader community. Additionally, CIQ proudly serves as the founding support and services partner for Rocky Linux, while also pioneering the development of an advanced federated computing stack. This commitment to innovation continues to drive their mission of empowering technology users worldwide.
  • 14
    Fedora Reviews & Ratings

    Fedora

    Fedora

    Empower your development journey with seamless productivity and collaboration.
    Fedora Workstation is recognized for its reliability, strength, and ease of use, making it an excellent operating system choice for desktops and laptops alike. It caters to a wide array of developers, from enthusiasts and students to professionals in business environments. With the GNOME 3 desktop environment, users can focus on their programming without distractions, fostering an environment conducive to productivity. Designed with developers in mind, GNOME enhances the user experience by streamlining essential tasks. The frustration of locating or assembling the required tools is alleviated by Fedora's comprehensive collection of open-source languages, tools, and utilities, which can be accessed effortlessly with a click or command. Furthermore, Fedora encourages collaboration through platforms and repositories like COPR, allowing developers to share their work and create builds that benefit the wider community. This collaborative aspect not only enhances individual workflows but also promotes the spirit of open-source contribution. Ultimately, Fedora Workstation stands out as a premier choice for developers eager to improve their productivity and make meaningful contributions to the tech ecosystem.
  • 15
    HashiCorp Consul Reviews & Ratings

    HashiCorp Consul

    HashiCorp

    Connect, protect, and monitor your services seamlessly today!
    An extensive multi-cloud service networking solution is engineered to connect and protect services across diverse runtime environments, including both public and private cloud setups. It provides real-time insights into the status and positioning of all services, guaranteeing progressive delivery and implementing zero trust security with minimal added complexity. Users can have confidence that HCP connections are secured automatically, laying a solid groundwork for secure operations. Furthermore, it enables thorough visibility into service health and performance metrics, which can either be visualized within the Consul UI or exported to third-party analytics platforms. As modern applications increasingly embrace decentralized architectures instead of traditional monolithic frameworks, especially in the context of microservices, there is a notable demand for a holistic view of services and their interrelations. Organizations are also on the lookout for better visibility into the performance and health metrics of these services to boost operational effectiveness. This shift in application design highlights the need for reliable tools that support smooth service integration and monitoring, ensuring that as systems evolve, they remain efficient and manageable. This comprehensive approach not only enhances security but also promotes a more adaptable and responsive infrastructure.
  • 16
    Oracle Advanced Security Reviews & Ratings

    Oracle Advanced Security

    Oracle

    Secure your data lifecycle with advanced encryption and redaction.
    Leverage Oracle Advanced Security to encrypt application tablespaces, effectively protecting sensitive information from unauthorized access and breaches. The introduction of redaction policies is instrumental in limiting the dissemination of confidential data, while also ensuring adherence to data protection regulations. Transparent Data Encryption (TDE) serves as a formidable shield against adversaries who may attempt to access sensitive information directly from storage by encrypting data at rest across the database. This encryption can be applied to individual data columns, complete tablespaces, database exports, and backups, offering enhanced control over who can access sensitive information. Additionally, Data Redaction complements TDE by further reducing the likelihood of unauthorized exposure of data within applications, as it conceals sensitive information prior to its exit from the database. The functionality includes options for both partial and full redaction, which effectively inhibits the extensive extraction of sensitive data into reports and spreadsheets. Furthermore, encryption is executed at the database kernel level, eliminating the need for any changes to current applications and thus simplifying the deployment process. Collectively, these security strategies create a comprehensive framework that safeguards sensitive information throughout its entire lifecycle, ensuring that data remains protected against evolving threats. By integrating these measures, organizations can foster greater trust in their data management practices.
  • 17
    Splunk APM Reviews & Ratings

    Splunk APM

    Cisco

    Empower your cloud-native business with AI-driven insights.
    Innovating in the cloud allows for faster development, enhanced user experiences, and ensures that applications remain relevant for the future. Splunk is specifically tailored for cloud-native businesses, offering solutions to present-day challenges. It enables you to identify issues proactively before they escalate into customer complaints. With its AI-driven Directed Troubleshooting, the mean time to resolution (MTTR) is significantly reduced. The platform's flexible, open-source instrumentation prevents vendor lock-in, allowing for greater adaptability. By utilizing AI-driven analytics, you can optimize performance across your entire application landscape. To deliver an exceptional user experience, comprehensive observation of all elements is essential. The NoSample™ feature, which facilitates full-fidelity trace ingestion, empowers you to utilize all trace data and pinpoint any irregularities. Additionally, Directed Troubleshooting streamlines MTTR by rapidly identifying service dependencies, uncovering correlations with the infrastructure, and mapping root-cause errors. You can dissect and analyze any transaction according to various dimensions or metrics, and it becomes straightforward to assess your application's performance across different regions, hosts, or versions. This extensive analytical capability ultimately leads to better-informed decision-making and enhanced operational efficiency.
  • 18
    SUSE Enterprise Storage Reviews & Ratings

    SUSE Enterprise Storage

    SUSE

    Transform your data with flexible, scalable, intelligent storage solutions.
    This technology offers a cohesive, infinitely scalable, and easily manageable storage solution specifically designed for modern data centers, transforming enterprise storage structures into powerful instruments that encourage innovation. SUSE Enterprise Storage emerges as a flexible, reliable, cost-efficient, and intelligent storage system. Constructed on the Ceph architecture, this cloud-native solution is engineered to accommodate a wide range of demanding workloads, from data archiving to high-performance computing (HPC) applications. It supports both x86 and Arm architectures and can be deployed on standard off-the-shelf hardware, allowing organizations to efficiently store and process data, which in turn enhances their competitive edge—optimizing business processes and yielding richer insights into customer behaviors to improve products and services. Additionally, SUSE Enterprise Storage is built to work with Kubernetes and integrates effortlessly with a variety of technologies, including ML/AI, EDGE, IoT, and embedded systems, positioning it as an all-encompassing option for enterprises preparing for the future. This multifaceted adaptability not only ensures that businesses can keep pace with technological innovations but also allows them to respond to their changing storage requirements in real-time, ultimately driving success in a fast-evolving market.
  • 19
    Podman Reviews & Ratings

    Podman

    Containers

    Effortlessly manage containers with seamless Kubernetes integration.
    Podman functions as a container engine that runs without a daemon, specifically designed for the creation, management, and execution of OCI Containers on Linux platforms. It allows users to operate containers in both root and rootless configurations, effectively serving as a substitute for Docker by utilizing the command alias docker=podman. With Podman, users have the capability to manage pods, containers, and container images, while also providing support for Docker Swarm. We recommend adopting Kubernetes as the main standard for generating Pods and orchestrating containers, thereby making Kubernetes YAML the favored format. As a result, Podman enables the creation and management of Pods directly from a Kubernetes YAML file through commands like podman-play-kube. Furthermore, it can produce Kubernetes YAML configurations from existing containers or Pods using podman-generate-kube, which enhances the process from local development to deployment in a production Kubernetes setting. This flexibility and functionality make Podman an invaluable resource for both developers and system administrators, significantly improving the containerization workflow. Its ability to seamlessly integrate with Kubernetes further emphasizes its role as a modern solution in container management.
  • 20
    AWS Hybrid Cloud Reviews & Ratings

    AWS Hybrid Cloud

    Amazon

    Transform your infrastructure with seamless hybrid cloud integration.
    AWS Hybrid Cloud services deliver an integrated experience across multiple environments, whether in the cloud, on-site, or at edge locations. Users can select from a wide variety of services such as computing, networking, storage, security, identity management, data integration, oversight, monitoring, and operations to build hybrid architectures that suit their specific requirements and applications. This adaptability enables the strategic placement of cloud resources and services where they are most critical, facilitating faster digital transformation efforts. You can enhance and manage all applications through AWS, including those that need to stay in designated locations due to data residency, local processing requirements, or latency issues. Consequently, organizations can anticipate improved productivity and reduced expenses. Additionally, by offering developers a consolidated platform for application creation, deployment, and administration, you equip IT teams with uniform hardware, services, and tools for effective infrastructure management across on-premises, cloud, and edge environments, thereby promoting operational efficiency. This approach fosters a more unified and streamlined method for resource management across varied environments, ultimately enhancing overall organizational agility.
  • 21
    CentOS Reviews & Ratings

    CentOS

    CentOS

    Reliable, community-driven Linux for consistent, secure computing experiences.
    CentOS Linux is a community-supported distribution that leverages resources provided publicly through Red Hat and CentOS repositories, specifically designed for Red Hat Enterprise Linux (RHEL). The main objective of CentOS is to preserve functional compatibility with RHEL, while the CentOS Project emphasizes the modification of packages to remove any branding or visual identifiers from the upstream vendor. Available at no charge, CentOS can be freely shared and redistributed by users. Each CentOS version is backed by support until the related RHEL version concludes its general support lifecycle. New CentOS versions are typically released after the rebuilding of new RHEL versions, occurring approximately every 6 to 12 months for minor updates and extending over several years for major releases. The rebuild process can take anywhere from a few weeks for minor updates to several months for significant changes, ensuring timely availability of new features. This structured approach allows users to enjoy a secure, reliable, and easily manageable Linux environment that is consistent and reproducible, ultimately nurturing a robust community around its usage and development. Additionally, the emphasis on community involvement encourages collaboration and innovation among users and developers alike.
  • 22
    CyberArk Conjur Reviews & Ratings

    CyberArk Conjur

    CyberArk

    Securely manage secrets with robust, transparent access control.
    A robust open-source interface designed for secure authentication, management, and auditing of non-human access across multiple tools, applications, containers, and cloud environments is crucial for effective secrets management. These secrets are essential for accessing various applications, critical infrastructure, and other sensitive data. Conjur strengthens this security framework by implementing strict Role-Based Access Control (RBAC) to manage secrets effectively. When an application requests access to a resource, Conjur first verifies the application's identity, followed by an assessment of its authorization based on the defined security policy, before securely delivering the required secret. The architecture of Conjur operates on the principle of treating security policies as code, with these policies documented in .yml files, version-controlled, and uploaded to the Conjur server. This methodology elevates the importance of security policy to that of other elements in source control, promoting greater transparency and collaboration regarding the security practices of the organization. Moreover, the capability to version control security policies not only simplifies updates and reviews but also significantly bolsters the overall security posture of the organization, ensuring that security remains a priority at all levels. In this way, Conjur contributes to a comprehensive approach to managing sensitive information securely and efficiently.
  • Previous
  • You're on page 1
  • Next