List of Splunk Enterprise Integrations

This is a list of platforms and tools that integrate with Splunk Enterprise. This list is updated as of April 2026.

  • 1
    Cyware Reviews & Ratings

    Cyware

    Cyware

    Empowering organizations with automated, proactive cyber defense solutions.
    Cyware distinguishes itself as the only company offering Virtual Cyber Fusion Centers that empower organizations globally with extensive automation for threat intelligence, sharing, and unmatched response capabilities. The firm delivers a comprehensive array of innovative cyber fusion solutions that facilitate the integration of diverse sources of strategic, tactical, technical, and operational threat intelligence, along with automated threat response mechanisms. With an emphasis on promoting secure collaboration, improving cyber resilience, and increasing threat visibility, Cyware’s Enterprise Solutions equip organizations with automated, context-rich threat analyses that enable proactive responses while preserving vital human insight. By harnessing the power of Machine Learning, Artificial Intelligence, and Security Automation & Orchestration technologies, Cyware is pushing the boundaries of existing security frameworks, allowing businesses to adeptly maneuver through the constantly evolving realm of cyber threats. Consequently, organizations are well-positioned to anticipate and mitigate potential risks, ensuring they uphold a strong and effective defense system against emerging threats. This innovative approach not only enhances security measures but also fosters a culture of vigilance and preparedness within the enterprise.
  • 2
    Darkfeed Reviews & Ratings

    Darkfeed

    Cybersixgill

    Elevate your defenses with cutting-edge, real-time threat intelligence.
    Boost your cybersecurity capabilities, refine your security framework, and enhance your analysts' performance with an elite underground threat intelligence solution. Darkfeed provides an ongoing flow of malicious indicators of compromise, including domains, URLs, hashes, and IP addresses. This service is powered by Cybersixgill's vast collection of intelligence from both the deep and dark web, offering users exclusive and forward-thinking alerts about emerging cyber threats. The fully automated system guarantees that indicators of compromise are extracted and communicated in real-time, enabling organizations to quickly pinpoint and eliminate potential risks. Additionally, Darkfeed is crafted to be actionable, allowing users to receive prompt updates and block threats that could undermine their security efforts. Notably, it features the most comprehensive IOC enrichment solution on the market, which enhances context and vital insights when interfacing with SIEM, SOAR, TIP, or VM platforms. This enrichment capability equips users to bolster their incident prevention and response strategies, ensuring they stay ahead in the constantly shifting domain of cyber threats. By utilizing Darkfeed, organizations can significantly fortify their defenses against a range of cyber dangers, ultimately fostering a more secure environment for their operations and data. Enhanced vigilance through such a solution is essential for maintaining a robust security posture.
  • 3
    Cofense Triage Reviews & Ratings

    Cofense Triage

    Cofense

    Speed up phishing response with expert insights and collaboration.
    Cofense Triage™ accelerates the identification and management of phishing emails, ensuring a quick and effective response. By utilizing integration and automation, response times can be drastically minimized. With the application of Cofense Intelligence™ rules and a leading spam engine, threats are detected and evaluated with remarkable accuracy. Our robust read/write API allows for a smooth integration of intelligent phishing defenses into your current workflow, enabling your team to focus on protecting your organization. Understanding the complexities of phishing prevention, Cofense Triage™ offers instant access to expert help with a mere click, available at any time of day. Our dedicated Threat Intelligence and Research Teams are committed to continually broadening our array of YARA rules, which aids in discovering new phishing campaigns and improving your response capabilities. Additionally, the Cofense Triage Community Exchange lets users collaboratively dissect phishing emails and compile threat intelligence, providing invaluable support in your fight against these dangers. This cooperative strategy not only fortifies your defenses but also cultivates a rich community of shared insights and experiences, enhancing collective knowledge in the ongoing battle against phishing threats. By working together, organizations can create a more resilient front against cyber threats.
  • 4
    Cased Reviews & Ratings

    Cased

    Cased

    Boost security and productivity with effortless workflow management.
    Discover a developer-focused method for managing production environments that boosts security while maintaining high productivity levels. You can effortlessly set up approval workflows for critical actions, maintain comprehensive activity logs, and link identity providers to command line interfaces, ensuring that your team stays engaged and operates efficiently. Compatible with any command line tool, Cased integrates smoothly into your existing workflows, from MySQL to custom deployment scripts, all without causing interruptions. The setup process is incredibly quick, leveraging our lightweight, agentless solution that preserves the integrity of your CLI commands. Enjoy the simplicity of tailored just-in-time approvals for both developer and operational tools, with versatile options for approving requests through platforms like Slack, Microsoft Teams, and SMS, fitting seamlessly into your current toolkit. Cased is also mindful of your on-call schedule, enabling automatic approvals that streamline on-call rotations. Gaining visibility into actions starts with identity, allowing you to manage access to production environments through your identity provider, ensuring you know who is executing each action. Designed to cater to your specific requirements, Cased enables you to carry your dotfiles across all servers, significantly improving your development experience. Furthermore, with Cased, you not only achieve strong security protocols but also empower your team to work both efficiently and effectively, fostering a collaborative environment. This blend of security and productivity is essential for modern development teams striving for excellence.
  • 5
    Cynerio Reviews & Ratings

    Cynerio

    Cynerio

    Empowering healthcare with proactive IoT security and resilience.
    We address a wide array of threats by implementing automated security measures and risk management strategies for all types of Healthcare IoT devices, ranging from medical and IoMT devices to Enterprise IoT and OT systems. This comprehensive approach guarantees the protection of patient safety, the confidentiality of data, and the uninterrupted operation of healthcare facilities. Cynerio advocates for a proactive and preventive stance on cybersecurity, utilizing automated tools that facilitate risk reduction, threat mitigation, and attack prevention. Additionally, we provide detailed remediation strategies grounded in a zero trust framework, which integrates clinical context to swiftly enhance hospital security. The vulnerability of hospital networks to Healthcare IoT devices cannot be overstated, as insecure devices significantly broaden the cyber attack surface and threaten both patient safety and the seamless functioning of healthcare operations. By addressing these concerns, we help healthcare organizations maintain a robust security posture.
  • 6
    HCL IntelliOps Event Management Reviews & Ratings

    HCL IntelliOps Event Management

    HCLSoftware

    Transform IT operations with AI-driven, real-time event management.
    HCL IntelliOps Event Management is a vital component of the Intelligent Full Stack Observability within the HCLSoftware Intelligent Operation ecosystem. This advanced AI-driven IT Event Management solution equips organizations with state-of-the-art features, including real-time topology-based alert correlation, machine learning-driven alert correlation, and effective noise reduction. Additionally, the product smoothly integrates with existing monitoring tools and IT service management software, facilitating prompt and effective issue resolution while enhancing overall operational efficiency.
  • 7
    Metric Insights Reviews & Ratings

    Metric Insights

    Metric Insights

    Streamline data access, empower decisions, and enhance efficiency.
    Engage users effectively by integrating all your business intelligence tools and datasets into a singular, intuitive BI portal that offers seamless search functionality. Make certain that relevant information is delivered to the right individuals at the ideal time and on their chosen devices. Implement automatic detection of anomalies within your data to ensure that key stakeholders receive timely notifications about important changes, preventing any vital details from slipping through the cracks. Effortlessly access insights from your data across multiple applications and devices. Metric Insights enables leading organizations to equip their business users with timely, relevant, and actionable data, which enhances the decision-making process. By optimizing the flow of information, organizations can significantly improve their operational efficiency and adaptability. Such enhancements not only promote a proactive approach to data management but also empower teams to respond swiftly to emerging trends and challenges.
  • 8
    ThreatConnect Threat Intelligence Platform Reviews & Ratings

    ThreatConnect Threat Intelligence Platform

    ThreatConnect

    Streamline threat intelligence, enhance security, and mitigate risks.
    The ThreatConnect Threat Intelligence Platform (TIP) acts as a central repository for the aggregation and oversight of threat-related data. This platform empowers users to harmonize information gathered from various sources, augment it with additional context, and automate manual security workflows tied to threat intelligence, thereby improving efficiency. Moreover, ThreatConnect TIP includes a robust workbench designed to categorize and prioritize threat information, which can subsequently guide and inform the actions taken by a security team, ultimately boosting operational effectiveness. Utilizing this platform allows organizations to enhance their responses to emerging threats while strengthening their overall security framework. In doing so, they can proactively mitigate risks and better safeguard their assets.