What Integrates with Splunk Enterprise?

Find out what Splunk Enterprise integrations exist in 2026. Learn what software and services currently integrate with Splunk Enterprise, and sort them by reviews, cost, features, and more. Below is a list of products that Splunk Enterprise currently integrates with:

  • 1
    Cyware Reviews
    Cyware stands out as the sole provider of Virtual Cyber Fusion Centers that facilitate comprehensive automation of threat intelligence, sharing, and unparalleled response capabilities for organizations around the world. The company presents a complete suite of cutting-edge cyber fusion solutions, enabling the integration of all-source strategic, tactical, technical, and operational threat intelligence sharing alongside automated threat response. Designed with a focus on fostering secure collaboration, enhancing cyber resilience, and boosting threat visibility, Cyware’s Enterprise Solutions provide organizations with automated, context-rich threat analysis that supports proactive responses while retaining essential human judgment. By leveraging advancements in Machine Learning, Artificial Intelligence, and Security Automation & Orchestration technologies, Cyware is redefining the limits of current security frameworks, equipping enterprises to effectively navigate the ever-changing landscape of cyber threats. As a result, organizations can stay ahead of potential risks while maintaining a robust defense system.
  • 2
    Darkfeed Reviews
    Enhance your cybersecurity effectiveness, optimize your security infrastructure, and elevate the performance of your analysts with the premier underground threat intelligence solution at your disposal. Darkfeed serves as a continuous stream of malicious indicators of compromise, encompassing domains, URLs, hashes, and IP addresses. It is powered by Cybersixgill’s extensive repository of deep and dark web intelligence, providing users with unique and cutting-edge alerts regarding emerging cyber threats. The system is fully automated, ensuring that indicators of compromise are extracted and transmitted in real-time, which allows organizations to swiftly identify and neutralize potential threats. Furthermore, Darkfeed is designed to be actionable, enabling users to receive timely updates and block items that could jeopardize their security. In addition, Darkfeed boasts the most thorough IOC enrichment solution currently available, allowing for enhanced context and critical insights when integrating with SIEM, SOAR, TIP, or VM platforms. This enrichment empowers users to improve their incident prevention and response strategies, ensuring they remain proactive in the ever-evolving landscape of cyber threats. Ultimately, leveraging Darkfeed can significantly strengthen your organization's defensive posture against cyber risks.
  • 3
    Cofense Triage Reviews
    Cofense Triage™ enhances the speed at which phishing emails are recognized and dealt with effectively. By leveraging integration and automation, you can significantly reduce your response time. Utilizing Cofense Intelligence™ rules alongside a top-tier spam engine, we automatically detect and assess threats with precision. Our comprehensive read/write API enables you to incorporate intelligent phishing defense seamlessly into your existing workflow, allowing your team to concentrate on safeguarding your organization. We recognize that combating phishing can be complex; therefore, Cofense Triage™ provides immediate access to expert assistance with just a single click, available at any moment. Our Threat Intelligence and Research Teams are dedicated to continuously expanding our collection of YARA rules, facilitating the identification of new campaigns and enhancing your response efficiency. Furthermore, the Cofense Triage Community Exchange empowers you to collaboratively analyze phishing emails and gather threat intelligence, ensuring you're well-supported in your efforts to combat these threats. This collaborative approach not only strengthens your defenses but also fosters a community of shared knowledge and experience.
  • 4
    Cased Reviews
    Experience a developer-centric approach to production environments that enhances security without hindering productivity. Easily implement approval workflows for sensitive actions, keep a detailed log of activities, and connect identity providers to command line interfaces, ensuring your team remains engaged and efficient. Compatible with any command line tool, Cased seamlessly integrates into your existing processes, from MySQL to bespoke deployment scripts, without causing disruptions. Set up takes just moments, thanks to our lightweight, agentless solution that maintains the integrity of your CLI commands. Enjoy straightforward, customizable just-in-time approvals for both developer and staff tools, with options to approve requests via Slack, Microsoft Teams, and SMS, integrating seamlessly into your current toolkit. Cased is aware of your on-call schedule, allowing for automatic approvals that facilitate smooth on-call rotations. Visibility into actions begins with identity, enabling you to provision access to production environments through your identity provider and know exactly who is performing each action. Tailored to meet your needs, Cased lets you carry your dotfiles across all servers, enhancing your development experience. With Cased, you gain the confidence of robust security measures while empowering your team to work efficiently and effectively.
  • 5
    Cynerio Reviews
    We cover all threats with automated security and risk reduction on every Healthcare IoT device, from medical/IoMT devices to Enterprise IoT systems and OT systems. This ensures patient safety, data confidentiality and operational continuity. Cynerio promotes proactive and preventive cybersecurity through automated risk reduction, threat mitigation and attack prevention tools. We also offer step-by-step remediation programs based on a zero trust framework that incorporates clinical context to make hospitals secure fast. Hospital networks are extremely vulnerable to IoT devices from Healthcare. Insecure devices increase cyber attack surface and pose a major threat to patient safety as well as the operational continuity of hospitals.
  • 6
    HCL IntelliOps Event Management Reviews
    HCL IntelliOps Event Management forms part of the Intelligent Full Stack Observability under HCLSoftware Intelligent Operation ecosystem. It is a cutting-edge AI-powered IT Event Management product that empowers organizations with leading capabilities, such as real-time topology based alert correlation, ML based alert correlation and noise reduction. The product integrates seamlessly with an organization's current element monitoring and ITSM software, allowing for efficient and quick resolution.
  • 7
    Metric Insights Reviews
    Capture user interest by consolidating all your business intelligence tools and datasets into a single, user-friendly BI portal that is easily searchable. Ensure that the appropriate content reaches the intended audience at the optimal moment and on their preferred device. Automatically detect irregularities within your data to guarantee that key individuals are promptly alerted to significant developments, leaving no critical information overlooked. Access insights from your data across various applications and devices without hassle. Metric Insights empowers top organizations to provide their business users with data that is timely, pertinent, and actionable, fostering a more informed decision-making process. By streamlining information flow, organizations can enhance their operational efficiency and responsiveness.
  • 8
    ThreatConnect Threat Intelligence Platform Reviews
    The ThreatConnect Threat Intelligence Platform (TIP) serves as a centralized hub for collecting and managing threat information. This platform enables users to standardize data sourced from multiple origins, enrich it with further context, and streamline manual security processes related to threat intelligence through automation. Additionally, ThreatConnect TIP offers a comprehensive workbench that helps in organizing and prioritizing threat data, which can then be leveraged to inform and direct actions within a security team, enhancing overall operational efficiency. By utilizing this platform, organizations can improve their response to potential threats and fortify their security posture.