59 Integrations with Graylog
View a list of Graylog integrations and software that integrates with Graylog below. Compare the best Graylog integrations as well as features, ratings, user reviews, and pricing of software that integrates with Graylog. Here are the current Graylog integrations in 2026:
-
1
Google Cloud Platform
Google
Google Cloud is a cloud-based service that allows you to create anything from simple websites to complex applications for businesses of all sizes. New customers get $300 in free credits to run, test, and deploy workloads. All customers can use 25+ products for free, up to monthly usage limits. Use Google's core infrastructure, data analytics & machine learning. Secure and fully featured for all enterprises. Tap into big data to find answers faster and build better products. Grow from prototype to production to planet-scale, without having to think about capacity, reliability or performance. From virtual machines with proven price/performance advantages to a fully managed app development platform. Scalable, resilient, high performance object storage and databases for your applications. State-of-the-art software-defined networking products on Google’s private fiber network. Fully managed data warehousing, batch and stream processing, data exploration, Hadoop/Spark, and messaging.Starting Price: Free ($300 in free credits) -
2
Auth0
Okta
Auth0 takes a modern approach to Identity, providing secure access to any application, for any user. Safeguarding billions of login transactions each month, Auth0 delivers convenience, privacy, and security so customers can focus on innovation. Auth0 is part of Okta, The World’s Identity Company™. Auth0 lets you quickly integrate authentication and authorization for web, mobile, and legacy applications, with new Fine Grained Authorization (FGA) that goes beyond role-based access control. Authenticate users across all applications with a customized, secure, and standards-based single login. Universal Login connects users to a central authorization server. Credentials aren’t transferred across sources, which boosts security and protects against phishing and credential stuffing attacks. OAuth 2.0 recommends that only external user agents (like the browser) be used by native applications for authentication flows. Auth0’s Universal Login achieves this while enabling SSO.Starting Price: Free plan -
3
StrongDM
StrongDM
StrongDM is a People-First Access platform that gives technical staff a direct route to the critical infrastructure they need to be their most productive. End users enjoy fast, intuitive, and auditable access to the resources they need, and administrators leverage simplified workflows to enhance security and compliance postures. - We open up a clear, direct path that gives individualized access to the right people and keeps everyone else out. - Total visibility into everything that’s ever happened in your stack. Security and Compliance teams can easily answer who did what, where, and when. - Admins have precise control over what each user has access to—without these controls ever getting in the way of productivity - IT, InfoSec, and Administrators have precise controls. Unauthorized access is eliminated because users never see resources they don’t have permission to use. -All past, present, and future infrastructure is supported - Responsive 24/7/365 customer support.Starting Price: $70/user/month -
4
Salesforce
Salesforce
Put the power of the #1 CRM to work, at a price that works for you. Launch and grow quickly with the leading AI CRM built for small businesses in any industry - available through the Starter Suite or Pro Suite. Connect marketing, sales, service, and commerce on one easy platform. Save time with quick setup and smart guidance. Harness unified data and AI to fuel your growth. Start simple with Starter Suite — an all-in-one CRM for small businesses. Scale smoothly with AI agents, integrated data, and apps in one platform. No installation needed, just sign up and go from your browser. Advance further with Pro Suite, the complete CRM that scales with your business. Automate tasks and customize your tools to deepen customer relationships and drive growth.Starting Price: $25.00/month/user -
5
Microsoft 365
Microsoft
Microsoft 365 for Individuals is a complete productivity suite that combines powerful applications, secure cloud storage, and AI-driven tools to help users achieve more in their daily lives. It integrates popular apps like Word, Excel, PowerPoint, Outlook, OneNote, and OneDrive, all enhanced with Copilot—Microsoft’s intelligent AI companion. The platform enables seamless collaboration, creativity, and organization across devices, including PC, Mac, iPhone, iPad, and Android. With Microsoft Designer, users can create stunning visuals, while Clipchamp adds professional-grade video editing capabilities. Built-in Microsoft Defender provides advanced security for personal data and devices. Microsoft 365 empowers individuals to imagine, create, and accomplish with greater efficiency and confidence.Starting Price: $9.99/month -
6
Kubernetes
Kubernetes
Kubernetes (K8s) is an open-source system for automating deployment, scaling, and management of containerized applications. It groups containers that make up an application into logical units for easy management and discovery. Kubernetes builds upon 15 years of experience of running production workloads at Google, combined with best-of-breed ideas and practices from the community. Designed on the same principles that allows Google to run billions of containers a week, Kubernetes can scale without increasing your ops team. Whether testing locally or running a global enterprise, Kubernetes flexibility grows with you to deliver your applications consistently and easily no matter how complex your need is. Kubernetes is open source giving you the freedom to take advantage of on-premises, hybrid, or public cloud infrastructure, letting you effortlessly move workloads to where it matters to you.Starting Price: Free -
7
Slack
Salesforce
Slack is a cloud-based project collaboration and team interaction software solution specially designed to seamlessly facilitate communication across organizations. Featuring powerful tools and services integrated into a single platform, Slack provides private channels to promote interaction within smaller teams, direct channels to help send messages directly to colleagues, and public channels that enables members across organizations to start conversations. Available on Mac, Windows, Android, and iOS apps, Slack offers a plethora of features that include chat, file sharing, collaborative workspace, real-time notifications, two-way audio and video, screen sharing, document imaging, activity tracking and logging, and more.Starting Price: $6.67 per user per month -
8
Zoom
Zoom Communications
Enterprise video conferencing with real-time messaging & content sharing with Zoom Meetings & Chat. Simplified video conferencing and messaging across any device. Enable quick adoption with meeting capabilities that make it easy to start, join, and collaborate across any device. Zoom Meetings syncs with your calendar system and delivers streamlined enterprise-grade video conferencing from desktop and mobile. Enable internal and external communications, all-hands meetings, and trainings through one platform. Bring HD video and audio to your meetings with support for up to 1000 video participants and 49 videos on screen. Multiple participants can share their screens simultaneously and co-annotate for a more interactive meeting. End-to-end encryption for all meetings, role-based user security, password protection, waiting rooms, and place attendee on hold. Record your meetings locally or to the cloud, with searchable transcripts. Zoom also offers a HIPAA compliant plan for healthcare.Starting Price: $14.99 per user per month -
9
GitHub
GitHub
GitHub is the world’s most secure, most scalable, and most loved developer platform. Join millions of developers and businesses building the software that powers the world. Build with the world’s most innovative communities, backed by our best tools, support, and services. If you manage multiple contributors , there’s a free option: GitHub Team for Open Source. We also run GitHub Sponsors, where we help fund your work. The Pack is back. We’ve partnered up to give students and teachers free access to the best developer tools—for the school year and beyond. Work for a government-recognized nonprofit, association, or 501(c)(3)? Get a discounted Organization account on us.Starting Price: $7 per month -
10
Netdata
Netdata, Inc.
The open-source observability platform everyone needs! Netdata collects metrics per second and presents them in beautiful low-latency dashboards. It is designed to run on all of your physical and virtual servers, cloud deployments, Kubernetes clusters, and edge/IoT devices, to monitor your systems, containers, and applications. It scales nicely from just a single server to thousands of servers, even in complex multi/mixed/hybrid cloud environments, and given enough disk space it can keep your metrics for years. KEY FEATURES: 💥 Collects metrics from 800+ integrations 💪 Real-Time, Low-Latency, High-Resolution 😶🌫️ Unsupervised Anomaly Detection 🔥 Powerful Visualization 🔔 Out of box Alerts 📖 systemd Journal Logs Explorer 😎 Low Maintenance ⭐ Open and Extensible Try Netdata today and feel the pulse of your infrastructure, with high-resolution metrics, journal logs and real-time visualizations.Starting Price: Free -
11
Google Workspace
Google
G Suite just got better — introducing Google Workspace (formerly G Suite). Everything you need to get anything done, now in one place. An integrated workspace that’s simple to use, Google Workspace lets you spend less time managing your work and more time actually doing it. Address what’s important and let Google handle the rest with best-in-class AI and search technology that helps you work smarter. Work from anywhere, on any device – even offline – with tools to help you integrate, customize, and extend Google Workspace to meet your team’s unique needs. Similar to G Suite, all Google Workspace plans provide a custom email for your business and includes collaboration tools like Gmail, Calendar, Meet, Chat, Drive, Docs, Sheets, Slides, Forms, Sites, and more. We have a variety of plans that are designed to meet your unique business needs. Discover which plan best fits your business needs on our plans and pricing page.Starting Price: $6 per user per month -
12
Okta
Okta
One platform, infinite ways to connect to your employees and customers. Build auth into any app. Create secure, delightful experiences quickly by offloading customer identity management to Okta. Get security, scalability, reliability, and flexibility by combining Okta’s Customer Identity products to build the stack you need. Protect and enable your employees, contractors, and partners. Secure your employees—wherever they are—with Okta’s workforce identity solutions. Get the tools to secure and automate cloud journeys, with full support for hybrid environments along the way. Companies around the world trust Okta with their workforce identity. -
13
SentinelOne Singularity
SentinelOne
One intelligent platform. Unprecedented speed. Infinite scale. Singularity™ enables unfettered visibility, industry-leading detection, and autonomous response. Discover the power of AI-powered, enterprise-wide cybersecurity. The world’s leading enterprises use the Singularity platform to prevent, detect, and respond to cyber attacks at machine-speed, greater scale, and higher accuracy across endpoint, cloud, and identity. SentinelOne delivers cutting-edge security with this platform by offering protection against malware, exploits, and scripts. SentinelOne cloud-based platform has been perfected to be innovative compliant with security industry standards, and high-performance whether the work environment is Windows, Mac or Linux. Thanks to constant updating, threat hunting, and behavior AI, the platform is ready for any threat.Starting Price: $45 per user per year -
14
Amazon CloudWatch
Amazon
Amazon CloudWatch is a monitoring and observability service built for DevOps engineers, developers, site reliability engineers (SREs), and IT managers. CloudWatch provides you with data and actionable insights to monitor your applications, respond to system-wide performance changes, optimize resource utilization, and get a unified view of operational health. CloudWatch collects monitoring and operational data in the form of logs, metrics, and events, providing you with a unified view of AWS resources, applications, and services that run on AWS and on-premises servers. You can use CloudWatch to detect anomalous behavior in your environments, set alarms, visualize logs and metrics side by side, take automated actions, troubleshoot issues, and discover insights to keep your applications. CloudWatch alarms watch your metric values against thresholds that you specify or that it creates using ML models to detect anomalous behavior. -
15
Ansible
Red Hat
Ansible is a radically simple automation engine that automates cloud provisioning, configuration management, application deployment, intra-service orchestration, and many other IT needs. Ansible Automation Platform has grown over the past years to provide powerful automation solutions that work for operators, administrators and IT decision makers across a variety of technology domains. It’s a leading enterprise automation solution from Red Hat®, a thriving open source community, and the de facto standard technology of IT automation. Scale automation, manage complex deployments, and speed productivity with an enterprise automation platform that can be used across entire IT teams. Red Hat or partner consulting services help you advance your end-to-end automation journey for faster time to value.Starting Price: Free -
16
Squadcast
Squadcast
Squadcast is an incident management tool that’s purpose-built for SRE. Create a blameless culture by reducing the need for physical war rooms, centralize SLO dashboards, unify internal and external SLIs and automate incident resolution and knowledge base creation with Squadcast Actions. Adopt world-class site reliability practices with a centralized SLO dashboard to view your system health. Anticipate incidents before they occur and respond proactively. The first step towards doing better incident management is adding enough context to incidents while they get detected. With Squadcast, discover everything you need, to take action and achieve best-in-class MTTD with highly configurable features like alert deduplication and tagging.Starting Price: Free -
17
ServiceNow
ServiceNow
Digitize your workflows - they'll love you for it. Your company can be more productive and your people more engaged. ServiceNow makes work, work better for people. Transform old, manual ways of working into modern digital workflows, so employees and customers get what they need, when they need it—fast, simple, easy. ServiceNow delivers digital workflows that create great experiences and unlock productivity for employees and the enterprise. We simplify the complexity of work on a single, enterprise cloud platform. The Now Platform: The intelligent and intuitive cloud platform for work. Choose from our workflows or build your own apps. Built on the Now Platform, our product portfolio delivers the IT, Employee, and Customer Workflows that matter with enterprise solutions to help drive every part of your digital transformation. Create the great experiences you want and unlock the productivity you need, now with native mobile capabilities for everyday work across the enterprise.Starting Price: $100 per month -
18
F5 BIG-IP
F5
Advanced technology for an app-centric world. Apps are your business. BIG-IP application services provide the availability, performance, and security you need to meet business demands. Keep your apps up and running with BIG-IP application delivery controllers. BIG-IP Local Traffic Manager (LTM) and BIG-IP DNS handle your application traffic and secure your infrastructure. You’ll get built-in security, traffic management, and performance application services, whether your applications live in a private data center or in the cloud. BIG-IP Diameter Traffic Management, BIG-IP Policy Enforcement Manager (PEM), and BIG-IP Carrier-Grade NAT (CGNAT) manage network resources to keep your applications performing at carrier-grade levels. They also help you identify ways to optimize and monetize your network, improving your bottom line. -
19
Telegraf
InfluxData
Telegraf is the open source server agent to help you collect metrics from your stacks, sensors and systems. Telegraf is a plugin-driven server agent for collecting and sending metrics and events from databases, systems, and IoT sensors. Telegraf is written in Go and compiles into a single binary with no external dependencies, and requires a very minimal memory footprint. Telegraf can collect metrics from a wide array of inputs and write them into a wide array of outputs. It is plugin-driven for both collection and output of data so it is easily extendable. It is written in Go, which means that it is a compiled and standalone binary that can be executed on any system with no need for external dependencies, no npm, pip, gem, or other package management tools required. With 300+ plugins already written by subject matter experts on the data in the community, it is easy to start collecting metrics from your end-points.Starting Price: $0 -
20
Opsera
Opsera
You choose your tools, we take care of the rest. Put together the perfect CI/CD stack that fits your organization’s goals with zero vendor lock-in. Eliminate manual scripts and stop building toolchain automation. Free your engineers to focus on your core business. Pipeline workflows follow a declarative model so you focus on what is required — not how it’s accomplished — including: software builds, security scans, unit testing, and deployments. With Blueprints, diagnose any failures from within Opsera using a console output of every step of your pipeline execution. Comprehensive software delivery analytics across your CI/CD process in a unified view — including Lead Time, Change Failure Rate, Deployment Frequency, and Time to Restore. Contextualized logs for faster resolution and improved auditing and compliance.Starting Price: $3.60 per user , Min 300 devs -
21
SOC Prime Platform
SOC Prime
SOC Prime operates the world’s largest and most advanced platform for collective cyber defense that cultivates collaboration from a global cybersecurity community and curates the most up-to-date Sigma rules compatible with over 28 SIEM, EDR, and XDR platforms. SOC Prime’s innovation, backed by the vendor-agnostic and zero-trust cybersecurity approach, and cutting-edge technology leveraging Sigma language and MITRE ATT&CK® as core pillars are recognized by the independent research companies, credited by the leading SIEM, XDR & MDR vendors, and trusted by 8,000+ organizations from 155 countries, including 42% of Fortune 100, 21% of Forbes Global 2000, 90+ public sector institutions, and 300+ MSSP and MDR providers. Driven by its advanced cybersecurity solutions, Threat Detection Marketplace, Uncoder AI, and Attack Detective, SOC Prime enables organizations to risk-optimize their cybersecurity posture while improving the ROI of their SOC investments. -
22
Kapacitor
InfluxData
Kapacitor is a native data processing engine for InfluxDB 1.x and is an integrated component in the InfluxDB 2.0 platform. Kapacitor can process both stream and batch data from InfluxDB, acting on this data in real-time via its programming language TICKscript. Today’s modern applications require more than just dashboarding and operator alerts—they need the ability to trigger actions. Kapacitor’s alerting system follows a publish-subscribe design pattern. Alerts are published to topics and handlers subscribe to a topic. This pub/sub model and the ability for these to call User Defined Functions make Kapacitor very flexible to act as the control plane in your environment, performing tasks like auto-scaling, stock reordering, and IoT device control. Kapacitor provides a simple plugin architecture, or interface, that allows it to integrate with any anomaly detection engine.Starting Price: $0.002 per GB per hour -
23
Microsoft Defender for IoT
Microsoft
Accelerate digital transformation with comprehensive security across your IoT/OT infrastructure. Microsoft Defender for IoT offers agentless network detection and response (NDR) that is rapidly deployed, works with diverse IoT, OT, and industrial control system (ICS) devices, and interoperates with Microsoft 365 Defender, Microsoft Sentinel, and external security operations center (SOC) tools. Deploy on-premises or via cloud. For IoT device builders, Defender for IoT offers lightweight agents for stronger device-layer security. Use passive, agentless network monitoring to safely gain a complete inventory of all your IoT/OT assets, with zero impact on IoT/OT performance. Analyze diverse and proprietary industrial protocols to visualize your IoT/OT network topology and see communication paths, and then use that information to accelerate network segmentation and zero trust initiatives.Starting Price: $0.001 per device per month -
24
StixMDM
Stix
StixMDM offers a reliable, secure and low cost MDM solution for businesses. Primarily focusing on ease of use for our customers and security across multiple platforms. StixMDM platform is ideal for hospitality, retail, field services, restaurants and education. Manage your mobile fleet on your terms. Enrol your whole mobile fleet in one go. Distribute company apps in one place. Set the level of oversight on each device, from limited to locked down. It's up to your business' needs. Enable employees to use their own device for work. Android work profiles separate business apps from personal apps so employees can use their favorite Android device for both work and play. Android’s work profile separates work and personal applications so IT can manage business data while employees keep their personal apps, photos, and other data private. It's peace of mind for both users and IT. Setting up a work profile is as easy as downloading an EMM app from Google Play and following the setup wizard.Starting Price: $0.99 per month -
25
Fleet
Fleet Device Management
Ask questions about your servers, and laptops. Whatever their operating system, wherever they live. Track and segment your enrolled hosts. Search by important details, and zoom in on individual targets. Collect and share useful information for ops teams, security teams, help desk, and more. Fleet is self-hosted and self-managed, and can be run within your own data centers or in the cloud. Write scripts with fleetctl and design scheduled queries to integrate alerts and dashboards across your enterprise.Starting Price: $4 per host per month -
26
Zenduty
Zenduty
Zenduty’s end-to-end incident alerting, on-call management and response orchestration platform helps you institutionalize reliability into your production operations. Get a single pane of glass view of the health of all your production operations. Respond to incidents 90% faster and resolve them 60% faster. Deploy customized and data-driven on-call rotations to ensure 24/7 operational coverage for major incidents. Deploy industry-leading incident response procedures and resolve incidents faster through effective task delegation and collaborative triaging. Bring your playbooks automatically into your incidents. Log incident tasks and action items for productive postmortems and future incidents. Suppress noisy alerts so that your engineers and support staff are focused on the alerts that matter. Over 100+ integrations with all your APMs, log monitoring, error monitoring, server monitoring, ITSM, Support, and security services.Starting Price: $5 per month -
27
SMSEagle
Proximus Sp. z o.o.
SMSEagle is a hardware SMS gateway that enables SMS messages to be sent directly to telecommunication carrier without 3rd party services and without the Internet. This is achieved by using a SIM card, built-in radio modules with external antenna to communicate directly with a telecommunication operator (works similar to mobile phones). Hardware SMS gateway, also known as SMS server, integrates hardware and software for managing communication. The device offers various methods for integration with external systems like API, Email To SMS, etc. Support of different message types (normal SMS/multipart SMS/flash SMS/MMS/binary SMS/USSD-code/WAP Push link) Unicode support (support of national characters) Sending to single users or groups of users Sending SMS at specified date and time (SMS scheduling) Limit sending to specified hours (for example between 08:00-18:00) Smartphone-like conversation mode (messages are nicely grouped by phone number). and many more...Starting Price: €989 -
28
Azure-AD-External-Identities
Microsoft
Azure Active Directory External Identities, part of Microsoft Entra, provides highly secure digital experiences for partners, customers, citizens, patients, or any users outside your organization with customization controls. Combine external identities and user directories in one portal to seamlessly manage access across the organization. Give both onsite and remote employees seamless access to all their apps so they can stay productive anywhere. Automate workflows for easy user lifecycle management and provisioning. Save admin time and resources with self-service identity management for external users. Simplify access to thousands of pre-integrated software as a service (SaaS) applications with single sign-on from any location, on any device.Starting Price: $0.00325 per month -
29
Parny
Parny
Get AI recommendations for your alerts. It can generate recommendations for your alert based on the persona selected. Ask Parny AI has three personas, DevOps engineer, senior developer and database administrator. Our personas are trained to provide the best recommendations for your alerts. You can easily add your team members to the on-call team member list. Always alert the right person at the right time. Share on-call responsibility across your team with on-call schedules and automatic escalations. We support engineering teams to be more proactive, resolve incidents faster and deliver a seamless operations experience. Get custom analytics for your organization, teams, services and users. Always be up to date with your performance and improve your organization's efficiency.Starting Price: $7 per month -
30
Icinga
Icinga GmbH
Icinga is a monitoring system which checks the availability of your network resources, notifies users of outages, and generates performance data for reporting. Scalable and extensible, Icinga can monitor large, complex environments across multiple locations. Icinga 2 is the monitoring server and requires Icinga Web 2 on top in your Icinga Stack. The configuration can be easily managed with either the Icinga Director, config management tools or plain text within the Icinga DSL. Find answers, take actions and become a problem-solver. Be flexible and take your own ways. Stay curious, stay passionate, stay in the loop. Tackle your monitoring challenge. The Icinga stack spans six core strengths that cover all aspects of monitoring. Level up with valuable insights and on-time notifications, eye-opening visuals and analytics. Icinga easily integrates within your systems, and gives you the power to automate your tasks.Starting Price: $0 -
31
Keyfactor EJBCA
Keyfactor
EJBCA is an Enterprise grade PKI platform capable of issuing and managing digital certificates in the billions. One of the most used PKI platforms globally, it is used by governments and large enterprises across all sectors. PKI shouldn't be complex. Simplify it, with EJBCA® Enterprise, the only PKI platform that deploys fast, runs anywhere, and scales on-demand — so you can issue and manage thousands, even billions of certificates, no problem. Powered by the most trusted and widely used open-source PKI, EJBCA Enterprise empowers teams to establish trust with identity-first security for every human and machine, anywhere. Replace legacy CA solutions with a flexible and scalable PKI platform to issue and manage certificates for devices, workloads, and users. Embed certificate-based identity into thousands or millions of connected products with a fast and scalable PKI solution. -
32
SafeConsole
DataLocker
Central Management Server Software. Instantly gain complete and granular control over all of your encrypted USB flash drives and portable hard drives with the SafeConsole central management server software: Achieve compliance for USB storage usage, with full control and audit. Keep the productivity benefits of USB storage devices – without the risks of malware, data leaks and breaches. Available as an on-premises software or as a DataLocker hosted cloud service with worldwide locations. Enforce policies such as password rules, file-type restrictions or geographic boundaries. Reset passwords, switch devices into read-only mode, and even remotely wipe them in case of loss or theft. Monitor all your encrypted drives, including their location anywhere in the world. Integrate with Active Directory to track users, assigned devices and connected computers with ease. See which files are saved to or deleted from your encrypted drives at any given moment.Starting Price: $28 per device per year -
33
Terraform
HashiCorp
Terraform is an open-source infrastructure as code software tool that provides a consistent CLI workflow to manage hundreds of cloud services. Terraform codifies cloud APIs into declarative configuration files. Write infrastructure as code using declarative configuration files. HashiCorp Configuration Language (HCL) allows for concise descriptions of resources using blocks, arguments, and expressions. Run terraform plan to check whether the execution plan for a configuration matches your expectations before provisioning or changing infrastructure. Apply changes to hundreds of cloud providers with terraform apply to reach the desired state of the configuration. Define infrastructure as code to manage the full lifecycle — create new resources, manage existing ones, and destroy those no longer needed. -
34
Qualys Container Security
Qualys
Qualys CS features a vulnerability analysis plug-in for CI/CD tool Jenkins, and soon for other CI/CD tools including Bamboo, TeamCity, and CircleCI. You can download the plugins directly from within the container security module. With Qualys CS, security teams can participate in the DevOps process to gate vulnerable images entering the system, while developers get actionable data to remediate vulnerabilities. Configure policies for preventing vulnerable images from entering the repositories. Set policies based on criteria such as vulnerability severity, and specific QIDs. Review from within the plug-in a summary of the build with its vulnerabilities, information on patchable software and fixed versions, and image layers where it is present. Container infrastructure is immutable in nature, which means containers need to be identical to the images they are baked from. -
35
Increased remote working makes it more important than ever to secure computers and the data on them. With the huge number of laptops lost, stolen, or misplaced every day, a crucial first line of defense against the loss or theft of devices is full disk encryption. Sophos Central Device Encryption leverages Windows BitLocker and macOS FileVault to secure devices and data. Centralized security management and operations from the world’s most trusted and scalable cloud security platform. With open APIs, extensive third-party integrations, and consolidated dashboards and alerts, Sophos Central makes cybersecurity easier and more effective. Integrated SASE-ready solutions to secure your cloud and hybrid networks - now and into the future. From Firewall and Zero Trust to Switches, Wi-Fi, and more. Trust your inbox again with cloud email security that protects your people and critical information from malware, phishing and impersonation attempts.
-
36
TruKno
TruKno
Keep up with how adversaries are bypassing enterprise security controls based on the latest cyber attack sequences in the wild. Understand cyber attack sequences associated with malicious IP addresses, file hashes, domains, malware, actors, etc. Keep up with the latest cyber threats attacking your networks, your industry/peers/vendors, etc. Understand MITRE TTPs (at a ‘procedure’ level) used by adversaries in the latest cyber attack campaigns so you can enhance your threat detection capabilities. A real-time snapshot of how top malware campaigns are evolving in terms of attack sequences (MITRE TTPs), vulnerability exploitation (CVEs), IOCs, etc. -
37
Sandfly Security
Sandfly Security
Trusted on critical infrastructure globally, Sandfly delivers agentless Linux security with no endpoint agents and no drama. Instant deployment without compromising stability or needing endpoint agents. Sandfly is an agentless, instantly deployable, and safe Linux security monitoring platform. Sandfly protects virtually any Linux system, from modern cloud deployments to decade-old devices, regardless of distribution or CPU architecture. Besides traditional Endpoint Detection and Response (EDR) capabilities, Sandfly also tracks SSH credentials, audits for weak passwords, detects unauthorized changes with drift detection, and allows custom modules to find new and emerging threats. We do all of this with the utmost safety, performance, and compatibility on Linux. And, we do it without loading agents on your endpoints. The widest coverage for Linux on the market. Sandfly protects most distributions and architectures such as AMD, Intel, Arm, MIPS, and POWER CPUs. -
38
NXLog
NXLog
Achieve complete security observability with powerful insights from your log data. Improve your infrastructure visibility and enhance threat prevention with a versatile multi-platform tool. With support for over 100 operating system versions and more than 120 configurable modules, gain comprehensive insights and increased security. Cut the cost of your SIEM solution by reducing noisy and unnecessary log data. Filter events, truncate unused fields, and remove duplicates to increase the quality of your logs. Collect and aggregate logs from systems across the entire breadth of your organization with a single tool. Reduce complexity in managing security-related events and decrease detection and response times. Empower your organization to meet compliance requirements by centralizing some logs in an SIEM and archiving others in your long-term storage. NXLog Platform is an on-premises solution for centralized log management, with versatile processing. -
39
FortiGate Cloud
Fortinet
FortiGate Cloud simplifies network operations for Fortinet FortiGate and the connected devices, FortiSwitch, FortiAP, and FortiExtender for initial deployment, setup, and ongoing maintenance. FortiGate Cloud brings enterprise-grade analytics and reporting for small to medium-sized businesses enabling organizations of all sizes complete visibility into their attack surface. FortiGate Cloud is a cloud-based software-as-a-service (SaaS) offering a range of management, reporting, and analytics for FortiGate next-generation firewalls. FortiGate Cloud simplifies the initial deployment, setup, and ongoing management of FortiGate with SD-WAN functions, FortiSwitch, FortiAP, and FortiExtender with zero-touch provisioning, providing you with visibility of your entire deployment. FortiGate Cloud grows with your requirements from a single FortiGate to a complete managed security services management solution for thousands of devices across multiple customers. -
40
AWS Marketplace
Amazon
AWS Marketplace is a curated digital catalog that enables customers to discover, purchase, deploy, and manage third-party software, data products, AI agents, and services directly within the AWS ecosystem. It provides access to thousands of listings across categories like security, machine learning, business applications, and DevOps tools. With flexible pricing models such as pay-as-you-go, annual subscriptions, and free trials, AWS Marketplace simplifies procurement and billing by integrating costs into a single AWS invoice. It also supports rapid deployment with pre-configured software that can be launched on AWS infrastructure. This streamlined approach allows businesses to accelerate innovation, reduce time-to-market, and maintain better control over software usage and costs. -
41
Trapster
Ballpoint
Trapster is a complete Deceptive Security platform that uncovers intrusions by deploying convincing decoy systems within your network, luring attackers into revealing their presence. Its powerful detection capabilities are built on three key components: 1) Network-Based Honeypot Server: launches virtual machines on your Hypervisor or Cloud, supporting 15+ protocols. It detects scans and lateral movements, delivering real-time alerts via email, dashboard, webhooks, syslog, or API. Effortlessly auto-configured and maintenance-free for seamless integration. 2) Lures (Honeytokens): plants deceptive files, URLs, API keys, or database entries to trap attackers early. 3) External Login Panel: mimics authentic login interfaces to expose credential leaks before they’re exploited. Unlike traditional security tools, Trapster proactively identifies threats that evade conventional detection, empowering organizations to stay one step ahead.Starting Price: $1000/year -
42
ServiceNow Asset Management
ServiceNow
Asset Management automates your IT asset lifecycles with intuitive workflows. Make informed decisions about asset capacity, refresh, and vendors. Know and control your assets. Optimize asset lifecycle investments to deliver better IT services and make smarter decisions. Reduce asset costs. Lower asset costs and automate asset lifecycle processes to minimize wasted resources. Mitigate risk. Enforce asset policies and regulatory requirements to limit risks. Transform your business with digital IT workflows. Modernize your operations to optimize productivity, cost, and resilience with a single platform for IT. Maximize your investment with ServiceNow Impact. Realize value faster with experts on demand, premium support, and preventive tools to guide your digital transformation. Our digital experiences can help your organization, so it simply works better. -
43
Swimlane
Swimlane
At Swimlane, we believe the convergence of agentic AI and automation can solve the most challenging security, compliance and IT/OT operations problems. With Swimlane, enterprises and MSSPs benefit from the world’s first and only hyperautomation platform for every security function. Only Swimlane gives you the scale and flexibility to build your own hyperautomation applications to unify security teams, tools and telemetry ensuring today’s SecOps are always a step ahead of tomorrow’s threats. Swimlane Turbine is the world’s fastest and most scalable security automation platform. Turbine is built with the flexibility and cloud scalability needed for enterprises and MSSP to automate any SecOps process, from SOC workflows to vulnerability management, compliance, and beyond. Only Turbine can execute 25 million daily actions per customer, 17 times faster than any other platform, provider, or technology. -
44
AWS CloudTrail
Amazon
AWS CloudTrail is a service that enables governance, compliance, operational auditing, and risk auditing of your AWS account. With CloudTrail, you can log, continuously monitor, and retain account activity related to actions across your AWS infrastructure. CloudTrail provides event history of your AWS account activity, including actions taken through the AWS Management Console, AWS SDKs, command line tools, and other AWS services. This event history simplifies security analysis, resource change tracking, and troubleshooting. In addition, you can use CloudTrail to detect unusual activity in your AWS accounts. These capabilities help simplify operational analysis and troubleshooting. Detect unauthorized access using the Who, What, and When information in CloudTrail Events. Respond with rules-based EventBridge alerts and automated workflows. Continuously monitor API usage history using machine learning (ML) models to spot unusual activity in your AWS accounts, and determine root cause. -
45
Tenable One
Tenable
Tenable One radically unifies security visibility, insight and action across the attack surface, equipping modern organizations to isolate and eradicate priority cyber exposures from IT infrastructure to cloud environments to critical infrastructure and everywhere in between. The world’s only AI-powered exposure management platform. See every asset across your entire attack surface—from cloud environments to operational technologies, infrastructure to containers, and remote workers to modern web-apps with Tenable's market-leading vulnerability management sensors. With more than 20 trillion aspects of threat, vulnerability, misconfiguration and asset information, Tenable’s machine-learning powered predictions reduce remediation efforts by enabling you to focus first on the risks that matter most. Drive improvements required to reduce the probability of a business-impacting cyber event from occurring by communicating objective measures of risk. -
46
Stackhero
Stackhero
We host and manage services like PostgreSQL, Graylog, RabbitMQ, MariaDB, Elasticsearch, Redis and dozen more. Start your services in just 2 minutes and be production ready instantly. Focus on your business, not on your infrastructure anymore. Our catalog contains dozen of services and we add new ones each month. You'll no longer have to juggle between cloud providers and technical solutions. Our pricing is clear and simple, without surprises at the end of the month. Start a small infrastructure and make it choose your instance up to 16 vCPUs and 64 GB of RAM and scale it as your business grows. as your business grows. We optimize the hardware and tune the software to get a blazing fast solution. We use open source solutions so you're not locked into proprietary, dark ones. You and your data are free to move when you want, where want. Create and delete services when you want, you'll be billed per hour of use and will receive a single clear invoice, each month, with all the details. -
47
Centreon
Centreon
Centreon is a global provider of business-aware IT monitoring for always-on operations and performance excellence. The company’s holistic, AIOps-ready platform is designed for today’s complex, distributed hybrid cloud infrastructures. Centreon monitors the complete IT Infrastructure from Cloud-to-Edge for a clear and comprehensive view. Centreon removes blind spots, monitoring all equipment, middleware and applications that are part of modern IT workflows, from on-premise legacy assets to private and public cloud environments, all the way to the edge of the network, where smart devices and customers combine to create business value. Centreon is constantly current, able to support the most dynamic environments. With auto-discovery capabilities it can keep track of Software-Defined Network (SDN) elements, AWS or Azure cloud assets, Wi-Fi access points or any other component of today’s agile IT infrastructure. -
48
AirShield
LOCH Technologies
IoT has created the world’s largest attack surface — and 80% of IoT devices are wirelessly connected. Today’s networks and organizations were never built to handle the massive volume, velocity and hyper-connectivity of smart devices. Most businesses still struggle to identify IoT devices within their environment – creating new security blind spots. AirShield provides comprehensive visibility into the IoT and OT (operational technology) threat landscape in order to detect, assess and prevent risk from unmanaged, unsecured and misconfigured IoT devices. AirShield provides non-intrusive real-time visibility and comprehensive monitoring and protection for broad-spectrum wireless devices for IoT, Industrial Internet of Things (IIOT), Internet of Medical Things (IOMT), and OT environments, irrespective of operating system, protocol, or connection type. AirShield sensors connect to the LOCH Machine Vision Cloud. No on-premise server installation is required. -
49
Recorded Future
Recorded Future
Recorded Future is the world’s largest provider of intelligence for enterprise security. By combining persistent and pervasive automated data collection and analytics with human analysis, Recorded Future delivers intelligence that is timely, accurate, and actionable. In a world of ever-increasing chaos and uncertainty, Recorded Future empowers organizations with the visibility they need to identify and detect threats faster; take proactive action to disrupt adversaries; and protect their people, systems, and assets, so business can be conducted with confidence. Recorded Future is trusted by more than 1,000 businesses and government organizations around the world. The Recorded Future Security Intelligence Platform produces superior security intelligence that disrupts adversaries at scale. It combines analytics with human expertise to unite an unrivaled variety of open source, dark web, technical sources, and original research. -
50
Palo Alto Networks DNS Security Service
Palo Alto Networks
Automatically secure your DNS traffic by using Palo Alto Networks DNS Security service, a cloud-based analytics platform providing your firewall with access to DNS signatures generated using advanced predictive analysis and machine learning, with malicious domain data from a growing threat intelligence sharing community. Maximize your protections against threats using DNS with the DNS Security subscription service. The DNS Security service now features individually configurable and extensible DNS Security Signature Categories, which allows you to create discrete security policies based on the risk factors associated with certain types of DNS traffic. DNS Security now protects you from additional DNS-based threats, including those that rely on dynamic DNS hosted domains, recently registered domains, and phishing domains.