102 Integrations with Sumo Logic
View a list of Sumo Logic integrations and software that integrates with Sumo Logic below. Compare the best Sumo Logic integrations as well as features, ratings, user reviews, and pricing of software that integrates with Sumo Logic. Here are the current Sumo Logic integrations in 2026:
-
1
Google Cloud Platform
Google
Google Cloud is a cloud-based service that allows you to create anything from simple websites to complex applications for businesses of all sizes. New customers get $300 in free credits to run, test, and deploy workloads. All customers can use 25+ products for free, up to monthly usage limits. Use Google's core infrastructure, data analytics & machine learning. Secure and fully featured for all enterprises. Tap into big data to find answers faster and build better products. Grow from prototype to production to planet-scale, without having to think about capacity, reliability or performance. From virtual machines with proven price/performance advantages to a fully managed app development platform. Scalable, resilient, high performance object storage and databases for your applications. State-of-the-art software-defined networking products on Google’s private fiber network. Fully managed data warehousing, batch and stream processing, data exploration, Hadoop/Spark, and messaging.Starting Price: Free ($300 in free credits) -
2
Rippling
Rippling
Streamline your business with Rippling’s all-in-one platform for HR, IT, payroll, and spend management. Effortlessly manage the entire employee lifecycle, from hiring to benefits administration. Automate HR tasks, ensure compliance, and streamline approvals. Simplify IT with device management, software access, and compliance monitoring, all from one dashboard. Enjoy timely payroll, real-time financial visibility, and dynamic spend policies. Rippling empowers your business to save time, reduce costs, and enhance efficiency, allowing you to focus on growth. Experience the power of unified management with Rippling today.Starting Price: $8 PEPM -
3
Shift
Shift Technologies Inc.
Shift is the first fully customizable browser that empowers you to make the most of your life online. Shift allows you to drag and drop apps, bars, and controls, to create a central hub that adapts to however you work. Sign into 1,500+ web apps, swap instantly between Spaces for work, side hustles or personal browsing, and stay logged into multiple accounts at once. In addition, Shift is proudly pioneering carbon-neutral browsing as part of its promise to reimagine what browsers can do—not only for users, but for the planet. Founded in 2016 in Victoria, British Columbia, Shift is a Certified B Corp within the Redbrick portfolio. Key capabilities & features - Build your browser: Create a custom layout for how you use the internet. - Create Spaces: Create separation between work, side hustles, and passion projects. - Integrate Apps: Add web apps to Shift to customize its capability. - Templates: Choose from 6 different layouts to build on.Starting Price: Free -
4
Cortex
Cortex
Cortex is the AI-powered Internal Developer Portal that helps engineering leaders build organizations that ship reliable, secure, and efficient software, faster. It uses AI to make sense of your engineering data, figure out the next unlock for your team, and solve it, all in one place. Trusted by high-performing engineering organizations, Cortex integrates seamlessly with existing tools to provide a centralized, actionable view of service health and ownership. • Within minutes, determine who owns each service with Cortex’s AI service ownership model across thousands of repositories. • Standardize golden paths using Workflows, enabling teams to scaffold new services & provision infrastructure in minutes. • Consistently uphold best practices and standards across your organization with automated Scorecards and targeted Initiatives. • Make informed, impactful actions based on real-time insights. -
5
Wiz
Wiz
Wiz is a new approach to cloud security that finds the most critical risks and infiltration vectors with complete coverage across the full stack of multi-cloud environments. Find all lateral movement risks such as private keys used to access both development and production environments. Scan for vulnerable and unpatched operating systems, installed software, and code libraries in your workloads prioritized by risk. Get a complete and up-to-date inventory of all services and software in your cloud environments including the version and package. Identify all keys located on your workloads cross referenced with the privileges they have in your cloud environment. See which resources are publicly exposed to the internet based on a full analysis of your cloud network, even those behind multiple hops. Assess the configuration of cloud infrastructure, Kubernetes, and VM operating systems against your baselines and industry best practices. -
6
CloudZero
CloudZero
CloudZero is the leader in proactive cloud cost efficiency. We enable engineers to build cost-efficient software without slowing down innovation. CloudZero's next-generation cloud cost optimization platform automates the collection, allocation, and analysis of cloud costs to uncover savings opportunities and improve unit economics. We are the only platform that enables companies to understand 100% of their operational cloud spend and take an engineering-led approach to optimizing that spend. CloudZero is used by industry leaders worldwide, such as Coinbase, Klaviyo, Miro, Nubank, and Rapid7. -
7
Orca Security
Orca Security
Designed for organizations operating in the cloud who need complete, centralized visibility of their entire cloud estate and want more time and resources dedicated to remediating the actual risks that matter, Orca Security is an agentless cloud Security Platform that provides security teams with 100% coverage their entire cloud environment. Instead of layering multiple siloed tools together or deploying cumbersome agents, Orca combines two revolutionary approaches - SideScanning, that enables frictionless and complete coverage without the need to maintain agents, and the Unified Data Model, that allows centralized contextual analysis of your entire cloud estate. Together, Orca has created the most comprehensive cloud security platform available on the marketplace. -
8
Criminal IP ASM
AI Spera
Criminal IP’s Attack Surface Management (ASM) is a threat-intelligence–driven platform that continuously discovers, inventories, and monitors every internet-connected asset associated with an organization, including shadow and forgotten resources, so teams see their true external footprint from an attacker’s perspective. The solution combines automated asset discovery with OSINT techniques, AI enrichment and advanced threat intelligence to surface exposed hosts, domains, cloud services, IoT endpoints and other Internet-facing vectors, capture evidence (screenshots and metadata), and correlate findings to known exploitability and attacker tradecraft. ASM prioritizes exposures by business context and risk, highlights vulnerable components and misconfigurations, and provides real-time alerts and dashboards to speed investigation and remediation.Starting Price: $89.08 per month -
9
Airlock Digital
Airlock Digital
Airlock Digital is an application control solution that enforces a Deny by Default security posture. It enables organizations to define trusted applications, scripts, libraries, and processes at a granular level using file hash, path, publisher, or parent process. Only those explicitly defined as trusted are allowed to execute. The platform supports Windows, macOS, and Linux systems, including legacy operating systems and operational technology (OT) environments. Airlock Digital includes allowlisting and blocklisting capabilities, integrated file reputation checks via VirusTotal, and detailed logging for audit and compliance. Exception management is supported through features such as rule-based overrides and time-bound One-Time Passwords (OTPs). Centralized policy management allows consistent enforcement across large and distributed environments. The platform is available as an on-premises deployment, in the cloud, or as a managed hosted service. -
10
StrongDM
StrongDM
StrongDM is a People-First Access platform that gives technical staff a direct route to the critical infrastructure they need to be their most productive. End users enjoy fast, intuitive, and auditable access to the resources they need, and administrators leverage simplified workflows to enhance security and compliance postures. - We open up a clear, direct path that gives individualized access to the right people and keeps everyone else out. - Total visibility into everything that’s ever happened in your stack. Security and Compliance teams can easily answer who did what, where, and when. - Admins have precise control over what each user has access to—without these controls ever getting in the way of productivity - IT, InfoSec, and Administrators have precise controls. Unauthorized access is eliminated because users never see resources they don’t have permission to use. -All past, present, and future infrastructure is supported - Responsive 24/7/365 customer support.Starting Price: $70/user/month -
11
Keeper Security
Keeper Security
Keeper Security is transforming the way people and organizations around the world secure their passwords and passkeys, secrets and confidential information. Keeper’s easy-to-use cybersecurity platform is built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Keeper’s solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance. Trusted by millions of individuals and thousands of organizations globally, Keeper is the leader for best-in-class password and passkey management, secrets management, privileged access, secure remote access and encrypted messaging. Protect what matters at KeeperSecurity.com.Starting Price: $2.00 per user, per month -
12
Polonious
Polonious Systems
Polonious is an ISO27001 certified secure, extremely flexible and highly configurable investigation workflow solution. The system includes features such as process centrism, workload management, reporting, dynamic dashboards, case reports, integrations and more. With our process and compliance focus, you can ensure your investigations are fully compliant with applicable regulations, with minimal extra effort or stress. With Polonious, you can run detailed reports on case outcomes, timeframes, and finances, and break that down across case types, investigators, and even down to investigation status. So you can prove your value up the chain, but you can also identify any problem areas and improve your efficiency.Starting Price: $75 AU per month -
13
Amazon Elastic Container Service (Amazon ECS) is a fully managed container orchestration service. Customers such as Duolingo, Samsung, GE, and Cook Pad use ECS to run their most sensitive and mission-critical applications because of its security, reliability, and scalability. ECS is a great choice to run containers for several reasons. First, you can choose to run your ECS clusters using AWS Fargate, which is serverless compute for containers. Fargate removes the need to provision and manage servers, lets you specify and pay for resources per application, and improves security through application isolation by design. Second, ECS is used extensively within Amazon to power services such as Amazon SageMaker, AWS Batch, Amazon Lex, and Amazon.com’s recommendation engine, ensuring ECS is tested extensively for security, reliability, and availability.
-
14
PagerDuty
PagerDuty
PagerDuty, Inc. (NYSE:PD) is a leader in digital operations management. In an always-on world, organizations of all sizes trust PagerDuty to help them deliver a perfect digital experience to their customers, every time. Teams use PagerDuty to identify issues and opportunities in real time and bring together the right people to fix problems faster and prevent them in the future. PagerDuty's ecosystem of over 350+ integrations, including Slack, Zoom, ServiceNow, AWS, Microsoft Teams, Salesforce, and more, enable teams to centralize their technology stack, get a holistic view of their operations, and optimize processes within their toolsets. -
15
GitGuardian
GitGuardian
GitGuardian is an end-to-end NHI security platform that empowers software-driven organizations to enhance their Non-Human Identity (NHI) security and comply with industry standards. With attackers increasingly targeting NHIs, such as service accounts and applications, GitGuardian integrates Secrets Security and NHI Governance. This dual approach enables the detection of compromised secrets across your dev environments while also managing non human identities and their secrets lifecycle. The platform supports over 450+ types of secrets, offers public monitoring for leaked data, and deploys honeytokens for added defense. Trusted by over 600,000 developers, GitGuardian is the choice of leading organizations like Snowflake, ING, BASF and Bouygues Telecom for robust secrets protection.Starting Price: $0 -
16
Campaign Monitor
Marigold
Turn customers into raving fans with Campaign Monitor by Marigold, a powerful email marketing and automation platform that offers the tools to help drive real, bottom line, business results. With Campaign Monitor, building email campaigns that convert is easy. Simply use Campaign Monitor's drag-and-drop email builder and choose from hundreds of beautiful and professionally-designed templates. The platform also comes with a wealth of tools for creating personalized customer journeys, creating smart segments, and building one-to-one relationships with every email subscriber.Starting Price: $9.00 per month -
17
Zoho One
Zoho
Replace your patchwork of cloud applications, legacy tools, and paper-based processes with one operating system for your entire business. Zoho One gives you one integrated system to transform your business' disparate activities into a more connected and agile organization. Increase productivity across your business, deliver better customer experiences, and much more. Collect leads in one place, close deals quickly, create quotes and invoices, sign contracts digitally, get paid, and track every key metric along the way. Close deals, manage contracts and projects, track and bill for time and expenses, and keep on schedule and on budget. Centralize all your customer data, create segments, send targeted campaigns and surveys at the right time, and track performance with executive dashboards.Starting Price: $45.00/month/user -
18
Zuplo
Zuplo
We’re reinventing API & MCP management for everybody, from startups to enterprises. Add authentication, analytics, rate-limiting, and developer documentation to your APIs and MCP servers in minutes. Protect your API by adding rate-limiting with Zuplo in minutes, and add over 50 available plugins like authentication to your API with a single click. Zuplo was built on the edge and deployed to +300 data centers in the world, which makes multi-cloud deployments first-class. With Zuplo you can run different workloads in different clouds while enforcing a unified set of security policies. Zuplo is the only API gateway that runs your OpenAPI spec directly. Leverage the OpenAPI ecosystem to build your API, and then deploy it to Zuplo without additional configuration. Zuplo automatically generates beautiful docs for your API. You can customize the docs with markdown and devs can self-serve API Keys directly from your docs. You can also directly generate hosted MCP servers from your OpenAPI.Starting Price: $0 per month -
19
Squadcast
Squadcast
Squadcast is an incident management tool that’s purpose-built for SRE. Create a blameless culture by reducing the need for physical war rooms, centralize SLO dashboards, unify internal and external SLIs and automate incident resolution and knowledge base creation with Squadcast Actions. Adopt world-class site reliability practices with a centralized SLO dashboard to view your system health. Anticipate incidents before they occur and respond proactively. The first step towards doing better incident management is adding enough context to incidents while they get detected. With Squadcast, discover everything you need, to take action and achieve best-in-class MTTD with highly configurable features like alert deduplication and tagging.Starting Price: Free -
20
threatYeti by alphaMountain
alphaMountain AI
threatYeti by alphaMountain, turns security professionals and hobbyists alike into a senior IP threat intelligence analysts with a browser-based platform that renders real-time threat verdicts for any domain, URL, or IP on the internet. With threatYeti, the risk posed by a domain is rendered instantly with a color-coded rating from 1.00 (low risk) to 10.00 (high risk). threatYeti also protects cyber threat analysts and their networks from risky sites. threatYeti’s no-click categorization presents sites into at least one out of 89 categories so that analysts don’t have to visit them and risk encountering objectionable material or downloading malware. threatYeti also displays related hosts, threat factors, passive DNS, certificates, redirect chains and more, giving analysts the full picture of any host. The result is faster, safer investigations that enable organizations to take conclusive action on domain and IP threats.Starting Price: $0 -
21
Barracuda Cloud Archiving Service
Barracuda
The Barracuda Cloud Archiving Service provides secure cloud-based archiving, enabling organizations to meet demanding compliance requirements and address e-discovery requests easily and effectively. Ideal for use with services such as Office 365 and G Suite, it uses the Barracuda Cloud to store data for as long as needed without risk of amendment or deletion. End user productivity is increased due to accessibility to every message ever sent or received from any device. The Barracuda Cloud Archiving Service integrates with Office 365, Exchange, and other email services to provide a complete cloud-based archive with no additional customer hardware or software required. A multi-functional add-in for Outlook, mobile apps for iOS and Android, and a dedicated web interface enable end users to retrieve and restore any message ever sent or received, even if deleted from the mail server. -
22
Carbon Black EDR
Broadcom
Carbon Black Endpoint Detection and Response (EDR) by Broadcom offers a comprehensive solution for detecting, investigating, and responding to cybersecurity threats on endpoints. It utilizes advanced behavioral analysis and machine learning to identify suspicious activities in real time, providing security teams with actionable insights to prevent data breaches and mitigate risks. With its cloud-based architecture, Carbon Black EDR enables continuous monitoring, visibility into endpoint activity, and automated threat response. It’s designed to support organizations of all sizes by improving threat detection, reducing investigation time, and enhancing overall endpoint security. -
23
SIRP
SIRP
SIRP is a no-code risk-based SOAR platform that connects everything security teams need to ensure consistently strong outcomes into a single, intuitive platform. SIRP empowers Security Operations Centers (SOCs), Incident Response (IR) teams, Threat Intelligence teams, and Vulnerability Management (VM) teams through integration of security tools and powerful automation and orchestration tools. SIRP is a no-code SOAR platform with a built-in security scoring engine. The engine calculates real-world risk scores that are specific to your organization for every incident, alert, and vulnerability. This granular approach enables security teams to map risks to individual assets and prioritize response at scale. SIRP makes all security tools and functions available to security teams at the push of a button, saving thousands of hours each year. Design and enforce best practice security processes using SIRP’s intuitive drag-and-drop playbook building module. -
24
Cloudaware
Cloudaware
Cloudaware is a cloud management platform with such modules as CMDB, Change Management, Cost Management, Compliance Engine, Vulnerability Scanning, Intrusion Detection, Patching, Log Management, and Backup. Cloudaware is designed for enterprises that deploy workloads across multiple cloud providers and on-premises. Cloudaware integrates out-of-the-box with ServiceNow, New Relic, JIRA, Chef, Puppet, Ansible, and over 50 other products. Customers deploy Cloudaware to streamline their cloud-agnostic IT management processes, spending, compliance and security.Starting Price: $0.008/CI/month -
25
Fidelis Halo
Fidelis Security
Fidelis Halo is a unified, SaaS-based cloud security platform that automates cloud computing security controls and compliance across servers, containers, and IaaS in any public, private, hybrid, and multi-cloud environment. With over 20,000 pre-configured rules and more than 150 policy templates that cover standards such as PCI, CIS, HIPAA, SOC, and DISA STIGs for IaaS services, Halo’s extensive automation capabilities streamline and accelerate workflows between InfoSec and DevOps. The comprehensive, bi-directional Halo API, developer SDK, and toolkit automate your security and compliance controls into your DevOps toolchain to identify critical vulnerabilities so they can be remediated prior to production. The free edition of Halo Cloud Secure includes full access to the Halo Cloud Secure CSPM service for up to 10 cloud service accounts across any mix of AWS, Azure, and GCP, at no cost to you, ever. Sign up now and start your journey to fully automated cloud security!Starting Price: Free -
26
Box Shield
Box
Shield lets you classify content your way, both manually and automatically. We're excited to announce our powerful, native capability that identifies PII and custom terms within files, and automatically classifies them based on your policies — helping you protect your data at scale. Placing controls close to your content helps prevent leaks in real time, while powering a frictionless end-user experience. Configure access policies within minutes to keep your data secure while letting people do their mission-critical work. Using machine learning, Shield brings you timely, accurate alerts on insider threats, account compromise, and malware attacks. Quickly evaluate alerts in Shield, or send them to your existing tools for further analysis. Shield works with the best-of-breed security tools you already have in place. Alerts containing more insights than ever before can be integrated with your SIEM and CASB for a unified view.Starting Price: $130 per month -
27
Edge Delta
Edge Delta
Edge Delta is a new way to do observability that helps developers and operations teams monitor datasets and create telemetry pipelines. We process your log data as it's created and give you the freedom to route it anywhere. Our primary differentiator is our distributed architecture. We are the only observability provider that pushes data processing upstream to the infrastructure level, enabling users to process their logs and metrics as soon as they’re created at the source. We combine our distributed approach with a column-oriented backend to help users store and analyze massive data volumes without impacting performance or cost. By using Edge Delta, customers can reduce observability costs without sacrificing visibility. Additionally, they can surface insights and trigger alerts before data leaves their environment.Starting Price: $0.20 per GB -
28
Contrast Security
Contrast Security
Modern software development must match the speed of the business. But the modern AppSec tool soup lacks integration and creates complexity that slows software development life cycles. Contrast simplifies the complexity that impedes today’s development teams. Legacy AppSec employs a one-size-fits-all vulnerability detection and remediation approach that is inefficient and costly. Contrast automatically applies the best analysis and remediation technique, dramatically improving efficiencies and efficacy. Separate AppSec tools create silos that obfuscate the gathering of actionable intelligence across the application attack surface. Contrast delivers centralized observability that is critical to managing risks and capitalizing on operational efficiencies, both for security and development teams. Contrast Scan is pipeline native and delivers the speed, accuracy, and integration demanded by modern software development.Starting Price: $0 -
29
Panoptica
Cisco
Panoptica makes it easy to secure your containers, APIs, and serverless functions, and manage software bills of materials. It analyzes internal and external APIs and assigns risk scores. Your policies govern which API calls the gateway permits or disables. New cloud-native architectures allow teams to develop and deploy software more quickly, keeping up with the pace of today’s market. But this speed can come with a cost—security. Panoptica closes the gaps by integrating automated, policy-based security and visibility into every stage of the software-development lifecycle. Decentralized cloud-native architectures have significantly increased the number of attack surfaces. At the same time, changes in the computing landscape have raised the risk of catastrophic security breaches. Here are some of the reasons why comprehensive security is more important than ever before. You need a platform that protects the entire application lifecycle—from development to runtime.Starting Price: $0 -
30
Dasera
Dasera
Dasera is a Data Security Posture Management (DSPM) platform providing automated security and governance controls for structured and unstructured data across cloud and on-prem environments. Uniquely, Dasera monitors data in use while offering continuous visibility and automated remediation, preventing data breaches across the entire data lifecycle. Dasera provides continuous visibility, risk detection, and mitigation to align with business goals while ensuring seamless integration, unmatched security, and regulatory compliance. Through its deep understanding of the four data variables - data infrastructure, data attributes, data users, and data usage - Dasera promotes a secure data-driven growth strategy that minimizes risk and maximizes value, giving businesses a competitive edge in today's rapidly evolving digital landscape.Starting Price: 3 data stores at $20,000 -
31
Feroot
Feroot Security
Feroot Security is a global leader in AI-powered website compliance and security. Feroot AI protects websites and web applications from hidden threats while enforcing compliance with PCI DSS 4.0.1, HIPAA rules on online tracking technologies, CCPA/CPRA, GDPR, CIPA, and 50+ laws and standards. The Feroot AI Platform replaces manual compliance work with continuous automation, delivering real-time protection and audit-ready evidence in minutes. Feroot unifies JavaScript behavior analysis, web compliance scanning, third-party script monitoring, consent enforcement, and data privacy posture management to stop Magecart, formjacking, and unauthorized tracking. Trusted by enterprises, healthcare providers, retailers, SaaS platforms, payment service providers, and public sector organizations. Feroot AI solutions include PaymentGuard AI, HealthData Shield AI, AlphaPrivacy AI, CodeGuard AI, and MobileGuard AI. Visit feroot for more information. -
32
Split
Harness
In a world where product development teams are pressured to do more with less, Split’s Feature Data Platform™ gives you the confidence to move fast without breaking things. Set up feature flags and safely deploy to production, controlling who sees which features and when. Connect every flag to contextual data, so you know if your features are making things better or worse, and act without hesitation. Effortlessly conduct feature experiments like A/B tests without slowing down. Split is a feature management platform that takes the extra step with experts to support you, online courses to help you learn as you go, and a developer-oriented culture that puts our customers at the center. Whether you’re looking to increase your releases, to decrease your MTTR, or to ignite your dev team without burning them out–Change the way the work gets done with Split. Switch on a free account today, schedule a demo to learn more, or contact us for further questions. -
33
SOC Prime Platform
SOC Prime
SOC Prime operates the world’s largest and most advanced platform for collective cyber defense that cultivates collaboration from a global cybersecurity community and curates the most up-to-date Sigma rules compatible with over 28 SIEM, EDR, and XDR platforms. SOC Prime’s innovation, backed by the vendor-agnostic and zero-trust cybersecurity approach, and cutting-edge technology leveraging Sigma language and MITRE ATT&CK® as core pillars are recognized by the independent research companies, credited by the leading SIEM, XDR & MDR vendors, and trusted by 8,000+ organizations from 155 countries, including 42% of Fortune 100, 21% of Forbes Global 2000, 90+ public sector institutions, and 300+ MSSP and MDR providers. Driven by its advanced cybersecurity solutions, Threat Detection Marketplace, Uncoder AI, and Attack Detective, SOC Prime enables organizations to risk-optimize their cybersecurity posture while improving the ROI of their SOC investments. -
34
IRONSCALES
IRONSCALES
IRONSCALES Fights Phishing For You Our self-learning, AI-driven email security platform continuously detects and remediates advanced threats like BEC, credential harvesting, account takeover and more in your company’s mailboxes. FAST! Not All Email Security Solutions are Equal Defending against today’s advanced threats requires a new approach to email security. IRONSCALES’ best-in-class email security platform is powered by AI, enhanced by thousands of customer security teams and is built to detect and remove threats in the inbox. We offer a service that is fast to deploy, easy to operate and is unparalleled in the ability to stop all types of email threats, including advanced attacks like BEC, ATO and more.Starting Price: $4.50 per user per month -
35
Vanta
Vanta
Thousands of fast-growing companies trust Vanta to help build, scale, manage and demonstrate their security and compliance programs and get ready for audits in weeks, not months. By offering the most in-demand security and privacy frameworks such as SOC 2, ISO 27001, HIPAA, and many more, Vanta helps companies obtain the reports they need to accelerate growth, build efficient compliance processes, mitigate risks to their business, and build trust with external stakeholders. Simply connect your existing tools to Vanta, follow the prescribed guidance to fix gaps, and then work with a Vanta-vetted auditor to complete audit. -
36
Teamstack
Teamstack
Never compromise security for convenience, choose both. Grow your team seamlessly by automating identity management for your web, mobile and legacy apps. Take efficiency to another level by integrating day-to-day applications with our identity management platform and enable employees, contractors and customers to work together seamlessly. Take advantage of pre-built integrations, Single Sign-On and one-click user provisioning and allow your team to conveniently sign in to any application passwordless with multi-factor authentication. Your workforce deserves easy access to your applications — whether they are cloud-based, custom-built or even integrated on-premise. High standards in identity management should not be limited to Fortune 500s — gain access to best-in-class security and accessibility features that protect your business, boost your efficiency and save valuable time. Whenever an employee tries to access a cloud app his login is now compliant with our access policies.Starting Price: $3 per user per month -
37
AWS IoT SiteWise
Amazon
AWS IoT SiteWise is a managed service that makes it easy to collect, store, organize, and monitor data from industrial equipment at scale to help you make better, data-driven decisions. You can use AWS IoT SiteWise to monitor operations across facilities, quickly compute common industrial performance metrics, and create applications that analyze industrial equipment data to prevent costly equipment issues and reduce gaps in production. This allows you to collect data consistently across devices, identify issues with remote monitoring more quickly, and improve multi-site processes with centralized data. Today, getting performance metrics from industrial equipment is challenging because data is often locked into proprietary on-premises data stores and typically requires specialized expertise to retrieve and place in a format that is useful for analysis. AWS IoT SiteWise simplifies this process by providing software running on a gateway that resides in your facilities.Starting Price: $0.00041667 -
38
Fleet
Fleet Device Management
Ask questions about your servers, and laptops. Whatever their operating system, wherever they live. Track and segment your enrolled hosts. Search by important details, and zoom in on individual targets. Collect and share useful information for ops teams, security teams, help desk, and more. Fleet is self-hosted and self-managed, and can be run within your own data centers or in the cloud. Write scripts with fleetctl and design scheduled queries to integrate alerts and dashboards across your enterprise.Starting Price: $4 per host per month -
39
OpenReplay
OpenReplay
Open-source session replay suite, built for developers and self-hosted for full control over your data. Understand every issue, as if it happened in your own browser. Look under the hood, while watching your users. Everything developers need to fix what's broken. One platform to replay sessions, understand issues, monitor your web app, and assist your customers. Relive your user's experience. Feel their struggle, uncover hidden issues and build stellar experiences. A full-featured session replay suite you can self-host, so your customer data never leaves your infrastructure. No more sharing of your data with 3rd parties. Have full control over what's captured. Stop wasting time on lengthy compliance and security checks. Fine-grained privacy features for sanitizing user data. Host your session replay tool yourself and stop sending data to third parties. Not a big fan of self-deployments? Use our cloud and get started in minutes.Starting Price: $3.95 per month -
40
InsightFinder
InsightFinder
InsightFinder Unified Intelligence Engine (UIE) platform provides human-centered AI solutions for identifying incident root causes, and predicting and preventing production incidents. Powered by patented self-tuning unsupervised machine learning, InsightFinder continuously learns from metric time series, logs, traces, and triage threads from SREs and DevOps Engineers to bubble up root causes and predict incidents from the source. Companies of all sizes have embraced the platform and seen that business-impacting incidents can be predicted hours ahead with clearly pinpointed root causes. Survey a comprehensive overview of your IT Ops ecosystem, including patterns, trends, and team activities. Also view calculations that demonstrate overall downtime savings, cost of labor savings, and number of incidents resolved.Starting Price: $2.5 per core per month -
41
Indent
Indent
Good security is necessary, but it doesn't need to be slow or painful, faster access unlocks more revenue. Give on-demand access that’s faster and easier, without frustrating your team. Users request access to apps, managers approve or deny them from Slack, and it's all auditable. End the process of manually cat herding approvals. Every time access is granted, it's a potential security risk. Indent helps teams scale security and least privilege by shifting users to temporary access without slowing down. Automate spreadsheet-based workflows needed for SOC 2, SOX, ISO, and HITRUST with controls and policies baked directly into access request workflows. Only provide access when it's needed instead of issuing permanent access, reducing your license footprint. Indent delivers cost savings without adding friction for end users. When you’re leading a fast-growing company toward success, your team needs to take big risks to deliver big returns.Starting Price: $8 per month -
42
Zenduty
Zenduty
Zenduty’s end-to-end incident alerting, on-call management and response orchestration platform helps you institutionalize reliability into your production operations. Get a single pane of glass view of the health of all your production operations. Respond to incidents 90% faster and resolve them 60% faster. Deploy customized and data-driven on-call rotations to ensure 24/7 operational coverage for major incidents. Deploy industry-leading incident response procedures and resolve incidents faster through effective task delegation and collaborative triaging. Bring your playbooks automatically into your incidents. Log incident tasks and action items for productive postmortems and future incidents. Suppress noisy alerts so that your engineers and support staff are focused on the alerts that matter. Over 100+ integrations with all your APMs, log monitoring, error monitoring, server monitoring, ITSM, Support, and security services.Starting Price: $5 per month -
43
Parny
Parny
Get AI recommendations for your alerts. It can generate recommendations for your alert based on the persona selected. Ask Parny AI has three personas, DevOps engineer, senior developer and database administrator. Our personas are trained to provide the best recommendations for your alerts. You can easily add your team members to the on-call team member list. Always alert the right person at the right time. Share on-call responsibility across your team with on-call schedules and automatic escalations. We support engineering teams to be more proactive, resolve incidents faster and deliver a seamless operations experience. Get custom analytics for your organization, teams, services and users. Always be up to date with your performance and improve your organization's efficiency.Starting Price: $7 per month -
44
Dropzone AI
Dropzone AI
Dropzone AI replicates the techniques of elite analysts and autonomously investigates every alert. Our specialized AI agent autonomously performs end-to-end investigations and will cover 100% of your alerts. Trained to replicate the investigation techniques of best-in-class SOC analysts, its reports are fast, detailed and accurate. You can also go deeper with its chatbot. Dropzone’s cybersecurity reasoning system, purpose-built on top of advanced LLMs, runs a full end-to-end investigation tailored for each alert. Its security pre-training, organizational context understanding and guardrails make it highly accurate. Dropzone then generates a full report, with the conclusion, executive summary, and full insights in plain English. You can also converse with its chatbot for ad-hoc inquiries.Starting Price: $36,000/year -
45
Stream Security
Stream Security
Stay ahead of exposure risks & threat actors with real-time detection of config change impacts and automated threat investigations fused to posture and all activities. Track all changes, and detect critical exposure and toxic combinations before attackers do. Leverage AI to effectively address and fix issues using your preferred methods. Utilize any of your preferred SOAR tools to respond in real time or use our suggested code snippets. Harden and prevent external exposure & lateral movement risks, focus on risks that are truly exploitable. Detect toxic combinations of posture and vulnerabilities. Detect gaps from segmentation intent and implement zero-trust. Answer any cloud-related question fast with context. Maintain compliance, and prevent deviation from taking hold. We integrate with your existing investment. We can share more about our security policies and work with your security teams to deliver any specific requirements for your organization.Starting Price: $8,000 per year -
46
Beeceptor
Beeceptor
Beeceptor is a high-performance, no-code platform that eliminates development bottlenecks through instant API mocking and real-time traffic inspection. Don't wait for backend teams to deploy; spin up a named subdomain in seconds and start integrating immediately. Key Capabilities: - Multi-Protocol Support: Simulate REST, SOAP, GraphQL, and gRPC endpoints without writing server-side code. - AI-Powered Mocking: Use AI to generate realistic, contextually relevant test data or import OpenAPI/Swagger for CRUD-ready mocks. - Chaos Engineering: Test "unhappy paths" by simulating latencies, timeouts, and rate limits. - Local Tunneling & Proxying: Expose localhost via HTTPS and inspect live webhooks or mobile traffic in real-time. Decouple your frontend and mobile teams, stabilize CI/CD by removing third-party dependencies, and go from API design to functional mock in minutes. Beeceptor scales from solo devs to enterprise-grade integration testing.Starting Price: $10 per month -
47
Zoho Directory
Zoho
Zoho Directory is a cloud-based identity and access management platform designed to streamline authentication, authorization, and user management for organizations. It offers Single Sign-On (SSO) capabilities, allowing employees to access multiple applications with a single set of credentials, thereby enhancing security and user convenience. The platform supports Multi-Factor Authentication (MFA), adding an extra layer of protection against unauthorized access. Device authentication ensures secure access to both applications and devices, enabling employees to use the same credentials across platforms. Zoho Directory also provides robust provisioning features, allowing IT administrators to create and manage user profiles across various applications directly from the platform, reducing the time spent on repetitive tasks. Integration with existing directories, such as Microsoft Active Directory and Azure AD, is facilitated through directory stores.Starting Price: $1.70/user/month -
48
Tracetest
Tracetest
Tracetest is an open source testing tool that enables developers to create and run end-to-end and integration tests by leveraging OpenTelemetry traces. It allows users to validate not only the final outcomes but also every step in the workflow, ensuring that each component in a distributed system behaves as expected. Tracetest integrates seamlessly with existing testing tools like Cypress, Playwright, k6, and Postman, enhancing testability and visibility without requiring code changes. By utilizing trace data, Tracetest helps identify issues such as incorrect service interactions or performance bottlenecks that might not be apparent with traditional testing methods. It supports integration with various observability solutions and can be incorporated into CI/CD pipelines for continuous testing. Tracetest also offers synthetic monitoring capabilities, allowing for proactive detection of performance issues before they impact users.Starting Price: Free -
49
Barracuda SSL VPN
Barracuda
Your army of road warriors and remote workers require a quick, flexible, reliable and completely secure way to connect to your internal enterprise applications, information and network resources. They want to do this from anywhere in the world, at any time and from any suitable device. The Barracuda SSL VPN provides the security and connectivity to deliver this access, via a web browser or virtually any mobile device. The Barracuda SSL VPN makes it easy for remote users to access internal applications and files. Unlike traditional VPN technologies, the Barracuda SSL VPN does not require any additional client software or complicated settings. Logging in from home or the road requires only a web browser and Internet connection. Upon login, users are presented with a portal of internal web applications or file shares. More advanced applications like Remote Desktop Services or Citrix XenApp are available to users running Java. -
50
OverOps
OverOps
OverOps instantly pinpoints at runtime why critical issues break backend Java and .NET applications, eliminating the detective-work of searching logs to reproduce critical errors. Unlike logs, static testing, and APM, that require foresight, OverOps analyzes code at runtime. OverOps requires no code changes, integrates into your existing CI/CD tooling, and does so continuously, from pre-prod through production.Starting Price: $250/user/month