Free node based Workflow Automation Tool. Easily automate tasks across different services. It can be easily extended and self-hosted.
Tines is an intelligent workflow platform that powers the world’s most important workflows. IT and security teams of all sizes, from Fortune 50 to startups, trust Tines for everything from phishing response, vulnerability and patch management, software lifecycle management, employee lifecycle management, and everything in between. Leaders across a wide array of industries –including Canva, Databricks, Elastic, Kayak, Intercom, and McKesson– use Tines AI-powered workflows to operate more effectively, mitigate risk, reduce tech debt, and do the work that matters most. Our workflow platform gives teams of any skillset (the most technical to your least technical) the tools to orchestrate, automate, and integrate your people, processes, and technology.
Sumo Logic enables enterprises to build analytical power that transforms daily operations into intelligent business decisions
Microsoft Azure Sentinel is a cloud-native SIEM that provides intelligent security analytics for your entire enterprise, powered by AI.
Google Security Operations is a modern, cloud-native SecOps platform that empowers security teams to better defend against today’s and tomorrow’s threats. It’s designed to serve as the workbench for security operations (SOC) teams tasked with detecting, investigating and responding to cyber threats across their hybrid environment.
Make is a visual platform for anyone to design, build, and automate anything—from tasks and workflows to apps and systems—without coding. Whether you’re integrating sales and marketing tools, automating a customer journey, improving business operations, or building a custom back-end system—creating on Make is powerful, intuitive, and playful.
SIRP Security orchestration and automation platform helps you improve response time, reduce risk exposure, and maintain consistency of your process across your security program.
Automate your malware analysis. Get answers quickly about any suspicious file, URL, endpoint or memory dump.
Harness the full power of your existing security investments with security orchestration, automation and response. With Splunk Phantom, execute actions in seconds not hours.