10 Integrations with Google Cloud Armor
View a list of Google Cloud Armor integrations and software that integrates with Google Cloud Armor below. Compare the best Google Cloud Armor integrations as well as features, ratings, user reviews, and pricing of software that integrates with Google Cloud Armor. Here are the current Google Cloud Armor integrations in 2026:
-
1
Google Cloud Platform
Google
Google Cloud is a cloud-based service that allows you to create anything from simple websites to complex applications for businesses of all sizes. New customers get $300 in free credits to run, test, and deploy workloads. All customers can use 25+ products for free, up to monthly usage limits. Use Google's core infrastructure, data analytics & machine learning. Secure and fully featured for all enterprises. Tap into big data to find answers faster and build better products. Grow from prototype to production to planet-scale, without having to think about capacity, reliability or performance. From virtual machines with proven price/performance advantages to a fully managed app development platform. Scalable, resilient, high performance object storage and databases for your applications. State-of-the-art software-defined networking products on Google’s private fiber network. Fully managed data warehousing, batch and stream processing, data exploration, Hadoop/Spark, and messaging.Starting Price: Free ($300 in free credits) -
2
Elastic Observability
Elastic
Rely on the most widely deployed observability platform available, built on the proven Elastic Stack (also known as the ELK Stack) to converge silos, delivering unified visibility and actionable insights. To effectively monitor and gain insights across your distributed systems, you need to have all your observability data in one stack. Break down silos by bringing together the application, infrastructure, and user data into a unified solution for end-to-end observability and alerting. Combine limitless telemetry data collection and search-powered problem resolution in a unified solution for optimal operational and business results. Converge data silos by ingesting all your telemetry data (metrics, logs, and traces) from any source in an open, extensible, and scalable platform. Accelerate problem resolution with automatic anomaly detection powered by machine learning and rich data analytics.Starting Price: $16 per month -
3
IntelliPay
Convenient Brands
IntelliPay — Cloud-Based Payment Processing & Recurring Billing. PCI DSS Level 1-certified payment platform for SaaS, subscription, healthcare, government, and service-based businesses. Operating since 2004, IntelliPay processes billions annually across thousands of U.S. organizations. Features: Online, virtual, EMV, mobile, ACH/eCheck, recurring billing, installment plans, text-to-pay, IVR, kiosk, and custom branded payment portals — all from one dashboard. No-Cost Processing: Keep 100% of every sale by shifting card fees to the cardholder via dual pricing, surcharging, or convenience fee models. Traditional processing also available. Integrations: REST API, QuickBooks Online, and prebuilt plugins for most platforms. Why IntelliPay: 20+ years in payments 70+ years combined team experience Google Cloud-hosted, end-to-end encryption Transparent interchange-plus pricing, no hidden fees U.S.-based support -
4
Beats
Elastic
Beats is a free and open platform for single-purpose data shippers. They send data from hundreds or thousands of machines and systems to Logstash or Elasticsearch. Beats are open source data shippers that you install as agents on your servers to send operational data to Elasticsearch. Elastic provides Beats for capturing data and event logs. Beats can send data directly to Elasticsearch or via Logstash, where you can further process and enhance the data, before visualizing it in Kibana. Want to get up and running quickly with infrastructure metrics monitoring and centralized log analytics? Try out the Metrics app and the Logs app in Kibana. For more details, see Analyze metrics and Monitor logs. Whether you’re collecting from security devices, cloud, containers, hosts, or OT, Filebeat helps you keep the simple things simple by offering a lightweight way to forward and centralize logs and files.Starting Price: $16 per month -
5
Kroll Cyber Risk
Kroll
We are the world incident response leader. Merging complete response capabilities with frontline threat intelligence from over 3000 incidents handled per year and end-to-end expertise we protect, detect and respond against cyberattacks. For immediate assistance, contact us today. Tackle every facet of today and tomorrow’s threat landscape with guidance from Kroll’s Cyber Risk experts. Enriched by frontline threat intel from 3000+ incidents cases every year, our end-to-end cyber risk solutions help organizations uncover exposures, validate the effectiveness of their defenses, implement new or updated controls, fine-tune detections and confidently respond to any threat. Get access to a wide portfolio of preparedness, resilience, detection and response services with a Kroll Cyber Risk retainer. Get in touch for more info. -
6
TrustCloud
TrustCloud Corporation
Don’t struggle with 1000s of vulnerability smoke signals from your security tools. Aggregate feeds from your cloud, on-premises, and bespoke apps, and combine them with feeds from your security tools, to continuously measure the control effectiveness and operational status of your entire IT environment. Map control assurance to business impact to assess which gaps to prioritize and remediate. Use AI and API-driven automation to accelerate and simplify first-party, third-party, and nth-party risk assessments. Automate document analysis and receive contextual, reliable information. Run frequent, programmatic risk assessments on all your internal and third-party applications to eradicate the risk of one-time or point-in-time evaluations. Take your risk register from manual spreadsheets to programmatic, predictive risk assessments. Monitor and forecast your risks in real-time, enable IT risk quantification to prove financial impact to the board, and prevent risk instead of managing it. -
7
Google Cloud Endpoints
Google
Develop, deploy, protect, and monitor your APIs with Cloud Endpoints. An NGINX-based proxy and distributed architecture give unparalleled performance and scalability. Using an OpenAPI Specification or one of our API frameworks, Cloud Endpoints gives you the tools you need for every phase of API development and provides insight with Cloud Logging, Cloud Monitoring, and Cloud Trace. Control who has access to your API and validate every call with JSON Web Tokens and Google API keys. Integration with Auth0 and Firebase Authentication lets you identify the users of your web or mobile application. Extensible Service Proxy delivers security and insight in less than 1 ms per call. Deploy your API automatically with App Engine and Google Kubernetes Engine, or add our proxy container to your Kubernetes deployment. Monitor critical operations metrics in Google Cloud Console, and gain insight into your users and usage with Cloud Trace, Cloud Logging, and BigQuery. -
8
Panaseer
Panaseer
Panaseer’s continuous controls monitoring platform sits above the tools and controls within your organisation. It provides automated, trusted insight into the security and risk posture of the organisation. We create an inventory of all entities across your organisation (devices, apps, people, accounts, databases). The inventory highlights assets missing from different sources and where security controls are missing from assets. The platform equips you with metrics and measures to understand your security and compliance status at any level. The platform ingests data from any source in the cloud or on-premises, across security, IT and business domains through out-of-the-box data connectors. It uses entity resolution to clean, normalise, aggregate, de-duplicate and correlate this data, creating a continuous feed of unified asset and controls insights across devices, applications, people, databases and accounts. -
9
Project Shield
Project Shield
Project Shield, created by Google Cloud and Jigsaw and powered by Google Cloud Armor, provides free unlimited protection against DDoS attacks, a type of digital attack used to censor information by taking websites offline. Project Shield filters out malicious traffic using Google's infrastructure and DDoS tools. If your website is targeted by a DDoS attack, our servers will block attacking traffic to keep your website up and running. Project Shield can be configured to fetch content from your website's servers once and serve a cached copy on subsequent requests. This reduces traffic to your servers and absorbs potential DDoS attacks. Project Shield caches content to strengthen DDoS defenses, improve site performance, and save bandwidth to sites. Users have the ability to invalidate caches for their site's needs. Project Shield provides controls such as JavaScript cookies and IP denylists for increased site protection. -
10
ZARUS
Maiora
ZARUS is Maiora’s end-to-end No-Code/Low-Code Data Infrastructure Platform designed to help enterprises integrate, govern, transform, visualise, and observe data seamlessly across cloud, on-premises, and legacy systems. Built for speed, scalability, and compliance, ZARUS eliminates data silos, streamlines workflows, and enables organisations to unlock real-time, AI-ready insights without the burden of high-code development or multiple toolchains. With pre-built connectors, advanced data quality management, observability dashboards, and secure governance frameworks, ZARUS empowers CIOs, CTOs, CDOs, and CFOs to make faster, smarter decisions while reducing operational complexity and costs.
- Previous
- You're on page 1
- Next