Business Software for AWS Marketplace

Top Software that integrates with AWS Marketplace

  • 1
    MediaWiki Reviews
    MediaWiki serves as a collaborative platform for documentation, supported by an active community of contributors. This robust software is utilized by countless websites and numerous organizations, including powering Wikipedia and various other sites. MediaWiki facilitates the collection and organization of knowledge, making it accessible to a wide audience. It is a powerful tool that is multilingual, open-source, customizable, reliable, and available at no cost. You can explore its features to determine if MediaWiki is suitable for your needs. Setting up and managing MediaWiki involves downloading, installing, and configuring the software, and you can enhance its capabilities by adding various extensions. If you encounter any issues, you can refer to the Errors and Symptoms section or the FAQ for assistance. For those without server access, there are hosting services available, as well as options for professional development and consulting. You can join the MediaWiki Stakeholders user group for additional support. Resources are available to help you navigate the platform, edit pages, and personalize your experience, alongside guidance on developing and extending the code. If you're new to coding, there are introductory resources to get you started in development. With a wealth of tools and community support, MediaWiki empowers users to share and expand knowledge effectively.
  • 2
    ecoTimer Reviews

    ecoTimer

    ecompute

    $1.50 per month
    IT business management products that reduce hosting costs and CO2 emissions. How to save time and money on your instances. You can save computing time by scheduling timers for each instance every day. AWS (using 100% renewable electricity) emits 84 grams of CO2 per hour. Instead, data center-servers using non-green electricity emit 84 grams. You can restrict access to limit the availability of your instances and services. All products and pricings include features. Running. A unique list of all instances that are running in different regions. ecoTimer for your servers ecoTimer allows you to save money and reduce your environmental impact by only using your computing servers when you need them. To save computing resources, you can view all instances in one list. Example: The Development team works Monday through Friday from 9:00 to 17:00. This team saves 512 hours per month for each server they use.
  • 3
    FreeSWITCH Reviews
    Everything essential for engaging with the FreeSWITCH platform is provided here. FreeSWITCH serves as a Software Defined Telecom Stack, facilitating the shift from traditional telecom switches to a flexible software solution that can operate on any standard hardware, whether it’s a Raspberry PI or a powerful multi-core server, thus unleashing the telecommunications capabilities of various devices. When paired with our cloud platform, SignalWire, FreeSWITCH can connect seamlessly to external networks and adapt to any scale of operation. To simplify your initiation, a pre-configured virtual machine come complete with comprehensive written and video tutorials, allowing you to get started quickly—just install VirtualBox and you will be set up in no time. For those with advanced programming skills, there are detailed instructions available to compile FreeSWITCH from source or explore other manual installation methods. Additionally, if you have a Debian instance available, you can find thorough guidance on how to install our packages from the provided link, ensuring versatility in your approach to utilizing FreeSWITCH. This platform truly empowers both beginners and seasoned developers alike, making telecommunications more accessible than ever.
  • 4
    Swarm Reviews
    The latest iterations of Docker feature swarm mode, which allows for the native management of a cluster known as a swarm, composed of multiple Docker Engines. Using the Docker CLI, one can easily create a swarm, deploy various application services within it, and oversee the swarm's operational behaviors. The Docker Engine integrates cluster management seamlessly, enabling users to establish a swarm of Docker Engines for service deployment without needing any external orchestration tools. With a decentralized architecture, the Docker Engine efficiently manages node role differentiation at runtime rather than at deployment, allowing for the simultaneous deployment of both manager and worker nodes from a single disk image. Furthermore, the Docker Engine adopts a declarative service model, empowering users to specify the desired state of their application's service stack comprehensively. This streamlined approach not only simplifies the deployment process but also enhances the overall efficiency of managing complex applications.
  • 5
    Privacera Reviews
    Multi-cloud data security with a single pane of glass Industry's first SaaS access governance solution. Cloud is fragmented and data is scattered across different systems. Sensitive data is difficult to access and control due to limited visibility. Complex data onboarding hinders data scientist productivity. Data governance across services can be manual and fragmented. It can be time-consuming to securely move data to the cloud. Maximize visibility and assess the risk of sensitive data distributed across multiple cloud service providers. One system that enables you to manage multiple cloud services' data policies in a single place. Support RTBF, GDPR and other compliance requests across multiple cloud service providers. Securely move data to the cloud and enable Apache Ranger compliance policies. It is easier and quicker to transform sensitive data across multiple cloud databases and analytical platforms using one integrated system.
  • 6
    VeChain Reviews
    The public blockchain generates its value through the contributions of its community members, tackling genuine economic challenges in the real world. With the introduction of BlockRef and Expiration transaction fields, users gain the ability to define when a transaction should be executed or deemed expired if it remains unconfirmed in a block. Additionally, the system supports various transaction fee delegation models, such as Multi-party Payment and Designated Gas Payer, which facilitate a seamless freemium approach for decentralized applications, thus allowing for easier user onboarding. Developers can also leverage multi-function atomic transactions to combine multiple payments and contract function calls into a single transaction while controlling their execution order. By establishing dependencies, the system ensures that transactions with specified prerequisites will only be executed after the required conditions are met, enhancing overall efficiency and reliability in business operations. This technology not only streamlines processes but also fosters innovation within the ecosystem as developers can create more complex and interrelated functionalities.
  • 7
    MONITORAPP AIWAF Reviews
    AIWAF, the Web Application Firewall from MONITORAPP, is designed to combat the growing number of web-based security threats. With most security breaches occurring online, having a robust web firewall is vital for protection against various types of attacks. AIWAF provides strong defense mechanisms tailored specifically to counteract these web threats. In today's digital landscape, web security is not just an option but a necessity due to the inherent vulnerabilities of the internet. The nature of HTTP/HTTPS traffic means these ports must remain accessible to users, which unfortunately also opens up avenues for potential attacks. AIWAF focuses on detecting hacking attempts by analyzing traffic patterns and managing server access effectively. As cyber threats continue to evolve, generating malicious traffic or manipulating request data, it is crucial for a WAF to adapt continuously to new attack methods. MONITORAPP’s AIWAF stands out by utilizing patented adaptive profiling technology combined with a comprehensive threat intelligence system, ensuring effective blocking of web attacks. This makes AIWAF an essential tool for organizations looking to safeguard their online presence against ever-changing security threats.
  • 8
    MONITORAPP AISWG Reviews
    The AISWG, or Advanced Intelligent Secure Web Gateway, is essential for safeguarding corporate resources since many websites that could jeopardize a secure working environment remain invisible to the naked eye. This secure web gateway effectively blocks dangerous sites, thereby preventing sensitive information from being compromised. As businesses increasingly rely on the internet for operations, they face a higher risk of encountering websites that can threaten both assets and overall productivity. Visiting non-work-related sites not only wastes valuable time but also exposes organizations to the risk of malicious code that could lead to the loss of critical corporate assets. Moreover, inappropriate web uploads can easily result in leaks of sensitive company information. The Secure Web Gateway (SWG) serves as a crucial defense, enabling organizations to manage web usage more effectively, minimizing disruptions to corporate productivity. By closely monitoring internal client access to the web, AISWG plays a significant role in enhancing overall business efficiency while ensuring the protection of vital assets. This proactive approach to web security is increasingly indispensable in today’s digital landscape.
  • 9
    CyberArk Endpoint Privilege Manager Reviews
    Your security needs to be as adaptable as your operations are. The Endpoint Privilege Manager provides real-time adjustments, granting users immediate local admin access when required. Cybercriminals relentlessly seek out your weaknesses, but we counteract this threat by automatically preventing credential theft before it can inflict harm. With countless ransomware variations circulating today, our solution is effective in thwarting 100% of such attacks. It allows for the temporary elevation of user privileges for particular tasks, seamlessly and instantly, while keeping help desk involvement to a minimum. Prevent ransomware from hindering your progress. Gain control over local admin accounts without interfering with daily tasks. Operate securely from any location and device, ensuring the protection of your assets and your organization's reputation. Safeguard every endpoint while maintaining smooth operational flow. By prioritizing security, you can enhance productivity without compromising safety.
  • 10
    ZETALY Cost Control Reviews
    A thorough strategy for managing expenses and monitoring your financial plan is essential. ZETALY Cost Control (CC) serves as an analytical tool tailored to mitigate the financial effects associated with your mainframe operations. With its modern and user-friendly interface, this solution provides immediate insights into your expenditures, enabling you to make well-informed choices. You can monitor the current costs of your production almost instantaneously. Gain clarity on cost determinants, trends, and the distribution of expenses across different software platforms. Evaluate how business operations influence mainframe expenses effectively. The system also automates chargeback reporting for both internal teams and external clients, ensuring seamless financial management. Stay on top of your mainframe budget to avoid overspending while also monitoring your contractual obligations to maintain budget adherence. To enhance visibility, ZETALY CC initially gathers your usage data in near real time, then computes the actual expenditures and presents them in your preferred currency. These calculations take into account your various agreements and the corresponding pricing structures, allowing for precise financial oversight. Furthermore, the ability to analyze historical data will empower you to refine your budgeting strategies over time.
  • 11
    vCloud Usage Meter Reviews
    Utilizing vCloud Usage Meter's on-premises agent alongside vCloud Usage Insight's SaaS offerings allows for effective licensing usage metering and automated reporting. Begin by familiarizing yourself with both Usage Meter and Usage Insight, and then proceed to download the latest version to initiate the process. Engage with the Automatic Reporting Service, which is central to the Cloud Provider Metering Architecture, and acquire the most recent On-Premises agent for efficient license usage collection and reporting. This setup enables you to generate monthly reports effortlessly, streamlining the entire process from data collection to aggregation and reporting via the Commerce Portal. With the release of Usage Meter 4.3, there's enhanced capability to manage larger environments within a single deployment. Additionally, the introduction of in-place upgrades means that replacing the on-premises agent with each new version is no longer necessary. Usage Insight serves as a centralized hub for accessing and downloading Usage reports, while VMware takes responsibility for storing historical records, alleviating partners from needing to maintain older appliances. Overall, this comprehensive system significantly simplifies the metering and reporting tasks for users.
  • 12
    PurpleLeaf Reviews
    PurpleLeaf offers a superior approach to penetration testing that ensures your organization is continuously monitored for vulnerabilities. This innovative platform is driven by dedicated penetration testers who focus on research and thorough analysis. We assess the complexity and scale of your application or infrastructure before providing an estimate for the testing, similar to the process of a conventional annual pentest. Within a timeframe of one to two weeks, you will receive your penetration test report. Unlike traditional methods, our continuous testing model provides ongoing evaluations throughout the year, along with monthly updates and alerts regarding newly identified vulnerabilities, assets, and applications. While a standard pentest could leave your organization exposed for nearly eleven months, our approach ensures consistent security oversight. PurpleLeaf accommodates even minimal testing hours to extend coverage over longer durations, allowing you to pay only for the services you require. Additionally, many pentest reports fail to accurately depict your actual attack surface, but we not only identify vulnerabilities but also visualize your applications and highlight critical services, providing a comprehensive view of your security posture. This holistic perspective enables organizations to make informed decisions regarding their cybersecurity strategies.
  • 13
    Let's Encrypt Reviews
    When considering the critical infrastructure necessary for the Internet, our focus extends beyond ordinary circumstances, aiming instead to effectively tackle the most challenging scenarios that may occur. To enable HTTPS on your website, obtaining a certificate from a Certificate Authority (CA) is essential, and Let’s Encrypt serves as one such CA. Securing a certificate for your website’s domain through Let’s Encrypt requires you to prove your ownership of the domain. This verification process is facilitated by software utilizing the ACME protocol, commonly executed on your web host. To determine the most suitable method for your situation, you must ascertain whether you possess shell access, also known as SSH access, to your web hosting environment. If you exclusively manage your site via a control panel, such as cPanel, Plesk, or WordPress, it’s quite likely that shell access is not available to you. In this case, consulting with your hosting provider can clarify your access options and ensure you have the necessary capabilities for the certificate acquisition process. Understanding these aspects is crucial for maintaining website security in various situations.
  • 14
    Envoi Reviews
    With more than ten years of experience in developing media technology, we have created a range of solutions aimed at elevating your media and content creation efforts. You can maintain control while utilizing your current tools and workflows, connecting with your audience in your envisioned manner. Production companies, editorial facilities, visual effects studios, audio houses, and finishing houses can collaborate with diverse vendors and securely exchange files across teams and various branch locations. Envoi, utilizing IBM Aspera on Cloud, Amazon S3, and Equinix, will automate the processing and delivery of these files through efficient workflows. You can upload files, request metadata, and collaborate with team members, storage options, and distribution partners seamlessly. By establishing ingest and distribution workflows, you can ensure that files are processed and transformed upon arrival, enhancing overall productivity and collaboration in your projects. This innovative approach not only streamlines operations but also fosters greater creativity and efficiency in media production.
  • 15
    Ansys RedHawk-SC Reviews
    Ansys RedHawk-SC stands as the industry's premier solution for voltage drop and electromigration multiphysics sign-off in digital designs, recognized for its reliability. Its advanced analytics swiftly uncover vulnerabilities and facilitate what-if scenarios to enhance both power efficiency and performance. The cloud-based framework of RedHawk-SC ensures it can efficiently manage full-chip analyses with remarkable speed and capacity. The signoff precision is validated by all leading foundries across all finFET nodes, including those down to 3nm. Through its sophisticated power analytics, Ansys RedHawk-SC supports the creation of robust, low-power digital designs without sacrificing performance, offering designers extensive methods to identify and rectify dynamic voltage drop issues. The trusted multiphysics signoff analysis provided by Ansys RedHawk-SC significantly mitigates project and technology risks. Additionally, its algorithms have been rigorously validated by major foundries for all finFET processes and have demonstrated success in countless tapeouts, further solidifying its reputation in the industry. As technology continues to evolve, the capabilities of Ansys RedHawk-SC will adapt to meet future challenges in digital design.
  • 16
    TinyCAD Reviews
    TinyCAD is a free, open-source software designed for creating circuit diagrams and is compatible with Windows operating systems. Remember, TinyCAD is completely free to use and will remain so, with no authorized sellers involved in its distribution. While assembling libraries of circuit symbols in TinyCAD can be straightforward, it often requires significant time investment. If you possess symbols that could enhance the TinyCAD experience for others, consider sharing them on this platform for communal access. The user manual for TinyCAD is bundled with the installer but is also accessible online through the TinyCAD wiki. If you identify any areas within the manual that could use improvement, feel free to contribute by editing the Wiki, which is a valuable resource for all users. Additionally, the GitHub site offers tutorials on how to effectively edit Wikis, making it easier for anyone to participate. By collaborating and sharing resources, we can all contribute to the growth of the TinyCAD community.
  • 17
    Cloaken URL Unshortener Reviews
    Efficiently expand shortened URLs and capture a rasterized image of the corresponding website, all while ensuring your anonymity through TOR exit nodes. The Cloaken URL Unshortener utilizes the anonymity offered by TOR to restore links shortened by services like Bit.ly or TinyUrl, effectively safeguarding operational security. By harnessing the unique features of the TOR network, Cloaken facilitates a self-contained and independently managed URL unshortener service deployable within the AWS Cloud infrastructure. This innovative product boasts a user-friendly WebUI and a comprehensive API, accompanied by a software development kit (SDK) for seamless integration. Additionally, it includes plugins designed for Security Orchestration and Automation platforms such as Demisto, enhancing its functionality. With capabilities for URL unshortening, webpage screenshots, and API access, Cloaken is a versatile tool that supports SOAR platforms like Demisto and Phantom, making it an invaluable resource for security professionals. Users can enjoy the benefits of a robust and secure URL unshortening process, all while navigating the digital landscape with confidence.
  • 18
    Ubuntu Server Reviews
    Ubuntu Server offers both economic and technical scalability for your data center, whether it is public or private. Whether your goal is to establish an OpenStack cloud, a Kubernetes cluster, or a massive 50,000-node render farm, Ubuntu Server provides unparalleled scale-out performance that delivers exceptional value. You can seamlessly deploy a variety of applications, including NoSQL databases and web farms, without any hassle. With certification from leading hardware manufacturers and a robust set of deployment tools, you can maximize the efficiency of your infrastructure. The regular release cycle ensures that you always have access to the latest and highest performing open-source solutions. Additionally, its lightweight initial installation combined with integrated deployment and application modeling technologies positions Ubuntu Server as an ideal choice for straightforward deployment and scaled management. Ultimately, this makes it an excellent option for organizations seeking to optimize their operational efficiency and resource utilization.
  • 19
    SUSE Linux Enterprise Desktop Reviews
    Tailored for diverse environments, this solution encompasses a comprehensive range of essential business applications that enhance employee productivity. The SLE Desktop is built upon the foundation of SUSE Linux Enterprise Server and incorporates advanced security measures that offer exceptional safeguarding of critical enterprise information. It serves as a versatile and secure desktop operating system, ideal for situations where dependability, simple maintenance, and regular updates are paramount. The system is bundled with a multitude of top-tier applications, including a web browser, email client, and collaboration tools, all essential for fostering employee efficiency. With robust security features such as an application security system, integrated VPN, and antivirus solutions, it ensures formidable protection against viruses and malware threats. Additionally, it comes with enterprise-level support and maintenance services from SUSE, further enhancing its value. Users are also granted a significant level of customization to align with their specific business needs, making it a dynamic choice for any organization. Ultimately, this desktop solution not only prioritizes security but also empowers users with tools that adapt to their workflows seamlessly.
  • 20
    Flatcar Container Linux Reviews
    The advent of container-based infrastructure represented a significant transformation in technology. A Linux distribution specifically optimized for containers serves as the ideal groundwork for a cloud-native setup. This streamlined operating system image consists solely of the essential tools needed for container execution. By omitting a package manager, it prevents any potential for configuration drift. The use of an immutable filesystem for the OS effectively mitigates a range of security vulnerabilities. Additionally, automated atomic updates ensure that you consistently receive the most current security patches and open-source technology advancements. Flatcar Container Linux is purpose-built from the ground up to support container workloads effectively. It fully embraces the container philosophy by incorporating only the necessary components for running containers. In a world of immutable infrastructure, it is crucial to have an equally immutable Linux operating system. With Flatcar Container Linux, your focus shifts from configuration management to effectively overseeing your infrastructure, allowing for a more efficient and secure operational environment. Embracing this approach revolutionizes how organizations manage their cloud-native applications and services.
  • 21
    MayaScale Reviews

    MayaScale

    ZettaLane Systems

    Create a robust NVMe over Fabrics high-performance shared storage solution with MayaScale that allows for the integration of directly attached NVMe resources into a unified storage pool. This solution enables the flexible provisioning of NVMe namespaces to clients who require high performance with minimal latency. After usage, clients have the option to return NVMe storage back to the shared pool, eliminating issues associated with over-provisioning or unutilized NVMe storage typical of direct-attached setups. The network-agnostic architecture employs RDMA for on-premises deployments and standard TCP for cloud environments, ensuring versatility. Clients can access true NVMe devices using a conventional NVMe driver stack, negating the need for any proprietary drivers. You can easily configure and implement NVMe over Fabrics SAN infrastructure at rack scale in your data center by aggregating diverse NVMe devices through RDMA-compatible connections, such as ROCE, iWARP, or Infiniband. Furthermore, even in public cloud settings, users can harness the benefits of NVMe over Fabrics via the standard TCP/IP protocol, which eliminates the requirement for specialized RDMA hardware or SRIOV virtualization. This innovative approach optimizes resource utilization while maintaining high performance across various deployment scenarios.
  • 22
    Rackspace Reviews
    Improved full-lifecycle cloud native development capabilities empower customers to create future-ready applications. By harnessing the full power of the cloud today, businesses can develop applications designed for tomorrow's needs. Historically, cloud adoption strategies have concentrated on infrastructure and application migration, often neglecting the essential updates needed in the underlying code. Although the cloud has consistently provided advantages like elasticity and scalability, its complete potential can only be realized when the application code is modernized. Embracing cloud native technologies and contemporary architectures enables the development of modern applications that tap into the cloud's full capabilities, enhance agility, and expedite innovation. Create self-healing and auto-scaling applications that are free from server constraints. Serverless architectures not only optimize efficiency and cost but also delegate the majority of infrastructure and software management tasks to the platform, resulting in a more streamlined development process. This shift allows organizations to focus on innovation rather than infrastructure, paving the way for groundbreaking advancements.
  • 23
    DataHub Reviews
    We assist organizations, regardless of their size, in crafting, developing, and expanding solutions to effectively manage their data and unlock its full potential. At Datahub, we offer a vast array of datasets at no cost, alongside a Premium Data Service for tailored or additional data with assured updates. Datahub delivers essential and widely-utilized data in the form of high-quality, user-friendly, and open data packages. Users can securely share and elegantly display their data online, benefiting from features such as quality checks, versioning, data APIs, notifications, and integrations. Data serves as the quickest method for individuals, teams, and organizations to publish, deploy, and share structured information, all while prioritizing both power and simplicity. Streamline your data processes through our open-source framework, enabling you to store, share, and showcase your data to the world or keep it private as needed. Our offering is entirely open source, backed by professional maintenance and support, providing an end-to-end solution where all components are seamlessly integrated. We not only supply tools but also offer a standardized methodology and framework for effectively handling your data, ensuring that you can harness its value efficiently. This comprehensive approach guarantees that all users can maximize their data's impact.
  • 24
    NeoPulse Reviews
    The NeoPulse Product Suite offers a comprehensive solution for businesses aiming to develop tailored AI applications utilizing their own selected data. It features a robust server application equipped with a powerful AI known as “the oracle,” which streamlines the creation of advanced AI models through automation. This suite not only oversees your AI infrastructure but also coordinates workflows to facilitate AI generation tasks seamlessly. Moreover, it comes with a licensing program that empowers any enterprise application to interact with the AI model via a web-based (REST) API. NeoPulse stands as a fully automated AI platform that supports organizations in training, deploying, and managing AI solutions across diverse environments and at scale. In essence, NeoPulse can efficiently manage each stage of the AI engineering process, including design, training, deployment, management, and eventual retirement, ensuring a holistic approach to AI development. Consequently, this platform significantly enhances the productivity and effectiveness of AI initiatives within an organization.
  • 25
    Q-Bot Reviews

    Q-Bot

    bi3 Technologies

    Qbot is a specialized automated testing engine designed specifically for ensuring data quality, capable of supporting large and intricate data platforms while being agnostic to both ETL and database technologies. It serves various purposes, including ETL testing, upgrades to ETL platforms and databases, cloud migrations, and transitions to big data systems, all while delivering data quality that is exceptionally reliable and unprecedented in speed. As one of the most extensive data quality automation engines available, Qbot is engineered with key features such as data security, scalability, and rapid execution, complemented by a vast library of tests. Users benefit from the ability to directly input SQL queries during test group configuration, streamlining the testing process. Additionally, we currently offer support for a range of database servers for both source and target database tables, ensuring versatile integration across different environments. This flexibility makes Qbot an invaluable tool for organizations looking to enhance their data quality assurance processes effectively.
MongoDB Logo MongoDB