Business Software for Azure Marketplace

Top Software that integrates with Azure Marketplace

  • 1
    Azure Logic Apps Reviews
    Designed on a container-based runtime, this platform enhances scalability and portability while automating essential business processes across any location. Upgrade your BizTalk Server applications by transitioning them to Logic Apps with the help of the BizTalk migration tool. Establish connections between logic apps and your virtual networks to integrate cloud-based and on-premises solutions in a smooth and secure manner. By containerizing your workflows, you can deploy and operate your applications in any environment—be it cloud, on-premises, or your preferred infrastructure. Implement CI/CD best practices to optimize your workflows and utilize built-in tools to ensure seamless and secure deployments. Logic applications can be deployed and executed in Azure, across various containers, and on local systems. Additionally, you can enable private endpoints, simplify virtual network access, and utilize deployment slots for better management. Develop, debug, and test applications on Windows, MacOS, and Linux using Visual Studio Code for maximum flexibility. By deploying multiple workflows within a single logic app, you can streamline automated deployments and enhance your CI/CD pipelines, making the overall process more efficient and manageable. Overall, this approach not only boosts productivity but also ensures that your applications are consistently up to date.
  • 2
    Tackle Cloud GTM Platform Reviews

    Tackle Cloud GTM Platform

    Tackle.io

    $24,995 per year
    Tackle’s Cloud Marketplace Platform equips you with all the essential tools to effectively achieve a listing, initiate sales, and expand your marketplace operations. Committed to assisting software companies in generating revenue through cloud marketplaces, Tackle focuses on platforms such as AWS Marketplace, Azure Marketplace, and Google Cloud Platform Marketplace. The platform significantly accelerates the process of listing and selling products across these marketplaces while offering detailed transaction reporting without necessitating any engineering resources. It empowers your teams in sales, business development, operations, and finance to seamlessly interact with the Cloud Marketplaces, enabling rapid revenue growth. By selling through these Cloud Marketplaces, you benefit from a streamlined sales and procurement process, a quicker product launch, the ability to utilize existing relationships and budgets with cloud providers, and access to a vast pool of potential customers. Additionally, with Tackle, you can optimize your marketplace strategy to adapt to evolving market trends and customer demands.
  • 3
    Azure Event Hubs Reviews

    Azure Event Hubs

    Microsoft

    $0.03 per hour
    Event Hubs provides a fully managed service for real-time data ingestion that is easy to use, reliable, and highly scalable. It enables the streaming of millions of events every second from various sources, facilitating the creation of dynamic data pipelines that allow businesses to quickly address challenges. In times of crisis, you can continue data processing thanks to its geo-disaster recovery and geo-replication capabilities. Additionally, it integrates effortlessly with other Azure services, enabling users to derive valuable insights. Existing Apache Kafka clients can communicate with Event Hubs without requiring code alterations, offering a managed Kafka experience while eliminating the need to maintain individual clusters. Users can enjoy both real-time data ingestion and microbatching on the same stream, allowing them to concentrate on gaining insights rather than managing infrastructure. By leveraging Event Hubs, organizations can rapidly construct real-time big data pipelines and swiftly tackle business issues as they arise, enhancing their operational efficiency.
  • 4
    pgAdmin Reviews
    pgAdmin is a free software initiative that operates under the PostgreSQL/Artistic license, and it can be accessed in both source and binary formats through the PostgreSQL mirror network. Given that compiling from the source can be complex and requires a certain level of technical expertise, it is advisable to opt for binary packages whenever feasible. This tool is widely recognized as the leading Open Source administration and development platform for PostgreSQL, which is regarded as the most sophisticated Open Source database globally. Additionally, pgAdmin serves as a management utility for PostgreSQL and related relational databases, including EnterpriseDB's EDB Advanced Server. Users can operate pgAdmin as either a web application or a desktop program. However, since pgAdmin functions as a web-based application, its interaction with the local filesystem is limited to the permissions set by modern web browsers. Consequently, this creates security constraints, meaning that files can primarily be "uploaded" or "downloaded" through designated forms. Overall, pgAdmin's robust feature set makes it an invaluable resource for database management.
  • 5
    Microsoft Cost Management Reviews
    Leverage the resources provided by your Azure subscription to enhance cloud value and establish financial governance within your organization. Monitor resource consumption and oversee expenses across all cloud platforms through a consolidated view, while gaining access to comprehensive operational and financial data to facilitate well-informed decision-making. Establish governance protocols for efficient enterprise cloud cost oversight, fostering accountability through budgets, cost distribution, and chargeback mechanisms. Optimize your cloud investment returns by embracing ongoing cost management strategies and adhering to industry standards. Centralize the management of expenses across both Azure and AWS to streamline your operations, and utilize insights derived from data across these platforms to simplify your cost oversight efforts. By doing so, you can ensure that your organization remains financially agile and responsive in a rapidly changing cloud environment.
  • 6
    Authomize Reviews
    Authomize persistently identifies all relevant connections between human and machine identities and company assets across every facet of your organization’s environments, including IaaS, PaaS, SaaS, Data, and On-prem, ensuring consistency down to the finest details of company assets across various applications. The platform maintains a constantly refreshed inventory that catalogs your identities, assets, and access policies, effectively preventing unauthorized access through protective measures while also sending alerts for any anomalies and potential risks. Powered by an AI-driven engine, Authomize utilizes its extensive and detailed insight into all organizational environments to design the most effective access policies tailored to each identity-asset relationship. Furthermore, its SmartGroup technology engages in ongoing access modeling, adeptly adjusting itself by integrating new data such as usage patterns, activities, and the decisions made, ultimately creating a precise and optimal permission framework. This dynamic approach not only enhances security but also streamlines access management across the entire organization, thereby fostering a more resilient operational environment.
  • 7
    Elastic Security Reviews
    Elastic Security provides analysts with the tools necessary to thwart, identify, and address threats effectively. This free and open-source platform offers a range of features, including SIEM, endpoint security, threat hunting, and cloud monitoring, among others. With its user-friendly interface, Elastic simplifies the process of searching, visualizing, and analyzing diverse data types — whether it's from the cloud, users, endpoints, or networks — in just a matter of seconds. Analysts can hunt and investigate using years of data, made easily accessible through searchable snapshots. Thanks to flexible licensing options, organizations can tap into information from across their entire ecosystem, regardless of volume, variety, or age. The solution aids in preventing damage and loss through comprehensive malware and ransomware protection across the environment. Users can swiftly deploy analytical content created by Elastic and the wider security community to bolster defenses against threats identified in the MITRE ATT&CK® framework. By utilizing analyst-driven, cross-index correlation, machine learning jobs, and technique-based strategies, complex threats can be detected with greater efficiency. Additionally, practitioners are empowered by an intuitive user interface and integrations with partners that enhance incident management processes. Overall, Elastic Security stands out as a robust solution for organizations committed to maintaining a secure digital environment.
  • 8
    Milvus Reviews

    Milvus

    Milvus

    $25 per month
    We are an intelligent HelpDesk. We will optimize your management processes, increase productivity of your team, and increase the efficiency in your support. Your customers will have more options by opening tickets from different devices. You have more control over how you configure your customers' SLA. The inventory management app can be used to monitor and control the entire equipment park of customers. You can increase the productivity of your technical support staff with intelligent and automated inventory management. Optimize your customer relationship and management! Receive alerts about key machine features via your dashboard. Automation, workflow and ticket triggers. Password Vault, satisfaction survey and ticket scheduling. Follow customer, service catalog, follow tickets, ticket conference, advanced dashboard.
  • 9
    Huawei WAF Reviews

    Huawei WAF

    Huawei Cloud

    $615 per month
    A Web Application Firewall (WAF) is essential for maintaining the security of your web applications. Utilizing Huawei's advanced machine learning capabilities, the WAF effectively discerns harmful traffic and mitigates potential attacks, thus enhancing the overall security architecture of your network. Users have the flexibility to set a variety of rules designed to identify and combat threats, which is crucial for protecting web applications. Additionally, you can anonymize sensitive information while also selecting the minimum TLS version and cipher suite to further secure your applications. With WAF, you are well-equipped to guard against emerging zero-day vulnerabilities. Around-the-clock surveillance is offered by dedicated security teams to ensure continuous protection. Furthermore, WAF adheres to PCI DSS standards, allowing you to pursue and achieve PCI DSS certification as part of your security framework. You can customize WAF to recognize and thwart malicious code injected into your web servers, promoting safe browsing experiences. With its robust capabilities, WAF stands as a critical component in your comprehensive cybersecurity strategy, providing peace of mind in an increasingly vulnerable digital landscape.
  • 10
    Qualys WAS Reviews
    A powerful cloud-based solution enables ongoing discovery and identification of vulnerabilities and misconfigurations in web applications. Designed entirely for the cloud, it offers straightforward deployment and management while accommodating millions of assets with ease. The Web Application Scanner (WAS) systematically locates and records all web applications within your network, including those that are new or previously unidentified, and can scale from just a few applications to thousands. Utilizing Qualys WAS, you have the ability to assign your own labels to applications, allowing for customized reporting and restricted access to scanning results. WAS employs dynamic deep scanning to thoroughly assess all applications within your perimeter, internal environment, active development stages, and APIs that serve mobile devices. Furthermore, it extends its coverage to public cloud instances, providing immediate insight into vulnerabilities such as SQL injection and cross-site scripting. The system supports authenticated, intricate, and progressive scanning methods. In addition, it incorporates programmatic scanning capabilities for SOAP and REST API services, effectively evaluating IoT services and the APIs utilized by contemporary mobile architectures, thereby enhancing your overall security posture. This comprehensive approach ensures that all aspects of your web applications are monitored and protected continuously.
  • 11
    AppCheck Reviews
    Developed and continuously improved by top security professionals, this technology-agnostic scanning engine is designed to be user-friendly and offers extensive customization options. It provides proof of concept evidence through safe exploitation methods and offers exceptional support for contemporary HTML5 applications. The system accommodates all authentication types through a scriptable browser interface and features detailed scheduling and continuous scanning capabilities. Furthermore, it seamlessly integrates with well-known bug tracking tools like JIRA, along with the possibility for custom integration using a JSON API. The dashboard presents a highly customizable overview of your security status at any moment, showcasing the current state of identified vulnerabilities, potential threats, and the progress of remediation efforts through easily interpretable widgets. Whether you need to conduct a quick scan or require advanced features for comprehensive control, AppCheck delivers unmatched flexibility. Users can initiate scans with just a few clicks using pre-configured profiles crafted by our security experts or create personalized profiles from scratch using the profile editor, ensuring that both novice and experienced users can effectively secure their applications. Ultimately, this solution empowers organizations to maintain a proactive stance on security while adapting to their specific needs.
  • 12
    StoneFly Reviews
    StoneFly delivers robust, flexible, and reliable IT infrastructure solutions that ensure seamless availability. Paired with our innovative and patented StoneFusion operating system, we are equipped to handle your data-centric applications and processes anytime and anywhere. You can easily set up backup, replication, disaster recovery, and scale out storage options for block, file, and object formats in both private and public cloud environments. In addition, we provide comprehensive support for virtual and container hosting, among other services. StoneFly also specializes in cloud data migration for various data types, including emails, archives, documents, SharePoint, and both physical and virtual storage solutions. Our all-in-one backup and disaster recovery systems can operate as either a standalone appliance or a cloud-based solution. Furthermore, our hyperconverged options enable the restoration of physical machines as virtual machines directly on the StoneFly disaster recovery appliance, facilitating rapid recovery in critical situations. With an emphasis on efficiency and reliability, StoneFly is committed to meeting the evolving demands of modern IT infrastructure.
  • 13
    Riverbed NetProfiler Reviews
    Cybercriminals are always on the lookout for innovative methods to circumvent your defenses, and while you create protective measures, they adeptly exploit any vulnerabilities. For this reason, it's imperative to have a robust network security solution that ensures the integrity and accessibility of your network. Riverbed NetProfiler converts network data into actionable security intelligence, offering vital visibility and forensic capabilities for comprehensive threat detection, analysis, and response. By meticulously capturing and archiving all network flow and packet information throughout your organization, it equips you with the essential insights needed to identify and scrutinize advanced persistent threats that may evade standard preventative strategies, as well as those threats that emerge from within the network itself. Distributed Denial of Service (DDoS) attacks are among the most common causes of business interruptions, often targeting vital infrastructures such as power facilities, healthcare systems, educational institutions, and governmental organizations. Protecting against these threats is not just about defense; it's about ensuring the resilience of essential services that our society relies upon.
  • 14
    Azure DevTest Labs Reviews
    Rapidly establish development and testing environments while effectively reducing waste through the implementation of quotas and policies. Implement automated shutdowns to keep costs low and create environments for both Windows and Linux systems. Offer self-service cloud solutions that eliminate concerns about management, as lab policies and thresholds seamlessly contribute to cost reduction. Set up your virtual machine equipped with essential development tools and the latest build in just a few clicks, enabling your team to share reusable templates effortlessly. Directly generate environments from your continuous integration (CI) tools by utilizing our plug-ins, REST API, or the Visual Studio Team Services extension. Configure lab policies to automatically manage the start-up and shutdown of virtual machines, ensuring operational efficiency. Establish limits for your lab, such as the maximum number of virtual machines allowed per user and per lab, to maintain control. Analyze lab cost trends to forecast your expenditures and define a spending threshold for better budget management. Employ our REST API to provision development and testing environments directly from continuous integration (CI) tools, allowing for an integrated workflow. In addition, you can swiftly deploy from your release pipeline using our Team Services tasks extension, ensuring a streamlined and efficient process. This comprehensive approach not only enhances productivity but also fosters collaboration across your development teams.
  • 15
    ColdFusion Builder Reviews

    ColdFusion Builder

    Adobe

    $299 one-time payment
    Utilize a nimble and rapidly loading IDE that enhances your Adobe ColdFusion experience. Expedite your projects with tools designed for developing, testing, debugging, and deploying applications efficiently. Automatically identify any vulnerabilities present in your code. Uncover performance bottlenecks by utilizing insights from the Performance Monitoring Toolset. Surf the trend of mobile and browser-based application development with ease, allowing you to gain a competitive edge in the thriving apps market. Ensure security is a priority by leveraging debugging, refactoring, previewing, and other advanced features that help pinpoint security issues and preserve your code’s integrity. Optimize your workflow with the help of extensions, support for remote projects, integrated server management, a log viewer, and additional functionalities, empowering you to take control of your development environment. Speed up your application development process with smart, organized code assistance for CFML, CFScript, HTML, JavaScript, and CSS. Additionally, benefit from code assistance for third-party JavaScript libraries that are part of your web application, making your development experience even more seamless and efficient. This comprehensive toolset is designed to elevate your productivity and enhance your coding journey.
  • 16
    ShareGate Reviews

    ShareGate

    Workleap

    $5,995 per year
    Avoid the hassle of navigating through various admin centers to gain insights about your teams and Microsoft 365 groups. By linking your tenant to ShareGate, you'll quickly discover details such as who established teams, the reasons behind their creation, their current usage status, and how they are being utilized. ShareGate conducts daily scans of your tenant to identify teams and groups that are no longer in use, allowing you to delete or archive them with just a click, thereby minimizing clutter and aiding users in locating necessary resources within Microsoft 365. The ShareGate Teams chatbot facilitates the gathering of essential information from team owners, providing clarity on each team's objectives and sensitivity levels, which in turn helps you evaluate the associated risks for your organization and make informed decisions regarding your teams. Tailor your security measures to fit the specific requirements of each team, ensuring that you maintain an appropriate level of protection. With ShareGate, the PowerShell scripts you would typically need to write are readily available at the click of a button, empowering users with greater flexibility in using their tools. Additionally, you can effortlessly establish boundaries to ensure compliance while enjoying increased peace of mind. This comprehensive approach not only streamlines team management but also enhances overall productivity.
  • 17
    JupyterLab Reviews
    Project Jupyter is dedicated to the creation of open-source tools, standards, and services that facilitate interactive computing in numerous programming languages. At the heart of this initiative is JupyterLab, a web-based interactive development environment designed for Jupyter notebooks, coding, and data manipulation. JupyterLab offers remarkable flexibility, allowing users to customize and organize the interface to cater to various workflows in fields such as data science, scientific research, and machine learning. Its extensibility and modular nature enable developers to create plugins that introduce new features and seamlessly integrate with existing components. The Jupyter Notebook serves as an open-source web application enabling users to produce and share documents that incorporate live code, mathematical equations, visualizations, and descriptive text. Common applications of Jupyter include data cleaning and transformation, numerical simulations, statistical analysis, data visualization, and machine learning, among others. Supporting over 40 programming languages—including popular ones like Python, R, Julia, and Scala—Jupyter continues to be a valuable resource for researchers and developers alike, fostering collaborative and innovative approaches to computing challenges.
  • 18
    Red Hat Enterprise Linux Reviews

    Red Hat Enterprise Linux

    Red Hat

    $99 one-time payment
    Red Hat Enterprise Linux serves as a robust operating system designed for enterprise use, with certifications spanning numerous cloud platforms and a vast array of vendors. It offers a reliable foundation that ensures consistency across different environments while equipping users with essential tools to accelerate the delivery of services and workloads for a wide range of applications. By minimizing deployment challenges and expenses, Red Hat Enterprise Linux enhances the speed at which value is realized for essential workloads, fostering collaboration and innovation among development and operations teams in various settings. Additionally, it enhances hybrid cloud infrastructures by extending capabilities to edge environments, reaching hundreds of thousands of nodes globally. Users can create OS images optimized for edge computing, reduce interruptions from OS updates, execute system updates with greater efficiency, and benefit from automatic health checks and rollback features. Furthermore, specialized command line tools are available to streamline inventory tasks and remediation processes linked to subscription upgrades or migrations from other Linux distributions, making the transition seamless and efficient. This versatility ensures that organizations can effectively manage their IT resources in a rapidly changing technological landscape.
  • 19
    Delinea Secret Server Reviews
    Safeguard your essential accounts using our advanced Privileged Access Management (PAM) solution, which can be deployed either on-premise or in the cloud. Experience rapid implementation with our offerings that include privileged account discovery, easy installation, and comprehensive auditing and reporting features. Effectively oversee numerous databases, software solutions, hypervisors, network devices, and security systems, even in extensive, distributed settings. Benefit from unlimited customizations with direct management capabilities for both on-premise and cloud PAM environments. Collaborate with our professional services team or utilize your in-house experts for optimal results. Protect privileges for service, application, root, and admin accounts throughout your organization to maintain robust security. Keep privileged credentials securely stored in an encrypted, centralized vault and identify all relevant accounts to mitigate sprawl while achieving complete visibility into your privileged access landscape. Ensure efficient provisioning and deprovisioning, maintain password complexity standards, and regularly rotate credentials to enhance security measures. Additionally, our solution offers seamless integration with existing systems, allowing for a more cohesive security strategy across your enterprise.
  • 20
    Azure Disk Storage Reviews
    Azure Disk Storage is carefully crafted for deployment alongside Azure Virtual Machines and the preview version of Azure VMware Solution, providing robust and high-performance block storage solutions for critical business applications. Transitioning to Azure infrastructure becomes seamless with four distinct disk storage options available—Ultra Disk Storage, Premium SSD, Standard SSD, and Standard HDD—that allow you to balance performance and costs effectively for your specific workload needs. It ensures exceptional performance with sub-millisecond latency tailored for demanding applications like SAP HANA, SQL Server, and Oracle, which require intensive throughput and transaction capabilities. Additionally, shared disks facilitate the economical operation of clustered or high-availability applications in the cloud environment. With a remarkable 0% annual failure rate, you can expect consistent enterprise-level durability. Ultra Disk Storage allows you to scale without compromising performance, meeting increasing demands effortlessly. Furthermore, your data is protected with built-in encryption options, utilizing either Microsoft-managed keys or your personal encryption keys for enhanced security. This comprehensive approach ensures that your critical applications operate smoothly and securely in the cloud.
  • 21
    Informatica Enterprise Data Catalog Reviews
    Efficiently scan and catalog metadata, uncover and characterize data, while offering comprehensive lineage tracking over millions of datasets. Organize and classify data assets across diverse environments to enhance their value and facilitate reuse. Perform automated scanning across multi-cloud environments, business intelligence tools, ETL processes, and external metadata catalogs, along with various data types. Utilize AI-driven capabilities for domain discovery, data similarity assessment, business term linkages, and tailored recommendations. Monitor data movement with precision, ranging from overarching system perspectives to detailed column-level lineage, accompanied by thorough impact assessments. Access the Data Asset Analytics dashboard to gain insights into asset utilization, enrichment processes, and collaborative efforts. Examine data quality protocols, scorecards, metric clusters, and profiling statistics within their relevant contexts. Engage with shared data intelligence through certifications, ratings and feedback, a Q&A feature, and timely change alerts. What truly distinguishes Informatica is its extensive and robust suite of enterprise-grade data management solutions, ensuring comprehensive support for diverse data needs. With such capabilities, organizations can navigate their data landscapes more effectively and make informed decisions.
  • 22
    Azure IoT Edge Reviews
    Azure IoT Edge is a comprehensive service that operates on the Azure IoT Hub platform. It allows you to deploy cloud-based workloads, artificial intelligence applications, Azure services, third-party tools, or custom business logic on Internet of Things (IoT) edge devices using standard container technology. By relocating specific workloads closer to the network edge, these devices can minimize their communication time with the cloud, respond more swiftly to changes in their local environment, and maintain functionality even during prolonged periods without internet access. You can implement models that have been developed and refined in the cloud directly on-site. For instance, when a predictive model is used on a factory camera for quality assurance and detects an anomaly, IoT Edge can initiate an alert, process the relevant data locally, or forward it to the cloud for more in-depth evaluation. Furthermore, your edge devices can be managed securely and effectively, ensuring reliable operation even in scenarios of limited or no connectivity. The device management feature of Azure IoT Edge automatically updates and synchronizes the current state of each device. This seamless integration fosters enhanced operational efficiency, enabling businesses to harness the full potential of their IoT solutions.
  • 23
    BlueCat Micetro Reviews
    BlueCat Micetro offers a powerful, software-based orchestration layer that brings together DNS, DHCP, and IPAM services for unified control across any combination of on-prem, cloud, and distributed networks. It integrates seamlessly with Microsoft DNS and DHCP, allowing organizations to preserve existing investments while significantly upgrading visibility and management capabilities. The platform supports API-driven automation, making it easier for NetOps, CloudOps, and DevOps teams to accelerate provisioning and enforce consistent network policies. Micetro enhances operational security through role-based access controls, proactive alerting, and centralized oversight of mission-critical network traffic. Its intuitive interface allows teams to visually design and manage IP address structures at scale. With recognition as a Strong Value solution in EMA’s 2025 report, Micetro demonstrates both performance and cost efficiency in modern DDI environments. IT teams can also extend the platform with add-ons such as Threat Protection, Edge, and LiveNX for enhanced security and observability. Ultimately, Micetro empowers organizations to simplify network administration while building a foundation for more intelligent, automated network operations.
  • 24
    Azure Virtual Network Reviews
    Azure Virtual Network provides a secure and isolated space for deploying your virtual machines and applications. You can utilize private IP addresses and configure subnets along with access control policies, among other features. This service allows you to manage Azure similar to your own data center environment. All traffic between Azure resources, whether within a single region or across multiple regions, remains within the Azure network—meaning intra-Azure communications do not pass through the Internet. For virtual machine-to-virtual machine, storage, and SQL interactions, the data traverses solely the Azure network, irrespective of the originating or destination regions. Furthermore, inter-region traffic between virtual networks also occurs entirely within the Azure infrastructure. Virtual Network empowers you to seamlessly integrate your on-premises IT setup into the cloud, akin to connecting to a remote branch office. You can securely establish a connection to your virtual network by selecting either an IPsec VPN or a dedicated line with Azure ExpressRoute, ensuring optimal performance and security for your applications. This flexible connectivity enhances the overall efficiency of managing cloud resources and bolstering your operational capabilities.
  • 25
    Parallels Desktop for Chrome OS Reviews
    Experience the seamless functionality of full-featured Windows applications, including Microsoft Office, on Chrome Enterprise devices, even when offline! This capability empowers users to utilize the extensive potential of Chromebooks alongside the comprehensive resources of the Windows ecosystem. IT management becomes more straightforward while catering to a dynamic workforce that requires versatility. With full-featured Windows applications delivered directly to your team's Chromebooks, they can remain productive whether they are at home, commuting, or offline. Alleviate the IT burden and minimize stress by leveraging Google's cutting-edge security and management protocols, combined with Parallels’ exceptional cross-platform expertise. This setup offers an affordable hardware solution without compromising on the essential tools, connectivity, or computational power necessary for advancing your business. Achieve the speed, performance, and resources needed to excel, regardless of your location, while ensuring continuous access to critical business Windows applications. This innovative approach not only enhances productivity but also fosters a more efficient work environment.
MongoDB Logo MongoDB