Business Software for Azure Marketplace

Top Software that integrates with Azure Marketplace

  • 1
    Apache Guacamole Reviews

    Apache Guacamole

    Apache Software Foundation

    Apache Guacamole serves as a gateway for remote desktop access without the need for a client. It is compatible with common protocols such as VNC, RDP, and SSH. The term "clientless" reflects the fact that no additional plugins or client applications are necessary. Thanks to the capabilities of HTML5, after installing Guacamole on a server, you only require a web browser to reach your desktops. This web-based client allows for a flexible usage scenario, making it possible to access your systems from any device or location that has a web browser. Interestingly, the desktops you connect to via Guacamole do not need to exist physically; they can be virtual machines hosted in the cloud. This setup merges the advantages of Guacamole with the robustness and adaptability of cloud computing services. Furthermore, Apache Guacamole is completely free and open-source, licensed under the Apache License, and is continuously updated by a dedicated community of developers who utilize Guacamole for their personal development needs. Consequently, this ensures that users benefit from ongoing improvements and support, enhancing their overall experience with the software.
  • 2
    FortiGate Cloud Reviews
    FortiGate Cloud enhances network management for Fortinet devices such as FortiGate, FortiSwitch, FortiAP, and FortiExtender, streamlining the process of initial deployment, configuration, and continuous maintenance. This platform offers advanced analytics and reporting capabilities designed for small to medium-sized enterprises, allowing organizations of any size to gain comprehensive insights into their security posture. As a cloud-based software-as-a-service (SaaS), FortiGate Cloud delivers a variety of management, reporting, and analytical tools tailored for FortiGate next-generation firewalls. It further simplifies the deployment, setup, and management of FortiGate alongside SD-WAN functionalities, FortiSwitch, FortiAP, and FortiExtender through zero-touch provisioning, ensuring full visibility over the entire deployment process. With the ability to scale according to your needs, FortiGate Cloud can evolve from managing a single FortiGate device to overseeing a complete security management service capable of handling thousands of devices across numerous clients. This flexibility ensures that as your business grows, your security management capabilities can adapt seamlessly to meet new challenges.
  • 3
    FortiPAM Reviews
    FortiPAM delivers privileged access management, oversight, and regulation of elevated and privileged accounts, processes, and vital systems throughout the complete IT landscape. As a component of the Fortinet Security Fabric, FortiPAM seamlessly integrates with various products including FortiClient, FortiAuthenticator, and FortiToken. To safeguard critical assets, the highest security measures are essential. With FortiPAM, enhanced security is achievable, incorporating zero-trust network access (ZTNA) controls that verify users attempting to access sensitive resources. ZTNA tags can be utilized to assess device posture for vulnerabilities, antivirus status, geographical location, and additional factors. These assessments are conducted on a continuous basis, ensuring that any changes in device status trigger a disconnection from the critical asset. Consequently, FortiPAM guarantees that both users and devices accessing vital resources remain secure, effectively mitigating potential threats. Users have the flexibility to utilize pre-existing applications, web-based launchers, or easily design customized launch templates to suit their specific needs. This adaptability enhances the overall user experience while maintaining robust security protocols.
  • 4
    FortiAIOps Reviews
    FortiAIOps enhances IT operations by providing proactive visibility through the power of artificial intelligence, facilitating a more efficient network management system. This AI/ML solution is specifically designed for Fortinet networks, enabling rapid data acquisition and the detection of anomalies within the network. The various Fortinet devices, including FortiAPs, FortiSwitches, FortiGates, SD-WAN, and FortiExtender, contribute to the FortiAIOps dataset, which aids in generating insights and correlating events crucial for the network operations center (NOC). This system allows for comprehensive visibility across the entire OSI model, offering detailed Layer 1 data such as RF spectrum analysis to identify potential Wi-Fi interference. Additionally, it provides Layer 7 application insights, revealing the applications that flow through both Ethernet and SD-WAN links. To further assist in network management, users can leverage an array of troubleshooting tools, including VLAN probing, cable verification, spectrum analysis, and service assurance, to effectively diagnose and resolve issues. By employing these tools, organizations can ensure their networks operate smoothly and efficiently.
  • 5
    FortiMonitor Reviews
    FortiMonitor transforms network oversight by facilitating comprehensive visibility into the user experience from start to finish. As a robust, software-as-a-service digital experience monitoring (DEM) platform, FortiMonitor aids organizations in upgrading their performance-monitoring systems. It ensures clarity into application performance on endpoints and the overall digital experience, regardless of the user's location or where the application is situated. Discover how FortiMonitor equips NetOps teams with the tools for thorough monitoring of network and application performance, ultimately enhancing the digital experience for both customers and employees. Moreover, the monitoring of SD-WAN underlays provides valuable DEM insights for active SD-WAN participants, revealing user-specific metrics related to application accessibility. Detailed metrics such as SSL resolution time, DNS resolution time, time to first byte, time to last byte, and round-trip time are provided, along with standard measurements of packet loss, latency, and jitter for each underlay. This comprehensive approach not only improves network performance but also fosters a more responsive and efficient user experience overall.
  • 6
    FortiVoice Reviews
    FortiVoice and FortiFone provide a unified communication experience that encompasses calling, conferencing, chat, fax, and mobility solutions. Fortinet's enterprise-grade phone systems merge the comprehensive FortiVoice system with high-definition audio from FortiFone, ensuring organizations can adapt to the dynamic demands of communication stemming from advancements in infrastructure, remote or hybrid work environments, and bring-your-own-device policies. This cohesive platform unifies various communication tools, enabling teams to collaborate effectively and adapt to modern communication challenges without incurring additional resource or cost burdens. By integrating calling, conferencing, chat, fax, and mobile capabilities, FortiVoice enhances organizational connectivity and streamlines communication processes. Furthermore, FortiVoice's extensive suite of communication and security features is housed within a user-friendly platform, simplifying management across various devices, users, and locations. The solution is designed for easy deployment and customization, allowing businesses to tailor it to their specific workflows, thus maximizing operational efficiency. Additionally, built with cutting-edge security and encryption technologies, FortiVoice ensures the protection of business conversations and the safeguarding of sensitive information, reinforcing trust and security in corporate communications. Ultimately, this combination of functionality and security makes FortiVoice an essential tool for modern enterprises.
  • 7
    Barracuda Firewall Insights Reviews
    As threats continue to evolve and network infrastructures become increasingly complex, utilizing analytics is crucial for effectively securing your network. By implementing analytics, you can enhance the early detection of potential data breaches. Failing to swiftly identify breaches once they occur poses a significant challenge for organizations. Comprehensive and aggregated reporting plays a vital role in sustaining a robust security posture. It is also essential to ensure both regulatory compliance and the security of your data. Tracking key performance indicators like latency and bandwidth can be accomplished through customizable dashboards. To optimize network performance, employ real-time monitoring capabilities. Additionally, real-time tracking and tailored reporting features can help in demonstrating compliance with GDPR regulations. To uphold security while ensuring smooth and uninterrupted connectivity, it is necessary to engage in continuous analysis of a vast stream of real-time data. Rapid responses to fluctuating inputs regarding network traffic, bandwidth usage, and line integrity are imperative. This ongoing assessment is the only way to consistently gauge the effectiveness of your security strategies, ultimately safeguarding your organization against potential breaches. Regularly reviewing these analytics can also uncover insights that may enhance overall network performance.
  • 8
    Tenable Web App Scanning Reviews
    Experience unified scanning for web applications and APIs that is straightforward, scalable, and fully automated. Tenable Web App Scanning provides thorough dynamic application security testing (DAST) that addresses critical risks, including the top ten threats identified by OWASP, alongside vulnerable web components and APIs. Backed by the largest vulnerability research team in the field, it ensures robust web application security. Rapid scans can be executed to identify prevalent security hygiene issues in under two minutes, offering immediate insights. Initiating a new web application scan takes mere seconds, utilizing familiar vulnerability management workflows. You can also automate testing for all your applications on a weekly or monthly basis. Furthermore, the platform allows for the creation of entirely customizable dashboards and visualizations, consolidating IT, cloud, and web application vulnerability data into a coherent overview. Tenable Web App Scanning is available both as a cloud solution and as an on-premises option that integrates seamlessly with Tenable Security Center, enhancing your security strategy through flexible deployment choices. This dual availability ensures that organizations can choose the solution that best fits their infrastructure and compliance needs.
  • 9
    Meraki vMX Reviews
    Compatible with AWS, Azure, Google Cloud Platform, Alibaba Cloud, and Cisco NFVIS, this solution requires just a license available in durations of 1, 3, or 5 years. It provides support for IPsec and Cisco AnyConnect VPN for remote employees, offering a VPN throughput of 200 Mbps and the capability to manage up to 50 simultaneous VPN tunnels. Any MX or Z3 device can create optimized SD-WAN links to a vMX in AWS, where EC2 instance usage incurs either hourly or monthly fees. Extending SD-WAN to a hybrid cloud setup can be accomplished in just three clicks, allowing for streamlined access to both public and private cloud resources utilizing virtual MX (vMX) appliances. The system enables real-time monitoring of web application health across LAN, WAN, and application servers, ensuring optimal performance. Moreover, branch locations can be securely linked with a physical MX appliance to public cloud resources using Auto VPN, facilitating a seamless connection experience in merely three clicks.
  • 10
    Arista NG Firewall Reviews
    Arista's Next Generation Firewall (NG Firewall) serves as a holistic network security solution aimed at streamlining and bolstering cybersecurity efforts within organizations. By unifying various security functionalities into a single, modular software package, it offers an intuitive interface that facilitates effective management. The NG Firewall takes a proactive stance against a variety of threats, including malware, hacking attempts, and phishing schemes, blocking them before they can compromise user devices and thereby delivering strong network protection. This platform features real-time, database-driven reporting capabilities that eliminate the need for extra hardware appliances. Administrators benefit from a centralized dashboard to monitor the network's status, maintain compliance through comprehensive event logs, and receive timely alerts regarding network irregularities or suspicious user activities. Furthermore, the NG Firewall adeptly handles rogue applications, encrypted web requests, points of malware distribution, and spam, granting detailed control over network traffic. With its advanced features, the NG Firewall not only protects but also enhances overall network performance, making it a vital component of modern cybersecurity infrastructure.
  • 11
    Azure Firewall Manager Reviews

    Azure Firewall Manager

    Microsoft

    $100 per policy per region
    A centralized approach to network security policy and route management is essential for software-defined perimeters that span globally. This involves the unified configuration and oversight of numerous Azure Firewall instances that are distributed across various Azure regions and subscriptions. The management of security policy settings and logging across these multiple Azure Firewall instances is crucial for maintaining a secure environment. By centralizing Azure Firewall management within secured virtual hubs and their associated hub virtual network deployments, organizations can streamline operations and enhance security. Traffic routing can be automated to ensure effective security filtering within these protected virtual hubs. Additionally, collaboration with third-party Security as a Service (SECaaS) providers can bolster defenses through advanced protection mechanisms. Firewall policies play a significant role in securing one or more virtual hubs or Virtual Networks, enabling rapid response to threats through a well-defined Firewall Policy hierarchy. The use of Secure Virtual Hubs facilitates the efficient redirection of branch and spoke VNET traffic to the Azure Firewall, making it easier to enforce a zero trust model with minimal effort. Furthermore, Azure Firewall is utilized for managing local traffic, while a SECaaS provider can handle filtering for internet traffic, ensuring a comprehensive security strategy that addresses both internal and external threats effectively. The integration of these elements not only strengthens the security posture but also promotes operational efficiency across the entire network infrastructure.
  • 12
    IBM Guardium AI Security Reviews
    Consistently monitor and remediate vulnerabilities within AI data, models, and application usage using IBM Guardium AI Security, which provides automated and ongoing surveillance for AI implementations. The system identifies security flaws and misconfigurations while managing the security dynamics between users, models, data, and applications. This functionality is integrated within the IBM Guardium Data Security Center, designed to enhance collaboration between security and AI teams through streamlined workflows, a unified overview of data assets, and centralized compliance regulations. Guardium AI Security identifies the specific AI model linked to each deployment, revealing the data, model, and application interactions involved. Additionally, it displays all applications that access the model, allowing users to assess vulnerabilities in the model, its foundational data, and the interacting applications. Each identified vulnerability is given a criticality score, enabling effective prioritization of remediation efforts. Furthermore, users can easily export the vulnerability list for comprehensive reporting, ensuring that all necessary stakeholders are informed and aligned on security efforts. This proactive approach not only strengthens security but also fosters a culture of awareness and responsiveness within the organization.
  • 13
    SolarWinds Observability Self-Hosted Reviews
    SolarWinds Observability Self-Hosted, previously referred to as Hybrid Cloud Observability, serves as a robust, all-encompassing observability platform tailored to assist businesses in maintaining system uptime and shortening remedial efforts across both on-premises and multi-cloud infrastructures by enhancing visibility, intelligence, and overall efficiency. This solution consolidates data from various components of the IT landscape, including networks, servers, applications, databases, and more, to deliver a cohesive perspective on service performance and component interrelations. Key functionalities of the platform include monitoring network performance, analyzing traffic flows, managing network device configurations, overseeing IP address allocations, tracking users and devices, as well as managing servers and applications. Additionally, it supports virtualization oversight, log monitoring and analysis, server configuration governance, and quality assurance for VoIP and network services. By providing these integrated features, SolarWinds helps organizations proactively address issues and optimize their IT environments.
  • 14
    ExSign Reviews

    ExSign

    Hosting Controller

    $1/month/user
    ExSign is a solution designed for managing email signatures within Microsoft 365 and Microsoft Exchange Server environments. With ExSign, administrators have the capability to automatically apply polished signatures and disclaimers to all outgoing emails, streamlining the communication process. This means employees can focus on their messages without the hassle of crafting signatures for each email they send. The software allows for centralized creation of signatures and disclaimers, enabling Exchange to intelligently select and apply the appropriate ones as needed. By using ExSign, organizations can ensure consistency and professionalism in their email communications effortlessly.
  • 15
    Contracts 365 Reviews
    Transform your business's approach to contract management with Contracts 365®, a robust solution designed specifically for Microsoft 365 users. Experience the daily advantages of effective contract oversight with this sleek, cloud-based software that integrates seamlessly into your Microsoft environment, catering to users at all levels. Contracts serve as the foundational elements of business operations; whether handling purchases, sales, rentals, partnerships, or investments, your organization's success hinges on effective contract management. By implementing seamless contract management, you can unlock significant value throughout your organization. Contracts 365 empowers you to enhance visibility, drive efficiency, and maintain control throughout the entire contract management process, ultimately leading to better decision-making and improved organizational performance.
  • 16
    CCH Tagetik Reviews
    CCH Tagetik Corporate Performance Management software is trusted by companies to save time, reduce costs, and reduce risk. Connect data, processes, and people with one trusted source to get a quicker close and more forward-looking planning. CCH Tagetik Finance Transformation Platform powered by the Analytic Information Hub is the unified platform that connects finance & operations and streamlines consolidation & close planning, reporting & analysis, disclosures, and compliance.
  • 17
    Syslog-ng Reviews
    Syslog-ng serves as a dependable, scalable, and secure solution for central log management. IT departments can utilize syslog-ng to gather and consolidate log information related to user behaviors, performance indicators, network activity, and other pertinent data. This functionality aids in eliminating data silos, enabling teams to achieve comprehensive visibility across their log information. Among its features, syslog-ng provides secure data transfer and storage, a scalable infrastructure, adaptable log routing capabilities, and real-time data transformation. Additionally, the platform is offered in both open-source and enterprise versions, catering to a variety of organizational needs. This versatility ensures that teams can select the edition that best aligns with their operational requirements.
  • 18
    erwin Data Modeler Reviews
    Simplify and enhance the accessibility of enterprise data through erwin Data Modeler. Recognized as the leading data modeling tool, erwin Data Modeler is utilized by premier brands globally to establish a cohesive perspective of data from diverse sources, thereby promoting its utilization, comprehension, and reliability throughout the organization. This versatile software is offered in three distinct editions: Standard, Workgroup, and Navigator, catering to varying business needs. By leveraging these options, organizations can tailor their data modeling approach to align with their specific requirements and enhance overall data governance.
  • 19
    CARTO Reviews
    Introducing the foremost cloud-native platform for Location Intelligence. From enhancing billboard placements to optimizing sales territories and crafting efficient supply chains, the ability to comprehend and analyze spatial data is essential for the advancement of your enterprise. CARTO's Location Intelligence platform empowers organizations to store, enrich, analyze, and visualize their data, facilitating informed, spatially-aware decision-making. A striking 80% of the data gathered by businesses contains a geographic element, yet a mere 10% is leveraged for strategic decision-making. By harnessing the power of spatial analytics, organizations can unlock a significant competitive advantage, enabling them to achieve their business objectives more effectively. Discover how your industry counterparts are utilizing spatial data and analysis to transform their operations and drive success.
  • 20
    Octopai Reviews
    To have complete control over your data, harness the power of data discovery, data lineage and a data catalogue. It can quickly navigate through complex data landscapes. Access the most comprehensive automated data lineage and discovery system. This gives you unprecedented visibility and trust in the most complex data environments. Octopai extracts metadata from all data environments. Octopai can instantly analyze metadata in a fast, secure, and easy process. Octopai gives you access to data lineage, data discovery, and a data catalogue, all from one central platform. In seconds, trace any data from end to end through your entire data landscape. Find the data you need automatically from any place in your data landscape. A self-creating, self updating data catalog will help you create consistency across your company.
  • 21
    Gibbon Reviews
    Gibbon serves as a centralized platform for gathering and managing student data, enabling educators to better connect with and support their students. Designed by teachers to address widespread challenges in educational settings, Gibbon facilitates efficient planning, instruction, and assessment processes. The web-based system is accessible to teachers, students, parents, and school administrators, offering customizable access levels for different users. As a free and open-source solution, Gibbon empowers schools with the autonomy and flexibility they need to tailor their use of the software. Schools from various backgrounds around the globe, including international institutions, public schools, homeschooling environments, and refugee education centers, utilize Gibbon regularly. We are in the process of creating a comprehensive map to visualize the diverse adoption of Gibbon, inviting users to explore and contribute their own school information. With support for numerous languages, Gibbon is available in 22 actively-translated languages, and additional translations are underway, including compatibility with right-to-left text and UTF-8 encoding. This commitment to multilingual support ensures that educators and students from different linguistic backgrounds can effectively engage with the platform.
  • 22
    IBM WebSphere Application Server Reviews
    IBM WebSphere Application Server offers a versatile and secure Java server runtime environment tailored for enterprise applications. It enhances application delivery through a dependable Java Enterprise Edition-based platform that supports both microservices and standard programming models, enabling you to modernize at a comfortable pace. This environment allows for improved visibility across various workloads, facilitates the analysis of enterprise applications, and supports your transition to Kubernetes. Additionally, it empowers you to deploy and manage applications and services seamlessly, regardless of time, location, or device type. With integrated management and administrative tools, it ensures heightened security and control, while also providing support for multicloud environments to accommodate your preferred deployment strategies. Continuous delivery capabilities and services are designed to keep pace with your business's evolving demands, ultimately allowing for greater responsiveness. This comprehensive solution positions your enterprise for long-term success in a rapidly changing technological landscape.
  • 23
    Egress Intelligent Email Security Reviews
    Intelligent Email Security. Our human layer security platform uses powerful encryption and analytics technologies, contextual machine learning, and powerful encryption to prevent human-activated data breach, protect sensitive data (Egress Guard), and allow you to identify areas at risk in your email network. To help employees make smart security decisions, we use advanced DLP technology and contextual machine learning. This includes detecting and stopping accidental and intentional data leaks and ensuring that sensitive data is protected when it's shared with the right recipients. Our plug-in makes email encryption simple. We also automate protection based upon your security policies. Our intelligent technology can determine the actual threat of a breach by sharing data to ensure that the right security and control are always in place. Our eDiscovery software provides time-saving analytics and reporting across your email network.
  • 24
    KNIME Analytics Platform Reviews
    Two complementary tools, one enterprise-grade platform. Open source KNIME Analytics Platform to create data science. Commercial KNIME Server to produce data science. KNIME Analytics Platform is an open-source software that creates data science. KNIME is intuitive, open, and constantly integrating new developments. It makes data science and designing data science workflows as easy as possible. KNIME Server Enterprise Software is used to facilitate team-based collaboration, automation, and management of data science workflows, as well as the deployment and management of analytical applications and services. Non-experts have access to KNIME WebPortal and REST APIs. Extensions for KNIME Analytics Platform allow you to do more with your data. Some are created and maintained by KNIME, while others are contributed by the community or our trusted partners. Integrations are also available with many open-source projects.
  • 25
    Heimdall Data Reviews
    The Heimdall Proxy serves as a vital data access layer for developers, database administrators, and architects alike, whether in on-premise setups or cloud environments. By utilizing our proxy, users experience a solution that enhances speed, scalability, and security for existing SQL databases. We provide comprehensive SQL visibility and performance management across various database vendors, and our proxy can be seamlessly implemented as a transparent sidecar process. This distributed deployment approach maximizes performance and ensures predictive scaling capabilities. To establish a master writer and read replica architecture, certain application modifications are necessary, and our proxy expertly directs queries to the correct database instance. With our replication lag detection feature, we can assure data consistency across the board. Furthermore, the connection efficiency is significantly boosted, achieving a reduction of front-side to back-side connections by as much as a 1000:1 ratio. Users can also set limits on connections based on individual users or specific databases, promoting fairness and safeguarding the database from overload. Our solution also goes a step further by incorporating Active Directory integration for robust authentication and authorization. This not only enhances security but also simplifies user management within the system.
MongoDB Logo MongoDB