Business Software for Azure Marketplace

Top Software that integrates with Azure Marketplace

  • 1
    Seeq Reviews

    Seeq

    Seeq Corporation

    $1000.00/year/user
    Seeq is the first app that focuses on process data analytics. Search your data, add context, model, cleanse, find patterns, establish boundaries and collaborate in real-time with time series data. No matter what your operational data system or process historian - the OSIsoft®, PI System®, Honeywell’s Uniformance®, Emerson DeltaV and Ovation or Inductive Automation's Ignition - Seeq can connect and get to work in minutes. What's missing in the current hype about predictive analytics, machine learning and data science is solutions to the real problems that an analytics-driven company faces. Your current employees' expertise. Collaboration and knowledge capture are key to fostering sharing and reuse of analytics efforts. The ability to quickly distribute insights to those who need them to improve outcomes.
  • 2
    Darktrace Reviews
    Darktrace offers a cutting-edge cybersecurity solution with its ActiveAI Security Platform, which utilizes AI to ensure proactive and real-time defense against cyber threats. The platform continually monitors enterprise data, from emails and cloud infrastructure to endpoints and applications, providing a detailed, contextual understanding of the security landscape. Darktrace’s AI-driven system autonomously investigates alerts, correlates incidents, and responds to both known and unknown threats, ensuring that businesses stay one step ahead of adversaries. By automating investigations and recovery actions, Darktrace reduces the burden on security teams and speeds up incident response, driving efficiency and improving cyber resilience. With a significant reduction in containment time and faster SOC triage, Darktrace ensures businesses are better protected from ever-evolving threats.
  • 3
    Flowmon Reviews

    Flowmon

    Progress Software

    Real-time network anomalies can be addressed and made decisions. Flowmon's actionable information is available in cloud, hybrid, and on-premise environments. Flowmon's network Intelligence integrates SecOps and NetOps into a single solution. It is capable of automated traffic monitoring, threat detection, and provides a solid foundation for informed decision-making. Its intuitive interface makes it easy for IT professionals to quickly understand incidents and anomalies, their context, impact, magnitude and, most importantly, their root cause.
  • 4
    Exasol Reviews
    An in-memory, column-oriented database combined with a Massively Parallel Processing (MPP) architecture enables the rapid querying of billions of records within mere seconds. The distribution of queries across all nodes in a cluster ensures linear scalability, accommodating a larger number of users and facilitating sophisticated analytics. The integration of MPP, in-memory capabilities, and columnar storage culminates in a database optimized for exceptional data analytics performance. With various deployment options available, including SaaS, cloud, on-premises, and hybrid solutions, data analysis can be performed in any environment. Automatic tuning of queries minimizes maintenance efforts and reduces operational overhead. Additionally, the seamless integration and efficiency of performance provide enhanced capabilities at a significantly lower cost compared to traditional infrastructure. Innovative in-memory query processing has empowered a social networking company to enhance its performance, handling an impressive volume of 10 billion data sets annually. This consolidated data repository, paired with a high-speed engine, accelerates crucial analytics, leading to better patient outcomes and improved financial results for the organization. As a result, businesses can leverage this technology to make quicker data-driven decisions, ultimately driving further success.
  • 5
    WALLIX Bastion Reviews
    WALLIX Bastion's PAM solution is easy to use and deploy. It provides robust security and oversight of privileged access to critical IT infrastructure. With simplified Privileged Access Management, you can reduce the attack surface, protect remote access, and comply with regulatory compliance requirements. WALLIX Bastion provides top session management, secrets management and access management features to secure IT environments and enable Zero Trust policies. It also protects internal and external access of sensitive data, servers and networks in industries that range from healthcare to finance to industry, manufacturing, and even finance. Adapt to the digital transformation with secure DevOps thanks to AAPM (Application-to-Application Password Management). WALLIX Bastion can be used both on-premise or in the cloud for maximum flexibility, scalability and the lowest total cost of ownership. WALLIX Bastion PAM natively integrates to a full suite security solutions
  • 6
    Trend Micro Deep Discovery Reviews
    Deep Discovery Inspector can be utilized as either a physical or virtual network appliance, purposefully engineered to swiftly identify sophisticated malware that often evades conventional security measures while exfiltrating confidential information. With the aid of specialized detection engines and unique sandbox analysis, it effectively identifies and mitigates potential breaches. As organizations increasingly fall prey to targeted ransomware attacks wherein advanced malware circumvents traditional defenses, encrypts essential data, and extorts payment for its release, Deep Discovery Inspector employs both known and novel patterns along with reputation analysis to uncover the most recent ransomware threats. Meanwhile, Deep Discovery Analyzer serves as an all-in-one appliance, leveraging virtual images of endpoint configurations to scrutinize and identify targeted attacks. By employing a combination of cross-generational detection methods at optimal moments, it successfully uncovers threats that are specifically engineered to bypass standard security solutions and protect organizations from emerging risks.
  • 7
    Akamai Reviews

    Akamai

    Akamai Technologies

    Akamai brings digital experiences closer to users than any other provider while simultaneously keeping threats and attacks at bay. As it drives the next wave of digital transformation, the Akamai Intelligent Edge Platform acts as a comprehensive shield, safeguarding all aspects of the digital ecosystem, including websites, users, devices, data centers, and clouds. This technology effectively reduces friction and enhances user engagement. With a network of a quarter of a million edge servers strategically positioned in numerous locations worldwide, it processes an astounding 2.5 exabytes of data annually, engaging with 1.3 billion devices and 100 million IP addresses daily. Positioned within a single network hop of over 90% of the global Internet population, it stands out as the sole global, extensively distributed, intelligent edge platform, delivering the scale, resilience, and security that modern businesses require. Additionally, it offers advanced threat intelligence to help organizations manage security vulnerabilities and defend against cyber threats. This comprehensive approach ensures that digital operations remain secure and efficient in an increasingly complex online landscape.
  • 8
    WPS Reviews

    WPS

    BlueBear Data Solutions

    Introducing the most comprehensive work permit system designed to cater to various sectors. The WPS is adaptable for organizations of all sizes, whether they are for-profit or nonprofit entities. It features a fully web-based and responsive interface for work permits. With WPS, users can conveniently check the status of a work permit and manage isolation procedures from any device, at any time and place. The system also utilizes tags to ensure that work is conducted safely. WPS operates effectively on both mobile and desktop platforms, making it ideal for any organization. The Permit to Work serves as a foundational element of the operational safety framework. WPS stands out as a permit-centric operational system that fulfills this need. Additionally, the platform offers a comprehensive view and management of all currently issued work permits, going beyond basic functionalities. WPS enhances each permit by integrating Task Risk Assessments (TRA), Last Minute Risk Assessments (LMRA), and Lockout/Tagout (LoToTo) processes. As a combined safety and risk assessment tool, WPS provides a tailored installation that meets the unique occupational safety requirements of each organization, ensuring a safer working environment for all involved. This flexibility allows organizations to streamline their safety protocols effectively.
  • 9
    Barracuda CloudGen Access Reviews
    Effectively oversee your remote team by enabling the rapid setup of both company-issued and personal devices, as well as unmanaged contractor endpoints. Minimize the risk of data breaches through a Zero Trust security framework that ensures secure access. This approach delivers ongoing verification of user and device identities, thereby decreasing the potential attack surface. By utilizing this method, employees benefit from enhanced access, improved security measures, and better performance relative to conventional VPN solutions. The foundation of security is rooted in access control. The CloudGen Access Zero Trust framework establishes unrivaled control over access for users and devices, eliminating the performance drawbacks associated with traditional VPNs. It allows for remote, conditional, and contextual resource access while mitigating excessive privileges and third-party risks. Through CloudGen Access, both employees and partners can seamlessly connect to corporate applications and cloud services without introducing additional vulnerabilities, ensuring a more fortified digital environment. This innovative approach not only secures sensitive information but also enhances overall operational efficiency.
  • 10
    Bold Reports Reviews
    Harness the full potential of your data through paginated, printable reports, enabling you to make informed choices. You can easily create, view, manage, schedule, and share these reports without the need for software installations or infrastructure management. Enjoy a secure on-premises reporting environment that allows for the creation and sharing of reports while ensuring data separation and isolation. This unique reporting solution includes a designer, viewer, writer, and server integrated within both desktop and web applications. Effortlessly integrate reports featuring viewing, printing, and exporting capabilities into your desktop and web reporting tools. This comprehensive approach ensures that your reporting needs are met with efficiency and security.
  • 11
    CTERA Reviews

    CTERA

    CTERA Networks

    Achieve boundless storage capacity without the need for additional hardware by utilizing smart edge caching and scalable cloud solutions. Facilitate contemporary remote working environments by enabling users in distributed offices and those working from home to efficiently store, access, and collaborate on files across various devices and locations. Ensure data sovereignty while supporting GDPR compliance by employing top-tier infrastructure that includes entirely private, public, and hybrid cloud storage options. Transition away from conventional storage and backup systems by implementing a cloud file system that leverages software-defined file services built on object storage technology. The CTERA Enterprise File Services Platform empowers organizations to link remote sites and users under a unified namespace, providing high-quality data access experiences from any edge location or device. This transformative approach not only streamlines data management but also enhances collaboration in an increasingly digital workplace.
  • 12
    Quorum Reviews

    Quorum

    Quorum Analytics

    Quorum’s public affairs platform enables you to efficiently map, monitor, modify, and report on your policy environment seamlessly in a single location. By utilizing this comprehensive tool, you can allocate more energy to strategic projects rather than getting bogged down by manual tasks, as it covers all aspects of your organization’s policy landscape. Stay informed about every mention of your issues in legislation, discussions, and documents at various levels, including Federal, State, and European. This solution serves as a centralized hub for managing contacts, nurturing new relationships, and actively engaging with stakeholders, ensuring that you remain connected and responsive in a dynamic policy environment. Furthermore, with its user-friendly interface, Quorum empowers users to swiftly adapt to changes and make informed decisions.
  • 13
    DigiCert ONE Reviews
    Swift and adaptable, providing complete oversight of your systems and users, this represents the contemporary method for Public Key Infrastructure (PKI) and integrates seamlessly within DigiCert ONE. It offers unparalleled flexibility for the identification, validation, and protection of all users, systems, and devices. Built from the ground up to fulfill even the strictest regional and local deployment standards, DigiCert Enterprise PKI Manager caters to your specific needs. With options that include in-country, air-gapped, private or public cloud configurations, or a hybrid model, it allows for exceptional adaptability. The solution features dynamic and nearly instantaneous Intermediate Certificate Authority (ICA) creation along with sophisticated permissions and access controls. Utilizing Docker containerization delivers a minimal footprint while allowing for scalability that aligns with your evolving requirements. Automatic orchestration paired with continuous updates guarantees that your essential applications remain secure and optimized. Moreover, it effectively addresses the significant security challenge commonly encountered in Internet of Things (IoT) initiatives: complexity. With DigiCert IoT Device Manager, you can effortlessly identify, manage, control, and secure every connected device from a centralized interface, enhancing both efficiency and security for your organization. This comprehensive approach not only simplifies management but also fortifies your entire IoT ecosystem.
  • 14
    ZeroFox Reviews
    Organizations allocate significant resources to enhance their social media and digital presence, which has emerged as the primary means of engagement for countless individuals and businesses alike. As social media solidifies its role as the favored tool for interaction, it becomes essential for security teams to recognize and mitigate the vulnerabilities associated with these digital channels, which represent the largest unprotected IT network globally. Discover the capabilities of the ZeroFox Platform by checking out this brief two-minute overview video. Equipped with a worldwide data collection engine, AI-driven analytics, and automated response features, the ZeroFox Platform safeguards you against cyber, brand, and physical threats across social media and various digital platforms. Gain insight into your organization’s exposure to digital risks across numerous platforms where interactions occur and cyber threats may arise. Moreover, the ZeroFox mobile application offers the robust protection of the ZeroFox Platform right at your fingertips, ensuring accessibility and security wherever and whenever it is needed. Ultimately, understanding your digital landscape is crucial for effective risk management in today’s interconnected world.
  • 15
    Broadcom Datacom Reviews
    Broadcom Datacom® is a powerful relational database management system built to support enterprise-wide business applications with continuous availability, scalability, and high-performance processing. The platform provides organizations with a secure and fault-tolerant database repository capable of managing large-scale workloads in demanding mainframe environments. Datacom leverages zIIP specialty processors to optimize performance and reduce operational costs while improving database management efficiency. The solution also supports modernization initiatives by enabling developers and DBAs to automate the creation of REST APIs for modern cloud, mobile, and web-based applications. Organizations can integrate Datacom with modern development tools and open IDEs such as Visual Studio Code and Eclipse CHE to simplify development workflows and improve productivity. Advanced monitoring and performance analysis capabilities allow teams to analyze SQL query performance, identify issues, and optimize database operations through browser-based interfaces. Datacom continuously evolves with new features, hardware optimizations, and memory management enhancements designed to support growing enterprise demands. Broadcom also provides educational resources, roadmap webinars, modernization workshops, and professional services to help businesses maximize the value of their database environments. By combining modernization support, enterprise scalability, and reliable database performance, Datacom enables organizations to strengthen operational resilience while supporting long-term digital transformation initiatives.
  • 16
    Nasuni Reviews
    The pioneering integration of 'in-line' edge detection alongside swift ransomware recovery capabilities instills confidence in IT professionals to effectively counter cyber threats. Nasuni is revolutionizing the file storage sector through its cloud-centric model, which supplants conventional on-premises primary and secondary storage solutions. By utilizing object storage technology, Nasuni offers a file storage platform that is not only simpler and more cost-effective but also more efficient as a SaaS offering that adapts seamlessly to the rapid growth of unstructured data. This innovative solution allows for cloud file storage across countless locations from a unified console, ensuring on-demand capacity when and where it is required, all while incorporating inherent backup and disaster recovery features. Designed to support cloud, hybrid cloud, and traditional on-premises setups, Nasuni consolidates various data silos and toolsets into a singular global file system that provides a comprehensive overview of your file data while being straightforward to deploy and manage. Ultimately, this approach empowers organizations to streamline their file storage processes, enhancing overall operational efficiency.
  • 17
    MinIO Reviews
    MinIO offers a powerful object storage solution that is entirely software-defined, allowing users to establish cloud-native data infrastructures tailored for machine learning, analytics, and various application data demands. What sets MinIO apart is its design centered around performance and compatibility with the S3 API, all while being completely open-source. This platform is particularly well-suited for expansive private cloud settings that prioritize robust security measures, ensuring critical availability for a wide array of workloads. Recognized as the fastest object storage server globally, MinIO achieves impressive READ/WRITE speeds of 183 GB/s and 171 GB/s on standard hardware, enabling it to serve as the primary storage layer for numerous tasks, including those involving Spark, Presto, TensorFlow, and H2O.ai, in addition to acting as an alternative to Hadoop HDFS. By incorporating insights gained from web-scale operations, MinIO simplifies the scaling process for object storage, starting with an individual cluster that can easily be federated with additional MinIO clusters as needed. This flexibility in scaling allows organizations to adapt their storage solutions efficiently as their data needs evolve.
  • 18
    ASC Reviews

    ASC

    ASC Technologies

    ASC offers innovative solutions that enable users to enhance service quality, safeguard their assets, and respond effectively in emergency situations. Such challenges are routinely faced by businesses and public safety agencies alike. Partnering with ASC allows these organizations to leverage a practical approach that not only captures communication streams but also transforms the overwhelming influx of data into actionable insights that boost productivity while reducing expenses. Recognized globally as a leading software provider in omni-channel recording, quality management, and analytics, ASC caters to a diverse range of businesses with recording necessities, particularly in the realms of contact centers, financial services, and public safety. We specialize in recording, analyzing, and evaluating interactions across various media formats, including fixed-line and mobile calls, chat, video, screen sharing, SMS, and Microsoft Teams Meetings. This comprehensive capability ensures that our clients can maintain high standards of communication and operational efficiency.
  • 19
    DataRobot Reviews
    AI Cloud represents an innovative strategy designed to meet the current demands, challenges, and potential of artificial intelligence. This comprehensive system acts as a single source of truth, expediting the process of bringing AI solutions into production for organizations of all sizes. Users benefit from a collaborative environment tailored for ongoing enhancements throughout the entire AI lifecycle. The AI Catalog simplifies the process of discovering, sharing, tagging, and reusing data, which accelerates deployment and fosters teamwork. This catalog ensures that users can easily access relevant data to resolve business issues while maintaining high standards of security, compliance, and consistency. If your database is subject to a network policy restricting access to specific IP addresses, please reach out to Support for assistance in obtaining a list of IPs that should be added to your network policy for whitelisting, ensuring that your operations run smoothly. Additionally, leveraging AI Cloud can significantly improve your organization’s ability to innovate and adapt in a rapidly evolving technological landscape.
  • 20
    Azure Storage Reviews
    Microsoft's Azure Storage platform serves as a comprehensive cloud storage solution tailored for contemporary data management needs. It guarantees high availability, impressive scalability, durability, and security for an extensive range of data objects hosted in the cloud. Users can access these data objects globally through HTTP or HTTPS using a REST API, facilitating seamless data retrieval. Additionally, Azure Storage provides client libraries to assist developers in creating applications or services in various programming languages, including .NET, Java, Python, JavaScript, C++, and Go. For scripting data management or configuration tasks, developers and IT experts can utilize Azure PowerShell and Azure CLI effectively. The Azure portal and Azure Storage Explorer serve as intuitive user-interface tools for engaging with Azure Storage resources. The platform's durability and high availability are enhanced by built-in redundancy, ensuring data safety even during temporary hardware failures. Furthermore, users can choose to replicate their data across multiple data centers or geographical regions, offering extra safeguards against local disasters or unforeseen events. This level of protection reinforces Azure Storage’s commitment to providing reliable and secure cloud storage solutions for its users.
  • 21
    Appgate Reviews
    Combining a diverse range of cloud and hybrid-ready security and analytics solutions, Appgate currently protects over 1,000 organizations in 40 different nations. The company adopts a dedicated strategy towards Zero Trust security. As IT becomes more distributed and on-demand, it presents new security challenges. Security professionals are often left attempting to tackle modern issues with outdated strategies. By becoming a less visible target, organizations can enhance their defenses against threat actors. Embracing an identity-centric, Zero Trust approach is crucial, as it considers various contextual factors before granting access. It is essential to proactively identify and eliminate both internal and external threats that may jeopardize your organization. Leading global corporations and government entities rely on our top-notch, effective secure access solutions. Our ZTNA solution is designed to strengthen and streamline network security by offering a comprehensive suite of features. Ultimately, this not only mitigates risk but also ensures that consumers enjoy a smooth and secure connection to your digital services while safeguarding sensitive data.
  • 22
    Gigamon Reviews
    Ignite Your Digital Transformation Journey. Oversee intricate digital applications throughout your network with unmatched levels of intelligence and insight. The daily task of managing your network to maintain seamless availability can feel overwhelming. As networks accelerate, data volumes expand, and users and applications proliferate, effective monitoring and management become increasingly challenging. How can you successfully lead Digital Transformation? Imagine being able to guarantee network uptime while also gaining insight into your data in motion across physical, virtual, and cloud environments. Achieve comprehensive visibility across all networks, tiers, and applications, while obtaining critical intelligence about your complex application frameworks. Solutions from Gigamon can significantly elevate the performance of your entire network ecosystem. Are you ready to discover how these improvements can transform your operations?
  • 23
    Microsoft Intune Reviews
    Revolutionize the delivery of IT services in your contemporary workplace environment. Achieve seamless management of modern workplace operations and drive digital transformation through Microsoft Intune. Facilitate a highly efficient Microsoft 365 ecosystem that empowers users to utilize their preferred devices and applications while ensuring data security. Manage iOS, Android, Windows, and macOS devices securely through a unified endpoint management solution. Enhance the efficiency of deployment, provisioning, policy management, app distribution, and updates through streamlined automation. Maintain a cutting-edge, scalable cloud service architecture that is distributed globally to keep your systems current. Utilize the power of the intelligent cloud to gain valuable insights and establish baselines for your security configurations and policies. Protect sensitive data effectively, especially when devices are not directly managed by your organization but are used by employees or partners to access work-related information. Intune's app protection policies allow for meticulous control over Office 365 data on mobile devices, ensuring compliance and security. By implementing these solutions, organizations can create a resilient digital environment that adapts to the evolving needs of the workforce.
  • 24
    Abnormal AI Reviews
    Abnormal AI provides an innovative behavioral AI platform that defends against highly targeted and automated email threats such as phishing, social engineering, and account takeovers. By employing superhuman understanding of human behavior and anomaly detection, it stops AI-driven attacks that often bypass conventional security tools. The platform operates fully autonomously, detecting and neutralizing threats in milliseconds without requiring human intervention, which significantly reduces the workload on security teams. It integrates smoothly with cloud email services like Microsoft 365, offering multi-layered protection with minimal disruption. With more than 3,000 customers, including 20% of the Fortune 500, Abnormal AI has proven its ability to reduce phishing attacks by 90% and lower SOC headcount by 50%. Customers praise its fast implementation, ease of use, and strong customer support. Its AI agents also automate repetitive security operations center workflows, accelerating response times. This comprehensive solution is designed to protect humans by focusing on behavioral insights rather than relying solely on traditional rule-based detection.
  • 25
    Scale GenAI Platform Reviews
    Build, test and optimize Generative AI apps that unlock the value in your data. Our industry-leading ML expertise, our state-of-the art test and evaluation platform and advanced retrieval augmented-generation (RAG) pipelines will help you optimize LLM performance to meet your domain-specific needs. We provide an end-toend solution that manages the entire ML Lifecycle. We combine cutting-edge technology with operational excellence to help teams develop high-quality datasets, because better data leads better AI.
MongoDB Logo MongoDB