Business Software for Azure Marketplace

Top Software that integrates with Azure Marketplace

  • 1
    iboss Reviews
    The iboss Zero Trust Secure Access Service Edge (SASE) redefines network security architecture for modern businesses, enabling secure, direct-to-cloud connections that prioritize safety and speed. At its core, iboss Zero Trust SASE enforces strict access controls, ensuring that only authenticated and authorized users and devices can access network resources, regardless of their location. This is achieved through a comprehensive suite of security services that operate under the principle of "never trust, always verify," including advanced threat protection & malware defense, data loss prevention (DLP), CASB, RBI, ZTNA, and real-time inspection of encrypted traffic. Built in the cloud, iboss Zero Trust SASE provides unparalleled visibility across all user activities and sensitive data transactions, facilitating a secure digital transformation. This allows organizations to adopt a more flexible, perimeter-less security model that supports the dynamic work environments of today's workforce. With iboss Zero Trust SASE, businesses can confidently embrace cloud technologies and mobile working without compromising on security, ensuring a balance between productivity and protection in the ever-evolving cyber landscape.
  • 2
    ProxySG and Advanced Secure Gateway Reviews
    Symantec offers robust on-premises secure web gateway appliances that safeguard organizations against threats found across the internet, social media, applications, and mobile networks. When paired with the cloud-based Web Security Service, it creates a centrally-managed and hybrid secure web environment. Their scalable high-performance web proxy appliance is designed to defend communications from sophisticated threats that target online activities. With a distinctive proxy server architecture, Symantec's Secure Web Gateway solutions enable organizations to efficiently oversee, regulate, and secure their traffic, ensuring a secure web and cloud usage. The advanced secure web proxy and cloud security solutions from Symantec provide comprehensive insights into SSL/TLS-encrypted web traffic. Moreover, Symantec Web Isolation technology prevents websites from delivering zero-day malware by executing web sessions away from user devices, effectively safeguarding them while transmitting only necessary rendering information to the browser. This multi-layered approach enhances overall cybersecurity while maintaining user experience.
  • 3
    Recorded Future Reviews
    Recorded Future stands as the largest global provider of intelligence tailored for enterprise security. By integrating continuous automated data gathering and insightful analytics with expert human analysis, Recorded Future offers intelligence that is not only timely and accurate but also highly actionable. In an increasingly chaotic and uncertain world, Recorded Future equips organizations with the essential visibility needed to swiftly identify and detect threats, enabling them to take proactive measures against adversaries and safeguard their personnel, systems, and assets, thereby ensuring business operations can proceed with assurance. This platform has gained the trust of over 1,000 businesses and government entities worldwide. The Recorded Future Security Intelligence Platform generates exceptional security intelligence capable of countering adversaries on a large scale. It melds advanced analytics with human insights, drawing from an unparalleled range of open sources, dark web data, technical resources, and original research, ultimately enhancing security measures across the board. As threats evolve, the ability to leverage such comprehensive intelligence becomes increasingly crucial for organizational resilience.
  • 4
    Citrix Analytics Reviews

    Citrix Analytics

    Cloud Software Group

    $3 per user per month
    To protect sensitive information, it's essential to ensure both assets and personnel are secured at all times. Citrix Analytics for Security provides proactive defense mechanisms that enhance security without hindering the employee experience. Safeguard your workforce, IT infrastructure, and data using intelligent analytics. Identify potential threats to your information with enhanced visibility throughout your organization. Citrix has been recognized as a Leader in the IDC MarketScape for virtual client computing. Assess user experiences and reveal the overall health of your IT environment. Ensure that employees enjoy a superior virtual experience across various devices. Transform the employee experience through an advanced workspace platform. Our Customer Success Services (CSS) Select program, which comes with your subscription, offers continuous support, expert advice, adaptable training, and proactive oversight. Our primary objective is your success, and we are dedicated to helping you achieve it. With the right tools and support, your organization can navigate the complexities of the digital landscape with confidence.
  • 5
    CyberArk Endpoint Privilege Manager Reviews
    Your security needs to be as adaptable as your operations are. The Endpoint Privilege Manager provides real-time adjustments, granting users immediate local admin access when required. Cybercriminals relentlessly seek out your weaknesses, but we counteract this threat by automatically preventing credential theft before it can inflict harm. With countless ransomware variations circulating today, our solution is effective in thwarting 100% of such attacks. It allows for the temporary elevation of user privileges for particular tasks, seamlessly and instantly, while keeping help desk involvement to a minimum. Prevent ransomware from hindering your progress. Gain control over local admin accounts without interfering with daily tasks. Operate securely from any location and device, ensuring the protection of your assets and your organization's reputation. Safeguard every endpoint while maintaining smooth operational flow. By prioritizing security, you can enhance productivity without compromising safety.
  • 6
    Azure Event Grid Reviews
    Streamline your event-driven applications with Event Grid, a unified service that efficiently handles the routing of events from any source to any endpoint. Built for exceptional availability, reliable performance, and flexible scalability, Event Grid allows you to concentrate on your application's functionality instead of the underlying infrastructure. It removes the need for polling, thereby cutting down on both costs and delays. Utilizing a pub/sub architecture with straightforward HTTP-based event transmission, Event Grid separates event producers from consumers, enabling the creation of scalable serverless solutions, microservices, and distributed architectures. You can achieve significant scalability on demand while receiving almost instantaneous notifications about the changes that matter to you. Enhance your application development with reactive programming principles, leveraging assured event delivery and the robust uptime provided by cloud technologies. Furthermore, you can create more complex application scenarios by integrating a variety of potential event sources and destinations, enhancing the overall capability of your solutions. Ultimately, Event Grid empowers developers to innovate and respond to changing requirements swiftly and efficiently.
  • 7
    Wazuh Reviews
    Wazuh is an open-source, enterprise-capable solution designed for security monitoring that effectively addresses threat detection, integrity monitoring, incident response, and compliance needs. By collecting, aggregating, indexing, and analyzing security data, Wazuh aids organizations in identifying intrusions, potential threats, and unusual behaviors. As cyber threats evolve in complexity, the demand for real-time monitoring and robust security analysis becomes increasingly critical for the swift detection and resolution of these threats. Our lightweight agent is equipped with essential monitoring and response functionalities, complemented by a server component that delivers security intelligence and performs comprehensive data analysis. Wazuh effectively meets the demand for ongoing monitoring and proactive responses to sophisticated threats, ensuring that security professionals have the necessary tools at their disposal. The platform emphasizes providing optimal visibility, offering valuable insights that empower security analysts to uncover, investigate, and address threats and attack strategies across a diverse range of endpoints. By integrating these features, Wazuh enhances an organization’s overall security posture.
  • 8
    Active Directory Certificate Services (AD CS) Reviews
    This document outlines the features of Active Directory Certificate Services (AD CS) within Windows Server® 2012. AD CS serves as the server role designed to establish a public key infrastructure (PKI), enabling your organization to utilize public key cryptography, digital certificates, and digital signatures. The services offered by AD CS can be tailored for issuing and managing digital certificates, which are essential for software security systems leveraging public key technologies. These digital certificates facilitate the encryption and digital signing of electronic documents and messages, ensuring secure communication. Additionally, they play a crucial role in authenticating computer, user, or device accounts across the network. By employing AD CS, you can significantly boost security measures by linking the identity of individuals, devices, or services to their corresponding private keys. Furthermore, AD CS provides a reliable, cost-effective, and efficient mechanism for overseeing the distribution and utilization of certificates, thereby enhancing overall security within your organization’s infrastructure. Ultimately, implementing AD CS can lead to improved trust and integrity in digital communications.
  • 9
    Voyage Reviews

    Voyage

    Voyage SMS

    $0.0075 per sms
    Our fully customized modals and unlimited keyword campaign options will help you grow or build your existing SMS list. You will notice a sharp rise in engagement and conversions. You can communicate with your customers by sending personalized messages at the right time. To engage and guide subscribers to buy, create a post-subscriber flow. Real-time feedback about campaign performance, including ROAS and attributed revenue. Automated A/B testing helps you optimize your campaigns and automations. The most effective and highest-converting marketing messaging. You can create unlimited keyword campaigns with unique sign up messages flows. Keywords for product launches, each physical shop, special keywords for events and keywords on product packaging are all common uses. Each keyword can be segmented for more targeted targeting.
  • 10
    BlueDolphin Reviews
    BlueDolphin serves as a comprehensive Enterprise SaaS platform aimed at assisting CIOs and Enterprise Architects in effectively managing intricate business transformations. By creating a cohesive environment for various stakeholders, BlueDolphin enhances collaboration and decision-making, leveraging actionable insights derived from data. With BlueDolphin, you have the ability to: - Consolidate planning efforts by simulating projects, systems, applications, and data seamlessly within a single interface. - Promote agility in execution through real-time teamwork and communication among teams. - Facilitate informed decision-making with powerful data analytics that illuminate the effects on business processes and architectural frameworks. - Additionally, BlueDolphin removes obstacles to cross-functional collaboration by incorporating a diverse array of modeling languages, thus effectively connecting architecture with process management. Experience a transformative digital journey with BlueDolphin's innovative and adaptable features, which are designed to meet the evolving needs of today's enterprises.
  • 11
    FortiSandbox Reviews
    In contrast to earlier viruses that were relatively simple and few in number, traditional antivirus solutions could adequately safeguard systems using a database of signatures. However, the landscape of modern malware has evolved, incorporating advanced techniques like exploiting vulnerabilities. When a weakness in a trusted application is exploited, it can lead to unexpected behavior, which attackers leverage to breach computer security. This method of attacking through an undisclosed software vulnerability is referred to as a zero-day attack, or 0-day attack, and prior to the adoption of sandboxing, effective prevention methods were lacking. A malware sandbox serves as a protective mechanism that restricts an application's operations, such as handling a Word document, within a controlled environment. This isolated space allows the sandbox to scrutinize the dynamic behaviors of applications and their interactions in a simulated user setting, thereby revealing any potential malicious activities. Such technology has become essential in the fight against sophisticated threats, ensuring a more comprehensive approach to cybersecurity.
  • 12
    VirusTotal Reviews
    VirusTotal evaluates files and URLs using more than 70 antivirus solutions and blocklisting services, alongside various analytical tools to derive insights from the analyzed content. Users can conveniently choose a file from their device through their web browser and upload it to VirusTotal for examination. The platform supports multiple methods for file submission, such as its main public web interface, desktop uploaders, browser extensions, and a programmable API, with the web interface receiving the highest priority for scanning among these options. Submissions can be automated in any programming language by utilizing the HTTP-based public API. VirusTotal is instrumental in uncovering harmful content and also plays a role in recognizing false positives, which are legitimate items incorrectly flagged as malicious by certain scanners. Additionally, URLs can be submitted through various means, including the VirusTotal website, browser extensions, and the API, ensuring flexibility for users. This comprehensive approach allows VirusTotal to serve as an essential resource for cybersecurity efforts.
  • 13
    OPAQUE Reviews

    OPAQUE

    OPAQUE Systems

    OPAQUE Systems delivers a cutting-edge confidential AI platform designed to unlock the full potential of AI on sensitive enterprise data while maintaining strict security and compliance. By combining confidential computing with hardware root of trust and cryptographic attestation, OPAQUE ensures AI workflows on encrypted data are secure, auditable, and policy-compliant. The platform supports popular AI frameworks such as Python and Spark, enabling seamless integration into existing environments with no disruption or retraining required. Its turnkey retrieval-augmented generation (RAG) workflows allow teams to accelerate time-to-value by 4-5x and reduce costs by over 60%. OPAQUE’s confidential agents enable secure, scalable AI and machine learning on encrypted datasets, allowing businesses to leverage data that was previously off-limits due to privacy restrictions. Extensive audit logs and attestation provide verifiable trust and governance throughout AI lifecycle management. Leading financial firms like Ant Financial have enhanced their models using OPAQUE’s confidential computing capabilities. This platform transforms AI adoption by balancing innovation with rigorous data protection.
  • 14
    ayfie Inspector Reviews
    ayfie Inspector offers a contemporary and reliable method for managing the data sets associated with today’s legal disputes. Its unique approach to feature engineering, grounded in linguistics, effectively organizes extensive text-based information, facilitating quick filtering. By utilizing augmented intelligence, ayfie promptly detects duplicate content through user-friendly workflows such as email threading, ensuring comprehensive inclusion of materials and precise near-duplicate assessments. Notably, ayfie empowers users with straightforward data querying capabilities, allowing for effortless exploration of large data collections. The introduction of the “Fact Finding” feature enhances immediate outcomes significantly. Organizations can leverage these established functionalities to boost their efficiency, productivity, and profitability within the legal sector. Furthermore, ayfie Inspector integrates seamlessly with leading technology platforms. The user-friendly interface, enriched with informative data visualizations, simplifies the process of analyzing information, making it accessible and understandable at a glance. This combination of features ensures that legal professionals can navigate complex data landscapes with confidence and agility.
  • 15
    openSUSE Leap Reviews
    openSUSE has introduced an innovative method for its development, resulting in a new kind of hybrid Linux distribution known as Leap. This version leverages the source code from SUSE Linux Enterprise (SLE), which ensures a reliability that few other Linux distributions can match, and merges it with community-driven advancements to offer the best stable experience for users, developers, and system administrators alike. Those currently using openSUSE can easily transition to Leap by booting from a DVD or USB and selecting the upgrade option, or they can perform an ‘Online Upgrade’ with just a few commands. Leap adopts a traditional approach to stability, releasing a new version annually while providing ongoing security updates and bug fixes in between releases. This combination of features makes Leap particularly appealing for server environments, but it is equally suitable for desktop users due to its low maintenance requirements. Furthermore, openSUSE Leap's compatibility with SUSE Linux Enterprise not only enhances its stability but also allows users the flexibility to move to an enterprise solution if needed, ensuring a smooth transition for future growth and support. Overall, Leap stands out as a compelling choice for anyone seeking a robust and reliable Linux operating system.
  • 16
    Xfce Reviews
    Xfce serves as a lightweight desktop environment tailored for UNIX-like systems, designed to prioritize speed and minimal resource usage while maintaining an attractive and intuitive interface. To enhance Xfce's visual appeal and coherence, we developed a new set of icons for our core applications, all derived from a unified color palette to promote consistency across the platform. Additionally, we implemented some implicit design guidelines, drawing inspiration from Adwaita's aesthetics. The Settings Manager has been updated with a revamped filter box that can now be permanently concealed, alongside improved search functions that allow for queries in the descriptive 'Comments' section of each dialog's launcher file (commonly known as .desktop). Moreover, we have combined the previous 'Mime Settings' and 'Preferred Applications' dialogs into a single interface, simplifying the process for users to designate default applications for various file types. This consolidation not only streamlines user experience but also reinforces Xfce's commitment to usability and efficiency.
  • 17
    Ubuntu Server Reviews
    Ubuntu Server offers both economic and technical scalability for your data center, whether it is public or private. Whether your goal is to establish an OpenStack cloud, a Kubernetes cluster, or a massive 50,000-node render farm, Ubuntu Server provides unparalleled scale-out performance that delivers exceptional value. You can seamlessly deploy a variety of applications, including NoSQL databases and web farms, without any hassle. With certification from leading hardware manufacturers and a robust set of deployment tools, you can maximize the efficiency of your infrastructure. The regular release cycle ensures that you always have access to the latest and highest performing open-source solutions. Additionally, its lightweight initial installation combined with integrated deployment and application modeling technologies positions Ubuntu Server as an ideal choice for straightforward deployment and scaled management. Ultimately, this makes it an excellent option for organizations seeking to optimize their operational efficiency and resource utilization.
  • 18
    SUSE Linux Enterprise Desktop Reviews
    Tailored for diverse environments, this solution encompasses a comprehensive range of essential business applications that enhance employee productivity. The SLE Desktop is built upon the foundation of SUSE Linux Enterprise Server and incorporates advanced security measures that offer exceptional safeguarding of critical enterprise information. It serves as a versatile and secure desktop operating system, ideal for situations where dependability, simple maintenance, and regular updates are paramount. The system is bundled with a multitude of top-tier applications, including a web browser, email client, and collaboration tools, all essential for fostering employee efficiency. With robust security features such as an application security system, integrated VPN, and antivirus solutions, it ensures formidable protection against viruses and malware threats. Additionally, it comes with enterprise-level support and maintenance services from SUSE, further enhancing its value. Users are also granted a significant level of customization to align with their specific business needs, making it a dynamic choice for any organization. Ultimately, this desktop solution not only prioritizes security but also empowers users with tools that adapt to their workflows seamlessly.
  • 19
    Flatcar Container Linux Reviews
    The advent of container-based infrastructure represented a significant transformation in technology. A Linux distribution specifically optimized for containers serves as the ideal groundwork for a cloud-native setup. This streamlined operating system image consists solely of the essential tools needed for container execution. By omitting a package manager, it prevents any potential for configuration drift. The use of an immutable filesystem for the OS effectively mitigates a range of security vulnerabilities. Additionally, automated atomic updates ensure that you consistently receive the most current security patches and open-source technology advancements. Flatcar Container Linux is purpose-built from the ground up to support container workloads effectively. It fully embraces the container philosophy by incorporating only the necessary components for running containers. In a world of immutable infrastructure, it is crucial to have an equally immutable Linux operating system. With Flatcar Container Linux, your focus shifts from configuration management to effectively overseeing your infrastructure, allowing for a more efficient and secure operational environment. Embracing this approach revolutionizes how organizations manage their cloud-native applications and services.
  • 20
    ActiveMQ Reviews

    ActiveMQ

    Apache Software Foundation

    Apache ActiveMQ® stands out as the leading open-source, multi-protocol message broker built on Java. It accommodates widely accepted protocols, allowing users to take advantage of diverse client options across various programming languages and platforms. Clients can connect using languages such as JavaScript, C, C++, Python, .Net, and more. The integration of multi-platform applications is made seamless with the widely-used AMQP protocol. Furthermore, web applications can communicate effectively through the STOMP protocol over websockets. ActiveMQ also facilitates the management of IoT devices by leveraging MQTT. It not only supports existing JMS infrastructures but also extends beyond them, providing the robustness and adaptability necessary for any messaging scenario. Presently, there are two distinct versions of ActiveMQ: the traditional "classic" broker and the innovative "next generation" broker known as Artemis. As Artemis develops to match the feature set of the Classic code-base, it is set to evolve into the next major release of ActiveMQ. Initial documentation for migration is accessible, along with a development roadmap outlining the future of Artemis, ensuring users have the guidance they need for a smooth transition. This evolution signifies a commitment to continual improvement and adaptation in a rapidly changing technological landscape.
  • 21
    Anunta Reviews
    Experience fully managed cloud-hosted desktops that prioritize enterprise-level security, featuring a Windows 10 environment built on the reliable and high-performance Azure cloud platform. With our solution, you can securely access your data and applications anytime, anywhere, and from any device, ensuring flexibility and convenience. We facilitate a smooth transition to cloud technologies, enhancing the overall experience for end users. With ten years of dedicated expertise in implementing and overseeing remote desktop solutions for leading global enterprises, we manage every aspect of your Desktop as a Service (DaaS) experience, including onboarding, monitoring, and environment management. As organizations increasingly turn to the cloud to not only reduce costs and enhance agility but also to achieve business resilience, scalability, and a transformation into a digital enterprise, they encounter difficulties in finding cloud solutions that align perfectly with their unique requirements. This struggle often hinders their ability to fully leverage the benefits of cloud technology for sustainable growth.
  • 22
    Sacumen Connector as a Service (CaaS) Reviews
    Companies that develop security products face a significant demand to create integrations with various third-party applications. This necessity arises from several factors, including customer expectations and the desire to enhance the functionality of their offerings. The target systems for these integrations can exist in diverse environments such as cloud, on-premise, or hybrid setups. The complexity increases due to the wide array of integration options provided by these target systems, including various interfaces like REST API, SOAP, SFTP, Message Queue, and SDKs. Additionally, the different data formats, such as JSON, XML, and Syslog, further complicate matters. Authentication and authorization methods also vary, with options including OAuth, API Tokens, and multi-factor authentication. Furthermore, challenges like rate limits, pagination options, latency issues, concurrency control, and data volume requirements must be addressed. As a result, security product companies frequently resort to developing customized, non-standard connectors for these target systems. This practice not only escalates development and support costs but also results in connectors that may underperform in terms of scalability, efficiency, and adaptability to future needs. Ultimately, the lack of standardization can hinder the overall integration process and impact customer satisfaction negatively.
  • 23
    Kali Linux Reviews
    Kali Linux is a Debian-based, open-source distribution designed specifically for a variety of information security activities, including penetration testing, security research, computer forensics, and reverse engineering. While it's possible to take any Linux distribution and manually install penetration testing tools, this requires considerable setup and configuration efforts. Kali Linux is tailored to minimize this workload, enabling professionals to focus on their tasks right away. You can access a version of Kali from virtually anywhere, whether on mobile devices, Docker, ARM architectures, Amazon Web Services, the Windows Subsystem for Linux, virtual machines, or even bare metal installations. Thanks to metapackages that cater to specific security tasks and a user-friendly ISO customization process that is well-documented, creating an optimized version of Kali to suit your particular needs is straightforward. This makes it a versatile choice for both experienced users and newcomers alike, as comprehensive documentation ensures that everyone can find the guidance they require. Additionally, the active community surrounding Kali Linux continuously contributes to its improvement, further enhancing the resources available to users.
  • 24
    Tencent Cloud Private DNS Reviews
    Private DNS allows users to establish tailored private domains that cater to specific requirements. These domains don't require public network registration and can be easily labeled and organized for enhanced configurability. By creating a private domain with a designated suffix and configuring a PTR record, IP addresses can be associated with the domain to facilitate reverse DNS, which significantly diminishes spam and enhances the clarity of IP usage. Additionally, Private DNS offers the ability to filter and analyze request volume metrics by region, VPC, or domain name, keeping users informed about their instance consumption details. Leveraging over a decade of expertise from DNSPod's top-tier DNS infrastructure and supported by Tencent Cloud's VPC service, Private DNS ensures secure, reliable, and highly available private DNS solutions for all users. This service not only optimizes domain management but also contributes to overall network efficiency.
  • 25
    Tencent Cloud IoT Hub Reviews
    Through the console, SDK, or Cloud API, users can swiftly activate device connectivity and data communication, all while bypassing concerns about the intricate details of the communication protocols in use. To enhance security, a robust network transfer protocol is implemented for both device access and data exchange, which mandates device authentication via certificate verification to effectively guard against unauthorized access, data breaches, and interference. By integrating the link between device data and Tencent Cloud services through the rule engine, IoT Hub streamlines the processes of data storage, real-time computation, and sophisticated analytics for handling extensive datasets. Additionally, IoT Hub provides access to Tencent Cloud RayData, a big data visualization service that empowers users to visualize, contextualize, and engage with the vast amounts of information generated by IoT devices using advanced real-time rendering techniques. This functionality not only enriches data interactions but also supports tailored management and utilization of the data, making it easier for users to derive actionable insights. Ultimately, this combination of features positions IoT Hub as a powerful tool for businesses aiming to optimize their IoT data strategies.
MongoDB Logo MongoDB