Business Software for Azure Marketplace

Top Software that integrates with Azure Marketplace

  • 1
    OpenVAS Reviews

    OpenVAS

    Greenbone Networks

    OpenVAS serves as a comprehensive vulnerability scanning tool, offering both unauthenticated and authenticated assessments, as well as support for a wide range of internet and industrial protocols at various levels. The scanner is designed to be optimized for extensive scanning operations and features a robust internal programming language that allows users to create customized vulnerability tests. It acquires its vulnerability detection tests from a continually updated feed with a rich historical background. Since its inception in 2006, OpenVAS has been developed by Greenbone Networks, and it is an integral component of their commercial product line, the Greenbone Enterprise Appliance, which includes several other Open Source modules for enhanced vulnerability management. With its extensive capabilities, OpenVAS empowers organizations to bolster their security posture effectively.
  • 2
    Kurmi Enterprise Suite Reviews
    Unified management is now possible with the Kurmi MACD Enterprise software program. System administrators love the convenience of having one platform to manage all their communications systems. Kurmi Enterprise software MACD offers multi-vendor, cloud-based, and on-premise environments. This allows for flexibility in integration of new services and vendors. The software automates routine tasks for system administrators. This software can reduce support costs and frees your most valuable tech employees to concentrate on the things they are best at. This results in higher end user satisfaction and fewer errors. Automating the provisioning process is possible. You can save time and be confident that your systems are working at their best, with no minor errors. Kurmi allows you to connect enterprise communications systems with corporate IT apps such as HR, ITSM: Workday or ServiceNow, OTRS and many more.
  • 3
    Canary Reviews

    Canary

    Canary Technologies

    Protect your business from chargebacks and fraudulent activities by utilizing Canary's digital credit card authorization system. This solution is compliant with PCI Level-1 standards, ensuring that sensitive information is handled securely. According to PCI regulations, it is crucial to avoid transmitting credit card details through insecure channels. Traditional methods of gathering credit card data on paper forms are problematic, as they do not allow for validation of the card's authenticity, increasing the risk of fraud. The issue of chargebacks in the hotel industry is often linked to outdated paper-based practices. These processes require guests to print, manually fill out, and fax forms, which can be cumbersome and frequently leads to errors due to missing or unreadable information, resulting in the need for guests to redo the forms. Instead, you can simplify this process by providing each guest with a personalized link that directs them to a secure online form for entering their credit card details. Once they complete the authorization, your team will receive an email notification, streamlining communication. Additionally, with Canary’s intuitive web dashboard, you can easily monitor and manage authorizations, giving you valuable insights over time and enhancing overall operational efficiency. This modern approach not only minimizes errors but also ensures a smooth experience for both the guests and your staff.
  • 4
    One Identity Reviews
    Eliminate the uncertainties associated with enterprise identity and access management by effectively reducing risks, safeguarding data, ensuring uptime, and fulfilling compliance requirements through tailored access for your users. Now, your approach to identity and access management (IAM) can align with business objectives rather than being limited by IT constraints. With Identity Manager, you can integrate security policies and meet governance demands for both the present and the future. At last, there's identity management software focused on the needs of the business rather than solely on IT capabilities. Identity Manager not only secures and governs your organization’s data and user access, but it also guarantees uptime, mitigates risks, and ensures compliance by providing users with precisely the access they require to data and applications, regardless of whether they are on-premises, hybrid, or cloud-based. Additionally, it helps you meet compliance and audit standards effectively. This comprehensive solution empowers organizations to maintain control over their identity management processes while adapting to evolving business requirements.
  • 5
    Trend Micro Deep Security Reviews
    Achieve efficiency with a comprehensive array of workload security features that safeguard your cloud-native applications, platforms, and data in any setting using a unified agent. With robust API integrations with Azure and AWS, Deep Security operates fluidly within cloud infrastructures. You can protect valuable enterprise workloads without the hassle of establishing and managing your own security framework. This solution also facilitates the acceleration and maintenance of compliance across hybrid and multi-cloud environments. While AWS and Azure boast numerous compliance certifications, the responsibility for securing your cloud workloads ultimately rests with you. Protect servers spanning both data centers and the cloud using a singular security solution, eliminating concerns about product updates, hosting, or database administration. Quick Start AWS CloudFormation templates are available for NIST compliance as well as AWS Marketplace. Furthermore, host-based security controls can be deployed automatically, even during auto-scaling events, ensuring continuous security in dynamic environments. This level of integration and automation allows organizations to focus more on their core business rather than security intricacies.
  • 6
    Entrust Identity as a Service Reviews
    Cloud-based identity management (IAM), which includes multi-factor authentication (MFA), credential based passwordless access and single sign-on (SSO). Cloud-based multi-factor authentication provides secure access to all your users' apps, networks, devices, and accounts. Optimal user experience is achieved through adaptive authentication, proximity-based login, and adaptive authentication. Happy users won't try to bypass security measures. Everyone wins. This is easier than any other thing you have tried. The work-saving features, such as built-in provisioning tools, on-premises integrations, and cloud integrations, reduce the IT workload from deployment to everyday management. To move forward faster, you need strong IAM. Cloud-based Identity as a Service scales rapidly to accommodate new users, expanding use case, and evolving security threats.
  • 7
    ArangoDB Reviews
    Store data in its native format for graph, document, and search purposes. Leverage a comprehensive query language that allows for rich access to this data. Map the data directly to the database and interact with it through optimal methods tailored for specific tasks, such as traversals, joins, searches, rankings, geospatial queries, and aggregations. Experience the benefits of polyglot persistence without incurring additional costs. Design, scale, and modify your architectures with ease to accommodate evolving requirements, all while minimizing effort. Merge the adaptability of JSON with advanced semantic search and graph technologies, enabling the extraction of features even from extensive datasets, thereby enhancing data analysis capabilities. This combination opens up new possibilities for handling complex data scenarios efficiently.
  • 8
    OpenText Unstructured Data Analytics Reviews
    OpenText™, Unstructured Data Analytics Products use AI and machine learning in order to help organizations discover and leverage key insights that are hidden deep within unstructured data such as text, audio, videos, and images. Organizations can connect their data at scale to understand the context and content locked in high-growth, unstructured content. Unified text, speech and video analytics support over 1,500 data formats to help you uncover insights within all types media. Use OCR, natural language processing and other AI models to track and understand the meaning of unstructured data. Use the latest innovations in deep neural networks and machine learning to understand spoken and written language in data. This will reveal greater insights.
  • 9
    OnePlaceMail Reviews

    OnePlaceMail

    Ideagen

    $4.00/month/user
    OnePlaceMail effortlessly integrates Microsoft Outlook with SharePoint and Office 365, enhancing collaboration, boosting business productivity, and streamlining records management throughout the organization. Experience the capabilities of the OnePlace Solutions product suite firsthand and maximize your data's potential by utilizing the SharePoint platform. You can easily download and test the complete OnePlace Solutions product suite for both Windows Desktop and Microsoft 365 applications. Our team is ready to assist you, so feel free to reach out with any inquiries you may have. With compatibility across all supported devices, including macOS, Windows, OWA, Android, iOS iPhone, and iPad, OnePlaceMail allows you to connect Outlook with Microsoft 365 and SharePoint Online seamlessly. The OnePlaceMail App is designed to function on all platforms and devices compatible with Outlook, ensuring you remain productive whether you are using your phone, a web browser, or your preferred Outlook client on Windows or Mac. Intuitively designed, the OnePlaceMail App integrates smoothly with Microsoft Outlook, providing a user-friendly experience that enhances your workflow. Embrace the flexibility of accessing your documents and collaborating efficiently from anywhere.
  • 10
    CloudHub Reviews
    Experience the benefits of a fully-managed and highly available cloud infrastructure. Harness the capabilities of the Mule runtime engine, which is securely hosted and managed in the cloud. CloudHub serves as the platform-as-a-service (PaaS) element of Anypoint Platform™, offering a global, multi-tenant, secure, and reliable environment for APIs and integrations. Eliminate the need for hardware acquisition, virtual image management, or cloud infrastructure oversight. Achieve optimal performance and availability through a platform that processes over 60 billion transactions each month. Benefit from enhanced efficiency and streamlined management thanks to true multi-tenancy at the application and cloud worker levels. Scale your cloud capacity effortlessly during peak demand periods with the platform's inherent scalability features. Rely on a resilient architecture supported by data centers located across North America, South America, Europe, Asia, and Australia. With CloudHub, you can also enjoy service-level agreements (SLAs) guaranteeing an uptime of 99.99%. This ensures that your applications remain accessible and performant at all times.
  • 11
    Cortex XDR Reviews

    Cortex XDR

    Palo Alto Networks

    Reduced alerts, comprehensive end-to-end automation, and enhanced security operations define the future of enterprise security. Our product suite stands out as the most extensive offering in the industry for security operations, equipping enterprises with unmatched capabilities in detection, investigation, automation, and response. Cortex XDR™ uniquely serves as the only platform for detection and response that operates on seamlessly integrated data from endpoints, networks, and the cloud. Additionally, Cortex XSOAR, recognized as the premier platform for security orchestration, automation, and response, allows users to manage alerts, streamline processes, and automate actions across more than 300 third-party products. By collecting, transforming, and integrating your organization’s security data, you can enhance the effectiveness of Palo Alto Networks solutions. Furthermore, our cutting-edge threat intelligence, unparalleled in its context, empowers organizations to strengthen their investigation, prevention, and response efforts against emerging threats. Ultimately, this level of integration and intelligence positions enterprises to tackle security challenges with confidence and agility.
  • 12
    Palo Alto Networks VM-Series Reviews
    Cater to your security needs with virtual firewalls that are not only automatable and scalable but also simple to implement in situations where traditional hardware firewalls present challenges. The VM-Series virtual firewalls deliver the outstanding, machine learning-enhanced features of Palo Alto Networks' next-generation hardware firewalls in a virtualized format, ensuring that you can protect the critical environments that are essential for your competitive edge and innovation. By utilizing this comprehensive solution, you can enhance cloud agility and speed, while effectively integrating threat prevention into your segments and microsegments for a robust security posture. This unified approach empowers organizations to adapt to the evolving digital landscape with confidence.
  • 13
    vSRX Virtual Firewall Reviews
    As organizations shift their workloads to the cloud to take advantage of virtualization advantages, they must also address the emerging security needs that accompany this transition. The vSRX Virtual Firewall steps in to deliver robust and scalable security solutions tailored for private, public, and hybrid cloud environments. This innovative firewall ensures that businesses can confidently embrace cloud technologies while maintaining strong protection against potential threats.
  • 14
    FortiMail Reviews
    Email continues to be the most vital communication medium for enterprises, yet this prominence also positions it as the primary threat vector, with the frequency and complexity of cyberattacks escalating. As organizations increasingly transition to cloud-based email services, such as Microsoft 365 and Google G-Suite, they are facing challenges in securing their email communications. The native security features provided by these platforms are often inadequate for defending against various threats, safeguarding critical information, and achieving compliance requirements. FortiMail, Fortinet’s secure email gateway solution, offers a thorough, multi-layered strategy for managing both incoming and outgoing email traffic effectively. Renowned for its reliability, Fortinet provides an extensive array of security solutions—including identity management, advanced threat protection, and security-driven networking—integrated within its Security Fabric, ensuring comprehensive protection for businesses. This robust offering allows organizations to confidently navigate the complex landscape of email security.
  • 15
    Forcepoint Email Security Reviews
    Organizations require an efficient, straightforward, and budget-friendly email encryption solution to ensure compliance with regulatory standards and safeguard their sensitive data. Forcepoint's email encryption technology is driven by policies that facilitate the secure transmission of email communications. By removing the usual hurdles of cost and complexity, it provides straightforward administration without the need for intricate key management or extra hardware. Moreover, its seamless integration with Forcepoint Email Security and the Forcepoint Data Loss Prevention (DLP) for both Web and Email allows for the inspection of encrypted emails for potential malware and content breaches. This approach enables the visualization of risks across various events, making it easier to detect possible threats from both external and internal sources. Additionally, it automatically trains employees on recognizing phishing attacks and reinforces their understanding of essential email best practices, fostering a more secure communication environment. This comprehensive strategy not only enhances security but also empowers employees to be vigilant in their email interactions.
  • 16
    Semperis Reviews
    Active Directory is becoming more important in today's cloud-first, mobile first world. This is a growing problem. Identify blind spots. Paralyze attackers. Minimize downtime. Hybrid enterprise cyber resilience is identity-driven The ever-expanding network of mobile workers, cloud services and devices means that identity is the only control plane to keep the bad guys out. Active Directory is essential for identity-centric security to be effective. Semperis protects your identity infrastructure, so you can venture boldly into the digital future. Active Directory is the main source of trust for access and identity in 90% of businesses. It's also the weakest link in the cyber kill chain - it can be hacked in almost every modern attack. Active Directory is also accessible via the cloud, so any tampering with it will have a ripple effect on the entire identity infrastructure.
  • 17
    Keycloak Reviews
    Keycloak serves as a robust open-source solution for managing identity and access. It simplifies the process of adding authentication to applications and securing services, eliminating the hassle of user management and authentication, which are readily provided out of the box. Users can take advantage of sophisticated features like User Federation, Identity Brokering, and Social Login. To explore further, be sure to check the official documentation and consider giving Keycloak a try; its user-friendly design makes implementation straightforward. With its extensive capabilities, Keycloak stands out as an excellent choice for developers seeking efficient identity management.
  • 18
    Azure Stream Analytics Reviews
    Explore Azure Stream Analytics, a user-friendly real-time analytics solution tailored for essential workloads. Create a comprehensive serverless streaming pipeline effortlessly within a matter of clicks. Transition from initial setup to full production in mere minutes with SQL, which can be easily enhanced with custom code and integrated machine learning features for complex use cases. Rely on the assurance of a financially backed SLA as you handle your most challenging workloads, knowing that performance and reliability are prioritized. This service empowers organizations to harness real-time data effectively, ensuring timely insights and informed decision-making.
  • 19
    JMeter Reviews

    JMeter

    Apache Software Foundation

    Apache JMeter™ is an open source tool developed in pure Java, intended for conducting load tests to assess functional behavior and performance metrics. Initially created for web application testing, its capabilities have grown to encompass various testing functions. This versatile software can evaluate the performance of both static and dynamic resources, including web applications that are dynamic in nature. By simulating substantial loads on a single server or a network of servers, it allows users to examine the system's resilience and analyze its performance across different types of loads. As a result, Apache JMeter has become an essential tool for developers and testers seeking to ensure optimal performance and reliability in their applications.
  • 20
    Unity Orchestrator Reviews
    Unity Orchestrator serves as a centralized management system that supervises the deployments of Silver Peak's Unity EdgeConnect SD-WAN. This platform empowers IT administrators to establish and implement business intent policies throughout the network, thereby ensuring both secure and effective management of application traffic. Featuring a user-friendly interface, Orchestrator offers real-time insights into applications hosted in data centers and the cloud, which helps streamline operations, ease change management, and accelerate troubleshooting efforts. Among its notable features are unified administration on a single screen, real-time monitoring of network health and performance metrics, and automation tools that ensure optimal application performance across multiple locations. Furthermore, by integrating these functionalities, Unity Orchestrator enhances overall network efficiency and responsiveness.
  • 21
    Haivision Media Platform Reviews
    Secure corporate communications, broadcast IPTV, and real-time video feeds can all be managed, shared, and delivered to your organization. Haivision Media Platform is a flexible, scalable solution that allows multi-site corporate communications, IPTV, high-capacity video monitoring and recording, as well as secure video delivery to mobile devices, set-top boxes, browsers, and other devices. Haivision Media Platform can be used in demanding live video environments, including broadcasters, government agencies, and defense forces.
  • 22
    WireGuard Reviews
    WireGuard® is a modern VPN solution that is not only incredibly straightforward but also fast, built on advanced cryptography. Its goal is to outperform IPsec by being quicker, easier to use, more streamlined, and less troublesome. WireGuard is positioned to deliver superior performance compared to OpenVPN as well. Engineered as a versatile VPN, it can operate on both embedded devices and high-performance supercomputers, making it adaptable for a variety of scenarios. Originally developed for the Linux kernel, WireGuard has since become available across multiple platforms, including Windows, macOS, BSD, iOS, and Android, enhancing its accessibility. Although it is still evolving, it is already seen as one of the most secure, user-friendly, and straightforward VPN options available today. Configuration and deployment are designed to be as seamless as SSH, with VPN connections established through the simple exchange of public keys—similar to the method used for SSH keys—while WireGuard takes care of all other processes automatically. Additionally, it supports roaming across different IP addresses, resembling the functionality of Mosh, which enhances its usability for mobile users. Overall, WireGuard stands out in the VPN landscape due to its blend of cutting-edge technology and user-centric design.
  • 23
    Fireblocks Reviews
    You can build, manage and scale a profitable digital assets business. Fireblocks is a platform that allows you to store, transfer and issue digital assets across your entire ecosystem. Fireblocks DeFi API & Browser Extension allow you to securely access all DeFi protocols. This includes trading, lending/borrowing and yield farming. Multi-layer technology that combines the best in MPC cryptography and hardware isolation to protect investor and customer funds from cyber attacks, collusion, and human error. The only institution asset transfer network that allows you to move and settle assets 24 hours a day. Maximize your cash flow, reduce counterparty risk and unlock new revenue streams. The only insurance policy that covers assets in storage and transfer, as well as E&O, gives you peace of mind.
  • 24
    Cisco Catalyst Center Reviews
    Maximize resource efficiency, lower expenses, and boost your organization's digital flexibility by implementing a robust management system that leverages AI to integrate, safeguard, and streamline network operations. Accelerate network deployments through automated provisioning and configuration processes. Anticipate network scaling needs with comprehensive insights into both capacity and performance metrics. Enhance resolution times with AI-driven diagnostics and solutions. Achieve optimal Wi-Fi coverage and provide services precisely where they are required through advanced 3D visualization techniques. Additionally, enhance visibility into user experiences and enrich hybrid work environments with detailed application insights, ensuring that your organization remains competitive and responsive to changing demands.
  • 25
    CloudLabs Reviews

    CloudLabs

    Spektra Systems

    Spektra’s CloudLabs platform empowers technology firms to conduct extensive hands-on labs, test drives, and proofs of concept across various scenarios. By offering a cutting-edge and interactive learning experience through reliable and responsive labs, businesses can engage their teams effectively. Whether it’s managing ten instances or scaling up to 10,000, we are fully prepared to deploy, oversee, and support thousands of lab environments seamlessly. With the flexibility to access labs from any location at any time, you can present your product to a broader audience worldwide. Our commitment lies in providing exceptional support, walking you through training processes, and offering innovative solutions tailored to the industry. The CloudLabs platform removes the necessity for any physical IT infrastructure in your technology training and labs, facilitating workshops and training sessions with participants globally. Furthermore, we are dedicated to assisting you in enabling your solutions on the cloud, which can significantly enhance your cloud-based business growth. By leveraging our comprehensive services, you will be well-positioned to thrive in the competitive technology landscape.
MongoDB Logo MongoDB