Business Software for Cisco ACI

  • 1
    Netdata Reviews
    Top Pick
    Monitor your servers, containers, and applications, in high-resolution and in real-time. Netdata collects metrics per second and presents them in beautiful low-latency dashboards. It is designed to run on all of your physical and virtual servers, cloud deployments, Kubernetes clusters, and edge/IoT devices, to monitor your systems, containers, and applications. It scales nicely from just a single server to thousands of servers, even in complex multi/mixed/hybrid cloud environments, and given enough disk space it can keep your metrics for years. KEY FEATURES: Collects metrics from 800+ integrations Real-Time, Low-Latency, High-Resolution Unsupervised Anomaly Detection Powerful Visualization Out of box Alerts systemd Journal Logs Explorer Low Maintenance Open and Extensible Troubleshoot slowdowns and anomalies in your infrastructure with thousands of per-second metrics, meaningful visualisations, and insightful health alarms with zero configuration. Netdata is different. Real-Time data collection and visualization. Infinite scalability baked into its design. Flexible and extremely modular. Immediately available for troubleshooting, requiring zero prior knowledge and preparation.
  • 2
    ThreatAdvice Cybersecurity Education Reviews
    ThreatAdvice Educate is a secure and efficient online cybersecurity training platform that your employees can use. ThreatAdvice Educate provides video-based micro-learning courses that will equip your employees with the cybersecurity knowledge they require to protect your company. Our comprehensive employee education platform features phishing simulations as well as quizzes, gamification and policies and procedures. We also offer audit reporting, external scans, and more. Did you know that 90% of all cyber-attacks on enterprises are caused by employees not being trained in cybersecurity basics? While employees are the greatest threat to your cybersecurity, they can also be your most powerful tool in preventing an attack. ThreatAdvice Educate offers cyber security training to employees. It provides the necessary cybersecurity knowledge and skills that will help you prevent a cyber-attack on your company and protect valuable company data. They also provide regular phishing tests.
  • 3
    INE Reviews
    Top Pick

    INE

    INE

    $49 per month
    81 Ratings
    INE's IT training and certification prep will give you and your team the tools to meet today's challenges as well as prepare for tomorrow. Our training materials are created entirely in-house by INE instructors, who are some of the most respected and tenured industry experts. They cover in-demand topics such as Networking, Cyber Security and Cloud Computing, as well as Data Science. Our unique training materials are housed on our own training platform that supports a practical approach to learning. Your expertise is developed through a combination of instructor-led videos and learning paths, quizzes, exercises, and interactive videos. We have helped thousands of professionals reach their goals and build successful IT careers.
  • 4
    AppDynamics Reviews
    We help you solve your most pressing business problems with simple, flexible and scalable packages that will make your digital transformation a reality. Get started today with our top business observability platform. AppDynamics or Cisco business lenses provide full-stack visibility. Prioritize the most important things for your business and your employees so that you can share, see and take action in real-time. With a deeper understanding and appreciation of user behavior and applications, you can turn performance into profit. You can quickly fix issues before they affect your bottom line by integrating full stack performance with key business metrics, such as conversions.
  • 5
    Telegraf Reviews

    Telegraf

    InfluxData

    $0
    Telegraf is an open-source server agent that helps you collect metrics from your sensors, stacks, and systems. Telegraf is a plugin-driven agent that collects and sends metrics and events from systems, databases, and IoT sensors. Telegraf is written in Go. It compiles to a single binary and has no external dependencies. It also requires very little memory. Telegraf can gather metrics from a wide variety of inputs and then write them into a wide range of outputs. It can be easily extended by being plugin-driven for both the collection and output data. It is written in Go and can be run on any system without external dependencies. It is easy to collect metrics from your endpoints with the 300+ plugins that have been created by data experts in the community.
  • 6
    Upfeed Reviews
    Engage customers through feature-voting Upfeed allows companies to get customer feedback through feature-voting. Accelerate growth and create the product people want. Find product opportunities to increase revenue and retain customers. Your users can help you build your next features. Collect feedback from customers and ideas for new features. You can eliminate the guesswork and Trello boards. Share your feedback board with your users and you will get real feedback. You can vote for ideas. You can see which suggestions are most popular and prioritize your roadmap accordingly. Don't waste your time on the wrong features When you release a new feature, follow up automatically with people. Keep the feedback loop open. We bring together all the necessary elements to create a better product using customer feedback. Upfeed products empower feedback with feature-voting and a powerful dashboard that allows you to make better decisions.
  • 7
    Splunk App for Infrastructure Reviews
    Combine and correlate logs and metrics into one solution. Your Splunk Enterprise or Splunk IT Service Intelligence licenses provide comprehensive infrastructure monitoring, alerting, and investigation. Cross-tier correlations, simplified workflows and advanced alerting make it easier to find root causes faster. Pre-built and custom visualizations can monitor performance in real-time. In just a few clicks, you can enrich infrastructure data with service context in Splunk IT Service Intelligence. Splunk App For Infrastructure (SAI), a curated, unified logs and metrics experience that focuses on infrastructure performance monitoring, provides a curated, well-designed experience. You can easily distribute metrics by grouping, filtering, and defining entities. SAI's custom-triggered alerting makes it easier to perform root cause analysis at the entity or group level. You can triage alerts faster by understanding the conditions that triggered them, assessing their severity, and viewing all triggered alarms at the time you need to take action.
  • 8
    Switch Automation Reviews
    Switch Automation is a global real estate software company that helps property owners and facility managers reduce operating costs, improve energy efficiency and deliver exceptional occupant satisfaction. Our comprehensive smart building platform integrates with traditional building systems as well as Internet of Things (IoT) technologies to analyze, automate and control assets in real-time. We serve enterprise customers and partners in a variety of industries including financial services, retail, grocery, commercial real estate and more.
  • 9
    IBM Datacap Reviews
    Streamline the classification, recognition, and capture of business documents. IBM® Datacap software forms a key capability in the IBM Cloud Pak®. This is for Business Automation. It simplifies the classification, recognition, and capture of business documents. It uses text analytics, natural language processing, and machine learning to extract content from unstructured and variable paper documents. Multichannel input from scanners and faxes, emails and digital files, such as PDF and images from mobile devices and applications. Machine learning is used to automate complex or unidentified formats and highly variable documents that are difficult to capture using traditional systems. Allows you to export information and documents to a variety of applications and content repositories, including IBM and other vendors. To speed up deployment, this interface allows you to configure capture workflows and apps with a simple point-and click interface.
  • 10
    Comarch EDI Reviews
    A secure and comprehensive platform for B2B collaboration within a supply chain. The Comarch EDI platform allows data exchange with all business partners. We recommend a solution that is tailored to your company's business needs, in relation to technological advancements and the volume document. We offer a variety of functionalities that will simplify communication with business partners. A GDSN-certified catalog allows for the management of product data that is exchanged with many business partners around the world. It makes it possible to define multiple attributes - both general and specific to a business partner. This functionality ensures coherence and high quality data throughout the entire value-chain. This is the solution to optimizing supply chain processes. It allows for effective communication between logistics operators and ensures fast and secure data flow.
  • 11
    Cisco SD-WAN Reviews
    Cisco SD-WAN (formerly Viptela). Any user, any app, anywhere in the globe. SD-WAN, also known as wide-area networking (WAN), is a software-defined method of managing the wide-area network. Intent-based networking can be extended to branch, WAN, or cloud. Connect any user to any app. Our industry-leading multicloud transformation solution offers integrated capabilities for security and unified communications as well as application optimization. Optimizing cloud and on-premises applications with real-time analytics, visibility and control can increase user productivity. Secure access service edge (SASE) provides security for users, devices, applications, and devices. It also provides embedded or cloud security. Cloud management can be centralized to make it easier to deploy SD-WAN security and policy across thousands of sites. Cloud-first architecture allows you to connect any user to any app, anywhere, anytime.
  • 12
    Smokescreen IllusionBLACK Reviews

    Smokescreen IllusionBLACK

    Smokescreen

    $7,750 per year
    Smokescreen, a deception technology and active defense company, provides a solution that covers your network with decoys that trap hackers. You'll learn how adversaries work and how decoys are placed all over your network to provide high-fidelity detections at every stage. It's simple to use and understand. We have you covered on the Perimeter and Cloud, internal network, endpoints and Active Directory. Launch your first deception campaign using ready-made decoys. Instead of wasting time configuring a new solution, focus on detecting threats and not on wasting man-hours. An interaction with an IllusionBLACK device is a sign of a breach. You know it's real when you receive an alert. Automated forensics and root cause analysis in just two clicks You can accomplish more with half the team in half the time. Integrations out-of-the box with SIEMs and Firewalls, EDRs. Proxy, threat feeds, SOAR and more.
  • 13
    Mosaic Reviews
    Mosaic enables digital conversations across all channels. You can either work with our experts or create them yourself. Build once, deploy anywhere. Mosaic allows your customers to automate conversations with your brand using intelligent virtual assistants. No matter your industry or company size, enterprise-grade performance is guaranteed. Outbound and inbound via voice, text, social media, and email. Cloud technology allows for quick and easy solution activation so you can get up and running quickly. Mosaic allows customers to have personalized, easy experiences on all channels. It's like having your best employee on every interaction to answer queries and facilitate transactions. Lifecycle managed services are a consultative and hands-on approach to delivering Mosaic. Intrado Success Coaches ensure that the software's functionality and controls are up-to-date, and follow market best practices.
  • 14
    Altair Knowledge Hub Reviews
    The self-service analytics tools promised to make end users more data-driven and agile. The increased agility resulted in siloed, disconnected work as a part of an ungoverned data-free-for-all. Knowledge Hub addresses these issues by providing a solution that benefits business users and simplifies and improves IT governance. Knowledge Hub is the only market-leading collaborative data preparation platform. It offers a browser-based interface that automates data transform tasks. Business teams can collaborate with data engineers and scientists to create, validate, and share governed, trusted datasets. No coding is required to share work and make better decisions. A cloud-ready solution that is designed to foster innovation can manage governance, data lineage, and collaboration. A platform that is extensible and requires little to no code allows multiple people in the enterprise to transform data.
  • 15
    Imperva CDN Reviews
    If you don't have security, the risk of your website and application being deployed around the world can increase. The Imperva Content Delivery Network, (CDN), provides content caching, load-balancing, failover, and failover, all built into a comprehensive Web Application Protection (WAAP), platform. Your applications are securely delivered around the world. Machine learning will do the rest. It efficiently caches your dynamically-generated pages, while ensuring content freshness. This greatly increases cache utilization and further reduces bandwidth consumption. Multiple content and networking optimization techniques can be used to reduce page rendering time and improve the user experience. Imperva's global CDN employs advanced caching and optimization techniques in order to increase connection and response speeds and lower bandwidth costs.
  • 16
    Imperva WAF Reviews
    Web application attacks can prevent sensitive data being stolen and prevent transactions from being made. Imperva Web Application Firewall analyzes traffic to your application to stop these attacks and ensure uninterrupted operations. You must choose whether to block legitimate traffic or manually limit attacks that your WAF allows through. Imperva Research Labs guarantee accuracy for WAF customers when the threat landscape changes. Your security teams can use third-party code with no risk and speedy rule propagation to create policies. Imperva WAF is an integral part of a comprehensive Web Application Protection (WAAP), stack that protects from edge to databank. This ensures that you only receive the traffic you need. We offer the best website protection in industry - PCI compliant, automated security that integrates analysis to go beyond OWASP Top 10 coverage and reduces third-party code.
  • 17
    Imperva DDoS Protection Reviews
    Imperva DDoS Protection protects your assets at the edge to ensure uninterrupted operation. You can ensure business continuity with 100% uptime. DDoS mitigation is based on the following rule: "moments to go down and hours to recover". Every second counts when you defend against an attack. Imperva provides you with the assurance that attack traffic will automatically be blocked at the edge. This is without you having to increase your bandwidth. Imperva DDoS protection for websites is an all-in-one service that instantly mitigates any size or type of DDoS attack on web applications. Our DDoS protection for websites is complemented by the Imperva cloud-based web application firewall (WAF), which stops hacking attempts and attacks from malicious bots. Your DNS records can be modified to ensure that all HTTP/S traffic to your domain(s), is routed through the Imperva network. Imperva DDoS protection protects websites by acting as a secure proxy. It masks your origin server IP.
  • 18
    AT&T Alien Labs Open Threat Exchange Reviews
    The largest open threat intelligence network in the world that facilitates collaborative defense using actionable, community-powered threats data. The security industry's threat sharing is still ad-hoc and informal. It is fraught with frustrations, blind spots, and pitfalls. Our vision is that companies and government agencies can quickly gather and share information about cyberattacks and threats, as well as current breaches, as accurate, timely, and complete information as quickly as possible. This will allow us to avoid major breaches and minimize the damage caused by an attack. This vision is realized by the Alien Labs Open Threat Exchange (OTX) - which provides an open, transparent threat intelligence community. OTX allows open access to a global network of security professionals and threat researchers. There are now more than 100,000 participants from 140 countries who contribute over 19,000,000 threat indicators each day. It provides community-generated threat information, facilitates collaborative research, and automates the updating of your security infrastructure.
  • 19
    Splunk User Behavior Analytics Reviews
    Unknown threats can be prevented by using analytics on entity and user behavior. Unknown threats and anomalies that traditional security tools fail to detect. Automate the stitching together of hundreds of anomalies to create a single threat to simplify the life of security analysts. Deep investigative capabilities and powerful behavior baselines can be used to identify any entity, threat, or anomaly. Automate threat detection with machine learning so that you can spend more time hunting and receive higher-fidelity alerts based on behavior for quick review. Automate the identification of anomalous entities quickly without human analysis. Rich set of threat classifications (25+), and anomaly types (65+), across users, accounts and devices. Rapidly identify anomalous entities, without the need for human analysis. A rich set of threat types (25+) across users and accounts, devices, applications, and devices. Organizations can use machine-driven and human-driven solutions to find and resolve anomalies and threats.
  • 20
    Scuba Database Vulnerability Scanner Reviews
    Scuba Database Vulnerability Scanner. Scuba is a free tool that reveals hidden security risks. Check enterprise databases for potential vulnerabilities and misconfigurations. Know the risks to your database. Get advice on how to address identified issues. Scuba is available for Windows, Mac and Linux (x32) and Linux (x64). It offers over 2,300 assessment tests for Oracle and Microsoft SQL, SAP Sybase and IBM DB2 as well as MySQL. Scuba scans enterprise databases for security flaws and configuration flaws. It is free and allows you to identify potential security risks. It contains more than 2,300 assessments for Oracle, Microsoft SQL Server and SAP Sybase. Scuba scans can be performed from any Windows, Mac, or Linux client. A typical Scuba scan takes between 2 and 3 minutes depending on the size of your database, users, groups, and network connection. There are no other requirements or pre-installation.
  • 21
    Trustwave DbProtect Reviews
    This database security platform is highly scalable and can be used to protect relational databases and big data stores on premises or in the cloud. It features a distributed architecture and enterprise level analytics. Cybercriminals are always looking for ways to gain access to sensitive and proprietary data in order to make databases a lucrative target. Trustwave DbProtect can help your business overcome resource limitations and uncover database configuration errors, access control problems, missing patches, or other weaknesses that could cause data leakage, misuse, and other serious consequences. A single, intuitive dashboard provides a real-time overview of all database assets, vulnerabilities and risk levels, user privileges, anomalies, incidents, and other information. You can detect, alert, and correct suspicious activities, intrusions, and policy violations.
  • 22
    It'sMe Reviews
    Employees hate passwords just as much as you hate managing password vulnerability. Increased security risk, fatigue, cost, and cost are all associated with more passwords and tokens. It is time to get rid them all. 89% of security professionals believe that a more advanced multifactor authentication tool that provides continuous, behavior-based authentication would improve their company’s security posture. Acceptto offers Intelligent MFA, which intuitively authorizes users to access applications and continues authenticating after authorization. Even if hackers have already obtained passwords, we prevent account takeovers. ItsMe™, Intelligent Multi Factor Authentication, (MFA) increases security by authorizing access attempts at a registered device in real time, whether it is through a push notification, verification code (SMS/TOTP, email, etc.). You can authenticate access even if you are offline using our timed-based one-time password (TOTP), security keys, or biometric options.
  • 23
    Delinea Cloud Access Controller Reviews
    You can have complete control over web applications and cloud-based cloud management platforms. Cloud Access Controller by Delinea is a comprehensive PAM solution. It operates at cloud speed, can be deployed quickly, and provides secure access to any web app. Cloud Access Controller allows you to integrate existing authentication solutions with any other web application. You can create granular RBAC policies to enforce zero trust and least privilege, even for legacy and custom web applications. Specify what web applications each employee can read or modify. Cloud applications can be granted, managed and revoked. At a very fine level, specify who has access to which cloud applications. You can track usage of every cloud application. Without agents, clientless session recording. Secure access to all web apps, including legacy and custom web applications.
  • 24
    DNSWatch Reviews
    WatchGuard DNSWatch, a Cloud-based service that adds DNS-level filtering, detects and blocks potentially dangerous connections and protects networks and employees against damaging attacks. WatchGuard analysts triage critical alerts and provide an easy-to-understand accounting with detailed insights about possible infection. DNSWatch redirects employees away from malicious sites when they click the link. It also offers resources to reinforce phishing education. Hackers use DNS to attack unsuspecting victims. Therefore, careful examination of DNS requests can help to identify and intercept attacks. DNSWatch adds DNS-level filtering to our Total Security Suite. This provides an additional layer of security to prevent malware infections. Your users can be prevented from connecting to known malicious DNS addresses. Users are then automatically blocked and redirected to a safe landing site.
  • 25
    ThreatSync Reviews
    It can be difficult to manage security across an organization, whether you have 10 branch offices or distributed businesses with 10 employees. SMBs and distributed enterprises must have visibility into their network and endpoint data. They also need to be able quickly and efficiently to use actionable insights to eliminate threats. ThreatSync, an essential component of TDR, collects threat data from WatchGuard Firebox, Host Sensor, and enterprise-grade threat intelligence feeds. It then analyzes this data using a proprietary algorithm and assigns a threat score and rank. This powerful correlation engine allows cloud-based threat prioritization, empowering IT teams to respond quickly and confidently to threats. Collects and correlates threat events data from the Firebox or Host Sensor.
  • Previous
  • You're on page 1
  • 2
  • 3
  • Next