Best IT Management Software for Fortinet SD-WAN

Find and compare the best IT Management software for Fortinet SD-WAN in 2024

Use the comparison tool below to compare the top IT Management software for Fortinet SD-WAN on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Netreo Reviews

    Netreo

    Netreo

    $5/resource/mo
    1 Rating
    Netreo is the best full-stack IT infrastructure management and observation platform. Netreo is a single source for truth for proactive performance monitoring and availability monitoring of large enterprise networks, infrastructure, and applications. Our solution is used by: IT executives should have full visibility of the business service, right down to the infrastructure and network that supports them. IT Engineering departments are used as a decision support system to plan and architect modern solutions. IT Operations teams can have real-time visibility into what is going wrong in their environment, which bottlenecks exist, and who it is affecting. All of these insights are available for systems and vendor mix in large heterogeneous environments that are constantly changing. We have a growing list of vendors that we support (over 350 integrations), including network vendors, storage, virtualization, and servers.
  • 2
    Fortinet Reviews
    Fortinet, a global leader of cybersecurity solutions, is known for its integrated and comprehensive approach to safeguarding digital devices, networks, and applications. Fortinet was founded in 2000 and offers a variety of products and solutions, including firewalls and endpoint protection systems, intrusion prevention and secure access. Fortinet Security Fabric is at the core of the company's offerings. It is a unified platform which seamlessly integrates security tools in order to deliver visibility, automate, and real-time intelligence about threats across the network. Fortinet is trusted by businesses, governments and service providers around the world. It emphasizes innovation, performance and scalability to ensure robust defense against evolving cyber-threats while supporting digital transformation.
  • 3
    LoginTC Reviews

    LoginTC

    Cyphercor

    $3/month/user
    Cyphercor is a two factor authentication provider that offers a best-in-class solution that's effortless, intuitive, and cost-effective called "LoginTC". LoginTC adds an additional layer of security to your systems and applications including VPNs, Firewalls, remote desktop, active directory, and more. LoginTC offers a wide range of two factor options for end-users to authenticate, including SMS, email, push notifications, hardware tokens, U2F, OTP, bypass codes, and more. LoginTC can help you reduce your insurance costs and meet compliance regulations with ease.
  • 4
    VEEUE Reviews

    VEEUE

    ADCom Solutions

    $5.29 MRR
    VEEUE is an enterprise class PaaS that monitors and manages every circuit and device in medium-sized to large companies. VEEUE is based on ServiceNow®, Zenoss®, LogicMonitor® and Sisense. It is 100% carrier and manufacturer agnostic, and offers unparalleled observability in one pane of glass anywhere in the world. VEEUE is supported by a US-based NOC that is available 24x7x365. The platform pulls metrics from more than 250 manufacturers, systems, devices, and device types using standard APIs and protocols such as SNMP, WinRM, and SSH. VEEUE™, which correlates information from your environment, provides clear visualizations of connected components and the services they support. A single dashboard allows you to see the status of all IT services, and predict which ones may be affected by outages or events. VEEUE™, a complete managed service solution, was designed to simplify the complex world of IT.
  • 5
    Armis Reviews

    Armis

    Armis Security

    Armis, the leading asset visibility and security company, provides a unified asset intelligence platform designed to address the new extended attack surface that connected assets create. Fortune 100 companies trust our real-time and continuous protection to see with full context all managed, unmanaged assets across IT, cloud, IoT devices, IoMT, OT, ICS, and 5G. Armis provides passive cyber asset management, risk management, and automated enforcement. Armis is a privately held company and headquartered in California.
  • 6
    Alibaba Cloud SSL Certificates Service Reviews
    Alibaba Cloud SSL Certificates Service allows customers directly to apply, buy and manage SSL certificates. This service is available in cooperation with qualified certificate authorities. Customers can choose the expected certificate authority and its products from this platform to receive full-site HTTPS security. For optimal cost efficiency, manage digital certificates from a single platform. All major Linux and Windows operating systems are supported, as well as the Alibaba Cloud network, VPC, hybrid clouds, and traditional IDC environments. Full-site HTTPS can be implemented with minimal cost using one platform that allows you to manage multiple digital certificates that can all be used to access multiple Alibaba Cloud services. You can view certificates used by different cloud businesses and place your own orders on a single platform.
  • 7
    Aruba Cloud Monitoring Reviews

    Aruba Cloud Monitoring

    Aruba Cloud

    €2.99 per month
    Cloud Monitoring allows you to monitor all your websites, Cloud Servers, dedicated servers, and other services, whether they are hosted in Aruba Cloud data centers, or any other provider. Cloud Monitoring will immediately notify you via SMS or email if there are any errors or failures in the service or resource being monitored. This allows you to keep track of the progress of your infrastructure and take appropriate action if necessary. The Cloud Monitoring control panel has charts that allow you to quickly register and analyze the activity of monitored services. You can easily identify and track any problems and see how they repeat over time. Cloud Monitoring Control Panel allows you to set up alerts and checks to notify you when a service isn't active. Cloud Monitoring is an essential service to manage your services.
  • 8
    Elastic Observability Reviews
    The most widely used observability platform, built on the ELK Stack, is the best choice. It converges silos and delivers unified visibility and actionable insight. All your observability data must be in one stack to effectively monitor and gain insight across distributed systems. Unify all data from the application, infrastructure, user, and other sources to reduce silos and improve alerting and observability. Unified solution that combines unlimited telemetry data collection with search-powered problem resolution for optimal operational and business outcomes. Converge data silos with the ingesting of all your telemetry data from any source, in an open, extensible and scalable platform. Automated anomaly detection powered with machine learning and rich data analysis can speed up problem resolution.
  • 9
    Comarch EDI Reviews
    A secure and comprehensive platform for B2B collaboration within a supply chain. The Comarch EDI platform allows data exchange with all business partners. We recommend a solution that is tailored to your company's business needs, in relation to technological advancements and the volume document. We offer a variety of functionalities that will simplify communication with business partners. A GDSN-certified catalog allows for the management of product data that is exchanged with many business partners around the world. It makes it possible to define multiple attributes - both general and specific to a business partner. This functionality ensures coherence and high quality data throughout the entire value-chain. This is the solution to optimizing supply chain processes. It allows for effective communication between logistics operators and ensures fast and secure data flow.
  • 10
    PowerTerm InterConnect Reviews
    The PowerTerm InterConnect Series consists of several robust terminal emulator applications that support the host access requirements of small and large organizations. It allows enterprises to use a single host access solution. PowerTerm InterConnect products provide fast and reliable access data residing on a wide range of hosts such as IBM Mainframe zSeries and IBM AS/400 iSeries. Each product of the PowerTerm InterConnect line allows terminal emulation using a variety of communication modes. PowerTerm InterConnect provides a flexible feature set that maximizes users' time and offers a wide variety of options. Power Script Language allows users to automate tasks and increase productivity. PowerTerm InterConnect is small in footprint and can be installed on any computer. It can run legacy applications quickly and efficiently.
  • 11
    PowerTerm Pro Reviews
    The PowerTerm Pro Series from Ericom Software is Ericom Software’s top terminal emulation solution. It simplifies and extends legacy accessibility functionality. PowerTerm Pro supports a variety of hosts and emulation types. This allows corporations to standardize on one host access solution. PowerTerm Pro Enterprise and PowerTerm Pro Pro Enterprise have a customizable GUI, SSL and SSH, and secure file transfer (SFTP) options. This allows corporations to choose the PowerTerm Pro product that best suits their security, server, and productivity needs. The intuitive GUI (graphic user interface), is easy to use and allows users to work quickly and efficiently. It also features drag-and-drop tools that allow for quick data access and AS/400 DFT which allows for file transfer between AS/400 hosts and PCs. PowerTerm Pro terminal emulator software is installed on a central Server and can be accessed via a Windows Desktop with per-user licensing.
  • 12
    Aruba Jelastic Cloud Reviews

    Aruba Jelastic Cloud

    Aruba Cloud

    €0.0040 per hour
    Jelastic Cloud, a Cloud service, offers maximum scalability for virtualized resources through the combination of the PaaS and CaaS models. Container technology is based upon the use of microclouds called cloudlets. They have 128MB RAM and 400MHz vCPU. These can be used directly within Jelastic. The service is available as a pay-per use basis, with preconfigured plans that come with monthly fees. Jelastic Cloud allows you to create, modify, and clone any environment in seconds. Virtualization of resources (storage servers load balancers databases, load balancers, load-balancers, etc.) allows the infrastructure to take shape in real time. There are many technologies (Docker, Ruby PHP, Java, etc.) available. Jelastic Cloud offers a variety of pricing options as well as flat-rate options. A pay-per-use option, which allows you to take advantage platform scalability and only pay for what you use, is also available.
  • 13
    LOGIQ Reviews
    LogIQ.AI's LogFlow allows you to centrally manage your observability data pipes. Data streams are automatically organized and optimized as they arrive for your business teams or knowledge workers. XOps teams can centralize the management of data flows, increase data quality, and relevance. LogFlow's InstaStore, which can be built on any object store allows for infinite data retention and data replay to any target observation platform of your choosing. Analyze operational metrics across applications, infrastructure and gain actionable insight that will help you scale with confidence and maintain high availability. By analyzing and collecting behavioral data from business systems, you can help your business make better business decisions and provide better user experiences. Don't let new attack techniques catch you off guard. Automate threat prevention and remediation by automating the detection and analysis of threat patterns from multiple sources.
  • 14
    BugZero Reviews
    BugZero reduces risk and improves IT operational intelligence by integrating an ITSM tool to track, filter, correlate and track non-security bugs that are specific to vendor products. Every IT organization has to deal with vendor operational bugs. These bugs are embedded in almost every critical system and can cause business productivity and loss of profitability. You can precisely map all software and firmware bugs to every device or system within your organization. You can eliminate the "noise", or less important bugs, by selecting the bug severity levels that will trigger tickets within your ITSM tool. Provides visibility into the existence, criticality, risks, and vulnerabilities of vendor bugs that are residing in the infrastructure. Accuracy and current operational bug data is ensured by taking corrective action on bugs as soon they are published by vendors. Within hours, the solution is operational and reporting on vendor operational bugs data.
  • 15
    FortiGate Cloud Reviews
    FortiGate Cloud simplifies the network operations of Fortinet FortiGate, FortiSwitch and FortiAP for initial deployment and setup, as well as ongoing maintenance. FortiGate Cloud provides enterprise-grade reporting and analytics for small to mid-sized businesses, giving them complete visibility into their attacks surface. FortiGate Cloud is a cloud-based software-as-a-service (SaaS) offering a range of management, reporting, and analytics for FortiGate next-generation firewalls. FortiGate Cloud simplifies initial deployment, setup and ongoing management of FortiGate, FortiSwitch and FortiAP with zero-touch provisioning. This gives you visibility over your entire deployment. FortiGate Cloud can grow with your needs from a single FortiGate up to a managed security services solution for thousands devices across multiple customers.
  • 16
    FortiMonitor Reviews
    FortiMonitor modernizes the network monitoring process to provide end-to-end visibility of the overall user experience. FortiMonitor is a comprehensive, SaaS-based digital experience monitoring (DEM) platform that helps organizations modernize their performance-monitoring tools. It provides visibility into the endpoint application's performance and digital experience no matter where the user is located or where the application resides. FortiMonitor provides NetOps teams end-to-end monitoring of network and application performance, which helps improve the digital experience for customers and employees. SD-WAN underlay monitors enable DEM insights for all active SD-WAN members by surfacing metrics at the user level on application reachability. Metrics are provided per underlay, including SSL resolution time and DNS resolution time as well as time to first byte, time last byte, and RTT.
  • 17
    HPE Consumption Analytics Reviews

    HPE Consumption Analytics

    Hewlett Packard Enterprise

    The HPE Consumption Analytics Portal, which is the metering and analysis component of HPE GreenLake's consumption-based IT offering by HPE Pointnext Services, is now available. It gives you the flexibility and economics of the private cloud in your own datacenter. Interactive dashboards and drag-and-drop reports give you granular insight into your usage and costs. Flexible budgets and a rules-based recommendation engine to consume-based services will help you stay on top of IT spending. Forecast demand to avoid a shortage becoming an outage. With decision-making power, you can plan your capacity. The HPE Consumption Analytics Portal, part of HPE GreenLake provides even more transparency into your usage and commitments that determine your monthly cost. You will have more power to make informed decisions and plan your workload for maximum performance.
  • 18
    SecureW2 Reviews
    A 2020 IBM report showed that credential compromise costs averaged $2.35M even for companies with fewer than 500 employees. Use x.509 certificates to eliminate the threat. Utilize your existing Wi Fi, Web, Firewall, and VPN infrastructure with zero technology upgrade. SecureW2 allows you to verify that only trusted users or devices have access to your network and applications. It's now easier than ever to enable 802.1x in cloud. SecureW2 allows you to use your Okta, Google, or Azure account to enroll and manage certificates for Wi-Fi authentication. It also includes the only Dynamic Cloud RADIUS server in the world, which gives you everything you need to secure WPA2-Enterprise network authentication. You can easily connect to any major operating system and provide secure connections without any IT hassle. You can secure your network with certificates that use the generation, delivery and authentication technology.
  • 19
    RapidScale Identity as a Service Reviews
    RapidScale's Identity as a Service is ideal for organizations that need to make network access simple for staff without compromising security. Our IDaaS solution is built on the backbone Azure Active Directory and provides powerful security right out of the box. No matter where your applications and critical data are located, you can protect them. There are options for single sign-on (SSO), multifactor authentication (MFA), password syncization, and many other features. Our identity services options make it easy to increase your login security. Advanced password sync functions such as user password reset, changing, writeback, and more can be used to control access. Our full-service portal makes it easy to manage IDaaS services, as well as other RapidScale solutions. Alternately let us manage your IDaaS deployment.
  • 20
    OcNOS Reviews
    OcNOS is an innovative, robust and programmable operating system. It features a single software image that runs across all Open Compute platforms from top network device vendors. This ensures consistent operations, workflow automation, high availability, and a significant reduction in operational expenses. OcNOS draws heavily from the ZebOS product line. This ZebOS line has been tested in thousands of customer networks and has a rich feature density. OcNOS supports industry standard MIBs, and all other standard operations and management tools. Its integrated central management and provisioning layer allows transaction-based configuration as well as device feature modeling. The management layer supports Netconf, REST APIs and custom CLI generation. This allows OcNOS systems to be managed, configured and controlled by Network Management System.
  • 21
    CloudVision Reviews
    CloudVision is a multi-domain, modern network management plane that uses cloud networking principles for telemetry and analytics. CloudVision is designed for use in data centers, wired or wireless campuses, multicloud and routing use-cases. It provides a consistent operational model across domains. This helps enterprises simplify network operations by breaking down old network management silos. CloudVision's abstraction allows for a more efficient approach to several operational and network-telemetry capabilities. CloudVision Studios offers turn-key automation for initial and ongoing provisioning, ZTP-as-a-Service configuration management, network-wide change control and network-wide upgrade control. This includes automated upgrades, network rollback and network snapshots. Real-time state streaming to network telemetry, analytics - A modern approach to replacing legacy polling per device.
  • 22
    The Thrive Platform Reviews
    Any IT department must manage the needs of hundreds of thousands of workers in the office and beyond. It's a difficult job, but it's becoming more difficult with budget and staff cuts, increasing numbers of applications, and new trends like remote work and bringing your device to work. ServiceNow's Thrive Platform empowers IT teams to deliver better service in less time and with less effort. The Thrive Platform makes IT easier by automating repetitive manual tasks such as password resets and new hire provisioning. The Thrive platform offers tailored experiences based on the role. This streamlines the day-today IT operations and makes technology self-service second-nature for everyone. The Thrive Platform was built and managed by a dedicated team of experts at Thrive. It makes life easier for everyone by providing customized workflows and clear instructions.
  • Previous
  • You're on page 1
  • Next