Best IT Management Software for Oracle Solaris

Find and compare the best IT Management software for Oracle Solaris in 2025

Use the comparison tool below to compare the top IT Management software for Oracle Solaris on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    RunMyJobs by Redwood Reviews
    Top Pick
    See Software
    Learn More
    RunMyJobs by Redwood is the most awarded SAP-certified SaaS workload automation platform allowing enterprises to achieve end-to-end IT process automation and unify complex across any application, system or environment without limits and with high availability as you scale. We're the #1 job scheduling choice for SAP customers with seamless integration to S/4HANA, BTP, RISE, ECC and more while maintaining a clean core. Empower teams with seamless integration with any present and future tech stack, a low-code editor and a rich library of templates. Monitor processes in real-time with predictive SLA management and get proactive notifications via email or SMS on performance issues or delays in all your processes. Redwood team provides 24/7/365 day global support with the industry’s strongest SLAs and 15-minute response times and a proven approach to migration that secures continuous operations, including team training, on-demand learning and more.
  • 2
    Pandora FMS Reviews
    Top Pick
    With more than 50,000 customer installations across the five continents, Pandora FMS is a truly all-in-one monitoring solution, covering all traditional silos for specific monitoring: servers, networks, applications, logs, synthetic/transactional, remote control, inventory, etc. Pandora FMS allows you to quickly find and solve problems. It scales them so that they can be derived either from on-premise, multi-cloud, or both. You now have the ability to use your entire IT stack and analytics to solve any problem, even those that are difficult to find. You can control and manage any technology and application with more than 500 plugins, including SAP, Oracle, Lotus or Citrix, Jboss, VMware, AWS and SQL Server.
  • 3
    OpenSVC Reviews
    OpenSVC is a free software solution that provides tools for service mobility and clustering, container orchestration and management, configuration management, as well as comprehensive infrastructure auditing. The platform consists of two main components. The agent acts as a clusterware, container orchestrator and configuration manager. It facilitates the deployment, management and scaling of services in diverse environments including on-premises virtual machines and cloud instances. It supports a variety of operating systems, including Unix, Linux BSD, macOS and Windows. It also offers features such as cluster DNS, backend networking, ingress gateways and scalers. The collector aggregates the data reported by agents, and fetches all information from site infrastructure, such as networks, SANs and storage arrays. It is a flexible, reliable and secure data storage.
  • 4
    Melissa Data Quality Suite Reviews
    According to industry experts, up to 20% of a company's contact list contains bad data. This can lead to bounced emails, returned mail, address correction fees and wasted sales and marketing efforts. The Data Quality Suite can be used to standardize, verify, and correct all contact data. This includes postal address, email address and phone number. It is essential for efficient communications and business operations. Verify, standardize and transliterate addresses from more than 240 countries. Intelligent recognition can identify 650,000+ ethnically diverse first and last names. Authenticate phone numbers and geo-data to ensure that mobile numbers are available and callable. Validate domain, syntax, spelling, & even test SMTP for global email verification. The Data Quality Suite allows organizations of all sizes to verify and maintain data in order to communicate effectively with customers via email, postal mail, or phone.
  • 5
    NXLog Reviews
    Log data can provide powerful insights to help you achieve complete security observability. Multi-platform tool that enhances threat prevention and improves infrastructure visibility. With over 120 configurable modules and support for more than 100 operating system versions, you can gain comprehensive insights as well as increased security. Reduce the cost of your SIEM by reducing noise and unnecessary log data. Filter events, trim unused fields and remove duplicates in order to improve the quality of your logs. With a single tool, you can collect and aggregate logs across your entire organization. Reduce the complexity of managing security-related incidents and reduce detection and response time. By centralizing certain logs into an SIEM, and archiving other logs on your long-term storage, you can empower your organization to meet compliance regulations. NXLog Platform provides centralized log management with flexible processing.
  • 6
    Catalogic DPX Reviews

    Catalogic DPX

    Catalogic Software

    Reliable, quick, and affordable backup and recovery. Protect your data from human error, disasters and ransomware attacks. Quick recovery-in-place from tape, disk, and cloud. Agentless backup for virtual environments enhancements, including single file recovery to restore files or directories from VMware or Microsoft Hyper-V agentless back-ups. Enhancements to vStor our software-defined backup appliance. These enhancements include appliance configuration via HTML5 interface, replication management and S3 object lock for protecting cloud backups from early deletion and ransomware. Additional cloud storage backup and archive targets include Backblaze B2 Cloud Storage with S3 object Lock, Amazon S3 Glacier, and Glacier Deep Archive support.
  • 7
    AD Bridge Reviews
    With AD Bridge, extend Microsoft® Active Directory authentication, single-sign-on capabilities and group policy configuration management to Unix and Linux systems. Consistent tools for the entire enterprise. One tool that can be used to manage both Windows systems and Unix/Linux system. Streamline compliance processes. Provide detailed audit details to audit and compliance team members and centrally manage group policies. Expand security policies. Expand single sign-on (SSO), file sharing, and control access for non-Windows systems. BeyondTrust AD Bridge centralizes authentication in Unix and Linux environments. It extends Active Directory's Kerberos authentication to these platforms and provides single sign-on capabilities. BeyondTrust allows for centralized configuration management. This reduces the risk and complexity associated with managing heterogeneous environments. Expand native group policy management tools so that they include Unix and Linux settings.
  • Previous
  • You're on page 1
  • Next