What Integrates with HCL Domino?
Find out what HCL Domino integrations exist in 2026. Learn what software and services currently integrate with HCL Domino, and sort them by reviews, cost, features, and more. Below is a list of products that HCL Domino currently integrates with:
-
1
Theum is cutting-edge software that fuses advanced knowledge management technology with generative AI capabilities to create an unparalleled platform for automating and controlling your organization’s knowledge processes and at the same time maximizing the value of your knowledge assets. Theum enables you to: - Streamline and automate complex tasks such as aggregating, curating, synchronizing, securing, converting, publishing, and delivering knowledge from diverse knowledge silos - Provide instant access to the precise, detailed knowledge required for any task via advanced, multilingual semantic search bolstered by a unique, intelligent context guidance system - Equip users with the full analytical and generative power of ChatGPT, seamlessly integrated into your knowledge and available for immediate use - Enhance knowledge quality and efficacy by analyzing user engagement, access trends, emerging needs, knowledge hot points, and more - Mitigate scalability issues in AI development and the compliance risks of unmonitored knowledge flows and the accidental use of unauthorized knowledge
-
2
Netreo is the best full-stack IT infrastructure management and observation platform. Netreo is a single source for truth for proactive performance monitoring and availability monitoring of large enterprise networks, infrastructure, and applications. Our solution is used by: IT executives should have full visibility of the business service, right down to the infrastructure and network that supports them. IT Engineering departments are used as a decision support system to plan and architect modern solutions. IT Operations teams can have real-time visibility into what is going wrong in their environment, which bottlenecks exist, and who it is affecting. All of these insights are available for systems and vendor mix in large heterogeneous environments that are constantly changing. We have a growing list of vendors that we support (over 350 integrations), including network vendors, storage, virtualization, and servers.
-
3
Combine social collaboration, messaging, and business applications into a unified workspace with HCL Notes. This email client software provides teams with essential tools such as email, calendar, and contact management, while also integrating various collaboration resources and HCL Domino business applications. With its enhanced user experience and improvements to critical mail functionalities, HCL Notes evolves your routine email usage into a central operational hub, becoming increasingly vital for your team's productivity. By integrating social collaboration, messaging, and business applications into one cohesive workspace, Notes enhances daily workflow significantly. Currently, leading logistics firms, influential banks, and fashionable brands depend on Notes to streamline their operations and improve efficiency in their everyday tasks. The versatility of HCL Notes makes it an indispensable tool for organizations seeking to optimize their collaborative efforts and communication strategies.
-
4
StarfishETL
StarfishETL
400/month StarfishETL is a Cloud iPaaS solution, which gives it the unique ability to connect virtually any kind of solution to any other kind of solution as long as both of those applications have an API. This gives StarfishETL customers ultimate control over their data projects, with the ability to build more unique and scalable data connections. -
5
SharingCloud
SharingCloud
SharingCloud empowers businesses to modernize their offices with flexible, data-driven Smart Office technologies designed for hybrid work. Its Instant Suite® platform covers every aspect of workplace management, from meeting and desk reservations to visitor registration, signage, and real-time space analytics. With dedicated tools like Instant Mobile, GroomPad, SignPad, and Instant Guest, organizations can create more efficient and engaging work environments. The platform supports collective performance by making it easy to manage hybrid meeting spaces while also delivering modern communication through digital displays and signage. By collecting and analyzing building usage data, SharingCloud enables leaders to anticipate space needs and optimize resource allocation. Trusted by global enterprises, the platform currently supports more than 13,000 meeting rooms and 22,000 shared offices worldwide. Integration through open APIs ensures seamless connection with existing enterprise tools and mobile applications. With its proven scalability and global presence, SharingCloud helps companies reduce inefficiencies, improve workplace satisfaction, and future-proof their operations. -
6
Peaka
Peaka
$1 per monthUnify all your data sources, encompassing both relational and NoSQL databases, SaaS applications, and APIs, allowing you to query them as if they were a single data entity instantly. Process data at its source without delay, enabling you to query, cache, and merge information from various origins seamlessly. Utilize webhooks to bring in real-time streaming data from platforms like Kafka and Segment into the Peaka BI Table, moving away from the traditional nightly batch ingestion in favor of immediate data accessibility. Approach every data source as though it were a relational database, transforming any API into a table that can be integrated and joined with your other datasets. Employ familiar SQL syntax to execute queries in NoSQL environments, allowing you to access data from both SQL and NoSQL databases using the same skill set. Consolidate your data to query and refine it into new sets, which you can then expose through APIs to support other applications and systems. Streamline your data stack setup without becoming overwhelmed by scripts and logs, and remove the complexities associated with building, managing, and maintaining ETL pipelines. This approach not only enhances efficiency but also empowers teams to focus on deriving insights rather than being bogged down by technical hurdles. -
7
SD Elements
Security Compass
SD Elements helps AppSec teams cope with fast-growing development demands by spelling out which security controls each project needs at the design stage. It follows a Security by Design approach, meaning it looks at architecture, data use, and compliance needs early, identifies relevant risks, and turns them into concrete requirements while changes are still cheap and low-friction. Many teams see security review time drop by 30–50% and fewer late surprises before release. The platform generates project-specific requirements mapped to standards such as NIST, OWASP, PCI, and ISO, and pairs them with concise implementation guidance developers can act on. This lets small AppSec groups support security for portfolios of 100+ applications without adding headcount, while driving consistent, policy-aligned expectations across teams and products instead of ad hoc checklists. SD Elements connects to Jira, CI/CD pipelines, and other engineering tools so security work is delivered and tracked in the same systems developers already use. Traceability is a core capability: every requirement is linked to its underlying risk, relevant standards, and evidence of implementation. AppSec leaders and directors get clear views of coverage, posture, and progress across applications, making it easier to reduce risk, support audits, and report meaningful security metrics to senior leadership. -
8
RadiantOne
Radiant Logic
Transform your existing infrastructure into an asset for the entire company with a platform that makes identity a business enabler. RadiantOne is a cornerstone for complex identity infrastructures. Using intelligent integration, you can improve your business outcomes, security and compliance posture, speed-to-market and more. RadiantOne allows companies to avoid custom coding, rework and ongoing maintenance in order to integrate new initiatives with existing environments. The deployment of expensive solutions is not on time or within budget, which negatively impacts ROI and causes employee frustration. Identity frameworks which cannot scale are a waste of time and resources. Employees struggle to provide new solutions for users. Rigid and static systems cannot meet changing requirements. This leads to duplication of efforts and repeated processes. -
9
ScanMail
Trend Micro
Over 90% of targeted cyber attacks initiate through spear phishing emails, highlighting the critical need for robust mail server security. Sadly, many existing mail server security measures, like the basic built-in defenses available in Microsoft® Exchange™ 2013 and 2016, depend on outdated pattern file updates that primarily identify conventional malware. Such measures typically lack the necessary capabilities to recognize harmful URLs or document exploits that are frequently employed in targeted attacks and advanced persistent threats (APTs). In contrast, ScanMail™ Suite for Microsoft® Exchange™ effectively mitigates highly targeted email threats and spear phishing attempts by incorporating document exploit detection, improved web reputation, and sandboxing as part of a tailored APT defense strategy, advantages not provided by competing solutions. Moreover, ScanMail uniquely offers the ability to block traditional malware through advanced email, file, and web reputation technologies, along with correlated global threat intelligence sourced from Trend Micro™ Smart Protection Network™ cloud-based security, ensuring comprehensive protection for your mail server. Ultimately, choosing the right security solution is vital in safeguarding your organization against evolving cyber threats. -
10
BMC Compuware Topaz Connect serves as a vital link between the systems overseeing mainframe applications and the contemporary tools utilized for managing non-mainframe applications, effectively breaking down silos that can hinder innovation. By integrating mainframe operations with various platforms throughout the organization, businesses can monitor processes for mainframe applications in a manner akin to that used for other software and hardware systems. This solution addresses the silos caused by a lack of unified tools, which in turn accelerates the delivery of business value. It enhances enterprise IT automation by minimizing the need for disparate manual interventions, making the most of existing investments in IT service management (ITSM). Additionally, it incorporates the mainframe into DevOps workflows, improving overall process efficiencies. With this tool, programmers who lack mainframe experience can effectively manage mainframe code, ensuring a smoother transition and operation. Moreover, it seamlessly connects BMC Compuware ISPW with ITSM solutions like BMC Helix and Tivoli, allowing for the precise communication of ITSM code changes to BMC Compuware ISPW. Ultimately, this integration fosters a more cohesive IT environment, fostering collaboration and innovation across the enterprise.
-
11
BMC's middleware management software offers comprehensive real-time monitoring and management capabilities tailored for messaging-oriented middleware systems such as IBM® MQ, Integration Bus (IIB), App Connect Enterprise (ACE), Apache ActiveMQ, DataPower, and TIBCO Enterprise Message Service (EMS). By streamlining alerts and providing insights across a diverse range of middleware technologies, this solution presents a user-friendly interface. The MainView Middleware Monitor ensures secure, real-time oversight and automatic alerts for any emerging issues, thus maintaining an efficient middleware environment. Users can delve into historical data to uncover trends, recognize patterns, and address recurring challenges effectively. This proactive approach enhances application availability and reduces risks through early problem detection and automated solutions. Additionally, the software promotes enhanced productivity and efficiency in managing, administering, and troubleshooting by offering customizable dashboards that cater to both infrastructure and application perspectives. Ultimately, this comprehensive tool empowers organizations to optimize their middleware performance and operational effectiveness.
-
12
Acxiom Real Identity
Acxiom
Real Identity™ provides rapid, sub-second decision-making capabilities that facilitate timely and relevant messaging. This innovative platform empowers leading global brands to accurately identify individuals and ethically engage with them at any location and time, thereby fostering significant experiences. With the ability to connect with audiences at scale and with precision, brands can enhance every customer interaction. Additionally, Real Identity allows companies to effectively manage their identity systems by utilizing five decades of expertise in data and identity, coupled with cutting-edge artificial intelligence and machine learning methodologies. In the fast-paced adtech sector, swift access to identity and data is essential for enabling personalization and informed decision-making. As the landscape evolves away from cookies, first-party data signals will become crucial for driving these initiatives, ensuring that communication remains vibrant between individuals, brands, and publishers. By crafting impactful experiences across all channels, businesses can not only impress current customers and prospects but also maintain compliance with regulations and outpace their competitors. Ultimately, Real Identity™ positions brands to thrive in a dynamic environment while enhancing their customer engagement strategies. -
13
Prominic.NET
Prominic.NET
We provide cutting-edge private and managed cloud solutions that ensure you have full visibility and authority over your data. Our cloud-hosted virtual servers and desktops leverage VMware's preferred virtualization platform for enterprises. If your organization requires enhanced security, reliability, and dedicated support for your WordPress hosting, you've found the right solution. Prominic’s fully managed private cloud acts like your own on-site data center, but with the added benefits of cloud technology. You maintain complete control over your environment while our support team integrates seamlessly with your own IT personnel. Worried about safeguarding your proprietary information away from company laptops while maintaining centralized control over security and applications across all devices? Virtual Desktop Infrastructure (VDI) might just be the perfect solution for you. We offer a single-tenant, customizable infrastructure tailored to fit your unique requirements. With our services, you can be confident about the location of your data and the individuals who have access to it, ensuring peace of mind in a digital world. Our commitment to transparency and client control sets us apart in the cloud services landscape. -
14
TRANSEND
TRANSEND
Transend's software offers a robust and user-friendly email and data migration solution that facilitates the transfer of emails, folders, attachments, calendars, contacts, tasks, and more across nearly any source and destination platform, ensuring zero data loss or downtime. This solution accommodates both straightforward and intricate migrations, including well-known platforms such as Microsoft 365, Google Workspace, Exchange, GroupWise, Lotus Notes, Amazon WorkMail, IMAP, and older systems, all managed through a centralized Migration Console. By automating configuration procedures and implementing intelligent predictive settings, it streamlines the setup process, enabling administrators to enhance performance across multiple remote agent machines with customizable concurrency options. Furthermore, it delivers improved reporting capabilities and real-time status updates, along with a Forecast Completion view that predicts the migration's end time. Transend's structured, multi-phased approach encompasses planning, assessment, configuration, scaling, and validation, with the added benefit of optional professional assistance from experienced architects, ensuring a seamless migration experience tailored to various organizational needs. This comprehensive system empowers organizations to transition their data effortlessly while minimizing disruptions to their operations. -
15
GBS iQ.Suite
GBS
The adoption of collaboration tools and meeting platforms from providers like Microsoft and CISCO is on the rise, leading to an urgent need for enhanced security measures. As organizations expand their communication channels and navigate increasingly intricate IT infrastructures, many of these platforms are now fully cloud-based, resulting in the emergence of new gateways and potential attack vectors. Although most businesses are diligently enhancing their email security protocols, they frequently neglect to safeguard against harmful files that can infiltrate their systems through platforms like SharePoint or messaging apps. Current security solutions are often inadequate and fail to provide comprehensive protection. To effectively address these challenges, the platforms offer a centralized cloud solution that enables companies—regardless of size—to swiftly adapt to the evolving threat landscape and bolster their defenses against emerging risks. This approach not only enhances security but also fosters a more resilient operational environment. -
16
Data Sentinel
Data Sentinel
As a leader in the business arena, it's crucial to have unwavering confidence in your data, ensuring it is thoroughly governed, compliant, and precise. This entails incorporating all data from every source and location without any restrictions. It's important to have a comprehensive grasp of your data resources. Conduct audits to assess risks, compliance, and quality to support your initiatives. Create a detailed inventory of data across all sources and types, fostering a collective understanding of your data resources. Execute a swift, cost-effective, and precise one-time audit of your data assets. Audits for PCI, PII, and PHI are designed to be both fast and thorough. This service approach eliminates the need for any software purchases. Evaluate and audit the quality and duplication of data within all your enterprise data assets, whether they are cloud-native or on-premises. Ensure compliance with global data privacy regulations on a large scale. Actively discover, classify, track, trace, and audit compliance with privacy standards. Additionally, oversee the propagation of PII, PCI, and PHI data while automating the processes for complying with Data Subject Access Requests (DSAR). This comprehensive strategy will effectively safeguard your data integrity and enhance overall business operations.
- Previous
- You're on page 1
- Next