What Integrates with IBM i?

Find out what IBM i integrations exist in 2025. Learn what software and services currently integrate with IBM i, and sort them by reviews, cost, features, and more. Below is a list of products that IBM i currently integrates with:

  • 1
    Kiuwan Code Security Reviews
    Top Pick
    Security Solutions for Your DevOps Process Automate scanning your code to find and fix vulnerabilities. Kiuwan Code Security is compliant with the strictest security standards, such OWASP or CWE. It integrates with top DevOps tools and covers all important languages. Static application security testing and source analysis are both effective, and affordable solutions for all sizes of teams. Kiuwan provides a wide range of essential functionality that can be integrated into your internal development infrastructure. Quick vulnerability detection: Simple and quick setup. You can scan your area and receive results in minutes. DevOps Approach to Code Security: Integrate Kiuwan into your Ci/CD/DevOps Pipeline to automate your security process. Flexible Licensing Options. There are many options. One-time scans and continuous scanning. Kiuwan also offers On-Premise or Saas models.
  • 2
    Storagepipe Reviews
    Top Pick
    Storagepipe offers world-class Cloud and Data Protection Services to companies of all sizes. Our services include secure Managed Private Cloud, Public Cloud and Cybersecurity. We also offer Disaster Recovery services. All of our services are supported by our top-of-the-line technical team. We provide outstanding value and service using state-of the-art technology such as Veeam, VMWare and Microsoft 365, as well as proprietary solutions to specialized platforms such as IBM iSeries. Storagepipe is determined to be your trusted partner. Our customers trust us with their mission-critical systems' protection and availability. We are focused on providing a Storagepipe Experience that provides the reliability, scalability, and support that you need.
  • 3
    IBM Watson Reviews
    Discover how to effectively integrate AI into your business operations with Watson. This innovative tool empowers you to forecast and influence future results, streamline intricate processes, and enhance the efficiency of your workforce. By incorporating Watson into your workflows, you can harness its capabilities to predict trends, automate challenging tasks, and maximize your team's productivity. Implementing Watson in your applications and processes allows you to leverage organizational data, facilitating the use of AI across various departments, including finance, customer service, and supply chain management. With the help of Watson, you can cultivate improved, tailored experiences for your clients, extend the knowledge of your top talent throughout the organization, and make astute decisions driven by profound data insights. Watson's products and solutions are rooted in scientific principles, designed with a focus on human needs, and emphasize inclusivity. This approach offers a more open, rapid, and secure method for transitioning a greater volume of workloads to the cloud and leveraging AI effectively. Embracing Watson could be a transformative step for your business in the evolving landscape of technology.
  • 4
    Curbstone Reviews

    Curbstone

    Curbstone Corporation

    $17,000
    Credit Card, ACH and IVR Payment SaaS available for your IBM i, iSeries and AS/400. Use native RPG APIs to ensure a stress-free and simple implementation for the IBM i, iSeries and AS/400. Automate manual data entry, get real-time authorizations and perform background or recurring charges with cards on file. Your entire infrastructure is now exempted from PCI. This will allow you to spend less time on compliance reporting, audits, and other administrative tasks. Remote payment tokenization can help you reduce risk and protect your data. Flat-fee pricing allows you to control your costs. We will show you how to improve transaction quality, reduce downgrade fees, and get the best credit card processing rates.
  • 5
    Connectria Reviews

    Connectria

    Connectria

    $199 per month
    Connectria offers the TRiA Cloud Management solution, which serves as an all-encompassing cloud governance tool designed to enhance expenditure efficiency, oversee performance metrics, and maintain ongoing security and compliance. It stands out as the sole Cloud Management Platform (CMP) that enables management across diverse cloud environments—from traditional IBM i systems to contemporary hyper-scale solutions like AWS, Azure, and GCP—all within one user-friendly dashboard. No other CMP on the market matches the comprehensive capabilities of the TRiA platform. It allows users to enhance visibility, control cloud expenditures, and uphold compliance and security standards. By integrating strategy, migration, managed services, and modernization resources, we provide complete solutions tailored to intricate infrastructure challenges. Whether your goal is to transition legacy systems away from data centers, embrace cloud-native technologies, or refocus IT resources from routine tasks to strategic objectives, our team will support you throughout the entire process, ensuring a seamless connection between your current status and future aspirations. Our commitment is to be your trusted partner in navigating the evolving landscape of cloud management.
  • 6
    TestBench for IBM i Reviews

    TestBench for IBM i

    Original Software

    $1,200 per user per year
    Testing and managing test data for IBM i, IBM iSeries, and AS/400 systems requires thorough validation of complex applications, extending down to the underlying data. TestBench for IBM i offers a robust and reliable solution for test data management, verification, and unit testing, seamlessly integrating with other tools to ensure overall application quality. Instead of duplicating the entire live database, you can focus on the specific data that is essential for your testing needs. By selecting or sampling data while maintaining complete referential integrity, you can streamline the testing process. You can easily identify which fields require protection and employ various obfuscation techniques to safeguard your data effectively. Additionally, you can monitor every insert, update, and delete action, including the intermediate states of the data. Setting up automatic alerts for data failures through customizable rules can significantly reduce manual oversight. This approach eliminates the tedious save and restore processes and helps clarify any inconsistencies in test results that stem from inadequate initial data. While comparing outputs is a reliable way to validate test results, it often involves considerable effort and is susceptible to mistakes; however, this innovative solution can significantly reduce the time spent on testing, making the entire process more efficient. With TestBench, you can enhance your testing accuracy and save valuable resources.
  • 7
    PKZIP Reviews

    PKZIP

    PKWARE

    $29 per copy
    Each passing year sees a dramatic surge in the volume of data stored and shared globally. The expenses associated with data storage and transfer are on the rise, whether entities choose to keep their information on-site or utilize cloud services. To effectively address cost management and resource allocation, a robust and adaptable data compression solution is crucial. Nearly thirty years after the introduction of the ZIP file format, PKZIP remains a benchmark in the realm of data compression and file organization. Utilizing PKZIP, businesses can achieve file compression rates of up to 95%, which not only lowers storage expenses but also significantly enhances the speed of file transfers. Moreover, PKZIP is capable of tackling vast compression challenges, accommodating over 2 billion files within a single archive and managing files that exceed 9 exabytes. The lossless compression technology offered by PKWARE guarantees that every piece of information, including metadata, is preserved during the zipping process. This reliability makes PKZIP a preferred choice for organizations aiming to optimize their data handling.
  • 8
    LongRange Reviews
    The LongRange mobile application builder is founded on two key principles: ensuring a rapid time-to-market and a reasonable total cost of ownership, both of which are crucial for IBM i development teams facing budget constraints, tight timelines, and limited resources. By leveraging your existing development skills in RPG, COBOL, or CL alongside the LongRange mobile app builder, you can quickly produce mobile applications for your user base while also enabling easy maintenance and upgrades at a low cost. LongRange functions as a native mobile application, similar to Twitter, Skype, and Salesforce, and is available for download from designated App Stores; it operates as a native app, providing exceptional speed and steadfast reliability. Unlike web applications that depend on server-side execution or hybrid apps that utilize HTML, CSS, and JavaScript, LongRange offers a seamless native experience that enhances performance and user satisfaction. This innovative approach allows developers to meet the demands of modern mobile users effectively.
  • 9
    CoolSpools Reviews

    CoolSpools

    Ariadne Software

    $3835 one-time payment
    The AS400 Spool File Converter (IBM i) is designed to transform AS400 spool and database files into various formats such as PDF, Excel, CSV, XML, and HTML. CoolSpools serves as a comprehensive information management tool for AS400 (IBM i / iSeries), offering a robust spool file conversion solution along with management and distribution capabilities across multiple formats. By utilizing CoolSpools, you can ensure that your users and clients receive valuable reports promptly, while also delivering them in the most suitable formats for their needs. This versatility enhances communication and data accessibility, making it an essential tool for efficient information management.
  • 10
    Fortra Sequel Reviews
    Sequel provides business intelligence solutions tailored for Power Systems™ that operate on IBM i. With robust capabilities for querying and reporting, Sequel simplifies the process of accessing, analyzing, and distributing data in the way that best suits your needs. Offering cost-effective IBM i business intelligence, Sequel caters to IT professionals, business users, and executives alike. Currently, thousands of clients around the globe rely on Sequel to obtain the necessary data precisely when they require it. IT personnel can swiftly deploy the software, seamlessly integrate pre-existing queries from Query/400, and deliver data to end users at remarkable speeds. Furthermore, Sequel’s user-friendly interfaces—including the traditional green screen, the graphical user interface known as Sequel Viewpoint, and web-based options—enable IT to empower business users and executives with direct data access, allowing them to efficiently address more pressing requests. The landscape of iSeries reporting has truly become more manageable and accessible. This enhancement not only streamlines operations but also fosters a data-driven culture within organizations.
  • 11
    Gravity Reviews

    Gravity

    Remain Software

    $2 per user per month
    Gravity is a versatile Project and Workflow Management software that operates across multiple platforms, including IBM i, Windows, Unix, and Linux, catering to the needs of organizations and development teams seeking efficient, rapid, and transparent oversight of diverse projects and processes. This software facilitates process automation and aids in optimizing all organizational changes, irrespective of the methodologies and terms employed. What sets Gravity apart from other workflow management tools is its capacity for customization, allowing users to adjust workflows to meet their unique requirements, incorporating personalized tasks such as sending emails or managing calendars, as well as more intricate steps like initiating builds on a build server and requiring user sign-offs. The user-friendly interface of Gravity's work management system empowers users to oversee all activities seamlessly with just one comprehensive solution, making it an attractive option for teams looking to enhance productivity and collaboration. Ultimately, Gravity not only simplifies project oversight but also adapts to the evolving needs of its users, ensuring a tailored experience that fosters greater efficiency.
  • 12
    Automate Schedule Reviews
    Experience robust workload automation designed for centralized scheduling of Linux jobs. By automating workflows across various platforms such as Windows, UNIX, Linux, and IBM i systems through a job scheduler, your IT team can dedicate more time to important strategic initiatives that drive business success. Consolidate disconnected job schedules from cron or Windows Task Scheduler into a cohesive enterprise solution. When your job scheduler seamlessly integrates with other essential software applications, it becomes much simpler to grasp the overall landscape, make informed decisions using data organization-wide, and synchronize job schedules effectively. This enhanced efficiency allows you to better achieve your workload automation objectives. The implementation of automated job scheduling not only simplifies your operations but also revolutionizes your business practices. You can create dynamic, event-driven job schedules that consider dependencies, ultimately aligning workflows with your organizational goals. Additionally, Automate Schedule provides a high-availability setup for a primary server alongside a standby server, ensuring that crucial tasks continue uninterrupted even in the event of an outage. Embracing this technology not only streamlines processes but also fosters resilience in your IT operations.
  • 13
    Webdocs Reviews
    Webdocs offers comprehensive document management solutions that cater to cloud platforms, Windows, and IBM iSeries systems. Their document management software enables users to digitally capture, organize, and share all types of documents and data seamlessly. You can easily automate the routing of electronic files through various workflows, such as approvals, payments, and order fulfillment, eliminating the need for cumbersome paper processes. By integrating ERP, POS, LOBs, and additional systems with your document management software, you ensure consistent data management throughout your organization. Say goodbye to the challenges of printing spool files and the complexities of generating reports in different formats. With Webdocs, you can create and deliver reports using a single tool, streamlining your workflow. Additionally, Webdocs lays a solid foundation for electronic document management, while its other specialized software modules focus on accounts payable processes, forms management, and efficient document creation and distribution. This comprehensive approach enhances overall productivity and simplifies document-related tasks across the board.
  • 14
    Powertech Antivirus Reviews
    Numerous organizations utilize a variety of technology stacks that incorporate different operating systems such as Windows, Linux, AIX, or IBM i. However, the majority of antivirus solutions are primarily tailored for Windows environments. Implementing a native tool that mitigates scan failures and security vulnerabilities is crucial for ensuring that each platform within your infrastructure is adequately safeguarded against threats like viruses, worms, and malware. Powertech Antivirus stands out as the sole commercially available antivirus solution designed specifically for server-level protection, offering native scanning capabilities across IBM Systems, including IBM i, AIX, Linux on Power, and LinuxONE. This software boasts one of the most extensive collections of virus signatures available on any platform and maintains its effectiveness by automatically downloading updates for virus definitions and software improvements, ensuring continuous protection. By utilizing such a specialized antivirus solution, organizations can significantly enhance their security posture across diverse operating systems.
  • 15
    IBM Db2 Reviews
    IBM Db2 encompasses a suite of data management solutions, prominently featuring the Db2 relational database. These offerings incorporate AI-driven functionalities designed to streamline the management of both structured and unstructured data across various on-premises and multicloud settings. By simplifying data accessibility, the Db2 suite empowers businesses to leverage the advantages of AI effectively. Most components of the Db2 family are integrated within the IBM Cloud Pak® for Data platform, available either as additional features or as built-in data source services, ensuring that nearly all data is accessible across hybrid or multicloud frameworks to support AI-driven applications. You can easily unify your transactional data repositories and swiftly extract insights through intelligent, universal querying across diverse data sources. The multimodel functionality helps reduce expenses by removing the necessity for data replication and migration. Additionally, Db2 offers enhanced flexibility, allowing for deployment on any cloud service provider, which further optimizes operational agility and responsiveness. This versatility in deployment options ensures that businesses can adapt their data management strategies as their needs evolve.
  • 16
    PTC Implementer Reviews
    PTC Implementer offers developers and IT managers a user-friendly platform that accelerates development by effectively managing and optimizing essential change management and development workflows. As the leading software configuration management and deployment tool for IBM i, Implementer combines both host-based and graphical user interfaces to cater to users of all skill levels. It provides the necessary ease of use for beginners while also delivering comprehensive features for seasoned professionals. By simplifying the processes of software change management and development, users can achieve enhanced productivity, access to larger libraries, and the ability to work with new programming languages. Implementer ensures a secure, scalable, and adaptable solution to safeguard production, development, and testing environments on IBM i servers. This intuitive environment facilitates faster host-based development and guarantees stringent controls over the initiation and approval of changes from various developers. Additionally, it seamlessly integrates with a wide range of popular application packages, making it a versatile choice for organizations looking to streamline their software development efforts. Overall, PTC Implementer empowers teams to work more efficiently and collaboratively in an increasingly complex development landscape.
  • 17
    iSecurity Audit Reviews
    iSecurity Audit significantly improves the native auditing capabilities of IBM i by continuously monitoring and reporting on all activities within the IBM i environment. Utilizing real-time detection, it identifies security events instantly and logs the relevant details for future reference. The audit logs can be presented in user-friendly graphical formats, complemented by clear explanations for each entry, facilitating quick analysis of statistical data. A key feature of this system is its ability to trigger alerts or initiate immediate corrective measures in response to security threats. Uniquely designed for non-technical users, such as external auditors and managers, iSecurity Audit stands out as the sole security auditing solution for IBM i created with user-friendliness in mind. In addition, this advanced security auditing tool not only monitors real-time events but also activates alerts and responses to potential vulnerabilities, making it an indispensable resource. Furthermore, it boasts a robust report generator equipped with over one hundred customizable, pre-configured reports, ensuring comprehensive coverage of security auditing needs.
  • 18
    Robot Monitor Reviews
    Robot Monitor stands out as the most thorough and detailed monitoring solution designed specifically for Power Systems environments, whether operating solely on IBM i or in conjunction with VIOS, AIX, or Linux on Power. Utilizing cutting-edge technology, it ensures the highest level of surveillance for your essential IT infrastructure. By providing real-time insights into the performance of your Power servers—covering aspects such as system status, disk performance, network health, availability, application data, and JDBC/ODBC activity—you and your team can take proactive measures to address potential issues before they adversely affect user productivity or resource allocation. With its highly customizable and contemporary dashboards, you gain clear visibility into all your metrics, elements, and status conditions, ensuring nothing goes unnoticed. Accessing all your data from a unified central interface helps you minimize downtime and enhance overall performance. Furthermore, if you're not actively monitoring the dashboard, Robot Monitor is equipped to send alerts when problems arise, ensuring you stay informed at all times. This proactive approach empowers your team to maintain optimal operational efficiency without constant manual oversight.
  • 19
    IBM i Server Suites Reviews
    In today's fast-moving business world, IT teams face immense pressure to ensure uninterrupted system availability while operating with limited resources. The IBM i server monitoring software streamlines this process by automating tasks that would typically require manual intervention, thus conserving both time and resources. With a straightforward download and easy implementation, deploying your solution across the organization becomes a hassle-free experience. After installation, users can take advantage of user-friendly features, automatic updates, and ready-to-use templates. You have the flexibility to select only the modules that suit your specific needs. Our tiered solutions cater to various levels, starting from basic monitoring to comprehensive operations management. As your organization expands, it allows for seamless addition of features to satisfy your evolving monitoring, automation, and reporting needs. Experience simplified oversight of multiple servers and applications through a convenient management interface that is accessible anytime and from anywhere, enhancing your operational efficiency further. This adaptability ensures that your IT infrastructure can grow harmoniously alongside your business objectives.
  • 20
    Ricoh Reviews
    Boost your growth trajectory by implementing scalable solutions across public, private, and hybrid cloud platforms. By embracing cloud computing, you can concentrate on achieving your primary business objectives without the hindrances of traditional infrastructure. You gain access to essential technology, tools, and applications, all while avoiding the burdens of maintenance costs and limitations typical of conventional setups. Opting for public cloud services provides you with high-performance, secure, and economically viable business solutions that eliminate the need for internal infrastructure or specialized personnel for setup. For numerous organizations, the low initial investment and flexible pay-as-you-go pricing structure make the public cloud a compelling option for getting started. This process begins with a thorough assessment followed by strategic planning to identify the most suitable cloud solution. The next steps involve building and deploying the cloud infrastructure, alongside managing user security to ensure operational effectiveness, compliance, and the establishment of disaster recovery protocols. After the setup is complete, ongoing support is essential, which includes proactive monitoring, scanning, and reporting to guarantee optimal performance and the highest levels of data security. Ultimately, these comprehensive services empower businesses to thrive in a fast-evolving digital landscape.
  • 21
    Powertech Exit Point Manager for IBM i Reviews
    Shield your organization from the hefty repercussions of security breaches by utilizing Powertech Exit Point Manager for IBM i, which allows for effective tracking and monitoring of data access. With its user-friendly interface, administrators can more rigorously adhere to security policies, leading to a network that is fortified against threats, compliant with regulatory mandates, and less prone to breaches. This solution secures network access points that conventional menu security measures fail to cover. By shutting down all potential back doors to the network—such as FTP, ODBC, SQL, JDBC, and remote command—you can enhance the safety of your IBM i systems. Additionally, overseeing and controlling exit point traffic ensures that data access is limited strictly to authorized personnel. This system enables the restriction of access to certain objects and libraries exclusively to users and groups with a verified business necessity. By setting rules based on IP addresses, access to the system can be confined to pre-approved locations, thus reinforcing security. Furthermore, the Powertech Exit Point Manager for IBM i allows for the effortless modification and implementation of rules throughout your entire network, ensuring ongoing protection against potential threats.
  • 22
    Robot Space Reviews
    Automating your daily disk space monitoring will not only alleviate your concerns about running out of space but also help you save money in the long term by efficiently managing your files and objects, thus preventing the need to invest in costly additional storage. By staying informed about the latest trends in your storage landscape, you gain the ability to forecast your organization’s future disk space requirements more effectively, utilizing the historical data provided by your disk space analyzer. Regular checks on various elements, from ongoing tasks to temporary files, using adaptable storage thresholds, ensure that you remain proactive about disk space management rather than reactive when you are nearing full capacity. Investigating disk storage issues allows you to pinpoint what is consuming your space, while reviewing past growth metrics and making comparisons with previous data collections empowers you to take necessary actions. Additionally, employing cleanup tools can help you eliminate outdated files and reorganize your storage for optimal efficiency. Ultimately, a strategic approach to monitoring and maintaining your disk space will contribute to smoother operations within your organization.
  • 23
    OpenText Exceed Reviews
    OpenText™ Exceed™ serves as a remote access solution tailored for Windows users who need to run graphically intensive Linux and UNIX applications, such as those used in CAD and CAM environments. By seamlessly integrating the Windows desktop experience with various operating systems, including UNIX, Linux, VMS, and IBM iSeries and z/OS, Exceed enhances usability. This high-performance X Window server ensures secure and dependable access to X Window applications from Microsoft Windows machines and Citrix virtual desktops over local area networks. Many software solutions in fields like engineering, architecture, and product design rely on Linux and UNIX platforms, which leverage the Linux X Window (X11) graphics technology. With Exceed, a Windows X Server allows these graphical UNIX and X11 applications to operate on standard Microsoft Windows systems, avoiding the need for expensive high-end graphical workstations. To effectively utilize this demanding software from a Windows environment, organizations need robust remote access solutions that facilitate efficient LAN connectivity. Thus, Exceed not only streamlines the workflow but also helps companies optimize their resources.
  • 24
    Alliance Key Manager Reviews

    Alliance Key Manager

    Townsend Security

    $4,800 one-time payment
    Once your data has been encrypted, the security of your personal information relies heavily on advanced key management practices employed at the enterprise level. This solution offers robust, high-availability, and standards-based key management for encryption across a diverse array of applications and databases. Alliance Key Manager serves as a FIPS 140-2 compliant enterprise key management system, assisting organizations in fulfilling compliance mandates while safeguarding sensitive data. The symmetric key management solution is capable of generating, overseeing, and distributing AES encryption keys in 128-bit, 192-bit, and 256-bit formats, suitable for any application or database operating on various enterprise platforms. Moreover, the access to encryption keys can be controlled through multiple criteria. The highest level of access requires a secure and authenticated TLS connection to the key server. Additionally, encryption keys can be tailored to specific users, groups, or designated individuals within those groups, allowing for precise control over who can access the data. Furthermore, organizations have the flexibility to establish enterprise-wide groups, enabling the restriction of keys to designated enterprise users, groups, or particular individuals within those groups, thereby enhancing the overall security and management of sensitive information.
  • 25
    WEBDEV Reviews

    WEBDEV

    Windev

    $1,703 one-time payment
    With the innovative capabilities of WEBDEV, you can effortlessly create both Internet and Intranet sites and applications (WEB & SaaS) for effective data and process management. Additionally, WEBDEV has the ability to generate PHP, while WINDEV is compatible with all database systems. Furthermore, WEBDEV accommodates any databases that utilize ODBC drivers or OLEDB providers, ensuring broad compatibility. The integration of WINDEV, WEBDEV, and WINDEV Mobile environments allows for seamless sharing of project elements, making the creation of multi-target applications simpler than ever. Developers can concentrate on critical business needs rather than getting bogged down by code, enabling applications to align closely with user requirements. This approach leads to a reduction of up to 20 times in code volume, significantly accelerating the development process. A shorter time to market translates into enhanced opportunities for capturing market share. Additionally, the software development process is streamlined, resulting in greater reliability and ease of use. As a comprehensive RAD generator for PC, web, and mobile platforms, it facilitates the creation of templates (patterns, inheritance & MVP), empowering developers to bring even their most ambitious projects to life with impressive speed. The combination of efficiency and creativity makes this tool indispensable for modern developers.
  • 26
    WINDEV Reviews

    WINDEV

    Windev

    $1,768 one-time payment
    With its seamless integration, exceptional user-friendliness, and cutting-edge technology, WINDEV empowers developers to efficiently create large-scale applications for various platforms including Windows, Linux, .NET, and Java, among others. It ensures full compatibility across web, mobile, Android, iOS, and more, allowing for the development of applications that function seamlessly on Windows, Linux, and Mac systems. Additionally, WEBDEV facilitates the recompilation of these applications for internet deployment, while WINDEV Mobile enables them to be optimized for smartphones and tablets. This capability to use the same project components, user interfaces, and source code across different targets greatly enhances development efficiency and speeds up deployment across all devices. The ability to effortlessly recompile applications for various platforms is a crucial benefit, ensuring consistent functionality and responsiveness to evolving needs. Moreover, WINDEV offers numerous automated features, including portable code and objects that work across web browsers and mobile environments. Supporting all databases utilizing ODBC drivers or OLEDB providers, WINDEV stands out as an exceptionally versatile tool for modern application development. This flexibility not only streamlines the development process but also empowers teams to adapt swiftly to changing market demands.
  • 27
    WebSmart Reviews
    WebSmart serves as an efficient development platform designed for the rapid creation of desktop and mobile web applications in RPG and PHP. Its responsive templates enable users to swiftly build contemporary applications and APIs, tailored to meet diverse business requirements through the robust integrated development environment (IDE) provided by WebSmart. These templates not only generate the foundational client and server-side code but also allow for extensive customization, empowering developers to craft various web applications. By utilizing responsive templates, one can develop web and mobile applications that operate from a unified code base, enhancing efficiency and consistency. Additionally, WebSmart's API templates facilitate the smooth integration of Db2 files and RPG programs with external web services, streamlining workflows. The PHP Edition specifically aids in creating open-source PHP applications that are compatible across multiple platforms, including IBM i, Windows, Linux, and Unix. Meanwhile, the ILE edition offers IBM i programmers the quickest route to developing new RPG web applications while making the most of their existing code. With its foundation in PHP, a widely recognized and reliable open-source language, WebSmart is specially designed for the creation of web applications, ensuring developers have the tools they need for success. Ultimately, WebSmart provides a powerful solution for efficient development, making it an invaluable resource for modern programming needs.
  • 28
    Robot Schedule Reviews
    Data center managers strive for their IT teams to operate efficiently, adhere to service-level agreements, and minimize processing mistakes. By utilizing automated job scheduling and batch job management, you enable your operators to enhance their productivity. Robot Schedule serves as an essential tool for any automation initiative that involves IBM i systems. With its robust workload automation features, Robot Schedule empowers users to streamline everything from straightforward jobs to intricate, event-triggered processes across various platforms, all while consolidating management on the dependable IBM i system. Simply set up a schedule for when and how tasks should execute, and the software will handle the execution seamlessly. Given the multitude of responsibilities your operators already manage, they shouldn't have to focus on monitoring scheduled jobs to guarantee timely and orderly execution. Rely on Robot Schedule to deliver effective workload automation, ensuring a smoother and more accurate job schedule. Additionally, you can select from over 25 unique scheduling parameters to tailor the automation to your needs. This flexibility allows for greater customization and adaptability within your operational processes.
  • 29
    Powertech Authority Broker for IBM i Reviews
    Granting excessive system access to inappropriate users can result in severe data damage and loss. To mitigate this risk, it is advisable to utilize privileged access management software. Powertech Authority Broker for IBM i ensures the protection of corporate resources and monitors user access continuously to enhance system security. While security best practices suggest minimizing the number of privileged accounts, having an excessive number of user profiles with elevated permissions remains a prevalent security vulnerability identified during IBM i audits. It is important to provide users with the necessary access required for their roles, without overextending their privileges. Additionally, it is crucial to maintain comprehensive records of all user actions when they activate a privileged profile. With its award-winning screen capture technology, Powertech Authority Broker for IBM i offers system administrators and IT leaders an exceptional perspective on user activities, thereby fortifying the protection of sensitive IBM i information. As such, investing in this tool not only improves security but also ensures compliance with best practices in user management.
  • 30
    Powertech Encryption for IBM i Reviews
    Powertech Encryption for IBM i safeguards sensitive information through robust encryption, tokenization, key management, and auditing features. This solution enables organizations to swiftly and efficiently encrypt database fields, backups, and IFS files, thanks to its user-friendly interfaces and reliable technology. Companies across the globe rely on Powertech Encryption to protect confidential data on IBM i (iSeries, AS/400) and information from distributed systems, defending against threats posed by external hackers and unauthorized internal access. With its comprehensive approach to data security, Powertech Encryption ensures that organizations can maintain compliance and protect their valuable assets.
  • 31
    Powertech Compliance Monitor for IBM i Reviews
    Compliance reporting for IBM i should not be overly complicated. Streamline the process of generating reports across your iSeries environments with ease. Compliance Monitor brings together audit and security information from various systems into one cohesive report, which not only saves your organization valuable time but also reduces costs. It provides auditors with the necessary information without the added expense or risks associated with creating custom reporting solutions. Featuring a user-friendly web interface and adaptable filters, you can customize and present data precisely as auditors need it. Transform vast amounts of IBM i data into actionable reports that aid system administrators in pinpointing areas for enhancing security through our compliance monitoring software. Additionally, you can efficiently retrieve and archive the essential audit data while conserving storage space. With Compliance Monitor’s log aggregation design, audit journal data can be accessed and stored in a highly compressed manner on a centralized system, ensuring optimal efficiency and ease of access. This ensures that your compliance efforts are not just effective but also sustainable in the long run.
  • 32
    Powertech SIEM Agent for IBM i Reviews
    Keep a close watch on your IBM i for vital security incidents and get instant notifications, enabling you to act swiftly—before essential business data is lost, damaged, or compromised. Directly relay security-related incidents to your enterprise security monitor for enhanced oversight. By integrating with your security information and event management (SIEM) system, Powertech SIEM Agent streamlines and consolidates monitoring of security and integrity. You can oversee security events from the network, operating system, and any journal or message queue in real-time, tracking user profile alterations, system value changes, unauthorized login attempts, intrusion alerts, and modifications or deletions of objects. Stay informed about every security event on your system in real-time, ensuring you never overlook a potential security threat. With Powertech SIEM Agent for IBM i, you will receive timely alerts to highlight critical issues and facilitate a rapid response. This comprehensive monitoring approach not only enhances your security posture but also helps maintain the integrity of your business operations.
  • 33
    Powertech Password Self Help for IBM i Reviews
    Allowing users to independently reset their IBM i passwords significantly alleviates productivity hurdles for both individuals and IT support staff who usually handle these requests. This self-service approach means that users can bypass the help desk ticketing system for password resets, enabling IT personnel to focus on more pressing technical issues. Given that password resets can constitute up to half of all help desk inquiries, the resultant efficiency improvements can be substantial. To ensure user authenticity and thwart fraudulent reset attempts, it's essential to implement a set of challenge questions that users must answer correctly before a password reset can be granted. Additionally, it's important to configure the system settings in alignment with security policies, establishing clear guidelines regarding the minimum password length, the allowance of character repetition, and whether answers to security questions are case-sensitive. Furthermore, these measures not only enhance security but also empower users by giving them more control over their access credentials.
  • 34
    Powertech Database Monitor for IBM i Reviews
    By providing real-time insight into every modification made by users across various systems, security administrators can significantly reduce the likelihood of unnoticed data corruption. This capability allows you to track user modifications across different platforms seamlessly. When you amalgamate data from numerous interconnected systems, you create a unified perspective for reporting and archiving, thereby simplifying the management of database security. Additionally, you can maintain a comprehensive audit trail of all alterations within a secure database, assisting in compliance with some of the most rigorous security standards. Implement filters to specifically monitor and log changes to your most sensitive information. You can designate which fields require oversight and establish criteria for triggering alerts. Powertech Database Monitor for IBM i is both robust and user-friendly, facilitating real-time monitoring of user actions on your IBM i databases. This solution’s exception-based event processing further aids in minimizing the need for manual database security and file integrity checks, thereby enhancing operational efficiency. Ultimately, this comprehensive approach not only safeguards your data but also promotes a proactive stance on security management.
  • 35
    Powertech Identity Manager for IBM i Reviews
    Ensuring that users have the appropriate rights while restricting unnecessary access is essential for maintaining the security of IBM i systems. Streamline the process of creating and updating user profiles by utilizing an automated and user-friendly solution. When onboarding new employees or adjusting the roles of current staff, you can generate user profiles tailored to their specific department and job title, eliminating the need to start from the ground up. It is crucial to guarantee that employees who hold the same positions possess uniform authorities, permissions, and access to partitions necessary for their responsibilities. By using templates, you can maintain consistency in user profile configurations throughout the organization. Easily modify profile settings and update profile templates across multiple systems without the need to log into each one individually. Additionally, Powertech Identity Manager for IBM i features a central administration menu that facilitates the creation or modification of user profiles across various systems, enhancing efficiency and security management. This centralized approach not only saves time but also helps ensure compliance with security policies effectively.
  • 36
    Powertech Multi-Factor Authentication Reviews
    The most recent update to the Payment Card Industry Data Security Standard mandates the use of multi-factor authentication (MFA) for any administrative access to the cardholder data environment (CDE), even when accessed from a trusted network. Additionally, implementing MFA helps streamline adherence to privacy regulations such as HIPAA and GDPR. With Powertech Multi-Factor Authentication, organizations can deploy MFA throughout their systems, including on platforms like IBM i. The solution also features comprehensive auditing and reporting tools that facilitate easy compliance verification. Relying solely on passwords is insufficient in the face of contemporary security threats. Many attackers are skilled in acquiring login credentials, and approximately half of all users tend to reuse passwords. Given the increase in remote work and network access, the question arises: which organization can afford such a significant level of vulnerability? By introducing Powertech Multi-Factor Authentication, organizations can enhance their existing security measures, significantly mitigating the potential impact of compromised passwords while fostering a more secure digital environment. This added layer of protection is essential as cyber risks continue to evolve.
  • 37
    Robot Console Reviews
    Neglecting IBM i messages and events can lead to delays in website order processing, inventory management, and account transactions, which can create significant issues. Robot Console proactively scans message queues to identify factors that may affect the performance of systems or applications. In cases where issues arise, Robot Console is capable of either resolving them automatically or escalating the matter, allowing you to focus on exceptions rather than everyday problems. This powerful message management solution streamlines your workflow, granting you more time to concentrate on what truly matters in your business. Effective availability monitoring extends well beyond just the QSYSOPR message queue, ensuring that your business users consistently have access to the critical system resources and applications they depend on daily. Additionally, Robot Console keeps an eye on various system resources including lines, ports, subsystems, and logs such as QHST, QAUDJRN, or FTP requests at designated intervals. If it identifies any issues, Robot Console can swiftly intervene, promoting higher uptime and ensuring that business operations continue seamlessly. With this level of oversight, you can rest assured that your systems are functioning optimally.
  • 38
    Robot HA Reviews
    In the event of an emergency or disaster, quickly switch to your on-premise or cloud backup server, allowing your business operations to resume in just a matter of minutes. Utilize your secondary system to handle nightly backups, execute queries, and carry out planned maintenance tasks without disrupting your primary production setup. You have the flexibility to replicate either your entire production environment or just specific libraries and programs, ensuring that your data is accessible on the target server almost immediately. With the use of remote journaling combined with a high-speed apply routine, Robot HA is capable of replicating an astounding 188 million journal transactions per hour, regardless of the distance—whether physical or virtual—and applies the data instantaneously upon receipt, ensuring that your hot backup remains a real-time reflection of your production environment. This system provides you with the reassurance that you can initiate a role swap whenever necessary. You have the option to manually trigger an audit for the role swap whenever you deem it necessary or schedule it to occur at regular intervals. Additionally, the audit can be customized to focus on the objects that are most critical to your data center, thereby enhancing the overall reliability of your backup strategy and ensuring your business's resilience.
  • 39
    Robot Save Reviews
    Oversee backups from a unified control hub, allowing for simple management of backup schedules while sharing and inventorying volumes across various instances of IBM i. Whether restoring a single object or an entire system, you can efficiently recover IBM i data with precision and minimal downtime. Eliminate the burdensome manual tasks associated with data backups through the use of reputable backup management software. Automated, safe, and dependable backups can run without supervision, freeing up your valuable time. Be prepared when auditors come calling for a documented disaster recovery plan—this backup reporting tool ensures you have everything readily accessible. Managing data backups can often be intricate; however, Robot Save streamlines the entire process, from deciding what to back up and locating files to monitoring saved items and handling save media post-backup. The outcome is reliable, scheduled backups that offer peace of mind and confidence in your data security. With such robust features, you can focus more on your core business operations while the backup processes are taken care of seamlessly.
  • 40
    TD/OMS Reviews

    TD/OMS

    Remain Software

    TD/OMS is compatible with IBM i (Power), Windows, and Unix/Linux platforms. It provides essential IT business process support for overseeing software modifications, development, deployment, and modernization initiatives. By facilitating collaboration among development teams, TD/OMS allows for the seamless exchange of information throughout various stages of the development lifecycle, including Development, Testing, Acceptance, and Deployment. This robust software solution encompasses all necessary features to meet the demands of contemporary software development practices. Furthermore, its versatility ensures that teams can adapt to changing environments and requirements with ease.
  • 41
    Visual LANSA Reviews
    Visual LANSA is a low code development platform that IT professionals use to create enterprise web and mobile apps more quickly, easier, and for a lower price than traditional coding. Visual LANSA is trusted by thousands of customers around the world. It eliminates the need to learn multiple technical skills required to create software applications. Once an app has been developed, it can then be deployed to an IBM i or Windows server. One IDE, one language. Visual LANSA includes features such as access Controls/Permissions, code assistance, code refactoring, collaboration tools, compatibility testing, data modeling, debugging, deployment management, graphical user interface, mobile development, No-Code, Reporting/Analytics, software development, source control, and version control. Visual LANSA provides 24/7 live support as well as online support.
  • 42
    VL OMNI Reviews
    Leading multichannel enterprises worldwide rely on VL OMNI to facilitate their eCommerce and ERP integrations, ensuring data flows effortlessly within their systems as they expand and enhance their operations. Through our comprehensive managed service, VL OMNI offers expert consultation tailored to growing brands, assisting them in aligning their applications with intricate business requirements. Effortlessly manage substantial data transfers with our adaptable and scalable integration solutions that evolve alongside your business rather than forcing you to adjust to them. Directly implement your business rules into data transformations, allowing our integration connectors to be customized to meet your unique specifications. Efficiently transfer data in a multipoint, bidirectional manner that resonates with your operational needs, while seamlessly aggregating and consolidating data across all sales channels. By leveraging real-time insights and business intelligence, you can ensure a consistently exceptional customer experience at every interaction point. This commitment to enhancing visibility and usability empowers businesses to thrive in a competitive landscape.
  • 43
    Fortra Robot Reviews
    The Robot product line is specifically crafted with the needs of operators at its core. With our contemporary interfaces and top-tier enterprise functionality, even those new to IBM i can oversee the system effectively by exception, allowing them to dedicate more time to IT projects that enhance value and influence financial outcomes. Having been integral to the IBM i community for over 35 years, Robot has a profound understanding of this platform. Our expertise extends beyond just the technical aspects; we truly grasp the requirements of the individuals who operate it and the organizations that depend on it. For those seeking a partner in IBM i, not merely a supplier, Robot is the go-to choice for support and collaboration. Trust in our long-standing commitment to excellence in this field.
  • 44
    PORTOLAN EVM Accounting Reviews

    PORTOLAN EVM Accounting

    PORTOLAN Commerce Solutions

    In the realm of accounting, outdated practices, complex procedures, and the lack of MS-Office integration frequently dominate the landscape, leaving little room for focusing on essential tasks. Transforming ingrained workflows and adopting new software often appears daunting and nearly impossible. The EVM accounting system, specifically designed for IBM i technology, features seamlessly integrated modules including financial accounting, asset management, and controlling. Enhanced by our EVM Mobile solution, this system delivers real-time reporting to keep you informed at all times. Since its inception in 1990, Portolan and EVM have evolved continuously to meet user needs, ensuring we only implement the modules that truly matter to you. The EVM accounting system not only streamlines your processes but also empowers your decision-making with timely data at your fingertips.
  • 45
    IBM PowerVM Reviews
    IBM® PowerVM® offers unparalleled server virtualization capabilities, enabling businesses to efficiently merge multiple workloads across fewer systems, which enhances server utilization and cuts costs. Organizations are increasingly adopting PowerVM for its secure, scalable virtualization environment tailored for AIX®, IBM i, and Linux applications, leveraging the advanced reliability, availability, and serviceability (RAS) features along with the exceptional performance of the Power Systems™ platform. With top-tier hypervisor technology, PowerVM guarantees the integrity and separation of essential applications and I/O, ensuring a secure enterprise environment. Users can easily scale their virtualized infrastructures, whether by expanding or enhancing existing setups, all without sacrificing performance. The solution also accelerates cloud service delivery by automating the deployment of virtual machines (VMs) and storage, while minimizing scheduled downtime through live migration capabilities between servers. Additionally, PowerVM enables businesses to maximize server and storage resource utilization, ultimately leading to improved cost management and greater returns on investment, making it a smart choice for modern enterprises. By choosing PowerVM, companies can future-proof their IT infrastructure and adapt to evolving demands seamlessly.
  • 46
    Infor LX Reviews
    Companies of various sizes across over 60 nations rely on Infor LX to facilitate each stage of their discrete manufacturing operations, encompassing processes from source-to-pay and prospect-to-cash to design-to-manufacture and financial reporting. With the LX Cloud, version 8.4 of this enterprise resource planning software, built on the IBM i® platform, becomes increasingly adaptable, boasting improved integration with Infor’s Supply Chain Execution, EAM, CRM, and Supplier Exchange systems, along with modern capabilities like Data Lake access, document management, and collaborative tools available through Infor OS. Additionally, the IBM® i infrastructure guarantees that essential systems remain scalable, reliable, and secure, which is crucial for operational continuity. The foundational features of LX empower manufacturers to evaluate their business performance effectively and make informed modifications to their supply, manufacturing, and distribution strategies to optimize efficiency. Ultimately, this comprehensive approach enables businesses to respond swiftly to market demands and maintain a competitive edge.
  • 47
    NGS-IQ Reviews

    NGS-IQ

    New Generation Software

    NGS-IQ offers integrated email and FTP capabilities along with the robust security features of IBM i and the ability to query external data sources. This solution allows you to enhance your reporting capabilities without the need for additional servers or databases in your network. With NGS-IQ™, business users and analysts can create queries that produce outputs in various formats, including Excel, Access, Word, PDF, CSV, TXT, HTML, and XML, as well as generate analytical reports and construct multidimensional models. Furthermore, it allows for the integration of web reporting that incorporates charts and drill-down functionalities into your intranet or web portal. Query developers benefit from a range of powerful, time-efficient tools, such as conditional (if-then) logic, calculations for new columns (fields), and run-time prompts for selecting records and applying calculation formulas. Additionally, the platform simplifies table (file) joins—whether inner, outer, exception, one-to-many, or unions—while offering program exits that facilitate unique data access and manipulation. The inclusion of query usage statistics and change management also enhances the overall efficiency of the querying process. Ultimately, NGS-IQ equips users with a comprehensive toolkit to streamline data reporting and analysis.
  • 48
    NetTerm Reviews
    InterSoft International, Inc. creates acclaimed software products that operate on Microsoft Windows workstations, facilitating connections to host systems such as IBM, UNIX, Windows, and VMS. Our solutions are utilized globally by both individuals and organizations to fulfill their client/server demands. The impressive capabilities of NetTerm make it suitable for use by military personnel, IBM, federal courts, the National Institutes of Health, public libraries, car dealerships, and countless individuals needing access to Internet accounts, public library systems, and various database connectivity options. Experts in the medical, financial, and legal sectors rely on NetTerm to navigate a wide array of databases across the globe. Recognized for its excellence, NetTerm is a powerful and customizable terminal emulator that supports Internet and intranet connections, offering compatibility with protocols including Telnet, rlogin, dial-up, and more. With its versatility and reliability, NetTerm continues to serve a diverse clientele and adapt to their evolving technological needs.
  • 49
    FlexTerm Reviews
    FlexTerm is developed entirely in C# .NET, offering a long-awaited modern user interface for the terminal emulation community. This interface features an innovative ribbon command bar that organizes the program's functionalities into a series of tabs located at the top of the window. By enhancing the discoverability of features and functions, it facilitates a quicker learning curve for users and fosters a sense of control over their interaction with the software. The ribbon not only replaces the conventional menu bar and toolbars but is also fully customizable, enabling users to design their own custom tabs and tab groups to suit their preferences. Additionally, a FlexTerm workspace can encompass a single session or multiple sessions, which can be docked and arranged as tabs or allowed to float independently. Users can effortlessly rearrange sessions within a workspace using intuitive drag-and-drop functionality, making it easier to tailor their workspace to their needs. This flexibility ensures that users can organize their terminal environment in a way that enhances their productivity and efficiency.
  • 50
    Precisely Enforcive Reviews
    Precisely's Enforcive Enterprise Security Suite stands out as a user-friendly and all-encompassing solution for security and compliance tailored specifically for IBM i systems. It features more than 20 seamlessly integrated, GUI-driven modules that empower system administrators and security personnel to oversee security and compliance activities with remarkable efficiency, even allowing for the management of multiple systems simultaneously. In an era marked by increasing privacy violations, intricate regulatory demands, and ever-evolving threats, this suite provides a robust framework for 'hardening' the defenses of your IBM i environment against unauthorized intrusions. The modules within the Enforcive Enterprise Security Suite address various critical areas, including network security, authority swapping, security monitoring, log transfers, and adherence to regulatory standards. Moreover, users have the flexibility to incorporate additional modules, customizing the solution to align perfectly with their unique operational requirements. By implementing this suite, organizations can significantly enhance their protective measures around IBM i systems and data while ensuring compliance with necessary security regulations, ultimately safeguarding their valuable information assets. This comprehensive approach not only mitigates risks but also fosters a culture of security awareness within the organization.
  • Previous
  • You're on page 1
  • 2
  • Next