What Integrates with Meridian Global LMS?

Find out what Meridian Global LMS integrations exist in 2025. Learn what software and services currently integrate with Meridian Global LMS, and sort them by reviews, cost, features, and more. Below is a list of products that Meridian Global LMS currently integrates with:

  • 1
    VIPRE Security Awareness Reviews

    VIPRE Security Awareness

    Inspired eLearning powered by VIPRE

    $16.75/user/year
    Inspired eLearning, powered by VIPRE, delivers cutting-edge security awareness training designed to help organizations minimize human-related security risks. By combining enterprise-grade cybersecurity software with targeted, user-friendly solutions, Inspired eLearning equips employees with the knowledge and tools needed to identify and respond effectively to modern cyber threats. With over 15 years of expertise in enterprise cybersecurity, the company provides three comprehensive, off-the-shelf packages tailored to meet the needs of businesses of all sizes and experience levels: Security First: Select, Security First: Preferred, and Security First: Elite. Each package includes an array of resources, such as in-depth training programs, engaging micro-learning modules, skills assessments, and phishing simulations powered by PhishProof, a solution proven to enhance awareness and readiness. Built on a foundation of automation, these solutions enable organizations to measure their progress, implement best practices, and foster a robust, security-first culture across their workforce. By prioritizing education and proactive defense, Inspired eLearning empowers organizations to confidently navigate today’s evolving threat landscape.
  • 2
    Inspired eLearning HR & Compliance Reviews

    Inspired eLearning HR & Compliance

    Inspired eLearning powered by VIPRE

    $16.75/user/year
    A single claim of harassment or a compliance violation can be extremely costly. Not only in dollars, but also in lost productivity, morale and reputation. The online HR and Compliance solutions from Inspired eLearning protect against these risks. Our programs are backed by the nationally recognized employment firm Fisher Phillips. They provide proven culpability while educating organizations about important governmental and industrial requirements. Harassment at work can lead to costly lawsuits, low morale and reputation loss, as well as diminished profits. The online harassment training program from Inspired eLearning can protect your company from lawsuits while creating a supportive working environment where all employees feel secure. Ethics are the foundation of any organization's culture. Inspired eLearning helps build a culture where employees make decisions that reflect organizational values, and are in compliance with industry standards and regulations.
  • 3
    Watershed Reviews

    Watershed

    Watershed

    $2,100/month
    Watershed can be used to standardize and collect data from your learning ecosystem. This will allow you to automate reporting, reduce scrap and provide a single source for truth. Watershed's Learning Record Store (LRS), which collects data via xAPI and proprietary connectors, as well as a data conversion engine, eliminates the need to access siloed systems data. The learning analytics capabilities provide robust reporting options that include enterprise integration, data security, and scalability.
  • 4
    OpenSesame Reviews
    We have the largest collection of elearning courses available from the top publishers around the world. We can help you find the right courses, map them to your core competencies, sync them with your LMS, and increase utilization and improve your L&D programs. Our carefully curated catalog contains thousands of courses that cover business skills, safety, technology, certifications and other industry-specific topics.
  • 5
    iSecurity Audit Reviews
    iSecurity Audit significantly improves the native auditing capabilities of IBM i by continuously monitoring and reporting on all activities within the IBM i environment. Utilizing real-time detection, it identifies security events instantly and logs the relevant details for future reference. The audit logs can be presented in user-friendly graphical formats, complemented by clear explanations for each entry, facilitating quick analysis of statistical data. A key feature of this system is its ability to trigger alerts or initiate immediate corrective measures in response to security threats. Uniquely designed for non-technical users, such as external auditors and managers, iSecurity Audit stands out as the sole security auditing solution for IBM i created with user-friendliness in mind. In addition, this advanced security auditing tool not only monitors real-time events but also activates alerts and responses to potential vulnerabilities, making it an indispensable resource. Furthermore, it boasts a robust report generator equipped with over one hundred customizable, pre-configured reports, ensuring comprehensive coverage of security auditing needs.
  • 6
    iSecurity AP-Journal Reviews
    iSecurity AP-Journal serves to safeguard essential business data against both insider threats and external security breaches while also keeping managers informed about any alterations to information assets, thereby simplifying the IBM i journaling process. It meticulously records the details of activities—who did what, when, and which specific actions were taken. Unlike the standard IBM i journaling, it captures database access (READ operations) directly into journal receivers, making it a vital element for meeting compliance requirements. The solution actively monitors modifications to objects, application files, and their members, while also accommodating periodic structural changes in application files. It facilitates the observation of application files during such changes, and offers programmable routines tailored to specific field exits. Moreover, it provides real-time alerts for any changes in critical business data, with these notifications triggered by thresholds defined by users. In addition, it generates detailed reports that present all application modifications on a unified timeline and in multiple formats, ensuring comprehensive oversight of data integrity. This level of reporting not only enhances transparency but also aids in maintaining robust security protocols.
  • Previous
  • You're on page 1
  • Next