Unimus
Unimus is a powerful network automation, configuration backup, and change management solution designed to simplify network operations for businesses of all sizes. Supporting 400+ device types across 150+ vendors, Unimus is a network-agnostic platform that eliminates manual network tasks while enhancing security and reliability.
With automated configuration backups, Unimus ensures seamless disaster recovery, giving IT teams quick access to historical versions and real-time change tracking. Its network auditing features provide instant visibility into configuration consistency, compliance, and security risks. Change management is simplified with automatic change detection, detailed version history, and customizable notifications.
Unimus' intuitive web-based interface makes it easy to manage networks without requiring deep technical expertise, while its integrated CLI access allows for real-time troubleshooting and command execution. Whether you're looking to automate bulk configuration changes, perform firmware upgrades, or improve network visibility, Unimus provides a scalable, cost-effective solution for modern network infrastructures.
Learn more
RaimaDB
RaimaDB, an embedded time series database that can be used for Edge and IoT devices, can run in-memory. It is a lightweight, secure, and extremely powerful RDBMS. It has been field tested by more than 20 000 developers around the world and has been deployed in excess of 25 000 000 times.
RaimaDB is a high-performance, cross-platform embedded database optimized for mission-critical applications in industries such as IoT and edge computing. Its lightweight design makes it ideal for resource-constrained environments, supporting both in-memory and persistent storage options. RaimaDB offers flexible data modeling, including traditional relational models and direct relationships through network model sets. With ACID-compliant transactions and advanced indexing methods like B+Tree, Hash Table, R-Tree, and AVL-Tree, it ensures data reliability and efficiency. Built for real-time processing, it incorporates multi-version concurrency control (MVCC) and snapshot isolation, making it a robust solution for applications demanding speed and reliability.
Learn more
Ardoq
Ardoq revolutionizes Enterprise Architecture by turning complex data into connected insights that drive better business outcomes. Built for modern enterprises, it replaces static documentation with a living, data-integrated repository that reflects your IT ecosystem in real time. From application rationalization to cloud migration and business capability modeling, Ardoq enables teams to visualize dependencies, identify risks, and optimize investments. It helps Enterprise Architects, CIOs, and Business Leaders align IT and business goals by connecting data from multiple systems to measurable outcomes. Users can model change scenarios, uncover redundancies, and generate insights that save both time and money—like one customer who saved $800,000 annually by rationalizing 30 unused applications. Ardoq’s collaborative interface makes data maintenance effortless, allowing stakeholders to contribute updates that ensure accuracy and accountability. Recognized as a five-time leader in the Gartner® Magic Quadrant™, it is built for organizations that want strategic agility backed by real-time intelligence. With Ardoq, architecture becomes the core driver of innovation, risk reduction, and operational excellence.
Learn more
Riot
Albert makes it possible to engage your employees in the fundamentals of cybersecurity with a method they truly enjoy. The key to this success lies in chat-based courses that last just five minutes, designed to be immersive and interactive. You can establish your awareness program using our extensive catalog of courses that address a range of topics, from CEO fraud to tailgating. Each course is tailored specifically for individual employees and distributed throughout the year. You can monitor the program’s progress in real-time from your dashboard, enabling you to quickly identify and reach out to those who have disengaged. Additionally, there's an option to export the program overview as a CSV file to meet compliance requirements. Conducting a phishing drill is also an integral part of this program, offering your team a chance to respond to simulated phishing attacks in a secure setting. With phishing tactics becoming increasingly sophisticated, the Riot catalog features a wide array of scenarios, including both spear phishing and CEO fraud, ensuring comprehensive training for your team. As cybersecurity threats continue to evolve, equipping your employees with the right knowledge is more crucial than ever.
Learn more